Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2024-57835
Awaiting Analysis
More InfoOfficial Page
Source-9b29abf9-4ab0-4765-b253-1875cd9b441e
View Known Exploited Vulnerability (KEV) details
Published At-05 Apr, 2025 | 16:15
Updated At-07 Apr, 2025 | 19:15

Amon2::Auth::Site::LINE uses the String::Random module to generate nonce values.  String::Random defaults to Perl's built-in predictable random number generator, the rand() function, which is not cryptographically secure

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.15.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-338Secondary9b29abf9-4ab0-4765-b253-1875cd9b441e
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://metacpan.org/release/SHLOMIF/String-Random-0.32/source/lib/String/Random.pm#L3779b29abf9-4ab0-4765-b253-1875cd9b441e
N/A
https://metacpan.org/release/TANIGUCHI/Amon2-Auth-Site-LINE-0.04/source/lib/Amon2/Auth/Site/LINE.pm#L2359b29abf9-4ab0-4765-b253-1875cd9b441e
N/A
https://metacpan.org/release/TANIGUCHI/Amon2-Auth-Site-LINE-0.04/source/lib/Amon2/Auth/Site/LINE.pm#L2559b29abf9-4ab0-4765-b253-1875cd9b441e
N/A
https://security.metacpan.org/docs/guides/random-data-for-security.html9b29abf9-4ab0-4765-b253-1875cd9b441e
N/A
Change History
0Changes found

Details not found