![images/blog_openssl-vulns.webp](https://eddieknight.dev/images/blog_openssl-vulns.webp)
In this article, we won’t be going into detail about how the vulnerability came to be or even how to patch it (in short: upgrade to the latest). Instead, we’ll be taking a quick look at what an exploit against these two new issues could be able to do- and compare it to two other common dependency exploits.