Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-c8v6-786g-vjx6 | json-jwt allows bypass of identity checks via a sign/encryption confusion attack |
Fri, 27 Feb 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:json-jwt_project:json-jwt:*:*:*:*:*:ruby:*:* | |
| Metrics |
ssvc
|
Thu, 08 May 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Json-jwt Project
Json-jwt Project json-jwt |
|
| CPEs | cpe:2.3:a:json-jwt_project:json-jwt:1.16.3:*:*:*:*:ruby:*:* | |
| Vendors & Products |
Json-jwt Project
Json-jwt Project json-jwt |
Mon, 26 Aug 2024 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-284 | |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-26T20:08:16.108Z
Reserved: 2023-12-25T00:00:00.000Z
Link: CVE-2023-51774
Updated: 2024-08-02T22:48:11.253Z
Status : Analyzed
Published: 2024-02-29T01:42:05.597
Modified: 2025-05-08T22:48:00.990
Link: CVE-2023-51774
OpenCVE Enrichment
No data.
Github GHSA