Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cerulean studios trillian 0.725 vulnerabilities and exploits
(subscribe to this query)
465
VMScore
CVE-2002-2162
Cerulean Studios Trillian 0.73 and previous versions use weak encrypttion (XOR) for storing user passwords in .ini files in the Trillian directory, which allows local users to gain access to other user accounts.
Cerulean Studios Trillian 0.6351
Cerulean Studios Trillian 0.725
Cerulean Studios Trillian 0.73
1 EDB exploit
775
VMScore
CVE-2002-1486
Multiple buffer overflows in the IRC component of Trillian 0.73 and 0.74 allows remote malicious IRC servers to cause a denial of service and possibly execute arbitrary code via (1) a large response from the server, (2) a JOIN with a long channel name, (3) a long "raw 221&qu...
Cerulean Studios Trillian 0.725
Cerulean Studios Trillian 0.73
Cerulean Studios Trillian 0.74
5 EDB exploits
605
VMScore
CVE-2002-2366
Buffer overflow in the XML parser of Trillian 0.6351, 0.725 and 0.73 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a skin with a long colors file name in trillian.xml.
Cerulean Studios Trillian 0.73
Cerulean Studios Trillian 0.6351
Cerulean Studios Trillian 0.725
668
VMScore
CVE-2002-2155
Format string vulnerability in the error handling of IRC invite responses for Trillian 0.725 and 0.73 allows remote IRC servers to execute arbitrary code via an invite to a channel with format string specifiers in the name.
Cerulean Studios Trillian 0.725
Cerulean Studios Trillian 0.73
668
VMScore
CVE-2002-2173
Buffer overflow in the IRC module of Trillian 0.725 and 0.73 allowing remote malicious users to execute arbitrary code via a long DCC Chat message.
Cerulean Studios Trillian 0.725
Cerulean Studios Trillian 0.73
668
VMScore
CVE-2004-2304
Integer overflow in Trillian 0.74 and previous versions, and Trillian Pro 2.01 and previous versions, allows remote malicious users to cause a denial of service and possibly execute arbitrary code via a directIM packet that triggers a heap-based buffer overflow.
Cerulean Studios Trillian 0.74
Cerulean Studios Trillian Pro 1.0
Cerulean Studios Trillian 0.71
Cerulean Studios Trillian Pro 2.0
Cerulean Studios Trillian Pro 2.01
Cerulean Studios Trillian 0.725
Cerulean Studios Trillian 0.73
668
VMScore
CVE-2004-2370
Stack-based buffer overflow in Trillian 0.71 up to and including 0.74f and Trillian Pro 1.0 up to and including 2.01 allows remote malicious users to execute arbitrary code via a Yahoo Messenger packet with a long key name.
Cerulean Studios Trillian 0.74c
Cerulean Studios Trillian 0.74d
Cerulean Studios Trillian 0.74
Cerulean Studios Trillian 0.74b
Cerulean Studios Trillian Pro 2.0
Cerulean Studios Trillian Pro 2.01
Cerulean Studios Trillian 0.71
Cerulean Studios Trillian 0.725
Cerulean Studios Trillian 0.73
Cerulean Studios Trillian 0.74g
Cerulean Studios Trillian Pro 1.0
Cerulean Studios Trillian 0.74e
Cerulean Studios Trillian 0.74f
828
VMScore
CVE-2008-2409
Stack-based buffer overflow in Cerulean Studios Trillian prior to 3.1.10.0 allows remote malicious users to execute arbitrary code via unspecified attributes in the X-MMS-IM-FORMAT header in an MSN message.
Cerulean Studios Trillian 0.6351
Cerulean Studios Trillian 0.71
Cerulean Studios Trillian 3.0
Cerulean Studios Trillian 3.1
Cerulean Studios Trillian 0.74
Cerulean Studios Trillian 0.74i
Cerulean Studios Trillian 3.1.6.0
Cerulean Studios Trillian 3.1.7.0
Cerulean Studios Trillian 3.1.9.0
Cerulean Studios Trillian 0.725
Cerulean Studios Trillian 0.73
Cerulean Studios Trillian 3.1.5.0
Cerulean Studios Trillian 3.1.5.1
Cerulean Studios Trillian 2.0
Cerulean Studios Trillian 2.1
890
VMScore
CVE-2008-5401
Stack-based buffer overflow in the image tooltip implementation in Trillian prior to 3.1.12.0 allows remote malicious users to execute arbitrary code via a long image filename, related to "AIM IMG Tag Parsing."
Cerulean Studios Trillian 2.0
Cerulean Studios Trillian 0.74
Cerulean Studios Trillian 1.0
Cerulean Studios Trillian 0.63
Cerulean Studios Trillian 0.62
Cerulean Studios Trillian 3.1.8.0
Cerulean Studios Trillian 3.1.7.0
Ceruleanstudios Trillian Pro 3.1.9.0
Cerulean Studios Trillian 3.1
Cerulean Studios Trillian 0.72
Cerulean Studios Trillian 0.70
Cerulean Studios Trillian 0.52
Cerulean Studios Trillian 0.50
Cerulean Studios Trillian 3.1.5.0
Cerulean Studios Trillian 3.1.0.121
Cerulean Studios Trillian Pro 2.0
Ceruleanstudios Trillian 3.1.9.0
Cerulean Studios Trillian 0.74d
Cerulean Studios Trillian 0.74c
Cerulean Studios Trillian 0.725
Cerulean Studios Trillian 3.0
Cerulean Studios Trillian 0.6351
890
VMScore
CVE-2008-5402
Double free vulnerability in the XML parser in Trillian prior to 3.1.12.0 allows remote malicious users to execute arbitrary code via a crafted XML expression, related to the "IMG SRC ID."
Cerulean Studios Trillian 3.0
Cerulean Studios Trillian 2.0
Cerulean Studios Trillian 0.6351
Cerulean Studios Trillian 0.635
Cerulean Studios Trillian 3.1.11.0
Cerulean Studios Trillian 3.1.10.0
Cerulean Studios Trillian 3.1.0.121
Cerulean Studios Trillian Pro 2.01
Cerulean Studios Trillian Pro 3.0
Ceruleanstudios Trillian 3.1.9.0
Ceruleanstudios Trillian
Cerulean Studios Trillian 3.1.9.0
Cerulean Studios Trillian 0.73
Cerulean Studios Trillian 0.71
Cerulean Studios Trillian 0.61
Cerulean Studios Trillian 0.60
Cerulean Studios Trillian 3.1.7.0
Cerulean Studios Trillian 3.1.6.0
Cerulean Studios Trillian Pro 3.1.5.0
Ceruleanstudios Trillian 3.1.0.9
Cerulean Studios Trillian Pro
Cerulean Studios Trillian 0.74e
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »