Filtered by vendor Espruino
Subscribe
Total
15 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-25044 | 1 Espruino | 1 Espruino | 2022-03-11 | 6.8 MEDIUM | 7.8 HIGH |
Espruino 2v11.251 was discovered to contain a stack buffer overflow via src/jsvar.c in jsvNewFromString. | |||||
CVE-2022-25465 | 1 Espruino | 1 Espruino | 2022-03-11 | 6.8 MEDIUM | 7.8 HIGH |
Espruino 2v11 release was discovered to contain a stack buffer overflow via src/jsvar.c in jsvGetNextSibling. | |||||
CVE-2021-46323 | 1 Espruino | 1 Espruino | 2022-01-27 | 4.3 MEDIUM | 5.5 MEDIUM |
Espruino 2v11.251 was discovered to contain a SEGV vulnerability via src/jsinteractive.c in jsiGetDeviceFromClass. | |||||
CVE-2021-46324 | 1 Espruino | 1 Espruino | 2022-01-27 | 6.8 MEDIUM | 7.8 HIGH |
Espruino 2v11.251 was discovered to contain a stack buffer overflow via src/jsvar.c in jsvNewFromString. | |||||
CVE-2021-46325 | 1 Espruino | 1 Espruino | 2022-01-27 | 6.8 MEDIUM | 7.8 HIGH |
Espruino 2v10.246 was discovered to contain a stack buffer overflow via src/jsutils.c in vcbprintf. | |||||
CVE-2020-22884 | 1 Espruino | 1 Espruino | 2021-07-15 | 7.5 HIGH | 9.8 CRITICAL |
Buffer overflow vulnerability in function jsvGetStringChars in Espruino before RELEASE_2V09, allows remote attackers to execute arbitrary code. | |||||
CVE-2018-11597 | 1 Espruino | 1 Espruino | 2019-10-02 | 4.3 MEDIUM | 5.5 MEDIUM |
Espruino before 1.99 allows attackers to cause a denial of service (application crash) with a user crafted input file via a Buffer Overflow during syntax parsing because of a missing check for stack exhaustion with many '{' characters in jsparse.c. | |||||
CVE-2018-11593 | 1 Espruino | 1 Espruino | 2019-10-02 | 5.8 MEDIUM | 7.1 HIGH |
Espruino before 1.99 allows attackers to cause a denial of service (application crash) and potential Information Disclosure with a user crafted input file via a Buffer Overflow during syntax parsing because strncpy is misused in jslex.c. | |||||
CVE-2018-11596 | 1 Espruino | 1 Espruino | 2018-06-08 | 4.3 MEDIUM | 5.5 MEDIUM |
Espruino before 1.99 allows attackers to cause a denial of service (application crash) with a user crafted input file via a Buffer Overflow during syntax parsing because a check for '\0' is made for the wrong array element in jsvar.c. | |||||
CVE-2018-11598 | 1 Espruino | 1 Espruino | 2018-06-08 | 5.8 MEDIUM | 7.1 HIGH |
Espruino before 1.99 allows attackers to cause a denial of service (application crash) and a potential Information Disclosure with user crafted input files via a Buffer Overflow or Out-of-bounds Read during syntax parsing of certain for loops in jsparse.c. | |||||
CVE-2018-11595 | 1 Espruino | 1 Espruino | 2018-06-08 | 6.8 MEDIUM | 7.8 HIGH |
Espruino before 1.99 allows attackers to cause a denial of service (application crash) and a potential Escalation of Privileges with a user crafted input file via a Buffer Overflow during syntax parsing, because strncat is misused. | |||||
CVE-2018-11594 | 1 Espruino | 1 Espruino | 2018-06-08 | 4.3 MEDIUM | 5.5 MEDIUM |
Espruino before 1.99 allows attackers to cause a denial of service (application crash) with a user crafted input file via a Buffer Overflow during syntax parsing of "VOID" tokens in jsparse.c. | |||||
CVE-2018-11590 | 1 Espruino | 1 Espruino | 2018-06-08 | 4.3 MEDIUM | 5.5 MEDIUM |
Espruino before 1.99 allows attackers to cause a denial of service (application crash) with a user crafted input file via an integer overflow during syntax parsing. This was addressed by fixing stack size detection on Linux in jsutils.c. | |||||
CVE-2018-11591 | 1 Espruino | 1 Espruino | 2018-06-08 | 4.3 MEDIUM | 5.5 MEDIUM |
Espruino before 1.98 allows attackers to cause a denial of service (application crash) with a user crafted input file via a NULL pointer dereference during syntax parsing. This was addressed by adding validation for a debug trace print statement in jsvar.c. | |||||
CVE-2018-11592 | 1 Espruino | 1 Espruino | 2018-06-08 | 4.3 MEDIUM | 5.5 MEDIUM |
Espruino before 1.98 allows attackers to cause a denial of service (application crash) with a user crafted input file via an Out-of-bounds Read during syntax parsing in which certain height validation is missing in libs/graphics/jswrap_graphics.c. |