The product uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.
124 vulnerabilities with CWE-331
CVE-2025-27551
MEDIUM
DBIx::Class::EncodedColumn <0.00032 - Info Disclosure
CVSS 4.0
CVE-2025-29311
HIGH
Onos <2.7.0 - Privilege Escalation
CVSS 7.5
CVE-2025-1828
HIGH
Crypt::Random Perl <1.56 - Info Disclosure
CVSS 8.8
CVE-2024-58040
CRITICAL
Crypt::RandomEncryption 0.01 - Insecure RNG
CVSS 9.1
CVE-2024-58134
HIGH
Mojolicious <0.999922 - Info Disclosure
CVSS 8.1
CVE-2024-56370
MEDIUM
Net::Xero <0.044 - Info Disclosure
CVSS 6.5
CVE-2024-52322
MEDIUM
WebService::Xero <0.11 - Info Disclosure
CVSS 5.5
CVE-2024-58036
MEDIUM
Net::Dropbox::API <1.9 - Info Disclosure
CVSS 5.5
CVE-2024-57868
MEDIUM
Web::API <2.8 - Info Disclosure
CVSS 5.5
CVE-2024-9055
MEDIUM
Silicon Labs Series 2 - Info Disclosure
CVSS 4.2
CVE-2024-53522
HIGH
Bangkok Medical Software HOSxP XE <4.64.11.3 - Info Disclosure
CVSS 7.5
CVE-2024-20331
MEDIUM
Cisco ASA/FTD - DoS
CVSS 6.8
CVE-2024-47945
CRITICAL
Session Hijacking - Info Disclosure
CVSS 9.8
CVE-2024-8796
MEDIUM
Devise-Two-Factor >=2.2.0 <6.0.0 - Info Disclosure
CVSS 5.3
CVE-2024-38270
MEDIUM
Zyxel GS1900-10HP <V2.80(AAZI.0)C0 - Info Disclosure
CVSS 5.3
CVE-2024-6508
HIGH
Openshift Console - CSRF
CVSS 8.0
CVE-2024-36400
CRITICAL
Nano-id < - Code Injection
CVSS 9.4
CVE-2024-3411
CRITICAL
IPMI - Privilege Escalation
CVSS 9.1
CVE-2024-26329
MEDIUM
Chilkat <9.5.0.98 - Info Disclosure
CVSS 6.2
CVE-2024-25730
CRITICAL
Hitron CODA-4582/4589 - Info Disclosure
CVSS 9.8
CVE-2024-22473
MEDIUM
TRNG - Signature Spoofing
CVSS 6.8
CVE-2024-25407
HIGH
SteVe <3.6.0 - DoS
CVSS 7.5
CVE-2023-37822
HIGH
Eufy Homebase 2 <3.3.4.1h - Info Disclosure
CVSS 8.2
CVE-2023-49927
MEDIUM
Samsung Mobile Processor - Info Disclosure
CVSS 5.3
CVE-2023-49599
CRITICAL
Wwbn Avideo - Privilege Escalation
CVSS 9.8
Details
Vulnerabilities
124