Xchat

Xchat

12 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 5.89%
  • Veröffentlicht 21.02.2020 18:15:11
  • Zuletzt bearbeitet 21.11.2024 01:35:48

Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing char...

  • EPSS 0.15%
  • Veröffentlicht 21.04.2016 14:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via...

Exploit
  • EPSS 30.07%
  • Veröffentlicht 30.08.2012 22:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Heap-based buffer overflow in XChat 2.8.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long response string.

  • EPSS 0.06%
  • Veröffentlicht 28.01.2009 11:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Untrusted search path vulnerability in the Python module in xchat allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).

  • EPSS 31.19%
  • Veröffentlicht 24.06.2008 19:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Argument injection vulnerability in XChat 2.8.7b and earlier on Windows, when Internet Explorer is used, allows remote attackers to execute arbitrary commands via the --command parameter in an ircs:// URI.

  • EPSS 47.51%
  • Veröffentlicht 30.08.2006 16:04:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Unspecified vulnerability in Xchat 2.6.7 and earlier allows remote attackers to cause a denial of service (crash) via unspecified vectors involving the PRIVMSG command. NOTE: the vendor has disputed this vulnerability, stating that it does not affec...

  • EPSS 26.77%
  • Veröffentlicht 01.06.2004 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code.

  • EPSS 1.11%
  • Veröffentlicht 05.01.2004 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

xchat 2.0.6 allows remote attackers to cause a denial of service (crash) via a passive DCC request with an invalid ID number, which causes a null dereference.

  • EPSS 8.63%
  • Veröffentlicht 25.06.2002 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

XChat 1.8.7 and earlier, including default configurations of 1.4.2 and 1.4.3, allows remote attackers to execute arbitrary IRC commands as other clients via encoded characters in a PRIVMSG command that calls CTCP PING, which expands the characters in...

  • EPSS 1.08%
  • Veröffentlicht 25.06.2002 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

XChat IRC client allows remote attackers to execute arbitrary commands via a /dns command on a host whose DNS reverse lookup contains shell metacharacters.