4 results (0.009 seconds)

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

RealNetworks Helix Universal Server 9.0.2 for Linux and 9.0.3 for Windows allows remote attackers to cause a denial of service (CPU and memory exhaustion) via a POST request with a Content-Length header set to -1. RealNetworks Helix Universal Server 9.0.2 para Linux y 9.0.3 for Windows permite a atacantes remotos causar una denegación de servicio (consumición de memoria y CPU) mediante peticiones POST con una cabecera Content-Length puesta a -1. • http://www.idefense.com/application/poi/display?id=151&type=vulnerabilities https://exchange.xforce.ibmcloud.com/vulnerabilities/17648 •

CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 0

Helix Universal Server/Proxy 9 and Mobile Server 10 allow remote attackers to cause a denial of service via certain HTTP POST messages to the Administration System port. Helix Universal Server/Proxy 9 y Mobile Server 10 permite a atacantes remotos causar una denegación de servicio mediante ciertos mensajes HTTP POST al puerto de Administración del Sistema. • http://seclists.org/lists/vulnwatch/2004/Jan-Mar/0057.html http://service.real.com/help/faq/security/040112_dos http://service.real.com/help/faq/security/security022604.html http://www.securityfocus.com/archive/1/357834 http://www.securityfocus.com/bid/9421 •

CVSS: 7.5EPSS: 89%CPEs: 12EXPL: 2

Buffer overflow in the RTSP protocol parser for the View Source plug-in (vsrcplin.so or vsrcplin3260.dll) for RealNetworks Helix Universal Server 9 and RealSystem Server 8, 7 and RealServer G2 allows remote attackers to execute arbitrary code. • https://www.exploit-db.com/exploits/86 http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0087.html http://lists.immunitysec.com/pipermail/dailydave/2003-August/000030.html http://www.kb.cert.org/vuls/id/934932 http://www.securityfocus.com/bid/8476 http://www.service.real.com/help/faq/security/rootexploit082203.html •

CVSS: 7.5EPSS: 95%CPEs: 2EXPL: 4

Multiple buffer overflows in RealNetworks Helix Universal Server 9.0 (9.0.2.768) allow remote attackers to execute arbitrary code via (1) a long Transport field in a SETUP RTSP request, (2) a DESCRIBE RTSP request with a long URL argument, or (3) two simultaneous HTTP GET requests with long arguments. • https://www.exploit-db.com/exploits/16286 https://www.exploit-db.com/exploits/9937 https://www.exploit-db.com/exploits/23 http://www.kb.cert.org/vuls/id/974689 http://www.nextgenss.com/advisories/realhelix.txt http://www.securityfocus.com/archive/1/304203 http://www.securityfocus.com/bid/6454 http://www.securityfocus.com/bid/6456 http://www.securityfocus.com/bid/6458 http://www.service.real.com/help/faq/security/bufferoverrun12192002.html https://exchange.xforce.ibm •