2.6
CVE-2005-0190
- EPSS 3.11%
- Veröffentlicht 29.09.2004 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
Directory traversal vulnerability in RealPlayer 10.5 (6.0.12.1040) and earlier allows remote attackers to delete arbitrary files via a Real Metadata Packages (RMP) file with a FILENAME tag containing .. (dot dot) sequences in a filename that ends with a ? (question mark) and an allowed file extension (e.g. .mp3), which bypasses the check for the file extension.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Realnetworks ≫ Realone Player Version1.0
Realnetworks ≫ Realone Player Version2.0
Realnetworks ≫ Realplayer Version10.0 Langen
Realnetworks ≫ Realplayer Version10.0 Langja
Realnetworks ≫ Realplayer Version10.0 Editionde
Realnetworks ≫ Realplayer Version10.0_6.0.12.690
Realnetworks ≫ Realplayer Version10.0_beta
Realnetworks ≫ Realplayer Version10.5
Realnetworks ≫ Realplayer Version10.5_6.0.12.1016_beta
Realnetworks ≫ Realplayer Version10.5_6.0.12.1040
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 3.11% | 0.856 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 2.6 | 4.9 | 2.9 |
AV:N/AC:H/Au:N/C:N/I:P/A:N
|