296,172
Total vulnerabilities in the database
The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.
Software | From | Fixed in |
---|---|---|
openssl / openssl | 1.0.1m | 1.0.1m.x |
openssl / openssl | 1.0.2a | 1.0.2a.x |
openssl / openssl | 1.0.1j | 1.0.1j.x |
openssl / openssl | 1.0.1-beta2 | 1.0.1-beta2.x |
openssl / openssl | 1.0.1h | 1.0.1h.x |
openssl / openssl | 1.0.2e | 1.0.2e.x |
openssl / openssl | 1.0.1r | 1.0.1r.x |
openssl / openssl | 1.0.2b | 1.0.2b.x |
openssl / openssl | 1.0.1c | 1.0.1c.x |
openssl / openssl | 1.0.1g | 1.0.1g.x |
openssl / openssl | 1.0.1-beta3 | 1.0.1-beta3.x |
openssl / openssl | 1.0.1a | 1.0.1a.x |
openssl / openssl | 1.0.1-beta1 | 1.0.1-beta1.x |
openssl / openssl | 1.0.1d | 1.0.1d.x |
openssl / openssl | 1.0.2c | 1.0.2c.x |
openssl / openssl | 1.0.2-beta3 | 1.0.2-beta3.x |
openssl / openssl | 1.0.1p | 1.0.1p.x |
openssl / openssl | 1.0.2-beta1 | 1.0.2-beta1.x |
openssl / openssl | 1.0.1k | 1.0.1k.x |
openssl / openssl | 1.0.1b | 1.0.1b.x |
openssl / openssl | 1.0.1n | 1.0.1n.x |
openssl / openssl | 1.0.1q | 1.0.1q.x |
openssl / openssl | 1.0.1e | 1.0.1e.x |
openssl / openssl | 1.0.1l | 1.0.1l.x |
openssl / openssl | 1.0.1f | 1.0.1f.x |
openssl / openssl | 1.0.1o | 1.0.1o.x |
openssl / openssl | 1.0.2 | 1.0.2.x |
openssl / openssl | 1.0.2f | 1.0.2f.x |
openssl / openssl | 1.0.1i | 1.0.1i.x |
openssl / openssl | 1.0.2-beta2 | 1.0.2-beta2.x |
openssl / openssl | 1.0.1 | 1.0.1.x |
openssl / openssl | 1.0.2d | 1.0.2d.x |