Show filters
83 Total Results
Displaying 1-10 of 83
Sort by:
Attacker Value
Unknown

CVE-2023-35116

Disclosure Date: June 14, 2023 (last updated November 08, 2023)
jackson-databind through 2.15.2 allows attackers to cause a denial of service or other unspecified impact via a crafted object that uses cyclic dependencies. NOTE: the vendor's perspective is that this is not a valid vulnerability report, because the steps of constructing a cyclic data structure and trying to serialize it cannot be achieved by an external attacker.
Attacker Value
Unknown

CVE-2023-3894

Disclosure Date: August 08, 2023 (last updated October 08, 2023)
Those using jackson-dataformats-text to parse TOML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
Attacker Value
Unknown

CVE-2021-46877

Disclosure Date: March 18, 2023 (last updated October 08, 2023)
jackson-databind 2.10.x through 2.12.x before 2.12.6 and 2.13.x before 2.13.1 allows attackers to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization.
Attacker Value
Unknown

CVE-2020-10650

Disclosure Date: December 26, 2022 (last updated October 08, 2023)
A deserialization flaw was discovered in jackson-databind through 2.9.10.4. It could allow an unauthenticated user to perform code execution via ignite-jta or quartz-core: org.apache.ignite.cache.jta.jndi.CacheJndiTmLookup, org.apache.ignite.cache.jta.jndi.CacheJndiTmFactory, and org.quartz.utils.JNDIConnectionProvider.
Attacker Value
Unknown

CVE-2022-42003

Disclosure Date: October 02, 2022 (last updated December 20, 2023)
In FasterXML jackson-databind before versions 2.13.4.1 and 2.12.17.1, resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled.
Attacker Value
Unknown

CVE-2022-42004

Disclosure Date: October 02, 2022 (last updated December 22, 2024)
In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization.
Attacker Value
Unknown

CVE-2022-40152

Disclosure Date: August 11, 2022 (last updated October 08, 2023)
Those using Woodstox to parse XML data may be vulnerable to Denial of Service attacks (DOS) if DTD support is enabled. If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
Attacker Value
Unknown

CVE-2020-36518

Disclosure Date: March 11, 2022 (last updated November 29, 2024)
jackson-databind before 2.13.0 allows a Java StackOverflow exception and denial of service via a large depth of nested objects.
Attacker Value
Unknown

CVE-2020-28491

Disclosure Date: February 18, 2021 (last updated November 28, 2024)
This affects the package com.fasterxml.jackson.dataformat:jackson-dataformat-cbor from 0 and before 2.11.4, from 2.12.0-rc1 and before 2.12.1. Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception.
Attacker Value
Unknown

CVE-2021-20190

Disclosure Date: January 19, 2021 (last updated November 08, 2023)
A flaw was found in jackson-databind before 2.9.10.7. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.