Логотип exploitDog
bind:CVE-2014-0160
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2014-0160

Количество 10

Количество 10

ubuntu логотип

CVE-2014-0160

больше 11 лет назад

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

CVSS3: 7.5
EPSS: Критический
redhat логотип

CVE-2014-0160

больше 11 лет назад

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

CVSS2: 5
EPSS: Критический
nvd логотип

CVE-2014-0160

больше 11 лет назад

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

CVSS3: 7.5
EPSS: Критический
debian логотип

CVE-2014-0160

больше 11 лет назад

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1 ...

CVSS3: 7.5
EPSS: Критический
github логотип

GHSA-w8r8-w5w4-4w4v

больше 3 лет назад

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

CVSS3: 7.5
EPSS: Критический
oracle-oval логотип

ELSA-2014-0376

больше 11 лет назад

ELSA-2014-0376: openssl security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2015-09760

больше 11 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации

CVSS2: 5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:1185-1

почти 11 лет назад

Security update for openssl1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:0546-1

почти 11 лет назад

Security update for openssl1

EPSS: Низкий
suse-cvrf логотип

SUSE-RU-2015:0769-1

почти 11 лет назад

Security update for openssl1

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2014-0160

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

CVSS3: 7.5
94%
Критический
больше 11 лет назад
redhat логотип
CVE-2014-0160

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

CVSS2: 5
94%
Критический
больше 11 лет назад
nvd логотип
CVE-2014-0160

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

CVSS3: 7.5
94%
Критический
больше 11 лет назад
debian логотип
CVE-2014-0160

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1 ...

CVSS3: 7.5
94%
Критический
больше 11 лет назад
github логотип
GHSA-w8r8-w5w4-4w4v

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

CVSS3: 7.5
94%
Критический
больше 3 лет назад
oracle-oval логотип
ELSA-2014-0376

ELSA-2014-0376: openssl security update (IMPORTANT)

больше 11 лет назад
fstec логотип
BDU:2015-09760

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации

CVSS2: 5
больше 11 лет назад
suse-cvrf логотип
SUSE-SU-2015:1185-1

Security update for openssl1

почти 11 лет назад
suse-cvrf логотип
SUSE-SU-2015:0546-1

Security update for openssl1

почти 11 лет назад
suse-cvrf логотип
SUSE-RU-2015:0769-1

Security update for openssl1

почти 11 лет назад

Уязвимостей на страницу