Lucene search

K

CVE-2021-3450

🗓️ 25 Mar 2021 15:13:15Reported by opensslType 
cve
 cve
🔗 web.nvd.nist.gov📰️ 73 Media mentions👁 512 Views

The X509_V_FLAG_X509_STRICT flag in OpenSSL 1.1.1h through 1.1.1j allows bypass of certificate chain check

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Detection
Affected
Refs
Social
Nvd
Vulners
Node
opensslopensslRange1.1.1h1.1.1k
Node
freebsdfreebsdMatch12.2-
OR
freebsdfreebsdMatch12.2p1
OR
freebsdfreebsdMatch12.2p2
Node
OR
windriverlinuxMatch17.0lts
OR
windriverlinuxMatch18.0lts
OR
windriverlinuxMatch19.0lts
Node
OROR
oraclegraalvmMatch19.3.5enterprise
OR
oraclegraalvmMatch20.3.1.2enterprise
OR
oraclegraalvmMatch21.0.0.2enterprise
OROROROROR
oraclemysql_serverRange5.7.33
OR
oraclemysql_serverRange8.0.158.0.23
OR
oraclemysql_workbenchRange8.0.23
OROR
oraclesecure_backupRange<18.1.0.1.0
OROR
oracleweblogic_serverMatch12.2.1.4.0
OR
oracleweblogic_serverMatch14.1.1.0.0
Node
sonicwallsma100_firmwareRange<10.2.1.0-17sv
AND
Node
OROR
sonicwallsonicosRange7.0.1-r1456
Node
nodejsnode.jsRange10.0.010.24.1-
OR
nodejsnode.jsRange12.0.012.22.1-
OR
nodejsnode.jsRange14.0.014.16.1-
OR
nodejsnode.jsRange15.0.015.14.0-
[
  {
    "product": "OpenSSL",
    "vendor": "OpenSSL",
    "versions": [
      {
        "status": "affected",
        "version": "Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j)"
      }
    ]
  }
]
Rows per page

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
25 Mar 2021 15:15Current
7.6High risk
Vulners AI Score7.6
CVSS25.8
CVSS37.4
EPSS0.00416
512
.json
Report