Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ceruleanstudios trillian vulnerabilities and exploits
(subscribe to this query)
828
VMScore
CVE-2008-2407
Stack-based buffer overflow in AIM.DLL in Cerulean Studios Trillian prior to 3.1.10.0 allows user-assisted remote malicious users to execute arbitrary code via a long attribute value in a FONT tag in a message.
Ceruleanstudios Trillian
935
VMScore
CVE-2008-6563
Buffer overflow in the XML parser in Trillian 3.1.9.0, and possibly earlier, allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DTD file.
Ceruleanstudios Trillian 3.1.9.0
1 EDB exploit
828
VMScore
CVE-2008-2408
Heap-based buffer overflow in the XML parsing functionality in talk.dll in Cerulean Studios Trillian Pro prior to 3.1.10.0 allows remote malicious users to execute arbitrary code via a malformed attribute in an IMG tag.
Ceruleanstudios Trillian Pro
890
VMScore
CVE-2008-5401
Stack-based buffer overflow in the image tooltip implementation in Trillian prior to 3.1.12.0 allows remote malicious users to execute arbitrary code via a long image filename, related to "AIM IMG Tag Parsing."
Cerulean Studios Trillian 2.0
Cerulean Studios Trillian 0.74
Cerulean Studios Trillian 1.0
Cerulean Studios Trillian 0.63
Cerulean Studios Trillian 0.62
Cerulean Studios Trillian 3.1.8.0
Cerulean Studios Trillian 3.1.7.0
Ceruleanstudios Trillian Pro 3.1.9.0
Cerulean Studios Trillian 3.1
Cerulean Studios Trillian 0.72
Cerulean Studios Trillian 0.70
Cerulean Studios Trillian 0.52
Cerulean Studios Trillian 0.50
Cerulean Studios Trillian 3.1.5.0
Cerulean Studios Trillian 3.1.0.121
Cerulean Studios Trillian Pro 2.0
Ceruleanstudios Trillian 3.1.9.0
Cerulean Studios Trillian 0.74d
Cerulean Studios Trillian 0.74c
Cerulean Studios Trillian 0.725
Cerulean Studios Trillian 3.0
Cerulean Studios Trillian 0.6351
890
VMScore
CVE-2008-5402
Double free vulnerability in the XML parser in Trillian prior to 3.1.12.0 allows remote malicious users to execute arbitrary code via a crafted XML expression, related to the "IMG SRC ID."
Cerulean Studios Trillian 3.0
Cerulean Studios Trillian 2.0
Cerulean Studios Trillian 0.6351
Cerulean Studios Trillian 0.635
Cerulean Studios Trillian 3.1.11.0
Cerulean Studios Trillian 3.1.10.0
Cerulean Studios Trillian 3.1.0.121
Cerulean Studios Trillian Pro 2.01
Cerulean Studios Trillian Pro 3.0
Ceruleanstudios Trillian 3.1.9.0
Ceruleanstudios Trillian
Cerulean Studios Trillian 3.1.9.0
Cerulean Studios Trillian 0.73
Cerulean Studios Trillian 0.71
Cerulean Studios Trillian 0.61
Cerulean Studios Trillian 0.60
Cerulean Studios Trillian 3.1.7.0
Cerulean Studios Trillian 3.1.6.0
Cerulean Studios Trillian Pro 3.1.5.0
Ceruleanstudios Trillian 3.1.0.9
Cerulean Studios Trillian Pro
Cerulean Studios Trillian 0.74e
890
VMScore
CVE-2008-5403
Heap-based buffer overflow in the XML parser in the AIM plugin in Trillian prior to 3.1.12.0 allows remote malicious users to execute arbitrary code via a malformed XML tag.
Cerulean Studios Trillian 3.1.9.0
Cerulean Studios Trillian 0.74
Cerulean Studios Trillian 1.0
Cerulean Studios Trillian 0.63
Cerulean Studios Trillian 0.62
Cerulean Studios Trillian 3.1.8.0
Cerulean Studios Trillian 3.1.7.0
Ceruleanstudios Trillian Pro 3.1.9.0
Cerulean Studios Trillian Pro 3.1 Build 121
Cerulean Studios Trillian Pro 1.0
Cerulean Studios Trillian 3.1.0.120
Cerulean Studios Trillian 0.74f
Cerulean Studios Trillian 0.74g
Cerulean Studios Trillian 3.1
Cerulean Studios Trillian 3.0
Cerulean Studios Trillian 0.72
Cerulean Studios Trillian 0.70
Cerulean Studios Trillian 0.52
Cerulean Studios Trillian 0.50
Cerulean Studios Trillian 3.1.11.0
Cerulean Studios Trillian 3.1.5.0
Cerulean Studios Trillian 3.1.0.121
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-36920
buffer overflow
CVE-2024-36913
CVE-2024-5497
CVE-2024-23917
CVE-2024-4956
server-side request forgery
CVE-2024-35468
SSTI
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started