RealNetworks RealPlayer 11.0 through 11.1, SP 1.0 through 1.1.5, and 14.0.0 through 14.0.1, and Enterprise 2.0 through 2.1.4, uses predictable names for temporary files, which allows remote attackers to conduct cross-domain scripting attacks and execute arbitrary code via the OpenURLinPlayerBrowser function.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 01:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://docs.real.com/docs/security/SecurityUpdate020811RPE.pdf - Vendor Advisory | |
References | () http://osvdb.org/70849 - | |
References | () http://secunia.com/advisories/43268 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/8098 - | |
References | () http://service.real.com/realplayer/security/02082011_player/en/ - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/516318/100/0/threaded - | |
References | () http://www.securitytracker.com/id?1025058 - | |
References | () http://www.zerodayinitiative.com/advisories/ZDI-11-076 - |
Information
Published : 2011-02-21 18:00
Updated : 2024-11-21 01:24
NVD link : CVE-2011-0694
Mitre link : CVE-2011-0694
CVE.ORG link : CVE-2011-0694
JSON object : View
Products Affected
realnetworks
- realplayer_sp
- realplayer
CWE