Search for packages
| purl | pkg:deb/debian/libjose4j-java@0.9.6-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-8mj8-rxf8-qyau | jose4j is vulnerable to DoS via compressed JWE content In jose4j before 0.9.6, an attacker can cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. |
CVE-2024-29371
GHSA-3677-xxcr-wjqv |
| VCID-nuak-t68p-tuhr | jose4j uses weak cryptographic algorithm jose4j before v0.9.3 allows attackers to set a low iteration count of 1000 or less. |
CVE-2023-31582
GHSA-7g24-qg88-p43q |
| VCID-wfmh-pkck-yfb3 | jose4j denial of service via specifically crafted JWE The jose4j component before 0.9.4 for Java allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value. |
CVE-2023-51775
GHSA-6qvw-249j-h44c |