Количество 10
Количество 10
GHSA-j857-7rvv-vj97
JWCrypto vulnerable to JWT bomb Attack in `deserialize` function

CVE-2024-28102
JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length.

CVE-2024-28102
JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length.

CVE-2024-28102
JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length.
CVE-2024-28102
JWCrypto implements JWK, JWS, and JWE specifications using python-cryp ...

RLSA-2024:2559
Moderate: python-jwcrypto security update
ELSA-2024-2559
ELSA-2024-2559: python-jwcrypto security update (MODERATE)

BDU:2024-01978
Уязвимость функции deserialize() python-библиотеки для криптографии Jwcrypto, позволяющая нарушителю вызвать отказ в обслуживании

ROS-20240918-16
Уязвимость python3-jwcrypto
ELSA-2024-3267
ELSA-2024-3267: idm:DL1 and idm:client security update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-j857-7rvv-vj97 JWCrypto vulnerable to JWT bomb Attack in `deserialize` function | CVSS3: 6.8 | 0% Низкий | больше 1 года назад | |
![]() | CVE-2024-28102 JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length. | CVSS3: 6.8 | 0% Низкий | больше 1 года назад |
![]() | CVE-2024-28102 JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length. | CVSS3: 6.8 | 0% Низкий | больше 1 года назад |
![]() | CVE-2024-28102 JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length. | CVSS3: 6.8 | 0% Низкий | больше 1 года назад |
CVE-2024-28102 JWCrypto implements JWK, JWS, and JWE specifications using python-cryp ... | CVSS3: 6.8 | 0% Низкий | больше 1 года назад | |
![]() | RLSA-2024:2559 Moderate: python-jwcrypto security update | 0% Низкий | около 1 года назад | |
ELSA-2024-2559 ELSA-2024-2559: python-jwcrypto security update (MODERATE) | около 1 года назад | |||
![]() | BDU:2024-01978 Уязвимость функции deserialize() python-библиотеки для криптографии Jwcrypto, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 6.8 | 0% Низкий | больше 1 года назад |
![]() | ROS-20240918-16 Уязвимость python3-jwcrypto | CVSS3: 6.8 | 0% Низкий | 9 месяцев назад |
ELSA-2024-3267 ELSA-2024-3267: idm:DL1 and idm:client security update (MODERATE) | около 1 года назад |
Уязвимостей на страницу