Quassel-irc

Quassel

9 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.12%
  • Published 17.06.2021 14:15:08
  • Last modified 21.11.2024 06:11:16

Quassel through 0.13.1, when --require-ssl is enabled, launches without SSL or TLS support if a usable X.509 certificate is not found on the local system.

Exploit
  • EPSS 1.13%
  • Published 08.05.2018 15:29:00
  • Last modified 21.11.2024 03:39:51

A heap corruption of type CWE-120 exists in quassel version 0.12.4 in quasselcore in void DataStreamPeer::processMessage(const QByteArray &msg) datastreampeer.cpp line 62 that allows an attacker to execute code remotely.

Exploit
  • EPSS 0.56%
  • Published 08.05.2018 15:29:00
  • Last modified 21.11.2024 03:39:51

A NULL Pointer Dereference of CWE-476 exists in quassel version 0.12.4 in the quasselcore void CoreAuthHandler::handle(const Login &msg) coreauthhandler.cpp line 235 that allows an attacker to cause a denial of service.

  • EPSS 2.9%
  • Published 13.06.2016 19:59:08
  • Last modified 12.04.2025 10:46:40

The onReadyRead function in core/coreauthhandler.cpp in Quassel before 0.12.4 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via invalid handshake data.

  • EPSS 2.36%
  • Published 08.01.2016 19:59:14
  • Last modified 12.04.2025 10:46:40

The CoreUserInputHandler::doMode function in core/coreuserinputhandler.cpp in Quassel 0.10.0 allows remote attackers to cause a denial of service (application crash) via the "/op *" command in a query.

  • EPSS 0.44%
  • Published 14.05.2015 14:59:11
  • Last modified 12.04.2025 10:46:40

Quassel before 0.12.2 does not properly re-initialize the database session when the PostgreSQL database is restarted, which allows remote attackers to conduct SQL injection attacks via a \ (backslash) in a message. NOTE: this vulnerability exists be...

  • EPSS 1.7%
  • Published 10.04.2015 15:00:05
  • Last modified 12.04.2025 10:46:40

Stack consumption vulnerability in the message splitting functionality in Quassel before 0.12-rc1 allows remote attackers to cause a denial of service (uncontrolled recursion) via a crafted massage.

  • EPSS 1.61%
  • Published 10.04.2015 15:00:04
  • Last modified 12.04.2025 10:46:40

Quassel before 0.12-rc1 uses an incorrect data-type size when splitting a message, which allows remote attackers to cause a denial of service (crash) via a long CTCP query containing only multibyte characters.

  • EPSS 1.62%
  • Published 04.10.2011 10:55:09
  • Last modified 11.04.2025 00:51:21

The CtcpParser::packedReply method in core/ctcpparser.cpp in Quassel before 0.7.3 allows remote attackers to cause a denial of service (crash) via a crafted Client-To-Client Protocol (CTCP) request, as demonstrated in the wild in September 2011.