Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vjgx-vcpf-hm6w

Опубликовано: 19 дек. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 1.9
CVSS3: 5.3

Описание

A vulnerability was determined in WebAssembly Binaryen up to 125. Affected by this issue is the function WasmBinaryReader::readExport of the file src/wasm/wasm-binary.cpp. This manipulation causes heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. Patch name: 4f52bff8c4075b5630422f902dd92a0af2c9f398. It is recommended to apply a patch to fix this issue.

A vulnerability was determined in WebAssembly Binaryen up to 125. Affected by this issue is the function WasmBinaryReader::readExport of the file src/wasm/wasm-binary.cpp. This manipulation causes heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. Patch name: 4f52bff8c4075b5630422f902dd92a0af2c9f398. It is recommended to apply a patch to fix this issue.

EPSS

Процентиль: 8%
0.00029
Низкий

1.9 Low

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-119
CWE-125

Связанные уязвимости

CVSS3: 5.3
ubuntu
около 2 месяцев назад

A vulnerability was determined in WebAssembly Binaryen up to 125. Affected by this issue is the function WasmBinaryReader::readExport of the file src/wasm/wasm-binary.cpp. This manipulation causes heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. Patch name: 4f52bff8c4075b5630422f902dd92a0af2c9f398. It is recommended to apply a patch to fix this issue.

CVSS3: 5.3
nvd
около 2 месяцев назад

A vulnerability was determined in WebAssembly Binaryen up to 125. Affected by this issue is the function WasmBinaryReader::readExport of the file src/wasm/wasm-binary.cpp. This manipulation causes heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. Patch name: 4f52bff8c4075b5630422f902dd92a0af2c9f398. It is recommended to apply a patch to fix this issue.

CVSS3: 5.3
debian
около 2 месяцев назад

A vulnerability was determined in WebAssembly Binaryen up to 125. Affe ...

EPSS

Процентиль: 8%
0.00029
Низкий

1.9 Low

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-119
CWE-125