Логотип exploitDog
bind:CVE-2020-24387
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-24387

Количество 2

Количество 2

nvd логотип

CVE-2020-24387

больше 5 лет назад

An issue was discovered in the yh_create_session() function of yubihsm-shell through 2.0.2. The function does not explicitly check the returned session id from the device. An invalid session id would lead to out-of-bounds read and write operations in the session array. This could be used by an attacker to cause a denial of service attack.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-f3q9-v3p2-wx3q

больше 3 лет назад

An issue was discovered in the yh_create_session() function of yubihsm-shell through 2.0.2. The function does not explicitly check the returned session id from the device. An invalid session id would lead to out-of-bounds read and write operations in the session array. This could be used by an attacker to cause a denial of service attack.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-24387

An issue was discovered in the yh_create_session() function of yubihsm-shell through 2.0.2. The function does not explicitly check the returned session id from the device. An invalid session id would lead to out-of-bounds read and write operations in the session array. This could be used by an attacker to cause a denial of service attack.

CVSS3: 7.5
1%
Низкий
больше 5 лет назад
github логотип
GHSA-f3q9-v3p2-wx3q

An issue was discovered in the yh_create_session() function of yubihsm-shell through 2.0.2. The function does not explicitly check the returned session id from the device. An invalid session id would lead to out-of-bounds read and write operations in the session array. This could be used by an attacker to cause a denial of service attack.

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу