Search CVE reports
81 – 90 of 207 results
Heap-based buffer overflow in the S_regatom function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to cause a denial of service (out-of-bounds write) via a regular expression with a...
1 affected package
perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
perl | — | — | — | — |
libapache-authenhook-perl 2.00-04 stores usernames and passwords in plaintext in the vhost error log.
1 affected package
libapache-authenhook-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libapache-authenhook-perl | — | — | — | — |
Some fixes available 1 of 5
The DBD::mysql module through 4.043 for Perl uses the mysql_ssl=1 setting to mean that SSL is optional (even though this setting’s documentation has a “your communication with the server will be encrypted” statement), which allows...
1 affected package
libdbd-mysql-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libdbd-mysql-perl | Not affected | Not affected | Not affected | Not affected |
Some fixes available 1 of 5
The DBD::mysql module through 4.043 for Perl allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by triggering (1) certain error responses from a...
1 affected package
libdbd-mysql-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libdbd-mysql-perl | Not affected | Not affected | Not affected | Not affected |
Some fixes available 4 of 5
Use-after-free in the XML-LibXML module through 2.0129 for Perl allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call.
1 affected package
libxml-libxml-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libxml-libxml-perl | — | — | — | — |
Some fixes available 1 of 4
The IPTables-Parse module before 1.6 for Perl allows local users to write to arbitrary files owned by the current user.
1 affected package
libiptables-parse-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libiptables-parse-perl | — | — | — | Not affected |
Some fixes available 2 of 4
Race condition in the rmtree and remove_tree functions in the File-Path module before 2.13 for Perl allows attackers to set the mode on arbitrary files via vectors involving directory-permission loosening logic.
1 affected package
perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
perl | — | — | — | — |
lib/Config/Model.pm in Config-Model (aka libconfig-model-perl) before 2.102 allows local users to gain privileges via a crafted model in the current working directory, related to use of . with the INC array.
1 affected package
libconfig-model-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libconfig-model-perl | Not affected | Not affected | Not affected | Not affected |
The gen_class_pod implementation in lib/Config/Model/Utils/GenClassPod.pm in Config-Model (aka libconfig-model-perl) before 2.102 has a dangerous “use lib” line, which allows remote attackers to have an unspecified impact via a...
1 affected package
libconfig-model-perl
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
libconfig-model-perl | Not affected | Not affected | Not affected | Not affected |
perltidy through 20160302, as used by perlcritic, check-all-the-things, and other software, relies on the current working directory for certain output files and does not have a symlink-attack protection mechanism, which...
1 affected package
perltidy
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
perltidy | Not affected | Not affected | Not affected | Not affected |