Download
| Alert*
oval:org.secpod.oval:def:16750
The host is installed with RealNetworks RealPlayer 16.0.2.32 and is prone to denial of service vulnerability. The flaw is present in the application, which fails to handle an HTML document containing JavaScript code that constructs a long string. Successful exploitation allows remote attackers to ca ... oval:org.secpod.oval:def:16099 The host is installed with RealPlayer before 16.0.3.51, RealPlayer SP 1.0 through 1.1.5 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted .rmp file. Successful exploitation could allow attackers to execute arbitrary cod ... oval:org.secpod.oval:def:16098 The host is installed with RealPlayer before 16.0.3.51, RealPlayer SP 1.0 through 1.1.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed RealMedia file. Successful exploitation could allow attackers to execute arbitrary code o ... oval:org.secpod.oval:def:49253 The host is installed with RealPlayer 16.0.3.51 and earlier is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed .3gp file. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.secpod.oval:def:16937 The host is installed with RealNetworks RealPlayer before 17.0.4.61 and is prone to multiple stack-based buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle a long (1) version number or (2) encoding declaration in the XML declaration of an RMP file. Succe ... oval:org.secpod.oval:def:16938 The host is installed with RealNetworks RealPlayer before 17.0.4.61 and is prone to heap-based buffer overflow vulnerability. The flaw is present in the TRACKID element of an RMP file, which fails to handle the long string. Successful exploitation allows remote attackers to execute arbitrary code. |