Логотип exploitDog
bind:CVE-2018-12556
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-12556

Количество 3

Количество 3

ubuntu логотип

CVE-2018-12556

больше 6 лет назад

The signature verification routine in install.sh in yarnpkg/website through 2018-06-05 only verifies that the yarn release is signed by any (arbitrary) key in the local keyring of the user, and does not pin the signature to the yarn release key, which allows remote attackers to sign tampered yarn release packages with their own key.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2018-12556

больше 6 лет назад

The signature verification routine in install.sh in yarnpkg/website through 2018-06-05 only verifies that the yarn release is signed by any (arbitrary) key in the local keyring of the user, and does not pin the signature to the yarn release key, which allows remote attackers to sign tampered yarn release packages with their own key.

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-8mxx-g9vw-r875

больше 3 лет назад

The signature verification routine in install.sh in yarnpkg/website through 2018-06-05 only verifies that the yarn release is signed by any (arbitrary) key in the local keyring of the user, and does not pin the signature to the yarn release key, which allows remote attackers to sign tampered yarn release packages with their own key.

CVSS3: 5.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2018-12556

The signature verification routine in install.sh in yarnpkg/website through 2018-06-05 only verifies that the yarn release is signed by any (arbitrary) key in the local keyring of the user, and does not pin the signature to the yarn release key, which allows remote attackers to sign tampered yarn release packages with their own key.

CVSS3: 5.9
0%
Низкий
больше 6 лет назад
nvd логотип
CVE-2018-12556

The signature verification routine in install.sh in yarnpkg/website through 2018-06-05 only verifies that the yarn release is signed by any (arbitrary) key in the local keyring of the user, and does not pin the signature to the yarn release key, which allows remote attackers to sign tampered yarn release packages with their own key.

CVSS3: 5.9
0%
Низкий
больше 6 лет назад
github логотип
GHSA-8mxx-g9vw-r875

The signature verification routine in install.sh in yarnpkg/website through 2018-06-05 only verifies that the yarn release is signed by any (arbitrary) key in the local keyring of the user, and does not pin the signature to the yarn release key, which allows remote attackers to sign tampered yarn release packages with their own key.

CVSS3: 5.9
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу