[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2011-0694Date: (C)2011-02-21   (M)2023-12-22


RealNetworks RealPlayer 11.0 through 11.1, SP 1.0 through 1.1.5, and 14.0.0 through 14.0.1, and Enterprise 2.0 through 2.1.4, uses predictable names for temporary files, which allows remote attackers to conduct cross-domain scripting attacks and execute arbitrary code via the OpenURLinPlayerBrowser function.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 9.3
Exploit Score: 8.6
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECTRACK-1025058
http://www.securityfocus.com/archive/1/516318/100/0/threaded
SECUNIA-43268
OSVDB-70849
SREASON-8098
http://docs.real.com/docs/security/SecurityUpdate020811RPE.pdf
http://service.real.com/realplayer/security/02082011_player/en/
http://www.zerodayinitiative.com/advisories/ZDI-11-076

CPE    17
cpe:/a:realnetworks:realplayer:2.1.2::enterprise
cpe:/a:realnetworks:realplayer:2.1.3::enterprise
cpe:/a:realnetworks:realplayer_sp:1.1
cpe:/a:realnetworks:realplayer:2.1.4::enterprise
...
OVAL    1
oval:org.secpod.oval:def:2243

© SecPod Technologies