📦 Zoom
by Zoom
🔍 What is Zoom?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability allows an unauthenticated attacker on the same network to escalate privileges on Windows systems running affected Zoom software. It affects Zoom Desktop Client for Windows, Zoom VDI...
This vulnerability in Zoom Desktop Client for Windows and Zoom VDI Client allows an unauthenticated attacker to escalate privileges via network access by exploiting improper neutralization of special ...
An improper input validation vulnerability in Zoom Desktop Client for Windows allows unauthenticated attackers to escalate privileges via network access. This affects Windows users running Zoom versio...
A path traversal vulnerability in Zoom Desktop Client for Windows allows unauthenticated attackers to escalate privileges via network access. This affects Windows users running Zoom versions before 5....
This vulnerability allows an authenticated user on a Windows system to escalate privileges by exploiting an untrusted search path in Zoom's 32-bit client. Attackers could gain higher system permission...
This vulnerability allows authenticated users on Windows systems to escalate their privileges through local access to the Zoom Desktop Client, Zoom VDI Client, or Zoom SDKs. Attackers could gain highe...
This vulnerability in Zoom Mobile App for iOS and Zoom SDKs for iOS allows authenticated users to access information they shouldn't have permission to view via network connections. It affects users ru...
This vulnerability in Zoom clients allows authenticated users to cause denial of service attacks through network access. It affects Zoom users who have authentication credentials and could disrupt mee...
This vulnerability in Zoom Desktop Client and Zoom Rooms for Windows allows authenticated local users to access sensitive information they shouldn't have permission to view. It affects Windows users r...
This vulnerability in Zoom Desktop Client for Windows allows an authenticated local user to escalate privileges through an untrusted search path in the installer. Attackers could gain higher system pe...
An improper input validation vulnerability in Zoom Desktop Client for Windows allows unauthorized users to escalate privileges via network access. This affects Windows users running Zoom Desktop Clien...
This vulnerability in Zoom for Windows allows a malicious user to manipulate protected memory buffers, potentially compromising the integrity of the Zoom client. It affects Windows users running Zoom ...
Zoom for Linux clients prior to version 5.13.10 contain an HTML injection vulnerability (CWE-79) that allows malicious users to inject arbitrary HTML into chat messages. When a victim starts a chat wi...
Zoom clients before version 5.13.5 have a vulnerability where saving recordings to SMB locations and opening them via Zoom's web portal can allow adjacent network attackers to intercept requests with ...
An information disclosure vulnerability in Zoom iOS clients allows unauthenticated attackers to access sensitive information via network access. This affects Zoom iOS app users running versions before...