Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-3103 | Wasmer is a WebAssembly runtime that enables containers to run anywhere: from Desktop to the Cloud, Edge and even the browser. Wasm programs can access the filesystem outside of the sandbox. Service providers running untrusted Wasm code on Wasmer can unexpectedly expose the host filesystem. This vulnerability has been patched in version 4.2.4. |
Github GHSA |
GHSA-4mq4-7rw3-vm5j | Wasmer filesystem sandbox not enforced |
Thu, 17 Apr 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-17T20:29:41.019Z
Reserved: 2023-12-21T14:14:26.224Z
Link: CVE-2023-51661
Updated: 2024-08-02T22:40:34.147Z
Status : Modified
Published: 2023-12-22T15:15:08.377
Modified: 2024-11-21T08:38:33.190
Link: CVE-2023-51661
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA