mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
94 lines
2.6 KiB
JSON
94 lines
2.6 KiB
JSON
![]() |
{
|
||
|
"CVE_data_meta" : {
|
||
|
"ASSIGNER" : "cve@mitre.org",
|
||
|
"ID" : "CVE-2007-2263",
|
||
|
"STATE" : "PUBLIC"
|
||
|
},
|
||
|
"affects" : {
|
||
|
"vendor" : {
|
||
|
"vendor_data" : [
|
||
|
{
|
||
|
"product" : {
|
||
|
"product_data" : [
|
||
|
{
|
||
|
"product_name" : "n/a",
|
||
|
"version" : {
|
||
|
"version_data" : [
|
||
|
{
|
||
|
"version_value" : "n/a"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"vendor_name" : "n/a"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
},
|
||
|
"data_format" : "MITRE",
|
||
|
"data_type" : "CVE",
|
||
|
"data_version" : "4.0",
|
||
|
"description" : {
|
||
|
"description_data" : [
|
||
|
{
|
||
|
"lang" : "eng",
|
||
|
"value" : "Heap-based buffer overflow in RealNetworks RealPlayer 10.0, 10.1, and possibly 10.5, RealOne Player, and RealPlayer Enterprise allows remote attackers to execute arbitrary code via an SWF (Flash) file with malformed record headers."
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"problemtype" : {
|
||
|
"problemtype_data" : [
|
||
|
{
|
||
|
"description" : [
|
||
|
{
|
||
|
"lang" : "eng",
|
||
|
"value" : "n/a"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"references" : {
|
||
|
"reference_data" : [
|
||
|
{
|
||
|
"url" : "http://www.securityfocus.com/archive/1/archive/1/483110/100/0/threaded"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-07-061.html"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://service.real.com/realplayer/security/10252007_player/en/"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://www.attrition.org/pipermail/vim/2007-October/001841.html"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://www.securityfocus.com/bid/26214"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://www.securityfocus.com/bid/26284"
|
||
|
},
|
||
|
{
|
||
|
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11432"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://www.vupen.com/english/advisories/2007/3628"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://osvdb.org/38344"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://www.securitytracker.com/id?1018866"
|
||
|
},
|
||
|
{
|
||
|
"url" : "http://secunia.com/advisories/27361"
|
||
|
},
|
||
|
{
|
||
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/37436"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
}
|