Zoom

Zoom

67 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.68%
  • Veröffentlicht 08.06.2020 14:15:12
  • Zuletzt bearbeitet 21.11.2024 05:35:06

An exploitable path traversal vulnerability exists in the Zoom client, version 4.6.10 processes messages including animated GIFs. A specially crafted chat message can cause an arbitrary file write, which could potentially be abused to achieve arbitra...

Exploit
  • EPSS 1.52%
  • Veröffentlicht 12.07.2019 04:15:10
  • Zuletzt bearbeitet 21.11.2024 04:25:11

The Zoom Client before 4.4.53932.0709 on macOS allows remote code execution, a different vulnerability than CVE-2019-13450. If the ZoomOpener daemon (aka the hidden web server) is running, but the Zoom Client is not installed or can't be opened, an a...

Exploit
  • EPSS 0.62%
  • Veröffentlicht 09.07.2019 06:15:10
  • Zuletzt bearbeitet 21.11.2024 04:24:55

In the Zoom Client through 4.4.4 and RingCentral 7.0.136380.0312 on macOS, remote attackers can force a user to join a video call with the video camera active. This occurs because any web site can interact with the Zoom web server on localhost port 1...

Exploit
  • EPSS 1.01%
  • Veröffentlicht 09.07.2019 06:15:10
  • Zuletzt bearbeitet 21.11.2024 04:24:55

In the Zoom Client before 4.4.2 on macOS, remote attackers can cause a denial of service (continual focus grabs) via a sequence of invalid launch?action=join&confno= requests to localhost port 19421.

Exploit
  • EPSS 3.67%
  • Veröffentlicht 30.11.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:51:19

Zoom clients on Windows (before version 4.1.34814.1119), Mac OS (before version 4.1.34801.1116), and Linux (2.4.129780.0915 and below) are vulnerable to unauthorized message processing. A remote unauthenticated attacker can spoof UDP messages from a ...

Exploit
  • EPSS 21.43%
  • Veröffentlicht 19.12.2017 15:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Stack-based buffer overflow in the ZoomLauncher binary in the Zoom client for Linux before 2.0.115900.1201 allows remote attackers to execute arbitrary code by leveraging the zoommtg:// scheme handler.

Exploit
  • EPSS 28.86%
  • Veröffentlicht 19.12.2017 15:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The ZoomLauncher binary in the Zoom client for Linux before 2.0.115900.1201 does not properly sanitize user input when constructing a shell command, which allows remote attackers to execute arbitrary code by leveraging the zoommtg:// scheme handler.