Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
polarssl polarssl 1.0.0 vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2013-5914
Buffer overflow in the ssl_read_record function in ssl_tls.c in PolarSSL prior to 1.1.8, when using TLS 1.1, might allow remote malicious users to execute arbitrary code via a long packet.
Polarssl Polarssl
Polarssl Polarssl 1.1.6
Polarssl Polarssl 1.1.1
Polarssl Polarssl 1.1.0
Polarssl Polarssl 1.1.5
Polarssl Polarssl 1.1.3
Polarssl Polarssl 1.1.4
Polarssl Polarssl 1.1.2
Polarssl Polarssl 1.0.0
2.6
CVSSv2
CVE-2013-0169
The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote malicious...
Openssl Openssl
Oracle Openjdk 1.7.0
Oracle Openjdk 1.6.0
Polarssl Polarssl 0.14.2
Polarssl Polarssl 0.11.0
Polarssl Polarssl 1.0.0
Polarssl Polarssl 0.13.1
Polarssl Polarssl 1.1.3
Polarssl Polarssl 0.12.1
Polarssl Polarssl 0.99
Polarssl Polarssl 0.11.1
Polarssl Polarssl 1.1.4
Polarssl Polarssl 0.14.0
Polarssl Polarssl 1.1.1
Polarssl Polarssl 1.1.2
Polarssl Polarssl 0.14.3
Polarssl Polarssl 1.1.0
Polarssl Polarssl 0.10.1
Polarssl Polarssl 0.12.0
Polarssl Polarssl 0.10.0
11 Github repositories
4.3
CVSSv2
CVE-2013-1621
Array index error in the SSL module in PolarSSL prior to 1.2.5 might allow remote malicious users to cause a denial of service via vectors involving a crafted padding-length value during validation of CBC padding in a TLS session, a different vulnerability than CVE-2013-0169.
Polarssl Polarssl 1.2.0
Polarssl Polarssl 1.1.5
Polarssl Polarssl 0.14.3
Polarssl Polarssl 0.99
Polarssl Polarssl 1.1.0
Polarssl Polarssl 1.1.1
Polarssl Polarssl
Polarssl Polarssl 1.2.3
Polarssl Polarssl 0.14.0
Polarssl Polarssl 0.14.2
Polarssl Polarssl 0.12.1
Polarssl Polarssl 0.11.1
Polarssl Polarssl 0.11.0
Polarssl Polarssl 1.0.0
Polarssl Polarssl 1.1.4
Polarssl Polarssl 1.1.3
Polarssl Polarssl 0.12.0
Polarssl Polarssl 1.1.2
Polarssl Polarssl 1.2.2
Polarssl Polarssl 1.2.1
Polarssl Polarssl 0.13.1
Polarssl Polarssl 0.10.0
4.3
CVSSv2
CVE-2013-5915
The RSA-CRT implementation in PolarSSL prior to 1.2.9 does not properly perform Montgomery multiplication, which might allow remote malicious users to conduct a timing side-channel attack and retrieve RSA private keys.
Polarssl Polarssl 0.10.0
Polarssl Polarssl 0.10.1
Polarssl Polarssl 0.14.3
Polarssl Polarssl 0.99
Polarssl Polarssl 1.1.0
Polarssl Polarssl 1.1.1
Polarssl Polarssl
Polarssl Polarssl 1.2.7
Polarssl Polarssl 0.12.0
Polarssl Polarssl 0.12.1
Polarssl Polarssl 0.13.1
Polarssl Polarssl 1.0.0
Polarssl Polarssl 1.1.4
Polarssl Polarssl 1.1.5
Polarssl Polarssl 1.2.3
Polarssl Polarssl 1.2.2
Polarssl Polarssl 0.14.0
Polarssl Polarssl 0.14.2
Polarssl Polarssl 1.1.6
Polarssl Polarssl 1.1.8
Polarssl Polarssl 1.2.1
Polarssl Polarssl 1.2.0
7.5
CVSSv2
CVE-2015-1182
The asn1_get_sequence_of function in library/asn1parse.c in PolarSSL 1.0 up to and including 1.2.12 and 1.3.x up to and including 1.3.9 does not properly initialize a pointer in the asn1_sequence linked list, which allows remote malicious users to cause a denial of service (crash...
Opensuse Opensuse 13.2
Polarssl Polarssl 1.0.0
Polarssl Polarssl 1.1.0
Polarssl Polarssl 1.1.5
Polarssl Polarssl 1.1.6
Polarssl Polarssl 1.2.12
Polarssl Polarssl 1.2.2
Polarssl Polarssl 1.2.3
Polarssl Polarssl 1.3.0
Polarssl Polarssl 1.3.6
Polarssl Polarssl 1.3.7
Polarssl Polarssl 1.1.1
Polarssl Polarssl 1.1.2
Polarssl Polarssl 1.2.0
Polarssl Polarssl 1.2.1
Polarssl Polarssl 1.2.6
Polarssl Polarssl 1.2.7
Polarssl Polarssl 1.3.2
Polarssl Polarssl 1.3.3
Polarssl Polarssl 1.1.3
Polarssl Polarssl 1.1.4
Polarssl Polarssl 1.2.10
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started