Webmproject Webmproject

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any Webmproject product.

RSS Feeds for Webmproject security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in Webmproject products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by Webmproject Sorted by Most Security Vulnerabilities since 2018

Webmproject Libwebp14 vulnerabilities

Webmproject Libvpx4 vulnerabilities

Webmproject Libwebm4 vulnerabilities

By the Year

In 2025 there have been 0 vulnerabilities in Webmproject. Webmproject did not have any published security vulnerabilities last year.




Year Vulnerabilities Average Score
2025 0 0.00
2024 0 0.00
2023 5 8.15
2022 0 0.00
2021 11 9.21
2020 0 0.00
2019 1 7.50
2018 3 8.37

It may take a day or so for new Webmproject vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Webmproject Security Vulnerabilities

VP9 in libvpx before 1.13.1 mishandles widths

CVE-2023-44488 7.5 - High - September 30, 2023

VP9 in libvpx before 1.13.1 mishandles widths, leading to a crash related to encoding.

Improper Handling of Exceptional Conditions

Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1

CVE-2023-5217 8.8 - High - September 28, 2023

Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Memory Corruption

** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority

CVE-2023-5129 - September 25, 2023

** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. Duplicate of CVE-2023-4863.

Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2

CVE-2023-4863 8.8 - High - September 12, 2023

Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)

Memory Corruption

There exists a use after free/double free in libwebp

CVE-2023-1999 7.5 - High - June 20, 2023

There exists a use after free/double free in libwebp. An attacker can use the ApplyFiltersAndEncode() function and loop through to free best.bw and assign best = trial pointer. The second loop will then return 0 because of an Out of memory error in VP8 encoder, the pointer is still assigned to trial and the AddressSanitizer will attempt a double free.

Double-free

A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in PutLE16().

CVE-2018-25011 9.8 - Critical - May 21, 2021

A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in PutLE16().

Memory Corruption

A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in ShiftBytes().

CVE-2018-25013 9.1 - Critical - May 21, 2021

A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in ShiftBytes().

Out-of-bounds Read

A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in GetLE24().

CVE-2018-25012 9.1 - Critical - May 21, 2021

A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in GetLE24().

Out-of-bounds Read

A use of uninitialized value was found in libwebp in versions before 1.0.1 in ReadSymbol().

CVE-2018-25014 9.8 - Critical - May 21, 2021

A use of uninitialized value was found in libwebp in versions before 1.0.1 in ReadSymbol().

Use of Uninitialized Resource

A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in ApplyFilter().

CVE-2018-25010 9.1 - Critical - May 21, 2021

A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in ApplyFilter().

Out-of-bounds Read

Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.