CVE-2002-0006 – X-Chat 1.x - CTCP Ping Remote IRC Command Execution
https://notcve.org/view.php?id=CVE-2002-0006
XChat 1.8.7 and earlier, including default configurations of 1.4.2 and 1.4.3, allows remote attackers to execute arbitrary IRC commands as other clients via encoded characters in a PRIVMSG command that calls CTCP PING, which expands the characters in the client response when the percascii variable is set. • https://www.exploit-db.com/exploits/21210 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000453 http://marc.info/?l=bugtraq&m=101060676210255&w=2 http://online.securityfocus.com/advisories/3806 http://rhn.redhat.com/errata/RHSA-2002-005.html http://www.debian.org/security/2002/dsa-099 http://www.securityfocus.com/bid/3830 https://exchange.xforce.ibmcloud.com/vulnerabilities/7856 •
CVE-2000-0787 – X-Chat 1.2/1.3/1.4/1.5 - Command Execution via URLs
https://notcve.org/view.php?id=CVE-2000-0787
IRC Xchat client versions 1.4.2 and earlier allows remote attackers to execute arbitrary commands by encoding shell metacharacters into a URL which XChat uses to launch a web browser. • https://www.exploit-db.com/exploits/20161 http://archives.neohapsis.com/archives/bugtraq/2000-08/0215.html http://archives.neohapsis.com/archives/bugtraq/2000-08/0301.html http://archives.neohapsis.com/archives/bugtraq/2000-08/0305.html http://www.redhat.com/support/errata/RHSA-2000-055.html http://www.securityfocus.com/bid/1601 •