Количество 2
Количество 2
CVE-2019-11808
Ratpack versions before 1.6.1 generate a session ID using a cryptographically weak PRNG in the JDK's ThreadLocalRandom. This means that if an attacker can determine a small window for the server start time and obtain a session ID value, they can theoretically determine the sequence of session IDs.
GHSA-54mg-vgrp-mwx9
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Ratpack
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2019-11808 Ratpack versions before 1.6.1 generate a session ID using a cryptographically weak PRNG in the JDK's ThreadLocalRandom. This means that if an attacker can determine a small window for the server start time and obtain a session ID value, they can theoretically determine the sequence of session IDs. | CVSS3: 3.7 | 0% Низкий | почти 7 лет назад | |
GHSA-54mg-vgrp-mwx9 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Ratpack | CVSS3: 3.7 | 0% Низкий | больше 6 лет назад |
Уязвимостей на страницу