{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T10:44:21.023","vulnerabilities":[{"cve":{"id":"CVE-2011-10027","sourceIdentifier":"disclosure@vulncheck.com","published":"2025-08-20T16:15:35.617","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[{"sourceIdentifier":"disclosure@vulncheck.com","tags":["unsupported-when-assigned"]}],"descriptions":[{"lang":"en","value":"AOL Desktop 9.6 contains a buffer overflow vulnerability in its Tool\\rich.rct component when parsing .rtx files. By embedding an overly long string in a hyperlink tag, an attacker can trigger a stack-based buffer overflow due to the use of unsafe strcpy operations. This allows remote attackers to execute arbitrary code when a victim opens a malicious .rtx file. AOL Desktop is end-of-life and no longer supported. Users are encouraged to migrate to AOL Desktop Gold or alternative platforms."},{"lang":"es","value":"AOL Desktop 9.6 contiene una vulnerabilidad de desbordamiento de búfer en su componente Tool\\rich.rct al analizar archivos .rtx. Al incrustar una cadena demasiado larga en una etiqueta de hipervínculo, un atacante puede provocar un desbordamiento de búfer basado en la pila debido al uso de operaciones strcpy inseguras. Esto permite a atacantes remotos ejecutar código arbitrario cuando una víctima abre un archivo .rtx malicioso. AOL Desktop ha finalizado su ciclo de vida y ya no recibe soporte. Se recomienda a los usuarios migrar a AOL Desktop Gold o a plataformas alternativas."}],"metrics":{"cvssMetricV40":[{"source":"disclosure@vulncheck.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":8.4,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"ACTIVE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}]},"weaknesses":[{"source":"disclosure@vulncheck.com","type":"Secondary","description":[{"lang":"en","value":"CWE-121"}]}],"references":[{"url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/aol_desktop_linktag.rb","source":"disclosure@vulncheck.com"},{"url":"https://www.exploit-db.com/exploits/16085","source":"disclosure@vulncheck.com"},{"url":"https://www.exploit-db.com/exploits/16107","source":"disclosure@vulncheck.com"},{"url":"https://www.exploit-db.com/exploits/17150","source":"disclosure@vulncheck.com"},{"url":"https://www.fortiguard.com/encyclopedia/ips/26516","source":"disclosure@vulncheck.com"},{"url":"https://www.vulncheck.com/advisories/aol-desktop-rtx-stack-based-buffer-overflow","source":"disclosure@vulncheck.com"}]}}]}