Cerulean Studios

Trillian Pro

10 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 25.56%
  • Published 10.12.2008 06:44:42
  • Last modified 09.04.2025 00:30:58

Heap-based buffer overflow in the XML parser in the AIM plugin in Trillian before 3.1.12.0 allows remote attackers to execute arbitrary code via a malformed XML tag.

  • EPSS 26.69%
  • Published 10.12.2008 06:44:41
  • Last modified 09.04.2025 00:30:58

Stack-based buffer overflow in the image tooltip implementation in Trillian before 3.1.12.0 allows remote attackers to execute arbitrary code via a long image filename, related to "AIM IMG Tag Parsing."

  • EPSS 18.77%
  • Published 10.12.2008 06:44:41
  • Last modified 09.04.2025 00:30:58

Double free vulnerability in the XML parser in Trillian before 3.1.12.0 allows remote attackers to execute arbitrary code via a crafted XML expression, related to the "IMG SRC ID."

  • EPSS 20.18%
  • Published 03.05.2007 00:19:00
  • Last modified 09.04.2025 00:30:58

Multiple heap-based buffer overflows in the IRC component in Cerulean Studios Trillian Pro before 3.1.5.1 allow remote attackers to corrupt memory and possibly execute arbitrary code via (1) a URL with a long UTF-8 string, which triggers the overflow...

  • EPSS 27.1%
  • Published 02.05.2007 22:19:00
  • Last modified 09.04.2025 00:30:58

Heap-based buffer overflow in the Rendezvous / Extensible Messaging and Presence Protocol (XMPP) component (plugins\rendezvous.dll) for Cerulean Studios Trillian Pro before 3.1.5.1 allows remote attackers to execute arbitrary code via a message that ...

  • EPSS 0.07%
  • Published 03.08.2005 04:00:00
  • Last modified 03.04.2025 01:03:51

Trillian Pro 3.1 build 121, when checking Yahoo e-mail, stores the password in plaintext in a world readable file and does not delete the file after login, which allows local users to obtain sensitive information.

  • EPSS 9.88%
  • Published 02.03.2005 05:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in Trillian 3.0 and Pro 3.0 allows remote attackers to execute arbitrary code via a crafted PNG image file.

  • EPSS 3.24%
  • Published 31.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

Integer overflow in Trillian 0.74 and earlier, and Trillian Pro 2.01 and earlier, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a directIM packet that triggers a heap-based buffer overflow.

  • EPSS 5.42%
  • Published 31.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

Stack-based buffer overflow in Trillian 0.71 through 0.74f and Trillian Pro 1.0 through 2.01 allows remote attackers to execute arbitrary code via a Yahoo Messenger packet with a long key name.

Exploit
  • EPSS 11.22%
  • Published 31.12.2002 05:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in the IDENT daemon (identd) in Trillian 0.6351, 0.725, 0.73, 0.74 and 1.0 pro allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long request.