CVE-2025-9230
- EPSS 0.03%
- Veröffentlicht 30.09.2025 14:15:41
- Zuletzt bearbeitet 02.10.2025 19:12:17
Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write. Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an a...
CVE-2025-9231
- EPSS 0.02%
- Veröffentlicht 30.09.2025 14:15:41
- Zuletzt bearbeitet 02.10.2025 19:12:17
Issue summary: A timing side-channel which could potentially allow remote recovery of the private key exists in the SM2 algorithm implementation on 64 bit ARM platforms. Impact summary: A timing side-channel in SM2 signature computations on 64 bit A...
CVE-2025-9232
- EPSS 0.03%
- Veröffentlicht 30.09.2025 14:15:41
- Zuletzt bearbeitet 02.10.2025 19:12:17
Issue summary: An application using the OpenSSL HTTP client API functions may trigger an out-of-bounds read if the 'no_proxy' environment variable is set and the host portion of the authority component of the HTTP URL is an IPv6 address. Impact summ...
CVE-2025-45765
- EPSS 0.02%
- Veröffentlicht 07.08.2025 21:15:27
- Zuletzt bearbeitet 12.08.2025 15:15:29
ruby-jwt v3.0.0.beta1 was discovered to contain weak encryption. NOTE: the Supplier's perspective is "keysize is not something that is enforced by this library. Currently more recent versions of OpenSSL are enforcing some key sizes and those restrict...
CVE-2025-27587
- EPSS 0.06%
- Veröffentlicht 16.06.2025 00:00:00
- Zuletzt bearbeitet 26.06.2025 17:15:30
OpenSSL 3.0.0 through 3.3.2 on the PowerPC architecture is vulnerable to a Minerva attack, exploitable by measuring the time of signing of random messages using the EVP_DigestSign API, and then using the private key to extract the K value (nonce) fro...
CVE-2025-4575
- EPSS 0.04%
- Veröffentlicht 22.05.2025 13:36:49
- Zuletzt bearbeitet 23.05.2025 15:55:02
Issue summary: Use of -addreject option with the openssl x509 application adds a trusted use instead of a rejected use for a certificate. Impact summary: If a user intends to make a trusted certificate rejected for a particular use it will be instea...
CVE-2024-12797
- EPSS 0.3%
- Veröffentlicht 11.02.2025 16:15:38
- Zuletzt bearbeitet 18.02.2025 14:15:27
Issue summary: Clients using RFC7250 Raw Public Keys (RPKs) to authenticate a server may fail to notice that the server was not authenticated, because handshakes don't abort as expected when the SSL_VERIFY_PEER verification mode is set. Impact summa...
CVE-2024-13176
- EPSS 0.09%
- Veröffentlicht 20.01.2025 14:15:26
- Zuletzt bearbeitet 26.05.2025 18:15:19
Issue summary: A timing side-channel which could potentially allow recovering the private key exists in the ECDSA signature computation. Impact summary: A timing side-channel in ECDSA signature computations could allow recovering the private key by ...
CVE-2024-4741
- EPSS 0.13%
- Veröffentlicht 13.11.2024 11:15:04
- Zuletzt bearbeitet 13.11.2024 17:01:16
Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations Impact summary: A use after free can have a range of potential consequences such as the corruption of valid...
CVE-2024-9143
- EPSS 0.65%
- Veröffentlicht 16.10.2024 17:15:18
- Zuletzt bearbeitet 01.09.2025 09:15:34
Issue summary: Use of the low-level GF(2^m) elliptic curve APIs with untrusted explicit values for the field polynomial can lead to out-of-bounds memory reads or writes. Impact summary: Out of bound memory writes can lead to an application crash or ...