Show filters
73 Total Results
Displaying 31-40 of 73
Sort by:
Attacker Value
Unknown
CVE-2022-31116
Disclosure Date: July 05, 2022 (last updated February 24, 2025)
UltraJSON is a fast JSON encoder and decoder written in pure C with bindings for Python 3.7+. Affected versions were found to improperly decode certain characters. JSON strings that contain escaped surrogate characters not part of a proper surrogate pair were decoded incorrectly. Besides corrupting strings, this allowed for potential key confusion and value overwriting in dictionaries. All users parsing JSON from untrusted sources are vulnerable. From version 5.4.0, UltraJSON decodes lone surrogates in the same way as the standard library's `json` module does, preserving them in the parsed output. Users are advised to upgrade. There are no known workarounds for this issue.
0
Attacker Value
Unknown
CVE-2022-30241
Disclosure Date: May 04, 2022 (last updated February 23, 2025)
The jquery.json-viewer library through 1.4.0 for Node.js does not properly escape characters such as < in a JSON object, as demonstrated by a SCRIPT element.
0
Attacker Value
Unknown
CVE-2021-45958
Disclosure Date: January 01, 2022 (last updated February 23, 2025)
UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). Exploitation can, for example, use a large amount of indentation.
0
Attacker Value
Unknown
CVE-2021-3918
Disclosure Date: November 13, 2021 (last updated February 23, 2025)
json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
0
Attacker Value
Unknown
CVE-2021-23509
Disclosure Date: November 03, 2021 (last updated February 23, 2025)
This affects the package json-ptr before 3.0.0. A type confusion vulnerability can lead to a bypass of CVE-2020-7766 when the user-provided keys used in the pointer parameter are arrays.
0
Attacker Value
Unknown
CVE-2021-42836
Disclosure Date: October 22, 2021 (last updated February 23, 2025)
GJSON before 1.9.3 allows a ReDoS (regular expression denial of service) attack.
0
Attacker Value
Unknown
CVE-2021-31684
Disclosure Date: June 01, 2021 (last updated February 22, 2025)
A vulnerability was discovered in the indexOf function of JSONParserByteArray in JSON Smart versions 1.3 and 2.4 which causes a denial of service (DOS) via a crafted web request.
0
Attacker Value
Unknown
CVE-2018-1107
Disclosure Date: March 30, 2021 (last updated February 22, 2025)
It was discovered that the is-my-json-valid JavaScript library used an inefficient regular expression to validate JSON fields defined to have email format. A specially crafted JSON file could cause it to consume an excessive amount of CPU time when validated.
0
Attacker Value
Unknown
CVE-2021-27568
Disclosure Date: February 23, 2021 (last updated February 22, 2025)
An issue was discovered in netplex json-smart-v1 through 2015-10-23 and json-smart-v2 through 2.4. An exception is thrown from a function, but it is not caught, as demonstrated by NumberFormatException. When it is not caught, it may cause programs using the library to crash or expose sensitive information.
0
Attacker Value
Unknown
CVE-2020-36066
Disclosure Date: January 05, 2021 (last updated November 28, 2024)
GJSON <1.6.5 allows attackers to cause a denial of service (remote) via crafted JSON.
0