Show filters
198 Total Results
Displaying 41-50 of 198
Sort by:
Attacker Value
Unknown
CVE-2019-9970
Disclosure Date: March 24, 2019 (last updated November 27, 2024)
Open Whisper Signal (aka Signal-Desktop) through 1.23.1 and the Signal Private Messenger application through 4.35.3 for Android are vulnerable to an IDN homograph attack when displaying messages containing URLs. This occurs because the application produces a clickable link even if (for example) Latin and Cyrillic characters exist in the same domain name, and the available font has an identical representation of characters from different alphabets.
0
Attacker Value
Unknown
CVE-2018-3988
Disclosure Date: December 10, 2018 (last updated November 27, 2024)
Signal Messenger for Android 4.24.8 may expose private information when using "disappearing messages." If a user uses the photo feature available in the "attach file" menu, then Signal will leave the picture in its own cache directory, which is available to any application on the system.
0
Attacker Value
Unknown
CVE-2018-17780
Disclosure Date: September 29, 2018 (last updated November 27, 2024)
Telegram Desktop (aka tdesktop) 1.3.14, and Telegram 3.3.0.0 WP8.1 on Windows, leaks end-user public and private IP addresses during a call because of an unsafe default behavior in which P2P connections are accepted from clients outside of the My Contacts list.
0
Attacker Value
Unknown
CVE-2018-11632
Disclosure Date: May 31, 2018 (last updated November 26, 2024)
An issue was discovered in the MULTIDOTS Add Social Share Messenger Buttons Whatsapp and Viber plugin 1.0.8 for WordPress. If an admin user can be tricked into visiting a crafted URL created by an attacker (via spear phishing/social engineering), the attacker can change the plugin settings via wp-admin/admin-post.php CSRF. There's no nonce or capability check in the whatsapp_share_setting_add_update() function.
0
Attacker Value
Unknown
CVE-2017-17715
Disclosure Date: December 16, 2017 (last updated November 26, 2024)
The saveFile method in MediaController.java in the Telegram Messenger application before 2017-12-08 for Android allows directory traversal via a pathname obtained in a file-transfer request from a remote peer, as demonstrated by writing to tgnet.dat or tgnet.dat.bak.
0
Attacker Value
Unknown
CVE-2017-10820
Disclosure Date: August 04, 2017 (last updated November 26, 2024)
Untrusted search path vulnerability in Installer of IP Messenger for Win 4.60 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
0
Attacker Value
Unknown
CVE-2014-8688
Disclosure Date: March 14, 2017 (last updated November 26, 2024)
An issue was discovered in Telegram Messenger 2.6 for iOS and 1.8.2 for Android. Secret chat messages are available in cleartext in process memory and a .db file.
0
Attacker Value
Unknown
CVE-2014-7216
Disclosure Date: September 11, 2015 (last updated October 05, 2023)
Multiple stack-based buffer overflows in Yahoo! Messenger 11.5.0.228 and earlier allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the (1) shortcut or (2) title keys in an emoticons.xml file.
0
Attacker Value
Unknown
CVE-2014-7685
Disclosure Date: October 21, 2014 (last updated October 05, 2023)
The Razer Comms - Gaming Messenger (aka com.razerzone.comms) application 1.3.07 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
0
Attacker Value
Unknown
CVE-2014-6392
Disclosure Date: September 15, 2014 (last updated November 08, 2023)
Cross-site scripting (XSS) vulnerability in the Facebook app 14.0 and the Facebook Messenger app 10.0 for iOS allows remote attackers to inject arbitrary web script or HTML via a crafted filename extension that is improperly handled during MIME sniffing of chat traffic. NOTE: the vendor disputes the significance of this report, because the user must accept an interstitial warning before the HTML file content is rendered, and because the HTML content's origin is a sandbox domain
0