WeeChat 2.7

CPE Details

WeeChat 2.7
2.7
2020-02-18
15h31 +00:00
2020-02-18
15h31 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:weechat:weechat:2.7:-:*:*:*:*:*:*

Informations

Vendor

weechat

Product

weechat

Version

2.7

Update

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-46613 2024-11-09 23h00 +00:00 WeeChat before 4.4.2 has an integer overflow and resultant buffer overflow at core/core-string.c when there are more than two billion items in a list. This affects string_free_split_shared , string_free_split, string_free_split_command, and string_free_split_tags.
9.8
Critical
CVE-2021-40516 2021-09-05 15h14 +00:00 WeeChat before 3.2.1 allows remote attackers to cause a denial of service (crash) via a crafted WebSocket frame that trigger an out-of-bounds read in plugins/relay/relay-websocket.c in the Relay plugin.
7.5
High
CVE-2020-9760 2020-03-23 14h39 +00:00 An issue was discovered in WeeChat before 2.7.1 (0.3.4 to 2.7 are affected). When a new IRC message 005 is received with longer nick prefixes, a buffer overflow and possibly a crash can happen when a new mode is set for a nick.
9.8
Critical
CVE-2020-8955 2020-02-12 20h58 +00:00 irc_mode_channel_update in plugins/irc/irc-mode.c in WeeChat through 2.7 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a malformed IRC message 324 (channel mode).
9.8
Critical