Логотип exploitDog
bind:CVE-2022-32271
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-32271

Количество 2

Количество 2

nvd логотип

CVE-2022-32271

больше 3 лет назад

In Real Player 20.0.8.310, there is a DCP:// URI Remote Arbitrary Code Execution Vulnerability. This is an internal URL Protocol used by Real Player to reference a file that contains an URL. It is possible to inject script code to arbitrary domains. It is also possible to reference arbitrary local files.

CVSS3: 9.6
EPSS: Низкий
github логотип

GHSA-c794-99vm-w4j9

больше 3 лет назад

In Real Player 20.0.8.310, there is a DCP:// URI Remote Arbitrary Code Execution Vulnerability. This is an internal URL Protocol used by Real Player to reference a file that contains an URL. It is possible to inject script code to arbitrary domains. It is also possible to reference arbitrary local files.

CVSS3: 9.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-32271

In Real Player 20.0.8.310, there is a DCP:// URI Remote Arbitrary Code Execution Vulnerability. This is an internal URL Protocol used by Real Player to reference a file that contains an URL. It is possible to inject script code to arbitrary domains. It is also possible to reference arbitrary local files.

CVSS3: 9.6
3%
Низкий
больше 3 лет назад
github логотип
GHSA-c794-99vm-w4j9

In Real Player 20.0.8.310, there is a DCP:// URI Remote Arbitrary Code Execution Vulnerability. This is an internal URL Protocol used by Real Player to reference a file that contains an URL. It is possible to inject script code to arbitrary domains. It is also possible to reference arbitrary local files.

CVSS3: 9.6
3%
Низкий
больше 3 лет назад

Уязвимостей на страницу