Vulnerabilities > Cisco > Anyconnect Secure Mobility Client > 3.1.0

DATE CVE VULNERABILITY TITLE RISK
2015-03-17 CVE-2015-0662 Permissions, Privileges, and Access Controls vulnerability in Cisco Anyconnect Secure Mobility Client
Cisco AnyConnect Secure Mobility Client 4.0(.00051) and earlier allows local users to gain privileges via crafted IPC messages that trigger use of root privileges for a software-package installation, aka Bug ID CSCus79385.
local
low complexity
cisco CWE-264
7.2
2013-04-11 CVE-2013-1173 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Cisco Anyconnect Secure Mobility Client
Heap-based buffer overflow in ciscod.exe in the Cisco Security Service in Cisco AnyConnect Secure Mobility Client (aka AnyConnect VPN Client) allows local users to gain privileges via unspecified vectors, aka Bug ID CSCud14143.
local
cisco CWE-119
6.6
2013-04-11 CVE-2013-1172 Improper Input Validation vulnerability in Cisco Anyconnect Secure Mobility Client
The Cisco Security Service in Cisco AnyConnect Secure Mobility Client (aka AnyConnect VPN Client) does not properly verify files, which allows local users to gain privileges via unspecified vectors, aka Bug ID CSCud14153.
local
cisco CWE-20
6.6
2012-09-16 CVE-2012-3094 Information Exposure vulnerability in Cisco Anyconnect Secure Mobility Client 3.1.0
The VPN downloader in the download_install component in Cisco AnyConnect Secure Mobility Client 3.1.x before 3.1.00495 on Linux accepts arbitrary X.509 server certificates without user interaction, which allows remote attackers to obtain sensitive information via vectors involving an invalid certificate, aka Bug ID CSCua11967.
network
low complexity
cisco linux CWE-200
5.0
2012-09-16 CVE-2012-3088 Remote Security vulnerability in Cisco Anyconnect Secure Mobility Client 3.1.0/3.2.0
Cisco AnyConnect Secure Mobility Client 3.1.x before 3.1.00495, and 3.2.x, does not check whether an HTTP request originally contains ScanSafe headers, which allows remote attackers to have an unspecified impact via a crafted request, aka Bug ID CSCua13166.
network
cisco
critical
9.3