{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-12T19:04:13.979","vulnerabilities":[{"cve":{"id":"CVE-2024-53427","sourceIdentifier":"cve@mitre.org","published":"2025-02-26T16:15:16.237","lastModified":"2025-07-01T21:25:24.020","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"decNumberCopy in decNumber.c in jq through 1.7.1 does not properly consider that NaN is interpreted as numeric, which has a resultant stack-based buffer overflow and out-of-bounds write, as demonstrated by use of --slurp with subtraction, such as a filter of .-. when the input has a certain form of digit string with NaN (e.g., \"1 NaN123\" immediately followed by many more digits)."},{"lang":"es","value":"jq v1.7.1 contiene un desbordamiento de búfer de pila en la función decNumberCopy dentro de decNumber.c."}],"metrics":{"cvssMetricV31":[{"source":"cve@mitre.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.4,"impactScore":6.0}]},"weaknesses":[{"source":"cve@mitre.org","type":"Secondary","description":[{"lang":"en","value":"CWE-843"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jqlang:jq:*:*:*:*:*:*:*:*","versionEndIncluding":"1.7.1","matchCriteriaId":"C4AFD89F-511E-4436-9D4F-28E33F0785DE"}]}]}],"references":[{"url":"https://gist.github.com/Ekkosun/a83870ce7f3b7813b9b462a395e8ad92","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://github.com/jqlang/jq/blob/71c2ab509a8628dbbad4bc7b3f98a64aa90d3297/src/decNumber/decNumber.c#L3375","source":"cve@mitre.org","tags":["Product"]},{"url":"https://github.com/jqlang/jq/issues/3196","source":"cve@mitre.org","tags":["Exploit","Issue Tracking","Vendor Advisory"]},{"url":"https://github.com/jqlang/jq/issues/3296","source":"cve@mitre.org","tags":["Issue Tracking","Vendor Advisory"]},{"url":"https://github.com/jqlang/jq/security/advisories/GHSA-x6c3-qv5r-7q22","source":"cve@mitre.org","tags":["Vendor Advisory"]}]}}]}