-
Notifications
You must be signed in to change notification settings - Fork 2
/
Copy pathpast.html
76 lines (69 loc) · 2.81 KB
/
past.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
<!DOCTYPE html>
<html>
<head>
<meta name="google-site-verification" content="TLLJPDP4pvbz-pt85bH9PiAyFDozMDpvimwFjdvp4xk" />
<meta name="viewport" content="initial-scale=1, maximum-scale=1, user-scalable=0">
<meta charset="utf-8">
<title>Days without an SSL exploit</title>
<style id="jsbin-css">
html {
display: table;
min-width: 100%;
min-height: 100%;
}
body {
font: 25px sans-serif;
text-align: center;
display: table-cell;
vertical-align: middle;
}
h1 {
font-size: 40px;
}
#days {
font-size: 120px;
margin: .5em 0 0 0;
}
small {
font-size: 15px;
}
p.note {
font-size: 15px;
}
</style>
</head>
<body>
<h3>Other exploits</h3>
<h5>2014-08-05- <a href="http://mailman.nginx.org/pipermail/nginx-announce/2014/000144.html">CVE-2014-3556</a></h5>
<h5>2014-07-31 - <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5171">CVE-2014-5171</a></h5>
<h5>2014-06-05 - <a href="https://www.openssl.org/news/secadv_20140605.txt">CVE-2014-0224</a></h5>
<h5>2014-06-05 - <a href="https://www.openssl.org/news/secadv_20140605.txt">CVE-2014-0221</a></h5>
<h5>2014-06-05 - <a href="https://www.openssl.org/news/secadv_20140605.txt">CVE-2014-0195</a></h5>
<h5>2014-06-05 - <a href="https://www.openssl.org/news/secadv_20140605.txt">CVE-2014-0198</a></h5>
<h5>2014-05-28 - <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1101932">CVE-2014-3466</a></h5>
<h5>2014-05-01 - <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.5/common/005_openssl.patch.sig">OpenBSD SSL Patch</a></h5>
<h5>2014-04-23 - <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1295">CVE-2014-1295</a></h5>
<h5>2014-04-12 - <a href="http://marc.info/?l=openbsd-cvs&m=139732441810737&w=2">OpenBSD CVS</a></h5>
<h5>2014-04-07 - <a href="http://heartbleed.com">Heartbleed</a></h5>
<h5>2014-02-22 - <a href="https://gotofail.com">gotofail</a></h5>
<h5><a href="/">Home</a></h5>
<p>Submissions <a href="submit.html">here</a>
<p class="note">Note: This is a <i>very</i> small index of SSL vulnerabilities; the CVEs we've listed on the front page of this site are listed here.</p>
<script>
(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){
(i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o),
m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)
})(window,document,'script','//www.google-analytics.com/analytics.js','ga');
ga('create', 'UA-49901513-1', 'dayswithoutansslexploit.com');
ga('send', 'pageview');
</script>
<!--<script async src="//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<ins class="adsbygoogle"
style="display:inline-block;width:728px;height:90px"
data-ad-client="ca-pub-1110845096909710"
data-ad-slot="7827588685"></ins>
<script>
(adsbygoogle = window.adsbygoogle || []).push({});
</script>-->
</body>
</html>