Vulnerabilites related to quassel-irc - quassel_irc
cve-2010-3443
Vulnerability from cvelistv5
Published
2013-11-23 11:00
Modified
2024-08-07 03:11
Severity ?
Summary
ctcphandler.cpp in Quassel before 0.6.3 and 0.7.x before 0.7.1 allows remote attackers to cause a denial of service (unresponsive IRC) via multiple Client-To-Client Protocol (CTCP) requests in a PRIVMSG message.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:11:43.740Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.quassel-irc.org/?p=quassel.git%3Ba=commitdiff%3Bh=a4ca568cdf68cf4a0343eb161518dc8e50cea87d"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.quassel-irc.org/issues/1023"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.quassel-irc.org/issues/1024"
          },
          {
            "name": "55581",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/55581"
          },
          {
            "name": "USN-991-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://ubuntu.com/usn/usn-991-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://quassel-irc.org/node/115"
          },
          {
            "name": "GLSA-201311-03",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201311-03.xml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-11-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "ctcphandler.cpp in Quassel before 0.6.3 and 0.7.x before 0.7.1 allows remote attackers to cause a denial of service (unresponsive IRC) via multiple Client-To-Client Protocol (CTCP) requests in a PRIVMSG message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-11-23T18:10:04",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.quassel-irc.org/?p=quassel.git%3Ba=commitdiff%3Bh=a4ca568cdf68cf4a0343eb161518dc8e50cea87d"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.quassel-irc.org/issues/1023"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.quassel-irc.org/issues/1024"
        },
        {
          "name": "55581",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/55581"
        },
        {
          "name": "USN-991-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://ubuntu.com/usn/usn-991-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://quassel-irc.org/node/115"
        },
        {
          "name": "GLSA-201311-03",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201311-03.xml"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2010-3443",
    "datePublished": "2013-11-23T11:00:00",
    "dateReserved": "2010-09-17T00:00:00",
    "dateUpdated": "2024-08-07T03:11:43.740Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-6404
Vulnerability from cvelistv5
Published
2013-12-09 11:00
Modified
2024-08-06 17:39
Severity ?
Summary
Quassel core (server daemon) in Quassel IRC before 0.9.2 does not properly verify the user ID when accessing user backlogs, which allows remote authenticated users to read other users' backlogs via the bufferid in (1) 16/select_buffer_by_id.sql, (2) 16/select_buffer_by_id.sql, and (3) 16/select_buffer_by_id.sql in core/SQL/PostgreSQL/.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:39:01.300Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/quassel/quassel/commit/a1a24da"
          },
          {
            "name": "openSUSE-SU-2013:1929",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00092.html"
          },
          {
            "name": "[oss-security] 20131127 Re: CVE Request: Quassel IRC - manipulated clients can access backlog of all users on a shared core",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/11/28/8"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://quassel-irc.org/node/123"
          },
          {
            "name": "quasselirc-cve20136404-sec-bypass(89377)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89377"
          },
          {
            "name": "55640",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/55640"
          },
          {
            "name": "openSUSE-SU-2014:0114",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00078.html"
          },
          {
            "name": "100432",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/100432"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-11-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Quassel core (server daemon) in Quassel IRC before 0.9.2 does not properly verify the user ID when accessing user backlogs, which allows remote authenticated users to read other users\u0027 backlogs via the bufferid in (1) 16/select_buffer_by_id.sql, (2) 16/select_buffer_by_id.sql, and (3) 16/select_buffer_by_id.sql in core/SQL/PostgreSQL/."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/quassel/quassel/commit/a1a24da"
        },
        {
          "name": "openSUSE-SU-2013:1929",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00092.html"
        },
        {
          "name": "[oss-security] 20131127 Re: CVE Request: Quassel IRC - manipulated clients can access backlog of all users on a shared core",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/11/28/8"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://quassel-irc.org/node/123"
        },
        {
          "name": "quasselirc-cve20136404-sec-bypass(89377)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89377"
        },
        {
          "name": "55640",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/55640"
        },
        {
          "name": "openSUSE-SU-2014:0114",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00078.html"
        },
        {
          "name": "100432",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/100432"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-6404",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Quassel core (server daemon) in Quassel IRC before 0.9.2 does not properly verify the user ID when accessing user backlogs, which allows remote authenticated users to read other users\u0027 backlogs via the bufferid in (1) 16/select_buffer_by_id.sql, (2) 16/select_buffer_by_id.sql, and (3) 16/select_buffer_by_id.sql in core/SQL/PostgreSQL/."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/quassel/quassel/commit/a1a24da",
              "refsource": "CONFIRM",
              "url": "https://github.com/quassel/quassel/commit/a1a24da"
            },
            {
              "name": "openSUSE-SU-2013:1929",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00092.html"
            },
            {
              "name": "[oss-security] 20131127 Re: CVE Request: Quassel IRC - manipulated clients can access backlog of all users on a shared core",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2013/11/28/8"
            },
            {
              "name": "http://quassel-irc.org/node/123",
              "refsource": "CONFIRM",
              "url": "http://quassel-irc.org/node/123"
            },
            {
              "name": "quasselirc-cve20136404-sec-bypass(89377)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89377"
            },
            {
              "name": "55640",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/55640"
            },
            {
              "name": "openSUSE-SU-2014:0114",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00078.html"
            },
            {
              "name": "100432",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/100432"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-6404",
    "datePublished": "2013-12-09T11:00:00",
    "dateReserved": "2013-11-04T00:00:00",
    "dateUpdated": "2024-08-06T17:39:01.300Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-8483
Vulnerability from cvelistv5
Published
2014-11-06 15:00
Modified
2024-08-06 13:18
Severity ?
Summary
The blowfishECB function in core/cipher.cpp in Quassel IRC 0.10.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a malformed string.
References
http://secunia.com/advisories/61932third-party-advisory, x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-updates/2014-11/msg00046.htmlvendor-advisory, x_refsource_SUSE
http://www.ubuntu.com/usn/USN-2401-1vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/62261third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2014/dsa-3063vendor-advisory, x_refsource_DEBIAN
http://bugs.quassel-irc.org/issues/1314x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.htmlvendor-advisory, x_refsource_SUSE
http://www.debian.org/security/2014/dsa-3068vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/62035third-party-advisory, x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-updates/2014-11/msg00028.htmlvendor-advisory, x_refsource_SUSE
https://github.com/quassel/quassel/commit/8b5ecd226f9208af3074b33d3b7cf5e14f55b138x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T13:18:48.337Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "61932",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/61932"
          },
          {
            "name": "openSUSE-SU-2014:1406",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00046.html"
          },
          {
            "name": "USN-2401-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2401-1"
          },
          {
            "name": "62261",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/62261"
          },
          {
            "name": "DSA-3063",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2014/dsa-3063"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.quassel-irc.org/issues/1314"
          },
          {
            "name": "openSUSE-SU-2015:0573",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html"
          },
          {
            "name": "DSA-3068",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2014/dsa-3068"
          },
          {
            "name": "62035",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/62035"
          },
          {
            "name": "openSUSE-SU-2014:1382",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00028.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/quassel/quassel/commit/8b5ecd226f9208af3074b33d3b7cf5e14f55b138"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-09-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The blowfishECB function in core/cipher.cpp in Quassel IRC 0.10.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a malformed string."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-03-25T12:57:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "61932",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/61932"
        },
        {
          "name": "openSUSE-SU-2014:1406",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00046.html"
        },
        {
          "name": "USN-2401-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2401-1"
        },
        {
          "name": "62261",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/62261"
        },
        {
          "name": "DSA-3063",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2014/dsa-3063"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.quassel-irc.org/issues/1314"
        },
        {
          "name": "openSUSE-SU-2015:0573",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html"
        },
        {
          "name": "DSA-3068",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2014/dsa-3068"
        },
        {
          "name": "62035",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/62035"
        },
        {
          "name": "openSUSE-SU-2014:1382",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00028.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/quassel/quassel/commit/8b5ecd226f9208af3074b33d3b7cf5e14f55b138"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-8483",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The blowfishECB function in core/cipher.cpp in Quassel IRC 0.10.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a malformed string."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "61932",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/61932"
            },
            {
              "name": "openSUSE-SU-2014:1406",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00046.html"
            },
            {
              "name": "USN-2401-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-2401-1"
            },
            {
              "name": "62261",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/62261"
            },
            {
              "name": "DSA-3063",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2014/dsa-3063"
            },
            {
              "name": "http://bugs.quassel-irc.org/issues/1314",
              "refsource": "CONFIRM",
              "url": "http://bugs.quassel-irc.org/issues/1314"
            },
            {
              "name": "openSUSE-SU-2015:0573",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html"
            },
            {
              "name": "DSA-3068",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2014/dsa-3068"
            },
            {
              "name": "62035",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/62035"
            },
            {
              "name": "openSUSE-SU-2014:1382",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00028.html"
            },
            {
              "name": "https://github.com/quassel/quassel/commit/8b5ecd226f9208af3074b33d3b7cf5e14f55b138",
              "refsource": "CONFIRM",
              "url": "https://github.com/quassel/quassel/commit/8b5ecd226f9208af3074b33d3b7cf5e14f55b138"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-8483",
    "datePublished": "2014-11-06T15:00:00",
    "dateReserved": "2014-10-24T00:00:00",
    "dateUpdated": "2024-08-06T13:18:48.337Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-4422
Vulnerability from cvelistv5
Published
2013-10-23 15:00
Modified
2024-08-06 16:45
Severity ?
Summary
SQL injection vulnerability in Quassel IRC before 0.9.1, when Qt 4.8.5 or later and PostgreSQL 8.2 or later are used, allows remote attackers to execute arbitrary SQL commands via a \ (backslash) in a message.
References
http://quassel-irc.org/node/120x_refsource_CONFIRM
http://secunia.com/advisories/55194third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/55581third-party-advisory, x_refsource_SECUNIA
http://bugs.quassel-irc.org/issues/1244x_refsource_CONFIRM
http://seclists.org/oss-sec/2013/q4/74mailing-list, x_refsource_MLIST
https://exchange.xforce.ibmcloud.com/vulnerabilities/87805vdb-entry, x_refsource_XF
http://security.gentoo.org/glsa/glsa-201311-03.xmlvendor-advisory, x_refsource_GENTOO
http://www.securityfocus.com/bid/62923vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:45:13.900Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://quassel-irc.org/node/120"
          },
          {
            "name": "55194",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/55194"
          },
          {
            "name": "55581",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/55581"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.quassel-irc.org/issues/1244"
          },
          {
            "name": "[oss-security] 20131010 Re: CVE Request - Quassel IRC SQL injection",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/oss-sec/2013/q4/74"
          },
          {
            "name": "quasselirc-backslash-sql-injection(87805)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87805"
          },
          {
            "name": "GLSA-201311-03",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201311-03.xml"
          },
          {
            "name": "62923",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/62923"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-10-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in Quassel IRC before 0.9.1, when Qt 4.8.5 or later and PostgreSQL 8.2 or later are used, allows remote attackers to execute arbitrary SQL commands via a \\ (backslash) in a message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://quassel-irc.org/node/120"
        },
        {
          "name": "55194",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/55194"
        },
        {
          "name": "55581",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/55581"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.quassel-irc.org/issues/1244"
        },
        {
          "name": "[oss-security] 20131010 Re: CVE Request - Quassel IRC SQL injection",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/oss-sec/2013/q4/74"
        },
        {
          "name": "quasselirc-backslash-sql-injection(87805)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87805"
        },
        {
          "name": "GLSA-201311-03",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201311-03.xml"
        },
        {
          "name": "62923",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/62923"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4422",
    "datePublished": "2013-10-23T15:00:00",
    "dateReserved": "2013-06-12T00:00:00",
    "dateUpdated": "2024-08-06T16:45:13.900Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2013-12-09 16:36
Modified
2024-11-21 01:59
Severity ?
Summary
Quassel core (server daemon) in Quassel IRC before 0.9.2 does not properly verify the user ID when accessing user backlogs, which allows remote authenticated users to read other users' backlogs via the bufferid in (1) 16/select_buffer_by_id.sql, (2) 16/select_buffer_by_id.sql, and (3) 16/select_buffer_by_id.sql in core/SQL/PostgreSQL/.
Impacted products
Vendor Product Version
quassel-irc quassel_irc *
quassel-irc quassel_irc 0.9.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD0D0C0E-20AB-469F-BF5C-E30A9D6174E7",
              "versionEndIncluding": "0.9.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE271B1C-BB4D-43BD-804A-02A56AFE1D98",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Quassel core (server daemon) in Quassel IRC before 0.9.2 does not properly verify the user ID when accessing user backlogs, which allows remote authenticated users to read other users\u0027 backlogs via the bufferid in (1) 16/select_buffer_by_id.sql, (2) 16/select_buffer_by_id.sql, and (3) 16/select_buffer_by_id.sql in core/SQL/PostgreSQL/."
    },
    {
      "lang": "es",
      "value": "Quassel core (server daemon) en Quassel IRC anteriores a 0.9.2 no verifica correctamente el ID del usuario cuando accede a backlogs de usuario, lo cual permite a usuarios autenticados remotamente leer backlogs de otros usuarios a trav\u00e9s del bufferid en (1) 16/select_buffer_by_id.sql, (2) 16/select_buffer_by_id.sql, y (3) 16/select_buffer_by_id.sql en core/SQL/PostgreSQL/."
    }
  ],
  "id": "CVE-2013-6404",
  "lastModified": "2024-11-21T01:59:09.630",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-12-09T16:36:47.283",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00092.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00078.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://osvdb.org/100432"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://quassel-irc.org/node/123"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/55640"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2013/11/28/8"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89377"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://github.com/quassel/quassel/commit/a1a24da"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00092.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00078.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/100432"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://quassel-irc.org/node/123"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/55640"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2013/11/28/8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89377"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://github.com/quassel/quassel/commit/a1a24da"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-11-06 15:55
Modified
2024-11-21 02:19
Severity ?
Summary
The blowfishECB function in core/cipher.cpp in Quassel IRC 0.10.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a malformed string.
References
cve@mitre.orghttp://bugs.quassel-irc.org/issues/1314Issue Tracking, Vendor Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2014-11/msg00028.htmlThird Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2014-11/msg00046.htmlThird Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2015-03/msg00068.htmlThird Party Advisory
cve@mitre.orghttp://secunia.com/advisories/61932Permissions Required, Third Party Advisory
cve@mitre.orghttp://secunia.com/advisories/62035Permissions Required, Third Party Advisory
cve@mitre.orghttp://secunia.com/advisories/62261Permissions Required, Third Party Advisory
cve@mitre.orghttp://www.debian.org/security/2014/dsa-3063Third Party Advisory
cve@mitre.orghttp://www.debian.org/security/2014/dsa-3068Third Party Advisory
cve@mitre.orghttp://www.ubuntu.com/usn/USN-2401-1Third Party Advisory
cve@mitre.orghttps://github.com/quassel/quassel/commit/8b5ecd226f9208af3074b33d3b7cf5e14f55b138Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108http://bugs.quassel-irc.org/issues/1314Issue Tracking, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-11/msg00028.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-11/msg00046.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61932Permissions Required, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62035Permissions Required, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62261Permissions Required, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2014/dsa-3063Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2014/dsa-3068Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2401-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/quassel/quassel/commit/8b5ecd226f9208af3074b33d3b7cf5e14f55b138Issue Tracking, Patch
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D62A66D6-7508-4333-A414-4102CBB072F8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The blowfishECB function in core/cipher.cpp in Quassel IRC 0.10.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a malformed string."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n blowfishECB en core/cipher.cpp en Quassel IRC 0.10.0 permite a atacantes remotos causar una denegaci\u00f3n de servicio (lectura fuera de rango) a trav\u00e9s de una cadena malformada."
    }
  ],
  "evaluatorComment": "\u003ca href=\"http://cwe.mitre.org/data/definitions/125.html\"\u003eCWE-125: Out-of-bounds Read\u003c/a\u003e",
  "id": "CVE-2014-8483",
  "lastModified": "2024-11-21T02:19:09.360",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-11-06T15:55:09.523",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "http://bugs.quassel-irc.org/issues/1314"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00028.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00046.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Permissions Required",
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/61932"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Permissions Required",
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/62035"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Permissions Required",
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/62261"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2014/dsa-3063"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2014/dsa-3068"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2401-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Patch"
      ],
      "url": "https://github.com/quassel/quassel/commit/8b5ecd226f9208af3074b33d3b7cf5e14f55b138"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "http://bugs.quassel-irc.org/issues/1314"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00028.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2014-11/msg00046.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required",
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/61932"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required",
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/62035"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required",
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/62261"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2014/dsa-3063"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2014/dsa-3068"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2401-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch"
      ],
      "url": "https://github.com/quassel/quassel/commit/8b5ecd226f9208af3074b33d3b7cf5e14f55b138"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-10-23 16:54
Modified
2024-11-21 01:55
Severity ?
Summary
SQL injection vulnerability in Quassel IRC before 0.9.1, when Qt 4.8.5 or later and PostgreSQL 8.2 or later are used, allows remote attackers to execute arbitrary SQL commands via a \ (backslash) in a message.
Impacted products
Vendor Product Version
quassel-irc quassel_irc *
quassel-irc quassel_irc 0.1.0
quassel-irc quassel_irc 0.3.0
quassel-irc quassel_irc 0.3.0.1
quassel-irc quassel_irc 0.3.0.2
quassel-irc quassel_irc 0.3.0.3
quassel-irc quassel_irc 0.3.1
quassel-irc quassel_irc 0.4.0
quassel-irc quassel_irc 0.4.1
quassel-irc quassel_irc 0.4.2
quassel-irc quassel_irc 0.4.3
quassel-irc quassel_irc 0.5.0
quassel-irc quassel_irc 0.6.1
quassel-irc quassel_irc 0.6.2
quassel-irc quassel_irc 0.6.3
quassel-irc quassel_irc 0.7.0
quassel-irc quassel_irc 0.7.1
quassel-irc quassel_irc 0.7.2
quassel-irc quassel_irc 0.7.3
quassel-irc quassel_irc 0.7.4
quassel-irc quassel_irc 0.8.0
postgresql postgresql 8.2
postgresql postgresql 8.2.1
postgresql postgresql 8.2.2
postgresql postgresql 8.2.3
postgresql postgresql 8.2.4
postgresql postgresql 8.2.5
postgresql postgresql 8.2.6
postgresql postgresql 8.2.7
postgresql postgresql 8.2.8
postgresql postgresql 8.2.9
postgresql postgresql 8.2.10
postgresql postgresql 8.2.11
postgresql postgresql 8.2.12
postgresql postgresql 8.2.13
postgresql postgresql 8.2.14
postgresql postgresql 8.2.15
postgresql postgresql 8.2.16
postgresql postgresql 8.2.17
postgresql postgresql 8.2.18
postgresql postgresql 8.3
postgresql postgresql 8.3.1
postgresql postgresql 8.3.2
postgresql postgresql 8.3.3
postgresql postgresql 8.3.4
postgresql postgresql 8.3.5
postgresql postgresql 8.3.6
postgresql postgresql 8.3.7
postgresql postgresql 8.3.8
postgresql postgresql 8.3.9
postgresql postgresql 8.3.10
postgresql postgresql 8.3.11
postgresql postgresql 8.3.12
postgresql postgresql 8.3.13
postgresql postgresql 8.3.14
postgresql postgresql 8.3.15
postgresql postgresql 8.3.16
postgresql postgresql 8.3.17
postgresql postgresql 8.3.18
postgresql postgresql 8.3.19
postgresql postgresql 8.3.20
postgresql postgresql 8.3.21
postgresql postgresql 8.3.22
postgresql postgresql 8.4
postgresql postgresql 8.4.1
postgresql postgresql 8.4.2
postgresql postgresql 8.4.3
postgresql postgresql 8.4.4
postgresql postgresql 8.4.5
postgresql postgresql 8.4.6
postgresql postgresql 8.4.7
postgresql postgresql 8.4.8
postgresql postgresql 8.4.9
postgresql postgresql 8.4.10
postgresql postgresql 8.4.11
postgresql postgresql 8.4.12
postgresql postgresql 8.4.13
postgresql postgresql 8.4.14
postgresql postgresql 8.4.15
postgresql postgresql 8.4.16
postgresql postgresql 9.0
postgresql postgresql 9.0.1
postgresql postgresql 9.0.2
postgresql postgresql 9.0.3
postgresql postgresql 9.0.4
postgresql postgresql 9.0.5
postgresql postgresql 9.0.6
postgresql postgresql 9.0.7
postgresql postgresql 9.0.8
postgresql postgresql 9.0.9
postgresql postgresql 9.0.10
postgresql postgresql 9.0.11
postgresql postgresql 9.0.12
postgresql postgresql 9.1
postgresql postgresql 9.1.1
postgresql postgresql 9.1.2
postgresql postgresql 9.1.3
postgresql postgresql 9.1.4
postgresql postgresql 9.1.5
postgresql postgresql 9.1.6
postgresql postgresql 9.1.7
postgresql postgresql 9.1.8
postgresql postgresql 9.2
postgresql postgresql 9.2.1
postgresql postgresql 9.2.2
postgresql postgresql 9.2.3
quassel-irc quassel_irc *
quassel-irc quassel_irc 0.1.0
quassel-irc quassel_irc 0.3.0
quassel-irc quassel_irc 0.3.0.1
quassel-irc quassel_irc 0.3.0.2
quassel-irc quassel_irc 0.3.0.3
quassel-irc quassel_irc 0.3.1
quassel-irc quassel_irc 0.4.0
quassel-irc quassel_irc 0.4.1
quassel-irc quassel_irc 0.4.2
quassel-irc quassel_irc 0.4.3
quassel-irc quassel_irc 0.5.0
quassel-irc quassel_irc 0.6.1
quassel-irc quassel_irc 0.6.2
quassel-irc quassel_irc 0.6.3
quassel-irc quassel_irc 0.7.0
quassel-irc quassel_irc 0.7.1
quassel-irc quassel_irc 0.7.2
quassel-irc quassel_irc 0.7.3
quassel-irc quassel_irc 0.7.4
quassel-irc quassel_irc 0.8.0
qt qt 4.8.5
qt qt 5.0.0
qt qt 5.0.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "170E86C5-BBF5-428C-ADA6-3A15EBDA4E19",
              "versionEndIncluding": "0.9.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1433FF02-5809-4437-81C9-F3DDBEEBDF58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "757EAC47-2700-4328-91AA-E530629C1ACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C753CCF-AA7D-4691-87A2-E9D8E3C6B907",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "01E3D0A4-E754-4730-B926-FEDEE7967356",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A85C99B-79A9-4FAF-BA6F-C4137D9FA709",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "862BCFFB-C188-423B-B66B-B34E65958F9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "34CDFCD1-7992-4AAC-9357-1B20C477A3D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "297A53B8-257A-4730-A745-06451A993DF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "831DBB69-C22C-466A-AA01-F8D89AF2516B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A85F092-B58B-461C-A81C-C237EBEB9575",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09B40EF-B855-4CE4-B1D2-9FEA960C2F86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E52C0DA4-45C8-4D40-9736-CCF133629C6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "68EE8417-05A3-4CAB-8540-20DD34EB6E00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0887210F-24D0-4E24-87B4-0F07764CA891",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9FEC0F5-4EAE-48EE-848C-E3BD14CCE65D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "06385037-D229-4A07-B1A6-1989BDA19C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA572CB3-5A7F-4BBC-B01D-97412ECE3CB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F7079BD-A592-4947-86CB-A1CEAC0B1207",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C40856E-C88B-42D1-B5A7-F1E1E5FFDD59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EE7000F-0920-4CFC-8619-7C49F6120FF1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7213327F-6909-43A7-952E-11600C28D4E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "10EF0EA6-C8B6-40A7-A3AE-8639CA94D5C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9F645F3-9767-4FD8-94EB-1096DF24E6C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C342A823-EF6F-4557-9F9E-D8893EA4C2BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B85A443F-0802-412F-9AEE-3525311C93D4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "06253BA8-7F1E-4C79-9B2E-197307A627F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A213AB8-A5FE-4062-B895-2FC4B19F60A4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A3F083E-59A8-41B1-826F-2CA39BD425C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE49E2D5-8EAC-49C7-B704-E626FBE7EC35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5059B2F-B588-463E-8E96-BC9DA129C12E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C919AF97-9713-44F8-B742-89C438DB0B48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "400BBC62-5D03-465B-A864-9CD479B963F8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8C96F7-7F85-4E47-A05F-15E3C70AF583",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C236CF1-72C0-4C3D-AE04-B67E3F18EEC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECC98D47-8B3C-4DE6-8C45-F5B92266027F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "C170C441-619A-48DB-9332-05FA4E62C342",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "053A2531-CFAA-466D-811C-A6154826D596",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "84A3D04C-2739-474C-B659-CBCFA574198B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D38CF1E-A944-4F7A-BECE-F8DF2589C873",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2A705DF-3654-427F-8B11-62DB0B6C9813",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "05AD5D33-86F4-4BFF-BA84-02AA1347BEEB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "02FDCF30-D0F7-48AA-9633-9CC060495F47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "788975F6-B3F1-4C21-B963-6BA59F14B71C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6713D96-338B-4467-9F05-3153997F62E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "01EB1A77-92AD-47FB-8290-D05C9B6C19C4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "74857259-30C7-422D-A24D-BE1E33F09466",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD80066B-787E-496B-88FD-F0AE291468C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "88C9F0AB-A125-4DCD-A02B-E04D4D95FB5D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FF13F89-F4C3-43EC-A36A-2F9283E923B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2631F09-73DD-4A28-8082-3939D89DDBE0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "82DDE9E7-EBF9-452B-8380-F9E87CF30ACA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BAE68CF-198D-4F01-92F3-4DED7E50ACA6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF798CBC-C8BB-4F88-A927-B385A0DD8F19",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF8F568F-7D23-4553-95C5-C7C6B6584EB7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1DB64EA-DE7B-4CA4-8121-90612409152D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A932403-9187-471B-BE65-4B6907D57D1B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.3.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CC6D76B-EF54-4F03-84BB-4CEAE31C4FFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.3.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE4CDA93-AEF6-489E-A5A1-BDC62BC9707B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.3.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "6866FCCB-1E43-4D8A-BC89-F06CB7A904B5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.3.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1198129D-E814-4BB8-88DA-E500EB65E01D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.3.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "1937DF43-31CA-4AB8-8832-96AAD73A7FCF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.3.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "59AC452F-3902-4E6C-856D-469C87AAC1C2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F30CA60-0A82-45CD-8044-CE245393593D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C991F71-1E27-47A6-97DC-424FC3EF6011",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5740C7AA-1772-41D8-9851-3E3669CD8521",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "970338CD-A680-4DD0-BD27-459B0DDA4002",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A99C579D-44C0-40A4-A4EB-CBCF40D0C2FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E9E57FA-5EAE-4698-992D-146C6310E0B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C66CDEC1-FB2E-49B7-A8BE-38E43C8ED652",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "87DF2937-9C51-4768-BAB1-901BCA636ADD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "515C0ECD-2D95-4B6E-8E2F-DAF94E4A310F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA0EB754-7A71-40FA-9EAD-44914EB758C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1089D316-D5A3-4F2D-9E52-57FD626A1D06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "F17D9158-E85A-4436-9180-E8546CF8F290",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "64CBBE6E-8FDA-46AD-96A9-8C6CFFE97ABC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A0D13E-6B06-42E9-BEB9-C8FCC3A4E2ED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.4.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79FB06-4712-4DE8-8C0B-5CEE8530828D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.4.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "7054A3D4-8C52-4636-B135-1078B8DF1D5D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:8.4.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6763B2A-00C4-4AAB-8769-9AAEE4BAA603",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DD4DE67-9E3C-4F79-8AAB-344C1C46C618",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:9.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB718D2-97AA-4D61-AA4B-2216EEF55F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:9.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "605C06BF-54A0-40F8-A01E-8641B4A83035",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:9.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F1F5B75-78D5-408E-8148-CA23DCED9CBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:9.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "88DE8C27-0E0A-4428-B25D-054D4FC6FEA8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:9.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F609DDE4-0858-4F83-B8E6-7870196E21CB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:9.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "349F02AF-013E-4264-9717-010293A3D6E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:9.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "047926F2-846A-4870-9640-9A4F2804D71B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:9.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB0165D8-0BFA-4D46-95A3-45A03DC086FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:9.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D6CF6A0-43DC-4C64-A3C4-01EB36F6672B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:9.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E8251C0-9CAE-4608-BC11-75646A601408",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:9.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC024E5D-122D-4E3D-AD24-759AB5940F20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:9.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "723336B5-405A-4236-A507-2C26E591CF49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4796DBEC-FF4F-4749-90D5-AD83D8B5E086",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "79108278-D644-4506-BD9C-F464C6E817B7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "10CF0AA0-41CD-4D50-BA7A-BF8846115C95",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "965E1A9D-BB23-4C0B-A9CA-54A1855055B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1F37C66-0AFE-4D59-8867-BDBCE656774E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE53AE6-232C-4068-98D1-7749007C3CFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFD38139-FD17-41E7-8D10-7731D8203CFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC0B41F-38FF-4D41-9E31-D666A84BB2FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A591CB08-5CEB-45EB-876F-417DCD60AF53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD27648F-E2FF-4779-97F9-2632DCC6B16D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEFB4916-8B59-4534-804C-CF9DA1B18508",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3413A3AB-45A3-48E1-9B30-1194C4E7D49D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5760CE83-4802-42A0-9338-E1E634882450",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "170E86C5-BBF5-428C-ADA6-3A15EBDA4E19",
              "versionEndIncluding": "0.9.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1433FF02-5809-4437-81C9-F3DDBEEBDF58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "757EAC47-2700-4328-91AA-E530629C1ACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C753CCF-AA7D-4691-87A2-E9D8E3C6B907",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "01E3D0A4-E754-4730-B926-FEDEE7967356",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A85C99B-79A9-4FAF-BA6F-C4137D9FA709",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "862BCFFB-C188-423B-B66B-B34E65958F9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "34CDFCD1-7992-4AAC-9357-1B20C477A3D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "297A53B8-257A-4730-A745-06451A993DF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "831DBB69-C22C-466A-AA01-F8D89AF2516B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A85F092-B58B-461C-A81C-C237EBEB9575",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09B40EF-B855-4CE4-B1D2-9FEA960C2F86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E52C0DA4-45C8-4D40-9736-CCF133629C6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "68EE8417-05A3-4CAB-8540-20DD34EB6E00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0887210F-24D0-4E24-87B4-0F07764CA891",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9FEC0F5-4EAE-48EE-848C-E3BD14CCE65D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "06385037-D229-4A07-B1A6-1989BDA19C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA572CB3-5A7F-4BBC-B01D-97412ECE3CB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F7079BD-A592-4947-86CB-A1CEAC0B1207",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C40856E-C88B-42D1-B5A7-F1E1E5FFDD59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EE7000F-0920-4CFC-8619-7C49F6120FF1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:qt:qt:4.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "581FF62C-BD93-485C-A5BA-E5EBFEDC45C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:qt:qt:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "03C7E11D-AA2C-48BB-8C50-B04E5CD3A7C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:qt:qt:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30B4386-B419-46B7-945F-C04F79600708",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in Quassel IRC before 0.9.1, when Qt 4.8.5 or later and PostgreSQL 8.2 or later are used, allows remote attackers to execute arbitrary SQL commands via a \\ (backslash) in a message."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de inyecci\u00f3n SQL en Quassel IRC anterior a la versi\u00f3n 0.9.1, cuando Qt 4.8.5 o posteriores y PostgreSQL 8.2 o posteriores son usados, permite a atacantes remotos ejecutar comandos SQL arbitrarios a trav\u00e9s de una \\ (barra invertida) en un mensaje."
    }
  ],
  "id": "CVE-2013-4422",
  "lastModified": "2024-11-21T01:55:32.120",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-10-23T16:54:28.907",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://bugs.quassel-irc.org/issues/1244"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://quassel-irc.org/node/120"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://seclists.org/oss-sec/2013/q4/74"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/55194"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/55581"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-201311-03.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/62923"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87805"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.quassel-irc.org/issues/1244"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://quassel-irc.org/node/120"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/oss-sec/2013/q4/74"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/55194"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/55581"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201311-03.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/62923"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87805"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-11-23 11:55
Modified
2024-11-21 01:18
Severity ?
Summary
ctcphandler.cpp in Quassel before 0.6.3 and 0.7.x before 0.7.1 allows remote attackers to cause a denial of service (unresponsive IRC) via multiple Client-To-Client Protocol (CTCP) requests in a PRIVMSG message.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "384843FB-51ED-43F4-ABA1-08850242F1DE",
              "versionEndIncluding": "0.6.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1433FF02-5809-4437-81C9-F3DDBEEBDF58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "757EAC47-2700-4328-91AA-E530629C1ACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C753CCF-AA7D-4691-87A2-E9D8E3C6B907",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "01E3D0A4-E754-4730-B926-FEDEE7967356",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A85C99B-79A9-4FAF-BA6F-C4137D9FA709",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "862BCFFB-C188-423B-B66B-B34E65958F9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "34CDFCD1-7992-4AAC-9357-1B20C477A3D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "297A53B8-257A-4730-A745-06451A993DF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "831DBB69-C22C-466A-AA01-F8D89AF2516B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A85F092-B58B-461C-A81C-C237EBEB9575",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09B40EF-B855-4CE4-B1D2-9FEA960C2F86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E52C0DA4-45C8-4D40-9736-CCF133629C6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:quassel-irc:quassel_irc:0.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9FEC0F5-4EAE-48EE-848C-E3BD14CCE65D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5D026D0-EF78-438D-BEDD-FC8571F3ACEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2BCB73E-27BB-4878-AD9C-90C4F20C25A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
              "matchCriteriaId": "7118F616-25CA-4E34-AA13-4D14BB62419F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ctcphandler.cpp in Quassel before 0.6.3 and 0.7.x before 0.7.1 allows remote attackers to cause a denial of service (unresponsive IRC) via multiple Client-To-Client Protocol (CTCP) requests in a PRIVMSG message."
    },
    {
      "lang": "es",
      "value": "ctcphandler.cpp en Quassel anterior a la versi\u00f3n 0.6.3 y 0.7.x anterior a 0.7.1 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (IRC sin respuesta) a trav\u00e9s de m\u00faltiples peticiones Client-To-Client Protocol (CTCP) en un mensaje PRIVMSG."
    }
  ],
  "id": "CVE-2010-3443",
  "lastModified": "2024-11-21T01:18:45.053",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-11-23T11:55:04.163",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://bugs.quassel-irc.org/issues/1023"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://bugs.quassel-irc.org/issues/1024"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.quassel-irc.org/?p=quassel.git%3Ba=commitdiff%3Bh=a4ca568cdf68cf4a0343eb161518dc8e50cea87d"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://quassel-irc.org/node/115"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/55581"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-201311-03.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://ubuntu.com/usn/usn-991-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://bugs.quassel-irc.org/issues/1023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://bugs.quassel-irc.org/issues/1024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.quassel-irc.org/?p=quassel.git%3Ba=commitdiff%3Bh=a4ca568cdf68cf4a0343eb161518dc8e50cea87d"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://quassel-irc.org/node/115"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/55581"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201311-03.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ubuntu.com/usn/usn-991-1"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}