Логотип exploitDog
bind:"CVE-2018-10846" OR bind:"CVE-2018-10844" OR bind:"CVE-2018-10845"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2018-10846" OR bind:"CVE-2018-10844" OR bind:"CVE-2018-10845"

Количество 25

Количество 25

oracle-oval логотип

ELSA-2018-3050

около 7 лет назад

ELSA-2018-3050: gnutls security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:2958-1

около 7 лет назад

Security update for gnutls

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:2854-1

около 7 лет назад

Security update for gnutls

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:2930-1

около 7 лет назад

Security update for gnutls

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:2842-1

около 7 лет назад

Security update for gnutls

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:2825-2

около 7 лет назад

Security update for gnutls

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:2825-1

около 7 лет назад

Security update for gnutls

EPSS: Низкий
ubuntu логотип

CVE-2018-10846

около 7 лет назад

A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.

CVSS3: 5.6
EPSS: Низкий
redhat логотип

CVE-2018-10846

около 7 лет назад

A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2018-10846

около 7 лет назад

A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.

CVSS3: 5.6
EPSS: Низкий
debian логотип

CVE-2018-10846

около 7 лет назад

A cache-based side channel in GnuTLS implementation that leads to plai ...

CVSS3: 5.6
EPSS: Низкий
github логотип

GHSA-qgw6-cgvx-vw2g

больше 3 лет назад

A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.

CVSS3: 5.6
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:14058-1

больше 6 лет назад

Security update for gnutls

EPSS: Низкий
ubuntu логотип

CVE-2018-10845

около 7 лет назад

It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2018-10845

около 7 лет назад

It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2018-10845

около 7 лет назад

It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2018-10845

около 7 лет назад

It was found that the GnuTLS implementation of HMAC-SHA-384 was vulner ...

CVSS3: 5.9
EPSS: Низкий
ubuntu логотип

CVE-2018-10844

около 7 лет назад

It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data using crafted packets.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2018-10844

около 7 лет назад

It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data using crafted packets.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2018-10844

около 7 лет назад

It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data using crafted packets.

CVSS3: 5.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2018-3050

ELSA-2018-3050: gnutls security, bug fix, and enhancement update (MODERATE)

около 7 лет назад
suse-cvrf логотип
openSUSE-SU-2018:2958-1

Security update for gnutls

около 7 лет назад
suse-cvrf логотип
openSUSE-SU-2018:2854-1

Security update for gnutls

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:2930-1

Security update for gnutls

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:2842-1

Security update for gnutls

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:2825-2

Security update for gnutls

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:2825-1

Security update for gnutls

около 7 лет назад
ubuntu логотип
CVE-2018-10846

A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.

CVSS3: 5.6
0%
Низкий
около 7 лет назад
redhat логотип
CVE-2018-10846

A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.

CVSS3: 5.3
0%
Низкий
около 7 лет назад
nvd логотип
CVE-2018-10846

A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.

CVSS3: 5.6
0%
Низкий
около 7 лет назад
debian логотип
CVE-2018-10846

A cache-based side channel in GnuTLS implementation that leads to plai ...

CVSS3: 5.6
0%
Низкий
около 7 лет назад
github логотип
GHSA-qgw6-cgvx-vw2g

A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.

CVSS3: 5.6
0%
Низкий
больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2019:14058-1

Security update for gnutls

больше 6 лет назад
ubuntu логотип
CVE-2018-10845

It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.

CVSS3: 5.9
1%
Низкий
около 7 лет назад
redhat логотип
CVE-2018-10845

It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.

CVSS3: 5.9
1%
Низкий
около 7 лет назад
nvd логотип
CVE-2018-10845

It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.

CVSS3: 5.9
1%
Низкий
около 7 лет назад
debian логотип
CVE-2018-10845

It was found that the GnuTLS implementation of HMAC-SHA-384 was vulner ...

CVSS3: 5.9
1%
Низкий
около 7 лет назад
ubuntu логотип
CVE-2018-10844

It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data using crafted packets.

CVSS3: 5.9
0%
Низкий
около 7 лет назад
redhat логотип
CVE-2018-10844

It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data using crafted packets.

CVSS3: 5.9
0%
Низкий
около 7 лет назад
nvd логотип
CVE-2018-10844

It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data using crafted packets.

CVSS3: 5.9
0%
Низкий
около 7 лет назад

Уязвимостей на страницу