Page 2 of 15 results (0.011 seconds)

CVSS: 5.1EPSS: 0%CPEs: 4EXPL: 0

The DHTML capability in Microsoft Windows Media Player (WMP) 6.4, 7.0, 7.1, and 9 may run certain URL commands from a security zone that is less trusted than the current zone, which allows attackers to bypass intended access restrictions. • http://support.microsoft.com/default.aspx?scid=kb%3Ben-us%3B828026 http://www.kb.cert.org/vuls/id/222044 https://exchange.xforce.ibmcloud.com/vulnerabilities/13375 •

CVSS: 7.5EPSS: 1%CPEs: 5EXPL: 2

Buffer overflow in mplay32.exe of Microsoft Windows Media Player (WMP) 6.3 through 7.1 allows remote attackers to execute arbitrary commands via a long mp3 filename command line argument. NOTE: since the only known attack vector requires command line access, this may not be a vulnerability. • https://www.exploit-db.com/exploits/21670 http://online.securityfocus.com/archive/1/285082 http://www.iss.net/security_center/static/9727.php http://www.securityfocus.com/bid/5357 •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

Microsoft Windows Media Player versions 6.4 and 7.1 and Media Player for Windows XP allow remote attackers to bypass Internet Explorer's (IE) security mechanisms and run code via an executable .wma media file with a license installation requirement stored in the IE cache, aka the "Cache Path Disclosure via Windows Media Player". Microsoft Windows Media Player versiones 6.4 y 7.1 y Media Player para Windows XP permite a atacantes remotos eludir los mecanismos de seguridad de Internet Explorer's (IE), y ejecutar código mediante un fichero ejecutable .wma con unos requerimientos para la licencia de instalación almacenados en la caché de IE, también conocida como: "Cache Patch Disclosure via Windows Media Player". • http://www.iss.net/security_center/static/9420.php http://www.securityfocus.com/bid/5107 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-032 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A281 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Windows Media Player (WMP) 8.00.00.4477, and possibly other versions, automatically detects and executes .wmf and other content, even when the file's extension or content type does not specify .wmf, which could make it easier for attackers to conduct unauthorized activities via Trojan horse files containing .wmf content. • http://marc.info/?l=bugtraq&m=101447771102582&w=2 •

CVSS: 7.5EPSS: 11%CPEs: 1EXPL: 0

Buffer overflow in Microsoft Windows Media Player 6.4 allows remote attackers to execute arbitrary code via a malformed Advanced Streaming Format (ASF) file. • http://online.securityfocus.com/archive/1/202470 http://www.iss.net/security_center/static/6962.php http://www.osvdb.org/5558 http://www.securityfocus.com/bid/3156 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-056 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A287 •