Show filters
8 Total Results
Displaying 1-8 of 8
Sort by:
Attacker Value
Moderate
CVE-2018-18629
Disclosure Date: December 20, 2018 (last updated November 27, 2024)
An issue was discovered in the Keybase command-line client before 2.8.0-20181023124437 for Linux. An untrusted search path vulnerability in the keybase-redirector application allows a local, unprivileged user on Linux to gain root privileges via a Trojan horse binary.
0
Attacker Value
Unknown
CVE-2022-22779
Disclosure Date: February 08, 2022 (last updated October 07, 2023)
The Keybase Clients for macOS and Windows before version 5.9.0 fails to properly remove exploded messages initiated by a user. This can occur if the receiving user switches to a non-chat feature and places the host in a sleep state before the sending user explodes the messages. This could lead to disclosure of sensitive information which was meant to be deleted from a user’s filesystem.
0
Attacker Value
Unknown
CVE-2021-34426
Disclosure Date: December 14, 2021 (last updated October 07, 2023)
A vulnerability was discovered in the Keybase Client for Windows before version 5.6.0 when a user executed the "keybase git lfs-config" command on the command-line. In versions prior to 5.6.0, a malicious actor with write access to a user\'s Git repository could leverage this vulnerability to potentially execute arbitrary Windows commands on a user\'s local system.
0
Attacker Value
Unknown
CVE-2021-34422
Disclosure Date: November 12, 2021 (last updated October 07, 2023)
The Keybase Client for Windows before version 5.7.0 contains a path traversal vulnerability when checking the name of a file uploaded to a team folder. A malicious user could upload a file to a shared folder with a specially crafted file name which could allow a user to execute an application which was not intended on their host machine. If a malicious user leveraged this issue with the public folder sharing feature of the Keybase client, this could lead to remote code execution.
0
Attacker Value
Unknown
CVE-2021-34421
Disclosure Date: November 12, 2021 (last updated October 07, 2023)
The Keybase Client for Android before version 5.8.0 and the Keybase Client for iOS before version 5.8.0 fails to properly remove exploded messages initiated by a user if the receiving user places the chat session in the background while the sending user explodes the messages. This could lead to disclosure of sensitive information which was meant to be deleted from the customer's device.
0
Attacker Value
Unknown
CVE-2021-23827
Disclosure Date: February 23, 2021 (last updated February 22, 2025)
Keybase Desktop Client before 5.6.0 on Windows and macOS, and before 5.6.1 on Linux, allows an attacker to obtain potentially sensitive media (such as private pictures) in the Cache and uploadtemps directories. It fails to effectively clear cached pictures, even after deletion via normal methodology within the client, or by utilizing the "Explode message/Explode now" functionality. Local filesystem access is needed by the attacker.
0
Attacker Value
Unknown
CVE-2019-16992
Disclosure Date: September 30, 2019 (last updated November 27, 2024)
The Keybase app 2.13.2 for iOS provides potentially insufficient notice that it is employing a user's private key to sign a certain cryptocurrency attestation (that an address at keybase.io can be used for Stellar payments to the user), which might be incompatible with a user's personal position on the semantics of an attestation.
0
Attacker Value
Unknown
CVE-2019-7249
Disclosure Date: January 31, 2019 (last updated November 27, 2024)
In Keybase before 2.12.6 on macOS, the move RPC to the Helper was susceptible to time-to-check-time-to-use bugs and would also allow one user of the system (who didn't have root access) to tamper with another's installs.
0