{"uuid": "4312a212-0f4a-4c99-9e3c-f156cd0c1bf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56830", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/246", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56830\n\ud83d\udd39 Description: The Net::EasyTCP package 0.15 through 0.26 for Perl uses Perl's builtin rand() if no strong randomization module is present.\n\ud83d\udccf Published: 2025-01-02T00:00:00\n\ud83d\udccf Modified: 2025-01-06T21:09:28.494Z\n\ud83d\udd17 References:\n1. https://metacpan.org/release/MNAGUIB/EasyTCP-0.26/changes\n2. https://github.com/briandfoy/cpan-security-advisory/issues/184", "creation_timestamp": "2025-01-06T21:37:16.000000Z"}