Search for packages
| purl | pkg:maven/org.bitbucket.b_c/jose4j@0.9.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-8mj8-rxf8-qyau
Aliases: CVE-2024-29371 GHSA-3677-xxcr-wjqv |
jose4j is vulnerable to DoS via compressed JWE content In jose4j before 0.9.6, an attacker can cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high compression ratio. When this token is processed by the server, it results in significant memory allocation and processing time during decompression. |
Affected by 0 other vulnerabilities. |
|
VCID-h1az-byzj-z3gq
Aliases: GHSA-jgvc-jfgh-rjvv GMS-2023-1246 |
Chosen Ciphertext Attack in Jose4j RSA1_5 in jose4j is susceptible to chosen ciphertext attacks. The attack allows to decrypt RSA1_5 or RSA_OAEP encrypted ciphertexts. It may be feasible to sign with affected keys. |
Affected by 2 other vulnerabilities. |
|
VCID-nuak-t68p-tuhr
Aliases: CVE-2023-31582 GHSA-7g24-qg88-p43q |
jose4j uses weak cryptographic algorithm jose4j before v0.9.3 allows attackers to set a low iteration count of 1000 or less. |
Affected by 2 other vulnerabilities. |
|
VCID-wfmh-pkck-yfb3
Aliases: CVE-2023-51775 GHSA-6qvw-249j-h44c |
jose4j denial of service via specifically crafted JWE The jose4j component before 0.9.4 for Java allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value. |
Affected by 1 other vulnerability. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||