A vulnerability was determined in quickjs-ng quickjs up to 0.11.0. This vulnerability affects the function js_typed_array_constructor of the file quickjs.c. Executing a manipulation can lead to heap-based buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. This patch is called c5d80831e51e48a83eab16ea867be87f091783c5. A patch should be applied to remediate this issue.
References
| Link | Resource |
|---|---|
| https://github.com/quickjs-ng/quickjs/commit/c5d80831e51e48a83eab16ea867be87f091783c5 | Patch |
| https://github.com/quickjs-ng/quickjs/issues/1296 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/quickjs-ng/quickjs/issues/1296#issue-3780003395 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/quickjs-ng/quickjs/pull/1299 | Issue Tracking |
| https://vuldb.com/?ctiid.340355 | Permissions Required VDB Entry |
| https://vuldb.com/?id.340355 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.731780 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2026-01-10 13:15
Updated : 2026-01-15 22:22
NVD link : CVE-2026-0821
Mitre link : CVE-2026-0821
CVE.ORG link : CVE-2026-0821
JSON object : View
Products Affected
quickjs-ng
- quickjs
