vlc vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the vlc package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2024-46461

<3.0.21-0+deb11u1
  • H
Integer Underflow

<3.0.20-0+deb11u1
  • C
Out-of-bounds Write

<3.0.20-0+deb11u1
  • H
Integer Overflow or Wraparound

<3.0.18-0+deb11u1
  • H
Buffer Overflow

<3.0.12-1
  • H
Buffer Overflow

<3.0.12-1
  • H
Buffer Overflow

<3.0.12-1
  • H
NULL Pointer Dereference

<3.0.12-1
  • L
Out-of-bounds Write

<3.0.12-1
  • H
Out-of-bounds Write

<3.0.11-1
  • H
Off-by-one Error

<3.0.9.2-1
  • H
Uncontrolled Recursion

<3.0.8-4
  • H
Integer Overflow or Wraparound

<3.0.8-4
  • H
Resource Exhaustion

<3.0.8-4
  • H
Out-of-bounds Read

<3.0.8-4
  • H
NULL Pointer Dereference

<3.0.8-4
  • H
Resource Exhaustion

<3.0.8-4
  • C
Double Free

<3.0.8-4
  • M
Information Exposure

<2.0.7-1
  • H
Out-of-bounds Write

<3.0.8-1
  • M
NULL Pointer Dereference

<3.0.8-1
  • H
Divide By Zero

<3.0.8-1
  • H
Out-of-bounds Read

<3.0.8-1
  • H
Divide By Zero

<3.0.8-1
  • H
Out-of-bounds Read

<3.0.8-1
  • H
Use After Free

<3.0.8-1
  • H
Out-of-bounds Read

<3.0.8-1
  • H
Use After Free

<3.0.8-1
  • H
Use After Free

<3.0.8-1
  • H
Out-of-bounds Read

<3.0.7-1
  • M
Double Free

<3.0.7-1
  • H
Integer Underflow

<3.0.7.1-2
  • L
Out-of-bounds Read

<3.0.8-1
  • C
Double Free

<3.0.7-1
  • M
Out-of-Bounds

<3.0.7-1
  • C
Access of Uninitialized Pointer

<3.0.4-4
  • H
Use After Free

<3.0.3-1-1
  • H
Integer Underflow

<2.2.0~rc2-2
  • H
Buffer Overflow

<2.2.0~rc2-2
  • L
Cross-site Scripting (XSS)

<2.0.7-1
  • H
Out-of-Bounds

<2.2.0~rc2-2
  • H
Incorrect Type Conversion or Cast

<2.2.0~rc2-2
  • H
Buffer Overflow

<2.2.0~rc2-2
  • H
Out-of-bounds Write

<3.0.2-1
  • H
Use After Free

<3.0.0~rc2-1
  • C
Out-of-bounds Write

<2.2.6-3
  • H
Out-of-Bounds

<2.2.6-3
  • H
Out-of-bounds Read

<2.2.5.1-1
  • M
Out-of-bounds Read

<2.2.5-1
  • M
Out-of-bounds Read

<2.2.6-1~deb9u1
  • H
Out-of-Bounds

<2.2.5-1
  • M
Out-of-bounds Read

<2.2.5.1-1~deb9u1
  • L
Out-of-Bounds

<2.1.5-1
  • C
Out-of-Bounds

<2.2.3-2
  • M
Out-of-Bounds

<2.2.0-1
  • M
Out-of-Bounds

<2.2.1-3
  • M
Cross-site Scripting (XSS)

<2.2.0~rc2-1
  • H
Out-of-Bounds

<1.0.6-1
  • H
Out-of-Bounds

<1.0.6-1
  • H
Numeric Errors

<1.0.1-1
  • H
Out-of-Bounds

<1.0.6-1
  • H
Out-of-Bounds

<1.1.3-1
  • H
Out-of-Bounds

<1.0.6-1
  • L
CVE-2010-1443

<1.0.6-1
  • L
Resource Management Errors

<2.2.0~rc2-1
  • L
Numeric Errors

<2.1.4-1
  • H
Out-of-Bounds

<2.1.4-1
  • L
Improper Input Validation

<2.1.0-2
  • M
Out-of-Bounds

<2.1.0-1
  • M
Out-of-Bounds

<2.0.6-1
  • L
Out-of-Bounds

<2.0.7-1
  • H
Out-of-Bounds

<2.0.5-1
  • H
Resource Management Errors

<1.1.13-1
  • M
Out-of-Bounds

<2.0.4-1
  • M
Out-of-Bounds

<2.0.2-1
  • L
Out-of-Bounds

<2.0.1-1
  • L
Out-of-Bounds

<2.0.1-1
  • M
Out-of-Bounds

<1.1.11-1
  • M
Out-of-Bounds

<1.1.11-1
  • H
Numeric Errors

<1.1.10-1
  • M
Out-of-Bounds

<1.1.8-3
  • L
Out-of-Bounds

<1.1.10-1
  • H
Out-of-Bounds

<1.1.8-1
  • H
Out-of-Bounds

<1.1.8-1
  • M
Improper Input Validation

<1.1.7-1
  • M
Out-of-Bounds

<1.1.3-1squeeze2
  • H
Out-of-Bounds

<1.1.3-1squeeze2
  • H
Numeric Errors

<1.1.3-1squeeze1
  • M
Improper Input Validation

<1.1.3-1
  • L
Out-of-Bounds

<0.8.6.c-4.1
  • L
Improper Input Validation

<0.9.9a-1
  • L
Numeric Errors

<0.9.8a-1
  • L
Out-of-Bounds

<1.0.3-1
  • M
Out-of-Bounds

<0.8.6.h-5
  • M
Numeric Errors

<0.8.6.h-4.1
  • L
Out-of-Bounds

<1.0.3-1
  • M
Resource Management Errors

<0.9.3-1
  • M
Numeric Errors

<0.8.6.h-4
  • H
Numeric Errors

<0.8.6.h-2
  • M
Numeric Errors

<0.8.6.h-1
  • L
Access Restriction Bypass

<0.8.6.e-2.2
  • M
Out-of-Bounds

<0.8.6.e-2.1
  • L
Resource Management Errors

<0.8.6.e-2.1
  • M
Out-of-Bounds

<0.8.6.e-2.1
  • M
Numeric Errors

<0.8.6.e-1.1
  • M
Numeric Errors

<0.8.6.e-2
  • M
Resource Management Errors

<0.8.6.e-1
  • M
CVE-2007-6682

<0.8.6.c-4.1
  • M
CVE-2007-6683

<0.8.6.c-4.1
  • M
Improper Input Validation

<0.8.6.c-4.1
  • L
Out-of-Bounds

<0.8.6.c-4.1
  • M
Out-of-Bounds

<0.8.6.c-6
  • M
Out-of-Bounds

<0.8.6.c-6
  • H
CVE-2007-3468

<0.8.6.c.debian-1
  • H
CVE-2007-3467

<0.8.6.c-1
  • M
CVE-2007-3316

<0.8.6.c-1
  • L
CVE-2007-0256

<0.8.6.c-1
  • M
Use of Externally-Controlled Format String

<0.8.6-svn20061012.debian-1.2
  • M
Out-of-Bounds

<0.8.4.debian-2