The jose4j component before 0.9.4 for Java allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value.
References
| Link | Resource |
|---|---|
| https://bitbucket.org/b_c/jose4j/issues/212 | Exploit Issue Tracking |
| https://bitbucket.org/b_c/jose4j/issues/212 | Exploit Issue Tracking |
Configurations
History
08 May 2025, 22:45
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Jose4j Project
Jose4j Project jose4j |
|
| CPE | cpe:2.3:a:jose4j_project:jose4j:*:*:*:*:*:*:*:* | |
| References | () https://bitbucket.org/b_c/jose4j/issues/212 - Exploit, Issue Tracking |
Information
Published : 2024-02-29 01:42
Updated : 2025-05-08 22:45
NVD link : CVE-2023-51775
Mitre link : CVE-2023-51775
CVE.ORG link : CVE-2023-51775
JSON object : View
Products Affected
jose4j_project
- jose4j
CWE
CWE-400
Uncontrolled Resource Consumption
