Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/json-smart@2.2-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/json-smart@2.2-2%2Bdeb11u1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (3)
Vulnerability Summary Aliases
VCID-7k5m-ys11-mfby json-smart Uncontrolled Recursion vulnerability Affected versions of [net.minidev:json-smart](https://github.com/netplex/json-smart-v1) are vulnerable to Denial of Service (DoS) due to a StackOverflowError when parsing a deeply nested JSON array or object. When reaching a ‘[‘ or ‘{‘ character in the JSON input, the code parses an array or an object respectively. It was discovered that the 3PP does not have any limit to the nesting of such arrays or objects. Since the parsing of nested arrays and objects is done recursively, nesting too many of them can cause stack exhaustion (stack overflow) and crash the software. CVE-2023-1370
GHSA-493p-pfq6-5258
VCID-9dt3-fcnc-j3hg Netplex Json-smart Uncontrolled Recursion vulnerability A security issue was found in Netplex Json-smart 2.5.0 through 2.5.1. When loading a specially crafted JSON input, containing a large number of ’{’, a stack exhaustion can be trigger, which could allow an attacker to cause a Denial of Service (DoS). This issue exists because of an incomplete fix for CVE-2023-1370. The fixed version only addresses the default modes provided by [JSONParser](https://github.com/netplex/json-smart-v2/blob/master/json-smart/src/main/java/net/minidev/json/parser/JSONParser.java#L118), such as `MODE_RFC4627`. If you create the JSONParser manually or with custom options, make sure to set the `LIMIT_JSON_DEPTH` option. CVE-2024-57699
GHSA-pq2g-wx69-c263
VCID-wg6b-e8ts-w7ct Out of bounds read in json-smart A vulnerability was discovered in the indexOf function of JSONParserByteArray in JSON Smart versions prior to 1.3.3 and 2.4.5 which causes a denial of service (DOS) via a crafted web request. CVE-2021-31684
GHSA-fg2v-w576-w4v3

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:28:13.945479+00:00 Debian Importer Fixing VCID-7k5m-ys11-mfby https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:12:29.318494+00:00 Debian Importer Fixing VCID-9dt3-fcnc-j3hg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:56:56.021502+00:00 Debian Importer Fixing VCID-wg6b-e8ts-w7ct https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:17:42.177856+00:00 Debian Importer Fixing VCID-7k5m-ys11-mfby https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:37:10.216626+00:00 Debian Importer Fixing VCID-9dt3-fcnc-j3hg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:25:31.382184+00:00 Debian Importer Fixing VCID-wg6b-e8ts-w7ct https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:27:55.921309+00:00 Debian Importer Fixing VCID-9dt3-fcnc-j3hg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:55.870624+00:00 Debian Importer Fixing VCID-7k5m-ys11-mfby https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:27:55.830537+00:00 Debian Importer Fixing VCID-wg6b-e8ts-w7ct https://security-tracker.debian.org/tracker/data/json 38.1.0