Page 2 of 41 results (0.003 seconds)

CVSS: 7.3EPSS: 0%CPEs: 2EXPL: 0

17 Nov 2022 — Windows 32-bit versions of the Zoom Client for Meetings before 5.12.6 and Zoom Rooms for Conference Room before version 5.12.6 are susceptible to a DLL injection vulnerability. A local low-privileged user could exploit this vulnerability to run arbitrary code in the context of the Zoom client. Las versiones de Windows de 32 bits de Zoom Client for Meetings anteriores a 5.12.6 y Zoom Rooms for Meetings anteriores a 5.12.6 son susceptibles a una vulnerabilidad de inyección de DLL. Un usuario local con pocos p... • https://explore.zoom.us/en/trust/security/security-bulletin • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-427: Uncontrolled Search Path Element •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

17 Nov 2022 — The Zoom Client for Meetings Installer for macOS (Standard and for IT Admin) before version 5.12.6 contains a local privilege escalation vulnerability. A local low-privileged user could exploit this vulnerability during the install process to escalate their privileges to root. El instalador de Zoom Client for Meetings para macOS (estándar y para administrador de TI) anterior a la versión 5.12.6 contiene una vulnerabilidad de escalada de privilegios local. Un usuario local con pocos privilegios podría aprove... • https://explore.zoom.us/en/trust/security/security-bulletin • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-689: Permission Race Condition During Resource Copy •

CVSS: 3.3EPSS: 0%CPEs: 11EXPL: 0

14 Nov 2022 — The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.12.6 is susceptible to a local information exposure vulnerability. A failure to clear data from a local SQL database after a meeting ends and the usage of an insufficiently secure per-device key encrypting that database results in a local malicious user being able to obtain meeting information such as in-meeting chat for the previous meeting attended from that local user account. Zoom Client para reuniones (para Andr... • https://explore.zoom.us/en/trust/security/security-bulletin • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-459: Incomplete Cleanup •

CVSS: 10.0EPSS: 0%CPEs: 11EXPL: 0

31 Oct 2022 — The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.12.2 is susceptible to a URL parsing vulnerability. If a malicious Zoom meeting URL is opened, the malicious link may direct the user to connect to an arbitrary network address, leading to additional attacks including session takeovers. El Zoom Client para Meetings (para Android, iOS, Linux, macOS y Windows) anterior a la versión 5.12.2 es susceptible a una vulnerabilidad de análisis de URL. Si se abre la URL de una ... • https://explore.zoom.us/en/trust/security/security-bulletin • CWE-20: Improper Input Validation CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

14 Oct 2022 — Zoom Client for Meetings for macOS (Standard and for IT Admin) starting with 5.10.6 and prior to 5.12.0 contains a debugging port misconfiguration. When camera mode rendering context is enabled as part of the Zoom App Layers API by running certain Zoom Apps, a local debugging port is opened by the Zoom client. A local malicious user could use this debugging port to connect to and control the Zoom Apps running in the Zoom client. Zoom Client for Meetings para macOS (Standard y para IT Admin) a partir de la v... • https://explore.zoom.us/en/trust/security/security-bulletin • CWE-16: Configuration •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

18 Aug 2022 — The Zoom Client for Meetings for macOS (Standard and for IT Admin) starting with version 5.7.3 and before 5.11.6 contains a vulnerability in the auto update process. A local low-privileged user could exploit this vulnerability to escalate their privileges to root. Zoom Client for Meetings para macOS (estándar y para IT Admin) a partir de la versión 5.7.3 y anteriores a 5.11.6, contiene una vulnerabilidad en el proceso de actualización automática. Un usuario local poco privilegiado podría aprovechar esta vul... • https://explore.zoom.us/en/trust/security/security-bulletin • CWE-345: Insufficient Verification of Data Authenticity •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

17 Aug 2022 — The Zoom Client for Meetings for MacOS (Standard and for IT Admin) before version 5.11.3 contains a vulnerability in the package signature validation during the update process. A local low-privileged user could exploit this vulnerability to escalate their privileges to root. Zoom Client for Meetings para MacOS (estándar y para IT Admin) versiones anteriores a 5.11.3, contiene una vulnerabilidad en la comprobación de la firma del paquete durante el proceso de actualización. Un usuario local poco privilegiado... • https://explore.zoom.us/en/trust/security/security-bulletin • CWE-347: Improper Verification of Cryptographic Signature •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

15 Aug 2022 — The Zoom Client for Meetings for macOS (Standard and for IT Admin) starting with version 5.7.3 and before 5.11.5 contains a vulnerability in the auto update process. A local low-privileged user could exploit this vulnerability to escalate their privileges to root. Zoom Client for Meetings para macOS (estándar y para IT Admin) a partir de la versión 5.7.3 y anteriores a 5.11.5, contiene una vulnerabilidad en el proceso de actualización automática. Un usuario local poco privilegiado podría aprovechar esta vul... • https://explore.zoom.us/en/trust/security/security-bulletin • CWE-347: Improper Verification of Cryptographic Signature •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

15 Jun 2022 — The Zoom Opener installer is downloaded by a user from the Launch meeting page, when attempting to join a meeting without having the Zoom Meeting Client installed. The Zoom Opener installer for Zoom Client for Meetings before version 5.10.3 and Zoom Rooms for Conference Room for Windows before version 5.10.3 are susceptible to a DLL injection attack. This vulnerability could be used to run arbitrary code on the victims host. El instalador de Zoom Opener es descargado por un usuario desde la página de inicio... • https://explore.zoom.us/en/trust/security/security-bulletin • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 1

18 May 2022 — The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.10.0 fails to properly validate the hostname during a server switch request. This issue could be used in a more sophisticated attack to trick an unsuspecting users client to connect to a malicious server when attempting to use Zoom services. Zoom Client for Meetings (para Android, iOS, Linux, macOS y Windows) anterior a la versión 5.10.0 no comprueba correctamente el nombre de host durante una petición de cambio de s... • https://packetstorm.news/files/id/167238 • CWE-295: Improper Certificate Validation •