CVE-2019-25089
LOW
3,1
Source: [email protected]
Attack Vector: network
Attack Complexity: high
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: none
Availability: none
Description
AI Translation Available
A vulnerability has been found in Morgawr Muon 0.1.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file src/muon/handler.clj. The manipulation leads to insufficiently random values. The attack can be launched remotely. Upgrading to version 0.2.0-indev is able to address this issue. The name of the patch is c09ed972c020f759110c707b06ca2644f0bacd7f. It is recommended to upgrade the affected component. The identifier VDB-216877 was assigned to this vulnerability.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0029
Percentile
0,5th
Updated
EPSS Score Trend (Last 90 Days)
330
Use of Insufficiently Random Values
StableCommon Consequences
Security Scopes Affected:
Confidentiality
Other
Access Control
Potential Impacts:
Other
Bypass Protection Mechanism
Gain Privileges Or Assume Identity
Applicable Platforms
All platforms may be affected
Application
Muon by Muon Project
CPE Identifier
View Detailed Analysis
cpe:2.3:a:muon_project:muon:0.1.1:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/Morgawr/Muon/commit/c09ed972c020f759110c707b06ca2644f0bacd7f
https://github.com/Morgawr/Muon/issues/4
https://vuldb.com/?ctiid.216877
https://vuldb.com/?id.216877
https://github.com/Morgawr/Muon/commit/c09ed972c020f759110c707b06ca2644f0bacd7f
https://github.com/Morgawr/Muon/issues/4
https://vuldb.com/?ctiid.216877
https://vuldb.com/?id.216877