4 results (0.007 seconds)

CVSS: 9.0EPSS: 7%CPEs: 3EXPL: 1

Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat software, which is different from the chat feature of the Zoom Meetings and Zoom Video Webinars software. Zoom Chat versión hasta el 09-04-2021 en Windows y macOS, permite a determinados atacantes autenticados remotamente ejecutar código arbitrario sin la interacción del usuario. Un atacante debe pertenecer a la misma organización o una parte externa que haya sido aceptada como contacto. • https://blog.malwarebytes.com/exploits-and-vulnerabilities/2021/04/zoom-zero-day-discovery-makes-calls-safer-hackers-200000-richer https://explore.zoom.us/en/trust/security/security-bulletin https://sector7.computest.nl/post/2021-08-zoom https://twitter.com/thezdi/status/1379855435730149378 https://twitter.com/thezdi/status/1379859851061395459 https://www.securityweek.com/200000-awarded-zero-click-zoom-exploit-pwn2own https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

Multiple cross-site scripting (XSS) vulnerabilities in Slash Command Creator in Synology Chat before 2.0.0-1124 allow remote authenticated users to inject arbitrary web script or HTML via (1) COMMAND, (2) COMMANDS INSTRUCTION, or (3) DESCRIPTION parameter. Múltiples vulnerabilidades de Cross-Site Scripting (XSS) en Slash Command Creator en Synology Chat, en versiones anteriores a la 2.0.0-1124 permiten que usuarios remotos autenticados inyecten scripts web o HTML arbitrarios mediante los parámetros (1) COMMAND, (2) COMMANDS INSTRUCTION o (3) DESCRIPTION. • https://www.synology.com/en-global/support/security/Synology_SA_17_78 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Server-side request forgery (SSRF) vulnerability in Link Preview in Synology Chat before 2.0.0-1124 allows remote authenticated users to download arbitrary local files via a crafted URI. Una vulnerabilidad Server-Side Request Forgery (SSRF) en Link Preview en Synology Chat en versiones anteriores a la 2.0.0-1124 permite que usuarios remotos autenticados descarguen archivos locales arbitrarios mediante un URI manipulado. • https://www.synology.com/en-global/support/security/Synology_SA_17_78 • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Server-side request forgery (SSRF) vulnerability in link preview in Synology Chat before 1.1.0-0806 allows remote authenticated users to access intranet resources via unspecified vectors. Una vulnerabilidad de tipo server-side request forgery (SSRF) en la previsualización de enlaces en Synology Chat en versiones anteriores a la 1.1.0-0806 permite que usuarios remotos autenticados accedan a recursos de la intranet mediante vectores sin especificar. • http://www.securityfocus.com/bid/100310 https://www.synology.com/en-global/support/security/Synology_SA_17_38_Chat • CWE-918: Server-Side Request Forgery (SSRF) •