2024-03-20 17:03:45 +00:00
|
|
|
{
|
|
|
|
"id": "CVE-2023-50967",
|
|
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
|
|
"published": "2024-03-20T16:15:07.570",
|
2024-04-19 06:03:30 +00:00
|
|
|
"lastModified": "2024-04-19T04:15:09.140",
|
2024-03-20 19:03:34 +00:00
|
|
|
"vulnStatus": "Awaiting Analysis",
|
2024-03-20 17:03:45 +00:00
|
|
|
"descriptions": [
|
|
|
|
{
|
|
|
|
"lang": "en",
|
|
|
|
"value": "latchset jose through version 11 allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value."
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"metrics": {},
|
|
|
|
"references": [
|
|
|
|
{
|
|
|
|
"url": "https://github.com/P3ngu1nW/CVE_Request/blob/main/latch-jose.md",
|
|
|
|
"source": "cve@mitre.org"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url": "https://github.com/latchset/jose",
|
|
|
|
"source": "cve@mitre.org"
|
2024-04-19 04:03:26 +00:00
|
|
|
},
|
2024-04-19 06:03:30 +00:00
|
|
|
{
|
|
|
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CIFPQUCLNWEAHYYJWCQD3AZPWYIV6YT3/",
|
|
|
|
"source": "cve@mitre.org"
|
|
|
|
},
|
2024-04-19 04:03:26 +00:00
|
|
|
{
|
|
|
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OOBFVMOAV732C7PY74AHJ62ZNKT3ISZ6/",
|
|
|
|
"source": "cve@mitre.org"
|
2024-03-20 17:03:45 +00:00
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|