{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-0822","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-01-09T18:24:23.935Z","datePublished":"2026-01-10T13:32:08.881Z","dateUpdated":"2026-02-23T08:28:11.224Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T08:28:11.224Z"},"title":"quickjs-ng quickjs quickjs.c js_typed_array_sort heap-based overflow","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-122","lang":"en","description":"Heap-based Buffer Overflow"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"quickjs-ng","product":"quickjs","versions":[{"version":"0.1","status":"affected"},{"version":"0.2","status":"affected"},{"version":"0.3","status":"affected"},{"version":"0.4","status":"affected"},{"version":"0.5","status":"affected"},{"version":"0.6","status":"affected"},{"version":"0.7","status":"affected"},{"version":"0.8","status":"affected"},{"version":"0.9","status":"affected"},{"version":"0.10","status":"affected"},{"version":"0.11.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was identified in quickjs-ng quickjs up to 0.11.0. This issue affects the function js_typed_array_sort of the file quickjs.c. The manipulation leads to heap-based buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The identifier of the patch is 53eefbcd695165a3bd8c584813b472cb4a69fbf5. To fix this issue, it is recommended to deploy a patch."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C"}}],"timeline":[{"time":"2026-01-09T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-01-09T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-01-23T15:03:53.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"mcsky23 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.340356","name":"VDB-340356 | quickjs-ng quickjs quickjs.c js_typed_array_sort heap-based overflow","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.340356","name":"VDB-340356 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.731783","name":"Submit #731783 | quickjs-ng quickjs v0.11.0 Heap-based Buffer Overflow","tags":["third-party-advisory"]},{"url":"https://github.com/quickjs-ng/quickjs/issues/1297","tags":["issue-tracking"]},{"url":"https://github.com/quickjs-ng/quickjs/pull/1298","tags":["issue-tracking"]},{"url":"https://github.com/quickjs-ng/quickjs/issues/1297#issue-3780006202","tags":["exploit","issue-tracking"]},{"url":"https://github.com/quickjs-ng/quickjs/commit/53eefbcd695165a3bd8c584813b472cb4a69fbf5","tags":["patch"]},{"url":"https://github.com/quickjs-ng/quickjs/","tags":["product"]}],"tags":["x_open-source"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-12T18:30:40.288394Z","id":"CVE-2026-0822","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-12T18:30:50.158Z"}}]}}