Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 01 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in wasm3 up to 0.5.0. Impacted is the function op_SetSlot_i32/op_CallIndirect of the file m3_exec.h. Performing manipulation results in memory corruption. The attack needs to be approached locally. The exploit is now public and may be used. Unfortunately, the project has no active maintainer at the moment. | |
| Title | wasm3 m3_exec.h op_CallIndirect memory corruption | |
| Weaknesses | CWE-119 | |
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-01-01T21:02:06.923Z
Reserved: 2026-01-01T09:23:09.668Z
Link: CVE-2025-15413
No data.
Status : Awaiting Analysis
Published: 2026-01-01T21:15:41.273
Modified: 2026-01-02T16:45:26.640
Link: CVE-2025-15413
No data.
OpenCVE Enrichment
No data.