mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-28 09:12:00 +00:00
97 lines
3.3 KiB
JSON
97 lines
3.3 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2011-0694",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "RealNetworks RealPlayer 11.0 through 11.1, SP 1.0 through 1.1.5, and 14.0.0 through 14.0.1, and Enterprise 2.0 through 2.1.4, uses predictable names for temporary files, which allows remote attackers to conduct cross-domain scripting attacks and execute arbitrary code via the OpenURLinPlayerBrowser function."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "70849",
|
|
"refsource": "OSVDB",
|
|
"url": "http://osvdb.org/70849"
|
|
},
|
|
{
|
|
"name": "http://service.real.com/realplayer/security/02082011_player/en/",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://service.real.com/realplayer/security/02082011_player/en/"
|
|
},
|
|
{
|
|
"name": "8098",
|
|
"refsource": "SREASON",
|
|
"url": "http://securityreason.com/securityalert/8098"
|
|
},
|
|
{
|
|
"name": "http://docs.real.com/docs/security/SecurityUpdate020811RPE.pdf",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://docs.real.com/docs/security/SecurityUpdate020811RPE.pdf"
|
|
},
|
|
{
|
|
"name": "http://www.zerodayinitiative.com/advisories/ZDI-11-076",
|
|
"refsource": "MISC",
|
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-11-076"
|
|
},
|
|
{
|
|
"name": "43268",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/43268"
|
|
},
|
|
{
|
|
"name": "1025058",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://www.securitytracker.com/id?1025058"
|
|
},
|
|
{
|
|
"name": "20110208 ZDI-11-076: RealNetworks Real Player Predictable Temporary File Remote Code Execution Vulnerability",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/516318/100/0/threaded"
|
|
}
|
|
]
|
|
}
|
|
} |