Filtered by vendor Jerryscript
Subscribe
Search
Total
14 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-2023-38961 | 1 Jerryscript | 1 Jerryscript | 2023-08-24 | N/A | 9.8 CRITICAL |
| Buffer Overflwo vulnerability in JerryScript Project jerryscript v.3.0.0 allows a remote attacker to execute arbitrary code via the scanner_is_context_needed component in js-scanner-until.c. | |||||
| CVE-2021-41752 | 1 Jerryscript | 1 Jerryscript | 2023-08-08 | 7.5 HIGH | 9.8 CRITICAL |
| Stack overflow vulnerability in Jerryscript before commit e1ce7dd7271288be8c0c8136eea9107df73a8ce2 on Oct 20, 2021 due to an unbounded recursive call to the new opt() function. | |||||
| CVE-2021-43453 | 1 Jerryscript | 1 Jerryscript | 2023-08-08 | 7.5 HIGH | 9.8 CRITICAL |
| A Heap-based Buffer Overflow vulnerability exists in JerryScript 2.4.0 and prior versions via an out-of-bounds read in parser_parse_for_statement_start in the js-parser-statm.c file. This issue is similar to CVE-2020-29657. | |||||
| CVE-2021-42863 | 1 Jerryscript | 1 Jerryscript | 2022-05-23 | 7.5 HIGH | 9.8 CRITICAL |
| A buffer overflow in ecma_builtin_typedarray_prototype_filter() in JerryScript version fe3a5c0 allows an attacker to construct a fake object or a fake arraybuffer with unlimited size. | |||||
| CVE-2019-1010176 | 1 Jerryscript | 1 Jerryscript | 2021-07-21 | 7.5 HIGH | 9.8 CRITICAL |
| JerryScript commit 4e58ccf68070671e1fff5cd6673f0c1d5b80b166 is affected by: Buffer Overflow. The impact is: denial of service and possibly arbitrary code execution. The component is: function lit_char_to_utf8_bytes (jerry-core/lit/lit-char-helpers.c:377). The attack vector is: executing crafted javascript code. The fixed version is: after commit 505dace719aebb3308a3af223cfaa985159efae0. | |||||
| CVE-2020-23323 | 1 Jerryscript | 1 Jerryscript | 2021-06-16 | 7.5 HIGH | 9.8 CRITICAL |
| There is a heap-buffer-overflow at re-parser.c in re_parse_char_escape in JerryScript 2.2.0. | |||||
| CVE-2020-23321 | 1 Jerryscript | 1 Jerryscript | 2021-06-16 | 7.5 HIGH | 9.8 CRITICAL |
| There is a heap-buffer-overflow at lit-strings.c:431 in lit_read_code_unit_from_utf8 in JerryScript 2.2.0. | |||||
| CVE-2020-23306 | 1 Jerryscript | 1 Jerryscript | 2021-06-16 | 7.5 HIGH | 9.8 CRITICAL |
| There is a stack-overflow at ecma-regexp-object.c:535 in ecma_regexp_match in JerryScript 2.2.0. | |||||
| CVE-2020-23303 | 1 Jerryscript | 1 Jerryscript | 2021-06-16 | 7.5 HIGH | 9.8 CRITICAL |
| There is a heap-buffer-overflow at jmem-poolman.c:165 in jmem_pools_collect_empty in JerryScript 2.2.0. | |||||
| CVE-2020-23302 | 1 Jerryscript | 1 Jerryscript | 2021-06-15 | 7.5 HIGH | 9.8 CRITICAL |
| There is a heap-use-after-free at ecma-helpers-string.c:772 in ecma_ref_ecma_string in JerryScript 2.2.0 | |||||
| CVE-2020-29657 | 1 Jerryscript | 1 Jerryscript | 2020-12-10 | 6.4 MEDIUM | 9.1 CRITICAL |
| In JerryScript 2.3.0, there is an out-of-bounds read in main_print_unhandled_exception in the main-utils.c file. | |||||
| CVE-2017-18212 | 1 Jerryscript | 1 Jerryscript | 2019-10-03 | 7.5 HIGH | 9.8 CRITICAL |
| An issue was discovered in JerryScript 1.0. There is a heap-based buffer over-read in the lit_read_code_unit_from_hex function in lit/lit-char-helpers.c via a RegExp("[\x0"); payload. | |||||
| CVE-2018-11419 | 1 Jerryscript | 1 Jerryscript | 2019-10-03 | 7.5 HIGH | 9.8 CRITICAL |
| An issue was discovered in JerryScript 1.0. There is a heap-based buffer over-read in the lit_read_code_unit_from_hex function via a RegExp("[\\u0") payload, related to re_parse_char_class in parser/regexp/re-parser.c. | |||||
| CVE-2018-11418 | 1 Jerryscript | 1 Jerryscript | 2019-10-03 | 7.5 HIGH | 9.8 CRITICAL |
| An issue was discovered in JerryScript 1.0. There is a heap-based buffer over-read in the lit_read_code_unit_from_utf8 function via a RegExp("[\\u0020") payload, related to re_parse_char_class in parser/regexp/re-parser.c. | |||||
