CVE-2006-5806
https://notcve.org/view.php?id=CVE-2006-5806
SSL VPN Client in Cisco Secure Desktop before 3.1.1.45, when configured to spawn a web browser after a successful connection, stores sensitive browser session information in a directory outside of the CSD vault and does not restrict the user from saving files outside of the vault, which is not cleared after the VPN connection terminates and allows local users to read unencrypted data. El SSL VPN Client del Cisco Secure Desktop en versiones anteriores a la 3.1.1.45, cuando se está creando la configuración de un buscador web después de una conexión con éxito, almacena información sensible de la sesión del buscador en un directorio externo al CSD y permite al usuario guardar ficheros fuera de la parte segura, que no son borrados una vez que la conexión VPN finaliza con lo que permite a usuarios locales leer datos codificados. • http://secunia.com/advisories/22747 http://securitytracker.com/id?1017195 http://www.cisco.com/warp/public/707/cisco-sa-20061108-csd.shtml http://www.osvdb.org/30306 http://www.securityfocus.com/bid/20964 http://www.vupen.com/english/advisories/2006/4409 https://exchange.xforce.ibmcloud.com/vulnerabilities/30129 •
CVE-2000-0568
https://notcve.org/view.php?id=CVE-2000-0568
Sybergen Secure Desktop 2.1 does not properly protect against false router advertisements (ICMP type 9), which allows remote attackers to modify default routes. • http://www.securityfocus.com/bid/1417 http://www.securityfocus.com/templates/archive.pike?list=1&msg=4125690E.00524395.00%40guardianit.se •