Search for vulnerabilities
Vulnerability details: VCID-vgx8-z91f-1fbm
Vulnerability ID VCID-vgx8-z91f-1fbm
Aliases CVE-2024-46461
Summary VLC media player 3.0.20 and earlier is vulnerable to denial of service through an integer overflow which could be triggered with a maliciously crafted mms stream (heap based overflow). If successful, a malicious third party could trigger either a crash of VLC or an arbitrary code execution with the target user's privileges.
Status Published
Exploitability 0.5
Weighted Severity 4.0
Risk 2.0
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.0024 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.0024 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.0024 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.0024 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.0024 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.0024 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.0024 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.0024 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.0024 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.0024 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00301 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00306 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00327 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00327 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00327 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00327 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00327 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00327 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00327 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00327 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00327 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00327 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00327 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00327 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00327 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00355 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00358 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00358 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00358 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00358 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
epss 0.00527 https://api.first.org/data/v1/epss?cve=CVE-2024-46461
cvssv3.1 8 https://www.videolan.org/security/sb-vlc3021.html
ssvc Track https://www.videolan.org/security/sb-vlc3021.html
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Found at https://www.videolan.org/security/sb-vlc3021.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T15:37:59Z/ Found at https://www.videolan.org/security/sb-vlc3021.html
Exploit Prediction Scoring System (EPSS)
Percentile 0.09902
EPSS Score 0.00043
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
2024-09-25T19:24:56.806233+00:00 Vulnrichment Import https://github.com/cisagov/vulnrichment/blob/develop/2024/46xxx/CVE-2024-46461.json 34.0.1