Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows media player 7 vulnerabilities and exploits
(subscribe to this query)
755
VMScore
CVE-2002-1847
Buffer overflow in mplay32.exe of Microsoft Windows Media Player (WMP) 6.3 up to and including 7.1 allows remote malicious users to execute arbitrary commands via a long mp3 filename command line argument. NOTE: since the only known attack vector requires command line access, thi...
Microsoft Windows Media Player 6.3
Microsoft Windows Media Player 6.4
Microsoft Windows Media Player 7
Microsoft Windows Media Player 7.1
Microsoft Windows Media Player -
1 EDB exploit
668
VMScore
CVE-2001-0541
Buffer overflow in Microsoft Windows Media Player 7.1 and previous versions allows remote malicious users to execute arbitrary commands via a malformed Windows Media Station (.NSC) file.
Microsoft Windows Media Player 6.4
Microsoft Windows Media Player 7
Microsoft Windows Media Player
454
VMScore
CVE-2003-1107
The DHTML capability in Microsoft Windows Media Player (WMP) 6.4, 7.0, 7.1, and 9 may run certain URL commands from a security zone that is less trusted than the current zone, which allows malicious users to bypass intended access restrictions.
Microsoft Windows Media Player 7
Microsoft Windows Media Player 7.1
Microsoft Windows Media Player 6.4
Microsoft Windows Media Player 9
668
VMScore
CVE-2001-0242
Buffer overflows in Microsoft Windows Media Player 7 and previous versions allow remote malicious users to execute arbitrary commands via (1) a long version tag in an .ASX file, or (2) a long banner tag, a variant of the ".ASX Buffer Overrun" vulnerability as discussed ...
Microsoft Windows Media Player 6.3
Microsoft Windows Media Player 6.4
Microsoft Windows Media Player 7
465
VMScore
CVE-2000-1112
Microsoft Windows Media Player 7 executes scripts in custom skin (.WMS) files, which could allow remote malicious users to gain privileges via a skin that contains a malicious script, aka the ".WMS Script Execution" vulnerability.
Microsoft Windows Media Player 6.4
Microsoft Windows Media Player 7
1 EDB exploit
445
VMScore
CVE-2001-0243
Windows Media Player 7 and previous versions stores Internet shortcuts in a user's Temporary Files folder with a fixed filename instead of in the Internet Explorer cache, which causes the HTML in those shortcuts to run in the Local Computer Zone instead of the Internet Zone,...
Microsoft Windows Media Player 6.4
Microsoft Windows Media Player 7
668
VMScore
CVE-2003-0604
Windows Media Player (WMP) 7 and 8, as running on Internet Explorer and possibly other Microsoft products that process HTML, allows remote malicious users to bypass zone restrictions and access or execute arbitrary files via an IFRAME tag pointing to an ASF file whose Content-loc...
Microsoft Windows Media Player 7
Microsoft Windows Media Player 8
755
VMScore
CVE-2000-1113
Buffer overflow in Microsoft Windows Media Player allows remote malicious users to execute arbitrary commands via a malformed Active Stream Redirector (.ASX) file, aka the ".ASX Buffer Overrun" vulnerability.
Microsoft Windows Media Player 6.4
Microsoft Windows Media Player 7
1 EDB exploit
755
VMScore
CVE-2001-0148
The WMP ActiveX Control in Windows Media Player 7 allows remote malicious users to execute commands in Internet Explorer via javascript URLs, a variant of the "Frame Domain Verification" vulnerability.
Microsoft Windows Media Player 7
1 EDB exploit
515
VMScore
CVE-2001-0137
Windows Media Player 7 allows remote malicious users to execute malicious Java applets in Internet Explorer clients by enclosing the applet in a skin file named skin.wmz, then referencing that skin in the codebase parameter to an applet tag, aka the Windows Media Player Skins Fil...
Microsoft Windows Media Player 7
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
remote code execution
CVE-2024-34909
CVE-2024-3317
SSTI
CVE-2024-3400
CVE-2024-30051
wireless
CVE-2024-4622
CVE-2024-4908
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »