Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4216-1 | cjson security update |
EUVD |
EUVD-2023-59777 | parse_string in cJSON before 1.7.18 has a heap-based buffer over-read via {"1":1, with no trailing newline if cJSON_ParseWithLength is called. |
Ubuntu USN |
USN-7973-1 | cJSON vulnerabilities |
Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 16 Jun 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Cjson Project
Cjson Project cjson |
|
| CPEs | cpe:2.3:a:cjson_project:cjson:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Cjson Project
Cjson Project cjson |
Mon, 26 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | cjson: Heap based buffer overflow at cJSON_ParseWithLength function | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 23 May 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 23 May 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | parse_string in cJSON before 1.7.18 has a heap-based buffer over-read via {"1":1, with no trailing newline if cJSON_ParseWithLength is called. | |
| Weaknesses | CWE-125 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-03T19:28:58.976Z
Reserved: 2025-05-23T00:00:00.000Z
Link: CVE-2023-53154
Updated: 2025-11-03T19:28:58.976Z
Status : Modified
Published: 2025-05-23T16:15:22.080
Modified: 2025-11-03T20:16:06.467
Link: CVE-2023-53154
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN