Page 4 of 37 results (0.007 seconds)

CVSS: 5.1EPSS: 39%CPEs: 7EXPL: 0

Heap-based buffer overflow in vidplin.dll in RealPlayer 10 and 10.5 (6.0.12.1040 through 1069), RealOne Player v1 and v2, RealPlayer 8 and RealPlayer Enterprise allows remote attackers to execute arbitrary code via an .avi file with a modified strf structure value. • http://marc.info/?l=bugtraq&m=111955853611840&w=2 http://service.real.com/help/faq/security/050623_player/EN •

CVSS: 5.1EPSS: 14%CPEs: 12EXPL: 0

Heap-based buffer overflow in RealPlayer 10 and earlier, Helix Player before 10.0.4, and RealOne Player v1 and v2 allows remote attackers to execute arbitrary code via a long hostname in a RAM file. • http://marc.info/?l=bugtraq&m=111401615202987&w=2 http://pb.specialised.info/all/adv/real-ram-adv.txt http://service.real.com/help/faq/security/050419_player/EN http://www.redhat.com/archives/fedora-announce-list/2005-April/msg00040.html http://www.redhat.com/support/errata/RHSA-2005-363.html http://www.redhat.com/support/errata/RHSA-2005-392.html http://www.redhat.com/support/errata/RHSA-2005-394.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg& •

CVSS: 5.1EPSS: 55%CPEs: 7EXPL: 0

Heap-based buffer overflow in RealNetworks RealPlayer 10.5 (6.0.12.1056 and earlier), 10, 8, and RealOne Player V2 and V1, allows remote attackers to execute arbitrary code via .WAV files. • http://marc.info/?l=bugtraq&m=110979465912834&w=2 http://marc.info/?l=vulnwatch&m=110977858619314&w=2 http://service.real.com/help/faq/security/050224_player/EN http://www.redhat.com/support/errata/RHSA-2005-265.html http://www.redhat.com/support/errata/RHSA-2005-271.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11419 https://access.redhat.com/security/cve/CVE-2005-0611 https://bugzilla.redhat.com/show_bug.cgi?id=1617552 •

CVSS: 5.1EPSS: 46%CPEs: 11EXPL: 2

Stack-based buffer overflow in the CSmil1Parser::testAttributeFailed function in smlparse.cpp for RealNetworks RealPlayer 10.5 (6.0.12.1056 and earlier), 10, 8, and RealOne Player V2 and V1 allows remote attackers to execute arbitrary code via a .SMIL file with a large system-screen-size value. • https://www.exploit-db.com/exploits/863 https://www.exploit-db.com/exploits/16586 http://service.real.com/help/faq/security/050224_player http://www.idefense.com/application/poi/display?id=209&type=vulnerabilities http://www.redhat.com/support/errata/RHSA-2005-265.html http://www.redhat.com/support/errata/RHSA-2005-271.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10926 https://access.redhat.com/security/cve/CVE-2005-0455 https:/ •

CVSS: 5.1EPSS: 4%CPEs: 10EXPL: 0

Off-by-one buffer overflow in the processing of tags in Real Metadata Package (RMP) files in RealPlayer 10.5 (6.0.12.1040) and earlier could allow remote attackers to execute arbitrary code via a long tag. • http://marc.info/?l=bugtraq&m=109707741022291&w=2 http://marc.info/?l=bugtraq&m=110616302008401&w=2 http://service.real.com/help/faq/security/040928_player/EN http://www.ngssoftware.com/advisories/real-03full.txt https://exchange.xforce.ibmcloud.com/vulnerabilities/18982 https://access.redhat.com/security/cve/CVE-2005-0191 https://bugzilla.redhat.com/show_bug.cgi?id=1617487 •