Lookup for vulnerable packages by Package URL.

GET /api/packages/243140?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/243140?format=api",
    "purl": "pkg:npm/jose@1.10.1",
    "type": "npm",
    "namespace": "",
    "name": "jose",
    "version": "1.10.1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "2.0.7",
    "latest_non_vulnerable_version": "5.0.0",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/16418?format=api",
            "vulnerability_id": "VCID-1rpd-33se-hkex",
            "summary": "jose vulnerable to resource exhaustion via specifically crafted JWE with compressed plaintext\nA vulnerability has been identified in the JSON Web Encryption (JWE) decryption interfaces, specifically related to the [support for decompressing plaintext after its decryption](https://www.rfc-editor.org/rfc/rfc7516.html#section-4.1.3). This allows an adversary to exploit specific scenarios where the compression ratio becomes exceptionally high. As a result, the length of the JWE token, which is determined by the compressed content's size, can land below application-defined limits. In such cases, other existing application level mechanisms for preventing resource exhaustion may be rendered ineffective.\n\nNote that as per [RFC 8725](https://www.rfc-editor.org/rfc/rfc8725.html#name-avoid-compression-of-encryp) compression of data SHOULD NOT be done before encryption, because such compressed data often reveals information about the plaintext. For this reason the v5.x major version of `jose` removed support for compressed payloads entirely and is therefore NOT affected by this advisory.\n\n### Impact\n\nUnder certain conditions it is possible to have the user's environment consume unreasonable amount of CPU time or memory during JWE Decryption operations.\n\n### Affected users\n\nThe impact is limited only to Node.js users utilizing the JWE decryption APIs to decrypt JWEs from untrusted sources.\n\nYou are NOT affected if any of the following applies to you\n\n- Your code uses jose version v5.x where JWE Compression is not supported anymore\n- Your code runs in an environment other than Node.js (e.g. Deno, CF Workers), which is the only runtime where JWE Compression is implemented out of the box\n- Your code does not use the JWE decryption APIs\n- Your code only accepts JWEs produced by trusted sources\n\n### Patches\n\n`v2.0.7` and `v4.15.5` releases limit the decompression routine to only allow decompressing up to 250 kB of plaintext. In v4.x it is possible to further adjust this limit via the `inflateRaw` decryption option implementation. In v2.x it is possible to further adjust this limit via the `inflateRawSyncLimit` decryption option.\n\n### Workarounds\n\nIf you cannot upgrade and do not want to support compressed JWEs you may detect and reject these tokens early by checking the token's protected header\n\n```js\nconst { zip } = jose.decodeProtectedHeader(token)\nif (zip !== undefined) {\n  throw new Error('JWE Compression is not supported')\n}\n```\n\nIf you wish to continue supporting JWEs with compressed payloads in these legacy release lines you must upgrade (v1.x and v2.x to version v2.0.7, v3.x and v4.x to version v4.15.5) and review the limits put forth by the patched releases.\n\n### For more information\nIf you have any questions or comments about this advisory please open a discussion in the project's [repository](https://github.com/panva/jose/discussions/new?category=q-a&title=GHSA-hhhv-q57g-882q%20advisory%20question)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28176.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28176.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-28176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68762",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6872",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68741",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68602",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68691",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68677",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6869",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68666",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68648",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68597",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6862",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68735",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68729",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68681",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68702",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-28176"
                },
                {
                    "reference_url": "https://github.com/panva/jose",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/panva/jose"
                },
                {
                    "reference_url": "https://github.com/panva/jose/commit/02a65794f7873cdaf12e81e80ad076fcdc4a9314",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-11T14:26:36Z/"
                        }
                    ],
                    "url": "https://github.com/panva/jose/commit/02a65794f7873cdaf12e81e80ad076fcdc4a9314"
                },
                {
                    "reference_url": "https://github.com/panva/jose/commit/1b91d88d2f8233f3477a5f4579aa5f8057b2ee8b",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-11T14:26:36Z/"
                        }
                    ],
                    "url": "https://github.com/panva/jose/commit/1b91d88d2f8233f3477a5f4579aa5f8057b2ee8b"
                },
                {
                    "reference_url": "https://github.com/panva/jose/security/advisories/GHSA-hhhv-q57g-882q",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-11T14:26:36Z/"
                        }
                    ],
                    "url": "https://github.com/panva/jose/security/advisories/GHSA-hhhv-q57g-882q"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I6MMWFBOXJA6ZCXNVPDFJ4XMK5PVG5RG",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I6MMWFBOXJA6ZCXNVPDFJ4XMK5PVG5RG"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXKGNCRU7OTM5AHC7YIYBNOWI742PRMY",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXKGNCRU7OTM5AHC7YIYBNOWI742PRMY"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UG5FSEYJ3GP27FZXC5YAAMMEC5XWKJHG",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UG5FSEYJ3GP27FZXC5YAAMMEC5XWKJHG"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJO2U5ACZVACNQXJ5EBRFLFW6DP5BROY",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJO2U5ACZVACNQXJ5EBRFLFW6DP5BROY"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJDO5VSIAOGT2WP63AXAAWNRSVJCNCRH",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJDO5VSIAOGT2WP63AXAAWNRSVJCNCRH"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-28176"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268820",
