### [CVE-2019-7701](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7701) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description A heap-based buffer over-read was discovered in wasm::SExpressionParser::skipWhitespace() in wasm-s-parser.cpp in Binaryen 1.38.22. A crafted wasm input can cause a segmentation fault, leading to denial-of-service, as demonstrated by wasm2js. ### POC #### Reference - https://github.com/WebAssembly/binaryen/issues/1863 #### Github No PoCs found on GitHub currently.