Page 20 of 105 results (0.007 seconds)

CVSS: 5.1EPSS: 14%CPEs: 12EXPL: 0

Heap-based buffer overflow in RealPlayer 10 and earlier, Helix Player before 10.0.4, and RealOne Player v1 and v2 allows remote attackers to execute arbitrary code via a long hostname in a RAM file. • http://marc.info/?l=bugtraq&m=111401615202987&w=2 http://pb.specialised.info/all/adv/real-ram-adv.txt http://service.real.com/help/faq/security/050419_player/EN http://www.redhat.com/archives/fedora-announce-list/2005-April/msg00040.html http://www.redhat.com/support/errata/RHSA-2005-363.html http://www.redhat.com/support/errata/RHSA-2005-392.html http://www.redhat.com/support/errata/RHSA-2005-394.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg& •

CVSS: 5.1EPSS: 55%CPEs: 7EXPL: 0

Heap-based buffer overflow in RealNetworks RealPlayer 10.5 (6.0.12.1056 and earlier), 10, 8, and RealOne Player V2 and V1, allows remote attackers to execute arbitrary code via .WAV files. • http://marc.info/?l=bugtraq&m=110979465912834&w=2 http://marc.info/?l=vulnwatch&m=110977858619314&w=2 http://service.real.com/help/faq/security/050224_player/EN http://www.redhat.com/support/errata/RHSA-2005-265.html http://www.redhat.com/support/errata/RHSA-2005-271.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11419 https://access.redhat.com/security/cve/CVE-2005-0611 https://bugzilla.redhat.com/show_bug.cgi?id=1617552 •

CVSS: 5.1EPSS: 46%CPEs: 11EXPL: 2

Stack-based buffer overflow in the CSmil1Parser::testAttributeFailed function in smlparse.cpp for RealNetworks RealPlayer 10.5 (6.0.12.1056 and earlier), 10, 8, and RealOne Player V2 and V1 allows remote attackers to execute arbitrary code via a .SMIL file with a large system-screen-size value. • https://www.exploit-db.com/exploits/863 https://www.exploit-db.com/exploits/16586 http://service.real.com/help/faq/security/050224_player http://www.idefense.com/application/poi/display?id=209&type=vulnerabilities http://www.redhat.com/support/errata/RHSA-2005-265.html http://www.redhat.com/support/errata/RHSA-2005-271.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10926 https://access.redhat.com/security/cve/CVE-2005-0455 https:/ •

CVSS: 5.1EPSS: 4%CPEs: 10EXPL: 0

Off-by-one buffer overflow in the processing of tags in Real Metadata Package (RMP) files in RealPlayer 10.5 (6.0.12.1040) and earlier could allow remote attackers to execute arbitrary code via a long tag. • http://marc.info/?l=bugtraq&m=109707741022291&w=2 http://marc.info/?l=bugtraq&m=110616302008401&w=2 http://service.real.com/help/faq/security/040928_player/EN http://www.ngssoftware.com/advisories/real-03full.txt https://exchange.xforce.ibmcloud.com/vulnerabilities/18982 https://access.redhat.com/security/cve/CVE-2005-0191 https://bugzilla.redhat.com/show_bug.cgi?id=1617487 •

CVSS: 5.1EPSS: 26%CPEs: 20EXPL: 0

Integer overflow in pnen3260.dll in RealPlayer 8 through 10.5 (6.0.12.1040) and earlier, and RealOne Player 1 or 2 on Windows or Mac OS, allows remote attackers to execute arbitrary code via a SMIL file and a .rm movie file with a large length field for the data chunk, which leads to a heap-based buffer overflow. • http://marc.info/?l=ntbugtraq&m=109708374115061&w=2 http://secunia.com/advisories/12672 http://www.securityfocus.com/bid/11309 http://www.service.real.com/help/faq/security/040928_player/EN https://exchange.xforce.ibmcloud.com/vulnerabilities/17549 •