Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-tdfp-krep-5ffe
Summary
Improper Check for Unusual or Exceptional Conditions in json-smart
An issue was discovered in netplex json-smart-v1 through 2015-10-23 and json-smart-v2 through 2.4. An exception is thrown from a function, but it is not caught, as demonstrated by NumberFormatException. When it is not caught, it may cause programs using the library to crash or expose sensitive information.
Aliases
0
alias CVE-2021-27568
1
alias GHSA-v528-7hrm-frqp
Fixed_packages
0
url pkg:maven/net.minidev/json-smart@1.3.2
purl pkg:maven/net.minidev/json-smart@1.3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7k5m-ys11-mfby
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/net.minidev/json-smart@1.3.2
1
url pkg:maven/net.minidev/json-smart@2.3.1
purl pkg:maven/net.minidev/json-smart@2.3.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7k5m-ys11-mfby
1
vulnerability VCID-wg6b-e8ts-w7ct
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/net.minidev/json-smart@2.3.1
2
url pkg:maven/net.minidev/json-smart@2.4.1
purl pkg:maven/net.minidev/json-smart@2.4.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7k5m-ys11-mfby
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/net.minidev/json-smart@2.4.1
3
url pkg:maven/net.minidev/json-smart-mini@1.3.2
purl pkg:maven/net.minidev/json-smart-mini@1.3.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/net.minidev/json-smart-mini@1.3.2
Affected_packages
0
url pkg:maven/net.minidev/json-smart@1.0.6.3
purl pkg:maven/net.minidev/json-smart@1.0.6.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7k5m-ys11-mfby
1
vulnerability VCID-tdfp-krep-5ffe
2
vulnerability VCID-wg6b-e8ts-w7ct
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/net.minidev/json-smart@1.0.6.3
1
url pkg:maven/net.minidev/json-smart@1.0.8
purl pkg:maven/net.minidev/json-smart@1.0.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7k5m-ys11-mfby
1
vulnerability VCID-tdfp-krep-5ffe
2
vulnerability VCID-wg6b-e8ts-w7ct
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/net.minidev/json-smart@1.0.8
2
url pkg:maven/net.minidev/json-smart@1.0.9
purl pkg:maven/net.minidev/json-smart@1.0.9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7k5m-ys11-mfby
1
vulnerability VCID-tdfp-krep-5ffe
2
vulnerability VCID-wg6b-e8ts-w7ct
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/net.minidev/json-smart@1.0.9
3
url pkg:maven/net.minidev/json-smart@1.0.9-1
purl pkg:maven/net.minidev/json-smart@1.0.9-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7k5m-ys11-mfby
1
vulnerability VCID-tdfp-krep-5ffe
2
vulnerability VCID-wg6b-e8ts-w7ct
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/net.minidev/json-smart@1.0.9-1
4
url pkg:maven/net.minidev/json-smart@1.1
purl pkg:maven/net.minidev/json-smart@1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7k5m-ys11-mfby
1
vulnerability VCID-tdfp-krep-5ffe
2
vulnerability VCID-wg6b-e8ts-w7ct
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/net.minidev/json-smart@1.1
5
url pkg:maven/net.minidev/json-smart@1.1.1
purl pkg:maven/net.minidev/json-smart@1.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7k5m-ys11-mfby
1
vulnerability VCID-tdfp-krep-5ffe
2
vulnerability VCID-wg6b-e8ts-w7ct
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/net.minidev/json-smart@1.1.1
6
url pkg:maven/net.minidev/json-smart@1.2
purl pkg:maven/net.minidev/json-smart@1.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7k5m-ys11-mfby
1
vulnerability VCID-tdfp-krep-5ffe
2
vulnerability VCID-wg6b-e8ts-w7ct
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/net.minidev/json-smart@1.2
7
url pkg:maven/net.minidev/json-smart@1.3
purl pkg:maven/net.minidev/json-smart@1.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7k5m-ys11-mfby
1
vulnerability VCID-tdfp-krep-5ffe
2
vulnerability VCID-wg6b-e8ts-w7ct
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/net.minidev/json-smart@1.3
8
url pkg:maven/net.minidev/json-smart@1.3.1
purl pkg:maven/net.minidev/json-smart@1.3.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7k5m-ys11-mfby
1
vulnerability VCID-tdfp-krep-5ffe
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/net.minidev/json-smart@1.3.1
9
url pkg:maven/net.minidev/json-smart@2.0
purl pkg:maven/net.minidev/json-smart@2.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7k5m-ys11-mfby
1
vulnerability VCID-tdfp-krep-5ffe
2
vulnerability VCID-wg6b-e8ts-w7ct
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/net.minidev/json-smart@2.0
10
url pkg:maven/net.minidev/json-smart@2.0.0
purl pkg:maven/net.minidev/json-smart@2.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tdfp-krep-5ffe
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/net.minidev/json-smart@2.0.0
11
url pkg:maven/net.minidev/json-smart@2.1.0
purl pkg:maven/net.minidev/json-smart@2.1.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7k5m-ys11-mfby
1
vulnerability VCID-tdfp-krep-5ffe
2
vulnerability VCID-wg6b-e8ts-w7ct
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/net.minidev/json-smart@2.1.0
12
url pkg:maven/net.minidev/json-smart@2.1.1
purl pkg:maven/net.minidev/json-smart@2.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7k5m-ys11-mfby
1
vulnerability VCID-tdfp-krep-5ffe
2
vulnerability VCID-wg6b-e8ts-w7ct
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/net.minidev/json-smart@2.1.1
13
url pkg:maven/net.minidev/json-smart@2.2
purl pkg:maven/net.minidev/json-smart@2.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7k5m-ys11-mfby
1
vulnerability VCID-tdfp-krep-5ffe
2
vulnerability VCID-wg6b-e8ts-w7ct
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/net.minidev/json-smart@2.2
14
url pkg:maven/net.minidev/json-smart@2.2.1
purl pkg:maven/net.minidev/json-smart@2.2.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7k5m-ys11-mfby
1
vulnerability VCID-tdfp-krep-5ffe
2
vulnerability VCID-wg6b-e8ts-w7ct
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/net.minidev/json-smart@2.2.1
15
url pkg:maven/net.minidev/json-smart@2.3
purl pkg:maven/net.minidev/json-smart@2.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7k5m-ys11-mfby
1
vulnerability VCID-tdfp-krep-5ffe
2
vulnerability VCID-wg6b-e8ts-w7ct
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/net.minidev/json-smart@2.3
16
url pkg:maven/net.minidev/json-smart@2.4
purl pkg:maven/net.minidev/json-smart@2.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tdfp-krep-5ffe
1
vulnerability VCID-wg6b-e8ts-w7ct
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/net.minidev/json-smart@2.4
17
url pkg:maven/net.minidev/json-smart@2.4.0
purl pkg:maven/net.minidev/json-smart@2.4.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tdfp-krep-5ffe
1
vulnerability VCID-wg6b-e8ts-w7ct
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/net.minidev/json-smart@2.4.0
18
url pkg:maven/net.minidev/json-smart-mini@1.0.6.3
purl pkg:maven/net.minidev/json-smart-mini@1.0.6.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tdfp-krep-5ffe
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/net.minidev/json-smart-mini@1.0.6.3
19
url pkg:maven/net.minidev/json-smart-mini@1.0.8
purl pkg:maven/net.minidev/json-smart-mini@1.0.8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tdfp-krep-5ffe
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/net.minidev/json-smart-mini@1.0.8
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27568.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27568.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-27568
reference_id
reference_type
scores
0
value 0.00647
scoring_system epss
scoring_elements 0.70851
published_at 2026-04-24T12:55:00Z
1
value 0.00647
scoring_system epss
scoring_elements 0.70798
published_at 2026-04-21T12:55:00Z
2
value 0.00647
scoring_system epss
scoring_elements 0.70821
published_at 2026-04-18T12:55:00Z
3
value 0.00647
scoring_system epss
scoring_elements 0.70814
published_at 2026-04-16T12:55:00Z
4
value 0.00647
scoring_system epss
scoring_elements 0.70769
published_at 2026-04-13T12:55:00Z
5
value 0.00647
scoring_system epss
scoring_elements 0.70784
published_at 2026-04-12T12:55:00Z
6
value 0.00647
scoring_system epss
scoring_elements 0.70708
published_at 2026-04-01T12:55:00Z
7
value 0.00647
scoring_system epss
scoring_elements 0.70723
published_at 2026-04-02T12:55:00Z
8
value 0.00647
scoring_system epss
scoring_elements 0.70741
published_at 2026-04-04T12:55:00Z
9
value 0.00647
