Lucene search

K

4 matches found

CVE
CVE
added 2024/10/09 6:15 p.m.233 views

CVE-2024-47813

Wasmtime is an open source runtime for WebAssembly. Under certain concurrent event orderings, a wasmtime::Engine's internal type registry was susceptible to double-unregistration bugs due to a race condition, leading to panics and potentially type registry corruption. That registry corruption could...

2.9CVSS3.6AI score0.00007EPSS
CVE
CVE
added 2024/04/04 4:15 p.m.223 views

CVE-2024-30266

wasmtime is a runtime for WebAssembly. The 19.0.0 release of Wasmtime contains a regression introduced during its development which can lead to a guest WebAssembly module causing a panic in the host runtime. A valid WebAssembly module, when executed at runtime, may cause this panic. This vulnerabil...

3.3CVSS3.6AI score0.00017EPSS
CVE
CVE
added 2024/10/09 6:15 p.m.201 views

CVE-2024-47763

Wasmtime is an open source runtime for WebAssembly. Wasmtime's implementation of WebAssembly tail calls combined with stack traces can result in a runtime crash in certain WebAssembly modules. The runtime crash may be undefined behavior if Wasmtime was compiled with Rust 1.80 or prior. The runtime ...

5.5CVSS5.4AI score0.00007EPSS
CVE
CVE
added 2024/11/05 10:15 p.m.201 views

CVE-2024-51745

Wasmtime is a fast and secure runtime for WebAssembly. Wasmtime's filesystem sandbox implementation on Windows blocks access to special device filenames such as "COM1", "COM2", "LPT0", "LPT1", and so on, however it did not block access to the special device filenames which use superscript digits, s...

2.3CVSS6.7AI score0.00078EPSS