Eran Hammer cryptiles version 4.1.1 earlier contains a CWE-331: Insufficient Entropy vulnerability in randomDigits() method that can result in An attacker is more likely to be able to brute force something that was supposed to be random.. This attack appear to be exploitable via Depends upon the calling application.. This vulnerability appears to have been fixed in 4.1.2.
References
Link | Resource |
---|---|
https://github.com/hapijs/cryptiles/issues/34 | Issue Tracking Patch Third Party Advisory |
https://github.com/hapijs/cryptiles/issues/35 | |
https://github.com/hapijs/cryptiles/issues/34 | Issue Tracking Patch Third Party Advisory |
https://github.com/hapijs/cryptiles/issues/35 |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/hapijs/cryptiles/issues/34 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://github.com/hapijs/cryptiles/issues/35 - |
Information
Published : 2018-07-09 20:29
Updated : 2024-11-21 03:40
NVD link : CVE-2018-1000620
Mitre link : CVE-2018-1000620
CVE.ORG link : CVE-2018-1000620
JSON object : View
Products Affected
cryptiles_project
- cryptiles
CWE
CWE-331
Insufficient Entropy