ffmpeg vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://ffmpeg.org|ffmpeg package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Unchecked Return Value

[0,)
  • M
Resource Injection

[0,)
  • M
Resource Injection

[0,)
  • M
Resource Injection

[0,)
  • H
Integer Overflow or Wraparound

[,n7.0)
  • H
Double Free

[,n7.0)
  • M
Information Exposure

[n2.0,)
  • H
NULL Pointer Dereference

[n3.0,n5.0)
  • H
Integer Overflow or Wraparound

[,n7.0)
  • M
Heap-based Buffer Overflow

[,5.1.6)
  • M
Heap-based Buffer Overflow

[4.3,4.3.8)[4.4,4.4.5)[5.0,5.1.6)[6.0,6.1.2)[7.0,7.0.2)
  • H
Buffer Overflow

[,7.0.1)
  • H
Heap-based Buffer Overflow

[0,)
  • H
Buffer Overflow

[,7.0.1)
  • M
Heap-based Buffer Overflow

[,n7.0)
  • H
Heap-based Buffer Overflow

[0,)
  • H
Heap-based Buffer Overflow

[,n7.0)
  • H
Heap-based Buffer Overflow

[0,)
  • H
Heap-based Buffer Overflow

[,n7.0)
  • H
Heap-based Buffer Overflow

[,n7.0)
  • H
Heap-based Buffer Overflow

[,n7.0)
  • H
Heap-based Buffer Overflow

[,n7.0)
  • H
Heap-based Buffer Overflow

[,n7.0)
  • H
Heap-based Buffer Overflow

[,n7.0)
  • H
Heap-based Buffer Overflow

[0,)
  • H
Heap-based Buffer Overflow

[,n7.0)
  • H
Stack-based Buffer Overflow

[,n7.0)
  • H
Improper Validation of Array Index

[,7.0)
  • H
Use After Free

[,7.0)
  • H
Heap-based Buffer Overflow

[,n7.0)
  • H
Off-by-one Error

[,n5.1)
  • M
Heap-based Buffer Overflow

[,n7.0)
  • H
Integer Overflow or Wraparound

[,n6.1)
  • M
Integer Overflow to Buffer Overflow

[,6.1)
  • C
Integer Overflow or Wraparound

[,6.1)
  • H
Buffer Overflow

[,6.1)
  • M
Out-of-bounds Read

[0,)
  • H
Denial of Service (DoS)

[,4.4)
  • H
Use After Free

[,4.4.3)[5.0,5.0.2)[5.1-dev,5.1.2)
  • M
NULL Pointer Dereference

[,5.1)
  • C
NULL Pointer Dereference

[,n5.1)
  • M
Out-of-bounds Read

[0,)
  • H
Out-of-bounds Read

[0,)
  • H
Heap-based Buffer Overflow

[0,)
  • H
Buffer Overflow

[2.0.0,2.2-rc1)
  • M
Denial of Service (DoS)

[2.0.0,2.2-rc1)
  • M
Denial of Service (DoS)

[2.0.0,2.2-rc1)
  • H
Buffer Overflow

[2.0.0,2.2-rc1)
  • M
Denial of Service (DoS)

[2.0.0,2.2-rc1)
  • M
Denial of Service (DoS)

[2.0.0,2.2-rc1)
  • M
Denial of Service (DoS)

[2.0.0,2.2-rc1)
  • M
Denial of Service (DoS)

[2.0.0,2.2-rc1)
  • M
Denial of Service (DoS)

[2.0.0,2.2-rc1)
  • M
Denial of Service (DoS)

[2.0.0,2.3)
  • M
Denial of Service (DoS)

[2.0.0,2.2-rc1)
  • M
Denial of Service (DoS)

[2.0.0,2.2-rc1)
  • M
Denial of Service (DoS)

[2.0.0,2.2-rc1)
  • M
Denial of Service (DoS)

