CVE-2002-0785
https://notcve.org/view.php?id=CVE-2002-0785
AOL Instant Messenger (AIM) allows remote attackers to cause a denial of service (crash) via an "AddBuddy" link with the ScreenName parameter set to a large number of comma-separated values, possibly triggering a buffer overflow. • http://archives.neohapsis.com/archives/bugtraq/2002-05/0086.html http://www.iss.net/security_center/static/9058.php http://www.kb.cert.org/vuls/id/259435 http://www.osvdb.org/5109 http://www.securityfocus.com/bid/4709 •
CVE-2002-0591 – AOL Instant Messenger 4.x - Arbitrary File Creation
https://notcve.org/view.php?id=CVE-2002-0591
Directory traversal vulnerability in AOL Instant Messenger (AIM) 4.8 beta and earlier allows remote attackers to create arbitrary files and execute commands via a Direct Connection with an IMG tag with a SRC attribute that specifies the target filename. • https://www.exploit-db.com/exploits/21386 http://archives.neohapsis.com/archives/bugtraq/2002-04/0203.html http://www.iss.net/security_center/static/8870.php http://www.securityfocus.com/bid/4526 •
CVE-2002-0592
https://notcve.org/view.php?id=CVE-2002-0592
AOL Instant Messenger (AIM) allows remote attackers to steal files that are being transferred to other clients by connecting to port 4443 (Direct Connection) or port 5190 (file transfer) before the intended user. • http://online.securityfocus.com/archive/1/269006 http://www.securityfocus.com/bid/4574 https://exchange.xforce.ibmcloud.com/vulnerabilities/8931 •
CVE-2002-0362
https://notcve.org/view.php?id=CVE-2002-0362
Buffer overflow in AOL Instant Messenger (AIM) 4.2 and later allows remote attackers to execute arbitrary code via a long AddExternalApp request and a TLV type greater than 0x2711. • http://marc.info/?l=bugtraq&m=102071080509955&w=2 http://www.iss.net/security_center/static/9017.php http://www.securityfocus.com/bid/4677 •
CVE-2002-1591
https://notcve.org/view.php?id=CVE-2002-1591
AOL Instant Messenger (AIM) 4.7.2480 adds free.aol.com to the Trusted Sites Zone in Internet Explorer without user approval, which could allow code from free.aol.com to bypass intended access restrictions. • http://www.informationweek.com/story/IWK20010927S0021 http://www.instantmessagingplanet.com/security/article.php/10818_1014151 http://www.kb.cert.org/vuls/id/744139 •