Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gnu gnutls 1.0.21 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2005-1431
The "record packet parsing" in GnuTLS 1.2 prior to 1.2.3 and 1.0 prior to 1.0.25 allows remote malicious users to cause a denial of service, possibly related to padding bytes in gnutils_cipher.c.
Gnu Gnutls 1.0.23
Gnu Gnutls 1.0.24
Gnu Gnutls 1.2.0
Gnu Gnutls 1.0.19
Gnu Gnutls 1.0.20
Gnu Gnutls 1.0.18
Gnu Gnutls 1.2.1
Gnu Gnutls 1.2.2
Gnu Gnutls 1.0.21
Gnu Gnutls 1.0.22
668
VMScore
CVE-2010-0731
The gnutls_x509_crt_get_serial function in the GnuTLS library prior to 1.2.1, when running on big-endian, 64-bit platforms, calls the asn1_read_value with a pointer to the wrong data type and the wrong length value, which allows remote malicious users to bypass the certificate re...
Gnu Gnutls 1.1.21
Gnu Gnutls 1.1.20
Gnu Gnutls 1.1.13
Gnu Gnutls 1.0.22
Gnu Gnutls 1.0.24
Gnu Gnutls 1.0.25
Gnu Gnutls 1.1.23
Gnu Gnutls 1.1.22
Gnu Gnutls 1.1.15
Gnu Gnutls 1.1.14
Gnu Gnutls 1.0.16
Gnu Gnutls 1.0.17
Gnu Gnutls
Gnu Gnutls 1.1.17
Gnu Gnutls 1.1.16
Gnu Gnutls 1.0.18
Gnu Gnutls 1.0.19
Gnu Gnutls 1.1.19
Gnu Gnutls 1.1.18
Gnu Gnutls 1.0.23
Gnu Gnutls 1.0.20
Gnu Gnutls 1.0.21
445
VMScore
CVE-2006-7239
The _gnutls_x509_oid2mac_algorithm function in lib/gnutls_algorithms.c in GnuTLS prior to 1.4.2 allows remote malicious users to cause a denial of service (crash) via a crafted X.509 certificate that uses a hash algorithm that is not supported by GnuTLS, which triggers a NULL poi...
Gnu Gnutls 1.2.8
Gnu Gnutls 1.1.14
Gnu Gnutls 1.2.11
Gnu Gnutls 1.1.21
Gnu Gnutls 1.0.20
Gnu Gnutls 1.2.5
Gnu Gnutls 1.0.17
Gnu Gnutls 1.2.4
Gnu Gnutls 1.3.1
Gnu Gnutls 1.0.24
Gnu Gnutls 1.0.21
Gnu Gnutls 1.0.16
Gnu Gnutls 1.1.20
Gnu Gnutls 1.2.10
Gnu Gnutls 1.1.22
Gnu Gnutls 1.4.0
Gnu Gnutls 1.3.4
Gnu Gnutls 1.0.19
Gnu Gnutls 1.2.1
Gnu Gnutls 1.1.19
Gnu Gnutls 1.1.18
Gnu Gnutls
445
VMScore
CVE-2006-4790
verify.c in GnuTLS prior to 1.4.4, when using an RSA key with exponent 3, does not properly handle excess data in the digestAlgorithm.parameters field when generating a hash, which allows remote malicious users to forge a PKCS #1 v1.5 signature that is signed by that RSA key and ...
Gnu Gnutls 1.0.21
Gnu Gnutls 1.0.22
Gnu Gnutls 1.1.17
Gnu Gnutls 1.1.18
Gnu Gnutls 1.2.10
Gnu Gnutls 1.2.11
Gnu Gnutls 1.2.8
Gnu Gnutls 1.2.8.1a1
Gnu Gnutls 1.3.5
Gnu Gnutls 1.4.0
Gnu Gnutls 1.4.1
Gnu Gnutls 1.0.23
Gnu Gnutls 1.0.24
Gnu Gnutls 1.1.19
Gnu Gnutls 1.1.20
Gnu Gnutls 1.1.21
Gnu Gnutls 1.2.2
Gnu Gnutls 1.0.19
Gnu Gnutls 1.0.20
Gnu Gnutls 1.1.15
Gnu Gnutls 1.1.16
Gnu Gnutls 1.2.0
890
VMScore
CVE-2008-1948
The _gnutls_server_name_recv_params function in lib/ext_server_name.c in libgnutls in gnutls-serv in GnuTLS prior to 2.2.4 does not properly calculate the number of Server Names in a TLS 1.0 Client Hello message during extension handling, which allows remote malicious users to ca...
Gnu Gnutls 2.3.5
Gnu Gnutls 1.6.0
Gnu Gnutls 2.0.0
Gnu Gnutls 1.5.0
Gnu Gnutls 1.2.8
Gnu Gnutls 1.1.14
Gnu Gnutls 2.3.4
Gnu Gnutls 1.7.3
Gnu Gnutls 1.4.1
Gnu Gnutls 1.4.3
Gnu Gnutls 1.2.11
Gnu Gnutls 1.1.21
Gnu Gnutls 1.7.5
Gnu Gnutls 1.7.11
Gnu Gnutls 1.0.20
Gnu Gnutls 1.2.5
Gnu Gnutls 2.2.4
Gnu Gnutls 1.2.4
Gnu Gnutls 1.3.1
Gnu Gnutls 1.0.24
Gnu Gnutls 1.7.15
Gnu Gnutls 1.6.1
828
VMScore
CVE-2008-1949
The _gnutls_recv_client_kx_message function in lib/gnutls_kx.c in libgnutls in gnutls-serv in GnuTLS prior to 2.2.4 continues to process Client Hello messages within a TLS message after one has already been processed, which allows remote malicious users to cause a denial of servi...
Gnu Gnutls 2.3.5
Gnu Gnutls 1.6.0
Gnu Gnutls 2.0.0
Gnu Gnutls 1.5.0
Gnu Gnutls 1.2.8
Gnu Gnutls 1.1.14
Gnu Gnutls 2.3.4
Gnu Gnutls 1.7.3
Gnu Gnutls 1.4.1
Gnu Gnutls 1.4.3
Gnu Gnutls 1.2.11
Gnu Gnutls 1.1.21
Gnu Gnutls 1.7.5
Gnu Gnutls 1.7.11
Gnu Gnutls 1.0.20
Gnu Gnutls 1.2.5
Gnu Gnutls 2.2.4
Gnu Gnutls 1.2.4
Gnu Gnutls 1.3.1
Gnu Gnutls 1.0.24
Gnu Gnutls 1.7.15
Gnu Gnutls 1.6.1
445
VMScore
CVE-2008-1950
Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS prior to 2.2.4 allows remote malicious users to cause a denial of service (buffer over-read and crash) via a certain integer value in the Random field in an encryp...
Gnu Gnutls 2.3.5
Gnu Gnutls 1.6.0
Gnu Gnutls 2.0.0
Gnu Gnutls 1.5.0
Gnu Gnutls 1.2.8
Gnu Gnutls 1.1.14
Gnu Gnutls 2.3.4
Gnu Gnutls 1.7.3
Gnu Gnutls 1.4.1
Gnu Gnutls 1.4.3
Gnu Gnutls 1.2.11
Gnu Gnutls 1.1.21
Gnu Gnutls 1.7.5
Gnu Gnutls 1.7.11
Gnu Gnutls 1.0.20
Gnu Gnutls 1.2.5
Gnu Gnutls 2.2.4
Gnu Gnutls 1.2.4
Gnu Gnutls 1.3.1
Gnu Gnutls 1.0.24
Gnu Gnutls 1.7.15
Gnu Gnutls 1.6.1
668
VMScore
CVE-2009-2730
libgnutls in GnuTLS prior to 2.8.2 does not properly handle a '\0' character in a domain name in the subject's (1) Common Name (CN) or (2) Subject Alternative Name (SAN) field of an X.509 certificate, which allows man-in-the-middle malicious users to spoof arbitrar...
Gnu Gnutls 2.6.5
Gnu Gnutls 2.4.2
Gnu Gnutls 2.3.3
Gnu Gnutls 2.3.9
Gnu Gnutls 1.0.18
Gnu Gnutls 1.0.19
Gnu Gnutls 1.1.14
Gnu Gnutls 1.1.15
Gnu Gnutls 1.2.0
Gnu Gnutls 1.2.11
Gnu Gnutls 1.2.6
Gnu Gnutls 1.2.8.1a1
Gnu Gnutls 1.3.4
Gnu Gnutls 1.3.5
Gnu Gnutls 2.2.1
Gnu Gnutls 1.7.12
Gnu Gnutls 2.2.5
Gnu Gnutls 1.7.16
Gnu Gnutls 2.0.3
Gnu Gnutls 1.4.3
Gnu Gnutls 2.0.0
Gnu Gnutls 1.5.2
445
VMScore
CVE-2009-1417
gnutls-cli in GnuTLS prior to 2.6.6 does not verify the activation and expiration times of X.509 certificates, which allows remote malicious users to successfully present a certificate that is (1) not yet valid or (2) no longer valid, related to lack of time checks in the _gnutls...
Gnu Gnutls 1.0.22
Gnu Gnutls 1.0.23
Gnu Gnutls 1.0.24
Gnu Gnutls 1.1.21
Gnu Gnutls 1.1.20
Gnu Gnutls 1.1.15
Gnu Gnutls 1.0.25
Gnu Gnutls 1.2.3
Gnu Gnutls 1.2.2
Gnu Gnutls 1.3.4
Gnu Gnutls 1.2.7
Gnu Gnutls 1.5.0
Gnu Gnutls 1.4.4
Gnu Gnutls 1.6.2
Gnu Gnutls 1.5.5
Gnu Gnutls 1.7.14
Gnu Gnutls 1.7.15
Gnu Gnutls 1.0.18
Gnu Gnutls 1.0.19
Gnu Gnutls 1.1.19
Gnu Gnutls 1.1.16
Gnu Gnutls 1.2.1
755
VMScore
CVE-2012-1663
Double free vulnerability in libgnutls in GnuTLS prior to 3.0.14 allows remote malicious users to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted certificate list.
Gnu Gnutls 1.1.21
Gnu Gnutls 1.2.10
Gnu Gnutls 1.2.3
Gnu Gnutls 1.2.8
Gnu Gnutls 1.2.9
Gnu Gnutls 1.4.1
Gnu Gnutls 1.0.22
Gnu Gnutls 1.0.16
Gnu Gnutls 2.4.1
Gnu Gnutls 1.1.15
Gnu Gnutls 1.0.24
Gnu Gnutls 1.4.5
Gnu Gnutls 2.10.5
Gnu Gnutls 1.1.13
Gnu Gnutls 1.7.18
Gnu Gnutls 2.0.3
Gnu Gnutls 1.4.3
Gnu Gnutls 1.5.2
Gnu Gnutls 2.1.0
Gnu Gnutls 1.5.5
Gnu Gnutls 2.1.5
Gnu Gnutls 2.1.8
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »