104 lines
3.1 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2005-2055",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-06-29T04:00:00.000",
"lastModified": "2008-09-05T20:50:45.853",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "RealPlayer 8, 10, 10.5 (6.0.12.1040-1069), and Enterprise and RealOne Player v1 and v2 allows remote malicious web server to create an arbitrary HTML file that executes an RM file via \"default settings of earlier Internet Explorer browsers\"."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realone_player:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7E940DAB-0CD5-4EC0-916F-6C0B2AE26D19"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realone_player:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF6535A6-6647-4E60-B5AA-24DFC06360AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:*:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "19BC5A59-BCBD-4859-8329-B4974D43DB90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4E6051B4-1B15-44C0-B2CD-5504E68C60F2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CD49D16C-B0AC-4228-9984-010661596232"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1040_1069:*:*:*:*:*:*:*",
"matchCriteriaId": "3A0BE7CF-D281-46F7-90B5-B469BE10E9A8"
}
]
}
]
}
],
"references": [
{
"url": "http://service.real.com/help/faq/security/050623_player/EN/",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}