Register Login
  • SaaS Solutions
    • Vulnerability Intelligence
    • Vulnerability Management
  • Pricing
  • Vulnerabilities
  • Reports
  • Blog
  • Contact Us
  1. Main
  2. Vulnerability Database
  3. Zoom Video Communications, Inc.
  4. Zoom Rooms Client for Windows
  5. 5.2.2 1990.1025

Known Vulnerabilities in Zoom Rooms Client for Windows 5.2.2 1990.1025 page 5

Show more ↓
6.4.0
6.3.0
6.2.5
6.2.0
6.1.11
6.1.10
6.1.5
6.1.2
6.1.0
6.0.7
6.0.6
6.0.0
5.17.13
5.17.6 3670
5.17.5
5.17.1 3576
5.17.0 3530
5.16.10 3425
5.16.5 3377
5.16.1 3257
5.16.0 3241
5.15.10
5.15.7 3094
5.15.5 3049
5.15.1 2993
5.15.0 2989
5.14.5 2778
5.14.2 2710
5.14.1 2691
5.14.0 2683
5.13.10 2558
5.13.6 2407
5.13.5 2391
5.13.0 2301
5.12.7 2172
5.12.6 2076
5.12.2 1970
5.12.0
5.11.3
5.11.0
5.10.6 1421
5.10.3 1320
5.10.0 1251
5.9.4 990
5.9.3 911
5.9.1 808
5.8.3 636
5.8.0 505
5.7.5 300
5.7.3 248
5.7.0 144
5.6.3 2614.0425
5.6.0 2581.0328
5.5.1 2477.0302
5.4.3 2161.0108
5.4.0 2132.1204
5.3.0 2087.1114
5.2.2 1990.1025
5.2.1 1888.1001
5.1.2 1697.0821
5.0.5 1518.0704
5.0.4 1469.0529
5.0.2 1459.0524
5.0.0 1420.0426
4.6.5 18374.0407



Multiple vulnerabilities in Zoom Client24 May, 2022
Medium Patched
  • 1
  • 2
  • 3
  • 4
  • 5


Stay Connected

  • Twitter
  • Facebook
  • Linkedin
  • Official YouTube channel of Cybersecurity Help s.r.o.
  • RSS
Security Services
  • Actionable & Personalized Vulnerability Intelligence
  • On-Demand Security Consulting
  • Pricing
IT-Consulting
  • IT Infrastructure Outsourcing Services
  • Web Applications Support & Deployment
  • On-Demand Consulting
Partner Links
  • SSL/TLS Security Test by ImmuniWeb
  • Web Server Security Test by ImmuniWeb
Blog
  • Cybercriminals weaponize jailbroken AI tools from Mistral and xAI
  • China-linked Salt Typhoon exploits Cisco flaw in attack on Canadian telecom firm
  • XDigo malware targets Eastern European government agencies
  • Chinese hackers infiltrated 1K+ networks using LapDogs ORB campaign
  • Ukraine’s state agencies targeted in APT28 campaign with Beardshell and Covenant malware
  • Read all articles →
Contacts | Terms of use | Privacy Policy

© 2025 Cybersecurity Help s.r.o.