Page 15 of 74 results (0.005 seconds)

CVSS: 2.6EPSS: 0%CPEs: 10EXPL: 0

Directory traversal vulnerability in RealPlayer 10.5 (6.0.12.1040) and earlier allows remote attackers to delete arbitrary files via a Real Metadata Packages (RMP) file with a FILENAME tag containing .. (dot dot) sequences in a filename that ends with a ? (question mark) and an allowed file extension (e.g. .mp3), which bypasses the check for the file extension. • http://marc.info/?l=bugtraq&m=109707741022291&w=2 http://marc.info/?l=bugtraq&m=110616160228843&w=2 http://secunia.com/advisories/12672 http://service.real.com/help/faq/security/040928_player/EN http://www.ngssoftware.com/advisories/real-02full.txt http://www.securityfocus.com/bid/11308 https://exchange.xforce.ibmcloud.com/vulnerabilities/17551 •

CVSS: 7.6EPSS: 13%CPEs: 14EXPL: 0

Multiple buffer overflows in RealOne Player, RealOne Player 2.0, RealOne Enterprise Desktop, and RealPlayer Enterprise allow remote attackers to execute arbitrary code via malformed (1) .RP, (2) .RT, (3) .RAM, (4) .RPM or (5) .SMIL files. Múltiples desbordamientos de búfer en RealOne Player, RealOne Player 2.0, RealOne Enterprise Desktop, y RealPlayer Enterprise permiten a atacantes remotos ejecutar código de su elección mediante ficheros 1) .RP, (2) .RT, (3) .RAM, (4) .RPM o (5) .SMIL malformados. • http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0027.html http://marc.info/?l=bugtraq&m=107608748813559&w=2 http://www.ciac.org/ciac/bulletins/o-075.shtml http://www.kb.cert.org/vuls/id/473814 http://www.nextgenss.com/advisories/realone.txt http://www.securityfocus.com/bid/9579 http://www.service.real.com/help/faq/security/040123_player/EN https://exchange.xforce.ibmcloud.com/vulnerabilities/15040 •

CVSS: 5.1EPSS: 0%CPEs: 10EXPL: 0

The PNG deflate algorithm in RealOne Player 6.0.11.x and earlier, RealPlayer 8/RealPlayer Plus 8 6.0.9.584, and other versions allows remote attackers to corrupt the heap and overwrite arbitrary memory via a PNG graphic file format containing compressed data using fixed trees that contain the length values 286-287, which are treated as a very large length. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0156.html http://marc.info/?l=bugtraq&m=104887465427579&w=2 http://www.coresecurity.com/common/showdoc.php?idx=311&idxseccion=10 http://www.kb.cert.org/vuls/id/705761 http://www.securityfocus.com/bid/7177 •

CVSS: 7.5EPSS: 4%CPEs: 5EXPL: 0

Multiple buffer overflows in RealOne and RealPlayer allow remote attackers to execute arbitrary code via (1) a Synchronized Multimedia Integration Language (SMIL) file with a long parameter, (2) a long long filename in a rtsp:// request, e.g. from a .m3u file, or (3) certain "Now Playing" options on a downloaded file with a long filename. Mültiples desbordamientos de búfer en RealOne y RealPlayer permite a atacantes remotos ejecutar código arbitrario mediante un fichero de Lenguaje de Integración Multimedia Sincronizada (SMIL) con un parámetro largo. un nombre de fichero largo en una petición rtsp://, por ejemplo un fichero. m3u, o Ciertas opciones "Now Playing" (Reproduciendo Ahora) en un fichero descargado con un nombre de fichero largo. • http://marc.info/?l=bugtraq&m=103808645120764&w=2 http://service.real.com/help/faq/security/bufferoverrun_player.html http://www.securityfocus.com/bid/6227 http://www.securityfocus.com/bid/6229 https://exchange.xforce.ibmcloud.com/vulnerabilities/10677 •