Zscaler

Client Connector

41 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 23.10.2023 14:15:09
  • Zuletzt bearbeitet 21.11.2024 07:56:01

Zscaler Client Connector for Windows before 4.1 writes/deletes a configuration file inside specific folders on the disk. A malicious user can replace the folder and execute code as a privileged user.

  • EPSS 0.01%
  • Veröffentlicht 23.10.2023 14:15:09
  • Zuletzt bearbeitet 21.11.2024 07:56:02

An authentication bypass by spoofing of a device with a synthetic IP address is possible in Zscaler Client Connector on Windows, allowing a functionality bypass. This issue affects Client Connector: before 3.9.

  • EPSS 0.03%
  • Veröffentlicht 23.10.2023 14:15:09
  • Zuletzt bearbeitet 21.11.2024 07:56:02

An Improper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector on Linux allows replacing binaries.This issue affects Linux Client Connector: before 1.4.0.105

  • EPSS 0.08%
  • Veröffentlicht 23.10.2023 14:15:09
  • Zuletzt bearbeitet 21.11.2024 07:56:03

An Improper Input Validation vulnerability in Zscaler Client Connector on Linux allows Privilege Escalation. This issue affects Client Connector: before 1.4.0.105

  • EPSS 0.02%
  • Veröffentlicht 23.10.2023 14:15:08
  • Zuletzt bearbeitet 21.11.2024 05:56:46

Zscaler Client Connector Installer on Windows before version 3.4.0.124 improperly handled directory junctions during uninstallation. A local adversary may be able to delete folders in an elevated context.

  • EPSS 0.16%
  • Veröffentlicht 22.06.2023 20:15:09
  • Zuletzt bearbeitet 21.11.2024 07:56:02

When using local accounts for administration, the redirect url parameter was not encoded correctly, allowing for an XSS attack providing admin login.

  • EPSS 0.11%
  • Veröffentlicht 22.06.2023 20:15:09
  • Zuletzt bearbeitet 21.11.2024 07:56:02

A URL parameter during login flow was vulnerable to injection. An attacker could insert a malicious domain in this parameter, which would redirect the user after auth and send the authorization token to the redirected domain.

  • EPSS 0.06%
  • Veröffentlicht 15.07.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 04:58:17

The Zscaler Client Connector for Windows prior to 2.1.2.105 had a DLL hijacking vulnerability caused due to the configuration of OpenSSL. A local adversary may be able to execute arbitrary code in the SYSTEM context.

  • EPSS 0.07%
  • Veröffentlicht 15.07.2021 20:15:09
  • Zuletzt bearbeitet 21.11.2024 04:58:17

The Zscaler Client Connector prior to 2.1.2.150 did not quote the search path for services, which allows a local adversary to execute code with system privileges.

  • EPSS 1.07%
  • Veröffentlicht 15.07.2021 18:15:08
  • Zuletzt bearbeitet 21.11.2024 04:58:17

The Zscaler Client Connector for Windows prior to 2.1.2.74 had a stack based buffer overflow when connecting to misconfigured TLS servers. An adversary would potentially have been able to execute arbitrary code with system privileges.