Page 7 of 38 results (0.014 seconds)

CVSS: 6.8EPSS: 1%CPEs: 1EXPL: 1

CRLF injection vulnerability in the xmms.bx 1.0 script for BitchX allows user-assisted remote attackers to execute arbitrary IRC commands via CRLF sequences in the name of the song in a .mp3 file. Vulnerabilidad de inyección de retorno de carro y salto de línea (CRLF) en la secuencia de comandos xmms.bx 1.0 para BitchX permite a atacantes remotos con la complicidad del usuario ejecutar comandos del IRC de su elección mediante secuencias CRLF en el nombre de la canción de un fichero .mp3. • http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065227.html http://osvdb.org/37481 http://secunia.com/advisories/26489 http://securityreason.com/securityalert/3036 http://wouter.coekaerts.be/site/security/nowplaying http://www.securityfocus.com/archive/1/476283/100/0/threaded http://www.securityfocus.com/bid/25281 https://exchange.xforce.ibmcloud.com/vulnerabilities/35985 •

CVSS: 9.3EPSS: 2%CPEs: 1EXPL: 0

Multiple CRLF injection vulnerabilities in (1) ixmmsa.pl 0.3, (2) l33tmusic.pl 2.00, (3) mpg123.pl 0.01, (4) ogg123.pl 0.01, (5) xmms.pl 2.0, (6) xmms2.pl 1.1.3, and (7) xmmsinfo.pl 1.1.1.1 scripts for irssi before 0.8.11 allow user-assisted remote attackers to execute arbitrary IRC commands via CRLF sequences in the name of the song in a .mp3 file. Múltiples vulnerabilidades de inyección de retorno de carro y salto de línea (CRLF) en las secuencias de comandos (1) ixmmsa.pl 0.3, (2) l33tmusic.pl 2.00, (3) mpg123.pl 0.01, (4) ogg123.pl 0.01, (5) xmms.pl 2.0, (6) xmms2.pl 1.1.3, y (7) xmmsinfo.pl 1.1.1.1 para irssi anterior a 0.8.11 permite a atacantes remotos con la complicidad del usuario ejecutar comandos de IRC de su elección mediante secuencias CRLF en el nombre de la canción de un fichero .mp3. • http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065227.html http://osvdb.org/39568 http://secunia.com/advisories/26483 http://securityreason.com/securityalert/3036 http://wouter.coekaerts.be/site/security/nowplaying http://www.securityfocus.com/archive/1/476283/100/0/threaded http://www.securityfocus.com/bid/25281 https://exchange.xforce.ibmcloud.com/vulnerabilities/35985 •

CVSS: 6.8EPSS: 1%CPEs: 7EXPL: 1

Multiple CRLF injection vulnerabilities in (1) xmms-thing 1.0, (2) XMMS Remote Control Script 1.07, (3) Disrok 1.0, (4) a2x 0.0.1, (5) Another xmms-info script 1.0, (6) XChat-XMMS 0.8.1, and other unspecified scripts for XChat allow user-assisted remote attackers to execute arbitrary IRC commands via CRLF sequences in the name of the song in a .mp3 file. Múltiples vulnerabilidades de inyección CRLF en (1) xmms-thing 1.0, (2) XMMS Remote Control Script 1.07, (3) Disrok 1.0, (4) a2x 0.0.1, (5) Another xmms-info script 1.0, (6) XChat-XMMS 0.8.1, y otras secuencias de comandos no especificadas para XChat permite a atacantes remotos con la intervención del usuario ejecutar comandos IRC de su elección a través de secuencias CRLF en el nombre de la canción en un archivo .mp3. • http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065227.html http://osvdb.org/39574 http://osvdb.org/39575 http://secunia.com/advisories/26454 http://secunia.com/advisories/26455 http://secunia.com/advisories/26484 http://secunia.com/advisories/26485 http://secunia.com/advisories/26486 http://secunia.com/advisories/26487 http://secunia.com/advisories/26488 http://securityreason.com/securityalert/3036 http://wouter.coekaerts.be/site/security/nowplaying http:/&# •

CVSS: 6.8EPSS: 3%CPEs: 1EXPL: 0

Multiple CRLF injection vulnerabilities in the (1) now-playing.rb and (2) xmms.pl 1.1 scripts for WeeChat allow user-assisted remote attackers to execute arbitrary IRC commands via CRLF sequences in the name of the song in a .mp3 file. Múltiples vulnerabilidades de inyección CRLF en las secuencias de comandos (1) now-playing.rb y (2) xmms.pl 1.1 para WeeChat permiten a atacantes remotos asistidos por usuario ejecutar comandos IRC arbitrarios a través de secuencias CRLF en el nombre de la canción en un archivo .mp3. • http://git.sv.gnu.org/gitweb/?p=weechat/scripts.git%3Ba=commit%3Bh=7429c29a2fab6d7493c0188b5f631a7c2ae1533d http://git.sv.gnu.org/gitweb/?p=weechat/scripts.git%3Ba=commit%3Bh=76f7f7b502352ba2b823e3388a2ca88840fd1945 http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065227.html http://osvdb.org/39564 http://osvdb.org/39565 http://secunia.com/advisories/26457 http://secunia.com/advisories/26490 http://securityreason.com/securityalert/3036 http://wouter.coekaerts.be/site/security/nowplaying •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 0

The DCC ACCEPT command handler in irssi before 0.8.9+0.8.10rc5-0ubuntu4.1 in Ubuntu Linux, and possibly other distributions, allows remote attackers to cause a denial of service (application crash) via certain crafted arguments in a DCC command. • http://secunia.com/advisories/19090 http://www.securityfocus.com/bid/16913 https://exchange.xforce.ibmcloud.com/vulnerabilities/25147 https://usn.ubuntu.com/259-1 •