Page 8 of 60 results (0.003 seconds)

CVSS: 2.6EPSS: 2%CPEs: 4EXPL: 3

Directory traversal vulnerability in AOL Instant Messenger (AIM) 4.8.2790 allows remote attackers to execute arbitrary programs by specifying the program in the href attribute of a link. • https://www.exploit-db.com/exploits/21958 http://archives.neohapsis.com/archives/bugtraq/2002-10/0319.html http://www.iss.net/security_center/static/10441.php http://www.securityfocus.com/bid/6027 •

CVSS: 5.0EPSS: 1%CPEs: 7EXPL: 1

Heap-based buffer overflow in the goim handler of AOL Instant Messenger (AIM) 4.4 through 4.8.2616 allows remote attackers to cause a denial of service (crash) via escaping of the screen name parameter, which triggers the overflow when the user selects "Get Info" on the buddy. • http://online.securityfocus.com/archive/1/288980 http://www.iss.net/security_center/static/9950.php http://www.securityfocus.com/bid/5492 •

CVSS: 5.0EPSS: 1%CPEs: 14EXPL: 1

AOL Instant Messenger (AIM) allows remote attackers to cause a denial of service (crash) via an "AddBuddy" link with the ScreenName parameter set to a large number of comma-separated values, possibly triggering a buffer overflow. • http://archives.neohapsis.com/archives/bugtraq/2002-05/0086.html http://www.iss.net/security_center/static/9058.php http://www.kb.cert.org/vuls/id/259435 http://www.osvdb.org/5109 http://www.securityfocus.com/bid/4709 •

CVSS: 7.5EPSS: 1%CPEs: 9EXPL: 0

Format string vulnerability in Ns_PdLog function for the external database driver proxy daemon library (libnspd.a) of AOLServer 3.0 through 3.4.2 allows remote attackers to execute arbitrary code via the Error or Notice parameters. • http://archives.neohapsis.com/archives/bugtraq/2002-04/0195.html http://sourceforge.net/tracker/index.php?func=detail&aid=533141&group_id=3152&atid=303152 http://www.iss.net/security_center/static/8860.php http://www.securityfocus.com/bid/4535 •

CVSS: 5.0EPSS: 3%CPEs: 9EXPL: 3

Directory traversal vulnerability in AOL Instant Messenger (AIM) 4.8 beta and earlier allows remote attackers to create arbitrary files and execute commands via a Direct Connection with an IMG tag with a SRC attribute that specifies the target filename. • https://www.exploit-db.com/exploits/21386 http://archives.neohapsis.com/archives/bugtraq/2002-04/0203.html http://www.iss.net/security_center/static/8870.php http://www.securityfocus.com/bid/4526 •