Search criteria
36 vulnerabilities found for xchat by xchat
FKIE_CVE-2012-0828
Vulnerability from fkie_nvd - Published: 2020-02-21 18:15 - Updated: 2024-11-21 01:35
Severity ?
Summary
Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the Basic Multilingual Plane (BMP).
References
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://www.openwall.com/lists/oss-security/2012/02/01/9 | Mailing List, Third Party Advisory | |
| secalert@redhat.com | https://access.redhat.com/security/cve/cve-2012-0828 | Third Party Advisory | |
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0828 | Issue Tracking, Patch, Third Party Advisory | |
| secalert@redhat.com | https://security-tracker.debian.org/tracker/CVE-2012-0828 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2012/02/01/9 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/cve-2012-0828 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0828 | Issue Tracking, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security-tracker.debian.org/tracker/CVE-2012-0828 | Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnome:gtk:2.10.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F5E89111-4AB1-4A89-9FD2-EC506CA7A2D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnome:gtk:2.14.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8DAAC3F9-6C8A-4F0D-BB2D-E11B7824D254",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnome:gtk:2.18.9:*:*:*:*:*:*:*",
"matchCriteriaId": "1AD6C94D-C4EB-474D-AEB4-A18458507BB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnome:gtk:2.24.7:*:*:*:*:*:*:*",
"matchCriteriaId": "BAEB7698-0F5B-44F1-B380-2D2F25FD89CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "144C01A3-C1C6-4467-8777-BA4C7AC8D0C4",
"versionEndExcluding": "2.8.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat-wdk:xchat-wdk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9AAC014F-2966-4507-AD36-C14FD515A652",
"versionEndExcluding": "1499-4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the Basic Multilingual Plane (BMP)."
},
{
"lang": "es",
"value": "Un desbordamiento del b\u00fafer en la regi\u00f3n heap de la memoria en xchat versi\u00f3n 2.8.6 sobre la arquitectura Maemo de Xchat-WDK versiones anteriores a 1499-4 (18-01-2012), podr\u00eda permitir a atacantes remotos causar una denegaci\u00f3n de servicio (DoS) (bloqueo del cliente xchat) o ejecutar c\u00f3digo arbitrario por medio de una l\u00ednea UTF-8 desde el servidor que contiene caracteres fuera del Basic Multilingual Plane (BMP)."
}
],
"id": "CVE-2012-0828",
"lastModified": "2024-11-21T01:35:48.180",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-02-21T18:15:11.270",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2012/02/01/9"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/cve-2012-0828"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0828"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security-tracker.debian.org/tracker/CVE-2012-0828"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2012/02/01/9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/cve-2012-0828"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0828"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security-tracker.debian.org/tracker/CVE-2012-0828"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2013-7449
Vulnerability from fkie_nvd - Published: 2016-04-21 14:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
The ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| canonical | ubuntu_linux | 12.04 | |
| canonical | ubuntu_linux | 14.04 | |
| canonical | ubuntu_linux | 15.10 | |
| xchat | xchat | - | |
| xchat | xchat_gnome | - | |
| hexchat_project | hexchat | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xchat:xchat:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41E75FBE-44C2-4B3D-8CAF-D35985102334",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat_gnome:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DECAEB82-4F89-41F9-9A04-BB5422617719",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hexchat_project:hexchat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "92B8E913-CA39-4610-A20A-9E4619DA1209",
"versionEndIncluding": "2.10.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate."
},
{
"lang": "es",
"value": "La funci\u00f3n ssl_do_connect en common/server.c en HexChat en versiones anteriores a 2.10.2, XChat y XChat-GNOME no verifica que el nombre de host del servidor coincide con un nombre de dominio en el certificado X.509, lo que permite a atacantes man-in-the-middle suplantar servidores SSL a trav\u00e9s de un certificado v\u00e1lido arbitrario."
}
],
"id": "CVE-2013-7449",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2016-04-21T14:59:00.107",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://hexchat.readthedocs.org/en/latest/changelog.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/USN-2945-1"
},
{
"source": "cve@mitre.org",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1081839"
},
{
"source": "cve@mitre.org",
"url": "https://github.com/hexchat/hexchat/commit/c9b63f7f9be01692b03fa15275135a4910a7e02d"
},
{
"source": "cve@mitre.org",
"url": "https://github.com/hexchat/hexchat/issues/524"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://hexchat.readthedocs.org/en/latest/changelog.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-2945-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1081839"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/hexchat/hexchat/commit/c9b63f7f9be01692b03fa15275135a4910a7e02d"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://github.com/hexchat/hexchat/issues/524"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-310"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-5129
Vulnerability from fkie_nvd - Published: 2012-08-30 22:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Heap-based buffer overflow in XChat 2.8.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long response string.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xchat:xchat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "251F8C65-B10B-477E-86B0-43821EB35A95",
"versionEndIncluding": "2.8.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0B8C5104-52ED-42EC-97A5-05D345597496",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF68327-9D45-41F3-B120-C9E71A0A3259",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "07373BC7-F34E-47A2-9057-64C04C45EA26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "F18504E4-03C8-45C9-B89D-86327D5663D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "3F6EE47C-0AE8-4CCD-8A2D-54E55BE9C7D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "103E7180-AFF5-4EBF-A9FD-EFE2A6C00256",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D371520F-1F2D-4EAB-A4D1-5CD13DBF6C62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4CA8BBE2-4ABE-4574-9BD7-A26F2FF25333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "74588BF3-4DA4-410B-8416-C90E7F446238",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "07D90F28-4BD2-4581-A8B7-ED90A9ECEF53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "721836E8-A4B6-46D6-BEDD-9B269DDB0525",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "06627FAB-2A5B-428D-A081-9628DC55E4AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "655D162F-1944-4D88-A2C0-825F7EED0BAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5C5454B5-AC2F-4B8E-BC20-2273472D0401",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B4BEFD40-62D5-4007-9D35-6865D6482D89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A0F904EA-16E1-401B-BD5A-1A9B5B32E6A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D02490BD-4B30-4213-A03E-443CAEE6C3DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "55162523-7648-4F94-BE7B-0B7E2EE598FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.8.7:*:*:*:*:*:*:*",
"matchCriteriaId": "83CC33D0-37D8-4C9C-BD89-560DFFF77F0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.8.8:*:*:*:*:*:*:*",
"matchCriteriaId": "64EE28DD-21CB-4DC3-91CE-E74B3D3F0F3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.8.9:*:*:*:*:*:*:*",
"matchCriteriaId": "BC2A5D0A-9C46-4631-BE22-472B0E748FB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "62820427-7013-4C10-AC31-BE11764F782F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E19C5E12-5A0B-4225-8409-BEA5BD2CD31B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "90D3F7D0-36F9-42DF-AA2F-658C767F9CAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "90006D01-8C0D-45DA-BF65-901E95C149BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7767D8F8-0AC6-473F-BEFA-0FA3EB88E7CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6EB78C64-BA92-4B41-83F0-22AF8F26F930",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "9E2D2DE3-1278-44F9-996D-A2102690D88F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1E571CEA-967E-4A99-B742-80E96C3275B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DFEE0D77-576D-4A80-BD29-39EA6602C2AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.9.9:*:*:*:*:*:*:*",
"matchCriteriaId": "D3221D9F-F47B-4DD5-8328-EBFC27549F98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C6109751-01D8-4585-A19C-F4F0D03FB82A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "10CFC601-73D7-4341-9606-D02128B86F8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "14124429-8DF7-44BB-8CBB-C4E04DB4FD99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "08F7D59F-A504-45B7-B8D8-6F3AB799788A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "72AF16EE-1B98-448F-8575-1EABFCD7CBEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "AB08B68B-C557-4285-9AAD-226EADD84DC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "2191D045-A2A9-47E0-A5CB-A4FF7C7D7179",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "638F3791-6343-498F-9BE2-73175606F6F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "6EFB0F36-CFF1-41F8-AC43-D00165639DBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "673B2CA0-C2D3-441C-9946-7FE12FB4BCBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3C2CE006-DAA0-40BA-A291-EBBC07147D68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1D92D905-9E86-40CE-ADF1-F561A2FC2F94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8649CA9A-87C6-4C89-A47A-2BE3E1025447",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.8.3:c:*:*:*:*:*:*",
"matchCriteriaId": "096F6B6A-E7A7-439C-BB04-D53D345B5936",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.8.3:e:*:*:*:*:*:*",
"matchCriteriaId": "35FBBED7-FF29-411B-BE9A-C499D3CF64C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "795E05AC-3F7B-41A9-B3DE-D8A375873642",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.8.5:b:*:*:*:*:*:*",
"matchCriteriaId": "37C966CE-BA65-408F-BE1E-006F0C3DBAD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.8.5:e:*:*:*:*:*:*",
"matchCriteriaId": "4048F9F4-E94D-445A-A228-5899A5CE7BCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1FF7EF6E-C303-45F0-83B3-149EF2B269BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.8.7:a:*:*:*:*:*:*",
"matchCriteriaId": "036260CB-9B35-41D4-BF8D-1FF55F3851C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.8.7:b:*:*:*:*:*:*",
"matchCriteriaId": "2215683D-9A27-47BC-A39F-92C134A236A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.8.7:c:*:*:*:*:*:*",
"matchCriteriaId": "ABDDDBC6-8A14-4596-9811-C202C48AA8E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.8.7:d:*:*:*:*:*:*",
"matchCriteriaId": "D212BF9E-CC88-48A9-B336-FECEC0672114",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.8.7:e:*:*:*:*:*:*",
"matchCriteriaId": "AEB4C892-87AA-4211-9B7B-9FA3E70F6DF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.8.7:f:*:*:*:*:*:*",
"matchCriteriaId": "B689B885-363C-46FC-9EE5-2DC1EE617102",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.8.7b:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A942FC-C19B-4585-91AF-8ECFD6D76CBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.8.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B9923817-4F47-4622-BF41-B9391006F698",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in XChat 2.8.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long response string."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en XChat v2.8.9 y anterior permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente la ejecuci\u00f3n de c\u00f3digo arbitrario a trav\u00e9s de una cadena de respuesta larga."
}
],
"id": "CVE-2011-5129",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-08-30T22:55:03.733",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://packetstormsecurity.org/files/107312/xchat-dos.txt"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.exploit-db.com/exploits/18159"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/77629"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/50820"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1027468"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://packetstormsecurity.org/files/107312/xchat-dos.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.exploit-db.com/exploits/18159"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/77629"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/50820"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1027468"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2009-0315
Vulnerability from fkie_nvd - Published: 2009-01-28 11:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Untrusted search path vulnerability in the Python module in xchat allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xchat:xchat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5BA25432-EBEC-42F3-A220-C830A13A3971",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Untrusted search path vulnerability in the Python module in xchat allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983)."
},
{
"lang": "es",
"value": "Vulnerabilidad de ruta de b\u00fasqueda no confiable en el m\u00f3dulo Python en xchat permite a usuarios locales ejecutar c\u00f3digo arbitrario a trav\u00e9s de un troyano en un fichero Python en el directorio de trabajo activo, relativo a la vulnerabilidad de la funci\u00f3n PySys_SetArgv (CVE-2008-5983)."
}
],
"id": "CVE-2009-0315",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-01-28T11:30:00.280",
"references": [
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:059"
},
{
"source": "cve@mitre.org",
"url": "http://www.openwall.com/lists/oss-security/2009/01/26/2"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/33444"
},
{
"source": "cve@mitre.org",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=481560"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:059"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2009/01/26/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/33444"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=481560"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2008-2841
Vulnerability from fkie_nvd - Published: 2008-06-24 19:41 - Updated: 2025-04-09 00:30
Severity ?
Summary
Argument injection vulnerability in XChat 2.8.7b and earlier on Windows, when Internet Explorer is used, allows remote attackers to execute arbitrary commands via the --command parameter in an ircs:// URI.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| microsoft | windows_nt | * | |
| microsoft | internet_explorer | * | |
| xchat | xchat | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ED27882B-A02A-4D5F-9117-A47976C676E0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8682FAF3-98E3-485C-89CB-C0358C4E2AB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C4CA9E47-EEFB-4484-B4E3-B3E06DEE71F6",
"versionEndIncluding": "2.8.7b",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Argument injection vulnerability in XChat 2.8.7b and earlier on Windows, when Internet Explorer is used, allows remote attackers to execute arbitrary commands via the --command parameter in an ircs:// URI."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n de argumento en XChat 2.8.7b y versiones anteriores de Windows, cuando Internet Explorer es ejecutado, permite a atacantes remotos ejecutar comandos de su elecci\u00f3n a trav\u00e9s del par\u00e1metro --command en una URI ircs://."
}
],
"id": "CVE-2008-2841",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2008-06-24T19:41:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://forum.xchat.org/viewtopic.php?t=4218"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30695"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/29696"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43065"
},
{
"source": "cve@mitre.org",
"url": "https://www.exploit-db.com/exploits/5795"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://forum.xchat.org/viewtopic.php?t=4218"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/30695"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/29696"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43065"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.exploit-db.com/exploits/5795"
}
],
"sourceIdentifier": "cve@mitre.org",
"vendorComments": [
{
"comment": "Not vulnerable. This issue did not affect the versions of XChat as shipped with Red Hat Enterprise Linux.",
"lastModified": "2008-07-07T00:00:00",
"organization": "Red Hat"
}
],
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-4455
Vulnerability from fkie_nvd - Published: 2006-08-30 16:04 - Updated: 2025-04-03 01:03
Severity ?
Summary
Unspecified vulnerability in Xchat 2.6.7 and earlier allows remote attackers to cause a denial of service (crash) via unspecified vectors involving the PRIVMSG command. NOTE: the vendor has disputed this vulnerability, stating that it does not affect 2.6.7 "or any recent version"
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xchat:xchat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E2E899A7-0064-4015-9CDC-7532F763DE1E",
"versionEndIncluding": "2.6.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Xchat 2.6.7 and earlier allows remote attackers to cause a denial of service (crash) via unspecified vectors involving the PRIVMSG command. NOTE: the vendor has disputed this vulnerability, stating that it does not affect 2.6.7 \"or any recent version\""
},
{
"lang": "es",
"value": "** IMPUGNADA ** Vulnerabilidad no especificada en Xchat 2.6.7 y anteriores permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante vectores no especificados implicando el comando PRIVMSG. NOTA: el vendedor ha impugnado esta vulnerabilidad, afirmando que no afecta a la 2.6.7 \"ni a ninguna versi\u00f3n reciente\"."
}
],
"id": "CVE-2006-4455",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-08-30T16:04:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://forum.xchat.org/viewtopic.php?t=2918"
},
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=bugtraq\u0026m=115523184321922\u0026w=2"
},
{
"source": "cve@mitre.org",
"url": "http://securitytracker.com/id?1016687"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/19398"
},
{
"source": "cve@mitre.org",
"url": "http://www.xchat.org/"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28325"
},
{
"source": "cve@mitre.org",
"url": "https://www.exploit-db.com/exploits/2124"
},
{
"source": "cve@mitre.org",
"url": "https://www.exploit-db.com/exploits/2147"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://forum.xchat.org/viewtopic.php?t=2918"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=115523184321922\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1016687"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/19398"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.xchat.org/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28325"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.exploit-db.com/exploits/2124"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.exploit-db.com/exploits/2147"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2004-0409
Vulnerability from fkie_nvd - Published: 2004-06-01 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| xchat | xchat | 1.8.0 | |
| xchat | xchat | 1.8.1 | |
| xchat | xchat | 1.8.2 | |
| xchat | xchat | 1.8.3 | |
| xchat | xchat | 1.8.4 | |
| xchat | xchat | 1.8.5 | |
| xchat | xchat | 1.8.6 | |
| xchat | xchat | 1.8.7 | |
| xchat | xchat | 1.8.8 | |
| xchat | xchat | 1.8.9 | |
| xchat | xchat | 1.9.0 | |
| xchat | xchat | 1.9.1 | |
| xchat | xchat | 1.9.2 | |
| xchat | xchat | 1.9.3 | |
| xchat | xchat | 1.9.4 | |
| xchat | xchat | 1.9.5 | |
| xchat | xchat | 1.9.6 | |
| xchat | xchat | 1.9.7 | |
| xchat | xchat | 1.9.8 | |
| xchat | xchat | 1.9.9 | |
| xchat | xchat | 2.0.0 | |
| xchat | xchat | 2.0.1 | |
| xchat | xchat | 2.0.2 | |
| xchat | xchat | 2.0.3 | |
| xchat | xchat | 2.0.4 | |
| xchat | xchat | 2.0.5 | |
| xchat | xchat | 2.0.6 | |
| xchat | xchat | 2.0.7 | |
| xchat | xchat | 2.0.8 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xchat:xchat:1.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "06627FAB-2A5B-428D-A081-9628DC55E4AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "655D162F-1944-4D88-A2C0-825F7EED0BAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5C5454B5-AC2F-4B8E-BC20-2273472D0401",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B4BEFD40-62D5-4007-9D35-6865D6482D89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A0F904EA-16E1-401B-BD5A-1A9B5B32E6A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D02490BD-4B30-4213-A03E-443CAEE6C3DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "55162523-7648-4F94-BE7B-0B7E2EE598FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.8.7:*:*:*:*:*:*:*",
"matchCriteriaId": "83CC33D0-37D8-4C9C-BD89-560DFFF77F0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.8.8:*:*:*:*:*:*:*",
"matchCriteriaId": "64EE28DD-21CB-4DC3-91CE-E74B3D3F0F3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.8.9:*:*:*:*:*:*:*",
"matchCriteriaId": "BC2A5D0A-9C46-4631-BE22-472B0E748FB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "62820427-7013-4C10-AC31-BE11764F782F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E19C5E12-5A0B-4225-8409-BEA5BD2CD31B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "90D3F7D0-36F9-42DF-AA2F-658C767F9CAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "90006D01-8C0D-45DA-BF65-901E95C149BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7767D8F8-0AC6-473F-BEFA-0FA3EB88E7CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6EB78C64-BA92-4B41-83F0-22AF8F26F930",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "9E2D2DE3-1278-44F9-996D-A2102690D88F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1E571CEA-967E-4A99-B742-80E96C3275B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DFEE0D77-576D-4A80-BD29-39EA6602C2AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:1.9.9:*:*:*:*:*:*:*",
"matchCriteriaId": "D3221D9F-F47B-4DD5-8328-EBFC27549F98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C6109751-01D8-4585-A19C-F4F0D03FB82A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "10CFC601-73D7-4341-9606-D02128B86F8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "14124429-8DF7-44BB-8CBB-C4E04DB4FD99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "08F7D59F-A504-45B7-B8D8-6F3AB799788A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "72AF16EE-1B98-448F-8575-1EABFCD7CBEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "AB08B68B-C557-4285-9AAD-226EADD84DC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "2191D045-A2A9-47E0-A5CB-A4FF7C7D7179",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "638F3791-6343-498F-9BE2-73175606F6F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:xchat:xchat:2.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "6EFB0F36-CFF1-41F8-AC43-D00165639DBE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code."
}
],
"id": "CVE-2004-0409",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2004-06-01T04:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html"
},
{
"source": "cve@mitre.org",
"url": "http://security.gentoo.org/glsa/glsa-200404-15.xml"
},
{
"source": "cve@mitre.org",
"url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_123013"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2004-177.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.redhat.com/support/errata/RHSA-2004-585.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.xchat.org/"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11312"
},
{
"source": "cve@mitre.org",
"url": "https://www.debian.org/security/2004/dsa-493"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200404-15.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_123013"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2004-177.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2004-585.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.xchat.org/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11312"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.debian.org/security/2004/dsa-493"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2003-1000
Vulnerability from fkie_nvd - Published: 2004-01-05 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
xchat 2.0.6 allows remote attackers to cause a denial of service (crash) via a passive DCC request with an invalid ID number, which causes a null dereference.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html | Broken Link, Patch, Vendor Advisory | |
| cve@mitre.org | http://marc.info/?l=bugtraq&m=107152093419276&w=2 | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html | Broken Link, Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=107152093419276&w=2 | Mailing List |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xchat:xchat:2.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "2191D045-A2A9-47E0-A5CB-A4FF7C7D7179",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "xchat 2.0.6 allows remote attackers to cause a denial of service (crash) via a passive DCC request with an invalid ID number, which causes a null dereference."
},
{
"lang": "es",
"value": "xchat 2.0.6 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) mediante una petici\u00f3n DCC pasiva con n\u00famero ID inv\u00e1lido, lo que causa una desreferencia nula."
}
],
"id": "CVE-2003-1000",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2004-01-05T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
],
"url": "http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List"
],
"url": "http://marc.info/?l=bugtraq\u0026m=107152093419276\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Patch",
"Vendor Advisory"
],
"url": "http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "http://marc.info/?l=bugtraq\u0026m=107152093419276\u0026w=2"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2012-0828 (GCVE-0-2012-0828)
Vulnerability from cvelistv5 – Published: 2020-02-21 17:20 – Updated: 2024-08-06 18:38
VLAI?
Summary
Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the Basic Multilingual Plane (BMP).
Severity ?
No CVSS data available.
CWE
- Heap-based buffer overflow by processing UTF-8 line from server containing characters outside BMP
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T18:38:14.795Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://security-tracker.debian.org/tracker/CVE-2012-0828"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0828"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://access.redhat.com/security/cve/cve-2012-0828"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2012/02/01/9"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Xchat-WDK",
"vendor": "xchat",
"versions": [
{
"status": "affected",
"version": "before 1499-4 (2012-01-18)"
}
]
},
{
"product": "xchat",
"vendor": "xchat",
"versions": [
{
"status": "affected",
"version": "2.8.6 on Maemo architecture"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the Basic Multilingual Plane (BMP)."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Heap-based buffer overflow by processing UTF-8 line from server containing characters outside BMP",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-02-21T17:20:43",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://security-tracker.debian.org/tracker/CVE-2012-0828"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0828"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://access.redhat.com/security/cve/cve-2012-0828"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.openwall.com/lists/oss-security/2012/02/01/9"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2012-0828",
"datePublished": "2020-02-21T17:20:43",
"dateReserved": "2012-01-19T00:00:00",
"dateUpdated": "2024-08-06T18:38:14.795Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-7449 (GCVE-0-2013-7449)
Vulnerability from cvelistv5 – Published: 2016-04-21 14:00 – Updated: 2024-08-06 18:09
VLAI?
Summary
The ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T18:09:16.618Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/hexchat/hexchat/commit/c9b63f7f9be01692b03fa15275135a4910a7e02d"
},
{
"name": "USN-2945-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-2945-1"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/hexchat/hexchat/issues/524"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://hexchat.readthedocs.org/en/latest/changelog.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1081839"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-04-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-04-21T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/hexchat/hexchat/commit/c9b63f7f9be01692b03fa15275135a4910a7e02d"
},
{
"name": "USN-2945-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-2945-1"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/hexchat/hexchat/issues/524"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://hexchat.readthedocs.org/en/latest/changelog.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1081839"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-7449",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/hexchat/hexchat/commit/c9b63f7f9be01692b03fa15275135a4910a7e02d",
"refsource": "CONFIRM",
"url": "https://github.com/hexchat/hexchat/commit/c9b63f7f9be01692b03fa15275135a4910a7e02d"
},
{
"name": "USN-2945-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2945-1"
},
{
"name": "https://github.com/hexchat/hexchat/issues/524",
"refsource": "CONFIRM",
"url": "https://github.com/hexchat/hexchat/issues/524"
},
{
"name": "http://hexchat.readthedocs.org/en/latest/changelog.html",
"refsource": "CONFIRM",
"url": "http://hexchat.readthedocs.org/en/latest/changelog.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1081839",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1081839"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-7449",
"datePublished": "2016-04-21T14:00:00",
"dateReserved": "2016-04-06T00:00:00",
"dateUpdated": "2024-08-06T18:09:16.618Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-5129 (GCVE-0-2011-5129)
Vulnerability from cvelistv5 – Published: 2012-08-30 22:00 – Updated: 2024-08-07 00:23
VLAI?
Summary
Heap-based buffer overflow in XChat 2.8.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long response string.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T00:23:40.241Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "50820",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/50820"
},
{
"name": "1027468",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1027468"
},
{
"name": "77629",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/77629"
},
{
"name": "18159",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "http://www.exploit-db.com/exploits/18159"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.org/files/107312/xchat-dos.txt"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-11-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in XChat 2.8.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long response string."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-02-14T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "50820",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/50820"
},
{
"name": "1027468",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1027468"
},
{
"name": "77629",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/77629"
},
{
"name": "18159",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "http://www.exploit-db.com/exploits/18159"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.org/files/107312/xchat-dos.txt"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-5129",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based buffer overflow in XChat 2.8.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long response string."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "50820",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/50820"
},
{
"name": "1027468",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027468"
},
{
"name": "77629",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/77629"
},
{
"name": "18159",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/18159"
},
{
"name": "http://packetstormsecurity.org/files/107312/xchat-dos.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/files/107312/xchat-dos.txt"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-5129",
"datePublished": "2012-08-30T22:00:00",
"dateReserved": "2012-08-30T00:00:00",
"dateUpdated": "2024-08-07T00:23:40.241Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-0315 (GCVE-0-2009-0315)
Vulnerability from cvelistv5 – Published: 2009-01-28 11:00 – Updated: 2024-08-07 04:31
VLAI?
Summary
Untrusted search path vulnerability in the Python module in xchat allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T04:31:25.503Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=481560"
},
{
"name": "[oss-security] 20090126 CVE request -- Python \u003c 2.6 PySys_SetArgv issues (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2009/01/26/2"
},
{
"name": "33444",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/33444"
},
{
"name": "MDVSA-2009:059",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:059"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-01-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Untrusted search path vulnerability in the Python module in xchat allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983)."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-02-05T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=481560"
},
{
"name": "[oss-security] 20090126 CVE request -- Python \u003c 2.6 PySys_SetArgv issues (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2009/01/26/2"
},
{
"name": "33444",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/33444"
},
{
"name": "MDVSA-2009:059",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:059"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-0315",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Untrusted search path vulnerability in the Python module in xchat allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=481560",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=481560"
},
{
"name": "[oss-security] 20090126 CVE request -- Python \u003c 2.6 PySys_SetArgv issues (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2009/01/26/2"
},
{
"name": "33444",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33444"
},
{
"name": "MDVSA-2009:059",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:059"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-0315",
"datePublished": "2009-01-28T11:00:00",
"dateReserved": "2009-01-27T00:00:00",
"dateUpdated": "2024-08-07T04:31:25.503Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-2841 (GCVE-0-2008-2841)
Vulnerability from cvelistv5 – Published: 2008-06-24 19:00 – Updated: 2024-08-07 09:14
VLAI?
Summary
Argument injection vulnerability in XChat 2.8.7b and earlier on Windows, when Internet Explorer is used, allows remote attackers to execute arbitrary commands via the --command parameter in an ircs:// URI.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T09:14:14.805Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "29696",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/29696"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://forum.xchat.org/viewtopic.php?t=4218"
},
{
"name": "xchat-ircs-command-execution(43065)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43065"
},
{
"name": "5795",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/5795"
},
{
"name": "30695",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30695"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-06-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Argument injection vulnerability in XChat 2.8.7b and earlier on Windows, when Internet Explorer is used, allows remote attackers to execute arbitrary commands via the --command parameter in an ircs:// URI."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "29696",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/29696"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://forum.xchat.org/viewtopic.php?t=4218"
},
{
"name": "xchat-ircs-command-execution(43065)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43065"
},
{
"name": "5795",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/5795"
},
{
"name": "30695",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30695"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-2841",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Argument injection vulnerability in XChat 2.8.7b and earlier on Windows, when Internet Explorer is used, allows remote attackers to execute arbitrary commands via the --command parameter in an ircs:// URI."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "29696",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29696"
},
{
"name": "http://forum.xchat.org/viewtopic.php?t=4218",
"refsource": "CONFIRM",
"url": "http://forum.xchat.org/viewtopic.php?t=4218"
},
{
"name": "xchat-ircs-command-execution(43065)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43065"
},
{
"name": "5795",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5795"
},
{
"name": "30695",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30695"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-2841",
"datePublished": "2008-06-24T19:00:00",
"dateReserved": "2008-06-24T00:00:00",
"dateUpdated": "2024-08-07T09:14:14.805Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-4455 (GCVE-0-2006-4455)
Vulnerability from cvelistv5 – Published: 2006-08-30 15:00 – Updated: 2024-08-07 19:14
VLAI?
Summary
Unspecified vulnerability in Xchat 2.6.7 and earlier allows remote attackers to cause a denial of service (crash) via unspecified vectors involving the PRIVMSG command. NOTE: the vendor has disputed this vulnerability, stating that it does not affect 2.6.7 "or any recent version"
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T19:14:46.691Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "xchat-privmsg-dos(28325)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28325"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.xchat.org/"
},
{
"name": "19398",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/19398"
},
{
"name": "2124",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/2124"
},
{
"name": "20060809 XChat \u003c= 2.6.4-1 (win version) Remote Denial of Service Exploit (php)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=115523184321922\u0026w=2"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://forum.xchat.org/viewtopic.php?t=2918"
},
{
"name": "2147",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/2147"
},
{
"name": "1016687",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016687"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-08-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Xchat 2.6.7 and earlier allows remote attackers to cause a denial of service (crash) via unspecified vectors involving the PRIVMSG command. NOTE: the vendor has disputed this vulnerability, stating that it does not affect 2.6.7 \"or any recent version\""
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-10-18T16:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "xchat-privmsg-dos(28325)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28325"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.xchat.org/"
},
{
"name": "19398",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/19398"
},
{
"name": "2124",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/2124"
},
{
"name": "20060809 XChat \u003c= 2.6.4-1 (win version) Remote Denial of Service Exploit (php)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=115523184321922\u0026w=2"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://forum.xchat.org/viewtopic.php?t=2918"
},
{
"name": "2147",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/2147"
},
{
"name": "1016687",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016687"
}
],
"tags": [
"disputed"
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-4455",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** DISPUTED ** Unspecified vulnerability in Xchat 2.6.7 and earlier allows remote attackers to cause a denial of service (crash) via unspecified vectors involving the PRIVMSG command. NOTE: the vendor has disputed this vulnerability, stating that it does not affect 2.6.7 \"or any recent version\"."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "xchat-privmsg-dos(28325)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28325"
},
{
"name": "http://www.xchat.org/",
"refsource": "MISC",
"url": "http://www.xchat.org/"
},
{
"name": "19398",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19398"
},
{
"name": "2124",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2124"
},
{
"name": "20060809 XChat \u003c= 2.6.4-1 (win version) Remote Denial of Service Exploit (php)",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=115523184321922\u0026w=2"
},
{
"name": "http://forum.xchat.org/viewtopic.php?t=2918",
"refsource": "MISC",
"url": "http://forum.xchat.org/viewtopic.php?t=2918"
},
{
"name": "2147",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2147"
},
{
"name": "1016687",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016687"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-4455",
"datePublished": "2006-08-30T15:00:00",
"dateReserved": "2006-08-30T00:00:00",
"dateUpdated": "2024-08-07T19:14:46.691Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2001-0792 (GCVE-0-2001-0792)
Vulnerability from cvelistv5 – Published: 2004-09-01 04:00 – Updated: 2024-08-08 04:30
VLAI?
Summary
Format string vulnerability in XChat 1.2.x allows remote attackers to execute arbitrary code via a malformed nickname.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T04:30:06.187Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.securiteam.com/exploits/5AP0Q2A4AQ.html"
},
{
"name": "xchat-nickname-format-string(7416)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7416"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2001-05-29T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Format string vulnerability in XChat 1.2.x allows remote attackers to execute arbitrary code via a malformed nickname."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2002-03-01T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.securiteam.com/exploits/5AP0Q2A4AQ.html"
},
{
"name": "xchat-nickname-format-string(7416)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7416"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2001-0792",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Format string vulnerability in XChat 1.2.x allows remote attackers to execute arbitrary code via a malformed nickname."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.securiteam.com/exploits/5AP0Q2A4AQ.html",
"refsource": "MISC",
"url": "http://www.securiteam.com/exploits/5AP0Q2A4AQ.html"
},
{
"name": "xchat-nickname-format-string(7416)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7416"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2001-0792",
"datePublished": "2004-09-01T04:00:00",
"dateReserved": "2001-10-12T00:00:00",
"dateUpdated": "2024-08-08T04:30:06.187Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2004-0409 (GCVE-0-2004-0409)
Vulnerability from cvelistv5 – Published: 2004-04-17 04:00 – Updated: 2024-08-08 00:17
VLAI?
Summary
Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T00:17:14.583Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2004:177",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2004-177.html"
},
{
"name": "DSA-493",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2004/dsa-493"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.xchat.org/"
},
{
"name": "RHSA-2004:585",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2004-585.html"
},
{
"name": "GLSA-200404-15",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200404-15.xml"
},
{
"name": "FLSA:123013",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_123013"
},
{
"name": "oval:org.mitre.oval:def:11312",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11312"
},
{
"name": "[xchat-announce] 20040405 xchat 2.0.x Socks5 Vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2004-04-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-10-10T00:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "RHSA-2004:177",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2004-177.html"
},
{
"name": "DSA-493",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2004/dsa-493"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.xchat.org/"
},
{
"name": "RHSA-2004:585",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2004-585.html"
},
{
"name": "GLSA-200404-15",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200404-15.xml"
},
{
"name": "FLSA:123013",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_123013"
},
{
"name": "oval:org.mitre.oval:def:11312",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11312"
},
{
"name": "[xchat-announce] 20040405 xchat 2.0.x Socks5 Vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2004-0409",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2004:177",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2004-177.html"
},
{
"name": "DSA-493",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2004/dsa-493"
},
{
"name": "http://www.xchat.org/",
"refsource": "CONFIRM",
"url": "http://www.xchat.org/"
},
{
"name": "RHSA-2004:585",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2004-585.html"
},
{
"name": "GLSA-200404-15",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200404-15.xml"
},
{
"name": "FLSA:123013",
"refsource": "FEDORA",
"url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_123013"
},
{
"name": "oval:org.mitre.oval:def:11312",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11312"
},
{
"name": "[xchat-announce] 20040405 xchat 2.0.x Socks5 Vulnerability",
"refsource": "MLIST",
"url": "http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2004-0409",
"datePublished": "2004-04-17T04:00:00",
"dateReserved": "2004-04-16T00:00:00",
"dateUpdated": "2024-08-08T00:17:14.583Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2003-1000 (GCVE-0-2003-1000)
Vulnerability from cvelistv5 – Published: 2003-12-17 05:00 – Updated: 2024-08-08 02:12
VLAI?
Summary
xchat 2.0.6 allows remote attackers to cause a denial of service (crash) via a passive DCC request with an invalid ID number, which causes a null dereference.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T02:12:35.459Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html"
},
{
"name": "20031214 GLSA: Malformed dcc send requests in xchat-2.0.6 lead to a denial of service",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=107152093419276\u0026w=2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2003-12-14T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "xchat 2.0.6 allows remote attackers to cause a denial of service (crash) via a passive DCC request with an invalid ID number, which causes a null dereference."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-10-17T13:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html"
},
{
"name": "20031214 GLSA: Malformed dcc send requests in xchat-2.0.6 lead to a denial of service",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=107152093419276\u0026w=2"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2003-1000",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "xchat 2.0.6 allows remote attackers to cause a denial of service (crash) via a passive DCC request with an invalid ID number, which causes a null dereference."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html",
"refsource": "CONFIRM",
"url": "http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html"
},
{
"name": "20031214 GLSA: Malformed dcc send requests in xchat-2.0.6 lead to a denial of service",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=107152093419276\u0026w=2"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2003-1000",
"datePublished": "2003-12-17T05:00:00",
"dateReserved": "2003-12-16T00:00:00",
"dateUpdated": "2024-08-08T02:12:35.459Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2002-0382 (GCVE-0-2002-0382)
Vulnerability from cvelistv5 – Published: 2003-04-02 05:00 – Updated: 2024-08-08 02:49
VLAI?
Summary
XChat IRC client allows remote attackers to execute arbitrary commands via a /dns command on a host whose DNS reverse lookup contains shell metacharacters.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T02:49:27.848Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2002:097",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2002-097.html"
},
{
"name": "xchat-dns-execute-commands(8704)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/8704.php"
},
{
"name": "RHSA-2002:124",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2002-124.html"
},
{
"name": "CLA-2002:526",
"tags": [
"vendor-advisory",
"x_refsource_CONECTIVA",
"x_transferred"
],
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000526"
},
{
"name": "MDKSA-2002:051",
"tags": [
"vendor-advisory",
"x_refsource_MANDRAKE",
"x_transferred"
],
"url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-051.php"
},
{
"name": "4376",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/4376"
},
{
"name": "20020327 Xchat /dns command execution vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=101725430425490\u0026w=2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2002-03-27T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "XChat IRC client allows remote attackers to execute arbitrary commands via a /dns command on a host whose DNS reverse lookup contains shell metacharacters."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2003-03-20T00:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "RHSA-2002:097",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2002-097.html"
},
{
"name": "xchat-dns-execute-commands(8704)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/8704.php"
},
{
"name": "RHSA-2002:124",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2002-124.html"
},
{
"name": "CLA-2002:526",
"tags": [
"vendor-advisory",
"x_refsource_CONECTIVA"
],
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000526"
},
{
"name": "MDKSA-2002:051",
"tags": [
"vendor-advisory",
"x_refsource_MANDRAKE"
],
"url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-051.php"
},
{
"name": "4376",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/4376"
},
{
"name": "20020327 Xchat /dns command execution vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=101725430425490\u0026w=2"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-0382",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "XChat IRC client allows remote attackers to execute arbitrary commands via a /dns command on a host whose DNS reverse lookup contains shell metacharacters."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2002:097",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2002-097.html"
},
{
"name": "xchat-dns-execute-commands(8704)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/8704.php"
},
{
"name": "RHSA-2002:124",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2002-124.html"
},
{
"name": "CLA-2002:526",
"refsource": "CONECTIVA",
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000526"
},
{
"name": "MDKSA-2002:051",
"refsource": "MANDRAKE",
"url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-051.php"
},
{
"name": "4376",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/4376"
},
{
"name": "20020327 Xchat /dns command execution vulnerability",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=101725430425490\u0026w=2"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-0382",
"datePublished": "2003-04-02T05:00:00",
"dateReserved": "2002-05-21T00:00:00",
"dateUpdated": "2024-08-08T02:49:27.848Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2002-0006 (GCVE-0-2002-0006)
Vulnerability from cvelistv5 – Published: 2003-04-02 05:00 – Updated: 2024-08-08 02:35
VLAI?
Summary
XChat 1.8.7 and earlier, including default configurations of 1.4.2 and 1.4.3, allows remote attackers to execute arbitrary IRC commands as other clients via encoded characters in a PRIVMSG command that calls CTCP PING, which expands the characters in the client response when the percascii variable is set.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T02:35:17.591Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "xchat-ctcp-ping-command(7856)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7856"
},
{
"name": "CLA-2002:453",
"tags": [
"vendor-advisory",
"x_refsource_CONECTIVA",
"x_transferred"
],
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000453"
},
{
"name": "RHSA-2002:005",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2002-005.html"
},
{
"name": "HPSBTL0201-016",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://online.securityfocus.com/advisories/3806"
},
{
"name": "3830",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/3830"
},
{
"name": "20020109 xchat IRC session hijacking vulnerability (versions 1.4.1, 1.4.2)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=101060676210255\u0026w=2"
},
{
"name": "DSA-099",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2002/dsa-099"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2002-01-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "XChat 1.8.7 and earlier, including default configurations of 1.4.2 and 1.4.3, allows remote attackers to execute arbitrary IRC commands as other clients via encoded characters in a PRIVMSG command that calls CTCP PING, which expands the characters in the client response when the percascii variable is set."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2002-05-31T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "xchat-ctcp-ping-command(7856)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7856"
},
{
"name": "CLA-2002:453",
"tags": [
"vendor-advisory",
"x_refsource_CONECTIVA"
],
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000453"
},
{
"name": "RHSA-2002:005",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2002-005.html"
},
{
"name": "HPSBTL0201-016",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://online.securityfocus.com/advisories/3806"
},
{
"name": "3830",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/3830"
},
{
"name": "20020109 xchat IRC session hijacking vulnerability (versions 1.4.1, 1.4.2)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=101060676210255\u0026w=2"
},
{
"name": "DSA-099",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2002/dsa-099"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-0006",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "XChat 1.8.7 and earlier, including default configurations of 1.4.2 and 1.4.3, allows remote attackers to execute arbitrary IRC commands as other clients via encoded characters in a PRIVMSG command that calls CTCP PING, which expands the characters in the client response when the percascii variable is set."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "xchat-ctcp-ping-command(7856)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7856"
},
{
"name": "CLA-2002:453",
"refsource": "CONECTIVA",
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000453"
},
{
"name": "RHSA-2002:005",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2002-005.html"
},
{
"name": "HPSBTL0201-016",
"refsource": "HP",
"url": "http://online.securityfocus.com/advisories/3806"
},
{
"name": "3830",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3830"
},
{
"name": "20020109 xchat IRC session hijacking vulnerability (versions 1.4.1, 1.4.2)",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=101060676210255\u0026w=2"
},
{
"name": "DSA-099",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2002/dsa-099"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-0006",
"datePublished": "2003-04-02T05:00:00",
"dateReserved": "2002-01-08T00:00:00",
"dateUpdated": "2024-08-08T02:35:17.591Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-0828 (GCVE-0-2012-0828)
Vulnerability from nvd – Published: 2020-02-21 17:20 – Updated: 2024-08-06 18:38
VLAI?
Summary
Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the Basic Multilingual Plane (BMP).
Severity ?
No CVSS data available.
CWE
- Heap-based buffer overflow by processing UTF-8 line from server containing characters outside BMP
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T18:38:14.795Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://security-tracker.debian.org/tracker/CVE-2012-0828"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0828"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://access.redhat.com/security/cve/cve-2012-0828"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2012/02/01/9"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Xchat-WDK",
"vendor": "xchat",
"versions": [
{
"status": "affected",
"version": "before 1499-4 (2012-01-18)"
}
]
},
{
"product": "xchat",
"vendor": "xchat",
"versions": [
{
"status": "affected",
"version": "2.8.6 on Maemo architecture"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the Basic Multilingual Plane (BMP)."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Heap-based buffer overflow by processing UTF-8 line from server containing characters outside BMP",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-02-21T17:20:43",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://security-tracker.debian.org/tracker/CVE-2012-0828"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0828"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://access.redhat.com/security/cve/cve-2012-0828"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.openwall.com/lists/oss-security/2012/02/01/9"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2012-0828",
"datePublished": "2020-02-21T17:20:43",
"dateReserved": "2012-01-19T00:00:00",
"dateUpdated": "2024-08-06T18:38:14.795Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-7449 (GCVE-0-2013-7449)
Vulnerability from nvd – Published: 2016-04-21 14:00 – Updated: 2024-08-06 18:09
VLAI?
Summary
The ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T18:09:16.618Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/hexchat/hexchat/commit/c9b63f7f9be01692b03fa15275135a4910a7e02d"
},
{
"name": "USN-2945-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-2945-1"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/hexchat/hexchat/issues/524"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://hexchat.readthedocs.org/en/latest/changelog.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1081839"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-04-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-04-21T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/hexchat/hexchat/commit/c9b63f7f9be01692b03fa15275135a4910a7e02d"
},
{
"name": "USN-2945-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-2945-1"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/hexchat/hexchat/issues/524"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://hexchat.readthedocs.org/en/latest/changelog.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1081839"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-7449",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/hexchat/hexchat/commit/c9b63f7f9be01692b03fa15275135a4910a7e02d",
"refsource": "CONFIRM",
"url": "https://github.com/hexchat/hexchat/commit/c9b63f7f9be01692b03fa15275135a4910a7e02d"
},
{
"name": "USN-2945-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2945-1"
},
{
"name": "https://github.com/hexchat/hexchat/issues/524",
"refsource": "CONFIRM",
"url": "https://github.com/hexchat/hexchat/issues/524"
},
{
"name": "http://hexchat.readthedocs.org/en/latest/changelog.html",
"refsource": "CONFIRM",
"url": "http://hexchat.readthedocs.org/en/latest/changelog.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1081839",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1081839"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-7449",
"datePublished": "2016-04-21T14:00:00",
"dateReserved": "2016-04-06T00:00:00",
"dateUpdated": "2024-08-06T18:09:16.618Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-5129 (GCVE-0-2011-5129)
Vulnerability from nvd – Published: 2012-08-30 22:00 – Updated: 2024-08-07 00:23
VLAI?
Summary
Heap-based buffer overflow in XChat 2.8.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long response string.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T00:23:40.241Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "50820",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/50820"
},
{
"name": "1027468",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1027468"
},
{
"name": "77629",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/77629"
},
{
"name": "18159",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "http://www.exploit-db.com/exploits/18159"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.org/files/107312/xchat-dos.txt"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-11-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in XChat 2.8.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long response string."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-02-14T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "50820",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/50820"
},
{
"name": "1027468",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1027468"
},
{
"name": "77629",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/77629"
},
{
"name": "18159",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "http://www.exploit-db.com/exploits/18159"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.org/files/107312/xchat-dos.txt"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-5129",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based buffer overflow in XChat 2.8.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long response string."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "50820",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/50820"
},
{
"name": "1027468",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1027468"
},
{
"name": "77629",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/77629"
},
{
"name": "18159",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/18159"
},
{
"name": "http://packetstormsecurity.org/files/107312/xchat-dos.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/files/107312/xchat-dos.txt"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-5129",
"datePublished": "2012-08-30T22:00:00",
"dateReserved": "2012-08-30T00:00:00",
"dateUpdated": "2024-08-07T00:23:40.241Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-0315 (GCVE-0-2009-0315)
Vulnerability from nvd – Published: 2009-01-28 11:00 – Updated: 2024-08-07 04:31
VLAI?
