2 results (0.006 seconds)

CVSS: 8.6EPSS: 0%CPEs: 2EXPL: 0

In Eclipse Parsson before 1.0.4 and 1.1.3, a document with a large depth of nested objects can allow an attacker to cause a Java stack overflow exception and denial of service. Eclipse Parsson allows processing (e.g. parse, generate, transform and query) JSON documents. En Eclipse Parsson anterior a 1.0.4 y 1.1.3, un documento con una gran profundidad de objetos anidados puede permitir que un atacante provoque una excepción de desbordamiento de pila de Java y denegación de servicio. Eclipse Parsson permite procesar (por ejemplo, analizar, generar, transformar y consultar) documentos JSON. • https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/12 • CWE-787: Out-of-bounds Write •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

In Eclipse Parsson before versions 1.1.4 and 1.0.5, Parsing JSON from untrusted sources can lead malicious actors to exploit the fact that the built-in support for parsing numbers with large scale in Java has a number of edge cases where the input text of a number can lead to much larger processing time than one would expect. To mitigate the risk, parsson put in place a size limit for the numbers as well as their scale. En Eclipse Parsson antes de las versiones 1.1.4 y 1.0.5, el Parsing JSON de fuentes no confiables puede llevar a actores maliciosos a explotar el hecho de que el soporte integrado para analizar números a gran escala en Java tiene varios casos extremos en los que el texto de entrada de un número puede llevar a un tiempo de procesamiento mucho mayor de lo que cabría esperar. Para mitigar el riesgo, parsson estableció un límite de tamaño para los números y su escala. A flaw was found in Eclipse Parsson library when processing untrusted source content. This issue may cause a Denial of Service (DoS) due to built-in support for parsing numbers with a large scale, and some cases where processing a large number may take much more time than expected. • https://github.com/eclipse-ee4j/parsson/pull/100 https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/13 https://access.redhat.com/security/cve/CVE-2023-4043 https://bugzilla.redhat.com/show_bug.cgi?id=2254594 • CWE-20: Improper Input Validation CWE-834: Excessive Iteration •