Описание
Описание отсутствует
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 3.5.2-0ubuntu27.1 |
devel | released | 3.5.7-1ubuntu23 |
edgy | released | 3.5.5-0ubuntu3.5 |
feisty | released | 3.5.6-0ubuntu20.2 |
upstream | needs-triage |
Показывать по
Ссылки на источники
7.5 High
CVSS2
Связанные уязвимости
KDM in KDE 3.1.3 and earlier uses a weak session cookie generation algorithm that does not provide 128 bits of entropy, which allows attackers to guess session cookies via brute force methods and gain access to the user session.
KDM in KDE 3.1.3 and earlier uses a weak session cookie generation algorithm that does not provide 128 bits of entropy, which allows attackers to guess session cookies via brute force methods and gain access to the user session.
KDM in KDE 3.1.3 and earlier uses a weak session cookie generation alg ...
KDM in KDE 3.1.3 and earlier uses a weak session cookie generation algorithm that does not provide 128 bits of entropy, which allows attackers to guess session cookies via brute force methods and gain access to the user session.
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
7.5 High
CVSS2