{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T13:01:45.476","vulnerabilities":[{"cve":{"id":"CVE-2023-5217","sourceIdentifier":"chrome-cve-admin@google.com","published":"2023-09-28T16:15:10.980","lastModified":"2025-10-24T14:07:24.923","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"},{"lang":"es","value":"El desbordamiento del búfer en la codificación vp8 en libvpx en Google Chrome anterior a 117.0.5938.132 y libvpx 1.13.1 permitía a un atacante remoto explotar potencialmente la corrupción del montón a través de una página HTML manipulada. (Severidad de seguridad de Chrome: alta)"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"cisaExploitAdd":"2023-10-02","cisaActionDue":"2023-10-23","cisaRequiredAction":"Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.","cisaVulnerabilityName":"Google Chromium libvpx Heap Buffer Overflow Vulnerability","weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:webmproject:libvpx:*:*:*:*:*:*:*:*","versionEndExcluding":"1.13.1","matchCriteriaId":"385F58CC-4AA0-4C41-9394-C9481586689E"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:edge:116.0.1938.98:*:*:*:*:*:*:*","matchCriteriaId":"83749E8D-D4EC-4C5E-B031-8DD4C5C3AA72"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:edge:117.0.2045.47:*:*:*:*:*:*:*","matchCriteriaId":"39F5AB10-A20E-4B12-863D-9335A6344130"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:edge_chromium:116.0.5845.229:*:*:*:*:*:*:*","matchCriteriaId":"494B17DA-B40E-4B79-925D-2F439C7A4BCC"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:edge_chromium:117.0.5938.132:*:*:*:*:*:*:*","matchCriteriaId":"0A1735C0-78BF-4B9C-9EC6-64471C609046"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*","versionEndExcluding":"115.3.1","matchCriteriaId":"93B700CD-4D4C-4D92-B105-9B02E21246BB"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*","versionEndExcluding":"118.0.1","matchCriteriaId":"B6BEA417-5012-4315-AFF2-20BBF931A550"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:android:*:*","versionEndExcluding":"118.1","matchCriteriaId":"C0246068-275F-4D13-93B9-44AD91D2EFFB"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","versionEndExcluding":"115.3.1","matchCriteriaId":"C287FD41-1668-4BA8-9BF5-7C56420F6F38"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*","matchCriteriaId":"E30D0E6F-4AE8-4284-8716-991DFA48CC5D"},{"vulnerable":true,"criteria":"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*","matchCriteriaId":"CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"},{"vulnerable":true,"criteria":"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*","matchCriteriaId":"B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","matchCriteriaId":"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","matchCriteriaId":"FA6FEEC2-9F11-4643-8827-749718254FED"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*","matchCriteriaId":"46D69DCC-AE4D-4EA5-861C-D60951444C6C"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*","versionStartIncluding":"17.0","versionEndExcluding":"17.0.3","matchCriteriaId":"5383A8BF-7AD6-4D5A-9B57-DE1BC2C59E09"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:ipados:16.7:*:*:*:*:*:*:*","matchCriteriaId":"A377B7C9-A339-49A9-9C96-A6F5F738B40C"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","versionStartIncluding":"17.0","versionEndExcluding":"17.0.3","matchCriteriaId":"F1D28032-F9E6-45E7-98B6-7CE2351C4C99"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:iphone_os:16.7:*:*:*:*:*:*:*","matchCriteriaId":"EF582B55-1D2F-4F53-9F3D-DB52F211B600"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*","versionEndExcluding":"117.0.5938.132","matchCriteriaId":"8F840D02-4766-4644-8FD6-637E945E88FB"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*","matchCriteriaId":"7F6FB57C-2BC7-487C-96DD-132683AEB35D"}]}]}],"references":[{"url":"http:\/\/seclists.org\/fulldisclosure\/2023\/Oct\/12","source":"chrome-cve-admin@google.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/seclists.org\/fulldisclosure\/2023\/Oct\/16","source":"chrome-cve-admin@google.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/28\/5","source":"chrome-cve-admin@google.com","tags":["Mailing List","Patch","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/28\/6","source":"chrome-cve-admin@google.com","tags":["Mailing List","Patch","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/29\/1","source":"chrome-cve-admin@google.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/29\/11","source":"chrome-cve-admin@google.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/29\/12","source":"chrome-cve-admin@google.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/29\/14","source":"chrome-cve-admin@google.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/29\/2","source":"chrome-cve-admin@google.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/29\/7","source":"chrome-cve-admin@google.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/29\/9","source":"chrome-cve-admin@google.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/30\/1","source":"chrome-cve-admin@google.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/30\/2","source":"chrome-cve-admin@google.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/30\/3","source":"chrome-cve-admin@google.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/30\/4","source":"chrome-cve-admin@google.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/30\/5","source":"chrome-cve-admin@google.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/10\/01\/1","source":"chrome-cve-admin@google.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/10\/01\/2","source":"chrome-cve-admin@google.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/10\/01\/5","source":"chrome-cve-admin@google.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/10\/02\/6","source":"chrome-cve-admin@google.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/10\/03\/11","source":"chrome-cve-admin@google.com","tags":["Mailing List","Third Party Advisory"]},{"url":"https:\/\/arstechnica.com\/security\/2023\/09\/new-0-day-in-chrome-and-firefox-is-likely-to-plague-other-software\/","source":"chrome-cve-admin@google.com","tags":["Third Party Advisory"]},{"url":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2241191","source":"chrome-cve-admin@google.com","tags":["Issue Tracking","Third Party Advisory"]},{"url":"https:\/\/chromereleases.googleblog.com\/2023\/09\/stable-channel-update-for-desktop_27.html","source":"chrome-cve-admin@google.com","tags":["Vendor Advisory"]},{"url":"https:\/\/crbug.com\/1486441","source":"chrome-cve-admin@google.com","tags":["Exploit","Issue Tracking"]},{"url":"https:\/\/github.com\/webmproject\/libvpx\/commit\/3fbd1dca6a4d2dad332a2110d646e4ffef36d590","source":"chrome-cve-admin@google.com","tags":["Patch"]},{"url":"https:\/\/github.com\/webmproject\/libvpx\/commit\/af6dedd715f4307669366944cca6e0417b290282","source":"chrome-cve-admin@google.com","tags":["Patch"]},{"url":"https:\/\/github.com\/webmproject\/libvpx\/releases\/tag\/v1.13.1","source":"chrome-cve-admin@google.com","tags":["Release Notes"]},{"url":"https:\/\/github.com\/webmproject\/libvpx\/tags","source":"chrome-cve-admin@google.com","tags":["Product"]},{"url":"https:\/\/lists.debian.org\/debian-lts-announce\/2023\/09\/msg00038.html","source":"chrome-cve-admin@google.com","tags":["Mailing List"]},{"url":"https:\/\/lists.debian.org\/debian-lts-announce\/2023\/10\/msg00001.html","source":"chrome-cve-admin@google.com","tags":["Mailing List"]},{"url":"https:\/\/lists.debian.org\/debian-lts-announce\/2023\/10\/msg00015.html","source":"chrome-cve-admin@google.com","tags":["Mailing List"]},{"url":"https:\/\/lists.fedoraproject.org\/archives\/list\/package-announce@lists.fedoraproject.org\/message\/4MFWDFJSSIFKWKNOCTQCFUNZWAXUCSS4\/","source":"chrome-cve-admin@google.com","tags":["Mailing List"]},{"url":"https:\/\/lists.fedoraproject.org\/archives\/list\/package-announce@lists.fedoraproject.org\/message\/55YVCZNAVY3Y5E4DWPWMX2SPKZ2E5SOV\/","source":"chrome-cve-admin@google.com","tags":["Mailing List"]},{"url":"https:\/\/lists.fedoraproject.org\/archives\/list\/package-announce@lists.fedoraproject.org\/message\/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD\/","source":"chrome-cve-admin@google.com","tags":["Mailing List"]},{"url":"https:\/\/lists.fedoraproject.org\/archives\/list\/package-announce@lists.fedoraproject.org\/message\/BCVSHVX2RFBU3RMCUFSATVQEJUFD4Q63\/","source":"chrome-cve-admin@google.com","tags":["Mailing List"]},{"url":"https:\/\/lists.fedoraproject.org\/archives\/list\/package-announce@lists.fedoraproject.org\/message\/CWEJYS5NC7KVFYU3OAMPKQDYN6JQGVK6\/","source":"chrome-cve-admin@google.com","tags":["Mailing List"]},{"url":"https:\/\/lists.fedoraproject.org\/archives\/list\/package-announce@lists.fedoraproject.org\/message\/TE7F54W5O5RS4ZMAAC7YK3CZWQXIDSKB\/","source":"chrome-cve-admin@google.com","tags":["Mailing List"]},{"url":"https:\/\/lists.fedoraproject.org\/archives\/list\/package-announce@lists.fedoraproject.org\/message\/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I\/","source":"chrome-cve-admin@google.com","tags":["Mailing List"]},{"url":"https:\/\/pastebin.com\/TdkC4pDv","source":"chrome-cve-admin@google.com","tags":["Not Applicable"]},{"url":"https:\/\/security-tracker.debian.org\/tracker\/CVE-2023-5217","source":"chrome-cve-admin@google.com","tags":["Third Party Advisory"]},{"url":"https:\/\/security.gentoo.org\/glsa\/202310-04","source":"chrome-cve-admin@google.com","tags":["Third Party Advisory"]},{"url":"https:\/\/security.gentoo.org\/glsa\/202401-34","source":"chrome-cve-admin@google.com","tags":["Third Party Advisory"]},{"url":"https:\/\/stackdiary.com\/google-discloses-a-webm-vp8-bug-tracked-as-cve-2023-5217\/","source":"chrome-cve-admin@google.com","tags":["Third Party Advisory"]},{"url":"https:\/\/support.apple.com\/kb\/HT213961","source":"chrome-cve-admin@google.com","tags":["Third Party Advisory"]},{"url":"https:\/\/support.apple.com\/kb\/HT213972","source":"chrome-cve-admin@google.com","tags":["Third Party Advisory"]},{"url":"https:\/\/twitter.com\/maddiestone\/status\/1707163313711497266","source":"chrome-cve-admin@google.com","tags":["Third Party Advisory"]},{"url":"https:\/\/www.debian.org\/security\/2023\/dsa-5508","source":"chrome-cve-admin@google.com","tags":["Mailing List"]},{"url":"https:\/\/www.debian.org\/security\/2023\/dsa-5509","source":"chrome-cve-admin@google.com","tags":["Mailing List"]},{"url":"https:\/\/www.debian.org\/security\/2023\/dsa-5510","source":"chrome-cve-admin@google.com","tags":["Mailing List"]},{"url":"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2023-44\/","source":"chrome-cve-admin@google.com","tags":["Third Party Advisory"]},{"url":"https:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/28\/5","source":"chrome-cve-admin@google.com","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/seclists.org\/fulldisclosure\/2023\/Oct\/12","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/seclists.org\/fulldisclosure\/2023\/Oct\/16","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/28\/5","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Patch","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/28\/6","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Patch","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/29\/1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/29\/11","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/29\/12","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/29\/14","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/29\/2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/29\/7","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/29\/9","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/30\/1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/30\/2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/30\/3","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/30\/4","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/30\/5","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/10\/01\/1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/10\/01\/2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/10\/01\/5","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/10\/02\/6","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http:\/\/www.openwall.com\/lists\/oss-security\/2023\/10\/03\/11","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https:\/\/arstechnica.com\/security\/2023\/09\/new-0-day-in-chrome-and-firefox-is-likely-to-plague-other-software\/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2241191","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Third Party Advisory"]},{"url":"https:\/\/chromereleases.googleblog.com\/2023\/09\/stable-channel-update-for-desktop_27.