Heap-based Buffer Overflow vulnerability in Samsung Open Source Escargot JavaScript engine allows Overflow Buffers.This issue affects Escargot: 4.0.0.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/Samsung/escargot/pull/1369 |
History
Tue, 10 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Samsung Open Source
Samsung Open Source escargot |
|
CPEs | cpe:2.3:a:samsung_open_source:escargot:*:*:*:*:*:*:*:* | |
Vendors & Products |
Samsung Open Source
Samsung Open Source escargot |
|
Metrics |
cvssV3_1
|
Tue, 10 Sep 2024 11:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Heap-based Buffer Overflow vulnerability in Samsung Open Source Escargot JavaScript engine allows Overflow Buffers.This issue affects Escargot: 4.0.0. | |
Weaknesses | CWE-122 | |
References |
| |
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: samsung.tv_appliance
Published: 2024-09-10T10:48:51.493Z
Updated: 2024-09-18T22:42:55.403Z
Reserved: 2024-07-10T03:39:53.782Z
Link: CVE-2024-40754
Vulnrichment
Updated: 2024-09-10T13:34:15.549Z
NVD
Status : Awaiting Analysis
Published: 2024-09-10T11:15:10.503
Modified: 2024-09-10T14:35:04.833
Link: CVE-2024-40754
Redhat
No data.