Page 2 of 12 results (0.003 seconds)

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 0

Windows Media Player (WMP) 7 and 8, as running on Internet Explorer and possibly other Microsoft products that process HTML, allows remote attackers to bypass zone restrictions and access or execute arbitrary files via an IFRAME tag pointing to an ASF file whose Content-location contains a File:// URL. Windows Media Player (WMP) 7 y 8, corriendo en Internet Explorer y posiblemente otros productos de Microsoft que procesan HTML, permite a atacantes remotos saltarse restricciones de zona y acceder o ejecutar ficheros arbitrarios mediante una etiqueta IFRAME apuntando a un fichero ADF cuyo "Content-location" contiene una URL de tipo "File://". • http://marc.info/?l=bugtraq&m=105899261818572&w=2 http://marc.info/?l=bugtraq&m=105906867322856&w=2 http://marc.info/?l=ntbugtraq&m=105899408520292&w=2 http://marc.info/?l=ntbugtraq&m=105906261314411&w=2 http://www.malware.com/once.again%21.html http://www.pivx.com/larholm/unpatched •

CVSS: 7.5EPSS: 95%CPEs: 2EXPL: 2

Directory traversal vulnerability in Microsoft Windows Media Player 7.1 and Windows Media Player for Windows XP allows remote attackers to execute arbitrary code via a skins file with a URL containing hex-encoded backslash characters (%5C) that causes an executable to be placed in an arbitrary location. Vulnerabilidad de cruce de directorios en Microsoft Media Player 7.1 y Windows Media Player para Windows XP permite que atacantes remotos ejecuten código arbitrario mediante un fichero de "skins" con una URL que contenga el caracter ``codificado en hexadecimal (%5C), lo cual permite que un ejecutable sea colado en una localizació arbitraria. • https://www.exploit-db.com/exploits/22570 http://marc.info/?l=bugtraq&m=105232913516488&w=2 http://marc.info/?l=bugtraq&m=105240528419389&w=2 http://marc.info/?l=ntbugtraq&m=105233960728901&w=2 http://www.kb.cert.org/vuls/id/384932 http://www.securityfocus.com/bid/7517 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-017 https://exchange.xforce.ibmcloud.com/vulnerabilities/11953 https://oval.cisecurity.org/repository/search/definition/oval%3Aor •

CVSS: 7.5EPSS: 1%CPEs: 5EXPL: 2

Buffer overflow in mplay32.exe of Microsoft Windows Media Player (WMP) 6.3 through 7.1 allows remote attackers to execute arbitrary commands via a long mp3 filename command line argument. NOTE: since the only known attack vector requires command line access, this may not be a vulnerability. • https://www.exploit-db.com/exploits/21670 http://online.securityfocus.com/archive/1/285082 http://www.iss.net/security_center/static/9727.php http://www.securityfocus.com/bid/5357 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

The Windows Media Device Manager (WMDM) Service in Microsoft Windows Media Player 7.1 on Windows 2000 systems allows local users to obtain LocalSystem rights via a program that calls the WMDM service to connect to an invalid local storage device, aka "Privilege Elevation through Windows Media Device Manager Service". • http://www.iss.net/security_center/static/9421.php http://www.securityfocus.com/bid/5109 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-032 •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

Microsoft Windows Media Player versions 6.4 and 7.1 and Media Player for Windows XP allow remote attackers to bypass Internet Explorer's (IE) security mechanisms and run code via an executable .wma media file with a license installation requirement stored in the IE cache, aka the "Cache Path Disclosure via Windows Media Player". Microsoft Windows Media Player versiones 6.4 y 7.1 y Media Player para Windows XP permite a atacantes remotos eludir los mecanismos de seguridad de Internet Explorer's (IE), y ejecutar código mediante un fichero ejecutable .wma con unos requerimientos para la licencia de instalación almacenados en la caché de IE, también conocida como: "Cache Patch Disclosure via Windows Media Player". • http://www.iss.net/security_center/static/9420.php http://www.securityfocus.com/bid/5107 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-032 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A281 •