Metrics
Affected Vendors & Products
Fri, 06 Jun 2025 22:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-126 | |
Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 03 Jun 2025 06:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
threat_severity
|
threat_severity
|
Thu, 22 May 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 21 May 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 21 May 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | jq is a command-line JSON processor. In versions up to and including 1.7.1, a heap-buffer-overflow is present in function `jv_string_vfmt` in the jq_fuzz_execute harness from oss-fuzz. This crash happens on file jv.c, line 1456 `void* p = malloc(sz);`. As of time of publication, no patched versions are available. | |
Title | AddressSanitizer: stack-buffer-overflow in jq_fuzz_execute (jv_string_vfmt) | |
Weaknesses | CWE-121 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-05-21T17:32:43.602Z
Updated: 2025-05-21T18:39:28.901Z
Reserved: 2025-05-15T16:06:40.940Z
Link: CVE-2025-48060

Updated: 2025-05-21T18:39:15.439Z

Status : Awaiting Analysis
Published: 2025-05-21T18:15:53.037
Modified: 2025-05-21T20:24:58.133
Link: CVE-2025-48060
