Common Vulnerabilities and Exposures is a rundown of sections-each containing a recognizable proof number, a portrayal, and no less than one open reference-for freely known cybersecurity vulnerabilities. CVE Entries are utilized in various cybersecurity items and administrations from around the globe.

CVE-2020-11500: Zoom vulnerability

October 19, 2020 0

Zoom Client for Meetings through 4.6.9 uses the ECB mode of AES for video and audio encryption. Within a meeting, all participants use a single 128-bit key. How to mitigate CVE-2020-11500 Time needed: 5 minutes. Follow Read more

Share this info:

CVE-2020-11470: Zoom vulnerability

October 19, 2020 0

Zoom Client for Meetings through 4.6.8 on macOS has the disable-library-validation entitlement, which allows a local process (with the user’s privileges) to obtain unprompted microphone and camera access by loading a crafted library and thereby Read more

Share this info:

CVE-2020-11469: Zoom vulnerability

October 19, 2020 0

Zoom Client for Meetings through 4.6.8 on macOS copies runwithroot to a user-writable temporary directory during installation, which allows a local process (with the user’s privileges) to obtain root access by replacing runwithroot. How to Read more

Share this info:

CVE-2020-11443: Zoom vulnerability

October 19, 2020 0

The Zoom IT installer for Windows (ZoomInstallerFull.msi) prior to version 4.6.10 deletes files located in %APPDATA%\Zoom before installing an updated version of the client. Standard users are able to write to this directory, and can Read more

Share this info:

CVE-2020-27174: Amazon vulnerability

October 18, 2020 0

In Amazon AWS Firecracker before 0.21.3, and 0.22.x before 0.22.1, the serial console buffer can grow its memory usage without limit when data is sent to the standard input. This can result in a memory Read more

Share this info:
1 2 3 4 5 49