The jose4j component before 0.9.4 for Java allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value.
References
Link | Resource |
---|---|
https://bitbucket.org/b_c/jose4j/issues/212 | Exploit Issue Tracking |
https://bitbucket.org/b_c/jose4j/issues/212 | Exploit Issue Tracking |
Configurations
History
08 May 2025, 22:45
Type | Values Removed | Values Added |
---|---|---|
First Time |
Jose4j Project
Jose4j Project jose4j |
|
CPE | cpe:2.3:a:jose4j_project:jose4j:*:*:*:*:*:*:*:* | |
References | () https://bitbucket.org/b_c/jose4j/issues/212 - Exploit, Issue Tracking |
21 Nov 2024, 08:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://bitbucket.org/b_c/jose4j/issues/212 - |
14 Aug 2024, 19:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-400 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
Summary |
|
29 Feb 2024, 01:42
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-29 01:42
Updated : 2025-05-08 22:45
NVD link : CVE-2023-51775
Mitre link : CVE-2023-51775
CVE.ORG link : CVE-2023-51775
JSON object : View
Products Affected
jose4j_project
- jose4j
CWE
CWE-400
Uncontrolled Resource Consumption