Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2017-0897

Summary
Assigner-hackerone
Assigner Org ID-36234546-b8fa-4601-9d6f-f4e334aa8ea1
Published At-22 Jun, 2017 | 21:00
Updated At-05 Aug, 2024 | 13:25
Rejected At-
Credits

ExpressionEngine version 2.x < 2.11.8 and version 3.x < 3.5.5 create an object signing token with weak entropy. Successfully guessing the token can lead to remote code execution.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:hackerone
Assigner Org ID:36234546-b8fa-4601-9d6f-f4e334aa8ea1
Published At:22 Jun, 2017 | 21:00
Updated At:05 Aug, 2024 | 13:25
Rejected At:
▼CVE Numbering Authority (CNA)

ExpressionEngine version 2.x < 2.11.8 and version 3.x < 3.5.5 create an object signing token with weak entropy. Successfully guessing the token can lead to remote code execution.

Affected Products
Vendor
EllisLab
Product
ExpressionEngine
Versions
Affected
  • Versions before 2.11.8 and 3.5.5
Problem Types
TypeCWE IDDescription
CWECWE-330Use of Insufficiently Random Values (CWE-330)
Type: CWE
CWE ID: CWE-330
Description: Use of Insufficiently Random Values (CWE-330)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/99242
vdb-entry
x_refsource_BID
https://docs.expressionengine.com/v2/about/changelog.html#version-2-11-8
x_refsource_CONFIRM
https://hackerone.com/reports/215890
x_refsource_MISC
https://docs.expressionengine.com/latest/about/changelog.html#version-3-5-5
x_refsource_CONFIRM
https://expressionengine.com/blog/expressionengine-3.5.5-and-2.11.8-released
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/99242
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://docs.expressionengine.com/v2/about/changelog.html#version-2-11-8
Resource:
x_refsource_CONFIRM
Hyperlink: https://hackerone.com/reports/215890
Resource:
x_refsource_MISC
Hyperlink: https://docs.expressionengine.com/latest/about/changelog.html#version-3-5-5
Resource:
x_refsource_CONFIRM
Hyperlink: https://expressionengine.com/blog/expressionengine-3.5.5-and-2.11.8-released
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/99242
vdb-entry
x_refsource_BID
x_transferred
https://docs.expressionengine.com/v2/about/changelog.html#version-2-11-8
x_refsource_CONFIRM
x_transferred
https://hackerone.com/reports/215890
x_refsource_MISC
x_transferred
https://docs.expressionengine.com/latest/about/changelog.html#version-3-5-5
x_refsource_CONFIRM
x_transferred
https://expressionengine.com/blog/expressionengine-3.5.5-and-2.11.8-released
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/99242
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://docs.expressionengine.com/v2/about/changelog.html#version-2-11-8
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://hackerone.com/reports/215890
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://docs.expressionengine.com/latest/about/changelog.html#version-3-5-5
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://expressionengine.com/blog/expressionengine-3.5.5-and-2.11.8-released
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:support@hackerone.com
Published At:22 Jun, 2017 | 21:29
Updated At:20 Apr, 2025 | 01:37

ExpressionEngine version 2.x < 2.11.8 and version 3.x < 3.5.5 create an object signing token with weak entropy. Successfully guessing the token can lead to remote code execution.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.07.5HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
Type: Primary
Version: 3.0
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N
CPE Matches

