Логотип exploitDog
bind:CVE-2014-0160
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2014-0160

Количество 10

Количество 10

ubuntu логотип

CVE-2014-0160

почти 12 лет назад

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

CVSS3: 7.5
EPSS: Критический
redhat логотип

CVE-2014-0160

почти 12 лет назад

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

CVSS2: 5
EPSS: Критический
nvd логотип

CVE-2014-0160

почти 12 лет назад

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

CVSS3: 7.5
EPSS: Критический
debian логотип

CVE-2014-0160

почти 12 лет назад

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1 ...

CVSS3: 7.5
EPSS: Критический
github логотип

GHSA-w8r8-w5w4-4w4v

больше 3 лет назад

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

CVSS3: 7.5
EPSS: Критический
oracle-oval логотип

ELSA-2014-0376

почти 12 лет назад

ELSA-2014-0376: openssl security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2015-09760

почти 12 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации

CVSS2: 5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:1185-1

больше 11 лет назад

Security update for openssl1

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:0546-1

больше 11 лет назад

Security update for openssl1

EPSS: Низкий
suse-cvrf логотип

SUSE-RU-2015:0769-1

больше 11 лет назад

Security update for openssl1

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2014-0160

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

CVSS3: 7.5
94%
Критический
почти 12 лет назад
redhat логотип
CVE-2014-0160

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

CVSS2: 5
94%
Критический
почти 12 лет назад
nvd логотип
CVE-2014-0160

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

CVSS3: 7.5
94%
Критический
почти 12 лет назад
debian логотип
CVE-2014-0160

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1 ...

CVSS3: 7.5
94%
Критический
почти 12 лет назад
github логотип
GHSA-w8r8-w5w4-4w4v

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

CVSS3: 7.5
94%
Критический
больше 3 лет назад
oracle-oval логотип
ELSA-2014-0376

ELSA-2014-0376: openssl security update (IMPORTANT)

почти 12 лет назад
fstec логотип
BDU:2015-09760

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации

CVSS2: 5
почти 12 лет назад
suse-cvrf логотип
SUSE-SU-2015:1185-1

Security update for openssl1

больше 11 лет назад
suse-cvrf логотип
SUSE-SU-2015:0546-1

Security update for openssl1

больше 11 лет назад
suse-cvrf логотип
SUSE-RU-2015:0769-1

Security update for openssl1

больше 11 лет назад

Уязвимостей на страницу