openssl

Direct Vulnerabilities

Known vulnerabilities in the https://openssl.org|openssl package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Out-of-bounds Read

[3.6.0-alpha1,3.6.2)
  • C
Use After Free

[,3.0.20)[3.1.0-alpha1,3.3.7)[3.4.0-alpha1,3.4.5)[3.5.0-alpha1,3.5.6)[3.6.0-alpha1,3.6.2)
  • H
NULL Pointer Dereference

[,3.0.20)[3.1.0-alpha1,3.3.7)[3.4.0-alpha1,3.4.5)[3.5.0-alpha1,3.5.6)[3.6.0-alpha1,3.6.2)
  • H
NULL Pointer Dereference

[,3.0.20)[3.1.0-alpha1,3.3.7)[3.4.0-alpha1,3.4.5)[3.5.0-alpha1,3.5.6)[3.6.0-alpha1,3.6.2)
  • H
Improper Check for Unusual or Exceptional Conditions

[,3.0.20)[3.1.0-alpha1,3.3.7)[3.4.0-alpha1,3.4.5)[3.5.0-alpha1,3.5.6)[3.6.0-alpha1,3.6.2)
  • C
Out-of-bounds Write

[,3.0.20)[3.1.0-alpha1,3.3.7)[3.4.0-alpha1,3.4.5)[3.5.0-alpha1,3.5.6)[3.6.0-alpha1,3.6.2)
  • H
NULL Pointer Dereference

[,3.0.20)[3.1.0-alpha1,3.3.7)[3.4.0-alpha1,3.4.5)[3.5.0-alpha1,3.5.6)[3.6.0-alpha1,3.6.2)
  • M
Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')

[3.5.0-alpha1,3.5.6)[3.6.0-alpha1,3.6.2)
  • M
Use of a Broken or Risky Cryptographic Algorithm

[3.0.0,3.0.13)[3.1.0-alpha1,3.1.5)[3.2.0-alpha1,3.2.1)
  • M
Improper Check for Unusual or Exceptional Conditions

[1.1.1,3.0.19)[3.1.0-alpha1,3.3.6)[3.4.0-alpha1,3.4.4)[3.5.0-alpha1,3.5.5)[3.6.0-alpha1,3.6.1)
  • H
NULL Pointer Dereference

[,3.0.19)[3.1.0-alpha1,3.3.6)[3.4.0-alpha1,3.4.4)[3.5.0-alpha1,3.5.5)[3.6.0-alpha1,3.6.1)
  • M
Missing Cryptographic Step

[1.1.1,3.0.19)[3.1.0-alpha1,3.3.6)[3.4.0-alpha1,3.4.4)[3.5.0-alpha1,3.5.5)[3.6.0-alpha1,3.6.1)
  • H
NULL Pointer Dereference

[3.2.0-alpha1,3.3.6)[3.4.0-alpha1,3.4.4)[3.5.0-alpha1,3.5.5)[3.6.0-alpha1,3.6.1)
  • H
Type Confusion

[1.1.1,3.0.19)[3.1.0-alpha1,3.3.6)[3.4.0-alpha1,3.4.4)[3.5.0-alpha1,3.5.5)[3.6.0-alpha1,3.6.1)
  • M
Improper Verification of Cryptographic Signature

[3.5.0-alpha1,3.5.5)[3.6.0-alpha1,3.6.1)
  • H
Out-of-bounds Write

[1.1.1,3.0.19)[3.1.0-alpha1,3.3.6)[3.4.0-alpha1,3.4.4)[3.5.0-alpha1,3.5.5)[3.6.0-alpha1,3.6.1)
  • M
Memory Allocation with Excessive Size Value

[3.1.0-alpha1,3.3.6)[3.4.0-alpha1,3.4.4)[3.5.0-alpha1,3.5.5)[3.6.0-alpha1,3.6.1)
  • M
Out-of-bounds Write

[,3.0.19)[3.1.0-alpha1,3.3.6)[3.4.0-alpha1,3.4.4)[3.5.0-alpha1,3.5.5)[3.6.0-alpha1,3.6.1)
  • H
Stack-based Buffer Overflow

[3.0.0-alpha1,3.0.19)[3.1.0-alpha1,3.3.6)[3.4.0-alpha1,3.4.4)[3.5.0-alpha1,3.5.5)[3.6.0-alpha1,3.6.1)
  • M
Stack-based Buffer Overflow

