### [CVE-2019-9154](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9154) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Improper Verification of a Cryptographic Signature in OpenPGP.js <=4.1.2 allows an attacker to pass off unsigned data as signed. ### POC #### Reference - http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html - http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/ - https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/ #### Github No PoCs found on GitHub currently.