### [CVE-2019-3795](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3795) ![](https://img.shields.io/static/v1?label=Product&message=Spring%20Security&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=5.05.0.11.RELEASE%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values&color=brighgreen) ### Description Spring Security versions 4.2.x prior to 4.2.12, 5.0.x prior to 5.0.12, and 5.1.x prior to 5.1.5 contain an insecure randomness vulnerability when using SecureRandomFactoryBean#setSeed to configure a SecureRandom instance. In order to be impacted, an honest application must provide a seed and make the resulting random material available to an attacker for inspection. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon