Логотип exploitDog
bind:CVE-2012-2681
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2012-2681

Количество 3

Количество 3

redhat логотип

CVE-2012-2681

больше 13 лет назад

Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, uses predictable random numbers to generate session keys, which makes it easier for remote attackers to guess the session key.

CVSS2: 5.8
EPSS: Низкий
nvd логотип

CVE-2012-2681

больше 13 лет назад

Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, uses predictable random numbers to generate session keys, which makes it easier for remote attackers to guess the session key.

CVSS2: 5.8
EPSS: Низкий
github логотип

GHSA-w3x9-vw38-f9cq

больше 3 лет назад

Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, uses predictable random numbers to generate session keys, which makes it easier for remote attackers to guess the session key.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2012-2681

Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, uses predictable random numbers to generate session keys, which makes it easier for remote attackers to guess the session key.

CVSS2: 5.8
1%
Низкий
больше 13 лет назад
nvd логотип
CVE-2012-2681

Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, uses predictable random numbers to generate session keys, which makes it easier for remote attackers to guess the session key.

CVSS2: 5.8
1%
Низкий
больше 13 лет назад
github логотип
GHSA-w3x9-vw38-f9cq

Cumin before 0.1.5444, as used in Red Hat Enterprise Messaging, Realtime, and Grid (MRG) 2.0, uses predictable random numbers to generate session keys, which makes it easier for remote attackers to guess the session key.

1%
Низкий
больше 3 лет назад

Уязвимостей на страницу