Page 2 of 14 results (0.002 seconds)

CVSS: 7.5EPSS: 4%CPEs: 3EXPL: 1

16 May 2005 — The YMSGR URL handler in Yahoo! Messenger 5.x through 6.0 allows remote attackers to cause a denial of service (disconnect) via a room login or a room join request packet with a third : (colon) and an & (ampersand), which causes Messenger to send a corrupted packet to the server, which triggers a disconnect from the server. • https://www.exploit-db.com/exploits/25658 •

CVSS: 9.8EPSS: 4%CPEs: 17EXPL: 2

13 Mar 2005 — Buffer overflow in Yahoo! Messenger allows remote attackers to execute arbitrary code via the offline mode. • https://www.exploit-db.com/exploits/25196 •

CVSS: 8.4EPSS: 0%CPEs: 5EXPL: 1

18 Feb 2005 — The Audio Setup Wizard (asw.dll) in Yahoo! Messenger 6.0.0.1750, and possibly other versions, allows attackers to arbitrary code by placing a malicious ping.exe program into the Messenger program directory, which is installed with weak default permissions. • http://messenger.yahoo.com/security/update6.html •

CVSS: 9.1EPSS: 0%CPEs: 5EXPL: 0

17 Feb 2005 — Yahoo! Messenger 6.0.0.1750, and possibly other versions before 6.0.0.1921, does not properly display long filenames in file dialog boxes, which could allow remote attackers to trick users into downloading and executing programs via file names containing a large number of spaces and multiple file extensions. • http://secunia.com/advisories/13712 •