2024-03-20 17:03:45 +00:00
{
"id" : "CVE-2023-50967" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2024-03-20T16:15:07.570" ,
2024-04-19 23:58:22 +00:00
"lastModified" : "2024-04-19T23:15:09.330" ,
2024-03-20 19:03:34 +00:00
"vulnStatus" : "Awaiting Analysis" ,
2024-03-20 17:03:45 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "latchset jose through version 11 allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value."
2024-04-19 23:58:22 +00:00
} ,
{
"lang" : "es" ,
"value" : "Latchset jose hasta la versi\u00f3n 11 permite a los atacantes provocar una denegaci\u00f3n de servicio (consumo de CPU) a trav\u00e9s de un valor grande de p2c (tambi\u00e9n conocido como PBES2 Count)."
2024-03-20 17:03:45 +00:00
}
] ,
"metrics" : { } ,
"references" : [
{
"url" : "https://github.com/P3ngu1nW/CVE_Request/blob/main/latch-jose.md" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://github.com/latchset/jose" ,
"source" : "cve@mitre.org"
2024-04-19 04:03:26 +00:00
} ,
2024-04-19 06:03:30 +00:00
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CIFPQUCLNWEAHYYJWCQD3AZPWYIV6YT3/" ,
"source" : "cve@mitre.org"
} ,
2024-04-19 04:03:26 +00:00
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OOBFVMOAV732C7PY74AHJ62ZNKT3ISZ6/" ,
"source" : "cve@mitre.org"
2024-04-19 23:58:22 +00:00
} ,
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W7EGLOAFN2PWZ75ZRLTUDUZCIPH2VFZU/" ,
"source" : "cve@mitre.org"
2024-03-20 17:03:45 +00:00
}
]
}