Vulnerabilities (CVE)

Filtered by vendor Linecorp Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-45561 1 Linecorp 1 Line 2024-01-08 N/A 5.3 MEDIUM
An issue in A-WORLD OIRASE BEER_waiting Line v.13.6.1 allows attackers to send crafted notifications via leakage of the channel access token.
CVE-2023-47365 1 Linecorp 1 Line 2023-12-28 N/A 6.5 MEDIUM
The leakage of channel access token in Lil.OFF-PRICE STORE Line 13.6.1 allows remote attackers to send malicious notifications to victims.
CVE-2023-47363 1 Linecorp 1 Line 2023-12-28 N/A 6.5 MEDIUM
The leakage of channel access token in F.B.P members Line 13.6.1 allows remote attackers to send malicious notifications to victims.
CVE-2023-47364 1 Linecorp 1 Line 2023-12-28 N/A 6.5 MEDIUM
The leakage of channel access token in nagaoka taxi Line 13.6.1 allows remote attackers to send malicious notifications to victims
CVE-2023-43299 1 Linecorp 1 Line 2023-12-11 N/A 5.3 MEDIUM
An issue in DA BUTCHERS mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
CVE-2023-43298 1 Linecorp 1 Line 2023-12-11 N/A 5.3 MEDIUM
An issue in SCOL Members Card mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
CVE-2023-47366 1 Linecorp 1 Line 2023-11-20 N/A 6.5 MEDIUM
The leakage of channel access token in craft_members Line 13.6.1 allows remote attackers to send malicious notifications to victims.
CVE-2023-47367 1 Linecorp 1 Line 2023-11-20 N/A 6.5 MEDIUM
The leakage of channel access token in platinum clinic Line 13.6.1 allows remote attackers to send malicious notifications to victims.
CVE-2023-47372 1 Linecorp 1 Line 2023-11-20 N/A 6.5 MEDIUM
The leakage of channel access token in UPDATESALON C-LOUNGE Line 13.6.1 allows remote attackers to send malicious notifications to victims.
CVE-2023-47370 1 Linecorp 1 Line 2023-11-20 N/A 6.5 MEDIUM
The leakage of channel access token in bluetrick Line 13.6.1 allows remote attackers to send malicious notifications to victims.
CVE-2023-47368 1 Linecorp 1 Line 2023-11-20 N/A 6.5 MEDIUM
The leakage of channel access token in taketorinoyu Line 13.6.1 allows remote attackers to send malicious notifications to victims.
CVE-2023-47369 1 Linecorp 1 Line 2023-11-20 N/A 6.5 MEDIUM
The leakage of channel access token in best_training_member Line 13.6.1 allows remote attackers to send malicious notifications.
CVE-2023-47373 1 Linecorp 1 Line 2023-11-20 N/A 6.5 MEDIUM
The leakage of channel access token in DRAGON FAMILY Line 13.6.1 allows remote attackers to send malicious notifications to victims.
CVE-2022-22820 1 Linecorp 1 Line 2023-08-08 4.3 MEDIUM 5.5 MEDIUM
Due to the lack of media file checks before rendering, it was possible for an attacker to cause abnormal CPU consumption for message recipient by sending specially crafted gif image in LINE for Windows before 7.4.
CVE-2021-36215 1 Linecorp 1 Line 2021-09-15 5.0 MEDIUM 5.3 MEDIUM
LINE client for iOS 10.21.3 and before allows address bar spoofing due to inappropriate address handling.
CVE-2016-1156 3 Apple, Linecorp, Microsoft 3 Mac Os X, Line, Windows 2020-05-11 3.5 LOW 5.7 MEDIUM
LINE 4.3.0.724 and earlier on Windows and 4.3.1 and earlier on OS X allows remote authenticated users to cause a denial of service (application crash) via a crafted post that is mishandled when displaying a Timeline.
CVE-2019-16771 1 Linecorp 1 Armeria 2019-12-16 5.0 MEDIUM 6.5 MEDIUM
Versions of Armeria 0.85.0 through and including 0.96.0 are vulnerable to HTTP response splitting, which allows remote attackers to inject arbitrary HTTP headers via CRLF sequences when unsanitized data is used to populate the headers of an HTTP response. This vulnerability has been patched in 0.97.0. Potential impacts of this vulnerability include cross-user defacement, cache poisoning, Cross-site scripting (XSS), and page hijacking.
CVE-2018-13434 1 Linecorp 1 Line 2018-11-08 4.4 MEDIUM 6.3 MEDIUM
** DISPUTED ** An issue was discovered in the LINE jp.naver.line application 8.8.0 for iOS. The LAContext class for Biometric (TouchID) validation allows authentication bypass by overriding the LAContext return Boolean value to be "true" because the kSecAccessControlUserPresence protection mechanism is not used. In other words, an attacker could authenticate with an arbitrary fingerprint. NOTE: the vendor indicates that this is not an attack of interest within the context of their threat model, which excludes iOS devices on which a jailbreak has occurred.
CVE-2018-0518 1 Linecorp 1 Line 2018-03-20 4.3 MEDIUM 5.9 MEDIUM
LINE for iOS version 7.1.3 to 7.1.5 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.