Логотип exploitDog
bind:CVE-2015-9235
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2015-9235

Количество 3

Количество 3

redhat логотип

CVE-2015-9235

почти 8 лет назад

In jsonwebtoken node module before 4.2.2 it is possible for an attacker to bypass verification when a token digitally signed with an asymmetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS* family).

CVSS3: 7.3
EPSS: Средний
nvd логотип

CVE-2015-9235

больше 7 лет назад

In jsonwebtoken node module before 4.2.2 it is possible for an attacker to bypass verification when a token digitally signed with an asymmetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS* family).

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-c7hr-j4mj-j2w6

больше 7 лет назад

Verification Bypass in jsonwebtoken

EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2015-9235

In jsonwebtoken node module before 4.2.2 it is possible for an attacker to bypass verification when a token digitally signed with an asymmetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS* family).

CVSS3: 7.3
32%
Средний
почти 8 лет назад
nvd логотип
CVE-2015-9235

In jsonwebtoken node module before 4.2.2 it is possible for an attacker to bypass verification when a token digitally signed with an asymmetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS* family).

CVSS3: 9.8
32%
Средний
больше 7 лет назад
github логотип
GHSA-c7hr-j4mj-j2w6

Verification Bypass in jsonwebtoken

32%
Средний
больше 7 лет назад

Уязвимостей на страницу