Page 10 of 60 results (0.011 seconds)

CVSS: 7.5EPSS: 95%CPEs: 2EXPL: 2

Directory traversal vulnerability in Microsoft Windows Media Player 7.1 and Windows Media Player for Windows XP allows remote attackers to execute arbitrary code via a skins file with a URL containing hex-encoded backslash characters (%5C) that causes an executable to be placed in an arbitrary location. Vulnerabilidad de cruce de directorios en Microsoft Media Player 7.1 y Windows Media Player para Windows XP permite que atacantes remotos ejecuten código arbitrario mediante un fichero de "skins" con una URL que contenga el caracter ``codificado en hexadecimal (%5C), lo cual permite que un ejecutable sea colado en una localizació arbitraria. • https://www.exploit-db.com/exploits/22570 http://marc.info/?l=bugtraq&m=105232913516488&w=2 http://marc.info/?l=bugtraq&m=105240528419389&w=2 http://marc.info/?l=ntbugtraq&m=105233960728901&w=2 http://www.kb.cert.org/vuls/id/384932 http://www.securityfocus.com/bid/7517 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-017 https://exchange.xforce.ibmcloud.com/vulnerabilities/11953 https://oval.cisecurity.org/repository/search/definition/oval%3Aor •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Microsoft Windows Media Player (WMP) 6.3, when installed on Solaris, installs executables with world-writable permissions, which allows local users to delete or modify the executables to gain privileges. • http://archives.neohapsis.com/archives/bugtraq/2002-10/0260.html http://www.iss.net/security_center/static/10398.php http://www.securityfocus.com/bid/6003 • CWE-276: Incorrect Default Permissions •

CVSS: 7.5EPSS: 1%CPEs: 5EXPL: 2

Buffer overflow in mplay32.exe of Microsoft Windows Media Player (WMP) 6.3 through 7.1 allows remote attackers to execute arbitrary commands via a long mp3 filename command line argument. NOTE: since the only known attack vector requires command line access, this may not be a vulnerability. • https://www.exploit-db.com/exploits/21670 http://online.securityfocus.com/archive/1/285082 http://www.iss.net/security_center/static/9727.php http://www.securityfocus.com/bid/5357 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

The Windows Media Device Manager (WMDM) Service in Microsoft Windows Media Player 7.1 on Windows 2000 systems allows local users to obtain LocalSystem rights via a program that calls the WMDM service to connect to an invalid local storage device, aka "Privilege Elevation through Windows Media Device Manager Service". • http://www.iss.net/security_center/static/9421.php http://www.securityfocus.com/bid/5109 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-032 •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

Microsoft Windows Media Player versions 6.4 and 7.1 and Media Player for Windows XP allow remote attackers to bypass Internet Explorer's (IE) security mechanisms and run code via an executable .wma media file with a license installation requirement stored in the IE cache, aka the "Cache Path Disclosure via Windows Media Player". Microsoft Windows Media Player versiones 6.4 y 7.1 y Media Player para Windows XP permite a atacantes remotos eludir los mecanismos de seguridad de Internet Explorer's (IE), y ejecutar código mediante un fichero ejecutable .wma con unos requerimientos para la licencia de instalación almacenados en la caché de IE, también conocida como: "Cache Patch Disclosure via Windows Media Player". • http://www.iss.net/security_center/static/9420.php http://www.securityfocus.com/bid/5107 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-032 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A281 •