-Infinity
0

Wire Audio, Video, And Signalingwire-avs remote format string vulnerability

8.8
First published (updated )

Wirewire-server vulnerable to unauthorized removal of Bots from Conversations

First published (updated )

Wirewire-webapp contains Improper Handling of Exceptional Conditions leading to a DoS via Markdown Rendering

First published (updated )

WireWire through 3.22.3993 on Windows advertises deletion of sent messages; nonetheless, all messages ca…

First published (updated )

WireWire-server vulnerable to Token Recipient Confusion resulting in account impersonation, deletion or malicious account creation

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

WireCross Site Scripting in Wire Messages

First published (updated )

WireDoS vulnerability: Invalid Accent Colors

First published (updated )

WireCross Site Scripting in Wire Webapp

First published (updated )

WireDoS vulnerabiliity in wire-server json parser

7.5
First published (updated )

WireImproper Verification of Cryptographic Signature in wire-server

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

WireDoS vulnerability: Malformed Resource Identifiers

First published (updated )

Wire - Audio, Video, and SignalingUse of Externally-Controlled Format String in wire-avs

First published (updated )

WireExpired Ephemeral Messages not reliably removed in wire-webapp

First published (updated )

WireAccount takeover when having only access to a user's short lived token in wire-server

First published (updated )

WireMandatory encryption at rest can be bypassed (UI) in Wire app

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

WireAccount takeover when having only access to a user's short lived token

First published (updated )

WireCORS `Access-Control-Allow-Origin` settings are too lenient

First published (updated )

WireCertificate pinning is not enforced on the web socket connection

First published (updated )

WireXSS through createObjectURL

8.8
First published (updated )

WireUnsafe loopback forwarding interface in Restund

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

WireAsset DoS vulnerability

First published (updated )

WireVerified groups not reliable

8.8
First published (updated )

WireEntering code in App Lock modal sends input to conversation

7.1
First published (updated )

WireBulk list client endpoint exposes too much metadata about a client

First published (updated )

WireVideo feed was captured while user has disabled video

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

WireWire before 2020-10-16 allows remote attackers to cause a denial of service (application crash) or p…

First published (updated )

WireInsecure use of shell.openExternal in Wire

First published (updated )

WirePath Traversal

7.5
First published (updated )

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203