Логотип exploitDog
product: "node.js"
Консоль
Логотип exploitDog

exploitDog

product: "node.js"

Количество 1 065

Количество 1 065

suse-cvrf логотип

SUSE-SU-2021:0955-2

больше 3 лет назад

Security update for openssl-1_1

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2021:0955-1

почти 5 лет назад

Security update for openssl-1_1

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2021:0954-1

почти 5 лет назад

Security update for openssl-1_1

EPSS: Средний
github логотип

GHSA-83mx-573x-5rw9

больше 4 лет назад

openssl-src NULL pointer Dereference in signature_algorithms processing

CVSS3: 5.9
EPSS: Средний
ubuntu логотип

CVE-2021-3449

почти 5 лет назад

An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).

CVSS3: 5.9
EPSS: Средний
redhat логотип

CVE-2021-3449

почти 5 лет назад

An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).

CVSS3: 5.9
EPSS: Средний
nvd логотип

CVE-2021-3449

почти 5 лет назад

An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).

CVSS3: 5.9
EPSS: Средний
debian логотип

CVE-2021-3449

почти 5 лет назад

An OpenSSL TLS server may crash if sent a maliciously crafted renegoti ...

CVSS3: 5.9
EPSS: Средний
fstec логотип

BDU:2019-00186

больше 7 лет назад

Уязвимость библиотеки OpenSSL, связанная с ошибками обработки криптографических ключей при использовании протокола DH (E), позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Высокий
suse-cvrf логотип

openSUSE-SU-2019:1637-1

больше 6 лет назад

Security update for compat-openssl098

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1432-1

больше 6 лет назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1175-1

почти 7 лет назад

Security update for openssl

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1105-1

почти 7 лет назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1608-1

больше 6 лет назад

Security update for compat-openssl098

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:14092-1

больше 6 лет назад

Security update for openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:14091-1

больше 6 лет назад

Security update for openssl1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1362-1

больше 6 лет назад

Security update for openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:0803-1

почти 7 лет назад

Security update for openssl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:0600-1

почти 7 лет назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:0572-1

почти 7 лет назад

Security update for openssl-1_0_0

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2021:0955-2

Security update for openssl-1_1

11%
Средний
больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2021:0955-1

Security update for openssl-1_1

11%
Средний
почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2021:0954-1

Security update for openssl-1_1

11%
Средний
почти 5 лет назад
github логотип
GHSA-83mx-573x-5rw9

openssl-src NULL pointer Dereference in signature_algorithms processing

CVSS3: 5.9
11%
Средний
больше 4 лет назад
ubuntu логотип
CVE-2021-3449

An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).

CVSS3: 5.9
11%
Средний
почти 5 лет назад
redhat логотип
CVE-2021-3449

An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).

CVSS3: 5.9
11%
Средний
почти 5 лет назад
nvd логотип
CVE-2021-3449

An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).

CVSS3: 5.9
11%
Средний
почти 5 лет назад
debian логотип
CVE-2021-3449

An OpenSSL TLS server may crash if sent a maliciously crafted renegoti ...

CVSS3: 5.9
11%
Средний
почти 5 лет назад
fstec логотип
BDU:2019-00186

Уязвимость библиотеки OpenSSL, связанная с ошибками обработки криптографических ключей при использовании протокола DH (E), позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
81%
Высокий
больше 7 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1637-1

Security update for compat-openssl098

5%
Низкий
больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1432-1

Security update for openssl-1_0_0

5%
Низкий
больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1175-1

Security update for openssl

5%
Низкий
почти 7 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1105-1

Security update for openssl-1_0_0

5%
Низкий
почти 7 лет назад
suse-cvrf логотип
SUSE-SU-2019:1608-1

Security update for compat-openssl098

5%
Низкий
больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:14092-1

Security update for openssl

5%
Низкий
больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:14091-1

Security update for openssl1

5%
Низкий
больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1362-1

Security update for openssl

5%
Низкий
больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:0803-1

Security update for openssl

5%
Низкий
почти 7 лет назад
suse-cvrf логотип
SUSE-SU-2019:0600-1

Security update for openssl-1_0_0

5%
Низкий
почти 7 лет назад
suse-cvrf логотип
SUSE-SU-2019:0572-1

Security update for openssl-1_0_0

5%
Низкий
почти 7 лет назад

Уязвимостей на страницу