Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-27552

Опубликовано: 26 мар. 2025
Источник: debian
EPSS Низкий

Описание

DBIx::Class::EncodedColumn use the rand() function, which is not cryptographically secure to salt password hashes. This vulnerability is associated with program files Crypt/Eksblowfish/Bcrypt.pm. This issue affects DBIx::Class::EncodedColumn until 0.00032.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libdbix-class-encodedcolumn-perlfixed0.00020-3package
libdbix-class-encodedcolumn-perlignoredbookwormpackage
libdbix-class-encodedcolumn-perlpostponedbullseyepackage

Примечания

  • https://github.com/wreis/DBIx-Class-EncodedColumn/commit/5e9e51f574f7e64e8c014e9e4f00ee8fd87a5335 (0.11)

EPSS

Процентиль: 5%
0.00021
Низкий

Связанные уязвимости

CVSS3: 4
ubuntu
11 месяцев назад

DBIx::Class::EncodedColumn use the rand() function, which is not cryptographically secure to salt password hashes. This vulnerability is associated with program files Crypt/Eksblowfish/Bcrypt.pm. This issue affects DBIx::Class::EncodedColumn until 0.00032.

CVSS3: 4
nvd
11 месяцев назад

DBIx::Class::EncodedColumn use the rand() function, which is not cryptographically secure to salt password hashes. This vulnerability is associated with program files Crypt/Eksblowfish/Bcrypt.pm. This issue affects DBIx::Class::EncodedColumn until 0.00032.

CVSS3: 4
github
11 месяцев назад

DBIx::Class::EncodedColumn use the rand() function, which is not cryptographically secure to salt password hashes. This vulnerability is associated with program files Crypt/Eksblowfish/Bcrypt.pm. This issue affects DBIx::Class::EncodedColumn until 0.00032.

EPSS

Процентиль: 5%
0.00021
Низкий