Search CVE reports
51 – 60 of 238 results
Some fixes available 9 of 21
Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires...
2 affected packages
libencode-perl, perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libencode-perl | Vulnerable | Vulnerable | Not affected | Not affected |
perl | Fixed | Fixed | Not affected | Not affected |
The Data::Validate::IP module through 0.29 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based...
1 affected package
libdata-validate-ip-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libdata-validate-ip-perl | Not affected | Not affected | Vulnerable | Vulnerable |
The Net::Netmask module before 2.0000 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on...
2 affected packages
libnet-netmask-perl, libnetwork-ipv4addr-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libnet-netmask-perl | Not affected | Not affected | Vulnerable | Vulnerable |
libnetwork-ipv4addr-perl | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
Improper neutralization of user data in the DjVu file format in ExifTool versions 7.44 and up allows arbitrary code execution when parsing the malicious image
1 affected package
libimage-exiftool-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libimage-exiftool-perl | — | Not affected | Fixed | Fixed |
A buffer overflow, as described in CVE-2020-8927, exists in the embedded Brotli library. Versions of IO::Compress::Brotli prior to 0.007 included a version of the brotli library prior to version 1.0.8, where an...
1 affected package
libio-compress-brotli-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libio-compress-brotli-perl | Needs evaluation | Not in release | Not in release | — |
The Mojolicious module before 8.65 for Perl is vulnerable to secure_compare timing attacks that allow an attacker to guess the length of a secret string. Only versions after 1.74 are affected.
1 affected package
libmojolicious-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libmojolicious-perl | Not affected | Not affected | Needs evaluation | Needs evaluation |
In Apache::Session::Browseable before 1.3.6, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE:...
1 affected package
libapache-session-browseable-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libapache-session-browseable-perl | Not affected | Not affected | Needs evaluation | Needs evaluation |
In Apache::Session::LDAP before 0.5, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can,...
1 affected package
libapache-session-ldap-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libapache-session-ldap-perl | — | Not affected | Fixed | Fixed |
Some fixes available 7 of 9
CPAN 2.28 allows Signature Verification Bypass.
1 affected package
perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
perl | — | Fixed | Fixed | Fixed |
The CPAN::Checksums package 2.12 for Perl does not uniquely define signed data.
1 affected package
libcpan-checksums-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libcpan-checksums-perl | Vulnerable | Vulnerable | Vulnerable | Vulnerable |