### [CVE-2021-38297](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38297) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Go before 1.16.9 and 1.17.x before 1.17.2 has a Buffer Overflow via large arguments in a function invocation from a WASM module, when GOARCH=wasm GOOS=js is used. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/gkrishnan724/CVE-2021-38297 - https://github.com/henriquebesing/container-security - https://github.com/kb5fls/container-security - https://github.com/paras98/CVE-2021-38297-Go-wasm-Replication - https://github.com/ruzickap/malware-cryptominer-container - https://github.com/shubhamkulkarni97/CVE-Presentations