Логотип exploitDog
bind:"CVE-2018-0737" OR bind:"CVE-2018-0732"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2018-0737" OR bind:"CVE-2018-0732"

Количество 49

Количество 49

suse-cvrf логотип

openSUSE-SU-2018:3015-1

около 7 лет назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:2965-1

около 7 лет назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:2545-1

около 7 лет назад

Security update for openssl1

EPSS: Низкий
oracle-oval логотип

ELSA-2018-4249

около 7 лет назад

ELSA-2018-4249: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2018-4248

около 7 лет назад

ELSA-2018-4248: openssl security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:2695-1

около 7 лет назад

Security update for compat-openssl098

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:2683-1

около 7 лет назад

Security update for compat-openssl098

EPSS: Низкий
oracle-oval логотип

ELSA-2018-3221

около 7 лет назад

ELSA-2018-3221: openssl security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1553-1

больше 6 лет назад

Security update for openssl

EPSS: Низкий
ubuntu логотип

CVE-2018-0737

больше 7 лет назад

The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).

CVSS3: 5.9
EPSS: Средний
redhat логотип

CVE-2018-0737

больше 7 лет назад

The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).

CVSS3: 3.3
EPSS: Средний
nvd логотип

CVE-2018-0737

больше 7 лет назад

The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).

CVSS3: 5.9
EPSS: Средний
debian логотип

CVE-2018-0737

больше 7 лет назад

The OpenSSL RSA Key generation algorithm has been shown to be vulnerab ...

CVSS3: 5.9
EPSS: Средний
ubuntu логотип

CVE-2018-0732

больше 7 лет назад

During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).

CVSS3: 7.5
EPSS: Средний
redhat логотип

CVE-2018-0732

больше 7 лет назад

During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).

CVSS3: 4.3
EPSS: Средний
nvd логотип

CVE-2018-0732

больше 7 лет назад

During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2018-0732

больше 7 лет назад

During key agreement in a TLS handshake using a DH(E) based ciphersuit ...

CVSS3: 7.5
EPSS: Средний
suse-cvrf логотип

openSUSE-SU-2019:0152-1

больше 6 лет назад

Security update for openssl-1_1

EPSS: Средний
suse-cvrf логотип

openSUSE-SU-2018:2957-1

около 7 лет назад

Security update for openssl

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2019:0197-1

почти 7 лет назад

Security update for openssl-1_1

EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
openSUSE-SU-2018:3015-1

Security update for openssl-1_0_0

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:2965-1

Security update for openssl-1_0_0

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:2545-1

Security update for openssl1

около 7 лет назад
oracle-oval логотип
ELSA-2018-4249

ELSA-2018-4249: openssl security update (IMPORTANT)

около 7 лет назад
oracle-oval логотип
ELSA-2018-4248

ELSA-2018-4248: openssl security update (IMPORTANT)

около 7 лет назад
suse-cvrf логотип
openSUSE-SU-2018:2695-1

Security update for compat-openssl098

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:2683-1

Security update for compat-openssl098

около 7 лет назад
oracle-oval логотип
ELSA-2018-3221

ELSA-2018-3221: openssl security, bug fix, and enhancement update (MODERATE)

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2019:1553-1

Security update for openssl

больше 6 лет назад
ubuntu логотип
CVE-2018-0737

The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).

CVSS3: 5.9
27%
Средний
больше 7 лет назад
redhat логотип
CVE-2018-0737

The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).

CVSS3: 3.3
27%
Средний
больше 7 лет назад
nvd логотип
CVE-2018-0737

The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).

CVSS3: 5.9
27%
Средний
больше 7 лет назад
debian логотип
CVE-2018-0737

The OpenSSL RSA Key generation algorithm has been shown to be vulnerab ...

CVSS3: 5.9
27%
Средний
больше 7 лет назад
ubuntu логотип
CVE-2018-0732

During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).

CVSS3: 7.5
59%
Средний
больше 7 лет назад
redhat логотип
CVE-2018-0732

During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).

CVSS3: 4.3
59%
Средний
больше 7 лет назад
nvd логотип
CVE-2018-0732

During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).

CVSS3: 7.5
59%
Средний
больше 7 лет назад
debian логотип
CVE-2018-0732

During key agreement in a TLS handshake using a DH(E) based ciphersuit ...

CVSS3: 7.5
59%
Средний
больше 7 лет назад
suse-cvrf логотип
openSUSE-SU-2019:0152-1

Security update for openssl-1_1

27%
Средний
больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2018:2957-1

Security update for openssl

27%
Средний
около 7 лет назад
suse-cvrf логотип
SUSE-SU-2019:0197-1

Security update for openssl-1_1

27%
Средний
почти 7 лет назад

Уязвимостей на страницу