説明
Multiple vulnerabilities were found in Zoom. Malicious users can exploit these vulnerabilities to gain privileges, bypass security restrictions, execute arbitrary code.
Below is a complete list of vulnerabilities:
- Insufficient hostname validation vulnerability can be exploited remotely to gain privileges.
- Security vulnerability can be exploited to bypass security restrictions.
- Improperly constrained session cookies vulnerability can be exploited remotely to gain privileges.
- Improper XML Parsing can be exploited remotely to execute arbitrary code.
オリジナルアドバイザリー
エクスプロイテーション
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
関連製品
CVEリスト
- CVE-2022-22787 critical
- CVE-2022-22786 critical
- CVE-2022-22785 critical
- CVE-2022-22784 critical
も参照してください
お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com
この脆弱性についての記述に不正確な点がありますか? お知らせください!