Vulnerabilities > Khaled Mardam BEY

DATE CVE VULNERABILITY TITLE RISK
2003-12-31 CVE-2003-1512 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Khaled Mardam-Bey Mirc 6.1/6.11
Buffer overflow in mIRC 6.1 and 6.11 allows remote attackers to cause a denial of service (crash) via a long DCC SEND request.
network
low complexity
khaled-mardam-bey CWE-119
5.0
2003-06-09 CVE-2002-1456 Buffer Overflow vulnerability in Khaled Mardam-Bey Mirc 6.0/6.0.1/6.0.2
Buffer overflow in mIRC 6.0.2 and earlier allows remote attackers to execute arbitrary code via a long $asctime value.
network
low complexity
khaled-mardam-bey
7.5
2002-08-12 CVE-2002-0425 Unspecified vulnerability in Khaled Mardam-Bey Mirc 6.0/6.01
mIRC DCC server protocol allows remote attackers to gain sensitive information such as alternate IRC nicknames via a "100 testing" message in a DCC connection request that cannot be ignored or canceled by the user, which may leak the alternate nickname in a response message.
network
low complexity
khaled-mardam-bey
5.0
2002-05-16 CVE-2002-0231 Buffer Overflow vulnerability in MIRC Nick
Buffer overflow in mIRC 5.91 and earlier allows a remote server to execute arbitrary code on the client via a long nickname.
network
low complexity
khaled-mardam-bey
7.5
2001-12-02 CVE-2001-0944 Local Security vulnerability in mIRC
DDE in mIRC allows local users to launch applications under another user's account via a DDE message that executes a command, which may be executed by the other user's process.
local
low complexity
khaled-mardam-bey
7.2
2001-06-02 CVE-2001-0315 Remote Security vulnerability in mIRC
The locking feature in mIRC 5.7 allows local users to bypass the password mechanism by modifying the LockOptions registry key.
network
low complexity
khaled-mardam-bey
7.5
1999-01-01 CVE-1999-0399 Unspecified vulnerability in Khaled Mardam-Bey Mirc 5.5
The DCC server command in the Mirc 5.5 client doesn't filter characters from file names properly, allowing remote attackers to place a malicious file in a different location, possibly allowing the attacker to execute commands.
network
low complexity
khaled-mardam-bey
7.5