CVE-2011-10028
BaseFortify
Publication date: 2025-08-20
Last updated on: 2025-08-22
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| realnetworks | installerdlg | 2.6.0.445 |
| realnetworks | realarcade | 2.6.0.445 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-623 | An ActiveX control is intended for restricted use, but it has been marked as safe-for-scripting. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the RealNetworks RealArcade platform's ActiveX control (InstallerDlg.dll, version 2.6.0.445). It exposes a method named Exec via the StubbyUtil.ProcessMgr COM object, which allows remote attackers to execute arbitrary commands on a victim's Windows machine without proper validation or restrictions.
How can this vulnerability impact me? :
An attacker exploiting this vulnerability can remotely execute arbitrary commands on your Windows machine, potentially leading to unauthorized control, data theft, system compromise, or further malware installation.