Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-12565

Опубликовано: 19 июн. 2018
Источник: ubuntu
Приоритет: high
EPSS Низкий
CVSS2: 6.5
CVSS3: 8.8

Описание

An issue was discovered in Linaro LAVA before 2018.5.post1. Because of use of yaml.load() instead of yaml.safe_load() when parsing user data, remote code execution can occur.

РелизСтатусПримечание
artful

DNE

bionic

DNE

devel

not-affected

2018.5.post1-1
esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

2018.5.post1-1
xenial

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

needs-triage

xenial

DNE

Показывать по

EPSS

Процентиль: 85%
0.025
Низкий

6.5 Medium

CVSS2

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
больше 7 лет назад

An issue was discovered in Linaro LAVA before 2018.5.post1. Because of use of yaml.load() instead of yaml.safe_load() when parsing user data, remote code execution can occur.

CVSS3: 8.8
debian
больше 7 лет назад

An issue was discovered in Linaro LAVA before 2018.5.post1. Because of ...

CVSS3: 8.8
github
больше 3 лет назад

An issue was discovered in Linaro LAVA before 2018.5.post1. Because of use of yaml.load() instead of yaml.safe_load() when parsing user data, remote code execution can occur.

EPSS

Процентиль: 85%
0.025
Низкий

6.5 Medium

CVSS2

8.8 High

CVSS3