Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openssl openssl 0.9.7 vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2002-0657
Buffer overflow in OpenSSL 0.9.7 prior to 0.9.7-beta3, with Kerberos enabled, allows malicious users to execute arbitrary code via a long master key.
Openssl Openssl 0.9.7
606
VMScore
CVE-2012-2333
Integer underflow in OpenSSL prior to 0.9.8x, 1.0.0 prior to 1.0.0j, and 1.0.1 prior to 1.0.1c, when TLS 1.1, TLS 1.2, or DTLS is used with CBC encryption, allows remote malicious users to cause a denial of service (buffer over-read) or possibly have unspecified other impact via ...
Openssl Openssl 0.9.8m
Openssl Openssl 0.9.8g
Openssl Openssl 0.9.8f
Openssl Openssl 0.9.8p
Openssl Openssl 0.9.8h
Openssl Openssl
Openssl Openssl 0.9.8v
Openssl Openssl 0.9.8q
Openssl Openssl 0.9.8o
Openssl Openssl 0.9.8i
Openssl Openssl 0.9.8j
Openssl Openssl 0.9.7
Openssl Openssl 0.9.7d
Openssl Openssl 0.9.7g
Openssl Openssl 0.9.7j
Openssl Openssl 0.9.6
Openssl Openssl 0.9.6b
Openssl Openssl 0.9.6e
Redhat Openssl 0.9.6-15
Openssl Openssl 0.9.8u
Openssl Openssl 0.9.8t
Openssl Openssl 0.9.8s
605
VMScore
CVE-2007-5135
Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote malicious users to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow. NOTE: this issue was introduced as a result ...
Openssl Openssl 0.9.7
Openssl Openssl 0.9.7g
Openssl Openssl 0.9.7h
Openssl Openssl 0.9.8c
Openssl Openssl 0.9.8d
Openssl Openssl 0.9.7a
Openssl Openssl 0.9.7b
Openssl Openssl 0.9.7i
Openssl Openssl 0.9.7j
Openssl Openssl 0.9.8e
Openssl Openssl 0.9.7l
Openssl Openssl 0.9.7e
Openssl Openssl 0.9.7f
Openssl Openssl 0.9.8a
Openssl Openssl 0.9.8b
Openssl Openssl 0.9.7c
Openssl Openssl 0.9.7d
Openssl Openssl 0.9.7k
Openssl Openssl 0.9.8
Openssl Openssl 0.9.8f
516
VMScore
CVE-2011-4354
crypto/bn/bn_nist.c in OpenSSL prior to 0.9.8h on 32-bit platforms, as used in stunnel and other products, in certain circumstances involving ECDH or ECDHE cipher suites, uses an incorrect modular reduction algorithm in its implementation of the P-256 and P-384 NIST elliptic curv...
Openssl Openssl 0.9.8
Openssl Openssl 0.9.8a
Openssl Openssl 0.9.2b
Openssl Openssl 0.9.3
Openssl Openssl 0.9.5a
Openssl Openssl 0.9.6
Openssl Openssl 0.9.6g
Openssl Openssl 0.9.6d
Openssl Openssl 0.9.6k
Openssl Openssl 0.9.7
Openssl Openssl 0.9.7m
Openssl Openssl 0.9.7c
Openssl Openssl 0.9.7h
Openssl Openssl 0.9.8b
Openssl Openssl 0.9.8c
Openssl Openssl 0.9.3a
Openssl Openssl 0.9.4
Openssl Openssl 0.9.6a
Openssl Openssl 0.9.6f
Openssl Openssl 0.9.8f
Openssl Openssl 0.9.1c
Openssl Openssl 0.9.5
516
VMScore
CVE-2008-5077
OpenSSL 0.9.8i and previous versions does not properly check the return value from the EVP_VerifyFinal function, which allows remote malicious users to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys.
Openssl Openssl 0.9.8e
Openssl Openssl 0.9.8c
Openssl Openssl 0.9.7k
Openssl Openssl 0.9.7a
Openssl Openssl 0.9.7f
Openssl Openssl 0.9.7g
Openssl Openssl 0.9.7j
Openssl Openssl 0.9.7
Openssl Openssl 0.9.8b
Openssl Openssl 0.9.8d
Openssl Openssl 0.9.7d
Openssl Openssl 0.9.7e
Openssl Openssl 0.9.6m
Openssl Openssl 0.9.6l
Openssl Openssl 0.9.6e
Openssl Openssl 0.9.6d
Openssl Openssl 0.9.6a
Openssl Openssl 0.9.6
Openssl Openssl 0.9.3a
Openssl Openssl 0.9.4
Openssl Openssl 0.9.7l
Openssl Openssl 0.9.8
505
VMScore
CVE-2003-0543
Integer overflow in OpenSSL 0.9.6 and 0.9.7 allows remote malicious users to cause a denial of service (crash) via an SSL client certificate with certain ASN.1 tag values.
