Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-93qx-3vc3-hx46

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Crypt::DSA (aka Crypt-DSA) module 1.17 and earlier for Perl, when /dev/random is absent, uses the Data::Random module, which makes it easier for remote attackers to spoof a signature, or determine the signing key of a signed message, via a brute-force attack.

The Crypt::DSA (aka Crypt-DSA) module 1.17 and earlier for Perl, when /dev/random is absent, uses the Data::Random module, which makes it easier for remote attackers to spoof a signature, or determine the signing key of a signed message, via a brute-force attack.

EPSS

Процентиль: 58%
0.00358
Низкий

Связанные уязвимости

ubuntu
больше 14 лет назад

The Crypt::DSA (aka Crypt-DSA) module 1.17 and earlier for Perl, when /dev/random is absent, uses the Data::Random module, which makes it easier for remote attackers to spoof a signature, or determine the signing key of a signed message, via a brute-force attack.

nvd
больше 14 лет назад

The Crypt::DSA (aka Crypt-DSA) module 1.17 and earlier for Perl, when /dev/random is absent, uses the Data::Random module, which makes it easier for remote attackers to spoof a signature, or determine the signing key of a signed message, via a brute-force attack.

debian
больше 14 лет назад

The Crypt::DSA (aka Crypt-DSA) module 1.17 and earlier for Perl, when ...

EPSS

Процентиль: 58%
0.00358
Низкий