Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2007-6682 — Use of Externally-Controlled Format String in VLC
7 documents6 sources
Severity
7.5HIGHNVD
EPSS
34.4%
top 3.00%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJan 17
Latest updateMay 1
Description
Format string vulnerability in the httpd_FileCallBack function (network/httpd.c) in VideoLAN VLC 0.8.6d allows remote attackers to execute arbitrary code via format string specifiers in the Connection parameter.
CVSS vector
AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4
Affected Packages2 packages
🔴Vulnerability Details
3GHSA▶
GHSA-prxp-p3xh-w4mq: Format string vulnerability in the httpd_FileCallBack function (network/httpd↗2022-05-01
OSV▶
CVE-2007-6682: Format string vulnerability in the httpd_FileCallBack function (network/httpd↗2008-01-17
CVEList▶
CVE-2007-6682: Format string vulnerability in the httpd_FileCallBack function (network/httpd↗2008-01-17
💥Exploits & PoCs
2📋Vendor Advisories
1Debian▶
CVE-2007-6682: vlc - Format string vulnerability in the httpd_FileCallBack function (network/httpd.c)...↗2007