Vulnerabilities
Vulnerable Software
Microsoft:  >> Chakracore  Security Vulnerabilities
ChakraCore branch master cbb9b was discovered to contain a stack overflow vulnerability via the function Js::ScopeSlots::IsDebuggerScopeSlotArray().
CVSS Score
5.5
EPSS Score
0.003
Published
2023-07-18
ChakraCore branch master cbb9b was discovered to contain a segmentation violation via the function Js::DiagScopeVariablesWalker::GetChildrenCount().
CVSS Score
5.5
EPSS Score
0.002
Published
2023-07-18
ChakraCore branch master cbb9b was discovered to contain a segmentation violation via the function Js::ProfilingHelpers::ProfiledNewScArray().
CVSS Score
5.5
EPSS Score
0.002
Published
2023-07-18
ChakraCore branch master cbb9b was discovered to contain a segmentation violation via the function Js::EntryPointInfo::HasInlinees().
CVSS Score
5.5
EPSS Score
0.002
Published
2023-07-18
ChakraCore branch master cbb9b was discovered to contain a segmentation violation via the function BackwardPass::IsEmptyLoopAfterMemOp().
CVSS Score
5.5
EPSS Score
0.002
Published
2023-07-18
There is an ASSERTION (pFuncBody->GetYieldRegister() == oldYieldRegister) failed in Js::DebugContext::RundownSourcesAndReparse in ChakraCore version 1.12.0.0-beta.
CVSS Score
7.5
EPSS Score
0.032
Published
2022-01-20
Chakra Scripting Engine Memory Corruption Vulnerability
CVSS Score
4.2
EPSS Score
0.021
Published
2020-12-10
Chakra Scripting Engine Memory Corruption Vulnerability
CVSS Score
4.2
EPSS Score
0.029
Published
2020-11-11
Chakra Scripting Engine Memory Corruption Vulnerability
CVSS Score
4.2
EPSS Score
0.022
Published
2020-11-11
<p>A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user.</p> <p>If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>The security update addresses the vulnerability by modifying how the ChakraCore scripting engine handles objects in memory.</p>
CVSS Score
4.2
EPSS Score
0.02
Published
2020-09-11


Contact Us

Shodan ® - All rights reserved