Browse all 8 CVE security advisories affecting NASM. AI-powered Chinese analysis, POCs, and references for each vulnerability.
NASM is an x86 assembler widely used for programming, reverse engineering, and malware development. Historically, it has been associated with vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, with 8 CVEs documented. Security researchers have identified risks in its error handling and input validation processes. While no major public security incidents have been widely reported, the tool's use in both legitimate security research and malicious activities makes it a potential attack vector. Its low-level nature and direct hardware interaction capabilities increase the potential for memory corruption flaws if not properly implemented.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-8846 | NASM Netwide Assember parser.c parse_line stack-based overflow — Netwide AssemberCWE-121 | 5.3 | Medium | 2025-08-11 |
| CVE-2025-8845 | NASM Netwide Assember nasm.c assemble_file stack-based overflow — Netwide AssemberCWE-121 | 5.3 | Medium | 2025-08-11 |
| CVE-2025-8844 | NASM Netwide Assember preproc.c parse_smacro_template null pointer dereference — Netwide AssemberCWE-476 | 3.3 | Low | 2025-08-11 |
| CVE-2025-8843 | NASM Netwide Assember outmacho.c macho_no_dead_strip heap-based overflow — Netwide AssemberCWE-122 | 5.3 | Medium | 2025-08-11 |
| CVE-2025-8842 | NASM Netwide Assember preproc.c do_directive use after free — Netwide AssemberCWE-416 | 5.3 | Medium | 2025-08-11 |
This page lists every published CVE security advisory associated with NASM. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.