Exploit POC for small RSA public exponent
RSA encoding with small exponent (typically e=3) is quite dangerous. This script explains how a hacker can forge a PKCS #1 v1.5 block then cubic root it to make it valid
sig_validation = (int.from_bytes() ** key_exponent).to_bytes(key_length)