CVE-2022-1252

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-1252
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-1252.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-1252
Published
2022-04-11T11:15:07Z
Modified
2025-01-14T10:17:54.862382Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
[none]
Details

Use of a Broken or Risky Cryptographic Algorithm in GitHub repository gnuboard/gnuboard5 prior to and including 5.5.5. A vulnerability in gnuboard v5.5.5 and below uses weak encryption algorithms leading to sensitive information exposure. This allows an attacker to derive the email address of any user, including when the 'Let others see my information.' box is ticked off. Or to send emails to any email address, with full control of its contents

References

Affected packages

Git / github.com/gnuboard/gnuboard5

Affected ranges

Type
GIT
Repo
https://github.com/gnuboard/gnuboard5
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

5.*

5.4.6

v5.*

v5.4.10
v5.4.11
v5.4.12
v5.4.13
v5.4.13.1
v5.4.14
v5.4.15
v5.4.15.1
v5.4.16
v5.4.17
v5.4.18
v5.4.18.1
v5.4.19
v5.4.20
v5.4.21
v5.4.22
v5.4.7
v5.4.8
v5.4.9
v5.5.0-beta
v5.5.0.1-beta
v5.5.0.2-beta
v5.5.1
v5.5.1-beta
v5.5.2
v5.5.3
v5.5.3.1
v5.5.4
v5.5.5