Search for vulnerabilities
Vulnerability ID | VCID-fqaq-nwsz-ekfa |
Aliases |
CVE-2012-1775
|
Summary | |
Status | Published |
Exploitability | 2.0 |
Weighted Severity | 0.6 |
Risk | 1.2 |
Affected and Fixed Packages | Package Details |
There are no known CWE. |
System | Score | Found at |
---|---|---|
epss | 0.62287 | https://api.first.org/data/v1/epss?cve=CVE-2012-1775 |
epss | 0.62287 | https://api.first.org/data/v1/epss?cve=CVE-2012-1775 |
epss | 0.62287 | https://api.first.org/data/v1/epss?cve=CVE-2012-1775 |
epss | 0.62287 | https://api.first.org/data/v1/epss?cve=CVE-2012-1775 |
epss | 0.62287 | https://api.first.org/data/v1/epss?cve=CVE-2012-1775 |
epss | 0.62287 | https://api.first.org/data/v1/epss?cve=CVE-2012-1775 |
epss | 0.62287 | https://api.first.org/data/v1/epss?cve=CVE-2012-1775 |
epss | 0.62287 | https://api.first.org/data/v1/epss?cve=CVE-2012-1775 |
epss | 0.62287 | https://api.first.org/data/v1/epss?cve=CVE-2012-1775 |
Reference id | Reference type | URL |
---|---|---|
https://api.first.org/data/v1/epss?cve=CVE-2012-1775 | ||
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1775 | ||
CVE-2012-1775;OSVDB-80188 | Exploit | https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/18825.rb |
Data source | Exploit-DB |
---|---|
Date added | May 3, 2012 |
Description | VideoLAN VLC Media Player 2.0.0 - Mms Stream Handling Buffer Overflow (Metasploit) |
Ransomware campaign use | Known |
Source publication date | May 3, 2012 |
Exploit type | remote |
Platform | windows |
Source update date | Nov. 15, 2016 |
Data source | Metasploit |
---|---|
Description | This module exploits a buffer overflow in VLC media player VLC media player prior to 2.0.0. The vulnerability is due to a dangerous use of sprintf which can result in a stack buffer overflow when handling a malicious MMS URI. This module uses the browser as attack vector. A specially crafted MMS URI is used to trigger the overflow and get flow control through SEH overwrite. Control is transferred to code located in the heap through a standard heap spray. The module only targets IE6 and IE7 because no DEP/ASLR bypass has been provided. |
Note | Reliability: - unknown-reliability Stability: - unknown-stability SideEffects: - unknown-side-effects |
Ransomware campaign use | Unknown |
Source publication date | March 15, 2012 |
Platform | Windows |
Source URL | https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/windows/browser/vlc_mms_bof.rb |
Percentile | 0.98277 |
EPSS Score | 0.62287 |
Published At | July 31, 2025, 12:55 p.m. |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
2025-07-31T11:44:45.180142+00:00 | EPSS Importer | Import | https://epss.cyentia.com/epss_scores-current.csv.gz | 37.0.0 |