Количество 7
Количество 7

BDU:2015-00079
Уязвимость системы мгновенного обмена сообщениями Pidgin, позволяющая удаленному злоумышленнику вызвать отказ в обслуживании

CVE-2013-6483
The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does not properly determine whether the from address in an iq reply is consistent with the to address in an iq request, which allows remote attackers to spoof iq traffic or cause a denial of service (NULL pointer dereference and application crash) via a crafted reply.

CVE-2013-6483
The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does not properly determine whether the from address in an iq reply is consistent with the to address in an iq request, which allows remote attackers to spoof iq traffic or cause a denial of service (NULL pointer dereference and application crash) via a crafted reply.

CVE-2013-6483
The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does not properly determine whether the from address in an iq reply is consistent with the to address in an iq request, which allows remote attackers to spoof iq traffic or cause a denial of service (NULL pointer dereference and application crash) via a crafted reply.
CVE-2013-6483
The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does not ...
GHSA-7hf8-wq8c-mrxp
The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does not properly determine whether the from address in an iq reply is consistent with the to address in an iq request, which allows remote attackers to spoof iq traffic or cause a denial of service (NULL pointer dereference and application crash) via a crafted reply.
ELSA-2014-0139
ELSA-2014-0139: pidgin security update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2015-00079 Уязвимость системы мгновенного обмена сообщениями Pidgin, позволяющая удаленному злоумышленнику вызвать отказ в обслуживании | CVSS2: 6.4 | 1% Низкий | больше 11 лет назад |
![]() | CVE-2013-6483 The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does not properly determine whether the from address in an iq reply is consistent with the to address in an iq request, which allows remote attackers to spoof iq traffic or cause a denial of service (NULL pointer dereference and application crash) via a crafted reply. | CVSS2: 6.4 | 1% Низкий | больше 11 лет назад |
![]() | CVE-2013-6483 The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does not properly determine whether the from address in an iq reply is consistent with the to address in an iq request, which allows remote attackers to spoof iq traffic or cause a denial of service (NULL pointer dereference and application crash) via a crafted reply. | CVSS2: 4.3 | 1% Низкий | больше 11 лет назад |
![]() | CVE-2013-6483 The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does not properly determine whether the from address in an iq reply is consistent with the to address in an iq request, which allows remote attackers to spoof iq traffic or cause a denial of service (NULL pointer dereference and application crash) via a crafted reply. | CVSS2: 6.4 | 1% Низкий | больше 11 лет назад |
CVE-2013-6483 The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does not ... | CVSS2: 6.4 | 1% Низкий | больше 11 лет назад | |
GHSA-7hf8-wq8c-mrxp The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does not properly determine whether the from address in an iq reply is consistent with the to address in an iq request, which allows remote attackers to spoof iq traffic or cause a denial of service (NULL pointer dereference and application crash) via a crafted reply. | 1% Низкий | около 3 лет назад | ||
ELSA-2014-0139 ELSA-2014-0139: pidgin security update (MODERATE) | больше 11 лет назад |
Уязвимостей на страницу