10
CVE-2008-5403
- EPSS 25.56%
- Veröffentlicht 10.12.2008 06:44:42
- Zuletzt bearbeitet 09.04.2025 00:30:58
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
Heap-based buffer overflow in the XML parser in the AIM plugin in Trillian before 3.1.12.0 allows remote attackers to execute arbitrary code via a malformed XML tag.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cerulean Studios ≫ Trillian Version0.50
Cerulean Studios ≫ Trillian Version0.52
Cerulean Studios ≫ Trillian Version0.60
Cerulean Studios ≫ Trillian Version0.61
Cerulean Studios ≫ Trillian Version0.62
Cerulean Studios ≫ Trillian Version0.63
Cerulean Studios ≫ Trillian Version0.70
Cerulean Studios ≫ Trillian Version0.71
Cerulean Studios ≫ Trillian Version0.72
Cerulean Studios ≫ Trillian Version0.73
Cerulean Studios ≫ Trillian Version0.74
Cerulean Studios ≫ Trillian Version0.74c
Cerulean Studios ≫ Trillian Version0.74d
Cerulean Studios ≫ Trillian Version0.74e
Cerulean Studios ≫ Trillian Version0.74f
Cerulean Studios ≫ Trillian Version0.74g
Cerulean Studios ≫ Trillian Version0.74i
Cerulean Studios ≫ Trillian Version0.635
Cerulean Studios ≫ Trillian Version0.725
Cerulean Studios ≫ Trillian Version0.6351
Cerulean Studios ≫ Trillian Version1.0
Cerulean Studios ≫ Trillian Version1.0 Editionpro
Cerulean Studios ≫ Trillian Version2.0
Cerulean Studios ≫ Trillian Version2.0 Editionpro
Cerulean Studios ≫ Trillian Version2.1
Cerulean Studios ≫ Trillian Version3.0
Cerulean Studios ≫ Trillian Version3.0 Editionbasic
Cerulean Studios ≫ Trillian Version3.0 Editionpro
Cerulean Studios ≫ Trillian Version3.1
Cerulean Studios ≫ Trillian Version3.1 Editionbasic
Cerulean Studios ≫ Trillian Version3.1 Editionpro
Cerulean Studios ≫ Trillian Version3.1.0.120
Cerulean Studios ≫ Trillian Version3.1.0.121
Cerulean Studios ≫ Trillian Version3.1.5.0
Cerulean Studios ≫ Trillian Version3.1.5.1
Cerulean Studios ≫ Trillian Version3.1.6.0
Cerulean Studios ≫ Trillian Version3.1.7.0
Cerulean Studios ≫ Trillian Version3.1.8.0
Cerulean Studios ≫ Trillian Version3.1.9.0
Cerulean Studios ≫ Trillian Version3.1.9.0 Editionbasic
Cerulean Studios ≫ Trillian Version3.1.9.0 Editionpro
Cerulean Studios ≫ Trillian Version3.1.10.0
Cerulean Studios ≫ Trillian Version3.1.11.0
Cerulean Studios ≫ Trillian Pro Version1.0
Cerulean Studios ≫ Trillian Pro Version2.0
Cerulean Studios ≫ Trillian Pro Version2.01
Cerulean Studios ≫ Trillian Pro Version3.0
Cerulean Studios ≫ Trillian Pro Version3.1.5.0
Cerulean Studios ≫ Trillian Pro Version3.1_build_121
Ceruleanstudios ≫ Trillian Version3.1.0.9
Ceruleanstudios ≫ Trillian Version3.1.9.0
Ceruleanstudios ≫ Trillian Pro Version3.1.9.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 25.56% | 0.957 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 10 | 10 | 10 |
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.