Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-1145

Опубликовано: 19 янв. 2026
Источник: debian
EPSS Низкий

Описание

A flaw has been found in quickjs-ng quickjs up to 0.11.0. Affected by this vulnerability is the function js_typed_array_constructor_ta of the file quickjs.c. This manipulation causes heap-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been published and may be used. Patch name: 53aebe66170d545bb6265906fe4324e4477de8b4. It is suggested to install a patch to address this issue.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
quickjsunfixedpackage
quickjsno-dsatrixiepackage
quickjsno-dsabookwormpackage

Примечания

  • https://github.com/quickjs-ng/quickjs/issues/1305

  • https://github.com/quickjs-ng/quickjs/pull/1306

  • https://github.com/paralin/quickjs/commit/53aebe66170d545bb6265906fe4324e4477de8b4

EPSS

Процентиль: 21%
0.00067
Низкий

Связанные уязвимости

CVSS3: 6.3
nvd
19 дней назад

A flaw has been found in quickjs-ng quickjs up to 0.11.0. Affected by this vulnerability is the function js_typed_array_constructor_ta of the file quickjs.c. This manipulation causes heap-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been published and may be used. Patch name: 53aebe66170d545bb6265906fe4324e4477de8b4. It is suggested to install a patch to address this issue.

CVSS3: 6.3
github
19 дней назад

A flaw has been found in quickjs-ng quickjs up to 0.11.0. Affected by this vulnerability is the function js_typed_array_constructor_ta of the file quickjs.c. This manipulation causes heap-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been published and may be used. Patch name: 53aebe66170d545bb6265906fe4324e4477de8b4. It is suggested to install a patch to address this issue.

EPSS

Процентиль: 21%
0.00067
Низкий