Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:a:zoom:zoom:3.5.17994.0608:*:*:*:*:macos:*:*
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-49646 |
Improper authentication in some Zoom clients before version 5.16.5 may allow an authenticated user to conduct a denial of service via network access. Published: December 13, 2023; 6:15:08 PM -0500 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2023-43588 |
Insufficient control flow management in some Zoom clients may allow an authenticated user to conduct an information disclosure via network access. Published: November 14, 2023; 7:15:08 PM -0500 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2023-43582 |
Improper authorization in some Zoom clients may allow an authorized user to conduct an escalation of privilege via network access. Published: November 14, 2023; 7:15:08 PM -0500 |
V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2023-39206 |
Buffer overflow in some Zoom clients may allow an unauthenticated user to conduct a denial of service via network access. Published: November 14, 2023; 6:15:09 PM -0500 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-39205 |
Improper conditions check in Zoom Team Chat for Zoom clients may allow an authenticated user to conduct a denial of service via network access. Published: November 14, 2023; 6:15:08 PM -0500 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2023-39204 |
Buffer overflow in some Zoom clients may allow an unauthenticated user to conduct a denial of service via network access. Published: November 14, 2023; 6:15:08 PM -0500 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-39199 |
Cryptographic issues with In-Meeting Chat for some Zoom clients may allow a privileged user to conduct an information disclosure via network access. Published: November 14, 2023; 6:15:08 PM -0500 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2023-39215 |
Improper authentication in Zoom clients may allow an authenticated user to conduct a denial of service via network access. Published: September 12, 2023; 4:15:09 PM -0400 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2023-39214 |
Exposure of sensitive information in Zoom Client SDK's before 5.15.5 may allow an authenticated user to enable a denial of service via network access. Published: August 08, 2023; 6:15:10 PM -0400 |
V3.1: 8.1 HIGH V2.0:(not available) |
CVE-2023-39218 |
Client-side enforcement of server-side security in Zoom clients before 5.14.10 may allow a privileged user to enable information disclosure via network access. Published: August 08, 2023; 2:15:23 PM -0400 |
V3.1: 4.9 MEDIUM V2.0:(not available) |
CVE-2023-36535 |
Client-side enforcement of server-side security in Zoom clients before 5.14.10 may allow an authenticated user to enable information disclosure via network access. Published: August 08, 2023; 2:15:14 PM -0400 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2023-36532 |
Buffer overflow in Zoom Clients before 5.14.5 may allow an unauthenticated user to enable a denial of service via network access. Published: August 08, 2023; 2:15:13 PM -0400 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-34114 |
Exposure of resource to wrong sphere in Zoom for Windows and Zoom for MacOS clients before 5.14.10 may allow an authenticated user to potentially enable information disclosure via network access. Published: June 13, 2023; 3:15:09 PM -0400 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2023-28600 |
Zoom for MacOSclients prior to 5.14.0 contain an improper access control vulnerability. A malicious user may be able to delete/replace Zoom Client files potentially causing a loss of integrity and availability to the Zoom Client. Published: June 13, 2023; 2:15:21 PM -0400 |
V3.1: 5.4 MEDIUM V2.0:(not available) |
CVE-2023-28599 |
Zoom clients prior to 5.13.10 contain an HTML injection vulnerability. A malicious user could inject HTML into their display name potentially leading a victim to a malicious website during meeting creation. Published: June 13, 2023; 1:15:14 PM -0400 |
V3.1: 4.3 MEDIUM V2.0:(not available) |
CVE-2023-28597 |
Zoom clients prior to 5.13.5 contain an improper trust boundary implementation vulnerability. If a victim saves a local recording to an SMB location and later opens it using a link from Zoom’s web portal, an attacker positioned on an adjacent network to the victim client could set up a malicious SMB server to respond to client requests, causing the client to execute attacker controlled executables. This could result in an attacker gaining access to a user's device and data, and remote code execution. Published: March 27, 2023; 5:15:12 PM -0400 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-28755 |
The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.11.0 are susceptible to a URL parsing vulnerability. If a malicious Zoom meeting URL is opened, the malicious link may direct the user to connect to an arbitrary network address, leading to additional attacks including the potential for remote code execution through launching executables from arbitrary paths. Published: August 11, 2022; 11:15:12 AM -0400 |
V3.1: 6.1 MEDIUM V2.0:(not available) |
CVE-2019-13567 |
The Zoom Client before 4.4.53932.0709 on macOS allows remote code execution, a different vulnerability than CVE-2019-13450. If the ZoomOpener daemon (aka the hidden web server) is running, but the Zoom Client is not installed or can't be opened, an attacker can remotely execute code with a maliciously crafted launch URL. NOTE: ZoomOpener is removed by the Apple Malware Removal Tool (MRT) if this tool is enabled and has the 2019-07-10 MRTConfigData. Published: July 12, 2019; 12:15:10 AM -0400 |
V3.1: 8.8 HIGH V2.0: 6.8 MEDIUM |