Summary
Untrusted search path vulnerability in the Python module in xchat allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T04:31:25.503Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=481560"
},
{
"name": "[oss-security] 20090126 CVE request -- Python \u003c 2.6 PySys_SetArgv issues (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2009/01/26/2"
},
{
"name": "33444",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/33444"
},
{
"name": "MDVSA-2009:059",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:059"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-01-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Untrusted search path vulnerability in the Python module in xchat allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983)."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-02-05T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=481560"
},
{
"name": "[oss-security] 20090126 CVE request -- Python \u003c 2.6 PySys_SetArgv issues (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2009/01/26/2"
},
{
"name": "33444",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/33444"
},
{
"name": "MDVSA-2009:059",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:059"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-0315",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Untrusted search path vulnerability in the Python module in xchat allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=481560",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=481560"
},
{
"name": "[oss-security] 20090126 CVE request -- Python \u003c 2.6 PySys_SetArgv issues (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2009/01/26/2"
},
{
"name": "33444",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/33444"
},
{
"name": "MDVSA-2009:059",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:059"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-0315",
"datePublished": "2009-01-28T11:00:00",
"dateReserved": "2009-01-27T00:00:00",
"dateUpdated": "2024-08-07T04:31:25.503Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-2841 (GCVE-0-2008-2841)
Vulnerability from nvd – Published: 2008-06-24 19:00 – Updated: 2024-08-07 09:14
VLAI?
Summary
Argument injection vulnerability in XChat 2.8.7b and earlier on Windows, when Internet Explorer is used, allows remote attackers to execute arbitrary commands via the --command parameter in an ircs:// URI.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T09:14:14.805Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "29696",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/29696"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://forum.xchat.org/viewtopic.php?t=4218"
},
{
"name": "xchat-ircs-command-execution(43065)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43065"
},
{
"name": "5795",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/5795"
},
{
"name": "30695",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/30695"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-06-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Argument injection vulnerability in XChat 2.8.7b and earlier on Windows, when Internet Explorer is used, allows remote attackers to execute arbitrary commands via the --command parameter in an ircs:// URI."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-09-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "29696",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/29696"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://forum.xchat.org/viewtopic.php?t=4218"
},
{
"name": "xchat-ircs-command-execution(43065)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43065"
},
{
"name": "5795",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/5795"
},
{
"name": "30695",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/30695"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-2841",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Argument injection vulnerability in XChat 2.8.7b and earlier on Windows, when Internet Explorer is used, allows remote attackers to execute arbitrary commands via the --command parameter in an ircs:// URI."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "29696",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29696"
},
{
"name": "http://forum.xchat.org/viewtopic.php?t=4218",
"refsource": "CONFIRM",
"url": "http://forum.xchat.org/viewtopic.php?t=4218"
},
{
"name": "xchat-ircs-command-execution(43065)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43065"
},
{
"name": "5795",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5795"
},
{
"name": "30695",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30695"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-2841",
"datePublished": "2008-06-24T19:00:00",
"dateReserved": "2008-06-24T00:00:00",
"dateUpdated": "2024-08-07T09:14:14.805Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-4455 (GCVE-0-2006-4455)
Vulnerability from nvd – Published: 2006-08-30 15:00 – Updated: 2024-08-07 19:14
VLAI?
Summary
Unspecified vulnerability in Xchat 2.6.7 and earlier allows remote attackers to cause a denial of service (crash) via unspecified vectors involving the PRIVMSG command. NOTE: the vendor has disputed this vulnerability, stating that it does not affect 2.6.7 "or any recent version"
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T19:14:46.691Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "xchat-privmsg-dos(28325)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28325"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.xchat.org/"
},
{
"name": "19398",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/19398"
},
{
"name": "2124",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/2124"
},
{
"name": "20060809 XChat \u003c= 2.6.4-1 (win version) Remote Denial of Service Exploit (php)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=115523184321922\u0026w=2"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://forum.xchat.org/viewtopic.php?t=2918"
},
{
"name": "2147",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/2147"
},
{
"name": "1016687",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016687"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-08-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Xchat 2.6.7 and earlier allows remote attackers to cause a denial of service (crash) via unspecified vectors involving the PRIVMSG command. NOTE: the vendor has disputed this vulnerability, stating that it does not affect 2.6.7 \"or any recent version\""
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-10-18T16:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "xchat-privmsg-dos(28325)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28325"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.xchat.org/"
},
{
"name": "19398",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/19398"
},
{
"name": "2124",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/2124"
},
{
"name": "20060809 XChat \u003c= 2.6.4-1 (win version) Remote Denial of Service Exploit (php)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=115523184321922\u0026w=2"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://forum.xchat.org/viewtopic.php?t=2918"
},
{
"name": "2147",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/2147"
},
{
"name": "1016687",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016687"
}
],
"tags": [
"disputed"
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-4455",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** DISPUTED ** Unspecified vulnerability in Xchat 2.6.7 and earlier allows remote attackers to cause a denial of service (crash) via unspecified vectors involving the PRIVMSG command. NOTE: the vendor has disputed this vulnerability, stating that it does not affect 2.6.7 \"or any recent version\"."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "xchat-privmsg-dos(28325)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28325"
},
{
"name": "http://www.xchat.org/",
"refsource": "MISC",
"url": "http://www.xchat.org/"
},
{
"name": "19398",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19398"
},
{
"name": "2124",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2124"
},
{
"name": "20060809 XChat \u003c= 2.6.4-1 (win version) Remote Denial of Service Exploit (php)",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=115523184321922\u0026w=2"
},
{
"name": "http://forum.xchat.org/viewtopic.php?t=2918",
"refsource": "MISC",
"url": "http://forum.xchat.org/viewtopic.php?t=2918"
},
{
"name": "2147",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2147"
},
{
"name": "1016687",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016687"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-4455",
"datePublished": "2006-08-30T15:00:00",
"dateReserved": "2006-08-30T00:00:00",
"dateUpdated": "2024-08-07T19:14:46.691Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2001-0792 (GCVE-0-2001-0792)
Vulnerability from nvd – Published: 2004-09-01 04:00 – Updated: 2024-08-08 04:30
VLAI?
Summary
Format string vulnerability in XChat 1.2.x allows remote attackers to execute arbitrary code via a malformed nickname.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T04:30:06.187Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.securiteam.com/exploits/5AP0Q2A4AQ.html"
},
{
"name": "xchat-nickname-format-string(7416)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7416"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2001-05-29T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Format string vulnerability in XChat 1.2.x allows remote attackers to execute arbitrary code via a malformed nickname."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2002-03-01T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.securiteam.com/exploits/5AP0Q2A4AQ.html"
},
{
"name": "xchat-nickname-format-string(7416)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7416"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2001-0792",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Format string vulnerability in XChat 1.2.x allows remote attackers to execute arbitrary code via a malformed nickname."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.securiteam.com/exploits/5AP0Q2A4AQ.html",
"refsource": "MISC",
"url": "http://www.securiteam.com/exploits/5AP0Q2A4AQ.html"
},
{
"name": "xchat-nickname-format-string(7416)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7416"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2001-0792",
"datePublished": "2004-09-01T04:00:00",
"dateReserved": "2001-10-12T00:00:00",
"dateUpdated": "2024-08-08T04:30:06.187Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2004-0409 (GCVE-0-2004-0409)
Vulnerability from nvd – Published: 2004-04-17 04:00 – Updated: 2024-08-08 00:17
VLAI?
Summary
Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T00:17:14.583Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2004:177",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2004-177.html"
},
{
"name": "DSA-493",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2004/dsa-493"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.xchat.org/"
},
{
"name": "RHSA-2004:585",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2004-585.html"
},
{
"name": "GLSA-200404-15",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200404-15.xml"
},
{
"name": "FLSA:123013",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_123013"
},
{
"name": "oval:org.mitre.oval:def:11312",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11312"
},
{
"name": "[xchat-announce] 20040405 xchat 2.0.x Socks5 Vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2004-04-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-10-10T00:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "RHSA-2004:177",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2004-177.html"
},
{
"name": "DSA-493",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2004/dsa-493"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.xchat.org/"
},
{
"name": "RHSA-2004:585",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2004-585.html"
},
{
"name": "GLSA-200404-15",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200404-15.xml"
},
{
"name": "FLSA:123013",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_123013"
},
{
"name": "oval:org.mitre.oval:def:11312",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11312"
},
{
"name": "[xchat-announce] 20040405 xchat 2.0.x Socks5 Vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2004-0409",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2004:177",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2004-177.html"
},
{
"name": "DSA-493",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2004/dsa-493"
},
{
"name": "http://www.xchat.org/",
"refsource": "CONFIRM",
"url": "http://www.xchat.org/"
},
{
"name": "RHSA-2004:585",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2004-585.html"
},
{
"name": "GLSA-200404-15",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200404-15.xml"
},
{
"name": "FLSA:123013",
"refsource": "FEDORA",
"url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_123013"
},
{
"name": "oval:org.mitre.oval:def:11312",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11312"
},
{
"name": "[xchat-announce] 20040405 xchat 2.0.x Socks5 Vulnerability",
"refsource": "MLIST",
"url": "http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2004-0409",
"datePublished": "2004-04-17T04:00:00",
"dateReserved": "2004-04-16T00:00:00",
"dateUpdated": "2024-08-08T00:17:14.583Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2003-1000 (GCVE-0-2003-1000)
Vulnerability from nvd – Published: 2003-12-17 05:00 – Updated: 2024-08-08 02:12
VLAI?
