You are here
Home > Preporuke > Ranjivost Cisco AnyConnect Secure Mobility Client proizvoda

Ranjivost Cisco AnyConnect Secure Mobility Client proizvoda

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

The following Cisco Security Advisory was published by Cisco PSIRT at 22:27 UTC on 2020-November-05.

+——————————————————————–

Cisco AnyConnect Secure Mobility Client Arbitrary Code Execution Vulnerability

CVE-2020-3556

SIR: High

CVSS Score v(3.1): 7.3

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-ipc-KfQO9QhK [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-ipc-KfQO9QhK”]

—–BEGIN PGP SIGNATURE—–
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=vd0H
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

 

 

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

The following Cisco Security Advisory was published by Cisco PSIRT at 22:27 UTC on 2020-November-05.

+——————————————————————–

Cisco AnyConnect Secure Mobility Client Arbitrary Code Execution Vulnerability

CVE-2020-3556

SIR: High

CVSS Score v(3.1): 7.3

URL: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-ipc-KfQO9QhK [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-ipc-KfQO9QhK”]

—–BEGIN PGP SIGNATURE—–
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=vd0H
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

Top
More in Preporuke
Nadogradnja za macOS Catalina

Apple je izdao nadogradnju za operacijski sustav macOS Catalina. Otkriveni nedostaci zahvaćaju jezgru operacijskog sustava i FontParser , a ovisno...

Close