Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
jerryscript jerryscript 2.2.0 vulnerabilities and exploits
(subscribe to this query)
446
VMScore
CVE-2020-13622
JerryScript 2.2.0 allows malicious users to cause a denial of service (assertion failure) because a property key query for a Proxy object returns unintended data.
Jerryscript Jerryscript 2.2.0
446
VMScore
CVE-2020-13623
JerryScript 2.2.0 allows malicious users to cause a denial of service (stack consumption) via a proxy operation.
Jerryscript Jerryscript 2.2.0
446
VMScore
CVE-2020-13649
parser/js/js-scanner.c in JerryScript 2.2.0 mishandles errors during certain out-of-memory conditions, as demonstrated by a scanner_reverse_info_list NULL pointer dereference and a scanner_scan_all assertion failure.
Jerryscript Jerryscript 2.2.0
668
VMScore
CVE-2020-23302
There is a heap-use-after-free at ecma-helpers-string.c:772 in ecma_ref_ecma_string in JerryScript 2.2.0
Jerryscript Jerryscript 2.2.0
668
VMScore
CVE-2020-23303
There is a heap-buffer-overflow at jmem-poolman.c:165 in jmem_pools_collect_empty in JerryScript 2.2.0.
Jerryscript Jerryscript 2.2.0
668
VMScore
CVE-2020-23306
There is a stack-overflow at ecma-regexp-object.c:535 in ecma_regexp_match in JerryScript 2.2.0.
Jerryscript Jerryscript 2.2.0
445
VMScore
CVE-2020-23308
There is an Assertion 'context_p->stack_top_uint8 == LEXER_EXPRESSION_START' at js-parser-expr.c:3565 in parser_parse_expression in JerryScript 2.2.0.
Jerryscript Jerryscript 2.2.0
445
VMScore
CVE-2020-23309
There is an Assertion 'context_p->stack_depth == context_p->context_stack_depth' failed at js-parser-statm.c:2756 in parser_parse_statements in JerryScript 2.2.0.
Jerryscript Jerryscript 2.2.0
445
VMScore
CVE-2020-23310
There is an Assertion 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' failed at js-parser-statm.c:733 in parser_parse_function_statement in JerryScript 2.2.0.
Jerryscript Jerryscript 2.2.0
445
VMScore
CVE-2020-23311
There is an Assertion 'context_p->token.type == LEXER_RIGHT_BRACE || context_p->token.type == LEXER_ASSIGN || context_p->token.type == LEXER_COMMA' failed at js-parser-expr.c:3230 in parser_parse_object_initializer in JerryScript 2.2.0.
Jerryscript Jerryscript 2.2.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23316
SQL injection
type confusion
CVE-2024-20697
CVE-2024-4344
local
CVE-2024-30043
CVE-2024-3821
CVE-2024-5041
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »