Required CVE Record Information
Description
Directory traversal vulnerability in Microsoft Windows Media Player 7.1 and Windows Media Player for Windows XP allows remote attackers to execute arbitrary code via a skins file with a URL containing hex-encoded backslash characters (%5C) that causes an executable to be placed in an arbitrary location.
References 8 Total
- marc.info: 20030507 Windows Media Player directory traversal vulnerability mailing-list
- securityfocus.com: 7517 vdb-entry
- marc.info: 20030507 Windows Media Player directory traversal vulnerability mailing-list
- exchange.xforce.ibmcloud.com: mediaplayer-skin-code-execution(11953) vdb-entry
- oval.cisecurity.org: oval:org.mitre.oval:def:321 vdb-entrysignature
- kb.cert.org: VU#384932 third-party-advisory
- marc.info: 20030508 why i love xs4all + mediaplayer thingie mailing-list
- docs.microsoft.com: MS03-017 vendor-advisory
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 8 Total
- marc.info: 20030507 Windows Media Player directory traversal vulnerability mailing-listx_transferred
- securityfocus.com: 7517 vdb-entryx_transferred
- marc.info: 20030507 Windows Media Player directory traversal vulnerability mailing-listx_transferred
- exchange.xforce.ibmcloud.com: mediaplayer-skin-code-execution(11953) vdb-entryx_transferred
- oval.cisecurity.org: oval:org.mitre.oval:def:321 vdb-entrysignaturex_transferred
- kb.cert.org: VU#384932 third-party-advisoryx_transferred
- marc.info: 20030508 why i love xs4all + mediaplayer thingie mailing-listx_transferred
- docs.microsoft.com: MS03-017 vendor-advisoryx_transferred