Page 3 of 34 results (0.010 seconds)

CVSS: 5.1EPSS: 15%CPEs: 20EXPL: 1

Integer overflow in RealNetworks RealPlayer 8, 10, and 10.5, RealOne Player 1 and 2, and Helix Player 10.0.0 allows remote attackers to execute arbitrary code via an .rm movie file with a large value in the length field of the first data packet, which leads to a stack-based buffer overflow, a different vulnerability than CVE-2004-1481. • https://www.exploit-db.com/exploits/26497 http://marc.info/?l=bugtraq&m=113166476423021&w=2 http://secunia.com/advisories/17514 http://secunia.com/advisories/17559 http://secunia.com/advisories/17860 http://securityreason.com/securityalert/169 http://securitytracker.com/id?1015184 http://securitytracker.com/id?1015185 http://securitytracker.com/id?1015186 http://service.real.com/help/faq/security/051110_player/EN http://www.debian.org/security/2005/dsa-915 http://www •

CVSS: 5.0EPSS: 1%CPEs: 6EXPL: 0

RealPlayer 8, 10, 10.5 (6.0.12.1040-1069), and Enterprise and RealOne Player v1 and v2 allows remote malicious web server to create an arbitrary HTML file that executes an RM file via "default settings of earlier Internet Explorer browsers". • http://service.real.com/help/faq/security/050623_player/EN •

CVSS: 5.1EPSS: 0%CPEs: 4EXPL: 0

Unknown vulnerability in RealPlayer 10 and 10.5 (6.0.12.1040-1069) and RealOne Player v1 and v2 allows remote attackers to overwrite arbitrary files or execute arbitrary ActiveX controls via a crafted MP3 file. • http://service.real.com/help/faq/security/050623_player/EN •

CVSS: 5.1EPSS: 39%CPEs: 7EXPL: 0

Heap-based buffer overflow in vidplin.dll in RealPlayer 10 and 10.5 (6.0.12.1040 through 1069), RealOne Player v1 and v2, RealPlayer 8 and RealPlayer Enterprise allows remote attackers to execute arbitrary code via an .avi file with a modified strf structure value. • http://marc.info/?l=bugtraq&m=111955853611840&w=2 http://service.real.com/help/faq/security/050623_player/EN •

CVSS: 5.1EPSS: 14%CPEs: 12EXPL: 0

Heap-based buffer overflow in RealPlayer 10 and earlier, Helix Player before 10.0.4, and RealOne Player v1 and v2 allows remote attackers to execute arbitrary code via a long hostname in a RAM file. • http://marc.info/?l=bugtraq&m=111401615202987&w=2 http://pb.specialised.info/all/adv/real-ram-adv.txt http://service.real.com/help/faq/security/050419_player/EN http://www.redhat.com/archives/fedora-announce-list/2005-April/msg00040.html http://www.redhat.com/support/errata/RHSA-2005-363.html http://www.redhat.com/support/errata/RHSA-2005-392.html http://www.redhat.com/support/errata/RHSA-2005-394.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg& •