Vulnerabilities > Zoom
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-06-13 | CVE-2023-34121 | Unspecified vulnerability in Zoom Improper input validation in the Zoom for Windows, Zoom Rooms, Zoom VDI Windows Meeting clients before 5.14.0 may allow an authenticated user to potentially enable an escalation of privilege via network access. | 8.8 |
2023-06-13 | CVE-2023-28598 | Injection vulnerability in Zoom Zoom for Linux clients prior to 5.13.10 contain an HTML injection vulnerability. | 6.5 |
2023-06-13 | CVE-2023-28599 | Injection vulnerability in Zoom Zoom clients prior to 5.13.10 contain an HTML injection vulnerability. | 4.3 |
2023-03-27 | CVE-2023-28596 | Uncontrolled Search Path Element vulnerability in Zoom Meetings 5.12.6/5.9.0 Zoom Client for IT Admin macOS installers before version 5.13.5 contain a local privilege escalation vulnerability. | 7.8 |
2023-03-27 | CVE-2023-28597 | Unspecified vulnerability in Zoom Rooms and Zoom Zoom clients prior to 5.13.5 contain an improper trust boundary implementation vulnerability. high complexity zoom | 7.5 |
2023-03-16 | CVE-2023-22880 | Unspecified vulnerability in Zoom Rooms, Virtual Desktop Infrastructure and Zoom Zoom for Windows clients before version 5.13.3, Zoom Rooms for Windows clients before version 5.13.5 and Zoom VDI for Windows clients before 5.13.1 contain an information disclosure vulnerability. | 7.5 |
2023-03-16 | CVE-2023-22881 | Unspecified vulnerability in Zoom Zoom clients before version 5.13.5 contain a STUN parsing vulnerability. | 7.5 |
2023-03-16 | CVE-2023-22882 | Unspecified vulnerability in Zoom Zoom clients before version 5.13.5 contain a STUN parsing vulnerability. | 7.5 |
2023-03-16 | CVE-2023-22883 | Unspecified vulnerability in Zoom Meetings Zoom Client for IT Admin Windows installers before version 5.13.5 contain a local privilege escalation vulnerability. | 7.8 |
2023-01-09 | CVE-2022-36925 | Use of Hard-coded Credentials vulnerability in Zoom Rooms 5.11.3 Zoom Rooms for macOS clients before version 5.11.4 contain an insecure key generation mechanism. | 7.8 |