{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T01:52:41.907","vulnerabilities":[{"cve":{"id":"CVE-2023-52079","sourceIdentifier":"security-advisories@github.com","published":"2023-12-28T16:16:01.863","lastModified":"2024-11-21T08:39:07.520","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"msgpackr is a fast MessagePack NodeJS/JavaScript implementation. Prior to 1.10.1, when decoding user supplied MessagePack messages, users can trigger stuck threads by crafting messages that keep the decoder stuck in a loop. The fix is available in v1.10.1.  \nExploits seem to require structured cloning, replacing the 0x70 extension with your own (that throws an error or does something other than recursive referencing) should mitigate the issue."},{"lang":"es","value":"msgpackr es una implementación rápida de MessagePack NodeJS/JavaScript. Antes de la versión 1.10.1, al decodificar mensajes MessagePack proporcionados por el usuario, los usuarios podían activar hilos atascados creando mensajes que mantuvieran el decodificador atascado en un bucle. La solución está disponible en v1.10.1. Las explotaciones parecen requerir una clonación estructurada; reemplazar la extensión 0x70 con la suya propia (que arroja un error o hace algo más que una referencia recursiva) debería mitigar el problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-674"},{"lang":"en","value":"CWE-754"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-674"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:kriszyp:msgpackr:*:*:*:*:*:node.js:*:*","versionEndExcluding":"1.10.1","matchCriteriaId":"A069FF92-55B5-4F7B-B10E-36BF23E6185A"}]}]}],"references":[{"url":"https://github.com/kriszyp/msgpackr/commit/18f44f8800e2261341cdf489d1ba1e35a0133602","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/kriszyp/msgpackr/security/advisories/GHSA-7hpj-7hhx-2fgx","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/kriszyp/msgpackr/commit/18f44f8800e2261341cdf489d1ba1e35a0133602","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/kriszyp/msgpackr/security/advisories/GHSA-7hpj-7hhx-2fgx","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}