Vulnerabilities > Use of Insufficiently Random Values
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-01-11 | CVE-2021-26407 | Use of Insufficiently Random Values vulnerability in AMD Romepi Firmware A randomly generated Initialization Vector (IV) may lead to a collision of IVs with the same key potentially resulting in information disclosure. | 5.5 |
2022-12-25 | CVE-2021-4277 | Use of Insufficiently Random Values vulnerability in Utils Project Utils A vulnerability, which was classified as problematic, has been found in fredsmith utils. | 5.3 |
2022-12-13 | CVE-2022-46353 | Use of Insufficiently Random Values vulnerability in Siemens products A vulnerability has been identified in SCALANCE X204RNA (HSR) (All versions < V3.2.7), SCALANCE X204RNA (PRP) (All versions < V3.2.7), SCALANCE X204RNA EEC (HSR) (All versions < V3.2.7), SCALANCE X204RNA EEC (PRP) (All versions < V3.2.7), SCALANCE X204RNA EEC (PRP/HSR) (All versions < V3.2.7). | 9.8 |
2022-11-15 | CVE-2021-4240 | Use of Insufficiently Random Values vulnerability in PHPservermonitor PHP Server Monitor A vulnerability, which was classified as problematic, was found in phpservermon. | 5.3 |
2022-11-15 | CVE-2021-4241 | Use of Insufficiently Random Values vulnerability in PHPservermonitor PHP Server Monitor A vulnerability, which was classified as problematic, was found in phpservermon. | 5.3 |
2022-11-11 | CVE-2022-3959 | Use of Insufficiently Random Values vulnerability in Drogon A vulnerability, which was classified as problematic, has been found in drogon up to 1.8.1. | 5.3 |
2022-11-10 | CVE-2022-36022 | Use of Insufficiently Random Values vulnerability in Eclipse Deeplearning4J Deeplearning4J is a suite of tools for deploying and training deep learning models using the JVM. | 5.3 |
2022-11-07 | CVE-2022-44795 | Use of Insufficiently Random Values vulnerability in Objectfirst Object First 1.0.7.712 An issue was discovered in Object First Ootbi BETA build 1.0.7.712. | 6.5 |
2022-09-28 | CVE-2022-30935 | Use of Insufficiently Random Values vulnerability in B2Evolution An authorization bypass in b2evolution allows remote, unauthenticated attackers to predict password reset tokens for any user through the use of a bad randomness function. | 9.1 |
2022-09-26 | CVE-2022-38970 | Use of Insufficiently Random Values vulnerability in multiple products ieGeek IG20 hipcam RealServer V1.0 is vulnerable to Incorrect Access Control. | 6.5 |