Search for packages
Package details: pkg:openssl/openssl@0.9.8v
purl pkg:openssl/openssl@0.9.8v
Next non-vulnerable version 0.9.8zh
Latest non-vulnerable version 3.0.7
Risk 10.0
Vulnerabilities affecting this package (36)
Vulnerability Summary Fixed by
VCID-1h5d-fnug-aaac
Aliases:
CVE-2014-3470
VC-OPENSSL-20140530-CVE-2014-3470
OpenSSL TLS clients enabling anonymous ECDH ciphersuites are subject to a denial of service attack.
0.9.8za
Affected by 25 other vulnerabilities.
1.0.0m
Affected by 30 other vulnerabilities.
1.0.1h
Affected by 59 other vulnerabilities.
VCID-1pke-t171-aaas
Aliases:
CVE-2015-0287
VC-OPENSSL-20150319-CVE-2015-0287
ASN.1 structure reuse memory corruption. Reusing a structure in ASN.1 parsing may allow an attacker to cause memory corruption via an invalid write. Such reuse is and has been strongly discouraged and is believed to be rare.
0.9.8zf
Affected by 5 other vulnerabilities.
1.0.0r
Affected by 6 other vulnerabilities.
1.0.1m
Affected by 31 other vulnerabilities.
1.0.2a
Affected by 59 other vulnerabilities.
VCID-1t6y-1zjy-aaae
Aliases:
CVE-2016-0704
VC-OPENSSL-20160301-CVE-2016-0704
This issue only affected versions of OpenSSL prior to March 19th 2015 at which time the code was refactored to address the vulnerability CVE-2015-0293. s2_srvr.c overwrite the wrong bytes in the master-key when applying Bleichenbacher protection for export cipher suites. This provides a Bleichenbacher oracle, and could potentially allow more efficient variants of the DROWN attack.
0.9.8zf
Affected by 5 other vulnerabilities.
1.0.0r
Affected by 6 other vulnerabilities.
1.0.1m
Affected by 31 other vulnerabilities.
1.0.2a
Affected by 59 other vulnerabilities.
VCID-3d3c-x2ux-aaaa
Aliases:
CVE-2015-3195
VC-OPENSSL-20151203-CVE-2015-3195
When presented with a malformed X509_ATTRIBUTE structure OpenSSL will leak memory. This structure is used by the PKCS#7 and CMS routines so any application which reads PKCS#7 or CMS data from untrusted sources is affected. SSL/TLS is not affected.
0.9.8zh
Affected by 0 other vulnerabilities.
1.0.0t
Affected by 0 other vulnerabilities.
1.0.1q
Affected by 22 other vulnerabilities.
1.0.2e
Affected by 50 other vulnerabilities.
VCID-5g8u-a3pe-aaan
Aliases:
CVE-2014-8275
VC-OPENSSL-20150105-CVE-2014-8275
OpenSSL accepts several non-DER-variations of certificate signature algorithm and signature encodings. OpenSSL also does not enforce a match between the signature algorithm between the signed and unsigned portions of the certificate. By modifying the contents of the signature algorithm or the encoding of the signature, it is possible to change the certificate's fingerprint. This does not allow an attacker to forge certificates, and does not affect certificate verification or OpenSSL servers/clients in any other way. It also does not affect common revocation mechanisms. Only custom applications that rely on the uniqueness of the fingerprint (e.g. certificate blacklists) may be affected.
0.9.8zd
Affected by 13 other vulnerabilities.
1.0.0p
Affected by 14 other vulnerabilities.
1.0.1k
Affected by 39 other vulnerabilities.
VCID-69ax-cbdq-aaam
Aliases:
CVE-2015-1791
VC-OPENSSL-20150602-CVE-2015-1791
If a NewSessionTicket is received by a multi-threaded client when attempting to reuse a previous ticket then a race condition can occur potentially leading to a double free of the ticket data.
0.9.8zg
Affected by 1 other vulnerability.
1.0.0s
Affected by 2 other vulnerabilities.
1.0.1n
Affected by 27 other vulnerabilities.
1.0.2b
Affected by 57 other vulnerabilities.
VCID-6xd4-wjkk-aaak
Aliases:
CVE-2014-0224
VC-OPENSSL-20140605-CVE-2014-0224
An attacker can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server.
0.9.8za
Affected by 25 other vulnerabilities.
1.0.0m
Affected by 30 other vulnerabilities.
1.0.1h
Affected by 59 other vulnerabilities.
VCID-75pz-sunt-aaaa
Aliases:
CVE-2015-0209
VC-OPENSSL-20150319-CVE-2015-0209
Use After Free following d2i_ECPrivatekey error. A malformed EC private key file consumed via the d2i_ECPrivateKey function could cause a use after free condition. This, in turn, could cause a double free in several private key parsing functions (such as d2i_PrivateKey or EVP_PKCS82PKEY) and could lead to a DoS attack or memory corruption for applications that receive EC private keys from untrusted sources. This scenario is considered rare.
0.9.8zf
Affected by 5 other vulnerabilities.
1.0.0r
Affected by 6 other vulnerabilities.
1.0.1m
Affected by 31 other vulnerabilities.
1.0.2a
Affected by 59 other vulnerabilities.
VCID-77pn-m7ra-aaap
Aliases:
CVE-2014-3505
VC-OPENSSL-20140806-CVE-2014-3505
A Double Free was found when processing DTLS packets. An attacker can force an error condition which causes openssl to crash whilst processing DTLS packets due to memory being freed twice. This could lead to a Denial of Service attack.
0.9.8zb
Affected by 20 other vulnerabilities.
1.0.0n
Affected by 24 other vulnerabilities.
1.0.1i
Affected by 50 other vulnerabilities.
VCID-88dn-xmg2-aaab
Aliases:
CVE-2014-0195
VC-OPENSSL-20140605-CVE-2014-0195
A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server. Only applications using OpenSSL as a DTLS client or server affected.
0.9.8za
Affected by 25 other vulnerabilities.
1.0.0m
Affected by 30 other vulnerabilities.
1.0.1h
Affected by 59 other vulnerabilities.
VCID-8c1z-2ue1-aaaj
Aliases:
CVE-2013-0169
VC-OPENSSL-20130204-CVE-2013-0169
A weakness in the handling of CBC ciphersuites in SSL, TLS and DTLS which could lead to plaintext recovery by exploiting timing differences arising during MAC processing.
0.9.8y
Affected by 32 other vulnerabilities.
1.0.0k
Affected by 40 other vulnerabilities.
1.0.1d
Affected by 72 other vulnerabilities.
VCID-8xeh-vwwg-aaak
Aliases:
CVE-2014-3508
VC-OPENSSL-20140806-CVE-2014-3508
A flaw in OBJ_obj2txt may cause pretty printing functions such as X509_name_oneline, X509_name_print_ex, to leak some information from the stack. Applications may be affected if they echo pretty printing output to the attacker. OpenSSL SSL/TLS clients and servers themselves are not affected.
0.9.8zb
Affected by 20 other vulnerabilities.
1.0.0n
Affected by 24 other vulnerabilities.
1.0.1i
Affected by 50 other vulnerabilities.
VCID-9few-spp9-aaag
Aliases:
CVE-2015-0293
VC-OPENSSL-20150319-CVE-2015-0293
DoS via reachable assert in SSLv2 servers. A malicious client can trigger an OPENSSL_assert in servers that both support SSLv2 and enable export cipher suites by sending a specially crafted SSLv2 CLIENT-MASTER-KEY message.
0.9.8zf
Affected by 5 other vulnerabilities.
1.0.0r
Affected by 6 other vulnerabilities.
1.0.1m
Affected by 31 other vulnerabilities.
1.0.2a
Affected by 59 other vulnerabilities.
VCID-amba-4zuy-aaap
Aliases:
CVE-2014-3571
VC-OPENSSL-20150105-CVE-2014-3571
A carefully crafted DTLS message can cause a segmentation fault in OpenSSL due to a NULL pointer dereference. This could lead to a Denial Of Service attack.
0.9.8zd
Affected by 13 other vulnerabilities.
1.0.0p
Affected by 14 other vulnerabilities.
1.0.1k
Affected by 39 other vulnerabilities.
VCID-arc3-rhts-aaar
Aliases:
CVE-2015-1792
VC-OPENSSL-20150611-CVE-2015-1792
When verifying a signedData message the CMS code can enter an infinite loop if presented with an unknown hash function OID. This can be used to perform denial of service against any system which verifies signedData messages using the CMS code.
0.9.8zg
Affected by 1 other vulnerability.
1.0.0s
Affected by 2 other vulnerabilities.
1.0.1n
Affected by 27 other vulnerabilities.
1.0.2b
Affected by 57 other vulnerabilities.
VCID-bsap-s527-aaaj
Aliases:
CVE-2015-0289
VC-OPENSSL-20150319-CVE-2015-0289
PKCS#7 NULL pointer dereference. The PKCS#7 parsing code does not handle missing outer ContentInfo correctly. An attacker can craft malformed ASN.1-encoded PKCS#7 blobs with missing content and trigger a NULL pointer dereference on parsing. Applications that verify PKCS#7 signatures, decrypt PKCS#7 data or otherwise parse PKCS#7 structures from untrusted sources are affected. OpenSSL clients and servers are not affected.
0.9.8zf
Affected by 5 other vulnerabilities.
1.0.0r
Affected by 6 other vulnerabilities.
1.0.1m
Affected by 31 other vulnerabilities.
1.0.2a
Affected by 59 other vulnerabilities.
VCID-ch34-h9ey-aaam
Aliases:
CVE-2014-0221
VC-OPENSSL-20140605-CVE-2014-0221
By sending an invalid DTLS handshake to an OpenSSL DTLS client the code can be made to recurse eventually crashing in a DoS attack. Only applications using OpenSSL as a DTLS client are affected.
0.9.8za
Affected by 25 other vulnerabilities.
1.0.0m
Affected by 30 other vulnerabilities.
1.0.1h
Affected by 59 other vulnerabilities.
VCID-dhsz-kcke-aaan
Aliases:
CVE-2014-3572
VC-OPENSSL-20150105-CVE-2014-3572
An OpenSSL client will accept a handshake using an ephemeral ECDH ciphersuite using an ECDSA certificate if the server key exchange message is omitted. This effectively removes forward secrecy from the ciphersuite.
0.9.8zd
Affected by 13 other vulnerabilities.
1.0.0p
Affected by 14 other vulnerabilities.
1.0.1k
Affected by 39 other vulnerabilities.
VCID-e7ep-2kks-aaad
Aliases:
CVE-2014-0076
VC-OPENSSL-20140214-CVE-2014-0076
Fix for the attack described in the paper "Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
0.9.8za
Affected by 25 other vulnerabilities.
1.0.0m
Affected by 30 other vulnerabilities.
1.0.1g
Affected by 67 other vulnerabilities.
VCID-ftte-av19-aaad
Aliases:
CVE-2016-0703
VC-OPENSSL-20160301-CVE-2016-0703
This issue only affected versions of OpenSSL prior to March 19th 2015 at which time the code was refactored to address vulnerability CVE-2015-0293. s2_srvr.c did not enforce that clear-key-length is 0 for non-export ciphers. If clear-key bytes are present for these ciphers, they *displace* encrypted-key bytes. This leads to an efficient divide-and-conquer key recovery attack: if an eavesdropper has intercepted an SSLv2 handshake, they can use the server as an oracle to determine the SSLv2 master-key, using only 16 connections to the server and negligible computation. More importantly, this leads to a more efficient version of DROWN that is effective against non-export ciphersuites, and requires no significant computation.
0.9.8zf
Affected by 5 other vulnerabilities.
1.0.0r
Affected by 6 other vulnerabilities.
1.0.1m
Affected by 31 other vulnerabilities.
1.0.2a
Affected by 59 other vulnerabilities.
VCID-gydy-46kx-aaaf
Aliases:
CVE-2015-1789
VC-OPENSSL-20150611-CVE-2015-1789
X509_cmp_time does not properly check the length of the ASN1_TIME string and can read a few bytes out of bounds. In addition, X509_cmp_time accepts an arbitrary number of fractional seconds in the time string. An attacker can use this to craft malformed certificates and CRLs of various sizes and potentially cause a segmentation fault, resulting in a DoS on applications that verify certificates or CRLs. TLS clients that verify CRLs are affected. TLS clients and servers with client authentication enabled may be affected if they use custom verification callbacks.
0.9.8zg
Affected by 1 other vulnerability.
1.0.0s
Affected by 2 other vulnerabilities.
1.0.1n
Affected by 27 other vulnerabilities.
1.0.2b
Affected by 57 other vulnerabilities.
VCID-h9w2-2k7p-aaae
Aliases:
CVE-2012-2333
VC-OPENSSL-20120510-CVE-2012-2333
An integer underflow flaw, leading to a buffer over-read, was found in the way OpenSSL handled TLS 1.1, TLS 1.2, and DTLS (Datagram Transport Layer Security) application data record lengths when using a block cipher in CBC (cipher-block chaining) mode. A malicious TLS 1.1, TLS 1.2, or DTLS client or server could use this flaw to crash its connection peer.
0.9.8x
Affected by 34 other vulnerabilities.
1.0.0j
Affected by 42 other vulnerabilities.
1.0.1c
Affected by 75 other vulnerabilities.
VCID-kna9-u4rt-aaar
Aliases:
CVE-2014-3507
VC-OPENSSL-20140806-CVE-2014-3507
A DTLS memory leak from zero-length fragments was found. By sending carefully crafted DTLS packets an attacker could cause OpenSSL to leak memory. This could lead to a Denial of Service attack.
0.9.8zb
Affected by 20 other vulnerabilities.
1.0.0n
Affected by 24 other vulnerabilities.
1.0.1i
Affected by 50 other vulnerabilities.
VCID-nemw-6d8n-aaah
Aliases:
CVE-2014-3567
VC-OPENSSL-20141015-CVE-2014-3567
When an OpenSSL SSL/TLS/DTLS server receives a session ticket the integrity of that ticket is first verified. In the event of a session ticket integrity check failing, OpenSSL will fail to free memory causing a memory leak. By sending a large number of invalid session tickets an attacker could exploit this issue in a Denial Of Service attack.
0.9.8zc
Affected by 18 other vulnerabilities.
1.0.0o
Affected by 22 other vulnerabilities.
1.0.1j
Affected by 47 other vulnerabilities.
VCID-rf1s-dsy1-aaag
Aliases:
CVE-2012-2131
VC-OPENSSL-20120424-CVE-2012-2131
It was discovered that the fix for CVE-2012-2110 released on 19 Apr 2012 was not sufficient to correct the issue for OpenSSL 0.9.8. This issue only affects OpenSSL 0.9.8v. OpenSSL 1.0.1a and 1.0.0i already contain a patch sufficient to correct CVE-2012-2110.
0.9.8w
Affected by 35 other vulnerabilities.
VCID-rr5p-edvp-aaar
Aliases:
CVE-2014-3506
VC-OPENSSL-20140806-CVE-2014-3506
A DTLS flaw leading to memory exhaustion was found. An attacker can force openssl to consume large amounts of memory whilst processing DTLS handshake messages. This could lead to a Denial of Service attack.
0.9.8zb
Affected by 20 other vulnerabilities.
1.0.0n
Affected by 24 other vulnerabilities.
1.0.1i
Affected by 50 other vulnerabilities.
VCID-sya7-pd7p-aaaa
Aliases:
CVE-2014-3510
VC-OPENSSL-20140806-CVE-2014-3510
A flaw in handling DTLS anonymous EC(DH) ciphersuites was found. OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject to a denial of service attack. A malicious server can crash the client with a null pointer dereference (read) by specifying an anonymous (EC)DH ciphersuite and sending carefully crafted handshake messages.
0.9.8zb
Affected by 20 other vulnerabilities.
1.0.0n
Affected by 24 other vulnerabilities.
1.0.1i
Affected by 50 other vulnerabilities.
VCID-tc8g-det5-aaad
Aliases:
CVE-2015-1790
VC-OPENSSL-20150611-CVE-2015-1790
The PKCS#7 parsing code does not handle missing inner EncryptedContent correctly. An attacker can craft malformed ASN.1-encoded PKCS#7 blobs with missing content and trigger a NULL pointer dereference on parsing. Applications that decrypt PKCS#7 data or otherwise parse PKCS#7 structures from untrusted sources are affected. OpenSSL clients and servers are not affected.
0.9.8zg
Affected by 1 other vulnerability.
1.0.0s
Affected by 2 other vulnerabilities.
1.0.1n
Affected by 27 other vulnerabilities.
1.0.2b
Affected by 57 other vulnerabilities.
VCID-vc6g-hwkh-aaas
Aliases:
VC-OPENSSL-20141015
OpenSSL has added support for TLS_FALLBACK_SCSV to allow applications to block the ability for a MITM attacker to force a protocol downgrade. Some client applications (such as browsers) will reconnect using a downgraded protocol to work around interoperability bugs in older servers. This could be exploited by an active man-in-the-middle to downgrade connections to SSL 3.0 even if both sides of the connection support higher protocols. SSL 3.0 contains a number of weaknesses including POODLE (CVE-2014-3566). See also https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00 and https://www.openssl.org/~bodo/ssl-poodle.pdf
0.9.8zc
Affected by 18 other vulnerabilities.
1.0.0o
Affected by 22 other vulnerabilities.
1.0.1j
Affected by 47 other vulnerabilities.
VCID-vu6d-q79f-aaaa
Aliases:
CVE-2013-0166
VC-OPENSSL-20130205-CVE-2013-0166
A flaw in the OpenSSL handling of OCSP response verification can be exploited in a denial of service attack.
0.9.8y
Affected by 32 other vulnerabilities.
1.0.0k
Affected by 40 other vulnerabilities.
1.0.1d
Affected by 72 other vulnerabilities.
VCID-vvuz-hvfa-aaae
Aliases:
CVE-2014-3570
VC-OPENSSL-20150108-CVE-2014-3570
Bignum squaring (BN_sqr) may produce incorrect results on some platforms, including x86_64. This bug occurs at random with a very low probability, and is not known to be exploitable in any way, though its exact impact is difficult to determine. The following has been determined: *) The probability of BN_sqr producing an incorrect result at random is very low: 1/2^64 on the single affected 32-bit platform (MIPS) and 1/2^128 on affected 64-bit platforms. *) On most platforms, RSA follows a different code path and RSA operations are not affected at all. For the remaining platforms (e.g. OpenSSL built without assembly support), pre-existing countermeasures thwart bug attacks [1]. *) Static ECDH is theoretically affected: it is possible to construct elliptic curve points that would falsely appear to be on the given curve. However, there is no known computationally feasible way to construct such points with low order, and so the security of static ECDH private keys is believed to be unaffected. *) Other routines known to be theoretically affected are modular exponentiation, primality testing, DSA, RSA blinding, JPAKE and SRP. No exploits are known and straightforward bug attacks fail - either the attacker cannot control when the bug triggers, or no private key material is involved.
0.9.8zd
Affected by 13 other vulnerabilities.
1.0.0p
Affected by 14 other vulnerabilities.
1.0.1k
Affected by 39 other vulnerabilities.
VCID-xmkv-s3ye-aaae
Aliases:
CVE-2015-0204
VC-OPENSSL-20150106-CVE-2015-0204
An OpenSSL client will accept the use of an RSA temporary key in a non-export RSA key exchange ciphersuite. A server could present a weak temporary key and downgrade the security of the session.
0.9.8zd
Affected by 13 other vulnerabilities.
1.0.0p
Affected by 14 other vulnerabilities.
1.0.1k
Affected by 39 other vulnerabilities.
VCID-xrv3-gt8k-aaak
Aliases:
CVE-2015-0292
VC-OPENSSL-20150319-CVE-2015-0292
A vulnerability existed in previous versions of OpenSSL related to the processing of base64 encoded data. Any code path that reads base64 data from an untrusted source could be affected (such as the PEM processing routines). Maliciously crafted base 64 data could trigger a segmenation fault or memory corruption.
0.9.8za
Affected by 25 other vulnerabilities.
1.0.0m
Affected by 30 other vulnerabilities.
1.0.1h
Affected by 59 other vulnerabilities.
VCID-y49b-wcn4-aaaa
Aliases:
CVE-2015-0288
VC-OPENSSL-20150302-CVE-2015-0288
X509_to_X509_REQ NULL pointer deref. The function X509_to_X509_REQ will crash with a NULL pointer dereference if the certificate key is invalid. This function is rarely used in practice.
0.9.8zf
Affected by 5 other vulnerabilities.
1.0.0r
Affected by 6 other vulnerabilities.
1.0.1m
Affected by 31 other vulnerabilities.
1.0.2a
Affected by 59 other vulnerabilities.
VCID-z8sc-rus1-aaae
Aliases:
CVE-2014-3568
VC-OPENSSL-20141015-CVE-2014-3568
When OpenSSL is configured with "no-ssl3" as a build option, servers could accept and complete a SSL 3.0 handshake, and clients could be configured to send them.
0.9.8zc
Affected by 18 other vulnerabilities.
1.0.0o
Affected by 22 other vulnerabilities.
1.0.1j
Affected by 47 other vulnerabilities.
VCID-zkqe-jrqc-aaab
Aliases:
CVE-2014-8176
VC-OPENSSL-20150611-CVE-2014-8176
This vulnerability does not affect current versions of OpenSSL. It existed in previous OpenSSL versions and was fixed in June 2014. If a DTLS peer receives application data between the ChangeCipherSpec and Finished messages, buffering of such data may cause an invalid free, resulting in a segmentation fault or potentially, memory corruption.
0.9.8za
Affected by 25 other vulnerabilities.
1.0.0m
Affected by 30 other vulnerabilities.
1.0.1h
Affected by 59 other vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-qhb8-626k-aaad Multiple numeric conversion errors, leading to a buffer overflow, were found in the way OpenSSL parsed ASN.1 (Abstract Syntax Notation One) data from BIO (OpenSSL's I/O abstraction) inputs. Specially-crafted DER (Distinguished Encoding Rules) encoded data read from a file or other BIO input could cause an application using the OpenSSL library to crash or, potentially, execute arbitrary code. CVE-2012-2110
VC-OPENSSL-20120419-CVE-2012-2110

Date Actor Action Vulnerability Source VulnerableCode Version
2024-01-03T20:01:54.255276+00:00 OpenSSL Importer Affected by VCID-1h5d-fnug-aaac https://www.openssl.org/news/secadv/20140605.txt 34.0.0rc1
2024-01-03T20:01:53.732819+00:00 OpenSSL Importer Affected by VCID-88dn-xmg2-aaab https://www.openssl.org/news/secadv/20140605.txt 34.0.0rc1
2024-01-03T20:01:53.538273+00:00 OpenSSL Importer Affected by VCID-ch34-h9ey-aaam https://www.openssl.org/news/secadv/20140605.txt 34.0.0rc1
2024-01-03T20:01:53.269949+00:00 OpenSSL Importer Affected by VCID-6xd4-wjkk-aaak https://www.openssl.org/news/secadv/20140605.txt 34.0.0rc1
2024-01-03T20:01:52.940957+00:00 OpenSSL Importer Affected by VCID-e7ep-2kks-aaad https://www.openssl.org/news/secadv/20140605.txt 34.0.0rc1
2024-01-03T20:01:52.495932+00:00 OpenSSL Importer Affected by VCID-vu6d-q79f-aaaa https://www.openssl.org/news/secadv/20130205.txt 34.0.0rc1
2024-01-03T20:01:52.222389+00:00 OpenSSL Importer Affected by VCID-8c1z-2ue1-aaaj https://www.openssl.org/news/secadv/20130205.txt 34.0.0rc1
2024-01-03T20:01:52.005121+00:00 OpenSSL Importer Affected by VCID-h9w2-2k7p-aaae https://www.openssl.org/news/secadv/20120510.txt 34.0.0rc1
2024-01-03T20:01:51.811206+00:00 OpenSSL Importer Fixing VCID-qhb8-626k-aaad https://www.openssl.org/news/secadv/20120419.txt 34.0.0rc1
2024-01-03T20:01:51.674243+00:00 OpenSSL Importer Affected by VCID-rf1s-dsy1-aaag https://www.openssl.org/news/secadv/20120424.txt 34.0.0rc1
2024-01-03T20:01:46.604432+00:00 OpenSSL Importer Affected by VCID-sya7-pd7p-aaaa https://www.openssl.org/news/secadv/20140806.txt 34.0.0rc1
2024-01-03T20:01:46.319400+00:00 OpenSSL Importer Affected by VCID-kna9-u4rt-aaar https://www.openssl.org/news/secadv/20140806.txt 34.0.0rc1
2024-01-03T20:01:46.108661+00:00 OpenSSL Importer Affected by VCID-rr5p-edvp-aaar https://www.openssl.org/news/secadv/20140806.txt 34.0.0rc1
2024-01-03T20:01:45.821383+00:00 OpenSSL Importer Affected by VCID-77pn-m7ra-aaap https://www.openssl.org/news/secadv/20140806.txt 34.0.0rc1
2024-01-03T20:01:45.389684+00:00 OpenSSL Importer Affected by VCID-8xeh-vwwg-aaak https://www.openssl.org/news/secadv/20140806.txt 34.0.0rc1
