Page 3 of 14 results (0.014 seconds)

CVSS: 5.0EPSS: 3%CPEs: 3EXPL: 1

The YMSGR URL handler in Yahoo! Messenger 5.x through 6.0 allows remote attackers to cause a denial of service (disconnect) via a room login or a room join request packet with a third : (colon) and an & (ampersand), which causes Messenger to send a corrupted packet to the server, which triggers a disconnect from the server. • https://www.exploit-db.com/exploits/25658 http://marc.info/?l=bugtraq&m=111601904204055&w=2 http://www.osvdb.org/16816 http://www.securityfocus.com/bid/13626 •

CVSS: 7.5EPSS: 2%CPEs: 17EXPL: 2

Buffer overflow in Yahoo! Messenger allows remote attackers to execute arbitrary code via the offline mode. • https://www.exploit-db.com/exploits/25196 http://seclists.org/lists/fulldisclosure/2005/Mar/0284.html http://www.securityfocus.com/bid/12750 •

CVSS: 4.6EPSS: 0%CPEs: 5EXPL: 1

The Audio Setup Wizard (asw.dll) in Yahoo! Messenger 6.0.0.1750, and possibly other versions, allows attackers to arbitrary code by placing a malicious ping.exe program into the Messenger program directory, which is installed with weak default permissions. • http://messenger.yahoo.com/security/update6.html http://secunia.com/advisories/11815 http://secunia.com/secunia_research/2004-6/advisory •

CVSS: 5.0EPSS: 7%CPEs: 5EXPL: 0

Yahoo! Messenger 6.0.0.1750, and possibly other versions before 6.0.0.1921, does not properly display long filenames in file dialog boxes, which could allow remote attackers to trick users into downloading and executing programs via file names containing a large number of spaces and multiple file extensions. • http://secunia.com/advisories/13712 http://secunia.com/secunia_research/2005-2/advisory •