Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
centericq centericq vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv2
CVE-2005-3694
centericq 4.20.0-r3 with "Enable peer-to-peer communications" set allows remote malicious users to cause a denial of service (segmentation fault and crash) via short zero-length packets, and possibly packets of length 1 or 2, as demonstrated using Nessus.
Centericq Centericq 4.20.0 R3
1 EDB exploit
7.5
CVSSv2
CVE-2007-3713
Multiple buffer overflows in Konst CenterICQ 4.9.11 up to and including 4.21 allow remote malicious users to execute arbitrary code via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. NOTE: th...
Konst Centericq 4.21
Konst Centericq 4.9.11
Konst Centericq 4.9.12
Konst Centericq 4.12
Konst Centericq 4.14
Konst Centericq 4.13
Konst Centericq 4.20
7.5
CVSSv2
CVE-2007-0160
Stack-based buffer overflow in the LiveJournal support (hooks/ljhook.cc) in CenterICQ 4.9.11 up to and including 4.21.0, when using unofficial LiveJournal servers, allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code by adding the...
Centericq Centericq 4.9.12
Centericq Centericq 4.21
Centericq Centericq 4.9.11
Centericq Centericq 4.12
Centericq Centericq 4.13
Centericq Centericq 4.14
Centericq Centericq 4.20
7.5
CVSSv2
CVE-2005-3863
Stack-based buffer overflow in kkstrtext.h in ktools library 0.3 and previous versions, as used in products such as (1) centericq, (2) orpheus, (3) motor, and (4) groan, allows local users or remote malicious users to execute arbitrary code via a long parameter to the VGETSTRING ...
Ktools Ktools
7.5
CVSSv2
CVE-2005-1852
Multiple integer overflows in libgadu, as used in Kopete in KDE 3.2.3 to 3.4.1, ekg prior to 1.6rc3, GNU Gadu, CenterICQ, Kadu, and other packages, allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via an incoming message.
Ekg Ekg 1.1 Rc2
Ekg Ekg 1.3
Ekg Ekg 1.1
Ekg Ekg 1.1 Rc1
Ekg Ekg 1.4
Ekg Ekg 1.5
Ekg Ekg 1.0
Ekg Ekg 1.0 Rc2
Ekg Ekg 1.0 Rc3
Ekg Ekg 1.5 Rc1
Ekg Ekg 1.5 Rc2
Kde Kde 3.3
Kde Kde 3.3.1
Kde Kde 3.2.3
Kde Kde 3.3.2
Kde Kde 3.4
Kde Kde 3.4.0
Kde Kde 3.4.1
Centericq Centericq
Kadu Kadu
2.1
CVSSv2
CVE-2005-1914
CenterICQ 4.20.0 and previous versions creates temporary files with predictable file names, which allows local users to overwrite arbitrary files via a symlink attack on the gg.token.PID temporary file.
Centericq Centericq 4.20
Centericq Centericq 4.20.0.1
Centericq Centericq 4.5.0.3
Centericq Centericq 4.5.1
Centericq Centericq 4.7.8
Centericq Centericq 4.7.8.3
Centericq Centericq 4.8.0
Centericq Centericq 4.8.0.1
Centericq Centericq 4.8.8
Centericq Centericq 4.8.8.1
Centericq Centericq 4.8.9
Centericq Centericq 4.9.0
Centericq Centericq 4.9.4
Centericq Centericq 4.9.4.1
Centericq Centericq 4.9.5
Centericq Centericq 4.9.5.1
Centericq Centericq 4.10.0.1
Centericq Centericq 4.11.0.1
Centericq Centericq 4.12
Centericq Centericq 4.12.0.1
Centericq Centericq 4.6.5.3
Centericq Centericq 4.6.9
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
XXE
CVE-2024-34490
SQL injection
CVE-2024-34488
CVE-2024-4507
CVE-2023-7028
CVE-2024-23187
TCP
CVE-2024-4439
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started