Zoom

Zoom

65 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.62%
  • Veröffentlicht 09.07.2019 06:15:10
  • Zuletzt bearbeitet 21.11.2024 04:24:55

In the Zoom Client through 4.4.4 and RingCentral 7.0.136380.0312 on macOS, remote attackers can force a user to join a video call with the video camera active. This occurs because any web site can interact with the Zoom web server on localhost port 1...

Exploit
  • EPSS 1.01%
  • Veröffentlicht 09.07.2019 06:15:10
  • Zuletzt bearbeitet 21.11.2024 04:24:55

In the Zoom Client before 4.4.2 on macOS, remote attackers can cause a denial of service (continual focus grabs) via a sequence of invalid launch?action=join&confno= requests to localhost port 19421.

Exploit
  • EPSS 1.27%
  • Veröffentlicht 30.11.2018 20:29:00
  • Zuletzt bearbeitet 21.11.2024 03:51:19

Zoom clients on Windows (before version 4.1.34814.1119), Mac OS (before version 4.1.34801.1116), and Linux (2.4.129780.0915 and below) are vulnerable to unauthorized message processing. A remote unauthenticated attacker can spoof UDP messages from a ...

Exploit
  • EPSS 21.43%
  • Veröffentlicht 19.12.2017 15:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Stack-based buffer overflow in the ZoomLauncher binary in the Zoom client for Linux before 2.0.115900.1201 allows remote attackers to execute arbitrary code by leveraging the zoommtg:// scheme handler.

Exploit
  • EPSS 28.86%
  • Veröffentlicht 19.12.2017 15:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

The ZoomLauncher binary in the Zoom client for Linux before 2.0.115900.1201 does not properly sanitize user input when constructing a shell command, which allows remote attackers to execute arbitrary code by leveraging the zoommtg:// scheme handler.