-
CVSS Score
-The analysis is based on the crash stack trace provided in the GitHub issue #548, which was referenced in the vulnerability details. This stack trace shows the sequence of function calls leading to the out-of-bounds read. Since no specific commit patches were available, the crash log provides the most direct evidence of functions involved at runtime when the vulnerability is triggered. The functions listed are those present in the call stack at the time of the crash, starting from the entry point json_loads down to string_get where the segmentation fault occurred. The vulnerability description explicitly names json_loads as the source of the parsing error.
Ongoing coverage of React2Shell