CVE-2005-1671
https://notcve.org/view.php?id=CVE-2005-1671
The Logfile feature in Yahoo! Messenger 5.x through 6.0 can be activated by a YMSGR: URL and writes all output to a single ypager.log file, even when there are multiple users, and does not properly warn later users that the feature has been enabled, which allows local users to obtain sensitive information from other users. • http://marc.info/?l=bugtraq&m=111643475210982&w=2 •
CVE-2005-1618 – Yahoo! Messenger 5.x/6.0 - URL Handler Remote Denial of Service
https://notcve.org/view.php?id=CVE-2005-1618
The YMSGR URL handler in Yahoo! Messenger 5.x through 6.0 allows remote attackers to cause a denial of service (disconnect) via a room login or a room join request packet with a third : (colon) and an & (ampersand), which causes Messenger to send a corrupted packet to the server, which triggers a disconnect from the server. • https://www.exploit-db.com/exploits/25658 http://marc.info/?l=bugtraq&m=111601904204055&w=2 http://www.osvdb.org/16816 http://www.securityfocus.com/bid/13626 •
CVE-2005-0737 – Yahoo! Messenger 5.x/6.0 - Offline Mode Status Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2005-0737
Buffer overflow in Yahoo! Messenger allows remote attackers to execute arbitrary code via the offline mode. • https://www.exploit-db.com/exploits/25196 http://seclists.org/lists/fulldisclosure/2005/Mar/0284.html http://www.securityfocus.com/bid/12750 •
CVE-2005-0242
https://notcve.org/view.php?id=CVE-2005-0242
The Audio Setup Wizard (asw.dll) in Yahoo! Messenger 6.0.0.1750, and possibly other versions, allows attackers to arbitrary code by placing a malicious ping.exe program into the Messenger program directory, which is installed with weak default permissions. • http://messenger.yahoo.com/security/update6.html http://secunia.com/advisories/11815 http://secunia.com/secunia_research/2004-6/advisory •
CVE-2005-0243
https://notcve.org/view.php?id=CVE-2005-0243
Yahoo! Messenger 6.0.0.1750, and possibly other versions before 6.0.0.1921, does not properly display long filenames in file dialog boxes, which could allow remote attackers to trick users into downloading and executing programs via file names containing a large number of spaces and multiple file extensions. • http://secunia.com/advisories/13712 http://secunia.com/secunia_research/2005-2/advisory •