Untrusted search path vulnerability in VideoLAN VLC before 0.9.0 allows local users to execute arbitrary code via a malicious library under the modules/ or plugins/ subdirectories of the current working directory.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.videolan.org/?p=vlc.git%3Ba=commit%3Bh=c7cef4fdd8dd72ce0a45be3cda8ba98df5e83181 - | |
References | () http://secunia.com/advisories/31317 - | |
References | () http://security.gentoo.org/glsa/glsa-200807-13.xml - | |
References | () http://trac.videolan.org/vlc/ticket/1578 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/42377 - |
07 Nov 2023, 02:02
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2008-05-12 20:20
Updated : 2024-11-21 00:46
NVD link : CVE-2008-2147
Mitre link : CVE-2008-2147
CVE.ORG link : CVE-2008-2147
JSON object : View
Products Affected
videolan
- vlc
CWE
CWE-264
Permissions, Privileges, and Access Controls