CVE-2024-28122

JWX is Go module implementing various JWx (JWA/JWE/JWK/JWS/JWT, otherwise known as JOSE) technologies. This vulnerability allows an attacker with a trusted public key to cause a Denial-of-Service (DoS ...

Continue Reading
CVE-2024-28176

jose is JavaScript module for JSON Object Signing and Encryption, providing support for JSON Web Tokens (JWT), JSON Web Signature (JWS), JSON Web Encryption (JWE), JSON Web Key (JWK), JSON Web Key Set ...

Continue Reading
JWX vulnerable to a denial of service attack using compressed JWE message

Summary This vulnerability allows an attacker with a trusted public key to cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high ...

Continue Reading
JWX vulnerable to a denial of service attack using compressed JWE message

Summary This vulnerability allows an attacker with a trusted public key to cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high ...

Continue Reading
JWX vulnerable to a denial of service attack using compressed JWE message

Summary This vulnerability allows an attacker with a trusted public key to cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high ...

Continue Reading
JWX vulnerable to a denial of service attack using compressed JWE message

Summary This vulnerability allows an attacker with a trusted public key to cause a Denial-of-Service (DoS) condition by crafting a malicious JSON Web Encryption (JWE) token with an exceptionally high ...

Continue Reading
Malicious code in jaas-jwt (npm)

-= Per source details. Do not edit below this line.=- Source: ossf-package-analysis (76d51349ced57684619394edb9408c414e03cfcd5c3add0128648bbf3ff3f08a) The OpenSSF Package Analysis project identified & ...

Continue Reading
[SECURITY] Fedora 39 Update: cpp-jwt-1.4-7.fc39

JSON Web Token(JWT) is a JSON based standard (RFC- 7519) for creating assertions or access tokens that consists of some claims (encoded within the assertion). This assertion can be used in some kind o ...

Continue Reading

Back to Main

Subscribe for the latest news: