Jsish 2.4.70 2.047 is affected by: Use After Free. The impact is: denial of service and possibly arbitrary code execution. The component is: function Jsi_RegExpNew (jsi/jsiRegexp.c:39). The attack vector is: executing crafted javascript code. The fixed version is: after commit 48a66c798d.
References
Link | Resource |
---|---|
https://jsish.org/fossil/jsi/tktview?name=65c8965977 | Exploit Vendor Advisory |
https://jsish.org/fossil/jsi/tktview?name=65c8965977 | Exploit Vendor Advisory |
Configurations
History
21 Nov 2024, 04:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://jsish.org/fossil/jsi/tktview?name=65c8965977 - Exploit, Vendor Advisory |
Information
Published : 2019-07-24 12:15
Updated : 2024-11-21 04:18
NVD link : CVE-2019-1010177
Mitre link : CVE-2019-1010177
CVE.ORG link : CVE-2019-1010177
JSON object : View
Products Affected
jsish
- jsish
CWE
CWE-416
Use After Free