Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8cmg-37qm-wxhr

Опубликовано: 03 апр. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 2.3
CVSS3: 3.1

Описание

A vulnerability classified as problematic was found in WebAssembly wabt 1.0.36. Affected by this vulnerability is the function BinaryReaderInterp::BeginFunctionBody of the file src/interp/binary-reader-interp.cc. The manipulation leads to null pointer dereference. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.

A vulnerability classified as problematic was found in WebAssembly wabt 1.0.36. Affected by this vulnerability is the function BinaryReaderInterp::BeginFunctionBody of the file src/interp/binary-reader-interp.cc. The manipulation leads to null pointer dereference. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.

EPSS

Процентиль: 74%
0.00798
Низкий

2.3 Low

CVSS4

3.1 Low

CVSS3

Дефекты

CWE-404
CWE-476

Связанные уязвимости

CVSS3: 3.1
ubuntu
10 месяцев назад

A vulnerability classified as problematic was found in WebAssembly wabt 1.0.36. Affected by this vulnerability is the function BinaryReaderInterp::BeginFunctionBody of the file src/interp/binary-reader-interp.cc. The manipulation leads to null pointer dereference. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.

CVSS3: 3.1
nvd
10 месяцев назад

A vulnerability classified as problematic was found in WebAssembly wabt 1.0.36. Affected by this vulnerability is the function BinaryReaderInterp::BeginFunctionBody of the file src/interp/binary-reader-interp.cc. The manipulation leads to null pointer dereference. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.

CVSS3: 3.1
debian
10 месяцев назад

A vulnerability classified as problematic was found in WebAssembly wab ...

EPSS

Процентиль: 74%
0.00798
Низкий

2.3 Low

CVSS4

3.1 Low

CVSS3

Дефекты

CWE-404
CWE-476