{"api_version":"1","generated_at":"2026-04-14T01:58:21+00:00","cve":"CVE-2026-5086","urls":{"html":"https://cve.report/CVE-2026-5086","api":"https://cve.report/api/cve/CVE-2026-5086.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-5086","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-5086"},"summary":{"title":"Crypt::SecretBuffer versions before 0.019 for Perl is suseceptible to timing attacks","description":"Crypt::SecretBuffer versions before 0.019 for Perl is suseceptible to timing attacks.\n\nFor example, if Crypt::SecretBuffer was used to store and compare plaintext passwords, then discrepencies in timing could be used to guess the secret password.","state":"PUBLISHED","assigner":"CPANSec","published_at":"2026-04-13 23:16:27","updated_at":"2026-04-13 23:16:27"},"problem_types":["CWE-208","CWE-208 CWE-208 Observable Timing Discrepancy"],"metrics":[],"references":[{"url":"https://metacpan.org/release/NERDVANA/Crypt-SecretBuffer-0.019/source/Changes","name":"https://metacpan.org/release/NERDVANA/Crypt-SecretBuffer-0.019/source/Changes","refsource":"9b29abf9-4ab0-4765-b253-1875cd9b441e","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-5086","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5086","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"NERDVANA","product":"Crypt::SecretBuffer","version":"affected 0.019 custom","platforms":[]}],"timeline":[],"solutions":[{"source":"CNA","title":"","value":"Upgrade to version 0.019 or later.","time":"","lang":"en"}],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"collectionURL":"https://cpan.org/modules","defaultStatus":"unaffected","packageName":"Crypt-SecretBuffer","product":"Crypt::SecretBuffer","programFiles":["SecretBuffer.xs"],"programRoutines":[{"name":"Crypt::SecretBuffer::memcmp"}],"repo":"https://github.com/nrdvana/perl-Crypt-SecretBuffer","vendor":"NERDVANA","versions":[{"lessThan":"0.019","status":"affected","version":"0","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"Crypt::SecretBuffer versions before 0.019 for Perl is suseceptible to timing attacks.\n\nFor example, if Crypt::SecretBuffer was used to store and compare plaintext passwords, then discrepencies in timing could be used to guess the secret password."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-208","description":"CWE-208 Observable Timing Discrepancy","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-13T22:54:53.724Z","orgId":"9b29abf9-4ab0-4765-b253-1875cd9b441e","shortName":"CPANSec"},"references":[{"tags":["release-notes"],"url":"https://metacpan.org/release/NERDVANA/Crypt-SecretBuffer-0.019/source/Changes"}],"solutions":[{"lang":"en","value":"Upgrade to version 0.019 or later."}],"source":{"discovery":"UNKNOWN"},"title":"Crypt::SecretBuffer versions before 0.019 for Perl is suseceptible to timing attacks","x_generator":{"engine":"cpansec-cna-tool 0.1"}}},"cveMetadata":{"assignerOrgId":"9b29abf9-4ab0-4765-b253-1875cd9b441e","assignerShortName":"CPANSec","cveId":"CVE-2026-5086","datePublished":"2026-04-13T22:54:53.724Z","dateReserved":"2026-03-28T19:22:27.564Z","dateUpdated":"2026-04-13T22:54:53.724Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-13 23:16:27","lastModifiedDate":"2026-04-13 23:16:27","problem_types":["CWE-208","CWE-208 CWE-208 Observable Timing Discrepancy"],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"5086","Ordinal":"1","Title":"Crypt::SecretBuffer versions before 0.019 for Perl is suseceptib","CVE":"CVE-2026-5086","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"5086","Ordinal":"1","NoteData":"Crypt::SecretBuffer versions before 0.019 for Perl is suseceptible to timing attacks.\n\nFor example, if Crypt::SecretBuffer was used to store and compare plaintext passwords, then discrepencies in timing could be used to guess the secret password.","Type":"Description","Title":"Crypt::SecretBuffer versions before 0.019 for Perl is suseceptib"}]}}}