Filter
-Infinity
0

WireWire before 2020-10-16 allows remote attackers to cause a denial of service (application crash) or p…

First published (updated )

WireAccount takeover when having only access to a user's short lived token

First published (updated )

WireAccount takeover when having only access to a user's short lived token in wire-server

First published (updated )

WireWire-server vulnerable to Token Recipient Confusion resulting in account impersonation, deletion or malicious account creation

First published (updated )

WireUnsafe loopback forwarding interface in Restund

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

WireCross Site Scripting in Wire Webapp

First published (updated )

WireCross Site Scripting in Wire Messages

First published (updated )

WireImproper Verification of Cryptographic Signature in wire-server

First published (updated )

WireXSS through createObjectURL

8.8
First published (updated )

WireVerified groups not reliable

8.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

WireInsecure use of shell.openExternal in Wire

First published (updated )

WirePath Traversal

7.5
First published (updated )

WireDoS vulnerabiliity in wire-server json parser

7.5
First published (updated )

WireEntering code in App Lock modal sends input to conversation

7.1
First published (updated )

WireBulk list client endpoint exposes too much metadata about a client

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

WireAsset DoS vulnerability

First published (updated )

WireDoS vulnerability: Malformed Resource Identifiers

First published (updated )

WireDoS vulnerability: Invalid Accent Colors

First published (updated )

Wirewire-server vulnerable to unauthorized removal of Bots from Conversations

First published (updated )

composer/wireui/wireuiCross site scripting (XSS) Vulnerability on route /wireui/button?label=Content in wireui

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

WireCORS `Access-Control-Allow-Origin` settings are too lenient

First published (updated )

WireCertificate pinning is not enforced on the web socket connection

First published (updated )

Wirewire-webapp contains Improper Handling of Exceptional Conditions leading to a DoS via Markdown Rendering

First published (updated )

WireWire through 3.22.3993 on Windows advertises deletion of sent messages; nonetheless, all messages ca…

First published (updated )

WireMandatory encryption at rest can be bypassed (UI) in Wire app

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

WireExpired Ephemeral Messages not reliably removed in wire-webapp

First published (updated )

WireVideo feed was captured while user has disabled video

First published (updated )

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203