Summary
xchat 2.0.6 allows remote attackers to cause a denial of service (crash) via a passive DCC request with an invalid ID number, which causes a null dereference.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T02:12:35.459Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html"
},
{
"name": "20031214 GLSA: Malformed dcc send requests in xchat-2.0.6 lead to a denial of service",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=107152093419276\u0026w=2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2003-12-14T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "xchat 2.0.6 allows remote attackers to cause a denial of service (crash) via a passive DCC request with an invalid ID number, which causes a null dereference."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-10-17T13:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html"
},
{
"name": "20031214 GLSA: Malformed dcc send requests in xchat-2.0.6 lead to a denial of service",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=107152093419276\u0026w=2"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2003-1000",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "xchat 2.0.6 allows remote attackers to cause a denial of service (crash) via a passive DCC request with an invalid ID number, which causes a null dereference."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html",
"refsource": "CONFIRM",
"url": "http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html"
},
{
"name": "20031214 GLSA: Malformed dcc send requests in xchat-2.0.6 lead to a denial of service",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=107152093419276\u0026w=2"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2003-1000",
"datePublished": "2003-12-17T05:00:00",
"dateReserved": "2003-12-16T00:00:00",
"dateUpdated": "2024-08-08T02:12:35.459Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2002-0382 (GCVE-0-2002-0382)
Vulnerability from nvd – Published: 2003-04-02 05:00 – Updated: 2024-08-08 02:49
VLAI?
Summary
XChat IRC client allows remote attackers to execute arbitrary commands via a /dns command on a host whose DNS reverse lookup contains shell metacharacters.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T02:49:27.848Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2002:097",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2002-097.html"
},
{
"name": "xchat-dns-execute-commands(8704)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/8704.php"
},
{
"name": "RHSA-2002:124",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2002-124.html"
},
{
"name": "CLA-2002:526",
"tags": [
"vendor-advisory",
"x_refsource_CONECTIVA",
"x_transferred"
],
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000526"
},
{
"name": "MDKSA-2002:051",
"tags": [
"vendor-advisory",
"x_refsource_MANDRAKE",
"x_transferred"
],
"url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-051.php"
},
{
"name": "4376",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/4376"
},
{
"name": "20020327 Xchat /dns command execution vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=101725430425490\u0026w=2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2002-03-27T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "XChat IRC client allows remote attackers to execute arbitrary commands via a /dns command on a host whose DNS reverse lookup contains shell metacharacters."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2003-03-20T00:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "RHSA-2002:097",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2002-097.html"
},
{
"name": "xchat-dns-execute-commands(8704)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/8704.php"
},
{
"name": "RHSA-2002:124",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2002-124.html"
},
{
"name": "CLA-2002:526",
"tags": [
"vendor-advisory",
"x_refsource_CONECTIVA"
],
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000526"
},
{
"name": "MDKSA-2002:051",
"tags": [
"vendor-advisory",
"x_refsource_MANDRAKE"
],
"url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-051.php"
},
{
"name": "4376",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/4376"
},
{
"name": "20020327 Xchat /dns command execution vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=101725430425490\u0026w=2"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-0382",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "XChat IRC client allows remote attackers to execute arbitrary commands via a /dns command on a host whose DNS reverse lookup contains shell metacharacters."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2002:097",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2002-097.html"
},
{
"name": "xchat-dns-execute-commands(8704)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/8704.php"
},
{
"name": "RHSA-2002:124",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2002-124.html"
},
{
"name": "CLA-2002:526",
"refsource": "CONECTIVA",
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000526"
},
{
"name": "MDKSA-2002:051",
"refsource": "MANDRAKE",
"url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-051.php"
},
{
"name": "4376",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/4376"
},
{
"name": "20020327 Xchat /dns command execution vulnerability",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=101725430425490\u0026w=2"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-0382",
"datePublished": "2003-04-02T05:00:00",
"dateReserved": "2002-05-21T00:00:00",
"dateUpdated": "2024-08-08T02:49:27.848Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2002-0006 (GCVE-0-2002-0006)
Vulnerability from nvd – Published: 2003-04-02 05:00 – Updated: 2024-08-08 02:35
VLAI?
Summary
XChat 1.8.7 and earlier, including default configurations of 1.4.2 and 1.4.3, allows remote attackers to execute arbitrary IRC commands as other clients via encoded characters in a PRIVMSG command that calls CTCP PING, which expands the characters in the client response when the percascii variable is set.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T02:35:17.591Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "xchat-ctcp-ping-command(7856)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7856"
},
{
"name": "CLA-2002:453",
"tags": [
"vendor-advisory",
"x_refsource_CONECTIVA",
"x_transferred"
],
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000453"
},
{
"name": "RHSA-2002:005",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2002-005.html"
},
{
"name": "HPSBTL0201-016",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://online.securityfocus.com/advisories/3806"
},
{
"name": "3830",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/3830"
},
{
"name": "20020109 xchat IRC session hijacking vulnerability (versions 1.4.1, 1.4.2)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=101060676210255\u0026w=2"
},
{
"name": "DSA-099",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2002/dsa-099"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2002-01-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "XChat 1.8.7 and earlier, including default configurations of 1.4.2 and 1.4.3, allows remote attackers to execute arbitrary IRC commands as other clients via encoded characters in a PRIVMSG command that calls CTCP PING, which expands the characters in the client response when the percascii variable is set."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2002-05-31T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "xchat-ctcp-ping-command(7856)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7856"
},
{
"name": "CLA-2002:453",
"tags": [
"vendor-advisory",
"x_refsource_CONECTIVA"
],
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000453"
},
{
"name": "RHSA-2002:005",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2002-005.html"
},
{
"name": "HPSBTL0201-016",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://online.securityfocus.com/advisories/3806"
},
{
"name": "3830",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/3830"
},
{
"name": "20020109 xchat IRC session hijacking vulnerability (versions 1.4.1, 1.4.2)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=101060676210255\u0026w=2"
},
{
"name": "DSA-099",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2002/dsa-099"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-0006",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "XChat 1.8.7 and earlier, including default configurations of 1.4.2 and 1.4.3, allows remote attackers to execute arbitrary IRC commands as other clients via encoded characters in a PRIVMSG command that calls CTCP PING, which expands the characters in the client response when the percascii variable is set."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "xchat-ctcp-ping-command(7856)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7856"
},
{
"name": "CLA-2002:453",
"refsource": "CONECTIVA",
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000453"
},
{
"name": "RHSA-2002:005",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2002-005.html"
},
{
"name": "HPSBTL0201-016",
"refsource": "HP",
"url": "http://online.securityfocus.com/advisories/3806"
},
{
"name": "3830",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3830"
},
{
"name": "20020109 xchat IRC session hijacking vulnerability (versions 1.4.1, 1.4.2)",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=101060676210255\u0026w=2"
},
{
"name": "DSA-099",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2002/dsa-099"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-0006",
"datePublished": "2003-04-02T05:00:00",
"dateReserved": "2002-01-08T00:00:00",
"dateUpdated": "2024-08-08T02:35:17.591Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}