Page 4 of 33 results (0.003 seconds)

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 0

Unspecified vulnerability in Yahoo! Messenger (Service 18) before 8.1.0.195 allows remote attackers to cause a denial of service (NULL dereference and application crash) via a crafted room name in a Conference Invite. NOTE: the provenance of this information is unknown; the details are obtained from third party information. Vulnerabilidad no especificada en Yahoo! Messenger (Service 18) anterior a 8.1.0.195 permite a atacantes remotos provocar una denegación de servicio (referencia a NULL y caída de aplicación) mediante un nombre de sala manipulado en una Invitación de Conferencia. • http://archives.neohapsis.com/archives/fulldisclosure/2006-10/0518.html http://archives.neohapsis.com/archives/fulldisclosure/2006-10/0566.html http://secunia.com/advisories/22510 http://www.securityfocus.com/archive/1/449667/100/0/threaded http://www.securityfocus.com/bid/20625 http://www.vupen.com/english/advisories/2006/4193 •

CVSS: 2.6EPSS: 0%CPEs: 1EXPL: 1

Yahoo! Messenger for WAP permits saving messages that contain JavaScript, which allows user-assisted remote attackers to inject arbitrary web script or HTML via a URL at the online service. Yahoo! Messenger para WAP permite guardar mensajes que contienen JavaScript, lo cual permite a atacantes con la complicidad del usuario inyectar secuencias de comandos web o HTML de su elección a través de una URL en el servicio en linea. • http://advisories.echo.or.id/adv/adv47-theday-2006.txt http://securityreason.com/securityalert/1626 http://www.securityfocus.com/archive/1/446414/100/0/threaded •

CVSS: 5.0EPSS: 3%CPEs: 2EXPL: 3

Yahoo! Messenger 7.5.0.814 and 7.0.438 allows remote attackers to cause a denial of service (crash) via messages that contain non-ASCII characters, which triggers the crash in jscript.dll. Yahoo! Messenger v7.5.0.814 y v7.0.438 permite a atacantes remotos provocar una denegación de servicio (caída) a través de mensajes que contiene caracteres non-ASCII, lo que provoca la caída en jscript.dll. • https://www.exploit-db.com/exploits/28099 http://secunia.com/advisories/20773 http://www.security.nnov.ru/Gnews281.html http://www.securityfocus.com/bid/18622 https://exchange.xforce.ibmcloud.com/vulnerabilities/27319 •

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 0

The Logfile feature in Yahoo! Messenger 5.x through 6.0 can be activated by a YMSGR: URL and writes all output to a single ypager.log file, even when there are multiple users, and does not properly warn later users that the feature has been enabled, which allows local users to obtain sensitive information from other users. • http://marc.info/?l=bugtraq&m=111643475210982&w=2 •

CVSS: 5.0EPSS: 3%CPEs: 3EXPL: 1

The YMSGR URL handler in Yahoo! Messenger 5.x through 6.0 allows remote attackers to cause a denial of service (disconnect) via a room login or a room join request packet with a third : (colon) and an & (ampersand), which causes Messenger to send a corrupted packet to the server, which triggers a disconnect from the server. • https://www.exploit-db.com/exploits/25658 http://marc.info/?l=bugtraq&m=111601904204055&w=2 http://www.osvdb.org/16816 http://www.securityfocus.com/bid/13626 •