Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2005-0189
Stack-based buffer overflow in the HandleAction function in RealPlayer 10.5 (6.0.12.1040) and earlier allows remote attackers to execute arbitrary code via a long ShowPreferences argument.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.222
EPSS Ranking
95.5%
CVSS Severity
CVSS v2 Score
7.5
References
http://archives.neohapsis.com/archives/ntbugtraq/2005-q1/0046.html
http://marc.info/?l=bugtraq&m=109707741022291&w=2
http://marc.info/?l=bugtraq&m=110616636318261&w=2
http://service.real.com/help/faq/security/040928_player/EN/
http://www.kb.cert.org/vuls/id/698390
http://www.securityfocus.com/bid/12311
http://archives.neohapsis.com/archives/ntbugtraq/2005-q1/0046.html
http://marc.info/?l=bugtraq&m=109707741022291&w=2
http://marc.info/?l=bugtraq&m=110616636318261&w=2
http://service.real.com/help/faq/security/040928_player/EN/
http://www.kb.cert.org/vuls/id/698390
http://www.securityfocus.com/bid/12311
Products affected by CVE-2005-0189
Realnetworks
»
Realone Player
»
Version:
1.0
cpe:2.3:a:realnetworks:realone_player:1.0
Realnetworks
»
Realone Player
»
Version:
2.0
cpe:2.3:a:realnetworks:realone_player:2.0
Realnetworks
»
Realplayer
»
Version:
10.0
cpe:2.3:a:realnetworks:realplayer:10.0
Realnetworks
»
Realplayer
»
Version:
10.0_6.0.12.690
cpe:2.3:a:realnetworks:realplayer:10.0_6.0.12.690
Realnetworks
»
Realplayer
»
Version:
10.0_beta
cpe:2.3:a:realnetworks:realplayer:10.0_beta
Realnetworks
»
Realplayer
»
Version:
10.5
cpe:2.3:a:realnetworks:realplayer:10.5
Realnetworks
»
Realplayer
»
Version:
10.5_6.0.12.1016_beta
cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1016_beta
Realnetworks
»
Realplayer
»
Version:
10.5_6.0.12.1040
cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1040
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved