Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ssleay ssleay 0.9 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2001-1141
The Pseudo-Random Number Generator (PRNG) in SSLeay and OpenSSL prior to 0.9.6b allows malicious users to use the output of small PRNG requests to determine the internal state information, which could be used by malicious users to predict future pseudo-random numbers.
Openssl Openssl 0.9.3
Openssl Openssl 0.9.1c
Openssl Openssl 0.9.6
Openssl Openssl 0.9.6a
Openssl Openssl 0.9.4
Ssleay Ssleay 0.9
Ssleay Ssleay 0.9.1
Ssleay Ssleay 0.8.1
Openssl Openssl 0.9.2b
Openssl Openssl 0.9.5
NA
CVE-1999-0007
Information from SSL-encrypted sessions via PKCS #1.
Microsoft Site Server 3.0
Netscape Directory Server 1.3
Netscape Directory Server 3.1
Ssleay Ssleay 0.6.6
Netscape Certificate Server 1.0
C2net Stonghold Web Server 2.0.1
Netscape Enterprise Server 3.0.1b
Microsoft Internet Information Server 3.0
Netscape Enterprise Server 2.0
Ssleay Ssleay 0.9
C2net Stonghold Web Server 2.3
Netscape Messaging Server 3.54
Netscape Collabra Server 3.5.2
Netscape Directory Server 3.12
Microsoft Internet Information Server 4.0
Netscape Fasttrack Server 3.01b
Ssleay Ssleay 0.8.1
C2net Stonghold Web Server 2.2
Netscape Enterprise Server 3.5.1
Netscape Proxy Server 3.5.1
Microsoft Exchange Server 5.5
Hp Open Market Secure Webserver 2.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started