Show filters
73 Total Results
Displaying 21-30 of 73
Sort by:
Attacker Value
Unknown
CVE-2022-44108
Disclosure Date: December 19, 2022 (last updated February 24, 2025)
pdftojson commit 94204bb was discovered to contain a stack overflow via the component Object::copy(Object*):Object.cc.
0
Attacker Value
Unknown
CVE-2022-45688
Disclosure Date: December 13, 2022 (last updated February 24, 2025)
A stack overflow in the XML.toJSONObject component of hutool-json v5.8.10 allows attackers to cause a Denial of Service (DoS) via crafted JSON or XML data.
0
Attacker Value
Unknown
CVE-2022-42743
Disclosure Date: November 03, 2022 (last updated February 24, 2025)
deep-parse-json version 1.0.2 allows an external attacker to edit or add new properties to an object. This is possible because the application does not correctly validate the incoming JSON keys, thus allowing the '__proto__' property to be edited.
0
Attacker Value
Unknown
CVE-2022-41714
Disclosure Date: November 03, 2022 (last updated February 24, 2025)
fastest-json-copy version 1.0.1 allows an external attacker to edit or add new properties to an object. This is possible because the application does not correctly validate the incoming JSON keys, thus allowing the '__proto__' property to be edited.
0
Attacker Value
Unknown
CVE-2022-38882
Disclosure Date: September 19, 2022 (last updated February 24, 2025)
The d8s-json for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package. The affected version is 0.1.0.
0
Attacker Value
Unknown
CVE-2022-25921
Disclosure Date: August 29, 2022 (last updated February 24, 2025)
All versions of package morgan-json are vulnerable to Arbitrary Code Execution due to missing sanitization of input passed to the Function constructor.
0
Attacker Value
Unknown
CVE-2022-23460
Disclosure Date: August 19, 2022 (last updated February 24, 2025)
Jsonxx or Json++ is a JSON parser, writer and reader written in C++. In affected versions of jsonxx json parsing may lead to stack exhaustion in an address sanitized (ASAN) build. This issue may lead to Denial of Service if the program using the jsonxx library crashes. This issue exists on the current commit of the jsonxx project and the project itself has been archived. Updates are not expected. Users are advised to find a replacement.
0
Attacker Value
Unknown
CVE-2022-23459
Disclosure Date: August 19, 2022 (last updated February 24, 2025)
Jsonxx or Json++ is a JSON parser, writer and reader written in C++. In affected versions of jsonxx use of the Value class may lead to memory corruption via a double free or via a use after free. The value class has a default assignment operator which may be used with pointer types which may point to alterable data where the pointer itself is not updated. This issue exists on the current commit of the jsonxx project. The project itself has been archived and updates are not expected. Users are advised to find a replacement.
0
Attacker Value
Unknown
CVE-2022-36010
Disclosure Date: August 15, 2022 (last updated February 24, 2025)
This library allows strings to be parsed as functions and stored as a specialized component, [`JsonFunctionValue`](https://github.com/oxyno-zeta/react-editable-json-tree/blob/09a0ca97835b0834ad054563e2fddc6f22bc5d8c/src/components/JsonFunctionValue.js). To do this, Javascript's [`eval`](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/eval) function is used to execute strings that begin with "function" as Javascript. This unfortunately could allow arbitrary code to be executed if it exists as a value within the JSON structure being displayed. Given that this component may often be used to display data from arbitrary, untrusted sources, this is extremely dangerous. One important note is that users who have defined a custom [`onSubmitValueParser`](https://github.com/oxyno-zeta/react-editable-json-tree/tree/09a0ca97835b0834ad054563e2fddc6f22bc5d8c#onsubmitvalueparser) callback prop on the [`JsonTree`](https://github.com/oxyno-zeta/react-editable-json-tree/…
0
Attacker Value
Unknown
CVE-2022-31117
Disclosure Date: July 05, 2022 (last updated February 24, 2025)
UltraJSON is a fast JSON encoder and decoder written in pure C with bindings for Python 3.7+. In versions prior to 5.4.0 an error occurring while reallocating a buffer for string decoding can cause the buffer to get freed twice. Due to how UltraJSON uses the internal decoder, this double free is impossible to trigger from Python. This issue has been resolved in version 5.4.0 and all users should upgrade to UltraJSON 5.4.0. There are no known workarounds for this issue.
0