Page 2 of 31 results (0.010 seconds)

CVSS: 10.0EPSS: 78%CPEs: 3EXPL: 3

12 Aug 2004 — Buffer overflow in the goaway function in the aim:goaway URI handler for AOL Instant Messenger (AIM) 5.5, including 5.5.3595, allows remote attackers to execute arbitrary code via a long Away message. Desbordamiento de búfer en la función goaway en el manejador de URI aim:goaway en AOL Instant Messenger (AIM) 5.5, incluyendo 5.5.3595, permite a atacantes remotos ejecutar código de su elección mediante un mensaje "Away" largo. • https://www.exploit-db.com/exploits/395 •

CVSS: 10.0EPSS: 6%CPEs: 1EXPL: 0

31 Dec 2003 — Buffer overflow in AOL Instant Messenger (AIM) 5.2.3292 allows remote attackers to execute arbitrary code via an aim:getfile URL with a long screen name. • http://archives.neohapsis.com/archives/ntbugtraq/2003-q4/0059.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 3%CPEs: 4EXPL: 3

31 Dec 2002 — Directory traversal vulnerability in AOL Instant Messenger (AIM) 4.8.2790 allows remote attackers to execute arbitrary programs by specifying the program in the href attribute of a link. • https://www.exploit-db.com/exploits/21958 •

CVSS: 7.5EPSS: 1%CPEs: 7EXPL: 1

31 Dec 2002 — Heap-based buffer overflow in the goim handler of AOL Instant Messenger (AIM) 4.4 through 4.8.2616 allows remote attackers to cause a denial of service (crash) via escaping of the screen name parameter, which triggers the overflow when the user selects "Get Info" on the buddy. • http://online.securityfocus.com/archive/1/288980 •

CVSS: 6.1EPSS: 3%CPEs: 3EXPL: 3

31 Dec 2002 — Cross-site scripting vulnerability AOL Instant Messenger (AIM) 4.5 and 4.7 for MacOS and Windows allows remote attackers to conduct unauthorized activities, such as adding buddies and groups to a user's buddy list, via a URL with a META HTTP-EQUIV="refresh" tag to an aim: URL. • https://www.exploit-db.com/exploits/21619 •

CVSS: 7.5EPSS: 2%CPEs: 14EXPL: 1

12 Aug 2002 — AOL Instant Messenger (AIM) allows remote attackers to cause a denial of service (crash) via an "AddBuddy" link with the ScreenName parameter set to a large number of comma-separated values, possibly triggering a buffer overflow. • http://archives.neohapsis.com/archives/bugtraq/2002-05/0086.html •

CVSS: 9.1EPSS: 9%CPEs: 9EXPL: 3

11 Jun 2002 — Directory traversal vulnerability in AOL Instant Messenger (AIM) 4.8 beta and earlier allows remote attackers to create arbitrary files and execute commands via a Direct Connection with an IMG tag with a SRC attribute that specifies the target filename. • https://www.exploit-db.com/exploits/21386 •

CVSS: 7.5EPSS: 0%CPEs: 27EXPL: 0

11 Jun 2002 — AOL Instant Messenger (AIM) allows remote attackers to steal files that are being transferred to other clients by connecting to port 4443 (Direct Connection) or port 5190 (file transfer) before the intended user. • http://online.securityfocus.com/archive/1/269006 •

CVSS: 9.8EPSS: 4%CPEs: 1EXPL: 1

29 May 2002 — Buffer overflow in AOL Instant Messenger (AIM) 4.2 and later allows remote attackers to execute arbitrary code via a long AddExternalApp request and a TLV type greater than 0x2711. • http://marc.info/?l=bugtraq&m=102071080509955&w=2 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

08 Apr 2002 — AOL Instant Messenger (AIM) 4.7.2480 adds free.aol.com to the Trusted Sites Zone in Internet Explorer without user approval, which could allow code from free.aol.com to bypass intended access restrictions. • http://www.informationweek.com/story/IWK20010927S0021 •