All the vulnerabilites related to xchat - xchat
cve-2001-0792
Vulnerability from cvelistv5
Published
2004-09-01 04:00
Modified
2024-08-08 04:30
Severity ?
EPSS score ?
Summary
Format string vulnerability in XChat 1.2.x allows remote attackers to execute arbitrary code via a malformed nickname.
References
▼ | URL | Tags |
---|---|---|
http://www.securiteam.com/exploits/5AP0Q2A4AQ.html | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/7416 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:30:06.187Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.securiteam.com/exploits/5AP0Q2A4AQ.html" }, { "name": "xchat-nickname-format-string(7416)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7416" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-05-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Format string vulnerability in XChat 1.2.x allows remote attackers to execute arbitrary code via a malformed nickname." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-03-01T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.securiteam.com/exploits/5AP0Q2A4AQ.html" }, { "name": "xchat-nickname-format-string(7416)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7416" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0792", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Format string vulnerability in XChat 1.2.x allows remote attackers to execute arbitrary code via a malformed nickname." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.securiteam.com/exploits/5AP0Q2A4AQ.html", "refsource": "MISC", "url": "http://www.securiteam.com/exploits/5AP0Q2A4AQ.html" }, { "name": "xchat-nickname-format-string(7416)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7416" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-0792", "datePublished": "2004-09-01T04:00:00", "dateReserved": "2001-10-12T00:00:00", "dateUpdated": "2024-08-08T04:30:06.187Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-5129
Vulnerability from cvelistv5
Published
2012-08-30 22:00
Modified
2024-08-07 00:23
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in XChat 2.8.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long response string.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/50820 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1027468 | vdb-entry, x_refsource_SECTRACK | |
http://www.osvdb.org/77629 | vdb-entry, x_refsource_OSVDB | |
http://www.exploit-db.com/exploits/18159 | exploit, x_refsource_EXPLOIT-DB | |
http://packetstormsecurity.org/files/107312/xchat-dos.txt | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:23:40.241Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "50820", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/50820" }, { "name": "1027468", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1027468" }, { "name": "77629", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/77629" }, { "name": "18159", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/18159" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.org/files/107312/xchat-dos.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-11-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in XChat 2.8.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long response string." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-02-14T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "50820", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/50820" }, { "name": "1027468", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1027468" }, { "name": "77629", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/77629" }, { "name": "18159", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/18159" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.org/files/107312/xchat-dos.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-5129", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in XChat 2.8.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long response string." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "50820", "refsource": "BID", "url": "http://www.securityfocus.com/bid/50820" }, { "name": "1027468", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1027468" }, { "name": "77629", "refsource": "OSVDB", "url": "http://www.osvdb.org/77629" }, { "name": "18159", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/18159" }, { "name": "http://packetstormsecurity.org/files/107312/xchat-dos.txt", "refsource": "MISC", "url": "http://packetstormsecurity.org/files/107312/xchat-dos.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-5129", "datePublished": "2012-08-30T22:00:00", "dateReserved": "2012-08-30T00:00:00", "dateUpdated": "2024-08-07T00:23:40.241Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-4455
Vulnerability from cvelistv5
Published
2006-08-30 15:00
Modified
2024-08-07 19:14
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Xchat 2.6.7 and earlier allows remote attackers to cause a denial of service (crash) via unspecified vectors involving the PRIVMSG command. NOTE: the vendor has disputed this vulnerability, stating that it does not affect 2.6.7 "or any recent version"
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/28325 | vdb-entry, x_refsource_XF | |
http://www.xchat.org/ | x_refsource_MISC | |
http://www.securityfocus.com/bid/19398 | vdb-entry, x_refsource_BID | |
https://www.exploit-db.com/exploits/2124 | exploit, x_refsource_EXPLOIT-DB | |
http://marc.info/?l=bugtraq&m=115523184321922&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://forum.xchat.org/viewtopic.php?t=2918 | x_refsource_MISC | |
https://www.exploit-db.com/exploits/2147 | exploit, x_refsource_EXPLOIT-DB | |
http://securitytracker.com/id?1016687 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:14:46.691Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "xchat-privmsg-dos(28325)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28325" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.xchat.org/" }, { "name": "19398", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19398" }, { "name": "2124", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/2124" }, { "name": "20060809 XChat \u003c= 2.6.4-1 (win version) Remote Denial of Service Exploit (php)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=115523184321922\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://forum.xchat.org/viewtopic.php?t=2918" }, { "name": "2147", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/2147" }, { "name": "1016687", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016687" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-08-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Xchat 2.6.7 and earlier allows remote attackers to cause a denial of service (crash) via unspecified vectors involving the PRIVMSG command. NOTE: the vendor has disputed this vulnerability, stating that it does not affect 2.6.7 \"or any recent version\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-18T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "xchat-privmsg-dos(28325)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28325" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.xchat.org/" }, { "name": "19398", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19398" }, { "name": "2124", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/2124" }, { "name": "20060809 XChat \u003c= 2.6.4-1 (win version) Remote Denial of Service Exploit (php)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=115523184321922\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://forum.xchat.org/viewtopic.php?t=2918" }, { "name": "2147", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/2147" }, { "name": "1016687", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016687" } ], "tags": [ "disputed" ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-4455", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** DISPUTED ** Unspecified vulnerability in Xchat 2.6.7 and earlier allows remote attackers to cause a denial of service (crash) via unspecified vectors involving the PRIVMSG command. NOTE: the vendor has disputed this vulnerability, stating that it does not affect 2.6.7 \"or any recent version\"." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "xchat-privmsg-dos(28325)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28325" }, { "name": "http://www.xchat.org/", "refsource": "MISC", "url": "http://www.xchat.org/" }, { "name": "19398", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19398" }, { "name": "2124", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/2124" }, { "name": "20060809 XChat \u003c= 2.6.4-1 (win version) Remote Denial of Service Exploit (php)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=115523184321922\u0026w=2" }, { "name": "http://forum.xchat.org/viewtopic.php?t=2918", "refsource": "MISC", "url": "http://forum.xchat.org/viewtopic.php?t=2918" }, { "name": "2147", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/2147" }, { "name": "1016687", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016687" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-4455", "datePublished": "2006-08-30T15:00:00", "dateReserved": "2006-08-30T00:00:00", "dateUpdated": "2024-08-07T19:14:46.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-2841
Vulnerability from cvelistv5
Published
2008-06-24 19:00
Modified
2024-08-07 09:14
Severity ?
EPSS score ?
Summary
Argument injection vulnerability in XChat 2.8.7b and earlier on Windows, when Internet Explorer is used, allows remote attackers to execute arbitrary commands via the --command parameter in an ircs:// URI.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/29696 | vdb-entry, x_refsource_BID | |
http://forum.xchat.org/viewtopic.php?t=4218 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/43065 | vdb-entry, x_refsource_XF | |
https://www.exploit-db.com/exploits/5795 | exploit, x_refsource_EXPLOIT-DB | |
http://secunia.com/advisories/30695 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:14:14.805Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "29696", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/29696" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://forum.xchat.org/viewtopic.php?t=4218" }, { "name": "xchat-ircs-command-execution(43065)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43065" }, { "name": "5795", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/5795" }, { "name": "30695", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30695" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-06-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Argument injection vulnerability in XChat 2.8.7b and earlier on Windows, when Internet Explorer is used, allows remote attackers to execute arbitrary commands via the --command parameter in an ircs:// URI." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "29696", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/29696" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://forum.xchat.org/viewtopic.php?t=4218" }, { "name": "xchat-ircs-command-execution(43065)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43065" }, { "name": "5795", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/5795" }, { "name": "30695", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30695" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-2841", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Argument injection vulnerability in XChat 2.8.7b and earlier on Windows, when Internet Explorer is used, allows remote attackers to execute arbitrary commands via the --command parameter in an ircs:// URI." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "29696", "refsource": "BID", "url": "http://www.securityfocus.com/bid/29696" }, { "name": "http://forum.xchat.org/viewtopic.php?t=4218", "refsource": "CONFIRM", "url": "http://forum.xchat.org/viewtopic.php?t=4218" }, { "name": "xchat-ircs-command-execution(43065)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43065" }, { "name": "5795", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/5795" }, { "name": "30695", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30695" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-2841", "datePublished": "2008-06-24T19:00:00", "dateReserved": "2008-06-24T00:00:00", "dateUpdated": "2024-08-07T09:14:14.805Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-0315
Vulnerability from cvelistv5
Published
2009-01-28 11:00
Modified
2024-08-07 04:31
Severity ?
EPSS score ?
Summary
Untrusted search path vulnerability in the Python module in xchat allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).
References
▼ | URL | Tags |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=481560 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2009/01/26/2 | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/33444 | vdb-entry, x_refsource_BID | |
http://www.mandriva.com/security/advisories?name=MDVSA-2009:059 | vendor-advisory, x_refsource_MANDRIVA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:31:25.503Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=481560" }, { "name": "[oss-security] 20090126 CVE request -- Python \u003c 2.6 PySys_SetArgv issues (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2009/01/26/2" }, { "name": "33444", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/33444" }, { "name": "MDVSA-2009:059", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:059" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-01-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in the Python module in xchat allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-02-05T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=481560" }, { "name": "[oss-security] 20090126 CVE request -- Python \u003c 2.6 PySys_SetArgv issues (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2009/01/26/2" }, { "name": "33444", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/33444" }, { "name": "MDVSA-2009:059", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:059" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-0315", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Untrusted search path vulnerability in the Python module in xchat allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=481560", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=481560" }, { "name": "[oss-security] 20090126 CVE request -- Python \u003c 2.6 PySys_SetArgv issues (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/01/26/2" }, { "name": "33444", "refsource": "BID", "url": "http://www.securityfocus.com/bid/33444" }, { "name": "MDVSA-2009:059", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:059" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-0315", "datePublished": "2009-01-28T11:00:00", "dateReserved": "2009-01-27T00:00:00", "dateUpdated": "2024-08-07T04:31:25.503Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2000-0787
Vulnerability from cvelistv5
Published
2000-10-13 04:00
Modified
2024-08-08 05:28
Severity ?
EPSS score ?
Summary
IRC Xchat client versions 1.4.2 and earlier allows remote attackers to execute arbitrary commands by encoding shell metacharacters into a URL which XChat uses to launch a web browser.
References
▼ | URL | Tags |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2000-08/0215.html | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/1601 | vdb-entry, x_refsource_BID | |
http://archives.neohapsis.com/archives/bugtraq/2000-08/0305.html | mailing-list, x_refsource_BUGTRAQ | |
http://www.redhat.com/support/errata/RHSA-2000-055.html | vendor-advisory, x_refsource_REDHAT | |
http://archives.neohapsis.com/archives/bugtraq/2000-08/0301.html | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:28:41.567Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20000817 XChat URL handler vulnerabilty", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0215.html" }, { "name": "1601", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/1601" }, { "name": "20000825 Conectiva Linux Security Announcement - xchat", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0305.html" }, { "name": "RHSA-2000:055", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2000-055.html" }, { "name": "20000824 MDKSA-2000:039 - xchat update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0301.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-08-17T00:00:00", "descriptions": [ { "lang": "en", "value": "IRC Xchat client versions 1.4.2 and earlier allows remote attackers to execute arbitrary commands by encoding shell metacharacters into a URL which XChat uses to launch a web browser." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2004-09-02T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20000817 XChat URL handler vulnerabilty", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0215.html" }, { "name": "1601", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/1601" }, { "name": "20000825 Conectiva Linux Security Announcement - xchat", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0305.html" }, { "name": "RHSA-2000:055", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2000-055.html" }, { "name": "20000824 MDKSA-2000:039 - xchat update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0301.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0787", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IRC Xchat client versions 1.4.2 and earlier allows remote attackers to execute arbitrary commands by encoding shell metacharacters into a URL which XChat uses to launch a web browser." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20000817 XChat URL handler vulnerabilty", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0215.html" }, { "name": "1601", "refsource": "BID", "url": "http://www.securityfocus.com/bid/1601" }, { "name": "20000825 Conectiva Linux Security Announcement - xchat", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0305.html" }, { "name": "RHSA-2000:055", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2000-055.html" }, { "name": "20000824 MDKSA-2000:039 - xchat update", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0301.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0787", "datePublished": "2000-10-13T04:00:00", "dateReserved": "2000-09-19T00:00:00", "dateUpdated": "2024-08-08T05:28:41.567Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0409
Vulnerability from cvelistv5
Published
2004-04-17 04:00
Modified
2024-08-08 00:17
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code.
References
▼ | URL | Tags |
---|---|---|
http://www.redhat.com/support/errata/RHSA-2004-177.html | vendor-advisory, x_refsource_REDHAT | |
https://www.debian.org/security/2004/dsa-493 | vendor-advisory, x_refsource_DEBIAN | |
http://www.xchat.org/ | x_refsource_CONFIRM | |
http://www.redhat.com/support/errata/RHSA-2004-585.html | vendor-advisory, x_refsource_REDHAT | |
http://security.gentoo.org/glsa/glsa-200404-15.xml | vendor-advisory, x_refsource_GENTOO | |
http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_123013 | vendor-advisory, x_refsource_FEDORA | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11312 | vdb-entry, signature, x_refsource_OVAL | |
http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:17:14.583Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2004:177", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-177.html" }, { "name": "DSA-493", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2004/dsa-493" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.xchat.org/" }, { "name": "RHSA-2004:585", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-585.html" }, { "name": "GLSA-200404-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200404-15.xml" }, { "name": "FLSA:123013", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_123013" }, { "name": "oval:org.mitre.oval:def:11312", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11312" }, { "name": "[xchat-announce] 20040405 xchat 2.0.x Socks5 Vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-04-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2004:177", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-177.html" }, { "name": "DSA-493", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2004/dsa-493" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.xchat.org/" }, { "name": "RHSA-2004:585", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-585.html" }, { "name": "GLSA-200404-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200404-15.xml" }, { "name": "FLSA:123013", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_123013" }, { "name": "oval:org.mitre.oval:def:11312", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11312" }, { "name": "[xchat-announce] 20040405 xchat 2.0.x Socks5 Vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0409", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2004:177", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-177.html" }, { "name": "DSA-493", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2004/dsa-493" }, { "name": "http://www.xchat.org/", "refsource": "CONFIRM", "url": "http://www.xchat.org/" }, { "name": "RHSA-2004:585", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-585.html" }, { "name": "GLSA-200404-15", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200404-15.xml" }, { "name": "FLSA:123013", "refsource": "FEDORA", "url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_123013" }, { "name": "oval:org.mitre.oval:def:11312", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11312" }, { "name": "[xchat-announce] 20040405 xchat 2.0.x Socks5 Vulnerability", "refsource": "MLIST", "url": "http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0409", "datePublished": "2004-04-17T04:00:00", "dateReserved": "2004-04-16T00:00:00", "dateUpdated": "2024-08-08T00:17:14.583Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-7449
Vulnerability from cvelistv5
Published
2016-04-21 14:00
Modified
2024-08-06 18:09
Severity ?
EPSS score ?
Summary
The ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
References
▼ | URL | Tags |
---|---|---|
https://github.com/hexchat/hexchat/commit/c9b63f7f9be01692b03fa15275135a4910a7e02d | x_refsource_CONFIRM | |
http://www.ubuntu.com/usn/USN-2945-1 | vendor-advisory, x_refsource_UBUNTU | |
https://github.com/hexchat/hexchat/issues/524 | x_refsource_CONFIRM | |
http://hexchat.readthedocs.org/en/latest/changelog.html | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=1081839 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:09:16.618Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/hexchat/hexchat/commit/c9b63f7f9be01692b03fa15275135a4910a7e02d" }, { "name": "USN-2945-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2945-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/hexchat/hexchat/issues/524" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://hexchat.readthedocs.org/en/latest/changelog.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1081839" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-04-09T00:00:00", "descriptions": [ { "lang": "en", "value": "The ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-04-21T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/hexchat/hexchat/commit/c9b63f7f9be01692b03fa15275135a4910a7e02d" }, { "name": "USN-2945-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2945-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/hexchat/hexchat/issues/524" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://hexchat.readthedocs.org/en/latest/changelog.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1081839" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-7449", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/hexchat/hexchat/commit/c9b63f7f9be01692b03fa15275135a4910a7e02d", "refsource": "CONFIRM", "url": "https://github.com/hexchat/hexchat/commit/c9b63f7f9be01692b03fa15275135a4910a7e02d" }, { "name": "USN-2945-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2945-1" }, { "name": "https://github.com/hexchat/hexchat/issues/524", "refsource": "CONFIRM", "url": "https://github.com/hexchat/hexchat/issues/524" }, { "name": "http://hexchat.readthedocs.org/en/latest/changelog.html", "refsource": "CONFIRM", "url": "http://hexchat.readthedocs.org/en/latest/changelog.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1081839", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1081839" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-7449", "datePublished": "2016-04-21T14:00:00", "dateReserved": "2016-04-06T00:00:00", "dateUpdated": "2024-08-06T18:09:16.618Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-0382
Vulnerability from cvelistv5
Published
2003-04-02 05:00
Modified
2024-08-08 02:49
Severity ?
EPSS score ?
Summary
XChat IRC client allows remote attackers to execute arbitrary commands via a /dns command on a host whose DNS reverse lookup contains shell metacharacters.
References
▼ | URL | Tags |
---|---|---|
http://www.redhat.com/support/errata/RHSA-2002-097.html | vendor-advisory, x_refsource_REDHAT | |
http://www.iss.net/security_center/static/8704.php | vdb-entry, x_refsource_XF | |
http://www.redhat.com/support/errata/RHSA-2002-124.html | vendor-advisory, x_refsource_REDHAT | |
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000526 | vendor-advisory, x_refsource_CONECTIVA | |
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-051.php | vendor-advisory, x_refsource_MANDRAKE | |
http://www.securityfocus.com/bid/4376 | vdb-entry, x_refsource_BID | |
http://marc.info/?l=bugtraq&m=101725430425490&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:49:27.848Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2002:097", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-097.html" }, { "name": "xchat-dns-execute-commands(8704)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/8704.php" }, { "name": "RHSA-2002:124", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-124.html" }, { "name": "CLA-2002:526", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000526" }, { "name": "MDKSA-2002:051", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-051.php" }, { "name": "4376", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/4376" }, { "name": "20020327 Xchat /dns command execution vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=101725430425490\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "XChat IRC client allows remote attackers to execute arbitrary commands via a /dns command on a host whose DNS reverse lookup contains shell metacharacters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2003-03-20T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2002:097", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-097.html" }, { "name": "xchat-dns-execute-commands(8704)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/8704.php" }, { "name": "RHSA-2002:124", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-124.html" }, { "name": "CLA-2002:526", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000526" }, { "name": "MDKSA-2002:051", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-051.php" }, { "name": "4376", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/4376" }, { "name": "20020327 Xchat /dns command execution vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=101725430425490\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0382", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "XChat IRC client allows remote attackers to execute arbitrary commands via a /dns command on a host whose DNS reverse lookup contains shell metacharacters." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2002:097", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2002-097.html" }, { "name": "xchat-dns-execute-commands(8704)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/8704.php" }, { "name": "RHSA-2002:124", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2002-124.html" }, { "name": "CLA-2002:526", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000526" }, { "name": "MDKSA-2002:051", "refsource": "MANDRAKE", "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-051.php" }, { "name": "4376", "refsource": "BID", "url": "http://www.securityfocus.com/bid/4376" }, { "name": "20020327 Xchat /dns command execution vulnerability", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=101725430425490\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0382", "datePublished": "2003-04-02T05:00:00", "dateReserved": "2002-05-21T00:00:00", "dateUpdated": "2024-08-08T02:49:27.848Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-0006
Vulnerability from cvelistv5
Published
2003-04-02 05:00
Modified
2024-08-08 02:35
Severity ?
EPSS score ?
Summary
XChat 1.8.7 and earlier, including default configurations of 1.4.2 and 1.4.3, allows remote attackers to execute arbitrary IRC commands as other clients via encoded characters in a PRIVMSG command that calls CTCP PING, which expands the characters in the client response when the percascii variable is set.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/7856 | vdb-entry, x_refsource_XF | |
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000453 | vendor-advisory, x_refsource_CONECTIVA | |
http://rhn.redhat.com/errata/RHSA-2002-005.html | vendor-advisory, x_refsource_REDHAT | |
http://online.securityfocus.com/advisories/3806 | vendor-advisory, x_refsource_HP | |
http://www.securityfocus.com/bid/3830 | vdb-entry, x_refsource_BID | |
http://marc.info/?l=bugtraq&m=101060676210255&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.debian.org/security/2002/dsa-099 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:35:17.591Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "xchat-ctcp-ping-command(7856)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7856" }, { "name": "CLA-2002:453", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000453" }, { "name": "RHSA-2002:005", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2002-005.html" }, { "name": "HPSBTL0201-016", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://online.securityfocus.com/advisories/3806" }, { "name": "3830", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/3830" }, { "name": "20020109 xchat IRC session hijacking vulnerability (versions 1.4.1, 1.4.2)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=101060676210255\u0026w=2" }, { "name": "DSA-099", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2002/dsa-099" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-01-09T00:00:00", "descriptions": [ { "lang": "en", "value": "XChat 1.8.7 and earlier, including default configurations of 1.4.2 and 1.4.3, allows remote attackers to execute arbitrary IRC commands as other clients via encoded characters in a PRIVMSG command that calls CTCP PING, which expands the characters in the client response when the percascii variable is set." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-05-31T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "xchat-ctcp-ping-command(7856)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7856" }, { "name": "CLA-2002:453", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000453" }, { "name": "RHSA-2002:005", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2002-005.html" }, { "name": "HPSBTL0201-016", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://online.securityfocus.com/advisories/3806" }, { "name": "3830", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/3830" }, { "name": "20020109 xchat IRC session hijacking vulnerability (versions 1.4.1, 1.4.2)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=101060676210255\u0026w=2" }, { "name": "DSA-099", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2002/dsa-099" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0006", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "XChat 1.8.7 and earlier, including default configurations of 1.4.2 and 1.4.3, allows remote attackers to execute arbitrary IRC commands as other clients via encoded characters in a PRIVMSG command that calls CTCP PING, which expands the characters in the client response when the percascii variable is set." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "xchat-ctcp-ping-command(7856)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7856" }, { "name": "CLA-2002:453", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000453" }, { "name": "RHSA-2002:005", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2002-005.html" }, { "name": "HPSBTL0201-016", "refsource": "HP", "url": "http://online.securityfocus.com/advisories/3806" }, { "name": "3830", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3830" }, { "name": "20020109 xchat IRC session hijacking vulnerability (versions 1.4.1, 1.4.2)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=101060676210255\u0026w=2" }, { "name": "DSA-099", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2002/dsa-099" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0006", "datePublished": "2003-04-02T05:00:00", "dateReserved": "2002-01-08T00:00:00", "dateUpdated": "2024-08-08T02:35:17.591Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2003-1000
Vulnerability from cvelistv5
Published
2003-12-17 05:00
Modified
2024-08-08 02:12
Severity ?
EPSS score ?
Summary
xchat 2.0.6 allows remote attackers to cause a denial of service (crash) via a passive DCC request with an invalid ID number, which causes a null dereference.
References
▼ | URL | Tags |
---|---|---|
http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html | x_refsource_CONFIRM | |
http://marc.info/?l=bugtraq&m=107152093419276&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:12:35.459Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html" }, { "name": "20031214 GLSA: Malformed dcc send requests in xchat-2.0.6 lead to a denial of service", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=107152093419276\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-12-14T00:00:00", "descriptions": [ { "lang": "en", "value": "xchat 2.0.6 allows remote attackers to cause a denial of service (crash) via a passive DCC request with an invalid ID number, which causes a null dereference." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html" }, { "name": "20031214 GLSA: Malformed dcc send requests in xchat-2.0.6 lead to a denial of service", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=107152093419276\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1000", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "xchat 2.0.6 allows remote attackers to cause a denial of service (crash) via a passive DCC request with an invalid ID number, which causes a null dereference." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html", "refsource": "CONFIRM", "url": "http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html" }, { "name": "20031214 GLSA: Malformed dcc send requests in xchat-2.0.6 lead to a denial of service", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=107152093419276\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1000", "datePublished": "2003-12-17T05:00:00", "dateReserved": "2003-12-16T00:00:00", "dateUpdated": "2024-08-08T02:12:35.459Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0828
Vulnerability from cvelistv5
Published
2020-02-21 17:20
Modified
2024-08-06 18:38
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the Basic Multilingual Plane (BMP).
References
▼ | URL | Tags |
---|---|---|
https://security-tracker.debian.org/tracker/CVE-2012-0828 | x_refsource_MISC | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0828 | x_refsource_MISC | |
https://access.redhat.com/security/cve/cve-2012-0828 | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2012/02/01/9 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:14.795Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2012-0828" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0828" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://access.redhat.com/security/cve/cve-2012-0828" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/02/01/9" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Xchat-WDK", "vendor": "xchat", "versions": [ { "status": "affected", "version": "before 1499-4 (2012-01-18)" } ] }, { "product": "xchat", "vendor": "xchat", "versions": [ { "status": "affected", "version": "2.8.6 on Maemo architecture" } ] } ], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the Basic Multilingual Plane (BMP)." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based buffer overflow by processing UTF-8 line from server containing characters outside BMP", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-21T17:20:43", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2012-0828" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0828" }, { "tags": [ "x_refsource_MISC" ], "url": "https://access.redhat.com/security/cve/cve-2012-0828" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.openwall.com/lists/oss-security/2012/02/01/9" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-0828", "datePublished": "2020-02-21T17:20:43", "dateReserved": "2012-01-19T00:00:00", "dateUpdated": "2024-08-06T18:38:14.795Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2008-06-24 19:41
Modified
2024-11-21 00:47
Severity ?
Summary
Argument injection vulnerability in XChat 2.8.7b and earlier on Windows, when Internet Explorer is used, allows remote attackers to execute arbitrary commands via the --command parameter in an ircs:// URI.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
microsoft | windows_nt | * | |
microsoft | internet_explorer | * | |
xchat | xchat | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED27882B-A02A-4D5F-9117-A47976C676E0", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*", "matchCriteriaId": "8682FAF3-98E3-485C-89CB-C0358C4E2AB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4CA9E47-EEFB-4484-B4E3-B3E06DEE71F6", "versionEndIncluding": "2.8.7b", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Argument injection vulnerability in XChat 2.8.7b and earlier on Windows, when Internet Explorer is used, allows remote attackers to execute arbitrary commands via the --command parameter in an ircs:// URI." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n de argumento en XChat 2.8.7b y versiones anteriores de Windows, cuando Internet Explorer es ejecutado, permite a atacantes remotos ejecutar comandos de su elecci\u00f3n a trav\u00e9s del par\u00e1metro --command en una URI ircs://." } ], "id": "CVE-2008-2841", "lastModified": "2024-11-21T00:47:50.170", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-06-24T19:41:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://forum.xchat.org/viewtopic.php?t=4218" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30695" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/29696" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43065" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/5795" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://forum.xchat.org/viewtopic.php?t=4218" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30695" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/29696" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43065" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/5795" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Not vulnerable. This issue did not affect the versions of XChat as shipped with Red Hat Enterprise Linux.", "lastModified": "2008-07-07T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-06-01 04:00
Modified
2024-11-20 23:48
Severity ?
Summary
Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
xchat | xchat | 1.8.0 | |
xchat | xchat | 1.8.1 | |
xchat | xchat | 1.8.2 | |
xchat | xchat | 1.8.3 | |
xchat | xchat | 1.8.4 | |
xchat | xchat | 1.8.5 | |
xchat | xchat | 1.8.6 | |
xchat | xchat | 1.8.7 | |
xchat | xchat | 1.8.8 | |
xchat | xchat | 1.8.9 | |
xchat | xchat | 1.9.0 | |
xchat | xchat | 1.9.1 | |
xchat | xchat | 1.9.2 | |
xchat | xchat | 1.9.3 | |
xchat | xchat | 1.9.4 | |
xchat | xchat | 1.9.5 | |
xchat | xchat | 1.9.6 | |
xchat | xchat | 1.9.7 | |
xchat | xchat | 1.9.8 | |
xchat | xchat | 1.9.9 | |
xchat | xchat | 2.0.0 | |
xchat | xchat | 2.0.1 | |
xchat | xchat | 2.0.2 | |
xchat | xchat | 2.0.3 | |
xchat | xchat | 2.0.4 | |
xchat | xchat | 2.0.5 | |
xchat | xchat | 2.0.6 | |
xchat | xchat | 2.0.7 | |
xchat | xchat | 2.0.8 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xchat:xchat:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "06627FAB-2A5B-428D-A081-9628DC55E4AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "655D162F-1944-4D88-A2C0-825F7EED0BAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "5C5454B5-AC2F-4B8E-BC20-2273472D0401", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4BEFD40-62D5-4007-9D35-6865D6482D89", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "A0F904EA-16E1-401B-BD5A-1A9B5B32E6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "D02490BD-4B30-4213-A03E-443CAEE6C3DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "55162523-7648-4F94-BE7B-0B7E2EE598FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "83CC33D0-37D8-4C9C-BD89-560DFFF77F0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "64EE28DD-21CB-4DC3-91CE-E74B3D3F0F3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.8.9:*:*:*:*:*:*:*", "matchCriteriaId": "BC2A5D0A-9C46-4631-BE22-472B0E748FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "62820427-7013-4C10-AC31-BE11764F782F", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "E19C5E12-5A0B-4225-8409-BEA5BD2CD31B", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "90D3F7D0-36F9-42DF-AA2F-658C767F9CAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "90006D01-8C0D-45DA-BF65-901E95C149BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "7767D8F8-0AC6-473F-BEFA-0FA3EB88E7CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "6EB78C64-BA92-4B41-83F0-22AF8F26F930", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "9E2D2DE3-1278-44F9-996D-A2102690D88F", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "1E571CEA-967E-4A99-B742-80E96C3275B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "DFEE0D77-576D-4A80-BD29-39EA6602C2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "D3221D9F-F47B-4DD5-8328-EBFC27549F98", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "C6109751-01D8-4585-A19C-F4F0D03FB82A", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "10CFC601-73D7-4341-9606-D02128B86F8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "14124429-8DF7-44BB-8CBB-C4E04DB4FD99", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "08F7D59F-A504-45B7-B8D8-6F3AB799788A", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "72AF16EE-1B98-448F-8575-1EABFCD7CBEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "AB08B68B-C557-4285-9AAD-226EADD84DC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "2191D045-A2A9-47E0-A5CB-A4FF7C7D7179", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "638F3791-6343-498F-9BE2-73175606F6F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "6EFB0F36-CFF1-41F8-AC43-D00165639DBE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code." } ], "id": "CVE-2004-0409", "lastModified": "2024-11-20T23:48:31.653", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-06-01T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200404-15.xml" }, { "source": "cve@mitre.org", "url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_123013" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-177.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2004-585.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.xchat.org/" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11312" }, { "source": "cve@mitre.org", "url": "https://www.debian.org/security/2004/dsa-493" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200404-15.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_123013" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-177.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2004-585.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.xchat.org/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11312" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2004/dsa-493" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-01-28 11:30
Modified
2024-11-21 00:59
Severity ?
Summary
Untrusted search path vulnerability in the Python module in xchat allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xchat:xchat:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BA25432-EBEC-42F3-A220-C830A13A3971", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in the Python module in xchat allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983)." }, { "lang": "es", "value": "Vulnerabilidad de ruta de b\u00fasqueda no confiable en el m\u00f3dulo Python en xchat permite a usuarios locales ejecutar c\u00f3digo arbitrario a trav\u00e9s de un troyano en un fichero Python en el directorio de trabajo activo, relativo a la vulnerabilidad de la funci\u00f3n PySys_SetArgv (CVE-2008-5983)." } ], "id": "CVE-2009-0315", "lastModified": "2024-11-21T00:59:36.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-01-28T11:30:00.280", "references": [ { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:059" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2009/01/26/2" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/33444" }, { "source": "cve@mitre.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=481560" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:059" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2009/01/26/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/33444" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=481560" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-08-30 16:04
Modified
2024-11-21 00:15
Severity ?
Summary
Unspecified vulnerability in Xchat 2.6.7 and earlier allows remote attackers to cause a denial of service (crash) via unspecified vectors involving the PRIVMSG command. NOTE: the vendor has disputed this vulnerability, stating that it does not affect 2.6.7 "or any recent version"
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xchat:xchat:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2E899A7-0064-4015-9CDC-7532F763DE1E", "versionEndIncluding": "2.6.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [ { "sourceIdentifier": "cve@mitre.org", "tags": [ "disputed" ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Xchat 2.6.7 and earlier allows remote attackers to cause a denial of service (crash) via unspecified vectors involving the PRIVMSG command. NOTE: the vendor has disputed this vulnerability, stating that it does not affect 2.6.7 \"or any recent version\"" }, { "lang": "es", "value": "** IMPUGNADA ** Vulnerabilidad no especificada en Xchat 2.6.7 y anteriores permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante vectores no especificados implicando el comando PRIVMSG. NOTA: el vendedor ha impugnado esta vulnerabilidad, afirmando que no afecta a la 2.6.7 \"ni a ninguna versi\u00f3n reciente\"." } ], "id": "CVE-2006-4455", "lastModified": "2024-11-21T00:15:59.330", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-08-30T16:04:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://forum.xchat.org/viewtopic.php?t=2918" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=115523184321922\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016687" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/19398" }, { "source": "cve@mitre.org", "url": "http://www.xchat.org/" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28325" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/2124" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/2147" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://forum.xchat.org/viewtopic.php?t=2918" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=115523184321922\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/19398" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.xchat.org/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28325" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/2124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/2147" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-30 22:55
Modified
2024-11-21 01:33
Severity ?
Summary
Heap-based buffer overflow in XChat 2.8.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long response string.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xchat:xchat:*:*:*:*:*:*:*:*", "matchCriteriaId": "251F8C65-B10B-477E-86B0-43821EB35A95", "versionEndIncluding": "2.8.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0B8C5104-52ED-42EC-97A5-05D345597496", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "DAF68327-9D45-41F3-B120-C9E71A0A3259", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "07373BC7-F34E-47A2-9057-64C04C45EA26", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "F18504E4-03C8-45C9-B89D-86327D5663D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "3F6EE47C-0AE8-4CCD-8A2D-54E55BE9C7D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "103E7180-AFF5-4EBF-A9FD-EFE2A6C00256", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "D371520F-1F2D-4EAB-A4D1-5CD13DBF6C62", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4CA8BBE2-4ABE-4574-9BD7-A26F2FF25333", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "74588BF3-4DA4-410B-8416-C90E7F446238", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "07D90F28-4BD2-4581-A8B7-ED90A9ECEF53", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "721836E8-A4B6-46D6-BEDD-9B269DDB0525", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "06627FAB-2A5B-428D-A081-9628DC55E4AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "655D162F-1944-4D88-A2C0-825F7EED0BAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "5C5454B5-AC2F-4B8E-BC20-2273472D0401", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4BEFD40-62D5-4007-9D35-6865D6482D89", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "A0F904EA-16E1-401B-BD5A-1A9B5B32E6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "D02490BD-4B30-4213-A03E-443CAEE6C3DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "55162523-7648-4F94-BE7B-0B7E2EE598FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "83CC33D0-37D8-4C9C-BD89-560DFFF77F0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "64EE28DD-21CB-4DC3-91CE-E74B3D3F0F3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.8.9:*:*:*:*:*:*:*", "matchCriteriaId": "BC2A5D0A-9C46-4631-BE22-472B0E748FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "62820427-7013-4C10-AC31-BE11764F782F", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "E19C5E12-5A0B-4225-8409-BEA5BD2CD31B", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "90D3F7D0-36F9-42DF-AA2F-658C767F9CAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "90006D01-8C0D-45DA-BF65-901E95C149BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "7767D8F8-0AC6-473F-BEFA-0FA3EB88E7CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "6EB78C64-BA92-4B41-83F0-22AF8F26F930", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "9E2D2DE3-1278-44F9-996D-A2102690D88F", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "1E571CEA-967E-4A99-B742-80E96C3275B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "DFEE0D77-576D-4A80-BD29-39EA6602C2AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "D3221D9F-F47B-4DD5-8328-EBFC27549F98", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "C6109751-01D8-4585-A19C-F4F0D03FB82A", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "10CFC601-73D7-4341-9606-D02128B86F8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "14124429-8DF7-44BB-8CBB-C4E04DB4FD99", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "08F7D59F-A504-45B7-B8D8-6F3AB799788A", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "72AF16EE-1B98-448F-8575-1EABFCD7CBEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "AB08B68B-C557-4285-9AAD-226EADD84DC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "2191D045-A2A9-47E0-A5CB-A4FF7C7D7179", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "638F3791-6343-498F-9BE2-73175606F6F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "6EFB0F36-CFF1-41F8-AC43-D00165639DBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "673B2CA0-C2D3-441C-9946-7FE12FB4BCBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C2CE006-DAA0-40BA-A291-EBBC07147D68", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D92D905-9E86-40CE-ADF1-F561A2FC2F94", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "8649CA9A-87C6-4C89-A47A-2BE3E1025447", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.8.3:c:*:*:*:*:*:*", "matchCriteriaId": "096F6B6A-E7A7-439C-BB04-D53D345B5936", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.8.3:e:*:*:*:*:*:*", "matchCriteriaId": "35FBBED7-FF29-411B-BE9A-C499D3CF64C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "795E05AC-3F7B-41A9-B3DE-D8A375873642", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.8.5:b:*:*:*:*:*:*", "matchCriteriaId": "37C966CE-BA65-408F-BE1E-006F0C3DBAD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.8.5:e:*:*:*:*:*:*", "matchCriteriaId": "4048F9F4-E94D-445A-A228-5899A5CE7BCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "1FF7EF6E-C303-45F0-83B3-149EF2B269BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.8.7:a:*:*:*:*:*:*", "matchCriteriaId": "036260CB-9B35-41D4-BF8D-1FF55F3851C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.8.7:b:*:*:*:*:*:*", "matchCriteriaId": "2215683D-9A27-47BC-A39F-92C134A236A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.8.7:c:*:*:*:*:*:*", "matchCriteriaId": "ABDDDBC6-8A14-4596-9811-C202C48AA8E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.8.7:d:*:*:*:*:*:*", "matchCriteriaId": "D212BF9E-CC88-48A9-B336-FECEC0672114", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.8.7:e:*:*:*:*:*:*", "matchCriteriaId": "AEB4C892-87AA-4211-9B7B-9FA3E70F6DF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.8.7:f:*:*:*:*:*:*", "matchCriteriaId": "B689B885-363C-46FC-9EE5-2DC1EE617102", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.8.7b:*:*:*:*:*:*:*", "matchCriteriaId": "D9A942FC-C19B-4585-91AF-8ECFD6D76CBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:2.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "B9923817-4F47-4622-BF41-B9391006F698", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in XChat 2.8.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long response string." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en XChat v2.8.9 y anterior permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente la ejecuci\u00f3n de c\u00f3digo arbitrario a trav\u00e9s de una cadena de respuesta larga." } ], "id": "CVE-2011-5129", "lastModified": "2024-11-21T01:33:42.420", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-30T22:55:03.733", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.org/files/107312/xchat-dos.txt" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/18159" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/77629" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/50820" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1027468" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://packetstormsecurity.org/files/107312/xchat-dos.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/18159" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/77629" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/50820" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1027468" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-06-25 04:00
Modified
2024-11-20 23:38
Severity ?
Summary
XChat IRC client allows remote attackers to execute arbitrary commands via a /dns command on a host whose DNS reverse lookup contains shell metacharacters.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xchat:xchat:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CC0E3DA-D2F6-4A46-A328-D1F0CDBE071F", "versionEndIncluding": "1.89", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "XChat IRC client allows remote attackers to execute arbitrary commands via a /dns command on a host whose DNS reverse lookup contains shell metacharacters." } ], "id": "CVE-2002-0382", "lastModified": "2024-11-20T23:38:56.957", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-06-25T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000526" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=101725430425490\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://www.iss.net/security_center/static/8704.php" }, { "source": "cve@mitre.org", "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-051.php" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2002-097.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2002-124.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/4376" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000526" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=101725430425490\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.iss.net/security_center/static/8704.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-051.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2002-097.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2002-124.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/4376" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-06-25 04:00
Modified
2024-11-20 23:38
Severity ?
Summary
XChat 1.8.7 and earlier, including default configurations of 1.4.2 and 1.4.3, allows remote attackers to execute arbitrary IRC commands as other clients via encoded characters in a PRIVMSG command that calls CTCP PING, which expands the characters in the client response when the percascii variable is set.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xchat:xchat:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "74588BF3-4DA4-410B-8416-C90E7F446238", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "07D90F28-4BD2-4581-A8B7-ED90A9ECEF53", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "XChat 1.8.7 and earlier, including default configurations of 1.4.2 and 1.4.3, allows remote attackers to execute arbitrary IRC commands as other clients via encoded characters in a PRIVMSG command that calls CTCP PING, which expands the characters in the client response when the percascii variable is set." } ], "id": "CVE-2002-0006", "lastModified": "2024-11-20T23:38:04.710", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-06-25T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000453" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=101060676210255\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://online.securityfocus.com/advisories/3806" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2002-005.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.debian.org/security/2002/dsa-099" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/3830" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7856" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000453" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=101060676210255\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://online.securityfocus.com/advisories/3806" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2002-005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.debian.org/security/2002/dsa-099" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/3830" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7856" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-01-05 05:00
Modified
2024-11-20 23:46
Severity ?
Summary
xchat 2.0.6 allows remote attackers to cause a denial of service (crash) via a passive DCC request with an invalid ID number, which causes a null dereference.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html | Broken Link, Patch, Vendor Advisory | |
cve@mitre.org | http://marc.info/?l=bugtraq&m=107152093419276&w=2 | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html | Broken Link, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=107152093419276&w=2 | Mailing List |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xchat:xchat:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "2191D045-A2A9-47E0-A5CB-A4FF7C7D7179", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "xchat 2.0.6 allows remote attackers to cause a denial of service (crash) via a passive DCC request with an invalid ID number, which causes a null dereference." }, { "lang": "es", "value": "xchat 2.0.6 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) mediante una petici\u00f3n DCC pasiva con n\u00famero ID inv\u00e1lido, lo que causa una desreferencia nula." } ], "id": "CVE-2003-1000", "lastModified": "2024-11-20T23:46:07.173", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2004-01-05T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Patch", "Vendor Advisory" ], "url": "http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=107152093419276\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Patch", "Vendor Advisory" ], "url": "http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://marc.info/?l=bugtraq\u0026m=107152093419276\u0026w=2" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2000-10-20 04:00
Modified
2024-11-20 23:33
Severity ?
Summary
IRC Xchat client versions 1.4.2 and earlier allows remote attackers to execute arbitrary commands by encoding shell metacharacters into a URL which XChat uses to launch a web browser.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xchat:xchat:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0B8C5104-52ED-42EC-97A5-05D345597496", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "DAF68327-9D45-41F3-B120-C9E71A0A3259", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "07373BC7-F34E-47A2-9057-64C04C45EA26", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "F18504E4-03C8-45C9-B89D-86327D5663D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "3F6EE47C-0AE8-4CCD-8A2D-54E55BE9C7D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "103E7180-AFF5-4EBF-A9FD-EFE2A6C00256", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "D371520F-1F2D-4EAB-A4D1-5CD13DBF6C62", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "4CA8BBE2-4ABE-4574-9BD7-A26F2FF25333", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "74588BF3-4DA4-410B-8416-C90E7F446238", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "721836E8-A4B6-46D6-BEDD-9B269DDB0525", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:1.5.xdev:*:*:*:*:*:*:*", "matchCriteriaId": "D2C27A32-761C-4413-8856-6689150BBB4A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IRC Xchat client versions 1.4.2 and earlier allows remote attackers to execute arbitrary commands by encoding shell metacharacters into a URL which XChat uses to launch a web browser." } ], "id": "CVE-2000-0787", "lastModified": "2024-11-20T23:33:17.223", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2000-10-20T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0215.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0301.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0305.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2000-055.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1601" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0215.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0301.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-08/0305.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2000-055.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1601" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-04-21 14:59
Modified
2024-11-21 02:01
Severity ?
Summary
The ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 15.10 | |
xchat | xchat | - | |
xchat | xchat_gnome | - | |
hexchat_project | hexchat | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xchat:xchat:-:*:*:*:*:*:*:*", "matchCriteriaId": "41E75FBE-44C2-4B3D-8CAF-D35985102334", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat_gnome:-:*:*:*:*:*:*:*", "matchCriteriaId": "DECAEB82-4F89-41F9-9A04-BB5422617719", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hexchat_project:hexchat:*:*:*:*:*:*:*:*", "matchCriteriaId": "92B8E913-CA39-4610-A20A-9E4619DA1209", "versionEndIncluding": "2.10.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate." }, { "lang": "es", "value": "La funci\u00f3n ssl_do_connect en common/server.c en HexChat en versiones anteriores a 2.10.2, XChat y XChat-GNOME no verifica que el nombre de host del servidor coincide con un nombre de dominio en el certificado X.509, lo que permite a atacantes man-in-the-middle suplantar servidores SSL a trav\u00e9s de un certificado v\u00e1lido arbitrario." } ], "id": "CVE-2013-7449", "lastModified": "2024-11-21T02:01:01.733", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-04-21T14:59:00.107", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://hexchat.readthedocs.org/en/latest/changelog.html" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-2945-1" }, { "source": "cve@mitre.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1081839" }, { "source": "cve@mitre.org", "url": "https://github.com/hexchat/hexchat/commit/c9b63f7f9be01692b03fa15275135a4910a7e02d" }, { "source": "cve@mitre.org", "url": "https://github.com/hexchat/hexchat/issues/524" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://hexchat.readthedocs.org/en/latest/changelog.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2945-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1081839" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/hexchat/hexchat/commit/c9b63f7f9be01692b03fa15275135a4910a7e02d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/hexchat/hexchat/issues/524" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-10-18 04:00
Modified
2024-11-20 23:36
Severity ?
Summary
Format string vulnerability in XChat 1.2.x allows remote attackers to execute arbitrary code via a malformed nickname.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xchat:xchat:1.2.x:*:*:*:*:*:*:*", "matchCriteriaId": "949D4D39-2B40-441A-A015-9C8667441ACB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Format string vulnerability in XChat 1.2.x allows remote attackers to execute arbitrary code via a malformed nickname." } ], "id": "CVE-2001-0792", "lastModified": "2024-11-20T23:36:10.020", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-10-18T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securiteam.com/exploits/5AP0Q2A4AQ.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7416" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securiteam.com/exploits/5AP0Q2A4AQ.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7416" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-02-21 18:15
Modified
2024-11-21 01:35
Severity ?
Summary
Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the Basic Multilingual Plane (BMP).
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2012/02/01/9 | Mailing List, Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/security/cve/cve-2012-0828 | Third Party Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0828 | Issue Tracking, Patch, Third Party Advisory | |
secalert@redhat.com | https://security-tracker.debian.org/tracker/CVE-2012-0828 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2012/02/01/9 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/cve-2012-0828 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0828 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security-tracker.debian.org/tracker/CVE-2012-0828 | Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnome:gtk:2.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "F5E89111-4AB1-4A89-9FD2-EC506CA7A2D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:gtk:2.14.7:*:*:*:*:*:*:*", "matchCriteriaId": "8DAAC3F9-6C8A-4F0D-BB2D-E11B7824D254", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:gtk:2.18.9:*:*:*:*:*:*:*", "matchCriteriaId": "1AD6C94D-C4EB-474D-AEB4-A18458507BB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:gtk:2.24.7:*:*:*:*:*:*:*", "matchCriteriaId": "BAEB7698-0F5B-44F1-B380-2D2F25FD89CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat:xchat:*:*:*:*:*:*:*:*", "matchCriteriaId": "144C01A3-C1C6-4467-8777-BA4C7AC8D0C4", "versionEndExcluding": "2.8.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:xchat-wdk:xchat-wdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "9AAC014F-2966-4507-AD36-C14FD515A652", "versionEndExcluding": "1499-4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the Basic Multilingual Plane (BMP)." }, { "lang": "es", "value": "Un desbordamiento del b\u00fafer en la regi\u00f3n heap de la memoria en xchat versi\u00f3n 2.8.6 sobre la arquitectura Maemo de Xchat-WDK versiones anteriores a 1499-4 (18-01-2012), podr\u00eda permitir a atacantes remotos causar una denegaci\u00f3n de servicio (DoS) (bloqueo del cliente xchat) o ejecutar c\u00f3digo arbitrario por medio de una l\u00ednea UTF-8 desde el servidor que contiene caracteres fuera del Basic Multilingual Plane (BMP)." } ], "id": "CVE-2012-0828", "lastModified": "2024-11-21T01:35:48.180", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-02-21T18:15:11.270", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2012/02/01/9" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/cve-2012-0828" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0828" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2012-0828" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2012/02/01/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/cve-2012-0828" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0828" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2012-0828" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }