Show filters
139 Total Results
Displaying 41-50 of 139
Sort by:
Attacker Value
Unknown

CVE-2015-10004

Disclosure Date: December 27, 2022 (last updated February 24, 2025)
Token validation methods are susceptible to a timing side-channel during HMAC comparison. With a large enough number of requests over a low latency connection, an attacker may use this to determine the expected HMAC.
Attacker Value
Unknown

CVE-2022-4742

Disclosure Date: December 26, 2022 (last updated February 24, 2025)
A vulnerability, which was classified as critical, has been found in json-pointer up to 0.6.1. Affected by this issue is the function set of the file index.js. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack may be launched remotely. Upgrading to version 0.6.2 is able to address this issue. The patch is identified as 859c9984b6c407fc2d5a0a7e47c7274daa681941. It is recommended to upgrade the affected component. VDB-216794 is the identifier assigned to this vulnerability.
Attacker Value
Unknown

CVE-2021-4279

Disclosure Date: December 25, 2022 (last updated February 24, 2025)
A vulnerability has been found in Starcounter-Jack JSON-Patch up to 3.1.0 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.1 is able to address this issue. The name of the patch is 7ad6af41eabb2d799f698740a91284d762c955c9. It is recommended to upgrade the affected component. VDB-216778 is the identifier assigned to this vulnerability.
Attacker Value
Unknown

CVE-2022-44109

Disclosure Date: December 19, 2022 (last updated February 24, 2025)
pdftojson commit 94204bb was discovered to contain a stack overflow via the component Stream::makeFilter(char*, Stream*, Object*, int).
Attacker Value
Unknown

CVE-2022-44108

Disclosure Date: December 19, 2022 (last updated February 24, 2025)
pdftojson commit 94204bb was discovered to contain a stack overflow via the component Object::copy(Object*):Object.cc.
Attacker Value
Unknown

CVE-2022-45688

Disclosure Date: December 13, 2022 (last updated February 24, 2025)
A stack overflow in the XML.toJSONObject component of hutool-json v5.8.10 allows attackers to cause a Denial of Service (DoS) via crafted JSON or XML data.
Attacker Value
Unknown

CVE-2022-42743

Disclosure Date: November 03, 2022 (last updated February 24, 2025)
deep-parse-json version 1.0.2 allows an external attacker to edit or add new properties to an object. This is possible because the application does not correctly validate the incoming JSON keys, thus allowing the '__proto__' property to be edited.
Attacker Value
Unknown

CVE-2022-41714

Disclosure Date: November 03, 2022 (last updated February 24, 2025)
fastest-json-copy version 1.0.1 allows an external attacker to edit or add new properties to an object. This is possible because the application does not correctly validate the incoming JSON keys, thus allowing the '__proto__' property to be edited.
Attacker Value
Unknown

CVE-2022-41382

Disclosure Date: October 11, 2022 (last updated February 24, 2025)
The d8s-json package for Python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-file-system package. The affected version is 0.1.0.
Attacker Value
Unknown

CVE-2022-38882

Disclosure Date: September 19, 2022 (last updated February 24, 2025)
The d8s-json for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. The backdoor is the democritus-strings package. The affected version is 0.1.0.