Количество 4
Количество 4
CVE-2021-46343
There is an Assertion 'context_p->token.type == LEXER_LITERAL' failed at /jerry-core/parser/js/js-parser-expr.c in JerryScript 3.0.0.
CVE-2021-46343
There is an Assertion 'context_p->token.type == LEXER_LITERAL' failed at /jerry-core/parser/js/js-parser-expr.c in JerryScript 3.0.0.
CVE-2021-46343
There is an Assertion 'context_p->token.type == LEXER_LITERAL' failed ...
GHSA-4m8v-5wv8-cxqr
There is an Assertion 'context_p->token.type == LEXER_LITERAL' failed at /jerry-core/parser/js/js-parser-expr.c in JerryScript 3.0.0.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-46343 There is an Assertion 'context_p->token.type == LEXER_LITERAL' failed at /jerry-core/parser/js/js-parser-expr.c in JerryScript 3.0.0. | CVSS3: 5.5 | 0% Низкий | около 4 лет назад | |
CVE-2021-46343 There is an Assertion 'context_p->token.type == LEXER_LITERAL' failed at /jerry-core/parser/js/js-parser-expr.c in JerryScript 3.0.0. | CVSS3: 5.5 | 0% Низкий | около 4 лет назад | |
CVE-2021-46343 There is an Assertion 'context_p->token.type == LEXER_LITERAL' failed ... | CVSS3: 5.5 | 0% Низкий | около 4 лет назад | |
GHSA-4m8v-5wv8-cxqr There is an Assertion 'context_p->token.type == LEXER_LITERAL' failed at /jerry-core/parser/js/js-parser-expr.c in JerryScript 3.0.0. | 0% Низкий | около 4 лет назад |
Уязвимостей на страницу