{"vulnerability": "CVE-2024-3982", "sightings": [{"uuid": "4d890553-2ac0-4205-9db0-cd35d19f20be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3982", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-331-04", "content": "", "creation_timestamp": "2024-11-26T11:00:00.000000Z"}, {"uuid": "0bedccc9-f797-4fad-b3d0-401cbaebdbe6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3982", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-133-03", "content": "", "creation_timestamp": "2025-05-13T10:00:00.000000Z"}, {"uuid": "4835c6f8-e515-4e25-93fe-f56a44344bff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3982", "type": "seen", "source": "https://t.me/cvedetector/4246", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-3982 - MicroSCADA X SYS600 Session Hijacking Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-3982 \nPublished : Aug. 27, 2024, 1:15 p.m. | 17\u00a0minutes ago \nDescription : An attacker with local access to machine where MicroSCADA X  \nSYS600 is installed, could enable the session logging supporting the product and try to exploit a session hijacking of an already established session. By default, the session logging level  \nis not enabled and only users with administrator rights can enable it. \nSeverity: 8.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-27T15:43:26.000000Z"}, {"uuid": "b560667b-040c-4b32-a522-1d2cdc7bc125", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39825", "type": "seen", "source": "https://t.me/cvedetector/3186", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39825 - Zoom Workplace Apps and Rooms Clients Elevation of Privilege Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-39825 \nPublished : Aug. 14, 2024, 5:15 p.m. | 29\u00a0minutes ago \nDescription : Buffer overflow in some Zoom Workplace Apps and Rooms Clients may allow an authenticated user to conduct an escalation of privilege via network access. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-14T19:54:15.000000Z"}, {"uuid": "f42f4a03-b357-4a3c-a98c-0b890dc5cb9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39824", "type": "seen", "source": "https://t.me/cvedetector/3189", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39824 - Sensitive information disclosure in some Zoom Work\", \n  \"Content\": \"CVE ID : CVE-2024-39824 \nPublished : Aug. 14, 2024, 5:15 p.m. | 29\u00a0minutes ago \nDescription : Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access. \nSeverity: 4.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-14T19:54:19.000000Z"}, {"uuid": "bb03ad99-f929-4d67-9b59-f2573126ad59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39823", "type": "seen", "source": "https://t.me/cvedetector/3188", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39823 - Zoom Sensitive Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39823 \nPublished : Aug. 14, 2024, 5:15 p.m. | 29\u00a0minutes ago \nDescription : Sensitive information disclosure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow a privileged user to conduct an information disclosure via network access. \nSeverity: 4.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-14T19:54:18.000000Z"}, {"uuid": "67670717-c008-4831-a154-014a5ecee4f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39822", "type": "seen", "source": "https://t.me/cvedetector/3187", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39822 - Sensitive information exposure in some Zoom Workpl\", \n  \"Content\": \"CVE ID : CVE-2024-39822 \nPublished : Aug. 14, 2024, 5:15 p.m. | 29\u00a0minutes ago \nDescription : Sensitive information exposure in some Zoom Workplace Apps, SDKs, Rooms Clients, and Rooms Controllers may allow an authenticated user to conduct an information disclosure via network access. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-14T19:54:17.000000Z"}, {"uuid": "b5475d77-f9ff-4282-9588-c89fa536d7a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39825", "type": "seen", "source": "https://t.me/CyberBulletin/368", "content": "\u26a1\ufe0fCVE-2024-39825 and CVE-2024-39818: High-Risk Zoom Flaws Require Urgent Updates.\n\n#CyberBulletin", "creation_timestamp": "2024-08-13T22:27:44.000000Z"}, {"uuid": "69e9f357-9a85-4359-b997-78b1c68ce9cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39821", "type": "seen", "source": "https://t.me/cvedetector/887", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39821 - \"Zoom Workplace App for Windows and Zoom Rooms App for Windows Race Condition Denial of Service\"\", \n  \"Content\": \"CVE ID : CVE-2024-39821 \nPublished : July 15, 2024, 6:15 p.m. | 42\u00a0minutes ago \nDescription : Race condition in the installer for Zoom Workplace App for Windows and Zoom Rooms App for Windows may allow an authenticated user to conduct a denial of service via local access. \nSeverity: 6.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-15T21:01:54.000000Z"}, {"uuid": "aa5b28da-ccd1-48f9-9a2f-7bfeed150bd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39826", "type": "seen", "source": "https://t.me/cvedetector/884", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39826 - Zoom Workplace Apps Path Traversal Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-39826 \nPublished : July 15, 2024, 6:15 p.m. | 42\u00a0minutes ago \nDescription : Path traversal in Team Chat for some Zoom Workplace Apps and SDKs for Windows may allow an authenticated user to conduct information disclosure via network access. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-15T21:01:48.000000Z"}, {"uuid": "00f5fcfb-2194-472f-b655-3e03e961d672", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39827", "type": "seen", "source": "https://t.me/cvedetector/882", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39827 - Zoom Workplace Desktop App for Windows Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39827 \nPublished : July 15, 2024, 6:15 p.m. | 42\u00a0minutes ago \nDescription : Improper input validation in the installer for Zoom Workplace Desktop App for Windows before version 6.0.10 may allow an authenticated user to conduct a denial of service via local access. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-15T21:01:46.000000Z"}, {"uuid": "ef2411e8-fdc4-48ae-a644-887299199138", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39820", "type": "seen", "source": "https://t.me/cvedetector/889", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39820 - Zoom Workplace Desktop App for macOS Directory Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39820 \nPublished : July 15, 2024, 6:15 p.m. | 42\u00a0minutes ago \nDescription : Uncontrolled search path element in the installer for Zoom Workplace Desktop App for macOS before version 6.0.10 may allow an authenticated user to conduct a denial of service via local access. \nSeverity: 6.6 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-15T21:01:56.000000Z"}]}