Page 2 of 18 results (0.001 seconds)

CVSS: 9.8EPSS: 57%CPEs: 3EXPL: 8

18 Mar 2003 — Multiple buffer overflows in the IRC component of Trillian 0.73 and 0.74 allows remote malicious IRC servers to cause a denial of service and possibly execute arbitrary code via (1) a large response from the server, (2) a JOIN with a long channel name, (3) a long "raw 221" message, (4) a PRIVMSG with a long nickname, or (5) a long response from an IDENT server. Multiples desbordamiento de búfer en el componente IRC de Trillian 0.73 y 0.74 permite a servidores IRC remotos malintencionados causar la Denegació... • https://www.exploit-db.com/exploits/21816 •

CVSS: 7.5EPSS: 15%CPEs: 1EXPL: 4

18 Mar 2003 — The IRC component of Trillian 0.73 and 0.74 allows remote malicious IRC servers to cause a denial of service (crash) by sending the raw messages (1) 206, (2) 211, (3) 213, (4) 214, (5) 215, (6) 217, (7) 218, (8) 243, (9) 302, (10) 317, (11) 324, (12) 332, (13) 333, (14) 352, and (15) 367. El componente IRC de Trillian 0.73 y 0.74 permite a servidores IRC remotos malintencionados causar la Denegación de Servicio (por caida)mediante el envío de mensajes 'no preparados' (raw messages): 206, 211, 213, 214, 215,... • https://www.exploit-db.com/exploits/73 •

CVSS: 7.5EPSS: 4%CPEs: 1EXPL: 3

18 Mar 2003 — The IRC component of Trillian 0.73 and 0.74 allows remote malicious IRC servers to cause a denial of service (crash) via a PART message with (1) a missing channel or (2) a channel that the Trillian user is not in. El componente IRC de Trillian 0.73 y 0.74 permite a servidores IRC maliciosos causar la Denegación de Servicos (DoS) (por caida) mediante un mensaje PART con: un canal desaparecido/no existente. un canal al que el usuario de Trillian no esta conectado. user is not in. • https://www.exploit-db.com/exploits/21821 •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

31 Dec 2002 — Format string vulnerability in the error handling of IRC invite responses for Trillian 0.725 and 0.73 allows remote IRC servers to execute arbitrary code via an invite to a channel with format string specifiers in the name. • http://www.iss.net/security_center/static/9761.php •

CVSS: 7.1EPSS: 0%CPEs: 3EXPL: 2

31 Dec 2002 — Cerulean Studios Trillian 0.73 and earlier use weak encrypttion (XOR) for storing user passwords in .ini files in the Trillian directory, which allows local users to gain access to other user accounts. • https://www.exploit-db.com/exploits/21781 •

CVSS: 9.8EPSS: 3%CPEs: 2EXPL: 0

31 Dec 2002 — Buffer overflow in the IRC module of Trillian 0.725 and 0.73 allowing remote attackers to execute arbitrary code via a long DCC Chat message. • http://www.iss.net/security_center/static/9764.php •

CVSS: 9.8EPSS: 1%CPEs: 3EXPL: 0

31 Dec 2002 — Buffer overflow in the XML parser of Trillian 0.6351, 0.725 and 0.73 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a skin with a long colors file name in trillian.xml. • http://archives.neohapsis.com/archives/bugtraq/2002-08/0334.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 4%CPEs: 3EXPL: 4

31 Dec 2002 — Buffer overflow in the IDENT daemon (identd) in Trillian 0.6351, 0.725, 0.73, 0.74 and 1.0 pro allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long request. • http://archives.neohapsis.com/archives/bugtraq/2002-09/0206.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •