Filtered by vendor Mirabilis Subscriptions
Total 27 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2003-0769 1 Mirabilis 1 Icq 2025-04-03 N/A
Cross-site scripting (XSS) vulnerability in the ICQ Web Front guestbook (guestbook.html) allows remote attackers to insert arbitrary web script and HTML via the message field.
CVE-2005-3433 1 Mirabilis 1 Icq 2025-04-03 N/A
Buffer overflow in Mirabilis ICQ 2003a allows user-assisted attackers to execute arbitrary code by convincing a user to enter long strings into the First Name and Last Name fields.
CVE-2006-2303 1 Mirabilis 1 Icq 2025-04-03 N/A
Cross-Application Scripting (XAS) vulnerability in ICQ Client 5.04 build 2321 and earlier allows remote attackers to inject arbitrary web script from one application into another via a banner, which is processed in the My Computer zone using the Internet Explorer COM object.
CVE-1999-1440 1 Mirabilis 1 Icq 98a 2025-04-03 N/A
Win32 ICQ 98a 1.30, and possibly other versions, does not display the entire portion of long filenames, which could allow attackers to send an executable file with a long name that contains so many spaces that the .exe extension is not displayed, which could make the user believe that the file is safe to open from the client.
CVE-2006-0765 1 Mirabilis 2 Icq, Icq Lite 2025-04-03 N/A
GUI display truncation vulnerability in ICQ Inc. (formerly Mirabilis) ICQ 2003a, 2003b, Lite 4.0, Lite 4.1, and possibly other Windows versions allows user-assisted remote attackers to hide malicious file extensions, bypass Windows security warnings via a filename that is all uppercase and of a specific length, which truncates the malicious extension from the display and could trick a user into executing arbitrary programs.
CVE-1999-0474 1 Mirabilis 1 Icq 2025-04-03 N/A
The ICQ Webserver allows remote attackers to use .. to access arbitrary files outside of the user's personal directory.
CVE-2006-0766 1 Mirabilis 2 Icq, Icq Lite 2025-04-03 N/A
ICQ Inc. (formerly Mirabilis) ICQ 2003a, 2003b, Lite 4.0, Lite 4.1, and possibly other Windows versions allows user-assisted remote attackers to hide malicious file extensions and bypass Windows security warnings via a filename that ends in an assumed-safe extension such as JPG, and possibly containing other modified properties such as company name, icon, and description, which could trick a user into executing arbitrary programs.