Download
| Alert*
oval:org.secpod.oval:def:14050
The host is installed with RealNetworks RealPlayer 10/10.5 or RealOne Player and is prone to stack buffer overflow vulnerability. A flaw is present in the application due to improper bounds checking of PLS files. Successful exploitation allows remote attackers to execute arbitrary code via a crafted ... oval:org.mitre.oval:def:7507 Unspecified vulnerability in an ActiveX control in the Internet Explorer (IE) plugin in RealNetworks RealPlayer 11.0 through 11.1 and RealPlayer SP 1.0 through 1.1.4 on Windows has unknown impact and attack vectors related to "multiple browser windows." oval:org.secpod.oval:def:3313 The host is installed with RealNetworks RealPlayer before 15.0.0 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle a crafted MP4 file. Successful exploitation allows remote attackers to execute arbitrary code. oval:org.secpod.oval:def:3314 The host is installed with RealNetworks RealPlayer before 15.0.0 and is prone to heap memory corruption vulnerability. A flaw is present in the application, which fails to handle crafted video dimensions in an MP4 file. Successful exploitation allows remote attackers to execute arbitrary code or cau ... oval:org.secpod.oval:def:3316 The host is installed with RealNetworks RealPlayer before 15.0.0 and is prone to integer underflow vulnerability. A flaw is present in the application, which fails to handle a crafted width value in an MPG file. Successful exploitation allows remote attackers to execute arbitrary code. oval:org.secpod.oval:def:3331 The host is installed with RealNetworks RealPlayer before 15.0.0 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of servi ... oval:org.secpod.oval:def:6194 The host is installed with RealPlayer before 15.0.4.53 or RealPlayer SP 1.0 through 1.1.5 and is prone to buffer overflow vulnerability. A flaw is present in the applications, which fail to handle a crafted RealJukebox Media file. Successful exploitation allows remote attackers to execute arbitrary ... oval:org.secpod.oval:def:6196 The host is installed with RealPlayer before 15.0.4.53 or RealPlayer SP 1.0 through 1.1.5 and is prone to memory corruption vulnerability. A flaw is present in the applications, which fail to handle mp4fformat.dll in the QuickTime File Format plugin. Successful exploitation allows remote attackers t ... oval:org.secpod.oval:def:14053 The host is installed with RealNetworks RealPlayer or RealPlayer SP and is prone to heap buffer overflow vulnerability. A flaw is present in the application due to improper bounds checking of MP4 files. Successful exploitation allows remote attackers to execute arbitrary code via a malformed MP4 fil ... oval:org.secpod.oval:def:3315 The host is installed with RealNetworks RealPlayer before 15.0.0 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle malformed header in an MP4 file. Successful exploitation allows remote attackers to execute arbitrary code. oval:org.secpod.oval:def:3317 The host is installed with RealNetworks RealPlayer before 15.0.0 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle a crafted length of an MLTI chunk in an IVR file. Successful exploitation allows remote attackers to execute arbitrary cod ... oval:org.secpod.oval:def:3318 The host is installed with RealNetworks RealPlayer before 15.0.0 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle crafted channel data. Successful exploitation allows remote attackers to execute arbitrary code. oval:org.secpod.oval:def:3321 The host is installed with RealNetworks RealPlayer before 15.0.0 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle a crafted RTSP SETUP request. Successful exploitation allows remote attackers to execute arbitrary code. oval:org.secpod.oval:def:3324 The host is installed with RealNetworks RealPlayer before 15.0.0 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle crafted sample size in a RealAudio file. Successful exploitation allows remote attackers to execute arbitrary code. oval:org.secpod.oval:def:3327 The host is installed with RealNetworks RealPlayer before 15.0.0 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to properly handle malformed AAC file. Successful exploitation allows remote attackers to execute arbitrary code. oval:org.secpod.oval:def:3328 The host is installed with RealNetworks RealPlayer before 15.0.0 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to properly handle a crafted QCELP stream. Successful exploitation allows remote attackers to execute arbitrary code. oval:org.secpod.oval:def:14051 The host is installed with RealNetworks RealPlayer 10/10.5, RealOne Player or RealPlayer Enterprise and is prone to integer overflow vulnerability. A flaw is present in the application due to improper bounds checking of Lyrics3 tags in MP3 files. Successful exploitation allows remote attackers to ex ... oval:org.secpod.oval:def:4355 The host is installed with RealPlayer 11.x through 11.1, 14.x through 14.0.7, 15.x before 15.02.71, and RealPlayer SP 1.0 through 1.1.5 and is prone to a remote code execution vulnerability. A flaw is present in the applications, which fail to handle a crafted RV20 RealVideo video stream. Successful ... oval:org.secpod.oval:def:4356 The host is installed with RealNetworks RealPlayer 11.x through 11.1, 14.x through 14.0.7, 15.x before 15.02.71, or RealPlayer SP 1.0 through 1.1.5 and is prone to a remote code execution vulnerability. A flaw is present in the applications, which fail to handle crafted flags in an RMFF file. Succes ... oval:org.secpod.oval:def:4357 The host is installed with RealNetworks RealPlayer 11.x through 11.1, 14.x through 14.0.7, 15.x before 15.02.71, or RealPlayer SP 1.0 through 1.1.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fail to handle vectors involving a VIDOBJ_START_ ... oval:org.secpod.oval:def:4358 The host is installed with RealNetworks RealPlayer 11.x through 11.1, 14.x through 14.0.7, 15.x before 15.02.71, or RealPlayer SP 1.0 through 1.1.5 and is prone to an unspecified vulnerability. A flaw is present in the applications, which fail to handle a crafted RV40 RealVideo video stream. Success ... oval:org.secpod.oval:def:4359 The host is installed with RealNetworks RealPlayer 11.x through 11.1, 14.x through 14.0.7, 15.x before 15.02.71, or RealPlayer SP 1.0 through 1.1.5 and is prone to an arbitrary code execution vulnerability. A flaw is present in the applications, which fail to properly handle height and width values. ... oval:org.secpod.oval:def:4360 The host is installed with RealNetworks RealPlayer 11.x through 11.1, 14.x through 14.0.7, 15.x before 15.02.71, or RealPlayer SP 1.0 through 1.1.5 and is prone to an unspecified vulnerability. A flaw is present in the applications, which fail to properly handle vectors involving the coded_frame_siz ... oval:org.secpod.oval:def:3326 The host is installed with RealNetworks RealPlayer before 15.0.0 and is prone to array index error vulnerability. A flaw is present in the application, which fails to properly handle an arbitrary index. Successful exploitation allows remote attackers to execute arbitrary code. oval:org.secpod.oval:def:20142 The host is installed with RealNetworks RealPlayer before 17.0.10.8 and is prone to multiple stack-based buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle a malformed (1) elst or (2) stsz atom in an MP4 file. Successful exploitation allows remote attack ... oval:org.secpod.oval:def:14052 The host is installed with RealNetworks RealPlayer 8/10/10.5, RealOne Player or RealPlayer Enterprise and is prone to heap buffer overflow vulnerability. A flaw is present in the application due to improper bounds checking of RM files. Successful exploitation allows remote attackers to execute arbit ... oval:org.secpod.oval:def:3323 The host is installed with RealNetworks RealPlayer before 15.0.0 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to handle a crafted sample height. Successful exploitation allows remote attackers to execute arbitrary code. oval:org.secpod.oval:def:3319 The host is installed with RealNetworks RealPlayer before 15.0.0 and is prone to remote code execution vulnerability. A flaw is present in the application, in which RV30 codec does not initialize an unspecified index value. Successful exploitation allows remote attackers to execute arbitrary code. oval:org.secpod.oval:def:3330 The host is installed with RealNetworks RealPlayer before 15.0.0 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service. oval:org.secpod.oval:def:3329 The host is installed with RealNetworks RealPlayer before 15.0.0 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle memory. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service. oval:org.secpod.oval:def:3325 The host is installed with RealNetworks RealPlayer before 15.0.0 and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to properly handle ATRC Codec parsing. Successful exploitation allows remote attackers to execute arbitrary code. oval:org.secpod.oval:def:3322 The host is installed with RealNetworks RealPlayer before 15.0.0 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle RV20 Decoding. Successful exploitation allows remote attackers to execute arbitrary code. oval:org.secpod.oval:def:3320 The host is installed with RealNetworks RealPlayer before 15.0.0 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle an invalid codec name. Successful exploitation allows remote attackers to execute arbitrary code. oval:org.secpod.oval:def:14048 The host is installed with RealNetworks RealPlayer 8/10/10.5, RealOne Player or RealPlayer Enterprise and is prone to heap buffer overflow vulnerability. A flaw is present in the application due to improper bounds checking of RA and RAM files. Successful exploitation allows remote attackers to execu ... oval:org.secpod.oval:def:14047 The host is installed with RealNetworks RealPlayer 10.5/10.0, RealOne Player V2 or RealPlayer Enterprise and is prone to heap buffer overflow vulnerability. A flaw is present in the application due to improper bounds checking of SWF files. Successful exploitation allows remote attackers to execute a ... oval:org.secpod.oval:def:14049 The host is installed with RealNetworks RealPlayer 10/10.5, RealOne Player or RealPlayer Enterprise and is prone to stack buffer overflow vulnerability. A flaw is present in the application due to an error in the SmilTimeValue::parseWallClockValue function in smlprstime.cpp. Successful exploitation ... oval:org.secpod.oval:def:6195 The host is installed with RealPlayer before 15.0.4.53 or RealPlayer SP 1.0 through 1.1.5 and is prone to remote code execution vulnerability. A flaw is present in the applications, which fail to properly parse ASMRuleBook data in RealMedia files. Successful exploitation allows remote attackers to e ... oval:org.secpod.oval:def:293 The host is installed with RealNetworks RealPlayer or RealPlayer SP and is prone to heap-based buffer overflow vulnerability. A flaw is present in vidplin.dll, which fails to perform the boundary check while processing malformed header data. Successful exploitation allows remote attackers to execute ... oval:org.mitre.oval:def:6807 Heap-based buffer overflow in RealNetworks RealPlayer 11.0 through 11.1 and RealPlayer SP 1.0 through 1.1.4 on Windows allows remote attackers to execute arbitrary code via large size values in QCP audio content. oval:org.secpod.oval:def:7510 The host is installed with RealPlayer 15.0.4.53 or prior or RealPlayer SP 1.0 through 1.1.5 and is prone to denial of service vulnerability. A flaw is present in the applications, which fail to properly handle codec frame sizes in RealAudio files. Successful exploitation allows remote attackers to c ... oval:org.secpod.oval:def:16099 The host is installed with RealPlayer before 16.0.3.51, RealPlayer SP 1.0 through 1.1.5 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted .rmp file. Successful exploitation could allow attackers to execute arbitrary cod ... oval:org.secpod.oval:def:2109 The host is installed with RealPlayer 11.0 through 11.1 or 14.0.0 through 14.0.5 or RealPlayer SP 1.0 through 1.1.5 or RealPlayer Enterprise 2.0 through 2.1.5 and is prone to use-after-free vulnerability. A flaw is present in the application which fails to properly handle memory. Successful exploita ... oval:org.secpod.oval:def:16098 The host is installed with RealPlayer before 16.0.3.51, RealPlayer SP 1.0 through 1.1.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed RealMedia file. Successful exploitation could allow attackers to execute arbitrary code o ... oval:org.mitre.oval:def:7330 RealNetworks RealPlayer Product ((32 bit) is installed oval:org.secpod.oval:def:8084 The host is installed with RealNetworks RealPlayer 15.0.5.109 or earlier and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted ZIP file that triggers incorrect processing of long pathnames by the Watch Folders feature. Succes ... oval:org.secpod.oval:def:2110 The host is installed with RealPlayer 11.0 through 11.1 or 14.0.0 through 14.0.5 or RealPlayer SP 1.0 through 1.1.5 and is prone to use-after-free vulnerability. A flaw is present in the application which fails to properly handle memory. Successful exploitation allows remote attackers to execute arb ... oval:org.secpod.oval:def:2112 The host is installed with RealPlayer 11.0 through 11.1 or 14.0.0 through 14.0.5 or RealPlayer SP 1.0 through 1.1.5 or RealPlayer Enterprise 2.0 through 2.1.5 and is prone to use-after-free vulnerability. A flaw is present in the application which fails to properly handle memory. Successful exploita ... oval:org.secpod.oval:def:2111 The host is installed with RealPlayer 11.0 through 11.1 or 14.0.0 through 14.0.5 or RealPlayer SP 