U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Results Type: Overview
  • Keyword (text search): cpe:2.3:a:realnetworks:realplayer:8:*:*:*:*:*:*:*
  • CPE Name Search: true
There are 41 matching records.
Displaying matches 21 through 40.
Vuln ID Summary CVSS Severity
CVE-2011-4260

RealNetworks RealPlayer before 15.0.0 allows remote attackers to execute arbitrary code via a malformed header in an MP4 file.

Published: November 24, 2011; 6:55:08 AM -0500
V3.x:(not available)
V2.0: 9.3 HIGH
CVE-2011-4259

Integer underflow in RealNetworks RealPlayer before 15.0.0 allows remote attackers to execute arbitrary code via a crafted width value in an MPG file.

Published: November 24, 2011; 6:55:08 AM -0500
V3.x:(not available)
V2.0: 9.3 HIGH
CVE-2011-4258

RealNetworks RealPlayer before 15.0.0 allows remote attackers to execute arbitrary code via a crafted length of an MLTI chunk in an IVR file.

Published: November 24, 2011; 6:55:08 AM -0500
V3.x:(not available)
V2.0: 9.3 HIGH
CVE-2011-4257

The Cook codec in RealNetworks RealPlayer before 15.0.0 allows remote attackers to execute arbitrary code via crafted channel data.

Published: November 24, 2011; 6:55:08 AM -0500
V3.x:(not available)
V2.0: 9.3 HIGH
CVE-2011-4256

The RV30 codec in RealNetworks RealPlayer before 15.0.0 and Mac RealPlayer before 12.0.0.1703 does not initialize an unspecified index value, which allows remote attackers to execute arbitrary code via unknown vectors.

Published: November 24, 2011; 6:55:08 AM -0500
V3.x:(not available)
V2.0: 10.0 HIGH
CVE-2011-4255

Unspecified vulnerability in RealNetworks RealPlayer before 15.0.0 and Mac RealPlayer before 12.0.0.1703 allows remote attackers to execute arbitrary code via an invalid codec name.

Published: November 24, 2011; 6:55:07 AM -0500
V3.x:(not available)
V2.0: 10.0 HIGH
CVE-2011-4254

RealNetworks RealPlayer before 15.0.0 allows remote attackers to execute arbitrary code via a crafted RTSP SETUP request.

Published: November 24, 2011; 6:55:07 AM -0500
V3.x:(not available)
V2.0: 10.0 HIGH
CVE-2011-4253

Unspecified vulnerability in the RV20 codec in RealNetworks RealPlayer before 15.0.0 and Mac RealPlayer before 12.0.0.1703 allows remote attackers to execute arbitrary code via unknown vectors.

Published: November 24, 2011; 6:55:07 AM -0500
V3.x:(not available)
V2.0: 10.0 HIGH
CVE-2011-4252

The RV10 codec in RealNetworks RealPlayer before 15.0.0 and Mac RealPlayer before 12.0.0.1703 allows remote attackers to execute arbitrary code via a crafted sample height.

Published: November 24, 2011; 6:55:07 AM -0500
V3.x:(not available)
V2.0: 9.3 HIGH
CVE-2011-4251

RealNetworks RealPlayer before 15.0.0 allows remote attackers to execute arbitrary code via a crafted sample size in a RealAudio file.

Published: November 24, 2011; 6:55:07 AM -0500
V3.x:(not available)
V2.0: 9.3 HIGH
CVE-2011-4250

Unspecified vulnerability in the ATRC codec in RealNetworks RealPlayer before 15.0.0 and Mac RealPlayer before 12.0.0.1703 allows remote attackers to execute arbitrary code via unknown vectors.

Published: November 24, 2011; 6:55:07 AM -0500
V3.x:(not available)
V2.0: 10.0 HIGH
CVE-2011-4249

Array index error in the RV30 codec in RealNetworks RealPlayer before 15.0.0 allows remote attackers to execute arbitrary code via unspecified vectors.

Published: November 24, 2011; 6:55:07 AM -0500
V3.x:(not available)
V2.0: 10.0 HIGH
CVE-2011-4248

RealNetworks RealPlayer before 15.0.0 allows remote attackers to execute arbitrary code via a malformed AAC file.

Published: November 24, 2011; 6:55:07 AM -0500
V3.x:(not available)
V2.0: 9.3 HIGH
CVE-2011-4247

RealNetworks RealPlayer before 15.0.0 allows remote attackers to execute arbitrary code via a crafted QCELP stream.

Published: November 24, 2011; 6:55:07 AM -0500
V3.x:(not available)
V2.0: 9.3 HIGH
CVE-2011-4246

The AAC codec in RealNetworks RealPlayer before 15.0.0 and Mac RealPlayer before 12.0.0.1703 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.

Published: November 24, 2011; 6:55:07 AM -0500
V3.x:(not available)
V2.0: 10.0 HIGH
CVE-2011-4245

The RealVideo renderer in RealNetworks RealPlayer before 15.0.0 and Mac RealPlayer before 12.0.0.1703 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.

Published: November 24, 2011; 6:55:06 AM -0500
V3.x:(not available)
V2.0: 10.0 HIGH
CVE-2011-4244

Heap-based buffer overflow in the RealVideo renderer in RealNetworks RealPlayer before 15.0.0 allows remote attackers to execute arbitrary code via unspecified vectors.

Published: November 24, 2011; 6:55:06 AM -0500
V3.x:(not available)
V2.0: 10.0 HIGH
CVE-2011-1525

Heap-based buffer overflow in rvrender.dll in RealNetworks RealPlayer 11.0 through 11.1 and 14.0.0 through 14.0.2, and RealPlayer SP 1.0 through 1.1.5, allows remote attackers to execute arbitrary code via a crafted frame in an Internet Video Recording (IVR) file.

Published: April 06, 2011; 12:55:15 PM -0400
V3.x:(not available)
V2.0: 9.3 HIGH
CVE-2010-0417

Buffer overflow in common/util/rlstate.cpp in Helix Player 1.0.6 and RealPlayer allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a RuleBook structure with a large number of rule-separator characters that trigger heap memory corruption.

Published: February 18, 2010; 6:30:00 PM -0500
V3.x:(not available)
V2.0: 5.0 MEDIUM
CVE-2005-4130

** UNVERIFIABLE, PRERELEASE ** NOTE: this issue describes a problem that can not be independently verified as of 20051208. Unspecified vulnerability in unspecified versions of Real Networks RealPlayer allows remote attackers to execute arbitrary code. NOTE: it is not known whether this issue should be MERGED with CVE-2005-4126. The information regarding this issue is extremely vague and does not provide any verifiable information. It has been posted by a reliable reporter with a prerelease disclosure policy. This item has only been assigned a CVE identifier for tracking purposes, and to serve as a concrete example for discussion of the newly emerging UNVERIFIABLE and PRERELEASE content decisions in CVE, which must be discussed by the Editorial Board. Without additional details or independent verification by reliable sources, it is possible that this item might be RECAST or REJECTED.

Published: December 09, 2005; 6:03:00 AM -0500
V3.x:(not available)
V2.0: 7.5 HIGH