Page 3 of 15 results (0.006 seconds)

CVSS: 5.0EPSS: 3%CPEs: 3EXPL: 1

The YMSGR URL handler in Yahoo! Messenger 5.x through 6.0 allows remote attackers to cause a denial of service (disconnect) via a room login or a room join request packet with a third : (colon) and an & (ampersand), which causes Messenger to send a corrupted packet to the server, which triggers a disconnect from the server. • https://www.exploit-db.com/exploits/25658 http://marc.info/?l=bugtraq&m=111601904204055&w=2 http://www.osvdb.org/16816 http://www.securityfocus.com/bid/13626 •

CVSS: 7.5EPSS: 2%CPEs: 17EXPL: 2

Buffer overflow in Yahoo! Messenger allows remote attackers to execute arbitrary code via the offline mode. • https://www.exploit-db.com/exploits/25196 http://seclists.org/lists/fulldisclosure/2005/Mar/0284.html http://www.securityfocus.com/bid/12750 •

CVSS: 4.6EPSS: 0%CPEs: 5EXPL: 1

The Audio Setup Wizard (asw.dll) in Yahoo! Messenger 6.0.0.1750, and possibly other versions, allows attackers to arbitrary code by placing a malicious ping.exe program into the Messenger program directory, which is installed with weak default permissions. • http://messenger.yahoo.com/security/update6.html http://secunia.com/advisories/11815 http://secunia.com/secunia_research/2004-6/advisory •

CVSS: 5.0EPSS: 7%CPEs: 5EXPL: 0

Yahoo! Messenger 6.0.0.1750, and possibly other versions before 6.0.0.1921, does not properly display long filenames in file dialog boxes, which could allow remote attackers to trick users into downloading and executing programs via file names containing a large number of spaces and multiple file extensions. • http://secunia.com/advisories/13712 http://secunia.com/secunia_research/2005-2/advisory •

CVSS: 7.5EPSS: 8%CPEs: 1EXPL: 0

Buffer overflow in Yahoo Instant Messenger 5.6.0.1351 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long filename in the download feature. Desbordamiento de búfer en Yahoo Instant Messenger 5.6.0.1351 y anteriores permite que atacantes remotos provoquen una denegación de servicio (caída) y posiblemente ejecuten código arbitrario mediante un nombre de fichero largo en la opción de descarga. • http://lists.grok.org.uk/pipermail/full-disclosure/2004-January/015334.html http://marc.info/?l=bugtraq&m=107357996802255&w=2 http://secunia.com/advisories/10573 http://www.osvdb.org/3437 http://www.securityfocus.com/bid/9383 http://www.securitytracker.com/id?1008651 https://exchange.xforce.ibmcloud.com/vulnerabilities/14171 •