WeeChat 3.2

CPE Details

WeeChat 3.2
3.2
2022-04-11
14h17 +00:00
2022-05-18
11h13 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:weechat:weechat:3.2:-:*:*:*:*:*:*

Informations

Vendor

weechat

Product

weechat

Version

3.2

Update

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-46613 2024-11-09 23h00 +00:00 WeeChat before 4.4.2 has an integer overflow and resultant buffer overflow at core/core-string.c when there are more than two billion items in a list. This affects string_free_split_shared , string_free_split, string_free_split_command, and string_free_split_tags.
9.8
Critical
CVE-2022-28352 2022-04-02 14h36 +00:00 WeeChat (aka Wee Enhanced Environment for Chat) 3.2 to 3.4 before 3.4.1 does not properly verify the TLS certificate of the server, after certain GnuTLS options are changed, which allows man-in-the-middle attackers to spoof a TLS chat server via an arbitrary certificate. NOTE: this only affects situations where weechat.network.gnutls_ca_system or weechat.network.gnutls_ca_user is changed without a WeeChat restart.
4.8
Medium
CVE-2021-40516 2021-09-05 15h14 +00:00 WeeChat before 3.2.1 allows remote attackers to cause a denial of service (crash) via a crafted WebSocket frame that trigger an out-of-bounds read in plugins/relay/relay-websocket.c in the Relay plugin.
7.5
High