No advisories yet.
Solution
Upgrade to WWW::OAuth 1.001 or higher
Workaround
No workaround given by the vendor.
Tue, 17 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 13 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dbook
Dbook www::oauth |
|
| Vendors & Products |
Dbook
Dbook www::oauth |
Fri, 13 Feb 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 12 Feb 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WWW::OAuth 1.000 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. | |
| Title | WWW::OAuth 1.000 and earlier for Perl uses insecure rand() function for cryptographic functions | |
| Weaknesses | CWE-338 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2026-02-17T15:05:12.318Z
Reserved: 2025-04-16T09:05:34.360Z
Link: CVE-2025-40905
Updated: 2026-02-13T19:16:45.884Z
Status : Awaiting Analysis
Published: 2026-02-13T00:16:03.280
Modified: 2026-02-17T15:16:18.387
Link: CVE-2025-40905
No data.
OpenCVE Enrichment
Updated: 2026-02-13T21:28:54Z