Логотип exploitDog
bind:"CVE-2022-2097" OR bind:"CVE-2022-2068" OR bind:"CVE-2022-1292"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2022-2097" OR bind:"CVE-2022-2068" OR bind:"CVE-2022-1292"

Количество 57

Количество 57

github логотип

GHSA-3wx7-46ch-7rq2

почти 3 года назад

AES OCB fails to encrypt some bytes

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2022-04284

почти 3 года назад

Уязвимость режима AES OCB библиотеки OpenSSL, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 3.7
EPSS: Низкий
ubuntu логотип

CVE-2022-2068

почти 3 года назад

In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).

CVSS3: 9.8
EPSS: Высокий
redhat логотип

CVE-2022-2068

почти 3 года назад

In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).

CVSS3: 6.7
EPSS: Высокий
nvd логотип

CVE-2022-2068

почти 3 года назад

In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).

CVSS3: 9.8
EPSS: Высокий
msrc логотип

CVE-2022-2068

почти 3 года назад

CVSS3: 9.8
EPSS: Высокий
debian логотип

CVE-2022-2068

почти 3 года назад

In addition to the c_rehash shell command injection identified in CVE- ...

CVSS3: 9.8
EPSS: Высокий
ubuntu логотип

CVE-2022-1292

около 3 лет назад

The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).

CVSS3: 9.8
EPSS: Высокий
redhat логотип

CVE-2022-1292

около 3 лет назад

The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).

CVSS3: 6.7
EPSS: Высокий
nvd логотип

CVE-2022-1292

около 3 лет назад

The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).

CVSS3: 9.8
EPSS: Высокий
msrc логотип

CVE-2022-1292

около 3 лет назад

CVSS3: 9.8
EPSS: Высокий
debian логотип

CVE-2022-1292

около 3 лет назад

The c_rehash script does not properly sanitise shell metacharacters to ...

CVSS3: 9.8
EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2022:2417-1

почти 3 года назад

Security update for nodejs12

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2181-1

почти 3 года назад

Security update for openssl

EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2022:2180-1

почти 3 года назад

Security update for openssl

EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2022:2179-1

почти 3 года назад

Security update for openssl

EPSS: Высокий
github логотип

GHSA-xjxr-x4h8-946x

почти 3 года назад

In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).

CVSS3: 9.8
EPSS: Высокий
fstec логотип

BDU:2022-04039

почти 3 года назад

Уязвимость функции модульного возведения в степень Монтгомери с постоянным временем библиотек OpenSSL и BoringSSL, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2022:2106-1

около 3 лет назад

Security update for openssl-1_0_0

EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2022:2098-1

около 3 лет назад

Security update for openssl

EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-3wx7-46ch-7rq2

AES OCB fails to encrypt some bytes

CVSS3: 7.5
1%
Низкий
почти 3 года назад
fstec логотип
BDU:2022-04284

Уязвимость режима AES OCB библиотеки OpenSSL, позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 3.7
1%
Низкий
почти 3 года назад
ubuntu логотип
CVE-2022-2068

In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).

CVSS3: 9.8
71%
Высокий
почти 3 года назад
redhat логотип
CVE-2022-2068

In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).

CVSS3: 6.7
71%
Высокий
почти 3 года назад
nvd логотип
CVE-2022-2068

In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).

CVSS3: 9.8
71%
Высокий
почти 3 года назад
msrc логотип
CVSS3: 9.8
71%
Высокий
почти 3 года назад
debian логотип
CVE-2022-2068

In addition to the c_rehash shell command injection identified in CVE- ...

CVSS3: 9.8
71%
Высокий
почти 3 года назад
ubuntu логотип
CVE-2022-1292

The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).

CVSS3: 9.8
70%
Высокий
около 3 лет назад
redhat логотип
CVE-2022-1292

The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).

CVSS3: 6.7
70%
Высокий
около 3 лет назад
nvd логотип
CVE-2022-1292

The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).

CVSS3: 9.8
70%
Высокий
около 3 лет назад
msrc логотип
CVSS3: 9.8
70%
Высокий
около 3 лет назад
debian логотип
CVE-2022-1292

The c_rehash script does not properly sanitise shell metacharacters to ...

CVSS3: 9.8
70%
Высокий
около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:2417-1

Security update for nodejs12

почти 3 года назад
suse-cvrf логотип
SUSE-SU-2022:2181-1

Security update for openssl

71%
Высокий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2022:2180-1

Security update for openssl

71%
Высокий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2022:2179-1

Security update for openssl

71%
Высокий
почти 3 года назад
github логотип
GHSA-xjxr-x4h8-946x

In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).

CVSS3: 9.8
71%
Высокий
почти 3 года назад
fstec логотип
BDU:2022-04039

Уязвимость функции модульного возведения в степень Монтгомери с постоянным временем библиотек OpenSSL и BoringSSL, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
71%
Высокий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2022:2106-1

Security update for openssl-1_0_0

70%
Высокий
около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:2098-1

Security update for openssl

70%
Высокий
около 3 лет назад

Уязвимостей на страницу