![]() ![]() Once compromised, the attacker can perform remote code execution, steal data, use the device as a pawn in a DDoS attack, and more. As of now, fixes have been released for the media players.Īccording to a blog post published by Check Point security, a subtitle file could be modified to create a new attack vector and compromise the devices such as PCs, mobile devices, TVs, etc running vulnerable media players. Check Point researchers have spotted vulnerabilities in VLC, Kodi, Stremio, and Popcorn Time in the way these media players handle subtitle files. Synopsis: A simple but malicious subtitle file can be used to gain control of your PC, TV or smartphone. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |