Nixpkgs security tracker

Login with GitHub
⚠️ You are using a production deployment that is still only suitable for demo purposes. Any work done in this might be wiped later without notice.

Suggestions search

With package: dotnetPackages.NewtonsoftJson

Found 1 matching suggestions

View:
Compact
Detailed
Dismissed
Permalink CVE-2024-21907
7.5 HIGH
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 4 months ago by @Erethon Activity log
  • Created automatic suggestion
  • @Erethon dismissed
  • @Erethon accepted
  • @Erethon dismissed
  • @Erethon accepted
  • @Erethon dismissed
  • @Erethon accepted
  • @Erethon dismissed
  • @Erethon accepted
  • @Erethon dismissed
  • @Erethon accepted
  • @Erethon dismissed
Improper Handling of Exceptional Conditions in Newtonsoft.Json

Newtonsoft.Json before version 13.0.1 is affected by a mishandling of exceptional conditions vulnerability. Crafted data that is passed to the JsonConvert.DeserializeObject method may trigger a StackOverflow exception resulting in denial of service. Depending on the usage of the library, an unauthenticated and remote attacker may be able to cause the denial of service condition.

References

Affected products

Newtonsoft.Json
  • <13.0.1

Matching in nixpkgs

dismiss test