Debian Golang-Github-Golang-Jwt-Jwt vulnerabilities
2 known vulnerabilities affecting debian/golang-github-golang-jwt-jwt.
Total CVEs
2
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH1LOW1
Vulnerabilities
Page 1 of 1
CVE-2025-30204HIGHCVSS 7.5fixed in golang-github-golang-jwt-jwt 5.0.0+really4.5.2-1 (forky)2025
CVE-2025-30204 [HIGH] CVE-2025-30204: golang-github-golang-jwt-jwt - golang-jwt is a Go implementation of JSON Web Tokens. Starting in version 3.2.0 ...
golang-jwt is a Go implementation of JSON Web Tokens. Starting in version 3.2.0 and prior to versions 5.2.2 and 4.5.2, the function parse.ParseUnverified splits (via a call to strings.Split) its argument (which is untrusted data) on periods. As a result, in the face of a malicious request whose Authorization header consists of Bearer followed by
debian
CVE-2024-51744LOWCVSS 3.1fixed in golang-github-golang-jwt-jwt 5.0.0+really4.5.2-1 (forky)2024
CVE-2024-51744 [LOW] CVE-2024-51744: golang-github-golang-jwt-jwt - golang-jwt is a Go implementation of JSON Web Tokens. Unclear documentation of t...
golang-jwt is a Go implementation of JSON Web Tokens. Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by `ParseWithClaims` return both error codes. If users only
debian