Total vulnerabilities in the database
Winamp 2.65 through 3.0 stores skin files in a predictable file location, which allows remote attackers to execute arbitrary code via a URL reference to (1) wsz and (2) wal files that contain embedded code.
Software | From | Fixed in |
---|---|---|
nullsoft / winamp | 2.72 | 2.72.x |
nullsoft / winamp | 2.73 | 2.73.x |
nullsoft / winamp | 2.75 | 2.75.x |
nullsoft / winamp | 2.65 | 2.65.x |
nullsoft / winamp | 3.1 | 3.1.x |
nullsoft / winamp | 2.76 | 2.76.x |
nullsoft / winamp | 2.80 | 2.80.x |
nullsoft / winamp | 2.74 | 2.74.x |
nullsoft / winamp | 2.71 | 2.71.x |
nullsoft / winamp | 2.78 | 2.78.x |
nullsoft / winamp | 2.77 | 2.77.x |
nullsoft / winamp | 2.70 | 2.70.x |
nullsoft / winamp | 2.79 | 2.79.x |