Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.eclipse.parsson/project@1.1.3
Typemaven
Namespaceorg.eclipse.parsson
Nameproject
Version1.1.3
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.1.4
Latest_non_vulnerable_version1.1.4
Affected_by_vulnerabilities
0
url VCID-gckj-wdhj-wfhe
vulnerability_id VCID-gckj-wdhj-wfhe
summary
Eclipse Parsson Denial of Service vulnerability
In Eclipse Parsson before versions 1.1.4 and 1.0.5, Parsing JSON from untrusted sources can lead malicious actors to exploit the fact that the built-in support for parsing numbers with large scale in Java has a number of edge cases where the input text of a number can lead to much larger processing time than one would expect.


To mitigate the risk, parsson put in place a size limit for the numbers as well as their scale.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4043.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4043.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4043
reference_id
reference_type
scores
0
value 0.0015
scoring_system epss
scoring_elements 0.35246
published_at 2026-04-24T12:55:00Z
1
value 0.0015
scoring_system epss
scoring_elements 0.35492
published_at 2026-04-07T12:55:00Z
2
value 0.0015
scoring_system epss
scoring_elements 0.35537
published_at 2026-04-08T12:55:00Z
3
value 0.0015
scoring_system epss
scoring_elements 0.35562
published_at 2026-04-09T12:55:00Z
4
value 0.0015
scoring_system epss
scoring_elements 0.35572
published_at 2026-04-11T12:55:00Z
5
value 0.0015
scoring_system epss
scoring_elements 0.35527
published_at 2026-04-12T12:55:00Z
6
value 0.0015
scoring_system epss
scoring_elements 0.35505
published_at 2026-04-13T12:55:00Z
7
value 0.0015
scoring_system epss
scoring_elements 0.35544
published_at 2026-04-16T12:55:00Z
8
value 0.0015
scoring_system epss
scoring_elements 0.35534
published_at 2026-04-18T12:55:00Z
9
value 0.0015
scoring_system epss
scoring_elements 0.35483
published_at 2026-04-21T12:55:00Z
10
value 0.0015
scoring_system epss
scoring_elements 0.35584
published_at 2026-04-02T12:55:00Z
11
value 0.0015
scoring_system epss
scoring_elements 0.3561
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4043
2
reference_url https://github.com/eclipse-ee4j/parsson/pull/100
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-05T14:21:34Z/
url https://github.com/eclipse-ee4j/parsson/pull/100
3
reference_url https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/13
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-05T14:21:34Z/
url https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/13
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2254594
reference_id 2254594
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2254594
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-4043
reference_id CVE-2023-4043
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-4043
6
reference_url https://github.com/advisories/GHSA-g8p6-p27c-52fx
reference_id GHSA-g8p6-p27c-52fx
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g8p6-p27c-52fx
7
reference_url https://access.redhat.com/errata/RHSA-2024:0530
reference_id RHSA-2024:0530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0530
8
reference_url https://access.redhat.com/errata/RHSA-2024:0722
reference_id RHSA-2024:0722
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0722
9
reference_url https://access.redhat.com/errata/RHSA-2024:0789
reference_id RHSA-2024:0789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0789
10
reference_url https://access.redhat.com/errata/RHSA-2024:0793
reference_id RHSA-2024:0793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0793
11
reference_url https://access.redhat.com/errata/RHSA-2024:1192
reference_id RHSA-2024:1192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1192
12
reference_url https://access.redhat.com/errata/RHSA-2024:1193
reference_id RHSA-2024:1193
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1193
fixed_packages
0
url pkg:maven/org.eclipse.parsson/project@1.1.4
purl pkg:maven/org.eclipse.parsson/project@1.1.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.eclipse.parsson/project@1.1.4
aliases CVE-2023-4043, GHSA-g8p6-p27c-52fx
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gckj-wdhj-wfhe
Fixing_vulnerabilities
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.eclipse.parsson/project@1.1.3