Логотип exploitDog
bind:"GHSA-jcj6-c96p-jcmm" OR bind:"CVE-2015-2808"
Консоль
Логотип exploitDog

exploitDog

bind:"GHSA-jcj6-c96p-jcmm" OR bind:"CVE-2015-2808"

Количество 27

Количество 27

github логотип

GHSA-jcj6-c96p-jcmm

около 3 лет назад

The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.

EPSS: Средний
ubuntu логотип

CVE-2015-2808

больше 10 лет назад

The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.

CVSS2: 5
EPSS: Средний
redhat логотип

CVE-2015-2808

больше 10 лет назад

The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.

CVSS2: 4.3
EPSS: Средний
nvd логотип

CVE-2015-2808

больше 10 лет назад

The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.

CVSS2: 5
EPSS: Средний
debian логотип

CVE-2015-2808

больше 10 лет назад

The RC4 algorithm, as used in the TLS protocol and SSL protocol, does ...

CVSS2: 5
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2015:1073-1

около 10 лет назад

Security update for java-1_7_0-ibm

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:1161-1

около 10 лет назад

Security update for java-1_6_0-ibm

EPSS: Низкий
oracle-oval логотип

ELSA-2015-1526

около 10 лет назад

ELSA-2015-1526: java-1.6.0-openjdk security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2015-1230

около 10 лет назад

ELSA-2015-1230: java-1.7.0-openjdk security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2015-1229

около 10 лет назад

ELSA-2015-1229: java-1.7.0-openjdk security update (CRITICAL)

EPSS: Низкий
oracle-oval логотип

ELSA-2015-1228

около 10 лет назад

ELSA-2015-1228: java-1.8.0-openjdk security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:1509-1

почти 10 лет назад

Security update for java-1_6_0-ibm

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:1345-1

около 10 лет назад

Security update for java-1_6_0-ibm

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:1331-1

около 10 лет назад

Security update for java-1_7_1-ibm

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:1329-1

около 10 лет назад

Security update for java-1_7_1-ibm

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:1375-1

около 10 лет назад

Security update for java-1_7_0-ibm

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:1320-1

около 10 лет назад

Security update for java-1_7_0-openjdk

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:1319-1

около 10 лет назад

Security update for java-1_7_0-openjdk

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:2192-1

больше 9 лет назад

Security update for java-1_6_0-ibm

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:2166-1

больше 9 лет назад

Security update for java-1_6_0-ibm

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
github логотип
GHSA-jcj6-c96p-jcmm

The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.

49%
Средний
около 3 лет назад
ubuntu логотип
CVE-2015-2808

The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.

CVSS2: 5
49%
Средний
больше 10 лет назад
redhat логотип
CVE-2015-2808

The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.

CVSS2: 4.3
49%
Средний
больше 10 лет назад
nvd логотип
CVE-2015-2808

The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.

CVSS2: 5
49%
Средний
больше 10 лет назад
debian логотип
CVE-2015-2808

The RC4 algorithm, as used in the TLS protocol and SSL protocol, does ...

CVSS2: 5
49%
Средний
больше 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:1073-1

Security update for java-1_7_0-ibm

около 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:1161-1

Security update for java-1_6_0-ibm

около 10 лет назад
oracle-oval логотип
ELSA-2015-1526

ELSA-2015-1526: java-1.6.0-openjdk security update (IMPORTANT)

около 10 лет назад
oracle-oval логотип
ELSA-2015-1230

ELSA-2015-1230: java-1.7.0-openjdk security update (IMPORTANT)

около 10 лет назад
oracle-oval логотип
ELSA-2015-1229

ELSA-2015-1229: java-1.7.0-openjdk security update (CRITICAL)

около 10 лет назад
oracle-oval логотип
ELSA-2015-1228

ELSA-2015-1228: java-1.8.0-openjdk security update (IMPORTANT)

около 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:1509-1

Security update for java-1_6_0-ibm

почти 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:1345-1

Security update for java-1_6_0-ibm

около 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:1331-1

Security update for java-1_7_1-ibm

около 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:1329-1

Security update for java-1_7_1-ibm

около 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:1375-1

Security update for java-1_7_0-ibm

около 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:1320-1

Security update for java-1_7_0-openjdk

около 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:1319-1

Security update for java-1_7_0-openjdk

около 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:2192-1

Security update for java-1_6_0-ibm

больше 9 лет назад
suse-cvrf логотип
SUSE-SU-2015:2166-1

Security update for java-1_6_0-ibm

больше 9 лет назад

Уязвимостей на страницу