In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerabilities in an interactive lesson.
Start learningUpgrade guzzlehttp/oauth-subscriber
to version 0.8.1 or higher.
Affected versions of this package are vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) via the generateNonce
function due to the insecure nonce
generation process. An attacker can exploit this vulnerability to perform replay attacks when TLS is not used by predicting or reusing the nonce value.