Show filters
77 Total Results
Displaying 31-40 of 77
Sort by:
Attacker Value
Unknown
CVE-2022-24295
Disclosure Date: February 21, 2022 (last updated February 23, 2025)
Okta Advanced Server Access Client for Windows prior to version 1.57.0 was found to be vulnerable to command injection via a specially crafted URL.
0
Attacker Value
Unknown
CVE-2022-23032
Disclosure Date: January 25, 2022 (last updated February 23, 2025)
In all versions before 7.2.1.4, when proxy settings are configured in the network access resource of a BIG-IP APM system, connecting BIG-IP Edge Client on Mac and Windows is vulnerable to a DNS rebinding attack. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
0
Attacker Value
Unknown
CVE-2021-42711
Disclosure Date: December 01, 2021 (last updated February 23, 2025)
Barracuda Network Access Client before 5.2.2 creates a Temporary File in a Directory with Insecure Permissions. This file is executed with SYSTEM privileges when an unprivileged user performs a repair operation.
0
Attacker Value
Unknown
CVE-2021-23022
Disclosure Date: June 10, 2021 (last updated February 22, 2025)
On version 7.2.1.x before 7.2.1.3 and 7.1.x before 7.1.9.9 Update 1, the BIG-IP Edge Client Windows Installer Service's temporary folder has weak file and folder permissions. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
0
Attacker Value
Unknown
CVE-2020-14231
Disclosure Date: December 22, 2020 (last updated February 22, 2025)
A vulnerability in the input parameter handling of HCL Client Application Access v9 could potentially be exploited by an authenticated attacker resulting in a stack buffer overflow. This could allow the attacker to crash the program or inject code into the system which would execute with the privileges of the currently logged in user.
0
Attacker Value
Unknown
CVE-2020-15590
Disclosure Date: September 14, 2020 (last updated February 22, 2025)
A vulnerability in the Private Internet Access (PIA) VPN Client for Linux 1.5 through 2.3+ allows remote attackers to bypass an intended VPN kill switch mechanism and read sensitive information via intercepting network traffic. Since 1.5, PIA has supported a “split tunnel” OpenVPN bypass option. The PIA killswitch & associated iptables firewall is designed to protect you while using the Internet. When the kill switch is configured to block all inbound and outbound network traffic, privileged applications can continue sending & receiving network traffic if net.ipv4.ip_forward has been enabled in the system kernel parameters. For example, a Docker container running on a host with the VPN turned off, and the kill switch turned on, can continue using the internet, leaking the host IP (CWE 200). In PIA 2.4.0+, policy-based routing is enabled by default and is used to direct all forwarded packets to the VPN interface automatically.
0
Attacker Value
Unknown
CVE-2020-5898
Disclosure Date: May 12, 2020 (last updated February 21, 2025)
In versions 7.1.5-7.1.9, BIG-IP Edge Client Windows Stonewall driver does not sanitize the pointer received from the userland. A local user on the Windows client system can send crafted DeviceIoControl requests to \\.\urvpndrv device causing the Windows kernel to crash.
0
Attacker Value
Unknown
CVE-2020-5897
Disclosure Date: May 12, 2020 (last updated February 21, 2025)
In versions 7.1.5-7.1.9, there is use-after-free memory vulnerability in the BIG-IP Edge Client Windows ActiveX component.
0
Attacker Value
Unknown
CVE-2020-5896
Disclosure Date: May 12, 2020 (last updated February 21, 2025)
On versions 7.1.5-7.1.9, the BIG-IP Edge Client's Windows Installer Service's temporary folder has weak file and folder permissions.
0
Attacker Value
Unknown
CVE-2020-5892
Disclosure Date: April 30, 2020 (last updated November 27, 2024)
In versions 7.1.5-7.1.8, the BIG-IP Edge Client components in BIG-IP APM, Edge Gateway, and FirePass legacy allow attackers to obtain the full session ID from process memory.
0