Show filters
1,462 Total Results
Displaying 121-130 of 1,462
Sort by:
Attacker Value
Unknown
CVE-2024-23464
Disclosure Date: August 06, 2024 (last updated February 26, 2025)
In certain cases, Zscaler Internet Access (ZIA) can be disabled by PowerShell commands with admin rights. This affects Zscaler Client Connector on Windows <4.2.1
0
Attacker Value
Unknown
CVE-2024-23460
Disclosure Date: August 06, 2024 (last updated February 26, 2025)
The Zscaler Updater process does not validate the digital signature of the installer before execution, allowing arbitrary code to be locally executed. This affects Zscaler Client Connector on MacOS <4.2.
0
Attacker Value
Unknown
CVE-2024-23458
Disclosure Date: August 06, 2024 (last updated February 26, 2025)
While copying individual autoupdater log files, reparse point check was missing which could result into crafted attacks, potentially leading to a local privilege escalation. This issue affects Zscaler Client Connector on Windows <4.2.0.190.
0
Attacker Value
Unknown
CVE-2024-23456
Disclosure Date: August 06, 2024 (last updated February 26, 2025)
Anti-tampering can be disabled under certain conditions without signature validation. This affects Zscaler Client Connector <4.2.0.190 with anti-tampering enabled.
0
Attacker Value
Unknown
CVE-2023-28806
Disclosure Date: August 06, 2024 (last updated February 26, 2025)
An Improper Validation of signature in Zscaler Client Connector on Windows allows an authenticated user to disable anti-tampering. This issue affects Client Connector on Windows <4.2.0.190.
0
Attacker Value
Unknown
CVE-2024-38877
Disclosure Date: August 02, 2024 (last updated February 26, 2025)
A vulnerability has been identified in Omnivise T3000 Application Server R9.2 (All versions), Omnivise T3000 Domain Controller R9.2 (All versions), Omnivise T3000 Network Intrusion Detection System (NIDS) R9.2 (All versions), Omnivise T3000 Product Data Management (PDM) R9.2 (All versions), Omnivise T3000 R8.2 SP3 (All versions), Omnivise T3000 R8.2 SP4 (All versions), Omnivise T3000 Security Server R9.2 (All versions), Omnivise T3000 Terminal Server R9.2 (All versions), Omnivise T3000 Thin Client R9.2 (All versions), Omnivise T3000 Whitelisting Server R9.2 (All versions). The affected devices stores initial system credentials without sufficient protection. An attacker with remote shell access or physical access could retrieve the credentials leading to confidentiality loss allowing the attacker to laterally move within the affected network.
0
Attacker Value
Unknown
CVE-2024-38876
Disclosure Date: August 02, 2024 (last updated February 26, 2025)
A vulnerability has been identified in Omnivise T3000 Application Server R9.2 (All versions), Omnivise T3000 Domain Controller R9.2 (All versions), Omnivise T3000 Product Data Management (PDM) R9.2 (All versions), Omnivise T3000 R8.2 SP3 (All versions), Omnivise T3000 R8.2 SP4 (All versions), Omnivise T3000 Terminal Server R9.2 (All versions), Omnivise T3000 Thin Client R9.2 (All versions), Omnivise T3000 Whitelisting Server R9.2 (All versions). The affected application regularly executes user modifiable code as a privileged user. This could allow a local authenticated attacker to execute arbitrary code with elevated privileges.
0
Attacker Value
Unknown
CVE-2024-32758
Disclosure Date: August 01, 2024 (last updated February 26, 2025)
Under certain circumstances the communication between exacqVision Client and exacqVision Server will use insufficient key length and exchange
0
Attacker Value
Unknown
CVE-2024-6978
Disclosure Date: July 31, 2024 (last updated February 26, 2025)
Cato Networks Windows SDP Client Local root certificates can be installed by low-privileged users.This issue affects SDP Client: before 5.10.28.
0
Attacker Value
Unknown
CVE-2024-6977
Disclosure Date: July 31, 2024 (last updated February 26, 2025)
A vulnerability in Cato Networks SDP Client on Windows allows the insertion of sensitive information into the log file, which can lead to an account takeover. However, the attack requires bypassing protections on modifying the tunnel token on a the attacker's system.This issue affects SDP Client: before 5.10.34.
0