Show filters
243 Total Results
Displaying 201-210 of 243
Sort by:
Attacker Value
Unknown
CVE-2016-4787
Disclosure Date: May 26, 2016 (last updated February 28, 2024)
Pulse Connect Secure (PCS) 8.2 before 8.2r1, 8.1 before 8.1r2, 8.0 before 8.0r10, and 7.4 before 7.4r13.4 allow remote attackers to read sensitive system authentication files in an unspecified directory via unknown vectors.
0
Attacker Value
Unknown
CVE-2016-3985
Disclosure Date: April 12, 2016 (last updated November 25, 2024)
The Terminal Services Remote Desktop Protocol (RDP) client session restrictions feature in Pulse Connect Secure (aka PCS) 8.1R7 and 8.2R1 allow remote authenticated users to bypass intended access restrictions via unspecified vectors.
0
Attacker Value
Unknown
CVE-2015-6322
Disclosure Date: October 12, 2015 (last updated October 05, 2023)
The IPC channel in Cisco AnyConnect Secure Mobility Client 2.0.0343 through 4.1(8) allows local users to bypass intended access restrictions and move arbitrary files by leveraging the lack of source-path validation, aka Bug ID CSCuv48563.
0
Attacker Value
Unknown
CVE-2015-7323
Disclosure Date: October 05, 2015 (last updated October 05, 2023)
The Secure Meeting (Pulse Collaboration) in Pulse Connect Secure (formerly Juniper Junos Pulse) before 7.1R22.1, 7.4, 8.0 before 8.0R11, and 8.1 before 8.1R3 allows remote authenticated users to bypass intended access restrictions and log into arbitrary meetings by leveraging a meeting id and meetingAppSun.jar.
0
Attacker Value
Unknown
CVE-2015-7322
Disclosure Date: October 05, 2015 (last updated October 05, 2023)
The Secure Meeting (Pulse Collaboration) in Pulse Connect Secure (formerly Juniper Junos Pulse) before 7.1R22.1, 7.4, 8.0 before 8.0R11, and 8.1 before 8.1R3 provides different messages for attempts to join a meeting depending on the status of the meeting, which allows remote attackers to enumerate valid meeting ids via a series of requests.
0
Attacker Value
Unknown
CVE-2015-6305
Disclosure Date: September 26, 2015 (last updated October 05, 2023)
Untrusted search path vulnerability in the CMainThread::launchDownloader function in vpndownloader.exe in Cisco AnyConnect Secure Mobility Client 2.0 through 4.1 on Windows allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by dbghelp.dll, aka Bug ID CSCuv01279. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-4211.
0
Attacker Value
Unknown
CVE-2015-6306
Disclosure Date: September 26, 2015 (last updated October 05, 2023)
Cisco AnyConnect Secure Mobility Client 4.1(8) on OS X and Linux does not verify pathnames before installation actions, which allows local users to obtain root privileges via a crafted installation file, aka Bug ID CSCuv11947.
0
Attacker Value
Unknown
CVE-2015-5369
Disclosure Date: August 11, 2015 (last updated October 05, 2023)
Pulse Connect Secure (aka PCS and formerly Juniper PCS) PSC6000, PCS6500, and MAG PSC360 8.1 before 8.1r5, 8.0 before 8.0r13, 7.4 before 7.4r13.5, and 7.1 before 7.1r22.2 and PPS 5.1 before 5.1R5 and 5.0 before 5.0R13, when Hardware Acceleration is enabled, does not properly validate the Finished TLS handshake message, which makes it easier for remote attackers to conduct man-in-the-middle attacks via a crafted Finished message.
0
Attacker Value
Unknown
CVE-2015-4289
Disclosure Date: August 01, 2015 (last updated October 05, 2023)
Directory traversal vulnerability in Cisco AnyConnect Secure Mobility Client 4.0(2049) allows remote head-end systems to write to arbitrary files via a crafted configuration attribute, aka Bug ID CSCut93920.
0
Attacker Value
Unknown
CVE-2015-4290
Disclosure Date: July 29, 2015 (last updated October 05, 2023)
The kernel extension in Cisco AnyConnect Secure Mobility Client 4.0(2049) on OS X allows local users to cause a denial of service (panic) via vectors involving contiguous memory locations, aka Bug ID CSCut12255.
0