Page 4 of 34 results (0.003 seconds)

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Trillian Pro 3.1 build 121, when checking Yahoo e-mail, stores the password in plaintext in a world readable file and does not delete the file after login, which allows local users to obtain sensitive information. Trillian Pro 3.1 build 121, cuando comprueba el e-mail de Yahoo, almacena el password en texto plano en un fichero legible y no borra ese fichero después del login, lo que permite que usuarios locales conozcan esa información. • http://marc.info/?l=bugtraq&m=112274667603628&w=2 http://secunia.com/advisories/16289 https://exchange.xforce.ibmcloud.com/vulnerabilities/21667 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Multiple buffer overflows in the Yahoo plug-in for Trillian 2.0, 3.0, and 3.1 allow remote web servers to cause a denial of service (application crash) via a long string in an HTTP 1.1 response header. • http://marc.info/?l=bugtraq&m=111171416802350&w=2 http://secunia.com/advisories/14689 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Multiple buffer overflows in the (1) AIM, (2) MSN, (3) RSS, and other plug-ins for Trillian 2.0 allow remote web servers to cause a denial of service (application crash) via a long string in an HTTP 1.1 response header. • http://marc.info/?l=bugtraq&m=111171416802350&w=2 http://secunia.com/advisories/14689 http://securitytracker.com/id?1013557 http://www.osvdb.org/15004 •

CVSS: 7.5EPSS: 4%CPEs: 2EXPL: 1

Buffer overflow in Trillian 3.0 and Pro 3.0 allows remote attackers to execute arbitrary code via a crafted PNG image file. • https://www.exploit-db.com/exploits/852 http://marc.info/?l=bugtraq&m=111023000624809&w=2 http://www.securiteam.com/exploits/5KP030KF5E.html http://www.securityfocus.com/bid/12703 http://www.vupen.com/english/advisories/2005/0221 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 4

Buffer overflow in the MSN module in Trillian 0.74i allows remote MSN servers to execute arbitrary code via a long string that ends in a newline character. • https://www.exploit-db.com/exploits/435 http://marc.info/?l=bugtraq&m=109466618609375&w=2 http://secunia.com/advisories/12487 http://unsecure.altervista.org/security/trillian.htm http://unsecure.altervista.org/security/trillianbof.c http://www.securityfocus.com/bid/11142 https://exchange.xforce.ibmcloud.com/vulnerabilities/17292 •