Page 2 of 12 results (0.004 seconds)

CVSS: 5.0EPSS: 16%CPEs: 1EXPL: 2

Unspecified vulnerability in Xchat 2.6.7 and earlier allows remote attackers to cause a denial of service (crash) via unspecified vectors involving the PRIVMSG command. NOTE: the vendor has disputed this vulnerability, stating that it does not affect 2.6.7 "or any recent version" ** IMPUGNADA ** Vulnerabilidad no especificada en Xchat 2.6.7 y anteriores permite a atacantes remotos provocar una denegación de servicio (caída) mediante vectores no especificados implicando el comando PRIVMSG. NOTA: el vendedor ha impugnado esta vulnerabilidad, afirmando que no afecta a la 2.6.7 "ni a ninguna versión reciente". • https://www.exploit-db.com/exploits/2124 https://www.exploit-db.com/exploits/2147 http://forum.xchat.org/viewtopic.php?t=2918 http://marc.info/?l=bugtraq&m=115523184321922&w=2 http://securitytracker.com/id?1016687 http://www.securityfocus.com/bid/19398 http://www.xchat.org https://exchange.xforce.ibmcloud.com/vulnerabilities/28325 •

CVSS: 7.5EPSS: 23%CPEs: 29EXPL: 1

Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code. • https://www.exploit-db.com/exploits/296 http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html http://security.gentoo.org/glsa/glsa-200404-15.xml http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_123013 http://www.redhat.com/support/errata/RHSA-2004-177.html http://www.redhat.com/support/errata/RHSA-2004-585.html http://www.xchat.org https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11312 https://www.debian.org/ •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

xchat 2.0.6 allows remote attackers to cause a denial of service (crash) via a passive DCC request with an invalid ID number, which causes a null dereference. xchat 2.0.6 permite a atacantes remotos causar una denegación de servicio (caída) mediante una petición DCC pasiva con número ID inválido, lo que causa una desreferencia nula. • http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html http://marc.info/?l=bugtraq&m=107152093419276&w=2 • CWE-476: NULL Pointer Dereference •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

XChat IRC client allows remote attackers to execute arbitrary commands via a /dns command on a host whose DNS reverse lookup contains shell metacharacters. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000526 http://marc.info/?l=bugtraq&m=101725430425490&w=2 http://www.iss.net/security_center/static/8704.php http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-051.php http://www.redhat.com/support/errata/RHSA-2002-097.html http://www.redhat.com/support/errata/RHSA-2002-124.html http://www.securityfocus.com/bid/4376 https://access.redhat.com/security/cve/CVE-2002-0382 https://bugzilla.redhat.com/s •

CVSS: 7.5EPSS: 8%CPEs: 2EXPL: 1

XChat 1.8.7 and earlier, including default configurations of 1.4.2 and 1.4.3, allows remote attackers to execute arbitrary IRC commands as other clients via encoded characters in a PRIVMSG command that calls CTCP PING, which expands the characters in the client response when the percascii variable is set. • https://www.exploit-db.com/exploits/21210 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000453 http://marc.info/?l=bugtraq&m=101060676210255&w=2 http://online.securityfocus.com/advisories/3806 http://rhn.redhat.com/errata/RHSA-2002-005.html http://www.debian.org/security/2002/dsa-099 http://www.securityfocus.com/bid/3830 https://exchange.xforce.ibmcloud.com/vulnerabilities/7856 •