3 results (0.005 seconds)

CVSS: 5.0EPSS: 1%CPEs: 3EXPL: 3

Real Networks RealServer 7 and earlier allows remote attackers to obtain portions of RealServer's memory contents, possibly including sensitive information, by accessing the /admin/includes/ URL. • https://www.exploit-db.com/exploits/20406 http://archives.neohapsis.com/archives/bugtraq/2000-11/0236.html http://service.real.com/help/faq/security/memory.html http://www.securityfocus.com/bid/1957 https://exchange.xforce.ibmcloud.com/vulnerabilities/5538 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 1

RealMedia RealServer reveals the real IP address of a Real Server, even if the address is supposed to be private. • https://www.exploit-db.com/exploits/19805 http://archives.neohapsis.com/archives/bugtraq/2000-03/0069.html http://www.securityfocus.com/bid/1049 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Real Media RealServer (rmserver) 6.0.3.353 stores a password in plaintext in the world-readable rmserver.cfg file, which allows local users to gain privileges. • http://marc.info/?l=bugtraq&m=92411181619110&w=2 •