First published: Mon Feb 21 2011(Updated: )
RealNetworks RealPlayer 11.0 through 11.1, SP 1.0 through 1.1.5, and 14.0.0 through 14.0.1, and Enterprise 2.0 through 2.1.4, uses predictable names for temporary files, which allows remote attackers to conduct cross-domain scripting attacks and execute arbitrary code via the OpenURLinPlayerBrowser function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Realnetworks Realplayer | =11.0 | |
Realnetworks Realplayer | =11.1 | |
Realnetworks Realplayer | =14.0.0 | |
Realnetworks Realplayer | =14.0.1 | |
Realnetworks Realplayer Sp | =1.0.0 | |
Realnetworks Realplayer Sp | =1.0.1 | |
Realnetworks Realplayer Sp | =1.0.2 | |
Realnetworks Realplayer Sp | =1.0.5 | |
Realnetworks Realplayer Sp | =1.1 | |
Realnetworks Realplayer Sp | =1.1.1 | |
Realnetworks Realplayer Sp | =1.1.2 | |
Realnetworks Realplayer Sp | =1.1.3 | |
Realnetworks Realplayer Sp | =1.1.4 | |
Realnetworks Realplayer Sp | =1.1.5 | |
Realnetworks Realplayer | =2.0 | |
Realnetworks Realplayer | =2.1 | |
Realnetworks Realplayer | =2.1.2 | |
Realnetworks Realplayer | =2.1.3 | |
Realnetworks Realplayer | =2.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.