Realnetworks Realplayer : OVAL Definitions

Filter: Compliance Inventory Patch Vulnerability All Family: All Windows Unix IOS Pixos
Title Definition Id Class Family
Array index error vulnerability in RealNetworks RealPlayer 11.0 through 11.1 oval:org.mitre.oval:def:6703 Vulnerability windows
Buffer overflow in common/util/rlstate.cpp in Helix Player 1.0.6 and RealPlayer allows remote attackers to cause a denia... oval:org.mitre.oval:def:11364 Vulnerability unix
Buffer overflow in the RTSPProtocol::HandleSetParameterRequest function in client/core/rtspprotocol.cpp in RealNetworks ... oval:org.mitre.oval:def:10641 Vulnerability unix
Buffer overflow in the Unescape function in common/util/hxurl.cpp and player/hxclientkit/src/CHXClientSink.cpp in Helix ... oval:org.mitre.oval:def:10847 Vulnerability unix
CVE-2005-0455 oval:org.opensuse.security:def:20050455 Vulnerability unix
CVE-2005-0611 oval:org.opensuse.security:def:20050611 Vulnerability unix
CVE-2005-2710 oval:org.opensuse.security:def:20052710 Vulnerability unix
CVE-2005-2922 oval:org.opensuse.security:def:20052922 Vulnerability unix
CVE-2006-0323 oval:org.opensuse.security:def:20060323 Vulnerability unix
CVE-2009-4243 oval:org.opensuse.security:def:20094243 Vulnerability unix
CVE-2009-4248 oval:org.opensuse.security:def:20094248 Vulnerability unix
CVE-2010-0416 oval:org.opensuse.security:def:20100416 Vulnerability unix
Format string vulnerability in Real HelixPlayer and RealPlayer 10 allows remote attackers to execute arbitrary code via ... oval:org.mitre.oval:def:11015 Vulnerability unix
Heap-based buffer overflow in the CGIFCodec::GetPacketBuffer function in datatype/image/gif/common/gifcodec.cpp in RealN... oval:org.mitre.oval:def:10144 Vulnerability unix
Heap-based buffer overflow in RealNetworks RealPlayer 10.5 (6.0.12.1056 and earlier), 10, 8, and RealOne Player V2 and V... oval:org.mitre.oval:def:11419 Vulnerability unix
Heap-based buffer overflow in RealNetworks RealPlayer 10.0, 10.1, and possibly 10.5, RealOne Player, and RealPlayer Ente... oval:org.mitre.oval:def:11432 Vulnerability unix
Heap-based buffer overflow in RealNetworks RealPlayer 8, 10, 10.1, and possibly 10.5; RealOne Player 1 and 2; and RealPl... oval:org.mitre.oval:def:11625 Vulnerability unix
Heap-based buffer overflow in RealNetworks RealPlayer 8, 10, 10.1, and possibly 10.5; RealOne Player 1 and 2; and RealPl... oval:org.mitre.oval:def:9100 Vulnerability unix
Heap-based buffer overflow in rtffplin.cpp in RealPlayer 10.5 6.0.12.1056 on Windows, and 10, 10.0.1.436, and other vers... oval:org.mitre.oval:def:9509 Vulnerability unix
Heap-based buffer overflow in the embedded player in multiple RealNetworks products and versions including RealPlayer 10... oval:org.mitre.oval:def:11444 Vulnerability unix
Heap-based buffer overflow in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11... oval:org.mitre.oval:def:9998 Vulnerability unix
Heap-based buffer overflow vulnerability in RealNetworks RealPlayer 11.0 through 11.1 and RealPlayer SP 1.0 through 1.1.... oval:org.mitre.oval:def:6807 Vulnerability windows
Heap-based buffer overflow in datatype/smil/common/smlpkt.cpp in smlrender.dll in RealNetworks RealPlayer 10, RealPlayer... oval:org.mitre.oval:def:11110 Vulnerability unix
Heap-based buffer overflow in RealPlayer 10 and earlier, Helix Player before 10.0.4, and RealOne Player v1 and v2 allows... oval:org.mitre.oval:def:11205 Vulnerability unix
Integer overflow in RealNetworks RealPlayer 8, 10, and 10.5, RealOne Player 1 and 2, and Helix Player 10.0.0 allows remo... oval:org.mitre.oval:def:9550 Vulnerability unix
Integer overflow vulnerability in RealNetworks RealPlayer 11.0 through 11.1 and RealPlayer SP 1.0 through 1.1.4 oval:org.mitre.oval:def:7326 Vulnerability windows
Multiple integer overflows in the ParseKnownType function in RealNetworks RealPlayer 11.0 through 11.1 and RealPlayer SP... oval:org.mitre.oval:def:6651 Vulnerability windows
RealPlayer or RealPlayer SP is installed on the system oval:org.mitre.oval:def:7330 Inventory windows
RHSA-2005:271: HelixPlayer security update (Critical) oval:com.redhat.rhsa:def:2005271 Patch unix
RHSA-2005:271: HelixPlayer security update (Critical) oval:com.redhat.rhsa:def:20050271 Patch unix
Total number of results : 46
Page : 1 (This Page) 2

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html