CVE-2005-2710 – RealPlayer/Helix Player (Linux) - Remote Format String
https://notcve.org/view.php?id=CVE-2005-2710
Format string vulnerability in Real HelixPlayer and RealPlayer 10 allows remote attackers to execute arbitrary code via the (1) image handle or (2) timeformat attribute in a RealPix (.rp) or RealText (.rt) file. • https://www.exploit-db.com/exploits/1232 http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168078 http://marc.info/?l=bugtraq&m=112785544325326&w=2 http://marc.info/?l=full-disclosure&m=112775929608219&w=2 http://secunia.com/advisories/16954 http://secunia.com/advisories/16961 http://secunia.com/advisories/16981 http://secunia.com/advisories/17116 http://secunia.com/advisories/17127 http://securityreason.com/securityalert/27 http://securityreason.com/securityalert/41 http •
CVE-2005-2055
https://notcve.org/view.php?id=CVE-2005-2055
RealPlayer 8, 10, 10.5 (6.0.12.1040-1069), and Enterprise and RealOne Player v1 and v2 allows remote malicious web server to create an arbitrary HTML file that executes an RM file via "default settings of earlier Internet Explorer browsers". • http://service.real.com/help/faq/security/050623_player/EN •
CVE-2005-2054
https://notcve.org/view.php?id=CVE-2005-2054
Unknown vulnerability in RealPlayer 10 and 10.5 (6.0.12.1040-1069) and RealOne Player v1 and v2 allows remote attackers to overwrite arbitrary files or execute arbitrary ActiveX controls via a crafted MP3 file. • http://service.real.com/help/faq/security/050623_player/EN •
CVE-2005-1766
https://notcve.org/view.php?id=CVE-2005-1766
Heap-based buffer overflow in rtffplin.cpp in RealPlayer 10.5 6.0.12.1056 on Windows, and 10, 10.0.1.436, and other versions before 10.0.5 on Linux, allows remote attackers to execute arbitrary code via a RealMedia file with a long RealText string, such as an SMIL file. • http://secunia.com/advisories/16981 http://service.real.com/help/faq/security/050623_player/EN http://www.debian.org/security/2005/dsa-826 http://www.idefense.com/application/poi/display?id=250&type=vulnerabilities&flashstatus=true http://www.novell.com/linux/security/advisories/2005_37_real_player.html http://www.redhat.com/support/errata/RHSA-2005-517.html http://www.redhat.com/support/errata/RHSA-2005-523.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg. •
CVE-2005-2052
https://notcve.org/view.php?id=CVE-2005-2052
Heap-based buffer overflow in vidplin.dll in RealPlayer 10 and 10.5 (6.0.12.1040 through 1069), RealOne Player v1 and v2, RealPlayer 8 and RealPlayer Enterprise allows remote attackers to execute arbitrary code via an .avi file with a modified strf structure value. • http://marc.info/?l=bugtraq&m=111955853611840&w=2 http://service.real.com/help/faq/security/050623_player/EN •