Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ssleay ssleay 0.8.1 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2001-1141
The Pseudo-Random Number Generator (PRNG) in SSLeay and OpenSSL prior to 0.9.6b allows malicious users to use the output of small PRNG requests to determine the internal state information, which could be used by malicious users to predict future pseudo-random numbers.
Openssl Openssl 0.9.1c
Openssl Openssl 0.9.2b
Ssleay Ssleay 0.9
Ssleay Ssleay 0.9.1
Openssl Openssl 0.9.3
Openssl Openssl 0.9.4
Openssl Openssl 0.9.5
Openssl Openssl 0.9.6
Openssl Openssl 0.9.6a
Ssleay Ssleay 0.8.1
446
VMScore
CVE-1999-0007
Information from SSL-encrypted sessions via PKCS #1.
C2net Stonghold Web Server 2.0.1
C2net Stonghold Web Server 2.2
C2net Stonghold Web Server 2.3
Hp Open Market Secure Webserver 2.1
Microsoft Exchange Server 5.5
Microsoft Internet Information Server 3.0
Microsoft Internet Information Server 4.0
Microsoft Site Server 3.0
Netscape Certificate Server 1.0
Netscape Collabra Server 3.5.2
Netscape Directory Server 1.3
Netscape Directory Server 3.1
Netscape Directory Server 3.12
Netscape Enterprise Server 2.0
Netscape Enterprise Server 3.0.1b
Netscape Enterprise Server 3.5.1
Netscape Fasttrack Server 3.01b
Netscape Messaging Server 3.54
Netscape Proxy Server 3.5.1
Ssleay Ssleay 0.6.6
Ssleay Ssleay 0.8.1
Ssleay Ssleay 0.9
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32886
insecure direct object reference
CVE-2024-34342
file inclusion
CVE-2024-34562
CVE-2024-34347
CVE-2024-26026
CVE-2024-4647
unprivileged
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started