Aaron Zauner

5 exploits Active since Jun 2014
CVE-2014-3466 NOMISEC WORKING POC
Gnutls < 3.1.24 - Memory Corruption
Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.
17 stars
CVE-2016-0270 WRITEUP MEDIUM WORKING POC
IBM Domino 9.0.1 FP3-5 IF1 - Auth Bypass
IBM Domino 9.0.1 Fix Pack 3 Interim Fix 2 through 9.0.1 Fix Pack 5 Interim Fix 1, when using TLS and AES GCM, uses random nonce generation, which makes it easier for remote attackers to obtain the authentication key and spoof data by leveraging the reuse of a nonce in a session and a "forbidden attack." NOTE: this CVE has been incorrectly used for GCM nonce reuse issues in other products; see CVE-2016-10213 for the A10 issue, CVE-2016-10212 for the Radware issue, and CVE-2017-5933 for the Citrix issue.
CVSS 5.9
CVE-2016-10212 WRITEUP MEDIUM WORKING POC
Radware Alteon < 30.0.5.10 - Information Disclosure
Radware devices use the same value for the first two GCM nonces, which allows remote attackers to obtain the authentication key and spoof data via a "forbidden attack," a similar issue to CVE-2016-0270. NOTE: this issue may be due to the use of a third-party Cavium product.
CVSS 5.9
CVE-2016-10213 WRITEUP MEDIUM WORKING POC
A10networks Advanced Core Operating System - Information Disclosure
A10 AX1030 and possibly other devices with software before 2.7.2-P8 uses random GCM nonce generations, which makes it easier for remote attackers to obtain the authentication key and spoof data by leveraging a reused nonce in a session and a "forbidden attack," a similar issue to CVE-2016-0270.
CVSS 5.9
CVE-2017-5933 WRITEUP MEDIUM WORKING POC
Citrix Netscaler Application Delivery... - Information Disclosure
Citrix NetScaler ADC and NetScaler Gateway 10.5 before Build 65.11, 11.0 before Build 69.12/69.123, and 11.1 before Build 51.21 randomly generates GCM nonces, which makes it marginally easier for remote attackers to obtain the GCM authentication key and spoof data by leveraging a reused nonce in a session and a "forbidden attack," a similar issue to CVE-2016-0270.
CVSS 5.9