Количество 7
Количество 7

BDU:2025-08560
Уязвимость функции rand() модуля Crypt::CBC языка программирования Perl, позволяющая нарушителю вызвать отказ в обслуживании

CVE-2025-2814
Crypt::CBC versions between 1.21 and 3.05 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. This issue affects operating systems where "/dev/urandom'" is unavailable. In that case, Crypt::CBC will fallback to use the insecure rand() function.

CVE-2025-2814
Crypt::CBC versions between 1.21 and 3.05 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. This issue affects operating systems where "/dev/urandom'" is unavailable. In that case, Crypt::CBC will fallback to use the insecure rand() function.

CVE-2025-2814
Crypt::CBC versions between 1.21 and 3.05 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. This issue affects operating systems where "/dev/urandom'" is unavailable. In that case, Crypt::CBC will fallback to use the insecure rand() function.
CVE-2025-2814
Crypt::CBC versions between 1.21 and 3.05 for Perl may use the rand() ...

ROS-20250630-11
Уязвимость perl-Crypt-CBC
GHSA-xpfq-7j72-x4px
Crypt::CBC versions between 1.21 and 3.04 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. This issue affects operating systems where "/dev/urandom'" is unavailable. In that case, Crypt::CBC will fallback to use the insecure rand() function.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2025-08560 Уязвимость функции rand() модуля Crypt::CBC языка программирования Perl, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 4 | 0% Низкий | 5 месяцев назад |
![]() | CVE-2025-2814 Crypt::CBC versions between 1.21 and 3.05 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. This issue affects operating systems where "/dev/urandom'" is unavailable. In that case, Crypt::CBC will fallback to use the insecure rand() function. | CVSS3: 4 | 0% Низкий | 5 месяцев назад |
![]() | CVE-2025-2814 Crypt::CBC versions between 1.21 and 3.05 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. This issue affects operating systems where "/dev/urandom'" is unavailable. In that case, Crypt::CBC will fallback to use the insecure rand() function. | CVSS3: 4.8 | 0% Низкий | 5 месяцев назад |
![]() | CVE-2025-2814 Crypt::CBC versions between 1.21 and 3.05 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. This issue affects operating systems where "/dev/urandom'" is unavailable. In that case, Crypt::CBC will fallback to use the insecure rand() function. | CVSS3: 4 | 0% Низкий | 5 месяцев назад |
CVE-2025-2814 Crypt::CBC versions between 1.21 and 3.05 for Perl may use the rand() ... | CVSS3: 4 | 0% Низкий | 5 месяцев назад | |
![]() | ROS-20250630-11 Уязвимость perl-Crypt-CBC | CVSS2: 2.1 | 0% Низкий | 3 месяца назад |
GHSA-xpfq-7j72-x4px Crypt::CBC versions between 1.21 and 3.04 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. This issue affects operating systems where "/dev/urandom'" is unavailable. In that case, Crypt::CBC will fallback to use the insecure rand() function. | CVSS3: 4 | 0% Низкий | 5 месяцев назад |
Уязвимостей на страницу