Show filters
1,078 Total Results
Displaying 31-40 of 1,078
Sort by:
Attacker Value
Unknown
CVE-2024-45422
Disclosure Date: November 19, 2024 (last updated November 20, 2024)
Improper input validation in some Zoom Apps before version 6.2.0 may allow an unauthenticated user to conduct a denial of service via network access.
0
Attacker Value
Unknown
CVE-2024-45420
Disclosure Date: November 19, 2024 (last updated November 20, 2024)
Uncontrolled resource consumption in some Zoom Apps before version 6.2.0 may allow an authenticated user to conduct a denial of service via network access.
0
Attacker Value
Unknown
CVE-2024-45419
Disclosure Date: November 19, 2024 (last updated November 20, 2024)
Improper input validation in some Zoom Apps may allow an unauthenticated user to conduct a disclosure of information via network access.
0
Attacker Value
Unknown
CVE-2024-11023
Disclosure Date: November 18, 2024 (last updated November 18, 2024)
Firebase JavaScript SDK utilizes a "FIREBASE_DEFAULTS" cookie to store configuration data, including an "_authTokenSyncURL" field used for session synchronization. If this cookie field is preset via an attacker by any other method, the attacker can manipulate the "_authTokenSyncURL" to point to their own server and it would allow an actor to capture user session data transmitted by the SDK. We recommend upgrading Firebase JS SDK at least to 10.9.0.
0
Attacker Value
Unknown
CVE-2024-34776
Disclosure Date: November 13, 2024 (last updated November 14, 2024)
Out-of-bounds write in some Intel(R) SGX SDK software may allow an authenticated user to potentially enable escalation of privilege via local access.
0
Attacker Value
Unknown
CVE-2024-50336
Disclosure Date: November 12, 2024 (last updated November 13, 2024)
matrix-js-sdk is a Matrix messaging protocol Client-Server SDK for JavaScript. matrix-js-sdk before 34.11.0 is vulnerable to client-side path traversal via crafted MXC URIs. A malicious room member can trigger clients based on the matrix-js-sdk to issue arbitrary authenticated GET requests to the client's homeserver. Fixed in matrix-js-sdk 34.11.1.
0
Attacker Value
Unknown
CVE-2024-47824
Disclosure Date: October 15, 2024 (last updated October 16, 2024)
matrix-react-sdk is react-based software development kit for inserting a Matrix chat/VOIP client into a web page. Starting in version 3.18.0 and before 3.102.0, matrix-react-sdk allows a malicious homeserver to potentially steal message keys for a room when a user invites another user to that room, via injection of a malicious device controlled by the homeserver. This is possible because matrix-react-sdk before 3.102.0 shared historical message keys on invite. Version 3.102.0 fixes this issue by disabling sharing message keys on invite by removing calls to the vulnerable functionality. No known workarounds are available.
0
Attacker Value
Unknown
CVE-2024-47080
Disclosure Date: October 15, 2024 (last updated October 16, 2024)
matrix-js-sdk is the Matrix Client-Server SDK for JavaScript and TypeScript. In matrix-js-sdk versions versions 9.11.0 through 34.7.0, the method `MatrixClient.sendSharedHistoryKeys` is vulnerable to interception by malicious homeservers. The method was introduced by MSC3061) and is commonly used to share historical message keys with newly invited users, granting them access to past messages in the room. However, it unconditionally sends these "shared" keys to all of the invited user's devices, regardless of whether the user's cryptographic identity is verified or whether the user's devices are signed by that identity. This allows the attacker to potentially inject its own devices to receive sensitive historical keys without proper security checks. Note that this only affects clients running the SDK with the legacy crypto stack. Clients using the new Rust cryptography stack (i.e. those that call `MatrixClient.initRustCrypto()` instead of `MatrixClient.initCrypto()`) are unaffected by…
0
Attacker Value
Unknown
CVE-2024-6657
Disclosure Date: October 11, 2024 (last updated October 30, 2024)
A denial of service may be caused to a single peripheral device in a BLE network when multiple central
devices continuously connect and disconnect to the peripheral. A hard reset is required to recover the peripheral device.
0
Attacker Value
Unknown
CVE-2024-47561
Disclosure Date: October 03, 2024 (last updated October 03, 2024)
Schema parsing in the Java SDK of Apache Avro 1.11.3 and previous versions allows bad actors to execute arbitrary code.
Users are recommended to upgrade to version 1.11.4 or 1.12.0, which fix this issue.
0