| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2026-5082 | Amon2::Plugin::Web::CSRFDefender versions from 7.00 through 7.03 for Perl generate an insecure session id | TOKUHIROM | Amon2::Plugin::Web::CSRFDefender | - | - | 2026-04-08 05:48:44 | Deep Dive |
| CVE-2025-15604 | Amon2 versions before 6.17 for Perl use an insecure random_string implementation for security functions | TOKUHIROM | Amon2 | 中危 | - | 2026-03-28 18:43:56 | Deep Dive |
| CVE-2026-3257 | UnQLite versions through 0.06 for Perl uses a potentially insecure version of the UnQLite library | TOKUHIROM | UnQLite | 超危 | - | 2026-03-05 01:35:13 | Deep Dive |
| CVE-2018-25160 | HTTP::Session2 versions through 1.09 for Perl does not validate the format of user provided session ids, enabling code injection or other impact depending on session backend | TOKUHIROM | HTTP::Session2 | 中危 | - | 2026-02-27 20:15:31 | Deep Dive |
| CVE-2026-3255 | HTTP::Session2 versions before 1.12 for Perl may generate weak session ids using the rand() function | TOKUHIROM | HTTP::Session2 | 中危 | - | 2026-02-27 20:12:35 | Deep Dive |