Количество 3
Количество 3
CVE-2008-5162
The arc4random function in the kernel in FreeBSD 6.3 through 7.1 does not have a proper entropy source for a short time period immediately after boot, which makes it easier for attackers to predict the function's return values and conduct certain attacks against the GEOM framework and various network protocols, related to the Yarrow random number generator.
CVE-2008-5162
The arc4random function in the kernel in FreeBSD 6.3 through 7.1 does ...
GHSA-9jr8-q773-x8pc
The arc4random function in the kernel in FreeBSD 6.3 through 7.1 does not have a proper entropy source for a short time period immediately after boot, which makes it easier for attackers to predict the function's return values and conduct certain attacks against the GEOM framework and various network protocols, related to the Yarrow random number generator.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2008-5162 The arc4random function in the kernel in FreeBSD 6.3 through 7.1 does not have a proper entropy source for a short time period immediately after boot, which makes it easier for attackers to predict the function's return values and conduct certain attacks against the GEOM framework and various network protocols, related to the Yarrow random number generator. | CVSS3: 7 | 0% Низкий | около 17 лет назад | |
CVE-2008-5162 The arc4random function in the kernel in FreeBSD 6.3 through 7.1 does ... | CVSS3: 7 | 0% Низкий | около 17 лет назад | |
GHSA-9jr8-q773-x8pc The arc4random function in the kernel in FreeBSD 6.3 through 7.1 does not have a proper entropy source for a short time period immediately after boot, which makes it easier for attackers to predict the function's return values and conduct certain attacks against the GEOM framework and various network protocols, related to the Yarrow random number generator. | CVSS3: 7 | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу