Search CVE reports
1 – 10 of 224 results
CVE-2025-40907
Medium priorityFCGI versions 0.44 through 0.82, for Perl, include a vulnerable version of the FastCGI fcgi2 (aka fcgi) library. The included FastCGI library is affected by CVE-2025-23016, causing an integer overflow (and resultant heap-based...
1 affected package
libfcgi-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libfcgi-perl | Not affected | Not affected | Needs evaluation | Needs evaluation |
CVE-2025-40906
Medium priorityBSON::XS versions 0.8.4 and earlier for Perl includes a bundled libbson 1.1.7, which has several vulnerabilities. Those include CVE-2017-14227, CVE-2018-16790, CVE-2023-0437, CVE-2024-6381, CVE-2024-6383, and...
1 affected package
libbson-xs-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libbson-xs-perl | Needs evaluation | Needs evaluation | Needs evaluation | — |
CVE-2024-58134
Medium priorityMojolicious versions from 0.999922 through 9.40 for Perl uses a hard coded string, or the application's class name, as a HMAC session secret by default. These predictable default secrets can be exploited to forge session cookies....
1 affected package
libmojolicious-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libmojolicious-perl | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
CVE-2024-58135
Medium priorityMojolicious versions from 7.28 through 9.40 for Perl may generate weak HMAC session secrets. When creating a default app with the "mojo generate app" tool, a weak secret is written to the application's configuration file using...
1 affected package
libmojolicious-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libmojolicious-perl | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
CVE-2024-56406
Medium priorityA heap buffer overflow vulnerability was discovered in Perl. Release branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10. When there are non-ASCII bytes in the left-hand-side...
1 affected package
perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
perl | Fixed | Fixed | Not affected | Not affected |
CVE-2025-2814
Medium priorityCrypt::CBC versions between 1.21 and 3.04 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. This issue affects operating systems where...
1 affected package
libcrypt-cbc-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libcrypt-cbc-perl | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
CVE-2024-58036
Medium priorityNet::Dropbox::API 1.9 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. Specifically Net::Dropbox::API uses the Data::Random library...
1 affected package
libnet-dropbox-api-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libnet-dropbox-api-perl | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
CVE-2024-57868
Medium priorityWeb::API 2.8 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. Specifically Web::API uses the Data::Random library which...
1 affected package
libweb-api-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libweb-api-perl | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
CVE-2025-30673
Medium prioritySub::HandlesVia for Perl before 0.050002 allows untrusted code from the current working directory ('.') to be loaded similar to CVE-2016-1238. If an attacker can place a malicious file in current working directory, it may...
1 affected package
libsub-handlesvia-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libsub-handlesvia-perl | Needs evaluation | Needs evaluation | Not in release | — |
CVE-2025-1860
Medium priorityData::Entropy for Perl 0.007 and earlier use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.
1 affected package
libdata-entropy-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libdata-entropy-perl | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |