{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T16:51:55.786","vulnerabilities":[{"cve":{"id":"CVE-2005-0190","sourceIdentifier":"cve@mitre.org","published":"2004-09-29T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in RealPlayer 10.5 (6.0.12.1040) and earlier allows remote attackers to delete arbitrary files via a Real Metadata Packages (RMP) file with a FILENAME tag containing .. (dot dot) sequences in a filename that ends with a ? (question mark) and an allowed file extension (e.g. .mp3), which bypasses the check for the file extension."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:N/I:P/A:N","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realone_player:1.0:*:*:*:*:*:*:*","matchCriteriaId":"7E940DAB-0CD5-4EC0-916F-6C0B2AE26D19"},{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realone_player:2.0:*:*:*:*:*:*:*","matchCriteriaId":"CF6535A6-6647-4E60-B5AA-24DFC06360AE"},{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realplayer:10.0:*:*:en:*:*:*:*","matchCriteriaId":"4EBB6E97-C8C0-49A7-BCDA-794C4986BAA3"},{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realplayer:10.0:*:*:ja:*:*:*:*","matchCriteriaId":"0C9031C2-95D1-46D0-965A-F4BAA76FB29F"},{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realplayer:10.0:*:de:*:*:*:*:*","matchCriteriaId":"E5E04CB6-AD7E-4F38-A6D9-D68C35DC9EBB"},{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realplayer:10.0_6.0.12.690:*:*:*:*:*:*:*","matchCriteriaId":"01513F87-049E-46A9-A573-A7AF27EB30C5"},{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realplayer:10.0_beta:*:*:*:*:*:*:*","matchCriteriaId":"9FDC43D9-C93E-4FB4-B05B-9FB519B03DCA"},{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realplayer:10.5:*:*:*:*:*:*:*","matchCriteriaId":"348F3214-E5C2-4D39-916F-1B0263D13F40"},{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1016_beta:*:*:*:*:*:*:*","matchCriteriaId":"169753E3-949F-4B7D-9955-A52240CB8E6A"},{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realplayer:10.5_6.0.12.1040:*:*:*:*:*:*:*","matchCriteriaId":"91278EFD-0285-4389-9C53-50FE225C3C19"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=109707741022291&w=2","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=110616160228843&w=2","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"http://secunia.com/advisories/12672/","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://service.real.com/help/faq/security/040928_player/EN/","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.ngssoftware.com/advisories/real-02full.txt","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/11308","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","VDB Entry","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17551","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://marc.info/?l=bugtraq&m=109707741022291&w=2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=110616160228843&w=2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://secunia.com/advisories/12672/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://service.real.com/help/faq/security/040928_player/EN/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.ngssoftware.com/advisories/real-02full.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/11308","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","VDB Entry","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17551","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]}]}}]}