Page 8 of 59 results (0.006 seconds)

CVSS: 7.6EPSS: 77%CPEs: 1EXPL: 4

Buffer overflow in Nullsoft Winamp 5.12 allows remote attackers to execute arbitrary code via a playlist (pls) file with a long file name (File1 field). • https://www.exploit-db.com/exploits/16531 https://www.exploit-db.com/exploits/1458 https://www.exploit-db.com/exploits/3422 https://www.exploit-db.com/exploits/1460 http://secunia.com/advisories/18649 http://securityreason.com/securityalert/386 http://securityreason.com/securityalert/398 http://securitytracker.com/id?1015552 http://www.heise.de/newsticker/meldung/68981 http://www.kb.cert.org/vuls/id/604745 http://www.osvdb.org/22789 http://www.securityfocus.com/arc •

CVSS: 9.3EPSS: 94%CPEs: 4EXPL: 3

Buffer overflow in Winamp 5.03a, 5.09 and 5.091, and other versions before 5.094, allows remote attackers to execute arbitrary code via an MP3 file with a long ID3v2 tag such as (1) ARTIST or (2) TITLE. Desbordamiento de búfer en Winamp 5.03a, 5.09 y 5.091 permite que atacantes remotos ejecuten código arbitrario mediante un fichero MP3 con un tag ID3v2 largo. • https://www.exploit-db.com/exploits/25989 http://secunia.com/advisories/16077 http://security.lss.hr/index.php?page=details&ID=LSS-2005-07-14 http://securitytracker.com/id?1014483 http://www.osvdb.org/17897 http://www.securityfocus.com/bid/14276 http://www.vupen.com/english/advisories/2005/1106 http://www.winamp.com/player/version_history.php • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.6EPSS: 24%CPEs: 5EXPL: 0

Heap-based buffer overflow in in_mod.dll in Nullsoft Winamp 2.91 through 5.02 allows remote attackers to execute arbitrary code via a Fasttracker 2 (.xm) mod media file. • http://marc.info/?l=bugtraq&m=108118289208693&w=2 http://secunia.com/advisories/11285 http://securitytracker.com/id?1009660 http://www.nextgenss.com/advisories/winampheap.txt http://www.osvdb.org/4944 http://www.securityfocus.com/bid/10045 https://exchange.xforce.ibmcloud.com/vulnerabilities/15727 •

CVSS: 5.1EPSS: 0%CPEs: 9EXPL: 2

Stack-based buffer overflow in the in_cdda.dll plugin for Winamp 5.0 through 5.08c allows attackers to execute arbitrary code via a cda:// URL with a long (1) device name or (2) sound track number, as demonstrated with a .m3u or .pls playlist file. • https://www.exploit-db.com/exploits/25061 http://marc.info/?l=bugtraq&m=110684140108614&w=2 http://secunia.com/advisories/13781 http://www.nsfocus.com/english/homepage/research/0501.htm http://www.securityfocus.com/bid/12381 http://www.winamp.com/player/version_history.php https://exchange.xforce.ibmcloud.com/vulnerabilities/18840 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

NullSoft Winamp 5.02 allows remote attackers to cause a denial of service (crash) by creating a file with a long filename, which causes the victim's player to crash when the file is opened from the command line. • http://www.securityfocus.com/archive/1/357986 http://www.securityfocus.com/archive/1/358097 http://www.securityfocus.com/bid/9920 https://exchange.xforce.ibmcloud.com/vulnerabilities/15541 •