First published: Mon May 12 2008(Updated: )
Untrusted search path vulnerability in VideoLAN VLC before 0.9.0 allows local users to execute arbitrary code via a malicious library under the modules/ or plugins/ subdirectories of the current working directory.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
VideoLAN VLC | =0.8.0 | |
VideoLAN VLC | =0.8.5 | |
VideoLAN VLC | =0.7.0 | |
VideoLAN VLC | =0.4.6 | |
VideoLAN VLC | =0.8.4 | |
VideoLAN VLC | =0.8.6b | |
VideoLAN VLC | =0.5.3 | |
VideoLAN VLC | =0.6.0 | |
VideoLAN VLC | =0.8.6c | |
VideoLAN VLC | =0.7.1 | |
VideoLAN VLC | =0.6.1 | |
VideoLAN VLC | =0.6.2 | |
VideoLAN VLC | =0.5.2 | |
VideoLAN VLC | =0.5.1a | |
VideoLAN VLC | =0.8.1 | |
VideoLAN VLC | =0.8.6d | |
VideoLAN VLC | =0.5.0 | |
VideoLAN VLC | =0.8.6e | |
VideoLAN VLC | =0.5.1 | |
VideoLAN VLC | =0.7.2 | |
VideoLAN VLC | <=0.8.6 | |
VideoLAN VLC | =0.8.2 | |
VideoLAN VLC | =0.8.4a | |
VideoLAN VLC | =0.8.6a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.