{"vulnerability": "CVE-2024-56830", "sightings": [{"uuid": "4312a212-0f4a-4c99-9e3c-f156cd0c1bf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56830", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/246", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-56830\n\ud83d\udd39 Description: The Net::EasyTCP package 0.15 through 0.26 for Perl uses Perl's builtin rand() if no strong randomization module is present.\n\ud83d\udccf Published: 2025-01-02T00:00:00\n\ud83d\udccf Modified: 2025-01-06T21:09:28.494Z\n\ud83d\udd17 References:\n1. https://metacpan.org/release/MNAGUIB/EasyTCP-0.26/changes\n2. https://github.com/briandfoy/cpan-security-advisory/issues/184", "creation_timestamp": "2025-01-06T21:37:16.000000Z"}, {"uuid": "d69547c2-98f2-430e-baee-35fac209a9f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56830", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113756992244510845", "content": "", "creation_timestamp": "2025-01-02T04:59:10.696729Z"}, {"uuid": "835b6821-1b55-4012-aa86-441ad7f26c6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56830", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3leqd22xq5e2k", "content": "", "creation_timestamp": "2025-01-02T05:15:28.251207Z"}, {"uuid": "60b6c0c7-5143-45e2-9494-f484efae86dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56830", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3leqesww7lg2w", "content": "", "creation_timestamp": "2025-01-02T05:47:18.653649Z"}, {"uuid": "3a4e8745-47d9-48e1-af6e-d991b6962855", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-56830", "type": "seen", "source": "https://t.me/cvedetector/14092", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-56830 - Apache Net::EasyTCP Weak Random Number Generating\", \n  \"Content\": \"CVE ID : CVE-2024-56830 \nPublished : Jan. 2, 2025, 5:15 a.m. | 19\u00a0minutes ago \nDescription : The Net::EasyTCP package 0.15 through 0.26 for Perl uses Perl's builtin rand() if no strong randomization module is present. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-02T06:43:06.000000Z"}]}