A vulnerability found in the ICQ Sound Scheme can be used to remotely drop files on systems running ICQ by using an Internet Explorer mapping via .icm files.
a57d7bce4fffa574d030c75c76377bbf9a65d4383b975bd3504617e115664363
© 2022 Packet Storm. All rights reserved.