Register Login
  • SaaS Solutions
    • Vulnerability Intelligence
    • Vulnerability Management
  • Pricing
  • Vulnerabilities
  • Reports
  • Blog
  • Contact Us
  1. Main
  2. Vulnerability Database
  3. Cisco Systems, Inc
  4. Cisco Webex Meetings Desktop App
  5. 39.5.24

Known Vulnerabilities in Cisco Webex Meetings Desktop App 39.5.24

Show more ↓
45.4.0.32158
45.3.1.32057
45.3.0.31978
45.3.0.31957
45.2.0.31800
45.2.0.31755
45.1.0.31549
44.12.1.31417
44.11.1.31236
44.11.0.31172
44.10.3.31415
44.10.2.31237
44.10.1.31028
44.10.0.30906
44.9.1.30809
44.9.0.30650
44.8.0.30404
44.7.0.30285
44.7.0.30141
44.6.2.30589
44.6.0.30148
44.6.0.29928
44.5.0.29672
44.4.0.29432
44.4.0.29298
44.3.0.28993
44.2.0.30312
44.2.0.29446
44.2.0.28859
44.2.0.28714
44.1.0.28423
43.12.0.28111
43.10.0.28042
43.10.0.27753
43.9.0.27194
43.8.0.26955
43.7.0.28035
43.7.0.26612
43.6.0.26407
43.5.0.26155
43.4.0.25788
43.3.0.25468
43.1.0.24716
40.10
40.8
40.6.6
40.6
40.4.6
39.5.25
39.5.24
33.9.1
33.6.6
33.6.5
33.6.4
33.6.0
-



Information disclosure in Cisco Webex Meetings Desktop App17 Feb, 2021
Low Patched
Arbitrary file overwrite in Cisco Webex Meetings Desktop App for Windows20 Aug, 2020
Medium Patched


Stay Connected

  • Twitter
  • Facebook
  • Linkedin
  • Official YouTube channel of Cybersecurity Help s.r.o.
  • RSS
Security Services
  • Actionable & Personalized Vulnerability Intelligence
  • On-Demand Security Consulting
  • Pricing
IT-Consulting
  • IT Infrastructure Outsourcing Services
  • Web Applications Support & Deployment
  • On-Demand Consulting
Partner Links
  • SSL/TLS Security Test by ImmuniWeb
  • Web Server Security Test by ImmuniWeb
Blog
  • Cyber Security Week in Review: May 16, 2025
  • Russia-linked espionage operation targeting webmail servers via XSS flaws
  • Kosovo man extradited to US for running BlackDB.cc criminal marketplace
  • Multiple actively exploited zero-days patched in Microsoft, Ivanti, and Fortinet products
  • Chinese hackers exploit SAP NetWeaver in cyber campaigns targeting critical infrastructure
  • Read all articles →
Contacts | Terms of use | Privacy Policy

© 2025 Cybersecurity Help s.r.o.