VLC executes arbitrary plugins
At startup, VLC recursively scans the modules/ and plugins/ subdirectories from the current working directory, and tries to execute the vlc_entry!__0_8_6 (or another in other VLC versions) symbol from any file matching the "lib*_plugin.so" pattern.
This is a local privilege escalation vulnerability.
Edited by Rémi Denis-Courmont