Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
signal signal vulnerabilities and exploits
(subscribe to this query)
614
VMScore
CVE-2019-19954
Signal Desktop prior to 1.29.1 on Windows allows local users to gain privileges by creating a Trojan horse %SYSTEMDRIVE%\node_modules\.bin\wmic.exe file.
Signal Signal-desktop
605
VMScore
CVE-2020-36446
An issue exists in the signal-simple crate through 2020-11-15 for Rust. There are unconditional implementations of Send and Sync for SyncChannel<T>.
Signal-simple Project Signal-simple
445
VMScore
CVE-2019-17191
The Signal Private Messenger application prior to 4.47.7 for Android allows a caller to force a call to be answered, without callee user interaction, via a connect message. The existence of the call is noticeable to the callee; however, the audio channel may be open before the ca...
Signal Private Messenger
668
VMScore
CVE-2019-17192
The WebRTC component in the Signal Private Messenger application up to and including 4.47.7 for Android processes videoconferencing RTP packets before a callee chooses to answer a call, which might make it easier for remote malicious users to cause a denial of service or possibly...
Signal Private Messenger
169
VMScore
CVE-2018-3988
Signal Messenger for Android 4.24.8 may expose private information when using "disappearing messages." If a user uses the photo feature available in the "attach file" menu, then Signal will leave the picture in its own cache directory, which is available to an...
Signal Private Messenger 4.24.8
614
VMScore
CVE-2014-5430
Untrusted search path vulnerability in ABB RobotStudio 5.6x prior to 5.61.02 and Test Signal Viewer 1.5 allows local users to gain privileges via a Trojan horse DLL that is accessed as a result of incorrect DLL configuration by an optional installation program.
Abb Robotstudio 5.61.01
Abb Robotstudio 5.60
Abb Test Signal Viewer 1.5
Abb Robotstudio 5.61
552
VMScore
CVE-2001-0905
Race condition in signal handling of procmail 3.20 and previous versions, when running setuid, allows local users to cause a denial of service or gain root privileges by sending a signal while a signal handling routine is already running.
Procmail Procmail
505
VMScore
CVE-2003-1139
Musicqueue 1.2.0 allows local users to overwrite arbitrary files by triggering a segmentation fault and using a symlink attack on the resulting musicqueue.crash file.
Musicqueue Musicqueue 1.2
1 EDB exploit
641
VMScore
CVE-2001-1180
FreeBSD 4.3 does not properly clear shared signal handlers when executing a process, which allows local users to gain privileges by calling rfork with a shared signal handler, having the child process execute a setuid program, and sending a signal to the child.
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1
Freebsd Freebsd 4.2
Freebsd Freebsd 4.3
765
VMScore
CVE-2006-0058
Signal handler race condition in Sendmail 8.13.x prior to 8.13.6 allows remote malicious users to execute arbitrary code by triggering timeouts in a way that causes the setjmp and longjmp function calls to be interrupted and modify unexpected memory locations.
Sendmail Sendmail 8.13.2
Sendmail Sendmail 8.13.3
Sendmail Sendmail 8.13.0
Sendmail Sendmail 8.13.1
Sendmail Sendmail 8.13.4
Sendmail Sendmail 8.13.5
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »