2018-09-06 13:06:29 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "kurt@seifried.org" ,
"DATE_ASSIGNED" : "2018-09-03T16:07:16.972937" ,
"DATE_REQUESTED" : "2018-08-21T09:40:58" ,
"ID" : "CVE-2018-1000663" ,
"REQUESTER" : "m.dominiak@samsung.com" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "jsish" ,
"version" : {
"version_data" : [
{
"version_value" : "2.4.70 2.047"
}
]
}
}
]
} ,
"vendor_name" : "jsish"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "jsish version 2.4.70 2.047 contains a Buffer Overflow vulnerability in function _jsi_evalcode from jsiEval.c that can result in Crash due to segmentation fault. This attack appear to be exploitable via The victim must execute crafted javascript code."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "Buffer Overflow"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "https://jsish.org/fossil/jsi/tktview/c253f6d80c9018d841e857b69e7ad6436ed95cb9" ,
"refsource" : "CONFIRM" ,
"url" : "https://jsish.org/fossil/jsi/tktview/c253f6d80c9018d841e857b69e7ad6436ed95cb9"
}
]
}
}