Page 39 of 217 results (0.010 seconds)

CVSS: 7.5EPSS: 5%CPEs: 1EXPL: 0

Buffer overflow in Real Networks RealPlayer 10 allows remote attackers to execute arbitrary code via a URL with a large number of "." (period) characters. Desbordamiento de búfer en Real Networks RealPlayer 10 permite a atacantes remotos ejecutar código de su elección mediante una URL con un número grande de caractéres "." (punto). • http://www.idefense.com/application/poi/display?id=109&type=vulnerabilities&flashstatus=false https://exchange.xforce.ibmcloud.com/vulnerabilities/16388 https://access.redhat.com/security/cve/CVE-2004-0550 https://bugzilla.redhat.com/show_bug.cgi?id=1617227 •

CVSS: 7.8EPSS: 2%CPEs: 2EXPL: 3

RealNetworks Helix Universal Server 9.0.1 and 9.0.2 allows remote attackers to cause a denial of service (crash) via malformed requests that trigger a null dereference, as demonstrated using (1) GET_PARAMETER or (2) DESCRIBE requests. • https://www.exploit-db.com/exploits/24010 http://secunia.com/advisories/11395 http://www.idefense.com/application/poi/display?id=102&type=vulnerabilities http://www.securityfocus.com/bid/10157 https://exchange.xforce.ibmcloud.com/vulnerabilities/15880 • CWE-476: NULL Pointer Dereference •

CVSS: 5.1EPSS: 33%CPEs: 4EXPL: 0

Stack-based buffer overflow in the RT3 plugin, as used in RealPlayer 8, RealOne Player, RealOne Player 10 beta, and RealOne Player Enterprise, allows remote attackers to execute arbitrary code via a malformed .R3T file. • http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0077.html http://marc.info/?l=bugtraq&m=108135350810135&w=2 http://secunia.com/advisories/11314 http://www.ngssoftware.com/advisories/realr3t.txt http://www.osvdb.org/displayvuln.php?osvdb_id=4977 http://www.securityfocus.com/bid/10070 http://www.service.real.com/help/faq/security/040406_r3t/en https://exchange.xforce.ibmcloud.com/vulnerabilities/15774 https://access.redhat.com/security/cve/CVE-2004-0387 https://bugzi •

CVSS: 7.6EPSS: 13%CPEs: 14EXPL: 0

Multiple buffer overflows in RealOne Player, RealOne Player 2.0, RealOne Enterprise Desktop, and RealPlayer Enterprise allow remote attackers to execute arbitrary code via malformed (1) .RP, (2) .RT, (3) .RAM, (4) .RPM or (5) .SMIL files. Múltiples desbordamientos de búfer en RealOne Player, RealOne Player 2.0, RealOne Enterprise Desktop, y RealPlayer Enterprise permiten a atacantes remotos ejecutar código de su elección mediante ficheros 1) .RP, (2) .RT, (3) .RAM, (4) .RPM o (5) .SMIL malformados. • http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0027.html http://marc.info/?l=bugtraq&m=107608748813559&w=2 http://www.ciac.org/ciac/bulletins/o-075.shtml http://www.kb.cert.org/vuls/id/473814 http://www.nextgenss.com/advisories/realone.txt http://www.securityfocus.com/bid/9579 http://www.service.real.com/help/faq/security/040123_player/EN https://exchange.xforce.ibmcloud.com/vulnerabilities/15040 •

CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 0

Helix Universal Server/Proxy 9 and Mobile Server 10 allow remote attackers to cause a denial of service via certain HTTP POST messages to the Administration System port. Helix Universal Server/Proxy 9 y Mobile Server 10 permite a atacantes remotos causar una denegación de servicio mediante ciertos mensajes HTTP POST al puerto de Administración del Sistema. • http://seclists.org/lists/vulnwatch/2004/Jan-Mar/0057.html http://service.real.com/help/faq/security/040112_dos http://service.real.com/help/faq/security/security022604.html http://www.securityfocus.com/archive/1/357834 http://www.securityfocus.com/bid/9421 •