Search CVE reports
61 – 70 of 242 results
A vulnerability has been found in Catalyst-Plugin-Session up to 0.40 and classified as problematic. This vulnerability affects the function _load_sessionid of the file lib/Catalyst/Plugin/Session.pm of the component Session ID...
1 affected package
libcatalyst-plugin-session-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libcatalyst-plugin-session-perl | Not affected | Not affected | Not affected | Needs evaluation |
Some fixes available 6 of 7
HTTP::Daemon is a simple http server class written in perl. Versions prior to 6.15 are subject to a vulnerability which could potentially be exploited to gain privileged access to APIs or poison intermediate caches. It...
1 affected package
libhttp-daemon-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libhttp-daemon-perl | — | Fixed | Fixed | Fixed |
lib/Image/ExifTool.pm in ExifTool before 12.38 mishandles a $file =~ /\|$/ check, leading to command injection.
1 affected package
libimage-exiftool-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libimage-exiftool-perl | Not affected | Needs evaluation | Vulnerable | Vulnerable |
Some fixes available 7 of 9
CPAN 2.28 allows Signature Verification Bypass.
1 affected package
perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
perl | — | Fixed | Fixed | Fixed |
The CPAN::Checksums package 2.12 for Perl does not uniquely define signed data.
1 affected package
libcpan-checksums-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libcpan-checksums-perl | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
Some fixes available 9 of 21
Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires...
2 affected packages
libencode-perl, perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libencode-perl | Vulnerable | Vulnerable | Not affected | Not affected |
perl | Fixed | Fixed | Not affected | Not affected |
Some fixes available 3 of 4
It was discovered that the XML::Atom Perl module before version 0.39 did not disable external entities when parsing XML from potentially untrusted sources. This may allow attackers to gain read access to otherwise protected...
1 affected package
libxml-atom-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libxml-atom-perl | — | — | — | — |
Improper neutralization of user data in the DjVu file format in ExifTool versions 7.44 and up allows arbitrary code execution when parsing the malicious image
1 affected package
libimage-exiftool-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libimage-exiftool-perl | — | Not affected | Fixed | Fixed |
The Net::Netmask module before 2.0000 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on...
2 affected packages
libnet-netmask-perl, libnetwork-ipv4addr-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libnet-netmask-perl | Not affected | Not affected | Vulnerable | Vulnerable |
libnetwork-ipv4addr-perl | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
The Data::Validate::IP module through 0.29 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based...
1 affected package
libdata-validate-ip-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libdata-validate-ip-perl | Not affected | Not affected | Vulnerable | Vulnerable |