The official znc docker images before 1.7.1-slim contain a blank password for a root user. Systems using the znc docker container deployed by affected versions of the Docker image may allow an remote attacker to achieve root access with a blank password.
Max CVSS
10.0
EPSS Score
0.66%
Published
2020-12-08
Updated
2020-12-22
ZNC 1.8.0 up to 1.8.1-rc1 allows authenticated users to trigger an application crash (with a NULL pointer dereference) if echo-message is not enabled and there is no network.
Max CVSS
6.5
EPSS Score
0.19%
Published
2020-06-02
Updated
2023-01-27
Modules.cpp in ZNC before 1.7.4-rc1 allows remote authenticated non-admin users to escalate privileges and execute arbitrary code by loading a module with a crafted name.
Max CVSS
8.8
EPSS Score
1.01%
Published
2019-06-15
Updated
2020-08-24
ZNC before 1.7.3-rc1 allows an existing remote user to cause a Denial of Service (crash) via invalid encoding.
Max CVSS
6.5
EPSS Score
1.23%
Published
2019-03-27
Updated
2019-06-15
ZNC before 1.7.1-rc1 is prone to a path traversal flaw via ../ in a web skin name to access files outside of the intended skins directories.
Max CVSS
5.3
EPSS Score
0.19%
Published
2018-07-15
Updated
2019-03-08
ZNC before 1.7.1-rc1 does not properly validate untrusted lines coming from the network, allowing a non-admin user to escalate his privilege and inject rogue values into znc.conf.
Max CVSS
6.5
EPSS Score
0.15%
Published
2018-07-15
Updated
2019-10-03
The CWebAdminMod::ChanPage function in modules/webadmin.cpp in ZNC before 1.4 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) by adding a channel with the same name as an existing channel but without the leading # character, related to a "use-after-delete" error.
Max CVSS
4.0
EPSS Score
0.71%
Published
2014-12-19
Updated
2015-09-29
Stack-based buffer overflow in fish.cpp in the Fish plugin for ZNC, as used in ZNC for Windows (znc-msvc) 0.206 and earlier, allows remote attackers to cause a denial of service (crash) via a long string in a DH1080_INIT message.
Max CVSS
4.3
EPSS Score
3.51%
Published
2013-12-23
Updated
2017-08-29
ZNC 1.0 allows remote authenticated users to cause a denial of service (NULL pointer reference and crash) via a crafted request to the (1) editnetwork, (2) editchan, (3) addchan, or (4) delchan page in modules/webadmin.cpp.
Max CVSS
4.0
EPSS Score
1.27%
Published
2014-06-05
Updated
2015-09-10
The CBounceDCCMod::OnPrivCTCP function in bouncedcc.cpp in the bouncedcc module in ZNC 0.200 and 0.202 allows remote attackers to cause a denial of service (crash) via a crafted DCC RESUME request.
Max CVSS
5.0
EPSS Score
1.28%
Published
2014-04-08
Updated
2016-12-08
Multiple unspecified vulnerabilities in ZNC 0.092 allow remote attackers to cause a denial of service (exception and daemon crash) via unknown vectors related to "unsafe substr() calls."
Max CVSS
5.0
EPSS Score
5.49%
Published
2010-08-17
Updated
2010-08-18
Client.cpp in ZNC 0.092 allows remote attackers to cause a denial of service (exception and daemon crash) via a PING command that lacks an argument.
Max CVSS
5.0
EPSS Score
28.42%
Published
2010-08-17
Updated
2010-08-18
NULL pointer dereference vulnerability in ZNC before 0.092 caused by traffic stats when there are unauthenticated connections.
Max CVSS
7.5
EPSS Score
0.30%
Published
2019-11-12
Updated
2019-11-14
znc.cpp in ZNC before 0.092 allows remote authenticated users to cause a denial of service (crash) by requesting traffic statistics when there is an active unauthenticated connection, which triggers a NULL pointer dereference, as demonstrated using (1) a traffic link in the web administration pages or (2) the traffic command in the /znc shell.
Max CVSS
3.5
EPSS Score
0.33%
Published
2010-07-12
Updated
2010-07-12
Directory traversal vulnerability in ZNC before 0.072 allows remote attackers to overwrite arbitrary files via a crafted DCC SEND request.
Max CVSS
7.5
EPSS Score
1.71%
Published
2009-08-04
Updated
2009-08-12
Multiple CRLF injection vulnerabilities in webadmin in ZNC before 0.066 allow remote authenticated users to modify the znc.conf configuration file and gain privileges via CRLF sequences in the quit message and other vectors.
Max CVSS
6.5
EPSS Score
0.48%
Published
2009-03-03
Updated
2009-06-09
16 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!