{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/6658?format=json","vulnerability_id":"VCID-cte2-nf4m-t7hm","summary":"Data Handling Stack Buffer Overflow\nThis package contains an overflow condition that is triggered as user-supplied input is not properly validated when handling specially crafted data. This may allow a remote attacker to cause a stack-based buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.","aliases":[{"alias":"OSVDB-101157"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/19927?format=json","purl":"pkg:gem/json@1.1.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-d6tn-s1q2-a3hc"},{"vulnerability":"VCID-ebq1-gkhe-pua7"},{"vulnerability":"VCID-xghz-9k48-bqej"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:gem/json@1.1.0"}],"affected_packages":[],"references":[{"reference_url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/json/OSVDB-101157.yml","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/json/OSVDB-101157.yml"}],"weaknesses":[],"exploits":[],"severity_range_score":null,"exploitability":null,"weighted_severity":null,"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cte2-nf4m-t7hm"}