8 results (0.012 seconds)

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 1

Heap-based buffer overflow the "Answering Service" function in ICQ 2003b Build 3916 allows local users to cause a denial of service (application crash) via a long string in the "AwayMsg Presets" value in the ICQ\ICQPro\DefaultPrefs\Presets registry key. Desbordamiento de búfer basado en pila en la función "Answering Service" en ICQ 2003b construcción 3916 permite a un usuario local provocar denegación de servicio (caida de aplicación) a través de una cadena larga en el valor "AwayMsg Presets" en la linea de registro: ICQ\ICQPro\DefaultPrefs\Presets. • http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/050461.html http://securityreason.com/securityalert/1818 https://exchange.xforce.ibmcloud.com/vulnerabilities/29933 •

CVSS: 7.5EPSS: 35%CPEs: 19EXPL: 0

Heap-based buffer overflow in the MCRegEx__Search function in AOL ICQ Pro 2003b Build 3916 and earlier allows remote attackers to execute arbitrary code via an inconsistent length field of a Message in a 0x2711 Type-Length-Value (TLV) type. Desbordamiento de búfer basado en montón en la función MCRegEx__Search en AOL ICQ Pro 2003b Build 3916 y anteriores permiten a un atacanet remoto ejecutar código de su elección a través de un campo grnde inconsistente de un mensaje en un tipo 0x2711 Type-Length-Value (TLV). • http://secunia.com/advisories/21834 http://securityreason.com/securityalert/1530 http://www.coresecurity.com/index.php5?module=ContentMod&action=item&id=1509 http://www.kb.cert.org/vuls/id/400780 http://www.securityfocus.com/archive/1/445513/100/0/threaded http://www.securityfocus.com/bid/19897 http://www.vupen.com/english/advisories/2006/3527 https://exchange.xforce.ibmcloud.com/vulnerabilities/28835 •

CVSS: 5.1EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in Mirabilis ICQ 2003a allows user-assisted attackers to execute arbitrary code by convincing a user to enter long strings into the First Name and Last Name fields. • http://marc.info/?l=bugtraq&m=113063323109149&w=2 •

CVSS: 7.5EPSS: 0%CPEs: 13EXPL: 0

Format string vulnerability in POP3 client for Mirabilis ICQ Pro 2003a allows remote malicious servers to execute arbitrary code via format strings in the response to a UIDL command. Vulnerabilidad en formateado de cadenas en cliente POP3 para Mirabilis ICQ Pro 2003a permite que servidores remotos maliciosos ejecuten código arbitrario mediante cadenas formateadas en la respuesta a un comando UIDL. • http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0051.html http://marc.info/?l=bugtraq&m=105216842131995&w=2 http://www.coresecurity.com/common/showdoc.php?idx=315&idxseccion=10 http://www.securityfocus.com/bid/7461 https://exchange.xforce.ibmcloud.com/vulnerabilities/11938 •

CVSS: 7.5EPSS: 1%CPEs: 13EXPL: 0

The "ICQ Features on Demand" functionality for Mirabilis ICQ Pro 2003a does not properly verify the authenticity of software upgrades, which allows remote attackers to install arbitrary software via a spoofing attack. La funcionalidad "ICQ Features on Demand" en Mirabilis ICQ Pro 2003a no verifica adecuadamente la autenticidad de las actualizaciones software, lo que permitiría a atacantes remotos instalar software arbitrario. • http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0051.html http://marc.info/?l=bugtraq&m=105216842131995&w=2 http://www.coresecurity.com/common/showdoc.php?idx=315&idxseccion=10 http://www.securityfocus.com/bid/7464 https://exchange.xforce.ibmcloud.com/vulnerabilities/11944 •