Количество 21
Количество 21

BDU:2016-00661
Уязвимость библиотеки OpenSSL, позволяющая нарушителю расшифровать передаваемые данные

CVE-2016-0800
The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.

CVE-2016-0800
The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.

CVE-2016-0800
The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.
CVE-2016-0800
The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before ...
GHSA-fqw2-3v24-gc79
The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.
ELSA-2016-0302
ELSA-2016-0302: openssl security update (IMPORTANT)
ELSA-2016-0372
ELSA-2016-0372: openssl098e security update (IMPORTANT)
ELSA-2016-0301
ELSA-2016-0301: openssl security update (IMPORTANT)

SUSE-SU-2016:0631-1
Security update for compat-openssl097g

openSUSE-SU-2016:0720-1
Security update for openssl

SUSE-SU-2016:0641-1
Security update for openssl

SUSE-SU-2016:0624-1
Security update for openssl

openSUSE-SU-2016:0628-1
Security update for openssl

SUSE-SU-2016:0621-1
Security update for openssl

SUSE-SU-2016:0620-1
Security update for openssl

SUSE-SU-2016:0617-1
Security update for openssl

SUSE-SU-2016:0748-1
Security update for sles12sp1-docker-image

SUSE-SU-2016:0778-1
Security update for sles11sp4-docker-image

SUSE-SU-2016:0786-1
Security update for sles12-docker-image
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2016-00661 Уязвимость библиотеки OpenSSL, позволяющая нарушителю расшифровать передаваемые данные | CVSS2: 4.3 | 90% Высокий | больше 9 лет назад |
![]() | CVE-2016-0800 The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack. | CVSS3: 5.9 | 90% Высокий | больше 9 лет назад |
![]() | CVE-2016-0800 The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack. | CVSS2: 5.8 | 90% Высокий | больше 9 лет назад |
![]() | CVE-2016-0800 The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack. | CVSS3: 5.9 | 90% Высокий | больше 9 лет назад |
CVE-2016-0800 The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before ... | CVSS3: 5.9 | 90% Высокий | больше 9 лет назад | |
GHSA-fqw2-3v24-gc79 The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack. | CVSS3: 5.9 | 90% Высокий | около 3 лет назад | |
ELSA-2016-0302 ELSA-2016-0302: openssl security update (IMPORTANT) | больше 9 лет назад | |||
ELSA-2016-0372 ELSA-2016-0372: openssl098e security update (IMPORTANT) | больше 9 лет назад | |||
ELSA-2016-0301 ELSA-2016-0301: openssl security update (IMPORTANT) | больше 9 лет назад | |||
![]() | SUSE-SU-2016:0631-1 Security update for compat-openssl097g | больше 9 лет назад | ||
![]() | openSUSE-SU-2016:0720-1 Security update for openssl | больше 9 лет назад | ||
![]() | SUSE-SU-2016:0641-1 Security update for openssl | больше 9 лет назад | ||
![]() | SUSE-SU-2016:0624-1 Security update for openssl | больше 9 лет назад | ||
![]() | openSUSE-SU-2016:0628-1 Security update for openssl | больше 9 лет назад | ||
![]() | SUSE-SU-2016:0621-1 Security update for openssl | больше 9 лет назад | ||
![]() | SUSE-SU-2016:0620-1 Security update for openssl | больше 9 лет назад | ||
![]() | SUSE-SU-2016:0617-1 Security update for openssl | больше 9 лет назад | ||
![]() | SUSE-SU-2016:0748-1 Security update for sles12sp1-docker-image | больше 9 лет назад | ||
![]() | SUSE-SU-2016:0778-1 Security update for sles11sp4-docker-image | больше 9 лет назад | ||
![]() | SUSE-SU-2016:0786-1 Security update for sles12-docker-image | больше 9 лет назад |
Уязвимостей на страницу