scoring_system epss
scoring_elements 0.70717
published_at 2026-04-07T12:55:00Z
10
value 0.00647
scoring_system epss
scoring_elements 0.70762
published_at 2026-04-08T12:55:00Z
11
value 0.00647
scoring_system epss
scoring_elements 0.70801
published_at 2026-04-11T12:55:00Z
12
value 0.00647
scoring_system epss
scoring_elements 0.70778
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-27568
2
reference_url https://github.com/netplex/json-smart-v1/commit/768db58ee0e3e344fcdb574b7629765308a1d0af
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/netplex/json-smart-v1/commit/768db58ee0e3e344fcdb574b7629765308a1d0af
3
reference_url https://github.com/netplex/json-smart-v1/issues/7
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/netplex/json-smart-v1/issues/7
4
reference_url https://github.com/netplex/json-smart-v2
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/netplex/json-smart-v2
5
reference_url https://github.com/netplex/json-smart-v2/issues/60
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/netplex/json-smart-v2/issues/60
6
reference_url https://github.com/netplex/json-smart-v2/issues/62
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/netplex/json-smart-v2/issues/62
7
reference_url https://github.com/netplex/json-smart-v2/pull/72
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/netplex/json-smart-v2/pull/72
8
reference_url https://lists.apache.org/thread.html/rb6287f5aa628c8d9af52b5401ec6cc51b6fc28ab20d318943453e396@%3Ccommits.druid.apache.org%3E
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/rb6287f5aa628c8d9af52b5401ec6cc51b6fc28ab20d318943453e396@%3Ccommits.druid.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/re237267da268c690df5e1c6ea6a38a7fc11617725e8049490f58a6fa@%3Ccommits.druid.apache.org%3E
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/re237267da268c690df5e1c6ea6a38a7fc11617725e8049490f58a6fa@%3Ccommits.druid.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/rf70210b4d63191c0bfb2a0d5745e104484e71703bf5ad9cb01c980c6@%3Ccommits.druid.apache.org%3E
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/rf70210b4d63191c0bfb2a0d5745e104484e71703bf5ad9cb01c980c6@%3Ccommits.druid.apache.org%3E
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-27568
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-27568
12
reference_url https://www.oracle.com/security-alerts/cpuapr2022.html
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuapr2022.html
13
reference_url https://www.oracle.com/security-alerts/cpujan2022.html
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujan2022.html
14
reference_url https://www.oracle.com//security-alerts/cpujul2021.html
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.oracle.com//security-alerts/cpujul2021.html
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1939839
reference_id 1939839
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1939839
16
reference_url https://github.com/advisories/GHSA-v528-7hrm-frqp
reference_id GHSA-v528-7hrm-frqp
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-v528-7hrm-frqp
17
reference_url https://access.redhat.com/errata/RHSA-2021:3225
reference_id RHSA-2021:3225
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3225
18
reference_url https://access.redhat.com/errata/RHSA-2021:4767
reference_id RHSA-2021:4767
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4767
19
reference_url https://access.redhat.com/errata/RHSA-2021:4918
reference_id RHSA-2021:4918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4918
20
reference_url https://access.redhat.com/errata/RHSA-2021:5134
reference_id RHSA-2021:5134
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:5134
Weaknesses
0
cwe_id 754
name Improper Check for Unusual or Exceptional Conditions
description The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product.
1
cwe_id 200
name Exposure of Sensitive Information to an Unauthorized Actor
description The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
2
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
3
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
Exploits
Severity_range_score4.0 - 6.9
Exploitability0.5
Weighted_severity6.2
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-tdfp-krep-5ffe