Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 24 Mar 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Halloy
Halloy halloy |
|
| CPEs | cpe:2.3:a:halloy:halloy:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Halloy
Halloy halloy |
|
| Metrics |
cvssV3_1
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Squidowl
Squidowl halloy |
|
| Vendors & Products |
Squidowl
Squidowl halloy |
Fri, 20 Mar 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Halloy is an IRC application written in Rust. Prior to commit 0f77b2cfc5f822517a256ea5a4b94bad8bfe38b6, the DCC receive flow did not sanitize filenames from incoming `DCC SEND` requests. A remote IRC user could send a filename with path traversal sequences like `../../.ssh/authorized_keys` and the file would be written outside the user's configured `save_directory`. With auto-accept enabled this required zero interaction from the victim. Starting with commit 0f77b2cfc5f822517a256ea5a4b94bad8bfe38b6, all identified code paths sanitize filenames through a shared `sanitize_filename` function. | |
| Title | Halloy has a file transfer path traveral vulnerability | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-24T02:06:30.856Z
Reserved: 2026-03-13T15:02:00.627Z
Link: CVE-2026-32733
Updated: 2026-03-24T02:06:24.819Z
Status : Analyzed
Published: 2026-03-20T23:16:44.703
Modified: 2026-03-23T19:21:36.567
Link: CVE-2026-32733
No data.
OpenCVE Enrichment
Updated: 2026-03-25T14:34:14Z