
Cloud Vulnerability DB
A community-led vulnerabilities database
Jerryscript 3.0 (commit 05dbbd1) was discovered to contain a heap-buffer-overflow vulnerability in the parserparsefunction_statement component located at /jerry-core/parser/js/js-parser-statm.c. The vulnerability was identified and disclosed on April 23, 2023 (GitHub Issue).
The vulnerability is classified with a CVSS v3.1 Base Score of 7.8 (HIGH) with the vector string CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. The issue manifests as a heap-buffer-overflow during the parsing of function statements, specifically when reading 2 bytes at an invalid memory address. The vulnerability is triggered through the parserparsefunction_statement function in the JavaScript parsing component (NVD).
The vulnerability allows for heap memory corruption which could potentially lead to arbitrary code execution. The high CVSS score indicates that successful exploitation could result in complete compromise of confidentiality, integrity, and availability of the affected system (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."