Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
polarssl polarssl 0.12.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2011-1923
The Diffie-Hellman key-exchange implementation in dhm.c in PolarSSL prior to 0.14.2 does not properly validate a public parameter, which makes it easier for man-in-the-middle malicious users to obtain the shared secret key by modifying network traffic, a related issue to CVE-2011...
Polarssl Polarssl 0.10.1
Polarssl Polarssl 0.10.0
Polarssl Polarssl
Polarssl Polarssl 0.11.1
Polarssl Polarssl 0.11.0
Polarssl Polarssl 0.13.1
Polarssl Polarssl 0.12.1
Polarssl Polarssl 0.12.0
NA
CVE-2013-0169
The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote malicious...
Openssl Openssl
Oracle Openjdk 1.7.0
Oracle Openjdk 1.6.0
Polarssl Polarssl 0.14.2
Polarssl Polarssl 0.11.0
Polarssl Polarssl 1.0.0
Polarssl Polarssl 0.13.1
Polarssl Polarssl 1.1.3
Polarssl Polarssl 0.12.1
Polarssl Polarssl 0.99
Polarssl Polarssl 0.11.1
Polarssl Polarssl 1.1.4
Polarssl Polarssl 0.14.0
Polarssl Polarssl 1.1.1
Polarssl Polarssl 1.1.2
Polarssl Polarssl 0.14.3
Polarssl Polarssl 1.1.0
Polarssl Polarssl 0.10.1
Polarssl Polarssl 0.12.0
Polarssl Polarssl 0.10.0
11 Github repositories
NA
CVE-2013-1621
Array index error in the SSL module in PolarSSL prior to 1.2.5 might allow remote malicious users to cause a denial of service via vectors involving a crafted padding-length value during validation of CBC padding in a TLS session, a different vulnerability than CVE-2013-0169.
Polarssl Polarssl 1.2.0
Polarssl Polarssl 1.1.5
Polarssl Polarssl 0.14.3
Polarssl Polarssl 0.99
Polarssl Polarssl 1.1.0
Polarssl Polarssl 1.1.1
Polarssl Polarssl
Polarssl Polarssl 1.2.3
Polarssl Polarssl 0.14.0
Polarssl Polarssl 0.14.2
Polarssl Polarssl 0.12.1
Polarssl Polarssl 0.11.1
Polarssl Polarssl 0.11.0
Polarssl Polarssl 1.0.0
Polarssl Polarssl 1.1.4
Polarssl Polarssl 1.1.3
Polarssl Polarssl 0.12.0
Polarssl Polarssl 1.1.2
Polarssl Polarssl 1.2.2
Polarssl Polarssl 1.2.1
Polarssl Polarssl 0.13.1
Polarssl Polarssl 0.10.0
NA
CVE-2013-5915
The RSA-CRT implementation in PolarSSL prior to 1.2.9 does not properly perform Montgomery multiplication, which might allow remote malicious users to conduct a timing side-channel attack and retrieve RSA private keys.
Polarssl Polarssl 0.10.0
Polarssl Polarssl 0.10.1
Polarssl Polarssl 0.14.3
Polarssl Polarssl 0.99
Polarssl Polarssl 1.1.0
Polarssl Polarssl 1.1.1
Polarssl Polarssl
Polarssl Polarssl 1.2.7
Polarssl Polarssl 0.12.0
Polarssl Polarssl 0.12.1
Polarssl Polarssl 0.13.1
Polarssl Polarssl 1.0.0
Polarssl Polarssl 1.1.4
Polarssl Polarssl 1.1.5
Polarssl Polarssl 1.2.3
Polarssl Polarssl 1.2.2
Polarssl Polarssl 0.14.0
Polarssl Polarssl 0.14.2
Polarssl Polarssl 1.1.6
Polarssl Polarssl 1.1.8
Polarssl Polarssl 1.2.1
Polarssl Polarssl 1.2.0
NA
CVE-2013-1622
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is not a security issue. Further investigation showed that, because of RFC noncompliance, no version or configuration of the product had the vulnerability previously associated with this I...
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started