Логотип exploitDog
bind:"BDU:2015-09068" OR bind:"CVE-2013-4576"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2015-09068" OR bind:"CVE-2013-4576"

Количество 10

Количество 10

fstec логотип

BDU:2015-09068

больше 11 лет назад

Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить целостность и доступность защищаемой информации

CVSS2: 5.8
EPSS: Низкий
ubuntu логотип

CVE-2013-4576

больше 11 лет назад

GnuPG 1.x before 1.4.16 generates RSA keys using sequences of introductions with certain patterns that introduce a side channel, which allows physically proximate attackers to extract RSA keys via a chosen-ciphertext attack and acoustic cryptanalysis during decryption. NOTE: applications are not typically expected to protect themselves from acoustic side-channel attacks, since this is arguably the responsibility of the physical device. Accordingly, issues of this type would not normally receive a CVE identifier. However, for this issue, the developer has specified a security policy in which GnuPG should offer side-channel resistance, and developer-specified security-policy violations are within the scope of CVE.

CVSS2: 2.1
EPSS: Низкий
redhat логотип

CVE-2013-4576

больше 11 лет назад

GnuPG 1.x before 1.4.16 generates RSA keys using sequences of introductions with certain patterns that introduce a side channel, which allows physically proximate attackers to extract RSA keys via a chosen-ciphertext attack and acoustic cryptanalysis during decryption. NOTE: applications are not typically expected to protect themselves from acoustic side-channel attacks, since this is arguably the responsibility of the physical device. Accordingly, issues of this type would not normally receive a CVE identifier. However, for this issue, the developer has specified a security policy in which GnuPG should offer side-channel resistance, and developer-specified security-policy violations are within the scope of CVE.

CVSS2: 2.9
EPSS: Низкий
nvd логотип

CVE-2013-4576

больше 11 лет назад

GnuPG 1.x before 1.4.16 generates RSA keys using sequences of introductions with certain patterns that introduce a side channel, which allows physically proximate attackers to extract RSA keys via a chosen-ciphertext attack and acoustic cryptanalysis during decryption. NOTE: applications are not typically expected to protect themselves from acoustic side-channel attacks, since this is arguably the responsibility of the physical device. Accordingly, issues of this type would not normally receive a CVE identifier. However, for this issue, the developer has specified a security policy in which GnuPG should offer side-channel resistance, and developer-specified security-policy violations are within the scope of CVE.

CVSS2: 2.1
EPSS: Низкий
debian логотип

CVE-2013-4576

больше 11 лет назад

GnuPG 1.x before 1.4.16 generates RSA keys using sequences of introduc ...

CVSS2: 2.1
EPSS: Низкий
github логотип

GHSA-f43f-q929-x2qf

больше 3 лет назад

GnuPG 1.x before 1.4.16 generates RSA keys using sequences of introductions with certain patterns that introduce a side channel, which allows physically proximate attackers to extract RSA keys via a chosen-ciphertext attack and acoustic cryptanalysis during decryption. NOTE: applications are not typically expected to protect themselves from acoustic side-channel attacks, since this is arguably the responsibility of the physical device. Accordingly, issues of this type would not normally receive a CVE identifier. However, for this issue, the developer has specified a security policy in which GnuPG should offer side-channel resistance, and developer-specified security-policy violations are within the scope of CVE.

EPSS: Низкий
oracle-oval логотип

ELSA-2014-0016

больше 11 лет назад

ELSA-2014-0016: gnupg security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2015-09067

больше 11 лет назад

Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить целостность и доступность защищаемой информации

CVSS2: 5.8
EPSS: Низкий
fstec логотип

BDU:2015-07749

больше 11 лет назад

Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить целостность и доступность защищаемой информации

CVSS2: 5.8
EPSS: Низкий
fstec логотип

BDU:2015-07748

больше 11 лет назад

Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить целостность и доступность защищаемой информации

CVSS2: 5.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2015-09068

Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить целостность и доступность защищаемой информации

CVSS2: 5.8
0%
Низкий
больше 11 лет назад
ubuntu логотип
CVE-2013-4576

GnuPG 1.x before 1.4.16 generates RSA keys using sequences of introductions with certain patterns that introduce a side channel, which allows physically proximate attackers to extract RSA keys via a chosen-ciphertext attack and acoustic cryptanalysis during decryption. NOTE: applications are not typically expected to protect themselves from acoustic side-channel attacks, since this is arguably the responsibility of the physical device. Accordingly, issues of this type would not normally receive a CVE identifier. However, for this issue, the developer has specified a security policy in which GnuPG should offer side-channel resistance, and developer-specified security-policy violations are within the scope of CVE.

CVSS2: 2.1
0%
Низкий
больше 11 лет назад
redhat логотип
CVE-2013-4576

GnuPG 1.x before 1.4.16 generates RSA keys using sequences of introductions with certain patterns that introduce a side channel, which allows physically proximate attackers to extract RSA keys via a chosen-ciphertext attack and acoustic cryptanalysis during decryption. NOTE: applications are not typically expected to protect themselves from acoustic side-channel attacks, since this is arguably the responsibility of the physical device. Accordingly, issues of this type would not normally receive a CVE identifier. However, for this issue, the developer has specified a security policy in which GnuPG should offer side-channel resistance, and developer-specified security-policy violations are within the scope of CVE.

CVSS2: 2.9
0%
Низкий
больше 11 лет назад
nvd логотип
CVE-2013-4576

GnuPG 1.x before 1.4.16 generates RSA keys using sequences of introductions with certain patterns that introduce a side channel, which allows physically proximate attackers to extract RSA keys via a chosen-ciphertext attack and acoustic cryptanalysis during decryption. NOTE: applications are not typically expected to protect themselves from acoustic side-channel attacks, since this is arguably the responsibility of the physical device. Accordingly, issues of this type would not normally receive a CVE identifier. However, for this issue, the developer has specified a security policy in which GnuPG should offer side-channel resistance, and developer-specified security-policy violations are within the scope of CVE.

CVSS2: 2.1
0%
Низкий
больше 11 лет назад
debian логотип
CVE-2013-4576

GnuPG 1.x before 1.4.16 generates RSA keys using sequences of introduc ...

CVSS2: 2.1
0%
Низкий
больше 11 лет назад
github логотип
GHSA-f43f-q929-x2qf

GnuPG 1.x before 1.4.16 generates RSA keys using sequences of introductions with certain patterns that introduce a side channel, which allows physically proximate attackers to extract RSA keys via a chosen-ciphertext attack and acoustic cryptanalysis during decryption. NOTE: applications are not typically expected to protect themselves from acoustic side-channel attacks, since this is arguably the responsibility of the physical device. Accordingly, issues of this type would not normally receive a CVE identifier. However, for this issue, the developer has specified a security policy in which GnuPG should offer side-channel resistance, and developer-specified security-policy violations are within the scope of CVE.

0%
Низкий
больше 3 лет назад
oracle-oval логотип
ELSA-2014-0016

ELSA-2014-0016: gnupg security update (MODERATE)

больше 11 лет назад
fstec логотип
BDU:2015-09067

Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить целостность и доступность защищаемой информации

CVSS2: 5.8
0%
Низкий
больше 11 лет назад
fstec логотип
BDU:2015-07749

Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить целостность и доступность защищаемой информации

CVSS2: 5.8
0%
Низкий
больше 11 лет назад
fstec логотип
BDU:2015-07748

Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить целостность и доступность защищаемой информации

CVSS2: 5.8
0%
Низкий
больше 11 лет назад

Уязвимостей на страницу