Total vulnerabilities in the database
Insufficient control flow management in some Zoom clients may allow an authenticated user to conduct an information disclosure via network access.
Software | From | Fixed in |
---|---|---|
zoom / meetings | - | 5.16.0 |
zoom / virtual_desktop_infrastructure | 5.15.0 | 5.15.11 |
zoom / virtual_desktop_infrastructure | - | 5.14.13 |
zoom / zoom | - | 5.16.0 |