Cerulean Studios » Trillian » 0.74d : Security Vulnerabilities, CVEs,
Heap-based buffer overflow in the XML parser in the AIM plugin in Trillian before 3.1.12.0 allows remote attackers to execute arbitrary code via a malformed XML tag.
Max CVSS
10.0
EPSS Score
70.75%
Published
2008-12-10
Updated
2018-10-11
Double free vulnerability in the XML parser in Trillian before 3.1.12.0 allows remote attackers to execute arbitrary code via a crafted XML expression, related to the "IMG SRC ID."
Max CVSS
10.0
EPSS Score
25.09%
Published
2008-12-10
Updated
2018-10-11
Stack-based buffer overflow in the image tooltip implementation in Trillian before 3.1.12.0 allows remote attackers to execute arbitrary code via a long image filename, related to "AIM IMG Tag Parsing."
Max CVSS
10.0
EPSS Score
71.46%
Published
2008-12-10
Updated
2018-10-11
Heap-based buffer overflow in Cerulean Studios Trillian 3.x before 3.1.6.0 allows remote attackers to execute arbitrary code via a message sent through the MSN protocol, or possibly other protocols, with a crafted UTF-8 string, which triggers improper memory allocation for word wrapping when a window width is used as a buffer size, a different vulnerability than CVE-2007-2478.
Max CVSS
9.3
EPSS Score
30.85%
Published
2007-06-21
Updated
2017-07-29
Stack-based buffer overflow in Trillian 0.71 through 0.74f and Trillian Pro 1.0 through 2.01 allows remote attackers to execute arbitrary code via a Yahoo Messenger packet with a long key name.
Max CVSS
7.5
EPSS Score
17.75%
Published
2004-12-31
Updated
2017-07-11
5 vulnerabilities found