- Description
- The Net::EasyTCP package 0.15 through 0.26 for Perl uses Perl's builtin rand() if no strong randomization module is present.
- Source
- cve@mitre.org
- NVD status
- Received
CVSS 3.1
- Type
- Secondary
- Base score
- 5.4
- Impact score
- 2.7
- Exploitability score
- 2.2
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
- cve@mitre.org
- CWE-338
- Hype score
- Not currently trending
CVE-2024-56830 Insecure Randomization Vulnerability in Net::EasyTCP Perl Package The Net::EasyTCP package, from version 0.15 to 0.26 for Perl, relies on Perl's builtin rand() when there is no strong randomization... https://t.co/9SZpdvQ55l
@VulmonFeeds
2 Jan 2025
111 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-56830 The Net::EasyTCP package 0.15 through 0.26 for Perl uses Perl's builtin rand() if no strong randomization module is present. https://t.co/no4UAv1kiU
@CVEnew
2 Jan 2025
570 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes