📦 Webassembly Micro Runtime
by Bytecodealliance
🔍 What is Webassembly Micro Runtime?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
A NULL pointer dereference vulnerability in wasm-micro-runtime's block_type_get_result_types function allows attackers to cause denial of service or potentially execute arbitrary code. This affects sy...
An out-of-bounds memory read vulnerability in Bytecode Alliance wasm-micro-runtime v2.0.0 allows remote attackers to cause denial of service by exploiting the block_type_get_arity function. This affec...
A heap overflow vulnerability in Bytecode Alliance's wasm-micro-runtime version 1.2.3 allows remote attackers to cause denial of service by exploiting the wasm_loader_prepare_bytecode function. This a...
This vulnerability in WebAssembly Micro Runtime (WAMR) allows a segmentation fault to be triggered via a specially crafted v128.store instruction in WebAssembly modules. This affects any application o...
This vulnerability in WebAssembly Micro Runtime (WAMR) causes runtime hangs or crashes when executing WebAssembly programs with specific memory.fill instructions in LLVM-JIT mode. It affects users run...
The WebAssembly Micro Runtime's iwasm package in versions 2.4.0 and below incorrectly handles IPv4 addresses without subnet masks in the --addr-pool parameter, causing the service to accept connection...