Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3m6g-2423-7cp3 | Ruby JSON has a format string injection vulnerability |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Mar 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ruby
Ruby json |
|
| Vendors & Products |
Ruby
Ruby json |
Sat, 21 Mar 2026 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Ruby JSON is a JSON implementation for Ruby. From version 2.14.0 to before versions 2.15.2.1, 2.17.1.2, and 2.19.2, a format string injection vulnerability can lead to denial of service attacks or information disclosure, when the allow_duplicate_key: false parsing option is used to parse user supplied documents. This issue has been patched in versions 2.15.2.1, 2.17.1.2, and 2.19.2. | |
| Title | Ruby JSON has a format string injection vulnerability | |
| Weaknesses | CWE-134 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-23T21:41:29.624Z
Reserved: 2026-03-17T23:23:58.313Z
Link: CVE-2026-33210
Updated: 2026-03-23T21:01:59.265Z
Status : Awaiting Analysis
Published: 2026-03-20T23:16:46.010
Modified: 2026-03-23T14:32:02.800
Link: CVE-2026-33210
OpenCVE Enrichment
Updated: 2026-03-23T09:51:58Z
Github GHSA