Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Zscaler | Client Connector | 0 ~ 3.6 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2023-28804 | 8.2 HIGH | Linux ZCC allows unsigned updates, allowing elevated Code Execution |
| CVE-2021-26738 | 7.8 HIGH | Privilege Escalation for ZCC macOS via PATH Variable |
| CVE-2023-28793 | 7.8 HIGH | Heap Based Buffer Overflow in Library |
| CVE-2023-28795 | 7.8 HIGH | Client IPC validation bypass |
| CVE-2023-28796 | 7.1 HIGH | IPC Bypass Through PLT Section in ELF |
| CVE-2021-26735 | 6.7 MEDIUM | Untrusted Search Path While Executing REG DELETE by Uninstaller |
| CVE-2023-28805 | 6.7 MEDIUM | ZCC on Linux privilege escalation |
| CVE-2023-28797 | 6.3 MEDIUM | LPE using arbitrary file delete with Symlinks |
| CVE-2023-28803 | 5.9 MEDIUM | Traffic being bypassed by ZCC by configuring synthetic IP range as local network |
| CVE-2021-26737 | 5.5 MEDIUM | Privilege Escalation Using PID Reuse in ZCC macOS |
| CVE-2021-26734 | 4.4 MEDIUM | Junction Delete leading to elevation of privilege |
No comments yet