From 6c392e1c11ae621f65612ee27fb51c6fd658aeeb Mon Sep 17 00:00:00 2001 From: brian d foy Date: Wed, 18 Dec 2024 19:50:32 -0500 Subject: [PATCH] re-generate data --- cpan-security-advisory.json | 2 +- cpan-security-advisory.json.gpg | 26 +++--- lib/CPAN/Audit/DB.pm | 144 ++++++++++++++++++++++++++++++-- lib/CPAN/Audit/DB.pm.gpg | 26 +++--- lib/CPAN/Audit/DB.pod | 4 +- lib/CPANSA/DB.pm | 144 ++++++++++++++++++++++++++++++-- lib/CPANSA/DB.pm.gpg | 26 +++--- lib/CPANSA/DB.pod | 4 +- 8 files changed, 320 insertions(+), 56 deletions(-) diff --git a/cpan-security-advisory.json b/cpan-security-advisory.json index 18e187c..8474c45 100644 --- a/cpan-security-advisory.json +++ b/cpan-security-advisory.json @@ -1 +1 @@ -{"module2dist":{"Moxy":"Moxy","Pod::Perldoc":"Pod-Perldoc","IPC::Open3":"perl","Net::IPv4Addr":"Net-IPv4Addr","Valiant::NestedError":"Valiant","Plack::App::PSGIBin":"Plack","POSIX::2008":"POSIX-2008","Image::ExifTool::SigmaRaw":"Image-ExifTool","Mojolicious":"Mojolicious","Image::ExifTool::CBOR":"Image-ExifTool","Pinto::Action::Register":"Pinto","Lemonldap::NG::Portal::MenuTab":"Lemonldap-NG-Portal","Tk::Menu::Cascade":"Tk","PApp::ECMAScript":"PApp","Tk::IconList":"Tk","Apache::MP3::L10N::en":"Apache-MP3","Lemonldap::NG::Portal::Auth::CAS":"Lemonldap-NG-Portal","Jifty::Web::Form::Field::Textarea":"Jifty","Apache::MP3::L10N::ja":"Apache-MP3","Legacy::DB::SyntenyBlock":"GBrowse","Jifty::Script::Env":"Jifty","CGI::File::Temp":"CGI","Moxy::Plugin::GPS::AirHPhone":"Moxy","Jifty::Logger":"Jifty","Bio::DB::GFF::Aggregator::match_gap":"GBrowse","Image::ExifTool::NikonCustom":"Image-ExifTool","Net::DNS::RR::NID":"Net-DNS","Search::OpenSearch::Result":"Search-OpenSearch-Server","GitLab::API::v4::Paginator":"GitLab-API-v4","SOAP::Utils":"SOAP-Lite","Net::DNS::RR::DHCID":"Net-DNS","Jifty::Request::Action":"Jifty","Pinto::Action::Log":"Pinto","Net::LDAP::Control::SortResult":"perl-ldap","YAML::Loader":"YAML","Perlbal::ManageCommand":"Perlbal","CPAN::Prompt":"CPAN","IO::Compress::Adapter::Identity":"IO-Compress","PerlIO::encoding":"perl","Kelp::Module::Config::Less":"Kelp","Apache::MP3::L10N::nl":"Apache-MP3","Kelp::Routes::Pattern":"Kelp","Spreadsheet::ParseExcel::Cell":"Spreadsheet-ParseExcel","Kelp::Exception":"Kelp","Apache::Session::Browseable::DBI":"Apache-Session-Browseable","Proc::Killall":"Proc-ProcessTable","Bundle::Image::Info::XBM":"Image-Info","File::DataClass::Schema":"File-DataClass","Tie::Hash":"perl","MHonArc::CharEnt::CP1253":"MHonArc","Apache::SessionX::Manager":"Apache-SessionX","Jifty::View::Declare::BaseClass":"Jifty","MojoMojo::Controller::Attachment":"MojoMojo","Apache::MP3::L10N::hr":"Apache-MP3","File::RandomAccess":"Image-ExifTool","Imager::Color::Float":"Imager","Spoon::MetadataObject":"Spoon","APR::Date":"mod_perl","Proc::ProcessTable::Process":"Proc-ProcessTable","Lemonldap::NG::Portal::Plugins::ForceAuthn":"Lemonldap-NG-Portal","POE::Component::IRC::Plugin::BotAddressed":"POE-Component-IRC","MARC::File::XML":"MARC-File-XML","Apache::MP3::L10N::uk":"Apache-MP3","HTTP::Session2":"HTTP-Session2","Porting::updateAUTHORS":"perl","Image::ExifTool::Palm":"Image-ExifTool","Dpkg::Deps::Simple":"Dpkg","Net::DNS::Resolver::android":"Net-DNS","Dpkg::Control::HashCore::Tie":"Dpkg","Kossy::Assets":"Kossy","Lemonldap::NG::Portal::Auth::LDAP":"Lemonldap-NG-Portal","Lemonldap::NG::Portal::Auth::Choice":"Lemonldap-NG-Portal","MojoMojo::Formatter::File::Image":"MojoMojo","CGI::Session::Driver::mysql":"CGI-Session","Image::ExifTool::Lang::pl":"Image-ExifTool","IO::Uncompress::Adapter::Identity":"IO-Compress","MySQL::Admin::GUI":"MySQL-Admin","LWP::Protocol::cpan":"libwww-perl","Crypt::Perl::X::UnknownHash":"Crypt-Perl","Jifty::Plugin::RequestInspector::View":"Jifty","Net::SNMP::Security::Community":"Net-SNMP","Imager::Font":"Imager","SOAP::XMLSchema1999::Deserializer":"SOAP-Lite","Catalyst::Authentication::Store::LDAP::Backend":"Catalyst-Authentication-Store-LDAP","Kossy::Request":"Kossy","Apache::ASP::State":"Apache-ASP","Tk::Font":"Tk","Archive::Zip::Tree":"Archive-Zip","File::Spec::Cygwin":"PathTools","Dpkg":"Dpkg","Apache::Session::Browseable::Store::LDAP":"Apache-Session-Browseable","MHonArc::UTF8::ISO8859_6":"MHonArc","HTML::Editor::Markdown":"MySQL-Admin","APR":"mod_perl","DBD::Proxy::db":"DBI","MHonArc::UTF8::ISO8859_8":"MHonArc","Net::SNMP::Transport::TCP":"Net-SNMP","Dpkg::BuildEnv":"Dpkg","CGI::HTML::Functions":"CGI","Jifty::Web::Form::Field::Combobox":"Jifty","Bio::Graphics::Browser2::SendMail":"GBrowse","CGI::Session::File":"CGI-Session","Dancer2::Core::Role::Logger":"Dancer2","Apache::RedirectLogFix":"mod_perl","Catalyst::Request::REST::ForBrowsers":"Catalyst-Action-REST","MojoMojo::View::JSON":"MojoMojo","Module::Provision::TraitFor::CreatingDistributions":"Module-Provision","Search::OpenSearch::Server::Plack":"Search-OpenSearch-Server","Zonemaster::Backend::DB":"Zonemaster-Backend","MHonArc::CharEnt::ISO8859_1":"MHonArc","RPC::PlClient::Comm":"PlRPC","Net::DNS::Resolver::MSWin32":"Net-DNS","MHonArc::CharEnt":"MHonArc","XAO::DO::Web::Config":"XAO-Web","Module::Provision::Config":"Module-Provision","Bio::Graphics::Browser2::MetaSegment":"GBrowse","Plack::Loader::Restarter":"Plack","YAML::Type::glob":"YAML","User::grent":"perl","back_tick_a_command":"PAR","Pinto::Role::Puller":"Pinto","DBD::SQLite::VirtualTable::FileContent":"DBD-SQLite","VMS::Filespec":"perl","PApp::ECMAScript::Layer":"PApp","Jifty::Web::Form::Field":"Jifty","Galileo::DB::Schema::Result::Page":"Galileo","Lemonldap::NG::Portal::Plugins::NewLocationWarning":"Lemonldap-NG-Portal","Bio::Graphics::Browser2::RemoteSet":"GBrowse","Apache::Wyrd::Services::Auth":"Apache-Wyrd","Mojolicious::Command::generate::app":"Mojolicious","Image::ExifTool::LIF":"Image-ExifTool","DBIx::Custom::NotExists":"DBIx-Custom","Crypt::Perl::Math":"Crypt-Perl","POSIX::SigSet":"perl","Lemonldap::NG::Portal::2F::REST":"Lemonldap-NG-Portal","MHonArc::CharEnt::ISO8859_8":"MHonArc","Dancer2::Core::Cookie":"Dancer2","File::Temp":"File-Temp","Crypt::Digest::SHA384":"CryptX","App::Serializer::Perl":"App-Context","Encode::GSM0338":"Encode","App::Pinto::Command::pin":"Pinto","HTML::Perlinfo::Apache":"HTML-Perlinfo","CGI::Carp":"CGI","Imager::ExtUtils":"Imager","Spreadsheet::ParseXLSX::Decryptor::Agile":"Spreadsheet-ParseXLSX","DBD::SQLite::Constants":"DBD-SQLite","CPAN::Distroprefs::Pref":"CPAN","Pinto::CommitMessage":"Pinto","MojoMojo::WordDiff":"MojoMojo","Jifty::Test":"Jifty","PApp::DataRef":"PApp","Crypt::Digest::RIPEMD160":"CryptX","Apache::Constants":"mod_perl","Bundle::DBD::Pg":"DBD-Pg","Apache::Symdump":"mod_perl","Net::Server::Multiplex::MUX":"Net-Server","SOAP::Custom::XML::Deserializer":"SOAP-Lite","Net::LDAP::Extra::AD":"perl-ldap","Jifty::TestServer::Apache":"Jifty","Apache::Wyrd::Services::Index":"Apache-Wyrd","B":"perl","Config::Model::Backend::ShellVar":"Config-Model","Lemonldap::NG::Portal::Plugins::AutoSignin":"Lemonldap-NG-Portal","Pinto::Action::Verify":"Pinto","Apache::Leak":"mod_perl","Apache2::Cookie":"libapreq2","Lemonldap::NG::Portal::2F::UTOTP":"Lemonldap-NG-Portal","Apache::MP3::L10N::pl":"Apache-MP3","HTTP::Body::XForms":"HTTP-Body","DBI::ProfileDumper::Apache":"DBI","Lemonldap::NG::Portal::UserDB::OpenID":"Lemonldap-NG-Portal","Spoon::Command":"Spoon","PAR::SetupTemp":"PAR","arybase":"perl","Mojolicious::Command::generate::lite_app":"Mojolicious","Pinto::Migrator":"Pinto","Crypt::KeyWrap":"Crypt-JWT","Crypt::Perl::X509::Extension::nameConstraints":"Crypt-Perl","Kelp::Module::Config":"Kelp","CGI::Session::Test::Default":"CGI-Session","Jifty::View::Declare::CRUD":"Jifty","Hash::Util::FieldHash":"perl","Crypt::PRNG":"CryptX","Jifty::Action::Record":"Jifty","Jifty::Plugin::ErrorTemplates":"Jifty","Getopt::Std":"perl","Dpkg::Shlibs::Symbol":"Dpkg","Lemonldap::NG::Portal::Lib::Notifications::XML":"Lemonldap-NG-Portal","App::Pinto::Command::update":"Pinto","Catalyst::Dispatcher":"Catalyst-Runtime","Image::ExifTool::Shortcuts":"Image-ExifTool","App::Context::ClusterController":"App-Context","Lemonldap::NG::Portal::Auth::WebAuthn":"Lemonldap-NG-Portal","Pinto::Editor":"Pinto","Lemonldap::NG::Portal::Plugins::CheckEntropy":"Lemonldap-NG-Portal","IO::Compress::Zlib::Constants":"IO-Compress","DBI::Gofer::Transport::stream":"DBI","Clipboard::Xsel":"Clipboard","Catalyst::Component::ContextClosure":"Catalyst-Runtime","Mojo::Message::Request":"Mojolicious","Log::Any::Adapter::Syslog":"Log-Any","Net::DNS::RR::MG":"Net-DNS","Catalyst::Request::REST":"Catalyst-Action-REST","Email::MIME":"Email-MIME","App::Context":"App-Context","FCGI::Stream":"FCGI","SOAP::Lite::Packager::MIME":"SOAP-Lite","Crypt::Perl::ECDSA":"Crypt-Perl","Image::Info::ICO":"Image-Info","Jifty::Plugin::Authentication::Password::Action::ResetLostPassword":"Jifty","Log::Any::Adapter::Stdout":"Log-Any","DBI::ProxyServer::dr":"DBI","Plack::Middleware::HTTPExceptions":"Plack","Dancer2::CLI::Gen":"Dancer2","App::Authentication":"App-Context","HTML::EP::Shop":"HTML-EP","Lemonldap::NG::Portal::Auth::OpenIDConnect":"Lemonldap-NG-Portal","Maintainers":"perl","Config::Model::Exception::User":"Config-Model","Net::DNS::RR::EUI64":"Net-DNS","Image::ExifTool::PDF":"Image-ExifTool","DBI::DBD::SqlEngine::db":"DBI","Compress::LZ4":"Compress-LZ4","DBM_Filter":"perl","Plack::Middleware::Head":"Plack","Safe":"Safe","Image::ExifTool::Ricoh":"Image-ExifTool","DBD::DBM::db":"DBI","Jifty::DBI::Record::Memcached":"Jifty-DBI","IO::Compress::Gzip::Constants":"IO-Compress","Crypt::Digest":"CryptX","Image::ExifTool::AAC":"Image-ExifTool","App::Serializer::Ini":"App-Context","Lemonldap::NG::Portal::Plugins::RESTServer":"Lemonldap-NG-Portal","RPC::XML::struct":"RPC-XML","builtin":"perl","MDK::Common::Func":"MDK-Common","APR::Table":"mod_perl","Plack::Middleware::Recursive":"Plack","Pinto::Server::Responder::File":"Pinto","App::perlall":"App-perlall","Crypt::Mode::OFB":"CryptX","Crypt::Mac::BLAKE2s":"CryptX","Tie::StdHash":"perl","Mojolicious::Plugin::NotYAMLConfig":"Mojolicious","MIME::Parser::Filer":"MIME-tools","Crypt::Perl::Ed25519::Math":"Crypt-Perl","Lemonldap::NG::Portal":"Lemonldap-NG-Portal","Pinto::IndexWriter":"Pinto","Image::ExifTool::NikonSettings":"Image-ExifTool","Pinto::Initializer":"Pinto","Lemonldap::NG::Portal::Lib::SAML":"Lemonldap-NG-Portal","Dancer::Serializer::JSON":"Dancer","Tk::TList":"Tk","Net::DNS::RR::OPT":"Net-DNS","CGI::Session::Test::SimpleObjectClass":"CGI-Session","UnicodeCD":"perl","Valiant::HTML::FormBuilder::Checkbox":"Valiant","Moxy::Attribute::CarrierHook":"Moxy","Crypt::Perl::Ed25519::PublicKey":"Crypt-Perl","XML::Atom::Link":"XML-Atom","Mojo::Server::PSGI::_IO":"Mojolicious","Image::ExifTool::Sony":"Image-ExifTool","POE::Component::IRC::Plugin::Console":"POE-Component-IRC","Encode":"Encode","Image::ExifTool::HP":"Image-ExifTool","Net::DNS::RR::OPT::N3U":"Net-DNS","Tie::StdHandle":"perl","Jifty::Plugin::RequestInspector":"Jifty","Valiant::Validator::Check":"Valiant","Image::ExifTool::Lang::fr":"Image-ExifTool","CPAN::CacheMgr":"CPAN","RT::Authen::ExternalAuth::DBI::Cookie":"RT-Authen-ExternalAuth","Apache::Wyrd::Site::GDButton":"Apache-Wyrd","LRUCache":"GBrowse","Image::Info::Result":"Image-Info","Image::ExifTool::PanasonicRaw":"Image-ExifTool","POE::Component::IRC::Plugin::BotCommand":"POE-Component-IRC","Galileo":"Galileo","Config::Model::Exception::Formula":"Config-Model","Pinto::Manual::Thanks":"Pinto","Jifty::DBI::HasFilters":"Jifty-DBI","XAO::DO::Web::Header":"XAO-Web","Perlbal::Socket":"Perlbal","HTML::EP::Session":"HTML-EP","Crypt::Mac::Pelican":"CryptX","Net::Server::Proto::SSLEAY":"Net-Server","Kelp::Generator":"Kelp","B::Xref":"perl","YAML::Types":"YAML","Dancer::Request::Upload":"Dancer","Pinto::Schema::Result::Package":"Pinto","pipe_a_command":"PAR","SVG::Sparkline::Utils":"SVG-Sparkline","SSL_Context":"IO-Socket-SSL","Jifty::Plugin::SQLQueries::View":"Jifty","Tk::MakeDepend":"Tk","Crypt::Perl::RSA::PublicKey":"Crypt-Perl","Mojolicious::Command::get":"Mojolicious","Apache::Wyrd::Site::WidgetIndex":"Apache-Wyrd","Bio::DB::Tagger::Tag":"GBrowse","Plack::Middleware::Conditional":"Plack","Lemonldap::NG::Portal::UserDB::Custom":"Lemonldap-NG-Portal","POE::Component::IRC::Plugin::NickReclaim":"POE-Component-IRC","Pinto::Chrome::Term":"Pinto","Log::Any::Adapter::Util":"Log-Any","Jifty::Plugin::AdminUI::Dispatcher":"Jifty","Lemonldap::NG::Portal::2F::Register::Generic":"Lemonldap-NG-Portal","MHonArc::CharEnt::KOI_0":"MHonArc","PApp::XSLT::Sablotron":"PApp","Crypt::Cipher::Serpent":"CryptX","Jifty::DBI::Handle::mysql":"Jifty-DBI","MojoMojo::Schema::ResultSet::Attachment":"MojoMojo","MojoMojo::Formatter::Pod":"MojoMojo","Pinto::ArchiveUnpacker":"Pinto","OS2::localMorphPM":"perl","Pinto::Target::Distribution":"Pinto","Tk::widgets":"Tk","Pinto::Action::Unlock":"Pinto","Crypt::Cipher::SAFER_SK128":"CryptX","DBI::Gofer::Response":"DBI","MojoMojo::Schema::Result::PathPermissions":"MojoMojo","MojoMojo::Formatter::RSS":"MojoMojo","Net::LDAP":"perl-ldap","App::MessageDispatcher":"App-Context","Kelp::Base":"Kelp","Pinto::Schema::Result::Stack":"Pinto","Net::SNMP::Security::USM":"Net-SNMP","Config::Model::Exception::WarpError":"Config-Model","Devel::StackTrace::Frame":"Devel-StackTrace","Valiant::Proxy":"Valiant","Moxy::Plugin::Bookmark":"Moxy","HTTP::Body":"HTTP-Body","B::Terse":"perl","Image::ExifTool::PNG":"Image-ExifTool","HeaderParser":"perl","Apache::Wyrd::Services::Key":"Apache-Wyrd","Apache2::Response":"mod_perl","SOAP::XMLSchema::Serializer":"SOAP-Lite","Tk::Dirlist":"Tk","Log::Any::Adapter::Capture":"Log-Any","Plack::Server::FCGI":"Plack","Jifty::Test::WWW::Declare":"Jifty","DBIx::Custom::Order":"DBIx-Custom","Config::Model::CheckList":"Config-Model","VMS::DCLsym":"perl","DBI::DBD::Metadata":"DBI","Mojo::File":"Mojolicious","Valiant::HTML::Util::TagBuilder":"Valiant","Valiant::HTML::Component":"Valiant","Config::Model::Role::FileHandler":"Config-Model","MySQL::Admin::Translate":"MySQL-Admin","Crypt::Digest::SHA256":"CryptX","Crypt::Mac::HMAC":"CryptX","Net::DNS::ZoneFile::Generator":"Net-DNS","Dpkg::BuildFlags":"Dpkg","Config::Extensions":"perl","Config::Model::FuseUI":"Config-Model","PApp::SCGI::PApp":"PApp","MDK::Common::System":"MDK-Common","MHonArc::CharEnt::ISO8859_10":"MHonArc","Crypt::Cipher::RC2":"CryptX","Apache::MP3::Sorted":"Apache-MP3","Plack::Middleware::Log4perl":"Plack","Config::Model::Role::ComputeFunction":"Config-Model","APR::Pool":"mod_perl","DBD::mysql::st":"DBD-mysql","DBD::File::db":"DBI","Valiant::HTML::Util::View":"Valiant","CGI::Session::Driver":"CGI-Session","MIME::Decoder":"MIME-tools","IPC::Run::Debug":"IPC-Run","Lemonldap::NG::Portal::UserDB::AD":"Lemonldap-NG-Portal","LWP::Authen::Digest":"libwww-perl","Crypt::Digest::SHA512_224":"CryptX","Net::DNS::RR::AMTRELAY":"Net-DNS","Moxy::Plugin::QRCode":"Moxy","Crypt::Perl::X509::Extension::acmeValidation_v1":"Crypt-Perl","MojoMojo::Formatter::Include":"MojoMojo","Clipboard::Xclip":"Clipboard","Crypt::Perl::X::UnknownJWKkty":"Crypt-Perl","Valiant::Util::Exception::InvalidValidatorArgs":"Valiant","Tk::Pixmap":"Tk","Lemonldap::NG::Portal::Plugins::CheckHIBP":"Lemonldap-NG-Portal","Crypt::Perl::ASN1::Signatures":"Crypt-Perl","Crypt::Digest::BLAKE2s_256":"CryptX","Image::ExifTool::Font":"Image-ExifTool","YAML::Type::regexp":"YAML","Mojo::Transaction::WebSocket":"Mojolicious","Pinto::Action::Roots":"Pinto","Jifty::Plugin::ActorMetadata::Mixin::Model::ActorMetadata":"Jifty","Plack::Middleware::XFramework":"Plack","Dancer::Exception":"Dancer","MHonArc::CharEnt::AppleIceland":"MHonArc","Net::LDAP::Control::VLVResponse":"perl-ldap","Dancer::Logger::Console":"Dancer","App::Pinto::Command::look":"Pinto","SOAP::Transport::HTTP::Daemon":"SOAP-Lite","XML::Atom::Base":"XML-Atom","Spreadsheet::ParseExcel::SaveParser":"Spreadsheet-ParseExcel","Dpkg::Build::Env":"Dpkg","CPAN::FTP::netrc":"CPAN","MHonArc::CharEnt::CP1258":"MHonArc","Bio::Graphics::Browser2::UserTracks::Filesystem":"GBrowse","MHonArc::CharEnt::CP1256":"MHonArc","Net::LDAP::Bind":"perl-ldap","Archive::Zip::NewFileMember":"Archive-Zip","Crypt::PK::DH":"CryptX","XAO::DO::Web::Footer":"XAO-Web","Jifty::Server":"Jifty","Elive::Connection::SDK":"Elive","Crypt::Perl::X509::Extension::noCheck":"Crypt-Perl","Valiant::HTML::PagerBuilder":"Valiant","MojoMojo::Schema::Result::Comment":"MojoMojo","APR::Socket":"mod_perl","DBI::ProfileSubs":"DBI","DBIx::Class::Valiant::Util::Exception":"Valiant","MHonArc::UTF8::CP1252":"MHonArc","Elive::Entity":"Elive","PApp::Prefs":"PApp","Mojo::HelloWorld":"Mojolicious","XML::LibXML::Literal":"XML-LibXML","XAO::DO::Context":"XAO-Web","Elive::Entity::Recording":"Elive","Apache::Wyrd::Site::Page":"Apache-Wyrd","ExtUtils::MM_Darwin":"ExtUtils-MakeMaker","Apache::MP3":"Apache-MP3","Encode::KR":"Encode","RPC::XML::nil":"RPC-XML","LWP::Authen::Basic":"libwww-perl","Compress::Raw::Bunzip2":"Compress-Raw-Bzip2","Apache::MP3::L10N::it":"Apache-MP3","Apache2::MPM":"mod_perl","Digest":"Digest","Jifty::Object":"Jifty","Config::Model::Utils::GenClassPod":"Config-Model","Plack::Middleware::LogDispatch":"Plack","Apache::Wyrd::LogDump":"Apache-Wyrd","Crypt::Mode::CFB":"CryptX","Mysql::st":"DBD-mysql","DBI::DBD::SqlEngine::st":"DBI","Spoon::Hooks":"Spoon","Crypt::Stream::ChaCha":"CryptX","App::Pinto::Command::roots":"Pinto","Apache::Wyrd::Services::Tree":"Apache-Wyrd","Lemonldap::NG::Portal::Lib::Wrapper":"Lemonldap-NG-Portal","XAO::DO::Web::FilloutForm":"XAO-Web","Lemonldap::NG::Portal::Password::DBI":"Lemonldap-NG-Portal","Valiant::Errors":"Valiant","Pinto::Database":"Pinto","Jifty::Plugin::SQLQueries":"Jifty","Apache::Session::Serialize::Hstore":"Apache-Session-Browseable","App::Context::NetServer":"App-Context","PGObject::Util::DBAdmin":"PGObject-Util-DBAdmin","Bio::Graphics::Browser2::Util":"GBrowse","SVG::Sparkline::Area":"SVG-Sparkline","XML::LibXML::RegExp":"XML-LibXML","Net::DNS::RR::SVCB":"Net-DNS","Net::DNS::RR::OPT::TCP_KEEPALIVE":"Net-DNS","Zonemaster::Backend::Error::ResourceNotFound":"Zonemaster-Backend","Crypt::CBC::PBKDF::opensslv2":"Crypt-CBC","Image::ExifTool::Exif":"Image-ExifTool","MHonArc::UTF8::ISO8859_3":"MHonArc","Net::netent":"perl","Net::LDAP::Extra":"perl-ldap","Tk::FileSelect":"Tk","App::Session::HTMLHidden":"App-Context","IO::Socket::SSL::SSL_Context":"IO-Socket-SSL","File::Spec":"PathTools","Galileo::Plugin::Deploy":"Galileo","Image::ExifTool::FLAC":"Image-ExifTool","Bundle::DBI":"DBI","Text::SmartyPants":"MojoMojo","Lemonldap::NG::Portal::Register::Demo":"Lemonldap-NG-Portal","UI::Dialog::Backend":"UI-Dialog","Tk::After":"Tk","Pinto::Action::Clean":"Pinto","Mojolicious::Static":"Mojolicious","YAML::Warning":"YAML","SOAP::Apache":"SOAP-Lite","DBD::Gofer::Transport::corostream":"DBI","File::DataClass::Storage":"File-DataClass","Bio::Graphics::Browser2::MetaDB":"GBrowse","RPC::XML::simple_type":"RPC-XML","Net::Server::Daemonize":"Net-Server","App::Pinto::Command::delete":"Pinto","Lemonldap::NG::Portal::2F::U2F":"Lemonldap-NG-Portal","Image::ExifTool::Microsoft":"Image-ExifTool","Elive::Entity::ParticipantList":"Elive","Image::ExifTool::GE":"Image-ExifTool","Tk::MsgBox":"Tk","MojoMojo::Formatter::Amazon":"MojoMojo","Module::Load::Conditional":"Module-Load-Conditional","Tk::TixGrid":"Tk","App::Serializer::Scalar":"App-Context","Jifty::DBI::Handle":"Jifty-DBI","MHonArc::CharEnt::AppleHebrew":"MHonArc","DBIx::Class::Valiant::Validates":"Valiant","Crypt::Perl::Ed25519::PrivateKey":"Crypt-Perl","Plack::Recursive::ForwardRequest":"Plack","Apache::Wyrd::Site::WidgetControl":"Apache-Wyrd","Catalyst::Authentication::Store::LDAP::User":"Catalyst-Authentication-Store-LDAP","Valiant::Error":"Valiant","Lemonldap::NG::Portal::UserDB::Null":"Lemonldap-NG-Portal","Config::Model::Exception::UnknownId":"Config-Model","Jifty::Plugin::Config":"Jifty","Net::DNS::RR::L32":"Net-DNS","Apache::RPC::Status":"RPC-XML","Net::LDAP::Entry":"perl-ldap","App::SharedDatastore":"App-Context","Perlbal::Plugin::Palimg":"Perlbal","Valiant::HTML::TagBuilder":"Valiant","Apache::Wyrd::Var":"Apache-Wyrd","ModPerl::BuildOptions":"mod_perl","MHonArc::Char::KR":"MHonArc","Tk::Canvas":"Tk","LWP::Protocol::file":"libwww-perl","HTTP::Daemon":"HTTP-Daemon","Apache::Server":"mod_perl","IPC::Cmd":"IPC-Cmd","Mojo::DOM::HTML":"Mojolicious","ModPerl::InterpPool":"mod_perl","Lemonldap::NG::Portal::Lib::LDAP":"Lemonldap-NG-Portal","Bundle::Image::Info::PNG":"Image-Info","Crypt::Perl::X509::Extension::subjectAltName":"Crypt-Perl","SSL_HANDLE":"IO-Socket-SSL","Spreadsheet::ParseXLSX::Worksheet":"Spreadsheet-ParseXLSX","APR::Const":"mod_perl","Mail::Send":"MailTools","Jifty::Plugin::TestServerWarnings":"Jifty","Dancer::Logger::Diag":"Dancer","Lemonldap::NG::Portal::Lib::2fDevices":"Lemonldap-NG-Portal","Tk::DragDrop::XDNDSite":"Tk","Log::Any::Adapter::Stderr":"Log-Any","Net::DNS::RR::OPT::EXTENDED_ERROR":"Net-DNS","Elive::Util::Type":"Elive","Lemonldap::NG::Portal::Lib::Radius":"Lemonldap-NG-Portal","App::Pinto::Command::manual":"Pinto","Tk::Event":"Tk","Apache::Session::LDAP":"Apache-Session-LDAP","Crypt::Perl::Ed25519":"Crypt-Perl","Apache::Log":"mod_perl","Apache::Session::Browseable::Store::Oracle":"Apache-Session-Browseable","Crypt::Perl::ECDSA::ECParameters":"Crypt-Perl","pp":"PAR-Packer","LWP::UserAgent::AtomClient":"XML-Atom","Tie::Handle":"perl","Spoon::Plugin":"Spoon","XML::LibXML::RelaxNG":"XML-LibXML","Bio::Graphics::Browser2::Render::HTML::TrackListing":"GBrowse","IPC::Run::IO":"IPC-Run","Crypt::Perl::PK":"Crypt-Perl","GPIB":"GPIB","Lemonldap::NG::Portal::Auth::Demo":"Lemonldap-NG-Portal","Dancer2::Template::Simple":"Dancer2","Apache2::FilterRec":"mod_perl","Lemonldap::NG::Portal::Lib::OpenID::Server":"Lemonldap-NG-Portal","Image::ExifTool::WPG":"Image-ExifTool","Perlbal::Plugin::Throttle":"Perlbal","ModPerl::TestReport":"mod_perl","I18N::LangTags":"perl","remove_file_and_try_executable_again":"PAR","Net::Server::Fork":"Net-Server","Dancer2::Logger::File":"Dancer2","Dancer2::CLI":"Dancer2","RPC::XML::request":"RPC-XML","Pinto::Action::Reset":"Pinto","Net::DNS::RR":"Net-DNS","Tk::Table":"Tk","EnableModule":"perl","XAO::DO::Web::Mailer":"XAO-Web","Lemonldap::NG::Portal::Plugins::ContextSwitching":"Lemonldap-NG-Portal","Crypt::Perl::X::ASN1::Find":"Crypt-Perl","Lemonldap::NG::Portal::Plugins::OIDCInternalTokenExchange":"Lemonldap-NG-Portal","APR::Base64":"mod_perl","CPAN::Mirrored::By":"CPAN","Bundle::Apache2":"mod_perl","Dpkg::Interface::Storable":"Dpkg","open":"perl","Bio::Graphics::Browser2::DataLoader::generic":"GBrowse","Jifty::Web::Form::Field::Upload":"Jifty","Legacy::Graphics::Browser::Util":"GBrowse","Net::Server::Thread":"Net-Server","Apache::Wyrd::Services::MySQLIndex":"Apache-Wyrd","Dpkg::Source::Quilt":"Dpkg","Jifty::Web::Form::Field::InlineButton":"Jifty","Net::DNS::DomainName2535":"Net-DNS","Net::LDAP::Control::Sort":"perl-ldap","DBM_Filter::null":"perl","Net::DNS::RR::NULL":"Net-DNS","Image::ExifTool::Lang::en_ca":"Image-ExifTool","Dancer::GetOpt":"Dancer","MHonArc::Char":"MHonArc","Valiant::Validations":"Valiant","Net::protoent":"perl","Plack::Util":"Plack","HTTP::Session2::Expired":"HTTP-Session2","Encode::MIME::Header::ISO_2022_JP":"Encode","MHonArc::UTF8::ISO8859_1":"MHonArc","XAO::DO::Web::Benchmark":"XAO-Web","Crypt::Perl::ECDSA::NIST":"Crypt-Perl","Net::DNS::RR::GPOS":"Net-DNS","Tk::HList":"Tk","Catalyst::DispatchType::Path":"Catalyst-Runtime","Net::DNS::RR::OPT::NSID":"Net-DNS","Spoon::Formatter::Block":"Spoon","Kelp::Routes::Controller":"Kelp","Spoon::Config":"Spoon","Apache::Wyrd::Datum::Text":"Apache-Wyrd","Image::ExifTool::Lang::de":"Image-ExifTool","Apache2::RequestUtil":"mod_perl","HTTP::Session2::Random":"HTTP-Session2","MHonArc::UTF8::KOI8_F":"MHonArc","CPAN::Distroprefs::Iterator":"CPAN","Valiant::Filter::Trim":"Valiant","PAR::StrippedPARL::Base":"PAR-Packer","Image::ExifTool::MakerNotes":"Image-ExifTool","Pinto::Action::Look":"Pinto","Net::LDAP::FilterMatch":"perl-ldap","Spoon::Hook":"Spoon","ExtUtils::MakeMaker::Locale":"ExtUtils-MakeMaker","Image::ExifTool::Qualcomm":"Image-ExifTool","Net::SNMP::Transport::IPv4":"Net-SNMP","Image::ExifTool::PostScript":"Image-ExifTool","Lemonldap::NG::Portal::CertificateResetByMail::Demo":"Lemonldap-NG-Portal","CGI::Application::Plugin::AutoRunmode":"CGI-Application-Plugin-AutoRunmode","PApp::XML":"PApp","PApp::Log":"PApp","Plack::Test::Suite":"Plack","Dpkg::File":"Dpkg","MojoMojo::Formatter::CPANHyperlink":"MojoMojo","Lemonldap::NG::Portal::Captcha::SecurityImage":"Lemonldap-NG-Portal","Config::Model::Exception::Any":"Config-Model","Legacy::Graphics::Browser::Synteny":"GBrowse","Crypt::Cipher::DES":"CryptX","Dpkg::Package":"Dpkg","XAO::DO::Web::Math":"XAO-Web","HTML::LinkExtor":"HTML-Parser","Lemonldap::NG::Portal::Auth::DBI":"Lemonldap-NG-Portal","Crypt::Digest::RIPEMD128":"CryptX","Net::Server::Proto::Coro":"Net-Server-Coro","UI::Dialog::Backend::GDialog":"UI-Dialog","MHonArc::UTF8::KOI8_A":"MHonArc","Jifty::Server::Fork":"Jifty","PApp::Callback::Function":"PApp","Pinto::Util":"Pinto","Apache::Wyrd::CGICond":"Apache-Wyrd","Catalyst::Plugin::Static::Simple":"Catalyst-Plugin-Static-Simple","Config::Model::ValueComputer":"Config-Model","Convert::ASN1":"Convert-ASN1","Net::LDAP::Control::PersistentSearch":"perl-ldap","Bio::DB::Tagger::mysql":"GBrowse","Crypt::Cipher::AES":"CryptX","MHonArc::UTF8::ISO8859_4":"MHonArc","File::Spec::VMS":"PathTools","Jifty":"Jifty","Apache::Wyrd::Site::SearchResults":"Apache-Wyrd","Plack::Server::CGI":"Plack","Spoon::Formatter::Container":"Spoon","in":"perl","Apache::Wyrd::Handler":"Apache-Wyrd","PApp::Application":"PApp","Config::Model::Role::WarpMaster":"Config-Model","Crypt::Digest::SHAKE":"CryptX","Net::DNS::RR::CDNSKEY":"Net-DNS","MHonArc::UTF8::AppleCyrillic":"MHonArc","Mojo::IOLoop::Server":"Mojolicious","Pod::Perldoc::ToPod":"Pod-Perldoc","Log::Any::Adapter::Test":"Log-Any","Net::DNS::RR::TKEY":"Net-DNS","MHonArc::CharEnt::CP936":"MHonArc","Apache::Wyrd::Interfaces::Dater":"Apache-Wyrd","SOAP::XMLSchemaSOAP1_2::Deserializer":"SOAP-Lite","Zonemaster::Backend::Error::JsonError":"Zonemaster-Backend","Sys::Syslog::Win32":"Sys-Syslog","Pinto::Shell":"Pinto","Apache::Wyrd::Site::Index":"Apache-Wyrd","Kelp::Response":"Kelp","MHonArc::CharEnt::AppleGreek":"MHonArc","MySQL::Admin":"MySQL-Admin","Dancer::Handler":"Dancer","Config::Model::Role::NodeLoader":"Config-Model","Mysql":"DBD-mysql","Kelp::Module::Config::Null":"Kelp","Jifty::Plugin::Config::Dispatcher":"Jifty","App::Packer::PAR":"PAR-Packer","Spoon::Formatter":"Spoon","Dancer2::Serializer::Mutable":"Dancer2","Lemonldap::NG::Portal::Lib::OneTimeToken":"Lemonldap-NG-Portal","MojoMojo::Controller::PageAdmin":"MojoMojo","Tk::ErrorDialog":"Tk","Bio::Graphics::Browser2::PluginSet":"GBrowse","Net::DNS::Resolver::Recurse":"Net-DNS","MojoMojo::Schema::Result::Link":"MojoMojo","Crypt::CBC":"Crypt-CBC","Batch::Batchrun::Load":"Batch-Batchrun","XAO::DO::Web::Date":"XAO-Web","DBD::Mem::db":"DBI","HTML::EP::Locale":"HTML-EP","Config::Model::Loader":"Config-Model","App::Pinto::Command::default":"Pinto","Dancer2::Logger::Capture::Trap":"Dancer2","Jifty::Web::Form::Field::DateTime":"Jifty","Batch::Batchrun::Mail":"Batch-Batchrun","Tk::TextList":"Tk","Kossy::BodyParser":"Kossy","Fake::Encode":"Fake-Encode","Apache::Wyrd::Interfaces::IndexUser":"Apache-Wyrd","SOAP::Server::Object":"SOAP-Lite","Jifty::Plugin::Halo":"Jifty","Config::Model::Exception::UnknownElement":"Config-Model","Config::Model::HashId":"Config-Model","Net::DNS::Mailbox1035":"Net-DNS","MHonArc::UTF8::AppleIceland":"MHonArc","IO::Compress::Adapter::Deflate":"IO-Compress","Crypt::Digest::RIPEMD256":"CryptX","XAO::DO::Web::Default":"XAO-Web","Valiant::Validator::Scalar":"Valiant","Config::Model::Describe":"Config-Model","Plack::Middleware::Lint":"Plack","Imager::Font::FreeType2":"Imager","Pinto::IndexCache":"Pinto","Net::IPAddress::Util":"Net-IPAddress-Util","CGI::Session::Tutorial":"CGI-Session","Plack::Middleware::StackTrace":"Plack","DBD::ExampleP::dr":"DBI","Apache::Wyrd::Cookie":"Apache-Wyrd","Jifty::Plugin::RPC":"Jifty","MDK::Common::Various":"MDK-Common","DBI::DBD::SqlEngine":"DBI","Perlbal::Test":"Perlbal","MojoMojo::View::TT":"MojoMojo","Net::DNS::RR::RRSIG":"Net-DNS","Mojolicious::Command::Author::generate::dockerfile":"Mojolicious","Image::ExifTool::Audible":"Image-ExifTool","Crypt::Checksum::Adler32":"CryptX","Apache::testold":"mod_perl","Crypt::Digest::BLAKE2b_512":"CryptX","Tk::MainWindow":"Tk","App::Serializer":"App-Context","Valiant::Name":"Valiant","Perlbal::Pool":"Perlbal","UI::Dialog::GNOME":"UI-Dialog","PApp::Env":"PApp","Dpkg::Vendor":"Dpkg","Mojolicious::Command::generate::plugin":"Mojolicious","Dancer::Request":"Dancer","Net::LDAP::Extension":"perl-ldap","MHonArc::CharEnt::ISO8859_14":"MHonArc","site":"Apache-ASP","Crypt::CBC::PBKDF::none":"Crypt-CBC","Spreadsheet::ParseExcel::Dump":"Spreadsheet-ParseExcel","Pinto::Exception":"Pinto","IPC::Run::Win32Helper":"IPC-Run","Batch::Batchrun::ProcessSteps":"Batch-Batchrun","Batch::Batchrun":"Batch-Batchrun","Jifty::Handler":"Jifty","Crypt::Perl::X":"Crypt-Perl","Jifty::CAS::Store::Memory":"Jifty","MHonArc::UTF8::GOST19768_87":"MHonArc","Archive::Zip::MockFileHandle":"Archive-Zip","Elive::Entity::Group::Members":"Elive","DBIx::Otogiri":"Otogiri","Net::Server::MultiType":"Net-Server","Net::DNS::Resolver::Base":"Net-DNS","Mojolicious::Command::eval":"Mojolicious","Lemonldap::NG::Portal::Auth::GPG":"Lemonldap-NG-Portal","PApp::XPCSE":"PApp","Jifty::Web::Form::Field::Date":"Jifty","Perlbal::Plugin::Throttle::Store::Memory":"Perlbal","Valiant::Validator::OnlyOf":"Valiant","ExtUtils::MY":"ExtUtils-MakeMaker","SOAP::Header":"SOAP-Lite","Lemonldap::NG::Portal::Password::Base":"Lemonldap-NG-Portal","ExtUtils::MM_AIX":"ExtUtils-MakeMaker","App::japerl":"App-japerl","Bio::Graphics::Wiggle::Loader::Nosample":"GBrowse","Jifty::Action::Record::Update":"Jifty","MIME::Field::ContType":"MIME-tools","Log::Any::Adapter":"Log-Any","CGI::Simple::Cookie":"CGI-Simple","Plack::Request::Upload":"Plack","Pinto::Manual::Introduction":"Pinto","Image::ExifTool::Casio":"Image-ExifTool","Dancer::Logger::Null":"Dancer","Dpkg::Source::Package::V3::Quilt":"Dpkg","CBC":"Crypt-CBC","MySQL::Admin::Actions":"MySQL-Admin","Plack::Util::IOWithPath":"Plack","Catalyst::TraitFor::Request::REST::ForBrowsers":"Catalyst-Action-REST","JNI":"perl","Zonemaster::Backend::Config":"Zonemaster-Backend","Dpkg::Checksums":"Dpkg","Dancer":"Dancer","XML::LibXML::CDATASection":"XML-LibXML","Testing":"perl","APR::Status":"mod_perl","Apache::Wyrd::Version":"Apache-Wyrd","Net::LDAP::Control::Relax":"perl-ldap","Image::ExifTool::JSON":"Image-ExifTool","XML::LibXML::InputCallback":"XML-LibXML","Net::DNS::Resolver::UNIX":"Net-DNS","PerlTmp":"Batch-Batchrun","Perlbal::Plugin::Cgilike":"Perlbal","Crypt::AuthEnc::CCM":"CryptX","MojoMojo::Schema::Result::Entry":"MojoMojo","DBIx::Otogiri::Iterator":"Otogiri","Jifty::Web::FileUpload":"Jifty","XML::Atom::Content":"XML-Atom","SOAP::Transport::POP3":"SOAP-Lite","Crypt::Perl::ASN1":"Crypt-Perl","SOAP::Lite::Deserializer::XMLSchema1999":"SOAP-Lite","XAO::DO::Web::Cookie":"XAO-Web","Apache":"mod_perl","Config::Model::TermUI":"Config-Model","GPIB::hpserial":"GPIB","ExtUtils::MakeMaker::version::regex":"ExtUtils-MakeMaker","Net::DNS::ZoneFile":"Net-DNS","Dpkg::Control::Tests":"Dpkg","Bio::Graphics::Browser2::Render::HTML":"GBrowse","Perlbal::Plugin::EchoService":"Perlbal","Tk::Toplevel":"Tk","Moxy::Plugin::RelativeLocation":"Moxy","Imager::CountColor":"Imager","MojoMojo":"MojoMojo","ExtUtils::MM_DOS":"ExtUtils-MakeMaker","Sys::Syslog":"Sys-Syslog","Crypt::Perl::RSA::PrivateKey":"Crypt-Perl","Config::Model::Exception::ModelDeclaration":"Config-Model","MHonArc::CharEnt::CP866":"MHonArc","PaletteModify":"Perlbal","Net::DNS::Update":"Net-DNS","Fh":"CGI","CGI::Application::Mailform":"CGI-Application","Catalyst::Component":"Catalyst-Runtime","SOAP::Transport::MAILTO":"SOAP-Lite","ModPerl::TypeMap":"mod_perl","Imager::Font::Type1":"Imager","Plack::Session::Store::DBI":"Plack-Middleware-Session","Apache::ASP::CGI::Table":"Apache-ASP","XML::Atom::Entry":"XML-Atom","MIME::Tools":"MIME-tools","encoding":"Encode","Bio::Graphics::Browser2::SubtrackTable":"GBrowse","ExtUtils::MM_VOS":"ExtUtils-MakeMaker","PhonyClipboard":"Clipboard","MHonArc::CharEnt::GB2312":"MHonArc","Pinto::Action::Install":"Pinto","Tk::DragDrop::Win32Drop":"Tk","Lemonldap::NG::Portal::Register::Custom":"Lemonldap-NG-Portal","Net::OpenID::Association":"Net-OpenID-Consumer","Tk::Frame":"Tk","Apache::Wyrd::Input::Set":"Apache-Wyrd","Mojolicious::Routes::Pattern":"Mojolicious","Net::Server::Proto::Coro::FH":"Net-Server-Coro","Crypt::Perl::X509::Extension::ct_precert_poison":"Crypt-Perl","Apache2::URI":"mod_perl","Pinto::Remote":"Pinto","Tk::LabFrame":"Tk","SOAP::XMLSchema2001::Serializer":"SOAP-Lite","Jifty::DBI::Column":"Jifty-DBI","Dpkg::Compression::FileHandle":"Dpkg","Valiant::Validator::Exclusion":"Valiant","Pinto::Remote::Action::Add":"Pinto","Mysql::Statement":"DBD-mysql","SVG::Sparkline::Whisker":"SVG-Sparkline","XML::LibXML":"XML-LibXML","ExtUtils::Liblist":"ExtUtils-MakeMaker","Jifty::Plugin::CSSQuery":"Jifty","APR::Util":"mod_perl","PAR::Heavy":"PAR","HTML::TokeParser":"HTML-Parser","Tk::DragDrop::SunSite":"Tk","PAR::Packer":"PAR-Packer","Net::SNMP::Transport":"Net-SNMP","Kelp::Module::Logger::Simple":"Kelp","Perlbal::Plugin::Redirect":"Perlbal","App::Context::POE":"App-Context","Dancer::Engine":"Dancer","CPAN::Distroprefs::Result::Success":"CPAN","Crypt::Perl::ECDSA::EC::Point":"Crypt-Perl","Bio::Graphics::Browser2::DataLoader::featurefile":"GBrowse","Lemonldap::NG::Portal::CDC":"Lemonldap-NG-Portal","App::Serializer::Xml":"App-Context","RPC::XML::i8":"RPC-XML","Jifty::Upgrade::Internal":"Jifty","ExtUtils::Command":"ExtUtils-MakeMaker","Perlbal::Plugin::EchoService::Client":"Perlbal","Spoon::Cookie":"Spoon","Image::ExifTool::ASF":"Image-ExifTool","Crypt::DSA::Signature":"Crypt-DSA","Perlbal::Test::WebClient":"Perlbal","Dancer::Template::Simple":"Dancer","Net::DNS::RR::DNSKEY":"Net-DNS","Net::DNS::RR::HINFO":"Net-DNS","Dancer::Serializer::Mutable":"Dancer","SOAP::Transport::HTTP::Daemon::ForkAfterProcessing":"SOAP-Lite","Image::ExifTool::CaptureOne":"Image-ExifTool","Net::DNS::RR::MR":"Net-DNS","Email::MIME::Header":"Email-MIME","Mojo":"Mojolicious","Catalyst::Controller::REST":"Catalyst-Action-REST","Image::ExifTool::MinoltaRaw":"Image-ExifTool","SOAP::Fault":"SOAP-Lite","Apache2::Build":"mod_perl","XML::Twig::Entity_list":"XML-Twig","Image::ExifTool::WTV":"Image-ExifTool","Crypt::Mac::F9":"CryptX","XAO::DO::Web::Search":"XAO-Web","PAR::SetupProgname":"PAR","Imager::Font::Image":"Imager","Crypt::Stream::Rabbit":"CryptX","Dpkg::Control":"Dpkg","Encode::Unicode::UTF7":"Encode","GitLab::API::v4::Mock::Engine":"GitLab-API-v4","Jifty::Plugin::Config::Action::Restart":"Jifty","Apache::ASP::Lang::PerlScript":"Apache-ASP","Plack::Middleware::ConditionalGET":"Plack","Plack::Handler::CGI::Writer":"Plack","ExtUtils::Embed":"perl","Bundle::DBD::mysql":"DBD-mysql","XAO::PreLoad":"XAO-Web","RPC::XML::Server":"RPC-XML","Jifty::Plugin::SetupWizard::View":"Jifty","Image::ExifTool::PLUS":"Image-ExifTool","Pinto::Locator::Multiplex":"Pinto","Image::ExifTool::ZISRAW":"Image-ExifTool","Perlbal::Plugin::XFFExtras":"Perlbal","Digest::base":"Digest","MojoMojo::Declaw":"MojoMojo","Mojo::Server::Daemon":"Mojolicious","MojoMojo::Formatter::GoogleCalendar":"MojoMojo","Apache::Session::Browseable::Cassandra":"Apache-Session-Browseable","Net::DNS::Resolver::cygwin":"Net-DNS","MojoMojo::Schema::Result::RoleMember":"MojoMojo","Mojo::DOM::Role::Analyzer":"Mojo-DOM-Role-Analyzer","CGI::Session::Driver::file":"CGI-Session","Dancer2::Core::Role::Hookable":"Dancer2","Dancer::Config::Object":"Dancer","Apache::Session::Browseable::SQLite":"Apache-Session-Browseable","Net::hostent":"perl","DBD::File::Statement":"DBI","App::Pinto":"Pinto","Image::ExifTool::PCX":"Image-ExifTool","ODBM_File":"perl","Plack::Middleware::AccessLog":"Plack","WidgetDemo":"Tk","MHonArc::CharEnt::CP1254":"MHonArc","Digest::MD5":"Digest-MD5","Dancer2::Core::HTTP":"Dancer2","Dancer::Logger":"Dancer","Crypt::Perl::X509::Extension::subjectKeyIdentifier":"Crypt-Perl","Net::SNMP::Message":"Net-SNMP","Jifty::Action::AboutMe":"Jifty","POE::Component::IRC::Plugin::NickServID":"POE-Component-IRC","ModPerl::StructureMap":"mod_perl","Lemonldap::NG::Portal::Issuer::OpenIDConnect":"Lemonldap-NG-Portal","Image::ExifTool::MIFF":"Image-ExifTool","PApp::I18n::PO_Reader":"PApp","Jifty::Plugin::Authentication::Password::Action::ConfirmEmail":"Jifty","MHonArc::CharEnt::CP1251":"MHonArc","Mojo::UserAgent::CookieJar":"Mojolicious","Apache::Wyrd::Datum":"Apache-Wyrd","Hash::Util":"perl","ModPerl::PerlRun":"mod_perl","Tie::SubstrHash":"perl","Lemonldap::NG::Portal::UserDB::Facebook":"Lemonldap-NG-Portal","PApp::XSLT":"PApp","Perlbal::Plugin::MaxContentLength":"Perlbal","PerlIO":"perl","Image::ExifTool::Lang::tr":"Image-ExifTool","MojoMojo::Controller::JSON":"MojoMojo","File::Basename":"perl","Dpkg::IPC":"Dpkg","Kelp::Module::Logger":"Kelp","XAO::Templates":"XAO-Web","Pinto::Manual":"Pinto","Mail::Mailer::testfile":"MailTools","Perlbal::ClientHTTP":"Perlbal","Config::Model::DumpAsData":"Config-Model","Image::ExifTool::InfiRay":"Image-ExifTool","Crypt::Perl::X509::RelativeDistinguishedName":"Crypt-Perl","DBIx::Class::Valiant::Util::Exception::BadParameters":"Valiant","Apache2::Log":"mod_perl","MHonArc::CharMaps":"MHonArc","Catalyst::Action":"Catalyst-Runtime","Jifty::Request::Mapper":"Jifty","Apache::MP3::L10N::zh_cn":"Apache-MP3","Crypt::Perl::PKCS10::Attribute":"Crypt-Perl","Net::DNS::ZoneFile::Text":"Net-DNS","Dancer::Handler::Standalone":"Dancer","Jifty::Param::Schema":"Jifty","Perlbal::BackendHTTP":"Perlbal","B::Section":"perl","Lemonldap::NG::Portal::Auth::SSL":"Lemonldap-NG-Portal","Crypt::PRNG::RC4":"CryptX","Dancer2::Template::TemplateToolkit":"Dancer2","Tk::Menu::Button":"Tk","DBD::Proxy::dr":"DBI","POE::Component::IRC::Plugin::Connector":"POE-Component-IRC","Jifty::Web::Form::Field::Button":"Jifty","Catalyst::Request::Upload":"Catalyst-Runtime","XML::LibXML::Text":"XML-LibXML","Valiant::Util::Exception::General":"Valiant","Crypt::Misc":"CryptX","Config::Model::Instance":"Config-Model","App::Request::CGI":"App-Context","XML::LibXML::Error":"XML-LibXML","Jifty::Plugin::Compat::Apache":"Jifty","Net::DNS::Header":"Net-DNS","Bio::Graphics::Browser2::Plugin::AuthPlugin":"GBrowse","Crypt::AuthEnc::ChaCha20Poly1305":"CryptX","Legacy::Graphics::Browser":"GBrowse","UI::Dialog::Backend::ASCII":"UI-Dialog","Dancer2::Core::Time":"Dancer2","POE::Component::IRC::Plugin::DCC":"POE-Component-IRC","Plack::Handler::Standalone":"Plack","My::Chat":"SOAP-Lite","Bio::Graphics::Browser2::Markup":"GBrowse","Valiant::HTML::BaseComponent":"Valiant","Jifty::Plugin::SkeletonApp":"Jifty","Image::ExifTool::Nikon":"Image-ExifTool","Pinto::Role::Plated":"Pinto","File::DataClass::Constants":"File-DataClass","Crypt::Digest::Keccak256":"CryptX","Image::TIFF":"Image-Info","Pinto::Action::Props":"Pinto","Lemonldap::NG::Portal::Plugins::PublicPages":"Lemonldap-NG-Portal","DBI::Gofer::Serializer::Base":"DBI","Elive::Entity::User":"Elive","MySQL::Admin::Settings":"MySQL-Admin","Mail::Filter":"MailTools","Image::ExifTool::CanonRaw":"Image-ExifTool","Apache2::Process":"mod_perl","XML::LibXML::AttributeHash":"XML-LibXML","Apache::SessionX":"Apache-SessionX","Apache::Wyrd::User":"Apache-Wyrd","OS2::REXX::_SCALAR":"perl","Perlbal":"Perlbal","Pinto::Remote::Action::Install":"Pinto","Dancer2::Core::Role::Engine":"Dancer2","XML::Atom":"XML-Atom","File::DataClass::ResultSource":"File-DataClass","Valiant::HTML::FormTags":"Valiant","Crypt::Perl::PKCS8":"Crypt-Perl","DBD::Proxy":"DBI","MHonArc::CharEnt::KOI8_F":"MHonArc","Perlbal::Fields":"Perlbal","MIME::Body":"MIME-tools","Plack::LWPish":"Plack","Module::ScanDeps":"Module-ScanDeps","CPAN::Mirrors":"CPAN","Net::LDAP::Control::Subentries":"perl-ldap","Lemonldap::NG::Portal::Issuer::OpenID":"Lemonldap-NG-Portal","Plack::TempBuffer::File":"Plack","MojoMojo::Formatter::File::Test":"MojoMojo","Net::DNS::RR::URI":"Net-DNS","Mail::Util":"MailTools","O":"perl","Apache::MP3::Playlist":"Apache-MP3","Jifty::Plugin::AdminUI::View":"Jifty","Mojo::Home":"Mojolicious","Compress::Zlib":"IO-Compress","Lemonldap::NG::Portal::Auth::Proxy":"Lemonldap-NG-Portal","Valiant::Validator::Numericality":"Valiant","Thread":"perl","CatalystX::Controller::OpenSearch":"Search-OpenSearch-Server","Devel::PPPort":"Devel-PPPort","Catalyst::Runtime":"Catalyst-Runtime","Valiant::HTML::Components":"Valiant","Apache2::Status::_version":"mod_perl","Lemonldap::NG::Portal::Main::Constants":"Lemonldap-NG-Portal","CPAN::URL":"CPAN","Dancer::HTTP":"Dancer","Unicode::UCD":"perl","ModPerl::Util":"mod_perl","MHonArc::CharEnt::ISO8859_15":"MHonArc","Tk::Text":"Tk","Crypt::Perl::X509::Name":"Crypt-Perl","Jifty::Param":"Jifty","Bio::Graphics::Browser2::Render::HTML::TrackListing::Categories":"GBrowse","App::ResourceLocker::IPCLocker":"App-Context","MojoMojo::Schema::Result::Photo":"MojoMojo","Encode::Encoding":"Encode","Crypt::OpenSSL::DSA":"Crypt-OpenSSL-DSA","Crypt::Mac::OMAC":"CryptX","Kossy::Connection":"Kossy","Term::ReadLine::Gnu::Var":"Term-ReadLine-Gnu","Apache::RegistryNG":"mod_perl","Net::DNS::Domain":"Net-DNS","Jifty::Dispatcher":"Jifty","App::Pinto::Command::verify":"Pinto","Spreadsheet::ParseExcel::Utility":"Spreadsheet-ParseExcel","Pinto::Role::FileFetcher":"Pinto","PApp::I18n":"PApp","Catalyst::Authentication::Store::LDAP":"Catalyst-Authentication-Store-LDAP","Moxy::Plugin::GPS":"Moxy","App::Serializer::Json":"App-Context","Apache::MP3::L10N::ca":"Apache-MP3","Valiant::Validator::Object":"Valiant","Tk::Text::Tag":"Tk","SVG::Sparkline::RangeBar":"SVG-Sparkline","Crypt::Perl::X::ASN1::Prepare":"Crypt-Perl","Tk::Region":"Tk","Moxy::Plugin::Pictogram":"Moxy","CPAN::FTP":"CPAN","Apache::Status":"mod_perl","Apache::Wyrd::Datum::Null":"Apache-Wyrd","Crypt::PK::Ed25519":"CryptX","MIME::WordDecoder":"MIME-tools","Tk::FloatEntry":"Tk","Plack::Middleware::ContentLength":"Plack","Jifty::DBI::Filter::Date":"Jifty-DBI","Jifty::Plugin::Authentication::Password::Action::Signup":"Jifty","Config::Model::Role::Constants":"Config-Model","Jifty::Plugin::Config::Action::Config":"Jifty","Dpkg::Path":"Dpkg","App::Context::ClusterNode":"App-Context","Apache::ASP::Response":"Apache-ASP","Dpkg::Changelog::Parse":"Dpkg","XML::LibXML::NamedNodeMap":"XML-LibXML","Net::DNS::RR::AFSDB":"Net-DNS","Mail::Mailer::testfile::pipe":"MailTools","APR::Bucket":"mod_perl","Apache::Options":"mod_perl","Dancer2::FileUtils":"Dancer2","Lemonldap::NG::Portal::Auth::PAM":"Lemonldap-NG-Portal","Pinto::Action::Nop":"Pinto","Crypt::Perl::X::ECDSA::NoCurveForParameters":"Crypt-Perl","Image::ExifTool::APE":"Image-ExifTool","Jifty::DBI::Handle::Sybase":"Jifty-DBI","Lemonldap::NG::Portal::Plugins::RememberAuthChoice":"Lemonldap-NG-Portal","MHonArc::UTF8::CP1255":"MHonArc","CPAN::Complete":"CPAN","Jifty::Action::Record::Delete":"Jifty","Crypt::CBC::PBKDF::pbkdf2":"Crypt-CBC","CPAN::Distribution":"CPAN","HTTP::Body::MultiPart":"HTTP-Body","Config::Model::Exception::WrongType":"Config-Model","RPC::PlClient::Object":"PlRPC","MHonArc::UTF8::CP1256":"MHonArc","Apache::Wyrd":"Apache-Wyrd","Imager::Fountain":"Imager","Encode::UTF_EBCDIC":"Encode","Image::ExifTool::TagInfoXML":"Image-ExifTool","Image::ExifTool::BPG":"Image-ExifTool","RT::Extension::MobileUI":"RT-Extension-MobileUI","GD::Image":"GD","CPAN::Shell":"CPAN","Image::ExifTool::APP12":"Image-ExifTool","App::Packer::Backend::PAR":"PAR","Apache::Session::Browseable::Redis":"Apache-Session-Browseable","DBD::File::DataSource::Stream":"DBI","Tk::DropSite":"Tk","NDBM_File":"perl","App::Pinto::Command::merge":"Pinto","Apache::Wyrd::SQLForm":"Apache-Wyrd","Jifty::Plugin::LetMe::Dispatcher":"Jifty","Jifty::Server::Prefork::NetServer":"Jifty","Bio::Graphics::Browser2::Render::Login":"GBrowse","Valiant::Validator::Boolean":"Valiant","Tk::TextUndo":"Tk","Bundle::Apache":"mod_perl","Apache::Wyrd::Services::FileCache":"Apache-Wyrd","PApp::FormBuffer":"PApp","App::Serializer::OneLine":"App-Context","Lemonldap::NG::Portal::Lib::OverConf":"Lemonldap-NG-Portal","MHonArc::CharEnt::CP932":"MHonArc","GD::Polygon":"GD","Mojolicious::Command::Author::generate::lite_app":"Mojolicious","MHonArc::CharEnt::ISO8859_6":"MHonArc","DBD::Proxy::st":"DBI","App::Authentication::Htpasswd":"App-Context","Valiant::Validator::Date":"Valiant","OverloadedClass":"CGI-Session","Net::Server::Coro":"Net-Server-Coro","Jifty::Plugin::PubSub::Bus":"Jifty","Apache2::ConnectionUtil":"mod_perl","SOAP::Lite::Deserializer::XMLSchemaSOAP1_2":"SOAP-Lite","Dancer::ModuleLoader":"Dancer","Batch::Batchrun::Dbfunctions":"Batch-Batchrun","Clipboard::MacPasteboard":"Clipboard","SVG::Sparkline::Bar":"SVG-Sparkline","Jifty::Plugin::Authentication::Password::Mixin::Model::User":"Jifty","Dpkg::Archive::Ar":"Dpkg","CPAN::Plugin::Specfile":"CPAN","Lemonldap::NG::Portal::Auth::Apache":"Lemonldap-NG-Portal","Bio::DB::SeqFeature::Store::BedLoader":"GBrowse","Image::ExifTool::Real":"Image-ExifTool","Net::DNS::RR::DNAME":"Net-DNS","MyStripScripts":"HTML-StripScripts","UI::Dialog::Backend::Whiptail":"UI-Dialog","CPAN::Queue":"CPAN","XML::LibXML::SAX::Generator":"XML-LibXML","IO::Socket::SSL::Intercept":"IO-Socket-SSL","Config::Model::Exception::Load":"Config-Model","Pinto::PackageSpec":"Pinto","java::lang::String":"perl","Net::DNS::Text":"Net-DNS","Class::Struct":"perl","MHonArc::UTF8::CP1253":"MHonArc","Crypt::Perl::X509::Extension::policyConstraints":"Crypt-Perl","Crypt::Digest::BLAKE2s_224":"CryptX","Dancer::Session::Simple":"Dancer","Digest::file":"Digest","ModPerl::MapUtil":"mod_perl","Config::Model::Exception::UnavailableElement":"Config-Model","App::Pinto::Command::log":"Pinto","Plack::Builder":"Plack","Image::ExifTool::MPEG":"Image-ExifTool","Amiga::Exec":"perl","DBD::Sponge::dr":"DBI","DBD::DBM::Table":"DBI","Plack::Middleware::Chunked":"Plack","Apache::ASP::Date":"Apache-ASP","Catalyst::Script::CGI":"Catalyst-Runtime","MIME::Field::ContDisp":"MIME-tools","Zonemaster::Backend::Error::Conflict":"Zonemaster-Backend","DBIx::Class::Valiant::Validator::Result":"Valiant","Plack::Middleware::RearrangeHeaders":"Plack","MHonArc::CharEnt::AppleRoman":"MHonArc","Plack::App::Directory":"Plack","Valiant::HTML::Util::Form::FormObject":"Valiant","Net::LDAP::Extension::Refresh":"perl-ldap","Net::DNS::Resolver::os390":"Net-DNS","Jifty::Notification":"Jifty","Crypt::PRNG::Sober128":"CryptX","CGI::Application::Dispatch::Regexp":"CGI-Application-Dispatch","I18N::LangTags::List":"perl","Image::ExifTool::Geolocation":"Image-ExifTool","Apache::ePerl":"eperl","PApp::XBox":"PApp","MojoMojo::Formatter::Gist":"MojoMojo","Config::Model::Lister":"Config-Model","Jifty::Script::Server":"Jifty","Jifty::View":"Jifty","Jifty::DBI::SchemaGenerator":"Jifty-DBI","Batch::Batchrun::BuildFile":"Batch-Batchrun","Crypt::Perl::ECDSA::Utils":"Crypt-Perl","Moxy::Plugin::Status::500":"Moxy","Jifty::DBI::Handle::mysqlPP":"Jifty-DBI","Dancer::Config":"Dancer","Catalyst::ActionRole::HTTPMethods":"Catalyst-Runtime","Net::DNS::RR::RT":"Net-DNS","Spoon::Utils":"Spoon","Apache::Wyrd::Services::PreAuth":"Apache-Wyrd","Mojolicious::Plugin::DefaultHelpers":"Mojolicious","warnings::register":"perl","Lemonldap::NG::Portal::Plugins::BruteForceProtection":"Lemonldap-NG-Portal","Dpkg::Getopt":"Dpkg","RPC::PlClient":"PlRPC","Lemonldap::NG::Portal::Main::Plugins":"Lemonldap-NG-Portal","Apache::Wyrd::DBL":"Apache-Wyrd","ExtUtils::MM_NW5":"ExtUtils-MakeMaker","My::Parameters":"SOAP-Lite","Image::ExifTool::GeoTiff":"Image-ExifTool","Imager::Filter::Mandelbrot":"Imager","Crypt::CBC::PBKDF::opensslv1":"Crypt-CBC","Email::Address":"Email-Address","MIME::Decoder::Binary":"MIME-tools","Pinto::Role::Schema::Result":"Pinto","Lemonldap::NG::Portal::Lib::Slave":"Lemonldap-NG-Portal","Crypt::OpenSSL::RSA":"Crypt-OpenSSL-RSA","XAO::DO::Web::Utility":"XAO-Web","App::UserAgent":"App-Context","Net::LDAP::Control::SyncRequest":"perl-ldap","Net::DNS::RR::OPT::REPORT_CHANNEL":"Net-DNS","B::Showlex":"perl","DBI::Gofer::Request":"DBI","Elive::Util":"Elive","RPC::XML::i4":"RPC-XML","Crypt::Checksum::CRC32":"CryptX","Mojo::Parameters":"Mojolicious","CGI::Session::ErrorHandler":"CGI-Session","Valiant::Validates":"Valiant","DBD::Mem":"DBI","DBD::DBM::dr":"DBI","Valiant::Validator::Each":"Valiant","Plack::Session::State::Cookie":"Plack-Middleware-Session","ExtUtils::MakeMaker::version::vpp":"ExtUtils-MakeMaker","Lemonldap::NG::Portal::Lib::OtherSessions":"Lemonldap-NG-Portal","Benchmark":"perl","POE::Component::IRC::Plugin::CTCP":"POE-Component-IRC","Pinto::Result":"Pinto","Plack::Middleware::XSRFBlock":"Plack-Middleware-XSRFBlock","Crypt::Perl::KeyBase":"Crypt-Perl","Mojo::Message::Response":"Mojolicious","Mojo::Server::Prefork":"Mojolicious","ModPerl::TiPool":"mod_perl","Jifty::Plugin::ActorMetadata":"Jifty","MHonArc::CharEnt::ISO8859_5":"MHonArc","Image::ExifTool::InDesign":"Image-ExifTool","Apache::Wyrd::Lib":"Apache-Wyrd","RPC::PlServer::Test":"PlRPC","HTML::EP::Session::Dumper":"HTML-EP","Image::ExifTool::ISO":"Image-ExifTool","Crypt::Cipher::SAFER_K128":"CryptX","Net::Server::Log::Log::Log4perl":"Net-Server","Tk::Compound":"Tk","Crypt::Digest::MD2":"CryptX","FileHandle":"perl","Mojo::UserAgent":"Mojolicious","MojoMojo::Extension":"MojoMojo","IPC::Run::Timer":"IPC-Run","Bio::Graphics::Browser2::Region":"GBrowse","Config::Model::Exception::LoadData":"Config-Model","Crypt::Cipher::KASUMI":"CryptX","Tk::DragDrop::XDNDDrop":"Tk","MHonArc::CharEnt::ISO8859_2":"MHonArc","Image::ExifTool::AES":"Image-ExifTool","Config::Model::Exception::Model":"Config-Model","Net::DNS::RR::NS":"Net-DNS","SOAP::Lite::Packager::DIME":"SOAP-Lite","Lemonldap::NG::Portal::Lib::Net::LDAP":"Lemonldap-NG-Portal","SOAP::Transport::LOCAL":"SOAP-Lite","JPL::Compile":"perl","Mojolicious::Plugin::Config::Sandbox":"Mojolicious","POSIX::SigRt":"perl","MojoMojo::Formatter::TOC":"MojoMojo","Image::ExifTool::MXF":"Image-ExifTool","Jifty::Request::StateVariable":"Jifty","Config::Model::Role::HelpAsText":"Config-Model","Plack::Util::Accessor":"Plack","ModPerl::MM":"mod_perl","Apache::Wyrd::Input::Complex":"Apache-Wyrd","Lemonldap::NG::Portal::Plugins::CheckState":"Lemonldap-NG-Portal","Valiant::Filter::Template":"Valiant","App":"App-Context","Apache2::Upload":"libapreq2","SOAP::Custom::XML::Data":"SOAP-Lite","Plack::Handler::Apache2":"Plack","Dpkg::Lock":"Dpkg","Cpanel::JSON::XS":"Cpanel-JSON-XS","DBD::mysqlPP":"DBD-mysqlPP","Dpkg::Deps::OR":"Dpkg","Dpkg::ErrorHandling":"Dpkg","Bio::Graphics::Browser2::UserConf":"GBrowse","Crypt::Stream::RC4":"CryptX","MHonArc::UTF8::AppleHebrew":"MHonArc","Apache::Session::Browseable::Store::MySQL":"Apache-Session-Browseable","Config::Model::Dumper":"Config-Model","Image::ExifTool::BMP":"Image-ExifTool","XML::LibXML::Number":"XML-LibXML","CGI::Cookie":"CGI","Crypt::PK::ECC":"CryptX","IO::Socket::SSL::Session_Cache":"IO-Socket-SSL","Moxy::Plugin::GPS::EZweb":"Moxy","Imager::FORMATS":"Imager","Mojolicious::Command::Author::generate::plugin":"Mojolicious","Net::SSLeay":"Net-SSLeay","Lemonldap::NG::Portal::Plugins::SamlFederation":"Lemonldap-NG-Portal","Moxy::Plugin::ShowHTTPHeaders":"Moxy","Jifty::Script":"Jifty","Jifty::Web::Form::Field::Checkbox":"Jifty","Jifty::LetMe":"Jifty","SOAP::Deserializer":"SOAP-Lite","ModPerl::WrapXS":"mod_perl","HTML::Scrubber":"HTML-Scrubber","Apache::Wyrd::Datum::Blob":"Apache-Wyrd","Jifty::Request":"Jifty","Dancer::Continuation::Route::ErrorSent":"Dancer","Perlbal::Plugin::Vpaths":"Perlbal","Bio::Graphics::Browser2::Plugin":"GBrowse","Mojo::EventEmitter":"Mojolicious","Tk::Menu":"Tk","Lemonldap::NG::Portal::Lib::Combination::UserLogger":"Lemonldap-NG-Portal","Image::ExifTool::Lang::ru":"Image-ExifTool","Kelp::Module":"Kelp","Elive::View::Session":"Elive","Lemonldap::NG::Portal::Register::LDAP":"Lemonldap-NG-Portal","Valiant::Validator::Unique":"Valiant","Apache::MP3::L10N::fa":"Apache-MP3","Lemonldap::NG::Portal::Auth::Null":"Lemonldap-NG-Portal","Imager::Expr":"Imager","Crypt::Mac":"CryptX","Catalyst::Request::PartData":"Catalyst-Runtime","Crypt::Perl::ECDSA::PublicKey":"Crypt-Perl","Plack::App::WrapCGI":"Plack","RPC::XML::base64":"RPC-XML","Crypt::Perl::X509::Extension::basicConstraints":"Crypt-Perl","Image::ExifTool::Sigma":"Image-ExifTool","Crypt::Perl::RSA::Template":"Crypt-Perl","Moxy::Plugin::ShowHTMLSource":"Moxy","Perlbal::Plugin::AccessControl":"Perlbal","Jifty::Web::Form::Field::Checkboxes":"Jifty","App::Context::Cmd":"App-Context","SOAP::Constants":"SOAP-Lite","Apache2::Util":"mod_perl","Dancer::Exception::Base":"Dancer","Crypt::Perl::X509::Extension::subjectDirectoryAttributes":"Crypt-Perl","Crypt::Stream::Salsa20":"CryptX","Bio::Graphics::Browser2::Render::TrackConfig":"GBrowse","MojoMojo::Schema::Result::PageVersion":"MojoMojo","Net::IPAddress::Util::Collection":"Net-IPAddress-Util","App::Pinto::Command::stacks":"Pinto","MHonArc::UTF8::KOI8_E":"MHonArc","Jifty::DBI::Filter::URI":"Jifty-DBI","SOAP::Packager":"SOAP-Lite","RPC::XML::fault":"RPC-XML","Apache::Resource":"mod_perl","XML::LibXML::SAX::Parser":"XML-LibXML","MHonArc::UTF8::KOI_0":"MHonArc","SOAP::Schema":"SOAP-Lite","Tk::ReindexedText":"Tk","Jifty::Script::WriteCCJS":"Jifty","MIME::Decoder::QuotedPrint":"MIME-tools","APR::BucketType":"mod_perl","HTML::EP::Session::DBI":"HTML-EP","Pinto::Difference":"Pinto","Dancer2::Core":"Dancer2","Dpkg::Exit":"Dpkg","Pinto::Role::PauseConfig":"Pinto","Valiant::Filter::Collapse":"Valiant","MojoMojo::Formatter::Comment":"MojoMojo","Apache::MP3::L10N::nl_be":"Apache-MP3","HTML::Perlinfo":"HTML-Perlinfo","Image::ExifTool::QuickTime":"Image-ExifTool","GD::Group":"GD","Jifty::Model::Session":"Jifty","Archive::Tar::Win32":"Archive-Tar","Lemonldap::NG::Portal::Lib::REST":"Lemonldap-NG-Portal","Jifty::View::Mason::Request":"Jifty","Tk::Label":"Tk","MojoMojo::Formatter::Markdown":"MojoMojo","Valiant::Validator::Presence":"Valiant","Image::ExifTool::FujiFilm":"Image-ExifTool","MHonArc::UTF8":"MHonArc","UNIVERSAL":"perl","Bio::Graphics::Browser2::DataLoader::gff":"GBrowse","DBIx::Custom::Query":"DBIx-Custom","Lemonldap::NG::Portal::Main::Issuer":"Lemonldap-NG-Portal","RT::Authen::ExternalAuth":"RT-Authen-ExternalAuth","Dancer2::CLI::Version":"Dancer2","Plack::Middleware::Static":"Plack","Imager::Expr::Assem":"Imager","MHonArc::UTF8::AppleRoman":"MHonArc","Time::tm":"perl","DBD::mysql::db":"DBD-mysql","Plack::Middleware::SimpleContentFilter":"Plack","Bio::DB::GFF::Aggregator::waba_alignment":"GBrowse","Pinto::Chrome":"Pinto","CPAN::Tarzip":"CPAN","URI::jabber":"SOAP-Lite","Valiant::Proxy::Array":"Valiant","Lemonldap::NG::Portal::Lib::WebAuthn":"Lemonldap-NG-Portal","Jifty::Collection":"Jifty","Module::Provision::TraitFor::Rendering":"Module-Provision","Bio::Graphics::Browser2::Shellwords":"GBrowse","Dancer2::Core::Role::DSL":"Dancer2","ModPerl::Interpreter":"mod_perl","Plack::Middleware::AccessLog::Timed":"Plack","MHonArc::CharEnt::CP1250":"MHonArc","App::Pinto::Command::install":"Pinto","Dpkg::Vendor::Default":"Dpkg","Moxy::Plugin":"Moxy","Mojolicious::Command":"Mojolicious","Image::ExifTool::HtmlDump":"Image-ExifTool","Image::ExifTool::Leaf":"Image-ExifTool","MojoMojo::Formatter::IRCLog":"MojoMojo","Tk::Menu::Checkbutton":"Tk","Lemonldap::NG::Portal::UserDB::OpenIDConnect":"Lemonldap-NG-Portal","Crypt::Perl::X::InvalidJWK":"Crypt-Perl","Mojolicious::Command::generate":"Mojolicious","MySQL::Admin::Session":"MySQL-Admin","Template::Quick":"MySQL-Admin","Mail::Audit::MailInternet":"Mail-Audit","Apache2::Provider":"mod_perl","Dpkg::Changelog::Entry":"Dpkg","Config::Model::BackendMgr":"Config-Model","Dancer2::CLI::Command::version":"Dancer2","Locale::Maketext::Guts":"Locale-Maketext","HTML::EP":"HTML-EP","Moxy::Plugin::DisableTableTag":"Moxy","Plack::Test::MockHTTP":"Plack","Dancer2::Serializer::YAML":"Dancer2","App::Pinto::Command::copy":"Pinto","Image::ExifTool::CanonVRD":"Image-ExifTool","MyFeatureFileLoader":"GBrowse","Pod::Perldoc::ToXml":"Pod-Perldoc","POE::Component::IRC::Plugin::Whois":"POE-Component-IRC","DBD::File":"DBI","CPAN::Module":"CPAN","Lemonldap::NG::Portal::Password::AD":"Lemonldap-NG-Portal","Pinto::Role::Committable":"Pinto","MIME::Decoder::BinHex":"MIME-tools","Jifty::CurrentUser":"Jifty","Jifty::Server::Prefork":"Jifty","Net::LDAP::Search":"perl-ldap","Dancer::Test":"Dancer","Elive::DAO::_Base":"Elive","Jifty::Web::Form::Field::Unrendered":"Jifty","Dpkg::OpenPGP::Backend::SOP":"Dpkg","Net::DNS::RR::KX":"Net-DNS","Module::Provision::TraitFor::AddingFiles":"Module-Provision","Valiant::Filter::Lower":"Valiant","Catalyst::Exception::Detach":"Catalyst-Runtime","Crypt::Checksum":"CryptX","MHonArc::UTF8::EUC_JP":"MHonArc","Perlbal::Plugin::Throttle::Store":"Perlbal","Apache::Wyrd::Site::NavPull":"Apache-Wyrd","ExtUtils::MakeMaker::charstar":"ExtUtils-MakeMaker","POE::Component::IRC::Plugin::ISupport":"POE-Component-IRC","IO::Compress::Zip":"IO-Compress","XAO::PageSupport":"XAO-Web","Catalyst::Controller::Combine":"Catalyst-Controller-Combine","File::Glob":"perl","Apache::FakeRequest":"mod_perl","Dancer2::Template::Tiny":"Dancer2","Perlbal::SocketSSL2":"Perlbal","Apache::Wyrd::BrowserSwitch":"Apache-Wyrd","Catalyst::EngineLoader":"Catalyst-Runtime","Encode::MIME::Name":"Encode","DBD::File::dr":"DBI","Imager::File::SGI":"Imager","Pinto::Editor::Edit":"Pinto","Lemonldap::NG::Portal::Plugins::Register":"Lemonldap-NG-Portal","Dancer::Continuation::Route::Templated":"Dancer","Data::Dumper":"Data-Dumper","Lemonldap::NG::Portal::2F::TOTP":"Lemonldap-NG-Portal","Image::ExifTool::GIMP":"Image-ExifTool","Galileo::DB::Deploy":"Galileo","Dpkg::BuildOptions":"Dpkg","MIME::Decoder::Gzip64":"MIME-tools","Crypt::Perl::X509::Extension::freshestCRL":"Crypt-Perl","Pinto::Schema::Result::Distribution":"Pinto","Plack::Server::Apache1":"Plack","Crypt::Perl::X509::Extension":"Crypt-Perl","CGI::Util":"CGI","Dpkg::Control::Tests::Entry":"Dpkg","Apache::MP3::Resample":"Apache-MP3","Tk::DirTreeDialog":"Tk","Apache2::RequestRec":"mod_perl","Catalyst::TraitFor::Request::REST":"Catalyst-Action-REST","Bio::Graphics::Browser2":"GBrowse","Mojo::Util":"Mojolicious","Crypt::Digest::SHA1":"CryptX","RPC::XML::datatype":"RPC-XML","Dpkg::Shlibs":"Dpkg","Catalyst::Test":"Catalyst-Runtime","Net::DNS::RR::OPT::DAU":"Net-DNS","Catalyst::Engine":"Catalyst-Runtime","Mojolicious::Sessions":"Mojolicious","Archive::Zip::StringMember":"Archive-Zip","Moxy::Plugin::GPS::DoCoMo":"Moxy","SVG::Sparkline":"SVG-Sparkline","Config::Model::Backend::PerlFile":"Config-Model","Mojo::Server::Morbo":"Mojolicious","SOAP::Transport::LOOPBACK::Client":"SOAP-Lite","Perlbal::TCPListener":"Perlbal","Kelp::Module::Encoder":"Kelp","Template::Declare::Exception":"Jifty","XML::Atom::ErrorHandler":"XML-Atom","APR::Error":"mod_perl","Pinto::Schema::Result::Registration":"Pinto","Perlbal::Plugin::AutoRemoveLeadingDir":"Perlbal","RPC::XML::boolean":"RPC-XML","Jifty::DBI::Filter::YAML":"Jifty-DBI","Data::FormValidator::Filters":"Data-FormValidator","OS2::REXX::_ARRAY":"perl","Mojo::Exception::_Guard":"Mojolicious","DBD::Gofer::Policy::Base":"DBI","MHonArc::UTF8::AppleCroatian":"MHonArc","Tk::Bitmap":"Tk","Lemonldap::NG::Portal::Main::Display":"Lemonldap-NG-Portal","Valiant::HTML::ContentComponent":"Valiant","CGI::Simple::Standard":"CGI-Simple","Dancer::Continuation::Route":"Dancer","Crypt::AuthEnc::OCB":"CryptX","DBD::Mem::st":"DBI","LWP::Authen::Ntlm":"libwww-perl","Jifty::Test::WWW::Selenium":"Jifty","Crypt::Cipher::SAFERP":"CryptX","Crypt::Cipher::DES_EDE":"CryptX","Lemonldap::NG::Portal::Plugins::Upgrade":"Lemonldap-NG-Portal","Dpkg::Source::Package::V2":"Dpkg","UI::Dialog::Backend::XOSD":"UI-Dialog","Crypt::Perl::X509::Extension::cRLDistributionPoints":"Crypt-Perl","Mojo::Server::Hypnotoad":"Mojolicious","MojoMojo::Schema::Result::Attachment":"MojoMojo","MojoMojo::Controller::Comment":"MojoMojo","Pinto::PrerequisiteWalker":"Pinto","PApp::MimeType":"PApp","Apache::Wyrd::Chart":"Apache-Wyrd","Pinto::Action::Pull":"Pinto","SOAP::SOM":"SOAP-Lite","Image::ExifTool::Parrot":"Image-ExifTool","HTTP::Tiny":"HTTP-Tiny","Lemonldap::NG::Portal::Issuer::JitsiMeetTokens":"Lemonldap-NG-Portal","Jifty::Web::PageRegion":"Jifty","Clipboard::Win32":"Clipboard","Net::DNS::RR::DS":"Net-DNS","CPAN::InfoObj":"CPAN","CPAN::HTTP::Client":"CPAN","Image::Info::SVG::XMLLibXMLReader":"Image-Info","Net::DNS::RR::MX":"Net-DNS","Config::Model::TypeConstraints":"Config-Model","Image::Info":"Image-Info","Net::LDAP::RootDSE":"perl-ldap","Crypt::Perl::X509::GeneralName":"Crypt-Perl","Image::ExifTool::IPTC":"Image-ExifTool","Bundle::Net::LDAP":"perl-ldap","Net::DNS::RR::OPT::CLIENT_SUBNET":"Net-DNS","Valiant::Filter::Each":"Valiant","DBI::DBD::SqlEngine::TableSource":"DBI","Jifty::Action::Record::Create":"Jifty","Jifty::View::Declare::Page":"Jifty","Spreadsheet::ParseExcel::Font":"Spreadsheet-ParseExcel","DBIx::Class::Valiant::Validator::SetSize":"Valiant","Crypt::Digest::Keccak512":"CryptX","Apache::ASP::Session":"Apache-ASP","vmsish":"perl","Email::MIME::Modifier":"Email-MIME","MHonArc::CharEnt::KOI8_A":"MHonArc","Perlbal::Plugin::Queues":"Perlbal","ModPerl::TestConfig":"mod_perl","Dpkg::Substvars":"Dpkg","MojoMojo::Controller::Image":"MojoMojo","Tk::BrowseEntry":"Tk","VMS::Stdio":"perl","MojoMojo::Formatter::Redirect":"MojoMojo","Crypt::Perl::ASN1::BitString":"Crypt-Perl","XML::LibXML::PI":"XML-LibXML","Bio::Graphics::Browser2::DataLoader::bigwig":"GBrowse","Pinto::Schema::Result::Revision":"Pinto","Mojolicious::Controller":"Mojolicious","Valiant::HTML::Util::Collection::HashItem":"Valiant","MojoMojo::Schema::Result::Role":"MojoMojo","Apache::MP3::L10N::ru":"Apache-MP3","ModPerl::BuildMM":"mod_perl","Valiant::Validator::With":"Valiant","Image::ExifTool::Radiance":"Image-ExifTool","Jifty::DBI::Filter::Truncate":"Jifty-DBI","Image::ExifTool::FLIF":"Image-ExifTool","IO::Compress::Base":"IO-Compress","Mojolicious::Command::Author::generate::makefile":"Mojolicious","Jifty::Test::Dist":"Jifty","Catalyst::Plugin::Static":"Catalyst-Plugin-Static","Valiant::HTML::FormBuilder::Model::TextField":"Valiant","Net::Server::PSGI":"Net-Server","Jifty::RightsFrom":"Jifty","Apache::Session::Browseable::Postgres":"Apache-Session-Browseable","Dpkg::BuildDriver::DebianRules":"Dpkg","Apache2::Module":"mod_perl","Agni::Callback":"PApp","Valiant::Validator::Collection":"Valiant","PApp::Event":"PApp","MHonArc::UTF8::ISO8859_13":"MHonArc","MojoMojo::Formatter::Dir":"MojoMojo","Mojolicious::Plugin::HeaderCondition":"Mojolicious","MHonArc::UTF8::KOI8_U":"MHonArc","Dancer2::Template::Implementation::ForkedTiny":"Dancer2","B::Lint::Plugin::Test":"perl","Net::OpenID::Consumer":"Net-OpenID-Consumer","Dpkg::Changelog::Entry::Debian":"Dpkg","MIME::Decoder::UU":"MIME-tools","Valiant::HTML::Util::Form":"Valiant","ModPerl::MapBase":"mod_perl","Image::ExifTool::Lang::cs":"Image-ExifTool","Dpkg::Source::Patch":"Dpkg","Tk::NBFrame":"Tk","MojoMojo::Controller::User":"MojoMojo","sort":"perl","XML::Atom::Client":"XML-Atom","DBIx::Class::Valiant::Validator::ResultSet":"Valiant","Mojolicious::Plugin":"Mojolicious","Spreadsheet::ParseExcel::FmtJapan":"Spreadsheet-ParseExcel","LWP::Protocol::ldaps":"perl-ldap","Archive::Tar":"Archive-Tar","Image::ExifTool::BuildTagLookup":"Image-ExifTool","Imager::TrimColorList":"Imager","UI::Dialog::Backend::CDialog":"UI-Dialog","Plack::App::File":"Plack","App::Serializer::XMLSimple":"App-Context","Perl::Version":"Perl-Version","Mail::Audit::Vacation":"Mail-Audit","Crypt::Perl::X509::GeneralNames":"Crypt-Perl","Valiant::I18N":"Valiant","Pinto::Locator":"Pinto","MojoMojo::Schema::Result::Journal":"MojoMojo","Apache2::Filter":"mod_perl","Mojolicious::Command::generate::makefile":"Mojolicious","Image::ExifTool::Lang::sk":"Image-ExifTool","Plack::Middleware::ErrorDocument":"Plack","English":"perl","Net::DNS::RR::APL":"Net-DNS","Plack::Middleware::BufferedStreaming":"Plack","RT::Authen::ExternalAuth::DBI":"RT-Authen-ExternalAuth","Image::Info::WEBP":"Image-Info","Bundle::Image::Info::SVG":"Image-Info","Net::SNMP::Transport::TCP6":"Net-SNMP","File::DataClass::Cache":"File-DataClass","Plack::Middleware::IIS6ScriptNameFix":"Plack","SOAP::Test::Server":"SOAP-Lite","Pinto::Schema::Result::Prerequisite":"Pinto","XAO::DO::Web::MenuBuilder":"XAO-Web","Valiant::Util::Exception::MissingMethod":"Valiant","Pinto::Role::Installer":"Pinto","Jifty::Plugin::OnlineDocs":"Jifty","Image::ExifTool::Motorola":"Image-ExifTool","Crypt::Perl::X::ECDSA::NoCurveForOID":"Crypt-Perl","Valiant::Proxy::Object":"Valiant","Moxy::Plugin::Status::401":"Moxy","Net::DNS::RR::LP":"Net-DNS","PApp::DataRef::DB_row":"PApp","Lemonldap::NG::Portal::CertificateResetByMail::LDAP":"Lemonldap-NG-Portal","Jifty::Plugin::REST":"Jifty","Crypt::Perl::X509::Extension::issuerAltName":"Crypt-Perl","Lemonldap::NG::Portal::2F::Register::Password":"Lemonldap-NG-Portal","XML::LibXML::Pattern":"XML-LibXML","Pinto::Schema":"Pinto","MHonArc::UTF8::ISO8859_11":"MHonArc","Config::Model::Exception::Internal":"Config-Model","Dpkg::Shlibs::SymbolFile":"Dpkg","SOAP::Packager::DIME":"SOAP-Lite","Apache::MP3::L10N::sk":"Apache-MP3","Batch::Batchrun::Pwlookup":"Batch-Batchrun","Valiant::Validator::Length":"Valiant","B::Concise":"perl","RPC::XML::int":"RPC-XML","Zonemaster::Backend::Metrics":"Zonemaster-Backend","SOAP::XMLSchemaApacheSOAP::Deserializer":"SOAP-Lite","Jifty::DBI::Schema":"Jifty-DBI","CPAN::FirstTime":"CPAN","Image::ExifTool::RTF":"Image-ExifTool","Kelp::Module::Null":"Kelp","Jifty::Record":"Jifty","Perlbal::Plugin::Stats::Storage":"Perlbal","Crypt::Perl::RSA::Parse":"Crypt-Perl","Perlbal::HTTPHeaders":"Perlbal","Kossy::BodyParser::JSON":"Kossy","MIME::Field::ParamVal":"MIME-tools","Tk::Menubar":"Tk","Dpkg::Build::Types":"Dpkg","IO::Socket::SSL::OCSP_Cache":"IO-Socket-SSL","Net::DNS::RR::APL::Item":"Net-DNS","yaml_scalar":"YAML","My::Examples":"SOAP-Lite","CGI::Session::Driver::sqlite":"CGI-Session","Text::Wikispaces2Markdown":"MojoMojo","DBD::ExampleP::st":"DBI","APR::Request::Apache2":"libapreq2","Bio::DB::SeqFeature::Store::Alias::Segment":"GBrowse","DBD::DBM":"DBI","SOAP::Transport::IO":"SOAP-Lite","Pod::Html":"perl","Mail::Address":"MailTools","Crypt::PRNG::Yarrow":"CryptX","Apache::Wyrd::Site::IndexBot":"Apache-Wyrd","DBD::Mem::dr":"DBI","DBD::SQLite::VirtualTable::FileContent::Cursor":"DBD-SQLite","RPC::XML::Client":"RPC-XML","Dancer::App":"Dancer","Image::ExifTool::RSRC":"Image-ExifTool","Data::Validate::IP":"Data-Validate-IP","Catalyst::Component::ApplicationAttribute":"Catalyst-Runtime","MHonArc::UTF8::AppleGreek":"MHonArc","Jifty::Web::Form::Field::Radio":"Jifty","Lemonldap::NG::Portal::Plugins::CheckDevOps":"Lemonldap-NG-Portal","Bio::Graphics::Browser2::DataLoader::bam":"GBrowse","Spoon::CGI":"Spoon","APR::Request::CGI":"libapreq2","Dancer::Serializer":"Dancer","Tk::Tree":"Tk","Apache::App":"App-Context","Jifty::Script::Script":"Jifty","Image::Info::PPM":"Image-Info","Image::ExifTool::VCard":"Image-ExifTool","Crypt::Perl::X::ASN1::Decode":"Crypt-Perl","CPAN::Exception::yaml_not_installed":"CPAN","Moxy::Util":"Moxy","DBDI":"DBI","DemoASP":"Apache-ASP","Crypt::Perl::ECDSA::Math":"Crypt-Perl","IO::Socket::SSL":"IO-Socket-SSL","Config::Model::AnyThing":"Config-Model","Log::Any::Adapter::Base":"Log-Any","Apache::Wyrd::CGISetter":"Apache-Wyrd","App::Serializer::Properties":"App-Context","HTTP::Body::XFormsMultipart":"HTTP-Body","Pinto::Constants":"Pinto","Kelp::Routes::Location":"Kelp","DBI::Library::st":"MySQL-Admin","Catalyst::Exception::Interface":"Catalyst-Runtime","Module::Provision::TraitFor::UpdatingContent":"Module-Provision","HTTP::Session2::ClientStore":"HTTP-Session2","Mojo::Content::Single":"Mojolicious","Kelp::Module::Template":"Kelp","Galileo::Plugin::Modal":"Galileo","Encode::EBCDIC":"Encode","Image::ExifTool::MacOS":"Image-ExifTool","Config::Model::Annotation":"Config-Model","Lemonldap::NG::Portal::Auth::_WebForm":"Lemonldap-NG-Portal","Bio::Graphics::Browser2::MetaSegment::Iterator":"GBrowse","Pinto::Remote::Result":"Pinto","GitUtils":"perl","Image::ExifTool::JPEGDigest":"Image-ExifTool","Mail::Mailer::rfc822":"MailTools","Devel::Peek":"perl","XML::LibXML::SAX::Builder":"XML-LibXML","Crypt::Perl":"Crypt-Perl","Apache::ASP::Load":"Apache-ASP","Lemonldap::NG::Portal::2F::WebAuthn":"Lemonldap-NG-Portal","PerlIO::mmap":"perl","APR::ThreadRWLock":"mod_perl","DBD::mysql::dr":"DBD-mysql","UI::Dialog::Gauged":"UI-Dialog","Plack::HTTPParser::PP":"Plack","Module::Provision::TraitFor::EnvControl":"Module-Provision","Config::Model::Role::Utils":"Config-Model","Mail::Field::AddrList":"MailTools","mro":"perl","Net::LDAPI":"perl-ldap","App::ResourceLocker::IPCSemaphore":"App-Context","Catalyst::Log":"Catalyst-Runtime","Apache2::ConstantsTable":"mod_perl","SOAP::Transport::MAILTO::Client":"SOAP-Lite","PApp::Callback":"PApp","Image::ExifTool::DV":"Image-ExifTool","Crypt::Mode":"CryptX","Jifty::Plugin::SinglePage":"Jifty","DBD::mysql":"DBD-mysql","CGI::mod_perl":"mod_perl","Crypt::PRNG::ChaCha20":"CryptX","Net::SNMP::Security":"Net-SNMP","XS::Typemap":"perl","Pinto::Chrome::Net":"Pinto","DBD::Mem::Table":"DBI","DBI::ProxyServer":"DBI","Apache::Wyrd::Services::SearchParser":"Apache-Wyrd","JPL::Class":"perl","Apache::Wyrd::Interfaces::Mother":"Apache-Wyrd","Dancer2::Core::Role::Serializer":"Dancer2","Net::SNMP::MessageProcessing":"Net-SNMP","DBI::Library::db":"MySQL-Admin","Apache::MP3::L10N::sh":"Apache-MP3","DBD::SQLite::GetInfo":"DBD-SQLite","DBI::Gofer::Transport::pipeone":"DBI","IO::Socket::SSL::Utils":"IO-Socket-SSL","Moxy::Plugin::Status::404":"Moxy","MojoMojo::Formatter::File::DocBook":"MojoMojo","Catalyst::ActionContainer":"Catalyst-Runtime","Zonemaster::Backend::Error::PermissionDenied":"Zonemaster-Backend","Apache::Util":"mod_perl","Dancer2::Core::Role::Handler":"Dancer2","Mojolicious::Command::cgi":"Mojolicious","App::Pinto::Command::nop":"Pinto","Jifty::Web::Session":"Jifty","YAML::XS":"YAML-LibYAML","Elive::Entity::Group":"Elive","CPAN::Version":"CPAN","Elive::Entity::Report":"Elive","Kelp::Request":"Kelp","Net::DNS::RR::OPENPGPKEY":"Net-DNS","CGI::Toggle":"GBrowse","Net::DNS::RR::CDS":"Net-DNS","Apache::MP3::L10N::ar":"Apache-MP3","CGI":"CGI","Kelp::Module::Config::Sandbox":"Kelp","Dancer2::CLI::Command::gen":"Dancer2","YAML::Dumper":"YAML","Tk::Menu::Item":"Tk","App::Pinto::Command::help":"Pinto","Apache::Session::Browseable":"Apache-Session-Browseable","DBD::Gofer::Transport::Base":"DBI","Jifty::Plugin::ViewDeclarePage::Page":"Jifty","Kossy":"Kossy","Jifty::Web::Form::Field::Password":"Jifty","Image::ExifTool::DJI":"Image-ExifTool","Mojo::Collection":"Mojolicious","Tk::LabRadiobutton":"Tk","Mojo::Path":"Mojolicious","PApp::DataRef::Scalar":"PApp","POE::Component::IRC::Plugin::PlugMan":"POE-Component-IRC","Perlbal::AIO":"Perlbal","Valiant::Filterable":"Valiant","Tk::CmdLine":"Tk","Image::ExifTool::Stim":"Image-ExifTool","Net::SNMP::Transport::IPv4::UDP":"Net-SNMP","XML::Twig::Entity":"XML-Twig","Crypt::Cipher::Khazad":"CryptX","App::Reference":"App-Context","MySQL::Admin::Config":"MySQL-Admin","Spoon::IndexList":"Spoon","PerlIO::via":"perl","Jifty::Plugin::Authentication::Password":"Jifty","Plack::App::Cascade":"Plack","Log::Any::Proxy":"Log-Any","IO::Uncompress::AnyInflate":"IO-Compress","Log::Any::Test":"Log-Any","Pinto::Action::Update":"Pinto","HTTP::Server::PSGI":"Plack","Crypt::Digest::Whirlpool":"CryptX","Lemonldap::NG::Portal::Lib::_tokenRule":"Lemonldap-NG-Portal","MIME::Decoder::NBit":"MIME-tools","Lemonldap::NG::Portal::Auth::Custom":"Lemonldap-NG-Portal","Net::LDAP::Control::VLV":"perl-ldap","CGI::Session::ID::md5":"CGI-Session","Tk::Spinbox":"Tk","Encode::Internal":"Encode","CPAN::Nox":"CPAN","Pinto::Action::Kill":"Pinto","ExtUtils::MM_MacOS":"ExtUtils-MakeMaker","HTML::Template::Pro::WrapAssociate":"HTML-Template-Pro","Crypt::Perl::RSA::KeyBase":"Crypt-Perl","Elive::DAO::Array":"Elive","Image::ExifTool::MRC":"Image-ExifTool","Net::SNMP::Transport::UDP":"Net-SNMP","YAML::Type::ref":"YAML","Bio::Graphics::Browser2::Render::SnapshotManager":"GBrowse","Pinto::SpecFactory":"Pinto","Crypt::Digest::BLAKE2b_384":"CryptX","Net::SNMP::Dispatcher":"Net-SNMP","Jifty::Web::Session::ClientSide":"Jifty","feature":"perl","Crypt::DSA::Util":"Crypt-DSA","Mojolicious::Command::version":"Mojolicious","Crypt::DSA::KeyChain":"Crypt-DSA","Apache::Wyrd::Site::Login":"Apache-Wyrd","Spreadsheet::ParseExcel::Worksheet":"Spreadsheet-ParseExcel","UI::Dialog::Backend::XDialog":"UI-Dialog","Catalyst::Helper::Controller::Combine":"Catalyst-Controller-Combine","Lemonldap::NG::Portal::Plugins::CheckUser":"Lemonldap-NG-Portal","CPAN::Index":"CPAN","File::Spec::Mac":"PathTools","Net::DNS::RR::SIG":"Net-DNS","Tk::Submethods":"Tk","sigtrap":"perl","Image::ExifTool::Validate":"Image-ExifTool","Pinto::Manual::Tutorial":"Pinto","Encode::Config":"Encode","DBIx::Custom::Result":"DBIx-Custom","Apache::ASP::GlobalASA":"Apache-ASP","HTTP::Body::OctetStream":"HTTP-Body","SOAP::Lite::Utils":"SOAP-Lite","AnyDBM_File":"perl","Jifty::Plugin::CompressedCSSandJS::Dispatcher":"Jifty","Lemonldap::NG::Portal::Auth::Remote":"Lemonldap-NG-Portal","Apache::Wyrd::Services::LoginServer":"Apache-Wyrd","Apache::Session::Browseable::LDAP":"Apache-Session-Browseable","Apache::Wyrd::Request":"Apache-Wyrd","Apache::XAO":"XAO-Web","DBI::DBD::SqlEngine::TieMeta":"DBI","Crypt::Perl::ToDER":"Crypt-Perl","Net::SNMP::Transport::IPv6::TCP":"Net-SNMP","Net::Server::INET::Handle":"Net-Server","Lemonldap::NG::Portal::Password::LDAP":"Lemonldap-NG-Portal","RPC::XML::double":"RPC-XML","Image::ExifTool::DjVu":"Image-ExifTool","Module::Provision::TraitFor::VCS":"Module-Provision","Thread::Signal":"perl","Kelp::Template":"Kelp","Kelp::Routes":"Kelp","MHonArc::CharEnt::AppleCenteuro":"MHonArc","Lemonldap::NG::Portal::Plugins::TrustedBrowser":"Lemonldap-NG-Portal","Clipboard":"Clipboard","Pinto::Action::Revert":"Pinto","CPAN::Distroprefs":"CPAN","LWP::Protocol::nogo":"libwww-perl","Jifty::DBI::Record::Plugin":"Jifty-DBI","Bio::Graphics::Browser2::DataLoader::gff3":"GBrowse","Image::ExifTool::Apple":"Image-ExifTool","MIME::WordDecoder::UTF_8":"MIME-tools","App::LogChannel":"App-Context","Encode::JP":"Encode","Tie::StdScalar":"perl","DBD::Sponge::db":"DBI","Pinto::Action":"Pinto","MHonArc::UTF8::VISCII":"MHonArc","GD":"GD","Crypt::Stream::Sober128":"CryptX","Pinto::Config":"Pinto","Tk::Adjuster::Item":"Tk","SOAP::Lite::Deserializer::XMLSchema2001":"SOAP-Lite","Dpkg::Source::Package::V1":"Dpkg","PApp::Session":"PApp","MIME::Parser::FileInto":"MIME-tools","Net::DNS::RR::MINFO":"Net-DNS","Net::Dropbear::XS::SessionAccept":"Net-Dropbear","Apache::MP3::L10N::de":"Apache-MP3","XML::LibXML::XPathExpression":"XML-LibXML","Tk::English":"Tk","Spreadsheet::ParseExcel::FmtJapan2":"Spreadsheet-ParseExcel","Jifty::DBI::Handle::ODBC":"Jifty-DBI","Apache2::SubRequest":"mod_perl","Mail::Internet":"MailTools","Image::ExifTool::CanonCustom":"Image-ExifTool","Mojo::IOLoop::Subprocess":"Mojolicious","MyTestModule":"perl","File::Slurp":"File-Slurp","Crypt::Digest::MD4":"CryptX","Net::Server::SIG":"Net-Server","DBD::DBM::st":"DBI","OverloadedObjectClass":"CGI-Session","Valiant::Naming":"Valiant","Image::ExifTool::MWG":"Image-ExifTool","Data::UUID":"Data-UUID","Catalyst::Exception::Base":"Catalyst-Runtime","LWP::Protocol::https":"LWP-Protocol-https","Pinto::PackageExtractor":"Pinto","Jifty::DBI::Filter::utf8":"Jifty-DBI","Apache::Session::Browseable::Sybase":"Apache-Session-Browseable","Valiant::JSON::Util":"Valiant","File::DataClass":"File-DataClass","Plack::Handler::CGI":"Plack","strict":"perl","Bundle::Apache::ASP":"Apache-ASP","Moxy::Plugin::XMLisHTML":"Moxy","File::KeePass":"File-KeePass","Crypt::Digest::BLAKE2s_128":"CryptX","Bio::Graphics::Browser2::DataLoader::bigbed":"GBrowse","Plack::Middleware::ContentMD5":"Plack","Plack::Response":"Plack","Net::Server::Proto":"Net-Server","HTML::Entities":"HTML-Parser","Moxy::Plugin::Hosts":"Moxy","Dancer::Continuation::Route::Passed":"Dancer","Apache::MP3::L10N":"Apache-MP3","Perlbal::UploadListener":"Perlbal","Config::Model::BackendTrackOrder":"Config-Model","LWP::Protocol::loopback":"libwww-perl","Image::ExifTool::GoPro":"Image-ExifTool","RPC::XML::response":"RPC-XML","Apache::Wyrd::Template":"Apache-Wyrd","Pinto::Action::Add":"Pinto","Crypt::Perl::X509::Extension::inhibitAnyPolicy":"Crypt-Perl","Dpkg::Vars":"Dpkg","Mojo::Cache":"Mojolicious","Crypt::DSA":"Crypt-DSA","DBD::SQLite::VirtualTable::Cursor":"DBD-SQLite","Valiant::Filter::Title":"Valiant","DBI::DBD::SqlEngine::Statement":"DBI","Dpkg::Control::Info":"Dpkg","CGI::Simple":"CGI-Simple","MySQL::Admin::Documentation":"MySQL-Admin","DBD::Gofer::Transport::stream":"DBI","Image::ExifTool::XISF":"Image-ExifTool","MojoMojo::Schema::ResultSet::Role":"MojoMojo","Mojo::Server":"Mojolicious","Crypt::Digest::SHA3_224":"CryptX","Apache::Wyrd::Services::TicketPad":"Apache-Wyrd","U64":"IO-Compress","Lemonldap::NG::Portal::UserDB::Remote":"Lemonldap-NG-Portal","MHonArc::CharEnt::KOI8_B":"MHonArc","Jifty::DBI::Filter::Boolean":"Jifty-DBI","Net::Server::Proto::UDP":"Net-Server","MDK::Common::String":"MDK-Common","Mail::Field::Date":"MailTools","Apache::ASP::Request":"Apache-ASP","Image::ExifTool::Lang::it":"Image-ExifTool","MIME::Parser::FileUnder":"MIME-tools","Apache::Session::Generate::SHA256":"Apache-Session-Browseable","DBI::DBD::SqlEngine::Table":"DBI","HTML::EP::Parser":"HTML-EP","Catalyst::Base":"Catalyst-Runtime","Moxy::Plugin::FlashUseImgTag":"Moxy","Image::ExifTool::LNK":"Image-ExifTool","for":"perl","Data::FormValidator::Constraints::RegexpCommon":"Data-FormValidator","Legacy::Graphics::Browser::PageSettings":"GBrowse","App::Pinto::Command::unlock":"Pinto","Image::ExifTool::MOI":"Image-ExifTool","Net::DNS::RR::OPT::EXPIRE":"Net-DNS","Net::DNS::Nameserver":"Net-DNS","Image::ExifTool::Ogg":"Image-ExifTool","Catalyst::Plugin::Unicode::Encoding":"Catalyst-Runtime","MHonArc::CharEnt::ISO8859_16":"MHonArc","Lemonldap::NG::Portal::2F::Yubikey":"Lemonldap-NG-Portal","HTML::PullParser":"HTML-Parser","Dancer2::Handler::AutoPage":"Dancer2","Moxy::Plugin::UserAgentSwitcher":"Moxy","DBI::ProxyServer::st":"DBI","Jifty::Action::Autocomplete":"Jifty","XML::Twig::XPath":"XML-Twig","LWP::Protocol::https::Socket":"LWP-Protocol-https","Spreadsheet::ParseXLSX::Cell":"Spreadsheet-ParseXLSX","B::Deparse":"perl","Image::ExifTool::DNG":"Image-ExifTool","Config::Model::ListId":"Config-Model","Valiant::Util::Exception::NameNotValidator":"Valiant","Bio::Graphics::Browser2::Render::Slave::Status":"GBrowse","Tk::ColorSelect":"Tk","Net::DNS::RR::CSYNC":"Net-DNS","Apache::Connection":"mod_perl","Mojo::Date":"Mojolicious","Spoon::Template::TT2":"Spoon","XML::LibXML::XPathContext":"XML-LibXML","Pinto::DifferenceEntry":"Pinto","ModPerl::PerlRunPrefork":"mod_perl","Math::BigInt::LTM":"CryptX","File::DataClass::Storage::JSON":"File-DataClass","CGI::Session::ID::static":"CGI-Session","Crypt::Cipher::CAST5":"CryptX","Dancer2::Core::Role::SessionFactory":"Dancer2","Apache::URI":"mod_perl","Net::DNS::RR::NAPTR":"Net-DNS","CGI::Session::Query":"CGI-Session","Imager::Expr::Infix":"Imager","PApp::Exception":"PApp","XML::LibXML::Attr":"XML-LibXML","MHonArc::CharEnt::AppleThai":"MHonArc","Archive::Zip::MemberRead":"Archive-Zip","Spoon::Hub":"Spoon","Dancer::Continuation::Halted":"Dancer","File::DataClass::Exception":"File-DataClass","Pinto::Schema::ResultSet::Package":"Pinto","DBIx::Class::Valiant":"Valiant","SOAP::Transport::HTTP":"SOAP-Lite","Apache::MP3::L10N::is":"Apache-MP3","Pinto::Action::Delete":"Pinto","Dpkg::Dist::Files":"Dpkg","MIME::Body::File":"MIME-tools","Plack::Middleware::Refresh":"Plack","ExtUtils::MM_Any":"ExtUtils-MakeMaker","APR::Brigade":"mod_perl","Valiant":"Valiant","Image::ExifTool::Red":"Image-ExifTool","Tk::DragDrop::Win32Site":"Tk","Crypt::Perl::BigInt":"Crypt-Perl","Encode::MIME::Header":"Encode","Apache::Wyrd::Interfaces::SmartInput":"Apache-Wyrd","Apache::Wyrd::Input":"Apache-Wyrd","Crypt::Digest::SHA3_384":"CryptX","GD::Simple":"GD","Apache::SOAP":"SOAP-Lite","Galileo::DB::Schema::Result::Menu":"Galileo","Galileo::User":"Galileo","Apache::Wyrd::Loop":"Apache-Wyrd","LWP::Simple":"libwww-perl","XAO::DO::Web::IdentifyUser":"XAO-Web","CPAN::Plugin":"CPAN","Jifty::DBI::Handle::Pg":"Jifty-DBI","Dpkg::OpenPGP::Backend::Sequoia":"Dpkg","DBI::ProfileDumper":"DBI","Tk::InputO":"Tk","X509_Certificate":"IO-Socket-SSL","DBM_Filter::compress":"perl","HTML::EP::CGIEncryptForm":"HTML-EP","Bundle::HTML::EP":"HTML-EP","RTMP::Client":"RTMP-Client","Archive::Zip::DirectoryMember":"Archive-Zip","Spoon::Trace":"Spoon","Bio::Graphics::Browser2::TrackDumper::RichSeqMaker":"GBrowse","DBI::DBD":"DBI","YAML::Type::code":"YAML","MojoMojo::Schema::Result::Preference":"MojoMojo","Image::ExifTool::GIF":"Image-ExifTool","Mojolicious::Types":"Mojolicious","Email::MIME::Header::AddressList":"Email-MIME","Image::ExifTool::RIFF":"Image-ExifTool","Cmd::Dwarf":"Cmd-Dwarf","Apache::Wyrd::Datum::Varchar":"Apache-Wyrd","Apache2::ParseSource::Scan":"mod_perl","Apache::Wyrd::Services::CodeRing":"Apache-Wyrd","Lemonldap::NG::Portal::UserDB::Proxy":"Lemonldap-NG-Portal","LWP::Debug::TraceHTTP":"libwww-perl","Jifty::CAS::Blob":"Jifty","RPC::XML::Parser::XMLLibXML":"RPC-XML","Jifty::Test::Email":"Jifty","Config::Model::Iterator":"Config-Model","Dpkg::Source::Package::V3::Bzr":"Dpkg","APR::Request::Cookie":"libapreq2","Crypt::Perl::PKCS10::Attribute::challengePassword":"Crypt-Perl","Lemonldap::NG::Portal::UserDB::WebID":"Lemonldap-NG-Portal","Lemonldap::NG::Portal::Lib::SOAPProxy":"Lemonldap-NG-Portal","MHonArc::CharEnt::CP1257":"MHonArc","Mojo::DOM::CSS":"Mojolicious","Pinto::Repository":"Pinto","Devel::PatchPerl::Plugin::Compiler":"App-perlall","ExtUtils::MM_Win95":"ExtUtils-MakeMaker","Log::Any::Adapter::Null":"Log-Any","MHonArc::CharEnt::BIG5_ETEN":"MHonArc","Jifty::View::Declare::Handler":"Jifty","Spreadsheet::ParseXLSX":"Spreadsheet-ParseXLSX","Jifty::CAS::Store::Memcached":"Jifty","Time::gmtime":"perl","Net::DNS::Mailbox2535":"Net-DNS","Net::DNS::RR::A":"Net-DNS","Image::ExifTool::ID3":"Image-ExifTool","CPAN::LWP::UserAgent":"CPAN","Apache2::Directive":"mod_perl","Proc::ProcessTable":"Proc-ProcessTable","Net::LDAP::Intermediate::SyncInfo":"perl-ldap","Mojolicious::Plugin::OAuth2":"Mojolicious-Plugin-OAuth2","Plack::Middleware::NullLogger":"Plack","Kossy::Response":"Kossy","MHonArc::UTF8::AppleThai":"MHonArc","Net::LDAP::Extension::WhoAmI":"perl-ldap","Jifty::Handle":"Jifty","PApp::DataRef::Base":"PApp","Dancer2::Core::Dispatcher":"Dancer2","Plack::Middleware::Auth::Basic":"Plack","DBD::NullP":"DBI","Dpkg::OpenPGP::Backend::GnuPG":"Dpkg","UI::Dialog::Backend::NotifySend":"UI-Dialog","Dwarf":"Cmd-Dwarf","MIME::Parser::Reader":"MIME-tools","Valiant::JSON::JSONBuilder":"Valiant","Pinto::Schema::Result::RegistrationChange":"Pinto","Apache::Wyrd::Input::Opt":"Apache-Wyrd","HTTP::Session2::ClientStore2":"HTTP-Session2","Valiant::Filter::Collection":"Valiant","CGI::Session::Example":"CGI-Session","Tie::Watch":"Tk","MDK::Common::Math":"MDK-Common","SOAP::Lite::COM":"SOAP-Lite","Spreadsheet::ParseExcel::Workbook":"Spreadsheet-ParseExcel","DBD::NullP::dr":"DBI","CPAN::Exception::yaml_process_error":"CPAN","Valiant::Util::Exception::MissingCountKey":"Valiant","IO::Socket::SSL::Trace":"IO-Socket-SSL","DBI::ProfileData":"DBI","Jifty::Plugin::Deflater":"Jifty","Net::LDAP::Constant":"perl-ldap","Dpkg::Control::Hash":"Dpkg","Dancer2::Logger::Null":"Dancer2","App::Response":"App-Context","bytes":"perl","Apache::Session::Browseable::MySQL":"Apache-Session-Browseable","Apache::Session::Browseable::Store::Cassandra":"Apache-Session-Browseable","Dancer2::Session::Simple":"Dancer2","Image::ExifTool::SonyIDC":"Image-ExifTool","Tk::Scale":"Tk","Catalyst::Action::Deserialize::JSON":"Catalyst-Action-REST","Imager::Font::Truetype":"Imager","Tk::ColorEditor":"Tk","Dancer::Deprecation":"Dancer","ModPerl::Manifest":"mod_perl","DBD::ExampleP":"DBI","Dancer2::Core::Role::HasLocation":"Dancer2","Jifty::Plugin::Authentication::Password::Action::SendAccountConfirmation":"Jifty","Parallel::ForkManager":"Parallel-ForkManager","Plack::Handler":"Plack","Crypt::Cipher::RC6":"CryptX","UI::Dialog::Screen::Menu":"UI-Dialog","CGI::apacheSSI::LMOD":"CGI-apacheSSI","Mojolicious::Lite":"Mojolicious","Lemonldap::NG::Portal::Auth::WebID":"Lemonldap-NG-Portal","Crypt::Digest::Keccak224":"CryptX","MHonArc::CharEnt::ISO8859_9":"MHonArc","Devel::PatchPerl::Plugin::General":"App-perlall","Lemonldap::NG::Portal::Auth::Slave":"Lemonldap