Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ffmpeg ffmpeg 2.8.4 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2015-8662
The ff_dwt_decode function in libavcodec/jpeg2000dwt.c in FFmpeg prior to 2.8.4 does not validate the number of decomposition levels before proceeding with Discrete Wavelet Transform decoding, which allows remote malicious users to cause a denial of service (out-of-bounds array a...
Ffmpeg Ffmpeg
7.5
CVSSv2
CVE-2015-8663
The ff_get_buffer function in libavcodec/utils.c in FFmpeg prior to 2.8.4 preserves width and height values after a failure, which allows remote malicious users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via a crafted .mov ...
Ffmpeg Ffmpeg 2.8.3
6.8
CVSSv2
CVE-2017-9996
The cdxl_decode_frame function in libavcodec/cdxl.c in FFmpeg 2.8.x prior to 2.8.12, 3.0.x prior to 3.0.8, 3.1.x prior to 3.1.8, 3.2.x prior to 3.2.5, and 3.3.x prior to 3.3.1 does not exclude the CHUNKY format, which allows remote malicious users to cause a denial of service (he...
Ffmpeg Ffmpeg 2.8.3
Ffmpeg Ffmpeg 2.8.4
Ffmpeg Ffmpeg 2.8.5
Ffmpeg Ffmpeg 2.8.6
Ffmpeg Ffmpeg 3.1.3
Ffmpeg Ffmpeg 3.1.4
Ffmpeg Ffmpeg 3.1.5
Ffmpeg Ffmpeg 3.2
Ffmpeg Ffmpeg 3.1.6
Ffmpeg Ffmpeg 3.1.7
Ffmpeg Ffmpeg 3.0.5
Ffmpeg Ffmpeg 3.0.6
Ffmpeg Ffmpeg 3.0
Ffmpeg Ffmpeg 3.0.1
Ffmpeg Ffmpeg 3.0.2
Ffmpeg Ffmpeg 3.0.3
Ffmpeg Ffmpeg 3.2.2
Ffmpeg Ffmpeg 3.2.4
Ffmpeg Ffmpeg 3.0.7
Ffmpeg Ffmpeg 2.8.1
Ffmpeg Ffmpeg 2.8.8
Ffmpeg Ffmpeg 2.8.11
4.3
CVSSv2
CVE-2016-1897
FFmpeg 2.x allows remote malicious users to conduct cross-origin attacks and read arbitrary files by using the concat protocol in an HTTP Live Streaming (HLS) M3U8 file, leading to an external HTTP request in which the URL string contains the first line of a local file.
Ffmpeg Ffmpeg 2.7.4
Ffmpeg Ffmpeg 2.7.3
Ffmpeg Ffmpeg 2.6.2
Ffmpeg Ffmpeg 2.6.1
Ffmpeg Ffmpeg 2.5.4
Ffmpeg Ffmpeg 2.5.3
Ffmpeg Ffmpeg 2.4.9
Ffmpeg Ffmpeg 2.4.8
Ffmpeg Ffmpeg 2.4
Ffmpeg Ffmpeg 2.3.6
Ffmpeg Ffmpeg 2.2.16
Ffmpeg Ffmpeg 2.2.15
Ffmpeg Ffmpeg 2.2.8
Ffmpeg Ffmpeg 2.2.7
Ffmpeg Ffmpeg 2.1.8
Ffmpeg Ffmpeg 2.1.7
Ffmpeg Ffmpeg 2.1
Ffmpeg Ffmpeg 2.0.7
Ffmpeg Ffmpeg 2.0
Ffmpeg Ffmpeg 2.8.4
Ffmpeg Ffmpeg 2.8.3
Ffmpeg Ffmpeg 2.7.2
2 Github repositories
4.3
CVSSv2
CVE-2016-1898
FFmpeg 2.x allows remote malicious users to conduct cross-origin attacks and read arbitrary files by using the subfile protocol in an HTTP Live Streaming (HLS) M3U8 file, leading to an external HTTP request in which the URL string contains an arbitrary line of a local file.
Ffmpeg Ffmpeg 2.8.3
Ffmpeg Ffmpeg 2.8.2
Ffmpeg Ffmpeg 2.7
Ffmpeg Ffmpeg 2.6.6
Ffmpeg Ffmpeg 2.5.9
Ffmpeg Ffmpeg 2.5.8
Ffmpeg Ffmpeg 2.5.1
Ffmpeg Ffmpeg 2.5
Ffmpeg Ffmpeg 2.4.5
Ffmpeg Ffmpeg 2.4.4
Ffmpeg Ffmpeg 2.3.4
Ffmpeg Ffmpeg 2.3.3
Ffmpeg Ffmpeg 2.2.13
Ffmpeg Ffmpeg 2.2.12
Ffmpeg Ffmpeg 2.2.11
Ffmpeg Ffmpeg 2.2.4
Ffmpeg Ffmpeg 2.2.3
Ffmpeg Ffmpeg 2.1.5
Ffmpeg Ffmpeg 2.1.4
Ffmpeg Ffmpeg 2.0.4
Ffmpeg Ffmpeg 2.0.3
Ffmpeg Ffmpeg 2.8.1
1 Github repository
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSRF
CVE-2023-52162
CVE-2024-23670
CVE-2024-5404
man-in-the-middle
CVE-2024-5214
CVE-2024-4358
CVE-2024-20696
hard-coded
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started