Show filters
10 Total Results
Displaying 1-10 of 10
Sort by:
Attacker Value
Very Low
CVE-2020-10560
Disclosure Date: March 30, 2020 (last updated February 21, 2025)
An issue was discovered in Open Source Social Network (OSSN) through 5.3. A user-controlled file path with a weak cryptographic rand() can be used to read any file with the permissions of the webserver. This can lead to further compromise. The attacker must conduct a brute-force attack against the SiteKey to insert into a crafted URL for components/OssnComments/ossn_com.php and/or libraries/ossn.lib.upgrade.php.
0
Attacker Value
Unknown
CVE-2021-0131
Disclosure Date: June 09, 2021 (last updated February 22, 2025)
Use of cryptographically weak pseudo-random number generator (PRNG) in an API for the Intel(R) Security Library before version 3.3 may allow an authenticated user to potentially enable information disclosure via network access.
0
Attacker Value
Unknown
CVE-2021-3538
Disclosure Date: June 02, 2021 (last updated February 22, 2025)
A flaw was found in github.com/satori/go.uuid in versions from commit 0ef6afb2f6cdd6cdaeee3885a95099c63f18fc8c to d91630c8510268e75203009fe7daf2b8e1d60c45. Due to insecure randomness in the g.rand.Read function the generated UUIDs are predictable for an attacker.
0
Attacker Value
Unknown
CVE-2008-3280
Disclosure Date: May 21, 2021 (last updated February 22, 2025)
It was found that various OpenID Providers (OPs) had TLS Server Certificates that used weak keys, as a result of the Debian Predictable Random Number Generator (CVE-2008-0166). In combination with the DNS Cache Poisoning issue (CVE-2008-1447) and the fact that almost all SSL/TLS implementations do not consult CRLs (currently an untracked issue), this means that it is impossible to rely on these OPs.
0
Attacker Value
Unknown
CVE-2021-29245
Disclosure Date: May 05, 2021 (last updated February 22, 2025)
BTCPay Server through 1.0.7.0 uses a weak method Next to produce pseudo-random values to generate a legacy API key.
0
Attacker Value
Unknown
CVE-2021-23126
Disclosure Date: March 02, 2021 (last updated February 22, 2025)
An issue was discovered in Joomla! 3.2.0 through 3.9.24. Usage of the insecure rand() function within the process of generating the 2FA secret.
0
Attacker Value
Unknown
CVE-2019-14480
Disclosure Date: December 16, 2020 (last updated February 22, 2025)
AdRem NetCrunch 10.6.0.4587 has an Improper Session Handling vulnerability in the NetCrunch web client, which can lead to an authentication bypass or escalation of privileges.
0
Attacker Value
Unknown
CVE-2020-28924
Disclosure Date: November 19, 2020 (last updated February 22, 2025)
An issue was discovered in Rclone before 1.53.3. Due to the use of a weak random number generator, the password generator has been producing weak passwords with much less entropy than advertised. The suggested passwords depend deterministically on the time the second rclone was started. This limits the entropy of the passwords enormously. These passwords are often used in the crypt backend for encryption of data. It would be possible to make a dictionary of all possible passwords with about 38 million entries per password length. This would make decryption of secret material possible with a plausible amount of effort. NOTE: all passwords generated by affected versions should be changed.
0
Attacker Value
Unknown
CVE-2020-28642
Disclosure Date: November 16, 2020 (last updated February 22, 2025)
In InfiniteWP Admin Panel before 3.1.12.3, resetPasswordSendMail generates a weak password-reset code, which makes it easier for remote attackers to conduct admin Account Takeover attacks.
0
Attacker Value
Unknown
CVE-2020-11616
Disclosure Date: October 29, 2020 (last updated February 22, 2025)
NVIDIA DGX servers, all BMC firmware versions prior to 3.38.30, contain a vulnerability in the AMI BMC firmware in which the Pseudo-Random Number Generator (PRNG) algorithm used in the JSOL package that implements the IPMI protocol is not cryptographically strong, which may lead to information disclosure.
0