Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ssleay ssleay 0.8.1 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2001-1141
The Pseudo-Random Number Generator (PRNG) in SSLeay and OpenSSL prior to 0.9.6b allows malicious users to use the output of small PRNG requests to determine the internal state information, which could be used by malicious users to predict future pseudo-random numbers.
Openssl Openssl 0.9.1c
Openssl Openssl 0.9.2b
Ssleay Ssleay 0.9
Ssleay Ssleay 0.9.1
Openssl Openssl 0.9.3
Openssl Openssl 0.9.4
Openssl Openssl 0.9.5
Openssl Openssl 0.9.6
Openssl Openssl 0.9.6a
Ssleay Ssleay 0.8.1
5
CVSSv2
CVE-1999-0007
Information from SSL-encrypted sessions via PKCS #1.
C2net Stonghold Web Server 2.0.1
C2net Stonghold Web Server 2.2
C2net Stonghold Web Server 2.3
Hp Open Market Secure Webserver 2.1
Microsoft Exchange Server 5.5
Microsoft Internet Information Server 3.0
Microsoft Internet Information Server 4.0
Microsoft Site Server 3.0
Netscape Certificate Server 1.0
Netscape Collabra Server 3.5.2
Netscape Directory Server 1.3
Netscape Directory Server 3.1
Netscape Directory Server 3.12
Netscape Enterprise Server 2.0
Netscape Enterprise Server 3.0.1b
Netscape Enterprise Server 3.5.1
Netscape Fasttrack Server 3.01b
Netscape Messaging Server 3.54
Netscape Proxy Server 3.5.1
Ssleay Ssleay 0.6.6
Ssleay Ssleay 0.8.1
Ssleay Ssleay 0.9
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started