Show filters
77 Total Results
Displaying 31-40 of 77
Sort by:
Attacker Value
Unknown

CVE-2022-24295

Disclosure Date: February 21, 2022 (last updated February 23, 2025)
Okta Advanced Server Access Client for Windows prior to version 1.57.0 was found to be vulnerable to command injection via a specially crafted URL.
Attacker Value
Unknown

CVE-2022-23032

Disclosure Date: January 25, 2022 (last updated February 23, 2025)
In all versions before 7.2.1.4, when proxy settings are configured in the network access resource of a BIG-IP APM system, connecting BIG-IP Edge Client on Mac and Windows is vulnerable to a DNS rebinding attack. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Attacker Value
Unknown

CVE-2021-42711

Disclosure Date: December 01, 2021 (last updated February 23, 2025)
Barracuda Network Access Client before 5.2.2 creates a Temporary File in a Directory with Insecure Permissions. This file is executed with SYSTEM privileges when an unprivileged user performs a repair operation.
Attacker Value
Unknown

CVE-2021-23022

Disclosure Date: June 10, 2021 (last updated February 22, 2025)
On version 7.2.1.x before 7.2.1.3 and 7.1.x before 7.1.9.9 Update 1, the BIG-IP Edge Client Windows Installer Service's temporary folder has weak file and folder permissions. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Attacker Value
Unknown

CVE-2020-14231

Disclosure Date: December 22, 2020 (last updated February 22, 2025)
A vulnerability in the input parameter handling of HCL Client Application Access v9 could potentially be exploited by an authenticated attacker resulting in a stack buffer overflow. This could allow the attacker to crash the program or inject code into the system which would execute with the privileges of the currently logged in user.
Attacker Value
Unknown

CVE-2020-15590

Disclosure Date: September 14, 2020 (last updated February 22, 2025)
A vulnerability in the Private Internet Access (PIA) VPN Client for Linux 1.5 through 2.3+ allows remote attackers to bypass an intended VPN kill switch mechanism and read sensitive information via intercepting network traffic. Since 1.5, PIA has supported a “split tunnel” OpenVPN bypass option. The PIA killswitch & associated iptables firewall is designed to protect you while using the Internet. When the kill switch is configured to block all inbound and outbound network traffic, privileged applications can continue sending & receiving network traffic if net.ipv4.ip_forward has been enabled in the system kernel parameters. For example, a Docker container running on a host with the VPN turned off, and the kill switch turned on, can continue using the internet, leaking the host IP (CWE 200). In PIA 2.4.0+, policy-based routing is enabled by default and is used to direct all forwarded packets to the VPN interface automatically.
Attacker Value
Unknown

CVE-2020-5898

Disclosure Date: May 12, 2020 (last updated February 21, 2025)
In versions 7.1.5-7.1.9, BIG-IP Edge Client Windows Stonewall driver does not sanitize the pointer received from the userland. A local user on the Windows client system can send crafted DeviceIoControl requests to \\.\urvpndrv device causing the Windows kernel to crash.
Attacker Value
Unknown

CVE-2020-5897

Disclosure Date: May 12, 2020 (last updated February 21, 2025)
In versions 7.1.5-7.1.9, there is use-after-free memory vulnerability in the BIG-IP Edge Client Windows ActiveX component.
Attacker Value
Unknown

CVE-2020-5896

Disclosure Date: May 12, 2020 (last updated February 21, 2025)
On versions 7.1.5-7.1.9, the BIG-IP Edge Client's Windows Installer Service's temporary folder has weak file and folder permissions.
Attacker Value
Unknown

CVE-2020-5892

Disclosure Date: April 30, 2020 (last updated November 27, 2024)
In versions 7.1.5-7.1.8, the BIG-IP Edge Client components in BIG-IP APM, Edge Gateway, and FirePass legacy allow attackers to obtain the full session ID from process memory.