Search for packages
purl | pkg:rpm/redhat/ose-baremetal-installer-container@4.8.0-202106291913.p0.git.a5ddd2d.assembly?arch=stream |
Next non-vulnerable version | None. |
Latest non-vulnerable version | None. |
Risk | 4.0 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-gt63-t28m-aaak
Aliases: CVE-2020-26160 GHSA-w73w-5m7g-f7qc |
jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check. | There are no reported fixed by versions. |
VCID-hscf-fc4z-aaaj
Aliases: CVE-2021-3121 GHSA-c3h9-896r-86jm |
An issue was discovered in GoGo Protobuf before 1.3.2. plugin/unmarshal/unmarshal.go lacks certain index validation, aka the "skippy peanut butter" issue. | There are no reported fixed by versions. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|