Page 14 of 69 results (0.005 seconds)

CVSS: 5.1EPSS: 79%CPEs: 1EXPL: 0

Heap-based buffer overflow in rtffplin.cpp in RealPlayer 10.5 6.0.12.1056 on Windows, and 10, 10.0.1.436, and other versions before 10.0.5 on Linux, allows remote attackers to execute arbitrary code via a RealMedia file with a long RealText string, such as an SMIL file. • http://secunia.com/advisories/16981 http://service.real.com/help/faq/security/050623_player/EN http://www.debian.org/security/2005/dsa-826 http://www.idefense.com/application/poi/display?id=250&type=vulnerabilities&flashstatus=true http://www.novell.com/linux/security/advisories/2005_37_real_player.html http://www.redhat.com/support/errata/RHSA-2005-517.html http://www.redhat.com/support/errata/RHSA-2005-523.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg. •

CVSS: 7.5EPSS: 4%CPEs: 5EXPL: 0

Multiple buffer overflows in RealOne and RealPlayer allow remote attackers to execute arbitrary code via (1) a Synchronized Multimedia Integration Language (SMIL) file with a long parameter, (2) a long long filename in a rtsp:// request, e.g. from a .m3u file, or (3) certain "Now Playing" options on a downloaded file with a long filename. Mültiples desbordamientos de búfer en RealOne y RealPlayer permite a atacantes remotos ejecutar código arbitrario mediante un fichero de Lenguaje de Integración Multimedia Sincronizada (SMIL) con un parámetro largo. un nombre de fichero largo en una petición rtsp://, por ejemplo un fichero. m3u, o Ciertas opciones "Now Playing" (Reproduciendo Ahora) en un fichero descargado con un nombre de fichero largo. • http://marc.info/?l=bugtraq&m=103808645120764&w=2 http://service.real.com/help/faq/security/bufferoverrun_player.html http://www.securityfocus.com/bid/6227 http://www.securityfocus.com/bid/6229 https://exchange.xforce.ibmcloud.com/vulnerabilities/10677 •

CVSS: 1.7EPSS: 0%CPEs: 1EXPL: 0

Directory traversal vulnerability in the web server used in RealPlayer 6.0.7, and possibly other versions, may allow local users to read files that are accessible to RealPlayer via a .. (dot dot) in an HTTP GET request to port 1275. • http://www.iss.net/security_center/static/8336.php http://www.securityfocus.com/archive/1/259333 http://www.securityfocus.com/bid/4221 •

CVSS: 2.6EPSS: 0%CPEs: 2EXPL: 3

Buffer overflow in the RealNetworks RealPlayer client versions 6 and 7 allows remote attackers to cause a denial of service via a long Location URL. • https://www.exploit-db.com/exploits/19834 http://archives.neohapsis.com/archives/bugtraq/2000-04/0018.html http://www.securityfocus.com/bid/1088 •