Логотип exploitDog
bind:"BDU:2023-00687" OR bind:"CVE-2022-46176"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2023-00687" OR bind:"CVE-2022-46176"

Количество 10

Количество 10

fstec логотип

BDU:2023-00687

больше 2 лет назад

Уязвимость менеджера пакетов Cargo языка программирования Rust, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

CVSS3: 5.3
EPSS: Низкий
redos логотип

ROS-20240402-20

около 1 года назад

Уязвимость cargo

CVSS3: 5.3
EPSS: Низкий
ubuntu логотип

CVE-2022-46176

больше 2 лет назад

Cargo is a Rust package manager. The Rust Security Response WG was notified that Cargo did not perform SSH host key verification when cloning indexes and dependencies via SSH. An attacker could exploit this to perform man-in-the-middle (MITM) attacks. This vulnerability has been assigned CVE-2022-46176. All Rust versions containing Cargo before 1.66.1 are vulnerable. Note that even if you don't explicitly use SSH for alternate registry indexes or crate dependencies, you might be affected by this vulnerability if you have configured git to replace HTTPS connections to GitHub with SSH (through git's [`url.<base>.insteadOf`][1] setting), as that'd cause you to clone the crates.io index through SSH. Rust 1.66.1 will ensure Cargo checks the SSH host key and abort the connection if the server's public key is not already trusted. We recommend everyone to upgrade as soon as possible.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2022-46176

больше 2 лет назад

Cargo is a Rust package manager. The Rust Security Response WG was notified that Cargo did not perform SSH host key verification when cloning indexes and dependencies via SSH. An attacker could exploit this to perform man-in-the-middle (MITM) attacks. This vulnerability has been assigned CVE-2022-46176. All Rust versions containing Cargo before 1.66.1 are vulnerable. Note that even if you don't explicitly use SSH for alternate registry indexes or crate dependencies, you might be affected by this vulnerability if you have configured git to replace HTTPS connections to GitHub with SSH (through git's [`url.<base>.insteadOf`][1] setting), as that'd cause you to clone the crates.io index through SSH. Rust 1.66.1 will ensure Cargo checks the SSH host key and abort the connection if the server's public key is not already trusted. We recommend everyone to upgrade as soon as possible.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2022-46176

больше 2 лет назад

Cargo is a Rust package manager. The Rust Security Response WG was notified that Cargo did not perform SSH host key verification when cloning indexes and dependencies via SSH. An attacker could exploit this to perform man-in-the-middle (MITM) attacks. This vulnerability has been assigned CVE-2022-46176. All Rust versions containing Cargo before 1.66.1 are vulnerable. Note that even if you don't explicitly use SSH for alternate registry indexes or crate dependencies, you might be affected by this vulnerability if you have configured git to replace HTTPS connections to GitHub with SSH (through git's [`url.<base>.insteadOf`][1] setting), as that'd cause you to clone the crates.io index through SSH. Rust 1.66.1 will ensure Cargo checks the SSH host key and abort the connection if the server's public key is not already trusted. We recommend everyone to upgrade as soon as possible.

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2022-46176

больше 2 лет назад

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2022-46176

больше 2 лет назад

Cargo is a Rust package manager. The Rust Security Response WG was not ...

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0133-1

больше 2 лет назад

Security update for rust1.65

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0132-1

больше 2 лет назад

Security update for rust1.66

EPSS: Низкий
github логотип

GHSA-r5w3-xm58-jv6j

больше 2 лет назад

Cargo did not verify SSH host keys

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2023-00687

Уязвимость менеджера пакетов Cargo языка программирования Rust, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
redos логотип
ROS-20240402-20

Уязвимость cargo

CVSS3: 5.3
0%
Низкий
около 1 года назад
ubuntu логотип
CVE-2022-46176

Cargo is a Rust package manager. The Rust Security Response WG was notified that Cargo did not perform SSH host key verification when cloning indexes and dependencies via SSH. An attacker could exploit this to perform man-in-the-middle (MITM) attacks. This vulnerability has been assigned CVE-2022-46176. All Rust versions containing Cargo before 1.66.1 are vulnerable. Note that even if you don't explicitly use SSH for alternate registry indexes or crate dependencies, you might be affected by this vulnerability if you have configured git to replace HTTPS connections to GitHub with SSH (through git's [`url.<base>.insteadOf`][1] setting), as that'd cause you to clone the crates.io index through SSH. Rust 1.66.1 will ensure Cargo checks the SSH host key and abort the connection if the server's public key is not already trusted. We recommend everyone to upgrade as soon as possible.

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2022-46176

Cargo is a Rust package manager. The Rust Security Response WG was notified that Cargo did not perform SSH host key verification when cloning indexes and dependencies via SSH. An attacker could exploit this to perform man-in-the-middle (MITM) attacks. This vulnerability has been assigned CVE-2022-46176. All Rust versions containing Cargo before 1.66.1 are vulnerable. Note that even if you don't explicitly use SSH for alternate registry indexes or crate dependencies, you might be affected by this vulnerability if you have configured git to replace HTTPS connections to GitHub with SSH (through git's [`url.<base>.insteadOf`][1] setting), as that'd cause you to clone the crates.io index through SSH. Rust 1.66.1 will ensure Cargo checks the SSH host key and abort the connection if the server's public key is not already trusted. We recommend everyone to upgrade as soon as possible.

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2022-46176

Cargo is a Rust package manager. The Rust Security Response WG was notified that Cargo did not perform SSH host key verification when cloning indexes and dependencies via SSH. An attacker could exploit this to perform man-in-the-middle (MITM) attacks. This vulnerability has been assigned CVE-2022-46176. All Rust versions containing Cargo before 1.66.1 are vulnerable. Note that even if you don't explicitly use SSH for alternate registry indexes or crate dependencies, you might be affected by this vulnerability if you have configured git to replace HTTPS connections to GitHub with SSH (through git's [`url.<base>.insteadOf`][1] setting), as that'd cause you to clone the crates.io index through SSH. Rust 1.66.1 will ensure Cargo checks the SSH host key and abort the connection if the server's public key is not already trusted. We recommend everyone to upgrade as soon as possible.

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
msrc логотип
CVSS3: 5.9
0%
Низкий
больше 2 лет назад
debian логотип
CVE-2022-46176

Cargo is a Rust package manager. The Rust Security Response WG was not ...

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:0133-1

Security update for rust1.65

0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:0132-1

Security update for rust1.66

0%
Низкий
больше 2 лет назад
github логотип
GHSA-r5w3-xm58-jv6j

Cargo did not verify SSH host keys

CVSS3: 5.3
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу