Impact
An out-of-bounds read vulnerability has been identified in the software component woof provided by fabiangreffrath. The flaw allows code within the application to read data beyond the bounds of a designated buffer, potentially exposing sensitive or private information to an attacker. The vulnerability is scored at 9.1 under CVSS, indicating a severe risk of exploitation, and although no explicit exploitation method is disclosed, the high score suggests that an attacker could leverage the flaw to obtain confidential data or possibly gain a foothold for higher‑level attacks.
Affected Systems
The issue affects all releases of fabiangreffrath:woof prior to the 15.3.0 version. There is no narrower version scope given, so any deployment using a version older than 15.3.0 is considered vulnerable.
Risk and Exploitability
The CVSS score of 9.1 reflects a high attack impact. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, so current exploitation activity is unknown. The likely path to exploitation involves providing crafted input to woof that triggers the out‑of‑bounds read, indicating a high likelihood of attack if the attacker can exercise control over the input or code path. In absence of publicly available exploits, the risk remains theoretical but potentially significant due to the severity rating.
OpenCVE Enrichment