Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-58036

Опубликовано: 05 апр. 2025
Источник: debian
EPSS Низкий

Описание

Net::Dropbox::API 1.9 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. Specifically Net::Dropbox::API uses the Data::Random library which specifically states that it is "Useful mostly for test programs". Data::Random uses the rand() function.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libnet-dropbox-api-perlfixed1.9-3package
libnet-dropbox-api-perlno-dsatrixiepackage
libnet-dropbox-api-perlno-dsabookwormpackage
libnet-dropbox-api-perlpostponedbullseyepackage

Примечания

  • https://lists.security.metacpan.org/cve-announce/msg/28504518/

EPSS

Процентиль: 29%
0.00101
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
10 месяцев назад

Net::Dropbox::API 1.9 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. Specifically Net::Dropbox::API uses the Data::Random library which specifically states that it is "Useful mostly for test programs". Data::Random uses the rand() function.

CVSS3: 5.5
nvd
10 месяцев назад

Net::Dropbox::API 1.9 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. Specifically Net::Dropbox::API uses the Data::Random library which specifically states that it is "Useful mostly for test programs". Data::Random uses the rand() function.

CVSS3: 5.5
github
10 месяцев назад

Net::Dropbox::API 1.9 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. Specifically Net::Dropbox::API uses the Data::Random library which specifically states that it is "Useful mostly for test programs". Data::Random uses the rand() function.

EPSS

Процентиль: 29%
0.00101
Низкий