Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-39028

EPSS 0.37% · P59
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-39028

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
telnetd in GNU Inetutils through 2.3, MIT krb5-appl through 1.0.3, and derivative works has a NULL pointer dereference via 0xff 0xf7 or 0xff 0xf8. In a typical installation, the telnetd application would crash but the telnet service would remain available through inetd. However, if the telnetd application has many crashes within a short time interval, the telnet service would become unavailable after inetd logs a "telnet/tcp server failing (looping), service terminated" error. NOTE: MIT krb5-appl is not supported upstream but is shipped by a few Linux distributions. The affected code was removed from the supported MIT Kerberos 5 (aka krb5) product many years ago, at version 1.8.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
GNU Inetutils 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
GNU Inetutils是GNU社区的一组常见的网络程序。 GNU Inetutils 2.3版本及之前版本、MIT krb5-appl 1.0.3版本及之前版本存在安全漏洞,该漏洞源于取消引用 NULL 指针,导致telnetd 应用程序崩溃。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2022-39028

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-39028

登录查看更多情报信息。

Same Patch Batch · n/a · 2022-08-30 · 31 CVEs total

CVE-2022-258577.5 HIGHDenial of Service (DoS)
CVE-2022-256465.4 MEDIUMCross-site Scripting (XSS)
CVE-2022-258875.3 MEDIUMRegular Expression Denial of Service (ReDoS)
CVE-2022-36745LibreNMS 跨站脚本漏洞
CVE-2022-37173Gvim 安全漏洞
CVE-2022-36730Library Management System SQL注入漏洞
CVE-2022-36731Library Management System SQL注入漏洞
CVE-2022-36732Library Management System SQL注入漏洞
CVE-2022-36733Library Management System SQL注入漏洞
CVE-2022-36734Library Management System SQL注入漏洞
CVE-2022-36735Library Management System SQL注入漏洞
CVE-2022-36657Library Management System 跨站脚本漏洞
CVE-2022-36565WampServer 安全漏洞
CVE-2022-36746LibreNMS 跨站脚本漏洞
CVE-2022-36747Razor 跨站脚本漏洞
CVE-2022-36748PicUploader 跨站脚本漏洞
CVE-2022-36749RPi-Jukebox-RFID 操作系统命令注入漏洞
CVE-2022-37172MSYS2 安全漏洞
CVE-2021-46837Asterisk 代码问题漏洞
CVE-2022-36564Perl 安全漏洞

Showing top 20 of 31 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2022-39028

No comments yet


Leave a comment