Total vulnerabilities in the database
Stack-based buffer overflow in Trillian 0.71 through 0.74f and Trillian Pro 1.0 through 2.01 allows remote attackers to execute arbitrary code via a Yahoo Messenger packet with a long key name.
Software | From | Fixed in |
---|---|---|
cerulean_studios / trillian_pro | 2.0 | 2.0.x |
cerulean_studios / trillian | 0.71 | 0.71.x |
cerulean_studios / trillian_pro | 2.01 | 2.01.x |
cerulean_studios / trillian | 0.74b | 0.74b.x |
cerulean_studios / trillian | 0.74g | 0.74g.x |
cerulean_studios / trillian_pro | 1.0 | 1.0.x |
cerulean_studios / trillian | 0.74e | 0.74e.x |
cerulean_studios / trillian | 0.73 | 0.73.x |
cerulean_studios / trillian | 0.725 | 0.725.x |
cerulean_studios / trillian | 0.74c | 0.74c.x |
cerulean_studios / trillian | 0.74f | 0.74f.x |
cerulean_studios / trillian | 0.74 | 0.74.x |
cerulean_studios / trillian | 0.74d | 0.74d.x |