

The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. The cookie is used to store the user consent for the cookies in the category "Performance". This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". The cookie is used to store the user consent for the cookies in the category "Other. The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".

The cookie is used to store the user consent for the cookies in the category "Analytics". RealPlayer will download and install the requested software. Select the software you want to download and install, then click Install. If new software is available, the 'AutoUpdate' dialog will open and show you a list. These cookies ensure basic functionalities and security features of the website, anonymously. Manual Update: When you select > Check for Update, RealPlayer checks for new and updated software.

Note: this vulnerability is being actively exploited. Successful exploitation of the vulnerability results in compromise of vulnerable system. A remote attacker can create a specially crafted web page, trick the victim into opening it, cause stack-based buffer overflow and execute arbitrary code with privileges of the current user. The vulnerability exists due to boundary error when processing playlist names passed via "Import()" method to RealPlayer IERPCtl ActiveX control (ierpplug.dll). The vulnerability allows a remote user to execute arbitrary code on the target system. CWE-ID: CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
