CVE-2010-4388
14.12.2010, 16:00
The (1) Upsell.htm, (2) Main.html, and (3) Custsupport.html components in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.1.5, and RealPlayer Enterprise 2.1.2 and 2.1.3 allow remote attackers to inject code into the RealOneActiveXObject process, and consequently bypass intended Local Machine Zone restrictions and load arbitrary ActiveX controls, via unspecified vectors.Enginsight
Vendor | Product | Version |
---|---|---|
realnetworks | realplayer | 11.0 |
realnetworks | realplayer | 11.0.1 |
realnetworks | realplayer | 11.0.2 |
realnetworks | realplayer | 11.0.3 |
realnetworks | realplayer | 11.0.4 |
realnetworks | realplayer | 11.0.5 |
realnetworks | realplayer | 11.1 |
realnetworks | realplayer_sp | 1.0.0 |
realnetworks | realplayer_sp | 1.0.1 |
realnetworks | realplayer_sp | 1.0.2 |
realnetworks | realplayer_sp | 1.0.5 |
realnetworks | realplayer_sp | 1.1 |
realnetworks | realplayer_sp | 1.1.1 |
realnetworks | realplayer_sp | 1.1.2 |
realnetworks | realplayer_sp | 1.1.3 |
realnetworks | realplayer_sp | 1.1.4 |
realnetworks | realplayer_sp | 1.1.5 |
realnetworks | realplayer | 2.1.2 |
realnetworks | realplayer | 2.1.3 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References