Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
zscaler client connector vulnerabilities and exploits
(subscribe to this query)
6.5
CVSSv3
CVE-2023-28803
An authentication bypass by spoofing of a device with a synthetic IP address is possible in Zscaler Client Connector on Windows, allowing a functionality bypass. This issue affects Client Connector: prior to 3.9.
Zscaler Client Connector
5.5
CVSSv3
CVE-2021-26734
Zscaler Client Connector Installer on Windows before version 3.4.0.124 improperly handled directory junctions during uninstallation. A local adversary may be able to delete folders in an elevated context.
Zscaler Client Connector
7.8
CVSSv3
CVE-2021-26735
The Zscaler Client Connector Installer and Unsintallers for Windows before 3.6 had an unquoted search path vulnerability. A local adversary may be able to execute code with SYSTEM privileges.
Zscaler Client Connector
7.8
CVSSv3
CVE-2021-26736
Multiple vulnerabilities in the Zscaler Client Connector Installer and Uninstaller for Windows before 3.6 allowed execution of binaries from a low privileged path. A local adversary may be able to execute code with SYSTEM privileges.
Zscaler Client Connector
4.7
CVSSv3
CVE-2021-26737
The Zscaler Client Connector for macOS before 3.6 did not sufficiently validate RPC clients. A local adversary without sufficient privileges may be able to shutdown the Zscaler tunnel by exploiting a race condition.
Zscaler Client Connector
7.8
CVSSv3
CVE-2021-26738
Zscaler Client Connector for macOS before 3.7 had an unquoted search path vulnerability via the PATH variable. A local adversary may be able to execute code with root privileges.
Zscaler Client Connector
7.8
CVSSv3
CVE-2020-11632
The Zscaler Client Connector before 2.1.2.150 did not quote the search path for services, which allows a local adversary to execute code with system privileges.
Zscaler Client Connector
9.8
CVSSv3
CVE-2020-11633
The Zscaler Client Connector for Windows before 2.1.2.74 had a stack based buffer overflow when connecting to misconfigured TLS servers. An adversary would potentially have been able to execute arbitrary code with system privileges.
Zscaler Client Connector
7.8
CVSSv3
CVE-2020-11634
The Zscaler Client Connector for Windows before 2.1.2.105 had a DLL hijacking vulnerability caused due to the configuration of OpenSSL. A local adversary may be able to execute arbitrary code in the SYSTEM context.
Zscaler Client Connector
7.8
CVSSv3
CVE-2020-11635
The Zscaler Client Connector before 3.1.0 did not sufficiently validate RPC clients, which allows a local adversary to execute code with system privileges or perform limited actions for which they did not have privileges.
Zscaler Client Connector
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »