Описание
A flaw has been found in quickjs-ng quickjs up to 0.11.0. Affected by this vulnerability is the function js_typed_array_constructor_ta of the file quickjs.c. This manipulation causes heap-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been published and may be used. Patch name: 53aebe66170d545bb6265906fe4324e4477de8b4. It is suggested to install a patch to address this issue.
Ссылки
- Patch
- ExploitIssue Tracking
- Issue TrackingExploit
- PatchIssue Tracking
- Permissions RequiredVDB Entry
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
Уязвимые конфигурации
EPSS
6.3 Medium
CVSS3
8.8 High
CVSS3
7.5 High
CVSS2
Дефекты
Связанные уязвимости
A flaw has been found in quickjs-ng quickjs up to 0.11.0. Affected by ...
A flaw has been found in quickjs-ng quickjs up to 0.11.0. Affected by this vulnerability is the function js_typed_array_constructor_ta of the file quickjs.c. This manipulation causes heap-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been published and may be used. Patch name: 53aebe66170d545bb6265906fe4324e4477de8b4. It is suggested to install a patch to address this issue.
EPSS
6.3 Medium
CVSS3
8.8 High
CVSS3
7.5 High
CVSS2