Register Login
  • more
    • SaaS Solutions
      • Vulnerability Intelligence
      • Vulnerability Management
    • Pricing
    • Vulnerabilities
    • Reports
    • Blog
    • Contact Us
  1. Main
  2. Vulnerability Database
  3. Zoom Video Communications, Inc.
  4. Zoom Rooms Client for macOS
  5. 6.4.0

Known Vulnerabilities in Zoom Rooms Client for macOS 6.4.0

Show more ↓
6.4.5
6.4.0
6.3.0
6.2.10
6.2.5
6.2.0
6.1.5 7039
6.1.2 6877
6.1.0 6810
6.0.6 6225
6.0.0 6108
5.17.6 5507
5.17.5
5.17.1 5255
5.17.0 5140
5.16.5 4587
5.16.0 4348
5.15.10
5.15.7 3859
5.15.5 3719
5.15.1 3602
5.15.0 3588
5.14.5 2929
5.14.2 2839
5.14.0 2786
5.13.10 2516
5.13.6 2288
5.13.5 2258
5.13.0 2196
5.12.6 1918
5.12.2 1820
5.12.0
5.11.7
5.11.6
5.11.4
5.11.3
5.11.0
5.10.3 653.0422
5.10.0 566.0402
5.9.4 4368.0123
5.9.3 4345.0106
5.9.0 4269.1220
5.8.0 4055.0929
5.7.5 3865.0810
5.7.3 3831.0726
5.7.0 3755.0628
5.6.7 3642.0606
5.6.3 3526.0424
5.6.0 3480.0326
5.4.3 3265.0106
5.4.0 3164.1204
5.3.0 3116.1113
5.2.2 3051.1024
5.2.0 2940.0927
5.1.2 2806.0821
5.0.5 2542.0703
5.0.0 2236.0426
4.6.6 2052.0409
4.6.5 2040.0406



Improper authentication in Zoom clients for macOS08 Jul, 2025
Low Patched
XSS in Zoom clients08 Jul, 2025
Medium Patched


Stay Connected

  • Twitter
  • Facebook
  • Linkedin
  • Official YouTube channel of Cybersecurity Help s.r.o.
  • RSS
Security Services
  • Actionable & Personalized Vulnerability Intelligence
  • On-Demand Security Consulting
  • Pricing
IT-Consulting
  • IT Infrastructure Outsourcing Services
  • Web Applications Support & Deployment
  • On-Demand Consulting
Partner Links
  • SSL/TLS Security Test by ImmuniWeb
  • Web Server Security Test by ImmuniWeb
Blog
  • Four arrested over cyberattacks targeting major UK retailers, including M&S
  • Initial access broker exploits leaked machine keys to access targeted orgs
  • AI voice impersonator posed as US Secretary of State Marco Rubio to contact foreign ministers
  • DoNot APT targets European foreign affairs ministry in espionage campaign
  • Microsoft fixes over 130 flaws, no actively exploited zero-days
  • Read all articles →
Contacts | Terms of use | Privacy Policy

© 2025 Cybersecurity Help s.r.o.