10 results (0.005 seconds)

CVSS: 7.5EPSS: 35%CPEs: 19EXPL: 0

Heap-based buffer overflow in the MCRegEx__Search function in AOL ICQ Pro 2003b Build 3916 and earlier allows remote attackers to execute arbitrary code via an inconsistent length field of a Message in a 0x2711 Type-Length-Value (TLV) type. Desbordamiento de búfer basado en montón en la función MCRegEx__Search en AOL ICQ Pro 2003b Build 3916 y anteriores permiten a un atacanet remoto ejecutar código de su elección a través de un campo grnde inconsistente de un mensaje en un tipo 0x2711 Type-Length-Value (TLV). • http://secunia.com/advisories/21834 http://securityreason.com/securityalert/1530 http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1509 http://www.kb.cert.org/vuls/id/400780 http://www.securityfocus.com/archive/1/445513/100/0/threaded http://www.securityfocus.com/bid/19897 http://www.vupen.com/english/advisories/2006/3527 https://exchange.xforce.ibmcloud.com/vulnerabilities/28835 •

CVSS: 5.1EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in Mirabilis ICQ 2003a allows user-assisted attackers to execute arbitrary code by convincing a user to enter long strings into the First Name and Last Name fields. • http://marc.info/?l=bugtraq&m=113063323109149&w=2 •

CVSS: 7.5EPSS: 0%CPEs: 13EXPL: 0

Format string vulnerability in POP3 client for Mirabilis ICQ Pro 2003a allows remote malicious servers to execute arbitrary code via format strings in the response to a UIDL command. Vulnerabilidad en formateado de cadenas en cliente POP3 para Mirabilis ICQ Pro 2003a permite que servidores remotos maliciosos ejecuten código arbitrario mediante cadenas formateadas en la respuesta a un comando UIDL. • http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0051.html http://marc.info/?l=bugtraq&m=105216842131995&w=2 http://www.coresecurity.com/common/showdoc.php?idx=315&idxseccion=10 http://www.securityfocus.com/bid/7461 https://exchange.xforce.ibmcloud.com/vulnerabilities/11938 •

CVSS: 7.5EPSS: 1%CPEs: 13EXPL: 0

The "ICQ Features on Demand" functionality for Mirabilis ICQ Pro 2003a does not properly verify the authenticity of software upgrades, which allows remote attackers to install arbitrary software via a spoofing attack. La funcionalidad "ICQ Features on Demand" en Mirabilis ICQ Pro 2003a no verifica adecuadamente la autenticidad de las actualizaciones software, lo que permitiría a atacantes remotos instalar software arbitrario. • http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0051.html http://marc.info/?l=bugtraq&m=105216842131995&w=2 http://www.coresecurity.com/common/showdoc.php?idx=315&idxseccion=10 http://www.securityfocus.com/bid/7464 https://exchange.xforce.ibmcloud.com/vulnerabilities/11944 •

CVSS: 7.5EPSS: 10%CPEs: 13EXPL: 0

Integer signedness errors in the POP3 client for Mirabilis ICQ Pro 2003a allow remote attackers to execute arbitrary code via the (1) Subject or (2) Date headers. Error en las signaturas de enteros en cliente POP3 para Mirabilis ICQ Pro 2003a permite que atacantes remotos ejecuten código arbitrario mediante los encabezamientos "Subject" o "Date". • http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0051.html http://marc.info/?l=bugtraq&m=105216842131995&w=2 http://www.coresecurity.com/common/showdoc.php?idx=315&idxseccion=10 http://www.securityfocus.com/bid/7462 http://www.securityfocus.com/bid/7463 https://exchange.xforce.ibmcloud.com/vulnerabilities/11939 •