{"uuid": "c1c66085-ff8d-441f-a45c-7b4237a6d3ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2008-0166", "type": "seen", "source": "https://t.me/VulnerabilityNews/22078", "content": "It was found that various OpenID Providers (OPs) had TLS Server Certificates that used weak keys, as a result of the Debian Predictable Random Number Generator (CVE-2008-0166). In combination with the DNS Cache Poisoning issue (CVE-2008-1447) and the fact that almost all SSL/TLS implementations do not consult CRLs (currently an untracked issue), this means that it is impossible to rely on these OPs.\nPublished at: May 21, 2021 at 10:15PM\nView on website", "creation_timestamp": "2021-05-22T00:46:52.000000Z"}