Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 08 Jan 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bellard
Bellard quickjs |
|
| Weaknesses | CWE-125 | |
| CPEs | cpe:2.3:a:bellard:quickjs:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Bellard
Bellard quickjs |
Thu, 06 Nov 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Quickjs-ng
Quickjs-ng quickjs |
|
| Vendors & Products |
Quickjs-ng
Quickjs-ng quickjs |
Wed, 05 Nov 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 05 Nov 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in QuickJS up to eb2c89087def1829ed99630cb14b549d7a98408c. This affects the function js_array_buffer_slice of the file quickjs.c. This manipulation causes buffer over-read. The attack is restricted to local execution. The exploit has been made available to the public and could be exploited. This product adopts a rolling release strategy to maintain continuous delivery Patch name: c6fe5a98fd3ef3b7064e6e0145dfebfe12449fea. To fix this issue, it is recommended to deploy a patch. | |
| Title | QuickJS quickjs.c js_array_buffer_slice buffer over-read | |
| Weaknesses | CWE-119 CWE-126 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-11-05T19:26:04.149Z
Reserved: 2025-11-05T13:54:35.678Z
Link: CVE-2025-12745
Updated: 2025-11-05T18:50:50.230Z
Status : Analyzed
Published: 2025-11-05T19:15:50.390
Modified: 2026-04-29T01:00:01.613
Link: CVE-2025-12745
No data.
OpenCVE Enrichment
Updated: 2025-11-06T10:06:53Z