{ "schema_version": "1.4.0", "id": "GHSA-vp7h-3q7r-gx68", "modified": "2025-04-09T03:47:57Z", "published": "2022-05-01T18:01:52Z", "aliases": [ "CVE-2007-2264" ], "details": "Heap-based buffer overflow in RealNetworks RealPlayer 8, 10, 10.1, and possibly 10.5; RealOne Player 1 and 2; and RealPlayer Enterprise allows remote attackers to execute arbitrary code via a RAM (.ra or .ram) file with a large size value in the RA header.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2264" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37437" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9100" }, { "type": "WEB", "url": "http://secunia.com/advisories/27361" }, { "type": "WEB", "url": "http://securitytracker.com/id?1018866" }, { "type": "WEB", "url": "http://service.real.com/realplayer/security/10252007_player/en" }, { "type": "WEB", "url": "http://www.attrition.org/pipermail/vim/2007-October/001841.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/483113/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/26214" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/3628" }, { "type": "WEB", "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-063.html" } ], "database_specific": { "cwe_ids": [ "CWE-119" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2007-10-31T17:46:00Z" } }