Page 12 of 76 results (0.005 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Winamp 3.0 allows remote attackers to cause a denial of service (crash) via .b4s file with a file: argument to the Playstring parameter that contains MS-DOS device names such as aux. • http://archives.neohapsis.com/archives/bugtraq/2003-01/0025.html https://exchange.xforce.ibmcloud.com/vulnerabilities/10983 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Winamp 3.0 allows remote attackers to cause a denial of service (crash) via a .b4s file with a playlist name that contains some non-English characters, e.g. Cyrillic characters. • http://archives.neohapsis.com/archives/bugtraq/2003-01/0025.html http://www.securityfocus.com/bid/6517 https://exchange.xforce.ibmcloud.com/vulnerabilities/10982 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 5

Buffer overflow in NullSoft Shoutcast Server 1.9.2 allows local users to cause a denial of service via (1) icy-name followed by a long server name or (2) icy-url followed by a long URL. • https://www.exploit-db.com/exploits/23328 https://www.exploit-db.com/exploits/23329 http://secunia.com/advisories/10146 http://securitytracker.com/id?1008080 http://www.osvdb.org/2776 http://www.securityfocus.com/archive/1/343177 http://www.securityfocus.com/bid/8954 https://exchange.xforce.ibmcloud.com/vulnerabilities/13586 •

CVSS: 7.5EPSS: 1%CPEs: 4EXPL: 1

The IN_MIDI.DLL plugin 3.01 and earlier, as used in Winamp 2.91, allows remote attackers to execute arbitrary code via a MIDI file with a large "Track data size" value. IN_MIDI.DLL plugin 3.01 y versiones anteriores, como es utilizado en Winamp 2.91, permite a atacantes remotos la ejecución de código arbitrario mediante un fichero MIDI con un valor "Track data size" largo. • https://www.exploit-db.com/exploits/23124 http://marc.info/?l=bugtraq&m=106305643432112&w=2 •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 2

Buffer overflow in XML parser in wsabi.dll of Winamp 3 (1.0.0.488) allows remote attackers to execute arbitrary code via a skin file (.wal) with a long include file tag. Desbordamiento de búfer en el procesador de XML en wsabi.dll de Winamp 3 (1.0.0.488) permite a atacantes remotos ejecutar código arbitrario mediante un fichero de piel (skin) .wal con una etiqueta de incluir fichero larga. • http://archives.neohapsis.com/archives/bugtraq/2002-09/0346.html http://www.iss.net/security_center/static/10228.php http://www.securityfocus.com/bid/5832 •