Show filters
4 Total Results
Displaying 1-4 of 4
Sort by:
Attacker Value
Unknown
CVE-2012-5534
Disclosure Date: December 03, 2012 (last updated October 05, 2023)
The hook_process function in the plugin API for WeeChat 0.3.0 through 0.3.9.1 allows remote attackers to execute arbitrary commands via shell metacharacters in a command from a plugin, related to "shell expansion."
0
Attacker Value
Unknown
CVE-2012-5854
Disclosure Date: November 19, 2012 (last updated October 05, 2023)
Heap-based buffer overflow in WeeChat 0.3.6 through 0.3.9 allows remote attackers to cause a denial of service (crash or hang) and possibly execute arbitrary code via crafted IRC colors that are not properly decoded.
0
Attacker Value
Unknown
CVE-2011-1428
Disclosure Date: March 16, 2011 (last updated October 04, 2023)
Wee Enhanced Environment for Chat (aka WeeChat) 0.3.4 and earlier does not properly verify that the server hostname matches the domain name of the subject of an X.509 certificate, which allows man-in-the-middle attackers to spoof an SSL chat server via an arbitrary certificate, related to incorrect use of the GnuTLS API.
0
Attacker Value
Unknown
CVE-2009-0661
Disclosure Date: March 19, 2009 (last updated October 04, 2023)
Wee Enhanced Environment for Chat (WeeChat) 0.2.6 allows remote attackers to cause a denial of service (crash) via an IRC PRIVMSG command containing crafted color codes that trigger an out-of-bounds read.
0