Show filters
34 Total Results
Displaying 11-20 of 34
Sort by:
Attacker Value
Unknown

CVE-2007-2479

Disclosure Date: May 03, 2007 (last updated November 24, 2024)
Cerulean Studios Trillian Pro before 3.1.5.1 allows remote attackers to obtain potentially sensitive information via long CTCP PING messages that contain UTF-8 characters, which generates a malformed response that is not truncated by a newline, which can cause portions of a server message to be sent to the attacker.
0
Attacker Value
Unknown

CVE-2007-2478

Disclosure Date: May 03, 2007 (last updated October 04, 2023)
Multiple heap-based buffer overflows in the IRC component in Cerulean Studios Trillian Pro before 3.1.5.1 allow remote attackers to corrupt memory and possibly execute arbitrary code via (1) a URL with a long UTF-8 string, which triggers the overflow when the user highlights it, or (2) a font HTML tag with a face attribute containing a long UTF-8 string.
0
Attacker Value
Unknown

CVE-2007-2418

Disclosure Date: May 02, 2007 (last updated October 04, 2023)
Heap-based buffer overflow in the Rendezvous / Extensible Messaging and Presence Protocol (XMPP) component (plugins\rendezvous.dll) for Cerulean Studios Trillian Pro before 3.1.5.1 allows remote attackers to execute arbitrary code via a message that triggers the overflow from expansion that occurs during encoding.
0
Attacker Value
Unknown

CVE-2006-0543

Disclosure Date: February 04, 2006 (last updated February 22, 2025)
Cerulean Trillian 3.1.0.120 allows remote attackers to cause a denial of service (client crash) via an AIM message containing the Mac encoded Rich Text Format (RTF) escape sequences (1) \'d1, (2) \'d2, (3) \'d3, (4) \'d4, and (5) \'d5. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
0
Attacker Value
Unknown

CVE-2005-3141

Disclosure Date: October 05, 2005 (last updated February 22, 2025)
Cerulean Studios Trillian 3.0 allows remote attackers to cause a denial of service (crash) via a reverse direct connection from a different client, as demonstrated using LICQ.
0
Attacker Value
Unknown

CVE-2005-2444

Disclosure Date: August 03, 2005 (last updated February 22, 2025)
Trillian Pro 3.1 build 121, when checking Yahoo e-mail, stores the password in plaintext in a world readable file and does not delete the file after login, which allows local users to obtain sensitive information.
0
Attacker Value
Unknown

CVE-2005-0875

Disclosure Date: May 02, 2005 (last updated February 22, 2025)
Multiple buffer overflows in the Yahoo plug-in for Trillian 2.0, 3.0, and 3.1 allow remote web servers to cause a denial of service (application crash) via a long string in an HTTP 1.1 response header.
0
Attacker Value
Unknown

CVE-2005-0874

Disclosure Date: May 02, 2005 (last updated February 22, 2025)
Multiple buffer overflows in the (1) AIM, (2) MSN, (3) RSS, and other plug-ins for Trillian 2.0 allow remote web servers to cause a denial of service (application crash) via a long string in an HTTP 1.1 response header.
0
Attacker Value
Unknown

CVE-2005-0633

Disclosure Date: March 02, 2005 (last updated February 22, 2025)
Buffer overflow in Trillian 3.0 and Pro 3.0 allows remote attackers to execute arbitrary code via a crafted PNG image file.
0
Attacker Value
Unknown

CVE-2004-2304

Disclosure Date: December 31, 2004 (last updated February 22, 2025)
Integer overflow in Trillian 0.74 and earlier, and Trillian Pro 2.01 and earlier, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a directIM packet that triggers a heap-based buffer overflow.
0