Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:a:gajim:gajim:0.7.1:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2022-39835 |
An issue was discovered in Gajim through 1.4.7. The vulnerability allows attackers, via crafted XML stanzas, to correct messages that were not sent by them. The attacker needs to be part of the group chat or single chat. The fixed version is 1.5.0. Published: September 27, 2022; 7:15:15 PM -0400 |
V3.1: 5.3 MEDIUM V2.0:(not available) |
CVE-2016-10376 |
Gajim through 0.16.7 unconditionally implements the "XEP-0146: Remote Controlling Clients" extension. This can be abused by malicious XMPP servers to, for example, extract plaintext from OTR encrypted sessions. Published: May 27, 2017; 8:29:00 PM -0400 |
V3.0: 4.5 MEDIUM V2.0: 3.5 LOW |
CVE-2015-8688 |
Gajim before 0.16.5 allows remote attackers to modify the roster and intercept messages via a crafted roster-push IQ stanza. Published: January 15, 2016; 2:59:03 PM -0500 |
V3.0: 5.4 MEDIUM V2.0: 5.8 MEDIUM |
CVE-2012-5524 |
The _ssl_verify_callback function in tls_nb.py in Gajim before 0.15.3 does not properly verify SSL certificates, which allows remote attackers to conduct man-in-the-middle (MITM) attacks and spoof servers via an arbitrary certificate from a trusted CA. Published: February 07, 2014; 7:55:05 PM -0500 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
CVE-2012-2086 |
SQL injection vulnerability in the get_last_conversation_lines function in common/logger.py in Gajim before 0.15 allows remote attackers to execute arbitrary SQL commands via the jig parameter. Published: November 23, 2012; 3:55:02 PM -0500 |
V3.x:(not available) V2.0: 7.5 HIGH |
CVE-2012-2085 |
The exec_command function in common/helpers.py in Gajim before 0.15 allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in an href attribute. Published: August 28, 2012; 1:55:04 PM -0400 |
V3.x:(not available) V2.0: 6.8 MEDIUM |