{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T15:24:21.229","vulnerabilities":[{"cve":{"id":"CVE-2024-28123","sourceIdentifier":"security-advisories@github.com","published":"2024-03-21T02:52:23.827","lastModified":"2025-06-02T14:06:34.380","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Wasmi is an efficient and lightweight WebAssembly interpreter with a focus on constrained and embedded systems. In the WASMI Interpreter, an Out-of-bounds Buffer Write will arise if the host calls or resumes a Wasm function with more parameters than the default limit (128), as it will surpass the stack value. This doesn’t affect calls from Wasm to Wasm, only from host to Wasm. This vulnerability was patched in version 0.31.1.\n"},{"lang":"es","value":"Wasmi es un intérprete de WebAssembly eficiente y liviano centrado en sistemas integrados y restringidos. En el intérprete WASMI, surgirá una escritura de búfer fuera de los límites si el host llama o reanuda una función Wasm con más parámetros que el límite predeterminado (128), ya que superará el valor de la pila. Esto no afecta las llamadas de Wasm a Wasm, solo del host a Wasm. Esta vulnerabilidad fue parcheada en la versión 0.31.1."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseScore":7.3,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":3.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-787"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:wasmi-labs:wasmi:*:*:*:*:*:rust:*:*","versionStartIncluding":"0.15.0","versionEndExcluding":"0.31.1","matchCriteriaId":"DAB41919-ADBF-4CC4-B289-F15B7F68460C"}]}]}],"references":[{"url":"https://github.com/wasmi-labs/wasmi/commit/f7b3200e9f3dc9e2cbca966cb255c228453c792f","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/wasmi-labs/wasmi/releases/tag/v0.31.1","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/wasmi-labs/wasmi/security/advisories/GHSA-75jp-vq8x-h4cq","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/wasmi-labs/wasmi/commit/f7b3200e9f3dc9e2cbca966cb255c228453c792f","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/wasmi-labs/wasmi/releases/tag/v0.31.1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes"]},{"url":"https://github.com/wasmi-labs/wasmi/security/advisories/GHSA-75jp-vq8x-h4cq","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}