### [CVE-2019-18278](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18278) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description When executing VideoLAN VLC media player 3.0.8 with libqt on Windows, Data from a Faulting Address controls Code Flow starting at libqt_plugin!vlc_entry_license__3_0_0f+0x00000000003b9aba. NOTE: the VideoLAN security team indicates that they have not been contacted, and have no way of reproducing this issue. ### POC #### Reference - https://code610.blogspot.com/2019/10/random-bytes-in-vlc-308.html - https://code610.blogspot.com/2019/10/random-bytes-in-vlc-308.html #### Github No PoCs found on GitHub currently.