You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
JSON (JavaScript Object Notation) is a lightweight data-interchange format. It is easy for humans to read and write. It is easy for machines to parse and generate. It is based on a subset of the JavaScript Programming Language, Standard ECMA-262 3rd Edition - December 1999. JSON is a text format that is completely language independent but uses conventions that are familiar to programmers of the C-family of languages, including C, C++, C#, Java, JavaScript, Perl, Python, and many others. These properties make JSON an ideal data-interchange language.
Path to vulnerable library: /home/wss-scanner/.m2/repository/net/minidev/json-smart/2.2.1/json-smart-2.2.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.2.1/json-smart-2.2.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.2.1/json-smart-2.2.1.jar
An issue was discovered in netplex json-smart-v1 through 2015-10-23 and json-smart-v2 through 2.4. An exception is thrown from a function, but it is not caught, as demonstrated by NumberFormatException. When it is not caught, it may cause programs using the library to crash or expose sensitive information.
mend-for-github-combot
changed the title
CVE-2021-27568 (High) detected in json-smart-2.2.1.jar
CVE-2021-27568 (Medium) detected in json-smart-2.2.1.jar
Feb 21, 2023
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
mend-for-github-combot
changed the title
CVE-2021-27568 (Medium) detected in json-smart-2.2.1.jar
CVE-2021-27568 (Medium) detected in json-smart-2.2.1.jar - autoclosed
Jun 16, 2023
mend-for-github-combot
changed the title
CVE-2021-27568 (Medium) detected in json-smart-2.2.1.jar - autoclosed
CVE-2021-27568 (Medium) detected in json-smart-2.2.1.jar
Jun 21, 2023
CVE-2021-27568 - Medium Severity Vulnerability
Vulnerable Library - json-smart-2.2.1.jar
JSON (JavaScript Object Notation) is a lightweight data-interchange format. It is easy for humans to read and write. It is easy for machines to parse and generate. It is based on a subset of the JavaScript Programming Language, Standard ECMA-262 3rd Edition - December 1999. JSON is a text format that is completely language independent but uses conventions that are familiar to programmers of the C-family of languages, including C, C++, C#, Java, JavaScript, Perl, Python, and many others. These properties make JSON an ideal data-interchange language.
Library home page: http://www.minidev.net/
Path to dependency file: /foxtrot-sql/pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/net/minidev/json-smart/2.2.1/json-smart-2.2.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.2.1/json-smart-2.2.1.jar,/home/wss-scanner/.m2/repository/net/minidev/json-smart/2.2.1/json-smart-2.2.1.jar
Dependency Hierarchy:
Found in HEAD commit: ffb8a6014463ce8aac1bf6e7dc9a23fc4a2a8adc
Found in base branch: master
Vulnerability Details
An issue was discovered in netplex json-smart-v1 through 2015-10-23 and json-smart-v2 through 2.4. An exception is thrown from a function, but it is not caught, as demonstrated by NumberFormatException. When it is not caught, it may cause programs using the library to crash or expose sensitive information.
Publish Date: 2021-02-23
URL: CVE-2021-27568
CVSS 3 Score Details (5.9)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Release Date: 2021-02-23
Fix Resolution: net.minidev:json-smart-mini:1.3.2;net.minidev:json-smart:1.3.2,2.3.1,2.4.2;net.minidev:json-smart-action:2.3.1,2.4.2
The text was updated successfully, but these errors were encountered: