Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
zscaler client connector vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-28804
An Improper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector on Linux allows replacing binaries.This issue affects Linux Client Connector: prior to 1.4.0.105
Zscaler Client Connector
NA
CVE-2023-28805
An Improper Input Validation vulnerability in Zscaler Client Connector on Linux allows Privilege Escalation. This issue affects Client Connector: prior to 1.4.0.105
Zscaler Client Connector
NA
CVE-2021-26734
Zscaler Client Connector Installer on Windows before version 3.4.0.124 improperly handled directory junctions during uninstallation. A local adversary may be able to delete folders in an elevated context.
Zscaler Client Connector
NA
CVE-2023-28799
A URL parameter during login flow was vulnerable to injection. An attacker could insert a malicious domain in this parameter, which would redirect the user after auth and send the authorization token to the redirected domain.
Zscaler Client Connector
NA
CVE-2023-28800
When using local accounts for administration, the redirect url parameter was not encoded correctly, allowing for an XSS attack providing admin login.
Zscaler Client Connector
7.2
CVSSv2
CVE-2020-11632
The Zscaler Client Connector before 2.1.2.150 did not quote the search path for services, which allows a local adversary to execute code with system privileges.
Zscaler Client Connector
6.9
CVSSv2
CVE-2020-11634
The Zscaler Client Connector for Windows before 2.1.2.105 had a DLL hijacking vulnerability caused due to the configuration of OpenSSL. A local adversary may be able to execute arbitrary code in the SYSTEM context.
Zscaler Client Connector
10
CVSSv2
CVE-2020-11633
The Zscaler Client Connector for Windows before 2.1.2.74 had a stack based buffer overflow when connecting to misconfigured TLS servers. An adversary would potentially have been able to execute arbitrary code with system privileges.
Zscaler Client Connector
7.2
CVSSv2
CVE-2020-11635
The Zscaler Client Connector before 3.1.0 did not sufficiently validate RPC clients, which allows a local adversary to execute code with system privileges or perform limited actions for which they did not have privileges.
Zscaler Client Connector
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2012-1823
malicious code
CVE-2024-5770
CVE-2023-45866
CVE-2024-35687
local users
CVE-2024-31246
CVE-2024-35730
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3