AOL Instant Messenger Arbitrary File Creation Vulnerability
The following exploit data has been provided by Noah Johnson <firstname.lastname@example.org>:
<HTML><BODY>Hey, what's up?<IMG
ID=1">***WAVE FILE DATA
However, injection into the AIM communication stream may require additional work as the protocol includes some overhead such as sequence numbers for messages.