Seeds were generated using Perl's built-in rand function, which is predictable and unsuitable for security usage.
No advisories yet.
Solution
Upgrade to version 1.20 or later.
Workaround
No workaround given by the vendor.
Mon, 18 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Sun, 17 May 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Timlegge
Timlegge crypt::dsa |
|
| Vendors & Products |
Timlegge
Timlegge crypt::dsa |
Sat, 16 May 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 15 May 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Crypt::DSA versions before 1.20 for Perl generate seeds using rand. Seeds were generated using Perl's built-in rand function, which is predictable and unsuitable for security usage. | |
| Title | Crypt::DSA versions before 1.20 for Perl generate seeds using rand | |
| Weaknesses | CWE-331 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2026-05-18T15:04:20.918Z
Reserved: 2026-05-15T17:20:11.254Z
Link: CVE-2026-8700
Updated: 2026-05-16T00:31:19.834Z
Status : Deferred
Published: 2026-05-15T22:16:57.020
Modified: 2026-05-18T17:40:45.343
Link: CVE-2026-8700
No data.
OpenCVE Enrichment
Updated: 2026-05-18T16:30:05Z