Lookup for vulnerabilities affecting packages.
| Vulnerability_id | VCID-9rtx-w9ry-rkcj |
| Summary | JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to 1.5.7, an unauthenticated attacker can exhaust server memory by sending crafted JWE tokens with ZIP compression. The existing patch for CVE-2024-28102 limits input token size to 250KB but does not validate the decompressed output size. An unauthenticated attacker can cause memory exhaustion on memory-constrained systems. A token under the 250KB input limit can decompress to approximately 100MB. This vulnerability is fixed in 1.5.7. |
| Aliases |
| 0 |
|
| 1 |
| alias |
GHSA-fjrm-76x2-c4q4 |
|
|
| Fixed_packages |
|
| Affected_packages |
|
| References |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-39373 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10838 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.1087 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10857 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.108 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00048 |
| scoring_system |
epss |
| scoring_elements |
0.14752 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21488 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21661 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21667 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21637 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-39373 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| Weaknesses |
| 0 |
| cwe_id |
409 |
| name |
Improper Handling of Highly Compressed Data (Data Amplification) |
| description |
The product does not handle or incorrectly handles a compressed input with a very high compression ratio that produces a large output. |
|
| 1 |
| cwe_id |
770 |
| name |
Allocation of Resources Without Limits or Throttling |
| description |
The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor. |
|
|
| Exploits |
|
| Severity_range_score | 4.0 - 7.5 |
| Exploitability | 0.5 |
| Weighted_severity | 6.8 |
| Risk_score | 3.4 |
| Resource_url | http://public2.vulnerablecode.io/vulnerabilities/VCID-9rtx-w9ry-rkcj |