Heap-based Buffer Overflow vulnerability in Samsung Open Source Escargot JavaScript engine allows Overflow Buffers.This issue affects Escargot: 4.0.0.
References
Link | Resource |
---|---|
https://github.com/Samsung/escargot/pull/1359 | Issue Tracking |
https://github.com/Samsung/escargot/pull/1359 | Issue Tracking |
Configurations
History
21 Nov 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Samsung/escargot/pull/1359 - Issue Tracking |
11 Sep 2024, 15:57
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:samsung:escargot:4.0.0:*:*:*:*:*:*:* | |
First Time |
Samsung
Samsung escargot |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | () https://github.com/Samsung/escargot/pull/1359 - Issue Tracking | |
CWE | CWE-787 |
29 Jul 2024, 14:12
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
29 Jul 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-29 03:15
Updated : 2024-11-21 09:15
NVD link : CVE-2024-32671
Mitre link : CVE-2024-32671
CVE.ORG link : CVE-2024-32671
JSON object : View
Products Affected
samsung
- escargot