
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2020-23323 is a heap-buffer-overflow vulnerability discovered in JerryScript version 2.2.0. The vulnerability specifically affects the reparsechar_escape function in the re-parser.c file. The issue was reported on June 7, 2020 (GitHub Issue).
The vulnerability occurs in the reparsechar_escape function at line 615 of jerry-core/parser/regexp/re-parser.c. The issue manifests when processing regular expressions with specific Unicode escape sequences. The proof of concept that triggers this vulnerability involves executing the following code: new RegExp('"\u', 'u').exec(1). When executed, it causes a heap-buffer-overflow READ of size 1 (GitHub Issue).
The vulnerability allows for a heap-buffer-overflow condition, which could potentially lead to memory corruption. This type of vulnerability could be exploited to cause program crashes or potentially lead to arbitrary code execution (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."