First published: Wed Jul 24 2019(Updated: )
Jsish 2.4.70 2.047 is affected by: Use After Free. The impact is: denial of service and possibly arbitrary code execution. The component is: function Jsi_RegExpNew (jsi/jsiRegexp.c:39). The attack vector is: executing crafted javascript code. The fixed version is: after commit 48a66c798d.
Credit: josh@bress.net
Affected Software | Affected Version | How to fix |
---|---|---|
Jsish Jsish | =2.4.70_2.047 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-1010177.
The severity of CVE-2019-1010177 is critical with a severity value of 9.8.
The impact of CVE-2019-1010177 is denial of service and possibly arbitrary code execution.
CVE-2019-1010177 affects Jsish version 2.4.70_2.047.
CVE-2019-1010177 can be fixed by updating to a version after commit 48a66c798d.