Vulnerabilities > Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

DATE CVE VULNERABILITY TITLE RISK
2021-09-23 CVE-2021-22948 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Revive-Adserver Revive Adserver
Vulnerability in the generation of session IDs in revive-adserver < 5.3.0, based on the cryptographically insecure uniqid() PHP function.
network
low complexity
revive-adserver CWE-338
7.1
2021-08-30 CVE-2021-27913 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Acquia Mautic
The function mt_rand is used to generate session tokens, this function is cryptographically flawed due to its nature being one pseudorandomness, an attacker can take advantage of the cryptographically insecure nature of this function to enumerate session tokens for accounts that are not under his/her control This issue affects: Mautic Mautic versions prior to 3.3.4; versions prior to 4.0.0.
network
low complexity
acquia CWE-338
3.5
2021-08-11 CVE-2021-3047 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Paloaltonetworks Pan-Os
A cryptographically weak pseudo-random number generator (PRNG) is used during authentication to the Palo Alto Networks PAN-OS web interface.
network
high complexity
paloaltonetworks CWE-338
3.1
2021-08-06 CVE-2021-37553 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Jetbrains Youtrack
In JetBrains YouTrack before 2021.2.16363, an insecure PRNG was used.
network
low complexity
jetbrains CWE-338
7.5
2021-08-04 CVE-2021-3678 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Showdoc
showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
network
high complexity
showdoc CWE-338
5.9
2021-06-09 CVE-2021-0131 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Intel Secl-Dc
Use of cryptographically weak pseudo-random number generator (PRNG) in an API for the Intel(R) Security Library before version 3.3 may allow an authenticated user to potentially enable information disclosure via network access.
network
low complexity
intel CWE-338
6.5
2021-06-02 CVE-2021-3538 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Satori Uuid
A flaw was found in github.com/satori/go.uuid in versions from commit 0ef6afb2f6cdd6cdaeee3885a95099c63f18fc8c to d91630c8510268e75203009fe7daf2b8e1d60c45.
network
low complexity
satori CWE-338
critical
9.8
2021-05-05 CVE-2021-29245 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Btcpayserver Btcpay Server
BTCPay Server through 1.0.7.0 uses a weak method Next to produce pseudo-random values to generate a legacy API key.
network
low complexity
btcpayserver CWE-338
5.3
2021-03-04 CVE-2021-23126 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Joomla Joomla!
An issue was discovered in Joomla! 3.2.0 through 3.9.24.
network
low complexity
joomla CWE-338
5.3
2020-11-19 CVE-2020-28924 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in multiple products
An issue was discovered in Rclone before 1.53.3.
network
low complexity
rclone fedoraproject CWE-338
7.5