{"uuid": "8153809d-0d7b-45de-a328-c65331c88575", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2814", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11553", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2814\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Crypt::CBC versions between 1.21 and 3.04 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.\n\nThis issue affects operating systems where \"/dev/urandom'\" is unavailable.\u00a0 In that case, Crypt::CBC will fallback to use the insecure rand() function.\n\ud83d\udccf Published: 2025-04-12T23:41:48.511Z\n\ud83d\udccf Modified: 2025-04-12T23:41:48.511Z\n\ud83d\udd17 References:\n1. https://perldoc.perl.org/functions/rand\n2. https://metacpan.org/dist/Crypt-CBC/source/lib/Crypt/CBC.pm#L777\n3. https://security.metacpan.org/docs/guides/random-data-for-security.html", "creation_timestamp": "2025-04-13T00:51:42.000000Z"}