Safety vulnerability ID: 42243
The information on this page was manually curated by our Cybersecurity Intelligence Team.
The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in jwcrypto before 0.3.2 lacks the Random Filling protection mechanism, which makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA).
Latest version: 1.5.6
Implementation of JOSE Web standards
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application