Lucene search

K

Go-jose Security Vulnerabilities

cve
cve

CVE-2024-28180

Package jose aims to provide an implementation of the Javascript Object Signing and Encryption set of standards. An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if...

4.3CVSS

4.8AI Score

0.0005EPSS

2024-03-09 01:15 AM
41
cve
cve

CVE-2016-9121

go-jose before 1.0.4 suffers from an invalid curve attack for the ECDH-ES algorithm. When deriving a shared key using ECDH-ES for an encrypted message, go-jose neglected to check that the received public key on a message is on the same curve as the static private key of the receiver, thus making...

9.1CVSS

9AI Score

0.002EPSS

2017-03-28 02:59 AM
32
cve
cve

CVE-2016-9123

go-jose before 1.0.5 suffers from a CBC-HMAC integer overflow on 32-bit architectures. An integer overflow could lead to authentication bypass for CBC-HMAC encrypted ciphertexts on 32-bit...

7.5CVSS

7.6AI Score

0.001EPSS

2017-03-28 02:59 AM
32
cve
cve

CVE-2016-9122

go-jose before 1.0.4 suffers from multiple signatures exploitation. The go-jose library supports messages with multiple signatures. However, when validating a signed message the API did not indicate which signature was valid, which could potentially lead to confusion. For example, users of the...

7.5CVSS

7.2AI Score

0.001EPSS

2017-03-28 02:59 AM
28