A vulnerability, which was classified as problematic, was found in phpservermon. Affected is the function setUserLoggedIn of the file src/psm/Service/User.php. The manipulation leads to use of predictable algorithm in random number generator. The exploit has been disclosed to the public and may be used. The name of the patch is bb10a5f3c68527c58073258cb12446782d223bc3. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-213744.
More Stories
ruby-3.3.8-19.fc41
FEDORA-2025-60513bdbbd Packages in this update: ruby-3.3.8-19.fc41 Update description: Upgrade to Ruby 3.3.8. CVE-2025-25186: Fix Net::IMAP vulnerable to possible DoS by...
dnf-4.23.0-1.fc40.1
FEDORA-2025-21c36b3aa5 Packages in this update: dnf-4.23.0-1.fc40.1 Update description: This releases preserves enablement state of dnf-automatic.timer when upgrading to Fedora 41....
podman-tui-1.5.0-2.el9
FEDORA-EPEL-2025-7c57e75cbc Packages in this update: podman-tui-1.5.0-2.el9 Update description: release v1.5.0 Read More
prometheus-podman-exporter-1.16.0-1.fc42
FEDORA-2025-12ac4e9cfd Packages in this update: prometheus-podman-exporter-1.16.0-1.fc42 Update description: release v1.16.0 Read More
prometheus-podman-exporter-1.16.0-1.fc41
FEDORA-2025-b0915f0a19 Packages in this update: prometheus-podman-exporter-1.16.0-1.fc41 Update description: release v1.16.0 Read More
prometheus-podman-exporter-1.16.0-1.el9
FEDORA-EPEL-2025-6653a27cfd Packages in this update: prometheus-podman-exporter-1.16.0-1.el9 Update description: release 1.16.0 Read More