Export limit exceeded: 328750 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.

Search

Search Results (27 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2003-0238 1 Mirabilis 1 Icq 2025-04-03 N/A
The Message Session window in Mirabilis ICQ Pro 2003a allows remote attackers to cause a denial of service (CPU consumption) by spoofing the address of an ADS server and sending HTML with a -1 width in a table tag.
CVE-2003-0239 1 Mirabilis 1 Icq 2025-04-03 N/A
icqateimg32.dll parsing/rendering library in Mirabilis ICQ Pro 2003a allows remote attackers to cause a denial of service via malformed GIF89a headers that do not contain a GCT (Global Color Table) or an LCT (Local Color Table) after an Image Descriptor.
CVE-2003-0769 1 Mirabilis 1 Icq 2025-04-03 N/A
Cross-site scripting (XSS) vulnerability in the ICQ Web Front guestbook (guestbook.html) allows remote attackers to insert arbitrary web script and HTML via the message field.
CVE-2006-2303 1 Mirabilis 1 Icq 2025-04-03 N/A
Cross-Application Scripting (XAS) vulnerability in ICQ Client 5.04 build 2321 and earlier allows remote attackers to inject arbitrary web script from one application into another via a banner, which is processed in the My Computer zone using the Internet Explorer COM object.
CVE-2006-0765 1 Mirabilis 2 Icq, Icq Lite 2025-04-03 N/A
GUI display truncation vulnerability in ICQ Inc. (formerly Mirabilis) ICQ 2003a, 2003b, Lite 4.0, Lite 4.1, and possibly other Windows versions allows user-assisted remote attackers to hide malicious file extensions, bypass Windows security warnings via a filename that is all uppercase and of a specific length, which truncates the malicious extension from the display and could trick a user into executing arbitrary programs.
CVE-1999-0474 1 Mirabilis 1 Icq 2025-04-03 N/A
The ICQ Webserver allows remote attackers to use .. to access arbitrary files outside of the user's personal directory.
CVE-2006-0766 1 Mirabilis 2 Icq, Icq Lite 2025-04-03 N/A
ICQ Inc. (formerly Mirabilis) ICQ 2003a, 2003b, Lite 4.0, Lite 4.1, and possibly other Windows versions allows user-assisted remote attackers to hide malicious file extensions and bypass Windows security warnings via a filename that ends in an assumed-safe extension such as JPG, and possibly containing other modified properties such as company name, icon, and description, which could trick a user into executing arbitrary programs.