openssl vulnerabilities

  • licenses detected

    • [1.0.2u]; [1.1.0l]; [1.1.1q]; [1.1.1s]; [1.1.1t]; [1.1.1u]; [1.1.1v]; [3.0.10]; [3.0.11]; [3.0.12]; [3.0.13]; [3.0.14]; [3.0.15]; [3.0.5]; [3.0.7]; [3.0.8]; [3.0.9]; [3.1.0]; [3.1.1]; [3.1.3]; [3.1.4]; [3.1.5]; [3.1.6]; [3.1.7]; [3.2.0]; [3.2.1]; [3.2.2]; [3.2.3]; [3.3.1]; [3.3.2]; [3.4.0]
    • [1.1.1w]
    • [3.0.16]; [3.0.17]; [3.0.18]; [3.1.2]; [3.1.8]; [3.2.4]; [3.2.5]; [3.2.6]; [3.3.3]; [3.3.4]; [3.3.5]; [3.4.1]; [3.4.2]; [3.4.3]; [3.5.0]; [3.5.1]; [3.5.2]; [3.5.3]; [3.5.4]; [3.6.0]
  • Direct Vulnerabilities

    Known vulnerabilities in the openssl package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • L
    Out-of-bounds Read

    [3.0.16,3.0.18)[3.1.8,3.2.0)[3.2.4,3.2.6)[3.3.3,3.3.5)[3.4.0,3.4.3)[3.5.0,3.5.4)
    • M
    Timing Attack

    [3.2.0,3.2.6)[3.3.1,3.3.5)[3.4.0,3.4.3)[3.5.0,3.5.4)
    • H
    Out-of-bounds Read

    [,3.0.18)[3.2.0,3.2.6)[3.3.1,3.3.5)[3.4.0,3.4.3)[3.5.0,3.5.4)
    • M
    Improper Certificate Validation

    [3.5.0,3.5.1)
    • M
    Missing Report of Error Condition

    [3.2.0,3.2.4)[3.3.1,3.3.2)[3.4.0,3.4.1)
    • M
    Covert Timing Channel

    [3.0.5,3.0.16)[3.1.0,3.1.8)[3.2.0,3.2.4)[3.3.1,3.3.3)[3.4.0,3.4.1)
    • M
    Out-of-bounds Write

    [,3.0.16)[3.1.0,3.1.8)[3.2.0,3.2.4)[3.3.1,3.3.3)
    • H
    Type Confusion

    [3.0.5,3.0.15)[3.1.0,3.1.7)[3.2.0,3.2.3)[3.3.1,3.3.2)
    • H
    Information Exposure

    [3.0.5,3.0.15)[3.1.0,3.1.7)[3.2.0,3.2.3)[3.3.1,3.3.2)
    • M
    Use After Free

    [1.1.1q,3.0.14)[3.1.0,3.1.6)[3.2.0,3.2.2)
    • L
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [3.0.5,3.0.14)[3.1.0,3.1.6)[3.2.0,3.2.2)
    • L
    Uncontrolled Resource Consumption ('Resource Exhaustion')

    [3.0.5,3.0.14)[3.1.0,3.1.6)[3.2.0,3.2.2)
    • M
    Observable Timing Discrepancy

    [,3.2.0)
    • M
    NULL Pointer Dereference

    [1.0.2u,1.1.0l)[1.1.1q,3.0.13)[3.1.0,3.1.5)[3.2.0,3.2.1)
    • M
    Resource Exhaustion

    [3.0.5,3.0.13)[3.1.0,3.1.5)[3.2.0,3.2.1)
    • M
    Use of a Broken or Risky Cryptographic Algorithm

    [3.0.5,3.0.13)[3.1.0,3.1.5)[3.2.0,3.2.1)
    • M
    Denial of Service (DoS)

    [,3.0.13)[3.1.0,3.1.5)
    • M
    Missing Cryptographic Step

    [3.0.5,3.0.12)[3.1.0,3.1.4)
    • M
    Denial of Service (DoS)

    [1.1.1q,1.1.1w)[3.0.5,3.0.11)[3.1.0,3.1.3)
    • L
    Denial of Service (DoS)

    [1.0.2u,1.1.1v)[3.0.9,3.0.10)[3.1.0,3.1.2)
    • M
    Denial of Service (DoS)

    [1.0.2u,1.1.1v)[3.0.9,3.0.10)[3.1.0,3.1.2)
    • L
    Insufficient Verification of Data Authenticity

    [3.0.9,3.0.10)[3.1.0,3.1.2)
    • M
    Denial of Service (DoS)

    [1.0.2u,1.1.0l)[1.1.1q,1.1.1u)[3.0.5,3.0.9)[3.1.0,3.1.1)
    • M
    Buffer Over-read

    [3.0.5,3.0.9)[3.1.0,3.1.1)
    • L
    Improper Certificate Validation

    [1.1.0l,1.1.1u)[3.0.5,3.0.9)[3.1.0,3.1.1)
    • L
    Improper Certificate Validation

    [1.1.0l,1.1.1u)[3.0.5,3.0.9)[3.1.0,3.1.1)
    • M
    Denial of Service (DoS)

    [1.0.2u,1.1.1u)[3.0.5,3.0.9)[3.1.0,3.1.1)
    • H
    Denial of Service (DoS)

    [3.0.5,3.0.8)
    • M
    Denial of Service (DoS)

    [3.0.5,3.0.8)
    • M
    Denial of Service (DoS)

    [3.0.5,3.0.8)
    • M
    Denial of Service (DoS)

    [1.1.1q,1.1.1t)[3.0.5,3.0.8)
    • M
    Denial of Service (DoS)

    [3.0.5,3.0.8)
    • M
    Timing Attack

    [1.0.2u,1.1.0l)[1.1.1q,1.1.1t)[3.0.5,3.0.8)
    • H
    Access of Resource Using Incompatible Type ('Type Confusion')

    [,1.1.1t)[3.0.5,3.0.8)
    • M
    Use After Free

    [1.0.2u,1.1.0l)[1.1.1q,1.1.1t)[3.0.5,3.0.8)
    • M
    Denial of Service (DoS)

    [3.0.5,3.0.8)
    • H
    Buffer Overflow

    [3.0.5,3.0.7)
    • H
    Buffer Overflow

    [3.0.5,3.0.7)
    • M
    Cryptographic Issues

    [3.0.5,3.0.7)
    • H
    Arbitrary Command Injection

    [,1.1.1q)
    • H
    Infinite loop

    [,1.1.1q)
    • H
    Denial of Service (DoS)

    [1.1.0l,1.1.1q)
    • C
    Use After Free

    [1.0.2u,1.1.0l)
    • M
    Integer Overflow or Wraparound

    [1.0.2u,1.1.1q)
    • H
    Out-of-bounds Read

    [1.0.2u,1.1.1q)
    • H
    Improper Input Validation

    [1.0.2u,1.1.0l)
    • H
    Use of a Risky Cryptographic Algorithm

    [,1.1.0l)
    • M
    Resource Management Errors

    [1.0.2u,1.1.0l)
    • M
    Integer Overflow or Wraparound

    [,1.1.0l)
    • M
    User Enumeration

    [,1.1.1q)
    • H
    Improper Access Control

    [1.0.2u,1.1.0l)
    • M
    NULL Pointer Dereference

    [1.0.2u,1.1.1q)
    • H
    NULL Pointer Dereference

    [1.0.2u,1.1.0l)
    • M
    Timing Attack

    [0,)
    • L
    User Enumeration

    [1.0.2u,1.1.0l)
    • M
    Cryptographic Issues

    [0,)
    • M
    Resource Management Errors

    [1.0.2u,1.1.0l)
    • C
    Buffer Overflow

    [1.1.0l,1.1.1q)
    • M
    Cryptographic Issues

    [,1.1.0l)
    • H
    NULL Pointer Dereference

    [1.0.2u,1.1.0l)
    • L
    Insecure Encryption

    [1.0.2u,1.1.1q)
    • H
    Improper Input Validation

    [1.0.2u,1.1.0l)
    • M
    NULL Pointer Dereference

    [1.1.0l,1.1.1q)
    • M
    Denial of Service (DoS)

    [1.0.2u,1.1.0l)
    • H
    Integer Overflow or Wraparound

    [,1.1.0l)
    • M
    Insecure Defaults

    [1.0.2u,1.1.0l)