Search criteria Use full-text search for keyword queries.
Combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by dates instead of relevance.

14 vulnerabilities found for mIRC by mIRC

CVE-2008-7314 (GCVE-0-2008-7314)

Vulnerability from nvd – Published: 2020-01-23 14:48 – Updated: 2024-08-07 12:03
VLAI?
Summary
mIRC before 6.35 allows attackers to cause a denial of service (crash) via a long nickname.
Severity ?
No CVSS data available.
CWE
  • Other
Assigner
References
http://www.mirc.com/news.html x_refsource_CONFIRM
https://www.mirc.com/versions.txt x_refsource_CONFIRM
Impacted products
Vendor Product Version
mIRC mIRC Affected: before 6.35
Create a notification for this product.
Date Public ?
2008-10-17 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:03:36.319Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mirc.com/news.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.mirc.com/versions.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "mIRC",
          "vendor": "mIRC",
          "versions": [
            {
              "status": "affected",
              "version": "before 6.35"
            }
          ]
        }
      ],
      "datePublic": "2008-10-17T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "mIRC before 6.35 allows attackers to cause a denial of service (crash) via a long nickname."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Other",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-01-23T14:48:47.000Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mirc.com/news.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.mirc.com/versions.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2008-7314",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "mIRC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before 6.35"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "mIRC"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "mIRC before 6.35 allows attackers to cause a denial of service (crash) via a long nickname."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Other"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.mirc.com/news.html",
              "refsource": "CONFIRM",
              "url": "http://www.mirc.com/news.html"
            },
            {
              "name": "https://www.mirc.com/versions.txt",
              "refsource": "CONFIRM",
              "url": "https://www.mirc.com/versions.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2008-7314",
    "datePublished": "2020-01-23T14:48:47.000Z",
    "dateReserved": "2014-10-09T00:00:00.000Z",
    "dateUpdated": "2024-08-07T12:03:36.319Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-5282 (GCVE-0-2011-5282)

Vulnerability from nvd – Published: 2020-01-21 15:05 – Updated: 2024-08-07 00:30
VLAI?
Summary
mIRC prior to 7.22 has a message leak because chopping of outbound messages is mishandled.
Severity ?
No CVSS data available.
CWE
  • data leak
Assigner
References
Impacted products
Vendor Product Version
mIRC mIRC Affected: prior to 7.22
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:30:46.930Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.mirc.com/news.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "mIRC",
          "vendor": "mIRC",
          "versions": [
            {
              "status": "affected",
              "version": "prior to 7.22"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "mIRC prior to 7.22 has a message leak because chopping of outbound messages is mishandled."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "data leak",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-01-21T15:05:30.000Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.mirc.com/news.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2011-5282",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "mIRC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "prior to 7.22"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "mIRC"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "mIRC prior to 7.22 has a message leak because chopping of outbound messages is mishandled."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "data leak"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.mirc.com/news.html",
              "refsource": "MISC",
              "url": "http://www.mirc.com/news.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-5282",
    "datePublished": "2020-01-21T15:05:30.000Z",
    "dateReserved": "2014-10-09T00:00:00.000Z",
    "dateUpdated": "2024-08-07T00:30:46.930Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-6453 (GCVE-0-2019-6453)

Vulnerability from nvd – Published: 2019-02-18 15:00 – Updated: 2024-08-04 20:23
VLAI?
Summary
mIRC before 7.55 allows remote command execution by using argument injection through custom URI protocol handlers. The attacker can specify an irc:// URI that loads an arbitrary .ini file from a UNC share pathname. Exploitation depends on browser-specific URI handling (Chrome is not exploitable).
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Date Public ?
2019-02-18 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T20:23:20.891Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "46392",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/46392/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://proofofcalc.com/advisories/20190218.txt"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/proofofcalc/cve-2019-6453-poc"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.mirc.com/news.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://proofofcalc.com/cve-2019-6453-mIRC/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://twitter.com/proofofcalc/status/1097518413143003136"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2019-02-18T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "mIRC before 7.55 allows remote command execution by using argument injection through custom URI protocol handlers. The attacker can specify an irc:// URI that loads an arbitrary .ini file from a UNC share pathname. Exploitation depends on browser-specific URI handling (Chrome is not exploitable)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-02-19T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "46392",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/46392/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://proofofcalc.com/advisories/20190218.txt"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/proofofcalc/cve-2019-6453-poc"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.mirc.com/news.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://proofofcalc.com/cve-2019-6453-mIRC/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://twitter.com/proofofcalc/status/1097518413143003136"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-6453",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "mIRC before 7.55 allows remote command execution by using argument injection through custom URI protocol handlers. The attacker can specify an irc:// URI that loads an arbitrary .ini file from a UNC share pathname. Exploitation depends on browser-specific URI handling (Chrome is not exploitable)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "46392",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/46392/"
            },
            {
              "name": "https://proofofcalc.com/advisories/20190218.txt",
              "refsource": "MISC",
              "url": "https://proofofcalc.com/advisories/20190218.txt"
            },
            {
              "name": "https://github.com/proofofcalc/cve-2019-6453-poc",
              "refsource": "MISC",
              "url": "https://github.com/proofofcalc/cve-2019-6453-poc"
            },
            {
              "name": "https://www.mirc.com/news.html",
              "refsource": "MISC",
              "url": "https://www.mirc.com/news.html"
            },
            {
              "name": "https://proofofcalc.com/cve-2019-6453-mIRC/",
              "refsource": "MISC",
              "url": "https://proofofcalc.com/cve-2019-6453-mIRC/"
            },
            {
              "name": "https://twitter.com/proofofcalc/status/1097518413143003136",
              "refsource": "MISC",
              "url": "https://twitter.com/proofofcalc/status/1097518413143003136"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-6453",
    "datePublished": "2019-02-18T15:00:00.000Z",
    "dateReserved": "2019-01-16T00:00:00.000Z",
    "dateUpdated": "2024-08-04T20:23:20.891Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-4449 (GCVE-0-2008-4449)

Vulnerability from nvd – Published: 2008-10-06 19:00 – Updated: 2024-08-07 10:17
VLAI?
Summary
Stack-based buffer overflow in mIRC 6.34 allows remote attackers to execute arbitrary code via a long hostname in a PRIVMSG message.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
https://www.exploit-db.com/exploits/6654 exploitx_refsource_EXPLOIT-DB
http://secunia.com/advisories/32102 third-party-advisoryx_refsource_SECUNIA
https://www.exploit-db.com/exploits/6666 exploitx_refsource_EXPLOIT-DB
http://securityreason.com/securityalert/4352 third-party-advisoryx_refsource_SREASON
http://www.vupen.com/english/advisories/2008/2736 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/31552 vdb-entryx_refsource_BID
Date Public ?
2008-10-02 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:17:09.722Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "mirc-privmsg-bo(45624)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45624"
          },
          {
            "name": "6654",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/6654"
          },
          {
            "name": "32102",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32102"
          },
          {
            "name": "6666",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/6666"
          },
          {
            "name": "4352",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/4352"
          },
          {
            "name": "ADV-2008-2736",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2736"
          },
          {
            "name": "31552",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/31552"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-10-02T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in mIRC 6.34 allows remote attackers to execute arbitrary code via a long hostname in a PRIVMSG message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "mirc-privmsg-bo(45624)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45624"
        },
        {
          "name": "6654",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/6654"
        },
        {
          "name": "32102",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32102"
        },
        {
          "name": "6666",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/6666"
        },
        {
          "name": "4352",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/4352"
        },
        {
          "name": "ADV-2008-2736",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2736"
        },
        {
          "name": "31552",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/31552"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-4449",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in mIRC 6.34 allows remote attackers to execute arbitrary code via a long hostname in a PRIVMSG message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "mirc-privmsg-bo(45624)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45624"
            },
            {
              "name": "6654",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/6654"
            },
            {
              "name": "32102",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32102"
            },
            {
              "name": "6666",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/6666"
            },
            {
              "name": "4352",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/4352"
            },
            {
              "name": "ADV-2008-2736",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2736"
            },
            {
              "name": "31552",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/31552"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-4449",
    "datePublished": "2008-10-06T19:00:00.000Z",
    "dateReserved": "2008-10-06T00:00:00.000Z",
    "dateUpdated": "2024-08-07T10:17:09.722Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-4402 (GCVE-0-2007-4402)

