-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| freewvs | pip | >= 0, < 0.1.1 | 0.1.1 |
The vulnerability stems from the unconstrained file.read() call in the main processing loop of the freewvs script. The commit diff shows the line 'filestr = file.read()' was replaced with a size-limited read ('file.read(200000)'), directly addressing resource exhaustion. This code is part of the file scanning logic in the top-level loop (not a named function), where reading large files without limits could crash the process. The CWE-770 classification confirms this is a resource allocation flaw. High confidence is justified because the patch explicitly targets this code location.