Show filters
13 Total Results
Displaying 1-10 of 13
Sort by:
Attacker Value
Unknown

CVE-2021-34825

Disclosure Date: June 17, 2021 (last updated February 22, 2025)
Quassel through 0.13.1, when --require-ssl is enabled, launches without SSL or TLS support if a usable X.509 certificate is not found on the local system.
Attacker Value
Unknown

CVE-2018-1000179

Disclosure Date: May 08, 2018 (last updated November 26, 2024)
A NULL Pointer Dereference of CWE-476 exists in quassel version 0.12.4 in the quasselcore void CoreAuthHandler::handle(const Login &msg) coreauthhandler.cpp line 235 that allows an attacker to cause a denial of service.
0
Attacker Value
Unknown

CVE-2018-1000178

Disclosure Date: May 08, 2018 (last updated November 26, 2024)
A heap corruption of type CWE-120 exists in quassel version 0.12.4 in quasselcore in void DataStreamPeer::processMessage(const QByteArray &msg) datastreampeer.cpp line 62 that allows an attacker to execute code remotely.
0
Attacker Value
Unknown

CVE-2016-4414

Disclosure Date: June 13, 2016 (last updated November 25, 2024)
The onReadyRead function in core/coreauthhandler.cpp in Quassel before 0.12.4 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via invalid handshake data.
0
Attacker Value
Unknown

CVE-2015-8547

Disclosure Date: January 08, 2016 (last updated November 25, 2024)
The CoreUserInputHandler::doMode function in core/coreuserinputhandler.cpp in Quassel 0.10.0 allows remote attackers to cause a denial of service (application crash) via the "/op *" command in a query.
0
Attacker Value
Unknown

CVE-2015-3427

Disclosure Date: May 14, 2015 (last updated October 05, 2023)
Quassel before 0.12.2 does not properly re-initialize the database session when the PostgreSQL database is restarted, which allows remote attackers to conduct SQL injection attacks via a \ (backslash) in a message. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4422.
0
Attacker Value
Unknown

CVE-2015-2778

Disclosure Date: April 10, 2015 (last updated October 05, 2023)
Quassel before 0.12-rc1 uses an incorrect data-type size when splitting a message, which allows remote attackers to cause a denial of service (crash) via a long CTCP query containing only multibyte characters.
0
Attacker Value
Unknown

CVE-2015-2779

Disclosure Date: April 10, 2015 (last updated October 05, 2023)
Stack consumption vulnerability in the message splitting functionality in Quassel before 0.12-rc1 allows remote attackers to cause a denial of service (uncontrolled recursion) via a crafted massage.
0
Attacker Value
Unknown

CVE-2014-8483

Disclosure Date: November 06, 2014 (last updated October 05, 2023)
The blowfishECB function in core/cipher.cpp in Quassel IRC 0.10.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a malformed string.
0
Attacker Value
Unknown

CVE-2013-6404

Disclosure Date: December 09, 2013 (last updated October 05, 2023)
Quassel core (server daemon) in Quassel IRC before 0.9.2 does not properly verify the user ID when accessing user backlogs, which allows remote authenticated users to read other users' backlogs via the bufferid in (1) 16/select_buffer_by_id.sql, (2) 16/select_buffer_by_id.sql, and (3) 16/select_buffer_by_id.sql in core/SQL/PostgreSQL/.
0