Логотип exploitDog
bind:"BDU:2024-11338" OR bind:"CVE-2024-45337"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2024-11338" OR bind:"CVE-2024-45337"

Количество 27

Количество 27

fstec логотип

BDU:2024-11338

около 1 года назад

Уязвимость функции ServerConfig.PublicKeyCallback() библиотеки для языка программирования Go crypto, позволяющая нарушителю обойти ограничения безопасности

CVSS3: 9.1
EPSS: Средний
redos логотип

ROS-20250110-14

12 месяцев назад

Уязвимость gitea

CVSS3: 9.1
EPSS: Средний
redos логотип

ROS-20241220-04

около 1 года назад

Уязвимость golang-x-crypto-devel

CVSS3: 9.1
EPSS: Средний
redos логотип

ROS-20250219-03

10 месяцев назад

Множественные уязвимости trivy

CVSS3: 9.8
EPSS: Низкий
redos логотип

ROS-20251203-11

28 дней назад

Множественные уязвимости etcd

CVSS3: 9.1
EPSS: Низкий
redos логотип

ROS-20251203-10

28 дней назад

Множественные уязвимости etcd

CVSS3: 9.1
EPSS: Низкий
ubuntu логотип

CVE-2024-45337

около 1 года назад

Applications and libraries which misuse connection.serverAuthenticate (via callback field ServerConfig.PublicKeyCallback) may be susceptible to an authorization bypass. The documentation for ServerConfig.PublicKeyCallback says that "A call to this function does not guarantee that the key offered is in fact used to authenticate." Specifically, the SSH protocol allows clients to inquire about whether a public key is acceptable before proving control of the corresponding private key. PublicKeyCallback may be called with multiple keys, and the order in which the keys were provided cannot be used to infer which key the client successfully authenticated with, if any. Some applications, which store the key(s) passed to PublicKeyCallback (or derived information) and make security relevant determinations based on it once the connection is established, may make incorrect assumptions. For example, an attacker may send public keys A and B, and then authenticate with A. PublicKeyCallback would b...

CVSS3: 9.1
EPSS: Средний
redhat логотип

CVE-2024-45337

около 1 года назад

Applications and libraries which misuse connection.serverAuthenticate (via callback field ServerConfig.PublicKeyCallback) may be susceptible to an authorization bypass. The documentation for ServerConfig.PublicKeyCallback says that "A call to this function does not guarantee that the key offered is in fact used to authenticate." Specifically, the SSH protocol allows clients to inquire about whether a public key is acceptable before proving control of the corresponding private key. PublicKeyCallback may be called with multiple keys, and the order in which the keys were provided cannot be used to infer which key the client successfully authenticated with, if any. Some applications, which store the key(s) passed to PublicKeyCallback (or derived information) and make security relevant determinations based on it once the connection is established, may make incorrect assumptions. For example, an attacker may send public keys A and B, and then authenticate with A. PublicKeyCallback would b...

CVSS3: 8.2
EPSS: Средний
nvd логотип

CVE-2024-45337

около 1 года назад

Applications and libraries which misuse connection.serverAuthenticate (via callback field ServerConfig.PublicKeyCallback) may be susceptible to an authorization bypass. The documentation for ServerConfig.PublicKeyCallback says that "A call to this function does not guarantee that the key offered is in fact used to authenticate." Specifically, the SSH protocol allows clients to inquire about whether a public key is acceptable before proving control of the corresponding private key. PublicKeyCallback may be called with multiple keys, and the order in which the keys were provided cannot be used to infer which key the client successfully authenticated with, if any. Some applications, which store the key(s) passed to PublicKeyCallback (or derived information) and make security relevant determinations based on it once the connection is established, may make incorrect assumptions. For example, an attacker may send public keys A and B, and then authenticate with A. PublicKeyCallback would be c

CVSS3: 9.1
EPSS: Средний
msrc логотип

CVE-2024-45337

около 1 года назад

CVSS3: 9.1
EPSS: Средний
debian логотип

CVE-2024-45337

около 1 года назад

Applications and libraries which misuse connection.serverAuthenticate ...

CVSS3: 9.1
EPSS: Средний
suse-cvrf логотип

openSUSE-SU-2025:0025-1

11 месяцев назад

Security update for cheat

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2025:1143-1

9 месяцев назад

Security update for google-guest-agent

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2025:1142-1

9 месяцев назад

Security update for google-guest-agent

EPSS: Средний
github логотип

GHSA-v778-237x-gjrc

около 1 года назад

Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto

CVSS3: 9.1
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2025:0602-1

10 месяцев назад

Security update for helm

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0601-1

10 месяцев назад

Security update for brise

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02581-1

5 месяцев назад

Security update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container, virt-pr-helper-container

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2025:0094-1

10 месяцев назад

Security update for gitea-tea

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0770-1

10 месяцев назад

Security update for govulncheck-vulndb

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2024-11338

Уязвимость функции ServerConfig.PublicKeyCallback() библиотеки для языка программирования Go crypto, позволяющая нарушителю обойти ограничения безопасности

CVSS3: 9.1
42%
Средний
около 1 года назад
redos логотип
ROS-20250110-14

Уязвимость gitea

CVSS3: 9.1
42%
Средний
12 месяцев назад
redos логотип
ROS-20241220-04

Уязвимость golang-x-crypto-devel

CVSS3: 9.1
42%
Средний
около 1 года назад
redos логотип
ROS-20250219-03

Множественные уязвимости trivy

CVSS3: 9.8
10 месяцев назад
redos логотип
ROS-20251203-11

Множественные уязвимости etcd

CVSS3: 9.1
28 дней назад
redos логотип
ROS-20251203-10

Множественные уязвимости etcd

CVSS3: 9.1
28 дней назад
ubuntu логотип
CVE-2024-45337

Applications and libraries which misuse connection.serverAuthenticate (via callback field ServerConfig.PublicKeyCallback) may be susceptible to an authorization bypass. The documentation for ServerConfig.PublicKeyCallback says that "A call to this function does not guarantee that the key offered is in fact used to authenticate." Specifically, the SSH protocol allows clients to inquire about whether a public key is acceptable before proving control of the corresponding private key. PublicKeyCallback may be called with multiple keys, and the order in which the keys were provided cannot be used to infer which key the client successfully authenticated with, if any. Some applications, which store the key(s) passed to PublicKeyCallback (or derived information) and make security relevant determinations based on it once the connection is established, may make incorrect assumptions. For example, an attacker may send public keys A and B, and then authenticate with A. PublicKeyCallback would b...

CVSS3: 9.1
42%
Средний
около 1 года назад
redhat логотип
CVE-2024-45337

Applications and libraries which misuse connection.serverAuthenticate (via callback field ServerConfig.PublicKeyCallback) may be susceptible to an authorization bypass. The documentation for ServerConfig.PublicKeyCallback says that "A call to this function does not guarantee that the key offered is in fact used to authenticate." Specifically, the SSH protocol allows clients to inquire about whether a public key is acceptable before proving control of the corresponding private key. PublicKeyCallback may be called with multiple keys, and the order in which the keys were provided cannot be used to infer which key the client successfully authenticated with, if any. Some applications, which store the key(s) passed to PublicKeyCallback (or derived information) and make security relevant determinations based on it once the connection is established, may make incorrect assumptions. For example, an attacker may send public keys A and B, and then authenticate with A. PublicKeyCallback would b...

CVSS3: 8.2
42%
Средний
около 1 года назад
nvd логотип
CVE-2024-45337

Applications and libraries which misuse connection.serverAuthenticate (via callback field ServerConfig.PublicKeyCallback) may be susceptible to an authorization bypass. The documentation for ServerConfig.PublicKeyCallback says that "A call to this function does not guarantee that the key offered is in fact used to authenticate." Specifically, the SSH protocol allows clients to inquire about whether a public key is acceptable before proving control of the corresponding private key. PublicKeyCallback may be called with multiple keys, and the order in which the keys were provided cannot be used to infer which key the client successfully authenticated with, if any. Some applications, which store the key(s) passed to PublicKeyCallback (or derived information) and make security relevant determinations based on it once the connection is established, may make incorrect assumptions. For example, an attacker may send public keys A and B, and then authenticate with A. PublicKeyCallback would be c

CVSS3: 9.1
42%
Средний
около 1 года назад
msrc логотип
CVSS3: 9.1
42%
Средний
около 1 года назад
debian логотип
CVE-2024-45337

Applications and libraries which misuse connection.serverAuthenticate ...

CVSS3: 9.1
42%
Средний
около 1 года назад
suse-cvrf логотип
openSUSE-SU-2025:0025-1

Security update for cheat

42%
Средний
11 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:1143-1

Security update for google-guest-agent

42%
Средний
9 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:1142-1

Security update for google-guest-agent

42%
Средний
9 месяцев назад
github логотип
GHSA-v778-237x-gjrc

Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto

CVSS3: 9.1
42%
Средний
около 1 года назад
suse-cvrf логотип
SUSE-SU-2025:0602-1

Security update for helm

10 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0601-1

Security update for brise

10 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02581-1

Security update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container, virt-pr-helper-container

5 месяцев назад
suse-cvrf логотип
openSUSE-SU-2025:0094-1

Security update for gitea-tea

10 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:0770-1

Security update for govulncheck-vulndb

10 месяцев назад

Уязвимостей на страницу