Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-32316 | 8.2 HIGH | jq: Integer overflow in jvp_string_append() allows Heap-based Buffer Overflow |
| CVE-2026-33947 | 6.2 MEDIUM | jq: Unbounded Recursion in jv_setpath(), jv_getpath() and delpaths_sorted() |
| CVE-2026-39956 | 6.1 MEDIUM | jq: Missing runtime type checks for _strindices lead to crash and limited memory disclosur |
| CVE-2026-39979 | jq: Out-of-Bounds Read in jv_parse_sized() Error Formatting for Non-NUL-Terminated Counted | |
| CVE-2026-33948 | jq: Embedded-NUL Truncation in CLI JSON Input Path Causes Prefix-Only Validation of Malfor |
No comments yet