Page 2 of 13 results (0.006 seconds)

CVSS: 2.6EPSS: 2%CPEs: 4EXPL: 3

Directory traversal vulnerability in AOL Instant Messenger (AIM) 4.8.2790 allows remote attackers to execute arbitrary programs by specifying the program in the href attribute of a link. • https://www.exploit-db.com/exploits/21958 http://archives.neohapsis.com/archives/bugtraq/2002-10/0319.html http://www.iss.net/security_center/static/10441.php http://www.securityfocus.com/bid/6027 •

CVSS: 5.0EPSS: 1%CPEs: 7EXPL: 1

Heap-based buffer overflow in the goim handler of AOL Instant Messenger (AIM) 4.4 through 4.8.2616 allows remote attackers to cause a denial of service (crash) via escaping of the screen name parameter, which triggers the overflow when the user selects "Get Info" on the buddy. • http://online.securityfocus.com/archive/1/288980 http://www.iss.net/security_center/static/9950.php http://www.securityfocus.com/bid/5492 •

CVSS: 5.0EPSS: 1%CPEs: 14EXPL: 1

AOL Instant Messenger (AIM) allows remote attackers to cause a denial of service (crash) via an "AddBuddy" link with the ScreenName parameter set to a large number of comma-separated values, possibly triggering a buffer overflow. • http://archives.neohapsis.com/archives/bugtraq/2002-05/0086.html http://www.iss.net/security_center/static/9058.php http://www.kb.cert.org/vuls/id/259435 http://www.osvdb.org/5109 http://www.securityfocus.com/bid/4709 •

CVSS: 5.0EPSS: 3%CPEs: 9EXPL: 3

Directory traversal vulnerability in AOL Instant Messenger (AIM) 4.8 beta and earlier allows remote attackers to create arbitrary files and execute commands via a Direct Connection with an IMG tag with a SRC attribute that specifies the target filename. • https://www.exploit-db.com/exploits/21386 http://archives.neohapsis.com/archives/bugtraq/2002-04/0203.html http://www.iss.net/security_center/static/8870.php http://www.securityfocus.com/bid/4526 •

CVSS: 7.5EPSS: 1%CPEs: 27EXPL: 0

AOL Instant Messenger (AIM) allows remote attackers to steal files that are being transferred to other clients by connecting to port 4443 (Direct Connection) or port 5190 (file transfer) before the intended user. • http://online.securityfocus.com/archive/1/269006 http://www.securityfocus.com/bid/4574 https://exchange.xforce.ibmcloud.com/vulnerabilities/8931 •