Video Conferencing with Zoom

Information

Software Type Plugin
Software Slug video-conferencing-with-zoom-api (view on wordpress.org)
Software Status Active
Software Author j_3rk
Software Website wordpress.org
Software Downloads 1,279,370
Software Active Installs 20,000
Software Record Last Updated May 19, 2024

8 Vulnerabilities

Title Status CVE ID CVSS Researchers Date
Video Conferencing with Zoom <= 4.2.1 - Sensitive Information Exposure Patched CVE-2023-3947 3.7 István Márton July 25, 2023
Video Conferencing with Zoom <= 4.4.5 - Sensitive Information Exposure Patched CVE-2024-2033 4.3 Krzysztof Zając March 22, 2024
Video Conferencing with Zoom <= 3.8.16 - E-mail Address Disclosure Patched CVE-2022-0384 4.3 Krzysztof Zając February 14, 2022
Video Conferencing with Zoom <= 4.4.4 - Open Redirect Patched CVE-2024-33584 6.1 Joshua Chan April 25, 2024
Video Conferencing with Zoom <= 3.9.2 - Reflected Cross-Site Scripting Patched 6.1 WPScanTeam May 31, 2022
Video Conferencing with Zoom < 3.8.16 - Reflected Cross-Site Scripting Patched 6.1 WPScanTeam November 30, 2021
Video Conferencing with Zoom <= 4.4.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Patched CVE-2024-2031 6.4 Krzysztof Zając March 12, 2024
Video Conferencing with Zoom <= 4.0.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Patched CVE-2022-4578 6.4 István Márton December 29, 2022

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation