Xchat
by Xchat
CVEs (12)
| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2003-1000 | Hig | 0.49 | 7.5 | 0.01 | Jan 5, 2004 | xchat 2.0.6 allows remote attackers to cause a denial of service (crash) via a passive DCC request with an invalid ID number, which causes a null dereference. | |
| CVE-2013-7449 | Med | 0.42 | 6.5 | 0.00 | Apr 21, 2016 | The ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. | |
| CVE-2006-4455 | 0.07 | — | 0.48 | Aug 30, 2006 | Unspecified vulnerability in Xchat 2.6.7 and earlier allows remote attackers to cause a denial of service (crash) via unspecified vectors involving the PRIVMSG command. NOTE: the vendor has disputed this vulnerability, stating that it does not affect 2.6.7 "or any recent version" | ||
| CVE-2008-2841 | 0.06 | — | 0.31 | Jun 24, 2008 | Argument injection vulnerability in XChat 2.8.7b and earlier on Windows, when Internet Explorer is used, allows remote attackers to execute arbitrary commands via the --command parameter in an ircs:// URI. | ||
| CVE-2011-5129 | 0.05 | — | 0.31 | Aug 30, 2012 | Heap-based buffer overflow in XChat 2.8.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long response string. | ||
| CVE-2004-0409 | 0.05 | — | 0.31 | Jun 1, 2004 | Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code. | ||
| CVE-2002-0006 | 0.04 | — | 0.09 | Jun 25, 2002 | XChat 1.8.7 and earlier, including default configurations of 1.4.2 and 1.4.3, allows remote attackers to execute arbitrary IRC commands as other clients via encoded characters in a PRIVMSG command that calls CTCP PING, which expands the characters in the client response when the percascii variable is set. | ||
| CVE-2000-0787 | 0.04 | — | 0.09 | Oct 20, 2000 | IRC Xchat client versions 1.4.2 and earlier allows remote attackers to execute arbitrary commands by encoding shell metacharacters into a URL which XChat uses to launch a web browser. | ||
| CVE-2012-0828 | 0.00 | — | 0.05 | Feb 21, 2020 | Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the Basic Multilingual Plane (BMP). | ||
| CVE-2009-0315 | 0.00 | — | 0.00 | Jan 28, 2009 | Untrusted search path vulnerability in the Python module in xchat allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983). | ||
| CVE-2002-0382 | 0.00 | — | 0.01 | Jun 25, 2002 | XChat IRC client allows remote attackers to execute arbitrary commands via a /dns command on a host whose DNS reverse lookup contains shell metacharacters. | ||
| CVE-2001-0792 | 0.00 | — | 0.03 | Oct 18, 2001 | Format string vulnerability in XChat 1.2.x allows remote attackers to execute arbitrary code via a malformed nickname. |