Логотип exploitDog
bind:"CVE-2019-17006" OR bind:"CVE-2020-12402" OR bind:"CVE-2019-17023" OR bind:"CVE-2019-11756"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2019-17006" OR bind:"CVE-2020-12402" OR bind:"CVE-2019-17023" OR bind:"CVE-2019-11756"

Количество 42

Количество 42

oracle-oval логотип

ELSA-2020-3280

больше 5 лет назад

ELSA-2020-3280: nss and nspr security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
rocky логотип

RLSA-2020:3280

больше 5 лет назад

Moderate: nss and nspr security, bug fix, and enhancement update

EPSS: Низкий
oracle-oval логотип

ELSA-2020-4076

около 5 лет назад

ELSA-2020-4076: nss and nspr security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1839-1

больше 5 лет назад

Security update for mozilla-nspr, mozilla-nss

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:14418-1

больше 5 лет назад

Security update for mozilla-nspr, mozilla-nss

EPSS: Низкий
ubuntu логотип

CVE-2019-17006

около 5 лет назад

In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.

CVSS3: 9.8
EPSS: Низкий
redhat логотип

CVE-2019-17006

почти 6 лет назад

In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.

CVSS3: 8.1
EPSS: Низкий
nvd логотип

CVE-2019-17006

около 5 лет назад

In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2019-17006

около 5 лет назад

In Network Security Services (NSS) before 3.46, several cryptographic ...

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-h4cr-x49j-2r7w

больше 3 лет назад

In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.

EPSS: Низкий
fstec логотип

BDU:2020-02871

почти 6 лет назад

Уязвимость набора библиотек NSS (Network Security Services), существующая из-за недостаточной проверки входных данных, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.1
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:0854-1

больше 5 лет назад

Security update for mozilla-nspr, mozilla-nss

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:1677-1

больше 5 лет назад

Security update for mozilla-nspr, mozilla-nss

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0088-1

почти 6 лет назад

Security update for mozilla-nspr, mozilla-nss

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:0008-1

почти 6 лет назад

Security update for mozilla-nspr, mozilla-nss

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3395-1

почти 6 лет назад

Security update for mozilla-nspr, mozilla-nss

EPSS: Низкий
ubuntu логотип

CVE-2020-12402

больше 5 лет назад

During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.

CVSS3: 4.4
EPSS: Низкий
redhat логотип

CVE-2020-12402

больше 5 лет назад

During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.

CVSS3: 4.4
EPSS: Низкий
nvd логотип

CVE-2020-12402

больше 5 лет назад

During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.

CVSS3: 4.4
EPSS: Низкий
debian логотип

CVE-2020-12402

больше 5 лет назад

During RSA key generation, bignum implementations used a variation of ...

CVSS3: 4.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2020-3280

ELSA-2020-3280: nss and nspr security, bug fix, and enhancement update (MODERATE)

больше 5 лет назад
rocky логотип
RLSA-2020:3280

Moderate: nss and nspr security, bug fix, and enhancement update

больше 5 лет назад
oracle-oval логотип
ELSA-2020-4076

ELSA-2020-4076: nss and nspr security, bug fix, and enhancement update (MODERATE)

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1839-1

Security update for mozilla-nspr, mozilla-nss

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:14418-1

Security update for mozilla-nspr, mozilla-nss

больше 5 лет назад
ubuntu логотип
CVE-2019-17006

In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.

CVSS3: 9.8
1%
Низкий
около 5 лет назад
redhat логотип
CVE-2019-17006

In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.

CVSS3: 8.1
1%
Низкий
почти 6 лет назад
nvd логотип
CVE-2019-17006

In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.

CVSS3: 9.8
1%
Низкий
около 5 лет назад
debian логотип
CVE-2019-17006

In Network Security Services (NSS) before 3.46, several cryptographic ...

CVSS3: 9.8
1%
Низкий
около 5 лет назад
github логотип
GHSA-h4cr-x49j-2r7w

In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.

1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-02871

Уязвимость набора библиотек NSS (Network Security Services), существующая из-за недостаточной проверки входных данных, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.1
1%
Низкий
почти 6 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0854-1

Security update for mozilla-nspr, mozilla-nss

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:1677-1

Security update for mozilla-nspr, mozilla-nss

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:0088-1

Security update for mozilla-nspr, mozilla-nss

почти 6 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0008-1

Security update for mozilla-nspr, mozilla-nss

почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:3395-1

Security update for mozilla-nspr, mozilla-nss

почти 6 лет назад
ubuntu логотип
CVE-2020-12402

During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.

CVSS3: 4.4
0%
Низкий
больше 5 лет назад
redhat логотип
CVE-2020-12402

During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.

CVSS3: 4.4
0%
Низкий
больше 5 лет назад
nvd логотип
CVE-2020-12402

During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.

CVSS3: 4.4
0%
Низкий
больше 5 лет назад
debian логотип
CVE-2020-12402

During RSA key generation, bignum implementations used a variation of ...

CVSS3: 4.4
0%
Низкий
больше 5 лет назад

Уязвимостей на страницу