Use of a Broken or Risky Cryptographic Algorithm in GitHub repository gnuboard/gnuboard5 prior to and including 5.5.5. A vulnerability in gnuboard v5.5.5 and below uses weak encryption algorithms leading to sensitive information exposure. This allows an attacker to derive the email address of any user, including when the 'Let others see my information.' box is ticked off. Or to send emails to any email address, with full control of its contents
Metrics
Affected Vendors & Products
References
History
Thu, 19 Sep 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Sir
Sir gnuboard |
|
CPEs | cpe:2.3:a:sir:gnuboard:*:*:*:*:*:*:*:* | |
Vendors & Products |
Gnuboard
Gnuboard gnuboard5 |
Sir
Sir gnuboard |
MITRE
Status: PUBLISHED
Assigner: @huntrdev
Published: 2022-04-11T10:15:14
Updated: 2024-08-02T23:55:24.553Z
Reserved: 2022-04-06T00:00:00
Link: CVE-2022-1252
Vulnrichment
No data.
NVD
Status : Modified
Published: 2022-04-11T11:15:07.943
Modified: 2024-11-21T06:40:20.770
Link: CVE-2022-1252
Redhat
No data.