Search for vulnerabilities
Vulnerability details: VCID-5aj9-jszc-vbgy
Vulnerability ID VCID-5aj9-jszc-vbgy
Aliases CVE-2011-0531
Summary
Status Published
Exploitability 2.0
Weighted Severity 0.7
Risk 1.4
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
Data source Exploit-DB
Date added Feb. 8, 2011
Description VideoLAN VLC Media Player 1.1.6 - 'MKV' Memory Corruption (Metasploit)
Ransomware campaign use Known
Source publication date Feb. 8, 2011
Exploit type local
Platform windows
Source update date Nov. 15, 2016
Data source Metasploit
Description This module exploits an input validation error in VideoLAN VLC < 1.1.7. By creating a malicious MKV or WebM file, a remote attacker could execute arbitrary code. NOTE: As of July 1st, 2010, VLC now calls SetProcessDEPPoly to permanently enable NX support on machines that support it.
Note
Reliability:
  - unknown-reliability
Stability:
  - unknown-stability
SideEffects:
  - unknown-side-effects
Ransomware campaign use Unknown
Source publication date Jan. 31, 2011
Platform Windows
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/windows/fileformat/vlc_webm.rb
There are no known vectors.
Exploit Prediction Scoring System (EPSS)
Percentile 0.98756
EPSS Score 0.73766
Published At July 31, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T11:42:54.276329+00:00 EPSS Importer Import https://epss.cyentia.com/epss_scores-current.csv.gz 37.0.0