Page 7 of 37 results (0.005 seconds)

CVSS: 10.0EPSS: 1%CPEs: 6EXPL: 0

Real Networks RealOne Enterprise Desktop 6.0.11.774, RealOne Player 2.0, and RealOne Player 6.0.11.818 through RealOne Player 6.0.11.853 allows remote attackers to execute arbitrary script in the local security zone by embedding script in a temp file before the temp file is executed by the default web browser. • http://service.real.com/help/faq/security/securityupdate_october2003.html http://www.securityfocus.com/bid/8839 https://exchange.xforce.ibmcloud.com/vulnerabilities/13445 •

CVSS: 5.1EPSS: 84%CPEs: 8EXPL: 4

RealOne player allows remote attackers to execute arbitrary script in the "My Computer" zone via a SMIL presentation with a URL that references a scripting protocol, which is executed in the security context of the previously loaded URL, as demonstrated using a "javascript:" URL in the area tag. • https://www.exploit-db.com/exploits/23043 http://securitytracker.com/id?1007532 http://www.digitalpranksters.com/advisories/realnetworks/smilscriptprotocol.html http://www.securityfocus.com/archive/1/335293 http://www.securityfocus.com/bid/8453 http://www.service.real.com/help/faq/security/securityupdate_august2003.html https://exchange.xforce.ibmcloud.com/vulnerabilities/13028 •

CVSS: 5.1EPSS: 0%CPEs: 10EXPL: 0

The PNG deflate algorithm in RealOne Player 6.0.11.x and earlier, RealPlayer 8/RealPlayer Plus 8 6.0.9.584, and other versions allows remote attackers to corrupt the heap and overwrite arbitrary memory via a PNG graphic file format containing compressed data using fixed trees that contain the length values 286-287, which are treated as a very large length. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0156.html http://marc.info/?l=bugtraq&m=104887465427579&w=2 http://www.coresecurity.com/common/showdoc.php?idx=311&idxseccion=10 http://www.kb.cert.org/vuls/id/705761 http://www.securityfocus.com/bid/7177 •

CVSS: 7.5EPSS: 4%CPEs: 5EXPL: 0

Multiple buffer overflows in RealOne and RealPlayer allow remote attackers to execute arbitrary code via (1) a Synchronized Multimedia Integration Language (SMIL) file with a long parameter, (2) a long long filename in a rtsp:// request, e.g. from a .m3u file, or (3) certain "Now Playing" options on a downloaded file with a long filename. Mültiples desbordamientos de búfer en RealOne y RealPlayer permite a atacantes remotos ejecutar código arbitrario mediante un fichero de Lenguaje de Integración Multimedia Sincronizada (SMIL) con un parámetro largo. un nombre de fichero largo en una petición rtsp://, por ejemplo un fichero. m3u, o Ciertas opciones "Now Playing" (Reproduciendo Ahora) en un fichero descargado con un nombre de fichero largo. • http://marc.info/?l=bugtraq&m=103808645120764&w=2 http://service.real.com/help/faq/security/bufferoverrun_player.html http://www.securityfocus.com/bid/6227 http://www.securityfocus.com/bid/6229 https://exchange.xforce.ibmcloud.com/vulnerabilities/10677 •

CVSS: 7.5EPSS: 2%CPEs: 5EXPL: 0

RealJukebox 2 1.0.2.340 and 1.0.2.379, and RealOne Player Gold 6.0.10.505, allows remote attackers to execute arbitrary script in the Local computer zone by inserting the script into the skin.ini file of an RJS archive, then referencing skin.ini from a web page after it has been extracted, which is parsed as HTML by Internet Explorer or other Microsoft-based web readers. • http://archives.neohapsis.com/archives/bugtraq/2002-07/0130.html http://service.real.com/help/faq/security/bufferoverrun07092002.html http://www.iss.net/security_center/static/9539.php http://www.kb.cert.org/vuls/id/888547 http://www.securityfocus.com/bid/5210 •