Логотип exploitDog
bind:"CVE-2015-3197" OR bind:"CVE-2016-0797" OR bind:"CVE-2016-0800"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2015-3197" OR bind:"CVE-2016-0797" OR bind:"CVE-2016-0800"

Количество 34

Количество 34

fstec логотип

BDU:2016-00896

больше 9 лет назад

Уязвимость библиотеки OpenSSL, позволяющая нарушителю взломать криптографический механизм защиты

CVSS2: 4.3
EPSS: Средний
ubuntu логотип

CVE-2016-0800

больше 9 лет назад

The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.

CVSS3: 5.9
EPSS: Высокий
redhat логотип

CVE-2016-0800

больше 9 лет назад

The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.

CVSS2: 5.8
EPSS: Высокий
nvd логотип

CVE-2016-0800

больше 9 лет назад

The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.

CVSS3: 5.9
EPSS: Высокий
debian логотип

CVE-2016-0800

больше 9 лет назад

The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before ...

CVSS3: 5.9
EPSS: Высокий
ubuntu логотип

CVE-2016-0797

больше 9 лет назад

Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.

CVSS3: 7.5
EPSS: Средний
redhat логотип

CVE-2016-0797

больше 9 лет назад

Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.

CVSS2: 4.3
EPSS: Средний
nvd логотип

CVE-2016-0797

больше 9 лет назад

Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.

CVSS3: 7.5
EPSS: Средний
debian логотип

CVE-2016-0797

больше 9 лет назад

Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 be ...

CVSS3: 7.5
EPSS: Средний
github логотип

GHSA-fqw2-3v24-gc79

около 3 лет назад

The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.

CVSS3: 5.9
EPSS: Высокий
github логотип

GHSA-88pg-cj77-9fxr

около 3 лет назад

Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.

CVSS3: 7.5
EPSS: Средний
fstec логотип

BDU:2016-00661

больше 9 лет назад

Уязвимость библиотеки OpenSSL, позволяющая нарушителю расшифровать передаваемые данные

CVSS2: 4.3
EPSS: Высокий
fstec логотип

BDU:2016-00632

больше 9 лет назад

Уязвимости библиотеки OpenSSL, позволяющие нарушителю вызвать отказ в обслуживании или оказать другое воздействие

CVSS2: 5
EPSS: Средний
suse-cvrf логотип

openSUSE-SU-2016:1566-1

около 9 лет назад

Security update for nodejs

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2016-00896

Уязвимость библиотеки OpenSSL, позволяющая нарушителю взломать криптографический механизм защиты

CVSS2: 4.3
18%
Средний
больше 9 лет назад
ubuntu логотип
CVE-2016-0800

The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.

CVSS3: 5.9
90%
Высокий
больше 9 лет назад
redhat логотип
CVE-2016-0800

The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.

CVSS2: 5.8
90%
Высокий
больше 9 лет назад
nvd логотип
CVE-2016-0800

The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.

CVSS3: 5.9
90%
Высокий
больше 9 лет назад
debian логотип
CVE-2016-0800

The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before ...

CVSS3: 5.9
90%
Высокий
больше 9 лет назад
ubuntu логотип
CVE-2016-0797

Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.

CVSS3: 7.5
31%
Средний
больше 9 лет назад
redhat логотип
CVE-2016-0797

Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.

CVSS2: 4.3
31%
Средний
больше 9 лет назад
nvd логотип
CVE-2016-0797

Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.

CVSS3: 7.5
31%
Средний
больше 9 лет назад
debian логотип
CVE-2016-0797

Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 be ...

CVSS3: 7.5
31%
Средний
больше 9 лет назад
github логотип
GHSA-fqw2-3v24-gc79

The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.

CVSS3: 5.9
90%
Высокий
около 3 лет назад
github логотип
GHSA-88pg-cj77-9fxr

Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.

CVSS3: 7.5
31%
Средний
около 3 лет назад
fstec логотип
BDU:2016-00661

Уязвимость библиотеки OpenSSL, позволяющая нарушителю расшифровать передаваемые данные

CVSS2: 4.3
90%
Высокий
больше 9 лет назад
fstec логотип
BDU:2016-00632

Уязвимости библиотеки OpenSSL, позволяющие нарушителю вызвать отказ в обслуживании или оказать другое воздействие

CVSS2: 5
31%
Средний
больше 9 лет назад
suse-cvrf логотип
openSUSE-SU-2016:1566-1

Security update for nodejs

около 9 лет назад

Уязвимостей на страницу