Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2025-2814

Опубликовано: 13 апр. 2025
Источник: nvd
CVSS3: 4
EPSS Низкий

Описание

Crypt::CBC versions between 1.21 and 3.05 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.

This issue affects operating systems where "/dev/urandom'" is unavailable.  In that case, Crypt::CBC will fallback to use the insecure rand() function.

EPSS

Процентиль: 6%
0.00025
Низкий

4 Medium

CVSS3

Дефекты

CWE-329
CWE-338

Связанные уязвимости

CVSS3: 4
ubuntu
9 месяцев назад

Crypt::CBC versions between 1.21 and 3.05 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. This issue affects operating systems where "/dev/urandom'" is unavailable. In that case, Crypt::CBC will fallback to use the insecure rand() function.

CVSS3: 4.8
redhat
9 месяцев назад

Crypt::CBC versions between 1.21 and 3.05 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. This issue affects operating systems where "/dev/urandom'" is unavailable.  In that case, Crypt::CBC will fallback to use the insecure rand() function.

CVSS3: 4
debian
9 месяцев назад

Crypt::CBC versions between 1.21 and 3.05 for Perl may use the rand() ...

CVSS3: 4
github
9 месяцев назад

Crypt::CBC versions between 1.21 and 3.04 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. This issue affects operating systems where "/dev/urandom'" is unavailable.  In that case, Crypt::CBC will fallback to use the insecure rand() function.

CVSS3: 4
fstec
9 месяцев назад

Уязвимость функции rand() модуля Crypt::CBC языка программирования Perl, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 6%
0.00025
Низкий

4 Medium

CVSS3

Дефекты

CWE-329
CWE-338