CVE-2020-15948 – eGain Chat 15.5.5 Cross Site Scripting
https://notcve.org/view.php?id=CVE-2020-15948
eGain Chat 15.5.5 allows XSS via the Name (aka full_name) field. eGain Chat versión 15.5.5, permite un ataque de tipo XSS por medio del campo Name (también se conoce como full_name) eGain Chat version 15.5.5 suffers from a cross site scripting vulnerability. • http://packetstormsecurity.com/files/163687/eGain-Chat-15.5.5-Cross-Site-Scripting.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2021-30480
https://notcve.org/view.php?id=CVE-2021-30480
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat software, which is different from the chat feature of the Zoom Meetings and Zoom Video Webinars software. Zoom Chat versión hasta el 09-04-2021 en Windows y macOS, permite a determinados atacantes autenticados remotamente ejecutar código arbitrario sin la interacción del usuario. Un atacante debe pertenecer a la misma organización o una parte externa que haya sido aceptada como contacto. • https://blog.malwarebytes.com/exploits-and-vulnerabilities/2021/04/zoom-zero-day-discovery-makes-calls-safer-hackers-200000-richer https://explore.zoom.us/en/trust/security/security-bulletin https://sector7.computest.nl/post/2021-08-zoom https://twitter.com/thezdi/status/1379855435730149378 https://twitter.com/thezdi/status/1379859851061395459 https://www.securityweek.com/200000-awarded-zero-click-zoom-exploit-pwn2own https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user •