CVE-2019-13450
- EPSS 0.62%
- Veröffentlicht 09.07.2019 06:15:10
- Zuletzt bearbeitet 21.11.2024 04:24:55
In the Zoom Client through 4.4.4 and RingCentral 7.0.136380.0312 on macOS, remote attackers can force a user to join a video call with the video camera active. This occurs because any web site can interact with the Zoom web server on localhost port 1...
CVE-2019-13449
- EPSS 1.01%
- Veröffentlicht 09.07.2019 06:15:10
- Zuletzt bearbeitet 21.11.2024 04:24:55
In the Zoom Client before 4.4.2 on macOS, remote attackers can cause a denial of service (continual focus grabs) via a sequence of invalid launch?action=join&confno= requests to localhost port 19421.
CVE-2018-15715
- EPSS 1.27%
- Veröffentlicht 30.11.2018 20:29:00
- Zuletzt bearbeitet 21.11.2024 03:51:19
Zoom clients on Windows (before version 4.1.34814.1119), Mac OS (before version 4.1.34801.1116), and Linux (2.4.129780.0915 and below) are vulnerable to unauthorized message processing. A remote unauthenticated attacker can spoof UDP messages from a ...
CVE-2017-15048
- EPSS 21.43%
- Veröffentlicht 19.12.2017 15:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
Stack-based buffer overflow in the ZoomLauncher binary in the Zoom client for Linux before 2.0.115900.1201 allows remote attackers to execute arbitrary code by leveraging the zoommtg:// scheme handler.
CVE-2017-15049
- EPSS 28.86%
- Veröffentlicht 19.12.2017 15:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
The ZoomLauncher binary in the Zoom client for Linux before 2.0.115900.1201 does not properly sanitize user input when constructing a shell command, which allows remote attackers to execute arbitrary code by leveraging the zoommtg:// scheme handler.