Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2007-3035
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Unspecified vulnerability in Microsoft Windows Media Player 7.1, 9, 10, and 11 allows remote attackers to execute arbitrary code via a skin file (WMZ or WMD) with crafted header information that is not properly handled during decompression, aka "Windows Media Player Code Execution Vulnerability Decompressing Skins."
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Windows Media Player皮肤文件解析远程代码执行漏洞(MS07-047)
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Media Player是Windows操作系统中默认捆绑的媒体播放器。 Media Player在处理畸形格式的皮肤文件时存在漏洞,远程攻击者可能利用此漏洞通过诱使用户处理恶意文件控制系统。 Media Player在解压饮食畸形头结构的皮肤文件(.WMZ和.WMD)时存在漏洞,如果用户受骗加载了恶意的皮肤文件或访问了恶意站点的话就可能导致执行任意指令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2007-3035
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2007-3035
Please Login to view more intelligence information
New Vulnerabilities
V. Comments for CVE-2007-3035

No comments yet


Leave a comment