[3.4.0-alpha1,3.4.4)[3.5.0-alpha1,3.5.5)[3.6.0-alpha1,3.6.1)
  • M
Improper Check for Unusual or Exceptional Conditions

[,3.0.19)[3.1.0-alpha1,3.3.6)[3.4.0-alpha1,3.4.4)[3.5.0-alpha1,3.5.5)[3.6.0-alpha1,3.6.1)
  • L
Out-of-bounds Read

[3.0.16,3.0.18)[3.1.8,3.2.0-alpha1)[3.2.4,3.2.6)[3.3.3,3.3.5)[3.4.0,3.4.3)[3.5.0,3.5.4)
  • M
Timing Attack

[3.2.0-alpha1,3.2.6)[3.3.0-alpha1,3.3.5)[3.4.0-alpha1,3.4.3)[3.5.0-alpha1,3.5.4)
  • H
Out-of-bounds Read

[,3.0.18)[3.2.0-alpha1,3.2.6)[3.3.0-alpha1,3.3.5)[3.4.0-alpha1,3.4.3)[3.5.0-alpha1,3.5.4)
  • M
Improper Input Validation

[,0.9.6e)
  • M
Information Exposure

[1.0.2,1.0.2p)[1.1.0,1.1.0i)
  • H
Missing Release of Resource after Effective Lifetime

[1.0.1,1.0.1u)[1.0.2,1.0.2i)
  • M
Improper Certificate Validation

[3.5.0-alpha1,3.5.1)
  • M
Missing Report of Error Condition

[3.2.0-alpha1,3.2.4)[3.3.0-alpha1,3.3.2)[3.4.0-alpha1,3.4.1)
  • M
Covert Timing Channel

[3.0.0,3.0.16)[3.1.0,3.1.8)[3.2.0,3.2.4)[3.3.0,3.3.3)[3.4.0,3.4.1)
  • M
Out-of-bounds Write

[,3.0.16)[3.1.0,3.1.8)[3.2.0,3.2.4)[3.3.0,3.3.3)
  • H
Type Confusion

[3.0.0-alpha1,3.0.15)[3.1.0-alpha1,3.1.7)[3.2.0-alpha1,3.2.3)[3.3.0-alpha1,3.3.2)
  • H
Information Exposure

[3.0.0-alpha1,3.0.15)[3.1.0-alpha1,3.1.7)[3.2.0-alpha1,3.2.3)[3.3.0-alpha1,3.3.2)
  • M
Use After Free

[1.1.1,1.1.1y)[3.0.0,3.0.14)[3.1.0,3.1.6)[3.2.0,3.2.2)[3.3.0,3.3.1)
  • L
Uncontrolled Resource Consumption ('Resource Exhaustion')

[3.0.0,3.0.14)[3.1.0,3.1.6)[3.2.0,3.2.2)[3.3.0,3.3.1)
  • L
Uncontrolled Resource Consumption ('Resource Exhaustion')

[3.0.0,3.0.14)[3.1.0,3.1.6)[3.2.0,3.2.2)
  • M
Observable Timing Discrepancy

[,3.2.0-alpha1)
  • M
NULL Pointer Dereference

[1.0.2,1.0.2zj)[1.1.1,1.1.1x)[3.0.0,3.0.13)[3.1.0,3.1.5)[3.2.0,3.2.1)
  • M
Resource Exhaustion

[3.0.0,3.0.13)[3.1.0,3.1.5)[3.2.0,3.2.1)
  • M
Use of a Broken or Risky Cryptographic Algorithm

[3.0.0,3.0.13)[3.1.0,3.1.5)[3.2.0,3.2.1)
  • M
Denial of Service (DoS)

[,3.0.13)[3.1.0-alpha1,3.1.5)
  • M
Missing Cryptographic Step

[3.0.0,3.0.12)[3.1.0,3.1.4)
  • M
Denial of Service (DoS)

[1.1.1,1.1.1w)[3.0.0,3.0.11)[3.1.0,3.1.3)
  • L
Denial of Service (DoS)

[1.0.2a,1.1.1v)[3.0.9,3.0.10)[3.1.0,3.1.2)
  • M
Denial of Service (DoS)

[1.0.2a,1.1.1v)[3.0.9,3.0.10)[3.1.0,3.1.2)
  • L
Insufficient Verification of Data Authenticity

[3.0.9,3.0.10)[3.1.0,3.1.2)
  • M
Buffer Over-read

[3.0.0,3.0.9)[3.1.0,3.1.1)
  • M
Denial of Service (DoS)

[1.0.2,1.0.2zh)[1.1.1,1.1.1u)[3.0.0,3.0.9)[3.1.0,3.1.1)
  • L
Improper Certificate Validation

[1.1.0,1.1.1u)[3.0.0,3.0.9)[3.1.0,3.1.1)
  • L
Improper Certificate Validation

[1.1.0,1.1.1u)[3.0.0,3.0.9)[3.1.0,3.1.1)
  • M
Denial of Service (DoS)

[1.0.2a,1.1.1u)[3.0.0,3.0.9)[3.1.0,3.1.1)
  • H
Denial of Service (DoS)

[3.0.0,3.0.8)
  • M
Denial of Service (DoS)

[3.0.0,3.0.8)
  • M
Use After Free

[1.0.2a,1.0.2zg)[1.1.1,1.1.1t)[3.0.0,3.0.8)
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

[,1.1.1t)[3.0.0,3.0.8)
  • M
Timing Attack

[1.0.2a,1.0.2zg)[1.1.1,1.1.1t)[3.0.0,3.0.8)
  • M
Denial of Service (DoS)

[3.0.0,3.0.8)
  • M
Denial of Service (DoS)

[3.0.0,3.0.8)
  • M
Denial of Service (DoS)

[1.1.1,1.1.1t)[3.0.0,3.0.8)
  • M
Denial of Service (DoS)

[3.0.0,3.0.8)
  • H
Buffer Overflow

[3.0.0,3.0.7)
  • H
Buffer Overflow

[3.0.0,3.0.7)
  • M
Cryptographic Issues

[3.0.0,3.0.6)
  • M
Information Exposure

[1.1.1,1.1.1q)[3.0.0,3.0.5)
  • H
Heap-based Buffer Overflow

[3.0.4,3.0.5)
  • H
Missing Release of Memory after Effective Lifetime

[3.0.0,3.0.3)
  • L
Key Management Errors

[3.0.0,3.0.3)
  • H
Arbitrary Command Injection

[,1.1.1o)[3.0.0,3.0.3)
  • M
Improper Certificate Validation

[3.0.0,3.0.3)
  • H
Infinite loop

[,1.1.1n)[3.0.0,3.0.2)
  • H
Denial of Service (DoS)

[3.0.0,3.0.1)[1.1.0a,1.1.1)
  • C
Use After Free

[0,1.1.0b)
  • H
Denial of Service (DoS)

[,1.0.1q)[1.0.2,1.0.2e)
  • M
Off-by-one Error

[0.9.7,0.9.8f)
  • M
Denial of Service (DoS)

[,0.9.6k)[0.9.7,0.9.7c)
  • M
CVE-2004-0975

[0.9.6,0.9.6-cvs)[0.9.7,0.9.7f)
  • M
Information Exposure

[,1.0.1u)[1.0.2,1.0.2i)
  • H
Denial of Service (DoS)

[,1.0.1t)[1.0.2,1.0.2h)
  • M
Resource Management Errors

[,0.9.8zb)[1.0.0,1.0.0n)[1.0.1,1.0.1i)
  • M
Information Exposure

[,1.0.2e)
  • M
Resource Management Errors

[,0.9.8m)
  • M
Insecure Defaults

[1.0.0,1.0.0b)[,0.9.8q)
  • H
Out-of-Bounds

[1.0.1,1.0.1h)[1.0.0,1.0.0m)[,0.9.8za)
  • M
Integer Overflow or Wraparound

[0,1.1.1e)
  • M
Improper Input Validation

[0.9.8f,0.9.8n)
  • H
Out-of-Bounds

[0,1.0.1g)
  • M
Security Features

[,1.0.1p)[1.0.2,1.0.2d)
  • H
Resource Management Errors

[,1.0.1u)[1.0.2,1.0.2i)[1.1.0,1.1.0a)
  • M
Improper Input Validation

[0,1.0.1j)
  • M
Use After Free

[,0.9.8m)
  • M
Race Condition

[,1.0.0n)[1.0.1,1.0.1i)
  • H
Arbitrary Code Execution

[,0.9.6e)[0.9.7-beta1,0.9.7-beta3)
  • H
Improper Input Validation

[0,1.1.0e)
  • M
Out-of-bounds Read

[,1.0.1u)[1.0.2,1.0.2i)
  • H
Denial of Service (DoS)

