Browse all 3 CVE security advisories affecting Jettison. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Jettison is a data management tool primarily used for secure file deletion and temporary data handling. Historically, it has been associated with vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, with three CVEs documented to date. Security researchers have identified issues related to improper input validation and insufficient access controls, which could allow attackers to execute arbitrary code or escalate privileges. While no major public incidents have been widely reported, the consistent pattern of vulnerabilities in input handling and access controls suggests potential risks in environments where Jettison handles sensitive or untrusted data.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-1436 | Infinite recursion in Jettison leads to denial of service when creating a crafted JSONArray — jettisonCWE-674 | 5.9 | Medium | 2023-03-16 |
| CVE-2022-40149 | Stack Buffer Overflow in Jettison — JettisonCWE-121 | 6.5 | Medium | 2022-09-16 |
| CVE-2022-40150 | Stack Buffer Overflow in Jettison — JettisonCWE-400 | 6.5 | Medium | 2022-09-16 |
This page lists every published CVE security advisory associated with Jettison. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.