Exploit for CVE-2024-3651

A vulnerability was identified in the kjd/idna library, specifically within the `idna.encode()` function, affecting version 3.6. The issue arises from the function's handling of crafted input strings, which can lead to quadratic complexity and consequently, a denial of service condition. This vulnerability is triggered by a crafted input that causes the `idna.encode()` function to process the input with considerable computational load, significantly increasing the processing time in a quadratic manner relative to the input size.

Published: 2024-07-07

CVSS: 7.5

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Download Exploit for CVE-2024-3651 here:

Tip: Download official Tor Browser at https://www.torproject.org/download/ to access .onion links.

https://augustaverburg.nl/exploit-610-cve-2012-3152/

https://augustaverburg.nl/exploit-812-cve-2024-6769/

https://augustaverburg.nl/exploit-521-cve-2022-29464/

https://augustaverburg.nl/exploit-383-cve-2018-5002/