Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sat, 10 Jan 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in quickjs-ng quickjs up to 0.11.0. This issue affects the function js_typed_array_sort of the file quickjs.c. The manipulation leads to heap-based buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The identifier of the patch is 53eefbcd695165a3bd8c584813b472cb4a69fbf5. To fix this issue, it is recommended to deploy a patch. | |
| Title | quickjs-ng quickjs quickjs.c js_typed_array_sort heap-based overflow | |
| Weaknesses | CWE-119 CWE-122 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-01-10T13:32:08.881Z
Reserved: 2026-01-09T18:24:23.935Z
Link: CVE-2026-0822
No data.
Status : Received
Published: 2026-01-10T14:15:50.087
Modified: 2026-01-10T14:15:50.087
Link: CVE-2026-0822
No data.
OpenCVE Enrichment
No data.