cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2022-25326,https://securityvulnerability.io/vulnerability/CVE-2022-25326,Denial of Service in fscrypt,"fscrypt through v0.3.2 creates a world-writable directory by default when setting up a filesystem, allowing unprivileged users to exhaust filesystem space. We recommend upgrading to fscrypt 0.3.3 or above and adjusting the permissions on existing fscrypt metadata directories where applicable.",Google,Fscrypt,5.5,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2022-02-25T11:15:00.000Z,0 CVE-2022-25327,https://securityvulnerability.io/vulnerability/CVE-2022-25327,Local Denial of Service in fscrypt PAM module,"The PAM module for fscrypt doesn't adequately validate fscrypt metadata files, allowing users to create malicious metadata files that prevent other users from logging in. A local user can cause a denial of service by creating a fscrypt metadata file that prevents other users from logging into the system. We recommend upgrading to version 0.3.3 or above",Google,Fscrypt,5.5,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2022-02-25T11:15:00.000Z,0 CVE-2022-25328,https://securityvulnerability.io/vulnerability/CVE-2022-25328,Privilege escalation through command injection in fscrypt,"The bash_completion script for fscrypt allows injection of commands via crafted mountpoint paths, allowing privilege escalation under a specific set of circumstances. A local user who has control over mountpoint paths could potentially escalate their privileges if they create a malicious mountpoint path and if the system administrator happens to be using the fscrypt bash completion script to complete mountpoint paths. We recommend upgrading to version 0.3.3 or above",Google,Fscrypt,5,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2022-02-25T11:15:00.000Z,0