Show filters
424 Total Results
Displaying 251-260 of 424
Sort by:
Attacker Value
Unknown
CVE-2015-2968
Disclosure Date: October 31, 2023 (last updated February 25, 2025)
LINE@ for Android version 1.0.0 and LINE@ for iOS version 1.0.0 are vulnerable to MITM (man-in-the-middle) attack since the application allows non-SSL/TLS communications. As a result, any API may be invoked from a script injected by a MITM (man-in-the-middle) attacker.
0
Attacker Value
Unknown
CVE-2015-0897
Disclosure Date: October 31, 2023 (last updated February 25, 2025)
LINE for Android version 5.0.2 and earlier and LINE for iOS version 5.0.0 and earlier are vulnerable to MITM (man-in-the-middle) attack since the application allows non-SSL/TLS communications. As a result, any API may be invoked from a script injected by a MITM (man-in-the-middle) attacker.
0
Attacker Value
Unknown
CVE-2023-41960
Disclosure Date: October 25, 2023 (last updated February 25, 2025)
The vulnerability allows an unprivileged(untrusted) third-party application to interact with a content-provider unsafely exposed by the Android Agent application, potentially modifying sensitive settings of the Android Client application itself.
0
Attacker Value
Unknown
CVE-2023-34056
Disclosure Date: October 25, 2023 (last updated February 25, 2025)
vCenter Server contains a partial information disclosure vulnerability. A malicious actor with non-administrative privileges to vCenter Server may leverage this issue to access unauthorized data.
0
Attacker Value
Unknown
CVE-2023-44195
Disclosure Date: October 13, 2023 (last updated February 25, 2025)
An Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the NetworkStack agent daemon (nsagentd) of Juniper Networks Junos OS Evolved allows an unauthenticated network based attacker to cause limited impact to the availability of the system.
If specific packets reach the Routing-Engine (RE) these will be processed normally even if firewall filters are in place which should have prevented this. This can lead to a limited, increased consumption of resources resulting in a Denial-of-Service (DoS), and unauthorized access.
CVE-2023-44196 is a prerequisite for this issue.
This issue affects Juniper Networks Junos OS Evolved:
* 21.3-EVO versions prior to 21.3R3-S5-EVO;
* 21.4-EVO versions prior to 21.4R3-S4-EVO;
* 22.1-EVO version 22.1R1-EVO and later;
* 22.2-EVO version 22.2R1-EVO and later;
* 22.3-EVO versions prior to 22.3R2-S2-EVO, 22.3R3-S1-EVO;
* 22.4-EVO versions prior to 22.4R3-EVO.
This issue doesn't not affected Junos OS…
0
Attacker Value
Unknown
CVE-2023-43297
Disclosure Date: October 02, 2023 (last updated February 25, 2025)
An issue in animal-art-lab v13.6.1 allows attackers to send crafted notifications via leakage of the channel access token.
0
Attacker Value
Unknown
CVE-2023-44129
Disclosure Date: September 27, 2023 (last updated February 25, 2025)
The vulnerability is that the Messaging ("com.android.mms") app patched by LG forwards attacker-controlled intents back to the attacker in the exported "com.android.mms.ui.QClipIntentReceiverActivity" activity. The attacker can abuse this functionality by launching this activity and then sending a broadcast with the "com.lge.message.action.QCLIP" action. The attacker can send, e.g., their own data/clipdata and set Intent.FLAG_GRANT_* flags. After the attacker received that intent in the "onActivityResult()" method, they would have access to arbitrary content providers that have the `android:grantUriPermissions="true"` flag set.
0
Attacker Value
Unknown
CVE-2023-44127
Disclosure Date: September 27, 2023 (last updated February 25, 2025)
he vulnerability is that the Call management ("com.android.server.telecom") app patched by LG launches implicit intents that disclose sensitive data to all third-party apps installed on the same device. Those intents include data such as contact details and phone numbers.
0
Attacker Value
Unknown
CVE-2023-44126
Disclosure Date: September 27, 2023 (last updated February 25, 2025)
The vulnerability is that the Call management ("com.android.server.telecom") app patched by LG sends a lot of LG-owned implicit broadcasts that disclose sensitive data to all third-party apps installed on the same device. Those intents include data such as call states, durations, called numbers, contacts info, etc.
0
Attacker Value
Unknown
CVE-2023-44124
Disclosure Date: September 27, 2023 (last updated February 25, 2025)
The vulnerability is to theft of arbitrary files with system privilege in the Screen recording ("com.lge.gametools.gamerecorder") app in the "com/lge/gametools/gamerecorder/settings/ProfilePreferenceFragment.java" file. The main problem is that the app launches implicit intents that can be intercepted by third-party apps installed on the same device. They also can return arbitrary data that will be passed to the "onActivityResult()" method. The Screen recording app saves contents of arbitrary URIs to SD card which is a world-readable storage.
0