Page 2 of 10 results (0.009 seconds)

CVSS: 10.0EPSS: 11%CPEs: 2EXPL: 0

Heap-based buffer overflow in the Rendezvous / Extensible Messaging and Presence Protocol (XMPP) component (plugins\rendezvous.dll) for Cerulean Studios Trillian Pro before 3.1.5.1 allows remote attackers to execute arbitrary code via a message that triggers the overflow from expansion that occurs during encoding. Desbordamiento de búfer basado en pila en el componente Rendezvous / Extensible Messaging y Presence Protocol (XMPP) (plugins\rendezvous.dll) para Cerulean Studios Trillian Pro anterior a 3.1.5.1 permite a atacantes remotos ejecutar código de su elección a través de un mensaje que dispara el desbordamiento de búfer desde la expansión que ocurre a lo largo de la codificación. • http://blog.ceruleanstudios.com/?p=131 http://dvlabs.tippingpoint.com/advisory/TPTI-07-06 http://osvdb.org/35720 http://www.securityfocus.com/archive/1/467439/100/0/threaded http://www.securityfocus.com/bid/23781 https://exchange.xforce.ibmcloud.com/vulnerabilities/34059 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 4%CPEs: 2EXPL: 1

Buffer overflow in Trillian 3.0 and Pro 3.0 allows remote attackers to execute arbitrary code via a crafted PNG image file. • https://www.exploit-db.com/exploits/852 http://marc.info/?l=bugtraq&m=111023000624809&w=2 http://www.securiteam.com/exploits/5KP030KF5E.html http://www.securityfocus.com/bid/12703 http://www.vupen.com/english/advisories/2005/0221 •

CVSS: 7.5EPSS: 10%CPEs: 13EXPL: 0

Stack-based buffer overflow in Trillian 0.71 through 0.74f and Trillian Pro 1.0 through 2.01 allows remote attackers to execute arbitrary code via a Yahoo Messenger packet with a long key name. • http://lists.grok.org.uk/pipermail/full-disclosure/2004-February/017766.html http://secunia.com/advisories/10973 http://security.e-matters.de/advisories/022004.html http://securitytracker.com/id?1009220 http://www.osvdb.org/4060 https://exchange.xforce.ibmcloud.com/vulnerabilities/15304 •

CVSS: 7.5EPSS: 7%CPEs: 7EXPL: 0

Integer overflow in Trillian 0.74 and earlier, and Trillian Pro 2.01 and earlier, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a directIM packet that triggers a heap-based buffer overflow. • http://lists.seifried.org/pipermail/security/2004-February/001869.html http://secunia.com/advisories/10973 http://security.e-matters.de/advisories/022004.html http://securitytracker.com/id?1009220 http://www.osvdb.org/4056 http://www.securityfocus.com/bid/9489 https://exchange.xforce.ibmcloud.com/vulnerabilities/15303 •

CVSS: 10.0EPSS: 4%CPEs: 3EXPL: 4

Buffer overflow in the IDENT daemon (identd) in Trillian 0.6351, 0.725, 0.73, 0.74 and 1.0 pro allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long request. • http://archives.neohapsis.com/archives/bugtraq/2002-09/0206.html http://archives.neohapsis.com/archives/bugtraq/2002-09/0224.html http://lists.grok.org.uk/pipermail/full-disclosure/2002-September/001890.html http://www.iss.net/security_center/static/10118.php http://www.securityfocus.com/bid/5733 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •