CVE-2024-58040

Crypt::RandomEncryption for Perl version 0.01 uses insecure rand() function during encryption.
Configurations

Configuration 1 (hide)

cpe:2.3:a:qwer:crypt\:\:randomencryption:0.01:*:*:*:*:perl:*:*

History

09 Mar 2026, 17:17

Type Values Removed Values Added
CPE cpe:2.3:a:qwer:crypt\:\:randomencryption:0.01:*:*:*:*:perl:*:*
References () https://metacpan.org/release/QWER/Crypt-RandomEncryption-0.01/source/lib/Crypt/RandomEncryption.pm#L33 - () https://metacpan.org/release/QWER/Crypt-RandomEncryption-0.01/source/lib/Crypt/RandomEncryption.pm#L33 - Broken Link, Product
References () https://perldoc.perl.org/functions/rand - () https://perldoc.perl.org/functions/rand - Third Party Advisory
References () https://security.metacpan.org/docs/guides/random-data-for-security.html - () https://security.metacpan.org/docs/guides/random-data-for-security.html - Third Party Advisory
First Time Qwer crypt\
Qwer

30 Sep 2025, 14:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1

30 Sep 2025, 11:37

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-30 11:37

Updated : 2026-03-09 17:17


NVD link : CVE-2024-58040

Mitre link : CVE-2024-58040

CVE.ORG link : CVE-2024-58040


JSON object : View

Products Affected

qwer

  • crypt\
CWE
CWE-331

Insufficient Entropy

CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)