Known vulnerabilities in Erik de Castro Lopo libsndfile

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
[] 
Main › Vulnerability Database › Erik de Castro Lopo › libsndfile

Known vulnerabilities in Erik de Castro Lopo libsndfile

Vendor: Erik de Castro Lopo
Website:
Total Security Bulletins: 10
1.2.2 1.2.1 1.2.0 1.1.0 1.1.0beta2 1.1.0beta1 1.0.31 1.0.30 1.0.29 1.0.28pre1 5.541 5.55 1.0.29pre1 1.0.28 1.0.27 1.0.26 1.0.25 1.0.24 1.0.23 1.0.22 1.0.21 1.0.20 1.0.19 1.0.18 1.0.17 1.0.16 1.0.15 1.0.14 1.0.13 1.0.12 1.0.11 1.0.10 1.0.9 1.0.8 1.0.7 1.0.6 1.0.5 1.0.4 1.0.3 1.0.2 1.0.1 1.0.0 1.0.0rc6 1.0.0rc1 0.0.28 0.0.8

Security bulletins (10)

Secuity bulletin Severity Status Published
SB2024112116: Denial of service in libsndfile Medium
Patched
21.11.2024
SB2023110948: Integer overflow in Libsndfile High
Patched
09.11.2023
SB2022032803: Multiple vulnerabilities in Libsndfile High
Patched
28.03.2022
SB2021080101: Remote code execution in libsndfile High
Patched
01.08.2021
SB2018112313: Denial of service in libsndfile Low
Patched
23.11.2018
SB2018080614: Denial of service in libsndfile Low
Patched
06.08.2018
SB2017092812: Denial of service in libsndfile Low
Patched
28.09.2017
SB2017092702: Multiple vulnerabilities in libsndfile Low
Patched
27.09.2017
SB2015111704: Heap-based buffer overflow in libsndfile High
Patched Public exploit
17.11.2015
SB2011072704: Heap-based buffer overflow in libsndfile Medium
Patched
27.07.2011


Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or