{"uuid": "c2b2c8fb-4f6b-44aa-b19d-2d73573de5f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-46687", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13634", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46687\n\ud83d\udd25 CVSS Score: 5.6 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: quickjs-ng through 0.9.0 has a missing length check in JS_ReadString for a string, leading to a heap-based buffer overflow. QuickJS before 2025-04-26 is also affected.\n\ud83d\udccf Published: 2025-04-27T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-27T19:38:23.826Z\n\ud83d\udd17 References:\n1. https://github.com/quickjs-ng/quickjs/issues/1018\n2. https://github.com/quickjs-ng/quickjs/pull/1020\n3. https://github.com/bellard/quickjs/commit/1eb05e44fad89daafa8ee3eb74b8520b4a37ec9a\n4. https://github.com/quickjs-ng/quickjs/commit/28fa43d3ddff2c1ba91b6e3a788b2d7ba82d1465\n5. https://github.com/bellard/quickjs/issues/399\n6. https://bellard.org/quickjs/Changelog", "creation_timestamp": "2025-04-27T20:09:41.000000Z"}