Логотип exploitDog
bind:"CVE-2025-32990" OR bind:"CVE-2025-6395" OR bind:"CVE-2025-32988"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-32990" OR bind:"CVE-2025-6395" OR bind:"CVE-2025-32988"

Количество 33

Количество 33

redhat логотип

CVE-2025-6395

4 месяца назад

A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite().

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2025-6395

4 месяца назад

A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite().

CVSS3: 6.5
EPSS: Низкий
msrc логотип

CVE-2025-6395

3 месяца назад

Gnutls: null pointer dereference in _gnutls_figure_common_ciphersuite()

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2025-6395

4 месяца назад

A NULL pointer dereference flaw was found in the GnuTLS software in _g ...

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2025-32988

4 месяца назад

A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure. This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2025-32988

4 месяца назад

A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure. This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2025-32988

4 месяца назад

A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure. This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.

CVSS3: 6.5
EPSS: Низкий
msrc логотип

CVE-2025-32988

4 месяца назад

Gnutls: vulnerability in gnutls othername san export

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2025-32988

4 месяца назад

A flaw was found in GnuTLS. A double-free vulnerability exists in GnuT ...

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-prf7-7jvx-hxj5

4 месяца назад

A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite(). When it reads certain settings from a template file, it can allow an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial of service (DoS) that could crash the system.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-fv5h-vqpf-6fqj

4 месяца назад

A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure. This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2025-11076

4 месяца назад

Уязвимость функции asn1_delete_structure() библиотеки безопасности транспортного уровня GnuTLS, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.2
EPSS: Низкий
fstec логотип

BDU:2025-08694

4 месяца назад

Уязвимость функции in _gnutls_figure_common_ciphersuite() библиотеки GnuTLS, позволяющая нарушителю повредить память и вызвать отказ в обслуживании

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2025-6395

A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite().

CVSS3: 6.5
0%
Низкий
4 месяца назад
nvd логотип
CVE-2025-6395

A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite().

CVSS3: 6.5
0%
Низкий
4 месяца назад
msrc логотип
CVE-2025-6395

Gnutls: null pointer dereference in _gnutls_figure_common_ciphersuite()

CVSS3: 6.5
0%
Низкий
3 месяца назад
debian логотип
CVE-2025-6395

A NULL pointer dereference flaw was found in the GnuTLS software in _g ...

CVSS3: 6.5
0%
Низкий
4 месяца назад
ubuntu логотип
CVE-2025-32988

A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure. This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.

CVSS3: 6.5
0%
Низкий
4 месяца назад
redhat логотип
CVE-2025-32988

A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure. This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.

CVSS3: 6.5
0%
Низкий
4 месяца назад
nvd логотип
CVE-2025-32988

A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure. This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.

CVSS3: 6.5
0%
Низкий
4 месяца назад
msrc логотип
CVE-2025-32988

Gnutls: vulnerability in gnutls othername san export

CVSS3: 6.5
0%
Низкий
4 месяца назад
debian логотип
CVE-2025-32988

A flaw was found in GnuTLS. A double-free vulnerability exists in GnuT ...

CVSS3: 6.5
0%
Низкий
4 месяца назад
github логотип
GHSA-prf7-7jvx-hxj5

A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite(). When it reads certain settings from a template file, it can allow an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial of service (DoS) that could crash the system.

CVSS3: 6.5
0%
Низкий
4 месяца назад
github логотип
GHSA-fv5h-vqpf-6fqj

A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure. This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.

CVSS3: 6.5
0%
Низкий
4 месяца назад
fstec логотип
BDU:2025-11076

Уязвимость функции asn1_delete_structure() библиотеки безопасности транспортного уровня GnuTLS, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.2
0%
Низкий
4 месяца назад
fstec логотип
BDU:2025-08694

Уязвимость функции in _gnutls_figure_common_ciphersuite() библиотеки GnuTLS, позволяющая нарушителю повредить память и вызвать отказ в обслуживании

CVSS3: 6.5
0%
Низкий
4 месяца назад

Уязвимостей на страницу