Cerulean Studios » Trillian Pro : Security Vulnerabilities, CVEs,
Heap-based buffer overflow in the XML parser in the AIM plugin in Trillian before 3.1.12.0 allows remote attackers to execute arbitrary code via a malformed XML tag.
Max CVSS
10.0
EPSS Score
70.75%
Published
2008-12-10
Updated
2018-10-11
Double free vulnerability in the XML parser in Trillian before 3.1.12.0 allows remote attackers to execute arbitrary code via a crafted XML expression, related to the "IMG SRC ID."
Max CVSS
10.0
EPSS Score
25.09%
Published
2008-12-10
Updated
2018-10-11
Stack-based buffer overflow in the image tooltip implementation in Trillian before 3.1.12.0 allows remote attackers to execute arbitrary code via a long image filename, related to "AIM IMG Tag Parsing."
Max CVSS
10.0
EPSS Score
71.46%
Published
2008-12-10
Updated
2018-10-11
Multiple heap-based buffer overflows in the IRC component in Cerulean Studios Trillian Pro before 3.1.5.1 allow remote attackers to corrupt memory and possibly execute arbitrary code via (1) a URL with a long UTF-8 string, which triggers the overflow when the user highlights it, or (2) a font HTML tag with a face attribute containing a long UTF-8 string.
Max CVSS
9.3
EPSS Score
16.36%
Published
2007-05-03
Updated
2017-07-29
Heap-based buffer overflow in the Rendezvous / Extensible Messaging and Presence Protocol (XMPP) component (plugins\rendezvous.dll) for Cerulean Studios Trillian Pro before 3.1.5.1 allows remote attackers to execute arbitrary code via a message that triggers the overflow from expansion that occurs during encoding.
Max CVSS
10.0
EPSS Score
11.21%
Published
2007-05-02
Updated
2018-10-16
Trillian Pro 3.1 build 121, when checking Yahoo e-mail, stores the password in plaintext in a world readable file and does not delete the file after login, which allows local users to obtain sensitive information.
Max CVSS
2.1
EPSS Score
0.04%
Published
2005-08-03
Updated
2017-07-11
Buffer overflow in Trillian 3.0 and Pro 3.0 allows remote attackers to execute arbitrary code via a crafted PNG image file.
Max CVSS
7.5
EPSS Score
4.17%
Published
2005-03-02
Updated
2016-10-18
Stack-based buffer overflow in Trillian 0.71 through 0.74f and Trillian Pro 1.0 through 2.01 allows remote attackers to execute arbitrary code via a Yahoo Messenger packet with a long key name.
Max CVSS
7.5
EPSS Score
17.75%
Published
2004-12-31
Updated
2017-07-11
Integer overflow in Trillian 0.74 and earlier, and Trillian Pro 2.01 and earlier, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a directIM packet that triggers a heap-based buffer overflow.
Max CVSS
7.5
EPSS Score
9.59%
Published
2004-12-31
Updated
2017-07-11
Buffer overflow in the IDENT daemon (identd) in Trillian 0.6351, 0.725, 0.73, 0.74 and 1.0 pro allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long request.
Max CVSS
10.0
EPSS Score
2.64%
Published
2002-12-31
Updated
2008-09-05
10 vulnerabilities found