All the vulnerabilites related to xchat - xchat
cve-2001-0792
Vulnerability from cvelistv5
Published
2004-09-01 04:00
Modified
2024-08-08 04:30
Severity ?
Summary
Format string vulnerability in XChat 1.2.x allows remote attackers to execute arbitrary code via a malformed nickname.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:30:06.187Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.securiteam.com/exploits/5AP0Q2A4AQ.html"
          },
          {
            "name": "xchat-nickname-format-string(7416)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7416"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-05-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Format string vulnerability in XChat 1.2.x allows remote attackers to execute arbitrary code via a malformed nickname."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2002-03-01T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.securiteam.com/exploits/5AP0Q2A4AQ.html"
        },
        {
          "name": "xchat-nickname-format-string(7416)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7416"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-0792",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Format string vulnerability in XChat 1.2.x allows remote attackers to execute arbitrary code via a malformed nickname."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.securiteam.com/exploits/5AP0Q2A4AQ.html",
              "refsource": "MISC",
              "url": "http://www.securiteam.com/exploits/5AP0Q2A4AQ.html"
            },
            {
              "name": "xchat-nickname-format-string(7416)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7416"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-0792",
    "datePublished": "2004-09-01T04:00:00",
    "dateReserved": "2001-10-12T00:00:00",
    "dateUpdated": "2024-08-08T04:30:06.187Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-5129
Vulnerability from cvelistv5
Published
2012-08-30 22:00
Modified
2024-08-07 00:23
Severity ?
Summary
Heap-based buffer overflow in XChat 2.8.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long response string.
References
http://www.securityfocus.com/bid/50820vdb-entry, x_refsource_BID
http://www.securitytracker.com/id?1027468vdb-entry, x_refsource_SECTRACK
http://www.osvdb.org/77629vdb-entry, x_refsource_OSVDB
http://www.exploit-db.com/exploits/18159exploit, x_refsource_EXPLOIT-DB
http://packetstormsecurity.org/files/107312/xchat-dos.txtx_refsource_MISC
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:23:40.241Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "50820",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/50820"
          },
          {
            "name": "1027468",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1027468"
          },
          {
            "name": "77629",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/77629"
          },
          {
            "name": "18159",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/18159"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.org/files/107312/xchat-dos.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-11-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in XChat 2.8.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long response string."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-02-14T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "50820",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/50820"
        },
        {
          "name": "1027468",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1027468"
        },
        {
          "name": "77629",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/77629"
        },
        {
          "name": "18159",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/18159"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.org/files/107312/xchat-dos.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-5129",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in XChat 2.8.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long response string."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "50820",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/50820"
            },
            {
              "name": "1027468",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1027468"
            },
            {
              "name": "77629",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/77629"
            },
            {
              "name": "18159",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/18159"
            },
            {
              "name": "http://packetstormsecurity.org/files/107312/xchat-dos.txt",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.org/files/107312/xchat-dos.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-5129",
    "datePublished": "2012-08-30T22:00:00",
    "dateReserved": "2012-08-30T00:00:00",
    "dateUpdated": "2024-08-07T00:23:40.241Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2006-4455
Vulnerability from cvelistv5
Published
2006-08-30 15:00
Modified
2024-08-07 19:14
Severity ?
Summary
Unspecified vulnerability in Xchat 2.6.7 and earlier allows remote attackers to cause a denial of service (crash) via unspecified vectors involving the PRIVMSG command. NOTE: the vendor has disputed this vulnerability, stating that it does not affect 2.6.7 "or any recent version"
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/28325vdb-entry, x_refsource_XF
http://www.xchat.org/x_refsource_MISC
http://www.securityfocus.com/bid/19398vdb-entry, x_refsource_BID
https://www.exploit-db.com/exploits/2124exploit, x_refsource_EXPLOIT-DB
http://marc.info/?l=bugtraq&m=115523184321922&w=2mailing-list, x_refsource_BUGTRAQ
http://forum.xchat.org/viewtopic.php?t=2918x_refsource_MISC
https://www.exploit-db.com/exploits/2147exploit, x_refsource_EXPLOIT-DB
http://securitytracker.com/id?1016687vdb-entry, x_refsource_SECTRACK
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:14:46.691Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "xchat-privmsg-dos(28325)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28325"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.xchat.org/"
          },
          {
            "name": "19398",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19398"
          },
          {
            "name": "2124",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/2124"
          },
          {
            "name": "20060809 XChat \u003c= 2.6.4-1 (win version) Remote Denial of Service Exploit (php)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=115523184321922\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://forum.xchat.org/viewtopic.php?t=2918"
          },
          {
            "name": "2147",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/2147"
          },
          {
            "name": "1016687",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016687"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-08-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in Xchat 2.6.7 and earlier allows remote attackers to cause a denial of service (crash) via unspecified vectors involving the PRIVMSG command.  NOTE: the vendor has disputed this vulnerability, stating that it does not affect 2.6.7 \"or any recent version\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-18T16:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "xchat-privmsg-dos(28325)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28325"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.xchat.org/"
        },
        {
          "name": "19398",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19398"
        },
        {
          "name": "2124",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/2124"
        },
        {
          "name": "20060809 XChat \u003c= 2.6.4-1 (win version) Remote Denial of Service Exploit (php)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=115523184321922\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://forum.xchat.org/viewtopic.php?t=2918"
        },
        {
          "name": "2147",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/2147"
        },
        {
          "name": "1016687",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016687"
        }
      ],
      "tags": [
        "disputed"
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4455",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "** DISPUTED **  Unspecified vulnerability in Xchat 2.6.7 and earlier allows remote attackers to cause a denial of service (crash) via unspecified vectors involving the PRIVMSG command.  NOTE: the vendor has disputed this vulnerability, stating that it does not affect 2.6.7 \"or any recent version\"."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "xchat-privmsg-dos(28325)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28325"
            },
            {
              "name": "http://www.xchat.org/",
              "refsource": "MISC",
              "url": "http://www.xchat.org/"
            },
            {
              "name": "19398",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19398"
            },
            {
              "name": "2124",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/2124"
            },
            {
              "name": "20060809 XChat \u003c= 2.6.4-1 (win version) Remote Denial of Service Exploit (php)",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=115523184321922\u0026w=2"
            },
            {
              "name": "http://forum.xchat.org/viewtopic.php?t=2918",
              "refsource": "MISC",
              "url": "http://forum.xchat.org/viewtopic.php?t=2918"
            },
            {
              "name": "2147",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/2147"
            },
            {
              "name": "1016687",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016687"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4455",
    "datePublished": "2006-08-30T15:00:00",
    "dateReserved": "2006-08-30T00:00:00",
    "dateUpdated": "2024-08-07T19:14:46.691Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-2841
Vulnerability from cvelistv5
Published
2008-06-24 19:00
Modified
2024-08-07 09:14
Severity ?
