cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-42441,https://securityvulnerability.io/vulnerability/CVE-2024-42441,Zoom Workplace Desktop App for macOS: Privilege Escalation Vulnerability,"Improper privilege management in the installer for Zoom Workplace Desktop App for macOS, Zoom Meeting SDK for macOS and Zoom Rooms Client for macOS before 6.1.5 may allow a privileged user to conduct an escalation of privilege via local access.",Zoom,"Zoom Workplace Desktop App For Mac OS, Zoom Meeting Sdk For Mac OS, Zoom Rooms Client For Mac OS",6.7,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-08-14T17:15:00.000Z,0 CVE-2024-24696,https://securityvulnerability.io/vulnerability/CVE-2024-24696,,"Improper input validation in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows may allow an authenticated user to conduct a disclosure of information via network access. ",Zoom,"Zoom,Vdi Windows Meeting Clients,Meeting Software Development Kit",6.5,MEDIUM,0.0005200000014156103,false,false,false,false,,false,false,2024-02-14T00:15:00.000Z,0 CVE-2024-24695,https://securityvulnerability.io/vulnerability/CVE-2024-24695,,"Improper input validation in Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows may allow an authenticated user to conduct a disclosure of information via network access. ",Zoom,"Meeting Software Development Kit,Zoom,Vdi Windows Meeting Clients",6.5,MEDIUM,0.0005200000014156103,false,false,false,false,,false,false,2024-02-14T00:15:00.000Z,0 CVE-2024-24690,https://securityvulnerability.io/vulnerability/CVE-2024-24690,Zoom Clients Vulnerable to Denial of Service Attacks via Network Access,Improper input validation in some Zoom clients may allow an authenticated user to conduct a denial of service via network access.,Zoom,"Zoom,Meeting Software Development Kit,Video Software Development Kit,Rooms,Vdi Windows Meeting Clients",6.5,MEDIUM,0.0005300000193528831,false,false,false,false,,false,false,2024-02-14T00:15:00.000Z,0 CVE-2024-24691,https://securityvulnerability.io/vulnerability/CVE-2024-24691,Unauthenticated Escalation of Privilege Vulnerability in Zoom Desktop Client for Windows,"A security flaw in various Zoom products, specifically the Zoom Desktop Client, Zoom VDI Client, and Zoom Meeting SDK for Windows, exists due to improper input validation. This vulnerability could enable an unauthenticated user to perform an elevation of privilege attack through network access, potentially compromising sensitive information and user permissions. It is crucial for users and administrators to remain vigilant and apply any security updates provided by Zoom to mitigate this vulnerability.","Zoom Video Communications, Inc.","Zoom Desktop Client for Windows, Zoom VDI Client for Windows, and Zoom Meeting SDK for Windows",9.8,CRITICAL,0.0010499999625608325,false,true,false,false,,true,true,2024-02-14T00:15:00.000Z,9953 CVE-2024-24698,https://securityvulnerability.io/vulnerability/CVE-2024-24698,Privileged User May Access Information via Local Access,Improper authentication in some Zoom clients may allow a privileged user to conduct a disclosure of information via local access.,Zoom,"Vdi Windows Meeting Clients,Zoom,Meeting Software Development Kit,Rooms",4.4,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-02-14T00:15:00.000Z,0 CVE-2024-24697,https://securityvulnerability.io/vulnerability/CVE-2024-24697,Untrusted Search Path Vulnerability in Zoom 32 bit Windows Clients Could Lead to Escalation of Privilege,"A vulnerability exists in the 32-bit Windows client of Zoom, stemming from an untrusted search path issue. This flaw allows an authenticated user to leverage local access for privilege escalation. It highlights the importance of ensuring proper security measures and validation of search paths within applications to mitigate potential exploitation.",Zoom,"Vdi Windows Meeting Clients,Rooms,Zoom,Meeting Sdk",7.