Search CVE reports
111 – 120 of 238 results
Some fixes available 1 of 4
The IPTables-Parse module before 1.6 for Perl allows local users to write to arbitrary files owned by the current user.
1 affected package
libiptables-parse-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libiptables-parse-perl | — | — | — | Not affected |
Algorithmic complexity vulnerability in Address.pm in the Email-Address module 1.908 and earlier for Perl allows remote attackers to cause a denial of service (CPU consumption) via a crafted string containing a list of e-mail...
1 affected package
libemail-address-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libemail-address-perl | Not affected | Not affected | Not affected | Vulnerable |
Some fixes available 1 of 4
Cross-site scripting (XSS) vulnerability in the HTML-Scrubber module before 0.15 for Perl, when the comment feature is enabled, allows remote attackers to inject arbitrary web script or HTML via a crafted comment.
1 affected package
libhtml-scrubber-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libhtml-scrubber-perl | — | — | — | Not affected |
The _clone function in XML::LibXML before 2.0119 does not properly set the expand_entities option, which allows remote attackers to conduct XML external entity (XXE) attacks via crafted XML data to the (1) new or (2) load_xml function.
1 affected package
libxml-libxml-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libxml-libxml-perl | — | — | — | — |
Some fixes available 4 of 5
Untrusted search path vulnerability in Module::Signature before 0.75 allows local users to gain privileges via a Trojan horse module under the current working directory, as demonstrated by a Trojan horse Text::Diff module.
1 affected package
libmodule-signature-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libmodule-signature-perl | — | — | — | — |
Some fixes available 4 of 5
Module::Signature before 0.74 allows remote attackers to execute arbitrary shell commands via a crafted SIGNATURE file which is not properly handled when generating checksums from a signed manifest.
1 affected package
libmodule-signature-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libmodule-signature-perl | — | — | — | — |
Some fixes available 4 of 5
Module::Signature before 0.74 allows remote attackers to bypass signature verification for files via a signature file that does not list the files.
1 affected package
libmodule-signature-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libmodule-signature-perl | — | — | — | — |
Some fixes available 4 of 5
The PGP signature parsing in Module::Signature before 0.74 allows remote attackers to cause the unsigned portion of a SIGNATURE file to be treated as the signed portion via unspecified vectors.
1 affected package
libmodule-signature-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libmodule-signature-perl | — | — | — | — |
Some fixes available 10 of 11
Multiple stack-based buffer overflows in the ib_fill_isqlda function in dbdimp.c in DBD-Firebird before 1.19 allow remote attackers to have unspecified impact via unknown vectors that trigger an error condition, related to binding...
1 affected package
libdbd-firebird-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libdbd-firebird-perl | — | — | — | Fixed |
Some fixes available 2 of 3
Use-after-free vulnerability in DBD::mysql before 4.029 allows attackers to cause a denial of service (program crash) or possibly execute arbitrary code via vectors related to a lost server connection.
1 affected package
libdbd-mysql-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libdbd-mysql-perl | — | — | — | — |