9.3
CVE-2011-4257
- EPSS 2.76%
- Veröffentlicht 24.11.2011 11:55:08
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
The Cook codec in RealNetworks RealPlayer before 15.0.0 allows remote attackers to execute arbitrary code via crafted channel data.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Realnetworks ≫ Realplayer Version <= 14.0.7
Realnetworks ≫ Realplayer Version4
Realnetworks ≫ Realplayer Version5
Realnetworks ≫ Realplayer Version6
Realnetworks ≫ Realplayer Version7
Realnetworks ≫ Realplayer Version8
Realnetworks ≫ Realplayer Version10.0
Realnetworks ≫ Realplayer Version10.5
Realnetworks ≫ Realplayer Version11.0
Realnetworks ≫ Realplayer Version11.0.1
Realnetworks ≫ Realplayer Version11.0.2
Realnetworks ≫ Realplayer Version11.0.2.1744
Realnetworks ≫ Realplayer Version11.0.2.2315
Realnetworks ≫ Realplayer Version11.0.3
Realnetworks ≫ Realplayer Version11.0.4
Realnetworks ≫ Realplayer Version11.0.5
Realnetworks ≫ Realplayer Version11.1
Realnetworks ≫ Realplayer Version11.1.3
Realnetworks ≫ Realplayer Version11_build_6.0.14.748
Realnetworks ≫ Realplayer Version12.0.0.1444
Realnetworks ≫ Realplayer Version12.0.0.1548
Realnetworks ≫ Realplayer Version14.0.0
Realnetworks ≫ Realplayer Version14.0.1
Realnetworks ≫ Realplayer Version14.0.1.609
Realnetworks ≫ Realplayer Version14.0.1.633
Realnetworks ≫ Realplayer Version14.0.2
Realnetworks ≫ Realplayer Version14.0.3
Realnetworks ≫ Realplayer Version14.0.4
Realnetworks ≫ Realplayer Version14.0.5
Realnetworks ≫ Realplayer Version14.0.6
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 2.76% | 0.854 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 9.3 | 8.6 | 10 |
AV:N/AC:M/Au:N/C:C/I:C/A:C
|
CWE-94 Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.