Vulnerabilities (CVE)

Filtered by vendor Zoom Subscribe
Filtered by product Zoom
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-39213 1 Zoom 2 Virtual Desktop Infrastructure, Zoom 2023-08-15 N/A 9.8 CRITICAL
Improper neutralization of special elements in Zoom Desktop Client for Windows and Zoom VDI Client before 5.15.2 may allow an unauthenticated user to enable an escalation of privilege via network access.
CVE-2023-39216 1 Zoom 1 Zoom 2023-08-11 N/A 9.8 CRITICAL
Improper input validation in Zoom Desktop Client for Windows before 5.14.7 may allow an unauthenticated user to enable an escalation of privilege via network access.
CVE-2023-36534 1 Zoom 1 Zoom 2023-08-11 N/A 9.8 CRITICAL
Path traversal in Zoom Desktop Client for Windows before 5.14.7 may allow an unauthenticated user to enable an escalation of privilege via network access.
CVE-2020-6109 1 Zoom 1 Zoom 2022-05-12 7.5 HIGH 9.8 CRITICAL
An exploitable path traversal vulnerability exists in the Zoom client, version 4.6.10 processes messages including animated GIFs. A specially crafted chat message can cause an arbitrary file write, which could potentially be abused to achieve arbitrary code execution. An attacker needs to send a specially crafted message to a target user or a group to exploit this vulnerability.
CVE-2018-15715 1 Zoom 1 Zoom 2019-10-09 7.5 HIGH 9.8 CRITICAL
Zoom clients on Windows (before version 4.1.34814.1119), Mac OS (before version 4.1.34801.1116), and Linux (2.4.129780.0915 and below) are vulnerable to unauthorized message processing. A remote unauthenticated attacker can spoof UDP messages from a meeting attendee or Zoom server in order to invoke functionality in the target client. This allows the attacker to remove attendees from meetings, spoof messages from users, or hijack shared screens.