expressionengine
expressionengine
>>expressionengine>>2.0.0
cpe:2.3:a:expressionengine:expressionengine:2.0.0:public_beta:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.0.1
cpe:2.3:a:expressionengine:expressionengine:2.0.1:public_beta:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.0.2
cpe:2.3:a:expressionengine:expressionengine:2.0.2:public_beta:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.1.0
cpe:2.3:a:expressionengine:expressionengine:2.1.0:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.1.1
cpe:2.3:a:expressionengine:expressionengine:2.1.1:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.1.2
cpe:2.3:a:expressionengine:expressionengine:2.1.2:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.1.3
cpe:2.3:a:expressionengine:expressionengine:2.1.3:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.1.4
cpe:2.3:a:expressionengine:expressionengine:2.1.4:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.1.5
cpe:2.3:a:expressionengine:expressionengine:2.1.5:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.2.0
cpe:2.3:a:expressionengine:expressionengine:2.2.0:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.2.1
cpe:2.3:a:expressionengine:expressionengine:2.2.1:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.2.2
cpe:2.3:a:expressionengine:expressionengine:2.2.2:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.3.0
cpe:2.3:a:expressionengine:expressionengine:2.3.0:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.3.1
cpe:2.3:a:expressionengine:expressionengine:2.3.1:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.4.0
cpe:2.3:a:expressionengine:expressionengine:2.4.0:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.5.0
cpe:2.3:a:expressionengine:expressionengine:2.5.0:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.5.1
cpe:2.3:a:expressionengine:expressionengine:2.5.1:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.5.2
cpe:2.3:a:expressionengine:expressionengine:2.5.2:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.5.3
cpe:2.3:a:expressionengine:expressionengine:2.5.3:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.5.4
cpe:2.3:a:expressionengine:expressionengine:2.5.4:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.5.5
cpe:2.3:a:expressionengine:expressionengine:2.5.5:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.6.0
cpe:2.3:a:expressionengine:expressionengine:2.6.0:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.6.1
cpe:2.3:a:expressionengine:expressionengine:2.6.1:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.7.0
cpe:2.3:a:expressionengine:expressionengine:2.7.0:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.7.1
cpe:2.3:a:expressionengine:expressionengine:2.7.1:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.7.2
cpe:2.3:a:expressionengine:expressionengine:2.7.2:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.7.3
cpe:2.3:a:expressionengine:expressionengine:2.7.3:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.8.0
cpe:2.3:a:expressionengine:expressionengine:2.8.0:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.8.1
cpe:2.3:a:expressionengine:expressionengine:2.8.1:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.9.0
cpe:2.3:a:expressionengine:expressionengine:2.9.0:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.9.1
cpe:2.3:a:expressionengine:expressionengine:2.9.1:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.9.2
cpe:2.3:a:expressionengine:expressionengine:2.9.2:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.9.3
cpe:2.3:a:expressionengine:expressionengine:2.9.3:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.10.0
cpe:2.3:a:expressionengine:expressionengine:2.10.0:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.10.1
cpe:2.3:a:expressionengine:expressionengine:2.10.1:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.10.2
cpe:2.3:a:expressionengine:expressionengine:2.10.2:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.10.3
cpe:2.3:a:expressionengine:expressionengine:2.10.3:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.11.0
cpe:2.3:a:expressionengine:expressionengine:2.11.0:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.11.1
cpe:2.3:a:expressionengine:expressionengine:2.11.1:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.11.2
cpe:2.3:a:expressionengine:expressionengine:2.11.2:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.11.3
cpe:2.3:a:expressionengine:expressionengine:2.11.3:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.11.4
cpe:2.3:a:expressionengine:expressionengine:2.11.4:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.11.5
cpe:2.3:a:expressionengine:expressionengine:2.11.5:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.11.6
cpe:2.3:a:expressionengine:expressionengine:2.11.6:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>2.11.7
cpe:2.3:a:expressionengine:expressionengine:2.11.7:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>3.0.0
cpe:2.3:a:expressionengine:expressionengine:3.0.0:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>3.0.1
cpe:2.3:a:expressionengine:expressionengine:3.0.1:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>3.0.2
cpe:2.3:a:expressionengine:expressionengine:3.0.2:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>3.0.3
cpe:2.3:a:expressionengine:expressionengine:3.0.3:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>3.0.4
cpe:2.3:a:expressionengine:expressionengine:3.0.4:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-330Secondarysupport@hackerone.com
CWE-331Primarynvd@nist.gov
CWE ID: CWE-330
Type: Secondary
Source: support@hackerone.com
CWE ID: CWE-331
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.securityfocus.com/bid/99242support@hackerone.com
Third Party Advisory
VDB Entry
https://docs.expressionengine.com/latest/about/changelog.html#version-3-5-5support@hackerone.com
Vendor Advisory
https://docs.expressionengine.com/v2/about/changelog.html#version-2-11-8support@hackerone.com
Vendor Advisory
https://expressionengine.com/blog/expressionengine-3.5.5-and-2.11.8-releasedsupport@hackerone.com
Vendor Advisory
https://hackerone.com/reports/215890support@hackerone.com
Permissions Required
http://www.securityfocus.com/bid/99242af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
https://docs.expressionengine.com/latest/about/changelog.html#version-3-5-5af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://docs.expressionengine.com/v2/about/changelog.html#version-2-11-8af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://expressionengine.com/blog/expressionengine-3.5.5-and-2.11.8-releasedaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://hackerone.com/reports/215890af854a3a-2127-422b-91ae-364da2661108
Permissions Required
Hyperlink: http://www.securityfocus.com/bid/99242
Source: support@hackerone.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://docs.expressionengine.com/latest/about/changelog.html#version-3-5-5
Source: support@hackerone.com
Resource:
Vendor Advisory
Hyperlink: https://docs.expressionengine.com/v2/about/changelog.html#version-2-11-8
Source: support@hackerone.com
Resource:
Vendor Advisory
Hyperlink: https://expressionengine.com/blog/expressionengine-3.5.5-and-2.11.8-released
Source: support@hackerone.com
Resource:
Vendor Advisory
Hyperlink: https://hackerone.com/reports/215890
Source: support@hackerone.com
Resource:
Permissions Required
Hyperlink: http://www.securityfocus.com/bid/99242
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://docs.expressionengine.com/latest/about/changelog.html#version-3-5-5
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://docs.expressionengine.com/v2/about/changelog.html#version-2-11-8
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://expressionengine.com/blog/expressionengine-3.5.5-and-2.11.8-released
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://hackerone.com/reports/215890
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Permissions Required

Change History

0
Information is not available yet

Similar CVEs

78Records found

CVE-2019-18850
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.36% / 57.69%
||
7 Day CHG~0.00%
Published-04 Dec, 2019 | 12:42
Updated-05 Aug, 2024 | 02:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TrevorC2 v1.1/v1.2 fails to prevent fingerprinting primarily via a discrepancy between response headers when responding to different HTTP methods, also via predictible responses when accessing and interacting with the "SITE_PATH_QUERY".

Action-Not Available
Vendor-trustedsecn/a
Product-trevorc2n/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CWE ID-CWE-203
Observable Discrepancy
CVE-2019-18282
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.39% / 59.38%
||
7 Day CHG~0.00%
Published-16 Jan, 2020 | 15:22
Updated-05 Aug, 2024 | 01:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The flow_dissector feature in the Linux kernel 4.3 through 5.x before 5.3.10 has a device tracking vulnerability, aka CID-55667441c84f. This occurs because the auto flowlabel of a UDP IPv6 packet relies on a 32-bit hashrnd value as a secret, and because jhash (instead of siphash) is used. The hashrnd value remains the same starting from boot time, and can be inferred by an attacker. This affects net/core/flow_dissector.c and related code.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncNetApp, Inc.Debian GNU/Linux
Product-a700s_firmwarea400_firmwarecloud_backupactive_iq_unified_managerh610s_firmware8300_firmwaresolidfiresteelstore_cloud_integrated_storageh610s8300debian_linux8700linux_kernela400hci_management_nodee-series_santricity_os_controllera700s8700_firmwaredata_availability_servicesn/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2019-17105
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 19.00%
||
7 Day CHG~0.00%
Published-08 Oct, 2019 | 14:35
Updated-05 Aug, 2024 | 01:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The token generator in index.php in Centreon Web before 2.8.27 is predictable.

Action-Not Available
Vendor-n/aCENTREON
Product-centreon_webn/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2019-15847
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.49% / 64.70%
||
7 Day CHG~0.00%
Published-02 Sep, 2019 | 22:03
Updated-05 Aug, 2024 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same.

