This issue affects weixin4j.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-444m-px7r-qpvv | weixin4j has Improperly Controlled Sequential Memory Allocation |
| Link | Providers |
|---|---|
| https://github.com/foxinmy/weixin4j/pull/229 |
|
Tue, 27 Jan 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Foxinmy
Foxinmy weixin4j |
|
| Vendors & Products |
Foxinmy
Foxinmy weixin4j |
Tue, 27 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 27 Jan 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improperly Controlled Sequential Memory Allocation vulnerability in foxinmy weixin4j (weixin4j-base/src/main/java/com/foxinmy/weixin4j/util modules). This vulnerability is associated with program files CharArrayBuffer.Java, ClassUtil.Java. This issue affects weixin4j. | |
| Title | An out-of-memory (OOM) issue in foxinmy/weixin4j | |
| Weaknesses | CWE-1325 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GovTech CSG
Published:
Updated: 2026-01-27T17:01:38.527Z
Reserved: 2026-01-27T08:48:56.893Z
Link: CVE-2026-24819
Updated: 2026-01-27T17:01:35.394Z
Status : Deferred
Published: 2026-01-27T09:15:52.520
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-24819
No data.
OpenCVE Enrichment
Updated: 2026-04-18T02:30:15Z
Github GHSA