Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

go-jose — Vulnerabilities & Security Advisories 3

Browse all 3 CVE security advisories affecting go-jose. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Go-jose is a Go implementation of the JavaScript Object Signing and Encryption (JOSE) specifications, primarily used for cryptographic operations in web applications. Historically, it has been susceptible to remote code execution vulnerabilities due to insecure parsing of cryptographic tokens, as well as cross-site scripting flaws through improper input validation. The library has faced three CVEs, including critical issues allowing attackers to bypass authentication or execute arbitrary code via crafted JWT tokens. While not associated with any major public incidents, these vulnerabilities highlight risks in token handling and cryptographic implementation that could lead to complete system compromise if unpatched.

Top products by go-jose: go-jose

This page lists every published CVE security advisory associated with go-jose. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.