cve_id stringlengths 13 16 | cve_published stringlengths 23 23 | cve_descriptions stringlengths 54 1.07k | cve_metrics dict | cve_references listlengths 1 34 | cve_configurations listlengths 1 5 | url stringlengths 39 77 | cve_tags listlengths 1 4 ⌀ | domain stringclasses 1
value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 3 88.6k ⌀ | issue_title stringlengths 3 335 | issue_comments_url stringlengths 58 81 | issue_comments_count int64 0 146 | issue_created_at stringlengths 20 20 | issue_updated_at stringlengths 20 20 | issue_html_url stringlengths 39 62 | issue_github_id int64 128M 2.09B | issue_number int64 1 122k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2021-40573 | 2022-01-13T19:15:08.267 | The binary MP4Box in Gpac 1.0.1 has a double-free vulnerability in the gf_list_del function in list.c, which allows attackers to cause a denial of service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/commit/b03c9f252526bb42fbd1b87b9f5e339c3cf2390a"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1891 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | - [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ..... | System abort caused by double free using mp4box, gf_list_del, list.c:614 | https://api.github.com/repos/gpac/gpac/issues/1891/comments | 1 | 2021-08-25T06:44:03Z | 2021-08-30T15:35:16Z | https://github.com/gpac/gpac/issues/1891 | 978,778,065 | 1,891 |
CVE-2021-40574 | 2022-01-13T19:15:08.317 | The binary MP4Box in Gpac 1.0.1 has a double-free vulnerability in the gf_text_get_utf8_line function in load_text.c, which allows attackers to cause a denial of service, even code execution and escalation of privileges. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/commit/30ac5e5236b790accd1f25347eebf2dc8c6c1bcb"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1897 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | - [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ..... | System abort (Core dumped) caused by buffer overflow using MP4Box in gf_text_get_utf8_line | https://api.github.com/repos/gpac/gpac/issues/1897/comments | 0 | 2021-08-26T11:19:33Z | 2021-08-30T15:33:45Z | https://github.com/gpac/gpac/issues/1897 | 980,128,523 | 1,897 |
CVE-2021-40575 | 2022-01-13T19:15:08.367 | The binary MP4Box in Gpac 1.0.1 has a null pointer dereference vulnerability in the mpgviddmx_process function in reframe_mpgvid.c, which allows attackers to cause a denial of service. This vulnerability is possibly due to an incomplete fix for CVE-2021-40566. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/commit/5f2c2a16d30229b6241f02fa28e3d6b810d64858"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1905 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | - [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ..... | Segmentation fault casued by null pointer dereference using mp4box in mpgviddmx_process, reframe_mpgvid.c:643 | https://api.github.com/repos/gpac/gpac/issues/1905/comments | 0 | 2021-09-01T06:02:21Z | 2021-09-01T12:04:16Z | https://github.com/gpac/gpac/issues/1905 | 984,701,234 | 1,905 |
CVE-2021-40576 | 2022-01-13T19:15:08.407 | The binary MP4Box in Gpac 1.0.1 has a null pointer dereference vulnerability in the gf_isom_get_payt_count function in hint_track.c, which allows attackers to cause a denial of service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/commit/ad18ece95fa064efc0995c4ab2c985f77fb166ec"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1904 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | - [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ..... | Segmentation fault caused by null pointer dereference using mp4box in gf_isom_get_payt_count, hint_track.c:990 | https://api.github.com/repos/gpac/gpac/issues/1904/comments | 0 | 2021-08-31T12:13:57Z | 2021-09-01T12:04:15Z | https://github.com/gpac/gpac/issues/1904 | 983,792,109 | 1,904 |
CVE-2021-45760 | 2022-01-14T00:15:07.767 | GPAC v1.1.0 was discovered to contain an invalid memory address dereference via the function gf_list_last(). This vulnerability allows attackers to cause a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1966"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1966 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough info... | Invalid memory address dereference in dump_od_to_saf.isra() | https://api.github.com/repos/gpac/gpac/issues/1966/comments | 0 | 2021-12-10T11:00:37Z | 2021-12-13T13:22:06Z | https://github.com/gpac/gpac/issues/1966 | 1,076,720,063 | 1,966 |
CVE-2021-45762 | 2022-01-14T19:15:08.027 | GPAC v1.1.0 was discovered to contain an invalid memory address dereference via the function gf_sg_vrml_mf_reset(). This vulnerability allows attackers to cause a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1978"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1978 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough info... | Invalid memory address dereference in gf_sg_vrml_mf_reset() | https://api.github.com/repos/gpac/gpac/issues/1978/comments | 0 | 2021-12-11T09:10:17Z | 2021-12-13T13:22:09Z | https://github.com/gpac/gpac/issues/1978 | 1,077,478,008 | 1,978 |
CVE-2021-45763 | 2022-01-14T19:15:08.077 | GPAC v1.1.0 was discovered to contain an invalid call in the function gf_node_changed(). This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1974"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1974 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough info... | Invalid call in gf_node_changed() | https://api.github.com/repos/gpac/gpac/issues/1974/comments | 0 | 2021-12-11T01:02:59Z | 2021-12-13T13:22:08Z | https://github.com/gpac/gpac/issues/1974 | 1,077,342,284 | 1,974 |
CVE-2021-45764 | 2022-01-14T20:15:14.977 | GPAC v1.1.0 was discovered to contain an invalid memory address dereference via the function shift_chunk_offsets.isra(). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1971"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1971 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough info... | Invalid memory address dereference in shift_chunk_offsets.isra() | https://api.github.com/repos/gpac/gpac/issues/1971/comments | 0 | 2021-12-10T15:59:06Z | 2021-12-13T13:22:07Z | https://github.com/gpac/gpac/issues/1971 | 1,076,993,672 | 1,971 |
CVE-2021-45767 | 2022-01-14T20:15:15.020 | GPAC 1.1.0 was discovered to contain an invalid memory address dereference via the function lsr_read_id(). This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1982"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://www.debian.org/security/2023/dsa-5411"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": ... | https://github.com/gpac/gpac/issues/1982 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough info... | Invalid memory address dereference in lsr_read_id() | https://api.github.com/repos/gpac/gpac/issues/1982/comments | 0 | 2021-12-14T02:23:22Z | 2021-12-14T10:36:53Z | https://github.com/gpac/gpac/issues/1982 | 1,079,233,614 | 1,982 |
CVE-2021-46170 | 2022-01-14T21:15:08.540 | An issue was discovered in JerryScript commit a6ab5e9. There is an Use-After-Free in lexer_compare_identifier_to_string in js-lexer.c file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4917"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:2.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BCC6C843-EE98-4852-8D03-7FC19D2E821C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4917 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
a6ab5e9
###### Build platform
Ubuntu 20.04.3 LTS (Linux 5.11.0-43-generic x86_64)
###### Build steps
```sh
./tools/build.py --clean --compile-flag=-fsanitize=address --lto=off --error-message=on --profile=es2015-subset --stack-limit=15 --debug --logging=on --line-info=on
```
####... | Use After Free at jerry-core/parser/js/js-lexer.c:3503 in lexer_compare_identifier_to_string | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4917/comments | 2 | 2022-01-03T03:39:39Z | 2022-01-04T10:38:46Z | https://github.com/jerryscript-project/jerryscript/issues/4917 | 1,092,198,721 | 4,917 |
CVE-2021-46336 | 2022-01-20T22:15:08.597 | There is an Assertion 'opts & PARSER_CLASS_LITERAL_CTOR_PRESENT' failed at /parser/js/js-parser-expr.c(parser_parse_class_body) in JerryScript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4927"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4927 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [a6ab5e9](https://github.com/jerryscript-project/jerryscript/commit/a6ab5e9abed70cdedf9f4e9c1dc379eb762ebf64)
Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 4.19.128-microsoft-standard x86_64)
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
... | Assertion 'opts & PARSER_CLASS_LITERAL_CTOR_PRESENT' failed at jerryscript/jerry-core/parser/js/js-parser-expr.c(parser_parse_class_body):656. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4927/comments | 0 | 2022-01-04T06:06:49Z | 2022-01-14T09:16:23Z | https://github.com/jerryscript-project/jerryscript/issues/4927 | 1,093,040,080 | 4,927 |
CVE-2021-46337 | 2022-01-20T22:15:08.640 | There is an Assertion 'page_p != NULL' failed at /parser/js/js-parser-mem.c(parser_list_get) in JerryScript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4930"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4930 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [a6ab5e9](https://github.com/jerryscript-project/jerryscript/commit/a6ab5e9abed70cdedf9f4e9c1dc379eb762ebf64)
Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 4.19.128-microsoft-standard x86_64)
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
... | Assertion 'page_p != NULL' failed at jerryscript/jerry-core/parser/js/js-parser-mem.c(parser_list_get):279. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4930/comments | 0 | 2022-01-04T06:09:14Z | 2022-01-14T09:14:04Z | https://github.com/jerryscript-project/jerryscript/issues/4930 | 1,093,041,266 | 4,930 |
CVE-2021-46338 | 2022-01-20T22:15:08.687 | There is an Assertion 'ecma_is_lexical_environment (object_p)' failed at /base/ecma-helpers.c(ecma_get_lex_env_type) in JerryScript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4900"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4900 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [42523bd6](https://github.com/jerryscript-project/jerryscript/commit/42523bd6e2b114755498c9f68fd78545f9b33476)
Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
python ./tools/build.py --cl... | Assertion 'ecma_is_lexical_environment (object_p)' failed at ecma-helpers.c (ecma_get_lex_env_type). | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4900/comments | 1 | 2021-12-13T08:54:30Z | 2022-01-12T02:04:14Z | https://github.com/jerryscript-project/jerryscript/issues/4900 | 1,078,245,904 | 4,900 |
CVE-2021-46339 | 2022-01-20T22:15:08.730 | There is an Assertion 'lit_is_valid_cesu8_string (string_p, string_size)' failed at /base/ecma-helpers-string.c(ecma_new_ecma_string_from_utf8) in JerryScript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4935"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4935 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [a6ab5e9](https://github.com/jerryscript-project/jerryscript/commit/a6ab5e9abed70cdedf9f4e9c1dc379eb762ebf64)
Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 4.19.128-microsoft-standard x86_64)
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
... | Assertion 'lit_is_valid_cesu8_string (string_p, string_size)' failed at jerryscript/jerry-core/ecma/base/ecma-helpers-string.c(ecma_new_ecma_string_from_utf8):371. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4935/comments | 3 | 2022-01-04T06:17:32Z | 2022-01-14T04:30:57Z | https://github.com/jerryscript-project/jerryscript/issues/4935 | 1,093,045,783 | 4,935 |
CVE-2021-46340 | 2022-01-20T22:15:08.777 | There is an Assertion 'context_p->stack_top_uint8 == SCAN_STACK_TRY_STATEMENT || context_p->stack_top_uint8 == SCAN_STACK_CATCH_STATEMENT' failed at /parser/js/js-scanner.c(scanner_scan_statement_end) in JerryScript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4924"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4924 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [a6ab5e9](https://github.com/jerryscript-project/jerryscript/commit/a6ab5e9abed70cdedf9f4e9c1dc379eb762ebf64)
Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 4.19.128-microsoft-standard x86_64)
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
... | Assertion 'context_p->stack_top_uint8 == SCAN_STACK_TRY_STATEMENT || context_p->stack_top_uint8 == SCAN_STACK_CATCH_STATEMENT' failed at jerryscript/jerry-core/parser/js/js-scanner.c(scanner_scan_statement_end):2370. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4924/comments | 0 | 2022-01-04T06:04:22Z | 2022-01-14T04:33:28Z | https://github.com/jerryscript-project/jerryscript/issues/4924 | 1,093,038,878 | 4,924 |
CVE-2021-46342 | 2022-01-20T22:15:08.827 | There is an Assertion 'ecma_is_lexical_environment (obj_p) || !ecma_op_object_is_fast_array (obj_p)' failed at /jerry-core/ecma/base/ecma-helpers.c in JerryScript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4934"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4934 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [a6ab5e9](https://github.com/jerryscript-project/jerryscript/commit/a6ab5e9abed70cdedf9f4e9c1dc379eb762ebf64)
Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 4.19.128-microsoft-standard x86_64)
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
... | Assertion 'ecma_is_lexical_environment (obj_p) || !ecma_op_object_is_fast_array (obj_p)' failed at jerryscript/jerry-core/ecma/base/ecma-helpers.c(ecma_find_named_property):621. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4934/comments | 0 | 2022-01-04T06:13:59Z | 2022-01-14T09:13:03Z | https://github.com/jerryscript-project/jerryscript/issues/4934 | 1,093,043,755 | 4,934 |
CVE-2021-46343 | 2022-01-20T22:15:08.873 | There is an Assertion 'context_p->token.type == LEXER_LITERAL' failed at /jerry-core/parser/js/js-parser-expr.c in JerryScript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4921"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4921 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [a6ab5e9](https://github.com/jerryscript-project/jerryscript/commit/a6ab5e9abed70cdedf9f4e9c1dc379eb762ebf64)
Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 4.19.128-microsoft-standard x86_64)
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
... | Assertion 'context_p->token.type == LEXER_LITERAL' failed at jerryscript/jerry-core/parser/js/js-parser-expr.c(parser_check_duplicated_private_field):531. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4921/comments | 0 | 2022-01-04T06:02:03Z | 2022-01-18T12:22:46Z | https://github.com/jerryscript-project/jerryscript/issues/4921 | 1,093,037,753 | 4,921 |
CVE-2021-46344 | 2022-01-20T22:15:08.920 | There is an Assertion 'flags & PARSER_PATTERN_HAS_REST_ELEMENT' failed at /jerry-core/parser/js/js-parser-expr.c in JerryScript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4928"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4928 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [a6ab5e9](https://github.com/jerryscript-project/jerryscript/commit/a6ab5e9abed70cdedf9f4e9c1dc379eb762ebf64)
Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 4.19.128-microsoft-standard x86_64)
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
... | Assertion 'flags & PARSER_PATTERN_HAS_REST_ELEMENT' failed at jerryscript/jerry-core/parser/js/js-parser-expr.c(parser_parse_object_initializer):4119. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4928/comments | 0 | 2022-01-04T06:07:34Z | 2022-01-14T09:15:48Z | https://github.com/jerryscript-project/jerryscript/issues/4928 | 1,093,040,435 | 4,928 |
CVE-2021-46345 | 2022-01-20T22:15:08.970 | There is an Assertion 'cesu8_cursor_p == cesu8_end_p' failed at /jerry-core/lit/lit-strings.c in JerryScript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4920"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4920 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [a6ab5e9](https://github.com/jerryscript-project/jerryscript/commit/a6ab5e9abed70cdedf9f4e9c1dc379eb762ebf64)
Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 4.19.128-microsoft-standard x86_64)
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
... | Assertion 'cesu8_cursor_p == cesu8_end_p' failed at /jerryscript/jerry-core/lit/lit-strings.c(lit_convert_cesu8_string_to_utf8_string):868. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4920/comments | 0 | 2022-01-04T06:01:01Z | 2022-01-14T09:03:47Z | https://github.com/jerryscript-project/jerryscript/issues/4920 | 1,093,037,283 | 4,920 |
CVE-2021-46346 | 2022-01-20T22:15:09.013 | There is an Assertion 'local_tza == ecma_date_local_time_zone_adjustment (date_value)' failed at /jerry-core/ecma/builtin-objects/ecma-builtin-date-prototype.c(ecma_builtin_date_prototype_dispatch_set):421 in JerryScript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4939"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4939 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [a6ab5e9](https://github.com/jerryscript-project/jerryscript/commit/a6ab5e9abed70cdedf9f4e9c1dc379eb762ebf64)
Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 4.19.128-microsoft-standard x86_64)
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
... | Assertion 'local_tza == ecma_date_local_time_zone_adjustment (date_value)' failed at jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-date-prototype.c(ecma_builtin_date_prototype_dispatch_set):421. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4939/comments | 0 | 2022-01-04T06:20:47Z | 2022-01-14T04:30:08Z | https://github.com/jerryscript-project/jerryscript/issues/4939 | 1,093,047,468 | 4,939 |
CVE-2021-46347 | 2022-01-20T22:15:09.060 | There is an Assertion 'ecma_object_check_class_name_is_object (obj_p)' failed at /jerry-core/ecma/operations/ecma-objects.c in JerryScript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4938"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4938 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [a6ab5e9](https://github.com/jerryscript-project/jerryscript/commit/a6ab5e9abed70cdedf9f4e9c1dc379eb762ebf64)
Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 4.19.128-microsoft-standard x86_64)
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
... | Assertion 'ecma_object_check_class_name_is_object (obj_p)' failed at jerryscript/jerry-core/ecma/operations/ecma-objects.c(ecma_object_get_class_name):3015. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4938/comments | 0 | 2022-01-04T06:20:03Z | 2022-01-14T04:30:19Z | https://github.com/jerryscript-project/jerryscript/issues/4938 | 1,093,047,047 | 4,938 |
CVE-2021-46348 | 2022-01-20T22:15:09.110 | There is an Assertion 'ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p)' failed at /jerry-core/ecma/base/ecma-literal-storage.c in JerryScript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4941"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4941 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [a6ab5e9](https://github.com/jerryscript-project/jerryscript/commit/a6ab5e9abed70cdedf9f4e9c1dc379eb762ebf64)
Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 4.19.128-microsoft-standard x86_64)
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
... | Assertion 'ECMA_STRING_IS_REF_EQUALS_TO_ONE (string_p)' failed at jerryscript/jerry-core/ecma/base/ecma-literal-storage.c(ecma_free_string_list):77. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4941/comments | 0 | 2022-01-04T06:22:36Z | 2022-01-14T10:02:19Z | https://github.com/jerryscript-project/jerryscript/issues/4941 | 1,093,048,389 | 4,941 |
CVE-2021-46349 | 2022-01-20T22:15:09.157 | There is an Assertion 'type == ECMA_OBJECT_TYPE_GENERAL || type == ECMA_OBJECT_TYPE_PROXY' failed at /jerry-core/ecma/operations/ecma-objects.c in JerryScript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4937"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4937 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [a6ab5e9](https://github.com/jerryscript-project/jerryscript/commit/a6ab5e9abed70cdedf9f4e9c1dc379eb762ebf64)
Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 4.19.128-microsoft-standard x86_64)
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
... | Assertion 'type == ECMA_OBJECT_TYPE_GENERAL || type == ECMA_OBJECT_TYPE_PROXY' failed at jerryscript/jerry-core/ecma/operations/ecma-objects.c(ecma_object_get_class_name):3020. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4937/comments | 0 | 2022-01-04T06:19:15Z | 2022-01-14T04:30:33Z | https://github.com/jerryscript-project/jerryscript/issues/4937 | 1,093,046,641 | 4,937 |
CVE-2021-46350 | 2022-01-20T22:15:09.207 | There is an Assertion 'ecma_is_value_object (value)' failed at jerryscript/jerry-core/ecma/base/ecma-helpers-value.c in JerryScript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4936"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4936 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [a6ab5e9](https://github.com/jerryscript-project/jerryscript/commit/a6ab5e9abed70cdedf9f4e9c1dc379eb762ebf64)
Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 4.19.128-microsoft-standard x86_64)
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
... | Assertion 'ecma_is_value_object (value)' failed at jerryscript/jerry-core/ecma/base/ecma-helpers-value.c(ecma_get_object_from_value):838. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4936/comments | 0 | 2022-01-04T06:18:34Z | 2022-01-18T12:16:02Z | https://github.com/jerryscript-project/jerryscript/issues/4936 | 1,093,046,263 | 4,936 |
CVE-2021-46351 | 2022-01-20T22:15:09.250 | There is an Assertion 'local_tza == ecma_date_local_time_zone_adjustment (date_value)' failed at /jerry-core/ecma/builtin-objects/ecma-builtin-date-prototype.c(ecma_builtin_date_prototype_dispatch_set):421 in JerryScript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4940"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4940 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [a6ab5e9](https://github.com/jerryscript-project/jerryscript/commit/a6ab5e9abed70cdedf9f4e9c1dc379eb762ebf64)
Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 4.19.128-microsoft-standard x86_64)
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
... | Assertion 'local_tza == ecma_date_local_time_zone_adjustment (date_value)' failed at jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-date-prototype.c(ecma_builtin_date_prototype_dispatch_routine):689. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4940/comments | 0 | 2022-01-04T06:21:48Z | 2022-01-14T04:29:46Z | https://github.com/jerryscript-project/jerryscript/issues/4940 | 1,093,048,021 | 4,940 |
CVE-2022-22888 | 2022-01-20T23:15:07.860 | Jerryscript 3.0.0 was discovered to contain a stack overflow via ecma_op_object_find_own in /ecma/operations/ecma-objects.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4848"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4848 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
[4592143](https://github.com/jerryscript-project/jerryscript/commit/4592143400910769707477bc2282a6c6601c9a31)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 4.19.128-microsoft-standard x86_64)
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
./too... | Stack-overflow in ecma-objects (ecma_op_object_find_own) | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4848/comments | 1 | 2021-12-07T10:36:37Z | 2022-01-12T02:04:53Z | https://github.com/jerryscript-project/jerryscript/issues/4848 | 1,073,189,379 | 4,848 |
CVE-2022-22890 | 2022-01-20T23:15:07.920 | There is an Assertion 'arguments_type != SCANNER_ARGUMENTS_PRESENT && arguments_type != SCANNER_ARGUMENTS_PRESENT_NO_REG' failed at /jerry-core/parser/js/js-scanner-util.c in Jerryscript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4847"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4847 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
[4592143](https://github.com/jerryscript-project/jerryscript/commit/4592143400910769707477bc2282a6c6601c9a31)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 4.19.128-microsoft-standard x86_64)
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```
.... | Assertion 'arguments_type != SCANNER_ARGUMENTS_PRESENT && arguments_type != SCANNER_ARGUMENTS_PRESENT_NO_REG' in js-scanner-util (scanner_pop_literal_pool) | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4847/comments | 1 | 2021-12-07T08:52:59Z | 2022-01-12T02:04:34Z | https://github.com/jerryscript-project/jerryscript/issues/4847 | 1,073,083,583 | 4,847 |
CVE-2022-22891 | 2022-01-21T00:15:07.700 | Jerryscript 3.0.0 was discovered to contain a SEGV vulnerability via ecma_ref_object_inline in /jerry-core/ecma/base/ecma-gc.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4871"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4871 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27) Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
./tools/build.py --clean --debug ... | SEGV in ecma_ref_object_inline of ecma-gc.c | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4871/comments | 0 | 2021-12-09T07:38:01Z | 2022-01-12T02:05:15Z | https://github.com/jerryscript-project/jerryscript/issues/4871 | 1,075,248,187 | 4,871 |
CVE-2022-22892 | 2022-01-21T00:15:07.747 | There is an Assertion 'ecma_is_value_undefined (value) || ecma_is_value_null (value) || ecma_is_value_boolean (value) || ecma_is_value_number (value) || ecma_is_value_string (value) || ecma_is_value_bigint (value) || ecma_is_value_symbol (value) || ecma_is_value_object (value)' failed at jerry-core/ecma/base/ecma-helpe... | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4872"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4872 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27)
Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
