These versions use the built-in rand function, which is predictable and unsuitable for cryptography.
No advisories yet.
Solution
Upgrade to version 0.10 or later.
Workaround
No workaround given by the vendor.
Thu, 21 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 21 May 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rrwo
Rrwo crypt::saltedhash |
|
| Vendors & Products |
Rrwo
Rrwo crypt::saltedhash |
Thu, 21 May 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 20 May 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Crypt::SaltedHash versions through 0.09 for Perl generate insecure random values for salts. These versions use the built-in rand function, which is predictable and unsuitable for cryptography. | |
| Title | Crypt::SaltedHash versions through 0.09 for Perl generate insecure random values for salts | |
| Weaknesses | CWE-338 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2026-05-21T14:12:28.966Z
Reserved: 2026-05-19T16:17:52.855Z
Link: CVE-2026-47372
Updated: 2026-05-21T14:12:24.494Z
Status : Deferred
Published: 2026-05-20T22:16:37.270
Modified: 2026-05-21T16:04:53.813
Link: CVE-2026-47372
No data.
OpenCVE Enrichment
Updated: 2026-05-21T17:00:14Z