13 results (0.010 seconds)

CVSS: 5.1EPSS: 0%CPEs: 4EXPL: 0

The DHTML capability in Microsoft Windows Media Player (WMP) 6.4, 7.0, 7.1, and 9 may run certain URL commands from a security zone that is less trusted than the current zone, which allows attackers to bypass intended access restrictions. • http://support.microsoft.com/default.aspx?scid=kb%3Ben-us%3B828026 http://www.kb.cert.org/vuls/id/222044 https://exchange.xforce.ibmcloud.com/vulnerabilities/13375 •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 0

Windows Media Player (WMP) 7 and 8, as running on Internet Explorer and possibly other Microsoft products that process HTML, allows remote attackers to bypass zone restrictions and access or execute arbitrary files via an IFRAME tag pointing to an ASF file whose Content-location contains a File:// URL. Windows Media Player (WMP) 7 y 8, corriendo en Internet Explorer y posiblemente otros productos de Microsoft que procesan HTML, permite a atacantes remotos saltarse restricciones de zona y acceder o ejecutar ficheros arbitrarios mediante una etiqueta IFRAME apuntando a un fichero ADF cuyo "Content-location" contiene una URL de tipo "File://". • http://marc.info/?l=bugtraq&m=105899261818572&w=2 http://marc.info/?l=bugtraq&m=105906867322856&w=2 http://marc.info/?l=ntbugtraq&m=105899408520292&w=2 http://marc.info/?l=ntbugtraq&m=105906261314411&w=2 http://www.malware.com/once.again%21.html http://www.pivx.com/larholm/unpatched •

CVSS: 7.5EPSS: 1%CPEs: 5EXPL: 2

Buffer overflow in mplay32.exe of Microsoft Windows Media Player (WMP) 6.3 through 7.1 allows remote attackers to execute arbitrary commands via a long mp3 filename command line argument. NOTE: since the only known attack vector requires command line access, this may not be a vulnerability. • https://www.exploit-db.com/exploits/21670 http://online.securityfocus.com/archive/1/285082 http://www.iss.net/security_center/static/9727.php http://www.securityfocus.com/bid/5357 •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

Microsoft Windows Media Player versions 6.4 and 7.1 and Media Player for Windows XP allow remote attackers to bypass Internet Explorer's (IE) security mechanisms and run code via an executable .wma media file with a license installation requirement stored in the IE cache, aka the "Cache Path Disclosure via Windows Media Player". Microsoft Windows Media Player versiones 6.4 y 7.1 y Media Player para Windows XP permite a atacantes remotos eludir los mecanismos de seguridad de Internet Explorer's (IE), y ejecutar código mediante un fichero ejecutable .wma con unos requerimientos para la licencia de instalación almacenados en la caché de IE, también conocida como: "Cache Patch Disclosure via Windows Media Player". • http://www.iss.net/security_center/static/9420.php http://www.securityfocus.com/bid/5107 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-032 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A281 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Windows Media Player (WMP) 8.00.00.4477, and possibly other versions, automatically detects and executes .wmf and other content, even when the file's extension or content type does not specify .wmf, which could make it easier for attackers to conduct unauthorized activities via Trojan horse files containing .wmf content. • http://marc.info/?l=bugtraq&m=101447771102582&w=2 •