Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-2584

Опубликовано: 21 мар. 2025
Источник: nvd
CVSS3: 5
CVSS3: 7.4
CVSS2: 5.1
EPSS Низкий

Описание

A vulnerability was found in WebAssembly wabt 1.0.36. It has been declared as critical. This vulnerability affects the function BinaryReaderInterp::GetReturnCallDropKeepCount of the file wabt/src/interp/binary-reader-interp.cc. The manipulation leads to heap-based buffer overflow. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.

Ссылки

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:webassembly:wabt:1.0.36:*:*:*:*:*:*:*

EPSS

Процентиль: 23%
0.00072
Низкий

5 Medium

CVSS3

7.4 High

CVSS3

5.1 Medium

CVSS2

Дефекты

CWE-119
CWE-787

Связанные уязвимости

CVSS3: 5
ubuntu
6 месяцев назад

A vulnerability was found in WebAssembly wabt 1.0.36. It has been declared as critical. This vulnerability affects the function BinaryReaderInterp::GetReturnCallDropKeepCount of the file wabt/src/interp/binary-reader-interp.cc. The manipulation leads to heap-based buffer overflow. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.

CVSS3: 5
redhat
6 месяцев назад

A vulnerability was found in WebAssembly wabt 1.0.36. It has been declared as critical. This vulnerability affects the function BinaryReaderInterp::GetReturnCallDropKeepCount of the file wabt/src/interp/binary-reader-interp.cc. The manipulation leads to heap-based buffer overflow. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.

CVSS3: 5
debian
6 месяцев назад

A vulnerability was found in WebAssembly wabt 1.0.36. It has been decl ...

CVSS3: 5
github
6 месяцев назад

A vulnerability was found in WebAssembly wabt 1.0.36. It has been declared as critical. This vulnerability affects the function BinaryReaderInterp::GetReturnCallDropKeepCount of the file wabt/src/interp/binary-reader-interp.cc. The manipulation leads to heap-based buffer overflow. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.

EPSS

Процентиль: 23%
0.00072
Низкий

5 Medium

CVSS3

7.4 High

CVSS3

5.1 Medium

CVSS2

Дефекты

CWE-119
CWE-787