Vulnerabilities > Use of Insufficiently Random Values

DATE CVE VULNERABILITY TITLE RISK
2018-03-27 CVE-2018-1266 Use of Insufficiently Random Values vulnerability in Cloudfoundry Capi-Release
Cloud Foundry Cloud Controller, versions prior to 1.52.0, contains information disclosure and path traversal vulnerabilities.
network
low complexity
cloudfoundry CWE-330
8.1
2018-02-19 CVE-2017-16924 Use of Insufficiently Random Values vulnerability in Zohocorp Manageengine Desktop Central 10.0.137
Remote Information Disclosure and Escalation of Privileges in ManageEngine Desktop Central MSP 10.0.137 allows attackers to download unencrypted XML files containing all data for configuration policies via a predictable /client-data/<client_id>/collections/##/usermgmt.xml URL, as demonstrated by passwords and Wi-Fi keys.
network
low complexity
zohocorp CWE-330
critical
9.8
2018-01-31 CVE-2017-15654 Use of Insufficiently Random Values vulnerability in Asus Asuswrt 3.0.0.4.378/3.0.0.4.380.7743
Highly predictable session tokens in the HTTPd server in all current versions (<= 3.0.0.4.380.7743) of Asus asuswrt allow gaining administrative router access.
network
high complexity
asus CWE-330
8.3
2017-12-31 CVE-2017-17704 Use of Insufficiently Random Values vulnerability in Swhouse Istar Ultra Firmware 6.5.2.20569
A door-unlocking issue was discovered on Software House iStar Ultra devices through 6.5.2.20569 when used in conjunction with the IP-ACM Ethernet Door Module.
network
high complexity
swhouse CWE-330
7.4
2017-12-29 CVE-2017-17910 Use of Insufficiently Random Values vulnerability in Hoermann products
On Hoermann BiSecur devices before 2018, a vulnerability can be exploited by recording a single radio transmission.
low complexity
hoermann CWE-330
6.5
2017-12-02 CVE-2017-17091 Use of Insufficiently Random Values vulnerability in Wordpress
wp-admin/user-new.php in WordPress before 4.9.1 sets the newbloguser key to a string that can be directly derived from the user ID, which allows remote attackers to bypass intended access restrictions by entering this string.
network
low complexity
wordpress CWE-330
8.8
2017-12-01 CVE-2017-10874 Use of Insufficiently Random Values vulnerability in Ntt-East Pwr-Q200 Firmware
PWR-Q200 does not use random values for source ports of DNS query packets, which allows remote attackers to conduct DNS cache poisoning attacks.
network
low complexity
ntt-east CWE-330
7.5
2017-11-30 CVE-2017-12361 Use of Insufficiently Random Values vulnerability in Cisco Jabber
A vulnerability in Cisco Jabber for Windows could allow an unauthenticated, local attacker to access sensitive communications made by the Jabber client.
local
low complexity
cisco CWE-330
4.0
2017-11-17 CVE-2017-1000246 Use of Insufficiently Random Values vulnerability in Pysaml2 Project Pysaml2
Python package pysaml2 version 4.4.0 and earlier reuses the initialization vector across encryptions in the IDP server, resulting in weak encryption of data.
network
low complexity
pysaml2-project CWE-330
5.3
2017-10-17 CVE-2017-13088 Use of Insufficiently Random Values vulnerability in multiple products
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
5.3