Логотип exploitDog
bind:CVE-2019-11808
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-11808

Количество 2

Количество 2

nvd логотип

CVE-2019-11808

почти 7 лет назад

Ratpack versions before 1.6.1 generate a session ID using a cryptographically weak PRNG in the JDK's ThreadLocalRandom. This means that if an attacker can determine a small window for the server start time and obtain a session ID value, they can theoretically determine the sequence of session IDs.

CVSS3: 3.7
EPSS: Низкий
github логотип

GHSA-54mg-vgrp-mwx9

больше 6 лет назад

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Ratpack

CVSS3: 3.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-11808

Ratpack versions before 1.6.1 generate a session ID using a cryptographically weak PRNG in the JDK's ThreadLocalRandom. This means that if an attacker can determine a small window for the server start time and obtain a session ID value, they can theoretically determine the sequence of session IDs.

CVSS3: 3.7
0%
Низкий
почти 7 лет назад
github логотип
GHSA-54mg-vgrp-mwx9

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Ratpack

CVSS3: 3.7
0%
Низкий
больше 6 лет назад

Уязвимостей на страницу