Show filters
37 Total Results
Displaying 31-37 of 37
Sort by:
Attacker Value
Unknown
CVE-2017-10862
Disclosure Date: October 12, 2017 (last updated November 26, 2024)
jwt-scala 1.2.2 and earlier fails to verify token signatures correctly which may lead to an attacker being able to pass specially crafted JWT data as a correctly signed token.
0
Attacker Value
Unknown
CVE-2017-11424
Disclosure Date: August 24, 2017 (last updated November 26, 2024)
In PyJWT 1.5.0 and below the `invalid_strings` check in `HMACAlgorithm.prepare_key` does not account for all PEM encoded public keys. Specifically, the PKCS1 PEM encoded format would be allowed because it is prefaced with the string `-----BEGIN RSA PUBLIC KEY-----` which is not accounted for. This enables symmetric/asymmetric key confusion attacks against users using the PKCS1 PEM encoded public keys, which would allow an attacker to craft JWTs from scratch.
0
Attacker Value
Unknown
CVE-2017-12973
Disclosure Date: August 20, 2017 (last updated November 26, 2024)
Nimbus JOSE+JWT before 4.39 proceeds improperly after detection of an invalid HMAC in authenticated AES-CBC decryption, which allows attackers to conduct a padding oracle attack.
0
Attacker Value
Unknown
CVE-2017-12974
Disclosure Date: August 20, 2017 (last updated November 08, 2023)
Nimbus JOSE+JWT before 4.36 proceeds with ECKey construction without ensuring that the public x and y coordinates are on the specified curve, which allows attackers to conduct an Invalid Curve Attack in environments where the JCE provider lacks the applicable curve validation.
0
Attacker Value
Unknown
CVE-2017-12972
Disclosure Date: August 20, 2017 (last updated November 08, 2023)
In Nimbus JOSE+JWT before 4.39, there is no integer-overflow check when converting length values from bytes to bits, which allows attackers to conduct HMAC bypass attacks by shifting Additional Authenticated Data (AAD) and ciphertext so that different plaintext is obtained for the same HMAC.
0
Attacker Value
Unknown
CVE-2016-7037
Disclosure Date: January 23, 2017 (last updated November 25, 2024)
The verify function in Encryption/Symmetric.php in Malcolm Fell jwt before 1.0.3 does not use a timing-safe function for hash comparison, which allows attackers to spoof signatures via a timing attack.
0
Attacker Value
Unknown
CVE-2015-2951
Disclosure Date: June 05, 2015 (last updated October 05, 2023)
JWT.php in F21 JWT before 2.0 allows remote attackers to bypass signature verification via crafted tokens.
0