Filtered by vendor Jerryscript
Subscriptions
Total
96 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2021-46346 | 1 Jerryscript | 1 Jerryscript | 2024-11-21 | 5.5 Medium |
There is an Assertion 'local_tza == ecma_date_local_time_zone_adjustment (date_value)' failed at /jerry-core/ecma/builtin-objects/ecma-builtin-date-prototype.c(ecma_builtin_date_prototype_dispatch_set):421 in JerryScript 3.0.0. | ||||
CVE-2021-46345 | 1 Jerryscript | 1 Jerryscript | 2024-11-21 | 5.5 Medium |
There is an Assertion 'cesu8_cursor_p == cesu8_end_p' failed at /jerry-core/lit/lit-strings.c in JerryScript 3.0.0. | ||||
CVE-2021-46344 | 1 Jerryscript | 1 Jerryscript | 2024-11-21 | 5.5 Medium |
There is an Assertion 'flags & PARSER_PATTERN_HAS_REST_ELEMENT' failed at /jerry-core/parser/js/js-parser-expr.c in JerryScript 3.0.0. | ||||
CVE-2021-46343 | 1 Jerryscript | 1 Jerryscript | 2024-11-21 | 5.5 Medium |
There is an Assertion 'context_p->token.type == LEXER_LITERAL' failed at /jerry-core/parser/js/js-parser-expr.c in JerryScript 3.0.0. | ||||
CVE-2021-46342 | 1 Jerryscript | 1 Jerryscript | 2024-11-21 | 5.5 Medium |
There is an Assertion 'ecma_is_lexical_environment (obj_p) || !ecma_op_object_is_fast_array (obj_p)' failed at /jerry-core/ecma/base/ecma-helpers.c in JerryScript 3.0.0. | ||||
CVE-2021-46340 | 1 Jerryscript | 1 Jerryscript | 2024-11-21 | 5.5 Medium |
There is an Assertion 'context_p->stack_top_uint8 == SCAN_STACK_TRY_STATEMENT || context_p->stack_top_uint8 == SCAN_STACK_CATCH_STATEMENT' failed at /parser/js/js-scanner.c(scanner_scan_statement_end) in JerryScript 3.0.0. | ||||
CVE-2021-46339 | 1 Jerryscript | 1 Jerryscript | 2024-11-21 | 5.5 Medium |
There is an Assertion 'lit_is_valid_cesu8_string (string_p, string_size)' failed at /base/ecma-helpers-string.c(ecma_new_ecma_string_from_utf8) in JerryScript 3.0.0. | ||||
CVE-2021-46338 | 1 Jerryscript | 1 Jerryscript | 2024-11-21 | 5.5 Medium |
There is an Assertion 'ecma_is_lexical_environment (object_p)' failed at /base/ecma-helpers.c(ecma_get_lex_env_type) in JerryScript 3.0.0. | ||||
CVE-2021-46337 | 1 Jerryscript | 1 Jerryscript | 2024-11-21 | 5.5 Medium |
There is an Assertion 'page_p != NULL' failed at /parser/js/js-parser-mem.c(parser_list_get) in JerryScript 3.0.0. | ||||
CVE-2021-46336 | 1 Jerryscript | 1 Jerryscript | 2024-11-21 | 5.5 Medium |
There is an Assertion 'opts & PARSER_CLASS_LITERAL_CTOR_PRESENT' failed at /parser/js/js-parser-expr.c(parser_parse_class_body) in JerryScript 3.0.0. | ||||
CVE-2021-46170 | 1 Jerryscript | 1 Jerryscript | 2024-11-21 | 7.5 High |
An issue was discovered in JerryScript commit a6ab5e9. There is an Use-After-Free in lexer_compare_identifier_to_string in js-lexer.c file. | ||||
CVE-2021-44994 | 1 Jerryscript | 1 Jerryscript | 2024-11-21 | 5.5 Medium |
There is an Assertion ''JERRY_CONTEXT (jmem_heap_allocated_size) == 0'' failed at /jerry-core/jmem/jmem-heap.c in Jerryscript 3.0.0. | ||||
CVE-2021-44993 | 1 Jerryscript | 1 Jerryscript | 2024-11-21 | 5.5 Medium |
There is an Assertion ''ecma_is_value_boolean (base_value)'' failed at /jerry-core/ecma/operations/ecma-get-put-value.c in Jerryscript 3.0.0. | ||||
CVE-2021-44992 | 1 Jerryscript | 1 Jerryscript | 2024-11-21 | 5.5 Medium |
There is an Assertion ''ecma_object_is_typedarray (obj_p)'' failed at /jerry-core/ecma/operations/ecma-typedarray-object.c in Jerryscript 3.0.0. | ||||
CVE-2021-44988 | 1 Jerryscript | 1 Jerryscript | 2024-11-21 | 7.8 High |
Jerryscript v3.0.0 and below was discovered to contain a stack overflow via ecma_find_named_property in ecma-helpers.c. | ||||
CVE-2021-43453 | 1 Jerryscript | 1 Jerryscript | 2024-11-21 | 9.8 Critical |
A Heap-based Buffer Overflow vulnerability exists in JerryScript 2.4.0 and prior versions via an out-of-bounds read in parser_parse_for_statement_start in the js-parser-statm.c file. This issue is similar to CVE-2020-29657. | ||||
CVE-2021-42863 | 1 Jerryscript | 1 Jerryscript | 2024-11-21 | 9.8 Critical |
A buffer overflow in ecma_builtin_typedarray_prototype_filter() in JerryScript version fe3a5c0 allows an attacker to construct a fake object or a fake arraybuffer with unlimited size. | ||||
CVE-2021-41959 | 1 Jerryscript | 1 Jerryscript | 2024-11-21 | 7.5 High |
JerryScript Git version 14ff5bf does not sufficiently track and release allocated memory via jerry-core/ecma/operations/ecma-regexp-object.c after RegExp, which causes a memory leak. | ||||
CVE-2021-41752 | 1 Jerryscript | 1 Jerryscript | 2024-11-21 | 9.8 Critical |
Stack overflow vulnerability in Jerryscript before commit e1ce7dd7271288be8c0c8136eea9107df73a8ce2 on Oct 20, 2021 due to an unbounded recursive call to the new opt() function. | ||||
CVE-2021-41751 | 1 Jerryscript | 1 Jerryscript | 2024-11-21 | 9.8 Critical |
Buffer overflow vulnerability in file ecma-builtin-array-prototype.c:909 in function ecma_builtin_array_prototype_object_slice in Jerryscript before commit e1ce7dd7271288be8c0c8136eea9107df73a8ce2 on Oct 20, 2021. |