First published: Tue Dec 14 2010(Updated: )
The (1) Upsell.htm, (2) Main.html, and (3) Custsupport.html components in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.5, and RealPlayer Enterprise 2.1.2 and 2.1.3 allow remote attackers to inject code into the RealOneActiveXObject process, and consequently bypass intended Local Machine Zone restrictions and load arbitrary ActiveX controls, via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Realnetworks Realplayer | =11.0 | |
Realnetworks Realplayer | =11.0.4 | |
Realnetworks Realplayer | =11.0.2 | |
Realnetworks Realplayer | =11.0.3 | |
Realnetworks Realplayer | =11.0.5 | |
Realnetworks Realplayer | =11.1 | |
Realnetworks Realplayer | =11.0.1 | |
Realnetworks Realplayer Sp | =1.0.1 | |
Realnetworks Realplayer Sp | =1.1.5 | |
Realnetworks Realplayer Sp | =1.1.3 | |
Realnetworks Realplayer Sp | =1.0.0 | |
Realnetworks Realplayer Sp | =1.0.2 | |
Realnetworks Realplayer Sp | =1.1 | |
Realnetworks Realplayer Sp | =1.1.2 | |
Realnetworks Realplayer Sp | =1.1.4 | |
Realnetworks Realplayer Sp | =1.1.1 | |
Realnetworks Realplayer Sp | =1.0.5 | |
Realnetworks Realplayer | =2.1.3 | |
Realnetworks Realplayer | =2.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.