./tools/build.py --clean --deb... | Assertion 'ecma_is_value_undefined (value) || ecma_is_value_null (value) || ecma_is_value_boolean (value) || ecma_is_value_number (value) || ecma_is_value_string (value) || ecma_is_value_bigint (value) || ecma_is_value_symbol (value) || ecma_is_value_object (value)' failed in ecma-helpers-value(ecma_check_value_type_i... | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4872/comments | 0 | 2021-12-09T07:41:05Z | 2022-01-12T02:05:47Z | https://github.com/jerryscript-project/jerryscript/issues/4872 | 1,075,250,208 | 4,872 |
CVE-2022-22893 | 2022-01-21T00:15:07.790 | Jerryscript 3.0.0 was discovered to contain a stack overflow via vm_loop.lto_priv.304 in /jerry-core/vm/vm.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4901"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4901 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [42523bd6](https://github.com/jerryscript-project/jerryscript/commit/42523bd6e2b114755498c9f68fd78545f9b33476)
Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
python ./tools/build.py --cle... | Stack-overflow in vm_loop.lto_priv.304 of vm.c | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4901/comments | 0 | 2021-12-13T09:33:54Z | 2022-01-12T02:03:50Z | https://github.com/jerryscript-project/jerryscript/issues/4901 | 1,078,286,757 | 4,901 |
CVE-2022-22894 | 2022-01-21T00:15:07.833 | Jerryscript 3.0.0 was discovered to contain a stack overflow via ecma_lcache_lookup in /jerry-core/ecma/base/ecma-lcache.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4890"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4890 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27)
Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
./tools/build.py --clean --deb... | Stack-overflow in ecma_lcache_lookup (ecma-lcache.c) | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4890/comments | 0 | 2021-12-09T14:27:01Z | 2022-01-12T02:08:57Z | https://github.com/jerryscript-project/jerryscript/issues/4890 | 1,075,634,585 | 4,890 |
CVE-2022-22895 | 2022-01-21T00:15:07.880 | Jerryscript 3.0.0 was discovered to contain a heap-buffer-overflow via ecma_utf8_string_to_number_by_radix in /jerry-core/ecma/base/ecma-helpers-conversion.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4850"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"T... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4850 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | JerryScript-DCO-1.0-Signed-off-by: Robert Fancsik robert.fancsik@h-lab.eu
| Fix buffer overflow in string radix conversion | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4850/comments | 0 | 2021-12-07T14:15:32Z | 2021-12-07T14:28:11Z | https://github.com/jerryscript-project/jerryscript/pull/4850 | 1,073,404,012 | 4,850 |
CVE-2022-22895 | 2022-01-21T00:15:07.880 | Jerryscript 3.0.0 was discovered to contain a heap-buffer-overflow via ecma_utf8_string_to_number_by_radix in /jerry-core/ecma/base/ecma-helpers-conversion.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4850"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"T... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4882 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27)
Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
./tools/build.py --clean --deb... | Heap-buffer-overflow in ecma_utf8_string_to_number_by_radix (ecma-helpers-conversion.c) | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4882/comments | 3 | 2021-12-09T13:20:38Z | 2022-01-12T02:08:24Z | https://github.com/jerryscript-project/jerryscript/issues/4882 | 1,075,566,600 | 4,882 |
CVE-2021-46234 | 2022-01-21T21:15:08.627 | A NULL pointer dereference vulnerability exists in GPAC v1.1.0 via the function gf_node_unregister () at scenegraph/base_scenegraph.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2023"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*",
"matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/gpac/gpac/issues/2023 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough info... | Null Pointer Dereference in gf_node_unregister () at scenegraph/base_scenegraph.c:682 | https://api.github.com/repos/gpac/gpac/issues/2023/comments | 0 | 2022-01-03T12:52:03Z | 2022-01-04T09:53:09Z | https://github.com/gpac/gpac/issues/2023 | 1,092,485,366 | 2,023 |
CVE-2021-46236 | 2022-01-21T21:15:08.667 | A NULL pointer dereference vulnerability exists in GPAC v1.1.0 via the function gf_sg_vrml_field_pointer_del () at scenegraph/vrml_tools.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2024"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*",
"matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/gpac/gpac/issues/2024 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough info... | Null Pointer Dereference in gf_sg_vrml_field_pointer_del () at scenegraph/vrml_tools.c:667 | https://api.github.com/repos/gpac/gpac/issues/2024/comments | 0 | 2022-01-03T12:56:20Z | 2022-01-04T10:19:41Z | https://github.com/gpac/gpac/issues/2024 | 1,092,488,021 | 2,024 |
CVE-2021-46237 | 2022-01-21T21:15:08.713 | An untrusted pointer dereference vulnerability exists in GPAC v1.1.0 via the function gf_node_unregister () at scenegraph/base_scenegraph.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2033"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*",
"matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/gpac/gpac/issues/2033 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough info... | Untrusted pointer dereference in gf_node_unregister () at scenegraph/base_scenegraph.c:710 | https://api.github.com/repos/gpac/gpac/issues/2033/comments | 0 | 2022-01-05T09:17:46Z | 2022-01-05T10:26:12Z | https://github.com/gpac/gpac/issues/2033 | 1,094,139,713 | 2,033 |
CVE-2021-46238 | 2022-01-21T21:15:08.753 | GPAC v1.1.0 was discovered to contain a stack overflow via the function gf_node_get_name () at scenegraph/base_scenegraph.c. This vulnerability can lead to a program crash, causing a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2027"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*",
"matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/gpac/gpac/issues/2027 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough info... | stack overflow in gf_node_get_name () at scenegraph/base_scenegraph.c:1293 | https://api.github.com/repos/gpac/gpac/issues/2027/comments | 0 | 2022-01-03T13:30:56Z | 2022-01-04T10:19:42Z | https://github.com/gpac/gpac/issues/2027 | 1,092,514,876 | 2,027 |
CVE-2021-46239 | 2022-01-21T21:15:08.797 | The binary MP4Box in GPAC v1.1.0 was discovered to contain an invalid free vulnerability via the function gf_free () at utils/alloc.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2026"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*",
"matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/gpac/gpac/issues/2026 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough info... | Invalid free in MP4Box | https://api.github.com/repos/gpac/gpac/issues/2026/comments | 0 | 2022-01-03T13:18:56Z | 2022-01-04T10:19:42Z | https://github.com/gpac/gpac/issues/2026 | 1,092,505,386 | 2,026 |
CVE-2021-46240 | 2022-01-21T21:15:08.840 | A NULL pointer dereference vulnerability exists in GPAC v1.1.0 via the function gf_dump_vrml_sffield () at scene_manager/scene_dump.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2028"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*",
"matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/gpac/gpac/issues/2028 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough info... | Null Pointer Dereference in gf_dump_vrml_sffield () at scene_manager/scene_dump.c:588 | https://api.github.com/repos/gpac/gpac/issues/2028/comments | 0 | 2022-01-03T13:46:36Z | 2022-01-04T10:19:42Z | https://github.com/gpac/gpac/issues/2028 | 1,092,526,001 | 2,028 |
CVE-2021-46311 | 2022-01-21T21:15:09.017 | A NULL pointer dereference vulnerability exists in GPAC v1.1.0 via the function gf_sg_destroy_routes () at scenegraph/vrml_route.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2038"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*",
"matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/gpac/gpac/issues/2038 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough info... | Null Pointer Dereference in gf_sg_destroy_routes()at scenegraph/vrml_route.c:126 | https://api.github.com/repos/gpac/gpac/issues/2038/comments | 0 | 2022-01-09T06:44:25Z | 2022-01-11T17:35:41Z | https://github.com/gpac/gpac/issues/2038 | 1,097,120,299 | 2,038 |
CVE-2021-46313 | 2022-01-21T21:15:09.060 | The binary MP4Box in GPAC v1.0.1 was discovered to contain a segmentation fault via the function __memmove_avx_unaligned_erms (). This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2039"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*",
"matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/gpac/gpac/issues/2039 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [x] I looked for a similar issue and couldn't find any.
