Page 19 of 105 results (0.024 seconds)

CVSS: 7.5EPSS: 8%CPEs: 7EXPL: 0

Buffer overflow in RealNetworks RealPlayer 10 and 10.5 allows remote attackers to execute arbitrary code via a crafted image in a RealPlayer Skin (RJS) file. NOTE: due to the lack of details, it is unclear how this is different than CVE-2005-2629 and CVE-2005-2630, but the vendor advisory implies that it is different. • http://marc.info/?l=bugtraq&m=113181464921104&w=2 http://secunia.com/advisories/17514 http://service.real.com/help/faq/security/051110_player/EN http://www.securityfocus.com/bid/15398 •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

Unquoted Windows search path vulnerability in RealNetworks RealPlayer 10.5 6.0.12.1040 through 6.0.12.1348, RealPlayer 10, RealOne Player v2, RealOne Player v1, and RealPlayer 8 before 20060322 might allow local users to gain privileges via a malicious C:\program.exe file. • http://secunia.com/advisories/19358 http://securitytracker.com/id?1015223 http://service.real.com/help/faq/security/security111605.html http://www.idefense.com/application/poi/display?id=340&type=vulnerabilities http://www.securityfocus.com/bid/15448 http://www.service.real.com/realplayer/security/03162006_player/en http://www.vupen.com/english/advisories/2006/1057 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.1EPSS: 40%CPEs: 14EXPL: 0

Heap-based buffer overflow in DUNZIP32.DLL for RealPlayer 8, 10, and 10.5 and RealOne Player 1 and 2 allows remote attackers to execute arbitrary code via a crafted RealPlayer Skin (RJS) file, a different vulnerability than CVE-2004-1094. • http://marc.info/?l=bugtraq&m=113166519206033&w=2 http://secunia.com/advisories/17514 http://secunia.com/advisories/17860 http://securityreason.com/securityalert/170 http://securitytracker.com/id?1015184 http://securitytracker.com/id?1015185 http://service.real.com/help/faq/security/051110_player/EN http://www.eeye.com/html/research/advisories/AD20051110b.html http://www.osvdb.org/18827 http://www.securityfocus.com/bid/15382 https://exchange.xforce.ibmcloud.com/vulnerabilities/2 •

CVSS: 5.1EPSS: 15%CPEs: 20EXPL: 1

Integer overflow in RealNetworks RealPlayer 8, 10, and 10.5, RealOne Player 1 and 2, and Helix Player 10.0.0 allows remote attackers to execute arbitrary code via an .rm movie file with a large value in the length field of the first data packet, which leads to a stack-based buffer overflow, a different vulnerability than CVE-2004-1481. • https://www.exploit-db.com/exploits/26497 http://marc.info/?l=bugtraq&m=113166476423021&w=2 http://secunia.com/advisories/17514 http://secunia.com/advisories/17559 http://secunia.com/advisories/17860 http://securityreason.com/securityalert/169 http://securitytracker.com/id?1015184 http://securitytracker.com/id?1015185 http://securitytracker.com/id?1015186 http://service.real.com/help/faq/security/051110_player/EN http://www.debian.org/security/2005/dsa-915 http://www •

CVSS: 5.0EPSS: 1%CPEs: 6EXPL: 0

RealPlayer 8, 10, 10.5 (6.0.12.1040-1069), and Enterprise and RealOne Player v1 and v2 allows remote malicious web server to create an arbitrary HTML file that executes an RM file via "default settings of earlier Internet Explorer browsers". • http://service.real.com/help/faq/security/050623_player/EN •