Search CVE reports
51 – 60 of 269 results
Data::Entropy for Perl 0.007 and earlier use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.
1 affected package
libdata-entropy-perl
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| libdata-entropy-perl | Needs evaluation | Needs evaluation | Needs evaluation | Ignored | Needs evaluation |
String::Compare::ConstantTime for Perl through 0.321 is vulnerable to timing attacks that allow an attacker to guess the length of a secret string. As stated in the documentation: "If the lengths of the strings are different,...
1 affected package
libstring-compare-constanttime-perl
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| libstring-compare-constanttime-perl | Needs evaluation | Needs evaluation | Needs evaluation | Ignored | Needs evaluation |
DBIx::Class::EncodedColumn use the rand() function, which is not cryptographically secure to salt password hashes. This vulnerability is associated with program files Crypt/Eksblowfish/Bcrypt.pm. This issue affects...
1 affected package
libdbix-class-encodedcolumn-perl
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| libdbix-class-encodedcolumn-perl | Needs evaluation | Needs evaluation | Needs evaluation | Ignored | Needs evaluation |
DBIx::Class::EncodedColumn use the rand() function, which is not cryptographically secure to salt password hashes. This vulnerability is associated with program files lib/DBIx/Class/EncodedColumn/Digest.pm. This issue affects...
1 affected package
libdbix-class-encodedcolumn-perl
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| libdbix-class-encodedcolumn-perl | Needs evaluation | Needs evaluation | Needs evaluation | Ignored | Needs evaluation |
In Net::OAuth::Client in the Net::OAuth package before 0.29 for Perl, the default nonce is a 32-bit integer generated from the built-in rand() function, which is not cryptographically strong.
1 affected package
libnet-oauth-perl
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| libnet-oauth-perl | Not affected | Needs evaluation | Needs evaluation | Ignored | Needs evaluation |
The Net::EasyTCP package 0.15 through 0.26 for Perl uses Perl's builtin rand() if no strong randomization module is present.
1 affected package
libnet-easytcp-perl
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| libnet-easytcp-perl | Not in release | Needs evaluation | Needs evaluation | Ignored | Needs evaluation |
The Crypt::Random::Source package before 0.13 for Perl has a fallback to the built-in rand() function, which is not a secure source of random bits.
1 affected package
libcrypt-random-source-perl
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| libcrypt-random-source-perl | Not affected | Not affected | Not affected | Not affected | Needs evaluation |
An issue was discovered in the Graphics::ColorNames package before 3.2.0 for Perl. There is an ambiguity between modules and filenames that can lead to HTML injection by an attacker who can create a file in the current working directory.
1 affected package
libgraphics-colornames-perl
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| libgraphics-colornames-perl | Needs evaluation | Needs evaluation | Needs evaluation | Ignored | Needs evaluation |
The POSIX::2008 package before 0.24 for Perl has a potential _execve50c env buffer overflow.
1 affected package
libposix-2008-perl
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| libposix-2008-perl | Not affected | Needs evaluation | Needs evaluation | Ignored | Needs evaluation |
The Imager package before 1.025 for Perl has a heap-based buffer overflow leading to denial of service, or possibly unspecified other impact, when the trim() method is called on a crafted input image.
1 affected package
libimager-perl
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| libimager-perl | Not affected | Needs evaluation | Needs evaluation | Ignored | Needs evaluation |