Show filters
231 Total Results
Displaying 161-170 of 231
Sort by:
Attacker Value
Unknown
CVE-2021-38394
Disclosure Date: September 30, 2021 (last updated February 23, 2025)
An attacker with physical access to the device can extract the binary that checks for the hardware key and reverse engineer it, which could be used to create a physical duplicate of a valid hardware key. The hardware key allows access to special settings when inserted.
0
Attacker Value
Unknown
CVE-2021-38400
Disclosure Date: September 30, 2021 (last updated February 23, 2025)
An attacker with physical access to Boston Scientific Zoom Latitude Model 3120 can remove the hard disk drive or create a specially crafted USB to extract the password hash for brute force reverse engineering of the system password.
0
Attacker Value
Unknown
CVE-2021-34410
Disclosure Date: September 27, 2021 (last updated February 23, 2025)
A user-writable application bundle unpacked during the install for all versions of the Zoom Plugin for Microsoft Outlook for Mac before 5.0.25611.0521 allows for privilege escalation to root.
0
Attacker Value
Unknown
CVE-2021-34413
Disclosure Date: September 27, 2021 (last updated February 23, 2025)
All versions of the Zoom Plugin for Microsoft Outlook for MacOS before 5.3.52553.0918 contain a Time-of-check Time-of-use (TOC/TOU) vulnerability during the plugin installation process. This could allow a standard user to write their own malicious application to the plugin directory, allowing the malicious application to execute in a privileged context.
0
Attacker Value
Unknown
CVE-2020-7877
Disclosure Date: September 07, 2021 (last updated February 23, 2025)
A buffer overflow issue was discovered in ZOOK solution(remote administration tool) through processing 'ConnectMe' command while parsing a crafted OUTERIP value because of missing boundary check. This vulnerability allows the attacker to execute remote arbitrary command.
0
Attacker Value
Unknown
CVE-2021-39316
Disclosure Date: August 30, 2021 (last updated February 23, 2025)
The Zoomsounds plugin <= 6.45 for WordPress allows arbitrary files, including sensitive configuration files such as wp-config.php, to be downloaded via the `dzsap_download` action using directory traversal in the `link` parameter.
0
Attacker Value
Unknown
CVE-2021-24447
Disclosure Date: July 19, 2021 (last updated February 23, 2025)
The WP Image Zoom WordPress plugin before 1.47 did not validate its tab parameter before using it in the include_once() function, leading to a local file inclusion issue in the admin dashboard
0
Attacker Value
Unknown
CVE-2020-7869
Disclosure Date: June 29, 2021 (last updated February 22, 2025)
An improper input validation vulnerability of ZOOK software (remote administration tool) could allow a remote attacker to create arbitrary file. The ZOOK viewer has the "Tight file CMD" function to create file. An attacker could create and execute arbitrary file in the ZOOK agent program using "Tight file CMD" without authority.
0
Attacker Value
Unknown
CVE-2021-28133
Disclosure Date: March 18, 2021 (last updated February 22, 2025)
Zoom through 5.5.4 sometimes allows attackers to read private information on a participant's screen, even though the participant never attempted to share the private part of their screen. When a user shares a specific application window via the Share Screen functionality, other meeting participants can briefly see contents of other application windows that were explicitly not shared. The contents of these other windows can (for instance) be seen for a short period of time when they overlay the shared window and get into focus. (An attacker can, of course, use a separate screen-recorder application, unsupported by Zoom, to save all such contents for later replays and analysis.) Depending on the unintentionally shared data, this short exposure of screen contents may be a more or less severe security issue.
0
Attacker Value
Unknown
CVE-2021-21295
Disclosure Date: March 09, 2021 (last updated February 22, 2025)
Netty is an open-source, asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In Netty (io.netty:netty-codec-http2) before version 4.1.60.Final there is a vulnerability that enables request smuggling. If a Content-Length header is present in the original HTTP/2 request, the field is not validated by `Http2MultiplexHandler` as it is propagated up. This is fine as long as the request is not proxied through as HTTP/1.1. If the request comes in as an HTTP/2 stream, gets converted into the HTTP/1.1 domain objects (`HttpRequest`, `HttpContent`, etc.) via `Http2StreamFrameToHttpObjectCodec `and then sent up to the child channel's pipeline and proxied through a remote peer as HTTP/1.1 this may result in request smuggling. In a proxy case, users may assume the content-length is validated somehow, which is not the case. If the request is forwarded to a backend channel that is a HTTP/1.1 connection, the Content…
0