Page 4 of 31 results (0.003 seconds)

CVSS: 5.0EPSS: 3%CPEs: 2EXPL: 3

Yahoo! Messenger 7.5.0.814 and 7.0.438 allows remote attackers to cause a denial of service (crash) via messages that contain non-ASCII characters, which triggers the crash in jscript.dll. Yahoo! Messenger v7.5.0.814 y v7.0.438 permite a atacantes remotos provocar una denegación de servicio (caída) a través de mensajes que contiene caracteres non-ASCII, lo que provoca la caída en jscript.dll. • https://www.exploit-db.com/exploits/28099 http://secunia.com/advisories/20773 http://www.security.nnov.ru/Gnews281.html http://www.securityfocus.com/bid/18622 https://exchange.xforce.ibmcloud.com/vulnerabilities/27319 •

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 0

The Logfile feature in Yahoo! Messenger 5.x through 6.0 can be activated by a YMSGR: URL and writes all output to a single ypager.log file, even when there are multiple users, and does not properly warn later users that the feature has been enabled, which allows local users to obtain sensitive information from other users. • http://marc.info/?l=bugtraq&m=111643475210982&w=2 •

CVSS: 5.0EPSS: 3%CPEs: 3EXPL: 1

The YMSGR URL handler in Yahoo! Messenger 5.x through 6.0 allows remote attackers to cause a denial of service (disconnect) via a room login or a room join request packet with a third : (colon) and an & (ampersand), which causes Messenger to send a corrupted packet to the server, which triggers a disconnect from the server. • https://www.exploit-db.com/exploits/25658 http://marc.info/?l=bugtraq&m=111601904204055&w=2 http://www.osvdb.org/16816 http://www.securityfocus.com/bid/13626 •

CVSS: 7.5EPSS: 2%CPEs: 17EXPL: 2

Buffer overflow in Yahoo! Messenger allows remote attackers to execute arbitrary code via the offline mode. • https://www.exploit-db.com/exploits/25196 http://seclists.org/lists/fulldisclosure/2005/Mar/0284.html http://www.securityfocus.com/bid/12750 •

CVSS: 4.6EPSS: 0%CPEs: 5EXPL: 1

The Audio Setup Wizard (asw.dll) in Yahoo! Messenger 6.0.0.1750, and possibly other versions, allows attackers to arbitrary code by placing a malicious ping.exe program into the Messenger program directory, which is installed with weak default permissions. • http://messenger.yahoo.com/security/update6.html http://secunia.com/advisories/11815 http://secunia.com/secunia_research/2004-6/advisory •