Логотип exploitDog
product: "node.js"
Консоль
Логотип exploitDog

exploitDog

product: "node.js"

Количество 1 025

Количество 1 025

fstec логотип

BDU:2019-01881

около 7 лет назад

Уязвимость реализации алгоритма шифрования ECDSA библиотеки OpenSSL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.9
EPSS: Низкий
fstec логотип

BDU:2023-04960

больше 2 лет назад

Уязвимость функций DH_check(), DH_check_ex(), EVP_PKEY_param_check() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2021-03037

почти 8 лет назад

Уязвимость процедуры AVX2 Montgomery библиотеки OpenSSL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.9
EPSS: Низкий
fstec логотип

BDU:2023-04957

больше 2 лет назад

Уязвимость функций DH_check(), DH_check_ex() или EVP_PKEY_param_check() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2018-01636

около 7 лет назад

Уязвимость процессоров Intel архитектур Skylake и Kaby Lake, связанная с ошибками реализации технологии одновременной многопоточности (SMT), позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 7.1
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:2269-1

почти 5 лет назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:2245-1

почти 5 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:2236-1

почти 5 лет назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:2223-1

почти 5 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3763-1

почти 5 лет назад

Security update for openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3762-1

почти 5 лет назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3740-1

почти 5 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3732-1

почти 5 лет назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3722-1

почти 5 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3721-1

почти 5 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3720-1

почти 5 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:14560-1

почти 5 лет назад

Security update for openssl1

EPSS: Низкий
github логотип

GHSA-whf2-mq76-2fhv

больше 3 лет назад

The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious...

CVSS3: 5.9
EPSS: Низкий
ubuntu логотип

CVE-2020-1971

почти 5 лет назад

The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious...

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2020-1971

почти 5 лет назад

The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious...

CVSS3: 5.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2019-01881

Уязвимость реализации алгоритма шифрования ECDSA библиотеки OpenSSL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.9
9%
Низкий
около 7 лет назад
fstec логотип
BDU:2023-04960

Уязвимость функций DH_check(), DH_check_ex(), EVP_PKEY_param_check() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2021-03037

Уязвимость процедуры AVX2 Montgomery библиотеки OpenSSL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.9
10%
Низкий
почти 8 лет назад
fstec логотип
BDU:2023-04957

Уязвимость функций DH_check(), DH_check_ex() или EVP_PKEY_param_check() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
1%
Низкий
больше 2 лет назад
fstec логотип
BDU:2018-01636

Уязвимость процессоров Intel архитектур Skylake и Kaby Lake, связанная с ошибками реализации технологии одновременной многопоточности (SMT), позволяющая нарушителю раскрыть защищаемую информацию

CVSS3: 7.1
0%
Низкий
около 7 лет назад
suse-cvrf логотип
openSUSE-SU-2020:2269-1

Security update for openssl-1_0_0

0%
Низкий
почти 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:2245-1

Security update for openssl-1_1

0%
Низкий
почти 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:2236-1

Security update for openssl-1_0_0

0%
Низкий
почти 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:2223-1

Security update for openssl-1_1

0%
Низкий
почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3763-1

Security update for openssl

0%
Низкий
почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3762-1

Security update for openssl-1_0_0

0%
Низкий
почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3740-1

Security update for openssl-1_1

0%
Низкий
почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3732-1

Security update for openssl-1_0_0

0%
Низкий
почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3722-1

Security update for openssl-1_1

0%
Низкий
почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3721-1

Security update for openssl-1_1

0%
Низкий
почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3720-1

Security update for openssl-1_1

0%
Низкий
почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:14560-1

Security update for openssl1

0%
Низкий
почти 5 лет назад
github логотип
GHSA-whf2-mq76-2fhv

The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious...

CVSS3: 5.9
0%
Низкий
больше 3 лет назад
ubuntu логотип
CVE-2020-1971

The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious...

CVSS3: 5.9
0%
Низкий
почти 5 лет назад
redhat логотип
CVE-2020-1971

The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious...

CVSS3: 5.9
0%
Низкий
почти 5 лет назад

Уязвимостей на страницу