Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
videolan vlc media player 2.2.0 vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2017-10699
avcodec 2.2.x, as used in VideoLAN VLC media player 2.2.7-x prior to 2017-06-29, allows out-of-bounds heap memory write due to calling memcpy() with a wrong size, leading to a denial of service (application crash) or possibly code execution.
Videolan Vlc Media Player 2.2.7
Videolan Vlc Media Player 2.2.4
Videolan Vlc Media Player 2.2.3
Videolan Vlc Media Player 2.2.5
Videolan Vlc Media Player 2.2.5.1
Videolan Vlc Media Player 2.2.6
Videolan Vlc Media Player 2.2.0
Videolan Vlc Media Player 2.2.2
Videolan Vlc Media Player 2.2.1
5.5
CVSSv3
CVE-2017-8310
Heap out-of-bound read in CreateHtmlSubtitle in VideoLAN VLC 2.2.x due to missing check of string termination allows malicious users to read data beyond allocated memory and potentially crash the process (causing a denial of service) via a crafted subtitles file.
Videolan Vlc Media Player 2.2.4
Videolan Vlc Media Player 2.2.2
Videolan Vlc Media Player 2.2.3
Videolan Vlc Media Player 2.2.1
Videolan Vlc Media Player 2.2.0
Videolan Vlc Media Player 2.2.5
5.5
CVSSv3
CVE-2016-3941
Buffer overflow in the AStreamPeekStream function in input/stream.c in VideoLAN VLC media player prior to 2.2.0 allows remote malicious users to cause a denial of service (crash) via a crafted wav file, related to "seek across EOF."
Videolan Vlc Media Player
Canonical Ubuntu Linux 14.04
NA
CVE-2014-9743
Cross-site scripting (XSS) vulnerability in the httpd_HtmlError function in network/httpd.c in the web interface in VideoLAN VLC Media Player prior to 2.2.0 allows remote malicious users to inject arbitrary web script or HTML via the path info.
Videolan Vlc Media Player
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started