Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown

CVE-2012-0268

Disclosure Date: January 19, 2012 (last updated October 04, 2023)
Integer overflow in the CYImage::LoadJPG method in YImage.dll in Yahoo! Messenger before 11.5.0.155, when photo sharing is enabled, might allow remote attackers to execute arbitrary code via a crafted JPG image that triggers a heap-based buffer overflow.
0
Attacker Value
Unknown

CVE-2007-0868

Disclosure Date: February 09, 2007 (last updated October 04, 2023)
Unspecified vulnerability in the Chat Room functionality in Yahoo! Messenger 8.1.0.239 and earlier allows remote attackers to cause a denial of service via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
0
Attacker Value
Unknown

CVE-2005-1671

Disclosure Date: May 19, 2005 (last updated February 22, 2025)
The Logfile feature in Yahoo! Messenger 5.x through 6.0 can be activated by a YMSGR: URL and writes all output to a single ypager.log file, even when there are multiple users, and does not properly warn later users that the feature has been enabled, which allows local users to obtain sensitive information from other users.
0
Attacker Value
Unknown

CVE-2005-0737

Disclosure Date: May 02, 2005 (last updated February 22, 2025)
Buffer overflow in Yahoo! Messenger allows remote attackers to execute arbitrary code via the offline mode.
0
Attacker Value
Unknown

CVE-2005-0242

Disclosure Date: February 18, 2005 (last updated February 22, 2025)
The Audio Setup Wizard (asw.dll) in Yahoo! Messenger 6.0.0.1750, and possibly other versions, allows attackers to arbitrary code by placing a malicious ping.exe program into the Messenger program directory, which is installed with weak default permissions.
0
Attacker Value
Unknown

CVE-2005-0243

Disclosure Date: February 17, 2005 (last updated February 22, 2025)
Yahoo! Messenger 6.0.0.1750, and possibly other versions before 6.0.0.1921, does not properly display long filenames in file dialog boxes, which could allow remote attackers to trick users into downloading and executing programs via file names containing a large number of spaces and multiple file extensions.
0