Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3pvq-p4gr-34c3

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

The Windows Media Active Playlist in Microsoft Windows Media Player 7.1 stores information in a well known location on the local file system, allowing attackers to execute HTML scripts in the Local Computer zone, aka "Media Playback Script Invocation".

The Windows Media Active Playlist in Microsoft Windows Media Player 7.1 stores information in a well known location on the local file system, allowing attackers to execute HTML scripts in the Local Computer zone, aka "Media Playback Script Invocation".

EPSS

Процентиль: 93%
0.11402
Средний

Связанные уязвимости

nvd
больше 23 лет назад

The Windows Media Active Playlist in Microsoft Windows Media Player 7.1 stores information in a well known location on the local file system, allowing attackers to execute HTML scripts in the Local Computer zone, aka "Media Playback Script Invocation".

EPSS

Процентиль: 93%
0.11402
Средний