Filtered by vendor Cerulean Studios
Subscriptions
Total
34 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2004-2304 | 1 Cerulean Studios | 2 Trillian, Trillian Pro | 2024-11-20 | N/A |
Integer overflow in Trillian 0.74 and earlier, and Trillian Pro 2.01 and earlier, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a directIM packet that triggers a heap-based buffer overflow. | ||||
CVE-2004-1666 | 1 Cerulean Studios | 1 Trillian | 2024-11-20 | N/A |
Buffer overflow in the MSN module in Trillian 0.74i allows remote MSN servers to execute arbitrary code via a long string that ends in a newline character. | ||||
CVE-2003-0520 | 1 Cerulean Studios | 1 Trillian | 2024-11-20 | N/A |
Trillian 1.0 Pro and 0.74 Freeware allows remote attackers to cause a denial of service (crash) via a TypingUser message in which the "TypingUser" string has been modified. | ||||
CVE-2002-2390 | 1 Cerulean Studios | 2 Trillian, Trillian Pro | 2024-11-20 | N/A |
Buffer overflow in the IDENT daemon (identd) in Trillian 0.6351, 0.725, 0.73, 0.74 and 1.0 pro allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long request. | ||||
CVE-2002-2366 | 1 Cerulean Studios | 1 Trillian | 2024-11-20 | N/A |
Buffer overflow in the XML parser of Trillian 0.6351, 0.725 and 0.73 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a skin with a long colors file name in trillian.xml. | ||||
CVE-2002-2173 | 1 Cerulean Studios | 1 Trillian | 2024-11-20 | N/A |
Buffer overflow in the IRC module of Trillian 0.725 and 0.73 allowing remote attackers to execute arbitrary code via a long DCC Chat message. | ||||
CVE-2002-2162 | 1 Cerulean Studios | 1 Trillian | 2024-11-20 | N/A |
Cerulean Studios Trillian 0.73 and earlier use weak encrypttion (XOR) for storing user passwords in .ini files in the Trillian directory, which allows local users to gain access to other user accounts. | ||||
CVE-2002-2156 | 1 Cerulean Studios | 1 Trillian | 2024-11-20 | N/A |
Buffer overflow in Trillian 0.73 allows remote IRC servers to execute arbitrary code via a long PING response. | ||||
CVE-2002-2155 | 1 Cerulean Studios | 1 Trillian | 2024-11-20 | N/A |
Format string vulnerability in the error handling of IRC invite responses for Trillian 0.725 and 0.73 allows remote IRC servers to execute arbitrary code via an invite to a channel with format string specifiers in the name. | ||||
CVE-2002-1488 | 1 Cerulean Studios | 1 Trillian | 2024-11-20 | N/A |
The IRC component of Trillian 0.73 and 0.74 allows remote malicious IRC servers to cause a denial of service (crash) via a PART message with (1) a missing channel or (2) a channel that the Trillian user is not in. | ||||
CVE-2002-1487 | 1 Cerulean Studios | 1 Trillian | 2024-11-20 | N/A |
The IRC component of Trillian 0.73 and 0.74 allows remote malicious IRC servers to cause a denial of service (crash) by sending the raw messages (1) 206, (2) 211, (3) 213, (4) 214, (5) 215, (6) 217, (7) 218, (8) 243, (9) 302, (10) 317, (11) 324, (12) 332, (13) 333, (14) 352, and (15) 367. | ||||
CVE-2002-1486 | 1 Cerulean Studios | 1 Trillian | 2024-11-20 | N/A |
Multiple buffer overflows in the IRC component of Trillian 0.73 and 0.74 allows remote malicious IRC servers to cause a denial of service and possibly execute arbitrary code via (1) a large response from the server, (2) a JOIN with a long channel name, (3) a long "raw 221" message, (4) a PRIVMSG with a long nickname, or (5) a long response from an IDENT server. | ||||
CVE-2002-1485 | 1 Cerulean Studios | 1 Trillian | 2024-11-20 | N/A |
The AIM component of Trillian 0.73 and 0.74 allows remote attackers to cause a denial of service (crash) via certain strings such as "P > O < C". | ||||
CVE-2001-1419 | 2 Aol, Cerulean Studios | 2 Instant Messenger, Trillian | 2024-11-20 | N/A |
AOL Instant Messenger (AIM) 4.7.2480 and earlier allows remote attackers to cause a denial of service (application crash) via an instant message that contains a large amount of "<!--" HTML comments. |