CVE-2003-0726
Gravedad CVSS v2.0:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
20/10/2003
Última modificación:
03/04/2025
Descripción
*** Pendiente de traducción *** RealOne player allows remote attackers to execute arbitrary script in the "My Computer" zone via a SMIL presentation with a URL that references a scripting protocol, which is executed in the security context of the previously loaded URL, as demonstrated using a "javascript:" URL in the area tag.
Impacto
Puntuación base 2.0
5.10
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:realnetworks:realone_desktop_manager:*:*:*:*:*:*:*:* | ||
cpe:2.3:a:realnetworks:realone_enterprise_desktop:6.0.11.774:*:*:*:*:*:*:* | ||
cpe:2.3:a:realnetworks:realone_player:2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:realnetworks:realone_player:6.0.10.505:gold:*:*:*:*:*:* | ||
cpe:2.3:a:realnetworks:realone_player:6.0.11.818:*:*:*:*:*:*:* | ||
cpe:2.3:a:realnetworks:realone_player:6.0.11.830:*:*:*:*:*:*:* | ||
cpe:2.3:a:realnetworks:realone_player:6.0.11.841:*:*:*:*:*:*:* | ||
cpe:2.3:a:realnetworks:realone_player:6.0.11.853:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://securitytracker.com/id?1007532=
- http://www.digitalpranksters.com/advisories/realnetworks/smilscriptprotocol.html
- http://www.securityfocus.com/archive/1/335293
- http://www.securityfocus.com/bid/8453
- http://www.service.real.com/help/faq/security/securityupdate_august2003.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/13028
- http://securitytracker.com/id?1007532=
- http://www.digitalpranksters.com/advisories/realnetworks/smilscriptprotocol.html
- http://www.securityfocus.com/archive/1/335293
- http://www.securityfocus.com/bid/8453
- http://www.service.real.com/help/faq/security/securityupdate_august2003.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/13028