CVE-2005-4130
https://notcve.org/view.php?id=CVE-2005-4130
** UNVERIFIABLE, PRERELEASE ** NOTE: this issue describes a problem that can not be independently verified as of 20051208. Unspecified vulnerability in unspecified versions of Real Networks RealPlayer allows remote attackers to execute arbitrary code. NOTE: it is not known whether this issue should be MERGED with CVE-2005-4126. The information regarding this issue is extremely vague and does not provide any verifiable information. It has been posted by a reliable reporter with a prerelease disclosure policy. • http://www.eeye.com/html/research/upcoming/20051116.html •
CVE-2005-3677
https://notcve.org/view.php?id=CVE-2005-3677
Buffer overflow in RealNetworks RealPlayer 10 and 10.5 allows remote attackers to execute arbitrary code via a crafted image in a RealPlayer Skin (RJS) file. NOTE: due to the lack of details, it is unclear how this is different than CVE-2005-2629 and CVE-2005-2630, but the vendor advisory implies that it is different. • http://marc.info/?l=bugtraq&m=113181464921104&w=2 http://secunia.com/advisories/17514 http://service.real.com/help/faq/security/051110_player/EN http://www.securityfocus.com/bid/15398 •
CVE-2005-2936
https://notcve.org/view.php?id=CVE-2005-2936
Unquoted Windows search path vulnerability in RealNetworks RealPlayer 10.5 6.0.12.1040 through 6.0.12.1348, RealPlayer 10, RealOne Player v2, RealOne Player v1, and RealPlayer 8 before 20060322 might allow local users to gain privileges via a malicious C:\program.exe file. • http://secunia.com/advisories/19358 http://securitytracker.com/id?1015223 http://service.real.com/help/faq/security/security111605.html http://www.idefense.com/application/poi/display?id=340&type=vulnerabilities http://www.securityfocus.com/bid/15448 http://www.service.real.com/realplayer/security/03162006_player/en http://www.vupen.com/english/advisories/2006/1057 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2005-2630
https://notcve.org/view.php?id=CVE-2005-2630
Heap-based buffer overflow in DUNZIP32.DLL for RealPlayer 8, 10, and 10.5 and RealOne Player 1 and 2 allows remote attackers to execute arbitrary code via a crafted RealPlayer Skin (RJS) file, a different vulnerability than CVE-2004-1094. • http://marc.info/?l=bugtraq&m=113166519206033&w=2 http://secunia.com/advisories/17514 http://secunia.com/advisories/17860 http://securityreason.com/securityalert/170 http://securitytracker.com/id?1015184 http://securitytracker.com/id?1015185 http://service.real.com/help/faq/security/051110_player/EN http://www.eeye.com/html/research/advisories/AD20051110b.html http://www.osvdb.org/18827 http://www.securityfocus.com/bid/15382 https://exchange.xforce.ibmcloud.com/vulnerabilities/2 •
CVE-2005-2629 – RealNetworks RealOne Player/RealPlayer - '.RM' Local Stack Buffer Overflow
https://notcve.org/view.php?id=CVE-2005-2629
Integer overflow in RealNetworks RealPlayer 8, 10, and 10.5, RealOne Player 1 and 2, and Helix Player 10.0.0 allows remote attackers to execute arbitrary code via an .rm movie file with a large value in the length field of the first data packet, which leads to a stack-based buffer overflow, a different vulnerability than CVE-2004-1481. • https://www.exploit-db.com/exploits/26497 http://marc.info/?l=bugtraq&m=113166476423021&w=2 http://secunia.com/advisories/17514 http://secunia.com/advisories/17559 http://secunia.com/advisories/17860 http://securityreason.com/securityalert/169 http://securitytracker.com/id?1015184 http://securitytracker.com/id?1015185 http://securitytracker.com/id?1015186 http://service.real.com/help/faq/security/051110_player/EN http://www.debian.org/security/2005/dsa-915 http://www •