Search for packages
purl | pkg:deb/debian/golang-github-dgrijalva-jwt-go@3.2.0-3 |
Vulnerability | Summary | Fixed by |
---|---|---|
This package is not known to be affected by vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-gt63-t28m-aaak | jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check. |
CVE-2020-26160
GHSA-w73w-5m7g-f7qc |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-06-21T05:59:39.587205+00:00 | Debian Oval Importer | Fixing | VCID-gt63-t28m-aaak | None | 36.1.3 |
2025-06-07T23:38:14.263878+00:00 | Debian Oval Importer | Fixing | VCID-gt63-t28m-aaak | None | 36.1.0 |
2025-04-12T21:52:00.947300+00:00 | Debian Oval Importer | Fixing | VCID-gt63-t28m-aaak | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 36.0.0 |
2025-04-07T22:10:21.855738+00:00 | Debian Oval Importer | Fixing | VCID-gt63-t28m-aaak | None | 36.0.0 |