
CVE-2007-5124
https://notcve.org/view.php?id=CVE-2007-5124
27 Sep 2007 — The embedded Internet Explorer server control in AOL Instant Messenger (AIM) 6.5.3.12 and earlier allows remote attackers to execute arbitrary code via unspecified web script or HTML in an instant message, related to AIM's filtering of "specific tags and attributes" and the lack of Local Machine Zone lockdown. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2007-4901. El control de Internet Explorer empotrado en AOL Instant Messenger (AIM) 6.5.3.12 y anteriores permite a atacantes re... • http://aviv.raffon.net/2007/09/25/ReadyAIMFire.aspx • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2007-1904
https://notcve.org/view.php?id=CVE-2007-1904
10 Apr 2007 — Directory traversal vulnerability in AOL Instant Messenger (AIM) 5.9 and earlier, and ICQ 5.1 and probably earlier, allows user-assisted remote attackers to write files to arbitrary locations via a .. (dot dot) in a filename in a file transfer operation. Vulnerabilidad de salto de directorio en AOL Instant Messenger (AIM) 5.9 y anteriores, e ICQ 5.1 y probablemente anteriores permite a atacantes remotos con la complicidad del usuario mediante secuencias .. (punto punto) en un nombre de fichero en una operac... • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=508 •

CVE-2005-1655 – AOL Instant Messenger 4.x/5.x - Smiley Icon Location Remote Denial of Service
https://notcve.org/view.php?id=CVE-2005-1655
18 May 2005 — AOL Instant Messenger 5.5.x and earlier allows remote attackers to cause a denial of service (client crash) via an invalid smiley icon location in the sml parameter of a font tag. • https://www.exploit-db.com/exploits/25633 •

CVE-2002-0785
https://notcve.org/view.php?id=CVE-2002-0785
12 Aug 2002 — AOL Instant Messenger (AIM) allows remote attackers to cause a denial of service (crash) via an "AddBuddy" link with the ScreenName parameter set to a large number of comma-separated values, possibly triggering a buffer overflow. • http://archives.neohapsis.com/archives/bugtraq/2002-05/0086.html •

CVE-2002-0591 – AOL Instant Messenger 4.x - Arbitrary File Creation
https://notcve.org/view.php?id=CVE-2002-0591
11 Jun 2002 — Directory traversal vulnerability in AOL Instant Messenger (AIM) 4.8 beta and earlier allows remote attackers to create arbitrary files and execute commands via a Direct Connection with an IMG tag with a SRC attribute that specifies the target filename. • https://www.exploit-db.com/exploits/21386 •

CVE-2002-0592
https://notcve.org/view.php?id=CVE-2002-0592
11 Jun 2002 — AOL Instant Messenger (AIM) allows remote attackers to steal files that are being transferred to other clients by connecting to port 4443 (Direct Connection) or port 5190 (file transfer) before the intended user. • http://online.securityfocus.com/archive/1/269006 •

CVE-2001-1421
https://notcve.org/view.php?id=CVE-2001-1421
06 Oct 2001 — AOL Instant Messenger (AIM) 4.7 and earlier allows remote attackers to cause a denial of service (application crash) via a large number of different fonts followed by an HTML HR tag. • http://www.kb.cert.org/vuls/id/530299 •

CVE-2001-1419
https://notcve.org/view.php?id=CVE-2001-1419
02 Oct 2001 — AOL Instant Messenger (AIM) 4.7.2480 and earlier allows remote attackers to cause a denial of service (application crash) via an instant message that contains a large amount of "<!--" HTML comments. • http://archives.neohapsis.com/archives/bugtraq/2001-10/0014.html •

CVE-2000-1093 – AOL Instant Messenger 3.5.1856/4.0/4.1.2010/4.2.1193 - 'aim://' Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2000-1093
19 Dec 2000 — Buffer overflow in AOL Instant Messenger before 4.3.2229 allows remote attackers to execute arbitrary commands via a long "goim" command. • https://www.exploit-db.com/exploits/20510 •

CVE-2000-0383
https://notcve.org/view.php?id=CVE-2000-0383
08 May 2000 — The file transfer component of AOL Instant Messenger (AIM) reveals the physical path of the transferred file to the remote recipient. • http://www.securityfocus.com/bid/1180 •