Логотип exploitDog
bind: "CVE-2020-26160"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2020-26160"

Количество 7

Количество 7

ubuntu логотип

CVE-2020-26160

почти 5 лет назад

jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2020-26160

почти 5 лет назад

jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2020-26160

почти 5 лет назад

jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2020-26160

12 месяцев назад

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2020-26160

почти 5 лет назад

jwt-go before 4.0.0-preview1 allows attackers to bypass intended acces ...

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20250822-09

13 дней назад

Уязвимость stolon

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-w73w-5m7g-f7qc

больше 4 лет назад

Authorization bypass in github.com/dgrijalva/jwt-go

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-26160

jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check.

CVSS3: 7.5
0%
Низкий
почти 5 лет назад
redhat логотип
CVE-2020-26160

jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check.

CVSS3: 7.5
0%
Низкий
почти 5 лет назад
nvd логотип
CVE-2020-26160

jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check.

CVSS3: 7.5
0%
Низкий
почти 5 лет назад
msrc логотип
CVSS3: 7.5
0%
Низкий
12 месяцев назад
debian логотип
CVE-2020-26160

jwt-go before 4.0.0-preview1 allows attackers to bypass intended acces ...

CVSS3: 7.5
0%
Низкий
почти 5 лет назад
redos логотип
ROS-20250822-09

Уязвимость stolon

CVSS3: 7.5
0%
Низкий
13 дней назад
github логотип
GHSA-w73w-5m7g-f7qc

Authorization bypass in github.com/dgrijalva/jwt-go

CVSS3: 7.5
0%
Низкий
больше 4 лет назад

Уязвимостей на страницу