Vulnerabilities > Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-02-04 | CVE-2013-20003 | Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Silabs products Z-Wave devices from Sierra Designs (circa 2013) and Silicon Labs (using S0 security) may use a known, shared network key of all zeros, allowing an attacker within radio range to spoof Z-Wave traffic. | 7.9 |
2022-01-25 | CVE-2021-43799 | Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Zulip Zulip is an open-source team collaboration tool. | 5.0 |
2021-12-25 | CVE-2021-45484 | Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Netbsd In NetBSD through 9.2, the IPv6 fragment ID generation algorithm employs a weak cryptographic PRNG. | 7.5 |
2021-12-25 | CVE-2021-45489 | Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Netbsd In NetBSD through 9.2, the IPv6 Flow Label generation algorithm employs a weak cryptographic PRNG. | 5.0 |
2021-12-01 | CVE-2021-3990 | Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Showdoc showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) | 4.3 |
2021-10-27 | CVE-2011-4574 | Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Polarssl PolarSSL versions prior to v1.1 use the HAVEGE random number generation algorithm. | 7.5 |
2021-09-23 | CVE-2021-22948 | Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Revive-Adserver Revive Adserver Vulnerability in the generation of session IDs in revive-adserver < 5.3.0, based on the cryptographically insecure uniqid() PHP function. | 7.1 |
2021-08-30 | CVE-2021-27913 | Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Acquia Mautic The function mt_rand is used to generate session tokens, this function is cryptographically flawed due to its nature being one pseudorandomness, an attacker can take advantage of the cryptographically insecure nature of this function to enumerate session tokens for accounts that are not under his/her control This issue affects: Mautic Mautic versions prior to 3.3.4; versions prior to 4.0.0. | 3.5 |
2021-08-06 | CVE-2021-37553 | Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Jetbrains Youtrack In JetBrains YouTrack before 2021.2.16363, an insecure PRNG was used. | 5.0 |
2021-08-04 | CVE-2021-3678 | Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Showdoc showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) | 4.3 |