Show filters
73 Total Results
Displaying 11-20 of 73
Sort by:
Attacker Value
Unknown

CVE-2023-34609

Disclosure Date: June 14, 2023 (last updated February 25, 2025)
An issue was discovered flexjson thru 3.3 allows attackers to cause a denial of service or other unspecified impacts via crafted object that uses cyclic dependencies.
Attacker Value
Unknown

CVE-2023-27849

Disclosure Date: April 24, 2023 (last updated February 24, 2025)
rails-routes-to-json v1.0.0 was discovered to contain a remote code execution (RCE) vulnerability via the child_process function.
Attacker Value
Unknown

CVE-2023-1370

Disclosure Date: March 22, 2023 (last updated February 24, 2025)
[Json-smart](https://netplex.github.io/json-smart/) is a performance focused, JSON processor lib. When reaching a ‘[‘ or ‘{‘ character in the JSON input, the code parses an array or an object respectively. It was discovered that the code does not have any limit to the nesting of such arrays or objects. Since the parsing of nested arrays and objects is done recursively, nesting too many of them can cause a stack exhaustion (stack overflow) and crash the software.
Attacker Value
Unknown

CVE-2021-4329

Disclosure Date: March 05, 2023 (last updated February 24, 2025)
A vulnerability, which was classified as critical, has been found in json-logic-js 2.0.0. Affected by this issue is some unknown functionality of the file logic.js. The manipulation leads to command injection. Upgrading to version 2.0.1 is able to address this issue. The patch is identified as c1dd82f5b15d8a553bb7a0cfa841ab8a11a9c227. It is recommended to upgrade the affected component. VDB-222266 is the identifier assigned to this vulnerability.
Attacker Value
Unknown

CVE-2023-23088

Disclosure Date: February 03, 2023 (last updated February 24, 2025)
Buffer OverFlow Vulnerability in Barenboim json-parser master and v1.1.0 fixed in v1.1.1 allows an attacker to execute arbitrary code via the json_value_parse function.
Attacker Value
Unknown

CVE-2023-23087

Disclosure Date: February 03, 2023 (last updated February 24, 2025)
An issue was found in MojoJson v1.2.3 allows attackers to execute arbitary code via the destroy function.
Attacker Value
Unknown

CVE-2023-23086

Disclosure Date: February 03, 2023 (last updated February 24, 2025)
Buffer OverFlow Vulnerability in MojoJson v1.2.3 allows an attacker to execute arbitrary code via the SkipString function.
Attacker Value
Unknown

CVE-2015-10004

Disclosure Date: December 27, 2022 (last updated February 24, 2025)
Token validation methods are susceptible to a timing side-channel during HMAC comparison. With a large enough number of requests over a low latency connection, an attacker may use this to determine the expected HMAC.
Attacker Value
Unknown

CVE-2022-4742

Disclosure Date: December 26, 2022 (last updated February 24, 2025)
A vulnerability, which was classified as critical, has been found in json-pointer up to 0.6.1. Affected by this issue is the function set of the file index.js. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack may be launched remotely. Upgrading to version 0.6.2 is able to address this issue. The patch is identified as 859c9984b6c407fc2d5a0a7e47c7274daa681941. It is recommended to upgrade the affected component. VDB-216794 is the identifier assigned to this vulnerability.
Attacker Value
Unknown

CVE-2022-44109

Disclosure Date: December 19, 2022 (last updated February 24, 2025)
pdftojson commit 94204bb was discovered to contain a stack overflow via the component Stream::makeFilter(char*, Stream*, Object*, int).