Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2011-0522

EPSS 66.19% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2011-0522

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The StripTags function in (1) the USF decoder (modules/codec/subtitles/subsdec.c) and (2) the Text decoder (modules/codec/subtitles/subsusf.c) in VideoLAN VLC Media Player 1.1 before 1.1.6-rc allows remote attackers to execute arbitrary code via a subtitle with an opening "<" without a closing ">" in an MKV file, which triggers heap memory corruption, as demonstrated using refined-australia-blu720p-sample.mkv.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
VideoLAN VLC媒体播放器StripTags函数缓冲区溢出漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
VideoLAN VLC media player是法国VideoLAN组织开发的一款免费、开源的跨平台多媒体播放器(也是一个多媒体框架)。该产品支持播放多种介质(文件、光盘等)、多种音视频格式(WMV, MP3等)等。 VideoLAN VLC媒体播放器1.1.6-rc之前的1.1版本中的(1)USF解码器(modules/codec/subtitles/subsdec.c)和(2)Text解码器(modules/codec/subtitles/subsusf.c)中的StripTags函数中存在缓冲区
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2011-0522

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2011-0522

登录查看更多情报信息。

Same Patch Batch · n/a · 2011-02-07 · 10 CVEs total

CVE-2010-4506Oracle Passlogix v-GO Self-Service Password Reset和OEM加密问题漏洞
CVE-2011-0323Topaz Systems SigPlus Pro ActiveX Control多个远程代码执行漏洞
CVE-2011-0324Topaz Systems SigPlus Pro ActiveX Control多个堆缓冲区溢出漏洞
CVE-2011-0531VideoLAN VLC媒体播放器输入验证漏洞
CVE-2011-0899Drupal AES加密模块权限提升漏洞
CVE-2011-0900Terminal Server Client tsc_launch_remote函数栈缓冲区溢出漏洞
CVE-2011-0901Terminal Server Client tsc_launch_remote函数多个栈缓冲区溢出漏洞
CVE-2011-0902Sun Microsystems SunScreen Firewall Java Service多个不可信搜索路径漏洞
CVE-2011-0903Awcm-Cms AR Web Content Manager Cookie参数多个本地目录遍历漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2011-0522

No comments yet


Leave a comment