Page 9 of 60 results (0.002 seconds)

CVSS: 7.5EPSS: 1%CPEs: 27EXPL: 0

AOL Instant Messenger (AIM) allows remote attackers to steal files that are being transferred to other clients by connecting to port 4443 (Direct Connection) or port 5190 (file transfer) before the intended user. • http://online.securityfocus.com/archive/1/269006 http://www.securityfocus.com/bid/4574 https://exchange.xforce.ibmcloud.com/vulnerabilities/8931 •

CVSS: 7.5EPSS: 3%CPEs: 9EXPL: 0

Buffer overflow in Ns_PdLog function for the external database driver proxy daemon library (libnspd.a) of AOLServer 3.0 through 3.4.2 allows remote attackers to cause a denial of service or execute arbitrary code via the Error or Notice parameters. • http://archives.neohapsis.com/archives/bugtraq/2002-04/0195.html http://cvs.sourceforge.net/cgi-bin/viewcvs.cgi/aolserver/aolserver/nspd/log.c.diff?r1=1.4&r2=1.4.6.1 http://sourceforge.net/tracker/index.php?func=detail&aid=533141&group_id=3152&atid=303152 •

CVSS: 7.5EPSS: 3%CPEs: 1EXPL: 1

Buffer overflow in AOL Instant Messenger (AIM) 4.2 and later allows remote attackers to execute arbitrary code via a long AddExternalApp request and a TLV type greater than 0x2711. • http://marc.info/?l=bugtraq&m=102071080509955&w=2 http://www.iss.net/security_center/static/9017.php http://www.securityfocus.com/bid/4677 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

AOL Instant Messenger (AIM) 4.7.2480 adds free.aol.com to the Trusted Sites Zone in Internet Explorer without user approval, which could allow code from free.aol.com to bypass intended access restrictions. • http://www.informationweek.com/story/IWK20010927S0021 http://www.instantmessagingplanet.com/security/article.php/10818_1014151 http://www.kb.cert.org/vuls/id/744139 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

AOL AOLserver 3.4.2 Win32 allows remote attackers to bypass authentication and read password-protected files via a URL that directly references the file. AOL AOLserver 3.4.2 Win32 permite a atacantes remotos evitar la autenticación y leer ficheros protegidos con contraseña, mediante una dirección URL que referencia directamente el fichero. • http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0005.html http://marc.info/?l=bugtraq&m=101038936305397&w=2 http://marc.info/?l=ntbugtraq&m=101062823205474&w=2 http://www.iss.net/security_center/static/7825.php http://www.securityfocus.com/bid/3791 •