Page 41 of 217 results (0.010 seconds)

CVSS: 7.5EPSS: 95%CPEs: 2EXPL: 4

Multiple buffer overflows in RealNetworks Helix Universal Server 9.0 (9.0.2.768) allow remote attackers to execute arbitrary code via (1) a long Transport field in a SETUP RTSP request, (2) a DESCRIBE RTSP request with a long URL argument, or (3) two simultaneous HTTP GET requests with long arguments. • https://www.exploit-db.com/exploits/16286 https://www.exploit-db.com/exploits/9937 https://www.exploit-db.com/exploits/23 http://www.kb.cert.org/vuls/id/974689 http://www.nextgenss.com/advisories/realhelix.txt http://www.securityfocus.com/archive/1/304203 http://www.securityfocus.com/bid/6454 http://www.securityfocus.com/bid/6456 http://www.securityfocus.com/bid/6458 http://www.service.real.com/help/faq/security/bufferoverrun12192002.html https://exchange.xforce.ibm •

CVSS: 7.5EPSS: 4%CPEs: 5EXPL: 0

Multiple buffer overflows in RealOne and RealPlayer allow remote attackers to execute arbitrary code via (1) a Synchronized Multimedia Integration Language (SMIL) file with a long parameter, (2) a long long filename in a rtsp:// request, e.g. from a .m3u file, or (3) certain "Now Playing" options on a downloaded file with a long filename. Mültiples desbordamientos de búfer en RealOne y RealPlayer permite a atacantes remotos ejecutar código arbitrario mediante un fichero de Lenguaje de Integración Multimedia Sincronizada (SMIL) con un parámetro largo. un nombre de fichero largo en una petición rtsp://, por ejemplo un fichero. m3u, o Ciertas opciones "Now Playing" (Reproduciendo Ahora) en un fichero descargado con un nombre de fichero largo. • http://marc.info/?l=bugtraq&m=103808645120764&w=2 http://service.real.com/help/faq/security/bufferoverrun_player.html http://www.securityfocus.com/bid/6227 http://www.securityfocus.com/bid/6229 https://exchange.xforce.ibmcloud.com/vulnerabilities/10677 •

CVSS: 7.5EPSS: 2%CPEs: 5EXPL: 0

RealJukebox 2 1.0.2.340 and 1.0.2.379, and RealOne Player Gold 6.0.10.505, allows remote attackers to execute arbitrary script in the Local computer zone by inserting the script into the skin.ini file of an RJS archive, then referencing skin.ini from a web page after it has been extracted, which is parsed as HTML by Internet Explorer or other Microsoft-based web readers. • http://archives.neohapsis.com/archives/bugtraq/2002-07/0130.html http://service.real.com/help/faq/security/bufferoverrun07092002.html http://www.iss.net/security_center/static/9539.php http://www.kb.cert.org/vuls/id/888547 http://www.securityfocus.com/bid/5210 •

CVSS: 7.5EPSS: 21%CPEs: 5EXPL: 1

Buffer overflow in RealJukebox 2 1.0.2.340 and 1.0.2.379, and RealOne Player Gold 6.0.10.505, allows remote attackers to execute arbitrary code via an RFS skin file whose skin.ini contains a long value in a CONTROLnImage argument, such as CONTROL1Image. • https://www.exploit-db.com/exploits/21615 http://archives.neohapsis.com/archives/bugtraq/2002-07/0127.html http://service.real.com/help/faq/security/bufferoverrun07092002.html http://www.iss.net/security_center/static/9538.php http://www.kb.cert.org/vuls/id/843667 http://www.securityfocus.com/bid/5217 •

CVSS: 1.7EPSS: 0%CPEs: 1EXPL: 0

Directory traversal vulnerability in the web server used in RealPlayer 6.0.7, and possibly other versions, may allow local users to read files that are accessible to RealPlayer via a .. (dot dot) in an HTTP GET request to port 1275. • http://www.iss.net/security_center/static/8336.php http://www.securityfocus.com/archive/1/259333 http://www.securityfocus.com/bid/4221 •