Jansson, possibly 2.4 and previous versions, does not restrict the ability to trigger hash collisions predictably, which allows context-dependent malicious users to cause a denial of service (CPU consumption) via a crafted JSON document.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
jansson project jansson 2.3 |
||
jansson project jansson |
||
jansson project jansson 2.3.1 |
||
jansson project jansson 2.0 |
||
jansson project jansson 2.0.1 |
||
jansson project jansson 2.2 |
||
jansson project jansson 2.2.1 |
||
jansson project jansson 2.1 |