cpe:/a:realnetworks:realone_player:1.0::windows:en cpe:/a:realnetworks:realone_player:2.0::windows cpe:/a:realnetworks:realplayer:10.0::windows cpe:/a:realnetworks:realplayer:10.5:6.0.12.1040:windows cpe:/a:realnetworks:realplayer:10.5:6.0.12.1578:windows cpe:/a:realnetworks:realplayer:10.5:6.0.12.1698:windows cpe:/a:realnetworks:realplayer:10.5:6.0.12.1741:windows cpe:/a:realnetworks:realplayer_enterprise:::windows:en CVE-2007-5080 2007-10-31T13:46:00.000-04:00 2017-07-28T21:33:22.770-04:00 9.3 NETWORK MEDIUM NONE COMPLETE COMPLETE COMPLETE http://nvd.nist.gov 2007-11-01T11:08:00.000-04:00 SECTRACK 1018866 VIM 20071030 RealPlayer Updates of October 25, 2007 BID 26214 SECUNIA 27361 VUPEN ADV-2007-3628 IAVM IAVM:2007-B-0035 CERT-VN VU#759385 CONFIRM http://service.real.com/realplayer/security/10252007_player/en/ MISC http://www.ngssoftware.com/advisories/high-risk-vulnerability-in-real-player-id3-tags/ XF realplayer-mp3-bo(37434) Integer overflow in RealNetworks RealPlayer 10 and 10.5, RealOne Player 1, and RealPlayer Enterprise for Windows allows remote attackers to execute arbitrary code via a crafted Lyrics3 2.00 tag in an MP3 file, resulting in a heap-based buffer overflow.