Filtered by vendor Skygroup Subscriptions
Filtered by product Skysea Client View Subscriptions
Total 6 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-21805 1 Skygroup 1 Skysea Client View 2025-05-23 7.8 High
Improper access control vulnerability exists in the specific folder of SKYSEA Client View versions from Ver.16.100 prior to Ver.19.2. If this vulnerability is exploited, an arbitrary file may be placed in the specific folder by a user who can log in to the PC where the product's Windows client is installed. In case the file is a specially crafted DLL file, arbitrary code may be executed with SYSTEM privilege.
CVE-2024-24964 1 Skygroup 1 Skysea Client View 2025-05-23 6.3 Medium
Improper access control vulnerability exists in the resident process of SKYSEA Client View versions from Ver.11.220 prior to Ver.19.2. If this vulnerability is exploited, an arbitrary process may be executed with SYSTEM privilege by a user who can log in to the PC where the product's Windows client is installed.
CVE-2016-7836 1 Skygroup 1 Skysea Client View 2025-04-20 N/A
SKYSEA Client View Ver.11.221.03 and earlier allows remote code execution via a flaw in processing authentication on the TCP connection with the management console program.
CVE-2024-41143 1 Skygroup 1 Skysea Client View 2025-03-14 7.8 High
Origin validation error vulnerability exists in SKYSEA Client View Ver.3.013.00 to Ver.19.210.04e. If this vulnerability is exploited, an arbitrary process may be executed with SYSTEM privilege by a user who can log in to the PC where the product's Windows client is installed.
CVE-2021-20616 1 Skygroup 1 Skysea Client View 2024-11-21 7.8 High
Untrusted search path vulnerability in the installer of SKYSEA Client View Ver.1.020.05b to Ver.16.001.01g allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2020-5617 1 Skygroup 1 Skysea Client View 2024-11-21 7.8 High
Privilege escalation vulnerability in SKYSEA Client View Ver.12.200.12n to 15.210.05f allows an attacker to obtain unauthorized privileges and modify/obtain sensitive information or perform unintended operations via unspecified vectors.