Количество 28
Количество 28
ELSA-2019-2237
ELSA-2019-2237: nss, nss-softokn, nss-util, and nspr security, bug fix, and enhancement update (MODERATE)

SUSE-SU-2018:4236-2
Security update for MozillaFirefox, mozilla-nspr and mozilla-nss

SUSE-SU-2018:4236-1
Security update for MozillaFirefox, mozilla-nspr and mozilla-nss

SUSE-SU-2018:4235-1
Security update for MozillaFirefox, mozilla-nspr and mozilla-nss

CVE-2018-12404
A cached side channel attack during handshakes using RSA encryption could allow for the decryption of encrypted content. This is a variant of the Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) and affects all NSS versions prior to NSS 3.41.

CVE-2018-12404
A cached side channel attack during handshakes using RSA encryption could allow for the decryption of encrypted content. This is a variant of the Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) and affects all NSS versions prior to NSS 3.41.

CVE-2018-12404
A cached side channel attack during handshakes using RSA encryption could allow for the decryption of encrypted content. This is a variant of the Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) and affects all NSS versions prior to NSS 3.41.
CVE-2018-12404
A cached side channel attack during handshakes using RSA encryption co ...

CVE-2018-0495
Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.

CVE-2018-0495
Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.

CVE-2018-0495
Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
CVE-2018-0495
Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache s ...

openSUSE-SU-2019:0183-1
Security update for mozilla-nss
GHSA-54r4-cg3v-pxw7
A cached side channel attack during handshakes using RSA encryption could allow for the decryption of encrypted content. This is a variant of the Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) and affects all NSS versions prior to NSS 3.41.

BDU:2019-01763
Уязвимость набора библиотек NSS (Network Security Services), связанная с ошибками криптографических преобразований, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

BDU:2019-00775
Уязвимость набора библиотек Network Security Services, связаная с возможностью понизить используемую версию протокола TLS, позволяющая нарушителю получить доступ к защищаемой информации

openSUSE-SU-2018:4283-1
Security update for mozilla-nspr and mozilla-nss

openSUSE-SU-2018:2178-1
Security update for libgcrypt

openSUSE-SU-2018:2122-1
Security update for libgcrypt

SUSE-SU-2018:2452-2
Security update for libgcrypt
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2019-2237 ELSA-2019-2237: nss, nss-softokn, nss-util, and nspr security, bug fix, and enhancement update (MODERATE) | почти 6 лет назад | |||
![]() | SUSE-SU-2018:4236-2 Security update for MozillaFirefox, mozilla-nspr and mozilla-nss | около 6 лет назад | ||
![]() | SUSE-SU-2018:4236-1 Security update for MozillaFirefox, mozilla-nspr and mozilla-nss | больше 6 лет назад | ||
![]() | SUSE-SU-2018:4235-1 Security update for MozillaFirefox, mozilla-nspr and mozilla-nss | больше 6 лет назад | ||
![]() | CVE-2018-12404 A cached side channel attack during handshakes using RSA encryption could allow for the decryption of encrypted content. This is a variant of the Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) and affects all NSS versions prior to NSS 3.41. | CVSS3: 5.9 | 42% Средний | около 6 лет назад |
![]() | CVE-2018-12404 A cached side channel attack during handshakes using RSA encryption could allow for the decryption of encrypted content. This is a variant of the Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) and affects all NSS versions prior to NSS 3.41. | CVSS3: 5.9 | 42% Средний | больше 6 лет назад |
![]() | CVE-2018-12404 A cached side channel attack during handshakes using RSA encryption could allow for the decryption of encrypted content. This is a variant of the Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) and affects all NSS versions prior to NSS 3.41. | CVSS3: 5.9 | 42% Средний | около 6 лет назад |
CVE-2018-12404 A cached side channel attack during handshakes using RSA encryption co ... | CVSS3: 5.9 | 42% Средний | около 6 лет назад | |
![]() | CVE-2018-0495 Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host. | CVSS3: 4.7 | 0% Низкий | около 7 лет назад |
![]() | CVE-2018-0495 Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host. | CVSS3: 5.1 | 0% Низкий | около 7 лет назад |
![]() | CVE-2018-0495 Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host. | CVSS3: 4.7 | 0% Низкий | около 7 лет назад |
CVE-2018-0495 Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache s ... | CVSS3: 4.7 | 0% Низкий | около 7 лет назад | |
![]() | openSUSE-SU-2019:0183-1 Security update for mozilla-nss | 42% Средний | около 6 лет назад | |
GHSA-54r4-cg3v-pxw7 A cached side channel attack during handshakes using RSA encryption could allow for the decryption of encrypted content. This is a variant of the Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) and affects all NSS versions prior to NSS 3.41. | CVSS3: 5.9 | 42% Средний | около 3 лет назад | |
![]() | BDU:2019-01763 Уязвимость набора библиотек NSS (Network Security Services), связанная с ошибками криптографических преобразований, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации | CVSS3: 5.9 | 42% Средний | почти 7 лет назад |
![]() | BDU:2019-00775 Уязвимость набора библиотек Network Security Services, связаная с возможностью понизить используемую версию протокола TLS, позволяющая нарушителю получить доступ к защищаемой информации | CVSS3: 5.1 | 42% Средний | больше 6 лет назад |
![]() | openSUSE-SU-2018:4283-1 Security update for mozilla-nspr and mozilla-nss | 0% Низкий | больше 6 лет назад | |
![]() | openSUSE-SU-2018:2178-1 Security update for libgcrypt | 0% Низкий | почти 7 лет назад | |
![]() | openSUSE-SU-2018:2122-1 Security update for libgcrypt | 0% Низкий | почти 7 лет назад | |
![]() | SUSE-SU-2018:2452-2 Security update for libgcrypt | 0% Низкий | больше 6 лет назад |
Уязвимостей на страницу