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-02-14T00:15:00.000Z,0 CVE-2024-24699,https://securityvulnerability.io/vulnerability/CVE-2024-24699,Zoom Clients Vulnerable to Information Disclosure via Network Access,"A business logic error present in various versions of the Zoom client allows an authenticated user to potentially expose sensitive information. This vulnerability is linked to how the application handles network access, posing risks to user privacy and data security. Ensuring the implementation of security updates is crucial for all affected client versions to mitigate the risks associated with this flaw.",Zoom,"Zoom,Vdi Windows Meeting Clients,Rooms,Meeting Sdk",6.5,MEDIUM,0.0005200000014156103,false,false,false,false,,false,false,2024-02-14T00:15:00.000Z,0 CVE-2023-28603,https://securityvulnerability.io/vulnerability/CVE-2023-28603,Improper Access Control in Zoom's VDI Client Installer,"The Zoom VDI client installer, prior to version 5.14.0, is susceptible to an improper access control vulnerability. This flaw allows a malicious user to potentially gain unauthorized access and delete local files without sufficient permissions, posing a significant risk to user data integrity. Users are encouraged to update to the latest version to mitigate this vulnerability.","Zoom Video Communications, Inc.",Zoom Vdi Windows Meeting Client,7.1,HIGH,0.0004400000034365803,false,false,false,false,,false,false,2023-06-13T18:15:00.000Z,0 CVE-2023-34121,https://securityvulnerability.io/vulnerability/CVE-2023-34121,Input Validation Flaw in Zoom for Windows and Related Products,"An improper input validation vulnerability in the Zoom for Windows, Zoom Rooms, and Zoom VDI Windows Meeting clients prior to version 5.14.0 has been identified. This security lapse could potentially allow an authenticated user to exploit the flaw and escalate privileges through network access, compromising the application's integrity.","Zoom Video Communications, Inc.","Zoom For Windows,Zoom Rooms Client For Windows,Zoom Vdi For Windows Meeting Clients",8.8,HIGH,0.0011399999493733048,false,false,false,false,,false,false,2023-06-13T18:15:00.000Z,0 CVE-2023-34120,https://securityvulnerability.io/vulnerability/CVE-2023-34120,Improper Privilege Management in Zoom for Windows Clients by Zoom,"A vulnerability in Zoom for Windows, including Zoom Rooms and Zoom VDI prior to version 5.14.0, allows authenticated users to exploit improper privilege management. This could lead to elevated system privileges, enabling them to spawn processes that operate with elevated rights. Such exploitation poses significant security risks, as it may allow unauthorized access to sensitive system functions and data.","Zoom Video Communications, Inc.","Zoom For Windows Client,Zoom Rooms Client For Windows,Zoom Vdi For Windows Meeting Clients",7.8,HIGH,0.0004400000034365803,false,false,false,false,,false,false,2023-06-13T18:15:00.000Z,0 CVE-2023-28596,https://securityvulnerability.io/vulnerability/CVE-2023-28596,Local Privilege Escalation in Zoom for macOS Installers,"The Zoom Client for IT Admin on macOS prior to version 5.13.5 has a vulnerability that allows low-privileged users to escalate their privileges during the installation process. This local privilege escalation can be exploited as part of a larger attack chain, allowing attackers to gain root access to the affected system. Organizations using affected versions of Zoom should prioritize updating to the latest version to mitigate this risk.",Zoom,Zoom Client for Meetings for IT Admin macOS installers,7.8,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2023-03-27T00:00:00.000Z,0 CVE-2023-22883,https://securityvulnerability.io/vulnerability/CVE-2023-22883,Local Privilege Escalation in Zoom for Windows Installers,"The Zoom Client for IT Admin Windows installers prior to version 5.13.5 contain a vulnerability that allows a local low-privileged user to exploit the installation process. Through this exploitation, the user can escalate their privileges to that of the SYSTEM user, potentially granting them access to sensitive system resources and increased control over the system.",Zoom,Zoom Client for Meetings for IT Admin Windows installers,7.8,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2023-03-16T00:00:00.000Z,0 CVE-2022-28768,https://securityvulnerability.io/vulnerability/CVE-2022-28768,Local Privilege Escalation in Zoom Client Installer for macOS,The Zoom Client for Meetings Installer for macOS (Standard and for IT Admin) before version 5.12.6 contains a local privilege escalation vulnerability. A local low-privileged user could exploit this vulnerability during the install process to escalate their privileges to root.,Zoom,Zoom Client For Meetings Installer For Mac OS (standard And For It Admin),8.8,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2022-11-17T23:15:00.000Z,0 CVE-2022-28766,https://securityvulnerability.io/vulnerability/CVE-2022-28766,DLL injection in Zoom Windows Clients,Windows 32-bit versions of the Zoom Client for Meetings before 5.12.6 and Zoom Rooms for Conference Room before version 5.12.6 are susceptible to a DLL injection vulnerability. A local low-privileged user could exploit this vulnerability to run arbitrary code in the context of the Zoom client.,Zoom,"Zoom Client For Meetings For Windows (32-bit),Zoom Vdi Windows Meeting Client For Windows (32-bit),Zoom Rooms For Conference Room For Windows (32-bit)",3.3,LOW,0.0004199999966658652,false,false,false,false,,false,false,2022-11-15T00:00:00.000Z,0 CVE-2022-28764,https://securityvulnerability.io/vulnerability/CVE-2022-28764,Local information exposure in Zoom Clients,"The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.12.6 is susceptible to a local information exposure vulnerability. A failure to clear data from a local SQL database after a meeting ends and the usage of an insufficiently secure per-device key encrypting that database results in a local malicious user being able to obtain meeting information such as in-meeting chat for the previous meeting attended from that local user account.",Zoom,"Zoom Client For Meetings (for Android, iOS, Linux, Mac OS, And Windows),Zoom Vdi Windows Meeting Clients,Zoom Rooms For Conference Room (for Android, iOS, Linux, Mac OS, And Windows)",3.3,LOW,0.0004199999966658652,false,false,false,false,,false,false,2022-11-14T21:15:00.000Z,0 CVE-2022-28763,https://securityvulnerability.io/vulnerability/CVE-2022-28763,Improper URL parsing in Zoom Clients,"The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.12.2 is susceptible to a URL parsing vulnerability. If a malicious Zoom meeting URL is opened, the malicious link may direct the user to connect to an arbitrary network address, leading to additional attacks including session takeovers.",Zoom,"Zoom Client For Meetings (for Android, iOS, Linux, Mac OS, And Windows),Zoom Vdi Windows Meeting Clients,Zoom Rooms For Conference Room (for Android, iOS, Linux, Mac OS, And Windows)",8.8,HIGH,0.001970000099390745,false,false,false,false,,false,false,2022-10-31T20:15:00.000Z,0 CVE-2022-28762,https://securityvulnerability.io/vulnerability/CVE-2022-28762,Debugging port misconfiguration in Zoom Apps in the Zoom Client for Meetings for macOS,"Zoom Client for Meetings for macOS (Standard and for IT Admin) starting with 5.10.6 and prior to 5.12.0 contains a debugging port misconfiguration. When camera mode rendering context is enabled as part of the Zoom App Layers API by running certain Zoom Apps, a local debugging port is opened by the Zoom client. A local malicious user could use this debugging port to connect to and control the Zoom Apps running in the Zoom client.",Zoom,Zoom Client For Meetings For Mac OS,7.3,HIGH,0.0004400000034365803,false,false,false,false,,false,false,2022-10-14T15:15:00.000Z,0 CVE-2022-28757,https://securityvulnerability.io/vulnerability/CVE-2022-28757,Local Privilege Escalation in Auto Updater for Zoom Client for Meetings for macOS,The Zoom Client for Meetings for macOS (Standard and for IT Admin) starting with version 5.7.3 and before 5.11.6 contains a vulnerability in the auto update process. A local low-privileged user could exploit this vulnerability to escalate their privileges to root.,Zoom,Zoom Client For Meetings For Mac OS,8.8,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2022-08-18T20:15:00.000Z,0 