漏洞标题
N/A
漏洞描述信息
RealNetworks的RealPlayer 11.0 through 11.1,SP 1.0 through 1.1.5,以及14.0.0 through 14.0.1和Enterprise 2.0 through 2.1.4,使用了可预测的名称来存储临时文件,这允许远程攻击者通过PlayerBrowser函数执行任意代码进行跨域脚本攻击。
CVSS信息
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
漏洞类别
N/A
漏洞标题
N/A
漏洞描述信息
RealNetworks RealPlayer 11.0 through 11.1, SP 1.0 through 1.1.5, and 14.0.0 through 14.0.1, and Enterprise 2.0 through 2.1.4, uses predictable names for temporary files, which allows remote attackers to conduct cross-domain scripting attacks and execute arbitrary code via the OpenURLinPlayerBrowser function.
CVSS信息
N/A
漏洞类别
N/A
漏洞标题
Real Networks RealPlayer远程代码执行漏洞
漏洞描述信息
RealPlayer是一款流行的多媒体播放器。 RealPlayer的"OpenURLinPlayerBrowser"方法在实现上存在远程代码执行漏洞,远程攻击者可利用此漏洞在受影响浏览器中执行任意代码。
CVSS信息
N/A
漏洞类别
其他