CVE-2022-39227 python-jwt patch available
Reporter | Title | Published | Views | Family All 14 |
---|---|---|---|---|
![]() | CVE-2022-39227 | 26 Sep 202208:49 | – | redhatcve |
![]() | CVE-2022-39227 | 23 Sep 202207:15 | – | nvd |
![]() | CVE-2022-39227 | 23 Sep 202207:15 | – | cve |
![]() | PYSEC-2022-259 | 1 Sep 202218:51 | – | osv |
![]() | CVE-2022-39227 | 23 Sep 202207:15 | – | osv |
![]() | python-jwt vulnerable to token forgery with new claims | 21 Sep 202221:33 | – | osv |
![]() | Exploit for Authentication Bypass by Spoofing in Python-Jwt Project Python-Jwt | 7 Jun 202311:11 | – | githubexploit |
![]() | CVE-2022-39227 Python-jwt subject to Authentication Bypass by Spoofing | 23 Sep 202206:55 | – | cvelist |
![]() | CBL Mariner 2.0 Security Update: python-jwt (CVE-2022-39227) | 28 Mar 202300:00 | – | nessus |
![]() | CVE-2022-39227 affecting package python-jwt for versions less than 2.4.0-2 | 17 Oct 202222:54 | – | cbl_mariner |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
CBL-Mariner | 1.0 | all | python-jwt | 2.4.0-2 | UNKNOWN |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo