Логотип exploitDog
bind:"CVE-2018-0734" OR bind:"CVE-2018-0735" OR bind:"CVE-2019-1543"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2018-0734" OR bind:"CVE-2018-0735" OR bind:"CVE-2019-1543"

Количество 47

Количество 47

oracle-oval логотип

ELSA-2019-3700

больше 5 лет назад

ELSA-2019-3700: openssl security, bug fix, and enhancement update (LOW)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:3890-1

больше 6 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:3945-1

больше 6 лет назад

Security update for openssl-1_1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:3863-1

больше 6 лет назад

Security update for openssl-1_1

EPSS: Низкий
ubuntu логотип

CVE-2018-0734

больше 6 лет назад

The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2018-0734

больше 6 лет назад

The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).

CVSS3: 5.1
EPSS: Низкий
nvd логотип

CVE-2018-0734

больше 6 лет назад

The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).

CVSS3: 5.9
EPSS: Низкий
msrc логотип

CVE-2018-0734

около 4 лет назад

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2018-0734

больше 6 лет назад

The OpenSSL DSA signature algorithm has been shown to be vulnerable to ...

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-93g8-hm6f-hrw3

около 3 лет назад

The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).

CVSS3: 5.9
EPSS: Низкий
fstec логотип

BDU:2019-01256

больше 6 лет назад

Уязвимость реализации алгоритма шифрования DSA (Digital Signature Algorithm) библиотеки OpenSSL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.9
EPSS: Низкий
ubuntu логотип

CVE-2018-0735

больше 6 лет назад

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2018-0735

больше 6 лет назад

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).

CVSS3: 5.1
EPSS: Низкий
nvd логотип

CVE-2018-0735

больше 6 лет назад

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2018-0735

больше 6 лет назад

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable ...

CVSS3: 5.9
EPSS: Низкий
ubuntu логотип

CVE-2019-1543

больше 6 лет назад

ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a nonce to be set of up to 16 bytes. In this case only the last 12 bytes are significant and any additional leading bytes are ignored. It is a requirement of using this cipher that nonce values are unique. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. If an application changes the default nonce length to be longer than 12 bytes and then makes a change to the leading bytes of the nonce expecting the new value to be a new unique nonce then such an application could inadvertently encrypt messages with a reused nonce. Additionally the ignored bytes in a long nonce are not covered by the integrity guarantee of...

CVSS3: 7.4
EPSS: Низкий
redhat логотип

CVE-2019-1543

больше 6 лет назад

ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a nonce to be set of up to 16 bytes. In this case only the last 12 bytes are significant and any additional leading bytes are ignored. It is a requirement of using this cipher that nonce values are unique. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. If an application changes the default nonce length to be longer than 12 bytes and then makes a change to the leading bytes of the nonce expecting the new value to be a new unique nonce then such an application could inadvertently encrypt messages with a reused nonce. Additionally the ignored bytes in a long nonce are not covered by the integrity guarantee of...

CVSS3: 2.9
EPSS: Низкий
nvd логотип

CVE-2019-1543

больше 6 лет назад

ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a nonce to be set of up to 16 bytes. In this case only the last 12 bytes are significant and any additional leading bytes are ignored. It is a requirement of using this cipher that nonce values are unique. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. If an application changes the default nonce length to be longer than 12 bytes and then makes a change to the leading bytes of the nonce expecting the new value to be a new unique nonce then such an application could inadvertently encrypt messages with a reused nonce. Additionally the ignored bytes in a long nonce are not covered by the integrity guarantee of th

CVSS3: 7.4
EPSS: Низкий
debian логотип

CVE-2019-1543

больше 6 лет назад

ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input ...

CVSS3: 7.4
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:4050-1

больше 6 лет назад

Security update for openssl-1_0_0

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2019-3700

ELSA-2019-3700: openssl security, bug fix, and enhancement update (LOW)

больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2018:3890-1

Security update for openssl-1_1

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2018:3945-1

Security update for openssl-1_1

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2018:3863-1

Security update for openssl-1_1

больше 6 лет назад
ubuntu логотип
CVE-2018-0734

The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).

CVSS3: 5.9
6%
Низкий
больше 6 лет назад
redhat логотип
CVE-2018-0734

The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).

CVSS3: 5.1
6%
Низкий
больше 6 лет назад
nvd логотип
CVE-2018-0734

The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).

CVSS3: 5.9
6%
Низкий
больше 6 лет назад
msrc логотип
CVSS3: 5.9
6%
Низкий
около 4 лет назад
debian логотип
CVE-2018-0734

The OpenSSL DSA signature algorithm has been shown to be vulnerable to ...

CVSS3: 5.9
6%
Низкий
больше 6 лет назад
github логотип
GHSA-93g8-hm6f-hrw3

The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).

CVSS3: 5.9
6%
Низкий
около 3 лет назад
fstec логотип
BDU:2019-01256

Уязвимость реализации алгоритма шифрования DSA (Digital Signature Algorithm) библиотеки OpenSSL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 5.9
6%
Низкий
больше 6 лет назад
ubuntu логотип
CVE-2018-0735

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).

CVSS3: 5.9
8%
Низкий
больше 6 лет назад
redhat логотип
CVE-2018-0735

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).

CVSS3: 5.1
8%
Низкий
больше 6 лет назад
nvd логотип
CVE-2018-0735

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).

CVSS3: 5.9
8%
Низкий
больше 6 лет назад
debian логотип
CVE-2018-0735

The OpenSSL ECDSA signature algorithm has been shown to be vulnerable ...

CVSS3: 5.9
8%
Низкий
больше 6 лет назад
ubuntu логотип
CVE-2019-1543

ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a nonce to be set of up to 16 bytes. In this case only the last 12 bytes are significant and any additional leading bytes are ignored. It is a requirement of using this cipher that nonce values are unique. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. If an application changes the default nonce length to be longer than 12 bytes and then makes a change to the leading bytes of the nonce expecting the new value to be a new unique nonce then such an application could inadvertently encrypt messages with a reused nonce. Additionally the ignored bytes in a long nonce are not covered by the integrity guarantee of...

CVSS3: 7.4
4%
Низкий
больше 6 лет назад
redhat логотип
CVE-2019-1543

ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a nonce to be set of up to 16 bytes. In this case only the last 12 bytes are significant and any additional leading bytes are ignored. It is a requirement of using this cipher that nonce values are unique. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. If an application changes the default nonce length to be longer than 12 bytes and then makes a change to the leading bytes of the nonce expecting the new value to be a new unique nonce then such an application could inadvertently encrypt messages with a reused nonce. Additionally the ignored bytes in a long nonce are not covered by the integrity guarantee of...

CVSS3: 2.9
4%
Низкий
больше 6 лет назад
nvd логотип
CVE-2019-1543

ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a nonce to be set of up to 16 bytes. In this case only the last 12 bytes are significant and any additional leading bytes are ignored. It is a requirement of using this cipher that nonce values are unique. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. If an application changes the default nonce length to be longer than 12 bytes and then makes a change to the leading bytes of the nonce expecting the new value to be a new unique nonce then such an application could inadvertently encrypt messages with a reused nonce. Additionally the ignored bytes in a long nonce are not covered by the integrity guarantee of th

CVSS3: 7.4
4%
Низкий
больше 6 лет назад
debian логотип
CVE-2019-1543

ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input ...

CVSS3: 7.4
4%
Низкий
больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2018:4050-1

Security update for openssl-1_0_0

больше 6 лет назад

Уязвимостей на страницу