### [CVE-2018-17293](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17293) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description An issue was discovered in WAVM before 2018-09-16. The run function in Programs/wavm/wavm.cpp does not check whether there is Emscripten memory to store the command-line arguments passed by the input WebAssembly file's main function, which allows attackers to cause a denial of service (application crash by NULL pointer dereference) or possibly have unspecified other impact by crafting certain WebAssembly files. ### POC #### Reference - https://github.com/WAVM/WAVM/issues/110#issuecomment-421764693 - https://github.com/WAVM/WAVM/issues/110#issuecomment-421764693 #### Github No PoCs found on GitHub currently.