Логотип exploitDog
bind:"BDU:2024-06988" OR bind:"CVE-2024-5535"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2024-06988" OR bind:"CVE-2024-5535"

Количество 27

Количество 27

github логотип

GHSA-4fc7-mvrr-wv2c

12 месяцев назад

Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application. The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiat...

CVSS3: 9.1
EPSS: Низкий
oracle-oval логотип

ELSA-2024-7848

8 месяцев назад

ELSA-2024-7848: openssl security update (LOW)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-12786

8 месяцев назад

ELSA-2024-12786: openssl security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2953-1

10 месяцев назад

Security update for openssl-1_1

EPSS: Низкий
oracle-oval логотип

ELSA-2024-9333

7 месяцев назад

ELSA-2024-9333: openssl and openssl-fips-provider security update (LOW)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-1673

4 месяца назад

ELSA-2025-1673: mysql:8.0 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-1671

4 месяца назад

ELSA-2025-1671: mysql security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-4fc7-mvrr-wv2c

Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application. The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiat...

CVSS3: 9.1
5%
Низкий
12 месяцев назад
oracle-oval логотип
ELSA-2024-7848

ELSA-2024-7848: openssl security update (LOW)

8 месяцев назад
oracle-oval логотип
ELSA-2024-12786

ELSA-2024-12786: openssl security update (IMPORTANT)

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2953-1

Security update for openssl-1_1

10 месяцев назад
oracle-oval логотип
ELSA-2024-9333

ELSA-2024-9333: openssl and openssl-fips-provider security update (LOW)

7 месяцев назад
oracle-oval логотип
ELSA-2025-1673

ELSA-2025-1673: mysql:8.0 security update (IMPORTANT)

4 месяца назад
oracle-oval логотип
ELSA-2025-1671

ELSA-2025-1671: mysql security update (IMPORTANT)

4 месяца назад

Уязвимостей на страницу