AI description
CVE-2025-68926 affects RustFS, a distributed object storage system. Prior to version 1.0.0-alpha.77, RustFS uses a hardcoded static token, "rustfs rpc", for gRPC authentication. This token is exposed in the source code repository and is the same on both the client and server sides. The hardcoded token is non-configurable, lacks a rotation mechanism, and is universally valid across all RustFS deployments. An attacker with network access to the gRPC port can use this publicly known token to authenticate and perform privileged operations, including data destruction, policy manipulation, and cluster configuration changes. Version 1.0.0-alpha.77 addresses this vulnerability.
- Description
- RustFS is a distributed object storage system built in Rust. In versions prior to 1.0.0-alpha.78, RustFS implements gRPC authentication using a hardcoded static token `"rustfs rpc"` that is publicly exposed in the source code repository, hardcoded on both client and server sides, non-configurable with no mechanism for token rotation, and universally valid across all RustFS deployments. Any attacker with network access to the gRPC port can authenticate using this publicly known token and execute privileged operations including data destruction, policy manipulation, and cluster configuration changes. Version 1.0.0-alpha.78 contains a fix for the issue.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
- Products
- rustfs
CVSS 3.1
- Type
- Secondary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- security-advisories@github.com
- CWE-287
- Hype score
- Not currently trending
#VulnerabilityReport #AuthenticationBypass CVE-2025-68926: Critical Hardcoded Credential Flaw Exposes RustFS Storage Clusters https://t.co/UUyxXbHGWH
@Komodosec
4 Feb 2026
30 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🧩 #RustFS Authentication Bypass Vulnerability (CVE-2025-68926) A critical hardcoded credential flaw allows authentication bypass on internet exposed RustFS instances via the gRPC management port. Our analysis shows: • CVSS v3.1 score of 9.8 (Critical) • Har
@CriminalIP_US
16 Jan 2026
91 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔍 CVE-2025-68926|#RustFS ハードコード認証情報脆弱性(CVSS 9.8) 2025年末に公開されたRustFSのハードコードされた静的認証トークンにより、gRPC 管理機能へ認証不要でアクセス可能となる致命的な脆弱性が確
@CriminalIP_JP
16 Jan 2026
175 Impressions
0 Retweets
3 Likes
0 Bookmarks
0 Replies
0 Quotes
🧩 CVE-2025-68926: RustFS 하드코딩 크리덴셜 취약점 (CVSS 9.8) Criminal IP 분석 결과, 하드코딩된 인증 구조로 인해 RustFS 스토리지 관리 서비스가 외부에 노출된 사례가 확인되었습니다. 이 취약점은 네트워크 접근만으
@CriminalIP_KR
16 Jan 2026
104 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
🚨 CVE-2025-68926 - critical 🚨 RustFS < 1.0.0-alpha.77 - Hardcoded gRPC Authentication Token > RustFS before 1.0.0-alpha.77 used a hardcoded gRPC authentication token "rustfs rpc" ... 👾 https://t.co/bHyVJJ2r7x @pdnuclei #NucleiTemplates #cve
@pdnuclei_bot
6 Jan 2026
91 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
CVE-2025-68926 RustFS gRPC Hardcoded. 2024-09-27: Hardcoded token "rustfs rpc" introduced• 2024-10-01: Vulnerable release published• 2026-01-05: Patched version released• Exposure: ~15 monthshttps://github.com/rustfs/rustfs/commit/04ab9d75a97014d3056d4affcb0a0987c0d29a01 ht
@MortyJin
6 Jan 2026
116 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️⚠️ CVE-2025-68926(CVSS 9.8): Critical Hardcoded Credential Flaw Exposes RustFS Storage Clusters 📖Details:https://t.co/1O7JgR4b2K 🔗FOFA Link: https://t.co/vWqmYyZisP 🎯2.8k+ Results are found on the https://t.co/pb16tGYaKe nearly year. FOFA Query: app="RUSTFS-Rus
@fofabot
5 Jan 2026
2381 Impressions
10 Retweets
46 Likes
10 Bookmarks
0 Replies
0 Quotes
GitHub - Chocapikk/CVE-2025-68926: CVE-2025-68926 - RustFS Hardcoded gRPC Authentication Token Exploit - https://t.co/w3Haw1NGsQ
@piedpiper1616
5 Jan 2026
3173 Impressions
8 Retweets
36 Likes
10 Bookmarks
1 Reply
0 Quotes
2025 下半年是 CVE 快樂年呢,每幾週就會有很生草的 CVE 漏洞。RustFS,一個有 19.1K GitHub Stars 的 MINIO 替代品,爆出了一個 CVSS 分數達 9.8 的漏洞 (CVE-2025-68926)。 原因也是非常笨:RustFS 的控制台 (console) 裡面使用了 gRP
@byStarTW
4 Jan 2026
218 Impressions
0 Retweets
3 Likes
0 Bookmarks
0 Replies
0 Quotes
wtf I'm seeing here? CVE-2025-68926 gRPC Hardcoded Token Authentication Bypass https://t.co/n4L0e4JWuk https://t.co/WnMV4U6vFI
@h4x0r_dz
4 Jan 2026
33697 Impressions
28 Retweets
258 Likes
106 Bookmarks
8 Replies
2 Quotes
🚨Alert🚨 CVE-2025-68926 (CVSS 9.8): Critical Hardcoded Credential Flaw Exposes RustFS Storage Clusters. 🧐Detail :https://t.co/RBnUrdDmyY 📊 18.1K Services are found on the https://t.co/ysWb28BTvF yearly. 🔗Hunter Link:https://t.co/DOuuryzojt 👇Query HUNTER : https:/
@HunterMapping
4 Jan 2026
2737 Impressions
9 Retweets
51 Likes
13 Bookmarks
1 Reply
0 Quotes
🚨Alert🚨 CVE-2025-68926 (CVSS 9.8): Critical Hardcoded Credential Flaw Exposes RustFS Storage Clusters. 🧐Detail :https://t.co/RBnUrdDmyY 📊 18.1K Services are found on the https://t.co/ysWb28BTvF yearly. 🔗Hunter Link:https://t.co/DOuuryzojt 👇Query HUNTER :
@HunterMapping
4 Jan 2026
71 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨Alert🚨 CVE-2025-68926 (CVSS 9.8): Critical Hardcoded Credential Flaw Exposes RustFS Storage Clusters. 🧐Detail :https://t.co/RBnUrdDmyY 📊 18.1K Services are found on the https://t.co/ysWb28BTvF yearly. 🔗Hunter Link:https://t.co/DOuuryzojt 👇Query HUNTER : https:/
@HunterMapping
4 Jan 2026
77 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 cve-2025-68926 (CVSS 9.8): RustFS has a gRPC Hardcoded Token Authentication Bypass RustFS is vulnerable to a gRPC hardcoded token authentication bypass due to a static, non-configurable token exposed in source code, allowing attackers to authenticate and perform privileged
@zoomeye_team
4 Jan 2026
3330 Impressions
8 Retweets
40 Likes
20 Bookmarks
1 Reply
0 Quotes
The Rust Security Myth? 🦀🔓 Rust is known for memory safety, but it can’t stop human error. CVE-2025-68926 (CWE-798) has just exposed a massive flaw in RustFS Full Report: 🔗 https://t.co/lZs9UfsKfl #CyberSecurity #CloudSecurity #RustLang #DataBreach #InfoSec #CYBERDU
@cyberbivash
2 Jan 2026
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
分散型オブジェクトストレージRustFSに重大(Critical)な脆弱性。CVE-2025-68926はCVSSスコア9.8のハードコードされた認証情報。gRPC認証機構のシークレットキーが"rustfs rpc"だった(ソースコードとして公開済)。PoC(
@__kokumoto
2 Jan 2026
1069 Impressions
1 Retweet
6 Likes
1 Bookmark
0 Replies
0 Quotes
CVE-2025-68926 Hardcoded Authentication Token Vulnerability in RustFS gRPC Service Before 1.0.0-alpha.77 https://t.co/DPHJDXF8tn
@VulmonFeeds
31 Dec 2025
5 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-68926: CRITICAL] Critical security flaw in RustFS versions <1.0.0-alpha.77 exposes network access to gRPC port due to hardcoded static authentication token. Update to v1.0.0-alpha.77 to fix the issue.#cve,CVE-2025-68926,#cybersecurity https://t.co/hALrrLrlPR https://
@CveFindCom
30 Dec 2025
19 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔴 CVE-2025-68926 - Critical RustFS is a distributed object storage system built in Rust. In versions prior to 1.0.0-alpha.77, RustFS implements gRPC authentication using a hardcoded static token `"rustfs rpc"` that ... https://t.co/4t4xudBsyQ https://t.co/6XL7QM9IJp
@TheHackerWire
30 Dec 2025
56 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha1:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "454A2F3A-76CF-4F2D-97FE-AEDEBE8FF1CA"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha10:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "32B2D146-7920-4C6D-B42F-1BDDF5193394"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha11:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "B25BC365-35BA-438A-B5B1-3FA696767821"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha12:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "B69213F1-7D94-4185-9309-FF3140733550"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha13:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "BD2476D6-257C-4A96-BED4-D8B002402242"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha14:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "774EC64C-73ED-4D6B-893B-30A066DA934C"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha15:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "4B567F4F-131F-4D4B-8C0C-9212F22F2BB3"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha16:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "711F7641-A2B2-410B-B05D-6656F9A1798F"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha17:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "EB79AC62-2B79-441C-BC09-4C834C32EADA"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha18:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "62DE84EE-9F3B-460A-AC13-D2B8CCBC5B4E"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha19:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "DEF70599-6550-49D2-9800-FE3249A66568"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha2:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "550786BD-A6A4-454B-BDAB-67AE64DABCA7"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha20:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "FDFE93A5-B6D7-482A-A891-4D8844604C07"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha21:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "79AC4F00-B006-46C2-863F-2946BB02B58E"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha22:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "E313A243-ED56-498D-988F-E088693EBB61"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha23:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "D3A60CB7-1F01-4A60-8555-C225AC89B959"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha24:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "1C98618D-CF5D-406B-8AA5-34B412F3D43D"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha25:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "98373960-FEDB-4933-92D5-2A597045DD23"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha26:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "83E0E1A5-3C07-45FF-80FD-0DB375E1575E"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha27:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "C2D66076-4005-4F58-A8E2-69062053D786"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha28:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "1D8CB0F5-299F-4BB0-B264-F5642DD991C4"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha29:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "96E20418-FE0C-4202-8771-FFF8EBB1B62D"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha3:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "C16A625B-3FC4-48EB-9107-6E7585080D15"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha30:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "810A17F9-AEEA-4396-B437-120789BBE882"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha31:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "7B1FECD4-E993-417D-AEA7-F8E97DC6A5FA"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha32:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "3839F299-E0E7-4994-A8AC-B67A534C9847"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha33:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "46CAEA4E-5DFD-4668-ABF0-DC53EB04EE7B"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha34:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "591075AB-81EF-4D42-A2A0-FA28BC6B78CC"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha35:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "FD46ED07-6DCC-4BF8-A4E8-78B2FF6DCE4C"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha36:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "6DF15533-D6E1-49B0-B30A-6FEECC7AE06C"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha37:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "EC68F03A-D299-4BFB-A99E-4B08E4E0848F"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha38:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "0DD60024-CAB2-4DA6-A9CA-503D2631E98B"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha39:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "32470ED0-7873-41A3-B2D5-7CD444ED0A45"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha4:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "A88E9293-4B7C-4C52-9943-47197DB55D59"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha40:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "E2EFC74D-40E7-426C-9F7B-3B654F2B940F"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha41:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "EAAF504E-51A5-492B-887E-BB67788B899C"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha42:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "35C83244-D2C7-4D70-9C0B-D0590B00C608"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha43:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "429E4ECD-997A-4D3B-9DE2-60835AE14473"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha44:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "5DDDBAA5-D207-498C-A6F0-79F07806C511"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha45:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "81758B85-6D2B-4914-96EC-E4CCDE2F9A52"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha46:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "D439B484-E32D-4A6A-84EE-9307A028F736"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha47:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "FDA137F7-DC8A-44F4-8061-F502AC8DD7BF"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha48:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "AE3EF7B3-E8C0-4844-9165-3A26EB426615"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha49:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "EB40D926-AE20-46A7-9B6E-ED1BADB9A08B"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha5:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "7F5E8DE5-ABB0-4884-B473-07FA596A8707"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha50:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "3A43A950-59A6-4343-815A-953C11DC3F13"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha51:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "87B36190-C30B-45BC-9738-BE0B3321025D"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha52:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "86A2967C-E2C6-4C73-9BDE-CCECACDB2B02"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha53:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "5E10A654-E265-4469-8099-ABBB1F5D8BCF"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha54:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "762591A8-A0A2-45D2-B15F-1E85DFC5CA86"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha55:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "53DE196C-1914-40AE-854D-4988073D57C3"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha56:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "5BE55B7E-3806-4F8A-B09C-7B9D173D3FAE"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha57:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "8CF07DA6-11F6-4A19-9FD9-1955EC22C779"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha58:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "1A571B98-0EE7-46A6-8514-3E02F9CE969A"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha59:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "3263EEC7-94FF-4802-BCB2-0C3713079439"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha6:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "2B55C391-0232-4F06-A9D8-3663FA564E81"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha60:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "FA13E6EE-A889-408E-8503-2F57A5E46CE1"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha61:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "4D28A63E-ADE5-4DEC-8E75-0884A7011613"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha62:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "21E6129E-565C-45AE-A0C8-2D1B623EEC9D"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha63:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "046F640C-18E9-4FC4-812D-8E4CAAFCAE55"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha64:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "BFB217B7-78AA-4D16-9A2B-863BD6CD01B6"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha65:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "F8EEF3FF-410B-40F3-A144-CD61ED394109"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha66:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "E3494138-7FE7-4152-935C-C1C35179064B"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha67:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "9E0461BC-0E45-4F9F-A837-4D9FC8852A75"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha68:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "E259407D-61CF-4956-A456-57F131334456"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha69:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "B6E44EF8-98A5-47F5-B7E9-3199EB08FAC1"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha7:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "54AB158B-F536-4627-8C6B-65AEE112FDF0"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha70:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "F4CBBD85-02F9-491A-8845-59EFB88F2DAF"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha71:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "2271380A-3AE1-4954-8D16-5065C8E88D32"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha72:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "DB3F6C7E-71E4-427A-96F4-F62DE0ED9450"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha73:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "980BEAAE-143E-4F28-9A2F-58CED3D296E9"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha74:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "8E14C88E-CE9B-44DA-98DE-280C0D6E4C8D"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha75:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "EEC13614-61AD-45A7-B7FA-07346D33CACF"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha76:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "6B3E9EB0-0A41-4146-B6A9-49B1A70358DC"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha77:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "CBDD75C5-1A08-4758-9324-172C1D539322"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha8:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "F800AEB3-3AD7-42D8-BC3A-23703851435B"
},
{
"criteria": "cpe:2.3:a:rustfs:rustfs:1.0.0:alpha9:*:*:*:rust:*:*",
"vulnerable": true,
"matchCriteriaId": "5821FADC-CF73-4639-911A-F3302D239B7C"
}
],
"operator": "OR"
}
]
}
]