In Real Player through 20.1.0.312, attackers can execute arbitrary code by placing a UNC share pathname (for a DLL file) in a RAM file.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/Edubr2020/RP_RecordClip_DLL_Hijack |
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2022-06-05T21:23:45
Updated: 2024-08-03T07:39:50.541Z
Reserved: 2022-06-05T00:00:00
Link: CVE-2022-32291
Vulnrichment
No data.
NVD
Status : Modified
Published: 2022-06-05T22:15:08.680
Modified: 2024-11-21T07:06:06.937
Link: CVE-2022-32291
Redhat
No data.