Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

Search CVE reports


Toggle filters

31 – 40 of 205 results


CVE-2020-16156

Medium priority

Some fixes available 7 of 9

CPAN 2.28 allows Signature Verification Bypass.

1 affected packages

perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
perl Fixed Fixed Fixed Fixed
Show less packages

CVE-2020-16155

Medium priority
Vulnerable

The CPAN::Checksums package 2.12 for Perl does not uniquely define signed data.

1 affected packages

libcpan-checksums-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
libcpan-checksums-perl Vulnerable Vulnerable Vulnerable Vulnerable Needs evaluation
Show less packages

CVE-2021-36770

Medium priority

Some fixes available 8 of 19

Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires...

2 affected packages

libencode-perl, perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
libencode-perl Vulnerable Vulnerable Not affected Not affected Needs evaluation
perl Fixed Fixed Not affected Not affected Not affected
Show less packages

CVE-2012-1102

Medium priority

Some fixes available 3 of 4

It was discovered that the XML::Atom Perl module before version 0.39 did not disable external entities when parsing XML from potentially untrusted sources. This may allow attackers to gain read access to otherwise protected...

1 affected packages

libxml-atom-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
libxml-atom-perl
Show less packages

CVE-2021-22204

High priority
Fixed

Improper neutralization of user data in the DjVu file format in ExifTool versions 7.44 and up allows arbitrary code execution when parsing the malicious image

1 affected packages

libimage-exiftool-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
libimage-exiftool-perl Not affected Fixed Fixed Fixed
Show less packages

CVE-2021-29424

Medium priority
Vulnerable

The Net::Netmask module before 2.0000 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on...

2 affected packages

libnet-netmask-perl, libnetwork-ipv4addr-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
libnet-netmask-perl Not affected Not affected Vulnerable Vulnerable Vulnerable
libnetwork-ipv4addr-perl Vulnerable Vulnerable Vulnerable Vulnerable Vulnerable
Show less packages

CVE-2021-29662

Negligible priority
Vulnerable

The Data::Validate::IP module through 0.29 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based...

1 affected packages

libdata-validate-ip-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
libdata-validate-ip-perl Not affected Not affected Vulnerable Vulnerable Needs evaluation
Show less packages

CVE-2019-20919

Medium priority
Fixed

An issue was discovered in the DBI module before 1.643 for Perl. The hv_fetch() documentation requires checking for NULL and the code does that. But, shortly thereafter, it calls SvOK(profile), causing a NULL pointer dereference.

1 affected packages

libdbi-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
libdbi-perl Not affected Fixed Fixed
Show less packages

CVE-2014-10402

Medium priority

Some fixes available 3 of 5

An issue was discovered in the DBI module through 1.643 for Perl. DBD::File drivers can open files from folders other than those specifically passed via the f_dir attribute in the data source name (DSN). NOTE: this issue exists...

1 affected packages

libdbi-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
libdbi-perl Not affected Not affected Fixed Fixed Fixed
Show less packages

CVE-2020-14393

Low priority

Some fixes available 2 of 3

A buffer overflow was found in perl-DBI < 1.643 in DBI.xs. A local attacker who is able to supply a string longer than 300 characters could cause an out-of-bounds write, affecting the availability of the service or integrity of data.

1 affected packages

libdbi-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
libdbi-perl Not affected Not affected Not affected Fixed Fixed
Show less packages