11 results (0.002 seconds)

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 0

27 Sep 2007 — The embedded Internet Explorer server control in AOL Instant Messenger (AIM) 6.5.3.12 and earlier allows remote attackers to execute arbitrary code via unspecified web script or HTML in an instant message, related to AIM's filtering of "specific tags and attributes" and the lack of Local Machine Zone lockdown. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2007-4901. El control de Internet Explorer empotrado en AOL Instant Messenger (AIM) 6.5.3.12 y anteriores permite a atacantes re... • http://aviv.raffon.net/2007/09/25/ReadyAIMFire.aspx • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

10 Apr 2007 — Directory traversal vulnerability in AOL Instant Messenger (AIM) 5.9 and earlier, and ICQ 5.1 and probably earlier, allows user-assisted remote attackers to write files to arbitrary locations via a .. (dot dot) in a filename in a file transfer operation. Vulnerabilidad de salto de directorio en AOL Instant Messenger (AIM) 5.9 y anteriores, e ICQ 5.1 y probablemente anteriores permite a atacantes remotos con la complicidad del usuario mediante secuencias .. (punto punto) en un nombre de fichero en una operac... • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=508 •

CVSS: 7.5EPSS: 3%CPEs: 36EXPL: 2

18 May 2005 — AOL Instant Messenger 5.5.x and earlier allows remote attackers to cause a denial of service (client crash) via an invalid smiley icon location in the sml parameter of a font tag. • https://www.exploit-db.com/exploits/25633 •

CVSS: 9.8EPSS: 3%CPEs: 15EXPL: 2

31 Dec 2004 — The Buddy icon file for AOL Instant Messenger (AIM) 4.3 through 5.5 is created in a predictable location, which may allow remote attackers to use a shell: URI to exploit other vulnerabilities that involve predictable locations. • https://www.exploit-db.com/exploits/23730 •

CVSS: 7.5EPSS: 1%CPEs: 7EXPL: 1

31 Dec 2002 — Heap-based buffer overflow in the goim handler of AOL Instant Messenger (AIM) 4.4 through 4.8.2616 allows remote attackers to cause a denial of service (crash) via escaping of the screen name parameter, which triggers the overflow when the user selects "Get Info" on the buddy. • http://online.securityfocus.com/archive/1/288980 •

CVSS: 7.5EPSS: 2%CPEs: 14EXPL: 1

12 Aug 2002 — AOL Instant Messenger (AIM) allows remote attackers to cause a denial of service (crash) via an "AddBuddy" link with the ScreenName parameter set to a large number of comma-separated values, possibly triggering a buffer overflow. • http://archives.neohapsis.com/archives/bugtraq/2002-05/0086.html •

CVSS: 9.1EPSS: 9%CPEs: 9EXPL: 3

11 Jun 2002 — Directory traversal vulnerability in AOL Instant Messenger (AIM) 4.8 beta and earlier allows remote attackers to create arbitrary files and execute commands via a Direct Connection with an IMG tag with a SRC attribute that specifies the target filename. • https://www.exploit-db.com/exploits/21386 •

CVSS: 7.5EPSS: 0%CPEs: 27EXPL: 0

11 Jun 2002 — AOL Instant Messenger (AIM) allows remote attackers to steal files that are being transferred to other clients by connecting to port 4443 (Direct Connection) or port 5190 (file transfer) before the intended user. • http://online.securityfocus.com/archive/1/269006 •

CVSS: 10.0EPSS: 27%CPEs: 8EXPL: 3

31 Jan 2002 — Buffer overflow in AOL Instant Messenger (AIM) 4.7.2480, 4.8.2616, and other versions allows remote attackers to execute arbitrary code via a long argument in a game request (AddGame). Desbordamiento de buffer en AOL Instant Messenger (AIM) 4.7.2480, 4.8.2616, y otras versiones permite a atacantes remotos ejecutar código arbitrario mediante un argumento largo en una petición de juegos (AddGame). • https://www.exploit-db.com/exploits/21196 •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 1

06 Oct 2001 — AOL Instant Messenger (AIM) 4.7 and earlier allows remote attackers to cause a denial of service (application crash) via a large number of different fonts followed by an HTML HR tag. • http://www.kb.cert.org/vuls/id/530299 •