CVE-2023-28797
- EPSS 0.03%
- Veröffentlicht 23.10.2023 14:15:09
- Zuletzt bearbeitet 21.11.2024 07:56:01
Zscaler Client Connector for Windows before 4.1 writes/deletes a configuration file inside specific folders on the disk. A malicious user can replace the folder and execute code as a privileged user.
CVE-2023-28803
- EPSS 0.01%
- Veröffentlicht 23.10.2023 14:15:09
- Zuletzt bearbeitet 21.11.2024 07:56:02
An authentication bypass by spoofing of a device with a synthetic IP address is possible in Zscaler Client Connector on Windows, allowing a functionality bypass. This issue affects Client Connector: before 3.9.
CVE-2023-28804
- EPSS 0.03%
- Veröffentlicht 23.10.2023 14:15:09
- Zuletzt bearbeitet 21.11.2024 07:56:02
An Improper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector on Linux allows replacing binaries.This issue affects Linux Client Connector: before 1.4.0.105
CVE-2023-28805
- EPSS 0.08%
- Veröffentlicht 23.10.2023 14:15:09
- Zuletzt bearbeitet 21.11.2024 07:56:03
An Improper Input Validation vulnerability in Zscaler Client Connector on Linux allows Privilege Escalation. This issue affects Client Connector: before 1.4.0.105
CVE-2021-26734
- EPSS 0.02%
- Veröffentlicht 23.10.2023 14:15:08
- Zuletzt bearbeitet 21.11.2024 05:56:46
Zscaler Client Connector Installer on Windows before version 3.4.0.124 improperly handled directory junctions during uninstallation. A local adversary may be able to delete folders in an elevated context.
CVE-2023-28800
- EPSS 0.16%
- Veröffentlicht 22.06.2023 20:15:09
- Zuletzt bearbeitet 21.11.2024 07:56:02
When using local accounts for administration, the redirect url parameter was not encoded correctly, allowing for an XSS attack providing admin login.
CVE-2023-28799
- EPSS 0.11%
- Veröffentlicht 22.06.2023 20:15:09
- Zuletzt bearbeitet 21.11.2024 07:56:02
A URL parameter during login flow was vulnerable to injection. An attacker could insert a malicious domain in this parameter, which would redirect the user after auth and send the authorization token to the redirected domain.
CVE-2020-11634
- EPSS 0.06%
- Veröffentlicht 15.07.2021 20:15:09
- Zuletzt bearbeitet 21.11.2024 04:58:17
The Zscaler Client Connector for Windows prior to 2.1.2.105 had a DLL hijacking vulnerability caused due to the configuration of OpenSSL. A local adversary may be able to execute arbitrary code in the SYSTEM context.
CVE-2020-11632
- EPSS 0.07%
- Veröffentlicht 15.07.2021 20:15:09
- Zuletzt bearbeitet 21.11.2024 04:58:17
The Zscaler Client Connector prior to 2.1.2.150 did not quote the search path for services, which allows a local adversary to execute code with system privileges.
- EPSS 1.07%
- Veröffentlicht 15.07.2021 18:15:08
- Zuletzt bearbeitet 21.11.2024 04:58:17
The Zscaler Client Connector for Windows prior to 2.1.2.74 had a stack based buffer overflow when connecting to misconfigured TLS servers. An adversary would potentially have been able to execute arbitrary code with system privileges.