Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-9308

Опубликовано: 21 авг. 2025
Источник: debian
EPSS Низкий

Описание

A vulnerability has been found in yarnpkg Yarn up to 1.22.22. This impacts the function setOptions of the file src/util/request-manager.js. Such manipulation leads to inefficient regular expression complexity. Local access is required to approach this attack. This vulnerability only affects products that are no longer supported by the maintainer.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
node-yarnpkgunfixedpackage
node-yarnpkgno-dsatrixiepackage
node-yarnpkgno-dsabookwormpackage
node-yarnpkgpostponedbullseyepackage

Примечания

  • https://github.com/yarnpkg/yarn/pull/9203

EPSS

Процентиль: 2%
0.00014
Низкий

Связанные уязвимости

CVSS3: 3.3
ubuntu
27 дней назад

A vulnerability has been found in yarnpkg Yarn up to 1.22.22. This impacts the function setOptions of the file src/util/request-manager.js. Such manipulation leads to inefficient regular expression complexity. Local access is required to approach this attack. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 3.3
redhat
27 дней назад

A vulnerability has been found in yarnpkg Yarn up to 1.22.22. This impacts the function setOptions of the file src/util/request-manager.js. Such manipulation leads to inefficient regular expression complexity. Local access is required to approach this attack. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 3.3
nvd
27 дней назад

A vulnerability has been found in yarnpkg Yarn up to 1.22.22. This impacts the function setOptions of the file src/util/request-manager.js. Such manipulation leads to inefficient regular expression complexity. Local access is required to approach this attack. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS3: 3.3
github
27 дней назад

A vulnerability has been found in yarnpkg Yarn up to 1.22.22. This impacts the function setOptions of the file src/util/request-manager.js. Such manipulation leads to inefficient regular expression complexity. Local access is required to approach this attack. This vulnerability only affects products that are no longer supported by the maintainer.

EPSS

Процентиль: 2%
0.00014
Низкий