Plaintext Password Storage Vulnerability in Trillian Pro 3.1 Build 121

Plaintext Password Storage Vulnerability in Trillian Pro 3.1 Build 121

CVE-2005-2444 · LOW Severity

AV:L/AC:L/AU:N/C:P/I:N/A:N

Trillian Pro 3.1 build 121, when checking Yahoo e-mail, stores the password in plaintext in a world readable file and does not delete the file after login, which allows local users to obtain sensitive information.

Learn more about our User Device Pen Test.