René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

227 lines
8.0 KiB
JSON

{
"id": "CVE-2011-1221",
"sourceIdentifier": "cve@mitre.org",
"published": "2011-10-04T22:55:01.270",
"lastModified": "2012-05-14T04:00:00.000",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross-zone scripting vulnerability in the RealPlayer ActiveX control in RealNetworks RealPlayer 11.0 through 11.1 and 14.0.0 through 14.0.5, RealPlayer SP 1.0 through 1.1.5, and RealPlayer Enterprise 2.0 through 2.1.5 allows remote attackers to inject arbitrary web script or HTML in the Local Zone via a local HTML document, a different vulnerability than CVE-2011-2947."
},
{
"lang": "es",
"value": "Vulnerabilidad de scripting a trav\u00e9s de zonas (cross-zone scripting) en el control ActiveX RealPlayer de RealNetworks RealPlayer 11.0 hasta la 11.1 y 14.0.0 hasta la 14.0.5, RealPlayer SP 1.0 hasta la 1.1.5, y RealPlayer Enterprise 2.0 hasta la 2.1.5. Permite a atacantes remotos inyectar c\u00f3digo script web arbitrario o HTML en la zona local a trav\u00e9s de un documento HTML. Una vulnerabilidad distinta a la CVE-2011-2947."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A8985B3B-BCC9-431D-9788-0C1949DF46E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D03738C3-D659-488D-B285-64A496C0F1FB"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E70D263C-820C-4399-9215-D69082024287"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6F6486B4-AEDB-428C-9F10-A494681577D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D825DDF3-5D19-403E-8990-58521314E99B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "27B4A01C-B07A-4879-926B-8C5F272F5662"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F9EA3EBA-DDB3-4C2E-BC78-9225E4D65C6E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:14.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9FEB9795-829C-4F2A-A796-EF0025E993F4"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8BFD9C4F-E93B-4BCE-A5E2-A20945EB8534"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5BBEBAA2-4892-4F9E-8C0E-94CA90DCD28D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "53D7AE43-A3AC-4B38-B0A3-E6F02834224F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "59FEDCDF-9FBF-4D08-A50F-FF92763DFC21"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "54A11B3A-547C-4F2F-A58E-DE06DBBE8115"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C7243D80-913D-405C-9988-B8473DB1A5DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D4C6D399-FF31-441D-A363-BD53CFE5569A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9818A6FB-2CF5-4236-8EFE-95458D603CC1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "73CC0582-D889-4907-A32E-218AC2B0591F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer_sp:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B5DD6CF-CCC7-40DD-A6CA-B9BBC339998F"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:2.0:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "58276A5F-A6A2-470F-9739-878B7785C3E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:2.1:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "DD715D54-D760-4BE9-ABDD-4F0A2279A76F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:2.1.2:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "1E2BC096-43B6-4696-8467-CC3D0163EFF5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:2.1.3:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "3A29D4B9-DD00-43F6-ACEA-B830FDFC1E5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:2.1.4:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "320D3DA6-DD8C-4423-84E5-55906D47BD6B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:realnetworks:realplayer:2.1.5:*:enterprise:*:*:*:*:*",
"matchCriteriaId": "CBE40E84-0053-4173-A60F-53979881E41F"
}
]
}
]
}
],
"references": [
{
"url": "http://service.real.com/realplayer/security/08162011_player/en/",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}