| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2023-28793 | Heap Based Buffer Overflow in Library | Zscaler | Client Connector | High | 7.8 | 2023-10-23 13:26:08 | Deep Dive |
| CVE-2021-26738 | Privilege Escalation for ZCC macOS via PATH Variable | Zscaler | Client Connector | High | 7.8 | 2023-10-23 13:24:50 | Deep Dive |
| CVE-2021-26737 | Privilege Escalation Using PID Reuse in ZCC macOS | Zscaler | Client Connector | Medium | 5.5 | 2023-10-23 13:22:52 | Deep Dive |
| CVE-2021-26736 | ZApp Installer Privilege Escalation Vulnerabilities | Zscaler | Client Connector | Medium | 6.7 | 2023-10-23 13:21:13 | Deep Dive |
| CVE-2021-26735 | Untrusted Search Path While Executing REG DELETE by Uninstaller | Zscaler | Client Connector | Medium | 6.7 | 2023-10-23 13:19:36 | Deep Dive |
| CVE-2021-26734 | Junction Delete leading to elevation of privilege | Zscaler | Client Connector | Medium | 4.4 | 2023-10-23 13:18:37 | Deep Dive |
| CVE-2023-5554 | Line 信任管理问题漏洞 | LINE Corporation | LINE client for iOS | Medium | 4.8 | 2023-10-12 09:34:02 | Deep Dive |
| CVE-2023-44689 | Digital Agency e-Gov Electronic application 安全漏洞 | Digital Agency | e-Gov Client Application (Windows version) | 中危 | - | 2023-10-11 00:06:38 | Deep Dive |
| CVE-2023-30801 | qBittorrent Web UI Default Credentials Lead to RCE | qBittorrent | qBittorrent client | Critical | 9.8 | 2023-10-10 13:46:47 | Deep Dive |
| CVE-2023-43611 | BIG-IP Edge Client for macOS vulnerability | F5 | BIG-IP Edge Client | High | 7.8 | 2023-10-10 12:34:29 | Deep Dive |
| CVE-2023-5450 | BIG-IP Edge Client for macOS vulnerability | F5 | BIG-IP Edge Client | High | 7.3 | 2023-10-10 12:31:49 | Deep Dive |
| CVE-2023-40310 | Missing XML Validation vulnerability in SAP PowerDesigner Client BPMN2 import | SAP_SE | SAP PowerDesigner Client | Medium | 6.5 | 2023-10-10 01:35:28 | Deep Dive |
| CVE-2023-35897 | IBM Spectrum Protect code execution | IBM | Storage Protect Client | High | 8.4 | 2023-10-06 13:06:35 | Deep Dive |
| CVE-2023-45160 | Elevated Temp Directory Execution in 1E Client | 1E | 1E Client | High | 8.8 | 2023-10-05 15:12:21 | Deep Dive |
| CVE-2023-45159 | 1E Client installer can perform arbitrary file deletion on protected files | 1E | 1E Client | High | 8.4 | 2023-10-05 10:11:20 | Deep Dive |
| CVE-2023-43125 | BIG-IP APM Clients TunnelCrack vulnerability | F5 | BIG-IP Edge Client | Medium | 6.8 | 2023-09-27 15:22:07 | Deep Dive |
| CVE-2023-43124 | BIG-IP APM Clients TunnelCrack vulnerability | F5 | BIG-IP Edge Client | Medium | 5.3 | 2023-09-27 15:21:51 | Deep Dive |
| CVE-2023-40368 | IBM Storage Protect information disclosure | IBM | Storage Protect Client | Medium | 4.4 | 2023-09-20 18:43:44 | Deep Dive |
| CVE-2023-3892 | Unsafe XML parsing of 3rd party DICOM private tags may lead to XXE | MIM Software | MIM Assistant | Medium | 5.6 | 2023-09-19 14:54:13 | Deep Dive |
| CVE-2023-39208 | Zoom Client 输入验证错误漏洞 | Zoom Video Communications, Inc. | Zoom Desktop Client for Linux | Medium | 6.5 | 2023-09-12 19:55:02 | Deep Dive |