CVE-2020-20093 – RTLO Injection URI Spoofing
https://notcve.org/view.php?id=CVE-2020-20093
The Facebook Messenger app for iOS 227.0 and prior and Android 228.1.0.10.116 and prior user interface does not properly represent URI messages to the user, which results in URI spoofing via specially crafted messages. Facebook Messenger app para iOS versiones 227.0 y anteriores y Android versión 228.1.0.10.116 y la interfaz de usuario anterior, no representan apropiadamente los mensajes URI para el usuario, lo que resulta en una suplantación de URI por medio de mensajes especialmente diseñados RTLO injection URI spoofing generator for WhatsApp, iMessage, Instagram, and Facebook Messenger. • http://packetstormsecurity.com/files/166448/RTLO-Injection-URI-Spoofing.html https://github.com/zadewg/RIUS •
CVE-2014-7216
https://notcve.org/view.php?id=CVE-2014-7216
Multiple stack-based buffer overflows in Yahoo! Messenger 11.5.0.228 and earlier allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the (1) shortcut or (2) title keys in an emoticons.xml file. Múltiples desbordamientos de buffer basado en pila en Yahoo! Messenger 11.5.0.228 y versiones anteriores, permite a atacantes remotos causar una denegación de servicio (colapso) y posiblemente ejecutar código arbitrario a través del (1) acceso directo o de (2) las claves de título en un archivo emoticons.xml. • http://packetstormsecurity.com/files/133443/Yahoo-Messenger-11.5.0.228-Buffer-Overflow.html http://seclists.org/fulldisclosure/2015/Sep/24 http://www.securityfocus.com/archive/1/536390/100/0/threaded http://www.securitytracker.com/id/1033544 https://hackerone.com/reports/10767 https://www.rcesecurity.com/2015/09/cve-2014-7216-a-journey-through-yahoos-bug-bounty-program • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2012-0268
https://notcve.org/view.php?id=CVE-2012-0268
Integer overflow in the CYImage::LoadJPG method in YImage.dll in Yahoo! Messenger before 11.5.0.155, when photo sharing is enabled, might allow remote attackers to execute arbitrary code via a crafted JPG image that triggers a heap-based buffer overflow. Un desbordamiento de entero en el método CYImage::LoadJPG en YImage.dll en Yahoo! Messenger antes de v11.5.0.155, cuando la compartición fotos está activada, podría permitir a atacantes remotos ejecutar código de su elección a través de una imagen JPG modificada a mano que genera un desbordamiento de búfer basado en memoria dinámica(montículo). • http://secunia.com/advisories/47041 • CWE-189: Numeric Errors •
CVE-2007-4515 – Yahoo! Messenger - 'YVerInfo.dll' ActiveX Control Buffer Overflow
https://notcve.org/view.php?id=CVE-2007-4515
Buffer overflow in a certain ActiveX control in YVerInfo.dll before 2007.8.27.1 in the Yahoo! services suite for Yahoo! Messenger before 8.1.0.419 allows remote attackers to execute arbitrary code via unspecified vectors involving arguments to the (1) fvCom and (2) info methods. NOTE: some of these details are obtained from third party information. Un desbordamiento de búfer en cierto control ActiveX en YVerInfo.dll versiones anteriores a 2007.8.27.1 en la conjunto de servicios para Yahoo! • https://www.exploit-db.com/exploits/16522 https://www.exploit-db.com/exploits/4351 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=591 http://messenger.yahoo.com/security_update.php?id=082907 http://osvdb.org/37739 http://secunia.com/advisories/26579 http://securityreason.com/securityalert/3083 http://securitytracker.com/id?1018628 http://www.securityfocus.com/bid/25494 http://www.vupen.com/english/advisories/2007/3011 https://exchange.xforce.ibmcloud.com/vuln • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2007-3147 – Yahoo! Messenger 8.1.0.249 - ActiveX Control Buffer Overflow
https://notcve.org/view.php?id=CVE-2007-3147
Buffer overflow in the Yahoo! Webcam Upload ActiveX control in ywcupl.dll 2.0.1.4 for Yahoo! Messenger 8.1.0.249 allows remote attackers to execute arbitrary code via a long server property value to the send method. NOTE: some of these details are obtained from third party information. Desbordamiento de búfer en el control Yahoo! • https://www.exploit-db.com/exploits/16519 https://www.exploit-db.com/exploits/4042 https://www.exploit-db.com/exploits/4053 http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063817.html http://messenger.yahoo.com/security_update.php?id=060707 http://research.eeye.com/html/advisories/published/AD20070608.html http://research.eeye.com/html/advisories/upcoming/20070605.html http://secunia.com/advisories/25547 http://securityreason.com/securityalert/2809 http://securitytracker. • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •