Security advisory warns that attackers could use a buffer overflow flaw in VLC to execute malicious code in a subtitle file and tamper with a PC A flaw in the widely used open source VLC media player ...
The number of ways that attackers can infect devices is incredible. One such method that has been around since at least 2003 involves inserting malicious code into the subtitle files used by media ...
Researchers at Check Point Security Labs have uncovered a nasty new hacking technique that takes advantage security deficiencies in several popular media players. The exploit uses phony subtitle files ...
If you use a media player that supports third-party subtitles you should probably check to see if there’s an update today. Security researchers at Check point identified a vulnerability that allowed ...
Researchers at Check Point Security Labs have uncovered a nasty new hacking technique that takes advantage security deficiencies in several popular media players. The exploit uses phony subtitle files ...
Attackers can remotely execute code on targeted systems via specially crafted subtitle files for videos. A proof of concept attack using malicious video subtitle files reveals how adversaries can ...
Security researchers have discovered a surprising new way for attackers to gain control of a machine: malicious subtitles. The vulnerability is device-independent, meaning it could be used to gain ...
CES 2025: Do you remember the time when we used to download movies and subtitles to it differently? We might have put those days in the past now as the OG media player, VLC Media Player, is ...
Be careful before you fire up media player software to play that foreign-language movie -- it might be a way for intruders to compromise your system. Check Point researchers have discovered an exploit ...