Lucene search

K
SignalPrivate Messenger

5 matches found

CVE
CVE
added 2019/10/05 2:15 a.m.206 views

CVE-2019-17191

The Signal Private Messenger application before 4.47.7 for Android allows a caller to force a call to be answered, without callee user interaction, via a connect message. The existence of the call is noticeable to the callee; however, the audio channel may be open before the callee can block eavesd...

7.5CVSS7.3AI score0.00319EPSS
CVE
CVE
added 2019/10/05 2:15 a.m.203 views

CVE-2019-17192

The WebRTC component in the Signal Private Messenger application through 4.47.7 for Android processes videoconferencing RTP packets before a callee chooses to answer a call, which might make it easier for remote attackers to cause a denial of service or possibly have unspecified other impact via ma...

9.8CVSS9.5AI score0.01154EPSS
CVE
CVE
added 2018/12/10 5:29 p.m.79 views

CVE-2018-3988

Signal Messenger for Android 4.24.8 may expose private information when using "disappearing messages." If a user uses the photo feature available in the "attach file" menu, then Signal will leave the picture in its own cache directory, which is available to any application on the system.

4.7CVSS4.5AI score0.00067EPSS
CVE
CVE
added 2020/05/20 2:15 p.m.40 views

CVE-2020-5753

Signal Private Messenger Android v4.59.0 and up and iOS v3.8.1.5 and up allows a remote non-contact to ring a victim's Signal phone and disclose currently used DNS server due to ICE Candidate handling before call is answered or declined.

5.3CVSS5AI score0.00232EPSS
CVE
CVE
added 2019/03/24 2:29 a.m.39 views

CVE-2019-9970

Open Whisper Signal (aka Signal-Desktop) through 1.23.1 and the Signal Private Messenger application through 4.35.3 for Android are vulnerable to an IDN homograph attack when displaying messages containing URLs. This occurs because the application produces a clickable link even if (for example) Lat...

6.5CVSS6.3AI score0.00423EPSS