8.8

CVSS3.1

CVE-2025-0147 - Zoom Workplace App for Linux - Type Confusion

Type confusion in the Zoom Workplace App for Linux before 6.2.10 may allow an authorized user to conduct an escalation of privilege via network access.

๐Ÿ“… Published: Jan. 30, 2025, 7:49 p.m. ๐Ÿ”„ Last Modified: Aug. 1, 2025, 1:21 a.m.

3.9

CVSS3.1

CVE-2025-0146 - Zoom Workplace app for macOS - Symlink Following

Symlink following in the installer for Zoom Workplace App for macOS before 6.2.10 may allow an authenticated user to conduct a denial of service via local access.

๐Ÿ“… Published: Jan. 30, 2025, 7:47 p.m. ๐Ÿ”„ Last Modified: Aug. 1, 2025, 1:25 a.m.

4.6

CVSS3.1

CVE-2025-0145 - Zoom Workplace Apps for Windows - Untrusted Search Path

Untrusted search path in the installer for some Zoom Workplace Apps for Windows may allow an authorized user to conduct an escalation of privilege via local access.

๐Ÿ“… Published: Jan. 30, 2025, 7:45 p.m. ๐Ÿ”„ Last Modified: Aug. 20, 2025, 12:38 p.m.

3.1

CVSS3.1

CVE-2025-0144 - Zoom Workplace Apps - Out-of-bounds Write

Out-of-bounds write in some Zoom Workplace Apps may allow an authorized user to conduct a loss of integrity via network access.

๐Ÿ“… Published: Jan. 30, 2025, 7:44 p.m. ๐Ÿ”„ Last Modified: Aug. 20, 2025, 12:36 p.m.

4.3

CVSS3.1

CVE-2025-0143 - Zoom Workplace Apps for Linux - Out-of-bounds Write

Out-of-bounds write in the Zoom Workplace App for Linux before version 6.2.5 may allow an unauthorized user to conduct a denial of service via network access.

๐Ÿ“… Published: Jan. 30, 2025, 7:42 p.m. ๐Ÿ”„ Last Modified: July 31, 2025, 7:43 p.m.

4.3

CVSS3.1

CVE-2025-0142 - Zoom Jenkins Marketplace plugin - Cleartext Storage of Sensitive Information

Cleartext storage of sensitive information in the Zoom Jenkins Marketplace plugin before version 1.4 may allow an authenticated user to conduct a disclosure of information via network access.

๐Ÿ“… Published: Jan. 30, 2025, 7:38 p.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

8.6

CVSS3.1

CVE-2025-24802 - Soundness issue with Plonky2 look up tables

Plonky2 is a SNARK implementation based on techniques from PLONK and FRI. Lookup tables, whose length is not divisible by 26 = floor(num_routed_wires / 3) always include the 0 -> 0 input-output pair. Thus a malicious prover can always prove that f(0) = 0 for any lookup table f (unless its length haโ€ฆ

๐Ÿ“… Published: Jan. 30, 2025, 7:20 p.m. ๐Ÿ”„ Last Modified: April 15, 2026, 12:35 a.m.

6.9

CVSS4.0

CVE-2024-10604 - Identifiable Header Values In Fuchsia Leading To Tracking of The User

Vulnerabilities in the algorithms used by Fuchsia to populate network protocol header fields, specifically the TCP ISN, TCP timestamp, TCP and UDP source ports, and IPv4/IPv6 fragment ID allow for these values to be guessed under circumstances

๐Ÿ“… Published: Jan. 30, 2025, 7:17 p.m. ๐Ÿ”„ Last Modified: July 29, 2025, 6:44 p.m.

6.3

CVSS4.0

CVE-2024-10603 -

Weaknesses in the generation of TCP/UDP source ports and some other header values in Google's gVisor allowed them to be predicted by an external attacker in some circumstances.

๐Ÿ“… Published: Jan. 30, 2025, 7:14 p.m. ๐Ÿ”„ Last Modified: July 29, 2025, 6:33 p.m.

6.3

CVSS4.0

CVE-2024-10026 - Improved Seeding and Hashing In gVisor

A weak hashing algorithm and small sizes of seeds/secrets in Google's gVisor allowed for a remote attacker to calculate a local IP address and a per-boot identifier that could aid in tracking of a device in certain circumstances.

๐Ÿ“… Published: Jan. 30, 2025, 7:12 p.m. ๐Ÿ”„ Last Modified: July 31, 2025, 6:33 p.m.
Total resulsts: 349182
Page 6903 of 34,919
ยซ previous page ยป next page
Filters