Filtered by vendor Zscaler Subscriptions
Total 44 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-23457 1 Zscaler 1 Client Connector 2024-11-21 7.8 High
The anti-tampering functionality of the Zscaler Client Connector can be disabled under certain conditions when an uninstall password is enforced. This affects Zscaler Client Connector on Windows prior to 4.2.0.209
CVE-2023-41973 1 Zscaler 1 Client Connector 2024-11-21 7.3 High
ZSATray passes the previousInstallerName as a config parameter to TrayManager, and TrayManager constructs the path and appends previousInstallerName to get the full path of the exe. Fixed Version: Win ZApp 4.3.0.121 and later.
CVE-2023-41972 1 Zscaler 1 Client Connector 2024-11-21 7.3 High
In some rare cases, there is a password type validation missing in Revert Password check and for some features it could be disabled. Fixed Version: Win ZApp 4.3.0.121 and later.
CVE-2023-41971 1 Zscaler 1 Client Connector 2024-11-21 5.3 Medium
An Improper Link Resolution Before File Access ('Link Following') vulnerability in Zscaler Client Connector on Windows allows a system file to be overwritten.This issue affects Client Connector on Windows: before 3.7.
CVE-2023-41970 1 Zscaler 1 Client Connector 2024-11-21 6 Medium
An Improper Validation of Integrity Check Value vulnerability in Zscaler Client Connector on Windows during the Repair App functionality may allow Local Execution of Code.This issue affects Client Connector on Windows: before 4.1.0.62.
CVE-2023-41969 1 Zscaler 1 Client Connector 2024-11-21 7.3 High
An arbitrary file deletion in ZSATrayManager where it protects the temporary encrypted ZApp issue reporting file from the unprivileged end user access and modification. Fixed version: Win ZApp 4.3.0 and later.
CVE-2023-41717 1 Zscaler 1 Zscaler Proxy 2024-11-21 5.5 Medium
Inappropriate file type control in Zscaler Proxy versions 3.6.1.25 and prior allows local attackers to bypass file download/upload restrictions.
CVE-2023-28804 1 Zscaler 1 Client Connector 2024-11-21 8.2 High
An Improper Verification of Cryptographic Signature vulnerability in Zscaler Client Connector on Linux allows replacing binaries.This issue affects Linux Client Connector: before 1.4.0.105
CVE-2023-28803 1 Zscaler 1 Client Connector 2024-11-21 5.9 Medium
An authentication bypass by spoofing of a device with a synthetic IP address is possible in Zscaler Client Connector on Windows, allowing a functionality bypass. This issue affects Client Connector: before 3.9.
CVE-2023-28801 1 Zscaler 1 Zscaler Internet Access Admin Portal 2024-11-21 9.6 Critical
An Improper Verification of Cryptographic Signature in the SAML authentication of the Zscaler Admin UI allows a Privilege Escalation.This issue affects Admin UI: from 6.2 before 6.2r.
CVE-2023-28798 1 Zscaler 1 Client Connector 2024-11-21 6.5 Medium
An out-of-bounds write to heap in the pacparser library on Zscaler Client Connector on Mac may lead to arbitrary code execution.
CVE-2023-28794 1 Zscaler 1 Client Connector 2024-11-21 4.3 Medium
Origin Validation Error vulnerability in Zscaler Client Connector on Linux allows Privilege Abuse. This issue affects Zscaler Client Connector for Linux: before 1.3.1.6.
CVE-2021-26737 1 Zscaler 1 Client Connector 2024-11-21 5.5 Medium
The Zscaler Client Connector for macOS prior to 3.6 did not sufficiently validate RPC clients. A local adversary without sufficient privileges may be able to shutdown the Zscaler tunnel by exploiting a race condition.
CVE-2021-26734 1 Zscaler 1 Client Connector 2024-11-21 4.4 Medium
Zscaler Client Connector Installer on Windows before version 3.4.0.124 improperly handled directory junctions during uninstallation. A local adversary may be able to delete folders in an elevated context.
CVE-2020-11635 1 Zscaler 1 Client Connector 2024-11-21 7.8 High
The Zscaler Client Connector prior to 3.1.0 did not sufficiently validate RPC clients, which allows a local adversary to execute code with system privileges or perform limited actions for which they did not have privileges.
CVE-2020-11634 1 Zscaler 1 Client Connector 2024-11-21 7.8 High
The Zscaler Client Connector for Windows prior to 2.1.2.105 had a DLL hijacking vulnerability caused due to the configuration of OpenSSL. A local adversary may be able to execute arbitrary code in the SYSTEM context.
CVE-2020-11633 1 Zscaler 1 Client Connector 2024-11-21 9.8 Critical
The Zscaler Client Connector for Windows prior to 2.1.2.74 had a stack based buffer overflow when connecting to misconfigured TLS servers. An adversary would potentially have been able to execute arbitrary code with system privileges.
CVE-2020-11632 1 Zscaler 1 Client Connector 2024-11-21 7.8 High
The Zscaler Client Connector prior to 2.1.2.150 did not quote the search path for services, which allows a local adversary to execute code with system privileges.
CVE-2024-23456 1 Zscaler 1 Client Connector 2024-08-07 7.8 High
Anti-tampering can be disabled under certain conditions without signature validation. This affects Zscaler Client Connector <4.2.0.190 with anti-tampering enabled.
CVE-2023-28806 1 Zscaler 1 Client Connector 2024-08-07 5.7 Medium
An Improper Validation of signature in Zscaler Client Connector on Windows allows an authenticated user to disable anti-tampering. This issue affects Client Connector on Windows <4.2.0.190.