CVE-2020-5753
- EPSS 0.23%
- Veröffentlicht 20.05.2020 14:15:11
- Zuletzt bearbeitet 21.11.2024 05:34:32
Signal Private Messenger Android v4.59.0 and up and iOS v3.8.1.5 and up allows a remote non-contact to ring a victim's Signal phone and disclose currently used DNS server due to ICE Candidate handling before call is answered or declined.
CVE-2019-17191
- EPSS 0.32%
- Veröffentlicht 05.10.2019 02:15:11
- Zuletzt bearbeitet 21.11.2024 04:31:50
The Signal Private Messenger application before 4.47.7 for Android allows a caller to force a call to be answered, without callee user interaction, via a connect message. The existence of the call is noticeable to the callee; however, the audio chann...
CVE-2019-17192
- EPSS 1.15%
- Veröffentlicht 05.10.2019 02:15:11
- Zuletzt bearbeitet 21.11.2024 04:31:50
The WebRTC component in the Signal Private Messenger application through 4.47.7 for Android processes videoconferencing RTP packets before a callee chooses to answer a call, which might make it easier for remote attackers to cause a denial of service...
CVE-2019-9970
- EPSS 0.42%
- Veröffentlicht 24.03.2019 02:29:00
- Zuletzt bearbeitet 21.11.2024 04:52:42
Open Whisper Signal (aka Signal-Desktop) through 1.23.1 and the Signal Private Messenger application through 4.35.3 for Android are vulnerable to an IDN homograph attack when displaying messages containing URLs. This occurs because the application pr...
CVE-2018-3988
- EPSS 0.12%
- Veröffentlicht 10.12.2018 17:29:00
- Zuletzt bearbeitet 21.11.2024 04:06:26
Signal Messenger for Android 4.24.8 may expose private information when using "disappearing messages." If a user uses the photo feature available in the "attach file" menu, then Signal will leave the picture in its own cache directory, which is avail...