- EPSS 2.31%
- Published 22.09.2011 10:55:03
- Last modified 11.04.2025 00:51:21
crypto/x509/x509_vfy.c in OpenSSL 1.0.x before 1.0.0e does not initialize certain structure members, which makes it easier for remote attackers to bypass CRL validation by using a nextUpdate value corresponding to a time in the past.
- EPSS 7.21%
- Published 22.09.2011 10:55:03
- Last modified 11.04.2025 00:51:21
The ephemeral ECDH ciphersuite functionality in OpenSSL 0.9.8 through 0.9.8r and 1.0.x before 1.0.0e does not ensure thread safety during processing of handshake messages from clients, which allows remote attackers to cause a denial of service (daemo...
CVE-2011-1945
- EPSS 4.85%
- Published 31.05.2011 20:55:05
- Last modified 11.04.2025 00:51:21
The elliptic curve cryptography (ECC) subsystem in OpenSSL 1.0.0d and earlier, when the Elliptic Curve Digital Signature Algorithm (ECDSA) is used for the ECDHE_ECDSA cipher suite, does not properly implement curves over binary fields, which makes it...
- EPSS 1.85%
- Published 19.02.2011 01:00:01
- Last modified 11.04.2025 00:51:21
ssl/t1_lib.c in OpenSSL 0.9.8h through 0.9.8q and 1.0.0 through 1.0.0c allows remote attackers to cause a denial of service (crash), and possibly obtain sensitive information in applications that use OpenSSL, via a malformed ClientHello handshake mes...
CVE-2008-7270
- EPSS 2%
- Published 06.12.2010 22:30:31
- Last modified 11.04.2025 00:51:21
OpenSSL before 0.9.8j, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the use of a disabled cipher via vectors involving sniffing ...
CVE-2010-4252
- EPSS 1.64%
- Published 06.12.2010 21:05:49
- Last modified 11.04.2025 00:51:21
OpenSSL before 1.0.0c, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending cra...
CVE-2010-4180
- EPSS 5.99%
- Published 06.12.2010 21:05:48
- Last modified 11.04.2025 00:51:21
OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an uninte...
CVE-2010-3864
- EPSS 7.36%
- Published 17.11.2010 16:00:01
- Last modified 11.04.2025 00:51:21
Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi-threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers ...
CVE-2010-2939
- EPSS 10.27%
- Published 17.08.2010 20:00:03
- Last modified 11.04.2025 00:51:21
Double free vulnerability in the ssl3_get_key_exchange function in the OpenSSL client (ssl/s3_clnt.c) in OpenSSL 1.0.0a, 0.9.8, 0.9.7, and possibly other versions, when using ECDH, allows context-dependent attackers to cause a denial of service (cras...
CVE-2010-0742
- EPSS 23.02%
- Published 03.06.2010 14:30:01
- Last modified 11.04.2025 00:51:21
The Cryptographic Message Syntax (CMS) implementation in crypto/cms/cms_asn1.c in OpenSSL before 0.9.8o and 1.x before 1.0.0a does not properly handle structures that contain OriginatorInfo, which allows context-dependent attackers to modify invalid ...