F5

Njs

39 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.17%
  • Veröffentlicht 13.08.2020 19:15:13
  • Zuletzt bearbeitet 21.11.2024 05:14:38

njs through 0.4.3, used in NGINX, has a use-after-free in njs_json_parse_iterator_call in njs_json.c.

Exploit
  • EPSS 0.29%
  • Veröffentlicht 16.07.2019 17:15:12
  • Zuletzt bearbeitet 21.11.2024 04:25:22

njs through 0.3.3, used in NGINX, has a heap-based buffer over-read in nxt_vsprintf in nxt/nxt_sprintf.c during error handling, as demonstrated by an njs_regexp_literal call that leads to an njs_parser_lexer_error call and then an njs_parser_scope_er...

Exploit
  • EPSS 0.37%
  • Veröffentlicht 30.06.2019 00:15:11
  • Zuletzt bearbeitet 21.11.2024 04:24:07

njs through 0.3.3, used in NGINX, has a buffer over-read in nxt_utf8_decode in nxt/nxt_utf8.c. This issue occurs after the fix for CVE-2019-12207 is in place.

Exploit
  • EPSS 0.47%
  • Veröffentlicht 20.05.2019 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:22:25

njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in njs_function_native_call in njs/njs_function.c.

Exploit
  • EPSS 0.44%
  • Veröffentlicht 20.05.2019 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:22:25

njs through 0.3.1, used in NGINX, has a heap-based buffer over-read in nxt_utf8_decode in nxt/nxt_utf8.c.

Exploit
  • EPSS 0.4%
  • Veröffentlicht 20.05.2019 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:22:25

njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in nxt_utf8_encode in nxt_utf8.c.

Exploit
  • EPSS 0.28%
  • Veröffentlicht 09.05.2019 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:21:51

njs through 0.3.1, used in NGINX, has a segmentation fault in String.prototype.toBytes for negative arguments, related to nxt_utf8_next in nxt/nxt_utf8.h and njs_string_offset in njs/njs_string.c.

Exploit
  • EPSS 0.39%
  • Veröffentlicht 09.05.2019 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:21:52

njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in Array.prototype.push after a resize, related to njs_array_prototype_push in njs/njs_array.c, because of njs_array_expand size mishandling.

Exploit
  • EPSS 0.39%
  • Veröffentlicht 09.05.2019 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:21:52

njs through 0.3.1, used in NGINX, has a heap-based buffer overflow in Array.prototype.splice after a resize, related to njs_array_prototype_splice in njs/njs_array.c, because of njs_array_expand size mishandling.