Show plain JSON{"containers": {"cna": {"affected": [{"product": "n/a", "vendor": "n/a", "versions": [{"status": "affected", "version": "n/a"}]}], "datePublic": "2007-10-25T00:00:00", "descriptions": [{"lang": "en", "value": "Heap-based buffer overflow in RealNetworks RealPlayer 10.0, 10.1, and possibly 10.5, RealOne Player, and RealPlayer Enterprise allows remote attackers to execute arbitrary code via an SWF (Flash) file with malformed record headers."}], "problemTypes": [{"descriptions": [{"description": "n/a", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre"}, "references": [{"tags": ["x_refsource_CONFIRM"], "url": "http://service.real.com/realplayer/security/10252007_player/en/"}, {"tags": ["x_refsource_MISC"], "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-061.html"}, {"name": "38344", "tags": ["vdb-entry", "x_refsource_OSVDB"], "url": "http://osvdb.org/38344"}, {"name": "realplayer-swf-bo(37436)", "tags": ["vdb-entry", "x_refsource_XF"], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37436"}, {"name": "oval:org.mitre.oval:def:11432", "tags": ["vdb-entry", "signature", "x_refsource_OVAL"], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11432"}, {"name": "20071031 ZDI-07-061: RealNetworks RealPlayer SWF Processing Remote Code Execution Vulnerability", "tags": ["mailing-list", "x_refsource_BUGTRAQ"], "url": "http://www.securityfocus.com/archive/1/483110/100/0/threaded"}, {"name": "1018866", "tags": ["vdb-entry", "x_refsource_SECTRACK"], "url": "http://www.securitytracker.com/id?1018866"}, {"name": "20071030 RealPlayer Updates of October 25, 2007", "tags": ["mailing-list", "x_refsource_VIM"], "url": "http://www.attrition.org/pipermail/vim/2007-October/001841.html"}, {"name": "ADV-2007-3628", "tags": ["vdb-entry", "x_refsource_VUPEN"], "url": "http://www.vupen.com/english/advisories/2007/3628"}, {"name": "26284", "tags": ["vdb-entry", "x_refsource_BID"], "url": "http://www.securityfocus.com/bid/26284"}, {"name": "27361", "tags": ["third-party-advisory", "x_refsource_SECUNIA"], "url": "http://secunia.com/advisories/27361"}, {"name": "26214", "tags": ["vdb-entry", "x_refsource_BID"], "url": "http://www.securityfocus.com/bid/26214"}], "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-2263", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "n/a", "version": {"version_data": [{"version_value": "n/a"}]}}]}, "vendor_name": "n/a"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "Heap-based buffer overflow in RealNetworks RealPlayer 10.0, 10.1, and possibly 10.5, RealOne Player, and RealPlayer Enterprise allows remote attackers to execute arbitrary code via an SWF (Flash) file with malformed record headers."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "n/a"}]}]}, "references": {"reference_data": [{"name": "http://service.real.com/realplayer/security/10252007_player/en/", "refsource": "CONFIRM", "url": "http://service.real.com/realplayer/security/10252007_player/en/"}, {"name": "http://www.zerodayinitiative.com/advisories/ZDI-07-061.html", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-061.html"}, {"name": "38344", "refsource": "OSVDB", "url": "http://osvdb.org/38344"}, {"name": "realplayer-swf-bo(37436)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37436"}, {"name": "oval:org.mitre.oval:def:11432", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11432"}, {"name": "20071031 ZDI-07-061: RealNetworks RealPlayer SWF Processing Remote Code Execution Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/483110/100/0/threaded"}, {"name": "1018866", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018866"}, {"name": "20071030 RealPlayer Updates of October 25, 2007", "refsource": "VIM", "url": "http://www.attrition.org/pipermail/vim/2007-October/001841.html"}, {"name": "ADV-2007-3628", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3628"}, {"name": "26284", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26284"}, {"name": "27361", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27361"}, {"name": "26214", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26214"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-07T13:33:28.289Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "http://service.real.com/realplayer/security/10252007_player/en/"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-061.html"}, {"name": "38344", "tags": ["vdb-entry", "x_refsource_OSVDB", "x_transferred"], "url": "http://osvdb.org/38344"}, {"name": "realplayer-swf-bo(37436)", "tags": ["vdb-entry", "x_refsource_XF", "x_transferred"], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37436"}, {"name": "oval:org.mitre.oval:def:11432", "tags": ["vdb-entry", "signature", "x_refsource_OVAL", "x_transferred"], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11432"}, {"name": "20071031 ZDI-07-061: RealNetworks RealPlayer SWF Processing Remote Code Execution Vulnerability", "tags": ["mailing-list", "x_refsource_BUGTRAQ", "x_transferred"], "url": "http://www.securityfocus.com/archive/1/483110/100/0/threaded"}, {"name": "1018866", "tags": ["vdb-entry", "x_refsource_SECTRACK", "x_transferred"], "url": "http://www.securitytracker.com/id?1018866"}, {"name": "20071030 RealPlayer Updates of October 25, 2007", "tags": ["mailing-list", "x_refsource_VIM", "x_transferred"], "url": "http://www.attrition.org/pipermail/vim/2007-October/001841.html"}, {"name": "ADV-2007-3628", "tags": ["vdb-entry", "x_refsource_VUPEN", "x_transferred"], "url": "http://www.vupen.com/english/advisories/2007/3628"}, {"name": "26284", "tags": ["vdb-entry", "x_refsource_BID", "x_transferred"], "url": "http://www.securityfocus.com/bid/26284"}, {"name": "27361", "tags": ["third-party-advisory", "x_refsource_SECUNIA", "x_transferred"], "url": "http://secunia.com/advisories/27361"}, {"name": "26214", "tags": ["vdb-entry", "x_refsource_BID", "x_transferred"], "url": "http://www.securityfocus.com/bid/26214"}]}]}, "cveMetadata": {"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-2263", "datePublished": "2007-10-31T17:00:00", "dateReserved": "2007-04-25T00:00:00", "dateUpdated": "2024-08-07T13:33:28.289Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}