{"vulnerability": "CVE-2016-10743", "sightings": [{"uuid": "70046f91-1717-44d6-afc6-cb2066ab5ba8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-10743", "type": "seen", "source": "https://t.me/cibsecurity/10175", "content": "ATENTION\u203c New - CVE-2019-10064\n\nhostapd before 2.6, in EAP mode, makes calls to the rand() and random() standard library functions without any preceding srand() or srandom() call, which results in inappropriate use of deterministic values. This was fixed in conjunction with CVE-2016-10743.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-02-28T18:33:05.000000Z"}, {"uuid": "d46ddad7-a8d5-4920-a0b2-349c90e35f27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-10743", "type": "seen", "source": "https://t.me/VulnerabilityNews/12805", "content": "hostapd before 2.6, in EAP mode, makes calls to the rand() and random() standard library functions without any preceding srand() or srandom() call, which results in inappropriate use of deterministic values. This was fixed in conjunction with CVE-2016-10743.\nPublished at: February 28, 2020 at 04:15PM\nView on website", "creation_timestamp": "2020-02-28T19:20:18.000000Z"}, {"uuid": "08b54ad6-1b88-4a70-a8e4-e7447f575c27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-10743", "type": "seen", "source": "https://t.me/cibsecurity/3307", "content": "ATENTION\u203c New - CVE-2016-10743\n\nhostapd before 2.6 does not prevent use of the low-quality PRNG that is reached by an os_random() function call.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-03-23T21:29:06.000000Z"}]}