Количество 7
Количество 7
CVE-2021-22573
The vulnerability is that IDToken verifier does not verify if token is properly signed. Signature verification makes sure that the token's payload comes from valid provider, not from someone else. An attacker can provide a compromised token with custom payload. The token will pass the validation on the client side. We recommend upgrading to version 1.33.3 or above
CVE-2021-22573
The vulnerability is that IDToken verifier does not verify if token is properly signed. Signature verification makes sure that the token's payload comes from valid provider, not from someone else. An attacker can provide a compromised token with custom payload. The token will pass the validation on the client side. We recommend upgrading to version 1.33.3 or above
CVE-2021-22573
The vulnerability is that IDToken verifier does not verify if token is properly signed. Signature verification makes sure that the token's payload comes from valid provider, not from someone else. An attacker can provide a compromised token with custom payload. The token will pass the validation on the client side. We recommend upgrading to version 1.33.3 or above
CVE-2021-22573
The vulnerability is that IDToken verifier does not verify if token is ...
SUSE-SU-2024:0806-1
Security update for google-oauth-java-client
GHSA-hw42-3568-wj87
google-oauth-java-client improperly verifies cryptographic signature
BDU:2022-04345
Уязвимость верификатора IDToken клиентской Java-библиотеки OAuth, позволяющая нарушителю загрузить произвольные файлы
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-22573 The vulnerability is that IDToken verifier does not verify if token is properly signed. Signature verification makes sure that the token's payload comes from valid provider, not from someone else. An attacker can provide a compromised token with custom payload. The token will pass the validation on the client side. We recommend upgrading to version 1.33.3 or above | CVSS3: 8.7 | 0% Низкий | почти 4 года назад | |
CVE-2021-22573 The vulnerability is that IDToken verifier does not verify if token is properly signed. Signature verification makes sure that the token's payload comes from valid provider, not from someone else. An attacker can provide a compromised token with custom payload. The token will pass the validation on the client side. We recommend upgrading to version 1.33.3 or above | CVSS3: 7.3 | 0% Низкий | почти 4 года назад | |
CVE-2021-22573 The vulnerability is that IDToken verifier does not verify if token is properly signed. Signature verification makes sure that the token's payload comes from valid provider, not from someone else. An attacker can provide a compromised token with custom payload. The token will pass the validation on the client side. We recommend upgrading to version 1.33.3 or above | CVSS3: 8.7 | 0% Низкий | почти 4 года назад | |
CVE-2021-22573 The vulnerability is that IDToken verifier does not verify if token is ... | CVSS3: 8.7 | 0% Низкий | почти 4 года назад | |
SUSE-SU-2024:0806-1 Security update for google-oauth-java-client | 0% Низкий | почти 2 года назад | ||
GHSA-hw42-3568-wj87 google-oauth-java-client improperly verifies cryptographic signature | CVSS3: 7.3 | 0% Низкий | почти 2 года назад | |
BDU:2022-04345 Уязвимость верификатора IDToken клиентской Java-библиотеки OAuth, позволяющая нарушителю загрузить произвольные файлы | CVSS3: 7.3 | 0% Низкий | почти 4 года назад |
Уязвимостей на страницу