Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-wp9q-eurd-43dx
Vulnerability ID VCID-wp9q-eurd-43dx
Aliases CVE-2022-45693
GHSA-grr4-wv38-f68w
Summary Jettison Out-of-bounds Write vulnerability Jettison before v1.5.2 was discovered to contain a stack overflow via the map parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted string.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45693.json
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2022-45693
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2022-45693
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2022-45693
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2022-45693
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2022-45693
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2022-45693
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2022-45693
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2022-45693
epss 0.00139 https://api.first.org/data/v1/epss?cve=CVE-2022-45693
epss 0.00139 https://api.first.org/data/v1/epss?cve=CVE-2022-45693
epss 0.00139 https://api.first.org/data/v1/epss?cve=CVE-2022-45693
cvssv3.1 6.2 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-grr4-wv38-f68w
cvssv3.1 7.5 https://github.com/jettison-json/jettison
generic_textual HIGH https://github.com/jettison-json/jettison
cvssv3.1 7.5 https://github.com/jettison-json/jettison/issues/52
generic_textual HIGH https://github.com/jettison-json/jettison/issues/52
ssvc Track https://github.com/jettison-json/jettison/issues/52
cvssv3.1 7.5 https://lists.debian.org/debian-lts-announce/2022/12/msg00045.html
generic_textual HIGH https://lists.debian.org/debian-lts-announce/2022/12/msg00045.html
ssvc Track https://lists.debian.org/debian-lts-announce/2022/12/msg00045.html
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2022-45693
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2022-45693
cvssv3.1 7.5 https://www.debian.org/security/2023/dsa-5312
generic_textual HIGH https://www.debian.org/security/2023/dsa-5312
ssvc Track https://www.debian.org/security/2023/dsa-5312
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45693.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/jettison-json/jettison
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/jettison-json/jettison/issues/52
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T14:58:02Z/ Found at https://github.com/jettison-json/jettison/issues/52
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://lists.debian.org/debian-lts-announce/2022/12/msg00045.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T14:58:02Z/ Found at https://lists.debian.org/debian-lts-announce/2022/12/msg00045.html
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2022-45693
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://www.debian.org/security/2023/dsa-5312
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T14:58:02Z/ Found at https://www.debian.org/security/2023/dsa-5312
Exploit Prediction Scoring System (EPSS)
Percentile 0.32713
EPSS Score 0.00131
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:05:57.271962+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/12/GHSA-grr4-wv38-f68w/GHSA-grr4-wv38-f68w.json 38.0.0