Логотип exploitDog
bind:"CVE-2023-0215" OR bind:"CVE-2023-0286" OR bind:"CVE-2022-4450" OR bind:"CVE-2022-4304"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-0215" OR bind:"CVE-2023-0286" OR bind:"CVE-2022-4450" OR bind:"CVE-2022-4304"

Количество 73

Количество 73

oracle-oval логотип

ELSA-2025-7895

около 1 месяца назад

ELSA-2025-7895: compat-openssl10 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-1335

больше 2 лет назад

ELSA-2023-1335: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-12326

около 2 лет назад

ELSA-2023-12326: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-12297

около 2 лет назад

ELSA-2023-12297: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-12210

около 2 лет назад

ELSA-2023-12210: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-12205

около 2 лет назад

ELSA-2023-12205: openssl security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2023-00665

больше 2 лет назад

Уязвимость функции GENERAL_NAME_cmp библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.4
EPSS: Высокий
ubuntu логотип

CVE-2022-4450

больше 2 лет назад

The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functi...

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2022-4450

больше 2 лет назад

The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functi...

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2022-4450

больше 2 лет назад

The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functio

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2022-4450

больше 2 лет назад

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2022-4450

больше 2 лет назад

The function PEM_read_bio_ex() reads a PEM file from a BIO and parses ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2022-4304

больше 2 лет назад

A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2022-4304

больше 2 лет назад

A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2022-4304

больше 2 лет назад

A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.

CVSS3: 5.9
EPSS: Низкий
msrc логотип

CVE-2022-4304

больше 2 лет назад

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2022-4304

больше 2 лет назад

A timing based side channel exists in the OpenSSL RSA Decryption imple ...

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-v5w6-wcm8-jm4q

больше 2 лет назад

openssl-src contains Double free after calling `PEM_read_bio_ex`

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2023-02240

больше 3 лет назад

Уязвимость функции PEM_read_bio_ex() криптографической библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20230620-06

около 2 лет назад

Множественные уязвимости python3-cryptography

CVSS3: 9.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2025-7895

ELSA-2025-7895: compat-openssl10 security update (IMPORTANT)

около 1 месяца назад
oracle-oval логотип
ELSA-2023-1335

ELSA-2023-1335: openssl security update (IMPORTANT)

больше 2 лет назад
oracle-oval логотип
ELSA-2023-12326

ELSA-2023-12326: openssl security update (IMPORTANT)

около 2 лет назад
oracle-oval логотип
ELSA-2023-12297

ELSA-2023-12297: openssl security update (IMPORTANT)

около 2 лет назад
oracle-oval логотип
ELSA-2023-12210

ELSA-2023-12210: openssl security update (IMPORTANT)

около 2 лет назад
oracle-oval логотип
ELSA-2023-12205

ELSA-2023-12205: openssl security update (IMPORTANT)

около 2 лет назад
fstec логотип
BDU:2023-00665

Уязвимость функции GENERAL_NAME_cmp библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.4
89%
Высокий
больше 2 лет назад
ubuntu логотип
CVE-2022-4450

The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functi...

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2022-4450

The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functi...

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2022-4450

The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out", "header" and "data" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functio

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
msrc логотип
CVSS3: 7.5
0%
Низкий
больше 2 лет назад
debian логотип
CVE-2022-4450

The function PEM_read_bio_ex() reads a PEM file from a BIO and parses ...

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
ubuntu логотип
CVE-2022-4304

A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.

CVSS3: 5.9
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2022-4304

A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.

CVSS3: 5.9
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2022-4304

A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.

CVSS3: 5.9
0%
Низкий
больше 2 лет назад
msrc логотип
CVSS3: 5.9
0%
Низкий
больше 2 лет назад
debian логотип
CVE-2022-4304

A timing based side channel exists in the OpenSSL RSA Decryption imple ...

CVSS3: 5.9
0%
Низкий
больше 2 лет назад
github логотип
GHSA-v5w6-wcm8-jm4q

openssl-src contains Double free after calling `PEM_read_bio_ex`

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-02240

Уязвимость функции PEM_read_bio_ex() криптографической библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
больше 3 лет назад
redos логотип
ROS-20230620-06

Множественные уязвимости python3-cryptography

CVSS3: 9.1
около 2 лет назад

Уязвимостей на страницу