Metrics
Affected Vendors & Products
Mon, 24 Mar 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Webassembly
Webassembly wabt |
|
Weaknesses | CWE-787 | |
CPEs | cpe:2.3:a:webassembly:wabt:1.0.36:*:*:*:*:*:*:* | |
Vendors & Products |
Webassembly
Webassembly wabt |
Fri, 21 Mar 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Fri, 21 Mar 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 21 Mar 2025 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in WebAssembly wabt 1.0.36. It has been declared as critical. This vulnerability affects the function BinaryReaderInterp::GetReturnCallDropKeepCount of the file wabt/src/interp/binary-reader-interp.cc. The manipulation leads to heap-based buffer overflow. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. | |
Title | WebAssembly wabt binary-reader-interp.cc GetReturnCallDropKeepCount heap-based overflow | |
Weaknesses | CWE-119 CWE-122 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-03-21T07:31:03.732Z
Updated: 2025-03-21T12:29:54.383Z
Reserved: 2025-03-20T23:01:41.046Z
Link: CVE-2025-2584

Updated: 2025-03-21T12:29:49.513Z

Status : Analyzed
Published: 2025-03-21T08:15:11.273
Modified: 2025-03-24T14:02:56.053
Link: CVE-2025-2584
