Products
Escargot JavaScript engine
- 4.0.0
Source
PSIRT@samsung.com
Tags
CVE-2024-32671 details
Published : July 29, 2024, 3:15 a.m.
Last Modified : July 29, 2024, 2:12 p.m.
Last Modified : July 29, 2024, 2:12 p.m.
Description
Heap-based Buffer Overflow vulnerability in Samsung Open Source Escargot JavaScript engine allows Overflow Buffers.This issue affects Escargot: 4.0.0.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-122 | Heap-based Buffer Overflow | A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc(). |
References
URL | Source |
---|---|
https://github.com/Samsung/escargot/pull/1359 | PSIRT@samsung.com |
This website uses the NVD API, but is not approved or certified by it.