Количество 11
Количество 11
CVE-2017-2626
It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.
CVE-2017-2626
It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.
CVE-2017-2626
It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.
CVE-2017-2626
It was discovered that libICE before 1.0.9-8 used a weak entropy to ge ...
openSUSE-SU-2017:1801-1
Security update for libICE
SUSE-SU-2018:0337-1
Security update for libICE
SUSE-SU-2017:1848-1
Security update for xorg-x11-libICE
SUSE-SU-2017:1835-1
Security update for libICE
GHSA-jqp9-hwjj-p328
It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list.
BDU:2019-00428
Уязвимость библиотеки межклиентского обмена данными (ICE) X11 libICE, связанная с использованием слабого источника энтропии при генерации ключей, позволяющая нарушителю перехватить сеанс
ELSA-2017-1865
ELSA-2017-1865: X.org X11 libraries security, bug fix and enhancement update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2017-2626 It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list. | CVSS3: 5.2 | 0% Низкий | больше 7 лет назад | |
CVE-2017-2626 It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list. | CVSS3: 5.2 | 0% Низкий | больше 8 лет назад | |
CVE-2017-2626 It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list. | CVSS3: 5.2 | 0% Низкий | больше 7 лет назад | |
CVE-2017-2626 It was discovered that libICE before 1.0.9-8 used a weak entropy to ge ... | CVSS3: 5.2 | 0% Низкий | больше 7 лет назад | |
openSUSE-SU-2017:1801-1 Security update for libICE | 0% Низкий | больше 8 лет назад | ||
SUSE-SU-2018:0337-1 Security update for libICE | 0% Низкий | почти 8 лет назад | ||
SUSE-SU-2017:1848-1 Security update for xorg-x11-libICE | 0% Низкий | больше 8 лет назад | ||
SUSE-SU-2017:1835-1 Security update for libICE | 0% Низкий | больше 8 лет назад | ||
GHSA-jqp9-hwjj-p328 It was discovered that libICE before 1.0.9-8 used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list. | CVSS3: 5.5 | 0% Низкий | больше 3 лет назад | |
BDU:2019-00428 Уязвимость библиотеки межклиентского обмена данными (ICE) X11 libICE, связанная с использованием слабого источника энтропии при генерации ключей, позволяющая нарушителю перехватить сеанс | CVSS3: 5.5 | 0% Низкий | больше 8 лет назад | |
ELSA-2017-1865 ELSA-2017-1865: X.org X11 libraries security, bug fix and enhancement update (MODERATE) | больше 8 лет назад |
Уязвимостей на страницу