The Zoom web conference Client contained a zero-day vulnerability that could have allowed attackers to execute commands on vulnerable systems remotely. The exploitation of the vulnerability required at least some form of action on the victim’s end, such as downloading and opening a malicious attachment, however, no security notifications would be triggered during exploitation. The vulnerability is only known to be exploitable on Windows 7 and earlier versions. Zoom has released a patch in the latest version 5.1.3 (28656.0709) for Windows users as of July 10th.
Source: https://www.bleepingcomputer.com/news/security/zoom-fixes-zero-day-rce-bug-affecting-windows-7-more-updates-soon/

