Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 19 Dec 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 19 Dec 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in WebAssembly Binaryen up to 125. Affected by this issue is the function WasmBinaryReader::readExport of the file src/wasm/wasm-binary.cpp. This manipulation causes heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. Patch name: 4f52bff8c4075b5630422f902dd92a0af2c9f398. It is recommended to apply a patch to fix this issue. | |
| Title | WebAssembly Binaryen wasm-binary.cpp readExport heap-based overflow | |
| Weaknesses | CWE-119 CWE-122 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-12-19T18:00:41.794Z
Reserved: 2025-12-19T08:38:51.694Z
Link: CVE-2025-14956
Updated: 2025-12-19T17:24:58.226Z
Status : Awaiting Analysis
Published: 2025-12-19T17:15:51.470
Modified: 2025-12-19T18:00:18.330
Link: CVE-2025-14956
No data.
OpenCVE Enrichment
No data.