Crypt::CBC Perl module 2.16 and previous versions, when running in RandomIV mode, uses an initialization vector (IV) of 8 bytes, which results in weaker encryption when used with a cipher that requires a larger block size than 8 bytes, such as Rijndael.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
lincoln d. stein crypt cbc 1.24 |
||
lincoln d. stein crypt cbc 1.25 |
||
lincoln d. stein crypt cbc 2.07 |
||
lincoln d. stein crypt cbc 2.08 |
||
lincoln d. stein crypt cbc 2.15 |
||
lincoln d. stein crypt cbc |
||
lincoln d. stein crypt cbc 1.21 |
||
lincoln d. stein crypt cbc 1.22 |
||
lincoln d. stein crypt cbc 2.04 |
||
lincoln d. stein crypt cbc 2.05 |
||
lincoln d. stein crypt cbc 2.13 |
||
lincoln d. stein crypt cbc 2.14 |
||
lincoln d. stein crypt cbc 1.00 |
||
lincoln d. stein crypt cbc 2.00 |
||
lincoln d. stein crypt cbc 2.01 |
||
lincoln d. stein crypt cbc 2.09 |
||
lincoln d. stein crypt cbc 2.10 |
||
lincoln d. stein crypt cbc 1.10 |
||
lincoln d. stein crypt cbc 1.20 |
||
lincoln d. stein crypt cbc 2.02 |
||
lincoln d. stein crypt cbc 2.03 |
||
lincoln d. stein crypt cbc 2.11 |
||
lincoln d. stein crypt cbc 2.12 |