Zoom : Vulnerability Statistics
Vulnerability Trends Over Time
Year | Overflow | Memory Corruption | Sql Injection | XSS | Directory Traversal | File Inclusion | CSRF | XXE | SSRF | Open Redirect | Input Validation |
---|---|---|---|---|---|---|---|---|---|---|---|
2014 | |||||||||||
2017 | 1 | ||||||||||
2018 | 1 | ||||||||||
2019 | 1 | ||||||||||
2020 | 2 | ||||||||||
2021 | 1 | 1 | 3 | ||||||||
2022 | 1 | 2 | 2 | ||||||||
2023 | 5 | 1 | 3 | 4 | 7 | ||||||
Total | 7 | 2 | 5 | 4 | 1 | 2 | 14 |
Vulnerabilities by impact types
Year | Code Execution | Bypass | Privilege Escalation | Denial of Service | Information Leak |
---|---|---|---|---|---|
2014 | |||||
2017 | 2 | ||||
2018 | |||||
2019 | 1 | 1 | |||
2020 | |||||
2021 | 3 | 4 | 1 | ||
2022 | 2 | 6 | 10 | 1 | |
2023 | 1 | 4 | 10 | 11 | 9 |
Total | 9 | 10 | 24 | 12 | 11 |
This page lists vulnerability statistics for all products of Zoom. Vulnerability statistics provide a quick overview for security vulnerabilities related to software products of Zoom. You can view products or security vulnerabilities of Zoom products.