Action-Not Available
Vendor-n/aGNUopenSUSE
Product-gccleapn/a
CWE ID-CWE-331
Insufficient Entropy
CVE-2019-16674
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.45% / 62.57%
||
7 Day CHG~0.00%
Published-06 Dec, 2019 | 17:09
Updated-05 Aug, 2024 | 01:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Authentication Information used in a cookie is predictable and can lead to admin password compromise when captured on the network.

Action-Not Available
Vendor-weidmuellern/a
Product-ie-sw-pl18mt-2gc14tx2stie-sw-pl18mt-2gc14tx2st_firmwareie-sw-pl16mt-16tx_firmwareie-sw-pl10m-1gt-2gs-7tx_firmwareie-sw-pl08m-8txie-sw-vl05mt-3tx-2scie-sw-vl05mt-3tx-2sc_firmwareie-sw-pl18m-2gc14tx2scie-sw-vl05mt-5txie-sw-pl08m-6tx-2st_firmwareie-sw-vl08mt-6tx-2stie-sw-pl18m-2gc14tx2scsie-sw-pl08mt-8txie-sw-pl18mt-2gc14tx2scsie-sw-pl16mt-14tx-2stie-sw-vl05m-5txie-sw-pl16mt-16txie-sw-pl16mt-14tx-2sc_firmwareie-sw-pl18m-2gc14tx2scs_firmwareie-sw-pl08mt-6tx-2st_firmwareie-sw-pl16m-16tx_firmwareie-sw-vl08mt-6tx-2scsie-sw-pl10m-3gt-7tx_firmwareie-sw-vl05m-3tx-2sc_firmwareie-sw-pl08m-6tx-2sc_firmwareie-sw-pl08m-6tx-2stie-sw-pl08m-8tx_firmwareie-sw-pl08m-6tx-2scs_firmwareie-sw-pl09m-5gc-4gtie-sw-pl18m-2gc-16tx_firmwareie-sw-vl08mt-6tx-2sc_firmwareie-sw-pl09mt-5gc-4gtie-sw-vl05m-3tx-2st_firmwareie-sw-vl08mt-6tx-2scie-sw-pl18mt-2gc-16tx_firmwareie-sw-pl10m-3gt-7txie-sw-pl16m-16txie-sw-pl10mt-3gt-7txie-sw-pl08mt-6tx-2sc_firmwareie-sw-pl08mt-6tx-2scie-sw-pl18mt-2gc14tx2scs_firmwareie-sw-pl08mt-8tx_firmwareie-sw-pl18mt-2gc-16txie-sw-pl16m-14tx-2stie-sw-pl18m-2gc14tx2stie-sw-vl05mt-3tx-2st_firmwareie-sw-pl16m-14tx-2scie-sw-pl18m-2gc-16txie-sw-vl08mt-5tx-1sc-2scsie-sw-pl16mt-14tx-2st_firmwareie-sw-pl18m-2gc14tx2sc_firmwareie-sw-pl10mt-1gt-2gs-7tx_firmwareie-sw-pl08m-6tx-2scie-sw-pl08m-6tx-2scsie-sw-pl09m-5gc-4gt_firmwareie-sw-vl08mt-6tx-2st_firmwareie-sw-pl08mt-6tx-2stie-sw-pl16mt-14tx-2scie-sw-pl18m-2gc14tx2st_firmwareie-sw-vl08mt-5tx-3sc_firmwareie-sw-pl10mt-3gt-7tx_firmwareie-sw-pl18mt-2gc14tx2sc_firmwareie-sw-pl09mt-5gc-4gt_firmwareie-sw-pl16m-14tx-2sc_firmwareie-sw-vl05mt-5tx_firmwareie-sw-pl10m-1gt-2gs-7txie-sw-vl08mt-6tx-2scs_firmwareie-sw-pl10mt-1gt-2gs-7txie-sw-vl05m-3tx-2scie-sw-vl08mt-8tx_firmwareie-sw-pl18mt-2gc14tx2scie-sw-vl08mt-8txie-sw-pl08mt-6tx-2scsie-sw-pl16m-14tx-2st_firmwareie-sw-vl05mt-3tx-2stie-sw-vl08mt-5tx-3scie-sw-vl08mt-5tx-1sc-2scs_firmwareie-sw-vl05m-3tx-2stie-sw-pl08mt-6tx-2scs_firmwareie-sw-vl05m-5tx_firmwaren/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2019-14806
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.22% / 45.00%
||
7 Day CHG~0.00%
Published-09 Aug, 2019 | 14:29
Updated-05 Aug, 2024 | 00:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Pallets Werkzeug before 0.15.3, when used with Docker, has insufficient debugger PIN randomness because Docker containers share the same machine id.

