CVE-2026-33948
- EPSS 0.1%
- Veröffentlicht 13.04.2026 23:51:04
- Zuletzt bearbeitet 21.04.2026 23:48:10
jq is a command-line JSON processor. Commits before 6374ae0bcdfe33a18eb0ae6db28493b1f34a0a5b contain a vulnerability where CLI input parsing allows validation bypass via embedded NUL bytes. When reading JSON from files or stdin, jq uses strlen() to d...
CVE-2026-40164
- EPSS 0.04%
- Veröffentlicht 13.04.2026 23:40:12
- Zuletzt bearbeitet 17.04.2026 15:26:13
jq is a command-line JSON processor. Before commit 0c7d133c3c7e37c00b6d46b658a02244fdd3c784, jq used MurmurHash3 with a hardcoded, publicly visible seed (0x432A9843) for all JSON object hash table operations, which allowed an attacker to precompute k...
CVE-2026-39979
- EPSS 0.04%
- Veröffentlicht 13.04.2026 22:18:56
- Zuletzt bearbeitet 17.04.2026 15:26:13
jq is a command-line JSON processor. In commits before 2f09060afab23fe9390cce7cb860b10416e1bf5f, the jv_parse_sized() API in libjq accepts a counted buffer with an explicit length parameter, but its error-handling path formats the input buffer using ...
CVE-2026-39956
- EPSS 0.01%
- Veröffentlicht 13.04.2026 22:10:18
- Zuletzt bearbeitet 21.04.2026 23:54:19
jq is a command-line JSON processor. In commits after 69785bf77f86e2ea1b4a20ca86775916889e91c9, the _strindices builtin in jq's src/builtin.c passes its arguments directly to jv_string_indexes() without verifying they are strings, and jv_string_index...
CVE-2026-33947
- EPSS 0.01%
- Veröffentlicht 13.04.2026 21:50:18
- Zuletzt bearbeitet 21.04.2026 23:57:19
jq is a command-line JSON processor. In versions 1.8.1 and below, functions jv_setpath(), jv_getpath(), and delpaths_sorted() in jq's src/jv_aux.c use unbounded recursion whose depth is controlled by the length of a caller-supplied path array, with n...
CVE-2026-32316
- EPSS 0.04%
- Veröffentlicht 13.04.2026 17:49:34
- Zuletzt bearbeitet 17.04.2026 15:38:09
jq is a command-line JSON processor. An integer overflow vulnerability exists through version 1.8.1 within the jvp_string_append() and jvp_string_copy_replace_bad functions, where concatenating strings with a combined length exceeding 2^31 bytes caus...
CVE-2025-9403
- EPSS 0.03%
- Veröffentlicht 25.08.2025 02:02:07
- Zuletzt bearbeitet 12.09.2025 20:11:28
A vulnerability was determined in jqlang jq up to 1.6. Impacted is the function run_jq_tests of the file jq_test.c of the component JSON Parser. Executing manipulation can lead to reachable assertion. The attack requires local access. The exploit has...
CVE-2025-49014
- EPSS 0.11%
- Veröffentlicht 19.06.2025 15:15:20
- Zuletzt bearbeitet 15.04.2026 00:35:42
jq is a command-line JSON processor. In version 1.8.0 a heap use after free vulnerability exists within the function f_strflocaltime of /src/builtin.c. This issue has been patched in commit 499c91b, no known fix version exists at time of publication.
CVE-2025-48060
- EPSS 0.59%
- Veröffentlicht 21.05.2025 17:32:43
- Zuletzt bearbeitet 03.11.2025 19:16:06
jq is a command-line JSON processor. In versions up to and including 1.7.1, a heap-buffer-overflow is present in function `jv_string_vfmt` in the jq_fuzz_execute harness from oss-fuzz. This crash happens on file jv.c, line 1456 `void* p = malloc(sz);...
CVE-2024-23337
- EPSS 0.26%
- Veröffentlicht 21.05.2025 14:34:51
- Zuletzt bearbeitet 21.05.2025 20:24:58
jq is a command-line JSON processor. In versions up to and including 1.7.1, an integer overflow arises when assigning value using an index of 2147483647, the signed integer limit. This causes a denial of service. Commit de21386681c0df0104a99d9d09db23...