Логотип exploitDog
bind:CVE-2022-32270
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-32270

Количество 2

Количество 2

nvd логотип

CVE-2022-32270

больше 3 лет назад

In Real Player 20.0.7.309 and 20.0.8.310, external::Import() allows download of arbitrary file types and Directory Traversal, leading to Remote Code Execution. This occurs because it is possible to plant executables in the startup folder (DLL planting could also occur).

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-3w46-g3w3-qj67

больше 3 лет назад

In Real Player 20.0.7.309 and 20.0.8.310, external::Import() allows download of arbitrary file types and Directory Traversal, leading to Remote Code Execution. This occurs because it is possible to plant executables in the startup folder (DLL planting could also occur).

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-32270

In Real Player 20.0.7.309 and 20.0.8.310, external::Import() allows download of arbitrary file types and Directory Traversal, leading to Remote Code Execution. This occurs because it is possible to plant executables in the startup folder (DLL planting could also occur).

CVSS3: 9.8
4%
Низкий
больше 3 лет назад
github логотип
GHSA-3w46-g3w3-qj67

In Real Player 20.0.7.309 and 20.0.8.310, external::Import() allows download of arbitrary file types and Directory Traversal, leading to Remote Code Execution. This occurs because it is possible to plant executables in the startup folder (DLL planting could also occur).

CVSS3: 9.8
4%
Низкий
больше 3 лет назад

Уязвимостей на страницу