[2.0.0,2.2-rc1)
  • M
Integer Overflow or Wraparound

[2.0.0,2.2-rc1)
  • M
Denial of Service (DoS)

[2.0.0,2.2-rc1)
  • M
Integer Overflow or Wraparound

[2.0.0,2.2-rc1)
  • H
Buffer Overflow

[2.0.0,2.2-rc1)
  • M
Denial of Service (DoS)

[2.0.0,2.3)
  • H
Buffer Overflow

[2.0.0,2.2-rc1)
  • H
Buffer Overflow

[2.0.0,2.2-rc1)
  • M
Denial of Service (DoS)

[2.0.0,2.2-rc1)
  • M
Denial of Service (DoS)

[2.0.0,2.2-rc1)
  • H
Integer Overflow or Wraparound

[,5.0.0)
  • M
Divide By Zero

[0,)
  • M
Improper Input Validation

[,3.1.5)
  • C
Out-of-bounds Write

[,2.8.10)
  • M
Out-of-bounds Read

[0,)
  • H
Out-of-bounds Write

[0,)
  • M
NULL Pointer Dereference

[,3.4]
  • H
Improper Input Validation

[,0.11)
  • H
Out-of-bounds Write

[0,)
  • H
Improper Input Validation

[,2.7.2)
  • M
Denial of Service (DoS)

[,2.0.2)
  • M
Out-of-bounds Write

[0,)
  • M
Improper Input Validation

[,1.0.4)
  • M
Resource Management Errors

[,3.3.3]
  • M
Out-of-Bounds

[,2.0.2)
  • H
Improper Input Validation

[,2.7.2)
  • M
Use After Free

[0,)
  • M
Denial of Service (DoS)

[,0.9.1)
  • M
Improper Input Validation

[,1.2.1)
  • M
Memory Leak

[0,)
  • M
Out-of-Bounds

[,1.0.2)
  • H
Improper Input Validation

[,3.3.3]
  • H
Out-of-bounds Read

[,3.3.3)
  • M
Divide By Zero

[0,)
  • H
Buffer Overflow

[0,)
  • H
Out-of-Bounds

[,3.3.1)
  • M
NULL Pointer Dereference

[,3.2.6)[3.3,3.3.3)
  • H
Out-of-Bounds

[,2.8.4)
  • H
Out-of-bounds Write

[0,)
  • H
Denial of Service (DoS)

[,2.5.2)
  • H
Buffer Overflow

[0,)
  • H
Out-of-Bounds

[,2.8.6)
  • C
Unchecked Return Value

[0,)
  • M
Denial of Service (DoS)

[,1.2.1)
  • M
Out-of-bounds Read

[,4.0.2)
  • M
Denial of Service (DoS)

[,2.6.5)[2.7.0,2.7.3)
  • H
Arbitrary Code Execution

[,0.6.3)
  • M
Resource Management Errors

[,0.9.2)
  • H
Denial of Service (DoS)

[,1.0.4)
  • C
Out-of-bounds Write

[,3.2.5)
  • M
Out-of-bounds Read

[0,)
  • H
Code

[,2.7.2)
  • H
Denial of Service (DoS)

[,1.0.1)
  • M
Denial of Service (DoS)

[,3.3.3]
  • M
Denial of Service (DoS)

[,1.0.2)
  • H
Out-of-Bounds

[,2.8.6)
  • H
Out-of-Bounds

[,1.0.4)
  • H
Improper Input Validation

[,1.0.1)
  • M
Information Exposure

[2.0,2.8.4]
  • H
Out-of-Bounds

[,2.8.12)
  • H
Denial of Service (DoS)

[,1.0.1)
  • M
Buffer Overflow

[0,)
  • H
Code

[,2.7.2)
  • M
Improper Input Validation

[0,)
  • H
Denial of Service (DoS)

[,1.1.4)
  • H
Buffer Overflow

[0,)
  • C
Out-of-bounds Write

[,2.8.11)
  • M
Memory Leak

[0,)
  • M
Denial of Service (DoS)

[,3.3.3]
  • H
Out-of-Bounds

[,1.0.3)
  • M
Improper Input Validation

[,0.6.4)
  • H
Integer Overflow or Wraparound

[,0.10.14)[1.1,1.1.12)[1.2,1.2.7)[2.0,2.0.5)[2.1,2.1.5)[2.2,2.2.4)
  • M
Out-of-Bounds

[,2.0.1)
  • M
CVE-2011-3944

[,0.9.2)
  • M
Resource Management Errors

[,2.0.2)
  • M
Denial of Service (DoS)

[,1.0.2)
  • M
Resource Management Errors

[,0.7.4)
  • H
Out-of-Bounds

[,2.4.2)
  • H
Out-of-bounds Read

[,3.3.3)
  • H
Denial of Service (DoS)

[,2.5.2)
  • M
Out-of-Bounds

[,0.9.1)
  • H
Out-of-bounds Write

[0,)
  • M
Out-of-bounds Write

[0,)
  • C
CVE-2012-2792

[,0.10.5)
  • H
Denial of Service (DoS)

[,1.1.3)
  • H
Out-of-Bounds

[,2.8.5)
  • M
Out-of-Bounds

[,1.2.1)
  • M
Integer Underflow

[,2.4.6)
  • H
Out-of-bounds Write

[0,)
  • H
Out-of-bounds Write

[0,)
  • M
Denial of Service (DoS)

[,0.11.4)
  • M
Denial of Service (DoS)

[,4.0.2)
  • M
Memory Leak

[0,)
  • M
Memory Leak

[0,)
  • H
Out-of-Bounds

[,1.0.1)
  • H
Code

[,2.8.2)
  • M
Out-of-Bounds

[,2.5.4)
  • M
Out-of-Bounds

[,2.1.4)
  • M
Resource Management Errors

[,3.3.3]
  • C
Out-of-bounds Write

[0,)
  • C
Out-of-bounds Read

[3.0,3.4]
  • H
Unchecked Return Value

[,4.2.2)
  • C
Use of Uninitialized Resource

[,3.2.14)
  • H
Out-of-Bounds

[,1.0.1)
  • H
Denial of Service (DoS)

[,1.1.2)
  • C
Buffer Overflow

[,0.10.5)
  • H
Out-of-Bounds

[,2.1.6)
  • H
Denial of Service (DoS)

[,2.5.1)
  • M
Out-of-Bounds

[,0.9.1)
  • C
Out-of-bounds Write

[,2.8.11)
  • C
Out-of-bounds Write

[,2.8.10)
  • M
Memory Leak

[0,)
  • H
Out-of-Bounds

[,2.8.3)
  • L
Out-of-Bounds

[,0.9.1)
  • H
Denial of Service (DoS)

[,0.10]
  • M
Out-of-Bounds

[,2.6.5)[2.7.0,2.7.3)
  • H
Out-of-Bounds

[,1.1.3)
  • M
NULL Pointer Dereference

[0,)
  • M
NULL Pointer Dereference

[0,)
  • H
Improper Input Validation

[,2.8.2)
  • H
Remote Code Execution (RCE)

[,0.8.1)
  • M
Resource Management Errors

[,3.1.4)
  • M
Resource Management Errors

[,3.2.1)
  • H
Out-of-Bounds

[,3.3.1)
  • H
Buffer Overflow

[0,)
  • H
Out-of-Bounds

[,2.4.2)
  • C
CVE-2012-2785

[,0.10.5)
  • H
Out-of-Bounds

[,2.8.12)[3.0,3.0.8)[3.1,3.1.8)[3.2,3.2.5)[3.3,3.3.1)
  • H
Out-of-Bounds

[,1.0.4)
  • M
Improper Input Validation

[,2.1.4)
  • M
Improper Input Validation

[,2.8.2)
  • H
Denial of Service (DoS)

[,4.0.3)
  • H
Denial of Service (DoS)

[,2.4.2)
  • M
Divide By Zero

[0,)
  • H
NULL Pointer Dereference

[0,)
  • M
Out-of-Bounds

[,0.10.5)
  • M
Out-of-Bounds

[,2.0.2)
  • H
Improper Input Validation

[,2.5.2)
  • L
Out-of-Bounds

[,1.0.2)
  • H
Out-of-Bounds

[,0.9.2)
  • H
Buffer Overflow

[0,)
  • C
Out-of-Bounds

[,2.8.10)
  • M
Resource Management Errors

[,3.4.3)
  • C
Out-of-Bounds

[,2.8.10)
  • M
Buffer Overflow

[0,)
  • M
Memory Leak

[0,)
  • M
Out-of-Bounds

[,3.1.4)
  • H
Improper Input Validation

[,2.4.2)
  • C
Out-of-bounds Read

[,3.4.3)
  • H
Denial of Service (DoS)

[,2.7.2)
  • H
Out-of-bounds Write

[4.3.1,4.4)
  • M
Divide By Zero

[0,)
  • M
Race Condition

[,2.8.2)
  • H
Out-of-bounds Read

[0,)
  • M
Resource Management Errors

[,3.3.3]
  • M
Buffer Overflow

[0,)
  • H
NULL Pointer Dereference

[0,)
  • H
Denial of Service (DoS)

[,1.1.3)
  • H
Improper Input Validation

[,1.0.1)
  • H
Improper Input Validation

[,1.0.1)
  • H
Out-of-Bounds

[,2.8.12)[3.0,3.0.8)[3.1,3.1.8)[3.2,3.2.5)[3.3,3.3.1)
  • M
Out-of-Bounds

[,0.9.1)
  • M
Improper Input Validation

[,2.0.2)
  • M
Resource Management Errors

[,3.1.3)
  • M
Resource Management Errors

[,3.3.3]
  • H
Out-of-Bounds

[,2.4.2)
  • H
Integer Overflow or Wraparound

[,2.8.5)
  • M
Out-of-Bounds

[,1.0.3)
  • M
CVE-2011-3950

[,0.9.2)
  • M
Out-of-Bounds

[,2.0.2)
  • C
Improper Input Validation

[,1.1.3)
  • M
Out-of-Bounds

[,2.0.2)
  • H
Memory Leak

[0,)
  • C
NULL Pointer Dereference

[,2.0.1)
  • M
Denial of Service (DoS)

[,2.0.2)
  • H
Out-of-Bounds

[,1.1.2)
  • C
Out-of-Bounds

[,1.1.3)
  • H
Buffer Overflow

[0,)
  • M
Out-of-bounds Read

[,3.4.3)
  • M
Improper Validation of Array Index

[0,)
  • H
Out-of-Bounds

[,1.0.1)
  • M
NULL Pointer Dereference

[0,)
  • C
CVE-2012-2780

[,0.10.1)
  • H
Improper Input Validation

[,1.0.1)
  • H
Out-of-Bounds

[,2.8.6)
  • C
Denial of Service (DoS)

[,1.1.2)
  • H
Out-of-Bounds

[,3.3.4)
  • M
Out-of-Bounds

[,2.0.2)
  • H
Out-of-Bounds

[,2.0.1)
  • M
Out-of-bounds Read

[,3.4.3)
  • H
Denial of Service (DoS)

[,1.0.1)
  • M
Denial of Service (DoS)

[,2.1.5)
  • H
Out-of-Bounds

[,2.1.6)
  • H
Out-of-bounds Write

[0,)
  • M
Out-of-bounds Read

[,3.4.2)
  • M
Denial of Service (DoS)

[,0.7.4)
  • H
Denial of Service (DoS)

[,2.4.2)
  • H
Improper Input Validation

[,3.3.2]
  • M
Information Exposure

[,3.1.4)
  • H
Out-of-Bounds

[,2.4.2)
  • M
Double Free

[,3.3.5)
  • H
Out-of-bounds Read

[4.0,4.0.4)[4.1,4.1.2)
  • H
Out-of-Bounds

[,1.1.3)
  • M
Use After Free

[,4.0.2)
  • H
Out-of-Bounds

[,2.4.2)
  • M
Remote Code Execution (RCE)

[,0.6.4)
  • H
Improper Data Handling

[0,)
  • H
CVE-2013-0858

[,1.0.4)
  • H
Out-of-Bounds

[,2.1.6)
  • M
Improper Input Validation

[,2.0.2)
  • H
Information Exposure

[,2.8.12)[3.0,3.1.9)[3.2,3.2.6)[3.3,3.3.2)
  • H
Out-of-Bounds

[,1.1.3)
  • H
Improper Input Validation

[,1.0.1)
  • H
Improper Validation of Array Index

[0,)
  • M
Improper Input Validation

[,1.2.1)
  • M
Out-of-Bounds

[,2.6.5)[2.7.0,2.7.3)
  • M
Denial of Service (DoS)

[,2.1.4)
  • M
Out-of-Bounds

[,2.8.6)
  • M
Out-of-bounds Read

[,3.2.1)
  • C
Improper Validation of Array Index

[,2.8.16)[3.2,3.2.15)[3.4,3.4.7)[4.0,4.0.5)[4.1,4.1.5)
  • H
Out-of-bounds Write

[0,)
  • M
Memory Leak

[0,)
  • M
Resource Management Errors

[,3.3.3]
  • M
Use After Free

[0,)
  • M
Improper Input Validation

[0,)
  • M
Out-of-Bounds

[,0.9.1)
  • M
Denial of Service (DoS)

[,2.3.6)
  • H
Improper Input Validation

[,1.1.2)
  • H
Out-of-Bounds

[,2.8.12)[3.0.0,3.0.8)[3.1.0,3.1.8)[3.2.0,3.2.5)[3.3.0,3.3.1)
  • H
Use After Free

[0,)
  • M
Memory Leak

[0,)
  • M
Out-of-bounds Read

[,3.4]
  • C
CVE-2012-2795

[,0.10.5)
  • M
Out-of-Bounds

[,1.2.1)
  • C
CVE-2013-0870

[,1.1.4]
  • M
Divide By Zero

[0,)
  • H
NULL Pointer Dereference

[,3.3.3]
  • M
Out-of-Bounds

[,2.1.6)
  • H
Out-of-Bounds

[,2.7.2)
  • M
Buffer Overflow

[0,)
  • M
Buffer Overflow

[,0.9.2)
  • M
Out-of-Bounds

[,2.1.1)
  • H
Denial of Service (DoS)

[,2021-06-30)
  • H
Improper Input Validation

[,0.11)
  • M
Unchecked Return Value

[0,)
  • M
Out-of-bounds Read

[,3.4.3)
  • H
Out-of-bounds Read

[,3.3.5)
  • H
Out-of-bounds Write

[0,)
  • H
Improper Input Validation

[,2.7.2)
  • M
Out-of-Bounds

[,0.9.1]
  • C
CVE-2012-2782

[,0.10.5)
  • H
Out-of-Bounds

[,3.1.3)
  • M
Divide By Zero

[0,)
  • H
Out-of-bounds Write

[0,)
  • H
Improper Input Validation

[,2.8.2)
  • C
NULL Pointer Dereference

[,3.4.7)[4.0,4.0.5)[4.1,4.1.5)
  • M
Improper Input Validation

[0,)
  • M
Out-of-Bounds

[,1.1.14)
  • H
Code

[,2.7.2)
  • H
Out-of-Bounds

[,3.1.2)
  • M
Divide By Zero

[,4.0.2)
  • M
Out-of-bounds Read

[,4.0.2)
  • C
CVE-2012-2771

[,0.10.3)
  • H
Out-of-Bounds

[,2.8.4)
  • H
Out-of-Bounds

[,1.1.2)
  • M
Out-of-Bounds

[,2.0.2)
  • C
CVE-2012-2778

[,0.10.1)
  • M
Denial of Service (DoS)

