![]() To exploit these vulnerabilities, the attacker must have valid credentials on the Windows system. A successful exploit could allow the attacker to execute arbitrary code on an affected device with SYSTEM privileges. ![]() Synopsis The remote device is missing a vendor-supplied security patch Description Multiple vulnerabilities in the install, uninstall, and upgrade processes of Cisco Anåonnect Secure Mobility Client for Windows could allow an authenticated, local attacker to hijack DLL or executable files that are used by the application. Severity display preferences can be toggled in the settings dropdown. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. The calculated severity for Plugins has been updated to use CVSS v3 by default.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |