CVE-2005-2630
https://notcve.org/view.php?id=CVE-2005-2630
Heap-based buffer overflow in DUNZIP32.DLL for RealPlayer 8, 10, and 10.5 and RealOne Player 1 and 2 allows remote attackers to execute arbitrary code via a crafted RealPlayer Skin (RJS) file, a different vulnerability than CVE-2004-1094. • http://marc.info/?l=bugtraq&m=113166519206033&w=2 http://secunia.com/advisories/17514 http://secunia.com/advisories/17860 http://securityreason.com/securityalert/170 http://securitytracker.com/id?1015184 http://securitytracker.com/id?1015185 http://service.real.com/help/faq/security/051110_player/EN http://www.eeye.com/html/research/advisories/AD20051110b.html http://www.osvdb.org/18827 http://www.securityfocus.com/bid/15382 https://exchange.xforce.ibmcloud.com/vulnerabilities/2 •
CVE-2005-2629 – RealNetworks RealOne Player/RealPlayer - '.RM' Local Stack Buffer Overflow
https://notcve.org/view.php?id=CVE-2005-2629
Integer overflow in RealNetworks RealPlayer 8, 10, and 10.5, RealOne Player 1 and 2, and Helix Player 10.0.0 allows remote attackers to execute arbitrary code via an .rm movie file with a large value in the length field of the first data packet, which leads to a stack-based buffer overflow, a different vulnerability than CVE-2004-1481. • https://www.exploit-db.com/exploits/26497 http://marc.info/?l=bugtraq&m=113166476423021&w=2 http://secunia.com/advisories/17514 http://secunia.com/advisories/17559 http://secunia.com/advisories/17860 http://securityreason.com/securityalert/169 http://securitytracker.com/id?1015184 http://securitytracker.com/id?1015185 http://securitytracker.com/id?1015186 http://service.real.com/help/faq/security/051110_player/EN http://www.debian.org/security/2005/dsa-915 http://www •
CVE-2005-2710 – RealPlayer/Helix Player (Linux) - Remote Format String
https://notcve.org/view.php?id=CVE-2005-2710
Format string vulnerability in Real HelixPlayer and RealPlayer 10 allows remote attackers to execute arbitrary code via the (1) image handle or (2) timeformat attribute in a RealPix (.rp) or RealText (.rt) file. • https://www.exploit-db.com/exploits/1232 http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168078 http://marc.info/?l=bugtraq&m=112785544325326&w=2 http://marc.info/?l=full-disclosure&m=112775929608219&w=2 http://secunia.com/advisories/16954 http://secunia.com/advisories/16961 http://secunia.com/advisories/16981 http://secunia.com/advisories/17116 http://secunia.com/advisories/17127 http://securityreason.com/securityalert/27 http://securityreason.com/securityalert/41 http •
CVE-2005-2055
https://notcve.org/view.php?id=CVE-2005-2055
RealPlayer 8, 10, 10.5 (6.0.12.1040-1069), and Enterprise and RealOne Player v1 and v2 allows remote malicious web server to create an arbitrary HTML file that executes an RM file via "default settings of earlier Internet Explorer browsers". • http://service.real.com/help/faq/security/050623_player/EN •
CVE-2005-2054
https://notcve.org/view.php?id=CVE-2005-2054
Unknown vulnerability in RealPlayer 10 and 10.5 (6.0.12.1040-1069) and RealOne Player v1 and v2 allows remote attackers to overwrite arbitrary files or execute arbitrary ActiveX controls via a crafted MP3 file. • http://service.real.com/help/faq/security/050623_player/EN •