Vulnerabilities (CVE)

Filtered by CWE-330
Total 316 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-46010 1 Totolink 2 A3100r, A3100r Firmware 2024-11-21 6.5 MEDIUM 8.8 HIGH
Totolink A3100R V5.9c.4577 suffers from Use of Insufficiently Random Values via the web configuration. The SESSION_ID is predictable. An attacker can hijack a valid session and conduct further malicious operations.
CVE-2021-45488 1 Netbsd 1 Netbsd 2024-11-21 5.0 MEDIUM 7.5 HIGH
In NetBSD through 9.2, there is an information leak in the TCP ISN (ISS) generation algorithm.
CVE-2021-45487 1 Netbsd 1 Netbsd 2024-11-21 5.0 MEDIUM 7.5 HIGH
In NetBSD through 9.2, the IPv4 ID generation algorithm does not use appropriate cryptographic measures.
CVE-2021-45458 1 Apache 1 Kylin 2024-11-21 5.0 MEDIUM 7.5 HIGH
Apache Kylin provides encryption classes PasswordPlaceholderConfigurer to help users encrypt their passwords. In the encryption algorithm used by this encryption class, the cipher is initialized with a hardcoded key and IV. If users use class PasswordPlaceholderConfigurer to encrypt their password and configure it into kylin's configuration file, there is a risk that the password may be decrypted. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.
CVE-2021-41994 1 Pingidentity 2 Pingid, Pingid Windows Login 2024-11-21 1.9 LOW 6.6 MEDIUM
A misconfiguration of RSA in PingID iOS app prior to 1.19 is vulnerable to pre-computed dictionary attacks, leading to an offline MFA bypass when using PingID Windows Login.
CVE-2021-41993 1 Pingidentity 2 Pingid, Pingid Windows Login 2024-11-21 1.9 LOW 6.6 MEDIUM
A misconfiguration of RSA in PingID Android app prior to 1.19 is vulnerable to pre-computed dictionary attacks, leading to an offline MFA bypass when using PingID Windows Login.
CVE-2021-41829 1 Zohocorp 1 Manageengine Remote Access Plus 2024-11-21 5.0 MEDIUM 7.5 HIGH
Zoho ManageEngine Remote Access Plus before 10.1.2121.1 relies on the application's build number to calculate a certain encryption key.
CVE-2021-41694 1 Globaldatingsoftware 1 Premiumdatingscript 2024-11-21 5.0 MEDIUM 9.8 CRITICAL
An Incorrect Access Control vulnerability exists in Premiumdatingscript 4.2.7.7 via the password change procedure in requests\user.php.
CVE-2021-41061 1 Riot-os 1 Riot 2024-11-21 2.1 LOW 5.5 MEDIUM
In RIOT-OS 2021.01, nonce reuse in 802.15.4 encryption in the ieee820154_security component allows attackers to break encryption by triggering reboots.
CVE-2021-3692 1 Yiiframework 1 Yii 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
yii2 is vulnerable to Use of Predictable Algorithm in Random Number Generator
CVE-2021-3689 1 Yiiframework 1 Yii 2024-11-21 5.0 MEDIUM 7.5 HIGH
yii2 is vulnerable to Use of Predictable Algorithm in Random Number Generator
CVE-2021-3446 3 Fedoraproject, Libtpms Project, Redhat 3 Fedora, Libtpms, Enterprise Linux 2024-11-21 2.1 LOW 5.5 MEDIUM
A flaw was found in libtpms in versions before 0.8.2. The commonly used integration of libtpms with OpenSSL contained a vulnerability related to the returned IV (initialization vector) when certain symmetric ciphers were used. Instead of returning the last IV it returned the initial IV to the caller, thus weakening the subsequent encryption and decryption steps. The highest threat from this vulnerability is to data confidentiality.
CVE-2021-39249 1 Invisioncommunity 1 Invision Power Board 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Invision Community (aka IPS Community Suite or IP-Board) before 4.6.5.1 allows reflected XSS because the filenames of uploaded files become predictable through a brute-force attack against the PHP mt_rand function.
CVE-2021-38606 1 Yogeshojha 1 Rengine 2024-11-21 7.5 HIGH 9.8 CRITICAL
reNgine through 0.5 relies on a predictable directory name.
CVE-2021-38377 1 Open-xchange 1 Ox App Suite 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
OX App Suite through 7.10.5 allows XSS via JavaScript code in an anchor HTML comment within truncated e-mail, because there is a predictable UUID with HTML transformation results.
CVE-2021-37186 1 Siemens 12 Logo\! Cmr2020, Logo\! Cmr2020 Firmware, Logo\! Cmr2040 and 9 more 2024-11-21 4.8 MEDIUM 5.4 MEDIUM
A vulnerability has been identified in LOGO! CMR2020 (All versions < V2.2), LOGO! CMR2040 (All versions < V2.2), SIMATIC RTU3010C (All versions < V4.0.9), SIMATIC RTU3030C (All versions < V4.0.9), SIMATIC RTU3031C (All versions < V4.0.9), SIMATIC RTU3041C (All versions < V4.0.9). The underlying TCP/IP stack does not properly calculate the random numbers used as ISN (Initial Sequence Numbers). An adjacent attacker with network access to the LAN interface could interfere with traffic, spoof the connection and gain access to sensitive information.
CVE-2021-36294 1 Dell 9 Emc Unity Operating Environment, Vnx5200, Vnx5400 and 6 more 2024-11-21 7.5 HIGH 9.8 CRITICAL
Dell VNX2 OE for File versions 8.1.21.266 and earlier, contain an authentication bypass vulnerability. A remote unauthenticated attacker may exploit this vulnerability by forging a cookie to login as any user.
CVE-2021-36166 1 Fortinet 1 Fortimail 2024-11-21 7.5 HIGH 9.8 CRITICAL
An improper authentication vulnerability in FortiMail before 7.0.1 may allow a remote attacker to efficiently guess one administrative account's authentication token by means of the observation of certain system's properties.
CVE-2021-34646 1 Booster 1 Booster For Woocommerce 2024-11-21 7.5 HIGH 9.8 CRITICAL
Versions up to, and including, 5.4.3, of the Booster for WooCommerce WordPress plugin are vulnerable to authentication bypass via the process_email_verification function due to a random token generation weakness in the reset_and_mail_activation_link function found in the ~/includes/class-wcj-emails-verification.php file. This allows attackers to impersonate users and trigger an email address verification for arbitrary accounts, including administrative accounts, and automatically be logged in as that user, including any site administrators. This requires the Email Verification module to be active in the plugin and the Login User After Successful Verification setting to be enabled, which it is by default.
CVE-2021-32791 3 Apache, Fedoraproject, Openidc 3 Http Server, Fedora, Mod Auth Openidc 2024-11-21 4.3 MEDIUM 5.9 MEDIUM
mod_auth_openidc is an authentication/authorization module for the Apache 2.x HTTP server that functions as an OpenID Connect Relying Party, authenticating users against an OpenID Connect Provider. In mod_auth_openidc before version 2.4.9, the AES GCM encryption in mod_auth_openidc uses a static IV and AAD. It is important to fix because this creates a static nonce and since aes-gcm is a stream cipher, this can lead to known cryptographic issues, since the same key is being reused. From 2.4.9 onwards this has been patched to use dynamic values through usage of cjose AES encryption routines.