Lucene search

K
githubexploit95EA4E33-8B45-577F-AC7E-767D091B794B
HistoryMay 10, 2024 - 2:30 p.m.

Exploit for Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Putty

2024-05-1014:30:50
268
putty
pseudo-random number generator
prng
ecdsa
github
ssh
sagemath
python
security vulnerability
exploit

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

5.6

Confidence

High

EPSS

0.002

Percentile

53.5%

CVE-2024-31497 POC

This vulnerability exploits the biased ECD…

This is an article that belongs to githubexploit private collection.
Please sign in to get more Information.

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

5.6

Confidence

High

EPSS

0.002

Percentile

53.5%