CVE-2004-0273
https://notcve.org/view.php?id=CVE-2004-0273
Directory traversal vulnerability in RealOne Player, RealOne Player 2.0, and RealOne Enterprise Desktop allows remote attackers to upload arbitrary files via an RMP file that contains .. (dot dot) sequences in a .rjs skin file. Vulnerabilidad de atravesamiento de directorios en RealOne Player, RealOne Player 2.0, y RealOne Enterprise Desktop permite a atacantes remotos subir ficheros arbitrarios mediante un fichero RMP que contenga secuencias .. (punto punto) en fichero de piel .rjs. • http://marc.info/?l=bugtraq&m=107642978524321&w=2 http://service.real.com/help/faq/security/040123_player/EN http://www.kb.cert.org/vuls/id/514734 http://www.securityfocus.com/bid/9580 https://exchange.xforce.ibmcloud.com/vulnerabilities/15123 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2004-0258
https://notcve.org/view.php?id=CVE-2004-0258
Multiple buffer overflows in RealOne Player, RealOne Player 2.0, RealOne Enterprise Desktop, and RealPlayer Enterprise allow remote attackers to execute arbitrary code via malformed (1) .RP, (2) .RT, (3) .RAM, (4) .RPM or (5) .SMIL files. Múltiples desbordamientos de búfer en RealOne Player, RealOne Player 2.0, RealOne Enterprise Desktop, y RealPlayer Enterprise permiten a atacantes remotos ejecutar código de su elección mediante ficheros 1) .RP, (2) .RT, (3) .RAM, (4) .RPM o (5) .SMIL malformados. • http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0027.html http://marc.info/?l=bugtraq&m=107608748813559&w=2 http://www.ciac.org/ciac/bulletins/o-075.shtml http://www.kb.cert.org/vuls/id/473814 http://www.nextgenss.com/advisories/realone.txt http://www.securityfocus.com/bid/9579 http://www.service.real.com/help/faq/security/040123_player/EN https://exchange.xforce.ibmcloud.com/vulnerabilities/15040 •
CVE-2003-0726 – RealOne Player 1.0/2.0/6.0.10/6.0.11 - '.SMIL' File Script Execution
https://notcve.org/view.php?id=CVE-2003-0726
RealOne player allows remote attackers to execute arbitrary script in the "My Computer" zone via a SMIL presentation with a URL that references a scripting protocol, which is executed in the security context of the previously loaded URL, as demonstrated using a "javascript:" URL in the area tag. • https://www.exploit-db.com/exploits/23043 http://securitytracker.com/id?1007532 http://www.digitalpranksters.com/advisories/realnetworks/smilscriptprotocol.html http://www.securityfocus.com/archive/1/335293 http://www.securityfocus.com/bid/8453 http://www.service.real.com/help/faq/security/securityupdate_august2003.html https://exchange.xforce.ibmcloud.com/vulnerabilities/13028 •