Action-Not Available
Vendor-palletsprojectsn/aopenSUSE
Product-werkzeugleapn/a
CWE ID-CWE-331
Insufficient Entropy
CVE-2019-1549
Matching Score-4
Assigner-OpenSSL Software Foundation
ShareView Details
Matching Score-4
Assigner-OpenSSL Software Foundation
CVSS Score-5.3||MEDIUM
EPSS-1.04% / 76.51%
||
7 Day CHG~0.00%
Published-10 Sep, 2019 | 16:58
Updated-16 Sep, 2024 | 22:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Fork Protection

OpenSSL 1.1.1 introduced a rewritten random number generator (RNG). This was intended to include protection in the event of a fork() system call in order to ensure that the parent and child processes did not share the same RNG state. However this protection was not being used in the default case. A partial mitigation for this issue is that the output from a high precision timer is mixed into the RNG state so the likelihood of a parent and child process sharing state is significantly reduced. If an application already calls OPENSSL_init_crypto() explicitly using OPENSSL_INIT_ATFORK then this problem does not occur at all. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c).

Action-Not Available
Vendor-OpenSSL
Product-opensslOpenSSL
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2019-11641
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.27% / 49.68%
||
7 Day CHG~0.00%
Published-01 May, 2019 | 17:58
Updated-04 Aug, 2024 | 23:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Anomali Agave (formerly Drupot) through 1.0.0 fails to avoid fingerprinting by including predictable data and minimal variation in size within HTML templates, giving attackers the ability to detect and avoid this system.

Action-Not Available
Vendor-anomalin/a
Product-agaven/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2018-20025
Matching Score-4
Assigner-Kaspersky
ShareView Details
Matching Score-4
Assigner-Kaspersky
CVSS Score-7.5||HIGH
EPSS-1.54% / 80.59%
||
7 Day CHG~0.00%
Published-19 Feb, 2019 | 21:00
Updated-16 Sep, 2024 | 18:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use of Insufficiently Random Values exists in CODESYS V3 products versions prior V3.5.14.0.

Action-Not Available
Vendor-Kaspersky LabCODESYS GmbH
Product-control_rte_sl_\(for_beckhoff_cx\)development_systemcontrol_for_pfc200_slhmi_slcontrol_for_pfc100_slgatewaycontrol_for_iot2000_slcontrol_for_raspberry_pi_slcontrol_for_beaglebone_slcontrol_rte_slsafety_sil2control_for_empc-a\/imx6_slcontrol_runtime_toolkitcontrol_win_slcontrol_for_linux_slCODESYS V3 products
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2022-23138
Matching Score-4
Assigner-ZTE Corporation
ShareView Details
Matching Score-4
Assigner-ZTE Corporation
CVSS Score-7.5||HIGH
EPSS-0.40% / 59.85%
||
7 Day CHG~0.00%
Published-09 Jun, 2022 | 14:34
Updated-03 Aug, 2024 | 03:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ZTE's MF297D product has cryptographic issues vulnerability. Due to the use of weak random values, the security of the device is reduced, and it may face the risk of attack.

Action-Not Available
Vendor-n/aZTE Corporation
Product-mf297dmf297d_firmwareMF297D
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2018-18602
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.34% / 56.35%
||
7 Day CHG~0.00%
Published-31 Dec, 2018 | 16:00
Updated-06 May, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Cloud API on Guardzilla smart cameras allows user enumeration, with resultant arbitrary camera access and monitoring.

Action-Not Available
Vendor-guardzillan/a
Product-outdoor_hd_cameraindoor_hd_camera_firmwareindoor_hd_camera360_indoor180_outdoor_firmware180_indoor_firmware360_outdoor180_indoor180_outdooroutdoor_hd_camera_firmware360_outdoor_firmware360_indoor_firmwaren/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2018-18326
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-76.54% / 98.90%
||
7 Day CHG~0.00%
Published-03 Jul, 2019 | 16:39
Updated-05 Aug, 2024 | 11:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DNN (aka DotNetNuke) 9.2 through 9.2.2 incorrectly converts encryption key source values, resulting in lower than expected entropy. NOTE: this issue exists because of an incomplete fix for CVE-2018-15812.

Action-Not Available
Vendor-n/aESW Operations, LLC ("DNN Software")
Product-dotnetnuken/a
CWE ID-CWE-331
Insufficient Entropy
CVE-2018-18531
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.36% / 57.39%
||
7 Day CHG~0.00%
Published-19 Oct, 2018 | 20:00
Updated-17 Sep, 2024 | 04:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

text/impl/DefaultTextCreator.java, text/impl/ChineseTextProducer.java, and text/impl/FiveLetterFirstNameTextCreator.java in kaptcha 2.3.2 use the Random (rather than SecureRandom) function for generating CAPTCHA values, which makes it easier for remote attackers to bypass intended access restrictions via a brute-force approach.

Action-Not Available
Vendor-kaptcha_projectn/a
Product-kaptchan/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2018-18375
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.35% / 56.95%
||
7 Day CHG~0.00%
Published-16 Oct, 2018 | 01:00
Updated-16 Sep, 2024 | 18:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

goform/getProfileList in Orange AirBox Y858_FL_01.16_04 allows attackers to extract APN data (name, number, username, and password) via the rand parameter.

Action-Not Available
Vendor-orangen/a
Product-airbox_firmwareairboxn/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2018-15812
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-82.37% / 99.18%
||
7 Day CHG~0.00%
Published-03 Jul, 2019 | 16:35
Updated-05 Aug, 2024 | 10:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DNN (aka DotNetNuke) 9.2 through 9.2.1 incorrectly converts encryption key source values, resulting in lower than expected entropy.

Action-Not Available
Vendor-n/aESW Operations, LLC ("DNN Software")
Product-dotnetnuken/a
CWE ID-CWE-331
Insufficient Entropy
CVE-2021-45458
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-7.5||HIGH
EPSS-0.65% / 69.88%
||
7 Day CHG~0.00%
Published-06 Jan, 2022 | 12:35
Updated-04 Aug, 2024 | 04:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Hardcoded credentials

Apache Kylin provides encryption classes PasswordPlaceholderConfigurer to help users encrypt their passwords. In the encryption algorithm used by this encryption class, the cipher is initialized with a hardcoded key and IV. If users use class PasswordPlaceholderConfigurer to encrypt their password and configure it into kylin's configuration file, there is a risk that the password may be decrypted. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.

Action-Not Available
Vendor-The Apache Software Foundation
Product-kylinApache Kylin
CWE ID-CWE-798
Use of Hard-coded Credentials
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2021-45488
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.32% / 54.66%
||
7 Day CHG~0.00%
Published-25 Dec, 2021 | 01:03
Updated-04 Aug, 2024 | 04:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In NetBSD through 9.2, there is an information leak in the TCP ISN (ISS) generation algorithm.

Action-Not Available
Vendor-n/aNetBSD
Product-netbsdn/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2018-1000620
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.37% / 58.24%
||
7 Day CHG~0.00%
Published-09 Jul, 2018 | 20:00
Updated-16 Sep, 2024 | 18:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Eran Hammer cryptiles version 4.1.1 earlier contains a CWE-331: Insufficient Entropy vulnerability in randomDigits() method that can result in An attacker is more likely to be able to brute force something that was supposed to be random.. This attack appear to be exploitable via Depends upon the calling application.. This vulnerability appears to have been fixed in 4.1.2.

Action-Not Available
Vendor-cryptiles_projectn/a
Product-cryptilesn/a
CWE ID-CWE-331
Insufficient Entropy
CVE-2021-44151
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.40% / 59.98%
||
7 Day CHG~0.00%
Published-13 Dec, 2021 | 00:00
Updated-30 Apr, 2025 | 21:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Reprise RLM 14.2. As the session cookies are small, an attacker can hijack any existing sessions by bruteforcing the 4 hex-character session cookie on the Windows version (the Linux version appears to have 8 characters). An attacker can obtain the static part of the cookie (cookie name) by first making a request to any page on the application (e.g., /goforms/menu) and saving the name of the cookie sent with the response. The attacker can then use the name of the cookie and try to request that same page, setting a random value for the cookie. If any user has an active session, the page should return with the authorized content, when a valid cookie value is hit.

Action-Not Available
Vendor-reprisesoftwaren/a
Product-reprise_license_managern/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2018-10240
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.3||HIGH
EPSS-1.35% / 79.34%
||
7 Day CHG~0.00%
Published-16 May, 2018 | 14:00
Updated-05 Aug, 2024 | 07:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SolarWinds Serv-U MFT before 15.1.6 HFv1 assigns authenticated users a low-entropy session token that can be included in requests to the application as a URL parameter in lieu of a session cookie. This session token's value can be brute-forced by an attacker to obtain the corresponding session cookie and hijack the user's session.

Action-Not Available
Vendor-n/aSolarWinds Worldwide, LLC.
Product-serv-un/a
CWE ID-CWE-331
Insufficient Entropy
CVE-2021-41694
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.35% / 56.95%
||
7 Day CHG~0.00%
Published-09 Dec, 2021 | 15:22
Updated-04 Aug, 2024 | 03:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Incorrect Access Control vulnerability exists in Premiumdatingscript 4.2.7.7 via the password change procedure in requests\user.php.

Action-Not Available
Vendor-globaldatingsoftwaren/a
Product-premiumdatingscriptn/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2017-7905
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-0.20% / 41.74%
||
7 Day CHG~0.00%
Published-30 Jun, 2017 | 02:35
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Weak Cryptography for Passwords issue was discovered in General Electric (GE) Multilin SR 750 Feeder Protection Relay, firmware versions prior to Version 7.47; SR 760 Feeder Protection Relay, firmware versions prior to Version 7.47; SR 469 Motor Protection Relay, firmware versions prior to Version 5.23; SR 489 Generator Protection Relay, firmware versions prior to Version 4.06; SR 745 Transformer Protection Relay, firmware versions prior to Version 5.23; SR 369 Motor Protection Relay, all firmware versions; Multilin Universal Relay, firmware Version 6.0 and prior versions; and Multilin URplus (D90, C90, B95), all versions. Ciphertext versions of user passwords were created with a non-random initialization vector leaving them susceptible to dictionary attacks. Ciphertext of user passwords can be obtained from the front LCD panel of affected products and through issued Modbus commands.

