Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
jerryscript vulnerabilities and exploits
(subscribe to this query)
5.5
CVSSv3
CVE-2021-46347
There is an Assertion 'ecma_object_check_class_name_is_object (obj_p)' failed at /jerry-core/ecma/operations/ecma-objects.c in JerryScript 3.0.0.
Jerryscript Jerryscript 3.0.0
5.5
CVSSv3
CVE-2021-46348
There is an Assertion 'ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p)' failed at /jerry-core/ecma/base/ecma-literal-storage.c in JerryScript 3.0.0.
Jerryscript Jerryscript 3.0.0
5.5
CVSSv3
CVE-2021-46350
There is an Assertion 'ecma_is_value_object (value)' failed at jerryscript/jerry-core/ecma/base/ecma-helpers-value.c in JerryScript 3.0.0.
Jerryscript Jerryscript 3.0.0
9.1
CVSSv3
CVE-2020-29657
In JerryScript 2.3.0, there is an out-of-bounds read in main_print_unhandled_exception in the main-utils.c file.
Jerryscript Jerryscript 2.3.0
7.5
CVSSv3
CVE-2023-34867
Jerryscript 3.0 (commit 05dbbd1) exists to contain an Assertion Failure via the ecma_property_hashmap_create at jerry-core/ecma/base/ecma-property-hashmap.c.
Jerryscript Jerryscript 3.0.0
7.5
CVSSv3
CVE-2023-34868
Jerryscript 3.0 (commit 05dbbd1) exists to contain an Assertion Failure via the parser_parse_for_statement_start at jerry-core/parser/js/js-parser-statm.c.
Jerryscript Jerryscript 3.0.0
9.8
CVSSv3
CVE-2018-11419
An issue exists in JerryScript 1.0. There is a heap-based buffer over-read in the lit_read_code_unit_from_hex function via a RegExp("[\\u0") payload, related to re_parse_char_class in parser/regexp/re-parser.c.
Jerryscript Jerryscript 1.0
7.5
CVSSv3
CVE-2020-14163
An issue exists in ecma/operations/ecma-container-object.c in JerryScript 2.2.0. Operations with key/value pairs did not consider the case where garbage collection is triggered after the key operation but before the value operation, as demonstrated by improper read access to memo...
Jerryscript Jerryscript 2.2.0
7.8
CVSSv3
CVE-2022-32117
Jerryscript v2.4.0 exists to contain a stack buffer overflow via the function jerryx_print_unhandled_exception in /util/print.c.
Jerryscript Jerryscript 2.4.0
7.5
CVSSv3
CVE-2020-23320
There is an Assertion in 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' in parser_parse_function_arguments in JerryScript 2.2.0.
Jerryscript Jerryscript 2.2.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »