Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
windows media player vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2010-1042
Microsoft Windows Media Player 11 does not properly perform colorspace conversion, which allows remote malicious users to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted .AVI file. NOTE: the provenance of this information is unknown;...
Microsoft Windows Media Player 11.0.5721.5145
Microsoft Windows Media Player 11.0.6000.6324
Microsoft Windows Media Player 11
1 EDB exploit
7.5
CVSSv2
CVE-2003-0228
Directory traversal vulnerability in Microsoft Windows Media Player 7.1 and Windows Media Player for Windows XP allows remote malicious users to execute arbitrary code via a skins file with a URL containing hex-encoded backslash characters (%5C) that causes an executable to be pl...
Microsoft Windows Media Player 7.1
Microsoft Windows Media Player -
1 EDB exploit
7.5
CVSSv2
CVE-2003-0604
Windows Media Player (WMP) 7 and 8, as running on Internet Explorer and possibly other Microsoft products that process HTML, allows remote malicious users to bypass zone restrictions and access or execute arbitrary files via an IFRAME tag pointing to an ASF file whose Content-loc...
Microsoft Windows Media Player 7
Microsoft Windows Media Player 8
7.5
CVSSv2
CVE-2005-1574
Windows Media Player 9 and 10, in certain cases, allows content protected by Windows Media Digital Rights Management (WMDRM) to redirect the user to a web site to obtain a license, even when the "Acquire licenses automatically for protected content" setting is not enabl...
Microsoft Windows Media Player 10
Microsoft Windows Media Player 9
4.3
CVSSv2
CVE-2010-0718
Buffer overflow in Microsoft Windows Media Player 9 and 11.0.5721.5145 allows remote malicious users to cause a denial of service (divide-by-zero error and application crash) via a crafted .mpg file.
Microsoft Windows Media Player 9
Microsoft Windows Media Player 11.0.5721.5145
1 EDB exploit
5
CVSSv2
CVE-2001-0243
Windows Media Player 7 and previous versions stores Internet shortcuts in a user's Temporary Files folder with a fixed filename instead of in the Internet Explorer cache, which causes the HTML in those shortcuts to run in the Local Computer Zone instead of the Internet Zone,...
Microsoft Windows Media Player 6.4
Microsoft Windows Media Player 7
4.6
CVSSv2
CVE-2000-1112
Microsoft Windows Media Player 7 executes scripts in custom skin (.WMS) files, which could allow remote malicious users to gain privileges via a skin that contains a malicious script, aka the ".WMS Script Execution" vulnerability.
Microsoft Windows Media Player 6.4
Microsoft Windows Media Player 7
1 EDB exploit
7.5
CVSSv2
CVE-2000-1113
Buffer overflow in Microsoft Windows Media Player allows remote malicious users to execute arbitrary commands via a malformed Active Stream Redirector (.ASX) file, aka the ".ASX Buffer Overrun" vulnerability.
Microsoft Windows Media Player 6.4
Microsoft Windows Media Player 7
1 EDB exploit
9.3
CVSSv2
CVE-2006-0025
Stack-based buffer overflow in Microsoft Windows Media Player 9 and 10 allows remote malicious users to execute arbitrary code via a PNG image with a large chunk size.
Microsoft Windows Media Player 10
Microsoft Windows Media Player 9
9.3
CVSSv2
CVE-2013-3127
The Microsoft WMV video codec in wmv9vcm.dll, wmvdmod.dll in Windows Media Format Runtime 9 and 9.5, and wmvdecod.dll in Windows Media Format Runtime 11 and Windows Media Player 11 and 12 allows remote malicious users to execute arbitrary code via a crafted media file, aka "...
Microsoft Windows Media Player 12
Microsoft Windows Media Format Runtime 9
Microsoft Windows Media Format Runtime 9.5
Microsoft Windows Media Format Runtime 11
Microsoft Windows Media Player 11
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »