Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-m39p-34qh-rh3w | binary-parser library has a code injection vulnerability |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 21 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 21 Jan 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Keichi
Keichi binary-parser |
|
| Vendors & Products |
Keichi
Keichi binary-parser |
Tue, 20 Jan 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 20 Jan 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 20 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A code injection vulnerability in the binary-parser library prior to version 2.3.0 allows arbitrary JavaScript code execution when untrusted values are used in parser field names or encoding parameters. The library directly interpolates these values into dynamically generated code without sanitization, enabling attackers to execute arbitrary code in the context of the Node.js process. | |
| Title | CVE-2026-1245 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2026-01-21T17:10:56.426Z
Reserved: 2026-01-20T18:48:57.730Z
Link: CVE-2026-1245
Updated: 2026-01-20T20:23:29.425Z
Status : Received
Published: 2026-01-20T19:15:50.573
Modified: 2026-01-21T17:16:07.940
Link: CVE-2026-1245
No data.
OpenCVE Enrichment
Updated: 2026-01-21T11:18:50Z
No weakness.
Github GHSA