Show filters
1,078 Total Results
Displaying 31-40 of 1,078
Sort by:
Attacker Value
Unknown

CVE-2024-45422

Disclosure Date: November 19, 2024 (last updated November 20, 2024)
Improper input validation in some Zoom Apps before version 6.2.0 may allow an unauthenticated user to conduct a denial of service via network access.
0
Attacker Value
Unknown

CVE-2024-45420

Disclosure Date: November 19, 2024 (last updated November 20, 2024)
Uncontrolled resource consumption in some Zoom Apps before version 6.2.0 may allow an authenticated user to conduct a denial of service via network access.
0
Attacker Value
Unknown

CVE-2024-45419

Disclosure Date: November 19, 2024 (last updated November 20, 2024)
Improper input validation in some Zoom Apps may allow an unauthenticated user to conduct a disclosure of information via network access.
0
Attacker Value
Unknown

CVE-2024-11023

Disclosure Date: November 18, 2024 (last updated November 18, 2024)
Firebase JavaScript SDK utilizes a "FIREBASE_DEFAULTS" cookie to store configuration data, including an "_authTokenSyncURL" field used for session synchronization. If this cookie field is preset via an attacker by any other method, the attacker can manipulate the "_authTokenSyncURL" to point to their own server and it would allow an actor to capture user session data transmitted by the SDK. We recommend upgrading Firebase JS SDK at least to 10.9.0.
0
Attacker Value
Unknown

CVE-2024-34776

Disclosure Date: November 13, 2024 (last updated November 14, 2024)
Out-of-bounds write in some Intel(R) SGX SDK software may allow an authenticated user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown

CVE-2024-50336

Disclosure Date: November 12, 2024 (last updated November 13, 2024)
matrix-js-sdk is a Matrix messaging protocol Client-Server SDK for JavaScript. matrix-js-sdk before 34.11.0 is vulnerable to client-side path traversal via crafted MXC URIs. A malicious room member can trigger clients based on the matrix-js-sdk to issue arbitrary authenticated GET requests to the client's homeserver. Fixed in matrix-js-sdk 34.11.1.
0
Attacker Value
Unknown

CVE-2024-47824

Disclosure Date: October 15, 2024 (last updated October 16, 2024)
matrix-react-sdk is react-based software development kit for inserting a Matrix chat/VOIP client into a web page. Starting in version 3.18.0 and before 3.102.0, matrix-react-sdk allows a malicious homeserver to potentially steal message keys for a room when a user invites another user to that room, via injection of a malicious device controlled by the homeserver. This is possible because matrix-react-sdk before 3.102.0 shared historical message keys on invite. Version 3.102.0 fixes this issue by disabling sharing message keys on invite by removing calls to the vulnerable functionality. No known workarounds are available.
0
Attacker Value
Unknown

CVE-2024-47080

Disclosure Date: October 15, 2024 (last updated October 16, 2024)
matrix-js-sdk is the Matrix Client-Server SDK for JavaScript and TypeScript. In matrix-js-sdk versions versions 9.11.0 through 34.7.0, the method `MatrixClient.sendSharedHistoryKeys` is vulnerable to interception by malicious homeservers. The method was introduced by MSC3061) and is commonly used to share historical message keys with newly invited users, granting them access to past messages in the room. However, it unconditionally sends these "shared" keys to all of the invited user's devices, regardless of whether the user's cryptographic identity is verified or whether the user's devices are signed by that identity. This allows the attacker to potentially inject its own devices to receive sensitive historical keys without proper security checks. Note that this only affects clients running the SDK with the legacy crypto stack. Clients using the new Rust cryptography stack (i.e. those that call `MatrixClient.initRustCrypto()` instead of `MatrixClient.initCrypto()`) are unaffected by…
0
Attacker Value
Unknown

CVE-2024-6657

Disclosure Date: October 11, 2024 (last updated October 30, 2024)
A denial of service may be caused to a single peripheral device in a BLE network when multiple central devices continuously connect and disconnect to the peripheral. A hard reset is required to recover the peripheral device.
0
Attacker Value
Unknown

CVE-2024-47561

Disclosure Date: October 03, 2024 (last updated October 03, 2024)
Schema parsing in the Java SDK of Apache Avro 1.11.3 and previous versions allows bad actors to execute arbitrary code. Users are recommended to upgrade to version 1.11.4  or 1.12.0, which fix this issue.
0