Vulnerability from nvd – Published: 2007-08-18 21:00 – Updated: 2024-08-07 14:53
VLAI?
Summary
Multiple unspecified scripts in mIRC allow user-assisted remote attackers to execute arbitrary code via the '|' (pipe) shell metacharacter in the name of the song in a .mp3 file.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://securityreason.com/securityalert/3036 third-party-advisoryx_refsource_SREASON
http://www.securityfocus.com/archive/1/476649/100… mailing-listx_refsource_BUGTRAQ
http://lists.grok.org.uk/pipermail/full-disclosur… mailing-listx_refsource_FULLDISC
http://www.securityfocus.com/archive/1/476283/100… mailing-listx_refsource_BUGTRAQ
http://wouter.coekaerts.be/site/security/nowplaying x_refsource_MISC
http://secunia.com/advisories/26491 third-party-advisoryx_refsource_SECUNIA
Date Public ?
2007-08-12 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:53:55.980Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "3036",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3036"
          },
          {
            "name": "20070815 Re: Vulnerability in multiple \"now playing\" scripts for various IRC clients",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/476649/100/0/threaded"
          },
          {
            "name": "20070812 Vulnerability in multiple \"now playing\" scripts for various IRC clients",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065227.html"
          },
          {
            "name": "20070812 Vulnerability in multiple \"now playing\" scripts for various IRC clients",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/476283/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://wouter.coekaerts.be/site/security/nowplaying"
          },
          {
            "name": "26491",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26491"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-08-12T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified scripts in mIRC allow user-assisted remote attackers to execute arbitrary code via the \u0027|\u0027 (pipe) shell metacharacter in the name of the song in a .mp3 file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "3036",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3036"
        },
        {
          "name": "20070815 Re: Vulnerability in multiple \"now playing\" scripts for various IRC clients",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/476649/100/0/threaded"
        },
        {
          "name": "20070812 Vulnerability in multiple \"now playing\" scripts for various IRC clients",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065227.html"
        },
        {
          "name": "20070812 Vulnerability in multiple \"now playing\" scripts for various IRC clients",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/476283/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://wouter.coekaerts.be/site/security/nowplaying"
        },
        {
          "name": "26491",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26491"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-4402",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified scripts in mIRC allow user-assisted remote attackers to execute arbitrary code via the \u0027|\u0027 (pipe) shell metacharacter in the name of the song in a .mp3 file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "3036",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3036"
            },
            {
              "name": "20070815 Re: Vulnerability in multiple \"now playing\" scripts for various IRC clients",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/476649/100/0/threaded"
            },
            {
              "name": "20070812 Vulnerability in multiple \"now playing\" scripts for various IRC clients",
              "refsource": "FULLDISC",
              "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065227.html"
            },
            {
              "name": "20070812 Vulnerability in multiple \"now playing\" scripts for various IRC clients",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/476283/100/0/threaded"
            },
            {
              "name": "http://wouter.coekaerts.be/site/security/nowplaying",
              "refsource": "MISC",
              "url": "http://wouter.coekaerts.be/site/security/nowplaying"
            },
            {
              "name": "26491",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26491"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-4402",
    "datePublished": "2007-08-18T21:00:00.000Z",
    "dateReserved": "2007-08-18T00:00:00.000Z",
    "dateUpdated": "2024-08-07T14:53:55.980Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2003-1508 (GCVE-0-2003-1508)

