Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
rob flynn gaim 1.1.1 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2005-0208
The HTML parsing functions in Gaim prior to 1.1.4 allow remote malicious users to cause a denial of service (application crash) via malformed HTML that causes "an invalid memory access," a different vulnerability than CVE-2005-0473.
Rob Flynn Gaim 1.1.2
Rob Flynn Gaim 1.1.3
Rob Flynn Gaim 1.1.0
Rob Flynn Gaim 1.1.1
445
VMScore
CVE-2005-2102
The AIM/ICQ module in Gaim prior to 1.5.0 allows remote malicious users to cause a denial of service (application crash) via a filename that contains invalid UTF-8 characters.
Rob Flynn Gaim 1.0.1
Rob Flynn Gaim 1.0.2
Rob Flynn Gaim 1.2.0
Rob Flynn Gaim 1.2.1
Rob Flynn Gaim 1.1.1
Rob Flynn Gaim 1.1.2
Rob Flynn Gaim 1.0
Rob Flynn Gaim 1.0.0
Rob Flynn Gaim 1.1.3
Rob Flynn Gaim 1.1.4
Rob Flynn Gaim 1.0.3
Rob Flynn Gaim 1.1.0
Rob Flynn Gaim 1.3.0
445
VMScore
CVE-2005-1262
Gaim 1.2.1 and previous versions allows remote malicious users to cause a denial of service (application crash) via a malformed MSN message.
Rob Flynn Gaim 0.52
Rob Flynn Gaim 0.53
Rob Flynn Gaim 0.59.1
Rob Flynn Gaim 0.60
Rob Flynn Gaim 0.67
Rob Flynn Gaim 0.68
Rob Flynn Gaim 0.76
Rob Flynn Gaim 0.77
Rob Flynn Gaim 1.0.0
Rob Flynn Gaim 1.0.1
Rob Flynn Gaim 1.1.4
Rob Flynn Gaim 1.2.0
Rob Flynn Gaim 0.10
Rob Flynn Gaim 0.56
Rob Flynn Gaim 0.57
Rob Flynn Gaim 0.63
Rob Flynn Gaim 0.64
Rob Flynn Gaim 0.71
Rob Flynn Gaim 0.72
Rob Flynn Gaim 0.73
Rob Flynn Gaim 0.80
Rob Flynn Gaim 0.81
755
VMScore
CVE-2005-1261
Stack-based buffer overflow in the URL parsing function in Gaim prior to 1.3.0 allows remote malicious users to execute arbitrary code via an instant message (IM) with a large URL.
Rob Flynn Gaim 0.50
Rob Flynn Gaim 0.51
Rob Flynn Gaim 0.52
Rob Flynn Gaim 0.59
Rob Flynn Gaim 0.59.1
Rob Flynn Gaim 0.66
Rob Flynn Gaim 0.67
Rob Flynn Gaim 0.74
Rob Flynn Gaim 0.75
Rob Flynn Gaim 0.76
Rob Flynn Gaim 0.82.1
Rob Flynn Gaim 1.0.0
Rob Flynn Gaim 1.1.3
Rob Flynn Gaim 1.1.4
Rob Flynn Gaim 0.55
Rob Flynn Gaim 0.56
Rob Flynn Gaim 0.62
Rob Flynn Gaim 0.63
Rob Flynn Gaim 0.70
Rob Flynn Gaim 0.71
Rob Flynn Gaim 0.79
Rob Flynn Gaim 0.80
1 EDB exploit
445
VMScore
CVE-2005-1269
Gaim prior to 1.3.1 allows remote malicious users to cause a denial of service (application crash) via a Yahoo! message with non-ASCII characters in a file name.
Rob Flynn Gaim 0.50
Rob Flynn Gaim 0.51
Rob Flynn Gaim 0.58
Rob Flynn Gaim 0.59
Rob Flynn Gaim 0.66
Rob Flynn Gaim 0.67
Rob Flynn Gaim 0.74
Rob Flynn Gaim 0.75
Rob Flynn Gaim 0.82
Rob Flynn Gaim 0.82.1
Rob Flynn Gaim 1.1.2
Rob Flynn Gaim 1.1.3
Rob Flynn Gaim 0.10
Rob Flynn Gaim 0.10.3
Rob Flynn Gaim 0.56
Rob Flynn Gaim 0.57
Rob Flynn Gaim 0.64
Rob Flynn Gaim 0.65
Rob Flynn Gaim 0.72
Rob Flynn Gaim 0.73
Rob Flynn Gaim 0.80
Rob Flynn Gaim 0.81
445
VMScore
CVE-2005-0472
Gaim prior to 1.1.3 allows remote malicious users to cause a denial of service (infinite loop) via malformed SNAC packets from (1) AIM or (2) ICQ.
Rob Flynn Gaim 1.1.1
Rob Flynn Gaim 1.1.2
Rob Flynn Gaim 1.0
Rob Flynn Gaim 1.0.1
Mandrakesoft Mandrake Linux 10.1
Redhat Enterprise Linux 4.0
Mandrakesoft Mandrake Linux Corporate Server 3.0
Mandrakesoft Mandrake Linux 10.0
Redhat Enterprise Linux Desktop 4.0
445
VMScore
CVE-2005-0473
The HTML parsing functions in Gaim prior to 1.1.3 allow remote malicious users to cause a denial of service (application crash) via malformed HTML that causes "an invalid memory access," a different vulnerability than CVE-2005-0208.
Rob Flynn Gaim 1.0
Rob Flynn Gaim 1.1.2
Rob Flynn Gaim 1.0.1
Rob Flynn Gaim 1.1.1
Mandrakesoft Mandrake Linux 10.1
Redhat Enterprise Linux 4.0
Mandrakesoft Mandrake Linux Corporate Server 3.0
Mandrakesoft Mandrake Linux 10.0
Redhat Enterprise Linux Desktop 4.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started