Total vulnerabilities in the database
The OpenURLInDefaultBrowser method in RealNetworks RealPlayer 11.0 through 11.1 and 14.0.0 through 14.0.2, and RealPlayer SP 1.0 through 1.1.5, launches a default handler for the filename specified in the first argument, which allows remote attackers to execute arbitrary code via a .rnx filename corresponding to a crafted RNX file.
Software | From | Fixed in |
---|---|---|
realnetworks / realplayer | 11.0 | 11.0.x |
realnetworks / realplayer | 11.1 | 11.1.x |
realnetworks / realplayer | 14.0.1 | 14.0.1.x |
realnetworks / realplayer | 14.0.2 | 14.0.2.x |
realnetworks / realplayer | 14.0.0 | 14.0.0.x |
realnetworks / realplayer_sp | 1.0.1 | 1.0.1.x |
realnetworks / realplayer_sp | 1.1.5 | 1.1.5.x |
realnetworks / realplayer_sp | 1.1.3 | 1.1.3.x |
realnetworks / realplayer_sp | 1.0.0 | 1.0.0.x |
realnetworks / realplayer_sp | 1.0.2 | 1.0.2.x |
realnetworks / realplayer_sp | 1.1 | 1.1.x |
realnetworks / realplayer_sp | 1.1.2 | 1.1.2.x |
realnetworks / realplayer_sp | 1.1.4 | 1.1.4.x |
realnetworks / realplayer_sp | 1.1.1 | 1.1.1.x |
realnetworks / realplayer_sp | 1.0.5 | 1.0.5.x |