                    "reference_id": "2268820",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268820"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-hhhv-q57g-882q",
                    "reference_id": "GHSA-hhhv-q57g-882q",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-hhhv-q57g-882q"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I6MMWFBOXJA6ZCXNVPDFJ4XMK5PVG5RG/",
                    "reference_id": "I6MMWFBOXJA6ZCXNVPDFJ4XMK5PVG5RG",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-11T14:26:36Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I6MMWFBOXJA6ZCXNVPDFJ4XMK5PVG5RG/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXKGNCRU7OTM5AHC7YIYBNOWI742PRMY/",
                    "reference_id": "KXKGNCRU7OTM5AHC7YIYBNOWI742PRMY",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-11T14:26:36Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXKGNCRU7OTM5AHC7YIYBNOWI742PRMY/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3826",
                    "reference_id": "RHSA-2024:3826",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3826"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3827",
                    "reference_id": "RHSA-2024:3827",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3827"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3968",
                    "reference_id": "RHSA-2024:3968",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3968"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5094",
                    "reference_id": "RHSA-2024:5094",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5094"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:5294",
                    "reference_id": "RHSA-2024:5294",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:5294"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6755",
                    "reference_id": "RHSA-2024:6755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6755"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:8676",
                    "reference_id": "RHSA-2024:8676",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:8676"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:9181",
                    "reference_id": "RHSA-2024:9181",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:9181"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UG5FSEYJ3GP27FZXC5YAAMMEC5XWKJHG/",
                    "reference_id": "UG5FSEYJ3GP27FZXC5YAAMMEC5XWKJHG",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-11T14:26:36Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UG5FSEYJ3GP27FZXC5YAAMMEC5XWKJHG/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJO2U5ACZVACNQXJ5EBRFLFW6DP5BROY/",
                    "reference_id": "UJO2U5ACZVACNQXJ5EBRFLFW6DP5BROY",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-11T14:26:36Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJO2U5ACZVACNQXJ5EBRFLFW6DP5BROY/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJDO5VSIAOGT2WP63AXAAWNRSVJCNCRH/",
                    "reference_id": "XJDO5VSIAOGT2WP63AXAAWNRSVJCNCRH",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-11T14:26:36Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJDO5VSIAOGT2WP63AXAAWNRSVJCNCRH/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/55854?format=api",
                    "purl": "pkg:npm/jose@2.0.7",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/jose@2.0.7"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/55850?format=api",
                    "purl": "pkg:npm/jose@4.15.5",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/jose@4.15.5"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/670959?format=api",
                    "purl": "pkg:npm/jose@5.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/jose@5.0.0"
                }
            ],
            "aliases": [
                "CVE-2024-28176",
                "GHSA-hhhv-q57g-882q"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1rpd-33se-hkex"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35571?format=api",
            "vulnerability_id": "VCID-79vy-8dqy-qqgm",
            "summary": "Padding Oracle Attack due to Observable Timing Discrepancy in jose-node-cjs-runtime\n### Impact\n\n[AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block).\n\n### Patches\n\nA patch was released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `>=3.11.4`.\n\nUsers should upgrade to `^3.11.4`.\n\n### Credits\nThanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29446",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60322",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60318",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60339",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60325",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60306",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60347",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60355",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60343",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60315",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6033",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60276",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60183",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60259",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60285",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60254",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60304",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29446"
                },
                {
                    "reference_url": "https://github.com/panva/jose",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/panva/jose"
                },
                {
                    "reference_url": "https://github.com/panva/jose/security/advisories/GHSA-rvcw-f68w-8h8h",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/panva/jose/security/advisories/GHSA-rvcw-f68w-8h8h"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29446",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29446"
                },
                {
                    "reference_url": "https://www.npmjs.com/package/jose-node-cjs-runtime",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.npmjs.com/package/jose-node-cjs-runtime"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-rvcw-f68w-8h8h",
                    "reference_id": "GHSA-rvcw-f68w-8h8h",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-rvcw-f68w-8h8h"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74008?format=api",
                    "purl": "pkg:npm/jose@3.11.4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1rpd-33se-hkex"
                        },
                        {
                            "vulnerability": "VCID-7vc7-dfdz-myg8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/jose@3.11.4"
                }
            ],
            "aliases": [
                "CVE-2021-29446",
                "GHSA-rvcw-f68w-8h8h"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-79vy-8dqy-qqgm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52258?format=api",
            "vulnerability_id": "VCID-7vc7-dfdz-myg8",
            "summary": "JOSE vulnerable to resource exhaustion via specifically crafted JWE\nThe PBKDF2-based JWE key management algorithms expect a JOSE Header Parameter named `p2c` ([PBES2 Count](https://www.rfc-editor.org/rfc/rfc7518.html#section-4.8.1.2)) which determines how many PBKDF2 iterations must be executed in order to derive a CEK wrapping key. The purpose of this parameter is to intentionally slow down the key derivation function in order to make password brute-force and dictionary attacks more expensive.\n\nThis makes the PBES2 algorithms unsuitable for situations where the JWE is coming from an untrusted source: an adversary can intentionally pick an extremely high PBES2 Count value, that will initiate a CPU-bound computation that may take an unreasonable amount of time to finish.\n\n### Impact\n\nUnder certain conditions (see below) it is possible to have the user's environment consume unreasonable amount of CPU time.\n\n### Affected users\n\nThe impact is limited only to users utilizing the JWE decryption APIs with symmetric secrets to decrypt JWEs from untrusted parties who do not limit the accepted JWE Key Management Algorithms (`alg` Header Parameter) using the `keyManagementAlgorithms` (or `algorithms` in v1.x) decryption option or through other means.\n\nThe PBKDF2-based JWE Key Management Algorithm Identifiers are\n\n- `PBES2-HS256+A128KW`\n- `PBES2-HS384+A192KW`\n- `PBES2-HS512+A256KW`\n\ne.g.\n\n```js\nconst secret = new Uint8Array(16)\nconst jwe = '...' // JWE from an untrusted party\n\nawait jose.compactDecrypt(jwe, secret)\n```\n\nYou are NOT affected if any of the following applies to you\n\n- Your code does not use the JWE APIs\n- Your code only produces JWE tokens\n- Your code only decrypts JWEs using an asymmetric JWE Key Management Algorithm (this means you're providing an asymmetric key object to the JWE decryption API)\n- Your code only accepts JWEs produced by trusted sources\n- Your code limits the accepted JWE Key Management Algorithms using the `keyManagementAlgorithms` decryption option not including any of the PBKDF2-based JWE key management algorithms\n\n### Patches\n\n`v1.28.2`, `v2.0.6`, `v3.20.4`, and `v4.9.2` releases limit the maximum PBKDF2 iteration count to `10000` by default. It is possible to adjust this limit with a newly introduced `maxPBES2Count` decryption option.\n\n### Workarounds\n\nAll users should be able to upgrade given all stable semver major release lines have had new a patch release introduced which limits the PBKDF2 iteration count to `10000` by default. This removes the ability to craft JWEs that would consume unreasonable amount of CPU time.\n\nIf users are unable to upgrade their required library version they have two options depending on whether they expect to receive JWEs using any of the three PBKDF2-based JWE key management algorithms.\n\n- they can use the `keyManagementAlgorithms` decryption option to disable accepting PBKDF2 altogether\n- they can inspect the JOSE Header prior to using the decryption API and limit the PBKDF2 iteration count (`p2c` Header Parameter)\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an discussion in the project's [repository](https://github.com/panva/jose/discussions/new?category=q-a&title=GHSA-jv3g-j58f-9mq9%20advisory%20question)\n* Email me at [panva.ip@gmail.com](mailto:panva.ip@gmail.com)",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36083",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00137",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33143",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00137",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33075",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00461",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64187",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00461",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64167",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00461",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64179",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00461",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64168",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00461",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64132",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00461",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6416",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00461",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64171",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00461",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64092",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00461",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64199",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00461",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64133",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00461",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64106",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00461",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64159",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00461",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64143",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-36083"
                },
                {
                    "reference_url": "https://github.com/panva/jose",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/panva/jose"
                },
                {
                    "reference_url": "https://github.com/panva/jose/commit/03d6d013bf6e070e85adfe5731f526978e3e8e4d",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:39:38Z/"
                        }
                    ],
                    "url": "https://github.com/panva/jose/commit/03d6d013bf6e070e85adfe5731f526978e3e8e4d"
                },
                {
                    "reference_url": "https://github.com/panva/jose/releases/tag/v4.9.2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:39:38Z/"
                        }
                    ],
                    "url": "https://github.com/panva/jose/releases/tag/v4.9.2"
                },
                {
                    "reference_url": "https://github.com/panva/jose/security/advisories/GHSA-jv3g-j58f-9mq9",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:39:38Z/"
                        }
                    ],
                    "url": "https://github.com/panva/jose/security/advisories/GHSA-jv3g-j58f-9mq9"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36083",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36083"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-jv3g-j58f-9mq9",
                    "reference_id": "GHSA-jv3g-j58f-9mq9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-jv3g-j58f-9mq9"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/80095?format=api",
                    "purl": "pkg:npm/jose@1.28.2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1rpd-33se-hkex"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/jose@1.28.2"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/80099?format=api",
                    "purl": "pkg:npm/jose@2.0.6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1rpd-33se-hkex"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/jose@2.0.6"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/80100?format=api",
                    "purl": "pkg:npm/jose@3.20.4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1rpd-33se-hkex"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/jose@3.20.4"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/80101?format=api",
                    "purl": "pkg:npm/jose@4.9.2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1rpd-33se-hkex"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/jose@4.9.2"
                }
            ],
            "aliases": [
                "CVE-2022-36083",
                "GHSA-jv3g-j58f-9mq9"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7vc7-dfdz-myg8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35221?format=api",
            "vulnerability_id": "VCID-ewa6-84fq-gfgm",
            "summary": "Padding Oracle Attack due to Observable Timing Discrepancy in jose-node-esm-runtime\n### Impact\n\n[AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block).\n\n### Patches\n\nA patch was released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `>=3.11.4`.\n\nUsers should upgrade to `^3.11.4`.\n\n### Credits\nThanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29445",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60322",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60318",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60339",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60325",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60306",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60347",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60355",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60343",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60315",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6033",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60276",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60183",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60259",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60285",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60254",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60304",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29445"
                },
                {
                    "reference_url": "https://github.com/panva/jose",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/panva/jose"
                },
                {
                    "reference_url": "https://github.com/panva/jose/security/advisories/GHSA-4v4g-726h-xvfv",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/panva/jose/security/advisories/GHSA-4v4g-726h-xvfv"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29445",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29445"
                },
                {
                    "reference_url": "https://www.npmjs.com/package/jose-node-esm-runtime",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.npmjs.com/package/jose-node-esm-runtime"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-4v4g-726h-xvfv",
                    "reference_id": "GHSA-4v4g-726h-xvfv",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-4v4g-726h-xvfv"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74008?format=api",
                    "purl": "pkg:npm/jose@3.11.4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1rpd-33se-hkex"
                        },
                        {
                            "vulnerability": "VCID-7vc7-dfdz-myg8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/jose@3.11.4"
                }
            ],
            "aliases": [
                "CVE-2021-29445",
                "GHSA-4v4g-726h-xvfv"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ewa6-84fq-gfgm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35081?format=api",
            "vulnerability_id": "VCID-mv6y-qymd-ryat",
            "summary": "Padding Oracle Attack due to Observable Timing Discrepancy in jose-browser-runtime\n### Impact\n\n[AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block).\n\n### Patches\n\nA patch was released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `>=3.11.4`.\n\nUsers should upgrade to `^3.11.4`.\n\n### Credits\nThanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29444",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60322",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60318",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60339",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60325",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60306",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60347",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60355",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60343",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60315",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6033",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60276",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60183",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60259",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60285",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60254",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60304",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29444"
                },
                {
                    "reference_url": "https://github.com/panva/jose",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/panva/jose"
                },
                {
                    "reference_url": "https://github.com/panva/jose/security/advisories/GHSA-94hh-pjjg-rwmr",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/panva/jose/security/advisories/GHSA-94hh-pjjg-rwmr"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29444",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29444"
                },
                {
                    "reference_url": "https://www.npmjs.com/package/jose-browser-runtime",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.npmjs.com/package/jose-browser-runtime"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-94hh-pjjg-rwmr",
                    "reference_id": "GHSA-94hh-pjjg-rwmr",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-94hh-pjjg-rwmr"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74008?format=api",
                    "purl": "pkg:npm/jose@3.11.4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1rpd-33se-hkex"
                        },
                        {
                            "vulnerability": "VCID-7vc7-dfdz-myg8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/jose@3.11.4"
                }
            ],
            "aliases": [
                "CVE-2021-29444",
                "GHSA-94hh-pjjg-rwmr"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mv6y-qymd-ryat"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35016?format=api",
            "vulnerability_id": "VCID-yzkv-xd7t-f3bv",
            "summary": "Padding Oracle Attack due to Observable Timing Discrepancy in jose\njose is an npm library providing a number of cryptographic operations.\n### Impact\n\n[AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block).\n\n### Patches\n\nAll major release versions have had a patch released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `^1.28.1 || ^2.0.5 || >=3.11.4`.\n\nUsers should upgrade their v1.x dependency to [`^1.28.1`](https://github.com/panva/jose/releases/tag/v1.28.1), their v2.x dependency to [`^2.0.5`](https://github.com/panva/jose/releases/tag/v2.0.5), and their v3.x dependency to [`^3.11.4`](https://github.com/panva/jose/releases/tag/v3.11.4)\n\n### Credits\nThanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29443",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54666",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54685",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54723",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54726",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54706",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54678",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54698",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54675",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54623",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.546",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54671",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54693",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54662",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54715",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54711",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54724",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54707",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29443"
                },
                {
                    "reference_url": "https://github.com/panva/jose/security/advisories/GHSA-58f5-hfqc-jgch",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/panva/jose/security/advisories/GHSA-58f5-hfqc-jgch"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29443",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29443"
                },
                {
                    "reference_url": "https://www.npmjs.com/package/jose",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.npmjs.com/package/jose"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-58f5-hfqc-jgch",
                    "reference_id": "GHSA-58f5-hfqc-jgch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-58f5-hfqc-jgch"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74006?format=api",
                    "purl": "pkg:npm/jose@1.28.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1rpd-33se-hkex"
                        },
                        {
                            "vulnerability": "VCID-79vy-8dqy-qqgm"
                        },
                        {
                            "vulnerability": "VCID-7vc7-dfdz-myg8"
                        },
                        {
                            "vulnerability": "VCID-ewa6-84fq-gfgm"
                        },
                        {
                            "vulnerability": "VCID-mv6y-qymd-ryat"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/jose@1.28.1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74007?format=api",
                    "purl": "pkg:npm/jose@2.0.5",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1rpd-33se-hkex"
                        },
                        {
                            "vulnerability": "VCID-79vy-8dqy-qqgm"
                        },
                        {
                            "vulnerability": "VCID-7vc7-dfdz-myg8"
                        },
                        {
                            "vulnerability": "VCID-ewa6-84fq-gfgm"
                        },
                        {
                            "vulnerability": "VCID-mv6y-qymd-ryat"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/jose@2.0.5"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74008?format=api",
                    "purl": "pkg:npm/jose@3.11.4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1rpd-33se-hkex"
                        },
                        {
                            "vulnerability": "VCID-7vc7-dfdz-myg8"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/jose@3.11.4"
                }
            ],
            "aliases": [
                "CVE-2021-29443",
                "GHSA-58f5-hfqc-jgch"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yzkv-xd7t-f3bv"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "3.1",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:npm/jose@1.10.1"
}