Page 2 of 15 results (0.012 seconds)

CVSS: 5.0EPSS: 2%CPEs: 3EXPL: 3

Cross-site scripting vulnerability AOL Instant Messenger (AIM) 4.5 and 4.7 for MacOS and Windows allows remote attackers to conduct unauthorized activities, such as adding buddies and groups to a user's buddy list, via a URL with a META HTTP-EQUIV="refresh" tag to an aim: URL. • https://www.exploit-db.com/exploits/21619 http://online.securityfocus.com/archive/1/282443 http://www.iss.net/security_center/static/9616.php http://www.mindflip.org/aim.html http://www.securityfocus.com/bid/5246 •

CVSS: 5.0EPSS: 1%CPEs: 7EXPL: 1

Heap-based buffer overflow in the goim handler of AOL Instant Messenger (AIM) 4.4 through 4.8.2616 allows remote attackers to cause a denial of service (crash) via escaping of the screen name parameter, which triggers the overflow when the user selects "Get Info" on the buddy. • http://online.securityfocus.com/archive/1/288980 http://www.iss.net/security_center/static/9950.php http://www.securityfocus.com/bid/5492 •

CVSS: 5.0EPSS: 1%CPEs: 14EXPL: 1

AOL Instant Messenger (AIM) allows remote attackers to cause a denial of service (crash) via an "AddBuddy" link with the ScreenName parameter set to a large number of comma-separated values, possibly triggering a buffer overflow. • http://archives.neohapsis.com/archives/bugtraq/2002-05/0086.html http://www.iss.net/security_center/static/9058.php http://www.kb.cert.org/vuls/id/259435 http://www.osvdb.org/5109 http://www.securityfocus.com/bid/4709 •

CVSS: 5.0EPSS: 3%CPEs: 9EXPL: 3

Directory traversal vulnerability in AOL Instant Messenger (AIM) 4.8 beta and earlier allows remote attackers to create arbitrary files and execute commands via a Direct Connection with an IMG tag with a SRC attribute that specifies the target filename. • https://www.exploit-db.com/exploits/21386 http://archives.neohapsis.com/archives/bugtraq/2002-04/0203.html http://www.iss.net/security_center/static/8870.php http://www.securityfocus.com/bid/4526 •

CVSS: 7.5EPSS: 1%CPEs: 27EXPL: 0

AOL Instant Messenger (AIM) allows remote attackers to steal files that are being transferred to other clients by connecting to port 4443 (Direct Connection) or port 5190 (file transfer) before the intended user. • http://online.securityfocus.com/archive/1/269006 http://www.securityfocus.com/bid/4574 https://exchange.xforce.ibmcloud.com/vulnerabilities/8931 •