|Max CVSS||5.0||Min CVSS||5.0||Total Count||3|
|ID||CVSS||Summary||Last (major) update||Published|
A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.
|10-09-2018 - 12:29||10-09-2018 - 12:29|
A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL ser
|13-11-2017 - 17:29||13-11-2017 - 17:29|
If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can
|05-05-2017 - 21:29||04-05-2017 - 15:29|