Action-Not Available
Vendor-gen/a
Product-multilin_sr_489_generator_protection_relay_firmwaremultilin_sr_469_motor_protection_relay_firmwaremultilin_sr_745_transformer_protection_relaymultilin_urplus_b95_firmwaremultilin_urplus_d90multilin_urplus_c90multilin_sr_750_feeder_protection_relay_firmwaremultilin_urplus_d90_firmwaremultilin_sr_760_feeder_protection_relay_firmwaremultilin_sr_369_motor_protection_relaymultilin_sr_760_feeder_protection_relaymultilin_sr_469_motor_protection_relaymultilin_sr_369_motor_protection_relay_firmwaremultilin_sr_750_feeder_protection_relaymultilin_universal_relay_firmwaremultilin_sr_745_transformer_protection_relay_firmwaremultilin_urplus_c90_firmwaremultilin_universal_relaymultilin_urplus_b95multilin_sr_489_generator_protection_relayGE Multilin SR, UR, and URplus Protective Relays
CWE ID-CWE-261
Weak Encoding for Password
CWE ID-CWE-326
Inadequate Encryption Strength
CWE ID-CWE-330
Use of Insufficiently Random Values
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2017-16031
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-7.5||HIGH
EPSS-0.41% / 60.23%
||
7 Day CHG~0.00%
Published-04 Jun, 2018 | 19:00
Updated-16 Sep, 2024 | 21:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Socket.io is a realtime application framework that provides communication via websockets. Because socket.io 0.9.6 and earlier depends on `Math.random()` to create socket IDs, the IDs are predictable. An attacker is able to guess the socket ID and gain access to socket.io servers, potentially obtaining sensitive information.

Action-Not Available
Vendor-socketHackerOne
Product-socket.iosocket.io node module
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2017-16028
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-5.3||MEDIUM
EPSS-0.41% / 60.39%
||
7 Day CHG~0.00%
Published-04 Jun, 2018 | 19:00
Updated-17 Sep, 2024 | 02:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

react-native-meteor-oauth is a library for Oauth2 login to a Meteor server in React Native. The oauth Random Token is generated using a non-cryptographically strong RNG (Math.random()).

Action-Not Available
Vendor-randomatic_projectHackerOne
Product-randomaticreact-native-meteor-oauth node module
CWE ID-CWE-330
Use of Insufficiently Random Values
CWE ID-CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
CVE-2021-26909
Matching Score-4
Assigner-Rapid7, Inc.
ShareView Details
Matching Score-4
Assigner-Rapid7, Inc.
CVSS Score-3.7||LOW
EPSS-0.20% / 42.58%
||
7 Day CHG~0.00%
Published-23 Apr, 2021 | 15:35
Updated-16 Sep, 2024 | 22:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Automox Agent Guessable S3 Bucket Endpoint

Automox Agent prior to version 31 uses an insufficiently protected S3 bucket endpoint for storing sensitive files, which could be brute-forced by an attacker to subvert an organization's security program. The issue has since been fixed in version 31 of the Automox Agent.

Action-Not Available
Vendor-automoxAutomox
Product-automoxAutomox Agent
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2021-26098
Matching Score-4
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-4
Assigner-Fortinet, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.31% / 53.26%
||
7 Day CHG~0.00%
Published-04 Aug, 2021 | 13:20
Updated-25 Oct, 2024 | 13:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An instance of small space of random values in the RPC API of FortiSandbox before 4.0.0 may allow an attacker in possession of a few information pieces about the state of the device to possibly predict valid session IDs.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortisandboxFortinet FortiSandbox
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2020-8792
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.23% / 45.95%
||
7 Day CHG~0.00%
Published-04 May, 2020 | 13:34
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The OKLOK (3.1.1) mobile companion app for Fingerprint Bluetooth Padlock FB50 (2.3) has an information-exposure issue. In the mobile app, an attempt to add an already-bound lock by its barcode reveals the email address of the account to which the lock is bound, as well as the name of the lock. Valid barcode inputs can be easily guessed because barcode strings follow a predictable pattern. Correctly guessed valid barcode inputs entered through the app interface disclose arbitrary users' email addresses and lock names.

Action-Not Available
Vendor-oklok_projectn/a
Product-oklokn/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2020-4188
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.16% / 37.73%
||
7 Day CHG~0.00%
Published-23 Jun, 2020 | 18:05
Updated-17 Sep, 2024 | 03:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Security Guardium 10.6 and 11.1 may use insufficiently random numbers or values in a security context that depends on unpredictable numbers. IBM X-Force ID: 174807.

Action-Not Available
Vendor-IBM Corporation
Product-security_guardiumSecurity Guardium
CWE ID-CWE-330
Use of Insufficiently Random Values
  • Previous
  • 1
  • 2
  • Next
Details not found