CVE-2022-28751,https://securityvulnerability.io/vulnerability/CVE-2022-28751,Local Privilege Escalation in Zoom Client for Meetings for MacOS,The Zoom Client for Meetings for MacOS (Standard and for IT Admin) before version 5.11.3 contains a vulnerability in the package signature validation during the update process. A local low-privileged user could exploit this vulnerability to escalate their privileges to root.,Zoom,Zoom Client For Meetings For Mac OS,8.8,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2022-08-17T22:15:00.000Z,0 CVE-2022-28756,https://securityvulnerability.io/vulnerability/CVE-2022-28756,Local Privilege Escalation in Auto Updater for Zoom Client for Meetings for macOS,The Zoom Client for Meetings for macOS (Standard and for IT Admin) starting with version 5.7.3 and before 5.11.5 contains a vulnerability in the auto update process. A local low-privileged user could exploit this vulnerability to escalate their privileges to root.,Zoom,Zoom Client For Meetings For Mac OS,8.8,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2022-08-15T23:15:00.000Z,0 CVE-2022-28755,https://securityvulnerability.io/vulnerability/CVE-2022-28755,Improper URL parsing in Zoom Clients,"The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.11.0 are susceptible to a URL parsing vulnerability. If a malicious Zoom meeting URL is opened, the malicious link may direct the user to connect to an arbitrary network address, leading to additional attacks including the potential for remote code execution through launching executables from arbitrary paths.",Zoom,"Zoom Client For Meetings (for Android, iOS, Linux, Mac OS, And Windows),Zoom Vdi Windows Meeting Clients",9.6,CRITICAL,0.001120000029914081,false,false,false,false,,false,false,2022-08-11T15:15:00.000Z,0 CVE-2022-22788,https://securityvulnerability.io/vulnerability/CVE-2022-22788,DLL injection in Zoom Opener installer for Zoom and Zoom Rooms clients,"The Zoom Opener installer is downloaded by a user from the Launch meeting page, when attempting to join a meeting without having the Zoom Meeting Client installed. The Zoom Opener installer for Zoom Client for Meetings before version 5.10.3 and Zoom Rooms for Conference Room for Windows before version 5.10.3 are susceptible to a DLL injection attack. This vulnerability could be used to run arbitrary code on the victims host.",Zoom,"Zoom Client For Meetings,All Zoom Rooms For Conference Room For Windows",7.1,HIGH,0.0006200000061653554,false,false,false,false,,false,false,2022-06-15T21:15:00.000Z,0 CVE-2022-22787,https://securityvulnerability.io/vulnerability/CVE-2022-22787,Insufficient hostname validation during Clusterswitch message in Zoom Client for Meetings,"The Zoom Client for Meetings (for Android, iOS, Linux, macOS, and Windows) before version 5.10.0 fails to properly validate the hostname during a server switch request. This issue could be used in a more sophisticated attack to trick an unsuspecting users client to connect to a malicious server when attempting to use Zoom services.",Zoom,"Zoom Client For Meetings For Android,Zoom Client For Meetings For iOS,Zoom Client For Meetings For Linux,Zoom Client For Meetings For Mac OS,Zoom Client For Meetings For Windows",5.9,MEDIUM,0.0013000000035390258,false,false,false,false,,false,false,2022-05-18T17:15:00.000Z,0 CVE-2022-22785,https://securityvulnerability.io/vulnerability/CVE-2022-22785,Improperly constrained session cookies in Zoom Client for Meetings,"The Zoom Client for Meetings (for Android, iOS, Linux, MacOS, and Windows) before version 5.10.0 failed to properly constrain client session cookies to Zoom domains. This issue could be used in a more sophisticated attack to send an unsuspecting users Zoom-scoped session cookies to a non-Zoom domain. This could potentially allow for spoofing of a Zoom user.",Zoom,"Zoom Client For Meetings For Android,Zoom Client For Meetings For iOS,Zoom Client For Meetings For Linux,Zoom Client For Meetings For Mac OS,Zoom Client For Meetings For Windows",5.9,MEDIUM,0.0015200000489130616,false,false,false,false,,false,false,2022-05-18T16:15:00.000Z,0