Lucene search

K
Easy Chat Server ProjectEasy Chat Server3.1

5 matches found

CVE
CVE
added 2023/10/04 1:15 p.m.36 views

CVE-2023-4494

Stack-based buffer overflow vulnerability in Easy Chat Server 3.1 version. An attacker could send an excessively long username string to the register.ghp file asking for the name via a GET request resulting in arbitrary code execution on the remote machine.

9.8CVSS9.8AI score0.00127EPSS
CVE
CVE
added 2023/10/04 1:15 p.m.36 views

CVE-2023-4495

Easy Chat Server, in its 3.1 version and before, does not sufficiently encrypt user-controlled inputs, resulting in a Cross-Site Scripting (XSS) vulnerability stored via /registresult.htm (POST method), in the Resume parameter. The XSS is loaded from /register.ghp.

6.1CVSS5.9AI score0.00146EPSS
CVE
CVE
added 2023/10/04 1:15 p.m.36 views

CVE-2023-4496

Easy Chat Server, in its 3.1 version and before, does not sufficiently encrypt user-controlled inputs, resulting in a Cross-Site Scripting (XSS) vulnerability stored via /body2.ghp (POST method), in the mtowho parameter.

6.1CVSS6AI score0.00146EPSS
CVE
CVE
added 2023/10/04 1:15 p.m.36 views

CVE-2023-4497

Easy Chat Server, in its 3.1 version and before, does not sufficiently encrypt user-controlled inputs, resulting in a Cross-Site Scripting (XSS) vulnerability stored via /registresult.htm (POST method), in the Icon parameter. The XSS is loaded from /users.ghp.

6.1CVSS5.9AI score0.00146EPSS
CVE
CVE
added 2024/01/18 11:15 p.m.21 views

CVE-2024-0695

A vulnerability, which was classified as problematic, has been found in EFS Easy Chat Server 3.1. Affected by this issue is some unknown functionality of the component HTTP GET Request Handler. The manipulation of the argument USERNAME leads to denial of service. The attack may be launched remotely...

5.3CVSS5.3AI score0.0005EPSS