Search for packages
| purl | pkg:maven/org.eclipse.parsson/parsson@1.1.3 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-gckj-wdhj-wfhe
Aliases: CVE-2023-4043 GHSA-g8p6-p27c-52fx |
Eclipse Parsson Denial of Service vulnerability In Eclipse Parsson before versions 1.1.4 and 1.0.5, Parsing JSON from untrusted sources can lead malicious actors to exploit the fact that the built-in support for parsing numbers with large scale in Java has a number of edge cases where the input text of a number can lead to much larger processing time than one would expect. To mitigate the risk, parsson put in place a size limit for the numbers as well as their scale. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-tb3a-16zd-wfcj | Eclipse Parsson stack overflow when parsing deeply nested input In Eclipse Parsson before 1.0.4 and 1.1.3, a document with a large depth of nested objects can allow an attacker to cause a Java stack overflow exception and denial of service. Eclipse Parsson allows processing (e.g. parse, generate, transform and query) JSON documents. |
CVE-2023-7272
GHSA-2rwm-xv5j-777p |