Логотип exploitDog
bind:"CVE-2013-0166" OR bind:"CVE-2012-4929" OR bind:"CVE-2013-0169"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2013-0166" OR bind:"CVE-2012-4929" OR bind:"CVE-2013-0169"

Количество 33

Количество 33

oracle-oval логотип

ELSA-2013-0587

больше 12 лет назад

ELSA-2013-0587: openssl security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2013-0166

больше 12 лет назад

OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.

CVSS2: 5
EPSS: Низкий
redhat логотип

CVE-2013-0166

больше 12 лет назад

OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.

CVSS2: 5
EPSS: Низкий
nvd логотип

CVE-2013-0166

больше 12 лет назад

OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.

CVSS2: 5
EPSS: Низкий
debian логотип

CVE-2013-0166

больше 12 лет назад

OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d do ...

CVSS2: 5
EPSS: Низкий
github логотип

GHSA-f8qw-pqjg-gpv2

около 3 лет назад

OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:1183-1

почти 13 лет назад

Security update for compat-openssl097g

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:0578-1

почти 13 лет назад

Security update for compat-openssl097g

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:0543-1

почти 13 лет назад

Security update for compat-openssl097g

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:0182-2

почти 13 лет назад

Security update for compat-openssl097g

EPSS: Низкий
ubuntu логотип

CVE-2012-4929

почти 13 лет назад

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

CVSS2: 2.6
EPSS: Средний
redhat логотип

CVE-2012-4929

почти 13 лет назад

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

CVSS2: 4.3
EPSS: Средний
nvd логотип

CVE-2012-4929

почти 13 лет назад

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

CVSS2: 2.6
EPSS: Средний
debian логотип

CVE-2012-4929

почти 13 лет назад

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google C ...

CVSS2: 2.6
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2015:1184-2

около 12 лет назад

Security update for OpenSSL

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:0545-1

около 12 лет назад

Security update for OpenSSL

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2016:0640-1

больше 9 лет назад

Security update for libopenssl0_9_8

EPSS: Низкий
ubuntu логотип

CVE-2013-0169

больше 12 лет назад

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.

CVSS2: 2.6
EPSS: Низкий
redhat логотип

CVE-2013-0169

больше 12 лет назад

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.

CVSS2: 5.1
EPSS: Низкий
nvd логотип

CVE-2013-0169

больше 12 лет назад

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.

CVSS2: 2.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2013-0587

ELSA-2013-0587: openssl security update (MODERATE)

больше 12 лет назад
ubuntu логотип
CVE-2013-0166

OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.

CVSS2: 5
5%
Низкий
больше 12 лет назад
redhat логотип
CVE-2013-0166

OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.

CVSS2: 5
5%
Низкий
больше 12 лет назад
nvd логотип
CVE-2013-0166

OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.

CVSS2: 5
5%
Низкий
больше 12 лет назад
debian логотип
CVE-2013-0166

OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d do ...

CVSS2: 5
5%
Низкий
больше 12 лет назад
github логотип
GHSA-f8qw-pqjg-gpv2

OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.

5%
Низкий
около 3 лет назад
suse-cvrf логотип
SUSE-SU-2015:1183-1

Security update for compat-openssl097g

почти 13 лет назад
suse-cvrf логотип
SUSE-SU-2015:0578-1

Security update for compat-openssl097g

почти 13 лет назад
suse-cvrf логотип
SUSE-SU-2015:0543-1

Security update for compat-openssl097g

почти 13 лет назад
suse-cvrf логотип
SUSE-SU-2015:0182-2

Security update for compat-openssl097g

почти 13 лет назад
ubuntu логотип
CVE-2012-4929

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

CVSS2: 2.6
13%
Средний
почти 13 лет назад
redhat логотип
CVE-2012-4929

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

CVSS2: 4.3
13%
Средний
почти 13 лет назад
nvd логотип
CVE-2012-4929

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.

CVSS2: 2.6
13%
Средний
почти 13 лет назад
debian логотип
CVE-2012-4929

The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google C ...

CVSS2: 2.6
13%
Средний
почти 13 лет назад
suse-cvrf логотип
SUSE-SU-2015:1184-2

Security update for OpenSSL

около 12 лет назад
suse-cvrf логотип
SUSE-SU-2015:0545-1

Security update for OpenSSL

около 12 лет назад
suse-cvrf логотип
openSUSE-SU-2016:0640-1

Security update for libopenssl0_9_8

больше 9 лет назад
ubuntu логотип
CVE-2013-0169

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.

CVSS2: 2.6
1%
Низкий
больше 12 лет назад
redhat логотип
CVE-2013-0169

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.

CVSS2: 5.1
1%
Низкий
больше 12 лет назад
nvd логотип
CVE-2013-0169

The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.

CVSS2: 2.6
1%
Низкий
больше 12 лет назад

Уязвимостей на страницу