2024-01-03T20:01:45.080986+00:00 OpenSSL Importer Affected by VCID-z8sc-rus1-aaae https://www.openssl.org/news/secadv/20141015.txt 34.0.0rc1
2024-01-03T20:01:44.792997+00:00 OpenSSL Importer Affected by VCID-vc6g-hwkh-aaas https://www.openssl.org/news/vulnerabilities.xml 34.0.0rc1
2024-01-03T20:01:44.498197+00:00 OpenSSL Importer Affected by VCID-nemw-6d8n-aaah https://www.openssl.org/news/secadv/20141015.txt 34.0.0rc1
2024-01-03T20:01:44.130603+00:00 OpenSSL Importer Affected by VCID-vvuz-hvfa-aaae https://www.openssl.org/news/secadv/20150108.txt 34.0.0rc1
2024-01-03T20:01:43.804726+00:00 OpenSSL Importer Affected by VCID-5g8u-a3pe-aaan https://www.openssl.org/news/secadv/20150108.txt 34.0.0rc1
2024-01-03T20:01:43.321040+00:00 OpenSSL Importer Affected by VCID-xmkv-s3ye-aaae https://www.openssl.org/news/secadv/20150108.txt 34.0.0rc1
2024-01-03T20:01:43.004618+00:00 OpenSSL Importer Affected by VCID-amba-4zuy-aaap https://www.openssl.org/news/secadv/20150108.txt 34.0.0rc1
2024-01-03T20:01:42.676735+00:00 OpenSSL Importer Affected by VCID-dhsz-kcke-aaan https://www.openssl.org/news/secadv/20150108.txt 34.0.0rc1
2024-01-03T20:01:42.073681+00:00 OpenSSL Importer Affected by VCID-y49b-wcn4-aaaa https://www.openssl.org/news/secadv/20150319.txt 34.0.0rc1
2024-01-03T20:01:41.703515+00:00 OpenSSL Importer Affected by VCID-75pz-sunt-aaaa https://www.openssl.org/news/secadv/20150319.txt 34.0.0rc1
2024-01-03T20:01:41.289274+00:00 OpenSSL Importer Affected by VCID-9few-spp9-aaag https://www.openssl.org/news/secadv/20150319.txt 34.0.0rc1
2024-01-03T20:01:41.016926+00:00 OpenSSL Importer Affected by VCID-xrv3-gt8k-aaak https://www.openssl.org/news/secadv/20150319.txt 34.0.0rc1
2024-01-03T20:01:40.656776+00:00 OpenSSL Importer Affected by VCID-bsap-s527-aaaj https://www.openssl.org/news/secadv/20150319.txt 34.0.0rc1
2024-01-03T20:01:40.266250+00:00 OpenSSL Importer Affected by VCID-1pke-t171-aaas https://www.openssl.org/news/secadv/20150319.txt 34.0.0rc1
2024-01-03T20:01:39.653487+00:00 OpenSSL Importer Affected by VCID-zkqe-jrqc-aaab https://www.openssl.org/news/secadv/20150611.txt 34.0.0rc1
2024-01-03T20:01:39.259363+00:00 OpenSSL Importer Affected by VCID-69ax-cbdq-aaam https://www.openssl.org/news/secadv/20150611.txt 34.0.0rc1
2024-01-03T20:01:38.867043+00:00 OpenSSL Importer Affected by VCID-arc3-rhts-aaar https://www.openssl.org/news/secadv/20150611.txt 34.0.0rc1
2024-01-03T20:01:38.477626+00:00 OpenSSL Importer Affected by VCID-tc8g-det5-aaad https://www.openssl.org/news/secadv/20150611.txt 34.0.0rc1
2024-01-03T20:01:38.088025+00:00 OpenSSL Importer Affected by VCID-gydy-46kx-aaaf https://www.openssl.org/news/secadv/20150611.txt 34.0.0rc1
2024-01-03T20:01:37.080499+00:00 OpenSSL Importer Affected by VCID-3d3c-x2ux-aaaa https://www.openssl.org/news/secadv/20151203.txt 34.0.0rc1
2024-01-03T20:01:36.294224+00:00 OpenSSL Importer Affected by VCID-1t6y-1zjy-aaae https://www.openssl.org/news/secadv/20160301.txt 34.0.0rc1
2024-01-03T20:01:35.923060+00:00 OpenSSL Importer Affected by VCID-ftte-av19-aaad https://www.openssl.org/news/secadv/20160301.txt 34.0.0rc1