cpe:/a:realnetworks:realplayer:11.0 cpe:/a:realnetworks:realplayer:11.1 cpe:/a:realnetworks:realplayer_sp:1.0.0 cpe:/a:realnetworks:realplayer_sp:1.0.1 cpe:/a:realnetworks:realplayer_sp:1.0.2 cpe:/a:realnetworks:realplayer_sp:1.0.5 cpe:/a:realnetworks:realplayer_sp:1.1 cpe:/a:realnetworks:realplayer_sp:1.1.1 cpe:/a:realnetworks:realplayer_sp:1.1.2 cpe:/a:realnetworks:realplayer_sp:1.1.3 cpe:/a:realnetworks:realplayer_sp:1.1.4 CVE-2010-0120 2010-08-30T16:00:01.920-04:00 2017-09-18T21:30:14.187-04:00 9.3 NETWORK MEDIUM NONE COMPLETE COMPLETE COMPLETE http://nvd.nist.gov 2010-08-31T09:39:00.000-04:00 SECTRACK 1024370 SECUNIA 41096 SECUNIA 41154 VUPEN ADV-2010-2216 MISC http://secunia.com/secunia_research/2010-8/ CONFIRM http://service.real.com/realplayer/security/08262010_player/en/ XF realplayer-qcp-audio-bo(61422) Heap-based buffer overflow in RealNetworks RealPlayer 11.0 through 11.1 and RealPlayer SP 1.0 through 1.1.4 on Windows allows remote attackers to execute arbitrary code via large size values in QCP audio content.