Vulnerabilities > Cisco > Secure Desktop

DATE CVE VULNERABILITY TITLE RISK
2015-04-17 CVE-2015-0691 Permissions, Privileges, and Access Controls vulnerability in Cisco Secure Desktop
A certain Cisco JAR file, as distributed in Cache Cleaner in Cisco Secure Desktop (CSD), allows remote attackers to execute arbitrary commands via a crafted web site, aka Bug ID CSCup83001.
network
cisco CWE-264
critical
9.3
2012-09-24 CVE-2012-4655 Improper Input Validation vulnerability in Cisco Secure Desktop
The WebLaunch feature in Cisco Secure Desktop before 3.6.6020 does not properly validate binaries that are received by the downloader process, which allows remote attackers to execute arbitrary code via vectors involving (1) ActiveX or (2) Java components, aka Bug IDs CSCtz76128 and CSCtz78204.
network
cisco CWE-20
critical
9.3
2012-06-20 CVE-2012-2495 Improper Input Validation vulnerability in Cisco Anyconnect Secure Mobility Client and Secure Desktop
The HostScan downloader implementation in Cisco AnyConnect Secure Mobility Client 3.x before 3.0 MR8 and Cisco Secure Desktop before 3.6.6020 does not compare the timestamp of offered software to the timestamp of installed software, which allows remote attackers to force a version downgrade by using (1) ActiveX or (2) Java components to offer signed code that corresponds to an older software release, aka Bug ID CSCtx74235.
network
cisco CWE-20
4.3
2011-02-28 CVE-2011-0925 Improper Input Validation vulnerability in Cisco Secure Desktop
The CSDWebInstallerCtrl ActiveX control in CSDWebInstaller.ocx in Cisco Secure Desktop (CSD) allows remote attackers to download an unintended Cisco program onto a client machine, and execute this program, by identifying a Cisco program with a Cisco digital signature and then renaming this program to inst.exe, a different vulnerability than CVE-2010-0589 and CVE-2011-0926.
network
cisco CWE-20
critical
9.3
2011-02-25 CVE-2011-0926 Improper Input Validation vulnerability in Cisco Secure Desktop
A certain ActiveX control in CSDWebInstaller.ocx in Cisco Secure Desktop (CSD) does not properly verify the signature of an unspecified downloaded program, which allows remote attackers to execute arbitrary code by spoofing the CSD installation process, a different vulnerability than CVE-2010-0589.
network
cisco CWE-20
critical
9.3
2010-10-14 CVE-2009-5008 Permissions, Privileges, and Access Controls vulnerability in Cisco Secure Desktop
Cisco Secure Desktop (CSD), when used in conjunction with an AnyConnect SSL VPN server, does not properly perform verification, which allows local users to bypass intended policy restrictions via a modified executable file.
local
low complexity
cisco CWE-264
2.1
2010-04-15 CVE-2010-0589 Improper Input Validation vulnerability in Cisco Secure Desktop
The Web Install ActiveX control (CSDWebInstaller) in Cisco Secure Desktop (CSD) before 3.5.841 does not properly verify the signatures of downloaded programs, which allows remote attackers to force the download and execution of arbitrary files via a crafted web page, aka Bug ID CSCta25876.
network
cisco CWE-20
critical
9.3
2006-11-08 CVE-2006-5808 Multiple vulnerability in Cisco Secure Desktop
The installation of Cisco Secure Desktop (CSD) before 3.1.1.45 uses insecure default permissions (all users full control) for the CSD directory and its parent directory, which allow local users to gain privileges by replacing CSD executables, aka "Local Privilege Escalation".
local
low complexity
cisco
4.6
2006-11-08 CVE-2006-5807 Multiple vulnerability in Cisco Secure Desktop
Cisco Secure Desktop (CSD) before 3.1.1.45 allows local users to escape out of the secure desktop environment by using certain applications that switch to the default desktop, aka "System Policy Evasion".
local
low complexity
cisco
4.6
2006-11-08 CVE-2006-5806 Multiple vulnerability in Cisco Secure Desktop
SSL VPN Client in Cisco Secure Desktop before 3.1.1.45, when configured to spawn a web browser after a successful connection, stores sensitive browser session information in a directory outside of the CSD vault and does not restrict the user from saving files outside of the vault, which is not cleared after the VPN connection terminates and allows local users to read unencrypted data.
local
low complexity
cisco
2.1