{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T15:28:25.251","vulnerabilities":[{"cve":{"id":"CVE-2022-23460","sourceIdentifier":"security-advisories@github.com","published":"2022-08-19T20:15:08.243","lastModified":"2025-10-28T16:00:13.997","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Jsonxx or Json++ is a JSON parser, writer and reader written in C++. In affected versions of jsonxx json parsing may lead to stack exhaustion in an address sanitized (ASAN) build. This issue may lead to Denial of Service if the program using the jsonxx library crashes. This issue exists on the current commit of the jsonxx project and the project itself has been archived. Updates are not expected. Users are advised to find a replacement."},{"lang":"es","value":"Jsonxx o Json++ es un analizador, escritor y lector de JSON escrito en C++. En versiones afectadas de jsonxx, el análisis sintáctico de JSON puede conllevar a un agotamiento de la pila en una compilación saneada de direcciones (ASAN). Este problema puede conllevar a una denegación de servicio si el programa usando la biblioteca jsonxx es bloqueada. Este problema se presenta en el commit actual del proyecto jsonxx y el proyecto mismo ha sido archivado. No son esperadas actualizaciones. Es recomendado a usuarios buscar un sustituto."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-121"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-674"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hjiang:json\\+\\+:1.0.0:*:*:*:*:*:*:*","matchCriteriaId":"F743B6ED-6EA9-4044-B144-1A2807F18715"},{"vulnerable":true,"criteria":"cpe:2.3:a:hjiang:json\\+\\+:1.0.1:*:*:*:*:*:*:*","matchCriteriaId":"004DEE3A-195F-4FB7-BB81-95ABA4C96635"}]}]}],"references":[{"url":"https://securitylab.github.com/advisories/GHSL-2022-049_Jsonxx","source":"security-advisories@github.com","tags":["Broken Link"]},{"url":"https://securitylab.github.com/advisories/GHSL-2022-049_Jsonxx","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]}]}}]}