Количество 3
Количество 3
CVE-2022-23529
A flaw was found in the jsonwebtoken package. In affected versions of the jsonwebtoken library, if a malicious actor can modify the key retrieval parameter (referring to the secretOrPublicKey argument from the readme link) of the jwt.verify() function, they can perform remote code execution (RCE).
CVE-2022-23529
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The issue is not a vulnerability. Notes: none.
GHSA-27h2-hvpr-p74q
jsonwebtoken has insecure input validation in jwt.verify function
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2022-23529 A flaw was found in the jsonwebtoken package. In affected versions of the jsonwebtoken library, if a malicious actor can modify the key retrieval parameter (referring to the secretOrPublicKey argument from the readme link) of the jwt.verify() function, they can perform remote code execution (RCE). | около 3 лет назад | |||
CVE-2022-23529 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The issue is not a vulnerability. Notes: none. | около 3 лет назад | |||
GHSA-27h2-hvpr-p74q jsonwebtoken has insecure input validation in jwt.verify function | CVSS3: 7.6 | около 3 лет назад |
Уязвимостей на страницу