Lucene search

K
githubexploit95EA4E33-8B45-577F-AC7E-767D091B794B
HistoryMay 10, 2024 - 2:30 p.m.

Exploit for Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Putty

2024-05-1014:30:50
201
putty
pseudo-random number generator
prng
ecdsa
github
ssh
sagemath
python
security vulnerability
exploit

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

5.6 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

53.5%

CVE-2024-31497 POC

This vulnerability exploits the biased ECD…

This is an article that belongs to githubexploit private collection.
Please sign in to get more Information.

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

5.6 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

53.5%