1.0 through 1.1.5 and is prone to remote code-execution vulnerability. A flaw is present in the application which is caused due to an out-of-bounds condition. Successful exploitation allows remote attac ... oval:org.secpod.oval:def:2114 The host is installed with RealPlayer 11.0 through 11.1 or 14.0.0 through 14.0.5 or RealPlayer SP 1.0 through 1.1.5 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application which fails to properly handle crafted QCP file. Successful exploitation allows remote at ... oval:org.secpod.oval:def:2113 The host is installed with RealPlayer 11.0 through 11.1 or 14.0.0 through 14.0.5 or RealPlayer SP 1.0 through 1.1.5 and is prone to buffer overflow vulnerability. A flaw is present in the application which fails to properly handle crafted raw_data_frame field in an AAC file. Successful exploitation ... oval:org.secpod.oval:def:2116 The host is installed with RealPlayer 11.0 through 11.1 or 14.0.0 through 14.0.5 or RealPlayer SP 1.0 through 1.1.5 or RealPlayer Enterprise 2.0 through 2.1.5 and is prone to remote code-execution vulnerability. A flaw is present in the application which fails to sufficiently validate user-supplied ... oval:org.secpod.oval:def:2115 The host is installed with RealPlayer 11.0 through 11.1 or 14.0.0 through 14.0.5 or RealPlayer SP 1.0 through 1.1.5 or RealPlayer Enterprise 2.0 through 2.1.5 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application which fails to properly handle crafted ID3v2 t ... oval:org.secpod.oval:def:2118 The host is installed with RealPlayer 11.0 through 11.1 or 14.0.0 through 14.0.5 or RealPlayer SP 1.0 through 1.1.5 and is prone to remote code execution vulnerability. A flaw is present in the application which fails to sufficiently validate user-supplied data. Successful exploitation allows remote ... oval:org.secpod.oval:def:2117 The host is installed with RealPlayer 11.0 through 11.1 or 14.0.0 through 14.0.5 or RealPlayer SP 1.0 through 1.1.5 or RealPlayer Enterprise 2.0 through 2.1.5 and is prone to cross-zone scripting vulnerability. A flaw is present in the application which fails to properly handle local HTML files. Suc ... oval:org.secpod.oval:def:2119 The host is installed with RealPlayer 11.0 through 11.1 or 14.0.0 through 14.0.5 or RealPlayer SP 1.0 through 1.1.5 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application which fails to perform adequate boundary-checks on user-supplied data. Successful exploit ... oval:org.mitre.oval:def:7169 RealNetworks RealPlayer 11.0 through 11.1 and RealPlayer SP 1.0 through 1.1.4 on Windows do not properly handle dimensions during YUV420 transformations, which might allow remote attackers to execute arbitrary code via crafted MP4 content. oval:org.secpod.oval:def:655 The host is installed with Real Networks RealPlayer and is prone to buffer overflow vulnerability. A flaw is present in rvrender.dll, which fails to handle malicious Internet Video Recording (IVR) files. Successful exploitation could allow remote attackers to execute arbitrary code or cause a denial ... oval:org.secpod.oval:def:16937 The host is installed with RealNetworks RealPlayer before 17.0.4.61 and is prone to multiple stack-based buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle a long (1) version number or (2) encoding declaration in the XML declaration of an RMP file. Succe ... oval:org.mitre.oval:def:7326 Integer overflow in RealNetworks RealPlayer 11.0 through 11.1 and RealPlayer SP 1.0 through 1.1.4 on Windows might allow remote attackers to execute arbitrary code via a crafted QCP file that triggers a heap-based buffer overflow. oval:org.secpod.oval:def:16938 The host is installed with RealNetworks RealPlayer before 17.0.4.61 and is prone to heap-based buffer overflow vulnerability. The flaw is present in the TRACKID element of an RMP file, which fails to handle the long string. Successful exploitation allows remote attackers to execute arbitrary code. oval:org.secpod.oval:def:16750 The host is installed with RealNetworks RealPlayer 16.0.2.32 and is prone to denial of service vulnerability. The flaw is present in the application, which fails to handle an HTML document containing JavaScript code that constructs a long string. Successful exploitation allows remote attackers to ca ... oval:org.secpod.oval:def:2120 The host is installed with RealPlayer 14.0.0 through 14.0.5 and is prone to Cross-Zone scripting remote code execution vulnerability. A flaw is present in the application that is caused by an error related to processing HTML files. Successful exploitation allows remote