Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2026-0821

Опубликовано: 10 янв. 2026
Источник: ubuntu
Приоритет: medium
CVSS2: 7.5
CVSS3: 7.3

Описание

A vulnerability was determined in quickjs-ng quickjs up to 0.11.0. This vulnerability affects the function js_typed_array_constructor of the file quickjs.c. Executing a manipulation can lead to heap-based buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. This patch is called c5d80831e51e48a83eab16ea867be87f091783c5. A patch should be applied to remediate this issue.

РелизСтатусПримечание
devel

needed

esm-apps/noble

needed

jammy

DNE

noble

needed

plucky

ignored

end of life, was needs-triage
questing

needed

upstream

released

0.12.1

Показывать по

7.5 High

CVSS2

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.3
redhat
3 месяца назад

A vulnerability was determined in quickjs-ng quickjs up to 0.11.0. This vulnerability affects the function js_typed_array_constructor of the file quickjs.c. Executing a manipulation can lead to heap-based buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. This patch is called c5d80831e51e48a83eab16ea867be87f091783c5. A patch should be applied to remediate this issue.

CVSS3: 7.3
nvd
3 месяца назад

A vulnerability was determined in quickjs-ng quickjs up to 0.11.0. This vulnerability affects the function js_typed_array_constructor of the file quickjs.c. Executing a manipulation can lead to heap-based buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. This patch is called c5d80831e51e48a83eab16ea867be87f091783c5. A patch should be applied to remediate this issue.

CVSS3: 7.3
debian
3 месяца назад

A vulnerability was determined in quickjs-ng quickjs up to 0.11.0. Thi ...

CVSS3: 7.3
github
3 месяца назад

A vulnerability was determined in quickjs-ng quickjs up to 0.11.0. This vulnerability affects the function js_typed_array_constructor of the file quickjs.c. Executing a manipulation can lead to heap-based buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. This patch is called c5d80831e51e48a83eab16ea867be87f091783c5. A patch should be applied to remediate this issue.

7.5 High

CVSS2

7.3 High

CVSS3

Уязвимость CVE-2026-0821