5 results (0.003 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

31 Dec 2002 — Microsoft Windows Media Player (WMP) 6.3, when installed on Solaris, installs executables with world-writable permissions, which allows local users to delete or modify the executables to gain privileges. • http://archives.neohapsis.com/archives/bugtraq/2002-10/0260.html • CWE-276: Incorrect Default Permissions •

CVSS: 9.8EPSS: 6%CPEs: 5EXPL: 2

31 Dec 2002 — Buffer overflow in mplay32.exe of Microsoft Windows Media Player (WMP) 6.3 through 7.1 allows remote attackers to execute arbitrary commands via a long mp3 filename command line argument. NOTE: since the only known attack vector requires command line access, this may not be a vulnerability. • https://www.exploit-db.com/exploits/21670 •

CVSS: 8.8EPSS: 4%CPEs: 1EXPL: 0

03 May 2002 — Windows Media Player (WMP) 8.00.00.4477, and possibly other versions, automatically detects and executes .wmf and other content, even when the file's extension or content type does not specify .wmf, which could make it easier for attackers to conduct unauthorized activities via Trojan horse files containing .wmf content. • http://marc.info/?l=bugtraq&m=101447771102582&w=2 •

CVSS: 8.8EPSS: 9%CPEs: 3EXPL: 0

20 Sep 2001 — Buffer overflow in Microsoft Windows Media Player 7.1 and earlier allows remote attackers to execute arbitrary commands via a malformed Windows Media Station (.NSC) file. Desbordamiento de buffer en el Reproductor de Medios de Windows 7.1 y anteriores que permite a atacantes remotos ejecutar comandos arbitrarios mediante un fichero malformado de Windows Media Station (.nsc) • http://www.securityfocus.com/archive/1/187001 •

CVSS: 8.8EPSS: 12%CPEs: 3EXPL: 1

24 May 2001 — Buffer overflows in Microsoft Windows Media Player 7 and earlier allow remote attackers to execute arbitrary commands via (1) a long version tag in an .ASX file, or (2) a long banner tag, a variant of the ".ASX Buffer Overrun" vulnerability as discussed in MS:MS00-090. • http://www.kb.cert.org/vuls/id/187528 •