CVE-2010-10015
HIGHAOL <9.5 - Buffer Overflow
Title source: llmDescription
AOL versions up to and including 9.5 includes an ActiveX control (Phobos.dll) that exposes a method called Import() via the Phobos.Playlist COM object. This method is vulnerable to a stack-based buffer overflow when provided with an excessively long string argument. Exploitation allows remote attackers to execute arbitrary code in the context of the user, but only when the malicious HTML file is opened locally, due to the control not being marked safe for scripting or initialization. AOL remains an active and supported brand offering services like AOL Mail and AOL Desktop Gold, but the legacy AOL 9.5 desktop software—specifically the version containing the vulnerable Phobos.dll ActiveX control—is long discontinued and no longer maintained.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Dz_attacker · htmlremotewindows
https://www.exploit-db.com/exploits/11204
exploitdb
WORKING POC
VERIFIED
by Hellcode Research · textdoswindows
https://www.exploit-db.com/exploits/11190
metasploit
WORKING POC
NORMAL
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/aol_phobos_bof.rb
References (9)
Scores
CVSS v4
8.4
EPSS
0.1996
EPSS Percentile
95.5%
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Details
CWE
CWE-121
Status
published
Products (1)
AOL/AOL
< 9.5 (Revision 4337.155)
Published
Aug 21, 2025
Tracked Since
Feb 18, 2026