Page 27 of 164 results (0.004 seconds)

CVSS: 7.8EPSS: 5%CPEs: 1EXPL: 2

RealNetworks RealPlayer 10 Gold allows remote attackers to cause a denial of service (memory consumption) via a certain .ra file. NOTE: this issue was referred to as a "memory leak," but it is not clear if this is correct. RealNetworks RealPlayer 10 Gold permite a atacantes remotos provocar una denegación de servicio (agotamiento de memoria) mediante un fichero .ra concreto. NOTA. Este tema fue tratado como un "agujero de memoria" pero no está claro que sea correcto. • https://www.exploit-db.com/exploits/3819 http://osvdb.org/41730 http://www.securityfocus.com/bid/23712 •

CVSS: 5.0EPSS: 6%CPEs: 8EXPL: 3

An ActiveX control in ierpplug.dll for RealNetworks RealPlayer 10.5 allows remote attackers to cause a denial of service (Internet Explorer 7 crash) by invoking the RealPlayer.OpenURLInPlayerBrowser method with a long second argument. Un control ActiveX en ierpplug.dll para RealNetworks RealPlayer 10.5 permite a un atacante remoto provocar denegación de servicio (caida de Internet Explorer 7) invocnado al método RealPlayer.OpenURLInPlayerBrowser con un segundo argumento. • https://www.exploit-db.com/exploits/3030 http://downloads.securityfocus.com/vulnerabilities/exploits/21802.html http://www.securityfocus.com/bid/21802 https://exchange.xforce.ibmcloud.com/vulnerabilities/31141 •

CVSS: 5.0EPSS: 8%CPEs: 1EXPL: 3

A certain ActiveX control in rpau3260.dll in RealNetworks RealPlayer 10.5 allows remote attackers to cause a denial of service (Internet Explorer crash) by invoking the RealPlayer.Initialize method with certain arguments. Un control ActiveX concreto en rpau3260.dll en RealNetworks RealPlayer 10.5 permite a atacantes remotos provocar una denegación de servicio (caída de Internet Explorer) invocando el método RealPlayer.Initialize con argumentos concretos. • https://www.exploit-db.com/exploits/2966 http://www.securityfocus.com/bid/21689 http://www.securityfocus.com/data/vulnerabilities/exploits/21689.html https://exchange.xforce.ibmcloud.com/vulnerabilities/31138 •

CVSS: 9.3EPSS: 96%CPEs: 6EXPL: 3

Buffer overflow in swfformat.dll in multiple RealNetworks products and versions including RealPlayer 10.x, RealOne Player, Rhapsody 3, and Helix Player allows remote attackers to execute arbitrary code via a crafted SWF (Flash) file with (1) a size value that is less than the actual size, or (2) other unspecified manipulations. Desbordamiento de buffer en swfformat.dll en múltiples productos y versiones RealNetworks incluyendo RealPlayer 10.x, RealOne Player, Rhapsody 3 y Helix Player permite a atacantes remotos ejecutar código arbitrario a través de un archivo SWF (Flash) manipulado con (1) un valor de tamaño que es menor que el tamaño real o (2) otras manipulaciones no especificadas. • https://www.exploit-db.com/exploits/1622 https://www.exploit-db.com/exploits/27460 http://secunia.com/advisories/19358 http://secunia.com/advisories/19362 http://secunia.com/advisories/19365 http://secunia.com/advisories/19390 http://securityreason.com/securityalert/690 http://securitytracker.com/id?1015806 http://www.gentoo.org/security/en/glsa/glsa-200603-24.xml http://www.kb.cert.org/vuls/id/231028 http://www.novell.com/linux/security/advisories/2006_18_realplayer. • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 2%CPEs: 12EXPL: 0

Buffer overflow in RealNetworks RealPlayer 10.5 6.0.12.1040 through 6.0.12.1348, RealPlayer 10, RealOne Player v2, RealOne Player v1, RealPlayer 8, and RealPlayer Enterprise before 20060322 allows remote attackers to have an unknown impact via a malicious Mimio boardCast (mbc) file. • http://secunia.com/advisories/19358 http://securitytracker.com/id?1015810 http://www.kb.cert.org/vuls/id/451556 http://www.securityfocus.com/bid/17202 http://www.service.real.com/realplayer/security/03162006_player/en http://www.vupen.com/english/advisories/2006/1057 https://exchange.xforce.ibmcloud.com/vulnerabilities/25411 •