[0,0.9.8w)
  • M
Resource Management Errors

[0.9.7,1.1.0-pre1)
  • H
Key Management Errors

[,1.0.2p)[1.1.0,1.1.0i)
  • H
Use of a Risky Cryptographic Algorithm

[,1.1.0k-dev)[1.1.1,1.1.1c-dev)
  • H
Out-of-bounds Read

[1.0.1m,1.1.1l)
  • L
Insecure Defaults

[,1.0.0)
  • H
Improper Authentication

[,1.0.0c)
  • M
Cryptographic Issues

[,1.0.1s)[1.0.2,1.0.2g)
  • H
Denial of Service (DoS)

[,1.0.1s)[1.0.2,1.0.2g)
  • M
Denial of Service (DoS)

[,0.9.8zb)[1.0.0,1.0.0n)[1.0.1,1.0.1i)
  • M
Access Restriction Bypass

[,1.0.0a)
  • M
Denial of Service (DoS)

[0.9.6e,0.9.6f)
  • C
Out-of-Bounds

[,0.9.7l)[0.9.8,0.9.8d)
  • M
Denial of Service (DoS)

[,0.9.6m)[0.9.7,0.9.7d)
  • C
Out-of-Bounds

[0.9.6,0.9.7c)
  • M
Denial of Service (DoS)

[,0.9.8zd)[1.0.0,1.0.0p)[1.0.1,1.0.1k)
  • H
Denial of Service (DoS)

[1.0.2,1.0.2h)[1.0.1,1.0.1t)
  • L
Observable Discrepancy

[0.9.8,0.9.8y)[1.0.0,1.0.0k)[1.0.1,1.0.1d)
  • M
Cryptographic Issues

[,0.9.8j)
  • H
Denial of Service (DoS)

[,1.0.2i)
  • M
Race Condition

[1.0.2,1.0.2b)[1.0.1,1.0.1n)[1.0.0,1.0.0s)[,0.9.8zg)
  • M
Integer Overflow or Wraparound

[,1.0.2y)[1.1.1,1.1.1j)
  • M
Denial Of Service (DoS)

[1.0.0,1.0.0f)[,0.9.8s)
  • L
Cryptographic Issues

[1.0.1,1.0.1g)[1.0.0,1.0.0m)[,0.9.8za)
  • M
Improper Input Validation

[,0.9.8j)
  • M
Use of a Risky Cryptographic Algorithm

[,1.0.2q)[1.1.0-pre1,1.1.0j)[1.1.1-pre1,1.1.1a)
  • M
Buffer Access with Incorrect Length Value

[0.9.8h,1.0.0d)
  • M
Denial of Service (DoS)

[,1.0.2e)
  • M
Double Free

[0.9.8f,0.9.8h)
  • M
Denial of Service (DoS)

[0,1.0.2a)
  • M
Information Exposure

[0,1.0.2n)
  • M
Information Exposure

[,1.0.1s)[1.0.2,1.0.2g)
  • M
Release of Memory after Effective Lifetime

[0.9.8f,0.9.8m)
  • H
Improper Access Control

[0,1.1.0c)
  • L
Improper Input Validation

[0,1.0.2a)
  • M
Denial of Service (DoS)

[0.9.6d,0.9.6e)
  • M
Cryptographic Issues

[0,1.0.1d)
  • H
NULL Pointer Dereference

[0,1.1.0c)
  • H
Out-of-Bounds

[1.0.1,1.0.1a)[1.0.0,1.0.0i)[,0.9.8v)
  • M
Denial of Service (DoS)

[1.0.2,1.0.2a)[1.0.1,1.0.1m)[1.0.0,1.0.0r)[,0.9.8zf)
  • M
NULL Pointer Dereference

[1.0.2,1.0.2a)[1.0.1,1.0.1m)[1.0.0,1.0.0r)[,0.9.8zf)
  • M
NULL Pointer Dereference

[0,1.1.1i)
  • M
Resource Management Errors

[1.0.1,1.0.1h)[1.0.0,1.0.0m)[,0.9.8za)
  • L
Cryptographic Issues

[1.0.0,1.0.0e)
  • M
User Enumeration

[,1.1.0i)[1.1.0,1.1.1)
  • M
Cryptographic Issues

[1.0.1,1.0.1k)[1.0.0,1.0.0p)[,0.9.8zd)
  • L
Improper Certificate Validation

[,1.0.2t)[1.1.0,1.1.0l)[1.1.1,1.1.1d)
  • M
Out-of-Bounds

[,0.9.8k)
  • M
Timing Attack

[0.9.6d,0.9.7]
  • H
Denial of Service (DoS)

