Mojolicious

2 CVEs product

Monthly

CVE-2024-58134 HIGH POC PATCH This Week

Mojolicious versions from 0.999922 for Perl uses a hard coded string, or the application's class name, as an HMAC session cookie secret by default. Rated high severity (CVSS 8.1), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available.

Information Disclosure Mojolicious Suse
NVD GitHub
CVSS 3.1
8.1
EPSS
0.3%
CVE-2024-58135 MEDIUM POC PATCH This Month

Mojolicious versions from 7.28 for Perl will generate weak HMAC session cookie secrets via "mojo generate app" by default When creating a default app skeleton with the "mojo generate app" tool, a. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

Information Disclosure Mojolicious Suse
NVD GitHub
CVSS 3.1
5.3
EPSS
0.6%
EPSS 0% CVSS 8.1
HIGH POC PATCH This Week

Mojolicious versions from 0.999922 for Perl uses a hard coded string, or the application's class name, as an HMAC session cookie secret by default. Rated high severity (CVSS 8.1), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available.

Information Disclosure Mojolicious Suse
NVD GitHub
EPSS 1% CVSS 5.3
MEDIUM POC PATCH This Month

Mojolicious versions from 7.28 for Perl will generate weak HMAC session cookie secrets via "mojo generate app" by default When creating a default app skeleton with the "mojo generate app" tool, a. Rated medium severity (CVSS 5.3), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available.

Information Disclosure Mojolicious Suse
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy