ffmpeg vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ffmpeg package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2025-12343

<7:7.1.2-1
  • L
CVE-2025-59734

*
  • L
CVE-2025-59732

<7:7.1.2-1
  • L
CVE-2025-59731

<7:7.1.2-1
  • L
CVE-2025-59733

<7:7.1.2-1
  • L
CVE-2025-10256

<7:7.1.2-1
  • L
CVE-2025-9951

*
  • L
CVE-2024-35369

<7:7.0.1-3
  • L
CVE-2024-35368

<7:7.1-3
  • C
Integer Overflow or Wraparound

<7:6.1-1
  • L
CVE-2023-51795

<7:7.0.1-3
  • M
Memory Leak

<7:7.1.1-1
  • H
Buffer Overflow

<7:7.0.1-3
  • H
CVE-2022-4907

<7:6.0-4
  • L
CVE-2024-36615

<7:7.1-3
  • C
Unchecked Return Value

<7:4.4.1-1
  • M
Integer Overflow or Wraparound

<7:4.4.2-1
  • M
CVE-2021-3566

<7:4.3-2
  • M
Integer Overflow or Wraparound

<7:4.4-5
  • H
Out-of-Bounds

<7:5.1.3-1
  • L
CVE-2023-6604

<7:7.1.1-1
  • L
Memory Leak

<7:4.3-2
  • H
Out-of-bounds Write

<7:4.3-2
  • M
NULL Pointer Dereference

<7:5.1-1
  • L
Reachable Assertion

<7:4.4.1-1
  • H
Out-of-Bounds

<7:7.1.2-1
  • M
Buffer Overflow

<7:4.3-2
  • L
CVE-2023-50008

<7:7.0.1-3
  • M
Buffer Overflow

<7:4.3-2
  • L
Memory Leak

<7:4.3-2
  • M
NULL Pointer Dereference

<7:7.1.2-1
  • L
CVE-2024-36616

<7:7.0.1-3
  • H
Out-of-bounds Write

<7:4.2.2-1
  • H
Out-of-bounds Write

<7:4.3-2
  • L
CVE-2023-49528

<7:7.0.1-3
  • H
Out-of-bounds Write

<7:6.0-4
  • L
Memory Leak

<7:4.4-5
  • H
NULL Pointer Dereference

<7:5.0.1-2
  • L
CVE-2024-55069

<7:7.1.1-1
  • L
Memory Leak

<7:4.3-2
  • L
Memory Leak

<7:4.3-2
  • L
Integer Overflow or Wraparound

<7:4.3-2
  • L
CVE-2023-51796

<7:7.0.1-3
  • H
Out-of-bounds Write

<7:4.3-2
  • M
Use After Free

<7:4.3.1-1
  • L
CVE-2023-6601

<7:7.1.1-1
  • H
Buffer Overflow

<7:4.3.2-0+deb11u2
  • L
CVE-2024-31582

<7:7.0.1-3
  • L
Out-of-bounds Read

<7:4.1.3-1
  • L
CVE-2023-51793

<7:7.0.1-3
  • L
CVE-2023-50010

<7:7.0.1-3
  • L
CVE-2024-35366

<7:7.0.1-3
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<7:3.4.3-1
  • H
NULL Pointer Dereference

<7:4.3-2
  • H
Buffer Overflow

<7:4.3-2
  • L
Integer Overflow or Wraparound

<7:4.3-2
  • L
CVE-2024-35367

<7:7.0.1-3
  • L
CVE-2024-36619

<7:7.1-3
  • H
Buffer Overflow

<7:4.3.1-1
  • L
CVE-2024-36613

<7:7.0.1-3
  • L
Integer Overflow or Wraparound

<7:4.3-2
  • L
Divide By Zero

<7:4.4.1-1
  • L
CVE-2024-31578

<7:7.0.1-3
  • L
Divide By Zero

<7:4.3-2
  • H
Out-of-bounds Write

<7:4.3.1-6
  • H
Buffer Overflow

<7:4.3.2-0+deb11u2
  • M
Out-of-bounds Read

<7:4.1.3-1
  • L
NULL Pointer Dereference

<7:4.4-5
  • L
CVE-2023-6605

<7:7.1.1-1
  • M
Insufficient Verification of Data Authenticity

<7:4.3.1-1
  • L
CVE-2023-51798

<7:7.0.1-3
  • M
Out-of-bounds Read

<7:3.4.3-1
  • M
Buffer Overflow

<7:4.3.2-0+deb11u2
  • M
CVE-2025-0518

<7:7.1.1-1
  • L
CVE-2023-51797

<7:7.0.1-3
  • L
CVE-2023-51794

<7:7.0.1-3
  • L
CVE-2023-49501

<7:7.0.1-3
  • M
Out-of-bounds Read

<7:4.0.2-1
  • L
CVE-2024-35365

<7:7.0.1-3
  • H
Out-of-bounds Write

<7:4.3-2
  • H
Out-of-bounds Write

<7:7.0.2-1
  • C
Improper Validation of Array Index

<7:4.2.1-1
  • L
CVE-2024-32228

<7:7.0.1-3
  • L
CVE-2024-36617

<7:7.0.1-3
  • L
Use of Uninitialized Resource

<7:4.1.4-1
  • L
Memory Leak

<7:4.3-2
  • M
Reachable Assertion

<7:4.0.2-1
  • H
Out-of-Bounds

<7:3.2.5-1
  • M
Out-of-bounds Write

<7:4.3.2-0+deb11u2
  • L
Memory Leak

<7:4.4-5
  • H
NULL Pointer Dereference

<7:5.1-1
  • H
Use After Free

<7:4.4-5
  • L
Out-of-bounds Read

<7:3.4.2-1
  • L
CVE-2023-50007

<7:7.0.1-3
  • L
CVE-2023-49502

<7:7.0.1-3
  • L
Improper Validation of Array Index

<7:4.1.1-1
  • L
NULL Pointer Dereference

<7:4.2.1-1
  • C
Out-of-bounds Write

<7:3.2.4-1
  • H
Out-of-bounds Write

<7:4.3-2
  • M
Out-of-bounds Read

<7:3.4.1-1
  • L
CVE-2023-51791

<7:7.0.1-3
  • L
Divide By Zero

<7:4.4.1-1
  • L
CVE-2023-50009

<7:7.0.1-3
  • M
Out-of-bounds Write

<7:4.3.1-6
  • L
Integer Overflow or Wraparound

<7:4.3-2
  • H
Integer Overflow or Wraparound

<7:6.1-1
  • H
Out-of-Bounds

<7:4.0.2-1
  • M
NULL Pointer Dereference

<7:4.0.2-1
  • H
NULL Pointer Dereference

<7:4.1.3-1
  • L
Memory Leak

<7:4.3-2
  • L
Memory Leak

<7:4.3-2
  • C
Out-of-bounds Write

<7:3.2.4-1
  • L
Reachable Assertion

<7:4.0.3-1
  • M
Use After Free

<7:4.0.2-1
  • L
Memory Leak

<7:4.3-2
  • M
Unchecked Return Value

<7:4.4.1-1
  • L
Integer Overflow or Wraparound

<7:4.3-2
  • L
Excessive Iteration

<7:3.3.4-1
  • L
NULL Pointer Dereference

<7:4.0.2-1
  • H
Information Exposure

<7:3.2.6-1
  • L
Out-of-bounds Read

<7:3.4.3-1
  • L
Memory Leak

<7:4.3-2
  • H
Out-of-bounds Write

<7:4.3-2
  • L
Improper Input Validation

<7:4.0.1-2
  • L
CVE-2025-25473

*
  • H
Out-of-Bounds

<7:5.1.3-1
  • L
NULL Pointer Dereference

<7:2.6.1-1
  • C
Out-of-bounds Read

<7:3.4.1-1
  • L
CVE-2025-22919

<7:7.1.1-1
  • M
Divide By Zero

<7:4.0.2-1
  • M
Out-of-Bounds

<7:3.2.4-1
  • L
Excessive Iteration

<7:3.3.4-1
  • L
CVE-2025-22921

*
  • C
Out-of-bounds Write

<7:3.2.4-1
  • L
CVE-2024-36618

<7:7.0.1-3
  • H
Divide By Zero

<7:4.3-2
  • L
Excessive Iteration

<7:3.3.4-1
  • L
Divide By Zero

<7:5.0.1-2
  • H
Out-of-bounds Write

<7:4.3-2
  • C
Out-of-Bounds

<7:3.2.2-1
  • M
Improper Input Validation

<7:2.8.2-1
  • L
Resource Exhaustion

<7:3.3.4-1
  • M
Out-of-Bounds

<7:3.2.4-1
  • H
Out-of-bounds Write

<7:4.3-2
  • L
CVE-2024-31585

<7:7.0.1-3
  • M
Buffer Overflow

<7:4.3-2
  • H
Out-of-bounds Write

<7:4.3-2
  • M
Out-of-bounds Read

<7:4.2.2-1
  • M
Use After Free

<7:4.4-5
  • H
Out-of-Bounds

<7:2.7.2-1
  • C
Integer Overflow or Wraparound

<7:6.1-1
  • L
NULL Pointer Dereference

<7:3.3.4-1
  • H
Improper Input Validation

<7:2.7.2-1
  • L
CVE-2024-31581

<7:7.0.1-3
  • H
Out-of-bounds Write

<7:4.3.1-1
  • M
Out-of-bounds Read

<7:4.0.2-1
  • M
NULL Pointer Dereference

<7:3.1.4-1
  • L
Excessive Iteration

<7:3.3.4-1
  • H
Out-of-bounds Read

<7:3.3.3-1
  • M
CVE-2023-6602

<7:7.1.1-1
  • H
Out-of-Bounds

<7:2.8.3-1
  • M
Improper Input Validation

<7:3.1.4-1
  • H
Out-of-bounds Read

<7:4.1.3-1
  • M
Resource Management Errors

<7:3.1.4-1
  • M
Out-of-Bounds

<7:3.1.4-1
  • M
Information Exposure

<7:3.1.4-1
  • H
Out-of-Bounds

<2.8.5-1
  • C
Out-of-bounds Write

<7:4.2.3-1
  • H
Out-of-Bounds

<2.4.4-1
  • H
Integer Overflow or Wraparound

<7:5.1.1-1
  • H
Out-of-bounds Read

<7:3.1.4-1
  • H
Integer Overflow or Wraparound

<2.8.5-1
  • M
Out-of-bounds Read

<7:3.4.2-1
  • H
Out-of-Bounds

<7:3.2-1
  • M
Out-of-Bounds

<7:2.8.6-1
  • H
Out-of-Bounds

<7:3.1.3-1
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

<7:3.3.4-1
  • H
Improper Input Validation

<7:2.4.3-1
  • C
Integer Overflow or Wraparound

<7:3.1.1-1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<7:4.0.2-1
  • L
Divide By Zero

<7:4.2.1-1
  • H
Improper Input Validation

<7:2.7.2-1
  • M
Out-of-Bounds

<7:2.8.3-1
  • M
Information Exposure

<7:2.8.5-1
  • C
Out-of-Bounds

<7:3.2.2-1
  • C
Out-of-bounds Read

<7:4.0.2-1
  • H
Use After Free

<7:5.1.2-1
  • M
Divide By Zero

<7:4.0.2-1
  • H
Improper Input Validation

<7:2.8.2-1
  • H
Out-of-Bounds

<7:3.2.5-1
  • L
Integer Overflow or Wraparound

<7:4.3-2
  • L
Memory Leak

<7:4.3-2
  • M
Double Free

<7:3.4-1
  • H
Improper Input Validation

<7:2.5.1-1
  • H
Improper Validation of Array Index

<7:3.4.3-1
  • L
Out-of-bounds Read

<7:3.4.3-1
  • M
CVE-2015-3417

<7:2.6.1-1
  • L
Memory Leak

<7:4.3-2
  • M
Out-of-Bounds

<7:2.8.3-1
  • H
Code

<7:2.7.2-1
  • H
Out-of-Bounds

<2.4.4-1
  • H
Out-of-bounds Read

<7:3.3.3-1
  • M
Integer Underflow

<7:2.5.3-1
  • H
Improper Input Validation

<7:2.7.2-1
  • L
Memory Leak

<7:4.3-2
  • H
Out-of-Bounds

<7:2.2.1-1
  • L
Memory Leak

<7:4.4.1-1
  • H
Buffer Overflow

<7:4.3-2
  • H
CVE-2017-11684

<7:2.3.1-1
  • H
Out-of-bounds Write

<7:4.3-2
  • H
Out-of-Bounds

<2.4.4-1
  • M
Out-of-bounds Read

<7:2.4-1
  • H
Numeric Errors

<7:2.7.2-1
  • L
Resource Management Errors

<7:3.1.3-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • L
Excessive Iteration

<7:3.3.4-1
  • L
Excessive Iteration

<7:3.3.4-1
  • H
Out-of-Bounds

<7:3.1.2-1
  • H
Out-of-bounds Write

<7:4.3-2
  • M
NULL Pointer Dereference

<7:3.3.3-1
  • H
Out-of-Bounds

<7:3.3.4-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • H
Numeric Errors

<7:2.4.3-1
  • M
Buffer Overflow

<7:4.3.2-0+deb11u2
  • M
Improper Input Validation

<7:2.4.1-1
  • M
Improper Input Validation

<7:3.1.5-1
  • M
Numeric Errors

<7:2.8.3-1
  • H
Out-of-bounds Read

<7:3.1.4-1
  • H
Buffer Overflow

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.6.2-1
  • M
Out-of-Bounds

<7:2.5.4-1
  • M
NULL Pointer Dereference

<7:3.1.1-1
  • H
Out-of-Bounds

<7:2.8.4-1
  • C
Out-of-Bounds

<7:3.2.2-1
  • H
Out-of-Bounds

<2.8.6-1
  • H
Improper Input Validation

<7:2.4.1-1
  • H
Numeric Errors

<7:2.5.1-1
  • M
Race Condition

<7:2.8.1-1
  • H
Out-of-Bounds

<7:2.4.3-1
  • H
Out-of-Bounds

<7:2.4.3-1
  • M
Improper Input Validation

<7:2.4.1-1
  • M
Information Exposure

<7:2.8.5-1
  • H
Code

<7:2.7.2-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • H
Numeric Errors

<7:2.4.3-1
  • M
Buffer Overflow

<7:4.3-2
  • H
Out-of-Bounds

<2.8.6-1
  • L
Out-of-bounds Read

<7:4.0.1-2
  • M
Out-of-Bounds

<7:2.4.1-1
  • H
Improper Input Validation

<7:2.4.1-1
  • H
Code

<7:2.8.2-1
  • H
Numeric Errors

<7:2.4.1-1
  • H
Improper Input Validation

<7:2.4.3-1
  • H
Numeric Errors

<7:2.5.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • H
Code

<7:2.7.2-1
  • H
Numeric Errors

<7:2.4.3-1
  • C
Improper Input Validation

<7:2.4.1-1
  • H
Integer Overflow or Wraparound

<7:2.4.1-1
  • L
Improper Input Validation

<7:3.4.3-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • C
CVE-2012-2788

<7:2.4.1-1
  • H
Out-of-bounds Read

<7:3.4.3-1
  • C
CVE-2012-2780

<7:2.4.1-1
  • M
Double Free

<7:2.6.1-1
  • H
Improper Input Validation

<7:2.7.2-1
  • H
Improper Input Validation

<7:2.4.1-1
  • H
Out-of-Bounds

<7:3.2.5-1
  • C
CVE-2012-2772

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.2-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • C
Out-of-bounds Write

<7:3.2.4-1
  • M
Improper Input Validation

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • H
Improper Input Validation

<7:2.4.1-1
  • H
Out-of-bounds Read

<7:3.4-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • H
Improper Input Validation

<7:2.4.1-1
  • L
Resource Management Errors

<7:2.4.1-1
  • C
Resource Management Errors

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • L
Excessive Iteration

<7:3.3.4-1
  • L
Excessive Iteration

<7:3.3.4-1
  • H
Improper Input Validation

<7:2.4.1-1
  • H
Out-of-Bounds

<7:3.2.5-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • C
CVE-2012-2783

<7:2.4.1-1
  • C
CVE-2012-2775

<7:2.4.1-1
  • L
Improper Input Validation

<7:3.3.4-1
  • L
Resource Management Errors

<7:3.2.4-1
  • H
Improper Input Validation

<7:3.3.3-1
  • M
Resource Management Errors

<7:2.2.1-1
  • H
Improper Input Validation

<7:2.4.1-1
  • C
CVE-2012-2778

<7:2.4.1-1
  • H
Improper Input Validation

<7:2.4.1-1
  • C
CVE-2011-2162

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • H
Resource Management Errors

<7:2.4.1-1
  • M
Numeric Errors

<7:2.4.1-1
  • H
Improper Input Validation

<7:2.8.2-1
  • M
Numeric Errors

<7:2.4.1-1
  • C
CVE-2012-2771

<7:2.4.1-1
  • M
Numeric Errors

<4:0.5+svn20090706-3
  • H
Out-of-Bounds

<2.8.6-1
  • H
Out-of-bounds Write

<7:2.4.1-1
  • L
Improper Input Validation

<0.svn20080206-16
  • M
Out-of-Bounds

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.8.4-1
  • H
Double Free

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • H
Out-of-Bounds

<0.svn20080206-10
  • H
Out-of-Bounds

<7:2.4.3-1
  • M
Resource Management Errors

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • M
Arbitrary Code Injection

<4:0.5.2-6
  • H
CVE-2014-7933

<7:2.5.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Improper Input Validation

<7:2.4.1-1
  • M
Out-of-Bounds

<2.4.4-1
  • H
Numeric Errors

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.1-1
  • L
Numeric Errors

<7:2.4.1-1
  • M
CVE-2011-3944

<7:2.4.1-1
  • C
CVE-2012-2797

<7:2.4.1-1
  • M
Out-of-bounds Read

<7:2.4.1-1
  • M
Resource Management Errors

<7:2.4.1-1
  • C
Out-of-Bounds

<4:0.5+svn20090706-3
  • H
Arbitrary Code Injection

<4:0.5+svn20090706-3
  • C
CVE-2012-2784

<7:2.4.1-1
  • M
Numeric Errors

<4:0.5+svn20090706-3
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • H
Out-of-Bounds

<7:2.4.3-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • H
CVE-2009-0385

<0.svn20080206-16
  • M
Improper Input Validation

<7:2.4.1-1
  • C
CVE-2012-2777

<7:2.4.1-1
  • M
Resource Management Errors

<7:2.4.1-1
  • H
CVE-2013-2277

<7:2.4.1-1
  • M
Numeric Errors

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • L
Resource Management Errors

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • H
CVE-2013-0858

<7:2.4.1-1
  • L
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • H
Improper Resource Shutdown or Release

<7:2.4.1-1
  • C
CVE-2012-2801

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • C
CVE-2012-2804

<7:2.4.1-1
  • L
Improper Input Validation

<7:2.4.1-1
  • M
Numeric Errors

<4:0.5+svn20090706-3
  • C
Numeric Errors

<4:0.5+svn20090706-3
  • C
CVE-2012-2779

<7:2.4.1-1
  • C
CVE-2012-2781

<7:2.4.1-1
  • C
Out-of-Bounds

<0.svn20080206-14
  • C
CVE-2012-2776

<7:2.4.1-1
  • C
CVE-2012-2773

<7:2.4.1-1
  • H
Numeric Errors

<4:0.5+svn20090706-3
  • M
Arbitrary Code Injection

<4:0.5+svn20090706-3
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • M
Improper Input Validation

<7:2.4.1-1
  • L
Resource Management Errors

<7:2.4.1-1
  • H
CVE-2006-4800

<0.cvs20060329-1
  • H
Arbitrary Code Injection

<7:2.4.1-1
  • M
Out-of-Bounds

<7:2.4.1-1
  • H
Buffer Overflow

<7:2.4.1-1
  • M
Out-of-Bounds

<0.cvs20050918-5.1
  • C
Out-of-Bounds

<0.svn20080206-14
  • C
Numeric Errors

<4:0.5+svn20090706-3