Логотип exploitDog
bind:"BDU:2023-02108" OR bind:"CVE-2023-0464"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2023-02108" OR bind:"CVE-2023-0464"

Количество 22

Количество 22

fstec логотип

BDU:2023-02108

больше 2 лет назад

Уязвимость криптографической библиотеки OpenSSL, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2023-0464

около 2 лет назад

A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2023-0464

около 2 лет назад

A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2023-0464

около 2 лет назад

A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2023-0464

около 2 лет назад

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2023-0464

около 2 лет назад

A security vulnerability has been identified in all supported versions ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1764-1

около 2 лет назад

Security update for openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1754-1

около 2 лет назад

Security update for openssl1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1748-1

около 2 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1747-1

около 2 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1746-1

около 2 лет назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1745-1

около 2 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1738-1

около 2 лет назад

Security update for openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1737-1

около 2 лет назад

Security update for compat-openssl098

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1704-1

около 2 лет назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1703-1

около 2 лет назад

Security update for openssl-1_0_0

EPSS: Низкий
redos логотип

ROS-20230407-03

около 2 лет назад

Уязвимость OpenSSL

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-w2w6-xp88-5cvw

около 2 лет назад

A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1790-1

около 2 лет назад

Security update for openssl-1_1

EPSS: Низкий
oracle-oval логотип

ELSA-2023-3722

почти 2 года назад

ELSA-2023-3722: openssl security and bug fix update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2023-02108

Уязвимость криптографической библиотеки OpenSSL, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
1%
Низкий
больше 2 лет назад
ubuntu логотип
CVE-2023-0464

A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 7.5
1%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-0464

A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 5.9
1%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-0464

A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 7.5
1%
Низкий
около 2 лет назад
msrc логотип
CVSS3: 7.5
1%
Низкий
около 2 лет назад
debian логотип
CVE-2023-0464

A security vulnerability has been identified in all supported versions ...

CVSS3: 7.5
1%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1764-1

Security update for openssl

1%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1754-1

Security update for openssl1

1%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1748-1

Security update for openssl-1_1

1%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1747-1

Security update for openssl-1_1

1%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1746-1

Security update for openssl-3

1%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1745-1

Security update for openssl-1_1

1%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1738-1

Security update for openssl

1%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1737-1

Security update for compat-openssl098

1%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1704-1

Security update for openssl-1_0_0

1%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1703-1

Security update for openssl-1_0_0

1%
Низкий
около 2 лет назад
redos логотип
ROS-20230407-03

Уязвимость OpenSSL

CVSS3: 7.5
1%
Низкий
около 2 лет назад
github логотип
GHSA-w2w6-xp88-5cvw

A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 7.5
1%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1790-1

Security update for openssl-1_1

около 2 лет назад
oracle-oval логотип
ELSA-2023-3722

ELSA-2023-3722: openssl security and bug fix update (MODERATE)

почти 2 года назад

Уязвимостей на страницу