Metrics
Affected Vendors & Products
Wed, 19 Mar 2025 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Mon, 17 Mar 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 17 Mar 2025 08:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in WebAssembly wabt 1.0.36 and classified as critical. This issue affects the function wabt::interp::(anonymous namespace)::BinaryReaderInterp::OnExport of the file wabt/src/interp/binary-reader-interp.cc of the component Malformed File Handler. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. | |
Title | WebAssembly wabt Malformed File binary-reader-interp.cc OnExport heap-based overflow | |
Weaknesses | CWE-119 CWE-122 |
|
References |
|
|
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-03-17T08:00:05.922Z
Updated: 2025-03-17T16:25:00.678Z
Reserved: 2025-03-16T12:47:32.747Z
Link: CVE-2025-2368

Updated: 2025-03-17T16:24:46.532Z

Status : Received
Published: 2025-03-17T08:15:11.493
Modified: 2025-03-17T08:15:11.493
Link: CVE-2025-2368
