{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T16:09:02.591","vulnerabilities":[{"cve":{"id":"CVE-2021-4240","sourceIdentifier":"cna@vuldb.com","published":"2022-11-15T23:15:10.233","lastModified":"2024-11-21T06:37:12.850","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as problematic, was found in phpservermon. This affects the function generatePasswordResetToken of the file src/psm/Service/User.php. The manipulation leads to use of predictable algorithm in random number generator. The exploit has been disclosed to the public and may be used. The name of the patch is 3daa804d5f56c55b3ae13bfac368bb84ec632193. It is recommended to apply a patch to fix this issue. The identifier VDB-213717 was assigned to this vulnerability."},{"lang":"es","value":"Una vulnerabilidad fue encontrada en phpservermon y clasificada como problemática. Esto afecta a la función generatePasswordResetToken del archivo src/psm/Service/User.php. La manipulación conduce al uso de un algoritmo predecible en un generador de números aleatorios. El exploit ha sido divulgado al público y puede utilizarse. El nombre del parche es 3daa804d5f56c55b3ae13bfac368bb84ec632193. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asignó el identificador VDB-213717."}],"metrics":{"cvssMetricV31":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":2.6,"baseSeverity":"LOW","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"cna@vuldb.com","type":"Secondary","description":[{"lang":"en","value":"CWE-331"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-330"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:phpservermonitor:php_server_monitor:-:*:*:*:*:*:*:*","matchCriteriaId":"8BA6165A-0BEC-4027-BFF8-92EF2B82B3CF"}]}]}],"references":[{"url":"https://github.com/phpservermon/phpservermon/commit/3daa804d5f56c55b3ae13bfac368bb84ec632193","source":"cna@vuldb.com","tags":["Patch","Third Party Advisory"]},{"url":"https://huntr.dev/bounties/2-phpservermon/phpservermon/","source":"cna@vuldb.com","tags":["Exploit","Patch","Third Party Advisory"]},{"url":"https://vuldb.com/?id.213717","source":"cna@vuldb.com","tags":["Third Party Advisory"]},{"url":"https://github.com/phpservermon/phpservermon/commit/3daa804d5f56c55b3ae13bfac368bb84ec632193","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://huntr.dev/bounties/2-phpservermon/phpservermon/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Third Party Advisory"]},{"url":"https://vuldb.com/?id.213717","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}