OpenSSL

OpenSSL

262 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Media report
  • EPSS 0.03%
  • Published 30.09.2025 14:15:41
  • Last modified 02.10.2025 19:12:17

Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write. Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an a...

Media report
  • EPSS 0.02%
  • Published 30.09.2025 14:15:41
  • Last modified 02.10.2025 19:12:17

Issue summary: A timing side-channel which could potentially allow remote recovery of the private key exists in the SM2 algorithm implementation on 64 bit ARM platforms. Impact summary: A timing side-channel in SM2 signature computations on 64 bit A...

Media report
  • EPSS 0.03%
  • Published 30.09.2025 14:15:41
  • Last modified 02.10.2025 19:12:17

Issue summary: An application using the OpenSSL HTTP client API functions may trigger an out-of-bounds read if the 'no_proxy' environment variable is set and the host portion of the authority component of the HTTP URL is an IPv6 address. Impact summ...

  • EPSS 0.02%
  • Published 07.08.2025 21:15:27
  • Last modified 12.08.2025 15:15:29

ruby-jwt v3.0.0.beta1 was discovered to contain weak encryption. NOTE: the Supplier's perspective is "keysize is not something that is enforced by this library. Currently more recent versions of OpenSSL are enforcing some key sizes and those restrict...

  • EPSS 0.06%
  • Published 16.06.2025 00:00:00
  • Last modified 26.06.2025 17:15:30

OpenSSL 3.0.0 through 3.3.2 on the PowerPC architecture is vulnerable to a Minerva attack, exploitable by measuring the time of signing of random messages using the EVP_DigestSign API, and then using the private key to extract the K value (nonce) fro...

  • EPSS 0.04%
  • Published 22.05.2025 13:36:49
  • Last modified 23.05.2025 15:55:02

Issue summary: Use of -addreject option with the openssl x509 application adds a trusted use instead of a rejected use for a certificate. Impact summary: If a user intends to make a trusted certificate rejected for a particular use it will be instea...

  • EPSS 0.3%
  • Published 11.02.2025 16:15:38
  • Last modified 18.02.2025 14:15:27

Issue summary: Clients using RFC7250 Raw Public Keys (RPKs) to authenticate a server may fail to notice that the server was not authenticated, because handshakes don't abort as expected when the SSL_VERIFY_PEER verification mode is set. Impact summa...

  • EPSS 0.09%
  • Published 20.01.2025 14:15:26
  • Last modified 26.05.2025 18:15:19

Issue summary: A timing side-channel which could potentially allow recovering the private key exists in the ECDSA signature computation. Impact summary: A timing side-channel in ECDSA signature computations could allow recovering the private key by ...

  • EPSS 0.13%
  • Published 13.11.2024 11:15:04
  • Last modified 13.11.2024 17:01:16

Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations Impact summary: A use after free can have a range of potential consequences such as the corruption of valid...

  • EPSS 0.65%
  • Published 16.10.2024 17:15:18
  • Last modified 01.09.2025 09:15:34

Issue summary: Use of the low-level GF(2^m) elliptic curve APIs with untrusted explicit values for the field polynomial can lead to out-of-bounds memory reads or writes. Impact summary: Out of bound memory writes can lead to an application crash or ...