Filtered by vendor Mirc Subscriptions
Total 9 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2003-1508 1 Mirc 1 Mirc 2024-08-08 N/A
Buffer overflow in mIRC 6.12, when the DCC get dialog window has been minimized and the user opens the minimized window, allows remote attackers to cause a denial of service (crash) via a long filename.
CVE-2003-1336 1 Mirc 1 Mirc 2024-08-08 N/A
Buffer overflow in mIRC before 6.11 allows remote attackers to execute arbitrary code via a long irc:// URL.
CVE-2007-4401 1 Mirc 1 Advanced Integration Plugin 2024-08-07 N/A
Multiple CRLF injection vulnerabilities in the Advanced mIRC Integration Plugin and possibly other unspecified scripts in mIRC allow user-assisted remote attackers to execute arbitrary IRC commands via CRLF sequences in the name of the song in a .mp3 file.
CVE-2007-4402 1 Mirc 1 Mirc 2024-08-07 N/A
Multiple unspecified scripts in mIRC allow user-assisted remote attackers to execute arbitrary code via the '|' (pipe) shell metacharacter in the name of the song in a .mp3 file.
CVE-2007-4403 1 Mirc 1 Plug-in For Winamp 2024-08-07 N/A
The mIRC Control Plug-in for Winamp allows user-assisted remote attackers to execute arbitrary code via the '|' (pipe) shell metacharacter in the name of the song in a .mp3 file.
CVE-2008-7314 1 Mirc 1 Mirc 2024-08-07 7.5 High
mIRC before 6.35 allows attackers to cause a denial of service (crash) via a long nickname.
CVE-2008-4449 1 Mirc 1 Mirc 2024-08-07 N/A
Stack-based buffer overflow in mIRC 6.34 allows remote attackers to execute arbitrary code via a long hostname in a PRIVMSG message.
CVE-2011-5282 1 Mirc 1 Mirc 2024-08-07 5.3 Medium
mIRC prior to 7.22 has a message leak because chopping of outbound messages is mishandled.
CVE-2019-6453 1 Mirc 1 Mirc 2024-08-04 N/A
mIRC before 7.55 allows remote command execution by using argument injection through custom URI protocol handlers. The attacker can specify an irc:// URI that loads an arbitrary .ini file from a UNC share pathname. Exploitation depends on browser-specific URI handling (Chrome is not exploitable).