Логотип exploitDog
bind:CVE-2025-66627
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-66627

Количество 2

Количество 2

nvd логотип

CVE-2025-66627

2 месяца назад

Wasmi is a WebAssembly interpreter focused on constrained and embedded systems. In versions 0.41.0, 0.41.1, 0.42.0 through 0.47.1, 0.50.0 through 0.51.2 and 1.0.0, Wasmi's linear memory implementation leads to a Use After Free vulnerability, triggered by a WebAssembly module under certain memory growth conditions. This issue potentially leads to memory corruption, information disclosure, or code execution. This issue is fixed in versions 0.41.2, 0.47.1, 0.51.3 and 1.0.1. To workaround this issue, consider limiting the maximum linear memory sizes where feasible.

CVSS3: 8.4
EPSS: Низкий
github логотип

GHSA-g4v2-cjqp-rfmq

2 месяца назад

Critical Use-After-Free in Wasmi's Linear Memory

CVSS3: 8.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-66627

Wasmi is a WebAssembly interpreter focused on constrained and embedded systems. In versions 0.41.0, 0.41.1, 0.42.0 through 0.47.1, 0.50.0 through 0.51.2 and 1.0.0, Wasmi's linear memory implementation leads to a Use After Free vulnerability, triggered by a WebAssembly module under certain memory growth conditions. This issue potentially leads to memory corruption, information disclosure, or code execution. This issue is fixed in versions 0.41.2, 0.47.1, 0.51.3 and 1.0.1. To workaround this issue, consider limiting the maximum linear memory sizes where feasible.

CVSS3: 8.4
0%
Низкий
2 месяца назад
github логотип
GHSA-g4v2-cjqp-rfmq

Critical Use-After-Free in Wasmi's Linear Memory

CVSS3: 8.4
0%
Низкий
2 месяца назад

Уязвимостей на страницу