Search criteria Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.

4 vulnerabilities found for MaLion for Mac by Intercom, Inc.

CVE-2017-10819 (GCVE-0-2017-10819)

Vulnerability from nvd – Published: 2017-08-04 16:00 – Updated: 2024-08-05 17:50
VLAI?
Summary
MaLion for Mac 4.3.0 to 5.2.1 does not properly validate certificates, which may allow an attacker to eavesdrop on an encrypted communication.
Severity ?
No CVSS data available.
CWE
  • Improper Certificate Validation
Assigner
Impacted products
Vendor Product Version
Intercom, Inc. MaLion for Mac Affected: 4.3.0 to 5.2.1
Create a notification for this product.
Date Public ?
2017-08-04 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T17:50:11.661Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.intercom.co.jp/information/2017/0801.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/vu/JVNVU91587298/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MaLion for Mac",
          "vendor": "Intercom, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "4.3.0 to 5.2.1"
            }
          ]
        }
      ],
      "datePublic": "2017-08-04T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "MaLion for Mac 4.3.0 to 5.2.1 does not properly validate certificates, which may allow an attacker to eavesdrop on an encrypted communication."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Improper Certificate Validation",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-04T15:57:01.000Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.intercom.co.jp/information/2017/0801.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://jvn.jp/en/vu/JVNVU91587298/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2017-10819",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MaLion for Mac",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "4.3.0 to 5.2.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Intercom, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MaLion for Mac 4.3.0 to 5.2.1 does not properly validate certificates, which may allow an attacker to eavesdrop on an encrypted communication."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Improper Certificate Validation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.intercom.co.jp/information/2017/0801.html",
              "refsource": "MISC",
              "url": "http://www.intercom.co.jp/information/2017/0801.html"
            },
            {
              "name": "https://jvn.jp/en/vu/JVNVU91587298/index.html",
              "refsource": "MISC",
              "url": "https://jvn.jp/en/vu/JVNVU91587298/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2017-10819",
    "datePublished": "2017-08-04T16:00:00.000Z",
    "dateReserved": "2017-07-04T00:00:00.000Z",
    "dateUpdated": "2024-08-05T17:50:11.661Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-10815 (GCVE-0-2017-10815)

Vulnerability from nvd – Published: 2017-08-04 16:00 – Updated: 2024-08-05 17:50
VLAI?
Summary
MaLion for Windows 5.2.1 and earlier (only when "Remote Control" is installed) and MaLion for Mac 4.0.1 to 5.2.1 (only when "Remote Control" is installed) allow remote attackers to bypass authentication to execute arbitrary commands or operations on Terminal Agent.
Severity ?
No CVSS data available.
CWE
  • Authentication bypass
Assigner
Impacted products
Vendor Product Version
Intercom, Inc. MaLion for Windows Affected: 5.2.1 and earlier (only when "Remote Control" is installed)
Create a notification for this product.
    Intercom, Inc. MaLion for Mac Affected: 4.0.1 to 5.2.1 (only when "Remote Control" is installed)
Create a notification for this product.
Date Public ?
2017-08-04 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T17:50:12.095Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.intercom.co.jp/information/2017/0801.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/vu/JVNVU91587298/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MaLion for Windows",
          "vendor": "Intercom, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "5.2.1 and earlier (only when \"Remote Control\" is installed)"
            }
          ]
        },
        {
          "product": "MaLion for Mac",
          "vendor": "Intercom, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "4.0.1 to  5.2.1 (only when \"Remote Control\" is installed)"
            }
          ]
        }
      ],
      "datePublic": "2017-08-04T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "MaLion for Windows 5.2.1 and earlier (only when \"Remote Control\" is installed) and MaLion for Mac 4.0.1 to 5.2.1 (only when \"Remote Control\" is installed) allow remote attackers to bypass authentication to execute arbitrary commands or operations on Terminal Agent."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Authentication bypass",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-11T01:57:01.000Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.intercom.co.jp/information/2017/0801.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://jvn.jp/en/vu/JVNVU91587298/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2017-10815",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MaLion for Windows",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "5.2.1 and earlier (only when \"Remote Control\" is installed)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "MaLion for Mac",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "4.0.1 to  5.2.1 (only when \"Remote Control\" is installed)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Intercom, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MaLion for Windows 5.2.1 and earlier (only when \"Remote Control\" is installed) and MaLion for Mac 4.0.1 to 5.2.1 (only when \"Remote Control\" is installed) allow remote attackers to bypass authentication to execute arbitrary commands or operations on Terminal Agent."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Authentication bypass"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.intercom.co.jp/information/2017/0801.html",
              "refsource": "MISC",
              "url": "http://www.intercom.co.jp/information/2017/0801.html"
            },
            {
              "name": "https://jvn.jp/en/vu/JVNVU91587298/index.html",
              "refsource": "MISC",
              "url": "https://jvn.jp/en/vu/JVNVU91587298/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2017-10815",
    "datePublished": "2017-08-04T16:00:00.000Z",
    "dateReserved": "2017-07-04T00:00:00.000Z",
    "dateUpdated": "2024-08-05T17:50:12.095Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-10815 (GCVE-0-2017-10815)

Vulnerability from cvelistv5 – Published: 2017-08-04 16:00 – Updated: 2024-08-05 17:50
VLAI?
Summary
MaLion for Windows 5.2.1 and earlier (only when "Remote Control" is installed) and MaLion for Mac 4.0.1 to 5.2.1 (only when "Remote Control" is installed) allow remote attackers to bypass authentication to execute arbitrary commands or operations on Terminal Agent.
Severity ?
No CVSS data available.
CWE
  • Authentication bypass
Assigner
Impacted products
Vendor Product Version
Intercom, Inc. MaLion for Windows Affected: 5.2.1 and earlier (only when "Remote Control" is installed)
Create a notification for this product.
    Intercom, Inc. MaLion for Mac Affected: 4.0.1 to 5.2.1 (only when "Remote Control" is installed)
Create a notification for this product.
Date Public ?
2017-08-04 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T17:50:12.095Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.intercom.co.jp/information/2017/0801.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/vu/JVNVU91587298/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MaLion for Windows",
          "vendor": "Intercom, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "5.2.1 and earlier (only when \"Remote Control\" is installed)"
            }
          ]
        },
        {
          "product": "MaLion for Mac",
          "vendor": "Intercom, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "4.0.1 to  5.2.1 (only when \"Remote Control\" is installed)"
            }
          ]
        }
      ],
      "datePublic": "2017-08-04T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "MaLion for Windows 5.2.1 and earlier (only when \"Remote Control\" is installed) and MaLion for Mac 4.0.1 to 5.2.1 (only when \"Remote Control\" is installed) allow remote attackers to bypass authentication to execute arbitrary commands or operations on Terminal Agent."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Authentication bypass",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-11T01:57:01.000Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.intercom.co.jp/information/2017/0801.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://jvn.jp/en/vu/JVNVU91587298/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2017-10815",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MaLion for Windows",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "5.2.1 and earlier (only when \"Remote Control\" is installed)"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "MaLion for Mac",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "4.0.1 to  5.2.1 (only when \"Remote Control\" is installed)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Intercom, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MaLion for Windows 5.2.1 and earlier (only when \"Remote Control\" is installed) and MaLion for Mac 4.0.1 to 5.2.1 (only when \"Remote Control\" is installed) allow remote attackers to bypass authentication to execute arbitrary commands or operations on Terminal Agent."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Authentication bypass"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.intercom.co.jp/information/2017/0801.html",
              "refsource": "MISC",
              "url": "http://www.intercom.co.jp/information/2017/0801.html"
            },
            {
              "name": "https://jvn.jp/en/vu/JVNVU91587298/index.html",
              "refsource": "MISC",
              "url": "https://jvn.jp/en/vu/JVNVU91587298/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2017-10815",
    "datePublished": "2017-08-04T16:00:00.000Z",
    "dateReserved": "2017-07-04T00:00:00.000Z",
    "dateUpdated": "2024-08-05T17:50:12.095Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-10819 (GCVE-0-2017-10819)

Vulnerability from cvelistv5 – Published: 2017-08-04 16:00 – Updated: 2024-08-05 17:50
VLAI?
Summary
MaLion for Mac 4.3.0 to 5.2.1 does not properly validate certificates, which may allow an attacker to eavesdrop on an encrypted communication.
Severity ?
No CVSS data available.
CWE
  • Improper Certificate Validation
Assigner
Impacted products
Vendor Product Version
Intercom, Inc. MaLion for Mac Affected: 4.3.0 to 5.2.1
Create a notification for this product.
Date Public ?
2017-08-04 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T17:50:11.661Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.intercom.co.jp/information/2017/0801.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/vu/JVNVU91587298/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MaLion for Mac",
          "vendor": "Intercom, Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "4.3.0 to 5.2.1"
            }
          ]
        }
      ],
      "datePublic": "2017-08-04T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "MaLion for Mac 4.3.0 to 5.2.1 does not properly validate certificates, which may allow an attacker to eavesdrop on an encrypted communication."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Improper Certificate Validation",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-04T15:57:01.000Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.intercom.co.jp/information/2017/0801.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://jvn.jp/en/vu/JVNVU91587298/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2017-10819",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "MaLion for Mac",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "4.3.0 to 5.2.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Intercom, Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MaLion for Mac 4.3.0 to 5.2.1 does not properly validate certificates, which may allow an attacker to eavesdrop on an encrypted communication."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Improper Certificate Validation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.intercom.co.jp/information/2017/0801.html",
              "refsource": "MISC",
              "url": "http://www.intercom.co.jp/information/2017/0801.html"
            },
            {
              "name": "https://jvn.jp/en/vu/JVNVU91587298/index.html",
              "refsource": "MISC",
              "url": "https://jvn.jp/en/vu/JVNVU91587298/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2017-10819",
    "datePublished": "2017-08-04T16:00:00.000Z",
    "dateReserved": "2017-07-04T00:00:00.000Z",
    "dateUpdated": "2024-08-05T17:50:11.661Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}