Vulnerabilities > Linecorp > Line
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-08-16 | CVE-2018-13435 | Improper Authentication vulnerability in Linecorp Line 8.8.0 An issue was discovered in the LINE jp.naver.line application 8.8.0 for iOS. | 7.0 |
2018-08-16 | CVE-2018-13434 | Improper Authentication vulnerability in Linecorp Line 8.8.0 An issue was discovered in the LINE jp.naver.line application 8.8.0 for iOS. | 6.3 |
2018-06-26 | CVE-2018-0609 | Untrusted Search Path vulnerability in Linecorp Line 4.3.0.724 Untrusted search path vulnerability in LINE for Windows versions before 5.8.0 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | 6.8 |
2018-02-23 | CVE-2018-0518 | Improper Certificate Validation vulnerability in Linecorp Line 7.1.3/7.15 LINE for iOS version 7.1.3 to 7.1.5 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | 4.3 |
2017-04-20 | CVE-2016-4850 | Improper Access Control vulnerability in Linecorp Line 4.3.0.724 LINE for Windows before 4.8.3 allows man-in-the-middle attackers to execute arbitrary code. | 6.8 |
2016-07-12 | CVE-2016-4831 | Remote Code Execution vulnerability in Linecorp Line and Line Installer Untrusted search path vulnerability in LINE and LINE Installer 4.7.0 and earlier on Windows allows local users to gain privileges via a Trojan horse DLL in an unspecified directory. | 7.2 |
2016-02-19 | CVE-2016-1156 | Improper Input Validation vulnerability in Linecorp Line 4.3.0.724/4.3.1 LINE 4.3.0.724 and earlier on Windows and 4.3.1 and earlier on OS X allows remote authenticated users to cause a denial of service (application crash) via a crafted post that is mishandled when displaying a Timeline. | 3.5 |
2014-08-16 | CVE-2013-7144 | Cryptographic Issues vulnerability in Linecorp Line LINE 3.2.1.83 and earlier on Windows and 3.2.1 and earlier on OS X does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | 4.3 |