Page 12 of 57 results (0.005 seconds)

CVSS: 5.0EPSS: 2%CPEs: 10EXPL: 0

The "record packet parsing" in GnuTLS 1.2 before 1.2.3 and 1.0 before 1.0.25 allows remote attackers to cause a denial of service, possibly related to padding bytes in gnutils_cipher.c. • http://lists.gnupg.org/pipermail/gnutls-dev/2005-April/000858.html http://secunia.com/advisories/15193 http://securitytracker.com/id?1013861 http://www.osvdb.org/16054 http://www.redhat.com/support/errata/RHSA-2005-430.html http://www.securityfocus.com/bid/13477 https://exchange.xforce.ibmcloud.com/vulnerabilities/20328 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9238 https://access.redhat.com/security/cve/CVE-2005-1431 https://bugzilla.re •

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 0

X.509 Certificate Signature Verification in Gnu transport layer security library (GnuTLS) 1.0.16 allows remote attackers to cause a denial of service (CPU consumption) via certificates containing long chains and signed with large RSA keys. • http://lists.gnupg.org/pipermail/gnutls-dev/2004-August/000703.html http://secunia.com/advisories/12156 http://securitytracker.com/id?1010838 http://www.hornik.sk/SA/SA-20040802.txt http://www.osvdb.org/8278 http://www.securityfocus.com/bid/10839 https://exchange.xforce.ibmcloud.com/vulnerabilities/16858 •