A vulnerability was identified in the kjd/idna library, specifically within the `idna.encode()` function, affecting version 3.6. The issue arises from the function's handling of crafted input strings, which can lead to quadratic complexity and consequently, a denial of service condition. This vulnerability is triggered by a crafted input that causes the `idna.encode()` function to process the input with considerable computational load, significantly increasing the processing time in a quadratic manner relative to the input size.
Published: 2024-07-07
CVSS: 7.5
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Download Exploit for CVE-2024-3651 here:
Tip: Download official Tor Browser at https://www.torproject.org/download/ to access .onion links.
https://augustaverburg.nl/exploit-610-cve-2012-3152/
https://augustaverburg.nl/exploit-812-cve-2024-6769/
https://augustaverburg.nl/exploit-521-cve-2022-29464/
https://augustaverburg.nl/exploit-383-cve-2018-5002/
