![]() The Exploit Writers team of Core Security Technologies. This vulnerability was discovered by Ricardo Narvaja (Ricnar) from ![]() Pre-compiled packages for MS Windows are available at the VLC media player 0.8.6d addresses this issue and introduces further Otherwise, websites from untrusted sources should not be opened. ![]() ![]() Which are not affected by this issue and provide the same features set. The user may use VLC media player's Mozilla plugin acquire local user privileges on the vulnerable system).Įxploitation of this bug requires the user to visit a maliciousĬrafted website using VLC media player's ActiveX plugin. To overwrite memory zones and execute arbitrary code within the context If successful, a malicious third party could use this vulnerability Release vulnerability when being used within specifically crafted websites. VLC media player's ActiveX plugin is prone to a recursive plugin Summary : Recursive plugin release vulnerability inĪffected versions : VLC media player 0.8.6 to 0.8.6c
0 Comments
Leave a Reply. |