The jose2go component before 1.6.0 for Go allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6294-6rgp-fr7r | jose2go vulnerable to denial of service via large p2c value |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 14 Feb 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dvsekhvalnov
Dvsekhvalnov jose2go |
|
| Weaknesses | CWE-770 | |
| CPEs | cpe:2.3:a:dvsekhvalnov:jose2go:*:*:*:*:*:go:*:* | |
| Vendors & Products |
Dvsekhvalnov
Dvsekhvalnov jose2go |
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T22:16:47.116Z
Reserved: 2023-12-11T00:00:00
Link: CVE-2023-50658
Updated: 2024-08-02T22:16:47.116Z
Status : Analyzed
Published: 2024-02-29T01:42:01.123
Modified: 2025-02-14T17:23:19.307
Link: CVE-2023-50658
No data.
OpenCVE Enrichment
No data.
Github GHSA