- EPSS 25.56%
- Published 10.12.2008 06:44:42
- Last modified 09.04.2025 00:30:58
Heap-based buffer overflow in the XML parser in the AIM plugin in Trillian before 3.1.12.0 allows remote attackers to execute arbitrary code via a malformed XML tag.
- EPSS 26.69%
- Published 10.12.2008 06:44:41
- Last modified 09.04.2025 00:30:58
Stack-based buffer overflow in the image tooltip implementation in Trillian before 3.1.12.0 allows remote attackers to execute arbitrary code via a long image filename, related to "AIM IMG Tag Parsing."
- EPSS 18.77%
- Published 10.12.2008 06:44:41
- Last modified 09.04.2025 00:30:58
Double free vulnerability in the XML parser in Trillian before 3.1.12.0 allows remote attackers to execute arbitrary code via a crafted XML expression, related to the "IMG SRC ID."
CVE-2007-2478
- EPSS 20.18%
- Published 03.05.2007 00:19:00
- Last modified 09.04.2025 00:30:58
Multiple heap-based buffer overflows in the IRC component in Cerulean Studios Trillian Pro before 3.1.5.1 allow remote attackers to corrupt memory and possibly execute arbitrary code via (1) a URL with a long UTF-8 string, which triggers the overflow...
- EPSS 27.1%
- Published 02.05.2007 22:19:00
- Last modified 09.04.2025 00:30:58
Heap-based buffer overflow in the Rendezvous / Extensible Messaging and Presence Protocol (XMPP) component (plugins\rendezvous.dll) for Cerulean Studios Trillian Pro before 3.1.5.1 allows remote attackers to execute arbitrary code via a message that ...
CVE-2005-2444
- EPSS 0.07%
- Published 03.08.2005 04:00:00
- Last modified 03.04.2025 01:03:51
Trillian Pro 3.1 build 121, when checking Yahoo e-mail, stores the password in plaintext in a world readable file and does not delete the file after login, which allows local users to obtain sensitive information.
CVE-2005-0633
- EPSS 9.88%
- Published 02.03.2005 05:00:00
- Last modified 03.04.2025 01:03:51
Buffer overflow in Trillian 3.0 and Pro 3.0 allows remote attackers to execute arbitrary code via a crafted PNG image file.
CVE-2004-2304
- EPSS 3.24%
- Published 31.12.2004 05:00:00
- Last modified 03.04.2025 01:03:51
Integer overflow in Trillian 0.74 and earlier, and Trillian Pro 2.01 and earlier, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a directIM packet that triggers a heap-based buffer overflow.
CVE-2004-2370
- EPSS 5.42%
- Published 31.12.2004 05:00:00
- Last modified 03.04.2025 01:03:51
Stack-based buffer overflow in Trillian 0.71 through 0.74f and Trillian Pro 1.0 through 2.01 allows remote attackers to execute arbitrary code via a Yahoo Messenger packet with a long key name.
- EPSS 11.22%
- Published 31.12.2002 05:00:00
- Last modified 03.04.2025 01:03:51
Buffer overflow in the IDENT daemon (identd) in Trillian 0.6351, 0.725, 0.73, 0.74 and 1.0 pro allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long request.