Количество 42
Количество 42
ELSA-2020-3280
ELSA-2020-3280: nss and nspr security, bug fix, and enhancement update (MODERATE)
RLSA-2020:3280
Moderate: nss and nspr security, bug fix, and enhancement update
ELSA-2020-4076
ELSA-2020-4076: nss and nspr security, bug fix, and enhancement update (MODERATE)
SUSE-SU-2020:1839-1
Security update for mozilla-nspr, mozilla-nss
SUSE-SU-2020:14418-1
Security update for mozilla-nspr, mozilla-nss
CVE-2019-17006
In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.
CVE-2019-17006
In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.
CVE-2019-17006
In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.
CVE-2019-17006
In Network Security Services (NSS) before 3.46, several cryptographic ...
GHSA-h4cr-x49j-2r7w
In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.
BDU:2020-02871
Уязвимость набора библиотек NSS (Network Security Services), существующая из-за недостаточной проверки входных данных, позволяющая нарушителю выполнить произвольный код
openSUSE-SU-2020:0854-1
Security update for mozilla-nspr, mozilla-nss
SUSE-SU-2020:1677-1
Security update for mozilla-nspr, mozilla-nss
SUSE-SU-2020:0088-1
Security update for mozilla-nspr, mozilla-nss
openSUSE-SU-2020:0008-1
Security update for mozilla-nspr, mozilla-nss
SUSE-SU-2019:3395-1
Security update for mozilla-nspr, mozilla-nss
CVE-2020-12402
During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.
CVE-2020-12402
During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.
CVE-2020-12402
During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.
CVE-2020-12402
During RSA key generation, bignum implementations used a variation of ...
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
ELSA-2020-3280 ELSA-2020-3280: nss and nspr security, bug fix, and enhancement update (MODERATE) | больше 5 лет назад | |||
RLSA-2020:3280 Moderate: nss and nspr security, bug fix, and enhancement update | больше 5 лет назад | |||
ELSA-2020-4076 ELSA-2020-4076: nss and nspr security, bug fix, and enhancement update (MODERATE) | около 5 лет назад | |||
SUSE-SU-2020:1839-1 Security update for mozilla-nspr, mozilla-nss | больше 5 лет назад | |||
SUSE-SU-2020:14418-1 Security update for mozilla-nspr, mozilla-nss | больше 5 лет назад | |||
CVE-2019-17006 In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow. | CVSS3: 9.8 | 1% Низкий | около 5 лет назад | |
CVE-2019-17006 In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow. | CVSS3: 8.1 | 1% Низкий | почти 6 лет назад | |
CVE-2019-17006 In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow. | CVSS3: 9.8 | 1% Низкий | около 5 лет назад | |
CVE-2019-17006 In Network Security Services (NSS) before 3.46, several cryptographic ... | CVSS3: 9.8 | 1% Низкий | около 5 лет назад | |
GHSA-h4cr-x49j-2r7w In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow. | 1% Низкий | больше 3 лет назад | ||
BDU:2020-02871 Уязвимость набора библиотек NSS (Network Security Services), существующая из-за недостаточной проверки входных данных, позволяющая нарушителю выполнить произвольный код | CVSS3: 8.1 | 1% Низкий | почти 6 лет назад | |
openSUSE-SU-2020:0854-1 Security update for mozilla-nspr, mozilla-nss | больше 5 лет назад | |||
SUSE-SU-2020:1677-1 Security update for mozilla-nspr, mozilla-nss | больше 5 лет назад | |||
SUSE-SU-2020:0088-1 Security update for mozilla-nspr, mozilla-nss | почти 6 лет назад | |||
openSUSE-SU-2020:0008-1 Security update for mozilla-nspr, mozilla-nss | почти 6 лет назад | |||
SUSE-SU-2019:3395-1 Security update for mozilla-nspr, mozilla-nss | почти 6 лет назад | |||
CVE-2020-12402 During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78. | CVSS3: 4.4 | 0% Низкий | больше 5 лет назад | |
CVE-2020-12402 During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78. | CVSS3: 4.4 | 0% Низкий | больше 5 лет назад | |
CVE-2020-12402 During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78. | CVSS3: 4.4 | 0% Низкий | больше 5 лет назад | |
CVE-2020-12402 During RSA key generation, bignum implementations used a variation of ... | CVSS3: 4.4 | 0% Низкий | больше 5 лет назад |
Уязвимостей на страницу