12 results (0.019 seconds)

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

The embedded Internet Explorer server control in AOL Instant Messenger (AIM) 6.5.3.12 and earlier allows remote attackers to execute arbitrary code via unspecified web script or HTML in an instant message, related to AIM's filtering of "specific tags and attributes" and the lack of Local Machine Zone lockdown. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2007-4901. El control de Internet Explorer empotrado en AOL Instant Messenger (AIM) 6.5.3.12 y anteriores permite a atacantes remotos ejecutar código de su elección mediante secuencias de comandos web o HTML de su elección en un mensaje instantáneo, relacionado con el filtrado de AIM de "etiquetas y atributos específicos" y la falta de cierre de la Zona de la Máquina Local. NOTA: este asunto existe debido a un arreglo incompleto para CVE-2007-4901. • http://aviv.raffon.net/2007/09/25/ReadyAIMFire.aspx http://www.securityfocus.com/archive/1/480647/100/0/threaded • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 4.3EPSS: 1%CPEs: 2EXPL: 0

Directory traversal vulnerability in AOL Instant Messenger (AIM) 5.9 and earlier, and ICQ 5.1 and probably earlier, allows user-assisted remote attackers to write files to arbitrary locations via a .. (dot dot) in a filename in a file transfer operation. Vulnerabilidad de salto de directorio en AOL Instant Messenger (AIM) 5.9 y anteriores, e ICQ 5.1 y probablemente anteriores permite a atacantes remotos con la complicidad del usuario mediante secuencias .. (punto punto) en un nombre de fichero en una operación de transferencia de fichero. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=508 http://secunia.com/advisories/24747 http://secunia.com/advisories/24803 http://www.securityfocus.com/bid/23391 http://www.securitytracker.com/id?1017890 http://www.securitytracker.com/id?1017891 http://www.vupen.com/english/advisories/2007/1306 http://www.vupen.com/english/advisories/2007/1307 https://exchange.xforce.ibmcloud.com/vulnerabilities/33538 •

CVSS: 5.0EPSS: 1%CPEs: 36EXPL: 2

AOL Instant Messenger 5.5.x and earlier allows remote attackers to cause a denial of service (client crash) via an invalid smiley icon location in the sml parameter of a font tag. • https://www.exploit-db.com/exploits/25633 http://www.securityfocus.com/bid/13553 •

CVSS: 7.5EPSS: 6%CPEs: 15EXPL: 2

The Buddy icon file for AOL Instant Messenger (AIM) 4.3 through 5.5 is created in a predictable location, which may allow remote attackers to use a shell: URI to exploit other vulnerabilities that involve predictable locations. • https://www.exploit-db.com/exploits/23730 http://www.securityfocus.com/archive/1/354448 http://www.securityfocus.com/bid/9698 https://exchange.xforce.ibmcloud.com/vulnerabilities/15310 •

CVSS: 5.0EPSS: 1%CPEs: 7EXPL: 1

Heap-based buffer overflow in the goim handler of AOL Instant Messenger (AIM) 4.4 through 4.8.2616 allows remote attackers to cause a denial of service (crash) via escaping of the screen name parameter, which triggers the overflow when the user selects "Get Info" on the buddy. • http://online.securityfocus.com/archive/1/288980 http://www.iss.net/security_center/static/9950.php http://www.securityfocus.com/bid/5492 •