Summary
Argument injection vulnerability in XChat 2.8.7b and earlier on Windows, when Internet Explorer is used, allows remote attackers to execute arbitrary commands via the --command parameter in an ircs:// URI.
References
http://www.securityfocus.com/bid/29696vdb-entry, x_refsource_BID
http://forum.xchat.org/viewtopic.php?t=4218x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/43065vdb-entry, x_refsource_XF
https://www.exploit-db.com/exploits/5795exploit, x_refsource_EXPLOIT-DB
http://secunia.com/advisories/30695third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T09:14:14.805Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "29696",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/29696"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://forum.xchat.org/viewtopic.php?t=4218"
          },
          {
            "name": "xchat-ircs-command-execution(43065)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43065"
          },
          {
            "name": "5795",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/5795"
          },
          {
            "name": "30695",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30695"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-06-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Argument injection vulnerability in XChat 2.8.7b and earlier on Windows, when Internet Explorer is used, allows remote attackers to execute arbitrary commands via the --command parameter in an ircs:// URI."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "29696",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/29696"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://forum.xchat.org/viewtopic.php?t=4218"
        },
        {
          "name": "xchat-ircs-command-execution(43065)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43065"
        },
        {
          "name": "5795",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/5795"
        },
        {
          "name": "30695",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30695"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-2841",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Argument injection vulnerability in XChat 2.8.7b and earlier on Windows, when Internet Explorer is used, allows remote attackers to execute arbitrary commands via the --command parameter in an ircs:// URI."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "29696",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/29696"
            },
            {
              "name": "http://forum.xchat.org/viewtopic.php?t=4218",
              "refsource": "CONFIRM",
              "url": "http://forum.xchat.org/viewtopic.php?t=4218"
            },
            {
              "name": "xchat-ircs-command-execution(43065)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43065"
            },
            {
              "name": "5795",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/5795"
            },
            {
              "name": "30695",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30695"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-2841",
    "datePublished": "2008-06-24T19:00:00",
    "dateReserved": "2008-06-24T00:00:00",
    "dateUpdated": "2024-08-07T09:14:14.805Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-0315
Vulnerability from cvelistv5
Published
2009-01-28 11:00
Modified
2024-08-07 04:31
Severity ?
Summary
Untrusted search path vulnerability in the Python module in xchat allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:31:25.503Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=481560"
          },
          {
            "name": "[oss-security] 20090126 CVE request -- Python \u003c 2.6 PySys_SetArgv issues (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/01/26/2"
          },
          {
            "name": "33444",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/33444"
          },
          {
            "name": "MDVSA-2009:059",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:059"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-01-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Untrusted search path vulnerability in the Python module in xchat allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-02-05T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=481560"
        },
        {
          "name": "[oss-security] 20090126 CVE request -- Python \u003c 2.6 PySys_SetArgv issues (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/01/26/2"
        },
        {
          "name": "33444",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/33444"
        },
        {
          "name": "MDVSA-2009:059",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:059"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-0315",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Untrusted search path vulnerability in the Python module in xchat allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=481560",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=481560"
            },
            {
              "name": "[oss-security] 20090126 CVE request -- Python \u003c 2.6 PySys_SetArgv issues (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2009/01/26/2"
            },
            {
              "name": "33444",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/33444"
            },
            {
              "name": "MDVSA-2009:059",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:059"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-0315",
    "datePublished": "2009-01-28T11:00:00",
    "dateReserved": "2009-01-27T00:00:00",
    "dateUpdated": "2024-08-07T04:31:25.503Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2000-0787
Vulnerability from cvelistv5
Published
2000-10-13 04:00
Modified
2024-08-08 05:28
Severity ?
Summary
IRC Xchat client versions 1.4.2 and earlier allows remote attackers to execute arbitrary commands by encoding shell metacharacters into a URL which XChat uses to launch a web browser.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T05:28:41.567Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20000817 XChat URL handler vulnerabilty",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0215.html"
          },
          {
            "name": "1601",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/1601"
          },
          {
            "name": "20000825 Conectiva Linux Security Announcement - xchat",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0305.html"
          },
          {
            "name": "RHSA-2000:055",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2000-055.html"
          },
          {
            "name": "20000824 MDKSA-2000:039 - xchat update",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0301.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2000-08-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "IRC Xchat client versions 1.4.2 and earlier allows remote attackers to execute arbitrary commands by encoding shell metacharacters into a URL which XChat uses to launch a web browser."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2004-09-02T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20000817 XChat URL handler vulnerabilty",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0215.html"
        },
        {
          "name": "1601",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/1601"
        },
        {
          "name": "20000825 Conectiva Linux Security Announcement - xchat",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0305.html"
        },
        {
          "name": "RHSA-2000:055",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2000-055.html"
        },
        {
          "name": "20000824 MDKSA-2000:039 - xchat update",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0301.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2000-0787",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "IRC Xchat client versions 1.4.2 and earlier allows remote attackers to execute arbitrary commands by encoding shell metacharacters into a URL which XChat uses to launch a web browser."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20000817 XChat URL handler vulnerabilty",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0215.html"
            },
            {
              "name": "1601",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/1601"
            },
            {
              "name": "20000825 Conectiva Linux Security Announcement - xchat",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0305.html"
            },
            {
              "name": "RHSA-2000:055",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2000-055.html"
            },
            {
              "name": "20000824 MDKSA-2000:039 - xchat update",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0301.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2000-0787",
    "datePublished": "2000-10-13T04:00:00",
    "dateReserved": "2000-09-19T00:00:00",
    "dateUpdated": "2024-08-08T05:28:41.567Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2004-0409
Vulnerability from cvelistv5
Published
2004-04-17 04:00
Modified
2024-08-08 00:17
Severity ?
Summary
Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:17:14.583Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2004:177",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2004-177.html"
          },
          {
            "name": "DSA-493",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2004/dsa-493"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.xchat.org/"
          },
          {
            "name": "RHSA-2004:585",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2004-585.html"
          },
          {
            "name": "GLSA-200404-15",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200404-15.xml"
          },
          {
            "name": "FLSA:123013",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_123013"
          },
          {
            "name": "oval:org.mitre.oval:def:11312",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11312"
          },
          {
            "name": "[xchat-announce] 20040405 xchat 2.0.x Socks5 Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-04-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "RHSA-2004:177",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2004-177.html"
        },
        {
          "name": "DSA-493",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2004/dsa-493"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.xchat.org/"
        },
        {
          "name": "RHSA-2004:585",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2004-585.html"
        },
        {
          "name": "GLSA-200404-15",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200404-15.xml"
        },
        {
          "name": "FLSA:123013",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_123013"
        },
        {
          "name": "oval:org.mitre.oval:def:11312",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11312"
        },
        {
          "name": "[xchat-announce] 20040405 xchat 2.0.x Socks5 Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-0409",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "RHSA-2004:177",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2004-177.html"
            },
            {
              "name": "DSA-493",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2004/dsa-493"
            },
            {
              "name": "http://www.xchat.org/",
              "refsource": "CONFIRM",
              "url": "http://www.xchat.org/"
            },
            {
              "name": "RHSA-2004:585",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2004-585.html"
            },
            {
              "name": "GLSA-200404-15",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200404-15.xml"
            },
            {
              "name": "FLSA:123013",
              "refsource": "FEDORA",
              "url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_123013"
            },
            {
              "name": "oval:org.mitre.oval:def:11312",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11312"
            },
            {
              "name": "[xchat-announce] 20040405 xchat 2.0.x Socks5 Vulnerability",
              "refsource": "MLIST",
              "url": "http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-0409",
    "datePublished": "2004-04-17T04:00:00",
    "dateReserved": "2004-04-16T00:00:00",
    "dateUpdated": "2024-08-08T00:17:14.583Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-7449
Vulnerability from cvelistv5
Published
2016-04-21 14:00
Modified
2024-08-06 18:09
Severity ?
Summary
The ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:09:16.618Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/hexchat/hexchat/commit/c9b63f7f9be01692b03fa15275135a4910a7e02d"
          },
          {
            "name": "USN-2945-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2945-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/hexchat/hexchat/issues/524"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://hexchat.readthedocs.org/en/latest/changelog.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1081839"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-04-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-04-21T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/hexchat/hexchat/commit/c9b63f7f9be01692b03fa15275135a4910a7e02d"
        },
        {
          "name": "USN-2945-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2945-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/hexchat/hexchat/issues/524"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://hexchat.readthedocs.org/en/latest/changelog.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1081839"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-7449",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/hexchat/hexchat/commit/c9b63f7f9be01692b03fa15275135a4910a7e02d",
              "refsource": "CONFIRM",
              "url": "https://github.com/hexchat/hexchat/commit/c9b63f7f9be01692b03fa15275135a4910a7e02d"
            },
            {
              "name": "USN-2945-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2945-1"
            },
            {
              "name": "https://github.com/hexchat/hexchat/issues/524",
              "refsource": "CONFIRM",
              "url": "https://github.com/hexchat/hexchat/issues/524"
            },
            {
              "name": "http://hexchat.readthedocs.org/en/latest/changelog.html",
              "refsource": "CONFIRM",
              "url": "http://hexchat.readthedocs.org/en/latest/changelog.html"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1081839",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1081839"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-7449",
    "datePublished": "2016-04-21T14:00:00",
    "dateReserved": "2016-04-06T00:00:00",
    "dateUpdated": "2024-08-06T18:09:16.618Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2002-0382
Vulnerability from cvelistv5
Published
2003-04-02 05:00
Modified
2024-08-08 02:49
Severity ?
Summary
XChat IRC client allows remote attackers to execute arbitrary commands via a /dns command on a host whose DNS reverse lookup contains shell metacharacters.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T02:49:27.848Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2002:097",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2002-097.html"
          },
          {
            "name": "xchat-dns-execute-commands(8704)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/8704.php"
          },
          {
            "name": "RHSA-2002:124",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2002-124.html"
          },
          {
            "name": "CLA-2002:526",
            "tags": [
              "vendor-advisory",
              "x_refsource_CONECTIVA",
              "x_transferred"
            ],
            "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000526"
          },
          {
            "name": "MDKSA-2002:051",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-051.php"
          },
          {
            "name": "4376",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/4376"
          },
          {
            "name": "20020327 Xchat /dns command execution vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=101725430425490\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-03-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "XChat IRC client allows remote attackers to execute arbitrary commands via a /dns command on a host whose DNS reverse lookup contains shell metacharacters."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2003-03-20T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "RHSA-2002:097",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2002-097.html"
        },
        {
          "name": "xchat-dns-execute-commands(8704)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/8704.php"
        },
        {
          "name": "RHSA-2002:124",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2002-124.html"
        },
        {
          "name": "CLA-2002:526",
          "tags": [
            "vendor-advisory",
            "x_refsource_CONECTIVA"
          ],
          "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000526"
        },
        {
          "name": "MDKSA-2002:051",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-051.php"
        },
        {
          "name": "4376",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/4376"
        },
        {
          "name": "20020327 Xchat /dns command execution vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=101725430425490\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-0382",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "XChat IRC client allows remote attackers to execute arbitrary commands via a /dns command on a host whose DNS reverse lookup contains shell metacharacters."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "RHSA-2002:097",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2002-097.html"
            },
            {
              "name": "xchat-dns-execute-commands(8704)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/8704.php"
            },
            {
              "name": "RHSA-2002:124",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2002-124.html"
            },
            {
              "name": "CLA-2002:526",
              "refsource": "CONECTIVA",
              "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000526"
            },
            {
              "name": "MDKSA-2002:051",
              "refsource": "MANDRAKE",
              "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-051.php"
            },
            {
              "name": "4376",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/4376"
            },
            {
              "name": "20020327 Xchat /dns command execution vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=101725430425490\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-0382",
    "datePublished": "2003-04-02T05:00:00",
    "dateReserved": "2002-05-21T00:00:00",
    "dateUpdated": "2024-08-08T02:49:27.848Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2002-0006
Vulnerability from cvelistv5
Published
2003-04-02 05:00
Modified
2024-08-08 02:35
Severity ?
Summary
XChat 1.8.7 and earlier, including default configurations of 1.4.2 and 1.4.3, allows remote attackers to execute arbitrary IRC commands as other clients via encoded characters in a PRIVMSG command that calls CTCP PING, which expands the characters in the client response when the percascii variable is set.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/7856vdb-entry, x_refsource_XF
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000453vendor-advisory, x_refsource_CONECTIVA
http://rhn.redhat.com/errata/RHSA-2002-005.htmlvendor-advisory, x_refsource_REDHAT
http://online.securityfocus.com/advisories/3806vendor-advisory, x_refsource_HP
http://www.securityfocus.com/bid/3830vdb-entry, x_refsource_BID
http://marc.info/?l=bugtraq&m=101060676210255&w=2mailing-list, x_refsource_BUGTRAQ
http://www.debian.org/security/2002/dsa-099vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T02:35:17.591Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "xchat-ctcp-ping-command(7856)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7856"
          },
          {
            "name": "CLA-2002:453",
            "tags": [
              "vendor-advisory",
              "x_refsource_CONECTIVA",
              "x_transferred"
            ],
            "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000453"
          },
          {
            "name": "RHSA-2002:005",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2002-005.html"
          },
          {
            "name": "HPSBTL0201-016",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://online.securityfocus.com/advisories/3806"
          },
          {
            "name": "3830",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/3830"
          },
          {
            "name": "20020109 xchat IRC session hijacking vulnerability (versions 1.4.1, 1.4.2)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=101060676210255\u0026w=2"
          },
          {
            "name": "DSA-099",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2002/dsa-099"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-01-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "XChat 1.8.7 and earlier, including default configurations of 1.4.2 and 1.4.3, allows remote attackers to execute arbitrary IRC commands as other clients via encoded characters in a PRIVMSG command that calls CTCP PING, which expands the characters in the client response when the percascii variable is set."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2002-05-31T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "xchat-ctcp-ping-command(7856)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7856"
        },
        {
          "name": "CLA-2002:453",
          "tags": [
            "vendor-advisory",
            "x_refsource_CONECTIVA"
          ],
          "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000453"
        },
        {
          "name": "RHSA-2002:005",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2002-005.html"
        },
        {
          "name": "HPSBTL0201-016",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://online.securityfocus.com/advisories/3806"
        },
        {
          "name": "3830",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/3830"
        },
        {
          "name": "20020109 xchat IRC session hijacking vulnerability (versions 1.4.1, 1.4.2)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=101060676210255\u0026w=2"
        },
        {
          "name": "DSA-099",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2002/dsa-099"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-0006",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "XChat 1.8.7 and earlier, including default configurations of 1.4.2 and 1.4.3, allows remote attackers to execute arbitrary IRC commands as other clients via encoded characters in a PRIVMSG command that calls CTCP PING, which expands the characters in the client response when the percascii variable is set."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "xchat-ctcp-ping-command(7856)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7856"
            },
            {
              "name": "CLA-2002:453",
              "refsource": "CONECTIVA",
              "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000453"
            },
            {
              "name": "RHSA-2002:005",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2002-005.html"
            },
            {
              "name": "HPSBTL0201-016",
              "refsource": "HP",
              "url": "http://online.securityfocus.com/advisories/3806"
            },
            {
              "name": "3830",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/3830"
            },
            {
              "name": "20020109 xchat IRC session hijacking vulnerability (versions 1.4.1, 1.4.2)",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=101060676210255\u0026w=2"
            },
            {
              "name": "DSA-099",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2002/dsa-099"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-0006",
    "datePublished": "2003-04-02T05:00:00",
    "dateReserved": "2002-01-08T00:00:00",
    "dateUpdated": "2024-08-08T02:35:17.591Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2003-1000
Vulnerability from cvelistv5
Published
2003-12-17 05:00
Modified
2024-08-08 02:12
Severity ?
Summary
xchat 2.0.6 allows remote attackers to cause a denial of service (crash) via a passive DCC request with an invalid ID number, which causes a null dereference.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T02:12:35.459Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html"
          },
          {
            "name": "20031214 GLSA: Malformed dcc send requests in xchat-2.0.6 lead to a denial of service",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=107152093419276\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2003-12-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "xchat 2.0.6 allows remote attackers to cause a denial of service (crash) via a passive DCC request with an invalid ID number, which causes a null dereference."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html"
        },
        {
          "name": "20031214 GLSA: Malformed dcc send requests in xchat-2.0.6 lead to a denial of service",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=107152093419276\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2003-1000",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "xchat 2.0.6 allows remote attackers to cause a denial of service (crash) via a passive DCC request with an invalid ID number, which causes a null dereference."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html",
              "refsource": "CONFIRM",
              "url": "http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html"
            },
            {
              "name": "20031214 GLSA: Malformed dcc send requests in xchat-2.0.6 lead to a denial of service",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=107152093419276\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2003-1000",
    "datePublished": "2003-12-17T05:00:00",
    "dateReserved": "2003-12-16T00:00:00",
    "dateUpdated": "2024-08-08T02:12:35.459Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-0828
Vulnerability from cvelistv5
Published
2020-02-21 17:20
Modified
2024-08-06 18:38
Severity ?
Summary
Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the Basic Multilingual Plane (BMP).
Impacted products
Vendor Product Version
xchat xchat Version: 2.8.6 on Maemo architecture
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:38:14.795Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://security-tracker.debian.org/tracker/CVE-2012-0828"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0828"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/security/cve/cve-2012-0828"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/02/01/9"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Xchat-WDK",
          "vendor": "xchat",
          "versions": [
            {
              "status": "affected",
              "version": "before 1499-4 (2012-01-18)"
            }
          ]
        },
        {
          "product": "xchat",
          "vendor": "xchat",
          "versions": [
            {
              "status": "affected",
              "version": "2.8.6 on Maemo architecture"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the Basic Multilingual Plane (BMP)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Heap-based buffer overflow by processing UTF-8 line from server containing characters outside BMP",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-02-21T17:20:43",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://security-tracker.debian.org/tracker/CVE-2012-0828"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0828"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://access.redhat.com/security/cve/cve-2012-0828"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/02/01/9"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-0828",
    "datePublished": "2020-02-21T17:20:43",
    "dateReserved": "2012-01-19T00:00:00",
    "dateUpdated": "2024-08-06T18:38:14.795Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2008-06-24 19:41
Modified
2024-11-21 00:47
Severity ?
Summary
Argument injection vulnerability in XChat 2.8.7b and earlier on Windows, when Internet Explorer is used, allows remote attackers to execute arbitrary commands via the --command parameter in an ircs:// URI.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED27882B-A02A-4D5F-9117-A47976C676E0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8682FAF3-98E3-485C-89CB-C0358C4E2AB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4CA9E47-EEFB-4484-B4E3-B3E06DEE71F6",
              "versionEndIncluding": "2.8.7b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Argument injection vulnerability in XChat 2.8.7b and earlier on Windows, when Internet Explorer is used, allows remote attackers to execute arbitrary commands via the --command parameter in an ircs:// URI."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de inyecci\u00f3n de argumento en XChat 2.8.7b y versiones anteriores de Windows, cuando Internet Explorer es ejecutado, permite a atacantes remotos ejecutar comandos de su elecci\u00f3n a trav\u00e9s del par\u00e1metro --command en una URI ircs://."
    }
  ],
  "id": "CVE-2008-2841",
  "lastModified": "2024-11-21T00:47:50.170",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-06-24T19:41:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://forum.xchat.org/viewtopic.php?t=4218"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30695"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/29696"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43065"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/5795"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://forum.xchat.org/viewtopic.php?t=4218"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30695"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/29696"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43065"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/5795"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Not vulnerable. This issue did not affect the versions of XChat as shipped with Red Hat Enterprise Linux.",
      "lastModified": "2008-07-07T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-06-01 04:00
Modified
2024-11-20 23:48
Severity ?
Summary
Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code.
Impacted products
Vendor Product Version
xchat xchat 1.8.0
xchat xchat 1.8.1
xchat xchat 1.8.2
xchat xchat 1.8.3
xchat xchat 1.8.4
xchat xchat 1.8.5
xchat xchat 1.8.6
xchat xchat 1.8.7
xchat xchat 1.8.8
xchat xchat 1.8.9
xchat xchat 1.9.0
xchat xchat 1.9.1
xchat xchat 1.9.2
xchat xchat 1.9.3
xchat xchat 1.9.4
xchat xchat 1.9.5
xchat xchat 1.9.6
xchat xchat 1.9.7
xchat xchat 1.9.8
xchat xchat 1.9.9
xchat xchat 2.0.0
xchat xchat 2.0.1
xchat xchat 2.0.2
xchat xchat 2.0.3
xchat xchat 2.0.4
xchat xchat 2.0.5
xchat xchat 2.0.6
xchat xchat 2.0.7
xchat xchat 2.0.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "06627FAB-2A5B-428D-A081-9628DC55E4AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "655D162F-1944-4D88-A2C0-825F7EED0BAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C5454B5-AC2F-4B8E-BC20-2273472D0401",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4BEFD40-62D5-4007-9D35-6865D6482D89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0F904EA-16E1-401B-BD5A-1A9B5B32E6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02490BD-4B30-4213-A03E-443CAEE6C3DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "55162523-7648-4F94-BE7B-0B7E2EE598FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "83CC33D0-37D8-4C9C-BD89-560DFFF77F0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EE28DD-21CB-4DC3-91CE-E74B3D3F0F3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.8.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC2A5D0A-9C46-4631-BE22-472B0E748FB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "62820427-7013-4C10-AC31-BE11764F782F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E19C5E12-5A0B-4225-8409-BEA5BD2CD31B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "90D3F7D0-36F9-42DF-AA2F-658C767F9CAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "90006D01-8C0D-45DA-BF65-901E95C149BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7767D8F8-0AC6-473F-BEFA-0FA3EB88E7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EB78C64-BA92-4B41-83F0-22AF8F26F930",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E2D2DE3-1278-44F9-996D-A2102690D88F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.9.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E571CEA-967E-4A99-B742-80E96C3275B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.9.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFEE0D77-576D-4A80-BD29-39EA6602C2AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.9.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3221D9F-F47B-4DD5-8328-EBFC27549F98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6109751-01D8-4585-A19C-F4F0D03FB82A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "10CFC601-73D7-4341-9606-D02128B86F8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "14124429-8DF7-44BB-8CBB-C4E04DB4FD99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F7D59F-A504-45B7-B8D8-6F3AB799788A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72AF16EE-1B98-448F-8575-1EABFCD7CBEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB08B68B-C557-4285-9AAD-226EADD84DC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2191D045-A2A9-47E0-A5CB-A4FF7C7D7179",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "638F3791-6343-498F-9BE2-73175606F6F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EFB0F36-CFF1-41F8-AC43-D00165639DBE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code."
    }
  ],
  "id": "CVE-2004-0409",
  "lastModified": "2024-11-20T23:48:31.653",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-06-01T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200404-15.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_123013"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2004-177.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2004-585.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.xchat.org/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11312"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.debian.org/security/2004/dsa-493"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200404-15.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_123013"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2004-177.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2004-585.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.xchat.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11312"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.debian.org/security/2004/dsa-493"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-01-28 11:30
Modified
2024-11-21 00:59
Severity ?
Summary
Untrusted search path vulnerability in the Python module in xchat allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).
Impacted products
Vendor Product Version
xchat xchat *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:xchat:xchat:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BA25432-EBEC-42F3-A220-C830A13A3971",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Untrusted search path vulnerability in the Python module in xchat allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983)."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de ruta de b\u00fasqueda no confiable en el m\u00f3dulo Python en xchat permite a usuarios locales ejecutar c\u00f3digo arbitrario a trav\u00e9s de un troyano en un fichero Python en el directorio de trabajo activo, relativo a la vulnerabilidad de la funci\u00f3n PySys_SetArgv (CVE-2008-5983)."
    }
  ],
  "id": "CVE-2009-0315",
  "lastModified": "2024-11-21T00:59:36.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.9,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-01-28T11:30:00.280",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:059"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2009/01/26/2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/33444"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=481560"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:059"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2009/01/26/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/33444"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=481560"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-08-30 16:04
Modified
2024-11-21 00:15
Severity ?
Summary
Unspecified vulnerability in Xchat 2.6.7 and earlier allows remote attackers to cause a denial of service (crash) via unspecified vectors involving the PRIVMSG command. NOTE: the vendor has disputed this vulnerability, stating that it does not affect 2.6.7 "or any recent version"
Impacted products
Vendor Product Version
xchat xchat *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:xchat:xchat:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2E899A7-0064-4015-9CDC-7532F763DE1E",
              "versionEndIncluding": "2.6.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [
    {
      "sourceIdentifier": "cve@mitre.org",
      "tags": [
        "disputed"
      ]
    }
  ],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in Xchat 2.6.7 and earlier allows remote attackers to cause a denial of service (crash) via unspecified vectors involving the PRIVMSG command.  NOTE: the vendor has disputed this vulnerability, stating that it does not affect 2.6.7 \"or any recent version\""
    },
    {
      "lang": "es",
      "value": "** IMPUGNADA ** Vulnerabilidad no especificada en Xchat 2.6.7 y anteriores permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante vectores no especificados implicando el comando PRIVMSG. NOTA: el vendedor ha impugnado esta vulnerabilidad, afirmando que no afecta a la 2.6.7 \"ni a ninguna versi\u00f3n reciente\"."
    }
  ],
  "id": "CVE-2006-4455",
  "lastModified": "2024-11-21T00:15:59.330",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-08-30T16:04:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://forum.xchat.org/viewtopic.php?t=2918"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=115523184321922\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016687"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/19398"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.xchat.org/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28325"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/2124"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/2147"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://forum.xchat.org/viewtopic.php?t=2918"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=115523184321922\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016687"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/19398"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.xchat.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28325"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/2124"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/2147"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-30 22:55
Modified
2024-11-21 01:33
Severity ?
Summary
Heap-based buffer overflow in XChat 2.8.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long response string.
Impacted products
Vendor Product Version
xchat xchat *
xchat xchat 1.2.1
xchat xchat 1.3.9
xchat xchat 1.3.10
xchat xchat 1.3.11
xchat xchat 1.3.12
xchat xchat 1.3.13
xchat xchat 1.4
xchat xchat 1.4.1
xchat xchat 1.4.2
xchat xchat 1.4.3
xchat xchat 1.5.6
xchat xchat 1.8.0
xchat xchat 1.8.1
xchat xchat 1.8.2
xchat xchat 1.8.3
xchat xchat 1.8.4
xchat xchat 1.8.5
xchat xchat 1.8.6
xchat xchat 1.8.7
xchat xchat 1.8.8
xchat xchat 1.8.9
xchat xchat 1.9.0
xchat xchat 1.9.1
xchat xchat 1.9.2
xchat xchat 1.9.3
xchat xchat 1.9.4
xchat xchat 1.9.5
xchat xchat 1.9.6
xchat xchat 1.9.7
xchat xchat 1.9.8
xchat xchat 1.9.9
xchat xchat 2.0.0
xchat xchat 2.0.1
xchat xchat 2.0.2
xchat xchat 2.0.3
xchat xchat 2.0.4
xchat xchat 2.0.5
xchat xchat 2.0.6
xchat xchat 2.0.7
xchat xchat 2.0.8
xchat xchat 2.6.7
xchat xchat 2.8.0
xchat xchat 2.8.1
xchat xchat 2.8.3
xchat xchat 2.8.3
xchat xchat 2.8.3
xchat xchat 2.8.4
xchat xchat 2.8.5
xchat xchat 2.8.5
xchat xchat 2.8.6
xchat xchat 2.8.7
xchat xchat 2.8.7
xchat xchat 2.8.7
xchat xchat 2.8.7
xchat xchat 2.8.7
xchat xchat 2.8.7
xchat xchat 2.8.7b
xchat xchat 2.8.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:xchat:xchat:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "251F8C65-B10B-477E-86B0-43821EB35A95",
              "versionEndIncluding": "2.8.9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B8C5104-52ED-42EC-97A5-05D345597496",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAF68327-9D45-41F3-B120-C9E71A0A3259",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "07373BC7-F34E-47A2-9057-64C04C45EA26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "F18504E4-03C8-45C9-B89D-86327D5663D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F6EE47C-0AE8-4CCD-8A2D-54E55BE9C7D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "103E7180-AFF5-4EBF-A9FD-EFE2A6C00256",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D371520F-1F2D-4EAB-A4D1-5CD13DBF6C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CA8BBE2-4ABE-4574-9BD7-A26F2FF25333",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "74588BF3-4DA4-410B-8416-C90E7F446238",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "07D90F28-4BD2-4581-A8B7-ED90A9ECEF53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "721836E8-A4B6-46D6-BEDD-9B269DDB0525",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "06627FAB-2A5B-428D-A081-9628DC55E4AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "655D162F-1944-4D88-A2C0-825F7EED0BAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C5454B5-AC2F-4B8E-BC20-2273472D0401",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4BEFD40-62D5-4007-9D35-6865D6482D89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0F904EA-16E1-401B-BD5A-1A9B5B32E6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02490BD-4B30-4213-A03E-443CAEE6C3DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "55162523-7648-4F94-BE7B-0B7E2EE598FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "83CC33D0-37D8-4C9C-BD89-560DFFF77F0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "64EE28DD-21CB-4DC3-91CE-E74B3D3F0F3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.8.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC2A5D0A-9C46-4631-BE22-472B0E748FB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "62820427-7013-4C10-AC31-BE11764F782F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E19C5E12-5A0B-4225-8409-BEA5BD2CD31B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "90D3F7D0-36F9-42DF-AA2F-658C767F9CAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "90006D01-8C0D-45DA-BF65-901E95C149BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7767D8F8-0AC6-473F-BEFA-0FA3EB88E7CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EB78C64-BA92-4B41-83F0-22AF8F26F930",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E2D2DE3-1278-44F9-996D-A2102690D88F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.9.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E571CEA-967E-4A99-B742-80E96C3275B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.9.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFEE0D77-576D-4A80-BD29-39EA6602C2AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.9.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3221D9F-F47B-4DD5-8328-EBFC27549F98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6109751-01D8-4585-A19C-F4F0D03FB82A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "10CFC601-73D7-4341-9606-D02128B86F8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "14124429-8DF7-44BB-8CBB-C4E04DB4FD99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F7D59F-A504-45B7-B8D8-6F3AB799788A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "72AF16EE-1B98-448F-8575-1EABFCD7CBEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB08B68B-C557-4285-9AAD-226EADD84DC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2191D045-A2A9-47E0-A5CB-A4FF7C7D7179",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "638F3791-6343-498F-9BE2-73175606F6F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EFB0F36-CFF1-41F8-AC43-D00165639DBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "673B2CA0-C2D3-441C-9946-7FE12FB4BCBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C2CE006-DAA0-40BA-A291-EBBC07147D68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D92D905-9E86-40CE-ADF1-F561A2FC2F94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8649CA9A-87C6-4C89-A47A-2BE3E1025447",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.8.3:c:*:*:*:*:*:*",
              "matchCriteriaId": "096F6B6A-E7A7-439C-BB04-D53D345B5936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.8.3:e:*:*:*:*:*:*",
              "matchCriteriaId": "35FBBED7-FF29-411B-BE9A-C499D3CF64C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "795E05AC-3F7B-41A9-B3DE-D8A375873642",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.8.5:b:*:*:*:*:*:*",
              "matchCriteriaId": "37C966CE-BA65-408F-BE1E-006F0C3DBAD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.8.5:e:*:*:*:*:*:*",
              "matchCriteriaId": "4048F9F4-E94D-445A-A228-5899A5CE7BCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FF7EF6E-C303-45F0-83B3-149EF2B269BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.8.7:a:*:*:*:*:*:*",
              "matchCriteriaId": "036260CB-9B35-41D4-BF8D-1FF55F3851C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.8.7:b:*:*:*:*:*:*",
              "matchCriteriaId": "2215683D-9A27-47BC-A39F-92C134A236A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.8.7:c:*:*:*:*:*:*",
              "matchCriteriaId": "ABDDDBC6-8A14-4596-9811-C202C48AA8E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.8.7:d:*:*:*:*:*:*",
              "matchCriteriaId": "D212BF9E-CC88-48A9-B336-FECEC0672114",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.8.7:e:*:*:*:*:*:*",
              "matchCriteriaId": "AEB4C892-87AA-4211-9B7B-9FA3E70F6DF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.8.7:f:*:*:*:*:*:*",
              "matchCriteriaId": "B689B885-363C-46FC-9EE5-2DC1EE617102",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.8.7b:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9A942FC-C19B-4585-91AF-8ECFD6D76CBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9923817-4F47-4622-BF41-B9391006F698",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in XChat 2.8.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long response string."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en XChat v2.8.9 y anterior permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente la ejecuci\u00f3n de c\u00f3digo arbitrario a trav\u00e9s de una cadena de respuesta larga."
    }
  ],
  "id": "CVE-2011-5129",
  "lastModified": "2024-11-21T01:33:42.420",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-08-30T22:55:03.733",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://packetstormsecurity.org/files/107312/xchat-dos.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/18159"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/77629"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/50820"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1027468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://packetstormsecurity.org/files/107312/xchat-dos.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/18159"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/77629"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/50820"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1027468"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2002-06-25 04:00
Modified
2024-11-20 23:38
Severity ?
Summary
XChat IRC client allows remote attackers to execute arbitrary commands via a /dns command on a host whose DNS reverse lookup contains shell metacharacters.
Impacted products
Vendor Product Version
xchat xchat *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:xchat:xchat:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CC0E3DA-D2F6-4A46-A328-D1F0CDBE071F",
              "versionEndIncluding": "1.89",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "XChat IRC client allows remote attackers to execute arbitrary commands via a /dns command on a host whose DNS reverse lookup contains shell metacharacters."
    }
  ],
  "id": "CVE-2002-0382",
  "lastModified": "2024-11-20T23:38:56.957",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-06-25T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000526"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=101725430425490\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.iss.net/security_center/static/8704.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-051.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2002-097.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2002-124.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/4376"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000526"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=101725430425490\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.iss.net/security_center/static/8704.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-051.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2002-097.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2002-124.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/4376"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2002-06-25 04:00
Modified
2024-11-20 23:38
Severity ?
Summary
XChat 1.8.7 and earlier, including default configurations of 1.4.2 and 1.4.3, allows remote attackers to execute arbitrary IRC commands as other clients via encoded characters in a PRIVMSG command that calls CTCP PING, which expands the characters in the client response when the percascii variable is set.
Impacted products
Vendor Product Version
xchat xchat 1.4.2
xchat xchat 1.4.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "74588BF3-4DA4-410B-8416-C90E7F446238",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "07D90F28-4BD2-4581-A8B7-ED90A9ECEF53",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "XChat 1.8.7 and earlier, including default configurations of 1.4.2 and 1.4.3, allows remote attackers to execute arbitrary IRC commands as other clients via encoded characters in a PRIVMSG command that calls CTCP PING, which expands the characters in the client response when the percascii variable is set."
    }
  ],
  "id": "CVE-2002-0006",
  "lastModified": "2024-11-20T23:38:04.710",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-06-25T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000453"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=101060676210255\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://online.securityfocus.com/advisories/3806"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2002-005.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2002/dsa-099"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/3830"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7856"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000453"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=101060676210255\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://online.securityfocus.com/advisories/3806"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2002-005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2002/dsa-099"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/3830"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7856"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-01-05 05:00
Modified
2024-11-20 23:46
Summary
xchat 2.0.6 allows remote attackers to cause a denial of service (crash) via a passive DCC request with an invalid ID number, which causes a null dereference.
Impacted products
Vendor Product Version
xchat xchat 2.0.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:xchat:xchat:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2191D045-A2A9-47E0-A5CB-A4FF7C7D7179",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "xchat 2.0.6 allows remote attackers to cause a denial of service (crash) via a passive DCC request with an invalid ID number, which causes a null dereference."
    },
    {
      "lang": "es",
      "value": "xchat 2.0.6 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) mediante una petici\u00f3n DCC pasiva con n\u00famero ID inv\u00e1lido, lo que causa una desreferencia nula."
    }
  ],
  "id": "CVE-2003-1000",
  "lastModified": "2024-11-20T23:46:07.173",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2004-01-05T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=107152093419276\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=107152093419276\u0026w=2"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2000-10-20 04:00
Modified
2024-11-20 23:33
Severity ?
Summary
IRC Xchat client versions 1.4.2 and earlier allows remote attackers to execute arbitrary commands by encoding shell metacharacters into a URL which XChat uses to launch a web browser.
Impacted products
Vendor Product Version
xchat xchat 1.2.1
xchat xchat 1.3.9
xchat xchat 1.3.10
xchat xchat 1.3.11
xchat xchat 1.3.12
xchat xchat 1.3.13
xchat xchat 1.4
xchat xchat 1.4.1
xchat xchat 1.4.2
xchat xchat 1.5.6
xchat xchat 1.5.xdev



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B8C5104-52ED-42EC-97A5-05D345597496",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAF68327-9D45-41F3-B120-C9E71A0A3259",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "07373BC7-F34E-47A2-9057-64C04C45EA26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "F18504E4-03C8-45C9-B89D-86327D5663D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F6EE47C-0AE8-4CCD-8A2D-54E55BE9C7D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "103E7180-AFF5-4EBF-A9FD-EFE2A6C00256",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D371520F-1F2D-4EAB-A4D1-5CD13DBF6C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CA8BBE2-4ABE-4574-9BD7-A26F2FF25333",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "74588BF3-4DA4-410B-8416-C90E7F446238",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "721836E8-A4B6-46D6-BEDD-9B269DDB0525",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.5.xdev:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C27A32-761C-4413-8856-6689150BBB4A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IRC Xchat client versions 1.4.2 and earlier allows remote attackers to execute arbitrary commands by encoding shell metacharacters into a URL which XChat uses to launch a web browser."
    }
  ],
  "id": "CVE-2000-0787",
  "lastModified": "2024-11-20T23:33:17.223",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2000-10-20T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0215.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0301.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0305.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2000-055.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/1601"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0215.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0301.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0305.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2000-055.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/1601"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-04-21 14:59
Modified
2024-11-21 02:01
Summary
The ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:xchat:xchat:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E75FBE-44C2-4B3D-8CAF-D35985102334",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat_gnome:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECAEB82-4F89-41F9-9A04-BB5422617719",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hexchat_project:hexchat:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "92B8E913-CA39-4610-A20A-9E4619DA1209",
              "versionEndIncluding": "2.10.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n ssl_do_connect en common/server.c en HexChat en versiones anteriores a 2.10.2, XChat y XChat-GNOME no verifica que el nombre de host del servidor coincide con un nombre de dominio en el certificado X.509, lo que permite a atacantes man-in-the-middle suplantar servidores SSL a trav\u00e9s de un certificado v\u00e1lido arbitrario."
    }
  ],
  "id": "CVE-2013-7449",
  "lastModified": "2024-11-21T02:01:01.733",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.5,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-04-21T14:59:00.107",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://hexchat.readthedocs.org/en/latest/changelog.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-2945-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1081839"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://github.com/hexchat/hexchat/commit/c9b63f7f9be01692b03fa15275135a4910a7e02d"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://github.com/hexchat/hexchat/issues/524"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://hexchat.readthedocs.org/en/latest/changelog.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2945-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1081839"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://github.com/hexchat/hexchat/commit/c9b63f7f9be01692b03fa15275135a4910a7e02d"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://github.com/hexchat/hexchat/issues/524"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2001-10-18 04:00
Modified
2024-11-20 23:36
Severity ?
Summary
Format string vulnerability in XChat 1.2.x allows remote attackers to execute arbitrary code via a malformed nickname.
Impacted products
Vendor Product Version
xchat xchat 1.2.x



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:xchat:xchat:1.2.x:*:*:*:*:*:*:*",
              "matchCriteriaId": "949D4D39-2B40-441A-A015-9C8667441ACB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Format string vulnerability in XChat 1.2.x allows remote attackers to execute arbitrary code via a malformed nickname."
    }
  ],
  "id": "CVE-2001-0792",
  "lastModified": "2024-11-20T23:36:10.020",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2001-10-18T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.securiteam.com/exploits/5AP0Q2A4AQ.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7416"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.securiteam.com/exploits/5AP0Q2A4AQ.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7416"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-02-21 18:15
Modified
2024-11-21 01:35
Severity ?
Summary
Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the Basic Multilingual Plane (BMP).
Impacted products
Vendor Product Version
gnome gtk 2.10.4
gnome gtk 2.14.7
gnome gtk 2.18.9
gnome gtk 2.24.7
xchat xchat *
xchat-wdk xchat-wdk *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnome:gtk:2.10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5E89111-4AB1-4A89-9FD2-EC506CA7A2D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:gtk:2.14.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DAAC3F9-6C8A-4F0D-BB2D-E11B7824D254",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:gtk:2.18.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AD6C94D-C4EB-474D-AEB4-A18458507BB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnome:gtk:2.24.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAEB7698-0F5B-44F1-B380-2D2F25FD89CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat:xchat:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "144C01A3-C1C6-4467-8777-BA4C7AC8D0C4",
              "versionEndExcluding": "2.8.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xchat-wdk:xchat-wdk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AAC014F-2966-4507-AD36-C14FD515A652",
              "versionEndExcluding": "1499-4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the Basic Multilingual Plane (BMP)."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento del b\u00fafer en la regi\u00f3n heap de la memoria en xchat versi\u00f3n 2.8.6 sobre la arquitectura Maemo de Xchat-WDK versiones anteriores a 1499-4 (18-01-2012), podr\u00eda permitir a atacantes remotos causar una denegaci\u00f3n de servicio (DoS) (bloqueo del cliente xchat) o ejecutar c\u00f3digo arbitrario por medio de una l\u00ednea UTF-8 desde el servidor que contiene caracteres fuera del Basic Multilingual Plane (BMP)."
    }
  ],
  "id": "CVE-2012-0828",
  "lastModified": "2024-11-21T01:35:48.180",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-02-21T18:15:11.270",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2012/02/01/9"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/cve-2012-0828"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0828"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security-tracker.debian.org/tracker/CVE-2012-0828"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2012/02/01/9"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/cve-2012-0828"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0828"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security-tracker.debian.org/tracker/CVE-2012-0828"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}