4.9

CVSS3.1

CVE-2024-39824 - Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers - Missing Authorization

Missing authorization in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access.

πŸ“… Published: Aug. 14, 2024, 4:39 p.m. πŸ”„ Last Modified: Oct. 2, 2025, 9:15 p.m.

4.9

CVSS3.1

CVE-2024-39823 - Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers - Missing Authorization

Missing authorization in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access.

πŸ“… Published: Aug. 14, 2024, 4:39 p.m. πŸ”„ Last Modified: Oct. 2, 2025, 9:15 p.m.

6.5

CVSS3.1

CVE-2024-39822 - Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers - Sensitive Information Exposure

Sensitive information exposure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct an information disclosure via network access.

πŸ“… Published: Aug. 14, 2024, 4:38 p.m. πŸ”„ Last Modified: Sept. 4, 2024, 9:28 p.m.

7.5

CVSS3.1

CVE-2024-39818 - Zoom Workplace Apps and SDKs - Protection Mechanism Failure

Protection mechanism failure for some Zoom Workplace Apps and SDKs may allow an authenticated user to conduct information disclosure via network access.

πŸ“… Published: Aug. 14, 2024, 4:36 p.m. πŸ”„ Last Modified: Sept. 11, 2024, 1:27 p.m.

8.5

CVSS3.1

CVE-2024-39825 - Zoom Workplace Apps and Rooms Clients - Buffer Overflow

Buffer overflow in some Zoom Workplace Apps and Rooms Clients may allow an authenticated user to conduct an escalation of privilege via network access.

πŸ“… Published: Aug. 14, 2024, 4:34 p.m. πŸ”„ Last Modified: Sept. 4, 2024, 9:34 p.m.

5.6

CVSS3.1

CVE-2024-28799 - IBM QRadar Suite Software information disclosure

IBM QRadar Suite Software 1.10.12.0 through 1.10.23.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 displays sensitive data improperly to a local privileged user, in non default configurations, during back-end commands which may result in the unexpected disclosure of this information. …

πŸ“… Published: Aug. 14, 2024, 3:41 p.m. πŸ”„ Last Modified: Sept. 21, 2024, 10:15 a.m.

5.5

CVSS3.1

CVE-2024-41832 - TALOS-2024-2002 | Adobe Acrobat Reader Font gvar TupleVariation Data Out-Of-Bounds Read Vulnerabili…

Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this is…

πŸ“… Published: Aug. 14, 2024, 3:07 p.m. πŸ”„ Last Modified: Nov. 21, 2024, 9:33 a.m.

7.8

CVSS3.1

CVE-2024-39426 - ZDI-CAN-24312: Adobe Acrobat Reader DC Annotation Memory Corruption Remote Code Execution Vulnerabi…

Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to ex…

πŸ“… Published: Aug. 14, 2024, 3:07 p.m. πŸ”„ Last Modified: Aug. 15, 2024, 5:17 p.m.

7.8

CVSS3.1

CVE-2024-39422 - ZDI-CAN-24090: New Vulnerability Report - Use-after-free remote code execution vulnerability in Ado…

Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open…

πŸ“… Published: Aug. 14, 2024, 3:07 p.m. πŸ”„ Last Modified: Aug. 15, 2024, 5:25 p.m.

7.8

CVSS3.1

CVE-2024-41831 - ZDI-CAN-24569: Adobe Acrobat Reader DC AcroForm Use-After-Free Remote Code Execution Vulnerability

Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open…

πŸ“… Published: Aug. 14, 2024, 3:07 p.m. πŸ”„ Last Modified: Aug. 15, 2024, 5:17 p.m.
Total resulsts: 346630
Page 8594 of 34,663
Β« previous page Β» next page
Filters