cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2021-46848,https://securityvulnerability.io/vulnerability/CVE-2021-46848,,GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.,Gnu,Libtasn1,9.1,CRITICAL,0.0035800000187009573,false,false,false,false,,false,false,2022-10-24T00:00:00.000Z,0 CVE-2018-1000654,https://securityvulnerability.io/vulnerability/CVE-2018-1000654,,"GNU Libtasn1-4.13 libtasn1-4.13 version libtasn1-4.13, libtasn1-4.12 contains a DoS, specifically CPU usage will reach 100% when running asn1Paser against the POC due to an issue in _asn1_expand_object_id(p_tree), after a long time, the program will be killed. This attack appears to be exploitable via parsing a crafted file.",Gnu,Libtasn1,5.5,MEDIUM,0.001979999942705035,false,false,false,false,,false,false,2018-08-20T19:00:00.000Z,0 CVE-2018-6003,https://securityvulnerability.io/vulnerability/CVE-2018-6003,,An issue was discovered in the _asn1_decode_simple_ber function in decoding.c in GNU Libtasn1 before 4.13. Unlimited recursion in the BER decoder leads to stack exhaustion and DoS.,Gnu,Libtasn1,7.5,HIGH,0.012749999761581421,false,false,false,false,,false,false,2018-01-22T20:00:00.000Z,0 CVE-2017-10790,https://securityvulnerability.io/vulnerability/CVE-2017-10790,,The _asn1_check_identifier function in GNU Libtasn1 through 4.12 causes a NULL pointer dereference and crash when reading crafted input that triggers assignment of a NULL value within an asn1_node structure. It may lead to a remote denial of service attack.,Gnu,Libtasn1,7.5,HIGH,0.011230000294744968,false,false,false,false,,false,false,2017-07-02T03:00:00.000Z,0 CVE-2014-3469,https://securityvulnerability.io/vulnerability/CVE-2014-3469,,The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument.,Gnu,"Gnutls,Libtasn1",,,0.0036800000816583633,false,false,false,false,,false,false,2014-06-05T20:00:00.000Z,0 CVE-2014-3467,https://securityvulnerability.io/vulnerability/CVE-2014-3467,,"Multiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 before 3.6, as used in GnuTLS, allow remote attackers to cause a denial of service (out-of-bounds read) via crafted ASN.1 data.",Gnu,"Gnutls,Libtasn1",,,0.013749999925494194,false,false,false,false,,false,false,2014-06-05T20:00:00.000Z,0 CVE-2014-3468,https://securityvulnerability.io/vulnerability/CVE-2014-3468,,"The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data.",Gnu,"Gnutls,Libtasn1",,,0.007180000189691782,false,false,false,false,,false,false,2014-06-05T20:00:00.000Z,0 CVE-2012-1569,https://securityvulnerability.io/vulnerability/CVE-2012-1569,,"The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure.",Gnu,"Gnutls,Libtasn1",,,0.8951600193977356,false,false,false,false,,false,false,2012-03-26T19:00:00.000Z,0