Search CVE reports


Toggle filters

21 – 30 of 238 results


CVE-2024-13939

Medium priority
Needs evaluation

String::Compare::ConstantTime for Perl through 0.321 is vulnerable to timing attacks that allow an attacker to guess the length of a secret string. As stated in the documentation: "If the lengths of the strings are different,...

1 affected package

libstring-compare-constanttime-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libstring-compare-constanttime-perl Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2025-27552

Medium priority
Needs evaluation

DBIx::Class::EncodedColumn use the rand() function, which is not cryptographically secure to salt password hashes. This vulnerability is associated with program files Crypt/Eksblowfish/Bcrypt.pm. This issue affects...

1 affected package

libdbix-class-encodedcolumn-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libdbix-class-encodedcolumn-perl Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2025-27551

Medium priority
Needs evaluation

DBIx::Class::EncodedColumn use the rand() function, which is not cryptographically secure to salt password hashes. This vulnerability is associated with program files lib/DBIx/Class/EncodedColumn/Digest.pm. This issue affects...

1 affected package

libdbix-class-encodedcolumn-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libdbix-class-encodedcolumn-perl Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2025-22376

Medium priority
Needs evaluation

In Net::OAuth::Client in the Net::OAuth package before 0.29 for Perl, the default nonce is a 32-bit integer generated from the built-in rand() function, which is not cryptographically strong.

1 affected package

libnet-oauth-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libnet-oauth-perl Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2024-56830

Medium priority
Needs evaluation

The Net::EasyTCP package 0.15 through 0.26 for Perl uses Perl's builtin rand() if no strong randomization module is present.

1 affected package

libnet-easytcp-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libnet-easytcp-perl Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2018-25107

Medium priority
Needs evaluation

The Crypt::Random::Source package before 0.13 for Perl has a fallback to the built-in rand() function, which is not a secure source of random bits.

1 affected package

libcrypt-random-source-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libcrypt-random-source-perl Not affected Not affected Not affected Needs evaluation
Show less packages

CVE-2024-55918

Medium priority
Needs evaluation

An issue was discovered in the Graphics::ColorNames package before 3.2.0 for Perl. There is an ambiguity between modules and filenames that can lead to HTML injection by an attacker who can create a file in the current working directory.

1 affected package

libgraphics-colornames-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libgraphics-colornames-perl Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2024-55564

Medium priority
Needs evaluation

The POSIX::2008 package before 0.24 for Perl has a potential _execve50c env buffer overflow.

1 affected package

libposix-2008-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libposix-2008-perl Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2024-53901

Medium priority
Needs evaluation

The Imager package before 1.025 for Perl has a heap-based buffer overflow leading to denial of service, or possibly unspecified other impact, when the trim() method is called on a crafted input image.

1 affected package

libimager-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libimager-perl Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2024-10224

Medium priority
Fixed

Qualys discovered that if unsanitized input was used with the library Modules::ScanDeps, before version 1.36 a local attacker could possibly execute arbitrary shell commands by open()ing a "pesky pipe" (such as passing "commands|"...

1 affected package

libmodule-scandeps-perl

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libmodule-scandeps-perl Fixed Fixed Fixed Fixed
Show less packages