[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with Cisco AnyConnect Secure Mobility Client 3.0 through 3.0.5080 or 3.1 through 3.1.02043 and is prone to an input validation vulnerability. A flaw is present in the application which fails to properly verify the files. successful exploitation could allow attackers to gain privileges via unspecified vectors.

The host is installed with Cisco AnyConnect Secure Mobility Client 2.0.0343 through 4.1 and is prone to an untrusted search path vulnerability. A flaw is present in the application which fails to properly handle the CMainThread::launchDownloader function in vpndownloader.exe. Successful exploitation could allow attackers to gain privileges via a Trojan horse DLL in the current working directory.

The host is installed with Cisco AnyConnect Secure Mobility Client before 4.2.05015 or 4.3.x before 4.3.02039 is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to properly handle the path names. Successful exploitation could allow local users to gain privileges via a crafted INF file.

The host is installed with Cisco AnyConnect Secure Mobility Client 4.3.02039 or 4.3.00748 is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to properly handle the path names. Successful exploitation could allow local users to install and execute an arbitrary executable file with privileges equivalent to the Microsoft Windows operating system SYSTEM ...

The host is installed with Cisco AnyConnect Secure Mobility Client 4.0.00051 and earlier and is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to properly handle the crafted IPC messages. successful exploitation could allow attackers to inject arbitrary web script or HTML via vectors.

The host is installed with Cisco AnyConnect Secure Mobility Client through 4.0.00051 and is prone to a privilege escalation vulnerability. A flaw is present in the application which fails to properly handle the crafted IPC messages. successful exploitation could allow attackers to inject arbitrary web script or HTML via vectors.

The host is installed with Cisco AnyConnect Secure Mobility Client 3.0 through 3.0.5080 or 3.1.0 through 3.1.02043 and is prone to an input validation vulnerability. A flaw is present in the application which fails to properly verify the files. successful exploitation could allow attackers to gain privileges via unspecified vectors.

The host is installed with Cisco AnyConnect Secure Mobility Client 2.0.0343 through 2.5.3055 and is prone to a buffer overflow vulnerability. A flaw is present in the application which fails to properly handle the Active Template Library (ATL) framework in the VPNAPI COM module. successful exploitation could allow attackers to execute arbitrary code via a crafted HTML document.

The host is installed with Cisco VPN Client on Windows before 5.0.01.0600 or 5.0.01.0600 InstallShield (IS) and is prone to privilege escalation vulnerability. A flaw is present in the application due to weak permissions for cvpnd.exe. Successful exploitation allows local attackers to gain privileges via a modified cvpnd.exe.

The host is installed with Cisco VPN Client on Windows before 4.8.02.0010 and is prone to privilege escalation vulnerability. A flaw is present in the application, which is caused by an error in the Dial-up Networking Interface. Successful exploitation allows local attackers to gain privileges via interacting with the dial-up networking dialog box.


Pages:      Start    1367    1368    1369    1370    1371    1372    1373    1374    1375    1376    1377    1378    1379    1380    ..   1502

© SecPod Technologies