Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
realnetworks vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2022-32291
In Real Player up to and including 20.1.0.312, attackers can execute arbitrary code by placing a UNC share pathname (for a DLL file) in a RAM file.
Realnetworks Realplayer
1 Github repository
9.8
CVSSv3
CVE-2022-32270
In Real Player 20.0.7.309 and 20.0.8.310, external::Import() allows download of arbitrary file types and Directory Traversal, leading to Remote Code Execution. This occurs because it is possible to plant executables in the startup folder (DLL planting could also occur).
Realnetworks Realplayer 20.0.8.310
Realnetworks Realplayer 20.0.7.309
9.8
CVSSv3
CVE-2022-32269
In Real Player 20.0.8.310, the G2 Control allows injection of unsafe javascript: URIs in local HTTP error pages (displayed by Internet Explorer core). This leads to arbitrary code execution.
Realnetworks Realplayer 20.0.8.310
9.6
CVSSv3
CVE-2022-32271
In Real Player 20.0.8.310, there is a DCP:// URI Remote Arbitrary Code Execution Vulnerability. This is an internal URL Protocol used by Real Player to reference a file that contains an URL. It is possible to inject script code to arbitrary domains. It is also possible to referen...
Realnetworks Realplayer 20.0.8.310
5.5
CVSSv3
CVE-2018-13121
RealOne Player 2.0 Build 6.0.11.872 allows remote malicious users to cause a denial of service (array out-of-bounds access and application crash) via a crafted .aiff file.
Realnetworks Realone Player 2.0
5.5
CVSSv3
CVE-2017-9302
RealPlayer 16.0.2.32 allows remote malicious users to cause a denial of service (divide-by-zero error and application crash) via a crafted mp4 file.
Realnetworks Realplayer 16.0.2.32
5.5
CVSSv3
CVE-2016-9018
Improper handling of a repeating VRAT chunk in qcpfformat.dll allows malicious users to cause a Null pointer dereference and crash in RealNetworks RealPlayer 18.1.5.705 through a crafted .QCP media file.
Realnetworks Realplayer 18.1.5.705
1 EDB exploit
NA
CVE-2013-2603
The RACInstaller.StateCtrl.1 ActiveX control in InstallerDlg.dll in RealNetworks GameHouse RealArcade Installer 2.6.0.481 performs unexpected type conversions for invalid parameter types, which allows remote malicious users to execute arbitrary code or cause a denial of service (...
Realnetworks Realarcade Installer 2.6.0.481
NA
CVE-2013-2604
RealNetworks GameHouse RealArcade Installer (aka ActiveMARK Game Installer) 2.6.0.481 and 3.0.7 uses weak permissions (Create Files/Write Data) for the GameHouse Games directory tree, which allows local users to gain privileges via a Trojan horse DLL in an individual game's ...
Realnetworks Realarcade Installer 2.6.0.481
Realnetworks Realarcade Installer 3.0.7
NA
CVE-2014-3113
Multiple buffer overflows in RealNetworks RealPlayer prior to 17.0.10.8 allow remote malicious users to execute arbitrary code via a malformed (1) elst or (2) stsz atom in an MP4 file.
Realnetworks Realplayer 17.0.4.60
Realnetworks Realplayer
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
bypass
open redirect
CVE-2024-4358
CVE-2024-24199
CVE-2024-5550
CVE-2024-5305
CVE-2024-30373
CVE-2024-1800
deserialization
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »