Page 16 of 79 results (0.008 seconds)

CVSS: 7.5EPSS: 78%CPEs: 34EXPL: 1

Buffer overflows in OpenSSL 0.9.6d and earlier, and 0.9.7-beta2 and earlier, allow remote attackers to execute arbitrary code via (1) a large client master key in SSL2 or (2) a large session ID in SSL3. Desbordamiento de búfer en OpenSSL 0.9.6d y anteriores, y 0.9.7-beta2 y anteriores, permite a atacantes remotos ejecutar código arbitrario mediante una clave maestra de cliente larga en SSL2 o un ID de sesión largo en SSL3 • https://www.exploit-db.com/exploits/40347 ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-033.0.txt ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-033.1.txt ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:33.openssl.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000513 http://www.cert.org/advisories/CA-2002-23.html http://www.iss.net/security_center/static/9714.php http://www.iss.net/security_center/static/9716.php •

CVSS: 5.0EPSS: 0%CPEs: 10EXPL: 0

The Pseudo-Random Number Generator (PRNG) in SSLeay and OpenSSL before 0.9.6b allows attackers to use the output of small PRNG requests to determine the internal state information, which could be used by attackers to predict future pseudo-random numbers. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-013.txt.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000418 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-065.php3?dis=8.0 http://www.linuxsecurity.com/advisories/other_advisory-1483.html http://www.osvdb.org/853 http://www.redhat.com/support/errata/RHSA-2001-051.html http://www.securityfocus.com/advisories/3475 http://www.securityfocus.com/archive/1/195829 http://www.securityfo •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

OpenSSL 0.9.4 and OpenSSH for FreeBSD do not properly check for the existence of the /dev/random or /dev/urandom devices, which are absent on FreeBSD Alpha systems, which causes them to produce weak keys which may be more easily broken. • http://archives.neohapsis.com/archives/freebsd/2000-06/0083.html http://www.securityfocus.com/bid/1340 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls. • http://www.osvdb.org/3936 • CWE-384: Session Fixation •