Filtered by vendor Dropbox
Subscribe
Total
14 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2010-3354 | 1 Dropbox | 1 Dropbox | 2024-11-21 | 6.9 MEDIUM | N/A |
dropboxd in Dropbox 0.7.110 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. | |||||
CVE-2024-25718 | 1 Dropbox | 1 Samly | 2024-10-21 | N/A | 9.8 CRITICAL |
In the Samly package before 1.4.0 for Elixir, Samly.State.Store.get_assertion/3 can return an expired session, which interferes with access control because Samly.AuthHandler uses a cached session and does not replace it, even after expiry. | |||||
CVE-2018-12446 | 1 Dropbox | 1 Dropbox | 2024-08-05 | 3.3 LOW | 3.6 LOW |
An issue was discovered in the com.dropbox.android application 98.2.2 for Android. The Passcode feature allows authentication bypass via runtime manipulation that forces a certain method's return value to true. In other words, an attacker could authenticate with an arbitrary passcode. NOTE: the vendor indicates that this is not an attack of interest within the context of their threat model, which excludes Android devices on which rooting has occurred | |||||
CVE-2018-12445 | 1 Dropbox | 1 Dropbox | 2024-08-05 | 3.3 LOW | 3.1 LOW |
An issue was discovered in the com.dropbox.android application 98.2.2 for Android. The FingerprintManager class for Biometric validation allows authentication bypass through the callback method from onAuthenticationFailed to onAuthenticationSucceeded with null, because the fingerprint API in conjunction with the Android keyGenerator class is not implemented. In other words, an attacker could authenticate with an arbitrary fingerprint. NOTE: the vendor indicates that this is not an attack of interest within the context of their threat model, which excludes Android devices on which rooting has occurred | |||||
CVE-2018-12271 | 1 Dropbox | 1 Dropbox | 2024-08-05 | 6.9 MEDIUM | 6.4 MEDIUM |
An issue was discovered in the com.getdropbox.Dropbox app 100.2 for iOS. The LAContext class for Biometric (TouchID) validation allows authentication bypass by overriding the LAContext return Boolean value to be "true" because the kSecAccessControlUserPresence protection mechanism is not used. In other words, an attacker could authenticate with an arbitrary fingerprint. NOTE: the vendor indicates that this is not an attack of interest within the context of their threat model, which excludes iOS devices on which a jailbreak has occurred | |||||
CVE-2022-4768 | 1 Dropbox | 1 Merou | 2024-05-17 | N/A | 9.8 CRITICAL |
A vulnerability was found in Dropbox merou. It has been classified as critical. Affected is the function add_public_key of the file grouper/public_key.py of the component SSH Public Key Handler. The manipulation of the argument public_key_str leads to injection. It is possible to launch the attack remotely. The name of the patch is d93087973afa26bc0a2d0a5eb5c0fde748bdd107. It is recommended to apply a patch to fix this issue. VDB-216906 is the identifier assigned to this vulnerability. | |||||
CVE-2022-26181 | 1 Dropbox | 1 Lepton | 2024-02-28 | 6.8 MEDIUM | 7.8 HIGH |
Dropbox Lepton v1.2.1-185-g2a08b77 was discovered to contain a heap-buffer-overflow in the function aligned_dealloc():src/lepton/bitops.cc:108. | |||||
CVE-2019-12171 | 1 Dropbox | 1 Dropbox | 2024-02-28 | 4.3 MEDIUM | 7.8 HIGH |
Dropbox.exe (and QtWebEngineProcess.exe in the Web Helper) in the Dropbox desktop application 71.4.108.0 store cleartext credentials in memory upon successful login or new account creation. These are not securely freed in the running process. | |||||
CVE-2018-20820 | 1 Dropbox | 1 Lepton | 2024-02-28 | 4.3 MEDIUM | 5.5 MEDIUM |
read_ujpg in jpgcoder.cc in Dropbox Lepton 1.2.1 allows attackers to cause a denial-of-service (application runtime crash because of an integer overflow) via a crafted file. | |||||
CVE-2018-20819 | 1 Dropbox | 1 Lepton | 2024-02-28 | 6.8 MEDIUM | 7.8 HIGH |
io/ZlibCompression.cc in the decompression component in Dropbox Lepton 1.2.1 allows attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact by crafting a jpg image file. The root cause is a missing check of header payloads that may be (incorrectly) larger than the maximum file size. | |||||
CVE-2018-12108 | 1 Dropbox | 1 Lepton | 2024-02-28 | 4.3 MEDIUM | 5.5 MEDIUM |
An issue was discovered in Dropbox Lepton 1.2.1. The validateAndCompress function in validation.cc allows remote attackers to cause a denial of service (SIGFPE and application crash) via a malformed file. | |||||
CVE-2014-8889 | 1 Dropbox | 1 Dropbox Sdk | 2024-02-28 | 2.6 LOW | 5.3 MEDIUM |
Dropbox SDK for Android before 1.6.2 might allow remote attackers to obtain sensitive information via crafted malware or via a drive-by download attack. | |||||
CVE-2017-7448 | 1 Dropbox | 1 Lepton | 2024-02-28 | 4.3 MEDIUM | 5.5 MEDIUM |
The allocate_channel_framebuffer function in uncompressed_components.hh in Dropbox Lepton 1.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a malformed JPEG image. | |||||
CVE-2017-8891 | 1 Dropbox | 1 Lepton | 2024-02-28 | 4.3 MEDIUM | 5.5 MEDIUM |
Dropbox Lepton 1.2.1 allows DoS (SEGV and application crash) via a malformed lepton file because the code does not ensure setup of a correct number of threads. |