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https:\/\/crbug.com\/1486441","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Issue Tracking"]},{"url":"https:\/\/github.com\/webmproject\/libvpx\/commit\/3fbd1dca6a4d2dad332a2110d646e4ffef36d590","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https:\/\/github.com\/webmproject\/libvpx\/commit\/af6dedd715f4307669366944cca6e0417b290282","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https:\/\/github.com\/webmproject\/libvpx\/releases\/tag\/v1.13.1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes"]},{"url":"https:\/\/github.com\/webmproject\/libvpx\/tags","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]},{"url":"https:\/\/lists.debian.org\/debian-lts-announce\/2023\/09\/msg00038.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"]},{"url":"https:\/\/lists.debian.org\/debian-lts-announce\/2023\/10\/msg00001.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"]},{"url":"https:\/\/lists.debian.org\/debian-lts-announce\/2023\/10\/msg00015.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"]},{"url":"https:\/\/lists.fedoraproject.org\/archives\/list\/package-announce@lists.fedoraproject.org\/message\/4MFWDFJSSIFKWKNOCTQCFUNZWAXUCSS4\/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"]},{"url":"https:\/\/lists.fedoraproject.org\/archives\/list\/package-announce@lists.fedoraproject.org\/message\/55YVCZNAVY3Y5E4DWPWMX2SPKZ2E5SOV\/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"]},{"url":"https:\/\/lists.fedoraproject.org\/archives\/list\/package-announce@lists.fedoraproject.org\/message\/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD\/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"]},{"url":"https:\/\/lists.fedoraproject.org\/archives\/list\/package-announce@lists.fedoraproject.org\/message\/BCVSHVX2RFBU3RMCUFSATVQEJUFD4Q63\/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"]},{"url":"https:\/\/lists.fedoraproject.org\/archives\/list\/package-announce@lists.fedoraproject.org\/message\/CWEJYS5NC7KVFYU3OAMPKQDYN6JQGVK6\/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"]},{"url":"https:\/\/lists.fedoraproject.org\/archives\/list\/package-announce@lists.fedoraproject.org\/message\/TE7F54W5O5RS4ZMAAC7YK3CZWQXIDSKB\/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"]},{"url":"https:\/\/lists.fedoraproject.org\/archives\/list\/package-announce@lists.fedoraproject.org\/message\/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I\/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"]},{"url":"https:\/\/pastebin.com\/TdkC4pDv","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Not Applicable"]},{"url":"https:\/\/security-tracker.debian.org\/tracker\/CVE-2023-5217","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https:\/\/security.gentoo.org\/glsa\/202310-04","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https:\/\/security.gentoo.org\/glsa\/202401-34","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https:\/\/stackdiary.com\/google-discloses-a-webm-vp8-bug-tracked-as-cve-2023-5217\/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https:\/\/support.apple.com\/kb\/HT213961","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https:\/\/support.apple.com\/kb\/HT213972","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https:\/\/twitter.com\/maddiestone\/status\/1707163313711497266","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https:\/\/www.debian.org\/security\/2023\/dsa-5508","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"]},{"url":"https:\/\/www.debian.org\/security\/2023\/dsa-5509","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"]},{"url":"https:\/\/www.debian.org\/security\/2023\/dsa-5510","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"]},{"url":"https:\/\/www.mozilla.org\/en-US\/security\/advisories\/mfsa2023-44\/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https:\/\/www.openwall.com\/lists\/oss-security\/2023\/09\/28\/5","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-5217","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"]}]}}]}