Show filters
168 Total Results
Displaying 1-10 of 168
Sort by:
Attacker Value
Unknown
CVE-2025-1302
Disclosure Date: February 15, 2025 (last updated February 15, 2025)
Versions of the package jsonpath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of eval='safe' mode.
**Note:**
This is caused by an incomplete fix for [CVE-2024-21534](https://security.snyk.io/vuln/SNYK-JS-JSONPATHPLUS-7945884).
0
Attacker Value
Unknown
CVE-2024-13258
Disclosure Date: January 09, 2025 (last updated January 10, 2025)
Incorrect Authorization vulnerability in Drupal Drupal REST & JSON API Authentication allows Forceful Browsing.This issue affects Drupal REST & JSON API Authentication: from 0.0.0 before 2.0.13.
0
Attacker Value
Unknown
CVE-2023-27531
Disclosure Date: January 09, 2025 (last updated January 09, 2025)
There is a deserialization of untrusted data vulnerability in the Kredis JSON deserialization code
0
Attacker Value
Unknown
CVE-2024-53848
Disclosure Date: November 29, 2024 (last updated December 21, 2024)
check-jsonschema is a CLI and set of pre-commit hooks for jsonschema validation. The default cache strategy uses the basename of a remote schema as the name of the file in the cache, e.g. `https://example.org/schema.json` will be stored as `schema.json`. This naming allows for conflicts. If an attacker can get a user to run `check-jsonschema` against a malicious schema URL, e.g., `https://example.evil.org/schema.json`, they can insert their own schema into the cache and it will be picked up and used instead of the appropriate schema. Such a cache confusion attack could be used to allow data to pass validation which should have been rejected. This issue has been patched in version 0.30.0. All users are advised to upgrade. A few workarounds exist: 1. Users can use `--no-cache` to disable caching. 2. Users can use `--cache-filename` to select filenames for use in the cache, or to ensure that other usages do not overwrite the cached schema. (Note: this flag is being deprecated as part of …
0
Attacker Value
Unknown
CVE-2024-21534
Disclosure Date: October 11, 2024 (last updated November 18, 2024)
All versions of the package jsonpath-plus are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node.
**Note:**
There were several attempts to fix it in versions [10.0.0-10.1.0](https://github.com/JSONPath-Plus/JSONPath/compare/v9.0.0...v10.1.0) but it could still be exploited using [different payloads](https://github.com/JSONPath-Plus/JSONPath/issues/226).
0
Attacker Value
Unknown
CVE-2024-38984
Disclosure Date: July 30, 2024 (last updated August 09, 2024)
Prototype Pollution in lukebond json-override 0.2.0 allows attackers to to execute arbitrary code or cause a Denial of Service (DoS) via the __proto__ property.
0
Attacker Value
Unknown
CVE-2024-38723
Disclosure Date: July 22, 2024 (last updated August 15, 2024)
Server-Side Request Forgery (SSRF) vulnerability in Bernhard Kux JSON Content Importer.This issue affects JSON Content Importer: from n/a through 1.5.6.
0
Attacker Value
Unknown
CVE-2024-6624
Disclosure Date: July 11, 2024 (last updated July 13, 2024)
The JSON API User plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.9.3. This is due to improper controls on custom user meta fields. This makes it possible for unauthenticated attackers to register as administrators on the site. The plugin requires the JSON API plugin to also be installed.
0
Attacker Value
Unknown
CVE-2024-39684
Disclosure Date: July 09, 2024 (last updated July 10, 2024)
Tencent RapidJSON is vulnerable to privilege escalation due to an integer overflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer overflow vulnerability (when the file is parsed), leading to elevation of privilege.
0
Attacker Value
Unknown
CVE-2024-38517
Disclosure Date: July 09, 2024 (last updated July 10, 2024)
Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege.
0