Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ffmpeg ffmpeg 2.8.1 vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2015-8363
The jpeg2000_read_main_headers function in libavcodec/jpeg2000dec.c in FFmpeg prior to 2.6.5, 2.7.x prior to 2.7.3, and 2.8.x up to and including 2.8.2 does not enforce uniqueness of the SIZ marker in a JPEG 2000 image, which allows remote malicious users to cause a denial of ser...
Ffmpeg Ffmpeg 2.7.1
Ffmpeg Ffmpeg 2.7.0
Ffmpeg Ffmpeg 2.8.2
Ffmpeg Ffmpeg 2.8.1
Ffmpeg Ffmpeg 2.6.4
Ffmpeg Ffmpeg 2.7.2
Ffmpeg Ffmpeg 2.8.0
6.8
CVSSv2
CVE-2015-8364
Integer overflow in the ff_ivi_init_planes function in libavcodec/ivi.c in FFmpeg prior to 2.6.5, 2.7.x prior to 2.7.3, and 2.8.x up to and including 2.8.2 allows remote malicious users to cause a denial of service (out-of-bounds heap-memory access) or possibly have unspecified o...
Ffmpeg Ffmpeg 2.7.1
Ffmpeg Ffmpeg 2.7.0
Ffmpeg Ffmpeg 2.8.2
Ffmpeg Ffmpeg 2.8.1
Ffmpeg Ffmpeg 2.6.4
Ffmpeg Ffmpeg 2.7.2
Ffmpeg Ffmpeg 2.8.0
Canonical Ubuntu Linux 12.04
6.8
CVSSv2
CVE-2015-8365
The smka_decode_frame function in libavcodec/smacker.c in FFmpeg prior to 2.6.5, 2.7.x prior to 2.7.3, and 2.8.x up to and including 2.8.2 does not verify that the data size is consistent with the number of channels, which allows remote malicious users to cause a denial of servic...
Canonical Ubuntu Linux 12.04
Ffmpeg Ffmpeg 2.7.1
Ffmpeg Ffmpeg 2.7.0
Ffmpeg Ffmpeg 2.8.2
Ffmpeg Ffmpeg 2.8.1
Ffmpeg Ffmpeg 2.6.4
Ffmpeg Ffmpeg 2.7.2
Ffmpeg Ffmpeg 2.8.0
6.8
CVSSv2
CVE-2017-9996
The cdxl_decode_frame function in libavcodec/cdxl.c in FFmpeg 2.8.x prior to 2.8.12, 3.0.x prior to 3.0.8, 3.1.x prior to 3.1.8, 3.2.x prior to 3.2.5, and 3.3.x prior to 3.3.1 does not exclude the CHUNKY format, which allows remote malicious users to cause a denial of service (he...
Ffmpeg Ffmpeg 2.8.3
Ffmpeg Ffmpeg 2.8.4
Ffmpeg Ffmpeg 2.8.5
Ffmpeg Ffmpeg 2.8.6
Ffmpeg Ffmpeg 3.1.3
Ffmpeg Ffmpeg 3.1.4
Ffmpeg Ffmpeg 3.1.5
Ffmpeg Ffmpeg 3.2
Ffmpeg Ffmpeg 3.1.6
Ffmpeg Ffmpeg 3.1.7
Ffmpeg Ffmpeg 3.0.5
Ffmpeg Ffmpeg 3.0.6
Ffmpeg Ffmpeg 3.0
Ffmpeg Ffmpeg 3.0.1
Ffmpeg Ffmpeg 3.0.2
Ffmpeg Ffmpeg 3.0.3
Ffmpeg Ffmpeg 3.2.2
Ffmpeg Ffmpeg 3.2.4
Ffmpeg Ffmpeg 3.0.7
Ffmpeg Ffmpeg 2.8.1
Ffmpeg Ffmpeg 2.8.8
Ffmpeg Ffmpeg 2.8.11
4.3
CVSSv2
CVE-2016-1897
FFmpeg 2.x allows remote malicious users to conduct cross-origin attacks and read arbitrary files by using the concat protocol in an HTTP Live Streaming (HLS) M3U8 file, leading to an external HTTP request in which the URL string contains the first line of a local file.
Ffmpeg Ffmpeg 2.7.4
Ffmpeg Ffmpeg 2.7.3
Ffmpeg Ffmpeg 2.6.2
Ffmpeg Ffmpeg 2.6.1
Ffmpeg Ffmpeg 2.5.4
Ffmpeg Ffmpeg 2.5.3
Ffmpeg Ffmpeg 2.4.9
Ffmpeg Ffmpeg 2.4.8
Ffmpeg Ffmpeg 2.4
Ffmpeg Ffmpeg 2.3.6
Ffmpeg Ffmpeg 2.2.16
Ffmpeg Ffmpeg 2.2.15
Ffmpeg Ffmpeg 2.2.8
Ffmpeg Ffmpeg 2.2.7
Ffmpeg Ffmpeg 2.1.8
Ffmpeg Ffmpeg 2.1.7
Ffmpeg Ffmpeg 2.1
Ffmpeg Ffmpeg 2.0.7
Ffmpeg Ffmpeg 2.0
Ffmpeg Ffmpeg 2.8.4
Ffmpeg Ffmpeg 2.8.3
Ffmpeg Ffmpeg 2.7.2
2 Github repositories
4.3
CVSSv2
CVE-2016-1898
FFmpeg 2.x allows remote malicious users to conduct cross-origin attacks and read arbitrary files by using the subfile protocol in an HTTP Live Streaming (HLS) M3U8 file, leading to an external HTTP request in which the URL string contains an arbitrary line of a local file.
Ffmpeg Ffmpeg 2.8.3
Ffmpeg Ffmpeg 2.8.2
Ffmpeg Ffmpeg 2.7
Ffmpeg Ffmpeg 2.6.6
Ffmpeg Ffmpeg 2.5.9
Ffmpeg Ffmpeg 2.5.8
Ffmpeg Ffmpeg 2.5.1
Ffmpeg Ffmpeg 2.5
Ffmpeg Ffmpeg 2.4.5
Ffmpeg Ffmpeg 2.4.4
Ffmpeg Ffmpeg 2.3.4
Ffmpeg Ffmpeg 2.3.3
Ffmpeg Ffmpeg 2.2.13
Ffmpeg Ffmpeg 2.2.12
Ffmpeg Ffmpeg 2.2.11
Ffmpeg Ffmpeg 2.2.4
Ffmpeg Ffmpeg 2.2.3
Ffmpeg Ffmpeg 2.1.5
Ffmpeg Ffmpeg 2.1.4
Ffmpeg Ffmpeg 2.0.4
Ffmpeg Ffmpeg 2.0.3
Ffmpeg Ffmpeg 2.8.1
1 Github repository
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started