Total vulnerabilities in the database
RLPx 5 has two CTR streams based on the same key, IV, and nonce. This can facilitate decryption on a private network.
No technical information available.
CWEs:
OWASP TOP 10:
No affected software listed.