CVE-2002-0592
https://notcve.org/view.php?id=CVE-2002-0592
AOL Instant Messenger (AIM) allows remote attackers to steal files that are being transferred to other clients by connecting to port 4443 (Direct Connection) or port 5190 (file transfer) before the intended user. • http://online.securityfocus.com/archive/1/269006 http://www.securityfocus.com/bid/4574 https://exchange.xforce.ibmcloud.com/vulnerabilities/8931 •
CVE-2001-1421
https://notcve.org/view.php?id=CVE-2001-1421
AOL Instant Messenger (AIM) 4.7 and earlier allows remote attackers to cause a denial of service (application crash) via a large number of different fonts followed by an HTML HR tag. • http://www.kb.cert.org/vuls/id/530299 http://www.kb.cert.org/vuls/id/JARL-569MD7 http://www.securityfocus.com/archive/1/218920 http://www.securityfocus.com/archive/1/247707 http://www.securityfocus.com/bid/3756 https://exchange.xforce.ibmcloud.com/vulnerabilities/7757 •
CVE-2001-1419
https://notcve.org/view.php?id=CVE-2001-1419
AOL Instant Messenger (AIM) 4.7.2480 and earlier allows remote attackers to cause a denial of service (application crash) via an instant message that contains a large amount of "<!--" HTML comments. • http://archives.neohapsis.com/archives/bugtraq/2001-10/0014.html http://www.kb.cert.org/vuls/id/507771 http://www.kb.cert.org/vuls/id/JARL-56TPTN http://www.securityfocus.com/archive/1/247707 http://www.securityfocus.com/bid/3398 https://exchange.xforce.ibmcloud.com/vulnerabilities/7233 •
CVE-2000-1093 – AOL Instant Messenger 3.5.1856/4.0/4.1.2010/4.2.1193 - 'aim://' Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2000-1093
Buffer overflow in AOL Instant Messenger before 4.3.2229 allows remote attackers to execute arbitrary commands via a long "goim" command. • https://www.exploit-db.com/exploits/20510 http://www.atstake.com/research/advisories/2000/a121200-1.txt https://exchange.xforce.ibmcloud.com/vulnerabilities/5732 •
CVE-2000-0383
https://notcve.org/view.php?id=CVE-2000-0383
The file transfer component of AOL Instant Messenger (AIM) reveals the physical path of the transferred file to the remote recipient. • http://www.securityfocus.com/bid/1180 http://www.securityfocus.com/templates/archive.pike?list=1&msg=002401bfb918%247310d5a0%241ef084ce%40karemor.com •