Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in rethinkdb (src/cjson modules). This vulnerability is associated with program files cJSON.Cc.

This issue affects rethinkdb: through v2.4.4.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 27 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 27 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
Description Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in rethinkdb (src/cjson modules). This vulnerability is associated with program files cJSON.Cc. This issue affects rethinkdb: through v2.4.4.
Title A buffer overflow in rethinkdb/rethinkdb
Weaknesses CWE-120
References
Metrics cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:N/AU:Y/R:U/V:C/RE:M/U:Red'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GovTech CSG

Published:

Updated: 2026-01-27T15:25:58.557Z

Reserved: 2026-01-27T08:39:10.281Z

Link: CVE-2026-24810

cve-icon Vulnrichment

Updated: 2026-01-27T15:25:51.787Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-27T09:15:51.300

Modified: 2026-01-27T14:59:34.073

Link: CVE-2026-24810

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses