First published: Fri Jan 31 2020(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in the HTTP Interface in VideoLAN VLC Media Player before 2.0.7 allow remote attackers to inject arbitrary web script or HTML via the (1) command parameter to requests/vlm_cmd.xml, (2) dir parameter to requests/browse.xml, or (3) URI in a request, which is returned in an error message through share/lua/intf/http.lua.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Videolan Vlc Media Player | <2.0.7 | |
openSUSE openSUSE | =13.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3565 is a vulnerability that allows remote attackers to inject arbitrary web script or HTML in VideoLAN VLC Media Player.
CVE-2013-3565 has a severity level of 6.1, which is considered medium.
CVE-2013-3565 affects VideoLAN VLC Media Player versions before 2.0.7 and allows for multiple cross-site scripting (XSS) vulnerabilities.
Remote attackers can exploit CVE-2013-3565 by injecting arbitrary web script or HTML through the command parameter to requests/vlm_cmd.xml, dir parameter to requests/browse.xml, or URI in a request.
Yes, updating VideoLAN VLC Media Player to version 2.0.7 or later will fix CVE-2013-3565.