Filtered by vendor Gajim
Subscriptions
Total
8 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-39835 | 1 Gajim | 1 Gajim | 2022-09-28 | 5.3 Medium |
An issue was discovered in Gajim through 1.4.7. The vulnerability allows attackers, via crafted XML stanzas, to correct messages that were not sent by them. The attacker needs to be part of the group chat or single chat. The fixed version is 1.5.0. | ||||
CVE-2021-41055 | 1 Gajim | 1 Gajim | 2021-10-19 | 7.5 High |
Gajim 1.2.x and 1.3.x before 1.3.3 allows remote attackers to cause a denial of service (crash) via a crafted XMPP Last Message Correction (XEP-0308) message in multi-user chat, where the message ID equals the correction ID. | ||||
CVE-2016-10376 | 1 Gajim | 1 Gajim | 2017-11-06 | N/A |
Gajim through 0.16.7 unconditionally implements the "XEP-0146: Remote Controlling Clients" extension. This can be abused by malicious XMPP servers to, for example, extract plaintext from OTR encrypted sessions. | ||||
CVE-2012-2093 | 1 Gajim | 1 Gajim | 2017-08-29 | N/A |
src/common/latex.py in Gajim 0.15 allows local users to overwrite arbitrary files via a symlink attack on a temporary latex file, related to the get_tmpfile_name function. | ||||
CVE-2015-8688 | 1 Gajim | 1 Gajim | 2016-12-07 | N/A |
Gajim before 0.16.5 allows remote attackers to modify the roster and intercept messages via a crafted roster-push IQ stanza. | ||||
CVE-2012-5524 | 1 Gajim | 1 Gajim | 2014-02-10 | N/A |
The _ssl_verify_callback function in tls_nb.py in Gajim before 0.15.3 does not properly verify SSL certificates, which allows remote attackers to conduct man-in-the-middle (MITM) attacks and spoof servers via an arbitrary certificate from a trusted CA. | ||||
CVE-2012-2086 | 1 Gajim | 1 Gajim | 2013-04-19 | N/A |
SQL injection vulnerability in the get_last_conversation_lines function in common/logger.py in Gajim before 0.15 allows remote attackers to execute arbitrary SQL commands via the jig parameter. | ||||
CVE-2012-2085 | 1 Gajim | 1 Gajim | 2013-04-19 | N/A |
The exec_command function in common/helpers.py in Gajim before 0.15 allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in an href attribute. |
Page 1 of 1.