{"package":"Microsoft.AspNetCore.Authentication.JwtBearer","ecosystem":"nuget","latest_version":"11.0.0-preview.3.26207.106","description":"ASP.NET Core middleware that enables an application to receive an OpenID Connect bearer token.\n\nThis package was built from the source code at https://github.com/dotnet/dotnet/tree/a8b33e7593686eaee701cd124daaabff2311634f","license":"MIT","license_risk":"permissive","commercial_use_notes":"Permissive: commercial closed-source use OK; preserve the copyright notice.","homepage":"https://asp.net/","repository":"https://asp.net/","downloads_weekly":5676318,"health":{"score":82,"risk":"low","breakdown":{"maintenance":25,"popularity":17,"security":23,"maturity":15,"community":2},"deprecated":false,"max_score":100},"vulnerabilities":{"count":1,"critical":0,"high":0,"medium":1,"low":0,"details":[{"vuln_id":"BIT-aspnet-core-2021-34532","severity":"medium","summary":"ASP.NET Core Information Disclosure Vulnerability","affected_versions":">=2.1.0,<2.1.29|>=3.0.0,<3.1.18|>=5.0.0,<5.0.9|=2.1.0|=2.1.1|=2.1.2|=3.0.0|=3.0.2|=3.0.3|=3.1.0|=3.1.1|=3.1.10|=3.1.11|=3.1.12|=3.1.13|=3.1.14|=3.1.15|=3.1.16|=3.1.17|=3.1.2|=3.1.3|=3.1.4|=3.1.5|=3.1.6|=3.1.7|=3.1.8|=3.1.9|=5.0.0|=5.0.1|=5.0.2|=5.0.3|=5.0.4|=5.0.5|=5.0.6|=5.0.7|=5.0.8","fixed_version":"5.0.9","source":"osv","published_at":"2021-08-25T14:45:28Z"}],"actively_exploited_count":0,"likely_exploited_count":0},"versions":{"latest":"11.0.0-preview.3.26207.106","total_count":262,"recent":["10.0.5","10.0.6","10.0.7","11.0.0-preview.1.26104.118","11.0.0-preview.2.26159.112","11.0.0-preview.3.26207.106"]},"metadata":{"deprecated":false,"deprecated_message":null,"maintainers_count":1,"first_published":null,"last_published":"2026-04-14T15:58:56.33+00:00","dependencies_count":1,"dependencies":["Microsoft.IdentityModel.Protocols.OpenIdConnect"]},"github_stats":null,"bundle":null,"typescript":null,"known_issues":{"bugs_count":0,"bugs_severity":{},"status_breakdown":{},"link":null,"scope":"none"},"historical_compromise":null,"recommendation":{"action":"safe_to_use","issues":[],"use_version":"11.0.0-preview.3.26207.106","version_hint":"Update to >= 5.0.9 to fix known vulnerabilities","summary":"Microsoft.AspNetCore.Authentication.JwtBearer@11.0.0-preview.3.26207.106 is safe to use (health: 82/100)"},"version_scoped":null,"_meta":{"endpoint":"check","tier":"full","philosophy":"DepScope is free. Use the cheapest endpoint that answers your real question.","cheaper_alternatives":[{"endpoint":"/api/exists/nuget/Microsoft.AspNetCore.Authentication.JwtBearer","tokens_estimated":12,"use_when":"you only need to know if the package exists (hallucination guard)"},{"endpoint":"/api/health/nuget/Microsoft.AspNetCore.Authentication.JwtBearer","tokens_estimated":80,"use_when":"you only need a 0-100 score for go/no-go (>=70 = safe)"},{"endpoint":"/api/prompt/nuget/Microsoft.AspNetCore.Authentication.JwtBearer","tokens_estimated":280,"use_when":"you want a plain-text LLM-friendly brief instead of JSON"},{"endpoint":"POST /api/check_bulk","tokens_estimated":60,"use_when":"you have 5+ packages to check; sends one round-trip instead of N"}],"docs":"https://depscope.dev/integrate","hint_bulk":"You've called /api/check 22 times in 60s. Save bandwidth + tokens with POST /api/check_bulk (1 round-trip for N pkgs)."},"requested_version":null,"_cache":"miss","_response_ms":849,"_powered_by":"depscope.dev — free package intelligence for AI agents","typosquat":{"is_suspected":false},"maintainer_trust":{"available":false},"malicious":{"is_malicious":false},"scorecard":{"available":false},"quality":{"available":true,"criticality_score":0.447,"criticality_tier":"medium","velocity_pct":null,"velocity_trend":null,"publish_security":null},"co_used_with":[{"package":"FluentMigrator.Abstractions","occurrences":2}],"version_history_summary":{"total_versions":6,"first_release_age_days":null,"last_release_days_ago":18,"avg_days_between_releases":null,"release_velocity":"active"}}