Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2026-0821

Опубликовано: 10 янв. 2026
Источник: nvd
CVSS3: 7.3
CVSS3: 9.8
CVSS2: 7.5
EPSS Низкий

Описание

A vulnerability was determined in quickjs-ng quickjs up to 0.11.0. This vulnerability affects the function js_typed_array_constructor of the file quickjs.c. Executing a manipulation can lead to heap-based buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. This patch is called c5d80831e51e48a83eab16ea867be87f091783c5. A patch should be applied to remediate this issue.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:quickjs-ng:quickjs:*:*:*:*:*:*:*:*
Версия до 0.11.0 (включая)

EPSS

Процентиль: 25%
0.00088
Низкий

7.3 High

CVSS3

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-119

Связанные уязвимости

CVSS3: 7.3
ubuntu
28 дней назад

A vulnerability was determined in quickjs-ng quickjs up to 0.11.0. This vulnerability affects the function js_typed_array_constructor of the file quickjs.c. Executing a manipulation can lead to heap-based buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. This patch is called c5d80831e51e48a83eab16ea867be87f091783c5. A patch should be applied to remediate this issue.

CVSS3: 7.3
debian
28 дней назад

A vulnerability was determined in quickjs-ng quickjs up to 0.11.0. Thi ...

CVSS3: 7.3
github
28 дней назад

A vulnerability was determined in quickjs-ng quickjs up to 0.11.0. This vulnerability affects the function js_typed_array_constructor of the file quickjs.c. Executing a manipulation can lead to heap-based buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. This patch is called c5d80831e51e48a83eab16ea867be87f091783c5. A patch should be applied to remediate this issue.

EPSS

Процентиль: 25%
0.00088
Низкий

7.3 High

CVSS3

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-119