attackers to execute arbitrary ... oval:org.secpod.oval:def:2243 The host is installed with RealNetworks RealPlayer 11.0 through 11.1 or SP 1.0 through 1.1.5 or 14.0.0 through 14.0.1 or Enterprise 2.0 through 2.1.4 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which uses predictable names for temporary files and ... oval:org.secpod.oval:def:946 The host is installed with RealNetworks RealPlayer or RealPlayer SP and is prone to remote code execution vulnerability. A flaw is present in the OpenURLInDefaultBrowser method, which launches a default handler for the filename specified in the first argument. Successful exploitation allows remote a ... oval:org.mitre.oval:def:6703 Array index error in RealNetworks RealPlayer 11.0 through 11.1 on Windows allows remote attackers to execute arbitrary code via a malformed header in a RealMedia .IVR file. oval:org.secpod.oval:def:8236 The host is installed with RealNetworks RealPlayer 14.0 before 16.0.0.282, 11.0 through 11.1 or RealPlayer SP 1.0 through 1.1.5 and is prone to buffer overflow vulnerability. A flaw is present in the applications, which fail to handle a crafted RealMedia file. Successful exploitation allows remote a ... oval:org.secpod.oval:def:8237 The host is installed with RealNetworks RealPlayer before 16.0.0.282, 11.0 through 11.1 or RealPlayer SP 1.0 through 1.1.5 and is prone to arbitrary code execution vulnerability. A flaw is present in the applications, which fail to handle a RealAudio file that triggers access to an invalid pointer. ... oval:org.secpod.oval:def:7509 The host is installed with RealPlayer 15.0.2.72 or prior or RealPlayer SP 1.0 through 1.1.5 and is prone to buffer overflow vulnerability. A flaw is present in the applications, which fail to handle a crafted RealMedia file. Successful exploitation allows remote attackers to cause a denial of servic ... oval:org.secpod.oval:def:7506 The host is installed with RealPlayer 15.0.2.72 or prior or RealPlayer SP 1.0 through 1.1.5 and is prone to buffer overflow vulnerability. A flaw is present in the applications, which fail to properly unpack steam-data of a crafted AAC file. Successful exploitation allows remote attackers to cause a ... oval:org.secpod.oval:def:7507 The host is installed with RealPlayer 15.0.2.72 or prior or RealPlayer SP 1.0 through 1.1.5 and is prone to denial of service vulnerability. A flaw is present in the applications, which fail to properly decode a crafted AAC file. Successful exploitation allows remote attackers to cause a denial of s ... oval:org.secpod.oval:def:7508 The host is installed with RealPlayer 15.0.2.72 or prior or RealPlayer SP 1.0 through 1.1.5 and is prone to buffer overflow vulnerability. A flaw is present in the applications, which fail to handle a crafted RealMedia file. Successful exploitation allows remote attackers to cause a denial of servic ... oval:org.secpod.oval:def:49253 The host is installed with RealPlayer 16.0.3.51 and earlier is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed .3gp file. Successful exploitation could allow attackers to execute arbitrary code or crash the service. oval:org.mitre.oval:def:6651 Multiple integer overflows in the ParseKnownType function in RealNetworks RealPlayer 11.0 through 11.1 and RealPlayer SP 1.0 through 1.1.4 on Windows allow remote attackers to execute arbitrary code via crafted (1) HX_FLV_META_AMF_TYPE_MIXEDARRAY or (2) HX_FLV_META_AMF_TYPE_ARRAY data in an FLV file ... oval:org.secpod.oval:def:49254 The host is installed with RealPlayer 18.1.5.705 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a repeating VRAT chunk in qcpfformat.dll. Successful exploitation could allow attackers to cause a null pointer dereference and crash. oval:org.mitre.oval:def:7227 Unspecified vulnerability in RealNetworks RealPlayer 11.0 through 11.1 allows attackers to bypass intended access restrictions on files via unknown vectors. oval:org.secpod.oval:def:4361 The host is installed with RealNetworks RealPlayer 11.x through 11.1, 14.x through 14.0.7, or RealPlayer SP 1.0 through 1.1.5 and is prone to an unspecified vulnerability. A flaw is present in the applications, which fail to properly decode samples. Successful exploitation could allow attackers to e ... oval:org.secpod.oval:def:87466 The host is installed with RealPlayer 16.0.2.32 and is prone to denial of service vulnerability. A flaw is present in the application, which fail to properly handle a crafted mp4 file. Successful exploitation allows remote attackers to cause a denial of service or divide-by-zero error and applicatio ... |