5.5
CVE-2025-64704
- EPSS 0.01%
- Veröffentlicht 25.11.2025 22:06:46
- Zuletzt bearbeitet 03.12.2025 18:50:20
- Quelle security-advisories@github.com
- CVE-Watchlists
- Unerledigt
WebAssembly Micro Runtime (WAMR) is a lightweight standalone WebAssembly (Wasm) runtime. Prior to version 2.4.4, WAMR is susceptible to a segmentation fault in v128.store instruction. This issue has been patched in version 2.4.4.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Bytecodealliance ≫ Webassembly Micro Runtime Version < 2.4.4
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.01% | 0.019 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
|
| security-advisories@github.com | 4.7 | 1 | 3.6 |
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
|
CWE-754 Improper Check for Unusual or Exceptional Conditions
The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product.