Max CVSS | 4.3 | Min CVSS | 4.3 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2017-6168 | 4.3 |
On BIG-IP versions 11.6.0-11.6.2 (fixed in 11.6.2 HF1), 12.0.0-12.1.2 HF1 (fixed in 12.1.2 HF2), or 13.0.0-13.0.0 HF2 (fixed in 13.0.0 HF3) a virtual server configured with a Client SSL profile may be vulnerable to an Adaptive Chosen Ciphertext attac
|
23-09-2021 - 15:58 | 17-11-2017 - 19:29 | |
CVE-2017-13098 | 4.3 |
BouncyCastle TLS prior to version 1.0.3, when configured to use the JCE (Java Cryptography Extension) for cryptographic functions, provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can r
|
20-10-2020 - 22:15 | 13-12-2017 - 01:29 | |
CVE-2017-13099 | 4.3 |
wolfSSL prior to version 3.12.2 provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable wolfSSL application. This vulnerability is referred to as
|
09-10-2019 - 23:23 | 13-12-2017 - 01:29 | |
CVE-2018-9194 | 4.3 |
A plaintext recovery of encrypted messages or a Man-in-the-middle (MiTM) attack on RSA PKCS #1 v1.5 encryption may be possible without knowledge of the server's private key. Fortinet FortiOS 5.4.6 to 5.4.9, 6.0.0 and 6.0.1 are vulnerable by such atta
|
03-10-2019 - 00:03 | 05-09-2018 - 13:29 | |
CVE-2018-9192 | 4.3 |
A plaintext recovery of encrypted messages or a Man-in-the-middle (MiTM) attack on RSA PKCS #1 v1.5 encryption may be possible without knowledge of the server's private key. Fortinet FortiOS 5.4.6 to 5.4.9, 6.0.0 and 6.0.1 are vulnerable by such atta
|
03-10-2019 - 00:03 | 05-09-2018 - 13:29 | |
CVE-2017-17382 | 4.3 |
Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway 10.5 before build 67.13, 11.0 before build 71.22, 11.1 before build 56.19, and 12.0 before build 53.22 might allow remote attackers to decrypt TLS ciphertext data by leverag
|
03-10-2019 - 00:03 | 13-12-2017 - 16:29 | |
CVE-2017-17427 | 4.3 |
Radware Alteon devices with a firmware version between 31.0.0.0-31.0.3.0 are vulnerable to an adaptive-chosen ciphertext attack ("Bleichenbacher attack"). This allows an attacker to decrypt observed traffic that has been encrypted with the RSA cipher
|
03-10-2019 - 00:03 | 13-12-2017 - 16:29 | |
CVE-2017-1000385 | 4.3 |
The Erlang otp TLS server answers with different TLS alerts to different error types in the RSA PKCS #1 1.5 padding. This allows an attacker to decrypt content or sign messages with the server's private key (this is a variation of the Bleichenbacher
|
03-10-2019 - 00:03 | 12-12-2017 - 21:29 |