Description
A vulnerability was determined in quickjs-ng quickjs up to 0.11.0. This vulnerability affects the function js_typed_array_constructor of the file quickjs.c. Executing a manipulation can lead to heap-based buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. This patch is called c5d80831e51e48a83eab16ea867be87f091783c5. A patch should be applied to remediate this issue.
Problem types
Product status
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
0.10
0.11.0
Timeline
| 2026-01-09: | Advisory disclosed |
| 2026-01-09: | VulDB entry created |
| 2026-01-09: | VulDB entry last update |
Credits
mcsky23 (VulDB User)
References
vuldb.com/?id.340355 (VDB-340355 | quickjs-ng quickjs quickjs.c js_typed_array_constructor heap-based overflow)
vuldb.com/?ctiid.340355 (VDB-340355 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.731780 (Submit #731780 | quickjs-ng quickjs v0.11.0 Heap-based Buffer Overflow)
github.com/quickjs-ng/quickjs/issues/1296
github.com/quickjs-ng/quickjs/pull/1299
github.com/quickjs-ng/quickjs/issues/1296
github.com/...ommit/c5d80831e51e48a83eab16ea867be87f091783c5
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.