![]() If the file is a critical systems file, the exploit could lead to a denial of service condition. A successful exploit could allow the attacker to corrupt the contents of the file. An authenticated, attacker could exploit this vulnerability by creating a symbolic link (symlink) to a target file on a specific path. The vulnerability is due to the incorrect handling of directory paths. Synopsis The remote device is missing a vendor-supplied security patch Description According to its self-reported version, Cisco Anåonnect Secure Mobility Client is affected by a file corruption vulnerability. Severity display preferences can be toggled in the settings dropdown. ![]() ![]() ![]() Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. The calculated severity for Plugins has been updated to use CVSS v3 by default. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |