Логотип exploitDog
bind:"BDU:2024-06469" OR bind:"CVE-2024-7531"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2024-06469" OR bind:"CVE-2024-7531"

Количество 10

Количество 10

fstec логотип

BDU:2024-06469

11 месяцев назад

Уязвимость компоненте шифрования NSS браузеров Mozilla Firefox, Firefox ESR, позволяющая нарушителю получить доступ к защищаемой информации

CVSS3: 6.5
EPSS: Низкий
redos логотип

ROS-20240828-08

10 месяцев назад

Множественные уязвимости thunderbird

CVSS3: 8.8
EPSS: Низкий
redos логотип

ROS-20240828-03

10 месяцев назад

Множественные уязвимости firefox

CVSS3: 8.8
EPSS: Низкий
ubuntu логотип

CVE-2024-7531

11 месяцев назад

Calling `PK11_Encrypt()` in NSS using CKM_CHACHA20 and the same buffer for input and output can result in plaintext on an Intel Sandy Bridge processor. In Firefox this only affects the QUIC header protection feature when the connection is using the ChaCha20-Poly1305 cipher suite. The most likely outcome is connection failure, but if the connection persists despite the high packet loss it could be possible for a network observer to identify packets as coming from the same source despite a network path change. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2024-7531

11 месяцев назад

Calling `PK11_Encrypt()` in NSS using CKM_CHACHA20 and the same buffer for input and output can result in plaintext on an Intel Sandy Bridge processor. In Firefox this only affects the QUIC header protection feature when the connection is using the ChaCha20-Poly1305 cipher suite. The most likely outcome is connection failure, but if the connection persists despite the high packet loss it could be possible for a network observer to identify packets as coming from the same source despite a network path change. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.

CVSS3: 3.1
EPSS: Низкий
nvd логотип

CVE-2024-7531

11 месяцев назад

Calling `PK11_Encrypt()` in NSS using CKM_CHACHA20 and the same buffer for input and output can result in plaintext on an Intel Sandy Bridge processor. In Firefox this only affects the QUIC header protection feature when the connection is using the ChaCha20-Poly1305 cipher suite. The most likely outcome is connection failure, but if the connection persists despite the high packet loss it could be possible for a network observer to identify packets as coming from the same source despite a network path change. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2024-7531

11 месяцев назад

Calling `PK11_Encrypt()` in NSS using CKM_CHACHA20 and the same buffer ...

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-3jj9-9269-99m2

11 месяцев назад

Calling `PK11_Encrypt()` in NSS using CKM_CHACHA20 and the same buffer for input and output can result in plaintext on an Intel Sandy Bridge processor. In Firefox this only affects the QUIC header protection feature when the connection is using the ChaCha20-Poly1305 cipher suite. The most likely outcome is connection failure, but if the connection persists despite the high packet loss it could be possible for a network observer to identify packets as coming from the same source despite a network path change. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.

CVSS3: 6.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3003-1

10 месяцев назад

Security update for MozillaFirefox

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:2876-1

10 месяцев назад

Security update for MozillaFirefox

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2024-06469

Уязвимость компоненте шифрования NSS браузеров Mozilla Firefox, Firefox ESR, позволяющая нарушителю получить доступ к защищаемой информации

CVSS3: 6.5
0%
Низкий
11 месяцев назад
redos логотип
ROS-20240828-08

Множественные уязвимости thunderbird

CVSS3: 8.8
10 месяцев назад
redos логотип
ROS-20240828-03

Множественные уязвимости firefox

CVSS3: 8.8
10 месяцев назад
ubuntu логотип
CVE-2024-7531

Calling `PK11_Encrypt()` in NSS using CKM_CHACHA20 and the same buffer for input and output can result in plaintext on an Intel Sandy Bridge processor. In Firefox this only affects the QUIC header protection feature when the connection is using the ChaCha20-Poly1305 cipher suite. The most likely outcome is connection failure, but if the connection persists despite the high packet loss it could be possible for a network observer to identify packets as coming from the same source despite a network path change. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.

CVSS3: 6.5
0%
Низкий
11 месяцев назад
redhat логотип
CVE-2024-7531

Calling `PK11_Encrypt()` in NSS using CKM_CHACHA20 and the same buffer for input and output can result in plaintext on an Intel Sandy Bridge processor. In Firefox this only affects the QUIC header protection feature when the connection is using the ChaCha20-Poly1305 cipher suite. The most likely outcome is connection failure, but if the connection persists despite the high packet loss it could be possible for a network observer to identify packets as coming from the same source despite a network path change. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.

CVSS3: 3.1
0%
Низкий
11 месяцев назад
nvd логотип
CVE-2024-7531

Calling `PK11_Encrypt()` in NSS using CKM_CHACHA20 and the same buffer for input and output can result in plaintext on an Intel Sandy Bridge processor. In Firefox this only affects the QUIC header protection feature when the connection is using the ChaCha20-Poly1305 cipher suite. The most likely outcome is connection failure, but if the connection persists despite the high packet loss it could be possible for a network observer to identify packets as coming from the same source despite a network path change. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.

CVSS3: 6.5
0%
Низкий
11 месяцев назад
debian логотип
CVE-2024-7531

Calling `PK11_Encrypt()` in NSS using CKM_CHACHA20 and the same buffer ...

CVSS3: 6.5
0%
Низкий
11 месяцев назад
github логотип
GHSA-3jj9-9269-99m2

Calling `PK11_Encrypt()` in NSS using CKM_CHACHA20 and the same buffer for input and output can result in plaintext on an Intel Sandy Bridge processor. In Firefox this only affects the QUIC header protection feature when the connection is using the ChaCha20-Poly1305 cipher suite. The most likely outcome is connection failure, but if the connection persists despite the high packet loss it could be possible for a network observer to identify packets as coming from the same source despite a network path change. This vulnerability affects Firefox < 129, Firefox ESR < 115.14, and Firefox ESR < 128.1.

CVSS3: 6.5
0%
Низкий
11 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3003-1

Security update for MozillaFirefox

10 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:2876-1

Security update for MozillaFirefox

10 месяцев назад

Уязвимостей на страницу