Логотип exploitDog
bind:"CVE-2013-0166" OR bind:"CVE-2012-4929" OR bind:"CVE-2013-0169"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2013-0166" OR bind:"CVE-2012-4929" OR bind:"CVE-2013-0169"

Количество 33

Количество 33

oracle-oval логотип

ELSA-2013-0587

почти 13 лет назад

ELSA-2013-0587: openssl security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2013-0166

около 13 лет назад

OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.

CVSS2: 5
EPSS: Средний
redhat логотип

CVE-2013-0166

около 13 лет назад

OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.

CVSS2: 5
EPSS: Средний
nvd логотип

CVE-2013-0166

около 13 лет назад

OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.

CVSS2: 5
EPSS: Средний
debian логотип

CVE-2013-0166

около 13 лет назад

OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d do ...

CVSS2: 5
EPSS: Средний
github логотип

GHSA-f8qw-pqjg-gpv2

почти 4 года назад

OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2015:1183-1

больше 13 лет назад

Security update for compat-openssl097g

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:0578-1

больше 13 лет назад

Security update for compat-openssl097g

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:0543-1

больше 13 лет назад

Security update for compat-openssl097g

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:0182-2

больше 13 лет назад

Security update for compat-openssl097g

EPSS: Низкий
ubuntu логотип

CVE-2012-4929

больше 13 лет назад

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

CVSS2: 2.6
EPSS: Средний
redhat логотип

CVE-2012-4929

больше 13 лет назад

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

CVSS2: 4.3
EPSS: Средний
nvd логотип

CVE-2012-4929

больше 13 лет назад

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

CVSS2: 2.6
EPSS: Средний
debian логотип

CVE-2012-4929

больше 13 лет назад

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google C ...

CVSS2: 2.6
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2015:1184-2

почти 13 лет назад

Security update for OpenSSL

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:0545-1

почти 13 лет назад

Security update for OpenSSL

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2016:0640-1

почти 10 лет назад

Security update for libopenssl0_9_8

EPSS: Низкий
ubuntu логотип

CVE-2013-0169

около 13 лет назад

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.

CVSS2: 2.6
EPSS: Низкий
redhat логотип

CVE-2013-0169

около 13 лет назад

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.

CVSS2: 5.1
EPSS: Низкий
nvd логотип

CVE-2013-0169

около 13 лет назад

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.

CVSS2: 2.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2013-0587

ELSA-2013-0587: openssl security update (MODERATE)

почти 13 лет назад
ubuntu логотип
CVE-2013-0166

OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.

CVSS2: 5
11%
Средний
около 13 лет назад
redhat логотип
CVE-2013-0166

OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.

CVSS2: 5
11%
Средний
около 13 лет назад
nvd логотип
CVE-2013-0166

OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.

CVSS2: 5
11%
Средний
около 13 лет назад
debian логотип
CVE-2013-0166

OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d do ...

CVSS2: 5
11%
Средний
около 13 лет назад
github логотип
GHSA-f8qw-pqjg-gpv2

OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.

11%
Средний
почти 4 года назад
suse-cvrf логотип
SUSE-SU-2015:1183-1

Security update for compat-openssl097g

больше 13 лет назад
suse-cvrf логотип
SUSE-SU-2015:0578-1

Security update for compat-openssl097g

больше 13 лет назад
suse-cvrf логотип
SUSE-SU-2015:0543-1

Security update for compat-openssl097g

больше 13 лет назад
suse-cvrf логотип
SUSE-SU-2015:0182-2

Security update for compat-openssl097g

больше 13 лет назад
ubuntu логотип
CVE-2012-4929

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

CVSS2: 2.6
15%
Средний
больше 13 лет назад
redhat логотип
CVE-2012-4929

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

CVSS2: 4.3
15%
Средний
больше 13 лет назад
nvd логотип
CVE-2012-4929

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

CVSS2: 2.6
15%
Средний
больше 13 лет назад
debian логотип
CVE-2012-4929

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google C ...

CVSS2: 2.6
15%
Средний
больше 13 лет назад
suse-cvrf логотип
SUSE-SU-2015:1184-2

Security update for OpenSSL

почти 13 лет назад
suse-cvrf логотип
SUSE-SU-2015:0545-1

Security update for OpenSSL

почти 13 лет назад
suse-cvrf логотип
openSUSE-SU-2016:0640-1

Security update for libopenssl0_9_8

почти 10 лет назад
ubuntu логотип
CVE-2013-0169

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.

CVSS2: 2.6
1%
Низкий
около 13 лет назад
redhat логотип
CVE-2013-0169

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.

CVSS2: 5.1
1%
Низкий
около 13 лет назад
nvd логотип
CVE-2013-0169

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.

CVSS2: 2.6
1%
Низкий
около 13 лет назад

Уязвимостей на страницу