Filtered by vendor Webassembly Subscriptions
Filtered by product Wabt Subscriptions
Total 7 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-6275 1 Webassembly 1 Wabt 2025-07-02 3.3 Low
A vulnerability was found in WebAssembly wabt up to 1.0.37. It has been declared as problematic. Affected by this vulnerability is the function GetFuncOffset of the file src/interp/binary-reader-interp.cc. The manipulation leads to use after free. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. A similar issue reported during the same timeframe was disputed by the code maintainer because it might not affect "real world wasm programs". Therefore, this entry might get disputed as well in the future.
CVE-2025-6274 1 Webassembly 1 Wabt 2025-07-02 3.3 Low
A vulnerability was found in WebAssembly wabt up to 1.0.37. It has been classified as problematic. Affected is the function OnDataCount of the file src/interp/binary-reader-interp.cc. The manipulation leads to resource consumption. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. A similar issue reported during the same timeframe was disputed by the code maintainer because it might not affect "real world wasm programs". Therefore, this entry might get disputed as well in the future.
CVE-2022-43283 1 Webassembly 1 Wabt 2025-05-08 5.5 Medium
wasm2c v1.0.29 was discovered to contain an abort in CWriter::Write.
CVE-2022-43282 1 Webassembly 1 Wabt 2025-05-08 7.1 High
wasm-interp v1.0.29 was discovered to contain an out-of-bounds read via the component OnReturnCallIndirectExpr->GetReturnCallDropKeepCount.
CVE-2022-43280 1 Webassembly 1 Wabt 2025-05-07 7.1 High
wasm-interp v1.0.29 was discovered to contain an out-of-bounds read via the component OnReturnCallExpr->GetReturnCallDropKeepCount.
CVE-2025-2584 1 Webassembly 1 Wabt 2025-03-24 5 Medium
A vulnerability was found in WebAssembly wabt 1.0.36. It has been declared as critical. This vulnerability affects the function BinaryReaderInterp::GetReturnCallDropKeepCount of the file wabt/src/interp/binary-reader-interp.cc. The manipulation leads to heap-based buffer overflow. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
CVE-2023-27119 1 Webassembly 1 Wabt 2025-02-28 5.5 Medium
WebAssembly v1.0.29 was discovered to contain a segmentation fault via the component wabt::Decompiler::WrapChild.