[0.9.6d,0.9.6e)
  • M
Improper Input Validation

[0,1.0.1f)
  • M
NULL Pointer Dereference

[,0.9.7l)[0.9.8,0.9.8d)
  • H
Resource Management Errors

[,0.9.7l)[0.9.8,0.9.8d)
  • H
Resource Management Errors

[,0.9.8s)
  • M
Race Condition

[,1.0.0t)[1.0.1,1.0.1p)[1.0.2,1.0.2d)
  • L
Generation of Predictable IV with CBC Mode

[0.9.8d,1.0.0o)[1.0.1,1.0.1j)
  • M
Access Restriction Bypass

[0,1.0.0e)
  • M
Improper Input Validation

[1.0.1,1.0.1j)[1.0.0,1.0.0o)[,0.9.8zc)
  • M
Out-of-Bounds

[1.0.1,1.0.1h)[1.0.0,1.0.0m)[,0.9.8za)
  • M
Timing Attack

[,1.0.2)
  • L
Use of a Risky Cryptographic Algorithm

[1.1.1,1.1.1d)[1.1.0,1.1.0l)[1.0.2,1.0.2t)
  • M
Improper Input Validation

[1.0.2,1.0.2a)[1.0.1,1.0.1m)[1.0.0,1.0.0r)[,0.9.8zf)
  • H
Resource Management Errors

[1.0.2,1.0.2h)[1.0.1,1.0.1t)
  • C
Out-of-Bounds

[1.0.2,1.0.2c)[1.0.1,1.0.1o)
  • M
Race Condition

[1.0.1,1.0.1h)[1.0.0,1.0.0m)
  • H
Race Condition

[0.9.8f,1.0.0b)
  • M
Cryptographic Issues

[,0.9.8)
  • H
Improper Certificate Validation

[1.1.1h,1.1.1k)
  • M
Denial of Service (DoS)

[0,1.0.2a)
  • H
Session Fixation

[,0.9.2b)
  • C
Use After Free

[,0.10.9)
  • M
Cryptographic Issues

[,1.0.0)
  • H
Resource Management Errors

[,0.9.7l)[0.9.8,0.9.8d)
  • M
Cryptographic Issues

[,0.9.8i]
  • M
Denial of Service (DoS)

[,0.9.6d)
  • L
User Enumeration

[0,1.0.2w)
  • H
Cryptographic Issues

[1.0.0,1.0.0a)[,0.9.8o)
  • M
Insecure Defaults

[1.0.2,1.0.2a)[1.0.1,1.0.1m)[1.0.0,1.0.0r)[,0.9.8zf)
  • M
Cryptographic Issues

[1.0.2,1.0.2h)[1.0.1,1.0.1t)
  • M
Denial of Service (DoS)

[1.0.1,1.0.1c)[1.0.0,1.0.0j)[,0.9.8x)
  • H
Out-of-Bounds

[1.0.2,1.0.2t)[1.0.1,1.0.1t)
  • M
Resource Management Errors

[,0.9.8m)
  • M
Information Exposure

[,1.0.2m)[1.1.0,1.1.0g)
  • M
Cryptographic Issues

[,1.0.0l)[1.0.1,1.0.1f)
  • M
Cryptographic Issues

[,0.9.8y)[1.0.0,1.0.0k)[1.0.1,1.0.1d)
  • M
CVE-2001-1141

[,0.9.6b)
  • M
Out-of-Bounds

[,1.0.0p)[1.0.1,1.0.1k)
  • M
Denial of Service (DoS)

[0,1.0.1i)
  • M
Resource Management Errors

[0,1.1.0a)
  • M
Information Exposure

[,0.9.8zb)[1.0.0,1.0.0n)[1.0.1,1.0.1i)
  • C
Buffer Overflow

[1.1.0a,1.1.1l)
  • H
Improper Input Validation

[,1.0.1u)[1.0.2,1.0.2i)
  • M
Resource Management Errors

[,1.0.0e)
  • M
Out-of-Bounds

[,0.9.8m)
  • M
Cryptographic Issues

[1.0.1,1.0.1k)[1.0.0,1.0.0p)[,0.9.8zd)
  • M
Denial Of Service (DoS)

[1.0.2,1.0.2b)[1.0.1,1.0.1n)[1.0.0,1.0.0e)[,0.9.8s)
  • M
Denial of Service (DoS)

[1.0.2,1.0.2a)[1.0.1,1.0.1m)[1.0.0,1.0.0r)[,0.9.8zf)
  • M
Denial Of Service (DoS)

[,0.9.8m)
  • M
Cryptographic Issues

[,1.1.0j)[1.1.1,1.1.1a)
  • M
Cryptographic Issues

[,1.0.0p)[1.0.1,1.0.1k)
  • H
Information Exposure

[0.9.6,0.9.6j)[0.9.7,0.9.7b)
  • H
Denial of Service (DoS)

[,0.9.8f)
  • M
Denial of Service (DoS)

[,1.0.0m)[1.0.1,1.0.1h)
  • M
Improper Authentication

[0.9.8f,0.9.8h)
  • C
Denial of Service (DoS)

[,1.0.1s)[1.0.2,1.0.2g)
  • M
Code

[0,1.0.2a)
  • H
NULL Pointer Dereference

[0,1.1.0d)
  • H
Out-of-bounds Read

[,1.0.2k)[1.1.0,1.1.0d)
  • M
Information Exposure

[,0.9.6i)[0.9.7,0.9.7a)
  • M
Denial of Service (DoS)

[0,1.0.2a)
  • M
CVE-2005-2969

[,0.9.7h)[0.9.8,0.9.8a)
  • M
Insecure Defaults

[1.1.1,1.1.1d)[1.1.0,1.1.0l)[1.0.2,1.0.2t)
  • M
Improper Certificate Validation

[,0.9.8k)
  • H
NULL Pointer Dereference

[1.1.1d,1.1.1g)
  • M
Information Exposure

[1.0.2,1.0.2a)[1.0.1,1.0.1m)[1.0.0,1.0.0r)[,0.9.8zf)
  • M
NULL Pointer Dereference

[1.0.1,1.0.1k)[1.0.0,1.0.0p)[,0.9.8zd)
  • M
User Enumeration

[0,1.0.2r)
  • M
Out-of-Bounds

[,1.0.2m)[1.1.0,1.1.0g)
  • C
Out-of-bounds Write

[,1.0.1u)[1.0.2,1.0.2i)
  • M
Denial of Service (DoS)

[,0.9.8zb)[1.0.0,1.0.0n)[1.0.1,1.0.1i)
  • M
Denial of Service (DoS)

[,0.9.6l)
  • M
CVE-2014-3511

[0,1.0.1i)
  • M
Cryptographic Issues

[,1.0.1r)[1.0.2,1.0.2f)
  • H
Improper Certificate Validation

[,0.9.0)
  • M
Denial of Service (DoS)

[,0.9.6k)[0.9.7,0.9.7c)
  • H
Resource Management Errors

[,1.0.1u)[1.0.2,1.0.2i)
  • M
Improper Input Validation

[,0.9.8n)
  • M
NULL Pointer Dereference

[,0.9.8i)
  • M
Cryptographic Issues

[,0.9.8h)
  • M
Cryptographic Issues

[1.0.1,1.0.1k)[1.0.0,1.0.0p)[,0.9.8zd)
  • M
Cryptographic Issues

[1.0.0,1.0.0h)[,0.9.8u)
  • M
Insecure Randomness

[1.1.1,1.1.1d)
  • M
Denial Of Service

[1.0.0,1.0.0h)[,0.9.8u)
  • L
Insecure Encryption

[1.1.0a,1.1.1j)[1.0.2s,1.0.2y)
  • H
Insecure Encryption

[,0.9.8za)[1.0.0,1.0.0m)[1.0.1,1.0.1h)
  • M
Denial of Service (DoS)

[0.9.6d,0.9.7d)
  • H
Improper Input Validation

[0,1.1.0a)
  • M
NULL Pointer Dereference

[1.1.0a,1.1.1k)
  • M
Cryptographic Issues

[0,1.0.2a)
  • M
Out-of-bounds Read

[0,1.0.2n)
  • C
Integer Overflow or Wraparound

[,1.0.1u)[1.0.2,1.0.2i)
  • M
Denial of Service (DoS)

[0,1.1.0a)
  • M
Denial Of Service (Dos)

[1.0.2,1.0.2b)[1.0.1,1.0.1n)[1.0.0,1.0.0s)[,0.9.8zg)
  • M
Cryptographic Issues

[1.0.1,1.0.1k)[1.0.0,1.0.0p)[,0.9.8zd)
  • M
Cryptographic Issues

[1.0.1,1.0.1f)
  • M
Cryptographic Issues

[0.9.8,0.9.8c)[0.9.7,0.9.7k)
  • M
Information Exposure

[,0.9.8zh)[1.0.0,1.0.0t)[1.0.1,1.0.1q)[1.0.2,1.0.2e)
  • C
Improper Input Validation

[,0.9.8m)
  • M
Cryptographic Issues

[1.0.0,1.0.0f)[,0.9.8s)
  • M
Denial Of Service (Dos)

[1.0.2,1.0.2b)[1.0.1,1.0.1n)[1.0.0,1.0.0s)[,0.9.8zg)
  • M
Access Restriction Bypass

[,0.9.8l)
  • M
Insecure Defaults

[1.0.2,1.0.2a)[1.0.1,1.0.1m)[1.0.0,1.0.0r)[,0.9.8zf)
  • L
Information Exposure

[,1.0.2f)
  • H
Arbitrary Code Execution

[,0.9.7-beta3)
  • H
Improper Authentication

[,0.9.6)
  • M
Resource Management Errors

[,0.9.8zb)[1.0.0,1.0.0n)[1.0.1,1.0.1i)
  • H
Out-of-bounds Read

[,1.0.1u)[1.0.2,1.0.2i)
  • H
Resource Management Errors

[,1.0.1s)[1.0.2,1.0.2g)
  • H
Denial of Service (DoS)

[,1.0.1u)[1.0.2,1.0.2i)
  • H
NULL Pointer Dereference

[0,1.0.2j)
  • M
Denial Of Service (DoS)

[,0.9.8u)
  • L
Cryptographic Issues

[1.0.1,1.0.1h)[1.0.2,1.0.2b)
  • M
Denial of Service (DoS)

[,0.9.8k)
  • M
Cryptographic Issues

[1.0.1,1.0.1h)[1.0.0,1.0.0m)[,0.9.8za)
  • H
Integer Overflow or Wraparound

[,1.0.2y)[1.1.1,1.1.1j)
  • M
Information Exposure

[1.0.2,1.0.2a)[1.0.1,1.0.1m)[1.0.0,1.0.0r)[,0.9.8zf)
  • H
Out-of-Bounds

[1.0.2,1.0.2b)[1.0.1,1.0.1n)[1.0.0,1.0.0s)[,0.9.8zg)
  • C
Out-of-bounds Write

[,1.0.1u)[1.0.2-beta1,1.0.2i)
  • M
Key Management Errors

[,1.0.2k)[1.1.0,1.1.0c)
  • M
Small Space of Random Values

[,0.9.5)
  • C
Out-of-Bounds

[,1.0.1s)[1.0.2,1.0.2g)
  • L
Improper Authentication

[0.9.8h,0.9.8k)
  • M
Out-of-bounds Read

[0.9.8s,1.0.0g)
  • H
Out-of-Bounds

[0,1.0.1i)
  • M
Information Exposure

[,1.0.2k)[1.1.0,1.1.0d)
  • C
Out-of-Bounds

[,1.0.1s)[1.0.2,1.0.2g)
  • M
CVE-2003-0147

[0.9.6,0.9.6j)[0.9.7,0.9.7b)
  • H
Cryptographic Issues

[,0.9.6)
  • M
Buffer Overflow

[,1.0.2o)[1.1.0,1.1.0h)
  • M
Insecure Defaults

[0,1.1.0h)
  • M
Cryptographic Issues

[,0.9.8m)
  • M
Cryptographic Issues

[,1.0.2p)[1.1.0,1.1.0i)
  • M
Cryptographic Issues

[1.0.0,1.0.0f)[,0.9.8s)
  • M
Resource Management Errors

[1.0.0,1.0.0f)[,0.9.8s)
  • H
Out-of-Bounds

[1.0.1,1.0.1h)[1.0.0,1.0.0m)[,0.9.8za)
  • M
Denial Of Service (DoS)

[,1.0.0f)
  • M
Cryptographic Issues

[1.0.1,1.0.1j)[1.0.0,1.0.0o)[,0.9.8zc)
  • H
Information Exposure

[,1.0.1u)[1.0.2,1.0.2i)