{"id":"CVE-2026-0821","details":"A vulnerability was determined in quickjs-ng quickjs up to 0.11.0. This vulnerability affects the function js_typed_array_constructor of the file quickjs.c. Executing a manipulation can lead to heap-based buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. This patch is called c5d80831e51e48a83eab16ea867be87f091783c5. A patch should be applied to remediate this issue.","modified":"2026-04-10T05:36:54.170704Z","published":"2026-01-10T13:15:49.040Z","references":[{"type":"WEB","url":"https://github.com/quickjs-ng/quickjs/"},{"type":"ADVISORY","url":"https://vuldb.com/?id.340355"},{"type":"ADVISORY","url":"https://vuldb.com/?submit.731780"},{"type":"REPORT","url":"https://github.com/quickjs-ng/quickjs/issues/1296"},{"type":"REPORT","url":"https://github.com/quickjs-ng/quickjs/issues/1296#issue-3780003395"},{"type":"REPORT","url":"https://github.com/quickjs-ng/quickjs/pull/1299"},{"type":"REPORT","url":"https://vuldb.com/?ctiid.340355"},{"type":"FIX","url":"https://github.com/quickjs-ng/quickjs/commit/c5d80831e51e48a83eab16ea867be87f091783c5"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/quickjs-ng/quickjs","events":[{"introduced":"0"},{"last_affected":"6a9fe9af5ca0bf7c49ae697edef44864272317d1"},{"fixed":"c5d80831e51e48a83eab16ea867be87f091783c5"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.11.0"}]}}],"versions":["v0.1.0","v0.10.0","v0.10.1","v0.11.0","v0.2.0","v0.3.0","v0.4.0","v0.4.1","v0.5.0","v0.6.0","v0.6.1","v0.7.0","v0.8.0","v0.9.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-0821.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}