Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-53713 | Netplex Json-smart Uncontrolled Recursion vulnerability |
Github GHSA |
GHSA-pq2g-wx69-c263 | Netplex Json-smart Uncontrolled Recursion vulnerability |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 02 Jul 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat ocp Tools
|
|
| CPEs | cpe:/a:redhat:ocp_tools:4.12::el8 cpe:/a:redhat:ocp_tools:4.13::el8 cpe:/a:redhat:ocp_tools:4.14::el8 cpe:/a:redhat:ocp_tools:4.15::el8 cpe:/a:redhat:ocp_tools:4.16::el9 cpe:/a:redhat:ocp_tools:4.17::el9 cpe:/a:redhat:ocp_tools:4.18::el9 |
|
| Vendors & Products |
Redhat ocp Tools
|
Thu, 12 Jun 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/a:redhat:camel_quarkus:3.15 |
Wed, 11 Jun 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat apache Camel Hawtio
|
|
| CPEs | cpe:/a:redhat:apache_camel_hawtio:4.2::el6 | |
| Vendors & Products |
Redhat rhboac Hawtio
|
Redhat apache Camel Hawtio
|
Tue, 10 Jun 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat rhboac Hawtio
|
|
| CPEs | cpe:/a:redhat:rhboac_hawtio:4 | |
| Vendors & Products |
Redhat rhboac Hawtio
|
Thu, 03 Apr 2025 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat apache Camel Spring Boot Redhat camel Quarkus |
|
| CPEs | cpe:/a:redhat:apache_camel_spring_boot:4.8.5 cpe:/a:redhat:camel_quarkus:3 |
|
| Vendors & Products |
Redhat
Redhat apache Camel Spring Boot Redhat camel Quarkus |
Tue, 18 Mar 2025 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370) | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 06 Feb 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-674 | |
| Metrics |
cvssV3_1
|
Wed, 05 Feb 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security issue was found in Netplex Json-smart 2.5.0 through 2.5.1. When loading a specially crafted JSON input, containing a large number of ’{’, a stack exhaustion can be trigger, which could allow an attacker to cause a Denial of Service (DoS). This issue exists because of an incomplete fix for CVE-2023-1370. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-06T15:15:17.536Z
Reserved: 2025-01-09T00:00:00.000Z
Link: CVE-2024-57699
Updated: 2025-02-06T15:14:58.541Z
Status : Deferred
Published: 2025-02-05T22:15:33.183
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-57699
OpenCVE Enrichment
No data.
EUVD
Github GHSA