Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-11418

Опубликовано: 24 мая 2018
Источник: debian
EPSS Низкий

Описание

An issue was discovered in JerryScript 1.0. There is a heap-based buffer over-read in the lit_read_code_unit_from_utf8 function via a RegExp("[\\u0020") payload, related to re_parse_char_class in parser/regexp/re-parser.c.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
iotjsfixed1.0+715-1package
iotjsno-dsabusterpackage

Примечания

  • https://github.com/jerryscript-project/jerryscript/issues/2237

  • https://github.com/jerryscript-project/jerryscript/pull/2352

EPSS

Процентиль: 59%
0.00376
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 7 лет назад

An issue was discovered in JerryScript 1.0. There is a heap-based buffer over-read in the lit_read_code_unit_from_utf8 function via a RegExp("[\\u0020") payload, related to re_parse_char_class in parser/regexp/re-parser.c.

CVSS3: 9.8
nvd
больше 7 лет назад

An issue was discovered in JerryScript 1.0. There is a heap-based buffer over-read in the lit_read_code_unit_from_utf8 function via a RegExp("[\\u0020") payload, related to re_parse_char_class in parser/regexp/re-parser.c.

CVSS3: 9.8
github
больше 3 лет назад

An issue was discovered in JerryScript 1.0. There is a heap-based buffer over-read in the lit_read_code_unit_from_utf8 function via a RegExp("[\\u0020") payload, related to re_parse_char_class in parser/regexp/re-parser.c.

EPSS

Процентиль: 59%
0.00376
Низкий