Search CVE reports
31 – 40 of 205 results
CVE-2020-16156
Medium prioritySome fixes available 7 of 9
CPAN 2.28 allows Signature Verification Bypass.
1 affected packages
perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
perl | — | Fixed | Fixed | Fixed | Fixed |
CVE-2020-16155
Medium priorityThe CPAN::Checksums package 2.12 for Perl does not uniquely define signed data.
1 affected packages
libcpan-checksums-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libcpan-checksums-perl | Vulnerable | Vulnerable | Vulnerable | Vulnerable | Needs evaluation |
CVE-2021-36770
Medium prioritySome fixes available 8 of 19
Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires...
2 affected packages
libencode-perl, perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libencode-perl | Vulnerable | Vulnerable | Not affected | Not affected | Needs evaluation |
perl | Fixed | Fixed | Not affected | Not affected | Not affected |
CVE-2012-1102
Medium prioritySome fixes available 3 of 4
It was discovered that the XML::Atom Perl module before version 0.39 did not disable external entities when parsing XML from potentially untrusted sources. This may allow attackers to gain read access to otherwise protected...
1 affected packages
libxml-atom-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libxml-atom-perl | — | — | — | — | — |
CVE-2021-22204
High priorityImproper neutralization of user data in the DjVu file format in ExifTool versions 7.44 and up allows arbitrary code execution when parsing the malicious image
1 affected packages
libimage-exiftool-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libimage-exiftool-perl | — | Not affected | Fixed | Fixed | Fixed |
CVE-2021-29424
Medium priorityThe Net::Netmask module before 2.0000 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on...
2 affected packages
libnet-netmask-perl, libnetwork-ipv4addr-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libnet-netmask-perl | Not affected | Not affected | Vulnerable | Vulnerable | Vulnerable |
libnetwork-ipv4addr-perl | Vulnerable | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
CVE-2021-29662
Negligible priorityThe Data::Validate::IP module through 0.29 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based...
1 affected packages
libdata-validate-ip-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libdata-validate-ip-perl | Not affected | Not affected | Vulnerable | Vulnerable | Needs evaluation |
CVE-2019-20919
Medium priorityAn issue was discovered in the DBI module before 1.643 for Perl. The hv_fetch() documentation requires checking for NULL and the code does that. But, shortly thereafter, it calls SvOK(profile), causing a NULL pointer dereference.
1 affected packages
libdbi-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libdbi-perl | — | — | Not affected | Fixed | Fixed |
CVE-2014-10402
Medium prioritySome fixes available 3 of 5
An issue was discovered in the DBI module through 1.643 for Perl. DBD::File drivers can open files from folders other than those specifically passed via the f_dir attribute in the data source name (DSN). NOTE: this issue exists...
1 affected packages
libdbi-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libdbi-perl | Not affected | Not affected | Fixed | Fixed | Fixed |
CVE-2020-14393
Low prioritySome fixes available 2 of 3
A buffer overflow was found in perl-DBI < 1.643 in DBI.xs. A local attacker who is able to supply a string longer than 300 characters could cause an out-of-bounds write, affecting the availability of the service or integrity of data.
1 affected packages
libdbi-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libdbi-perl | Not affected | Not affected | Not affected | Fixed | Fixed |