Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-1252


Use of a Broken or Risky Cryptographic Algorithm in GitHub repository gnuboard/gnuboard5 prior to and including 5.5.5. A vulnerability in gnuboard v5.5.5 and below uses weak encryption algorithms leading to sensitive information exposure. This allows an attacker to derive the email address of any user, including when the 'Let others see my information.' box is ticked off. Or to send emails to any email address, with full control of its contents


Published

2022-04-11T11:15:07.943

Last Modified

2024-11-21T06:40:20.770

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.2 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

4.9

Weaknesses
  • Type: Secondary
    CWE-327
  • Type: Secondary
    CWE-327

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application sir gnuboard ≤ 5.5.5 Yes

References