{"uuid": "e39e51f7-ef14-4b09-b00b-e7ff94f1c295", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2814", "type": "seen", "source": "https://t.me/cvedetector/22801", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2814 - \"Verisign Crypt::CBC Insecure Random Number Generation Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-2814 \nPublished : April 13, 2025, 12:15 a.m. | 32\u00a0minutes ago \nDescription : Crypt::CBC versions between 1.21 and 3.04 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.  \n  \nThis issue affects operating systems where \"/dev/urandom'\" is unavailable.\u00a0 In that case, Crypt::CBC will fallback to use the insecure rand() function. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-13T03:33:14.000000Z"}