Jqlang

Jq

14 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.1%
  • Veröffentlicht 13.04.2026 23:51:04
  • Zuletzt bearbeitet 21.04.2026 23:48:10

jq is a command-line JSON processor. Commits before 6374ae0bcdfe33a18eb0ae6db28493b1f34a0a5b contain a vulnerability where CLI input parsing allows validation bypass via embedded NUL bytes. When reading JSON from files or stdin, jq uses strlen() to d...

  • EPSS 0.04%
  • Veröffentlicht 13.04.2026 23:40:12
  • Zuletzt bearbeitet 17.04.2026 15:26:13

jq is a command-line JSON processor. Before commit 0c7d133c3c7e37c00b6d46b658a02244fdd3c784, jq used MurmurHash3 with a hardcoded, publicly visible seed (0x432A9843) for all JSON object hash table operations, which allowed an attacker to precompute k...

  • EPSS 0.04%
  • Veröffentlicht 13.04.2026 22:18:56
  • Zuletzt bearbeitet 17.04.2026 15:26:13

jq is a command-line JSON processor. In commits before 2f09060afab23fe9390cce7cb860b10416e1bf5f, the jv_parse_sized() API in libjq accepts a counted buffer with an explicit length parameter, but its error-handling path formats the input buffer using ...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 13.04.2026 22:10:18
  • Zuletzt bearbeitet 21.04.2026 23:54:19

jq is a command-line JSON processor. In commits after 69785bf77f86e2ea1b4a20ca86775916889e91c9, the _strindices builtin in jq's src/builtin.c passes its arguments directly to jv_string_indexes() without verifying they are strings, and jv_string_index...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 13.04.2026 21:50:18
  • Zuletzt bearbeitet 21.04.2026 23:57:19

jq is a command-line JSON processor. In versions 1.8.1 and below, functions jv_setpath(), jv_getpath(), and delpaths_sorted() in jq's src/jv_aux.c use unbounded recursion whose depth is controlled by the length of a caller-supplied path array, with n...

  • EPSS 0.04%
  • Veröffentlicht 13.04.2026 17:49:34
  • Zuletzt bearbeitet 17.04.2026 15:38:09

jq is a command-line JSON processor. An integer overflow vulnerability exists through version 1.8.1 within the jvp_string_append() and jvp_string_copy_replace_bad functions, where concatenating strings with a combined length exceeding 2^31 bytes caus...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 25.08.2025 02:02:07
  • Zuletzt bearbeitet 12.09.2025 20:11:28

A vulnerability was determined in jqlang jq up to 1.6. Impacted is the function run_jq_tests of the file jq_test.c of the component JSON Parser. Executing manipulation can lead to reachable assertion. The attack requires local access. The exploit has...

  • EPSS 0.11%
  • Veröffentlicht 19.06.2025 15:15:20
  • Zuletzt bearbeitet 15.04.2026 00:35:42

jq is a command-line JSON processor. In version 1.8.0 a heap use after free vulnerability exists within the function f_strflocaltime of /src/builtin.c. This issue has been patched in commit 499c91b, no known fix version exists at time of publication.

Exploit
  • EPSS 0.59%
  • Veröffentlicht 21.05.2025 17:32:43
  • Zuletzt bearbeitet 03.11.2025 19:16:06

jq is a command-line JSON processor. In versions up to and including 1.7.1, a heap-buffer-overflow is present in function `jv_string_vfmt` in the jq_fuzz_execute harness from oss-fuzz. This crash happens on file jv.c, line 1456 `void* p = malloc(sz);...

  • EPSS 0.26%
  • Veröffentlicht 21.05.2025 14:34:51
  • Zuletzt bearbeitet 21.05.2025 20:24:58

jq is a command-line JSON processor. In versions up to and including 1.7.1, an integer overflow arises when assigning value using an index of 2147483647, the signed integer limit. This causes a denial of service. Commit de21386681c0df0104a99d9d09db23...