Логотип exploitDog
bind:"CVE-2018-0737" OR bind:"CVE-2018-0732"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2018-0737" OR bind:"CVE-2018-0732"

Количество 49

Количество 49

suse-cvrf логотип

openSUSE-SU-2018:3015-1

больше 6 лет назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:2965-1

больше 6 лет назад

Security update for openssl-1_0_0

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:2545-1

почти 7 лет назад

Security update for openssl1

EPSS: Низкий
oracle-oval логотип

ELSA-2018-4249

больше 6 лет назад

ELSA-2018-4249: openssl security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2018-4248

больше 6 лет назад

ELSA-2018-4248: openssl security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:2695-1

почти 7 лет назад

Security update for compat-openssl098

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:2683-1

почти 7 лет назад

Security update for compat-openssl098

EPSS: Низкий
oracle-oval логотип

ELSA-2018-3221

больше 6 лет назад

ELSA-2018-3221: openssl security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1553-1

около 6 лет назад

Security update for openssl

EPSS: Низкий
ubuntu логотип

CVE-2018-0737

около 7 лет назад

The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).

CVSS3: 5.9
EPSS: Средний
redhat логотип

CVE-2018-0737

около 7 лет назад

The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).

CVSS3: 3.3
EPSS: Средний
nvd логотип

CVE-2018-0737

около 7 лет назад

The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).

CVSS3: 5.9
EPSS: Средний
debian логотип

CVE-2018-0737

около 7 лет назад

The OpenSSL RSA Key generation algorithm has been shown to be vulnerab ...

CVSS3: 5.9
EPSS: Средний
ubuntu логотип

CVE-2018-0732

около 7 лет назад

During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).

CVSS3: 7.5
EPSS: Высокий
redhat логотип

CVE-2018-0732

около 7 лет назад

During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).

CVSS3: 4.3
EPSS: Высокий
nvd логотип

CVE-2018-0732

около 7 лет назад

During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).

CVSS3: 7.5
EPSS: Высокий
debian логотип

CVE-2018-0732

около 7 лет назад

During key agreement in a TLS handshake using a DH(E) based ciphersuit ...

CVSS3: 7.5
EPSS: Высокий
suse-cvrf логотип

openSUSE-SU-2019:0152-1

около 6 лет назад

Security update for openssl-1_1

EPSS: Средний
suse-cvrf логотип

openSUSE-SU-2018:2957-1

больше 6 лет назад

Security update for openssl

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2019:0197-1

больше 6 лет назад

Security update for openssl-1_1

EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
openSUSE-SU-2018:3015-1

Security update for openssl-1_0_0

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2018:2965-1

Security update for openssl-1_0_0

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2018:2545-1

Security update for openssl1

почти 7 лет назад
oracle-oval логотип
ELSA-2018-4249

ELSA-2018-4249: openssl security update (IMPORTANT)

больше 6 лет назад
oracle-oval логотип
ELSA-2018-4248

ELSA-2018-4248: openssl security update (IMPORTANT)

больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2018:2695-1

Security update for compat-openssl098

почти 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:2683-1

Security update for compat-openssl098

почти 7 лет назад
oracle-oval логотип
ELSA-2018-3221

ELSA-2018-3221: openssl security, bug fix, and enhancement update (MODERATE)

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1553-1

Security update for openssl

около 6 лет назад
ubuntu логотип
CVE-2018-0737

The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).

CVSS3: 5.9
28%
Средний
около 7 лет назад
redhat логотип
CVE-2018-0737

The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).

CVSS3: 3.3
28%
Средний
около 7 лет назад
nvd логотип
CVE-2018-0737

The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o).

CVSS3: 5.9
28%
Средний
около 7 лет назад
debian логотип
CVE-2018-0737

The OpenSSL RSA Key generation algorithm has been shown to be vulnerab ...

CVSS3: 5.9
28%
Средний
около 7 лет назад
ubuntu логотип
CVE-2018-0732

During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).

CVSS3: 7.5
81%
Высокий
около 7 лет назад
redhat логотип
CVE-2018-0732

During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).

CVSS3: 4.3
81%
Высокий
около 7 лет назад
nvd логотип
CVE-2018-0732

During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).

CVSS3: 7.5
81%
Высокий
около 7 лет назад
debian логотип
CVE-2018-0732

During key agreement in a TLS handshake using a DH(E) based ciphersuit ...

CVSS3: 7.5
81%
Высокий
около 7 лет назад
suse-cvrf логотип
openSUSE-SU-2019:0152-1

Security update for openssl-1_1

28%
Средний
около 6 лет назад
suse-cvrf логотип
openSUSE-SU-2018:2957-1

Security update for openssl

28%
Средний
больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:0197-1

Security update for openssl-1_1

28%
Средний
больше 6 лет назад

Уязвимостей на страницу