Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2007-1904
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Directory traversal vulnerability in AOL Instant Messenger (AIM) 5.9 and earlier, and ICQ 5.1 and probably earlier, allows user-assisted remote attackers to write files to arbitrary locations via a .. (dot dot) in a filename in a file transfer operation.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
AOL AIM及ICQ客户端目录遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
AOL Instant Messenger和ICQ都是非常流行的即时消息客户端。 AOL AIM和ICQ即时通信软件在处理文件传输时存在漏洞,远程攻击者可能利用此漏洞在文件接收方的机器上指定目录中创建文件。 AIM和ICQ允许用户通过自定义协议共享和传输文件。在文件传输期间,发送者可以指定文件的显示名称及传输所使用的文件名;接收者仅可以指定保存文件的文件夹。由于一个输入验证错误,客户端没有正确地剥离文件名中的"../"遍历字符,因此攻击者可以通过特殊编码的路径在用户接受文件传输时强制将文件保存到指定的目录
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2007-1904
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2007-1904
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2007-1904

No comments yet


Leave a comment