Lookup for vulnerable packages by Package URL.
| Purl | pkg:pypi/python-jose@3.0.1 |
| Type | pypi |
| Namespace | |
| Name | python-jose |
| Version | 3.0.1 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 3.4.0 |
| Latest_non_vulnerable_version | 3.4.0 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-az98-gfrm-c3ev |
| vulnerability_id |
VCID-az98-gfrm-c3ev |
| summary |
python-jose through 3.3.0 allows attackers to cause a denial of service (resource consumption) during a decode via a crafted JSON Web Encryption (JWE) token with a high compression ratio, aka a "JWT bomb." This is similar to CVE-2024-21319. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-33664 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.41335 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.41339 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.41368 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.41325 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.41338 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.4137 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.41349 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.41342 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.41291 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.41363 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-33664 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-33664, GHSA-cjwg-qfpm-7377, PYSEC-2024-233
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-az98-gfrm-c3ev |
|
| 1 |
| url |
VCID-vnjx-j746-z3fn |
| vulnerability_id |
VCID-vnjx-j746-z3fn |
| summary |
python-jose through 3.3.0 has algorithm confusion with OpenSSH ECDSA keys and other key formats. This is similar to CVE-2022-29217. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-33663 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00684 |
| scoring_system |
epss |
| scoring_elements |
0.7161 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00684 |
| scoring_system |
epss |
| scoring_elements |
0.71689 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00684 |
| scoring_system |
epss |
| scoring_elements |
0.71684 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00684 |
| scoring_system |
epss |
| scoring_elements |
0.71658 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00684 |
| scoring_system |
epss |
| scoring_elements |
0.71675 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00684 |
| scoring_system |
epss |
| scoring_elements |
0.71651 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00684 |
| scoring_system |
epss |
| scoring_elements |
0.7164 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00684 |
| scoring_system |
epss |
| scoring_elements |
0.716 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00684 |
| scoring_system |
epss |
| scoring_elements |
0.71628 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-33663 |
|
| 2 |
|
| 3 |
| reference_url |
https://github.com/mpdavis/python-jose |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |
|
| 1 |
| value |
9.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/mpdavis/python-jose |
|
| 4 |
| reference_url |
https://github.com/mpdavis/python-jose/issues/346 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
|
| 1 |
| value |
7.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N |
|
| 2 |
| value |
9.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N |
|
| 3 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 4 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T13:37:11Z/ |
|
|
| url |
https://github.com/mpdavis/python-jose/issues/346 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-33663, GHSA-6c5p-j8vq-pqhj, PYSEC-2024-232
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vnjx-j746-z3fn |
|
| 2 |
| url |
VCID-x2xb-crrp-hfaf |
| vulnerability_id |
VCID-x2xb-crrp-hfaf |
| summary |
Duplicate Advisory: python-jose denial of service via compressed JWE content
### Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-cjwg-qfpm-7377. This link is maintained to preserve external references.
### Original Description
In python-jose 3.3.0 (specifically jwe.decrypt), a vulnerability allows an attacker to cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-29370 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.3635 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36308 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36329 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36365 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36359 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36338 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36454 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36422 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36289 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00201 |
| scoring_system |
epss |
| scoring_elements |
0.42236 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-29370 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-29370, GHSA-h4pw-wxh7-4vjj
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x2xb-crrp-hfaf |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 4.5 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:pypi/python-jose@3.0.1 |