Search CVE reports
31 – 40 of 211 results
CVE-2020-36659
Medium priorityIn Apache::Session::Browseable before 1.3.6, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE:...
1 affected package
libapache-session-browseable-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libapache-session-browseable-perl | Not affected | Not affected | Needs evaluation | Needs evaluation | Needs evaluation |
CVE-2020-36658
Medium priorityIn Apache::Session::LDAP before 0.5, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can,...
1 affected package
libapache-session-ldap-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libapache-session-ldap-perl | — | Not affected | Fixed | Fixed | Fixed |
CVE-2023-24038
Medium prioritySome fixes available 6 of 7
The HTML-StripScripts module through 1.06 for Perl allows _hss_attval_style ReDoS because of catastrophic backtracking for HTML content with certain style attributes.
1 affected package
libhtml-stripscripts-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libhtml-stripscripts-perl | — | Fixed | Fixed | Fixed | Fixed |
CVE-2018-25052
Medium priorityA vulnerability has been found in Catalyst-Plugin-Session up to 0.40 and classified as problematic. This vulnerability affects the function _load_sessionid of the file lib/Catalyst/Plugin/Session.pm of the component Session ID...
1 affected package
libcatalyst-plugin-session-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libcatalyst-plugin-session-perl | Not affected | Not affected | Not affected | Needs evaluation | Not affected |
CVE-2022-31081
Medium prioritySome fixes available 6 of 7
HTTP::Daemon is a simple http server class written in perl. Versions prior to 6.15 are subject to a vulnerability which could potentially be exploited to gain privileged access to APIs or poison intermediate caches. It...
1 affected package
libhttp-daemon-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libhttp-daemon-perl | — | Fixed | Fixed | Fixed | Fixed |
CVE-2022-23935
Medium prioritylib/Image/ExifTool.pm in ExifTool before 12.38 mishandles a $file =~ /\|$/ check, leading to command injection.
1 affected package
libimage-exiftool-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libimage-exiftool-perl | Not affected | Needs evaluation | Vulnerable | Vulnerable | Needs evaluation |
CVE-2020-16156
Medium prioritySome fixes available 7 of 9
CPAN 2.28 allows Signature Verification Bypass.
1 affected package
perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
perl | — | Fixed | Fixed | Fixed | Fixed |
CVE-2020-16155
Medium priorityThe CPAN::Checksums package 2.12 for Perl does not uniquely define signed data.
1 affected package
libcpan-checksums-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libcpan-checksums-perl | Vulnerable | Vulnerable | Vulnerable | Vulnerable | Needs evaluation |
CVE-2021-36770
Medium prioritySome fixes available 8 of 19
Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires...
2 affected packages
libencode-perl, perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libencode-perl | Vulnerable | Vulnerable | Not affected | Not affected | Needs evaluation |
perl | Fixed | Fixed | Not affected | Not affected | Not affected |
CVE-2012-1102
Medium prioritySome fixes available 3 of 4
It was discovered that the XML::Atom Perl module before version 0.39 did not disable external entities when parsing XML from potentially untrusted sources. This may allow attackers to gain read access to otherwise protected...
1 affected package
libxml-atom-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libxml-atom-perl | — | — | — | — | — |