Количество 27
Количество 27
GHSA-jcj6-c96p-jcmm
The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.

CVE-2015-2808
The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.

CVE-2015-2808
The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.

CVE-2015-2808
The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.
CVE-2015-2808
The RC4 algorithm, as used in the TLS protocol and SSL protocol, does ...

SUSE-SU-2015:1073-1
Security update for java-1_7_0-ibm

SUSE-SU-2015:1161-1
Security update for java-1_6_0-ibm
ELSA-2015-1526
ELSA-2015-1526: java-1.6.0-openjdk security update (IMPORTANT)
ELSA-2015-1230
ELSA-2015-1230: java-1.7.0-openjdk security update (IMPORTANT)
ELSA-2015-1229
ELSA-2015-1229: java-1.7.0-openjdk security update (CRITICAL)
ELSA-2015-1228
ELSA-2015-1228: java-1.8.0-openjdk security update (IMPORTANT)

SUSE-SU-2015:1509-1
Security update for java-1_6_0-ibm

SUSE-SU-2015:1345-1
Security update for java-1_6_0-ibm

SUSE-SU-2015:1331-1
Security update for java-1_7_1-ibm

SUSE-SU-2015:1329-1
Security update for java-1_7_1-ibm

SUSE-SU-2015:1375-1
Security update for java-1_7_0-ibm

SUSE-SU-2015:1320-1
Security update for java-1_7_0-openjdk

SUSE-SU-2015:1319-1
Security update for java-1_7_0-openjdk

SUSE-SU-2015:2192-1
Security update for java-1_6_0-ibm

SUSE-SU-2015:2166-1
Security update for java-1_6_0-ibm
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-jcj6-c96p-jcmm The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue. | 49% Средний | около 3 лет назад | ||
![]() | CVE-2015-2808 The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue. | CVSS2: 5 | 49% Средний | больше 10 лет назад |
![]() | CVE-2015-2808 The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue. | CVSS2: 4.3 | 49% Средний | больше 10 лет назад |
![]() | CVE-2015-2808 The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue. | CVSS2: 5 | 49% Средний | больше 10 лет назад |
CVE-2015-2808 The RC4 algorithm, as used in the TLS protocol and SSL protocol, does ... | CVSS2: 5 | 49% Средний | больше 10 лет назад | |
![]() | SUSE-SU-2015:1073-1 Security update for java-1_7_0-ibm | около 10 лет назад | ||
![]() | SUSE-SU-2015:1161-1 Security update for java-1_6_0-ibm | около 10 лет назад | ||
ELSA-2015-1526 ELSA-2015-1526: java-1.6.0-openjdk security update (IMPORTANT) | около 10 лет назад | |||
ELSA-2015-1230 ELSA-2015-1230: java-1.7.0-openjdk security update (IMPORTANT) | около 10 лет назад | |||
ELSA-2015-1229 ELSA-2015-1229: java-1.7.0-openjdk security update (CRITICAL) | около 10 лет назад | |||
ELSA-2015-1228 ELSA-2015-1228: java-1.8.0-openjdk security update (IMPORTANT) | около 10 лет назад | |||
![]() | SUSE-SU-2015:1509-1 Security update for java-1_6_0-ibm | почти 10 лет назад | ||
![]() | SUSE-SU-2015:1345-1 Security update for java-1_6_0-ibm | около 10 лет назад | ||
![]() | SUSE-SU-2015:1331-1 Security update for java-1_7_1-ibm | около 10 лет назад | ||
![]() | SUSE-SU-2015:1329-1 Security update for java-1_7_1-ibm | около 10 лет назад | ||
![]() | SUSE-SU-2015:1375-1 Security update for java-1_7_0-ibm | около 10 лет назад | ||
![]() | SUSE-SU-2015:1320-1 Security update for java-1_7_0-openjdk | около 10 лет назад | ||
![]() | SUSE-SU-2015:1319-1 Security update for java-1_7_0-openjdk | около 10 лет назад | ||
![]() | SUSE-SU-2015:2192-1 Security update for java-1_6_0-ibm | больше 9 лет назад | ||
![]() | SUSE-SU-2015:2166-1 Security update for java-1_6_0-ibm | больше 9 лет назад |
Уязвимостей на страницу