Common Vulnerabilities and Exposures is a rundown of sections-each containing a recognizable proof number, a portrayal, and no less than one open reference-for freely known cybersecurity vulnerabilities. CVE Entries are utilized in various cybersecurity items and administrations from around the globe.

CVE-2020-6110: Zoom vulnerability

October 19, 2020 0

An exploitable partial path traversal vulnerability exists in the way Zoom Client version 4.6.10 processes messages including shared code snippets. A specially crafted chat message can cause an arbitrary binary planting which could be abused Read more

Share this info:

CVE-2020-6109: Zoom vulnerability

October 19, 2020 0

An exploitable path traversal vulnerability exists in the Zoom client, version 4.6.10 processes messages including animated GIFs. A specially crafted chat message can cause an arbitrary file write, which could potentially be abused to achieve Read more

Share this info:

CVE-2020-1895: Instagram vulnerability

October 19, 2020 0

A large heap overflow could occur in Instagram for Android when attempting to upload an image with specially crafted dimensions. This affects versions prior to 128.0.0.26.128. How to mitigate CVE-2020-1895 Time needed: 5 minutes. Follow the Read more

Share this info:

CVE-2020-11877: Zoom vulnerability

October 19, 2020 0

** DISPUTED ** airhost.exe in Zoom Client for Meetings 4.6.11 uses 3423423432325249 as the Initialization Vector (IV) for AES-256 CBC encryption. NOTE: the vendor states that this IV is used only within unreachable code. How Read more

Share this info:

CVE-2020-11876: Zoom vulnerability

October 19, 2020 0

** DISPUTED ** airhost.exe in Zoom Client for Meetings 4.6.11 uses the SHA-256 hash of 0123425234234fsdfsdr3242 for initialization of an OpenSSL EVP AES-256 CBC context. NOTE: the vendor states that this initialization only occurs within Read more

Share this info:
1 2 3 4 49