CVE-2002-1321
https://notcve.org/view.php?id=CVE-2002-1321
Multiple buffer overflows in RealOne and RealPlayer allow remote attackers to execute arbitrary code via (1) a Synchronized Multimedia Integration Language (SMIL) file with a long parameter, (2) a long long filename in a rtsp:// request, e.g. from a .m3u file, or (3) certain "Now Playing" options on a downloaded file with a long filename. Mültiples desbordamientos de búfer en RealOne y RealPlayer permite a atacantes remotos ejecutar código arbitrario mediante un fichero de Lenguaje de Integración Multimedia Sincronizada (SMIL) con un parámetro largo. un nombre de fichero largo en una petición rtsp://, por ejemplo un fichero. m3u, o Ciertas opciones "Now Playing" (Reproduciendo Ahora) en un fichero descargado con un nombre de fichero largo. • http://marc.info/?l=bugtraq&m=103808645120764&w=2 http://service.real.com/help/faq/security/bufferoverrun_player.html http://www.securityfocus.com/bid/6227 http://www.securityfocus.com/bid/6229 https://exchange.xforce.ibmcloud.com/vulnerabilities/10677 •
CVE-2002-0415
https://notcve.org/view.php?id=CVE-2002-0415
Directory traversal vulnerability in the web server used in RealPlayer 6.0.7, and possibly other versions, may allow local users to read files that are accessible to RealPlayer via a .. (dot dot) in an HTTP GET request to port 1275. • http://www.iss.net/security_center/static/8336.php http://www.securityfocus.com/archive/1/259333 http://www.securityfocus.com/bid/4221 •
CVE-2002-0337
https://notcve.org/view.php?id=CVE-2002-0337
RealPlayer 8 allows remote attackers to cause a denial of service (CPU utilization) via malformed .mp3 files. • http://marc.info/?l=bugtraq&m=101495354424868&w=2 http://www.iss.net/security_center/static/8320.php http://www.securityfocus.com/bid/4200 •
CVE-2000-0280 – Real Networks RealPlayer 6/7 - Location Buffer Overflow
https://notcve.org/view.php?id=CVE-2000-0280
Buffer overflow in the RealNetworks RealPlayer client versions 6 and 7 allows remote attackers to cause a denial of service via a long Location URL. • https://www.exploit-db.com/exploits/19834 http://archives.neohapsis.com/archives/bugtraq/2000-04/0018.html http://www.securityfocus.com/bid/1088 •