Json C Json Cproject Json C

Do you want an email whenever new security vulnerabilities are reported in Json Cproject Json C?

By the Year

In 2024 there have been 0 vulnerabilities in Json Cproject Json C . Last year Json C had 1 security vulnerability published. Right now, Json C is on track to have less security vulnerabilities in 2024 than it did last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 1 9.80
2022 0 0.00
2021 0 0.00
2020 1 7.80
2019 0 0.00
2018 0 0.00

It may take a day or so for new Json C vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Json Cproject Json C Security Vulnerabilities

An issue was discovered in json-c from 20200420 (post 0.14 unreleased code) through 0.15-20200726

CVE-2021-32292 9.8 - Critical - August 22, 2023

An issue was discovered in json-c from 20200420 (post 0.14 unreleased code) through 0.15-20200726. A stack-buffer-overflow exists in the auxiliary sample program json_parse which is located in the function parseit.

Memory Corruption

json-c through 0.14 has an integer overflow and out-of-bounds write

CVE-2020-12762 7.8 - High - May 09, 2020

json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.

Memory Corruption

The hash functionality in json-c before 0.12

CVE-2013-6371 - April 22, 2014

The hash functionality in json-c before 0.12 allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted JSON data, involving collisions.

Cryptographic Issues

Buffer overflow in the printbuf APIs in json-c before 0.12

CVE-2013-6370 - April 22, 2014

Buffer overflow in the printbuf APIs in json-c before 0.12 allows remote attackers to cause a denial of service via unspecified vectors.

Buffer Overflow

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Json C or by Json Cproject? Click the Watch button to subscribe.

subscribe