Количество 4
Количество 4
CVE-2024-56830
The Net::EasyTCP package 0.15 through 0.26 for Perl uses Perl's builtin rand() if no strong randomization module is present.
CVE-2024-56830
The Net::EasyTCP package 0.15 through 0.26 for Perl uses Perl's builtin rand() if no strong randomization module is present.
CVE-2024-56830
The Net::EasyTCP package 0.15 through 0.26 for Perl uses Perl's builti ...
GHSA-99f2-vhmm-9fw8
The Net::EasyTCP package 0.15 through 0.26 for Perl uses Perl's builtin rand() if no strong randomization module is present.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-56830 The Net::EasyTCP package 0.15 through 0.26 for Perl uses Perl's builtin rand() if no strong randomization module is present. | CVSS3: 5.4 | 0% Низкий | около 1 года назад | |
CVE-2024-56830 The Net::EasyTCP package 0.15 through 0.26 for Perl uses Perl's builtin rand() if no strong randomization module is present. | CVSS3: 5.4 | 0% Низкий | около 1 года назад | |
CVE-2024-56830 The Net::EasyTCP package 0.15 through 0.26 for Perl uses Perl's builti ... | CVSS3: 5.4 | 0% Низкий | около 1 года назад | |
GHSA-99f2-vhmm-9fw8 The Net::EasyTCP package 0.15 through 0.26 for Perl uses Perl's builtin rand() if no strong randomization module is present. | CVSS3: 5.4 | 0% Низкий | около 1 года назад |
Уязвимостей на страницу