Webmproject Webmproject

Do you want an email whenever new security vulnerabilities are reported in any Webmproject product?

Products by Webmproject Sorted by Most Security Vulnerabilities since 2018

Webmproject Libwebp14 vulnerabilities

Webmproject Libwebm4 vulnerabilities

Webmproject Libvpx3 vulnerabilities

By the Year

In 2024 there have been 0 vulnerabilities in Webmproject . Last year Webmproject had 4 security vulnerabilities published. Right now, Webmproject is on track to have less security vulnerabilities in 2024 than it did last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 4 7.93
2022 0 0.00
2021 11 9.21
2020 0 0.00
2019 1 7.50
2018 3 8.37

It may take a day or so for new Webmproject vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Webmproject Security Vulnerabilities

VP9 in libvpx before 1.13.1 mishandles widths

CVE-2023-44488 7.5 - High - September 30, 2023

VP9 in libvpx before 1.13.1 mishandles widths, leading to a crash related to encoding.

Improper Handling of Exceptional Conditions

** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority

CVE-2023-5129 - September 25, 2023

** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. Duplicate of CVE-2023-4863.

Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2

CVE-2023-4863 8.8 - High - September 12, 2023

Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)

Memory Corruption

There exists a use after free/double free in libwebp

CVE-2023-1999 7.5 - High - June 20, 2023

There exists a use after free/double free in libwebp. An attacker can use the ApplyFiltersAndEncode() function and loop through to free best.bw and assign best = trial pointer. The second loop will then return 0 because of an Out of memory error in VP8 encoder, the pointer is still assigned to trial and the AddressSanitizer will attempt a double free. 

Double-free

A flaw was found in libwebp in versions before 1.0.1

CVE-2020-36328 9.8 - Critical - May 21, 2021

A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow in function WebPDecodeRGBInto is possible due to an invalid check for buffer size. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Memory Corruption

A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in GetLE16().

CVE-2018-25009 9.1 - Critical - May 21, 2021

A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in GetLE16().

Out-of-bounds Read

A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in ApplyFilter().

CVE-2018-25010 9.1 - Critical - May 21, 2021

A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in ApplyFilter().

Out-of-bounds Read

A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in PutLE16().

CVE-2018-25011 9.8 - Critical - May 21, 2021

A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in PutLE16().

Memory Corruption

A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in GetLE24().

CVE-2018-25012 9.1 - Critical - May 21, 2021

A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in GetLE24().

Out-of-bounds Read

A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in ShiftBytes().

CVE-2018-25013 9.1 - Critical - May 21, 2021

A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in ShiftBytes().

Out-of-bounds Read

A use of uninitialized value was found in libwebp in versions before 1.0.1 in ReadSymbol().

CVE-2018-25014 9.8 - Critical - May 21, 2021

A use of uninitialized value was found in libwebp in versions before 1.0.1 in ReadSymbol().

Use of Uninitialized Resource

A flaw was found in libwebp in versions before 1.0.1

CVE-2020-36329 9.8 - Critical - May 21, 2021

A flaw was found in libwebp in versions before 1.0.1. A use-after-free was found due to a thread being killed too early. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Dangling pointer

A flaw was found in libwebp in versions before 1.0.1

CVE-2020-36330 9.1 - Critical - May 21, 2021

A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function ChunkVerifyAndAssign. The highest threat from this vulnerability is to data confidentiality and to the service availability.

Out-of-bounds Read

A flaw was found in libwebp in versions before 1.0.1

CVE-2020-36331 9.1 - Critical - May 21, 2021

A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function ChunkAssignData. The highest threat from this vulnerability is to data confidentiality and to the service availability.

Out-of-bounds Read

A flaw was found in libwebp in versions before 1.0.1

CVE-2020-36332 7.5 - High - May 21, 2021

A flaw was found in libwebp in versions before 1.0.1. When reading a file libwebp allocates an excessive amount of memory. The highest threat from this vulnerability is to the service availability.

Resource Exhaustion

In libwebm before 2019-03-08, a NULL pointer dereference caused by the functions OutputCluster and OutputTracks in webm_info.cc will trigger an abort, which

CVE-2019-9746 7.5 - High - March 13, 2019

In libwebm before 2019-03-08, a NULL pointer dereference caused by the functions OutputCluster and OutputTracks in webm_info.cc will trigger an abort, which allows a DoS attack, a similar issue to CVE-2018-19212.

NULL Pointer Dereference

In libwebm through 2018-10-03, there is an abort caused by libwebm::Webm2Pes::InitWebmParser()

CVE-2018-19212 6.5 - Medium - November 12, 2018

In libwebm through 2018-10-03, there is an abort caused by libwebm::Webm2Pes::InitWebmParser() that will lead to a DoS attack.

Always-Incorrect Control Flow Implementation

A use-after-free issue was discovered in libwebm through 2018-02-02

CVE-2018-6548 9.8 - Critical - February 02, 2018

A use-after-free issue was discovered in libwebm through 2018-02-02. If a Vp9HeaderParser was initialized once before, its property frame_ would not be changed because of code in vp9parser::Vp9HeaderParser::SetFrame. Its frame_ could be freed while the corresponding pointer would not be updated, leading to a dangling pointer. This is related to the function OutputCluster in webm_info.cc.

Dangling pointer

The function ParseVP9SuperFrameIndex in common/libwebm_util.cc in libwebm through 2018-01-30 does not validate the child_frame_length data obtained from a .webm file, which

CVE-2018-6406 8.8 - High - January 30, 2018

The function ParseVP9SuperFrameIndex in common/libwebm_util.cc in libwebm through 2018-01-30 does not validate the child_frame_length data obtained from a .webm file, which allows remote attackers to cause an information leak or a denial of service (heap-based buffer over-read and later out-of-bounds write), or possibly have unspecified other impact.

Out-of-bounds Read

VP8 Codec SDK (libvpx) before 1.0.0 "Duclair"

CVE-2012-0823 - February 23, 2012

VP8 Codec SDK (libvpx) before 1.0.0 "Duclair" allows remote attackers to cause a denial of service (application crash) via (1) unspecified "corrupt input" or (2) by "starting decoding from a P-frame," which triggers an out-of-bounds read, related to "the clamping of motion vectors in SPLITMV blocks".

Improper Input Validation

Built by Foundeo Inc., with data from the National Vulnerability Database (NVD), Icons by Icons8. Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.