CWE-338
Medium likelihoodUse of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
The product uses a Pseudo-Random Number Generator (PRNG) in a security context, but the PRNG's algorithm is not cryptographically strong.
171 vulnerabilities with CWE-338
CVE-2026-5080
Dancer::Session::Abstract versions through 1.3522 for Perl generates session ids insecurely
CVE-2026-40514
MEDIUM
SmarterTools SmarterMail < Build 9610 Cryptographic Weakness via Weak RNG
CVSS 5.9
CVE-2026-41564
HIGH
CryptX versions before 0.088 for Perl do not reseed the Crypt::PK PRNG state after forking
CVSS 7.5
CVE-2026-5088
HIGH
Apache::API::Password versions through v0.5.2 for Perl can generate insecure random values for salts
CVSS 7.5
CVE-2026-5085
CRITICAL
Solstice::Session versions through 1440 for Perl generates session ids insecurely
CVSS 9.1
CVE-2026-5083
MEDIUM
Ado::Sessions versions through 0.935 for Perl generates insecure session ids
CVSS 5.3
CVE-2026-5082
MEDIUM
Amon2::Plugin::Web::CSRFDefender versions from 7.00 through 7.03 for Perl generate an insecure session id
CVSS 5.3
CVE-2026-25726
HIGH
Cloudreve is vulnerable to Account Takeover via Weak Cryptographic Token Generation (Insecure PRNG Seeding)
CVSS 8.1
CVE-2026-34871
MEDIUM
Mbed TLS <3.6.6/4.x<4.1.0 - Predictable PRNG
CVSS 6.7
CVE-2026-5087
HIGH
PAGI::Middleware::Session::Store::Cookie versions through 0.001003 for Perl generates random bytes insecurely
CVSS 7.5
CVE-2026-3256
CRITICAL
HTTP::Session versions through 0.53 for Perl defaults to using insecurely generated session ids
CVSS 9.8
CVE-2026-3255
MEDIUM
HTTP::Session2 <1.12 - Weak Session ID
CVSS 6.5
CVE-2026-2439
CRITICAL
Concierge::Sessions 0.8.1-0.8.5 - Auth Bypass
CVSS 9.8
CVE-2025-15618
CRITICAL
Business::OnlinePayment::StoredTransaction versions through 0.01 for Perl uses an insecure secret key
CVSS 9.1
CVE-2025-15604
CRITICAL
Amon2 versions before 6.17 for Perl use an insecure random_string implementation for security functions
CVSS 9.8
CVE-2025-40931
CRITICAL
Apache::Session::Generate::MD5 <=1.94 - Info Disclosure
CVSS 9.1
CVE-2025-40926
CRITICAL
Plack::Middleware::Session::Simple <=0.04 - Auth Bypass
CVSS 9.8
CVE-2025-40932
HIGH
Apache::SessionX <=2.01 - Insecure Session ID
CVSS 8.2
CVE-2025-15578
CRITICAL
Maypole 2.10-2.13 - Auth Bypass
CVSS 9.8
CVE-2025-40905
HIGH
WWW::OAuth <1.000 - Info Disclosure
CVSS 7.3
CVE-2025-66630
CRITICAL
Fiber <2.52.11 - Info Disclosure
CVSS 9.4
CVE-2025-69217
HIGH
coturn <4.7.0-r4 - Info Disclosure
CVSS 7.7
CVE-2025-68932
CRITICAL
FreshRSS <1.28.0 - Info Disclosure
CVSS 9.8
CVE-2025-26379
HIGH
PowerG <unknown - Info Disclosure
CVE-2025-67504
CRITICAL
Wbce Cms < 1.6.5 - Privilege Escalation
CVSS 9.1
Details
Vulnerabilities
171
Exploit Likelihood
Medium