cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-28077,https://securityvulnerability.io/vulnerability/CVE-2023-28077,Debug Message Reveals Unnecessary Information Vulnerability in Dell BSAFE SSL-J,"A vulnerability exists in Dell BSAFE SSL-J that allows the disclosure of unnecessary information through a debug message. This issue affects versions prior to 6.5 and versions 7.0 and 7.1. A locally privileged user could exploit this vulnerability to access sensitive information, posing potential security risks to the integrity of the system. Organizations using these affected versions should apply the necessary security updates to mitigate risks associated with this vulnerability.",Dell,Dell Bsafe Ssl-j,4.4,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-10T03:11:28.614Z,0 CVE-2022-34381,https://securityvulnerability.io/vulnerability/CVE-2022-34381,Unmaintained Third-Party Component Vulnerability in Dell BSAFE SSL-J and Crypto-J,"An unmaintained third-party component found in Dell BSAFE SSL-J versions 7.0 and previous versions up to 6.5, alongside Dell BSAFE Crypto-J versions earlier than 6.2.6.1, poses a significant security vulnerability. This flaw allows an unauthenticated remote attacker the potential to exploit the vulnerability, which can lead to serious compromise of affected systems. Users of these products are strongly recommended to upgrade to the secure versions to mitigate associated risks. For more details on the remediation, refer to Dell's security advisory.",Dell,"Dell Bsafe Crypto-j,Dell Bsafe Ssl-j",9.1,CRITICAL,0.0017999999690800905,false,,false,false,false,,,false,false,,2024-02-02T15:30:23.697Z,0 CVE-2022-34364,https://securityvulnerability.io/vulnerability/CVE-2022-34364,Information Disclosure Vulnerability in Dell BSAFE SSL-J,"The vulnerability in Dell BSAFE SSL-J arises when the software operates in debug mode, potentially disclosing sensitive information. This flaw can be exploited by attackers to gain access to otherwise protected data, heightening the risk of privacy violations and unauthorized access. It is essential for users of BSAFE SSL-J to be aware of this issue and take necessary precautions to secure their environments.",Dell,Bsafe Ssl-j,4.4,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2023-02-10T19:13:42.880Z,0 CVE-2022-24409,https://securityvulnerability.io/vulnerability/CVE-2022-24409,Covert Timing Channel Vulnerability in Dell BSAFE SSL-J,Dell BSAFE SSL-J has a covert timing channel vulnerability that malicious users could exploit to compromise the security of the affected system. This issue underscores the importance of maintaining updated software and being aware of vulnerability management practices. Only users with active BSAFE maintenance contracts can access detailed vulnerability information.,Dell,Dell Bsafe Ssl-j,5.9,MEDIUM,0.0007800000021234155,false,,false,false,false,,,false,false,,2022-02-23T22:15:00.000Z,0 CVE-2018-11068,https://securityvulnerability.io/vulnerability/CVE-2018-11068,,RSA BSAFE SSL-J versions prior to 6.2.4 contain a Heap Inspection vulnerability that could allow an attacker with physical access to the system to recover sensitive key material.,Dell,Rsa Bsafe Ssl-j,3.9,LOW,0.0005799999926239252,false,,false,false,false,,,false,false,,2018-09-11T19:29:00.000Z,0 CVE-2018-11070,https://securityvulnerability.io/vulnerability/CVE-2018-11070,,"RSA BSAFE Crypto-J versions prior to 6.2.4 and RSA BSAFE SSL-J versions prior to 6.2.4 contain a Covert Timing Channel vulnerability during PKCS #1 unpadding operations, also known as a Bleichenbacher attack. A remote attacker may be able to recover a RSA key.",Dell,"Rsa Bsafe Crypto-j,Rsa Bsafe Ssl-j",5.9,MEDIUM,0.0016499999910593033,false,,false,false,false,,,false,false,,2018-09-11T19:29:00.000Z,0 CVE-2018-11069,https://securityvulnerability.io/vulnerability/CVE-2018-11069,,"RSA BSAFE SSL-J versions prior to 6.2.4 contain a Covert Timing Channel vulnerability during RSA decryption, also known as a Bleichenbacher attack on RSA decryption. A remote attacker may be able to recover a RSA key.",Dell,Rsa Bsafe Ssl-j,5.9,MEDIUM,0.0027099999133497477,false,,false,false,false,,,false,false,,2018-09-11T19:29:00.000Z,0 CVE-2016-0887,https://securityvulnerability.io/vulnerability/CVE-2016-0887,,"EMC RSA BSAFE Micro Edition Suite (MES) 4.0.x and 4.1.x before 4.1.5, RSA BSAFE Crypto-C Micro Edition (CCME) 4.0.x and 4.1.x before 4.1.3, RSA BSAFE Crypto-J before 6.2.1, RSA BSAFE SSL-J before 6.2.1, and RSA BSAFE SSL-C before 2.8.9 allow remote attackers to discover a private-key prime by conducting a Lenstra side-channel attack that leverages an application's failure to detect an RSA signature failure during a TLS session.",Dell,"Bsafe Crypto-j,Bsafe Ssl-c,Bsafe Crypto-c-micro-edition,Bsafe Micro-edition-suite,Bsafe Ssl-j",5.9,MEDIUM,0.006130000110715628,false,,false,false,false,,,false,false,,2016-04-12T23:59:00.000Z,0 CVE-2015-0534,https://securityvulnerability.io/vulnerability/CVE-2015-0534,,"EMC RSA BSAFE Micro Edition Suite (MES) 4.0.x before 4.0.8 and 4.1.x before 4.1.3, RSA BSAFE Crypto-J before 6.2, RSA BSAFE SSL-J before 6.2, and RSA BSAFE SSL-C 2.8.9 and earlier do not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, a similar issue to CVE-2014-8275.",Dell,"Bsafe Ssl-c,Bsafe,Bsafe Ssl-j",7.5,HIGH,0.00431999983265996,false,,false,false,false,,,false,false,,2015-08-20T10:00:00.000Z,0 CVE-2014-4630,https://securityvulnerability.io/vulnerability/CVE-2014-4630,,"EMC RSA BSAFE Micro Edition Suite (MES) 4.0.x before 4.0.6 and RSA BSAFE SSL-J before 6.1.4 do not ensure that a server's X.509 certificate is the same during renegotiation as it was before renegotiation, which allows man-in-the-middle attackers to obtain sensitive information or modify TLS session data via a ""triple handshake attack.""",Dell,"Bsafe Micro-edition-suite,Bsafe Ssl-j",,,0.00107999995816499,false,,false,false,false,,,false,false,,2014-12-30T15:00:00.000Z,0