Логотип exploitDog
bind:CVE-2025-14956
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-14956

Количество 4

Количество 4

ubuntu логотип

CVE-2025-14956

около 2 месяцев назад

A vulnerability was determined in WebAssembly Binaryen up to 125. Affected by this issue is the function WasmBinaryReader::readExport of the file src/wasm/wasm-binary.cpp. This manipulation causes heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. Patch name: 4f52bff8c4075b5630422f902dd92a0af2c9f398. It is recommended to apply a patch to fix this issue.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2025-14956

около 2 месяцев назад

A vulnerability was determined in WebAssembly Binaryen up to 125. Affected by this issue is the function WasmBinaryReader::readExport of the file src/wasm/wasm-binary.cpp. This manipulation causes heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. Patch name: 4f52bff8c4075b5630422f902dd92a0af2c9f398. It is recommended to apply a patch to fix this issue.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2025-14956

около 2 месяцев назад

A vulnerability was determined in WebAssembly Binaryen up to 125. Affe ...

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-vjgx-vcpf-hm6w

около 2 месяцев назад

A vulnerability was determined in WebAssembly Binaryen up to 125. Affected by this issue is the function WasmBinaryReader::readExport of the file src/wasm/wasm-binary.cpp. This manipulation causes heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. Patch name: 4f52bff8c4075b5630422f902dd92a0af2c9f398. It is recommended to apply a patch to fix this issue.

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-14956

A vulnerability was determined in WebAssembly Binaryen up to 125. Affected by this issue is the function WasmBinaryReader::readExport of the file src/wasm/wasm-binary.cpp. This manipulation causes heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. Patch name: 4f52bff8c4075b5630422f902dd92a0af2c9f398. It is recommended to apply a patch to fix this issue.

CVSS3: 5.3
0%
Низкий
около 2 месяцев назад
nvd логотип
CVE-2025-14956

A vulnerability was determined in WebAssembly Binaryen up to 125. Affected by this issue is the function WasmBinaryReader::readExport of the file src/wasm/wasm-binary.cpp. This manipulation causes heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. Patch name: 4f52bff8c4075b5630422f902dd92a0af2c9f398. It is recommended to apply a patch to fix this issue.

CVSS3: 5.3
0%
Низкий
около 2 месяцев назад
debian логотип
CVE-2025-14956

A vulnerability was determined in WebAssembly Binaryen up to 125. Affe ...

CVSS3: 5.3
0%
Низкий
около 2 месяцев назад
github логотип
GHSA-vjgx-vcpf-hm6w

A vulnerability was determined in WebAssembly Binaryen up to 125. Affected by this issue is the function WasmBinaryReader::readExport of the file src/wasm/wasm-binary.cpp. This manipulation causes heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. Patch name: 4f52bff8c4075b5630422f902dd92a0af2c9f398. It is recommended to apply a patch to fix this issue.

CVSS3: 5.3
0%
Низкий
около 2 месяцев назад

Уязвимостей на страницу