Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2001-1141

The Pseudo-Random Number Generator (PRNG) in SSLeay and OpenSSL before 0.9.6b allows attackers to use the output of small PRNG requests to determine the internal state information, which could be used by attackers to predict future pseudo-random numbers.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.012
EPSS Ranking 77.9%
CVSS Severity
CVSS v2 Score 5.0
References
Products affected by CVE-2001-1141
  • Openssl » Openssl » Version: 0.9.1c
    cpe:2.3:a:openssl:openssl:0.9.1c
  • Openssl » Openssl » Version: 0.9.2b
    cpe:2.3:a:openssl:openssl:0.9.2b
  • Openssl » Openssl » Version: 0.9.3
    cpe:2.3:a:openssl:openssl:0.9.3
  • Openssl » Openssl » Version: 0.9.4
    cpe:2.3:a:openssl:openssl:0.9.4
  • Openssl » Openssl » Version: 0.9.5
    cpe:2.3:a:openssl:openssl:0.9.5
  • Openssl » Openssl » Version: 0.9.6
    cpe:2.3:a:openssl:openssl:0.9.6
  • Openssl » Openssl » Version: 0.9.6a
    cpe:2.3:a:openssl:openssl:0.9.6a
  • Ssleay » Ssleay » Version: 0.8.1
    cpe:2.3:a:ssleay:ssleay:0.8.1
  • Ssleay » Ssleay » Version: 0.9
    cpe:2.3:a:ssleay:ssleay:0.9
  • Ssleay » Ssleay » Version: 0.9.1
    cpe:2.3:a:ssleay:ssleay:0.9.1


Contact Us

Shodan ® - All rights reserved