Register Login
  • SaaS Solutions
    • Vulnerability Intelligence
    • Vulnerability Management
  • Pricing
  • Vulnerabilities
  • Reports
  • Blog
  • Contact Us
  1. Main
  2. Vulnerability Database
  3. Bytecode Alliance
  4. Wasmtime
  5. 0.20.0

Known Vulnerabilities in Wasmtime 0.20.0

Show more ↓
28.0.0
27.0.0
26.0.1
26.0.0
25.0.3
25.0.2
25.0.1
25.0.0
24.0.2
24.0.1
24.0.0
23.0.3
23.0.2
23.0.1
23.0.0
22.0.1
22.0.0
21.0.2
21.0.1
21.0.0
20.0.2
20.0.1
20.0.0
19.0.2
19.0.1
19.0.0
18.0.4
18.0.3
18.0.2
18.0.1
18.0.0
17.0.3
17.0.2
17.0.1
17.0.0
16.0.0
15.0.1
15.0.0
14.0.4
14.0.3
14.0.2
14.0.1
14.0.0
13.0.1
13.0.0
12.0.2
12.0.1
12.0.0
11.0.2
11.0.1
11.0.0
10.0.2
10.0.1
10.0.0
9.0.4
9.0.3
9.0.2
9.0.1
9.0.0
8.0.1
8.0.0
7.0.1
7.0.0
6.0.2
6.0.1
6.0.0
5.0.1
5.0.0
4.0.1
4.0.0
3.0.1
3.0.0
2.0.2
2.0.1
2.0.0
1.0.2
1.0.1
1.0.0
0.40.1
0.40.0
0.39.1
0.39.0
0.38.3
0.38.2
0.38.1
0.38.0
0.37.0
0.36.0
0.35.3
0.35.2
0.35.1
0.35.0
0.34.2
0.34.1
0.34.0
0.33.1
0.33.0
0.32.1
0.32.0
0.31.0
0.30.0
0.29.0
0.28.0
0.27.0
0.26.1
0.26.0
0.25.0
0.24.0
0.23.0
0.22.1
0.22.0
0.21.0
0.20.0
0.19.0
0.18.0
0.17.0
0.16.0
0.15.0
0.12.0
0.11.0
0.10.0
0.9.0
0.8.0
0.6.0
0.4.0
0.3.0
0.2.0



Multiple vulnerabilities in Bytecode Alliance Wasmtime20 Mar, 2023
Medium Patched Public exploit
Multiple vulnerabilities in Bytecode Alliance Wasmtime18 Feb, 2022
Low Patched


Stay Connected

  • Twitter
  • Facebook
  • Linkedin
  • Official YouTube channel of Cybersecurity Help s.r.o.
  • RSS
Security Services
  • Actionable & Personalized Vulnerability Intelligence
  • On-Demand Security Consulting
  • Pricing
IT-Consulting
  • IT Infrastructure Outsourcing Services
  • Web Applications Support & Deployment
  • On-Demand Consulting
Partner Links
  • SSL/TLS Security Test by ImmuniWeb
  • Web Server Security Test by ImmuniWeb
Blog
  • Cyber Security Week in Review: May 23, 2025
  • Russian GRU hackers accused of massive espionage campaign across NATO and allied nations
  • Chinese-speaking threat actors exploit Cityworks zero-day to hack into US govt agencies
  • Infamous Lumma stealer malware disrupted in global takedown
  • Hazy Hawk hijacks abandoned cloud resources of global orgs to spread scams and malware
  • Read all articles →
Contacts | Terms of use | Privacy Policy

© 2025 Cybersecurity Help s.r.o.