Логотип exploitDog
bind:"CVE-2023-0464"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-0464"

Количество 22

Количество 22

ubuntu логотип

CVE-2023-0464

больше 2 лет назад

A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2023-0464

больше 2 лет назад

A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2023-0464

больше 2 лет назад

A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2023-0464

больше 2 лет назад

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2023-0464

больше 2 лет назад

A security vulnerability has been identified in all supported versions ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1764-1

больше 2 лет назад

Security update for openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1754-1

больше 2 лет назад

Security update for openssl1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1748-1

больше 2 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1747-1

больше 2 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1746-1

больше 2 лет назад

Security update for openssl-3

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1745-1

больше 2 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1738-1

больше 2 лет назад

Security update for openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1737-1

больше 2 лет назад

Security update for compat-openssl098

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1704-1

больше 2 лет назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1703-1

больше 2 лет назад

Security update for openssl-1_0_0

EPSS: Низкий
redos логотип

ROS-20230407-03

больше 2 лет назад

Уязвимость OpenSSL

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-w2w6-xp88-5cvw

больше 2 лет назад

A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2023-02108

больше 2 лет назад

Уязвимость криптографической библиотеки OpenSSL, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:1790-1

больше 2 лет назад

Security update for openssl-1_1

EPSS: Низкий
oracle-oval логотип

ELSA-2023-3722

около 2 лет назад

ELSA-2023-3722: openssl security and bug fix update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-0464

A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 7.5
1%
Низкий
больше 2 лет назад
redhat логотип
CVE-2023-0464

A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 5.9
1%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-0464

A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 7.5
1%
Низкий
больше 2 лет назад
msrc логотип
CVSS3: 7.5
1%
Низкий
больше 2 лет назад
debian логотип
CVE-2023-0464

A security vulnerability has been identified in all supported versions ...

CVSS3: 7.5
1%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1764-1

Security update for openssl

1%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1754-1

Security update for openssl1

1%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1748-1

Security update for openssl-1_1

1%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1747-1

Security update for openssl-1_1

1%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1746-1

Security update for openssl-3

1%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1745-1

Security update for openssl-1_1

1%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1738-1

Security update for openssl

1%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1737-1

Security update for compat-openssl098

1%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1704-1

Security update for openssl-1_0_0

1%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1703-1

Security update for openssl-1_0_0

1%
Низкий
больше 2 лет назад
redos логотип
ROS-20230407-03

Уязвимость OpenSSL

CVSS3: 7.5
1%
Низкий
больше 2 лет назад
github логотип
GHSA-w2w6-xp88-5cvw

A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.

CVSS3: 7.5
1%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-02108

Уязвимость криптографической библиотеки OpenSSL, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
1%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:1790-1

Security update for openssl-1_1

больше 2 лет назад
oracle-oval логотип
ELSA-2023-3722

ELSA-2023-3722: openssl security and bug fix update (MODERATE)

около 2 лет назад

Уязвимостей на страницу