Vulnerability from nvd – Published: 2007-10-25 19:00 – Updated: 2024-08-08 02:28
VLAI?
Summary
Buffer overflow in mIRC 6.12, when the DCC get dialog window has been minimized and the user opens the minimized window, allows remote attackers to cause a denial of service (crash) via a long filename.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://securityreason.com/securityalert/3303 third-party-advisoryx_refsource_SREASON
http://www.securityfocus.com/archive/1/342179 mailing-listx_refsource_BUGTRAQ
http://www.irchelp.org/irchelp/mirc/exploit.html x_refsource_CONFIRM
http://www.securityfocus.com/bid/8880 vdb-entryx_refsource_BID
Date Public ?
2003-10-23 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T02:28:03.726Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "3303",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3303"
          },
          {
            "name": "20031023 (Fw) : mIRC 6.12 (latest) DCC Exploit",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/342179"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.irchelp.org/irchelp/mirc/exploit.html"
          },
          {
            "name": "8880",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/8880"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2003-10-23T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in mIRC 6.12, when the DCC get dialog window has been minimized and the user opens the minimized window, allows remote attackers to cause a denial of service (crash) via a long filename."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-11-28T10:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "3303",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3303"
        },
        {
          "name": "20031023 (Fw) : mIRC 6.12 (latest) DCC Exploit",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/342179"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.irchelp.org/irchelp/mirc/exploit.html"
        },
        {
          "name": "8880",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/8880"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2003-1508",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in mIRC 6.12, when the DCC get dialog window has been minimized and the user opens the minimized window, allows remote attackers to cause a denial of service (crash) via a long filename."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "3303",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3303"
            },
            {
              "name": "20031023 (Fw) : mIRC 6.12 (latest) DCC Exploit",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/342179"
            },
            {
              "name": "http://www.irchelp.org/irchelp/mirc/exploit.html",
              "refsource": "CONFIRM",
              "url": "http://www.irchelp.org/irchelp/mirc/exploit.html"
            },
            {
              "name": "8880",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/8880"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2003-1508",
    "datePublished": "2007-10-25T19:00:00.000Z",
    "dateReserved": "2007-10-25T00:00:00.000Z",
    "dateUpdated": "2024-08-08T02:28:03.726Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2003-1336 (GCVE-0-2003-1336)

Vulnerability from nvd – Published: 2007-09-23 23:00 – Updated: 2024-08-08 02:28
VLAI?
Summary
Buffer overflow in mIRC before 6.11 allows remote attackers to execute arbitrary code via a long irc:// URL.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://archives.neohapsis.com/archives/ntbugtraq/… mailing-listx_refsource_NTBUGTRAQ
http://www.osvdb.org/2665 vdb-entryx_refsource_OSVDB
http://www.securiteam.com/windowsntfocus/6M00B0U8… x_refsource_MISC
http://secunia.com/advisories/9996 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/bid/8819 vdb-entryx_refsource_BID
Date Public ?
2003-10-13 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T02:28:01.617Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20031015 mIRC Buffer Overflow in irc protocol handler",
            "tags": [
              "mailing-list",
              "x_refsource_NTBUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/ntbugtraq/2003-q4/0060.html"
          },
          {
            "name": "2665",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/2665"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.securiteam.com/windowsntfocus/6M00B0U8KE.html"
          },
          {
            "name": "9996",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/9996"
          },
          {
            "name": "mirc-ircprotocol-execute-code(13405)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13405"
          },
          {
            "name": "8819",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/8819"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2003-10-13T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in mIRC before 6.11 allows remote attackers to execute arbitrary code via a long irc:// URL."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20031015 mIRC Buffer Overflow in irc protocol handler",
          "tags": [
            "mailing-list",
            "x_refsource_NTBUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/ntbugtraq/2003-q4/0060.html"
        },
        {
          "name": "2665",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/2665"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.securiteam.com/windowsntfocus/6M00B0U8KE.html"
        },
        {
          "name": "9996",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/9996"
        },
        {
          "name": "mirc-ircprotocol-execute-code(13405)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13405"
        },
        {
          "name": "8819",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/8819"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2003-1336",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in mIRC before 6.11 allows remote attackers to execute arbitrary code via a long irc:// URL."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20031015 mIRC Buffer Overflow in irc protocol handler",
              "refsource": "NTBUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/ntbugtraq/2003-q4/0060.html"
            },
            {
              "name": "2665",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/2665"
            },
            {
              "name": "http://www.securiteam.com/windowsntfocus/6M00B0U8KE.html",
              "refsource": "MISC",
              "url": "http://www.securiteam.com/windowsntfocus/6M00B0U8KE.html"
            },
            {
              "name": "9996",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/9996"
            },
            {
              "name": "mirc-ircprotocol-execute-code(13405)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13405"
            },
            {
              "name": "8819",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/8819"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2003-1336",
    "datePublished": "2007-09-23T23:00:00.000Z",
    "dateReserved": "2007-09-23T00:00:00.000Z",
    "dateUpdated": "2024-08-08T02:28:01.617Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-7314 (GCVE-0-2008-7314)

Vulnerability from cvelistv5 – Published: 2020-01-23 14:48 – Updated: 2024-08-07 12:03
VLAI?
Summary
mIRC before 6.35 allows attackers to cause a denial of service (crash) via a long nickname.
Severity ?
No CVSS data available.
CWE
  • Other
Assigner
References
http://www.mirc.com/news.html x_refsource_CONFIRM
https://www.mirc.com/versions.txt x_refsource_CONFIRM
Impacted products
Vendor Product Version
mIRC mIRC Affected: before 6.35
Create a notification for this product.
Date Public ?
2008-10-17 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:03:36.319Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mirc.com/news.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.mirc.com/versions.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "mIRC",
          "vendor": "mIRC",
          "versions": [
            {
              "status": "affected",
              "version": "before 6.35"
            }
          ]
        }
      ],
      "datePublic": "2008-10-17T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "mIRC before 6.35 allows attackers to cause a denial of service (crash) via a long nickname."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Other",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-01-23T14:48:47.000Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mirc.com/news.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.mirc.com/versions.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2008-7314",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "mIRC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before 6.35"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "mIRC"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "mIRC before 6.35 allows attackers to cause a denial of service (crash) via a long nickname."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Other"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.mirc.com/news.html",
              "refsource": "CONFIRM",
              "url": "http://www.mirc.com/news.html"
            },
            {
              "name": "https://www.mirc.com/versions.txt",
              "refsource": "CONFIRM",
              "url": "https://www.mirc.com/versions.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2008-7314",
    "datePublished": "2020-01-23T14:48:47.000Z",
    "dateReserved": "2014-10-09T00:00:00.000Z",
    "dateUpdated": "2024-08-07T12:03:36.319Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-5282 (GCVE-0-2011-5282)

Vulnerability from cvelistv5 – Published: 2020-01-21 15:05 – Updated: 2024-08-07 00:30
VLAI?
Summary
mIRC prior to 7.22 has a message leak because chopping of outbound messages is mishandled.
Severity ?
No CVSS data available.
CWE
  • data leak
Assigner
References
Impacted products
Vendor Product Version
mIRC mIRC Affected: prior to 7.22
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:30:46.930Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.mirc.com/news.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "mIRC",
          "vendor": "mIRC",
          "versions": [
            {
              "status": "affected",
              "version": "prior to 7.22"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "mIRC prior to 7.22 has a message leak because chopping of outbound messages is mishandled."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "data leak",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-01-21T15:05:30.000Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.mirc.com/news.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2011-5282",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "mIRC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "prior to 7.22"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "mIRC"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "mIRC prior to 7.22 has a message leak because chopping of outbound messages is mishandled."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "data leak"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.mirc.com/news.html",
              "refsource": "MISC",
              "url": "http://www.mirc.com/news.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-5282",
    "datePublished": "2020-01-21T15:05:30.000Z",
    "dateReserved": "2014-10-09T00:00:00.000Z",
    "dateUpdated": "2024-08-07T00:30:46.930Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-6453 (GCVE-0-2019-6453)

Vulnerability from cvelistv5 – Published: 2019-02-18 15:00 – Updated: 2024-08-04 20:23
VLAI?
Summary
mIRC before 7.55 allows remote command execution by using argument injection through custom URI protocol handlers. The attacker can specify an irc:// URI that loads an arbitrary .ini file from a UNC share pathname. Exploitation depends on browser-specific URI handling (Chrome is not exploitable).
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Date Public ?
2019-02-18 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T20:23:20.891Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "46392",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/46392/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://proofofcalc.com/advisories/20190218.txt"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/proofofcalc/cve-2019-6453-poc"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.mirc.com/news.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://proofofcalc.com/cve-2019-6453-mIRC/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://twitter.com/proofofcalc/status/1097518413143003136"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2019-02-18T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "mIRC before 7.55 allows remote command execution by using argument injection through custom URI protocol handlers. The attacker can specify an irc:// URI that loads an arbitrary .ini file from a UNC share pathname. Exploitation depends on browser-specific URI handling (Chrome is not exploitable)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-02-19T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "46392",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/46392/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://proofofcalc.com/advisories/20190218.txt"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/proofofcalc/cve-2019-6453-poc"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.mirc.com/news.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://proofofcalc.com/cve-2019-6453-mIRC/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://twitter.com/proofofcalc/status/1097518413143003136"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-6453",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "mIRC before 7.55 allows remote command execution by using argument injection through custom URI protocol handlers. The attacker can specify an irc:// URI that loads an arbitrary .ini file from a UNC share pathname. Exploitation depends on browser-specific URI handling (Chrome is not exploitable)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "46392",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/46392/"
            },
            {
              "name": "https://proofofcalc.com/advisories/20190218.txt",
              "refsource": "MISC",
              "url": "https://proofofcalc.com/advisories/20190218.txt"
            },
            {
              "name": "https://github.com/proofofcalc/cve-2019-6453-poc",
              "refsource": "MISC",
              "url": "https://github.com/proofofcalc/cve-2019-6453-poc"
            },
            {
              "name": "https://www.mirc.com/news.html",
              "refsource": "MISC",
              "url": "https://www.mirc.com/news.html"
            },
            {
              "name": "https://proofofcalc.com/cve-2019-6453-mIRC/",
              "refsource": "MISC",
              "url": "https://proofofcalc.com/cve-2019-6453-mIRC/"
            },
            {
              "name": "https://twitter.com/proofofcalc/status/1097518413143003136",
              "refsource": "MISC",
              "url": "https://twitter.com/proofofcalc/status/1097518413143003136"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-6453",
    "datePublished": "2019-02-18T15:00:00.000Z",
    "dateReserved": "2019-01-16T00:00:00.000Z",
    "dateUpdated": "2024-08-04T20:23:20.891Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-4449 (GCVE-0-2008-4449)

Vulnerability from cvelistv5 – Published: 2008-10-06 19:00 – Updated: 2024-08-07 10:17
VLAI?
Summary
Stack-based buffer overflow in mIRC 6.34 allows remote attackers to execute arbitrary code via a long hostname in a PRIVMSG message.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
https://www.exploit-db.com/exploits/6654 exploitx_refsource_EXPLOIT-DB
http://secunia.com/advisories/32102 third-party-advisoryx_refsource_SECUNIA
https://www.exploit-db.com/exploits/6666 exploitx_refsource_EXPLOIT-DB
http://securityreason.com/securityalert/4352 third-party-advisoryx_refsource_SREASON
http://www.vupen.com/english/advisories/2008/2736 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/31552 vdb-entryx_refsource_BID
Date Public ?
2008-10-02 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:17:09.722Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "mirc-privmsg-bo(45624)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45624"
          },
          {
            "name": "6654",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/6654"
          },
          {
            "name": "32102",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32102"
          },
          {
            "name": "6666",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/6666"
          },
          {
            "name": "4352",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/4352"
          },
          {
            "name": "ADV-2008-2736",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2736"
          },
          {
            "name": "31552",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/31552"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-10-02T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in mIRC 6.34 allows remote attackers to execute arbitrary code via a long hostname in a PRIVMSG message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "mirc-privmsg-bo(45624)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45624"
        },
        {
          "name": "6654",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/6654"
        },
        {
          "name": "32102",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32102"
        },
        {
          "name": "6666",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/6666"
        },
        {
          "name": "4352",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/4352"
        },
        {
          "name": "ADV-2008-2736",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2736"
        },
        {
          "name": "31552",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/31552"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-4449",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in mIRC 6.34 allows remote attackers to execute arbitrary code via a long hostname in a PRIVMSG message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "mirc-privmsg-bo(45624)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45624"
            },
            {
              "name": "6654",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/6654"
            },
            {
              "name": "32102",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32102"
            },
            {
              "name": "6666",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/6666"
            },
            {
              "name": "4352",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/4352"
            },
            {
              "name": "ADV-2008-2736",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2736"
            },
            {
              "name": "31552",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/31552"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-4449",
    "datePublished": "2008-10-06T19:00:00.000Z",
    "dateReserved": "2008-10-06T00:00:00.000Z",
    "dateUpdated": "2024-08-07T10:17:09.722Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2003-1508 (GCVE-0-2003-1508)

Vulnerability from cvelistv5 – Published: 2007-10-25 19:00 – Updated: 2024-08-08 02:28
VLAI?
Summary
Buffer overflow in mIRC 6.12, when the DCC get dialog window has been minimized and the user opens the minimized window, allows remote attackers to cause a denial of service (crash) via a long filename.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://securityreason.com/securityalert/3303 third-party-advisoryx_refsource_SREASON
http://www.securityfocus.com/archive/1/342179 mailing-listx_refsource_BUGTRAQ
http://www.irchelp.org/irchelp/mirc/exploit.html x_refsource_CONFIRM
http://www.securityfocus.com/bid/8880 vdb-entryx_refsource_BID
Date Public ?
2003-10-23 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T02:28:03.726Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "3303",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3303"
          },
          {
            "name": "20031023 (Fw) : mIRC 6.12 (latest) DCC Exploit",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/342179"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.irchelp.org/irchelp/mirc/exploit.html"
          },
          {
            "name": "8880",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/8880"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2003-10-23T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in mIRC 6.12, when the DCC get dialog window has been minimized and the user opens the minimized window, allows remote attackers to cause a denial of service (crash) via a long filename."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-11-28T10:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "3303",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3303"
        },
        {
          "name": "20031023 (Fw) : mIRC 6.12 (latest) DCC Exploit",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/342179"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.irchelp.org/irchelp/mirc/exploit.html"
        },
        {
          "name": "8880",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/8880"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2003-1508",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in mIRC 6.12, when the DCC get dialog window has been minimized and the user opens the minimized window, allows remote attackers to cause a denial of service (crash) via a long filename."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "3303",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3303"
            },
            {
              "name": "20031023 (Fw) : mIRC 6.12 (latest) DCC Exploit",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/342179"
            },
            {
              "name": "http://www.irchelp.org/irchelp/mirc/exploit.html",
              "refsource": "CONFIRM",
              "url": "http://www.irchelp.org/irchelp/mirc/exploit.html"
            },
            {
              "name": "8880",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/8880"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2003-1508",
    "datePublished": "2007-10-25T19:00:00.000Z",
    "dateReserved": "2007-10-25T00:00:00.000Z",
    "dateUpdated": "2024-08-08T02:28:03.726Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2003-1336 (GCVE-0-2003-1336)

Vulnerability from cvelistv5 – Published: 2007-09-23 23:00 – Updated: 2024-08-08 02:28
VLAI?
Summary
Buffer overflow in mIRC before 6.11 allows remote attackers to execute arbitrary code via a long irc:// URL.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://archives.neohapsis.com/archives/ntbugtraq/… mailing-listx_refsource_NTBUGTRAQ
http://www.osvdb.org/2665 vdb-entryx_refsource_OSVDB
http://www.securiteam.com/windowsntfocus/6M00B0U8… x_refsource_MISC
http://secunia.com/advisories/9996 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/bid/8819 vdb-entryx_refsource_BID
Date Public ?
2003-10-13 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T02:28:01.617Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20031015 mIRC Buffer Overflow in irc protocol handler",
            "tags": [
              "mailing-list",
              "x_refsource_NTBUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/ntbugtraq/2003-q4/0060.html"
          },
          {
            "name": "2665",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/2665"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.securiteam.com/windowsntfocus/6M00B0U8KE.html"
          },
          {
            "name": "9996",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/9996"
          },
          {
            "name": "mirc-ircprotocol-execute-code(13405)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13405"
          },
          {
            "name": "8819",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/8819"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2003-10-13T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in mIRC before 6.11 allows remote attackers to execute arbitrary code via a long irc:// URL."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20031015 mIRC Buffer Overflow in irc protocol handler",
          "tags": [
            "mailing-list",
            "x_refsource_NTBUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/ntbugtraq/2003-q4/0060.html"
        },
        {
          "name": "2665",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/2665"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.securiteam.com/windowsntfocus/6M00B0U8KE.html"
        },
        {
          "name": "9996",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/9996"
        },
        {
          "name": "mirc-ircprotocol-execute-code(13405)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13405"
        },
        {
          "name": "8819",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/8819"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2003-1336",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in mIRC before 6.11 allows remote attackers to execute arbitrary code via a long irc:// URL."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20031015 mIRC Buffer Overflow in irc protocol handler",
              "refsource": "NTBUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/ntbugtraq/2003-q4/0060.html"
            },
            {
              "name": "2665",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/2665"
            },
            {
              "name": "http://www.securiteam.com/windowsntfocus/6M00B0U8KE.html",
              "refsource": "MISC",
              "url": "http://www.securiteam.com/windowsntfocus/6M00B0U8KE.html"
            },
            {
              "name": "9996",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/9996"
            },
            {
              "name": "mirc-ircprotocol-execute-code(13405)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13405"
            },
            {
              "name": "8819",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/8819"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2003-1336",
    "datePublished": "2007-09-23T23:00:00.000Z",
    "dateReserved": "2007-09-23T00:00:00.000Z",
    "dateUpdated": "2024-08-08T02:28:01.617Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-4402 (GCVE-0-2007-4402)

Vulnerability from cvelistv5 – Published: 2007-08-18 21:00 – Updated: 2024-08-07 14:53
VLAI?
Summary
Multiple unspecified scripts in mIRC allow user-assisted remote attackers to execute arbitrary code via the '|' (pipe) shell metacharacter in the name of the song in a .mp3 file.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://securityreason.com/securityalert/3036 third-party-advisoryx_refsource_SREASON
http://www.securityfocus.com/archive/1/476649/100… mailing-listx_refsource_BUGTRAQ
http://lists.grok.org.uk/pipermail/full-disclosur… mailing-listx_refsource_FULLDISC
http://www.securityfocus.com/archive/1/476283/100… mailing-listx_refsource_BUGTRAQ
http://wouter.coekaerts.be/site/security/nowplaying x_refsource_MISC
http://secunia.com/advisories/26491 third-party-advisoryx_refsource_SECUNIA
Date Public ?
2007-08-12 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:53:55.980Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "3036",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3036"
          },
          {
            "name": "20070815 Re: Vulnerability in multiple \"now playing\" scripts for various IRC clients",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/476649/100/0/threaded"
          },
          {
            "name": "20070812 Vulnerability in multiple \"now playing\" scripts for various IRC clients",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065227.html"
          },
          {
            "name": "20070812 Vulnerability in multiple \"now playing\" scripts for various IRC clients",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/476283/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://wouter.coekaerts.be/site/security/nowplaying"
          },
          {
            "name": "26491",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26491"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-08-12T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified scripts in mIRC allow user-assisted remote attackers to execute arbitrary code via the \u0027|\u0027 (pipe) shell metacharacter in the name of the song in a .mp3 file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "3036",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3036"
        },
        {
          "name": "20070815 Re: Vulnerability in multiple \"now playing\" scripts for various IRC clients",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/476649/100/0/threaded"
        },
        {
          "name": "20070812 Vulnerability in multiple \"now playing\" scripts for various IRC clients",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065227.html"
        },
        {
          "name": "20070812 Vulnerability in multiple \"now playing\" scripts for various IRC clients",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/476283/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://wouter.coekaerts.be/site/security/nowplaying"
        },
        {
          "name": "26491",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26491"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-4402",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified scripts in mIRC allow user-assisted remote attackers to execute arbitrary code via the \u0027|\u0027 (pipe) shell metacharacter in the name of the song in a .mp3 file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "3036",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3036"
            },
            {
              "name": "20070815 Re: Vulnerability in multiple \"now playing\" scripts for various IRC clients",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/476649/100/0/threaded"
            },
            {
              "name": "20070812 Vulnerability in multiple \"now playing\" scripts for various IRC clients",
              "refsource": "FULLDISC",
              "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-August/065227.html"
            },
            {
              "name": "20070812 Vulnerability in multiple \"now playing\" scripts for various IRC clients",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/476283/100/0/threaded"
            },
            {
              "name": "http://wouter.coekaerts.be/site/security/nowplaying",
              "refsource": "MISC",
              "url": "http://wouter.coekaerts.be/site/security/nowplaying"
            },
            {
              "name": "26491",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26491"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-4402",
    "datePublished": "2007-08-18T21:00:00.000Z",
    "dateReserved": "2007-08-18T00:00:00.000Z",
    "dateUpdated": "2024-08-07T14:53:55.980Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}