Page 6 of 30 results (0.017 seconds)

CVSS: 4.6EPSS: 23%CPEs: 33EXPL: 1

Winamp before 5.0.4 allows remote attackers to execute arbitrary script in the Local computer zone via script in HTML files that are referenced from XML files contained in a .wsz skin file. • https://www.exploit-db.com/exploits/418 http://secunia.com/advisories/12381 http://www.auscert.org.au/render.html?it=4338 http://www.frsirt.com/exploits/08252004.skinhead.php https://exchange.xforce.ibmcloud.com/vulnerabilities/17124 •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 0

Buffer overflow in the mini-browser for Winamp 2.79 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in the title field of an ID3v2 tag. Desbordamiento de búfer en la zona de navegación de Winamp 2.79 y versiones anteriores, permite a atacantes remotos causar una Denegación de Servicios (caída) y posiblemente la ejecución arbitraria de código mediante una cadena larga de caracteres en el campo title de una etiqueta ID3v2. • http://archives.neohapsis.com/archives/bugtraq/2002-04/0373.html http://www.iss.net/security_center/static/8946.php http://www.securityfocus.com/bid/4609 http://www.winamp.com/download/newfeatures.jhtml •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

Buffer overflow in WINAMP 2.6x and 2.7x allows attackers to execute arbitrary code via a long string in an AIP file. • https://www.exploit-db.com/exploits/20820 http://archives.neohapsis.com/archives/bugtraq/2001-04/0518.html •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 3

Buffer overflow in Winamp 2.64 and earlier allows remote attackers to execute arbitrary commands via a long #EXTINF: extension in the M3U playlist. • https://www.exploit-db.com/exploits/20094 http://archives.neohapsis.com/archives/bugtraq/2000-07/0289.html http://www.securityfocus.com/bid/1496 http://www.winamp.com/getwinamp/newfeatures.jhtml https://exchange.xforce.ibmcloud.com/vulnerabilities/4956 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 1

Buffer overflow in Winamp client allows remote attackers to execute commands via a long entry in a .pls file. • https://www.exploit-db.com/exploits/19720 http://www.osvdb.org/12022 http://www.securityfocus.com/bid/925 •