Webmproject
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Webmproject product.
RSS Feeds for Webmproject security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Webmproject products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Webmproject Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2026 there have been 0 vulnerabilities in Webmproject. Webmproject did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 2 | 8.30 |
| 2023 | 5 | 8.15 |
| 2022 | 0 | 0.00 |
| 2021 | 11 | 0.00 |
| 2020 | 0 | 0.00 |
| 2019 | 1 | 0.00 |
| 2018 | 3 | 6.50 |
It may take a day or so for new Webmproject vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Webmproject Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2024-5197 | Jun 03, 2024 |
Integer Overflow in libvpx <=1.14.0 via vpx_img_alloc()/wrapThere exists interger overflows in libvpx in versions prior to 1.14.1. Calling vpx_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. Calling vpx_img_wrap() with a large value of the d_w, d_h, or stride_align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t struct may be invalid. We recommend upgrading to version 1.14.1 or beyond |
|
| CVE-2023-6349 | May 27, 2024 |
Heap Overflow in libvpx <1.13.1 (VP9 Frame Size Mismatch)A heap overflow vulnerability exists in libvpx - Encoding a frame that has larger dimensions than the originally configured size with VP9 may result in a heap overflow in libvpx. We recommend upgrading to version 1.13.1 or above |
|
| CVE-2023-44488 | Sep 30, 2023 |
VP9 Crash in libvpx <=1.13.0 via width mishandlingVP9 in libvpx before 1.13.1 mishandles widths, leading to a crash related to encoding. |
|
| CVE-2023-5217 | Sep 28, 2023 |
Highseverity heap buffer overflow in Chrome libvpx <117.0.5938.132Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) |
|
| CVE-2023-5129 | Sep 25, 2023 |
REJECTED CVE-2023-5129: Duplicate of CVE-2023-4863** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. Duplicate of CVE-2023-4863. |
|
| CVE-2023-4863 | Sep 12, 2023 |
Heap Buffer Overflow in libwebp (Chrome <116.0.5845.187 / libwebp 1.3.2)Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical) |
|
| CVE-2023-1999 | Jun 20, 2023 |
libwebp Use After Free in ApplyFiltersAndEncode()There exists a use after free/double free in libwebp. An attacker can use the ApplyFiltersAndEncode() function and loop through to free best.bw and assign best = trial pointer. The second loop will then return 0 because of an Out of memory error in VP8 encoder, the pointer is still assigned to trial and the AddressSanitizer will attempt a double free. |
|
| CVE-2018-25011 | May 21, 2021 |
A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in PutLE16().A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in PutLE16(). |
|
| CVE-2018-25012 | May 21, 2021 |
A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in GetLE24().A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in GetLE24(). |
|
| CVE-2018-25013 | May 21, 2021 |
A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in ShiftBytes().A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in ShiftBytes(). |
|