| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2024-42441 | Zoom Workplace Desktop App for macOS, Zoom Meeting SDK for macOS, Zoom Rooms Client for macOS - Incorrect Privilege Assignment | Zoom Communications Inc. | Zoom Workplace Desktop App for macOS, Zoom Meeting SDK for macOS, Zoom Rooms Client for macOS | Medium | 6.2 | 2024-08-14 16:46:18 | Deep Dive |
| CVE-2024-42440 | Zoom Workplace Desktop App for macOS, Zoom Meeting SDK for macOS, Zoom Rooms Client for macOS - Improper Privilege Management | Zoom Communications Inc. | Zoom Workplace Desktop App for macOS, Zoom Meeting SDK for macOS, Zoom Rooms Client for macOS | Medium | 6.2 | 2024-08-14 16:44:46 | Deep Dive |
| CVE-2024-22378 | Intel Unite Client Extended Display Plugin 安全漏洞 | - | Intel Unite(R) Client Extended Display Plugin software installers | Medium | 6.7 | 2024-08-14 13:45:29 | Deep Dive |
| CVE-2024-38483 | Dell BIOS 输入验证错误漏洞 | Dell | Dell Client Platform BIOS | Medium | 5.8 | 2024-08-14 09:24:11 | Deep Dive |
| CVE-2024-38157 | Azure IoT SDK Remote Code Execution Vulnerability | Microsoft | Azure IoT Hub Device Client SDK | High | 7.0 | 2024-08-13 17:30:24 | Deep Dive |
| CVE-2024-38131 | Clipboard Virtual Channel Extension Remote Code Execution Vulnerability | Microsoft | Windows 11 Version 24H2 | High | 8.8 | 2024-08-13 17:30:10 | Deep Dive |
| CVE-2023-28806 | Signature validation error in DLL allows disabling anti-tampering protection | Zscaler | Client Connector | Medium | 5.7 | 2024-08-06 15:41:02 | Deep Dive |
| CVE-2024-23483 | Local Privilege Escalation via lack of input validation | Zscaler | Client Connector | High | 7.0 | 2024-08-06 15:30:52 | Deep Dive |
| CVE-2024-23460 | Incorrect signature validation of package | Zscaler | Client Connector | Medium | 6.4 | 2024-08-06 15:29:26 | Deep Dive |
| CVE-2024-23464 | Zscaler bypass with administrative privileges on Windows | Zscaler | Client Connector | High | 7.2 | 2024-08-06 15:24:04 | Deep Dive |
| CVE-2024-23458 | Local Privilege Escalation on Zscaler Client Connector on Windows | Zscaler | Client Connector | High | 7.3 | 2024-08-06 15:22:59 | Deep Dive |
| CVE-2024-23456 | Signature validation issue leads to Anti-Tampering bypass | Zscaler | Client Connector | High | 7.8 | 2024-08-06 15:21:51 | Deep Dive |
| CVE-2024-38877 | Siemens多款产品 安全漏洞 | Siemens | Omnivise T3000 Application Server R9.2 | High | 8.2 | 2024-08-02 10:36:18 | Deep Dive |
| CVE-2024-38876 | Siemens多款产品 安全漏洞 | Siemens | Omnivise T3000 Application Server R9.2 | High | 7.8 | 2024-08-02 10:36:17 | Deep Dive |
| CVE-2024-36268 | Apache InLong TubeMQ Client: Remote Code Execution vulnerability | Apache Software Foundation | Apache InLong TubeMQ Client | - | - | 2024-08-02 09:44:26 | Deep Dive |
| CVE-2024-6978 | Cato Networks Windows SDP Client Local root certificates can be installed by low-privileged users | Cato Networks | SDP Client | Medium | 5.6 | 2024-07-31 16:56:16 | Deep Dive |
| CVE-2024-6977 | Cato Networks Windows SDP Client Sensitive data in trace logs can lead to account takeover | Cato Networks | SDP Client | Medium | 6.5 | 2024-07-31 16:56:06 | Deep Dive |
| CVE-2024-6975 | Cato Networks Windows SDP Client Local Privilege Escalation via openssl configuration file | Cato Networks | SDP Client | High | 8.8 | 2024-07-31 16:55:56 | Deep Dive |
| CVE-2024-6974 | Cato Networks Windows SDP Client Local Privilege Escalation via self-upgrade | Cato Networks | SDP Client | High | 8.8 | 2024-07-31 16:55:40 | Deep Dive |
| CVE-2024-6973 | Remote Code Execution in Cato Windows SDP client via crafted URLs | Cato Networks | SDP Client | High | 7.5 | 2024-07-31 16:55:21 | Deep Dive |