Page 6 of 31 results (0.006 seconds)

CVSS: 9.3EPSS: 89%CPEs: 30EXPL: 1

Buffer overflow in in_midi.dll for WinAmp 2.90 up to 5.23, including 5.21, allows remote attackers to execute arbitrary code via a crafted .mid (MIDI) file. Desbordamiento de búfer en in_midi.dll para WinAmp v2.90 hasta v5.23, incluyendo v5.21, permite a atacantes remotos ejecutar código de su elección a través de un fichero manipulado .mi (MIDI). • https://www.exploit-db.com/exploits/1935 http://forums.winamp.com/showthread.php?threadid=248100 http://secunia.com/advisories/20722 http://www.attrition.org/pipermail/vim/2006-June/000892.html http://www.attrition.org/pipermail/vim/2006-June/000893.html http://www.winamp.com/about/article.php?aid=10694 •

CVSS: 9.3EPSS: 10%CPEs: 18EXPL: 1

Multiple buffer overflows in NullSoft Winamp 5.13 and earlier allow remote attackers to execute arbitrary code via (1) an m3u file containing a long URL ending in .wma, (2) a pls file containing a File1 field with a long URL ending in .wma, or (3) an m3u file with a long filename, variants of CVE-2005-3188 and CVE-2006-0476. • http://forums.winamp.com/showthread.php?s=&threadid=238648 http://securityreason.com/securityalert/444 http://securityreason.com/securityalert/492 http://securitytracker.com/id?1015621 http://www.securityfocus.com/archive/1/424903/100/0/threaded http://www.securityfocus.com/bid/16623 http://www.vupen.com/english/advisories/2006/0613 https://exchange.xforce.ibmcloud.com/vulnerabilities/24739 https://exchange.xforce.ibmcloud.com/vulnerabilities/24740 https://exchange.xforce.ibmcloud.com/vulnerabilities •

CVSS: 9.3EPSS: 94%CPEs: 4EXPL: 3

Buffer overflow in Winamp 5.03a, 5.09 and 5.091, and other versions before 5.094, allows remote attackers to execute arbitrary code via an MP3 file with a long ID3v2 tag such as (1) ARTIST or (2) TITLE. Desbordamiento de búfer en Winamp 5.03a, 5.09 y 5.091 permite que atacantes remotos ejecuten código arbitrario mediante un fichero MP3 con un tag ID3v2 largo. • https://www.exploit-db.com/exploits/25989 http://secunia.com/advisories/16077 http://security.lss.hr/index.php?page=details&ID=LSS-2005-07-14 http://securitytracker.com/id?1014483 http://www.osvdb.org/17897 http://www.securityfocus.com/bid/14276 http://www.vupen.com/english/advisories/2005/1106 http://www.winamp.com/player/version_history.php • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.1EPSS: 0%CPEs: 9EXPL: 2

Stack-based buffer overflow in the in_cdda.dll plugin for Winamp 5.0 through 5.08c allows attackers to execute arbitrary code via a cda:// URL with a long (1) device name or (2) sound track number, as demonstrated with a .m3u or .pls playlist file. • https://www.exploit-db.com/exploits/25061 http://marc.info/?l=bugtraq&m=110684140108614&w=2 http://secunia.com/advisories/13781 http://www.nsfocus.com/english/homepage/research/0501.htm http://www.securityfocus.com/bid/12381 http://www.winamp.com/player/version_history.php https://exchange.xforce.ibmcloud.com/vulnerabilities/18840 •

CVSS: 10.0EPSS: 88%CPEs: 6EXPL: 2

Stack-based buffer overflow in IN_CDDA.dll in Winamp 5.05, and possibly other versions including 5.06, allows remote attackers to execute arbitrary code via a certain .m3u playlist file. • https://www.exploit-db.com/exploits/654 http://archives.neohapsis.com/archives/bugtraq/2004-11/0369.html http://marc.info/?l=bugtraq&m=110123330404482&w=2 http://marc.info/?l=bugtraq&m=110146036300803&w=2 http://marc.info/?l=ntbugtraq&m=110126352412395&w=2 http://marc.info/?l=ntbugtraq&m=110135574326217&w=2 http://secunia.com/advisories/13269 http://www.kb.cert.org/vuls/id/986504 http://www.security-assessment.com/Papers/Winamp_IN_CDDA_Buffer_Overflow.pdf http& •