Логотип exploitDog
bind:"CVE-2016-8610" OR bind:"CVE-2017-3731"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2016-8610" OR bind:"CVE-2017-3731"

Количество 40

Количество 40

oracle-oval логотип

ELSA-2017-0286

больше 8 лет назад

ELSA-2017-0286: openssl security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2017:0487-1

больше 8 лет назад

Security update for openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:0495-1

больше 8 лет назад

Security update for openssl1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2017:0461-1

больше 8 лет назад

Security update for openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:0112-1

больше 7 лет назад

Security update for openssl

EPSS: Низкий
ubuntu логотип

CVE-2017-3731

около 8 лет назад

If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.

CVSS3: 7.5
EPSS: Средний
redhat логотип

CVE-2017-3731

больше 8 лет назад

If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.

CVSS3: 5.9
EPSS: Средний
nvd логотип

CVE-2017-3731

около 8 лет назад

If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2017-3731

около 8 лет назад

If an SSL/TLS server or client is running on a 32-bit host, and a spec ...

CVSS3: 7.5
EPSS: Средний
ubuntu логотип

CVE-2016-8610

больше 7 лет назад

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.

CVSS3: 7.5
EPSS: Средний
redhat логотип

CVE-2016-8610

больше 8 лет назад

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.

CVSS3: 7.5
EPSS: Средний
nvd логотип

CVE-2016-8610

больше 7 лет назад

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2016-8610

больше 7 лет назад

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 thro ...

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-3cp9-4w64-73cg

около 3 лет назад

If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.

CVSS3: 7.5
EPSS: Средний
fstec логотип

BDU:2020-02909

около 8 лет назад

Уязвимость библиотеки OpenSSL, связанная с чтением за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2018:3994-1

больше 6 лет назад

Security update for compat-openssl097g

EPSS: Средний
github логотип

GHSA-v2q2-jxh8-m5h8

около 3 лет назад

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.

CVSS3: 7.5
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2017:0601-1

больше 8 лет назад

Security update for compat-openssl097g

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2017:0941-1

около 8 лет назад

Security update for nodejs4

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2017:0527-1

больше 8 лет назад

Security update for nodejs

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2017-0286

ELSA-2017-0286: openssl security update (MODERATE)

больше 8 лет назад
suse-cvrf логотип
openSUSE-SU-2017:0487-1

Security update for openssl

больше 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:0495-1

Security update for openssl1

больше 8 лет назад
suse-cvrf логотип
SUSE-SU-2017:0461-1

Security update for openssl

больше 8 лет назад
suse-cvrf логотип
SUSE-SU-2018:0112-1

Security update for openssl

больше 7 лет назад
ubuntu логотип
CVE-2017-3731

If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.

CVSS3: 7.5
15%
Средний
около 8 лет назад
redhat логотип
CVE-2017-3731

If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.

CVSS3: 5.9
15%
Средний
больше 8 лет назад
nvd логотип
CVE-2017-3731

If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.

CVSS3: 7.5
15%
Средний
около 8 лет назад
debian логотип
CVE-2017-3731

If an SSL/TLS server or client is running on a 32-bit host, and a spec ...

CVSS3: 7.5
15%
Средний
около 8 лет назад
ubuntu логотип
CVE-2016-8610

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.

CVSS3: 7.5
69%
Средний
больше 7 лет назад
redhat логотип
CVE-2016-8610

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.

CVSS3: 7.5
69%
Средний
больше 8 лет назад
nvd логотип
CVE-2016-8610

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.

CVSS3: 7.5
69%
Средний
больше 7 лет назад
debian логотип
CVE-2016-8610

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 thro ...

CVSS3: 7.5
69%
Средний
больше 7 лет назад
github логотип
GHSA-3cp9-4w64-73cg

If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.

CVSS3: 7.5
15%
Средний
около 3 лет назад
fstec логотип
BDU:2020-02909

Уязвимость библиотеки OpenSSL, связанная с чтением за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
15%
Средний
около 8 лет назад
suse-cvrf логотип
SUSE-SU-2018:3994-1

Security update for compat-openssl097g

69%
Средний
больше 6 лет назад
github логотип
GHSA-v2q2-jxh8-m5h8

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.

CVSS3: 7.5
69%
Средний
около 3 лет назад
suse-cvrf логотип
SUSE-SU-2017:0601-1

Security update for compat-openssl097g

больше 8 лет назад
suse-cvrf логотип
openSUSE-SU-2017:0941-1

Security update for nodejs4

около 8 лет назад
suse-cvrf логотип
openSUSE-SU-2017:0527-1

Security update for nodejs

больше 8 лет назад

Уязвимостей на страницу