Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5rfq-cm4h-mwv3

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

ircu 2.10.12.03 and 2.10.12.04 does not associate a timestamp with ops privilege on an unused channel (zannel), which allows remote attackers to (1) set or remove certain channel modes via a "netriding" attack or (2) take over a channel by joining an unlinked server with the A/Upass and then setting a new Apass.

ircu 2.10.12.03 and 2.10.12.04 does not associate a timestamp with ops privilege on an unused channel (zannel), which allows remote attackers to (1) set or remove certain channel modes via a "netriding" attack or (2) take over a channel by joining an unlinked server with the A/Upass and then setting a new Apass.

EPSS

Процентиль: 71%
0.00686
Низкий

Связанные уязвимости

ubuntu
около 18 лет назад

ircu 2.10.12.03 and 2.10.12.04 does not associate a timestamp with ops privilege on an unused channel (zannel), which allows remote attackers to (1) set or remove certain channel modes via a "netriding" attack or (2) take over a channel by joining an unlinked server with the A/Upass and then setting a new Apass.

nvd
около 18 лет назад

ircu 2.10.12.03 and 2.10.12.04 does not associate a timestamp with ops privilege on an unused channel (zannel), which allows remote attackers to (1) set or remove certain channel modes via a "netriding" attack or (2) take over a channel by joining an unlinked server with the A/Upass and then setting a new Apass.

debian
около 18 лет назад

ircu 2.10.12.03 and 2.10.12.04 does not associate a timestamp with ops ...

EPSS

Процентиль: 71%
0.00686
Низкий