📦 Jsish
by Jsish
🔍 What is Jsish?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
A type confusion vulnerability in jsish 2.0 allows incorrect control flow during execution of the OP_NEXT opcode. When an 'instanceof' expression uses array element access inside a for-in loop, the im...
CVE-2024-24188 is a critical heap buffer overflow vulnerability in Jsish v3.5.0 that allows attackers to execute arbitrary code or cause denial of service. This affects all systems running the vulnera...
This integer overflow vulnerability in jsish's Jsi_ObjArraySizer function allows remote attackers to execute arbitrary code by triggering memory corruption. It affects all systems running jsish versio...
This vulnerability in Jsish (a JavaScript interpreter for embedded systems) allows attackers to cause denial of service through a NULL pointer dereference in the Jsi_Strlen function. Systems running J...
CVE-2021-46482 is a heap buffer overflow vulnerability in Jsish v3.5.0's NumberConstructor function that allows attackers to execute arbitrary code or cause denial of service. This affects systems run...