Search CVE reports


Toggle filters

11 – 20 of 241 results


CVE-2025-40909

Medium priority

Some fixes available 3 of 8

Perl threads have a working directory race condition where file operations may target unintended paths. If a directory handle is open at thread creation, the process-wide current working directory is temporarily changed in order...

1 affected package

perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
perl Fixed Fixed Needs evaluation Needs evaluation
Show less packages

CVE-2020-36846

Medium priority
Needs evaluation

A buffer overflow, as described in CVE-2020-8927, exists in the embedded Brotli library.  Versions of IO::Compress::Brotli prior to 0.007 included a version of the brotli library prior to version 1.0.8, where an...

1 affected package

libio-compress-brotli-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libio-compress-brotli-perl Needs evaluation Not in release Not in release
Show less packages

CVE-2025-40911

Medium priority
Needs evaluation

Net::CIDR::Set versions 0.10 through 0.13 for Perl does not properly handle leading zero characters in IP CIDR address strings, which could allow attackers to bypass access control that is based on IP addresses. Leading zeros are...

1 affected package

libnet-cidr-set-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libnet-cidr-set-perl Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2025-40906

Medium priority
Needs evaluation

BSON::XS versions 0.8.4 and earlier for Perl includes a bundled libbson 1.1.7, which has several vulnerabilities. Those include CVE-2017-14227, CVE-2018-16790, CVE-2023-0437, CVE-2024-6381, CVE-2024-6383, and...

1 affected package

libbson-xs-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libbson-xs-perl Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2025-40907

Medium priority
Fixed

FCGI versions 0.44 through 0.82, for Perl, include a vulnerable version of the FastCGI fcgi2 (aka fcgi) library. The included FastCGI library is affected by CVE-2025-23016, causing an integer overflow (and resultant heap-based...

1 affected package

libfcgi-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libfcgi-perl Not affected Not affected Fixed Fixed
Show less packages

CVE-2024-58134

Medium priority
Needs evaluation

Mojolicious versions from 0.999922 through 9.40 for Perl uses a hard coded string, or the application's class name, as a HMAC session secret by default. These predictable default secrets can be exploited to forge session cookies....

1 affected package

libmojolicious-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libmojolicious-perl Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2024-58135

Medium priority
Needs evaluation

Mojolicious versions from 7.28 through 9.40 for Perl may generate weak HMAC session secrets. When creating a default app with the "mojo generate app" tool, a weak secret is written to the application's configuration file using...

1 affected package

libmojolicious-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libmojolicious-perl Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2024-56406

Medium priority
Fixed

A heap buffer overflow vulnerability was discovered in Perl. Release branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10. When there are non-ASCII bytes in the left-hand-side...

1 affected package

perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
perl Fixed Fixed Not affected Not affected
Show less packages

CVE-2025-2814

Medium priority
Needs evaluation

Crypt::CBC versions between 1.21 and 3.05 for Perl may use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. This issue affects operating systems where...

1 affected package

libcrypt-cbc-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libcrypt-cbc-perl Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2024-58036

Medium priority
Needs evaluation

Net::Dropbox::API 1.9 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions. Specifically Net::Dropbox::API uses the Data::Random library...

1 affected package

libnet-dropbox-api-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libnet-dropbox-api-perl Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages