Vulnerabilities (CVE)

Filtered by vendor Jsish Subscribe
Total 52 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-24189 1 Jsish 1 Jsish 2024-11-21 N/A 9.8 CRITICAL
Jsish v3.5.0 (commit 42c694c) was discovered to contain a use-after-free via the SplitChar at ./src/jsiUtils.c.
CVE-2024-24188 1 Jsish 1 Jsish 2024-11-21 N/A 9.8 CRITICAL
Jsish v3.5.0 was discovered to contain a heap-buffer-overflow in ./src/jsiUtils.c.
CVE-2024-24186 1 Jsish 1 Jsish 2024-11-21 N/A 9.8 CRITICAL
Jsish v3.5.0 (commit 42c694c) was discovered to contain a stack-overflow via the component IterGetKeysCallback at /jsish/src/jsiValue.c.
CVE-2021-46507 1 Jsish 1 Jsish 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
Jsish v3.5.0 was discovered to contain a stack overflow via Jsi_LogMsg at src/jsiUtils.c.
CVE-2021-46506 1 Jsish 1 Jsish 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
There is an Assertion 'v->d.lval != v' failed at src/jsiValue.c in Jsish v3.5.0.
CVE-2021-46505 1 Jsish 1 Jsish 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
Jsish v3.5.0 was discovered to contain a stack overflow via /usr/lib/x86_64-linux-gnu/libasan.so.4+0x5b1e5.
CVE-2021-46504 1 Jsish 1 Jsish 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
There is an Assertion 'vp != resPtr' failed at jsiEval.c in Jsish v3.5.0.
CVE-2021-46503 1 Jsish 1 Jsish 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
Jsish v3.5.0 was discovered to contain a heap-use-after-free via /usr/lib/x86_64-linux-gnu/libasan.so.4+0x79732. This vulnerability can lead to a Denial of Service (DoS).
CVE-2021-46502 1 Jsish 1 Jsish 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
Jsish v3.5.0 was discovered to contain a heap-use-after-free via /usr/lib/x86_64-linux-gnu/libasan.so.4+0x5166d. This vulnerability can lead to a Denial of Service (DoS).
CVE-2021-46501 1 Jsish 1 Jsish 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
Jsish v3.5.0 was discovered to contain a heap-use-after-free via SortSubCmd in src/jsiArray.c. This vulnerability can lead to a Denial of Service (DoS).
CVE-2021-46500 1 Jsish 1 Jsish 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_ArgTypeCheck in src/jsiFunc.c. This vulnerability can lead to a Denial of Service (DoS).
CVE-2021-46499 1 Jsish 1 Jsish 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_ValueCopyMove in src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS).
CVE-2021-46498 1 Jsish 1 Jsish 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_wswebsocketObjFree in src/jsiWebSocket.c. This vulnerability can lead to a Denial of Service (DoS).
CVE-2021-46497 1 Jsish 1 Jsish 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_UserObjDelete in src/jsiUserObj.c. This vulnerability can lead to a Denial of Service (DoS).
CVE-2021-46496 1 Jsish 1 Jsish 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
Jsish v3.5.0 was discovered to contain a heap-use-after-free via Jsi_ObjFree in src/jsiObj.c. This vulnerability can lead to a Denial of Service (DoS).
CVE-2021-46495 1 Jsish 1 Jsish 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
Jsish v3.5.0 was discovered to contain a heap-use-after-free via DeleteTreeValue in src/jsiObj.c. This vulnerability can lead to a Denial of Service (DoS).
CVE-2021-46494 1 Jsish 1 Jsish 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_ValueLookupBase in src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS).
CVE-2021-46492 1 Jsish 1 Jsish 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
Jsish v3.5.0 was discovered to contain a SEGV vulnerability via Jsi_FunctionInvoke at src/jsiFunc.c. This vulnerability can lead to a Denial of Service (DoS).
CVE-2021-46491 1 Jsish 1 Jsish 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
Jsish v3.5.0 was discovered to contain a SEGV vulnerability via Jsi_CommandPkgOpts at src/jsiCmds.c. This vulnerability can lead to a Denial of Service (DoS).
CVE-2021-46490 1 Jsish 1 Jsish 2024-11-21 4.3 MEDIUM 5.5 MEDIUM
Jsish v3.5.0 was discovered to contain a SEGV vulnerability via NumberConstructor at src/jsiNumber.c. This vulnerability can lead to a Denial of Service (DoS).