Show filters
160 Total Results
Displaying 21-30 of 160
Sort by:
Attacker Value
Unknown

CVE-2023-38042

Disclosure Date: May 31, 2024 (last updated June 01, 2024)
A local privilege escalation vulnerability in Ivanti Secure Access Client for Windows allows a low privileged user to execute code as SYSTEM.
0
Attacker Value
Unknown

CVE-2024-20391

Disclosure Date: May 15, 2024 (last updated May 16, 2024)
A vulnerability in the Network Access Manager (NAM) module of Cisco Secure Client could allow an unauthenticated attacker with physical access to an affected device to elevate privileges to SYSTEM. This vulnerability is due to a lack of authentication on a specific function. A successful exploit could allow the attacker to execute arbitrary code with SYSTEM privileges on an affected device.
0
Attacker Value
Unknown

CVE-2024-3661

Disclosure Date: May 06, 2024 (last updated January 16, 2025)
DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.
Attacker Value
Unknown

CVE-2024-20338

Disclosure Date: March 06, 2024 (last updated March 07, 2024)
A vulnerability in the ISE Posture (System Scan) module of Cisco Secure Client for Linux could allow an authenticated, local attacker to elevate privileges on an affected device. This vulnerability is due to the use of an uncontrolled search path element. An attacker could exploit this vulnerability by copying a malicious library file to a specific directory in the filesystem and persuading an administrator to restart a specific process. A successful exploit could allow the attacker to execute arbitrary code on an affected device with root privileges.
0
Attacker Value
Unknown

CVE-2024-20337

Disclosure Date: March 06, 2024 (last updated March 07, 2024)
A vulnerability in the SAML authentication process of Cisco Secure Client could allow an unauthenticated, remote attacker to conduct a carriage return line feed (CRLF) injection attack against a user. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link while establishing a VPN session. A successful exploit could allow the attacker to execute arbitrary script code in the browser or access sensitive, browser-based information, including a valid SAML token. The attacker could then use the token to establish a remote access VPN session with the privileges of the affected user. Individual hosts and services behind the VPN headend would still need additional credentials for successful access.
0
Attacker Value
Unknown

CVE-2023-28872

Disclosure Date: December 25, 2023 (last updated January 04, 2024)
Support Assistant in NCP Secure Enterprise Client before 13.10 allows attackers to execute DLL files with SYSTEM privileges by creating a symbolic link from a %LOCALAPPDATA%\Temp\NcpSupport* location.
Attacker Value
Unknown

CVE-2023-28871

Disclosure Date: December 09, 2023 (last updated December 13, 2023)
Support Assistant in NCP Secure Enterprise Client before 12.22 allows attackers to read registry information of the operating system by creating a symbolic link.
Attacker Value
Unknown

CVE-2023-28870

Disclosure Date: December 09, 2023 (last updated December 13, 2023)
Insecure File Permissions in Support Assistant in NCP Secure Enterprise Client before 12.22 allow attackers to write to configuration files from low-privileged user accounts.
Attacker Value
Unknown

CVE-2023-28869

Disclosure Date: December 09, 2023 (last updated December 13, 2023)
Support Assistant in NCP Secure Enterprise Client before 12.22 allows attackers read the contents of arbitrary files on the operating system by creating a symbolic link.
Attacker Value
Unknown

CVE-2023-28868

Disclosure Date: December 09, 2023 (last updated December 13, 2023)
Support Assistant in NCP Secure Enterprise Client before 12.22 allows attackers to delete arbitrary files on the operating system by creating a symbolic link.