videolan vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://download.videolan.org|videolan package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Buffer Overflow

[,3.0.18)
  • M
Out-of-Bounds

[,1.1.9)
  • M
Out-of-bounds Read

[,2.2.5)
  • M
Out-of-Bounds

[,0.8.6)
  • H
Out-of-bounds Write

[0,)
  • H
Out-of-bounds Read

[,2.2.5)
  • H
Denial of Service (DoS)

[,1.1.6)
  • H
Integer Underflow

[,2.1.6)
  • M
Out-of-Bounds

[,3.0.7)
  • M
Out-of-bounds Read

[,2.2.6)
  • M
Resource Management Errors

[,0.8.6)
  • H
Denial of Service (DoS)

[0.8.6d,1.1.9]
  • H
Denial of Service (DoS)

[,1.0.1)
  • H
NULL Pointer Dereference

[0,)
  • H
Buffer Overflow

[0,)
  • H
Improper Input Validation

[,1.1.7)
  • M
Out-of-Bounds

[,2.0.2)
  • H
Use After Free

[0,)
  • M
Out-of-Bounds

[,2.0.3]
  • H
Divide By Zero

[0,)
  • C
Double Free

[3.0.0,3.0.7.1)
  • M
Out-of-Bounds

[,0.8.6)
  • M
Cross-site Scripting (XSS)

[,2.2.0)
  • H
Out-of-Bounds

[,1.0.6)
  • M
Out-of-Bounds

[,1.1.11)
  • H
Out-of-Bounds

[,1.1.8)
  • M
NULL Pointer Dereference

[0,)
  • M
Improper Input Validation

[,2.1.5]
  • H
Out-of-Bounds

[,0.9.9]
  • H
Use After Free

[,3.0.0)
  • M
Resource Management Errors

[,2.0.7)
  • H
Denial of Service (DoS)

[,0.8.6)
  • H
Buffer Overflow

[0,)
  • M
Resource Management Errors

[,0.9.2]
  • H
Out-of-Bounds

[,2.0.1)
  • M
Cross-site Scripting (XSS)

[,2.0.7)
  • H
Denial of Service (DoS)

[0.9.0,0.9.4]
  • H
Use After Free

[0,)
  • H
Denial of Service (DoS)

[,0.8.6i]
  • H
Denial of Service (DoS)

[,0.8.6h]
  • H
Resource Management Errors

[0.9.0,1.1.12]
  • M
Denial of Service (DoS)

[,0.8.6e]
  • M
Out-of-Bounds

[,2.2.2)
  • H
Out-of-Bounds

[,0.9.6)
  • C
Out-of-Bounds

[,2.2.4)
  • M
Denial of Service (DoS)

[,0.8.6i]
  • M
Denial of Service (DoS)

[,2.0.1]
  • H
Out-of-Bounds

[,1.0.5]
  • M
Denial of Service (DoS)

[,2.1.3)
  • H
Out-of-Bounds

[,1.0.6)
  • H
Integer Underflow

[,3.0.7)
  • H
Improper Validation of Array Index

[0,)
  • H
Denial of Service (DoS)

[0.9.0,0.9.8]
  • C
Access of Uninitialized Pointer

[0,)
  • M
Out-of-Bounds

[,2.1.3]
  • H
Denial of Service (DoS)

[,2.1.0)
  • H
Denial of Service (DoS)

[,0.8.6a]
  • M
Out-of-bounds Read

[2.2.0,2.2.5]
  • H
Out-of-bounds Write

[,3.0.11)
  • M
Double Free

[,3.0.7)
  • C
Out-of-Bounds

[,0.8.6e)
  • H
Use After Free

[0,)
  • M
Out-of-Bounds

[,2.0.6)
  • M
Out-of-Bounds

[,1.1.6)
  • H
Out-of-Bounds

[,2.1.6)
  • M
Improper Input Validation

[,0.9.8a]
  • M
Access Restriction Bypass

[,0.8.1337)
  • M
Use of Externally-Controlled Format String

[0.7.0,0.8.6]
  • M
Out-of-Bounds

[,2.0.8)
  • H
Use After Free

[,3.0.0)
  • M
Out-of-bounds Read

[,3.0.3)
  • H
Denial of Service (DoS)

[,0.8.6)
  • H
Out-of-Bounds

[0.9,0.9.4]
  • H
Integer Underflow

[,3.0.9)
  • H
Incorrect Type Conversion or Cast

[,2.1.6)
  • M
Out-of-Bounds

[,1.1.11)
  • C
Out-of-bounds Read

[,3.0.7.1)
  • H
Arbitrary Code Execution

[,1.1.4)
  • H
Off-by-one Error

[,3.0.9)
  • H
Buffer Overflow

[0,)
  • H
Out-of-Bounds

[,2.0.5)
  • H
Out-of-Bounds

[,1.0.2)
  • H
Divide By Zero

[0,)
  • M
Information Exposure

[,2.0.7)
  • M
Arbitrary Code Execution

[,0.8.6d]
  • H
Buffer Overflow

[,2.1.6)
  • H
Denial of Service (DoS)

[,0.8.6)
  • M
Improper Input Validation

[0.9.0,1.1.2]
  • H
Improper Input Validation

[,2.0.9)
  • H
Out-of-Bounds

[,2.0.1)
  • H
Out-of-Bounds

[,2.2.5)
  • H
Out-of-Bounds

[,1.0.6)
  • M
Out-of-Bounds

[,2.2.0)
  • H
Buffer Overflow

[,2.1.6)[2.2.0,2.2.1)
  • H
Out-of-bounds Read

[0,)
  • H
Out-of-Bounds

[,1.1.8)
  • H
Buffer Overflow

[,2.1.6)
  • M
Denial of Service (DoS)

[,2.0.5)
  • H
Resource Management Errors

[,0.8.6e)
  • M
Improper Input Validation

[,2.1.5]
  • H
Out-of-Bounds

[0.8.6d,0.9.5]
  • M
Denial of Service (DoS)

[,1.0.6)
  • H
Out-of-bounds Read

[0,)
  • M
Improper Input Validation

[,0.8.6d]
  • C
Out-of-Bounds

[,2.1.5)
  • H
Out-of-Bounds

[,2.2.5)
  • H
Out-of-Bounds

[,1.1.6)
  • H
Out-of-bounds Write

[,3.0.12)
  • H
Out-of-Bounds

[,0.8.6e)
  • C
Out-of-bounds Write

[,2.2.8)
  • M
Out-of-Bounds

[,0.8.6e]
  • H
Out-of-Bounds

[,0.8.6]
  • M
Resource Management Errors

[,1.1.11]
  • H
Out-of-Bounds

[,1.0.6)
  • M
Out-of-Bounds

[,1.1.10)