Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.eclipse.parsson/parsson@1.1.3
Typemaven
Namespaceorg.eclipse.parsson
Nameparsson
Version1.1.3
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.1.4
Latest_non_vulnerable_version1.1.4
Affected_by_vulnerabilities
0
url VCID-gckj-wdhj-wfhe
vulnerability_id VCID-gckj-wdhj-wfhe
summary
Eclipse Parsson Denial of Service vulnerability
In Eclipse Parsson before versions 1.1.4 and 1.0.5, Parsing JSON from untrusted sources can lead malicious actors to exploit the fact that the built-in support for parsing numbers with large scale in Java has a number of edge cases where the input text of a number can lead to much larger processing time than one would expect.


To mitigate the risk, parsson put in place a size limit for the numbers as well as their scale.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4043.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4043.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4043
reference_id
reference_type
scores
0
value 0.0015
scoring_system epss
scoring_elements 0.35246
published_at 2026-04-24T12:55:00Z
1
value 0.0015
scoring_system epss
scoring_elements 0.35492
published_at 2026-04-07T12:55:00Z
2
value 0.0015
scoring_system epss
scoring_elements 0.35537
published_at 2026-04-08T12:55:00Z
3
value 0.0015
scoring_system epss
scoring_elements 0.35562
published_at 2026-04-09T12:55:00Z
4
value 0.0015
scoring_system epss
scoring_elements 0.35572
published_at 2026-04-11T12:55:00Z
5
value 0.0015
scoring_system epss
scoring_elements 0.35527
published_at 2026-04-12T12:55:00Z
6
value 0.0015
scoring_system epss
scoring_elements 0.35505
published_at 2026-04-13T12:55:00Z
7
value 0.0015
scoring_system epss
scoring_elements 0.35544
published_at 2026-04-16T12:55:00Z
8
value 0.0015
scoring_system epss
scoring_elements 0.35534
published_at 2026-04-18T12:55:00Z
9
value 0.0015
scoring_system epss
scoring_elements 0.35483
published_at 2026-04-21T12:55:00Z
10
value 0.0015
scoring_system epss
scoring_elements 0.35584
published_at 2026-04-02T12:55:00Z
11
value 0.0015
scoring_system epss
scoring_elements 0.3561
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4043
2
reference_url https://github.com/eclipse-ee4j/parsson/pull/100
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-05T14:21:34Z/
url https://github.com/eclipse-ee4j/parsson/pull/100
3
reference_url https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/13
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-05T14:21:34Z/
url https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/13
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2254594
reference_id 2254594
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2254594
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-4043
reference_id CVE-2023-4043
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-4043
6
reference_url https://github.com/advisories/GHSA-g8p6-p27c-52fx
reference_id GHSA-g8p6-p27c-52fx
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g8p6-p27c-52fx
7
reference_url https://access.redhat.com/errata/RHSA-2024:0530
reference_id RHSA-2024:0530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0530
8
reference_url https://access.redhat.com/errata/RHSA-2024:0722
reference_id RHSA-2024:0722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0722
9
reference_url https://access.redhat.com/errata/RHSA-2024:0789
reference_id RHSA-2024:0789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0789
10
reference_url https://access.redhat.com/errata/RHSA-2024:0793
reference_id RHSA-2024:0793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0793
11
reference_url https://access.redhat.com/errata/RHSA-2024:1192
reference_id RHSA-2024:1192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1192
12
reference_url https://access.redhat.com/errata/RHSA-2024:1193
reference_id RHSA-2024:1193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1193
fixed_packages
0
url pkg:maven/org.eclipse.parsson/parsson@1.1.4
purl pkg:maven/org.eclipse.parsson/parsson@1.1.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.eclipse.parsson/parsson@1.1.4
aliases CVE-2023-4043, GHSA-g8p6-p27c-52fx
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gckj-wdhj-wfhe
Fixing_vulnerabilities
0
url VCID-tb3a-16zd-wfcj
vulnerability_id VCID-tb3a-16zd-wfcj
summary
Eclipse Parsson stack overflow when parsing deeply nested input
In Eclipse Parsson before 1.0.4 and 1.1.3, a document with a large depth of nested objects can allow an attacker to cause a Java stack overflow exception and denial of service. Eclipse Parsson allows processing (e.g. parse, generate, transform and query) JSON documents.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-7272.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-7272.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-7272
reference_id
reference_type
scores
0
value 0.00566
scoring_system epss
scoring_elements 0.68537
published_at 2026-04-24T12:55:00Z
1
value 0.00566
scoring_system epss
scoring_elements 0.68489
published_at 2026-04-21T12:55:00Z
2
value 0.00566
scoring_system epss
scoring_elements 0.68491
published_at 2026-04-12T12:55:00Z
3
value 0.00566
scoring_system epss
scoring_elements 0.6851
published_at 2026-04-18T12:55:00Z
4
value 0.00566
scoring_system epss
scoring_elements 0.68496
published_at 2026-04-16T12:55:00Z
5
value 0.00566
scoring_system epss
scoring_elements 0.68414
published_at 2026-04-02T12:55:00Z
6
value 0.00566
scoring_system epss
scoring_elements 0.68458
published_at 2026-04-13T12:55:00Z
7
value 0.00566
scoring_system epss
scoring_elements 0.68434
published_at 2026-04-04T12:55:00Z
8
value 0.00566
scoring_system epss
scoring_elements 0.6841
published_at 2026-04-07T12:55:00Z
9
value 0.00566
scoring_system epss
scoring_elements 0.68461
published_at 2026-04-08T12:55:00Z
10
value 0.00566
scoring_system epss
scoring_elements 0.68477
published_at 2026-04-09T12:55:00Z
11
value 0.00566
scoring_system epss
scoring_elements 0.68503
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-7272
2
reference_url https://github.com/eclipse-ee4j/parsson
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value 9.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/eclipse-ee4j/parsson
3
reference_url https://github.com/eclipse-ee4j/parsson/commit/755d2a86dff74fecc4114fbe7d21e071380c4e45
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value 9.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/eclipse-ee4j/parsson/commit/755d2a86dff74fecc4114fbe7d21e071380c4e45
4
reference_url https://github.com/eclipse-ee4j/parsson/commit/d0ec79badd44a940c82842954430762a2199f4e1
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value 9.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/eclipse-ee4j/parsson/commit/d0ec79badd44a940c82842954430762a2199f4e1
5
reference_url https://github.com/eclipse-ee4j/parsson/issues/91
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value 9.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/eclipse-ee4j/parsson/issues/91
6
reference_url https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/12
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value 9.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-18T13:26:07Z/
url https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/12
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-7272
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value 9.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-7272
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2298458
reference_id 2298458
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2298458
9
reference_url https://github.com/advisories/GHSA-2rwm-xv5j-777p
reference_id GHSA-2rwm-xv5j-777p
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-2rwm-xv5j-777p
fixed_packages
0
url pkg:maven/org.eclipse.parsson/parsson@1.0.4
purl pkg:maven/org.eclipse.parsson/parsson@1.0.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gckj-wdhj-wfhe
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.eclipse.parsson/parsson@1.0.4
1
url pkg:maven/org.eclipse.parsson/parsson@1.1.3
purl pkg:maven/org.eclipse.parsson/parsson@1.1.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gckj-wdhj-wfhe
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.eclipse.parsson/parsson@1.1.3
aliases CVE-2023-7272, GHSA-2rwm-xv5j-777p
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tb3a-16zd-wfcj
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.eclipse.parsson/parsson@1.1.3