Количество 16
Количество 16
ELSA-2024-3267
ELSA-2024-3267: idm:DL1 and idm:client security update (MODERATE)

CVE-2023-6681
A vulnerability was found in JWCrypto. This flaw allows an attacker to cause a denial of service (DoS) attack and possible password brute-force and dictionary attacks to be more resource-intensive. This issue can result in a large amount of computational consumption, causing a denial of service attack.

CVE-2023-6681
A vulnerability was found in JWCrypto. This flaw allows an attacker to cause a denial of service (DoS) attack and possible password brute-force and dictionary attacks to be more resource-intensive. This issue can result in a large amount of computational consumption, causing a denial of service attack.

CVE-2023-6681
A vulnerability was found in JWCrypto. This flaw allows an attacker to cause a denial of service (DoS) attack and possible password brute-force and dictionary attacks to be more resource-intensive. This issue can result in a large amount of computational consumption, causing a denial of service attack.
CVE-2023-6681
A vulnerability was found in JWCrypto. This flaw allows an attacker to ...

CVE-2024-28102
JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length.

CVE-2024-28102
JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length.

CVE-2024-28102
JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length.
CVE-2024-28102
JWCrypto implements JWK, JWS, and JWE specifications using python-cryp ...
GHSA-cw2r-4p82-qv79
DoS with algorithms that use PBKDF2 due to unbounded PBES2 Count value
ELSA-2024-9281
ELSA-2024-9281: python-jwcrypto security update (MODERATE)

RLSA-2024:2559
Moderate: python-jwcrypto security update
GHSA-j857-7rvv-vj97
JWCrypto vulnerable to JWT bomb Attack in `deserialize` function
ELSA-2024-2559
ELSA-2024-2559: python-jwcrypto security update (MODERATE)

BDU:2024-01978
Уязвимость функции deserialize() python-библиотеки для криптографии Jwcrypto, позволяющая нарушителю вызвать отказ в обслуживании

ROS-20240918-16
Уязвимость python3-jwcrypto
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2024-3267 ELSA-2024-3267: idm:DL1 and idm:client security update (MODERATE) | около 1 года назад | |||
![]() | CVE-2023-6681 A vulnerability was found in JWCrypto. This flaw allows an attacker to cause a denial of service (DoS) attack and possible password brute-force and dictionary attacks to be more resource-intensive. This issue can result in a large amount of computational consumption, causing a denial of service attack. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-6681 A vulnerability was found in JWCrypto. This flaw allows an attacker to cause a denial of service (DoS) attack and possible password brute-force and dictionary attacks to be more resource-intensive. This issue can result in a large amount of computational consumption, causing a denial of service attack. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад |
![]() | CVE-2023-6681 A vulnerability was found in JWCrypto. This flaw allows an attacker to cause a denial of service (DoS) attack and possible password brute-force and dictionary attacks to be more resource-intensive. This issue can result in a large amount of computational consumption, causing a denial of service attack. | CVSS3: 5.3 | 0% Низкий | больше 1 года назад |
CVE-2023-6681 A vulnerability was found in JWCrypto. This flaw allows an attacker to ... | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
![]() | CVE-2024-28102 JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length. | CVSS3: 6.8 | 0% Низкий | больше 1 года назад |
![]() | CVE-2024-28102 JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length. | CVSS3: 6.8 | 0% Низкий | больше 1 года назад |
![]() | CVE-2024-28102 JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length. | CVSS3: 6.8 | 0% Низкий | больше 1 года назад |
CVE-2024-28102 JWCrypto implements JWK, JWS, and JWE specifications using python-cryp ... | CVSS3: 6.8 | 0% Низкий | больше 1 года назад | |
GHSA-cw2r-4p82-qv79 DoS with algorithms that use PBKDF2 due to unbounded PBES2 Count value | CVSS3: 5.3 | 0% Низкий | больше 1 года назад | |
ELSA-2024-9281 ELSA-2024-9281: python-jwcrypto security update (MODERATE) | 7 месяцев назад | |||
![]() | RLSA-2024:2559 Moderate: python-jwcrypto security update | 0% Низкий | около 1 года назад | |
GHSA-j857-7rvv-vj97 JWCrypto vulnerable to JWT bomb Attack in `deserialize` function | CVSS3: 6.8 | 0% Низкий | больше 1 года назад | |
ELSA-2024-2559 ELSA-2024-2559: python-jwcrypto security update (MODERATE) | около 1 года назад | |||
![]() | BDU:2024-01978 Уязвимость функции deserialize() python-библиотеки для криптографии Jwcrypto, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 6.8 | 0% Низкий | больше 1 года назад |
![]() | ROS-20240918-16 Уязвимость python3-jwcrypto | CVSS3: 6.8 | 0% Низкий | 9 месяцев назад |
Уязвимостей на страницу