latchset CVE Vulnerabilities & Metrics

Focus on latchset vulnerabilities and metrics.

Last updated: 16 Apr 2026, 22:25 UTC

About latchset Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with latchset. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total latchset CVEs: 6
Earliest CVE date: 01 Sep 2016, 23:59 UTC
Latest CVE date: 07 Apr 2026, 20:16 UTC

Latest CVE reference: CVE-2026-39373

Rolling Stats

30-day Count (Rolling): 1
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical latchset CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 0.72

Max CVSS: 4.3

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 5
4.0-6.9 1
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS latchset CVEs

These are the five CVEs with the highest CVSS scores for latchset, sorted by severity first and recency.

All CVEs for latchset

CVE-2026-39373 latchset vulnerability CVSS: 0 07 Apr 2026, 20:16 UTC

JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to 1.5.7, an unauthenticated attacker can exhaust server memory by sending crafted JWE tokens with ZIP compression. The existing patch for CVE-2024-28102 limits input token size to 250KB but does not validate the decompressed output size. An unauthenticated attacker can cause memory exhaustion on memory-constrained systems. A token under the 250KB input limit can decompress to approximately 100MB. This vulnerability is fixed in 1.5.7.

CVE-2024-28102 latchset vulnerability CVSS: 0 21 Mar 2024, 02:52 UTC

JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length.

CVE-2023-50967 latchset vulnerability CVSS: 0 20 Mar 2024, 16:15 UTC

latchset jose through version 11 allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value.

CVE-2023-6681 latchset vulnerability CVSS: 0 12 Feb 2024, 14:15 UTC

A vulnerability was found in JWCrypto. This flaw allows an attacker to cause a denial of service (DoS) attack and possible password brute-force and dictionary attacks to be more resource-intensive. This issue can result in a large amount of computational consumption, causing a denial of service attack.

CVE-2023-6258 latchset vulnerability CVSS: 0 30 Jan 2024, 17:15 UTC

A security vulnerability has been identified in the pkcs11-provider, which is associated with Public-Key Cryptography Standards (PKCS#11). If exploited successfully, this vulnerability could result in a Bleichenbacher-like security flaw, potentially enabling a side-channel attack on PKCS#1 1.5 decryption.

CVE-2016-6298 latchset vulnerability CVSS: 4.3 01 Sep 2016, 23:59 UTC

The _Rsa15 class in the RSA 1.5 algorithm implementation in jwa.py in jwcrypto before 0.3.2 lacks the Random Filling protection mechanism, which makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA).