[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14298 Download | Alert*

The host is installed with Cisco AnyConnect Secure Mobility Client 4.0.00051 and earlier and is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to properly handle the crafted IPC messages. successful exploitation could allow attackers to inject arbitrary web script or HTML via vectors.

The host is installed with Cisco AnyConnect Secure Mobility Client through 4.0.00051 and is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to properly handle the crafted IPC messages. successful exploitation could allow attackers to inject arbitrary web script or HTML via vectors.

The host is installed with Cisco AnyConnect Secure Mobility Client 3.0 through 3.0.5080 or 3.1.0 through 3.1.02043 and is prone to an input validation vulnerability. A flaw is present in the application which fails to properly verify the files. successful exploitation could allow attackers to gain privileges via unspecified vectors.

The host is installed with Cisco AnyConnect Secure Mobility Client 2.0.0343 through 2.5.3055 and is prone to a buffer overflow vulnerability. A flaw is present in the application which fails to properly handle the Active Template Library (ATL) framework in the VPNAPI COM module. successful exploitation could allow attackers to execute arbitrary code via a crafted HTML document.

The host is installed with Cisco VPN Client on Windows before 5.0.01.0600 or 5.0.01.0600 InstallShield (IS) and is prone to privilege escalation vulnerability. A flaw is present in the application due to weak permissions for cvpnd.exe. Successful exploitation allows local attackers to gain privileges via a modified cvpnd.exe.

The host is installed with Cisco VPN Client on Windows before 4.8.02.0010 and is prone to privilege escalation vulnerability. A flaw is present in the application, which is caused by an error in the Dial-up Networking Interface. Successful exploitation allows local attackers to gain privileges via interacting with the dial-up networking dialog box.

The host is installed with Cisco AnyConnect Secure Mobility Client 4.0.00051 and earlier and is prone to a path traversal vulnerability. A flaw is present in the application which fails to properly handle the host scan module. Successful exploitation could allow attackers to write to arbitrary files via crafted IPC messages.

The host is installed with Cisco AnyConnect Secure Mobility Client 3.1.02043 and earlier and is prone to a cross-site scripting vulnerability. A flaw is present in the application which fails to properly handle the applet-path URL. successful exploitation could allow attackers to inject arbitrary web script or HTML via vectors.

The host is installed with VMWare Tools 9.x or 10.x through 10.0.5, VMware Workstation 12.1.x before 12.1.1 or VMware Player 12.1.x before 12.1.1 and is prone to an untrusted search path vulnerability. A flaw is present in the application, which fails to properly handle a trojan horse dll in the current working directory. Successful exploitation allows local users to gain privileges.

The host is installed with 5.5.19 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Server Optimizer. Successful exploitation could allow remote authenticated users to affect availability.


Pages:      Start    1293    1294    1295    1296    1297    1298    1299    1300    1301    1302    1303    1304    1305    1306    ..   1429

© SecPod Technologies