- [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [x] I give enough info... | A segmentation fault in MP4Box | https://api.github.com/repos/gpac/gpac/issues/2039/comments | 0 | 2022-01-09T07:07:05Z | 2022-01-11T17:35:42Z | https://github.com/gpac/gpac/issues/2039 | 1,097,123,366 | 2,039 |
CVE-2021-44988 | 2022-01-25T01:15:07.640 | Jerryscript v3.0.0 and below was discovered to contain a stack overflow via ecma_find_named_property in ecma-helpers.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4890"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4891 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27)
Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 4.19.128-microsoft-standard x86_64)
###### Build steps
```bash
./tools/build.py --clea... | Stack-overflow in ecma_find_named_property (ecma-helpers.c) | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4891/comments | 1 | 2021-12-09T14:33:33Z | 2021-12-09T14:35:17Z | https://github.com/jerryscript-project/jerryscript/issues/4891 | 1,075,642,418 | 4,891 |
CVE-2021-44992 | 2022-01-25T01:15:07.690 | There is an Assertion ''ecma_object_is_typedarray (obj_p)'' failed at /jerry-core/ecma/operations/ecma-typedarray-object.c in Jerryscript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4875"
},
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "https://security.samsungmobil... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4875 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27) Version: v3.0.0
Commit: [8ba0d1b](https://github.com/jerryscript-project/jerryscript/commit/8ba0d1b6ee5a065a42f3b306771ad8e3c0d819bc) Version: v2.4.0
###### B... | Assertion 'ecma_object_is_typedarray (obj_p)' failed in ecma-typedarray-object(ecma_get_typedarray_id) | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4875/comments | 0 | 2021-12-09T09:08:53Z | 2022-01-12T02:06:25Z | https://github.com/jerryscript-project/jerryscript/issues/4875 | 1,075,325,382 | 4,875 |
CVE-2021-44993 | 2022-01-25T01:15:07.730 | There is an Assertion ''ecma_is_value_boolean (base_value)'' failed at /jerry-core/ecma/operations/ecma-get-put-value.c in Jerryscript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4876"
},
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "https://security.samsungmobil... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4876 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27)
Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
./tools/build.py --clean --deb... | Assertion 'ecma_is_value_boolean (base_value)' failed in ecma_op_get_value_object_base (ecma-get-put-value). | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4876/comments | 0 | 2021-12-09T09:48:50Z | 2022-01-12T02:06:45Z | https://github.com/jerryscript-project/jerryscript/issues/4876 | 1,075,367,669 | 4,876 |
CVE-2021-44994 | 2022-01-25T01:15:07.773 | There is an Assertion ''JERRY_CONTEXT (jmem_heap_allocated_size) == 0'' failed at /jerry-core/jmem/jmem-heap.c in Jerryscript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4894"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4894 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ## JerryScript commit hash
55acdf2048b390d0f56f12e64dbfb2559f0e70ad
## Build platform
Ubuntu 20.04 LTS
## Build steps
```
./tools/build.py --clean --debug --compile-flag=-fsanitize=address \
--compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \
--compile-flag=-fno-common --compile-flag=-g \
--strip=... | Assertion 'JERRY_CONTEXT (jmem_heap_allocated_size) == 0' failed at /home/sakura/jerryscript/jerry-core/jmem/jmem-heap.c(jmem_heap_finalize):108. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4894/comments | 1 | 2021-12-09T14:53:08Z | 2022-01-14T09:05:39Z | https://github.com/jerryscript-project/jerryscript/issues/4894 | 1,075,663,454 | 4,894 |
CVE-2021-44994 | 2022-01-25T01:15:07.773 | There is an Assertion ''JERRY_CONTEXT (jmem_heap_allocated_size) == 0'' failed at /jerry-core/jmem/jmem-heap.c in Jerryscript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4894"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
... | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionSta... | https://github.com/jerryscript-project/jerryscript/issues/4895 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27)
Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
./tools/build.py --clean --debug... | Assertion 'ecma_object_check_class_name_is_object (obj_p)' failed at ecma-objects.c(ecma_object_get_class_name) | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4895/comments | 3 | 2021-12-09T14:58:57Z | 2022-01-12T02:09:35Z | https://github.com/jerryscript-project/jerryscript/issues/4895 | 1,075,669,945 | 4,895 |
CVE-2021-46474 | 2022-01-25T01:15:07.817 | Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsiEvalCodeSub in src/jsiEval.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/57"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/57 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-buffer-overflow src/jsiEval.c:1366 in jsiEvalCodeSub | https://api.github.com/repos/pcmacdon/jsish/issues/57/comments | 1 | 2021-12-24T09:47:27Z | 2022-01-12T02:12:21Z | https://github.com/pcmacdon/jsish/issues/57 | 1,088,279,556 | 57 |
CVE-2021-46475 | 2022-01-25T01:15:07.853 | Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsi_ArraySliceCmd in src/jsiArray.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/64"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/64 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-buffer-overflow src/jsiArray.c:912 in jsi_ArraySliceCmd | https://api.github.com/repos/pcmacdon/jsish/issues/64/comments | 0 | 2021-12-24T10:33:23Z | 2021-12-26T17:16:57Z | https://github.com/pcmacdon/jsish/issues/64 | 1,088,304,005 | 64 |
CVE-2021-46477 | 2022-01-25T01:15:07.893 | Jsish v3.5.0 was discovered to contain a heap buffer overflow via RegExp_constructor in src/jsiRegexp.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/63"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/63 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-buffer-overflow src/jsiRegexp.c:176 in RegExp_constructor | https://api.github.com/repos/pcmacdon/jsish/issues/63/comments | 0 | 2021-12-24T10:32:32Z | 2022-01-12T02:13:42Z | https://github.com/pcmacdon/jsish/issues/63 | 1,088,303,589 | 63 |
CVE-2021-46478 | 2022-01-25T01:15:07.930 | Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsiClearStack in src/jsiEval.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/60"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/60 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-buffer-overflow src/jsiEval.c:120 in jsiClearStack | https://api.github.com/repos/pcmacdon/jsish/issues/60/comments | 0 | 2021-12-24T09:50:51Z | 2022-01-12T02:12:56Z | https://github.com/pcmacdon/jsish/issues/60 | 1,088,281,295 | 60 |
CVE-2021-46480 | 2022-01-25T01:15:07.970 | Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsiValueObjDelete in src/jsiEval.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/61"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/61 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-buffer-overflow src/jsiEval.c:464 in jsiValueObjDelete | https://api.github.com/repos/pcmacdon/jsish/issues/61/comments | 0 | 2021-12-24T10:30:42Z | 2022-01-12T02:13:11Z | https://github.com/pcmacdon/jsish/issues/61 | 1,088,302,674 | 61 |
CVE-2021-46481 | 2022-01-25T01:15:08.010 | Jsish v3.5.0 was discovered to contain a memory leak via linenoise at src/linenoise.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/55"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/55 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Memory leaks in linenoise src/linenoise.c:1061 | https://api.github.com/repos/pcmacdon/jsish/issues/55/comments | 0 | 2021-12-24T09:44:48Z | 2022-01-12T02:11:57Z | https://github.com/pcmacdon/jsish/issues/55 | 1,088,278,241 | 55 |
CVE-2021-46482 | 2022-01-25T01:15:08.050 | Jsish v3.5.0 was discovered to contain a heap buffer overflow via NumberConstructor at src/jsiNumber.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/66"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/66 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-buffer-overflow src/jsiNumber.c:93 in NumberConstructor | https://api.github.com/repos/pcmacdon/jsish/issues/66/comments | 0 | 2021-12-24T10:35:07Z | 2022-01-12T02:14:08Z | https://github.com/pcmacdon/jsish/issues/66 | 1,088,304,812 | 66 |
CVE-2021-46483 | 2022-01-25T01:15:08.090 | Jsish v3.5.0 was discovered to contain a heap buffer overflow via BooleanConstructor at src/jsiBool.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/62"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/62 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-buffer-overflow src/jsiBool.c:17 in BooleanConstructor | https://api.github.com/repos/pcmacdon/jsish/issues/62/comments | 0 | 2021-12-24T10:31:27Z | 2022-01-12T02:13:25Z | https://github.com/pcmacdon/jsish/issues/62 | 1,088,303,083 | 62 |
CVE-2021-46089 | 2022-01-25T15:15:08.203 | In JeecgBoot 3.0, there is a SQL injection vulnerability that can operate the database with root privileges. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10,
"confidentialityImpact": "COMPLETE"... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jeecgboot/jeecg-boot/issues/3331"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "45720048-60C0-4FA8-AA09-16C8CF329FD3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcludi... | https://github.com/jeecgboot/jeecg-boot/issues/3331 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jeecgboot",
"jeecg-boot"
