Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
irssi irssi 1.1.0 vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2018-7053
An issue exists in Irssi prior to 1.0.7 and 1.1.x prior to 1.1.1. There is a use-after-free when SASL messages are received in an unexpected order.
Irssi Irssi 1.1.0
Irssi Irssi
Debian Debian Linux 9.0
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 17.10
9.8
CVSSv3
CVE-2018-7054
An issue exists in Irssi prior to 1.0.7 and 1.1.x prior to 1.1.1. There is a use-after-free when a server is disconnected during netsplits. NOTE: this issue exists because of an incomplete fix for CVE-2017-7191.
Irssi Irssi 1.1.0
Irssi Irssi
Canonical Ubuntu Linux 17.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Debian Debian Linux 9.0
7.5
CVSSv3
CVE-2018-7050
An issue exists in Irssi prior to 1.0.7 and 1.1.x prior to 1.1.1. A NULL pointer dereference occurs for an "empty" nick.
Irssi Irssi
Irssi Irssi 1.1.0
Debian Debian Linux 9.0
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 17.10
Canonical Ubuntu Linux 16.04
7.5
CVSSv3
CVE-2018-7051
An issue exists in Irssi prior to 1.0.7 and 1.1.x prior to 1.1.1. Certain nick names could result in out-of-bounds access when printing theme strings.
Irssi Irssi 1.1.0
Irssi Irssi
Debian Debian Linux 7.0
Debian Debian Linux 9.0
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 17.10
Canonical Ubuntu Linux 16.04
7.5
CVSSv3
CVE-2018-7052
An issue exists in Irssi prior to 1.0.7 and 1.1.x prior to 1.1.1. When the number of windows exceeds the available space, a crash due to a NULL pointer dereference would occur.
Irssi Irssi 1.1.0
Irssi Irssi
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 17.10
Debian Debian Linux 9.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started