This CPE summary could be partial or incomplete. Please contact us for a detailed listing.
Summary
Detail | |||
---|---|---|---|
Vendor | Bnc | First view | 2005-03-01 |
Product | Bnc | Last view | 2005-03-01 |
Version | 2.8.9 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:bnc:bnc |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
10 | 2005-03-01 | CVE-2004-1052 | Buffer overflow in the getnickuserhost function in BNC 2.8.9, and possibly other versions, allows remote IRC servers to execute arbitrary code via an IRC server response that contains many (1) ! (exclamation) or (2) @ (at sign) characters. |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
11595 | BNC IRC proxy getnickuserhost() Remote Overflow |
OpenVAS Exploits
id | Description |
---|---|
2008-09-04 | Name : FreeBSD Ports: bnc File : nvt/freebsd_bnc.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 595-1 (bnc) File : nvt/deb_595_1.nasl |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2005-07-13 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_9be819c6463311d9a9e70001020eed82.nasl - Type: ACT_GATHER_INFO |
2004-11-24 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-595.nasl - Type: ACT_GATHER_INFO |