ActiveX Control Vulnerability in AOL Desktop Software
CVE-2010-10015

8.4HIGH

Key Information:

Vendor

Aol

Status
Vendor
CVE Published:
21 August 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2010-10015?

The AOL Desktop Software, specifically versions 9.5 and earlier, contains a security vulnerability in the Phobos.dll ActiveX control. The Import() method of the Phobos.Playlist COM object is susceptible to a stack-based buffer overflow when it processes an overly long string argument. If exploited, this vulnerability could allow an attacker to execute arbitrary code in the context of the user, provided that the crafted HTML file is opened locally. It is crucial to note that this vulnerability arises because the ActiveX control is not designated safe for scripting or initialization. Although AOL remains active through services like AOL Mail, the affected software versions are no longer maintained or supported.

Affected Version(s)

AOL * <= 9.5 (Revision 4337.155)

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
8.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Hellcode Research
.
CVE-2010-10015 : ActiveX Control Vulnerability in AOL Desktop Software