{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T07:03:09.885","vulnerabilities":[{"cve":{"id":"CVE-2024-23684","sourceIdentifier":"disclosure@vulncheck.com","published":"2024-01-19T21:15:10.387","lastModified":"2025-11-29T02:15:51.653","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Inefficient algorithmic complexity in DecodeFromBytes function in com.upokecenter.cbor Java implementation of Concise Binary Object Representation (CBOR) versions 4.0.0 to 4.5.1 allows an attacker to cause a denial of service by passing a maliciously crafted input. Depending on an application's use of this library, this may be a remote attacker."},{"lang":"es","value":"La complejidad algorítmica ineficiente en la función DecodeFromBytes en com.upokecenter.cbor la implementación Java de Concise Binary Object Representation (CBOR) versiones 4.0.0 a 4.5.1 permite a un atacante provocar una denegación de servicio al pasar una entrada manipulada con fines malintencionados. Dependiendo del uso de esta librería por parte de una aplicación, este puede ser un atacante remoto."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"disclosure@vulncheck.com","type":"Secondary","description":[{"lang":"en","value":"CWE-407"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-407"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:peteroupc:cbor:*:*:*:*:*:.net:*:*","versionStartIncluding":"4.0.0","versionEndExcluding":"4.5.1","matchCriteriaId":"1ACE4764-C56D-427B-99DA-52922CA6C062"}]}]}],"references":[{"url":"https://github.com/advisories/GHSA-fj2w-wfgv-mwq6","source":"disclosure@vulncheck.com","tags":["Mitigation","Third Party Advisory"]},{"url":"https://github.com/peteroupc/CBOR-Java/security/advisories/GHSA-fj2w-wfgv-mwq6","source":"disclosure@vulncheck.com","tags":["Vendor Advisory"]},{"url":"https://vulncheck.com/advisories/vc-advisory-GHSA-fj2w-wfgv-mwq6","source":"disclosure@vulncheck.com","tags":["Third Party Advisory"]},{"url":"https://github.com/advisories/GHSA-fj2w-wfgv-mwq6","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation","Third Party Advisory"]},{"url":"https://github.com/peteroupc/CBOR-Java/security/advisories/GHSA-fj2w-wfgv-mwq6","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://vulncheck.com/advisories/vc-advisory-GHSA-fj2w-wfgv-mwq6","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}