Openssl Openssl 0.9.6
Openssl Openssl 0.9.7
1 EDB exploit
505
VMScore
CVE-2003-0078
ssl3_get_record in s3_pkt.c for OpenSSL prior to 0.9.7a and 0.9.6 prior to 0.9.6i does not perform a MAC computation if an incorrect block cipher padding is used, which causes an information leak (timing discrepancy) that may make it easier to launch cryptographic attacks that re...
Openssl Openssl 0.9.7
Openssl Openssl 0.9.6i
Openssl Openssl
Openbsd Openbsd 3.1
Freebsd Freebsd 4.5
Freebsd Freebsd 4.7
Freebsd Freebsd 4.4
Openbsd Openbsd 3.2
Freebsd Freebsd 4.2
Freebsd Freebsd 4.6
Freebsd Freebsd 4.3
Freebsd Freebsd 5.0
1 EDB exploit
505
VMScore
CVE-2002-0659
The ASN1 library in OpenSSL 0.9.6d and previous versions, and 0.9.7-beta2 and previous versions, allows remote malicious users to cause a denial of service via invalid encodings.
Openssl Openssl 0.9.1c
Openssl Openssl 0.9.2b
Openssl Openssl 0.9.3
Oracle Application Server 1.0.2.1s
Oracle Application Server 1.0.2.2
Oracle Corporate Time Outlook Connector 3.1
Oracle Corporate Time Outlook Connector 3.1.1
Openssl Openssl 0.9.6a
Openssl Openssl 0.9.6b
Openssl Openssl 0.9.6c
Openssl Openssl 0.9.6d
Openssl Openssl 0.9.4
Openssl Openssl 0.9.5a
Openssl Openssl 0.9.7
Oracle Application Server 1.0.2
Oracle Corporate Time Outlook Connector 3.1.2
Oracle Http Server 9.0.1
Openssl Openssl 0.9.5
Openssl Openssl 0.9.6
Oracle Application Server
Oracle Corporate Time Outlook Connector 3.3
Oracle Http Server 9.2.0
1 EDB exploit
454
VMScore
CVE-2005-1797
The design of Advanced Encryption Standard (AES), aka Rijndael, allows remote malicious users to recover AES keys via timing attacks on S-box lookups, which are difficult to perform in constant time in AES implementations.
Openssl Openssl 0.9.1c
Openssl Openssl 0.9.2b
Openssl Openssl 0.9.3
Openssl Openssl 0.9.4
Openssl Openssl 0.9.6j
Openssl Openssl 0.9.6k
Openssl Openssl 0.9.6l
Openssl Openssl 0.9.6m
Openssl Openssl 0.9.7
Openssl Openssl 0.9.6b
Openssl Openssl 0.9.6c
Openssl Openssl 0.9.6d
Openssl Openssl 0.9.6e
Openssl Openssl 0.9.7b
Openssl Openssl 0.9.7c
Openssl Openssl 0.9.7d
Openssl Openssl 0.9.5a
Openssl Openssl 0.9.6a
Openssl Openssl 0.9.6f
Openssl Openssl 0.9.6h
Openssl Openssl 0.9.5
Openssl Openssl 0.9.6
446
VMScore
CVE-2012-0884
The implementation of Cryptographic Message Syntax (CMS) and PKCS #7 in OpenSSL prior to 0.9.8u and 1.x prior to 1.0.0h does not properly restrict certain oracle behavior, which makes it easier for context-dependent malicious users to decrypt data via a Million Message Attack (MM...
Openssl Openssl 1.0.0c
Openssl Openssl 1.0.0b
Openssl Openssl 1.0.0a
Openssl Openssl 0.9.8o
Openssl Openssl 0.9.8n
Openssl Openssl 0.9.8g
Openssl Openssl 0.9.8f
Openssl Openssl 0.9.7l
Openssl Openssl 0.9.7m
Openssl Openssl 0.9.7d
Openssl Openssl 0.9.7c
Openssl Openssl 0.9.6k
Openssl Openssl 0.9.6j
Openssl Openssl 0.9.6
Openssl Openssl 1.0.0e
Openssl Openssl 1.0.0d
Openssl Openssl 0.9.8q
Openssl Openssl 0.9.8p
Openssl Openssl 0.9.8i
Openssl Openssl 0.9.8h
Openssl Openssl 0.9.8a
Openssl Openssl 0.9.8
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »