Page 28 of 164 results (0.001 seconds)

CVSS: 9.3EPSS: 2%CPEs: 32EXPL: 1

Heap-based buffer overflow in the embedded player in multiple RealNetworks products and versions including RealPlayer 10.x, RealOne Player, and Helix Player allows remote malicious servers to cause a denial of service (crash) and possibly execute arbitrary code via a chunked Transfer-Encoding HTTP response in which either (1) the chunk header length is specified as -1, (2) the chunk header with a length that is less than the actual amount of sent data, or (3) a missing chunk header. • http://secunia.com/advisories/19358 http://secunia.com/advisories/19365 http://securitytracker.com/id?1015808 http://www.kb.cert.org/vuls/id/172489 http://www.novell.com/linux/security/advisories/2006_18_realplayer.html http://www.redhat.com/support/errata/RHSA-2005-762.html http://www.redhat.com/support/errata/RHSA-2005-788.html http://www.securityfocus.com/bid/17202 http://www.service.real.com/realplayer/security/03162006_player/en http://www.vupen.com/english/advisor • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 14EXPL: 0

** UNVERIFIABLE, PRERELEASE ** NOTE: this issue describes a problem that can not be independently verified as of 20051208. Unspecified vulnerability in unspecified versions of Real Networks RealPlayer allows attackers to execute arbitrary code. NOTE: the information regarding this issue is extremely vague and does not provide any verifiable information. It has been posted by a reliable reporter with a prerelease disclosure policy. This item has only been assigned a CVE identifier for tracking purposes, and to serve as a concrete example for discussion of the newly emerging UNVERIFIABLE and PRERELEASE content decisions in CVE, which must be discussed by the Editorial Board. • http://www.eeye.com/html/research/upcoming/20051130.html http://www.securityfocus.com/bid/15691 •

CVSS: 7.5EPSS: 8%CPEs: 7EXPL: 0

Buffer overflow in RealNetworks RealPlayer 10 and 10.5 allows remote attackers to execute arbitrary code via a crafted image in a RealPlayer Skin (RJS) file. NOTE: due to the lack of details, it is unclear how this is different than CVE-2005-2629 and CVE-2005-2630, but the vendor advisory implies that it is different. • http://marc.info/?l=bugtraq&m=113181464921104&w=2 http://secunia.com/advisories/17514 http://service.real.com/help/faq/security/051110_player/EN http://www.securityfocus.com/bid/15398 •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

Unquoted Windows search path vulnerability in RealNetworks RealPlayer 10.5 6.0.12.1040 through 6.0.12.1348, RealPlayer 10, RealOne Player v2, RealOne Player v1, and RealPlayer 8 before 20060322 might allow local users to gain privileges via a malicious C:\program.exe file. • http://secunia.com/advisories/19358 http://securitytracker.com/id?1015223 http://service.real.com/help/faq/security/security111605.html http://www.idefense.com/application/poi/display?id=340&type=vulnerabilities http://www.securityfocus.com/bid/15448 http://www.service.real.com/realplayer/security/03162006_player/en http://www.vupen.com/english/advisories/2006/1057 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.1EPSS: 40%CPEs: 14EXPL: 0

Heap-based buffer overflow in DUNZIP32.DLL for RealPlayer 8, 10, and 10.5 and RealOne Player 1 and 2 allows remote attackers to execute arbitrary code via a crafted RealPlayer Skin (RJS) file, a different vulnerability than CVE-2004-1094. • http://marc.info/?l=bugtraq&m=113166519206033&w=2 http://secunia.com/advisories/17514 http://secunia.com/advisories/17860 http://securityreason.com/securityalert/170 http://securitytracker.com/id?1015184 http://securitytracker.com/id?1015185 http://service.real.com/help/faq/security/051110_player/EN http://www.eeye.com/html/research/advisories/AD20051110b.html http://www.osvdb.org/18827 http://www.securityfocus.com/bid/15382 https://exchange.xforce.ibmcloud.com/vulnerabilities/2 •