] | ##### version: <=3.0
##### precondition: After logged in the website,click 流程管理 proxy burp,the parameter "column" can be made SQL injection.
##### Screenshot & code :
<img width="1240" alt="图片" src="https://user-images.githubusercontent.com/25843151/147641725-71a3c7a3-c4d4-41f8-af76-b875641e2cbf.png">
... | There is an SQL injection vulnerability that can operate the database with root privileges. | https://api.github.com/repos/jeecgboot/JeecgBoot/issues/3331/comments | 3 | 2021-12-29T08:36:51Z | 2022-01-21T02:04:30Z | https://github.com/jeecgboot/JeecgBoot/issues/3331 | 1,090,357,318 | 3,331 |
CVE-2021-46484 | 2022-01-27T21:15:08.343 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via Jsi_IncrRefCount in src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/73"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/73 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-use-after-free src/jsiValue.c:34 in Jsi_IncrRefCount | https://api.github.com/repos/pcmacdon/jsish/issues/73/comments | 1 | 2021-12-24T10:41:10Z | 2021-12-28T03:39:04Z | https://github.com/pcmacdon/jsish/issues/73 | 1,088,307,699 | 73 |
CVE-2021-46485 | 2022-01-27T21:15:08.427 | Jsish v3.5.0 was discovered to contain a SEGV vulnerability via Jsi_ValueIsNumber at src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/70"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/70 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | SEGV src/jsiValue.c:418 in Jsi_ValueIsNumber | https://api.github.com/repos/pcmacdon/jsish/issues/70/comments | 0 | 2021-12-24T10:38:22Z | 2022-01-12T02:15:00Z | https://github.com/pcmacdon/jsish/issues/70 | 1,088,306,373 | 70 |
CVE-2021-46486 | 2022-01-27T21:15:08.470 | Jsish v3.5.0 was discovered to contain a SEGV vulnerability via jsi_ArraySpliceCmd at src/jsiArray.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/65"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/65 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | SEGV src/jsiArray.c:1172 in jsi_ArraySpliceCmd | https://api.github.com/repos/pcmacdon/jsish/issues/65/comments | 1 | 2021-12-24T10:34:07Z | 2022-01-12T02:13:57Z | https://github.com/pcmacdon/jsish/issues/65 | 1,088,304,355 | 65 |
CVE-2021-46487 | 2022-01-27T21:15:08.517 | Jsish v3.5.0 was discovered to contain a SEGV vulnerability via /lib/x86_64-linux-gnu/libc.so.6+0x18e506. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/72"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/72 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | SEGV (/lib/x86_64-linux-gnu/libc.so.6+0x18e506) | https://api.github.com/repos/pcmacdon/jsish/issues/72/comments | 0 | 2021-12-24T10:39:45Z | 2022-01-12T02:15:13Z | https://github.com/pcmacdon/jsish/issues/72 | 1,088,306,982 | 72 |
CVE-2021-46488 | 2022-01-27T21:15:08.560 | Jsish v3.5.0 was discovered to contain a SEGV vulnerability via jsi_ArrayConcatCmd at src/jsiArray.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/68"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/68 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | SEGV src/jsiArray.c:311 in jsi_ArrayConcatCmd | https://api.github.com/repos/pcmacdon/jsish/issues/68/comments | 0 | 2021-12-24T10:36:54Z | 2022-01-12T02:14:32Z | https://github.com/pcmacdon/jsish/issues/68 | 1,088,305,652 | 68 |
CVE-2021-46489 | 2022-01-27T21:15:08.603 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via Jsi_DecrRefCount in src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/74"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/74 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-use-after-free src/jsiValue.c:41 in Jsi_DecrRefCount | https://api.github.com/repos/pcmacdon/jsish/issues/74/comments | 0 | 2021-12-24T10:41:50Z | 2021-12-27T15:24:09Z | https://github.com/pcmacdon/jsish/issues/74 | 1,088,308,024 | 74 |
CVE-2021-46490 | 2022-01-27T21:15:08.647 | Jsish v3.5.0 was discovered to contain a SEGV vulnerability via NumberConstructor at src/jsiNumber.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/67"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/67 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | SEGV src/jsiNumber.c:93 in NumberConstructor | https://api.github.com/repos/pcmacdon/jsish/issues/67/comments | 2 | 2021-12-24T10:35:45Z | 2022-01-12T02:14:20Z | https://github.com/pcmacdon/jsish/issues/67 | 1,088,305,078 | 67 |
CVE-2021-46491 | 2022-01-27T21:15:08.690 | Jsish v3.5.0 was discovered to contain a SEGV vulnerability via Jsi_CommandPkgOpts at src/jsiCmds.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/69"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/69 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | SEGV src/jsiCmds.c:785 in Jsi_CommandPkgOpts | https://api.github.com/repos/pcmacdon/jsish/issues/69/comments | 7 | 2021-12-24T10:37:33Z | 2022-01-12T02:14:45Z | https://github.com/pcmacdon/jsish/issues/69 | 1,088,305,979 | 69 |
CVE-2021-46492 | 2022-01-27T21:15:08.733 | Jsish v3.5.0 was discovered to contain a SEGV vulnerability via Jsi_FunctionInvoke at src/jsiFunc.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/71"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/71 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | SEGV src/jsiFunc.c:786 in Jsi_FunctionInvoke | https://api.github.com/repos/pcmacdon/jsish/issues/71/comments | 0 | 2021-12-24T10:38:56Z | 2021-12-27T03:47:20Z | https://github.com/pcmacdon/jsish/issues/71 | 1,088,306,590 | 71 |
CVE-2021-46494 | 2022-01-27T21:15:08.777 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_ValueLookupBase in src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/78"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/78 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-use-after-free src/jsiValue.c:980 in jsi_ValueLookupBase | https://api.github.com/repos/pcmacdon/jsish/issues/78/comments | 0 | 2021-12-24T10:45:48Z | 2022-01-12T02:16:10Z | https://github.com/pcmacdon/jsish/issues/78 | 1,088,309,877 | 78 |
CVE-2021-46495 | 2022-01-27T21:15:08.827 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via DeleteTreeValue in src/jsiObj.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/82"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/82 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-use-after-free src/jsiObj.c:176 in DeleteTreeValue | https://api.github.com/repos/pcmacdon/jsish/issues/82/comments | 0 | 2021-12-24T10:48:59Z | 2021-12-28T02:31:29Z | https://github.com/pcmacdon/jsish/issues/82 | 1,088,311,523 | 82 |
CVE-2021-46496 | 2022-01-27T21:15:08.870 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via Jsi_ObjFree in src/jsiObj.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/83"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/83 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | MEMLEAK NOW: Heap-use-after-free src/jsiObj.c:339 in Jsi_ObjFree | https://api.github.com/repos/pcmacdon/jsish/issues/83/comments | 2 | 2021-12-24T10:49:33Z | 2021-12-28T02:31:03Z | https://github.com/pcmacdon/jsish/issues/83 | 1,088,311,780 | 83 |
CVE-2021-46497 | 2022-01-27T21:15:08.917 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_UserObjDelete in src/jsiUserObj.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/84"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/84 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-use-after-free src/jsiUserObj.c:32 in jsi_UserObjDelete | https://api.github.com/repos/pcmacdon/jsish/issues/84/comments | 0 | 2021-12-24T10:50:28Z | 2021-12-27T16:51:37Z | https://github.com/pcmacdon/jsish/issues/84 | 1,088,312,235 | 84 |
CVE-2021-46498 | 2022-01-27T21:15:08.957 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_wswebsocketObjFree in src/jsiWebSocket.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/81"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/81 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-use-after-free src/jsiWebSocket.c:3190 in jsi_wswebsocketObjFree | https://api.github.com/repos/pcmacdon/jsish/issues/81/comments | 0 | 2021-12-24T10:48:23Z | 2021-12-28T02:31:29Z | https://github.com/pcmacdon/jsish/issues/81 | 1,088,311,213 | 81 |
CVE-2021-46499 | 2022-01-27T21:15:09.003 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_ValueCopyMove in src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/76"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/76 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-use-after-free src/jsiValue.c:245 in jsi_ValueCopyMove | https://api.github.com/repos/pcmacdon/jsish/issues/76/comments | 0 | 2021-12-24T10:44:21Z | 2022-01-12T02:15:38Z | https://github.com/pcmacdon/jsish/issues/76 | 1,088,309,178 | 76 |
