Search for vulnerabilities
Vulnerability details: VCID-14dc-nj4b-aaaq
Vulnerability ID VCID-14dc-nj4b-aaaq
Aliases CVE-2008-0296
Summary Heap-based buffer overflow in the libaccess_realrtsp plugin in VideoLAN VLC Media Player 0.8.6d and earlier on Windows might allow remote RTSP servers to cause a denial of service (application crash) or execute arbitrary code via a long string.
Status Published
Exploitability 2.0
Weighted Severity 9.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.00813 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.00813 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.00813 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.00813 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.00813 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.00813 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.00813 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.00813 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.00813 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.00813 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.00813 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.00813 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.00813 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.00813 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.00813 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.00813 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.09005 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
epss 0.17094 https://api.first.org/data/v1/epss?cve=CVE-2008-0296
cvssv2 10.0 https://nvd.nist.gov/vuln/detail/CVE-2008-0296
Data source Exploit-DB
Date added April 24, 2008
Description Kantaris 0.3.4 - SSA Subtitle Local Buffer Overflow
Ransomware campaign use Known
Source publication date April 25, 2008
Exploit type local
Platform windows
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2008-0296
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.82242
EPSS Score 0.00813
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.