U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Results Type: Overview
  • Keyword (text search): zoom
  • Search Type: Search All
There are 187 matching records.
Displaying matches 41 through 60.
Vuln ID Summary CVSS Severity
CVE-2023-36541

Insufficient verification of data authenticity in Zoom Desktop Client for Windows before 5.14.5 may allow an authenticated user to enable an escalation of privilege via network access.

Published: August 08, 2023; 2:15:14 PM -0400
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2023-36540

Untrusted search path in the installer for Zoom Desktop Client for Windows before 5.14.5 may allow an authenticated user to enable an escalation of privilege via local access.

Published: August 08, 2023; 2:15:14 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-36535

Client-side enforcement of server-side security in Zoom clients before 5.14.10 may allow an authenticated user to enable information disclosure via network access.

Published: August 08, 2023; 2:15:14 PM -0400
V3.1: 6.5 MEDIUM
V2.0:(not available)
CVE-2023-36534

Path traversal in Zoom Desktop Client for Windows before 5.14.7 may allow an unauthenticated user to enable an escalation of privilege via network access.

Published: August 08, 2023; 2:15:14 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-36533

Uncontrolled resource consumption in Zoom SDKs before 5.14.7 may allow an unauthenticated user to enable a denial of service via network access.

Published: August 08, 2023; 2:15:14 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-36532

Buffer overflow in Zoom Clients before 5.14.5 may allow an unauthenticated user to enable a denial of service via network access.

Published: August 08, 2023; 2:15:13 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-3947

The Video Conferencing with Zoom plugin for WordPress is vulnerable to Sensitive Information Exposure due to hardcoded encryption key on the 'vczapi_encrypt_decrypt' function in versions up to, and including, 4.2.1. This makes it possible for unauthenticated attackers to decrypt and view the meeting id and password.

Published: July 26, 2023; 12:15:11 AM -0400
V3.1: 5.3 MEDIUM
V2.0:(not available)
CVE-2023-30200

In the module “Image: WebP, Compress, Zoom, Lazy load, Alt & More” (ultimateimagetool) in versions up to 2.1.02 from Advanced Plugins for PrestaShop, a guest can download personal informations without restriction by performing a path traversal attack.

Published: July 20, 2023; 4:15:10 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-36538

Improper access control in Zoom Rooms for Windows before version 5.15.0 may allow an authenticated user to enable an escalation of privilege via local access.

Published: July 11, 2023; 2:15:20 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-36537

Improper privilege management in Zoom Rooms for Windows before version 5.14.5 may allow an authenticated user to enable an escalation of privilege via local access.

Published: July 11, 2023; 2:15:20 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-36536

Untrusted search path in the installer for Zoom Rooms for Windows before version 5.15.0 may allow an authenticated user to enable an escalation of privilege via local access.

Published: July 11, 2023; 2:15:20 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-34119

Insecure temporary file in the installer for Zoom Rooms for Windows before version 5.15.0 may allow an authenticated user to enable an escalation of privilege via local access.

Published: July 11, 2023; 2:15:16 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-34118

Improper privilege management in Zoom Rooms for Windows before version 5.14.5 may allow an authenticated user to enable an escalation of privilege via local access.

Published: July 11, 2023; 2:15:16 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-34117

Relative path traversal in the Zoom Client SDK before version 5.15.0 may allow an unauthorized user to enable information disclosure via local access.

Published: July 11, 2023; 1:15:13 PM -0400
V3.1: 3.3 LOW
V2.0:(not available)
CVE-2023-34116

Improper input validation in the Zoom Desktop Client for Windows before version 5.15.0 may allow an unauthorized user to enable an escalation of privilege via network access.

Published: July 11, 2023; 1:15:13 PM -0400
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2023-36539

Exposure of information intended to be encrypted by some Zoom clients may lead to disclosure of sensitive information.

Published: June 29, 2023; 11:15:09 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-34115

Buffer copy without checking size of input in Zoom Meeting SDK before 5.13.0 may allow an authenticated user to potentially enable a denial of service via local access. This issue may result in the Zoom Meeting SDK to crash and need to be restarted.

Published: June 13, 2023; 3:15:09 PM -0400
V3.1: 3.8 LOW
V2.0:(not available)
CVE-2023-34114

Exposure of resource to wrong sphere in Zoom for Windows and Zoom for MacOS clients before 5.14.10 may allow an authenticated user to potentially enable information disclosure via network access.

Published: June 13, 2023; 3:15:09 PM -0400
V3.1: 6.5 MEDIUM
V2.0:(not available)
CVE-2023-34122

Improper input validation in the installer for Zoom for Windows clients before 5.14.0 may allow an authenticated user to potentially enable an escalation of privilege via local access.

Published: June 13, 2023; 2:15:22 PM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-34121

Improper input validation in the Zoom for Windows, Zoom Rooms, Zoom VDI Windows Meeting clients before 5.14.0 may allow an authenticated user to potentially enable an escalation of privilege via network access.

Published: June 13, 2023; 2:15:21 PM -0400
V3.1: 8.8 HIGH
V2.0:(not available)