| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2025-61670 | Wasmtime has memory leak in C API with `externref` and `anyref` types | bytecodealliance | wasmtime | - | - | 2025-10-07 18:49:54 | Deep Dive |
| CVE-2025-58749 | WAMR runtime hangs or crashes with large memory.fill addresses in LLVM-JIT mode | bytecodealliance | wasm-micro-runtime | - | - | 2025-09-16 15:53:35 | Deep Dive |
| CVE-2025-54126 | WebAssembly Micro Runtime's `--addr-pool` option allows all IPv4 addresses when subnet mask is not specified | bytecodealliance | wasm-micro-runtime | - | - | 2025-07-29 21:52:36 | Deep Dive |
| CVE-2025-53901 | Wasmtime has host panic with `fd_renumber` WASIp1 function | bytecodealliance | wasmtime | Low | 3.5 | 2025-07-18 17:10:12 | Deep Dive |
| CVE-2025-43853 | iwasm vulnerable to filesystem sandbox escape with symlink when using uvwasi feature | bytecodealliance | wasm-micro-runtime | - | - | 2025-05-15 17:13:12 | Deep Dive |
| CVE-2024-51756 | cap-std doesn't fully sandbox all the Windows device filenames | bytecodealliance | cap-std | - | - | 2024-11-05 22:06:10 | Deep Dive |
| CVE-2024-51745 | Wasmtime doesn't fully sandbox all the Windows device filenames | bytecodealliance | wasmtime | - | - | 2024-11-05 21:09:44 | Deep Dive |
| CVE-2024-47813 | Wasmtime race condition could lead to WebAssembly control-flow integrity and type safety violations | bytecodealliance | wasmtime | Low | 2.9 | 2024-10-09 18:07:50 | Deep Dive |
| CVE-2024-47763 | Wasmtime runtime crash when combining tail calls with trapping imports | bytecodealliance | wasmtime | Medium | 5.5 | 2024-10-09 18:03:34 | Deep Dive |
| CVE-2024-43806 | `rustix::fs::Dir` iterator with the `linux_raw` backend can cause memory explosion | bytecodealliance | rustix | Medium | 6.5 | 2024-08-26 18:43:23 | Deep Dive |
| CVE-2024-30266 | Wasmtime vulnerable to panic when using a dropped extenref-typed element segment | bytecodealliance | wasmtime | Low | 3.3 | 2024-04-04 15:42:00 | Deep Dive |
| CVE-2023-41880 | Miscompilation of wasm `i64x2.shr_s` instruction with constant input on x86_64 | bytecodealliance | wasmtime | Low | 2.2 | 2023-09-15 19:43:42 | Deep Dive |
| CVE-2023-30624 | Wasmtime has Undefined Behavior in Rust runtime functions | bytecodealliance | wasmtime | Low | 3.9 | 2023-04-27 16:56:50 | Deep Dive |
| CVE-2023-26489 | Guest-controlled out-of-bounds read/write on x86_64 in wasmtime | bytecodealliance | wasmtime | Critical | 9.9 | 2023-03-08 19:59:57 | Deep Dive |
| CVE-2023-27477 | Wasmtime 安全漏洞 | bytecodealliance | wasmtime | Low | 3.1 | 2023-03-08 00:00:00 | Deep Dive |
| CVE-2022-39394 | wasmtime_trap_code C API function has out of bounds write vulnerability | bytecodealliance | wasmtime | Low | 3.8 | 2022-11-10 00:00:00 | Deep Dive |
| CVE-2022-39392 | Wasmtime vulnerable to out of bounds read/write with zero-memory-pages configuration | bytecodealliance | wasmtime | Medium | 5.9 | 2022-11-10 00:00:00 | Deep Dive |
| CVE-2022-39393 | Wasmtime vulnerable to data leakage between instances in the pooling allocator | bytecodealliance | wasmtime | High | 8.6 | 2022-11-10 00:00:00 | Deep Dive |
| CVE-2022-31169 | Cranelift vulnerable to miscompilation of constant values in division on AArch64 | bytecodealliance | wasmtime | Medium | 5.9 | 2022-07-21 13:50:11 | Deep Dive |
| CVE-2022-31146 | Use After Free in Wasmtime | bytecodealliance | wasmtime | Medium | 6.4 | 2022-07-20 22:30:16 | Deep Dive |