Логотип exploitDog
bind:"CVE-2020-6829" OR bind:"CVE-2020-12400" OR bind:"CVE-2020-12403"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2020-6829" OR bind:"CVE-2020-12400" OR bind:"CVE-2020-12403"

Количество 24

Количество 24

oracle-oval логотип

ELSA-2021-0538

почти 5 лет назад

ELSA-2021-0538: nss security and bug fix update (MODERATE)

EPSS: Низкий
rocky логотип

RLSA-2021:0538

почти 5 лет назад

Moderate: nss security and bug fix update

EPSS: Низкий
suse-cvrf логотип

SUSE-RU-2021:3116-1

больше 4 лет назад

Recommended update for mozilla-nspr, mozilla-nss

EPSS: Низкий
suse-cvrf логотип

SUSE-RU-2021:3115-1

больше 4 лет назад

Recommended update for mozilla-nspr, mozilla-nss

EPSS: Низкий
suse-cvrf логотип

SUSE-RU-2021:14818-1

больше 4 лет назад

Recommended update for mozilla-nspr, mozilla-nss

EPSS: Низкий
oracle-oval логотип

ELSA-2020-4076

больше 5 лет назад

ELSA-2020-4076: nss and nspr security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2020-6829

больше 5 лет назад

When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox < 80 and Firefox for Android < 80.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2020-6829

больше 5 лет назад

When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox < 80 and Firefox for Android < 80.

CVSS3: 4.4
EPSS: Низкий
nvd логотип

CVE-2020-6829

больше 5 лет назад

When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox < 80 and Firefox for Android < 80.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2020-6829

больше 5 лет назад

When performing EC scalar point multiplication, the wNAF point multipl ...

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-cc99-55qg-f87r

больше 3 лет назад

When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox < 80 and Firefox for Android < 80.

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2020-03953

больше 5 лет назад

Уязвимость компонента Knowledge Management программной интеграционной платформы SAP NetWeaver, позволяющая нарушителю осуществить межсайтовые сценарные атаки

CVSS3: 9
EPSS: Низкий
ubuntu логотип

CVE-2020-12403

больше 4 лет назад

A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.

CVSS3: 9.1
EPSS: Низкий
redhat логотип

CVE-2020-12403

больше 5 лет назад

A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.

CVSS3: 7.4
EPSS: Низкий
nvd логотип

CVE-2020-12403

больше 4 лет назад

A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.

CVSS3: 9.1
EPSS: Низкий
msrc логотип

CVE-2020-12403

больше 4 лет назад

A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20 it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.

CVSS3: 9.1
EPSS: Низкий
debian логотип

CVE-2020-12403

больше 4 лет назад

A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS i ...

CVSS3: 9.1
EPSS: Низкий
ubuntu логотип

CVE-2020-12400

больше 5 лет назад

When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80.

CVSS3: 4.7
EPSS: Низкий
redhat логотип

CVE-2020-12400

больше 5 лет назад

When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80.

CVSS3: 4.4
EPSS: Низкий
nvd логотип

CVE-2020-12400

больше 5 лет назад

When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80.

CVSS3: 4.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2021-0538

ELSA-2021-0538: nss security and bug fix update (MODERATE)

почти 5 лет назад
rocky логотип
RLSA-2021:0538

Moderate: nss security and bug fix update

почти 5 лет назад
suse-cvrf логотип
SUSE-RU-2021:3116-1

Recommended update for mozilla-nspr, mozilla-nss

больше 4 лет назад
suse-cvrf логотип
SUSE-RU-2021:3115-1

Recommended update for mozilla-nspr, mozilla-nss

больше 4 лет назад
suse-cvrf логотип
SUSE-RU-2021:14818-1

Recommended update for mozilla-nspr, mozilla-nss

больше 4 лет назад
oracle-oval логотип
ELSA-2020-4076

ELSA-2020-4076: nss and nspr security, bug fix, and enhancement update (MODERATE)

больше 5 лет назад
ubuntu логотип
CVE-2020-6829

When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox < 80 and Firefox for Android < 80.

CVSS3: 5.3
0%
Низкий
больше 5 лет назад
redhat логотип
CVE-2020-6829

When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox < 80 and Firefox for Android < 80.

CVSS3: 4.4
0%
Низкий
больше 5 лет назад
nvd логотип
CVE-2020-6829

When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox < 80 and Firefox for Android < 80.

CVSS3: 5.3
0%
Низкий
больше 5 лет назад
debian логотип
CVE-2020-6829

When performing EC scalar point multiplication, the wNAF point multipl ...

CVSS3: 5.3
0%
Низкий
больше 5 лет назад
github логотип
GHSA-cc99-55qg-f87r

When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox < 80 and Firefox for Android < 80.

CVSS3: 5.3
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-03953

Уязвимость компонента Knowledge Management программной интеграционной платформы SAP NetWeaver, позволяющая нарушителю осуществить межсайтовые сценарные атаки

CVSS3: 9
0%
Низкий
больше 5 лет назад
ubuntu логотип
CVE-2020-12403

A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.

CVSS3: 9.1
0%
Низкий
больше 4 лет назад
redhat логотип
CVE-2020-12403

A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.

CVSS3: 7.4
0%
Низкий
больше 5 лет назад
nvd логотип
CVE-2020-12403

A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.

CVSS3: 9.1
0%
Низкий
больше 4 лет назад
msrc логотип
CVE-2020-12403

A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20 it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.

CVSS3: 9.1
0%
Низкий
больше 4 лет назад
debian логотип
CVE-2020-12403

A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS i ...

CVSS3: 9.1
0%
Низкий
больше 4 лет назад
ubuntu логотип
CVE-2020-12400

When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80.

CVSS3: 4.7
0%
Низкий
больше 5 лет назад
redhat логотип
CVE-2020-12400

When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80.

CVSS3: 4.4
0%
Низкий
больше 5 лет назад
nvd логотип
CVE-2020-12400

When converting coordinates from projective to affine, the modular inversion was not performed in constant time, resulting in a possible timing-based side channel attack. This vulnerability affects Firefox < 80 and Firefox for Android < 80.

CVSS3: 4.7
0%
Низкий
больше 5 лет назад

Уязвимостей на страницу