Software catalogue for TeamViewer

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER

Main › Vulnerability Database › TeamViewer

Software catalogue for TeamViewer

Digital Employee Experience (DEX) Digital Employee Experience (DEX) Client for Windows TeamViewer Full Client for Linux TeamViewer Full Client for macOS TeamViewer Host for Linux
TeamViewer Host for macOS TeamViewer Remote Full Client for Windows TeamViewer Remote Host for Windows


Latest security bulletins

Secuity bulletin Severity Status Published
SB20260205111: Improper authorization in TeamViewer Full and Host clients Medium
Patched
05.02.2026
SB2026013032: Multiple vulnerabilities in TeamViewer Digital Employee Experience (DEX) Client Medium
Patched
30.01.2026
SB2025121125: Multiple vulnerabilities in Teamviewer Digital Employee Experience (DEX) Low
Patched
11.12.2025
SB2025121124: Multiple vulnerabilities in TeamViewer DEX Client for Windows High
Patched
11.12.2025
SB2025100347: Privilege escalation in TeamViewer Full Client and Host for Windows Low
Patched
03.10.2025
SB2025082718: Arbitrary File Creation in TeamViewer Full Client and Host Low
Patched
27.08.2025
SB2025062424: Privilege escalation in TeamViewer Low
Patched
24.06.2025
SB2025012959: Privilege escalation in TeamViewer Low
Patched
29.01.2025
SB2024092676: Multiple privilege escalation vulnerabilities in TeamViewer Low
Patched Public exploit
26.09.2024
SB2021082619: Multiple vulnerabilities in Teamviewer High
Patched
26.08.2021

Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or