cpe:2.3:a:realnetworks:realplayer:20.0.8.310:*:*:*:*:*:*:*
In Real Player through 20.1.0.312, attackers can execute arbitrary code by placing a UNC share pathname (for a DLL file) in a RAM file.
Max CVSS
8.8
EPSS Score
0.28%
Published
2022-06-05
Updated
2022-06-14
In Real Player 20.0.8.310, there is a DCP:// URI Remote Arbitrary Code Execution Vulnerability. This is an internal URL Protocol used by Real Player to reference a file that contains an URL. It is possible to inject script code to arbitrary domains. It is also possible to reference arbitrary local files.
Max CVSS
9.6
EPSS Score
0.41%
Published
2022-06-03
Updated
2022-06-13
In Real Player 20.0.7.309 and 20.0.8.310, external::Import() allows download of arbitrary file types and Directory Traversal, leading to Remote Code Execution. This occurs because it is possible to plant executables in the startup folder (DLL planting could also occur).
Max CVSS
9.8
EPSS Score
0.57%
Published
2022-06-03
Updated
2022-06-12
In Real Player 20.0.8.310, the G2 Control allows injection of unsafe javascript: URIs in local HTTP error pages (displayed by Internet Explorer core). This leads to arbitrary code execution.
Max CVSS
9.8
EPSS Score
0.37%
Published
2022-06-03
Updated
2022-06-12
4 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!