CVE-2024-39821 – Zoom Workplace App for Windows and Zoom Rooms App for Windows - Race Condition
https://notcve.org/view.php?id=CVE-2024-39821
Race condition in the installer for Zoom Workplace App for Windows and Zoom Rooms App for Windows may allow an authenticated user to conduct a denial of service via local access. • https://www.zoom.com/en/trust/security-bulletin/zsb-24028 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •
CVE-2024-39820 – Zoom Workplace Desktop App for macOS - Uncontrolled Search Path Element
https://notcve.org/view.php?id=CVE-2024-39820
Uncontrolled search path element in the installer for Zoom Workplace Desktop App for macOS before version 6.0.10 may allow an authenticated user to conduct a denial of service via local access. • https://www.zoom.com/en/trust/security-bulletin/zsb-24027 • CWE-427: Uncontrolled Search Path Element •
CVE-2024-39827 – Zoom Workplace Desktop App for Windows - Improper Input Validation
https://notcve.org/view.php?id=CVE-2024-39827
Improper input validation in the installer for Zoom Workplace Desktop App for Windows before version 6.0.10 may allow an authenticated user to conduct a denial of service via local access. • https://www.zoom.com/en/trust/security-bulletin/zsb-24024 • CWE-20: Improper Input Validation •
CVE-2024-27241 – Zoom Apps and SDKs - Improper Input Validation
https://notcve.org/view.php?id=CVE-2024-27241
Improper input validation in some Zoom Apps and SDKs may allow an authenticated user to conduct a denial of service via network access. • https://www.zoom.com/en/trust/security-bulletin/zsb-24020 • CWE-20: Improper Input Validation •
CVE-2024-41007 – tcp: avoid too many retransmit packets
https://notcve.org/view.php?id=CVE-2024-41007
En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: evitar demasiados paquetes de retransmisión Si un socket TCP está usando TCP_USER_TIMEOUT y el otro par retrajo su ventana a cero, tcp_retransmit_timer() puede retransmitir un paquete cada dos santiamén (2 ms). para HZ=1000), durante aproximadamente 4 minutos después de que TCP_USER_TIMEOUT haya 'expirado'. • https://git.kernel.org/stable/c/b701a99e431db784714c32fc6b68123045714679 https://git.kernel.org/stable/c/7bb7670f92bfbd05fc41a8f9a8f358b7ffed65f4 https://git.kernel.org/stable/c/d2346fca5bed130dc712f276ac63450201d52969 https://git.kernel.org/stable/c/5d7e64d70a11d988553a08239c810a658e841982 https://git.kernel.org/stable/c/04317a2471c2f637b4c49cbd0e9c0d04a519f570 https://git.kernel.org/stable/c/e113cddefa27bbf5a79f72387b8fbd432a61a466 https://git.kernel.org/stable/c/dfcdd7f89e401d2c6616be90c76c2fac3fa98fde https://git.kernel.org/stable/c/66cb64a1d2239cd0309f9b5038b054625 • CWE-99: Improper Control of Resource Identifiers ('Resource Injection') •