Directory traversal vulnerability in RealPlayer 10.5 (6.0.12.1040) and earlier allows remote attackers to delete arbitrary files via a Real Metadata Packages (RMP) file with a FILENAME tag containing .. (dot dot) sequences in a filename that ends with a ? (question mark) and an allowed file extension (e.g. .mp3), which bypasses the check for the file extension.
https://exchange.xforce.ibmcloud.com/vulnerabilities/17551
http://www.securityfocus.com/bid/11308
http://www.ngssoftware.com/advisories/real-02full.txt
http://service.real.com/help/faq/security/040928_player/EN/
http://secunia.com/advisories/12672/