9.3

CVE-2012-0927

Unspecified vulnerability in RealNetworks RealPlayer 11.x, 14.x, and 15.x before 15.02.71, and RealPlayer SP 1.0 through 1.1.5, allows remote attackers to execute arbitrary code via vectors involving the coded_frame_size value in a RealAudio audio stream.

Data is provided by the National Vulnerability Database (NVD)
RealnetworksRealplayer Version14.0.0
RealnetworksRealplayer Version14.0.1
RealnetworksRealplayer Version14.0.1.609
RealnetworksRealplayer Version14.0.1.633
RealnetworksRealplayer Version14.0.2
RealnetworksRealplayer Version14.0.3
RealnetworksRealplayer Version14.0.4
RealnetworksRealplayer Version14.0.5
RealnetworksRealplayer Version14.0.6
RealnetworksRealplayer Version14.0.7
RealnetworksRealplayer Version11.0
RealnetworksRealplayer Version11.0.1
RealnetworksRealplayer Version11.0.2
RealnetworksRealplayer Version11.0.2.1744
RealnetworksRealplayer Version11.0.2.2315
RealnetworksRealplayer Version11.0.3
RealnetworksRealplayer Version11.0.4
RealnetworksRealplayer Version11.0.5
RealnetworksRealplayer Version11.1
RealnetworksRealplayer Version11.1.3
RealnetworksRealplayer Version11_build_6.0.14.748
RealnetworksRealplayer Version15.0.0
RealnetworksRealplayer Version15.0.1.13
RealnetworksRealplayer Sp Version1.0.0
RealnetworksRealplayer Sp Version1.0.1
RealnetworksRealplayer Sp Version1.0.2
RealnetworksRealplayer Sp Version1.0.5
RealnetworksRealplayer Sp Version1.1
RealnetworksRealplayer Sp Version1.1.1
RealnetworksRealplayer Sp Version1.1.2
RealnetworksRealplayer Sp Version1.1.3
RealnetworksRealplayer Sp Version1.1.4
RealnetworksRealplayer Sp Version1.1.5
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 2.77% 0.854
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE-94 Improper Control of Generation of Code ('Code Injection')

The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.