Vulnerability Details CVE-2011-1426
The OpenURLInDefaultBrowser method in RealNetworks RealPlayer 11.0 through 11.1 and 14.0.0 through 14.0.2, and RealPlayer SP 1.0 through 1.1.5, launches a default handler for the filename specified in the first argument, which allows remote attackers to execute arbitrary code via a .rnx filename corresponding to a crafted RNX file.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.044
EPSS Ranking 88.3%
CVSS Severity
CVSS v2 Score 9.3
Products affected by CVE-2011-1426
-
cpe:2.3:a:realnetworks:realplayer:11.0
-
cpe:2.3:a:realnetworks:realplayer:11.1
-
cpe:2.3:a:realnetworks:realplayer:14.0.0
-
cpe:2.3:a:realnetworks:realplayer:14.0.1
-
cpe:2.3:a:realnetworks:realplayer:14.0.2
-
cpe:2.3:a:realnetworks:realplayer_sp:1.0.0
-
cpe:2.3:a:realnetworks:realplayer_sp:1.0.1
-
cpe:2.3:a:realnetworks:realplayer_sp:1.0.2
-
cpe:2.3:a:realnetworks:realplayer_sp:1.0.5
-
cpe:2.3:a:realnetworks:realplayer_sp:1.1
-
cpe:2.3:a:realnetworks:realplayer_sp:1.1.1
-
cpe:2.3:a:realnetworks:realplayer_sp:1.1.2
-
cpe:2.3:a:realnetworks:realplayer_sp:1.1.3
-
cpe:2.3:a:realnetworks:realplayer_sp:1.1.4
-
cpe:2.3:a:realnetworks:realplayer_sp:1.1.5