RealNetworks RealPlayer 17.0.4.60

CPE Details

RealNetworks RealPlayer 17.0.4.60
17.0.4.60
2014-01-07
02h03 +00:00
2014-04-29
10h36 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:realnetworks:realplayer:17.0.4.60:*:*:*:*:*:*:*

Informations

Vendor

realnetworks

Product

realplayer

Version

17.0.4.60

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-32291 2022-06-05 19h23 +00:00 In Real Player through 20.1.0.312, attackers can execute arbitrary code by placing a UNC share pathname (for a DLL file) in a RAM file.
8.8
High
CVE-2014-3113 2014-07-07 08h00 +00:00 Multiple buffer overflows in RealNetworks RealPlayer before 17.0.10.8 allow remote attackers to execute arbitrary code via a malformed (1) elst or (2) stsz atom in an MP4 file.
9.3
CVE-2013-7260 2014-01-03 19h00 +00:00 Multiple stack-based buffer overflows in RealNetworks RealPlayer before 17.0.4.61 on Windows, and Mac RealPlayer before 12.0.1.1738, allow remote attackers to execute arbitrary code via a long (1) version number or (2) encoding declaration in the XML declaration of an RMP file, a different issue than CVE-2013-6877.
7.5
CVE-2010-0417 2010-02-18 22h00 +00:00 Buffer overflow in common/util/rlstate.cpp in Helix Player 1.0.6 and RealPlayer allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a RuleBook structure with a large number of rule-separator characters that trigger heap memory corruption.
5
CVE-2005-4130 2005-12-09 11h00 +00:00 ** UNVERIFIABLE, PRERELEASE ** NOTE: this issue describes a problem that can not be independently verified as of 20051208. Unspecified vulnerability in unspecified versions of Real Networks RealPlayer allows remote attackers to execute arbitrary code. NOTE: it is not known whether this issue should be MERGED with CVE-2005-4126. The information regarding this issue is extremely vague and does not provide any verifiable information. It has been posted by a reliable reporter with a prerelease disclosure policy. This item has only been assigned a CVE identifier for tracking purposes, and to serve as a concrete example for discussion of the newly emerging UNVERIFIABLE and PRERELEASE content decisions in CVE, which must be discussed by the Editorial Board. Without additional details or independent verification by reliable sources, it is possible that this item might be RECAST or REJECTED.
7.5