Page 36 of 217 results (0.004 seconds)

CVSS: 5.1EPSS: 14%CPEs: 12EXPL: 0

Heap-based buffer overflow in RealPlayer 10 and earlier, Helix Player before 10.0.4, and RealOne Player v1 and v2 allows remote attackers to execute arbitrary code via a long hostname in a RAM file. • http://marc.info/?l=bugtraq&m=111401615202987&w=2 http://pb.specialised.info/all/adv/real-ram-adv.txt http://service.real.com/help/faq/security/050419_player/EN http://www.redhat.com/archives/fedora-announce-list/2005-April/msg00040.html http://www.redhat.com/support/errata/RHSA-2005-363.html http://www.redhat.com/support/errata/RHSA-2005-392.html http://www.redhat.com/support/errata/RHSA-2005-394.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg& •

CVSS: 5.1EPSS: 55%CPEs: 7EXPL: 0

Heap-based buffer overflow in RealNetworks RealPlayer 10.5 (6.0.12.1056 and earlier), 10, 8, and RealOne Player V2 and V1, allows remote attackers to execute arbitrary code via .WAV files. • http://marc.info/?l=bugtraq&m=110979465912834&w=2 http://marc.info/?l=vulnwatch&m=110977858619314&w=2 http://service.real.com/help/faq/security/050224_player/EN http://www.redhat.com/support/errata/RHSA-2005-265.html http://www.redhat.com/support/errata/RHSA-2005-271.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11419 https://access.redhat.com/security/cve/CVE-2005-0611 https://bugzilla.redhat.com/show_bug.cgi?id=1617552 •

CVSS: 5.1EPSS: 46%CPEs: 11EXPL: 2

Stack-based buffer overflow in the CSmil1Parser::testAttributeFailed function in smlparse.cpp for RealNetworks RealPlayer 10.5 (6.0.12.1056 and earlier), 10, 8, and RealOne Player V2 and V1 allows remote attackers to execute arbitrary code via a .SMIL file with a large system-screen-size value. • https://www.exploit-db.com/exploits/863 https://www.exploit-db.com/exploits/16586 http://service.real.com/help/faq/security/050224_player http://www.idefense.com/application/poi/display?id=209&type=vulnerabilities http://www.redhat.com/support/errata/RHSA-2005-265.html http://www.redhat.com/support/errata/RHSA-2005-271.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10926 https://access.redhat.com/security/cve/CVE-2005-0455 https:/ •

CVSS: 2.6EPSS: 0%CPEs: 1EXPL: 0

Directory traversal vulnerability in RealArcade 1.2.0.994 allows remote attackers to delete arbitrary files via an RGP file with a .. (dot dot) in the FILENAME tag. • http://marc.info/?l=bugtraq&m=110792779115794&w=2 http://secunia.com/advisories/14187 http://securitytracker.com/id?1013128 http://www.securityfocus.com/bid/12494 https://exchange.xforce.ibmcloud.com/vulnerabilities/19260 •

CVSS: 5.1EPSS: 3%CPEs: 1EXPL: 0

Integer overflow in RealArcade 1.2.0.994 and earlier allows remote attackers to execute arbitrary code via an RGS file with an invalid size string for the GUID and game name, which leads to a buffer overflow. • http://marc.info/?l=bugtraq&m=110792779115794&w=2 http://secunia.com/advisories/14187 http://securitytracker.com/id?1013128 https://exchange.xforce.ibmcloud.com/vulnerabilities/19259 •