CVE-2025-62711
- EPSS 0.04%
- Veröffentlicht 24.10.2025 21:54:52
- Zuletzt bearbeitet 27.10.2025 13:20:15
Wasmtime is a runtime for WebAssembly. In versions from 38.0.0 to before 38.0.3, the implementation of component-model related host-to-wasm trampolines in Wasmtime contained a bug where it's possible to carefully craft a component, which when called ...
CVE-2025-61670
- EPSS 0.02%
- Veröffentlicht 07.10.2025 18:49:53
- Zuletzt bearbeitet 30.10.2025 14:45:37
Wasmtime is a runtime for WebAssembly. Wasmtime 37.0.0 and 37.0.1 have memory leaks in the C/C++ API when using bindings for the `anyref` or `externref` WebAssembly values. This is caused by a regression introduced during the development of 37.0.0 an...
CVE-2025-53901
- EPSS 0.08%
- Veröffentlicht 18.07.2025 17:10:11
- Zuletzt bearbeitet 04.09.2025 17:12:30
Wasmtime is a runtime for WebAssembly. Prior to versions 24.0.4, 33.0.2, and 34.0.2, a bug in Wasmtime's implementation of the WASIp1 set of import functions can lead to a WebAssembly guest inducing a panic in the host (embedder). The specific bug is...
- EPSS 0.21%
- Veröffentlicht 05.11.2024 22:15:21
- Zuletzt bearbeitet 04.09.2025 16:14:33
Wasmtime is a fast and secure runtime for WebAssembly. Wasmtime's filesystem sandbox implementation on Windows blocks access to special device filenames such as "COM1", "COM2", "LPT0", "LPT1", and so on, however it did not block access to the special...
CVE-2024-47813
- EPSS 0.01%
- Veröffentlicht 09.10.2024 18:15:09
- Zuletzt bearbeitet 29.09.2025 13:11:34
Wasmtime is an open source runtime for WebAssembly. Under certain concurrent event orderings, a `wasmtime::Engine`'s internal type registry was susceptible to double-unregistration bugs due to a race condition, leading to panics and potentially type ...
CVE-2024-47763
- EPSS 0.01%
- Veröffentlicht 09.10.2024 18:15:08
- Zuletzt bearbeitet 29.09.2025 13:26:36
Wasmtime is an open source runtime for WebAssembly. Wasmtime's implementation of WebAssembly tail calls combined with stack traces can result in a runtime crash in certain WebAssembly modules. The runtime crash may be undefined behavior if Wasmtime w...
CVE-2024-30266
- EPSS 0.02%
- Veröffentlicht 04.04.2024 16:15:09
- Zuletzt bearbeitet 02.09.2025 14:46:00
wasmtime is a runtime for WebAssembly. The 19.0.0 release of Wasmtime contains a regression introduced during its development which can lead to a guest WebAssembly module causing a panic in the host runtime. A valid WebAssembly module, when executed ...
CVE-2023-41880
- EPSS 0.18%
- Veröffentlicht 15.09.2023 20:15:11
- Zuletzt bearbeitet 21.11.2024 08:21:50
Wasmtime is a standalone runtime for WebAssembly. Wasmtime versions from 10.0.0 to versions 10.02, 11.0.2, and 12.0.1 contain a miscompilation of the WebAssembly `i64x2.shr_s` instruction on x86_64 platforms when the shift amount is a constant value ...
CVE-2023-30624
- EPSS 0.09%
- Veröffentlicht 27.04.2023 17:15:08
- Zuletzt bearbeitet 21.11.2024 08:00:32
Wasmtime is a standalone runtime for WebAssembly. Prior to versions 6.0.2, 7.0.1, and 8.0.1, Wasmtime's implementation of managing per-instance state, such as tables and memories, contains LLVM-level undefined behavior. This undefined behavior was fo...
CVE-2023-27477
- EPSS 0.26%
- Veröffentlicht 08.03.2023 21:15:11
- Zuletzt bearbeitet 21.11.2024 07:52:58
wasmtime is a fast and secure runtime for WebAssembly. Wasmtime's code generation backend, Cranelift, has a bug on x86_64 platforms for the WebAssembly `i8x16.select` instruction which will produce the wrong results when the same operand is provided ...