python-jose before 1.3.2 allows attackers to have unspecified impact by leveraging failure to use a constant time comparison for HMAC keys.
CPE | Name | Operator | Version |
---|---|---|---|
python-jose | eq | 0.5.2 | |
python-jose | eq | 1.3.0 | |
python-jose | eq | 0.5.1 | |
python-jose | eq | 0.1.0 | |
python-jose | eq | 0.1.5 | |
python-jose | eq | 0.5.6 | |
python-jose | eq | 0.1.1 | |
python-jose | eq | 0.3.0 | |
python-jose | eq | 0.5.3 | |
python-jose | eq | 0.1.4 |