CVE-2005-0755
https://notcve.org/view.php?id=CVE-2005-0755
Heap-based buffer overflow in RealPlayer 10 and earlier, Helix Player before 10.0.4, and RealOne Player v1 and v2 allows remote attackers to execute arbitrary code via a long hostname in a RAM file. • http://marc.info/?l=bugtraq&m=111401615202987&w=2 http://pb.specialised.info/all/adv/real-ram-adv.txt http://service.real.com/help/faq/security/050419_player/EN http://www.redhat.com/archives/fedora-announce-list/2005-April/msg00040.html http://www.redhat.com/support/errata/RHSA-2005-363.html http://www.redhat.com/support/errata/RHSA-2005-392.html http://www.redhat.com/support/errata/RHSA-2005-394.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg& •
CVE-2005-0611
https://notcve.org/view.php?id=CVE-2005-0611
Heap-based buffer overflow in RealNetworks RealPlayer 10.5 (6.0.12.1056 and earlier), 10, 8, and RealOne Player V2 and V1, allows remote attackers to execute arbitrary code via .WAV files. • http://marc.info/?l=bugtraq&m=110979465912834&w=2 http://marc.info/?l=vulnwatch&m=110977858619314&w=2 http://service.real.com/help/faq/security/050224_player/EN http://www.redhat.com/support/errata/RHSA-2005-265.html http://www.redhat.com/support/errata/RHSA-2005-271.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11419 https://access.redhat.com/security/cve/CVE-2005-0611 https://bugzilla.redhat.com/show_bug.cgi?id=1617552 •
CVE-2005-0455 – RealNetworks RealPlayer 10 - '.smil' Local Buffer Overflow
https://notcve.org/view.php?id=CVE-2005-0455
Stack-based buffer overflow in the CSmil1Parser::testAttributeFailed function in smlparse.cpp for RealNetworks RealPlayer 10.5 (6.0.12.1056 and earlier), 10, 8, and RealOne Player V2 and V1 allows remote attackers to execute arbitrary code via a .SMIL file with a large system-screen-size value. • https://www.exploit-db.com/exploits/863 https://www.exploit-db.com/exploits/16586 http://service.real.com/help/faq/security/050224_player http://www.idefense.com/application/poi/display?id=209&type=vulnerabilities http://www.redhat.com/support/errata/RHSA-2005-265.html http://www.redhat.com/support/errata/RHSA-2005-271.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10926 https://access.redhat.com/security/cve/CVE-2005-0455 https:/ •
CVE-2005-0348
https://notcve.org/view.php?id=CVE-2005-0348
Directory traversal vulnerability in RealArcade 1.2.0.994 allows remote attackers to delete arbitrary files via an RGP file with a .. (dot dot) in the FILENAME tag. • http://marc.info/?l=bugtraq&m=110792779115794&w=2 http://secunia.com/advisories/14187 http://securitytracker.com/id?1013128 http://www.securityfocus.com/bid/12494 https://exchange.xforce.ibmcloud.com/vulnerabilities/19260 •
CVE-2005-0347
https://notcve.org/view.php?id=CVE-2005-0347
Integer overflow in RealArcade 1.2.0.994 and earlier allows remote attackers to execute arbitrary code via an RGS file with an invalid size string for the GUID and game name, which leads to a buffer overflow. • http://marc.info/?l=bugtraq&m=110792779115794&w=2 http://secunia.com/advisories/14187 http://securitytracker.com/id?1013128 https://exchange.xforce.ibmcloud.com/vulnerabilities/19259 •