Vulnerabilities (CVE)

Filtered by vendor Signal Subscribe
Filtered by product Signal
Total 4 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-28345 1 Signal 1 Signal 2024-02-04 5.0 MEDIUM 7.5 HIGH
The Signal app before 5.34 for iOS allows URI spoofing via RTLO injection. It incorrectly renders RTLO encoded URLs beginning with a non-breaking space, when there is a hash character in the URL. This technique allows a remote unauthenticated attacker to send legitimate looking links, appearing to be any website URL, by abusing the non-http/non-https automatic rendering of URLs. An attacker can spoof, for example, example.com, and masquerade any URL with a malicious destination. An attacker requires a subdomain such as gepj, txt, fdp, or xcod, which would appear backwards as jpeg, txt, pdf, and docx respectively.
CVE-2020-5753 1 Signal 2 Private Messenger, Signal 2024-02-04 5.0 MEDIUM 5.3 MEDIUM
Signal Private Messenger Android v4.59.0 and up and iOS v3.8.1.5 and up allows a remote non-contact to ring a victim's Signal phone and disclose currently used DNS server due to ICE Candidate handling before call is answered or declined.
CVE-2018-16132 1 Signal 1 Signal 2024-02-04 7.8 HIGH 8.6 HIGH
The image rendering component (createGenericPreview) of the Open Whisper Signal app through 2.29.0 for iOS fails to check for unreasonably large images before manipulating received images. This allows for a large image sent to a user to exhaust all available memory when the image is displayed, resulting in a forced restart of the device.
CVE-2018-9840 1 Signal 1 Signal 2024-02-04 4.6 MEDIUM 6.8 MEDIUM
The Open Whisper Signal app before 2.23.2 for iOS allows physically proximate attackers to bypass the screen locker feature via certain rapid sequences of actions that include app opening, clicking on cancel, and using the home button.