The threat to the vulnerability that uses REAL Player and IE has begun to spread on the network. The Secunia security agency pointed out that the browser in RealPlayer can open the local disk file via the RealMedia (.rm) file. This means that a malicious site can load a local HTML document in a document associated with the locally with a copyable RealMedia file. This defect is mainly present in RealPlayer 10.5 (Build 6.0.12.1056) versions, and other versions will also be affected.
There is a mitigation for this issue, first avoid opening the RealMedia file from an unused site or resource, and restricting some similar files to open by the RealPlayer built-in browser. I think so far we can do this is that we can only do well-made measures before RealPlayer and IE revised.