Directory traversal vulnerability in WsMp3 daemon (WsMp3d) 0.0.10 and earlier allows remote attackers to read and execute arbitrary files via .. (dot dot) sequences in HTTP GET or POST requests.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0077.html | Exploit Vendor Advisory |
http://marc.info/?l=bugtraq&m=105353168619211&w=2 | |
http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0077.html | Exploit Vendor Advisory |
http://marc.info/?l=bugtraq&m=105353168619211&w=2 |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:44
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0077.html - Exploit, Vendor Advisory | |
References | () http://marc.info/?l=bugtraq&m=105353168619211&w=2 - |
Information
Published : 2003-05-21 04:00
Updated : 2024-11-20 23:44
NVD link : CVE-2003-0338
Mitre link : CVE-2003-0338
CVE.ORG link : CVE-2003-0338
JSON object : View
Products Affected
wsmp3
- wsmp3_web_server
- wsmp3_daemon
CWE