Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
anyconnect secure mobility client vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2021-1258
A vulnerability in the upgrade component of Cisco AnyConnect Secure Mobility Client could allow an authenticated, local attacker with low privileges to read arbitrary files on the underlying operating system (OS) of an affected device. The vulnerability is due to insufficient fil...
Cisco Anyconnect Secure Mobility Client
Mcafee Agent Epolicy Orchestrator Extension
7.2
CVSSv2
CVE-2015-4211
Cisco AnyConnect Secure Mobility Client 3.1(60) on Windows does not properly validate pathnames, which allows local users to gain privileges via a crafted INF file, aka Bug ID CSCus65862.
Cisco Anyconnect Secure Mobility Client 3.1\\(60\\)
5
CVSSv2
CVE-2019-1853
A vulnerability in the HostScan component of Cisco AnyConnect Secure Mobility Client for Linux could allow an unauthenticated, remote malicious user to read sensitive information on an affected system. The vulnerability exists because the affected software performs improper bound...
Cisco Anyconnect Secure Mobility Client 4.6\\(2074\\)
4.9
CVSSv2
CVE-2021-1450
A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client could allow an authenticated, local malicious user to cause a denial of service (DoS) condition on an affected device. To exploit this vulnerability, the attacker would need...
Cisco Anyconnect Secure Mobility Client 4.9\\(5086\\)
2.1
CVSSv2
CVE-2021-1519
A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client Software could allow an authenticated, local malicious user to overwrite VPN profiles on an affected device. The vulnerability is due to insufficient validation of user-supp...
Cisco Anyconnect Secure Mobility Client
4.4
CVSSv2
CVE-2020-3556
A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client Software could allow an authenticated, local malicious user to cause a targeted AnyConnect user to execute a malicious script. The vulnerability is due to a lack of authenti...
Cisco Anyconnect Secure Mobility Client 4.9\\(3052\\)
Cisco Anyconnect Secure Mobility Client 98.145\\(86\\)
2.1
CVSSv2
CVE-2017-12268
A vulnerability in the Network Access Manager (NAM) of Cisco AnyConnect Secure Mobility Client could allow an authenticated, local malicious user to enable multiple network adapters, aka a Dual-Homed Interface vulnerability. The vulnerability is due to insufficient NAM policy enf...
Cisco Anyconnect Secure Mobility Client 4.5\\(822\\)
5.8
CVSSv2
CVE-2018-0334
A vulnerability in the certificate management subsystem of Cisco AnyConnect Network Access Manager and of Cisco AnyConnect Secure Mobility Client for iOS, Mac OS X, Android, Windows, and Linux could allow an unauthenticated, remote malicious user to bypass the TLS certificate che...
Cisco Anyconnect Secure Mobility Client 4.6\\(100\\)
7.2
CVSSv2
CVE-2021-1426
Multiple vulnerabilities in the install, uninstall, and upgrade processes of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local malicious user to hijack DLL or executable files that are used by the application. A successful exploit could allow...
Cisco Anyconnect Secure Mobility Client
7.2
CVSSv2
CVE-2021-1427
Multiple vulnerabilities in the install, uninstall, and upgrade processes of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local malicious user to hijack DLL or executable files that are used by the application. A successful exploit could allow...
Cisco Anyconnect Secure Mobility Client
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
brute force
CVE-2024-24908
open redirect
CVE-2024-31497
CVE-2023-45866
CVE-2024-4135
CVE-2024-25523
cache poisoning
CVE-2024-4649
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »