First published: Wed Sep 20 2023(Updated: )
Buffer Overflow vulnerability in JerryScript version 3.0, allows remote attackers to execute arbitrary code via ecma_stringbuilder_append_raw component at /jerry-core/ecma/base/ecma-helpers-string.c.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jerryscript Jerryscript | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-36109.
The severity of CVE-2023-36109 is critical with a score of 9.8.
The affected software is JerryScript version 3.0.
The vulnerability in JerryScript version 3.0 allows remote attackers to execute arbitrary code through the ecma_stringbuilder_append_raw component in /jerry-core/ecma/base/ecma-helpers-string.c.
Yes, you can find references for CVE-2023-36109 at the following links: [GitHub - Limesss/CVE-2023-36109](https://github.com/Limesss/CVE-2023-36109/tree/main) and [GitHub - jerryscript-project/jerryscript/issues/5080](https://github.com/jerryscript-project/jerryscript/issues/5080).