Show filters
73 Total Results
Displaying 11-20 of 73
Sort by:
Attacker Value
Unknown
CVE-2023-34609
Disclosure Date: June 14, 2023 (last updated February 25, 2025)
An issue was discovered flexjson thru 3.3 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies.
0
Attacker Value
Unknown
CVE-2023-27849
Disclosure Date: April 24, 2023 (last updated February 24, 2025)
rails-routes-to-json v1.0.0 was discovered to contain a remote code execution (RCE) vulnerability via the child_process function.
0
Attacker Value
Unknown
CVE-2023-1370
Disclosure Date: March 22, 2023 (last updated February 24, 2025)
[Json-smart](https://netplex.github.io/json-smart/) is a performance focused, JSON processor lib.
When reaching a ‘[‘ or ‘{‘ character in the JSON input, the code parses an array or an object respectively.
It was discovered that the code does not have any limit to the nesting of such arrays or objects. Since the parsing of nested arrays and objects is done recursively, nesting too many of them can cause a stack exhaustion (stack overflow) and crash the software.
0
Attacker Value
Unknown
CVE-2021-4329
Disclosure Date: March 05, 2023 (last updated February 24, 2025)
A vulnerability, which was classified as critical, has been found in json-logic-js 2.0.0. Affected by this issue is some unknown functionality of the file logic.js. The manipulation leads to command injection. Upgrading to version 2.0.1 is able to address this issue. The patch is identified as c1dd82f5b15d8a553bb7a0cfa841ab8a11a9c227. It is recommended to upgrade the affected component. VDB-222266 is the identifier assigned to this vulnerability.
0
Attacker Value
Unknown
CVE-2023-23088
Disclosure Date: February 03, 2023 (last updated February 24, 2025)
Buffer OverFlow Vulnerability in Barenboim json-parser master and v1.1.0 fixed in v1.1.1 allows an attacker to execute arbitrary code via the json_value_parse function.
0
Attacker Value
Unknown
CVE-2023-23087
Disclosure Date: February 03, 2023 (last updated February 24, 2025)
An issue was found in MojoJson v1.2.3 allows attackers to execute arbitary code via the destroy function.
0
Attacker Value
Unknown
CVE-2023-23086
Disclosure Date: February 03, 2023 (last updated February 24, 2025)
Buffer OverFlow Vulnerability in MojoJson v1.2.3 allows an attacker to execute arbitrary code via the SkipString function.
0
Attacker Value
Unknown
CVE-2015-10004
Disclosure Date: December 27, 2022 (last updated February 24, 2025)
Token validation methods are susceptible to a timing side-channel during HMAC comparison. With a large enough number of requests over a low latency connection, an attacker may use this to determine the expected HMAC.
0
Attacker Value
Unknown
CVE-2022-4742
Disclosure Date: December 26, 2022 (last updated February 24, 2025)
A vulnerability, which was classified as critical, has been found in json-pointer up to 0.6.1. Affected by this issue is the function set of the file index.js. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack may be launched remotely. Upgrading to version 0.6.2 is able to address this issue. The patch is identified as 859c9984b6c407fc2d5a0a7e47c7274daa681941. It is recommended to upgrade the affected component. VDB-216794 is the identifier assigned to this vulnerability.
0
Attacker Value
Unknown
CVE-2022-44109
Disclosure Date: December 19, 2022 (last updated February 24, 2025)
pdftojson commit 94204bb was discovered to contain a stack overflow via the component Stream::makeFilter(char*, Stream*, Object*, int).
0