{"id":"CVE-2024-32671","details":"Heap-based Buffer Overflow vulnerability in Samsung Open Source Escargot JavaScript engine allows Overflow Buffers.This issue affects Escargot: 4.0.0.","modified":"2026-03-14T12:28:35.956128Z","published":"2024-07-29T03:15:02.017Z","references":[{"type":"REPORT","url":"https://github.com/Samsung/escargot/pull/1359"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/samsung/escargot","events":[{"introduced":"0"},{"last_affected":"3e1fa28c8f1a8c6f34e2dd81461e90dee32b63e1"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.0.0"}]}}],"versions":["v1.0.0","v2.0.0","v3.0.0","v4.0.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-32671.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}