Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 08 Jan 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bellard
Bellard quickjs |
|
| Weaknesses | CWE-125 | |
| CPEs | cpe:2.3:a:bellard:quickjs:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Bellard
Bellard quickjs |
Thu, 06 Nov 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Quickjs-ng
Quickjs-ng quickjs |
|
| Vendors & Products |
Quickjs-ng
Quickjs-ng quickjs |
Wed, 05 Nov 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 05 Nov 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in QuickJS up to eb2c89087def1829ed99630cb14b549d7a98408c. This affects the function js_array_buffer_slice of the file quickjs.c. This manipulation causes buffer over-read. The attack is restricted to local execution. The exploit has been made available to the public and could be exploited. This product adopts a rolling release strategy to maintain continuous delivery Patch name: c6fe5a98fd3ef3b7064e6e0145dfebfe12449fea. To fix this issue, it is recommended to deploy a patch. | |
| Title | QuickJS quickjs.c js_array_buffer_slice buffer over-read | |
| Weaknesses | CWE-119 CWE-126 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-11-05T19:26:04.149Z
Reserved: 2025-11-05T13:54:35.678Z
Link: CVE-2025-12745
Updated: 2025-11-05T18:50:50.230Z
Status : Analyzed
Published: 2025-11-05T19:15:50.390
Modified: 2026-01-08T21:50:36.420
Link: CVE-2025-12745
No data.
OpenCVE Enrichment
Updated: 2025-11-06T10:06:53Z