CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:H/Au:N/C:N/I:P/A:N
AI Score
Confidence
Low
EPSS
Percentile
72.4%
Directory traversal vulnerability in RealPlayer 10.5 (6.0.12.1040) and earlier allows remote attackers to delete arbitrary files via a Real Metadata Packages (RMP) file with a FILENAME tag containing … (dot dot) sequences in a filename that ends with a ? (question mark) and an allowed file extension (e.g. .mp3), which bypasses the check for the file extension.
Vendor | Product | Version | CPE |
---|---|---|---|
realnetworks | realone_player | 1.0 | cpe:2.3:a:realnetworks:realone_player:1.0:*:*:*:*:*:*:* |
realnetworks | realone_player | 2.0 | cpe:2.3:a:realnetworks:realone_player:2.0:*:*:*:*:*:*:* |
realnetworks | realplayer | 10.0 | cpe:2.3:a:realnetworks:realplayer:10.0:*:*:en:*:*:*:* |
realnetworks | realplayer | 10.0 | cpe:2.3:a:realnetworks:realplayer:10.0:*:*:ja:*:*:*:* |
realnetworks | realplayer | 10.0 | cpe:2.3:a:realnetworks:realplayer:10.0:*:de:*:*:*:*:* |
realnetworks | realplayer | 10.0_6.0.12.690 | cpe:2.3:a:realnetworks:realplayer:10.0_6.0.12.690:*:*:*:*:*:*:* |
realnetworks | realplayer | 10.0_beta | cpe:2.3:a:realnetworks:realplayer:10.0_beta:*:*:*:*:*:*:* |
realnetworks | realplayer | 10.5 | cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:* |
realnetworks | realplayer | 10.5_6.0.12.1016_beta | cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1016_beta:*:*:*:*:*:*:* |
realnetworks | realplayer | 10.5_6.0.12.1040 | cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1040:*:*:*:*:*:*:* |