A certain Java applet in the VPN downloader implementation in the WebLaunch feature in Cisco AnyConnect Secure Mobility Client 3.x before 3.0 MR7 on 64-bit Linux platforms does not properly restrict use of Java components, which allows remote attackers to execute arbitrary code via a crafted web site, aka Bug ID CSCty45925.
                
            References
                    | Link | Resource | 
|---|---|
| http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ac | Vendor Advisory | 
| http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ac | Vendor Advisory | 
Configurations
                    History
                    21 Nov 2024, 01:39
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120620-ac - Vendor Advisory | 
Information
                Published : 2012-06-20 20:55
Updated : 2025-04-11 00:51
NVD link : CVE-2012-2496
Mitre link : CVE-2012-2496
CVE.ORG link : CVE-2012-2496
JSON object : View
Products Affected
                cisco
- anyconnect_secure_mobility_client
CWE
                
                    
                        
                        CWE-20
                        
            Improper Input Validation
