{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T10:10:15.237","vulnerabilities":[{"cve":{"id":"CVE-2002-0591","sourceIdentifier":"cve@mitre.org","published":"2002-06-18T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in AOL Instant Messenger (AIM) 4.8 beta and earlier allows remote attackers to create arbitrary files and execute commands via a Direct Connection with an IMG tag with a SRC attribute that specifies the target filename."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:aol:instant_messenger:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E00F0805-8C73-43B1-87AC-744434046E59"},{"vulnerable":true,"criteria":"cpe:2.3:a:aol:instant_messenger:4.1:*:*:*:*:*:*:*","matchCriteriaId":"3098DC2A-6A68-4160-9DAC-8F31A49BA45D"},{"vulnerable":true,"criteria":"cpe:2.3:a:aol:instant_messenger:4.2:*:*:*:*:*:*:*","matchCriteriaId":"D7577EED-D28B-430A-B554-CE40D9154893"},{"vulnerable":true,"criteria":"cpe:2.3:a:aol:instant_messenger:4.3:*:*:*:*:*:*:*","matchCriteriaId":"E81E472E-45B5-465B-B2D7-40F906AC31E9"},{"vulnerable":true,"criteria":"cpe:2.3:a:aol:instant_messenger:4.4:*:*:*:*:*:*:*","matchCriteriaId":"B2D8157E-3447-44BF-AC22-5A65F4C707E7"},{"vulnerable":true,"criteria":"cpe:2.3:a:aol:instant_messenger:4.5:*:*:*:*:*:*:*","matchCriteriaId":"FDA52A0F-2A09-4FA8-AC10-2D1B6B41D13C"},{"vulnerable":true,"criteria":"cpe:2.3:a:aol:instant_messenger:4.6:*:*:*:*:*:*:*","matchCriteriaId":"9C4FA9B9-E98C-435C-9F7A-D62E348D92D9"},{"vulnerable":true,"criteria":"cpe:2.3:a:aol:instant_messenger:4.7:*:*:*:*:*:*:*","matchCriteriaId":"E0ADB0D5-BD25-488D-87D3-426ABB036B7A"},{"vulnerable":true,"criteria":"cpe:2.3:a:aol:instant_messenger:4.8_beta:*:*:*:*:*:*:*","matchCriteriaId":"1029CF68-C425-4FFD-9D47-2EDB724CF6C3"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2002-04/0203.html","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/8870.php","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/4526","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2002-04/0203.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/8870.php","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/4526","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}}]}