Логотип exploitDog
bind:"CVE-2023-6237" OR bind:"CVE-2024-1298" OR bind:"CVE-2024-0727" OR bind:"CVE-2023-6129"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-6237" OR bind:"CVE-2024-1298" OR bind:"CVE-2024-0727" OR bind:"CVE-2023-6129"

Количество 52

Количество 52

oracle-oval логотип

ELSA-2024-9088

7 месяцев назад

ELSA-2024-9088: edk2 security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0518-1

больше 1 года назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:0172-1

больше 1 года назад

Security update for openssl-3

EPSS: Низкий
oracle-oval логотип

ELSA-2024-2447

около 1 года назад

ELSA-2024-2447: openssl and openssl-fips-provider security update (LOW)

EPSS: Низкий
ubuntu логотип

CVE-2023-6237

около 1 года назад

Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an untrusted source this may lead to a Denial of Service. When function EVP_PKEY_public_check() is called on RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is an overly large prime, then this computation would take a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function EVP_PKEY_public_check() is not called from other OpenSSL functions however it is called from the OpenSSL pkey command line application. For that reason that applica...

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2023-6237

больше 1 года назад

Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an untrusted source this may lead to a Denial of Service. When function EVP_PKEY_public_check() is called on RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is an overly large prime, then this computation would take a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function EVP_PKEY_public_check() is not called from other OpenSSL functions however it is called from the OpenSSL pkey command line application. For that reason that applica...

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2023-6237

около 1 года назад

Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an untrusted source this may lead to a Denial of Service. When function EVP_PKEY_public_check() is called on RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is an overly large prime, then this computation would take a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function EVP_PKEY_public_check() is not called from other OpenSSL functions however it is called from the OpenSSL pkey command line application. For that reason that applic

CVSS3: 5.9
EPSS: Низкий
msrc логотип

CVE-2023-6237

8 месяцев назад

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2023-6237

около 1 года назад

Issue summary: Checking excessively long invalid RSA public keys may t ...

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-hvc4-mjv4-5mw6

около 1 года назад

Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an untrusted source this may lead to a Denial of Service. When function EVP_PKEY_public_check() is called on RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is an overly large prime, then this computation would take a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function EVP_PKEY_public_check() is not called from other OpenSSL functions however it is called from the OpenSSL pkey command line application. For that reason that app...

CVSS3: 5.9
EPSS: Низкий
fstec логотип

BDU:2024-01137

больше 1 года назад

Уязвимость функции EVP_PKEY_public_check() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании (DoS)

CVSS3: 5.9
EPSS: Низкий
redos логотип

ROS-20240503-11

около 1 года назад

Уязвимость openssl3

CVSS3: 5.9
EPSS: Низкий
ubuntu логотип

CVE-2024-1298

около 1 года назад

EDK2 contains a vulnerability when S3 sleep is activated where an Attacker may cause a Division-By-Zero due to a UNIT32 overflow via local access. A successful exploit of this vulnerability may lead to a loss of Availability.

CVSS3: 6
EPSS: Низкий
redhat логотип

CVE-2024-1298

около 1 года назад

EDK2 contains a vulnerability when S3 sleep is activated where an Attacker may cause a Division-By-Zero due to a UNIT32 overflow via local access. A successful exploit of this vulnerability may lead to a loss of Availability.

CVSS3: 6
EPSS: Низкий
nvd логотип

CVE-2024-1298

около 1 года назад

EDK2 contains a vulnerability when S3 sleep is activated where an Attacker may cause a Division-By-Zero due to a UNIT32 overflow via local access. A successful exploit of this vulnerability may lead to a loss of Availability.

CVSS3: 6
EPSS: Низкий
msrc логотип

CVE-2024-1298

около 1 года назад

CVSS3: 6
EPSS: Низкий
debian логотип

CVE-2024-1298

около 1 года назад

EDK2 contains a vulnerability when S3 sleep is activated where an Atta ...

CVSS3: 6
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4088-1

7 месяцев назад

Security update for ovmf

EPSS: Низкий
github логотип

GHSA-xvcj-qw55-xx42

около 1 года назад

EDK2 contains a vulnerability when S3 sleep is activated where an Attacker may cause a Division-By-Zero due to a UNIT32 overflow via local access. A successful exploit of this vulnerability may lead to a loss of Availability.

CVSS3: 6
EPSS: Низкий
ubuntu логотип

CVE-2023-6129

больше 1 года назад

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the wors...

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2024-9088

ELSA-2024-9088: edk2 security update (MODERATE)

7 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:0518-1

Security update for openssl-3

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:0172-1

Security update for openssl-3

больше 1 года назад
oracle-oval логотип
ELSA-2024-2447

ELSA-2024-2447: openssl and openssl-fips-provider security update (LOW)

около 1 года назад
ubuntu логотип
CVE-2023-6237

Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an untrusted source this may lead to a Denial of Service. When function EVP_PKEY_public_check() is called on RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is an overly large prime, then this computation would take a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function EVP_PKEY_public_check() is not called from other OpenSSL functions however it is called from the OpenSSL pkey command line application. For that reason that applica...

CVSS3: 5.9
1%
Низкий
около 1 года назад
redhat логотип
CVE-2023-6237

Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an untrusted source this may lead to a Denial of Service. When function EVP_PKEY_public_check() is called on RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is an overly large prime, then this computation would take a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function EVP_PKEY_public_check() is not called from other OpenSSL functions however it is called from the OpenSSL pkey command line application. For that reason that applica...

CVSS3: 5.9
1%
Низкий
больше 1 года назад
nvd логотип
CVE-2023-6237

Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an untrusted source this may lead to a Denial of Service. When function EVP_PKEY_public_check() is called on RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is an overly large prime, then this computation would take a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function EVP_PKEY_public_check() is not called from other OpenSSL functions however it is called from the OpenSSL pkey command line application. For that reason that applic

CVSS3: 5.9
1%
Низкий
около 1 года назад
msrc логотип
CVSS3: 5.9
1%
Низкий
8 месяцев назад
debian логотип
CVE-2023-6237

Issue summary: Checking excessively long invalid RSA public keys may t ...

CVSS3: 5.9
1%
Низкий
около 1 года назад
github логотип
GHSA-hvc4-mjv4-5mw6

Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checked has been obtained from an untrusted source this may lead to a Denial of Service. When function EVP_PKEY_public_check() is called on RSA public keys, a computation is done to confirm that the RSA modulus, n, is composite. For valid RSA keys, n is a product of two or more large primes and this computation completes quickly. However, if n is an overly large prime, then this computation would take a long time. An application that calls EVP_PKEY_public_check() and supplies an RSA key obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function EVP_PKEY_public_check() is not called from other OpenSSL functions however it is called from the OpenSSL pkey command line application. For that reason that app...

CVSS3: 5.9
1%
Низкий
около 1 года назад
fstec логотип
BDU:2024-01137

Уязвимость функции EVP_PKEY_public_check() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании (DoS)

CVSS3: 5.9
1%
Низкий
больше 1 года назад
redos логотип
ROS-20240503-11

Уязвимость openssl3

CVSS3: 5.9
1%
Низкий
около 1 года назад
ubuntu логотип
CVE-2024-1298

EDK2 contains a vulnerability when S3 sleep is activated where an Attacker may cause a Division-By-Zero due to a UNIT32 overflow via local access. A successful exploit of this vulnerability may lead to a loss of Availability.

CVSS3: 6
0%
Низкий
около 1 года назад
redhat логотип
CVE-2024-1298

EDK2 contains a vulnerability when S3 sleep is activated where an Attacker may cause a Division-By-Zero due to a UNIT32 overflow via local access. A successful exploit of this vulnerability may lead to a loss of Availability.

CVSS3: 6
0%
Низкий
около 1 года назад
nvd логотип
CVE-2024-1298

EDK2 contains a vulnerability when S3 sleep is activated where an Attacker may cause a Division-By-Zero due to a UNIT32 overflow via local access. A successful exploit of this vulnerability may lead to a loss of Availability.

CVSS3: 6
0%
Низкий
около 1 года назад
msrc логотип
CVSS3: 6
0%
Низкий
около 1 года назад
debian логотип
CVE-2024-1298

EDK2 contains a vulnerability when S3 sleep is activated where an Atta ...

CVSS3: 6
0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:4088-1

Security update for ovmf

0%
Низкий
7 месяцев назад
github логотип
GHSA-xvcj-qw55-xx42

EDK2 contains a vulnerability when S3 sleep is activated where an Attacker may cause a Division-By-Zero due to a UNIT32 overflow via local access. A successful exploit of this vulnerability may lead to a loss of Availability.

CVSS3: 6
0%
Низкий
около 1 года назад
ubuntu логотип
CVE-2023-6129

Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL for PowerPC CPUs restores the contents of vector registers in a different order than they are saved. Thus the contents of some of these vector registers are corrupted when returning to the caller. The vulnerable code is used only on newer PowerPC processors supporting the PowerISA 2.07 instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the wors...

CVSS3: 6.5
2%
Низкий
больше 1 года назад

Уязвимостей на страницу