12 results (0.007 seconds)

CVSS: 9.8EPSS: 5%CPEs: 6EXPL: 0

21 Feb 2020 — Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the Basic Multilingual Plane (BMP). Un desbordamiento del búfer en la región heap de la memoria en xchat versión 2.8.6 sobre la arquitectura Maemo de Xchat-WDK versiones anteriores a 1499-4 (18-01-2012), podría permitir a atacantes remotos caus... • http://www.openwall.com/lists/oss-security/2012/02/01/9 • CWE-787: Out-of-bounds Write •

CVSS: 6.5EPSS: 0%CPEs: 6EXPL: 0

21 Apr 2016 — The ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. La función ssl_do_connect en common/server.c en HexChat en versiones anteriores a 2.10.2, XChat y XChat-GNOME no verifica que el nombre de host del servidor coincide con un nombre de dominio en el certificado X.509, lo que permit... • http://hexchat.readthedocs.org/en/latest/changelog.html • CWE-310: Cryptographic Issues •

CVSS: 9.8EPSS: 24%CPEs: 59EXPL: 4

30 Aug 2012 — Heap-based buffer overflow in XChat 2.8.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long response string. Desbordamiento de búfer basado en memoria dinámica en XChat v2.8.9 y anterior permite a atacantes remotos causar una denegación de servicio (caída) y posiblemente la ejecución de código arbitrario a través de una cadena de respuesta larga. • https://www.exploit-db.com/exploits/18159 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

28 Jan 2009 — Untrusted search path vulnerability in the Python module in xchat allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983). Vulnerabilidad de ruta de búsqueda no confiable en el módulo Python en xchat permite a usuarios locales ejecutar código arbitrario a través de un troyano en un fichero Python en el directorio de trabajo activo, relativo a la vulnerabilidad de la función PySys_Se... • http://www.mandriva.com/security/advisories?name=MDVSA-2009:059 •

CVSS: 9.8EPSS: 17%CPEs: 3EXPL: 1

24 Jun 2008 — Argument injection vulnerability in XChat 2.8.7b and earlier on Windows, when Internet Explorer is used, allows remote attackers to execute arbitrary commands via the --command parameter in an ircs:// URI. Vulnerabilidad de inyección de argumento en XChat 2.8.7b y versiones anteriores de Windows, cuando Internet Explorer es ejecutado, permite a atacantes remotos ejecutar comandos de su elección a través del parámetro --command en una URI ircs://. • https://www.exploit-db.com/exploits/5795 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 31%CPEs: 1EXPL: 2

30 Aug 2006 — Unspecified vulnerability in Xchat 2.6.7 and earlier allows remote attackers to cause a denial of service (crash) via unspecified vectors involving the PRIVMSG command. NOTE: the vendor has disputed this vulnerability, stating that it does not affect 2.6.7 "or any recent version" ** IMPUGNADA ** Vulnerabilidad no especificada en Xchat 2.6.7 y anteriores permite a atacantes remotos provocar una denegación de servicio (caída) mediante vectores no especificados implicando el comando PRIVMSG. NOTA: el vendedor ... • https://www.exploit-db.com/exploits/2124 •

CVSS: 9.8EPSS: 26%CPEs: 29EXPL: 1

17 Apr 2004 — Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code. • https://www.exploit-db.com/exploits/296 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

17 Dec 2003 — xchat 2.0.6 allows remote attackers to cause a denial of service (crash) via a passive DCC request with an invalid ID number, which causes a null dereference. xchat 2.0.6 permite a atacantes remotos causar una denegación de servicio (caída) mediante una petición DCC pasiva con número ID inválido, lo que causa una desreferencia nula. • http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html • CWE-476: NULL Pointer Dereference •

CVSS: 9.8EPSS: 8%CPEs: 2EXPL: 1

25 Jun 2002 — XChat 1.8.7 and earlier, including default configurations of 1.4.2 and 1.4.3, allows remote attackers to execute arbitrary IRC commands as other clients via encoded characters in a PRIVMSG command that calls CTCP PING, which expands the characters in the client response when the percascii variable is set. • https://www.exploit-db.com/exploits/21210 •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 0

25 Jun 2002 — XChat IRC client allows remote attackers to execute arbitrary commands via a /dns command on a host whose DNS reverse lookup contains shell metacharacters. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000526 •