CVE-2021-46500 | 2022-01-27T21:15:09.047 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_ArgTypeCheck in src/jsiFunc.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/85"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/85 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-use-after-free src/jsiFunc.c:207 in jsi_ArgTypeCheck | https://api.github.com/repos/pcmacdon/jsish/issues/85/comments | 2 | 2021-12-24T10:51:56Z | 2021-12-26T22:47:18Z | https://github.com/pcmacdon/jsish/issues/85 | 1,088,313,003 | 85 |
CVE-2021-46501 | 2022-01-27T21:15:09.097 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via SortSubCmd in src/jsiArray.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/86"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/86 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-use-after-free src/jsiArray.c:958 in SortSubCmd | https://api.github.com/repos/pcmacdon/jsish/issues/86/comments | 0 | 2021-12-24T10:52:55Z | 2021-12-26T22:47:42Z | https://github.com/pcmacdon/jsish/issues/86 | 1,088,313,466 | 86 |
CVE-2021-46502 | 2022-01-27T21:15:09.143 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via /usr/lib/x86_64-linux-gnu/libasan.so.4+0x5166d. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/87"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/87 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-use-after-free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x5166d) | https://api.github.com/repos/pcmacdon/jsish/issues/87/comments | 0 | 2021-12-24T10:53:39Z | 2021-12-26T22:08:17Z | https://github.com/pcmacdon/jsish/issues/87 | 1,088,313,832 | 87 |
CVE-2021-46503 | 2022-01-27T21:15:09.187 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via /usr/lib/x86_64-linux-gnu/libasan.so.4+0x79732. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/88"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/88 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Heap-use-after-free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x79732) | https://api.github.com/repos/pcmacdon/jsish/issues/88/comments | 0 | 2021-12-24T10:54:21Z | 2021-12-26T20:57:24Z | https://github.com/pcmacdon/jsish/issues/88 | 1,088,314,163 | 88 |
CVE-2021-46504 | 2022-01-27T21:15:09.233 | There is an Assertion 'vp != resPtr' failed at jsiEval.c in Jsish v3.5.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/51"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/51 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Assertion `vp != resPtr' failed at jsiEval.c:1020: jsiEvalSubscript. | https://api.github.com/repos/pcmacdon/jsish/issues/51/comments | 0 | 2021-12-24T09:40:19Z | 2022-01-12T02:02:10Z | https://github.com/pcmacdon/jsish/issues/51 | 1,088,275,965 | 51 |
CVE-2021-46505 | 2022-01-27T21:15:09.277 | Jsish v3.5.0 was discovered to contain a stack overflow via /usr/lib/x86_64-linux-gnu/libasan.so.4+0x5b1e5. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/53"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/53 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Stack-overflow in (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x5b1e5) | https://api.github.com/repos/pcmacdon/jsish/issues/53/comments | 0 | 2021-12-24T09:43:02Z | 2022-01-12T02:11:35Z | https://github.com/pcmacdon/jsish/issues/53 | 1,088,277,342 | 53 |
CVE-2021-46506 | 2022-01-27T21:15:09.323 | There is an Assertion 'v->d.lval != v' failed at src/jsiValue.c in Jsish v3.5.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/52"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/52 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Assertion `v->d.lval != v' failed at src/jsiValue.c:181: ValueFree. | https://api.github.com/repos/pcmacdon/jsish/issues/52/comments | 0 | 2021-12-24T09:41:38Z | 2022-01-12T02:03:28Z | https://github.com/pcmacdon/jsish/issues/52 | 1,088,276,639 | 52 |
CVE-2021-46507 | 2022-01-27T21:15:09.367 | Jsish v3.5.0 was discovered to contain a stack overflow via Jsi_LogMsg at src/jsiUtils.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/54"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding"... | https://github.com/pcmacdon/jsish/issues/54 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
#... | Stack-overflow src/jsiUtils.c:151 in Jsi_LogMsg | https://api.github.com/repos/pcmacdon/jsish/issues/54/comments | 0 | 2021-12-24T09:43:48Z | 2022-01-12T02:11:46Z | https://github.com/pcmacdon/jsish/issues/54 | 1,088,277,734 | 54 |
CVE-2021-46508 | 2022-01-27T21:15:09.413 | There is an Assertion `i < parts_cnt' failed at src/mjs_bcode.c in Cesanta MJS v2.20.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/188"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/188 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_CLANG=clang
$(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCE... | Assertion `i < parts_cnt' failed at src/mjs_bcode.c:121: struct mjs_bcode_part *mjs_bcode_part_get_by_offset(struct mjs *, size_t). | https://api.github.com/repos/cesanta/mjs/issues/188/comments | 0 | 2021-12-31T05:23:32Z | 2022-01-12T02:18:33Z | https://github.com/cesanta/mjs/issues/188 | 1,091,424,362 | 188 |
CVE-2021-46509 | 2022-01-27T21:15:09.460 | Cesanta MJS v2.20.0 was discovered to contain a stack overflow via snquote at mjs/src/mjs_json.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/200"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/200 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build steps
```bash
vim Makefile
DOCKER_CLANG=clang
$(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)
# save the makefile then make
make
```
... | Stack-overflow mjs/src/mjs_json.c:102:7 in snquote | https://api.github.com/repos/cesanta/mjs/issues/200/comments | 0 | 2021-12-31T05:43:04Z | 2022-01-12T02:20:01Z | https://github.com/cesanta/mjs/issues/200 | 1,091,428,300 | 200 |
CVE-2021-46510 | 2022-01-27T21:15:09.507 | There is an Assertion `s < mjs->owned_strings.buf + mjs->owned_strings.len' failed at src/mjs_gc.c in Cesanta MJS v2.20.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/185"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/185 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
DOCKER_CLANG=clang
$(DOCKER_GCC) $(CFLAGS) $(TOP_... | Assertion `s < mjs->owned_strings.buf + mjs->owned_strings.len' failed src/mjs_gc.c:354: gc_mark_string. | https://api.github.com/repos/cesanta/mjs/issues/185/comments | 0 | 2021-12-31T05:20:39Z | 2022-01-12T02:18:09Z | https://github.com/cesanta/mjs/issues/185 | 1,091,423,652 | 185 |
CVE-2021-46511 | 2022-01-27T21:15:09.550 | There is an Assertion `m->len >= sizeof(v)' failed at src/mjs_core.c in Cesanta MJS v2.20.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/183"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/183 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP... | Assertion `m->len >= sizeof(v)' failed at src/mjs_core.c:372: mjs_pop_val | https://api.github.com/repos/cesanta/mjs/issues/183/comments | 0 | 2021-12-31T05:18:57Z | 2022-01-12T02:17:55Z | https://github.com/cesanta/mjs/issues/183 | 1,091,423,222 | 183 |
CVE-2021-46512 | 2022-01-27T21:15:09.593 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_apply at src/mjs_exec.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/202"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/202 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
Version:
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_S... | SEGV src/mjs_exec.c:1155 in mjs_apply | https://api.github.com/repos/cesanta/mjs/issues/202/comments | 0 | 2021-12-31T07:29:20Z | 2021-12-31T07:29:20Z | https://github.com/cesanta/mjs/issues/202 | 1,091,456,612 | 202 |
CVE-2021-46513 | 2022-01-27T21:15:09.633 | Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via mjs_mk_string at mjs/src/mjs_string.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/189"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/189 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_CLANG=clang
$(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOUR... | Global-buffer-overflow mjs/src/mjs_string.c:58:15 in mjs_mk_string | https://api.github.com/repos/cesanta/mjs/issues/189/comments | 0 | 2021-12-31T05:24:24Z | 2021-12-31T05:49:18Z | https://github.com/cesanta/mjs/issues/189 | 1,091,424,556 | 189 |
CVE-2021-46514 | 2022-01-27T21:15:09.677 | There is an Assertion 'ppos != NULL && mjs_is_number(*ppos)' failed at src/mjs_core.c in Cesanta MJS v2.20.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/187"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/187 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_CLANG=clang
$(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCES)... | Assertion `ppos != NULL && mjs_is_number(*ppos)' failed at src/mjs_core.c:311: int mjs_getretvalpos(struct mjs *). | https://api.github.com/repos/cesanta/mjs/issues/187/comments | 0 | 2021-12-31T05:22:41Z | 2021-12-31T08:13:20Z | https://github.com/cesanta/mjs/issues/187 | 1,091,424,159 | 187 |
CVE-2021-46515 | 2022-01-27T21:15:09.723 | There is an Assertion `mjs_stack_size(&mjs->scopes) >= scopes_len' failed at src/mjs_exec.c in Cesanta MJS v2.20.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/186"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/186 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
DOCKER_CLANG=clang
$(DOCKER_GCC) $(CFLAGS) $(... | Assertion `mjs_stack_size(&mjs->scopes) >= scopes_len' failed at src/mjs_exec.c:949: mjs_execute. | https://api.github.com/repos/cesanta/mjs/issues/186/comments | 0 | 2021-12-31T05:21:24Z | 2022-01-12T02:18:21Z | https://github.com/cesanta/mjs/issues/186 | 1,091,423,861 | 186 |
CVE-2021-46516 | 2022-01-27T21:15:09.767 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via mjs_stack_size at mjs/src/mjs_core.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/201"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/201 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_CLANG=clang
$(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCE... | SEGV mjs/src/mjs_core.c:348:13 in mjs_stack_size | https://api.github.com/repos/cesanta/mjs/issues/201/comments | 0 | 2021-12-31T07:26:25Z | 2021-12-31T07:26:25Z | https://github.com/cesanta/mjs/issues/201 | 1,091,455,737 | 201 |
CVE-2021-46517 | 2022-01-27T21:15:09.813 | There is an Assertion `mjs_stack_size(&mjs->scopes) > 0' failed at src/mjs_exec.c in Cesanta MJS v2.20.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/184"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/184 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
DOCKER_CLANG=clang
$(DOCKER_GCC) $(CFLAGS) $(... | Assertion `mjs_stack_size(&mjs->scopes) > 0' failed src/mjs_exec.c:725: mjs_execute. | https://api.github.com/repos/cesanta/mjs/issues/184/comments | 0 | 2021-12-31T05:19:48Z | 2021-12-31T05:46:31Z | https://github.com/cesanta/mjs/issues/184 | 1,091,423,443 | 184 |
CVE-2021-46518 | 2022-01-27T21:15:09.857 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_disown at src/mjs_core.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/195"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/195 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
DOCKER_CLANG=clang
$(DOCKER_GCC) $(CFLAGS... | Heap-buffer-overflow src/mjs_core.c:288 in mjs_disown | https://api.github.com/repos/cesanta/mjs/issues/195/comments | 0 | 2021-12-31T05:37:12Z | 2022-01-12T02:18:56Z | https://github.com/cesanta/mjs/issues/195 | 1,091,427,107 | 195 |
CVE-2021-46519 | 2022-01-27T21:15:09.900 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_array_length at src/mjs_array.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/194"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/194 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $... | Heap-buffer-overflow src/mjs_array.c:83 in mjs_array_length | https://api.github.com/repos/cesanta/mjs/issues/194/comments | 0 | 2021-12-31T05:36:16Z | 2021-12-31T05:36:16Z | https://github.com/cesanta/mjs/issues/194 | 1,091,426,932 | 194 |
CVE-2021-46520 | 2022-01-27T21:15:09.947 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_jprintf at src/mjs_util.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/193"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/193 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES)... | Heap-buffer-overflow src/mjs_util.c:61 in mjs_jprintf | https://api.github.com/repos/cesanta/mjs/issues/193/comments | 0 | 2021-12-31T05:35:03Z | 2021-12-31T05:35:03Z | https://github.com/cesanta/mjs/issues/193 | 1,091,426,673 | 193 |
CVE-2021-46521 | 2022-01-27T21:15:09.990 | Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via c_vsnprintf at mjs/src/common/str_util.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/190"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/190 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_CLANG=clang
$(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_... | Global-buffer-overflow mjs/src/common/str_util.c:180:14 in c_vsnprintf | https://api.github.com/repos/cesanta/mjs/issues/190/comments | 0 | 2021-12-31T05:25:14Z | 2022-01-12T02:18:45Z | https://github.com/cesanta/mjs/issues/190 | 1,091,424,729 | 190 |
CVE-2021-46522 | 2022-01-27T21:15:10.033 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via /usr/lib/x86_64-linux-gnu/libasan.so.4+0xaff53. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/196"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/196 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES)... | Heap-buffer-overflow (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xaff53) | https://api.github.com/repos/cesanta/mjs/issues/196/comments | 0 | 2021-12-31T05:38:16Z | 2022-01-12T02:19:08Z | https://github.com/cesanta/mjs/issues/196 | 1,091,427,319 | 196 |
CVE-2021-46523 | 2022-01-27T21:15:10.077 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via to_json_or_debug at mjs/src/mjs_json.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/198"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/198 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build steps
```bash
vim Makefile
DOCKER_CLANG=clang
$(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)
# save the makefile then make
make
```
... | Heap-buffer-overflow mjs/src/mjs_json.c:154:13 in to_json_or_debug | https://api.github.com/repos/cesanta/mjs/issues/198/comments | 0 | 2021-12-31T05:40:39Z | 2022-01-12T02:19:30Z | https://github.com/cesanta/mjs/issues/198 | 1,091,427,798 | 198 |
CVE-2021-46524 | 2022-01-27T21:15:10.117 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via snquote at mjs/src/mjs_json.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/192"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/192 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES)... | Heap-buffer-overflow src/mjs_json.c:81 in snquote | https://api.github.com/repos/cesanta/mjs/issues/192/comments | 0 | 2021-12-31T05:33:31Z | 2021-12-31T05:33:31Z | https://github.com/cesanta/mjs/issues/192 | 1,091,426,355 | 192 |
CVE-2021-46525 | 2022-01-27T21:15:10.160 | Cesanta MJS v2.20.0 was discovered to contain a heap-use-after-free via mjs_apply at src/mjs_exec.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/199"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/199 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_C... | Heap-use-after-free src/mjs_exec.c:1156 in mjs_apply | https://api.github.com/repos/cesanta/mjs/issues/199/comments | 0 | 2021-12-31T05:41:58Z | 2022-01-12T02:19:47Z | https://github.com/cesanta/mjs/issues/199 | 1,091,428,077 | 199 |
CVE-2021-46526 | 2022-01-27T21:15:10.207 | Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via snquote at src/mjs_json.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/191"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/191 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(T... | Global-buffer-overflow src/mjs_json.c:81 in snquote | https://api.github.com/repos/cesanta/mjs/issues/191/comments | 0 | 2021-12-31T05:31:36Z | 2021-12-31T05:31:36Z | https://github.com/cesanta/mjs/issues/191 | 1,091,425,933 | 191 |
CVE-2021-46527 | 2022-01-27T21:15:10.250 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_get_cstring at src/mjs_string.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PART... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/197"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/197 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $... | Heap-buffer-overflow src/mjs_string.c:213 in mjs_get_cstring | https://api.github.com/repos/cesanta/mjs/issues/197/comments | 0 | 2021-12-31T05:39:31Z | 2022-01-12T02:19:19Z | https://github.com/cesanta/mjs/issues/197 | 1,091,427,555 | 197 |
CVE-2021-46528 | 2022-01-27T21:15:10.293 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x5361e. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/208"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/208 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP... | SEGV (/usr/local/bin/mjs+0x5361e) | https://api.github.com/repos/cesanta/mjs/issues/208/comments | 0 | 2021-12-31T07:44:06Z | 2021-12-31T07:44:06Z | https://github.com/cesanta/mjs/issues/208 | 1,091,460,498 | 208 |
CVE-2021-46529 | 2022-01-27T21:15:10.337 | Cesanta MJS v2.20.0 was discovered to contain a SEGV vulnerability via /usr/local/bin/mjs+0x8814e. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE... | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/210"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding... | https://github.com/cesanta/mjs/issues/210 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(T... | SEGV (/usr/local/bin/mjs+0x8814e) | https://api.github.com/repos/cesanta/mjs/issues/210/comments | 0 | 2021-12-31T07:46:17Z | 2022-01-12T02:20:50Z | https://github.com/cesanta/mjs/issues/210 | 1,091,461,061 | 210 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.