CVE-2008-2551 – C6 Messenger - ActiveX Remote Download and Execute
https://notcve.org/view.php?id=CVE-2008-2551
The DownloaderActiveX Control (DownloaderActiveX.ocx) in Icona SpA C6 Messenger 1.0.0.1 allows remote attackers to force the download and execution of arbitrary files via a URL in the propDownloadUrl parameter with the propPostDownloadAction parameter set to "run." El Control DownloaderActiveX en Icona SpA C6 Messenger 1.0.0.1, permite a atacantes remotos forzar la descarga y la ejecución arbitraria de archivos a través de una URL en el parámetro propDownloadUrl con el parámetro propPostDownloadAction establecido a "run". • https://www.exploit-db.com/exploits/5732 https://www.exploit-db.com/exploits/18449 http://secunia.com/advisories/30512 http://securityreason.com/securityalert/3926 http://www.securityfocus.com/archive/1/493019/100/0/threaded http://www.securityfocus.com/bid/29519 http://www.vupen.com/english/advisories/2008/1733/references https://exchange.xforce.ibmcloud.com/vulnerabilities/42825 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2007-5124
https://notcve.org/view.php?id=CVE-2007-5124
The embedded Internet Explorer server control in AOL Instant Messenger (AIM) 6.5.3.12 and earlier allows remote attackers to execute arbitrary code via unspecified web script or HTML in an instant message, related to AIM's filtering of "specific tags and attributes" and the lack of Local Machine Zone lockdown. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2007-4901. El control de Internet Explorer empotrado en AOL Instant Messenger (AIM) 6.5.3.12 y anteriores permite a atacantes remotos ejecutar código de su elección mediante secuencias de comandos web o HTML de su elección en un mensaje instantáneo, relacionado con el filtrado de AIM de "etiquetas y atributos específicos" y la falta de cierre de la Zona de la Máquina Local. NOTA: este asunto existe debido a un arreglo incompleto para CVE-2007-4901. • http://aviv.raffon.net/2007/09/25/ReadyAIMFire.aspx http://www.securityfocus.com/archive/1/480647/100/0/threaded • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2007-1904
https://notcve.org/view.php?id=CVE-2007-1904
Directory traversal vulnerability in AOL Instant Messenger (AIM) 5.9 and earlier, and ICQ 5.1 and probably earlier, allows user-assisted remote attackers to write files to arbitrary locations via a .. (dot dot) in a filename in a file transfer operation. Vulnerabilidad de salto de directorio en AOL Instant Messenger (AIM) 5.9 y anteriores, e ICQ 5.1 y probablemente anteriores permite a atacantes remotos con la complicidad del usuario mediante secuencias .. (punto punto) en un nombre de fichero en una operación de transferencia de fichero. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=508 http://secunia.com/advisories/24747 http://secunia.com/advisories/24803 http://www.securityfocus.com/bid/23391 http://www.securitytracker.com/id?1017890 http://www.securitytracker.com/id?1017891 http://www.vupen.com/english/advisories/2007/1306 http://www.vupen.com/english/advisories/2007/1307 https://exchange.xforce.ibmcloud.com/vulnerabilities/33538 •
CVE-2005-1655 – AOL Instant Messenger 4.x/5.x - Smiley Icon Location Remote Denial of Service
https://notcve.org/view.php?id=CVE-2005-1655
AOL Instant Messenger 5.5.x and earlier allows remote attackers to cause a denial of service (client crash) via an invalid smiley icon location in the sml parameter of a font tag. • https://www.exploit-db.com/exploits/25633 http://www.securityfocus.com/bid/13553 •
CVE-2002-0592
https://notcve.org/view.php?id=CVE-2002-0592
AOL Instant Messenger (AIM) allows remote attackers to steal files that are being transferred to other clients by connecting to port 4443 (Direct Connection) or port 5190 (file transfer) before the intended user. • http://online.securityfocus.com/archive/1/269006 http://www.securityfocus.com/bid/4574 https://exchange.xforce.ibmcloud.com/vulnerabilities/8931 •