First published: Fri Jun 03 2022(Updated: )
In Real Player 20.0.8.310, the G2 Control allows injection of unsafe javascript: URIs in local HTTP error pages (displayed by Internet Explorer core). This leads to arbitrary code execution.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RealPlayer | =20.0.8.310 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-32269 has been classified as a critical vulnerability due to its potential for arbitrary code execution.
To mitigate CVE-2022-32269, upgrade RealPlayer to the latest version that addresses this vulnerability.
CVE-2022-32269 allows attackers to execute arbitrary code on affected systems through unsafe JavaScript injections.
CVE-2022-32269 specifically affects RealPlayer version 20.0.8.310.
No, using RealPlayer version 20.0.8.310 is not safe due to the critical vulnerabilities present in that version.