Metrics
Affected Vendors & Products
Fri, 03 Apr 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:trueconf:trueconf:*:*:*:*:*:windows:*:* |
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Trueconf
Trueconf trueconf |
|
| Vendors & Products |
Trueconf
Trueconf trueconf |
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
ssvc
|
kev
|
Tue, 31 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 31 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TrueConf Client downloads application update code and applies it without performing verification. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user. | |
| Title | TrueConf Client Update Integrity Verification Bypass | |
| Weaknesses | CWE-494 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: checkpoint
Published: 2026-03-30T18:05:42.806Z
Updated: 2026-04-03T03:55:23.638Z
Reserved: 2026-03-03T21:18:35.221Z
Link: CVE-2026-3502
Updated: 2026-03-31T14:28:12.261Z
Status : Analyzed
Published: 2026-03-30T19:16:27.053
Modified: 2026-04-03T11:40:57.390
Link: CVE-2026-3502
No data.
ReportizFlow