Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Communications_application_session_controller
(Oracle)Repositories |
• https://github.com/bcgit/bc-java
• https://github.com/openssl/openssl |
#Vulnerabilities | 19 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2013-03-15 | CVE-2013-2566 | The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext. | Ubuntu_linux, M10\-1_firmware, M10\-4_firmware, M10\-4s_firmware, Sparc_enterprise_m3000_firmware, Sparc_enterprise_m4000_firmware, Sparc_enterprise_m5000_firmware, Sparc_enterprise_m8000_firmware, Sparc_enterprise_m9000_firmware, Firefox, Firefox_esr, Seamonkey, Thunderbird, Thunderbird_esr, Communications_application_session_controller, Http_server, Integrated_lights_out_manager_firmware | 5.9 | ||
2017-05-04 | CVE-2017-3730 | In OpenSSL 1.1.0 before 1.1.0d, if a malicious server supplies bad parameters for a DHE or ECDHE key exchange then this can result in the client attempting to dereference a NULL pointer leading to a client crash. This could be exploited in a Denial of Service attack. | Openssl, Agile_engineering_data_management, Communications_application_session_controller, Communications_eagle_lnp_application_processor, Communications_operations_monitor, Jd_edwards_enterpriseone_tools, Jd_edwards_world_security | 7.5 |