Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-32316 | 8.2 HIGH | jq: Integer overflow in jvp_string_append() allows Heap-based Buffer Overflow |
| CVE-2026-40164 | 7.5 HIGH | jq: Algorithmic complexity DoS via hardcoded MurmurHash3 seed |
| CVE-2026-33947 | 6.2 MEDIUM | jq: Unbounded Recursion in jv_setpath(), jv_getpath() and delpaths_sorted() |
| CVE-2026-39979 | jq: Out-of-Bounds Read in jv_parse_sized() Error Formatting for Non-NUL-Terminated Counted | |
| CVE-2026-33948 | jq: Embedded-NUL Truncation in CLI JSON Input Path Causes Prefix-Only Validation of Malfor |
No comments yet