Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ffmpeg ffmpeg 2.4.6 vulnerabilities and exploits
(subscribe to this query)
5.5
CVSSv3
CVE-2015-1208
Integer underflow in the mov_read_default function in libavformat/mov.c in FFmpeg prior to 2.4.6 allows remote malicious users to obtain sensitive information from heap and/or stack memory via a crafted MP4 file.
Ffmpeg Ffmpeg
5.5
CVSSv3
CVE-2016-1897
FFmpeg 2.x allows remote malicious users to conduct cross-origin attacks and read arbitrary files by using the concat protocol in an HTTP Live Streaming (HLS) M3U8 file, leading to an external HTTP request in which the URL string contains the first line of a local file.
Ffmpeg Ffmpeg 2.7.4
Ffmpeg Ffmpeg 2.7.3
Ffmpeg Ffmpeg 2.6.2
Ffmpeg Ffmpeg 2.6.1
Ffmpeg Ffmpeg 2.5.4
Ffmpeg Ffmpeg 2.5.3
Ffmpeg Ffmpeg 2.4.9
Ffmpeg Ffmpeg 2.4.8
Ffmpeg Ffmpeg 2.4
Ffmpeg Ffmpeg 2.3.6
Ffmpeg Ffmpeg 2.2.16
Ffmpeg Ffmpeg 2.2.15
Ffmpeg Ffmpeg 2.2.8
Ffmpeg Ffmpeg 2.2.7
Ffmpeg Ffmpeg 2.1.8
Ffmpeg Ffmpeg 2.1.7
Ffmpeg Ffmpeg 2.1
Ffmpeg Ffmpeg 2.0.7
Ffmpeg Ffmpeg 2.0
Ffmpeg Ffmpeg 2.8.4
Ffmpeg Ffmpeg 2.8.3
Ffmpeg Ffmpeg 2.7.2
2 Github repositories
5.5
CVSSv3
CVE-2016-1898
FFmpeg 2.x allows remote malicious users to conduct cross-origin attacks and read arbitrary files by using the subfile protocol in an HTTP Live Streaming (HLS) M3U8 file, leading to an external HTTP request in which the URL string contains an arbitrary line of a local file.
Ffmpeg Ffmpeg 2.8.3
Ffmpeg Ffmpeg 2.8.2
Ffmpeg Ffmpeg 2.7
Ffmpeg Ffmpeg 2.6.6
Ffmpeg Ffmpeg 2.5.9
Ffmpeg Ffmpeg 2.5.8
Ffmpeg Ffmpeg 2.5.1
Ffmpeg Ffmpeg 2.5
Ffmpeg Ffmpeg 2.4.5
Ffmpeg Ffmpeg 2.4.4
Ffmpeg Ffmpeg 2.3.4
Ffmpeg Ffmpeg 2.3.3
Ffmpeg Ffmpeg 2.2.13
Ffmpeg Ffmpeg 2.2.12
Ffmpeg Ffmpeg 2.2.11
Ffmpeg Ffmpeg 2.2.4
Ffmpeg Ffmpeg 2.2.3
Ffmpeg Ffmpeg 2.1.5
Ffmpeg Ffmpeg 2.1.4
Ffmpeg Ffmpeg 2.0.4
Ffmpeg Ffmpeg 2.0.3
Ffmpeg Ffmpeg 2.8.1
1 Github repository
NA
CVE-2015-3395
The msrle_decode_pal4 function in msrledec.c in Libav prior to 10.7 and 11.x prior to 11.4 and FFmpeg prior to 2.0.7, 2.2.x prior to 2.2.15, 2.4.x prior to 2.4.8, 2.5.x prior to 2.5.6, and 2.6.x prior to 2.6.2 allows remote malicious users to have unspecified impact via a crafted...
Canonical Ubuntu Linux 12.04
Ffmpeg Ffmpeg 2.2.12
Ffmpeg Ffmpeg 2.2.8
Ffmpeg Ffmpeg 2.4.4
Ffmpeg Ffmpeg 2.5.0
Ffmpeg Ffmpeg 2.4.1
Ffmpeg Ffmpeg 2.2.4
Ffmpeg Ffmpeg 2.2.6
Ffmpeg Ffmpeg 2.2.3
Ffmpeg Ffmpeg 2.4.6
Ffmpeg Ffmpeg 2.6.0
Ffmpeg Ffmpeg 2.5.4
Ffmpeg Ffmpeg 2.2.1
Ffmpeg Ffmpeg 2.4.3
Ffmpeg Ffmpeg 2.2.14
Ffmpeg Ffmpeg 2.5.5
Ffmpeg Ffmpeg 2.4.7
Ffmpeg Ffmpeg 2.4.2
Ffmpeg Ffmpeg 2.4.5
Ffmpeg Ffmpeg 2.2.9
Ffmpeg Ffmpeg 2.2.11
Ffmpeg Ffmpeg 2.5.3
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started