[,2.0.2)
  • M
Improper Input Validation

[,3.1.4)
  • M
Denial of Service (DoS)

[,3.3.3]
  • H
Out-of-Bounds

[,1.1.4)
  • H
Out-of-Bounds

[,1.0.1)
  • H
Out-of-Bounds

[,4.0.2)
  • M
Out-of-Bounds

[,2.0.2)
  • M
Denial of Service (DoS)

[,2.0.2)
  • M
Memory Leak

[0,)
  • M
Out-of-Bounds

[,0.9.1)
  • M
Integer Underflow

[,0.8.3)
  • M
Resource Management Errors

[,0.9.2)
  • H
Improper Input Validation

[,2.7.2)
  • H
Buffer Overflow

[,1.1.4)
  • H
Improper Input Validation

[,2.4.2)
  • M
Out-of-Bounds

[,2.0.2)
  • H
Out-of-bounds Write

[0,)
  • C
CVE-2012-2781

[,0.10.1)
  • M
Improper Input Validation

[,1.2.1)
  • M
Buffer Overflow

[0,)
  • H
Out-of-bounds Read

[,3.1.4)
  • M
Memory Leak

[0,)
  • H
Denial of Service (DoS)

[,1.1.3)
  • M
CVE-2021-3566

[,4.3)
  • M
Resource Management Errors

[,3.3.3]
  • H
Out-of-bounds Read

[0,)
  • H
Out-of-Bounds

[,1.0.1)
  • H
Out-of-Bounds

[,0.10.16)
  • H
Out-of-bounds Write

[0,)
  • C
Out-of-Bounds

[,2.8.10)
  • M
CVE-2011-3949

[,0.9.2)
  • M
Memory Leak

[0,)
  • M
Buffer Overflow

[0,)
  • M
Denial of Service (DoS)

[,3.3.3]
  • M
Memory Leak

[0,)
  • H
Out-of-bounds Read

[,3.1.4)
  • H
Denial of Service (DoS)

[,2.4.2)
  • H
Denial of Service (DoS)

[,1.1.3)
  • C
Integer Overflow or Wraparound

[,2.8.8)
  • H
Out-of-Bounds

[,0.5.6)
  • M
Memory Leak

[0,)
  • H
Out-of-bounds Read

[,3.4.3)
  • H
Out-of-bounds Read

[0,)
  • M
Out-of-Bounds

[,0.9.1)
  • M
Information Exposure

[2.0,2.8.4]
  • C
CVE-2012-2773

[,0.10.1)
  • M
Denial of Service (DoS)

[,2.0.2)
  • M
Out-of-Bounds

[,2.0.2)
  • H
Out-of-bounds Write

[4.3,4.3.1)
  • M
NULL Pointer Dereference

[,3.1.4)
  • H
Out-of-Bounds

[,1.0.3)
  • M
Memory Leak

[0,)
  • M
Out-of-Bounds

[,0.5.6)[0.5.0,0.5.7)[0.6.0,0.6.4)[0.6.0,0.6.4)[0.7.0,0.7.3)[0.7.0,0.7.9)[0.8.0,0.8.8)
  • M
Denial of Service (DoS)

[,0.7.3)
  • M
Out-of-Bounds

[,2.0.7)[2.2.0,2.2.15)[2.4.0,2.4.8)[2.5.0,2.5.6)[2.6.0,2.6.2)[10.0,10.7)[11.0,11.4)
  • M
Out-of-Bounds

[,0.5.9)[0.6.0,0.6.6)[0.7.0,0.7.5)[0.7.0,0.7.12)[0.8.0,0.8.1)[0.8.0,0.8.11)
  • C
CVE-2012-2783

[,0.10.5)
  • C
CVE-2012-2784

[,0.10.5)
  • C
CVE-2012-2788

[,0.10.5)
  • C
CVE-2012-2776

[,0.10.5)
  • C
CVE-2012-2787

[,0.10.5)
  • C
CVE-2012-2798

[,0.10.5)
  • M
Out-of-Bounds

[,0.9.2)
  • M
Out-of-Bounds

[,0.5.9)[0.6.0,0.6.6)[0.7.0,0.7.5)[0.7.0,0.7.12)[0.8.0,0.8.1)[0.8.0,0.8.11)
  • M
Denial of Service (DoS)

[,0.5.6)[0.5.0,0.5.7)[0.6.0,0.6.4)[0.6.0,0.6.4)[0.7.0,0.7.3)[0.7.0,0.7.9)[0.8.0,0.8.8)
  • M
Resource Management Errors

[,0.5.9)[0.6.0,0.6.6)[0.7.0,0.7.5)[0.7.0,0.7.12)[0.8.0,0.8.1)[0.8.0,0.8.11)
  • M
Out-of-Bounds

[,0.5.9)[0.6.0,0.6.6)[0.7.0,0.7.5)[0.7.0,0.7.12)[0.8.0,0.8.1)[0.8.0,0.8.11)
  • C
CVE-2011-3937

[,0.9.2)
  • C
CVE-2012-2791

[,0.10.5)
  • C
CVE-2012-2794

[,0.10.5)
  • C
CVE-2012-2779

[,0.10.5)
  • C
CVE-2012-2801

[,0.10.5)
  • M
Out-of-Bounds

[,0.6.4)
  • M
Improper Input Validation

[,0.9.2)
  • C
Remote Code Execution (RCE)

[,0.10.5)
  • H
Out-of-Bounds

[,1.1.14)
  • M
Out-of-Bounds

[,0.5.9)[0.6.0,0.6.6)[0.7.0,0.7.5)[0.7.0,0.7.12)[0.8.0,0.8.1)[0.8.0,0.8.11)
  • C
CVE-2012-2772

[,0.10.5)
  • C
CVE-2012-2777

[,0.10.5)
  • C
CVE-2012-2775

[,0.10.5)
  • C
CVE-2012-2804

[,0.10.5)
  • M
Out-of-Bounds

[,0.9.1)
  • M
Improper Input Validation

[,0.5.9)[0.6.0,0.6.6)[0.7.0,0.7.5)[0.7.0,0.7.12)[0.8.0,0.8.1)[0.8.0,0.8.11)
  • H
Out-of-Bounds

[,0.10.16)
  • M
Out-of-Bounds

[,0.5.6)[0.5.0,0.5.7)[0.6.0,0.6.4)[0.6.0,0.6.4)[0.7.0,0.7.3)[0.7.0,0.7.9)[0.8.0,0.8.8)
  • M
Out-of-Bounds

[,0.5.6)[0.5.0,0.5.7)[0.6.0,0.6.4)[0.6.0,0.6.4)[0.7.0,0.7.3)[0.7.0,0.7.9)[0.8.0,0.8.8)
  • C
Resource Management Errors

[,0.10.5)
  • C
CVE-2012-2790

[,0.10.5)
  • C
CVE-2012-2800

[,0.10.5)
  • C
CVE-2012-2802

[,0.10.5)
  • C
CVE-2012-2786

[,0.10.5)
  • C
CVE-2012-2796

[,0.10.5)
  • C
CVE-2012-2797

[,0.10.5)
  • M
Improper Input Validation

[,0.5.9)[0.6.0,0.6.6)[0.7.0,0.7.5)[0.7.0,0.7.12)[0.8.0,0.8.1)[0.8.0,0.8.11)
  • M
Out-of-Bounds

[,0.9.1)
  • C
CVE-2012-2789

[,0.10.5)
  • M
NULL Pointer Dereference

[,3.4.1]