U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Results Type: Overview
  • Keyword (text search): cpe:2.3:a:gajim:gajim:-:*:*:*:*:*:*:*
  • CPE Name Search: true
There are 6 matching records.
Displaying matches 1 through 6.
Vuln ID Summary CVSS Severity
CVE-2022-39835

An issue was discovered in Gajim through 1.4.7. The vulnerability allows attackers, via crafted XML stanzas, to correct messages that were not sent by them. The attacker needs to be part of the group chat or single chat. The fixed version is 1.5.0.

Published: September 27, 2022; 7:15:15 PM -0400
V3.1: 5.3 MEDIUM
V2.0:(not available)
CVE-2016-10376

Gajim through 0.16.7 unconditionally implements the "XEP-0146: Remote Controlling Clients" extension. This can be abused by malicious XMPP servers to, for example, extract plaintext from OTR encrypted sessions.

Published: May 27, 2017; 8:29:00 PM -0400
V3.0: 4.5 MEDIUM
V2.0: 3.5 LOW
CVE-2015-8688

Gajim before 0.16.5 allows remote attackers to modify the roster and intercept messages via a crafted roster-push IQ stanza.

Published: January 15, 2016; 2:59:03 PM -0500
V3.0: 5.4 MEDIUM
V2.0: 5.8 MEDIUM
CVE-2012-5524

The _ssl_verify_callback function in tls_nb.py in Gajim before 0.15.3 does not properly verify SSL certificates, which allows remote attackers to conduct man-in-the-middle (MITM) attacks and spoof servers via an arbitrary certificate from a trusted CA.

Published: February 07, 2014; 7:55:05 PM -0500
V3.x:(not available)
V2.0: 4.3 MEDIUM
CVE-2012-2086

SQL injection vulnerability in the get_last_conversation_lines function in common/logger.py in Gajim before 0.15 allows remote attackers to execute arbitrary SQL commands via the jig parameter.

Published: November 23, 2012; 3:55:02 PM -0500
V3.x:(not available)
V2.0: 7.5 HIGH
CVE-2012-2085

The exec_command function in common/helpers.py in Gajim before 0.15 allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in an href attribute.

Published: August 28, 2012; 1:55:04 PM -0400
V3.x:(not available)
V2.0: 6.8 MEDIUM