Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-67vh-536w-6pc4

Опубликовано: 10 янв. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 2.1
CVSS3: 6.3

Описание

A vulnerability was identified in quickjs-ng quickjs up to 0.11.0. This issue affects the function js_typed_array_sort of the file quickjs.c. The manipulation leads to heap-based buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The identifier of the patch is 53eefbcd695165a3bd8c584813b472cb4a69fbf5. To fix this issue, it is recommended to deploy a patch.

A vulnerability was identified in quickjs-ng quickjs up to 0.11.0. This issue affects the function js_typed_array_sort of the file quickjs.c. The manipulation leads to heap-based buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The identifier of the patch is 53eefbcd695165a3bd8c584813b472cb4a69fbf5. To fix this issue, it is recommended to deploy a patch.

EPSS

Процентиль: 17%
0.00053
Низкий

2.1 Low

CVSS4

6.3 Medium

CVSS3

Дефекты

CWE-119
CWE-787

Связанные уязвимости

CVSS3: 6.3
ubuntu
28 дней назад

A vulnerability was identified in quickjs-ng quickjs up to 0.11.0. This issue affects the function js_typed_array_sort of the file quickjs.c. The manipulation leads to heap-based buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The identifier of the patch is 53eefbcd695165a3bd8c584813b472cb4a69fbf5. To fix this issue, it is recommended to deploy a patch.

CVSS3: 6.3
nvd
28 дней назад

A vulnerability was identified in quickjs-ng quickjs up to 0.11.0. This issue affects the function js_typed_array_sort of the file quickjs.c. The manipulation leads to heap-based buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The identifier of the patch is 53eefbcd695165a3bd8c584813b472cb4a69fbf5. To fix this issue, it is recommended to deploy a patch.

CVSS3: 6.3
debian
28 дней назад

A vulnerability was identified in quickjs-ng quickjs up to 0.11.0. Thi ...

EPSS

Процентиль: 17%
0.00053
Низкий

2.1 Low

CVSS4

6.3 Medium

CVSS3

Дефекты

CWE-119
CWE-787