Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-57868

Опубликовано: 05 апр. 2025
Источник: nvd
CVSS3: 5.5
EPSS Низкий

Описание

Web::API 2.8 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.

Specifically Web::API uses the Data::Random library which specifically states that it is "Useful mostly for test programs". Data::Random uses the rand() function.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:lev:web\:\:api:*:*:*:*:*:perl:*:*
Версия до 2.8 (включая)

EPSS

Процентиль: 29%
0.00101
Низкий

5.5 Medium

CVSS3

Дефекты

CWE-331
CWE-338

Связанные уязвимости

CVSS3: 5.5
ubuntu
10 месяцев назад

Web::API 2.8 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. Specifically Web::API uses the Data::Random library which specifically states that it is "Useful mostly for test programs". Data::Random uses the rand() function.

CVSS3: 5.5
debian
10 месяцев назад

Web::API 2.8 and earlier for Perl uses the rand() function as the defa ...

CVSS3: 5.5
github
10 месяцев назад

Web::API 2.8 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. Specifically Web::API uses the Data::Random library which specifically states that it is "Useful mostly for test programs". Data::Random uses the rand() function.

EPSS

Процентиль: 29%
0.00101
Низкий

5.5 Medium

CVSS3

Дефекты

CWE-331
CWE-338