-NG-Portal","Lemonldap::NG::Portal::Auth::GitHub":"Lemonldap-NG-Portal","Crypt::PK::DSA":"CryptX","Crypt::CBC::PBKDF::randomiv":"Crypt-CBC","MojoMojo::Schema::Result::Content":"MojoMojo","Mail::Field":"MailTools","Crypt::Perl::ECDSA::EC::DB":"Crypt-Perl","MHonArc::CharEnt::CP950":"MHonArc","LWP::UserAgent":"libwww-perl","App::ResourceLocker":"App-Context","Net::Server::PreFork":"Net-Server","Net::DNS::RR::MB":"Net-DNS","Apache::ASP::Application":"Apache-ASP","Tk::WinPhoto":"Tk","Apache::Include":"mod_perl","MHonArc::CharEnt::ISO8859_3":"MHonArc","XML::Atom::Namespace":"XML-Atom","Apache2::FunctionTable":"mod_perl","Crypt::Perl::PKCS10::ASN1":"Crypt-Perl","GPIB::rmt":"GPIB","MojoMojo::Formatter::Text":"MojoMojo","ExtUtils::MM_QNX":"ExtUtils-MakeMaker","XAO::DO::Web::CgiParam":"XAO-Web","Dezi::Config":"Dezi","Catalyst::Action::Serialize::JSON::XS":"Catalyst-Action-REST","Apache2::Access":"mod_perl","PAR":"PAR","Spoon::Base":"Spoon","IPC::Run":"IPC-Run","Lemonldap::NG::Portal::Auth::LinkedIn":"Lemonldap-NG-Portal","Lemonldap::NG::Portal::Plugins::CrowdSec":"Lemonldap-NG-Portal","Apache::httpd_conf":"mod_perl","Bio::DB::Tagger::Iterator":"GBrowse","Apache::SIG":"mod_perl","Apache::Session::Browseable::Store::Postgres":"Apache-Session-Browseable","Lemonldap::NG::Portal::Password::REST":"Lemonldap-NG-Portal","Kelp::Less":"Kelp","yaml_sequence":"YAML","Imager::Test":"Imager","Jifty::Plugin::I18N":"Jifty","Lemonldap::NG::Portal::Lib::Notifications::JSON":"Lemonldap-NG-Portal","Config::Model::SimpleUI":"Config-Model","App::CallDispatcher":"App-Context","Jifty::Plugin::AdminUI":"Jifty","CGI::Application::Plugin::CAPTCHA":"CGI-Application-Plugin-CAPTCHA","Lemonldap::NG::Portal::Plugins::Impersonation":"Lemonldap-NG-Portal","File::stat":"perl","Spreadsheet::ParseExcel::Format":"Spreadsheet-ParseExcel","Lemonldap::NG::Portal::UserDB::REST":"Lemonldap-NG-Portal","IO::Compress::Base::Common":"IO-Compress","Dpkg::OpenPGP::ErrorCodes":"Dpkg","Apache::Wyrd::View":"Apache-Wyrd","Plack::TempBuffer::Auto":"Plack","Crypt::KeyDerivation":"CryptX","Spoon::Headers":"Spoon","Valiant::HTML::Util::Pager":"Valiant","Lemonldap::NG::Portal::2F::Register::WebAuthn":"Lemonldap-NG-Portal","MHonArc::UTF8::KOI8_B":"MHonArc","Dancer::Logger::Abstract":"Dancer","POE::Filter::IRC":"POE-Component-IRC","Config::Model::Exception":"Config-Model","Jifty::Web::Form::Field::Text":"Jifty","Apache::File":"mod_perl","Mojolicious::Command::Author::cpanify":"Mojolicious","Apache::MP3::L10N::ko":"Apache-MP3","IO::Compress::Zip::Constants":"IO-Compress","PAR::Filter::Obfuscate":"PAR-Packer","Jifty::Plugin::I18N::Action::SetLang":"Jifty","OS2::DLL::dll":"perl","Apache::MP3::L10N::ga":"Apache-MP3","PApp::XSLT::LibXSLT":"PApp","CPAN::Bundle":"CPAN","Perlbal::Plugin::Include":"Perlbal","XAO::DO::Web::Condition":"XAO-Web","Lemonldap::NG::Portal::2F::Register::U2F":"Lemonldap-NG-Portal","Lemonldap::NG::Portal::Lib::OpenID::SREG":"Lemonldap-NG-Portal","Apache::Wyrd::Redirect":"Apache-Wyrd","Mozilla::CA":"Mozilla-CA","XML::Atom::Util":"XML-Atom","PApp::User":"PApp","Mojo::Content::MultiPart":"Mojolicious","Jifty::DBI::Filter::Storable":"Jifty-DBI","PAR::Filter::PatchContent":"PAR-Packer","Net::DNS::RR::ISDN":"Net-DNS","HTTP::Body::UrlEncoded":"HTTP-Body","Pinto::Action::Default":"Pinto","RPC::XML::Parser::XMLParser":"RPC-XML","MHonArc::CharEnt::ISO8859_11":"MHonArc","Imager::Matrix2d":"Imager","Jifty::CAS::Store::LocalFile":"Jifty","Jifty::Plugin::TestServerWarnings::View":"Jifty","Perlbal::Plugin::Vhosts":"Perlbal","Valiant::Translation":"Valiant","File::GlobMapper":"IO-Compress","Plack":"Plack","Jifty::View::Mason::Handler":"Jifty","YAML::Marshall":"YAML","Catalyst::Action::REST":"Catalyst-Action-REST","Image::ExifTool::Other":"Image-ExifTool","File::Spec::OS2":"PathTools","File::Find":"perl","Pinto::Manual::QuickStart":"Pinto","Graphics::ColorNames":"Graphics-ColorNames","Dancer::Serializer::Dumper":"Dancer","SOAP::Schema::WSDL":"SOAP-Lite","Perlbal::Plugin::LazyCDN":"Perlbal","MHonArc::CharEnt::VISCII":"MHonArc","Apache::ASP::Server":"Apache-ASP","Jifty::CAS::Store":"Jifty","Pinto":"Pinto","Tk::Stdio":"PAR","Apache::Wyrd::Number":"Apache-Wyrd","Net::LDAP::Message":"perl-ldap","utf8":"perl","MHonArc::UTF8::ISO8859_5":"MHonArc","Pinto::Action::Statistics":"Pinto","Apache::Wyrd::Datum::Set":"Apache-Wyrd","POE::Component::IRC::Plugin::Proxy":"POE-Component-IRC","Jifty::Util":"Jifty","Lemonldap::NG::Portal::Plugins::AuthOidcPkce":"Lemonldap-NG-Portal","Tk::Tiler":"Tk","Plack::Middleware::LighttpdScriptNameFix":"Plack","My::PersistentIterator":"SOAP-Lite","XML::LibXML::ErrNo":"XML-LibXML","XML::Atom::Server":"XML-Atom","Valiant::Util::Exception":"Valiant","Tk::Pretty":"Tk","Crypt::JWT":"Crypt-JWT","Apache::MP3::L10N::Aliases":"Apache-MP3","Valiant::Util::Exception::Strict":"Valiant","Jifty::Web::Session::ApacheSession":"Jifty","Crypt::Digest::CHAES":"CryptX","LWP::Protocol::http":"libwww-perl","Config::Model::Value":"Config-Model","Crypt::Cipher::SAFER_SK64":"CryptX","prior_to_test":"PAR","Valiant::HTML::Util::FormTags":"Valiant","Net::DNS::Mailbox":"Net-DNS","Apache::Wyrd::Interfaces::Columnize":"Apache-Wyrd","GitLab::API::v4::Config":"GitLab-API-v4","Tk::DummyEncode::iso8859_1":"Tk","XML::LibXML::Devel":"XML-LibXML","Net::DNS::RR::OPT::PADDING":"Net-DNS","DBM_Filter::utf8":"perl","Bio::DB::GFF::Aggregator::wormbase_gene":"GBrowse","Elive::Entity::Role":"Elive","PApp::SCGI::Worker":"PApp","MHonArc::CharEnt::CP1255":"MHonArc","Bio::Graphics::Browser2::CachedTrack":"GBrowse","Apache::ASP::STDERR":"Apache-ASP","Crypt::Perl::X::Base":"Crypt-Perl","MHonArc::Encode":"MHonArc","Jifty::Script::FastCGI":"Jifty","Apache::Wyrd::Site::Pull":"Apache-Wyrd","Jifty::Plugin::Authentication::Password::Dispatcher":"Jifty","CGI::Session::PostgreSQL":"CGI-Session","Batch::Batchrun::Extract":"Batch-Batchrun","Dpkg::Source::Package::V3::Native":"Dpkg","Pinto::Action::List":"Pinto","Kelp::Module::Routes":"Kelp","MojoMojo::Formatter::GoogleSearch":"MojoMojo","APR::Finfo":"mod_perl","Bio::Graphics::Browser2::DataBase":"GBrowse","PApp::CGI::Request":"PApp","MHonArc::CharEnt::AppleCroatian":"MHonArc","CGI::Simple::Util":"CGI-Simple","Zonemaster::Backend::DB::SQLite":"Zonemaster-Backend","Valiant::HTML::FormBuilder":"Valiant","MHonArc::RFC822":"MHonArc","Mail::Audit":"Mail-Audit","Net::Server::Single":"Net-Server","Apache::MP3::L10N::RightToLeft":"Apache-MP3","MHonArc::CharEnt::BIG5_HKSCS":"MHonArc","Catalyst::Action::Serialize::XML::Simple":"Catalyst-Action-REST","POE::Component::IRC::Plugin":"POE-Component-IRC","Tie::Scalar":"perl","Jifty::DBI::Filter::Duration":"Jifty-DBI","HTML::Editor":"MySQL-Admin","Valiant::Validator::Array":"Valiant","LWP::Protocol::ldap":"perl-ldap","Mojolicious::Plugins":"Mojolicious","Mojo::Template":"Mojolicious","Encode::CN::HZ":"Encode","SOAP::Server":"SOAP-Lite","Config::Model::Backend::PlainFile":"Config-Model","CGI::apacheSSI::Local":"CGI-apacheSSI","DBIx::Class::Valiant::ResultSet":"Valiant","App::Serializer::Storable":"App-Context","Net::DNS::RR::X25":"Net-DNS","MojoMojo::Schema::ResultSet::Person":"MojoMojo","Catalyst::Action::Deserialize::View":"Catalyst-Action-REST","Moxy::Plugin::ResponseTime":"Moxy","PApp::Preprocessor":"PApp","Net::Dropbear::SSHd":"Net-Dropbear","Image::ExifTool::JPEG":"Image-ExifTool","Dancer2::Core::Route":"Dancer2","Jifty::Plugin::Authentication::Password::Action::ResendConfirmation":"Jifty","MIME::Entity":"MIME-tools","Zonemaster::Backend::DB::PostgreSQL":"Zonemaster-Backend","Pod::Perldoc::ToTk":"Pod-Perldoc","Image::ExifTool::Reconyx":"Image-ExifTool","LWP":"libwww-perl","App::Packer::Temp":"PAR","POE::Component::IRC::Qnet::State":"POE-Component-IRC","Jifty::Web::Form::Field::Time":"Jifty","Zonemaster::Backend::Translator":"Zonemaster-Backend","Crypt::Digest::SHA512_256":"CryptX","Config::Model::Exception::ConfigFile":"Config-Model","Lemonldap::NG::Portal::Main":"Lemonldap-NG-Portal","IPC::Run::Win32IO":"IPC-Run","Dpkg::Arch":"Dpkg","Catalyst::Action::Deserialize":"Catalyst-Action-REST","ExtUtils::Mksymlists":"ExtUtils-MakeMaker","Image::ExifTool::DarwinCore":"Image-ExifTool","XML::Atom::Thing":"XML-Atom","Tk::Mwm":"Tk","ExtUtils::MM":"ExtUtils-MakeMaker","Plack::Server::Standalone::Prefork":"Plack","Encode::KR::2022_KR":"Encode","Crypt::Cipher::Blowfish":"CryptX","DBIx::Custom::Model":"DBIx-Custom","MM":"ExtUtils-MakeMaker","MojoMojo::Schema::Result::RolePrivilege":"MojoMojo","less":"perl","DBIx::Custom::Where":"DBIx-Custom","Catalyst::Action::Serialize::Callback":"Catalyst-Action-REST","Alien::PCRE2":"Alien-PCRE2","Lemonldap::NG::Portal::UserDB::CAS":"Lemonldap-NG-Portal","FileSlurp_12":"File-Slurp","Pod::Perldoc::BaseTo":"Pod-Perldoc","t::BHK":"perl","App::Pinto::Command::statistics":"Pinto","Crypt::Digest::Keccak384":"CryptX","App::Pinto::Command::new":"Pinto","DBD::File::Table":"DBI","Mojolicious::Command::test":"Mojolicious","SimpleObjectClass":"CGI-Session","XAO::DO::Web::Redirect":"XAO-Web","ojo":"Mojolicious","Email::MIME::Creator":"Email-MIME","Apache::Session::Browseable::Store::Redis":"Apache-Session-Browseable","Encode::Symbol":"Encode","HTML::EP::Session::Cookie":"HTML-EP","Net::DNS::RR::CNAME":"Net-DNS","Catalyst::Action::Serialize":"Catalyst-Action-REST","Plack::Test::Server":"Plack","Image::Info::XPM":"Image-Info","Dpkg::Source::Archive":"Dpkg","Net::DNS::RR::PX":"Net-DNS","Net::LDAP::Control::EntryChange":"perl-ldap","HTML::Perlinfo::_version":"HTML-Perlinfo","XS::APItest":"perl","Mojolicious::Validator":"Mojolicious","Bio::Graphics::Browser2::DataLoader::useq":"GBrowse","Apache::Wyrd::Input::URLInput":"Apache-Wyrd","DBD::mysql::GetInfo":"DBD-mysql","ModPerl::CScan":"mod_perl","Net::DNS::RR::SSHFP":"Net-DNS","Dancer::Continuation::Route::Forwarded":"Dancer","Bio::Graphics::Browser2::AuthorizedFeatureFile":"GBrowse","Apache::Wyrd::Attribute":"Apache-Wyrd","My::PingPong":"SOAP-Lite","Lemonldap::NG::Portal::Lib::SMTP":"Lemonldap-NG-Portal","App::Serializer::Yaml":"App-Context","Bio::Graphics::Browser2::Render::Slave":"GBrowse","HTML::EP::Session::DBIq":"HTML-EP","Jifty::Everything":"Jifty","OS2::PrfDB":"perl","DBD::Gofer::st":"DBI","MojoMojo::Controller::Jsrpc":"MojoMojo","ModPerl::Config":"mod_perl","XML::Twig":"XML-Twig","Tk::Optionmenu":"Tk","Lemonldap::NG::Portal::Issuer::SAML":"Lemonldap-NG-Portal","of":"perl","Dancer2::Core::App":"Dancer2","Net::DNS::RR::OPT::CHAIN":"Net-DNS","Dpkg::Deps::AND":"Dpkg","Pinto::Statistics":"Pinto","Apache::src":"mod_perl","Image::Info::PNG":"Image-Info","Image::ExifTool::MPC":"Image-ExifTool","Pinto::Locker":"Pinto","IO::Socket::SSL::SSL_HANDLE":"IO-Socket-SSL","Tk::DirTree":"Tk","Net::DNS::Resolver::os2":"Net-DNS","Archive::Zip::FileMember":"Archive-Zip","Archive::Zip::Archive":"Archive-Zip","Valiant::Validator":"Valiant","Crypt::Perl::ECDSA::EncodedPoint":"Crypt-Perl","Imager::File::CUR":"Imager","Mysql::dr":"DBD-mysql","DBD::mysqlPP::dr":"DBD-mysqlPP","Lemonldap::NG::Portal::Issuer::CAS":"Lemonldap-NG-Portal","CGI::apacheSSI":"CGI-apacheSSI","Image::ExifTool::ZIP":"Image-ExifTool","POE::Component::IRC::Plugin::Logger":"POE-Component-IRC","Catalyst::DispatchType":"Catalyst-Runtime","MHonArc::UTF8::Encode":"MHonArc","MHonArc::CharEnt::CP949":"MHonArc","MDK::Common::DataStructure":"MDK-Common","Tk::Menu::Radiobutton":"Tk","Jifty::Web":"Jifty","UI::Dialog":"UI-Dialog","Lemonldap::NG::Portal::Issuer::Get":"Lemonldap-NG-Portal","Dancer2::Plugin":"Dancer2","MojoMojo::Formatter::Defang":"MojoMojo","Dancer2::Core::Session":"Dancer2","Catalyst::Engine::FastCGI":"Catalyst-Runtime","Tk::X":"Tk","Tk::DragDrop::Rect":"Tk","XML::LibXML::_SAXParser":"XML-LibXML","Perlbal::ReproxyManager":"Perlbal","Mojolicious::Plugin::OAuth2::Mock":"Mojolicious-Plugin-OAuth2","Crypt::Perl::PKCS10::Attributes":"Crypt-Perl","Pinto::Server::Responder::Action":"Pinto","Valiant::Util":"Valiant","Spreadsheet::ParseExcel":"Spreadsheet-ParseExcel","Net::DNS::Question":"Net-DNS","MojoMojo::Schema::Result::Tag":"MojoMojo","Tk::Radiobutton":"Tk","Jifty::Plugin::Authentication::Password::Action::GeneratePasswordToken":"Jifty","Crypt::Perl::Ed25519::KeyBase":"Crypt-Perl","Net::DNS::DomainName1035":"Net-DNS","CPAN::DeferredCode":"CPAN","Dancer::Cookies":"Dancer","MHonArc::UTF8::AppleArabic":"MHonArc","Mojo::BaseUtil":"Mojolicious","Dpkg::OpenPGP::Backend":"Dpkg","Spoon::DataObject":"Spoon","RPC::XML::ParserFactory":"RPC-XML","Config::Model::ObjTreeScanner":"Config-Model","Dpkg::OpenPGP::KeyHandle":"Dpkg","Mail::Mailer::smtp":"MailTools","Mojolicious::Command::routes":"Mojolicious","Imager::Fill":"Imager","Image::ExifTool::AIFF":"Image-ExifTool","HTTP::Message::PSGI":"Plack","Config::Model::WarpedNode":"Config-Model","Dancer::Template::Abstract":"Dancer","Net::DNS::RR::SRV":"Net-DNS","Tk::ROText":"Tk","Jifty::Script::App":"Jifty","Jifty::Plugin::RequestInspector::Model::Request":"Jifty","Image::ExifTool::Olympus":"Image-ExifTool","Dpkg::BuildTypes":"Dpkg","Pinto::Action::Rename":"Pinto","Config::Model::Warper":"Config-Model","Image::ExifTool::Jpeg2000":"Image-ExifTool","ExtUtils::Mkbootstrap":"ExtUtils-MakeMaker","Tk::Message":"Tk","Apache::PerlRun":"mod_perl","Mojolicious::Command::Author::inflate":"Mojolicious","App::Pinto::Command::unregister":"Pinto","DBI::SQL::Nano::Statement_":"DBI","Apache::Wyrd::Form::Template":"Apache-Wyrd","My::SessionIterator":"SOAP-Lite","App::Session::Cookie":"App-Context","Apache2::PerlSections::Dump":"mod_perl","Dancer::Plugin":"Dancer","DBIx::Custom::Mapper":"DBIx-Custom","HTML::EP::EditTable":"HTML-EP","MHonArc::UTF8::ISO8859_16":"MHonArc","Crypt::Digest::SHA3_512":"CryptX","Jifty::DBI::Filter":"Jifty-DBI","Apache::Wyrd::Datum::Char":"Apache-Wyrd","Catalyst::Response":"Catalyst-Runtime","Mysql::db":"DBD-mysql","ModPerl::FunctionTable":"mod_perl","MojoMojo::Schema::Base::ResultSet":"MojoMojo","Elive::Entity::ServerParameters":"Elive","Bio::Graphics::Browser2::TrackDumper":"GBrowse","Lemonldap::NG::Portal::2F::Mail2F":"Lemonldap-NG-Portal","MojoMojo::Schema::Result::WantedPage":"MojoMojo","MHonArc::UTF8::ISO8859_7":"MHonArc","Net::Server::PreForkSimple":"Net-Server","Jifty::Plugin::Authentication::Password::Notification::ConfirmLostPassword":"Jifty","Config::Model":"Config-Model","DBIx::Custom::Util":"DBIx-Custom","HTML::StripScripts":"HTML-StripScripts","File::Copy":"perl","Apache::Wyrd::Datum::Integer":"Apache-Wyrd","XML::Twig::XPath::Elt":"XML-Twig","DBI::Const::GetInfoReturn":"DBI","Archive::Zip::ZipFileMember":"Archive-Zip","SOAP::XMLSchema2001::Deserializer":"SOAP-Lite","Pinto::RevisionWalker":"Pinto","Jifty::Continuation":"Jifty","HTML::Perlinfo::Loaded":"HTML-Perlinfo","Dancer::Cookie":"Dancer","Zlib::OldInflate":"IO-Compress","App::Pinto::Command":"Pinto","Tk::DragDrop::Common":"Tk","Net::LDAP::Control::NoOp":"perl-ldap","Mojolicious::Command::daemon":"Mojolicious","Tie::StdArray":"perl","PApp::SCGI":"PApp","CGI::Session::Serialize::storable":"CGI-Session","DBD::File::DataSource::File":"DBI","Apache::Wyrd::Interfaces::Indexable":"Apache-Wyrd","MHonArc::UTF8::HP_ROMAN8":"MHonArc","DirHandle":"perl","blib":"perl","ModPerl::RegistryPrefork":"mod_perl","App::Context::POE::ClusterNode":"App-Context","Lemonldap::NG::Portal::Plugins::StayConnected":"Lemonldap-NG-Portal","SOAP::Transport::IO::Server":"SOAP-Lite","Jifty::DBI":"Jifty-DBI","Pod::Perldoc::ToTerm":"Pod-Perldoc","Catalyst::Script::Server":"Catalyst-Runtime","Image::ExifTool::PLIST":"Image-ExifTool","Tk::Wm":"Tk","Catalyst::Exception::Basic":"Catalyst-Runtime","OS2::REXX":"perl","Image::ExifTool::Lang::zh_cn":"Image-ExifTool","Mojolicious::Plugin::JSONConfig":"Mojolicious","Dpkg::BuildDriver":"Dpkg","PApp::CGI::Connection":"PApp","DBD::Sponge":"DBI","Net::LDAP::Util":"perl-ldap","Dancer2::Core::Request::Upload":"Dancer2","HTML::EP::Examples::Glimpse":"HTML-EP","POE::Component::IRC::Common":"POE-Component-IRC","Spoon::ContentObject":"Spoon","Image::Info::BMP":"Image-Info","Crypt::DSA::Key":"Crypt-DSA","Crypt::Perl::ECDSA::Parse":"Crypt-Perl","Apache::MP3::L10N::nn":"Apache-MP3","Moxy::Plugin::StripScripts":"Moxy","Tk::DragDrop::SunConst":"Tk","Image::ExifTool::PhotoMechanic":"Image-ExifTool","HTTP::Daemon::ClientConn":"HTTP-Daemon","Perlbal::Plugin::FlvStreaming":"Perlbal","Mojolicious::Plugin::Config":"Mojolicious","Pinto::Target":"Pinto","LWP::Debug":"libwww-perl","Plack::Handler::Apache2::Registry":"Plack","Dpkg::Shlibs::Cppfilt":"Dpkg","Legacy::Graphics::BrowserConfig":"GBrowse","Apache::MP3::L10N::es":"Apache-MP3","Crypt::Perl::X509::InfoAccessBase":"Crypt-Perl","MHonArc::CharEnt::ISO8859_13":"MHonArc","Encode::XS":"Encode","Apache::Wyrd::Services::SAK":"Apache-Wyrd","Tk::MMutil":"Tk","Config::Model::Exception::Fatal":"Config-Model","MHonArc::UTF8::AppleRomanian":"MHonArc","Net::LDAP::Filter":"perl-ldap","Jifty::Plugin::Compat":"Jifty","PApp::CGI":"PApp","Bio::DB::Tagger":"GBrowse","GPIB::ni":"GPIB","Dancer::SharedData":"Dancer","Crypt::Perl::ECDSA::KeyBase":"Crypt-Perl","Jifty::Web::Form::Element":"Jifty","Jifty::Plugin::PubSub::Connection":"Jifty","Dpkg::Control::HashCore":"Dpkg","JPL::AutoLoader":"perl","Image::ExifTool::ICO":"Image-ExifTool","App::Context::POE::Server":"App-Context","Zonemaster::Backend::Error::Internal":"Zonemaster-Backend","Net::DNS::RR::OPT::DHU":"Net-DNS","Apache::Constants::Exports":"mod_perl","DBD::SQLite::VirtualTable":"DBD-SQLite","testcases::requires":"XAO-Web","IO::Compress::Gzip":"IO-Compress","Jifty::Web::Form::Field::OrderedList":"Jifty","filetest":"perl","Encode::CJKConstants":"Encode","POE::Component::IRC::Qnet":"POE-Component-IRC","Dancer2::Core::DSL":"Dancer2","Filesys::SmbClientParser":"Filesys-SmbClientParser","Catalyst::Action::REST::ForBrowsers":"Catalyst-Action-REST","CGI::Session::Driver::postgresql":"CGI-Session","Plack::Test":"Plack","Net::LDAP::Schema":"perl-ldap","Agni":"PApp","Crypt::Cipher::SAFER_K64":"CryptX","Image::ExifTool::DICOM":"Image-ExifTool","Catalyst::Action::Deserialize::YAML":"Catalyst-Action-REST","Module::Provision::Base":"Module-Provision","Crypt::Perl::RSA::PKCS1_v1_5":"Crypt-Perl","Galileo::File":"Galileo","Dancer2::Test":"Dancer2","Dpkg::BuildProfiles":"Dpkg","Apache::MP3::L10N::no":"Apache-MP3","Dancer2::Logger::Note":"Dancer2","Apache::Session::Browseable::Oracle":"Apache-Session-Browseable","Jifty::API":"Jifty","App::Pinto::Command::kill":"Pinto","Image::ExifTool::EXE":"Image-ExifTool","Apache2::HookRun":"mod_perl","Dpkg::Source::BinaryFiles":"Dpkg","Net::SNMP":"Net-SNMP","Catalyst::DispatchType::Default":"Catalyst-Runtime","Image::ExifTool::Rawzor":"Image-ExifTool","Crypt::Perl::PKCS10":"Crypt-Perl","Net::DNS::RR::ZONEMD":"Net-DNS","Dpkg::Shlibs::Objdump::Object":"Dpkg","Config::Model::DeprecatedHandle":"Config-Model","Net::DNS::RR::CERT":"Net-DNS","SOAP::Transport::HTTP::Daemon::ForkOnAccept":"SOAP-Lite","Catalyst::Model":"Catalyst-Runtime","Catalyst::Action::Deserialize::XML::Simple":"Catalyst-Action-REST","PAR::Filter::Bytecode":"PAR-Packer","Spreadsheet::ParseXLSX::Decryptor::Standard":"Spreadsheet-ParseXLSX","Lemonldap::NG::Portal::CertificateResetByMail::Custom":"Lemonldap-NG-Portal","Thread::Specific":"perl","Search::OpenSearch::Server::Catalyst":"Search-OpenSearch-Server","MHonArc::CharEnt::AppleArabic":"MHonArc","Kelp::Middleware":"Kelp","Apache2::ServerUtil":"mod_perl","MIME::Parser":"MIME-tools","ModPerl::FunctionMap":"mod_perl","LWP::Protocol::data":"libwww-perl","CPAN::Distroprefs::Result::Error":"CPAN","DBI::SQL::Nano":"DBI","Axis":"perl","Apache::Wyrd::Lookup":"Apache-Wyrd","UI::Dialog::Console":"UI-Dialog","XML::LibXML::Document":"XML-LibXML","Dpkg::Source::Package::V3::Custom":"Dpkg","Bio::Graphics::Browser2::DataLoader":"GBrowse","SSL_SSL":"IO-Socket-SSL","Dancer::Route":"Dancer","Dpkg::BuildInfo":"Dpkg","Jifty::Plugin::TestServerWarnings::Appender":"Jifty","Config::Model::Exception::ConfigFile::Missing":"Config-Model","HTML::EP::Examples::POP3Client":"HTML-EP","App::Service":"App-Context","Config::Model::Backend::Fstab":"Config-Model","Tk::ProgressBar":"Tk","OS2::PrfDB::Hini":"perl","Catalyst::Action::Deserialize::JSON::XS":"Catalyst-Action-REST","Jifty::Plugin::SinglePage::Dispatcher":"Jifty","Apache::MP3::L10N::x_marklar":"Apache-MP3","Crypt::Perl::X509::Extension::subjectInfoAccess":"Crypt-Perl","Tk::MMtry":"Tk","App::Pinto::Command::init":"Pinto","Crypt::Digest::SHA512":"CryptX","Apache::MP3::L10N::he":"Apache-MP3","HTML::EP::Tokens":"HTML-EP","I18N::LangTags::Detect":"perl","ExtUtils::MM_Cygwin":"ExtUtils-MakeMaker","Apache::MP3::L10N::cs":"Apache-MP3","Mojo::Asset::Memory":"Mojolicious","Image::ExifTool::TagLookup":"Image-ExifTool","Net::LDAP::Extra::eDirectory":"perl-ldap","Jifty::Web::Form":"Jifty","Imager::Preprocess":"Imager","Dancer::Handler::Debug":"Dancer","Image::ExifTool::ICC_Profile":"Image-ExifTool","Jifty::DBI::Record":"Jifty-DBI","Crypt::Cipher::RC5":"CryptX","ops":"perl","Dpkg::Conf":"Dpkg","Apache::Wyrd::Bot":"Apache-Wyrd","Plack::Session::Store::Cache":"Plack-Middleware-Session","Pod::Perldoc::ToMan":"Pod-Perldoc","HTTP::Tiny::NoProxy":"Dancer","Mail::Mailer::smtps":"MailTools","Dancer::Serializer::YAML":"Dancer","Apache::Wyrd::FileSize":"Apache-Wyrd","Apache::Symbol":"mod_perl","Elive::Entity::ServerDetails":"Elive","Dancer::Continuation::Route::FileSent":"Dancer","Dancer::Session::Abstract":"Dancer","Catalyst::Exception":"Catalyst-Runtime","RPC::XML::Function":"RPC-XML","MHonArc::CharEnt::CP1252":"MHonArc","Tk::Configure":"Tk","Locale::Maketext::GutsLoader":"Locale-Maketext","Pinto::Types":"Pinto","Jifty::Plugin::PubSub":"Jifty","Net::Server::Proto::UNIX":"Net-Server","MHonArc::UTF8::KOI8_R":"MHonArc","CPAN::Eval":"CPAN","IO::Socket::SSL::PublicSuffix":"IO-Socket-SSL","Fake::Our":"Fake-Our","Mojo::JSON::Pointer":"Mojolicious","Crypt::Perl::ECDSA::Deterministic":"Crypt-Perl","Perlbal::Service":"Perlbal","Imager::Font::Wrap":"Imager","Net::DNS::Packet":"Net-DNS","Jifty::DBI::Collection::Union":"Jifty-DBI","Image::Info::GIF":"Image-Info","Apache::Registry":"mod_perl","HTML::Perlinfo::General":"HTML-Perlinfo","Spreadsheet::ParseExcel::SaveParser::Worksheet":"Spreadsheet-ParseExcel","ModPerl::MethodLookup":"mod_perl","Dpkg::Control::Types":"Dpkg","Dpkg::Index":"Dpkg","Log::Any::Adapter::File":"Log-Any","Mojolicious::Command::psgi":"Mojolicious","SelectSaver":"perl","MHonArc::UTF8::CP1250":"MHonArc","Dpkg::BuildAPI":"Dpkg","Net::Server::Log::Sys::Syslog":"Net-Server","Tk::Adjuster":"Tk","Dancer::Factory::Hook":"Dancer","testcases::base":"XAO-Web","Galileo::Admin":"Galileo","Lemonldap::NG::Portal::Password::Demo":"Lemonldap-NG-Portal","Tk::Derived":"Tk","Catalyst::Utils":"Catalyst-Runtime","Lemonldap::NG::Portal::Lib::OpenIDConnect":"Lemonldap-NG-Portal","ExtUtils::MM_VMS":"ExtUtils-MakeMaker","File::DosGlob":"perl","Dpkg::Source::Format":"Dpkg","RPC::XML::Procedure":"RPC-XML","Bio::Graphics::Browser2::DataLoader::sam":"GBrowse","Jifty::JSON":"Jifty","Net::DNS::DomainName":"Net-DNS","DBD::Gofer::Policy::pedantic":"DBI","Crypt::Mac::PMAC":"CryptX","App::Github::Email":"App-Github-Email","Bio::Graphics::Browser2::UserDB":"GBrowse","Image::ExifTool::PrintIM":"Image-ExifTool","DBD::SQLite::VirtualTable::PerlData::Cursor":"DBD-SQLite","POE::Component::IRC::Plugin::FollowTail":"POE-Component-IRC","Catalyst::Action::Serialize::YAML::HTML":"Catalyst-Action-REST","CPAN::Exception::blocked_urllist":"CPAN","Lemonldap::NG::Portal::Plugins::GrantSession":"Lemonldap-NG-Portal","File::DataClass::Storage::Any":"File-DataClass","Plack::App::CGIBin":"Plack","App::Pinto::Command::reset":"Pinto","Image::ExifTool::Torrent":"Image-ExifTool","DBD::File::TableSource::FileSystem":"DBI","Plack::Server::Standalone":"Plack","Data::FormValidator::Constraints::Dates":"Data-FormValidator","Jifty::Plugin::User::Mixin::Model::User":"Jifty","Mail::Audit::KillDups":"Mail-Audit","Tk::Listbox":"Tk","YAML::Type::undef":"YAML","DBI::Const::GetInfo::ANSI":"DBI","Valiant::Filter":"Valiant","Net::DNS::RR::SMIMEA":"Net-DNS","DBM_Filter::encode":"perl","Dpkg::Compression":"Dpkg","Plack::Middleware::SimpleLogger":"Plack","Net::LDAP::ASN":"perl-ldap","LWP::Protocol::mailto":"libwww-perl","Net::Server::TiedHandle":"Net-Server","Log::Any::Adapter::Core":"Log-Any","Plack::HTTPParser":"Plack","Valiant::Util::Ancestors":"Valiant","SOAP::Transport::TCP::Client":"SOAP-Lite","Lemonldap::NG::Portal::Auth::REST":"Lemonldap-NG-Portal","Net::LDAP::DSML::output":"perl-ldap","CGI::Application::Dispatch":"CGI-Application-Dispatch","MojoMojo::Schema::Result::Page":"MojoMojo","Tk::Checkbutton":"Tk","Mail::Mailer::smtp::pipe":"MailTools","IO::Socket::SSL::OCSP_Resolver":"IO-Socket-SSL","Jifty::Server::Fork::NetServer":"Jifty","Perlbal::Test::WebServer":"Perlbal","Jifty::Plugin::PubSub::Subscriptions":"Jifty","Config::Model::TreeSearcher":"Config-Model","Jifty::Plugin::IEFixes":"Jifty","Tk::JPEG":"Tk","POE::Filter::IRC::Compat":"POE-Component-IRC","Catalyst::Action::Serialize::View":"Catalyst-Action-REST","PApp":"PApp","Apache::PerlSections":"mod_perl","Spoon::Registry":"Spoon","IPC::Open2":"perl","Class::Struct::Tie_ISA":"perl","Net::LDAP::Control::PreRead":"perl-ldap","Apache2::Resource":"mod_perl","Net::LDAP::Extension::Cancel":"perl-ldap","Plack::Runner":"Plack","Lemonldap::NG::Portal::Lib::DBI":"Lemonldap-NG-Portal","Data::FormValidator::Results":"Data-FormValidator","MHonArc::UTF8::GB2312":"MHonArc","App::Serializer::TextArray":"App-Context","Pod::Simple::XHTML::LocalPodLinks":"perl","Archive::Tar::File":"Archive-Tar","DBI::DBD::SqlEngine::TieTables":"DBI","Lemonldap::NG::Portal::Plugins::Notifications":"Lemonldap-NG-Portal","CPAN::Exception::RecursiveDependency::na":"CPAN","Config::Model::Backend::CdsFile":"Config-Model","MojoMojo::Controller::Admin":"MojoMojo","MIME::Words":"MIME-tools","Bio::Graphics::Browser2::DataSource":"GBrowse","Data::FormValidator::ConstraintsFactory":"Data-FormValidator","Spreadsheet::ParseExcel::FmtUnicode":"Spreadsheet-ParseExcel","Valiant::Filter::ToArray":"Valiant","Valiant::Util::Exception::InvalidFilterArgs":"Valiant","Apache::MP3::L10N::sl":"Apache-MP3","Image::ExifTool::MISB":"Image-ExifTool","XAO::testcases::Web::base":"XAO-Web","CGI::Application::Plugin::AutoRunmode::FileDelegate":"CGI-Application-Plugin-AutoRunmode","Crypt::AuthEnc::GCM":"CryptX","Apache::Wyrd::Interfaces::Setter":"Apache-Wyrd","Apache2::ServerRec":"mod_perl","HTML::HeadParser":"HTML-Parser","Net::LDAP::Control::TreeDelete":"perl-ldap","Mojolicious::Command::cpanify":"Mojolicious","PApp::Application::Agni":"PApp","IO::Uncompress::Bunzip2":"IO-Compress","Net::LDAP::Control::SyncState":"perl-ldap","CPAN::Distroprefs::Result::Fatal":"CPAN","Image::ExifTool::Fixup":"Image-ExifTool","Crypt::Perl::X::ECDSA::NoCurveForName":"Crypt-Perl","Mojo::URL":"Mojolicious","Mojo::Upload":"Mojolicious","XML::LibXML::Namespace":"XML-LibXML","Net::LDAP::LDIF":"perl-ldap","APR::String":"mod_perl","Lemonldap::NG::Portal::Auth::AD":"Lemonldap-NG-Portal","Pinto::Action::Lock":"Pinto","Apache::RegistryLoader":"mod_perl","Pinto::Role::Transactional":"Pinto","IO::Compress::Zlib::Extra":"IO-Compress","Apache::MP3::L10N::nb_no":"Apache-MP3","DBIx::Class::Valiant::Result":"Valiant","Catalyst::Action::Serialize::JSON":"Catalyst-Action-REST","Jifty::DBI::Handle::SQLite":"Jifty-DBI","Plack::Handler::HTTP::Server::PSGI":"Plack","Apache::StatINC":"mod_perl","Perlbal::Plugin::Cgilike::Request":"Perlbal","Pinto::Server":"Pinto","Spoon::Formatter::Wafl":"Spoon","IO::Compress::Bzip2":"IO-Compress","Pinto::Role::UserAgent":"Pinto","Dancer2":"Dancer2","Pod::Perldoc::ToText":"Pod-Perldoc","Lemonldap::NG::Portal::2F::Register::Yubikey":"Lemonldap-NG-Portal","MDK::Common::File":"MDK-Common","Catalyst::ScriptRunner":"Catalyst-Runtime","Jifty::Upgrade":"Jifty","ExtUtils::MM_OS2":"ExtUtils-MakeMaker","Image::ExifTool::Matroska":"Image-ExifTool","Dezi::Server::About":"Dezi","File::DataClass::ResultSet":"File-DataClass","Moxy::Plugin::CookieCutter":"Moxy","DBD::Sponge::st":"DBI","SOAP::Lite::Deserializer::XMLSchemaSOAP1_1":"SOAP-Lite","Dancer2::Core::Request":"Dancer2","Image::ExifTool::Vorbis":"Image-ExifTool","Lemonldap::NG::Portal::Plugins::AdaptativeAuthenticationLevel":"Lemonldap-NG-Portal","MojoMojo::Formatter":"MojoMojo","XAO::PluginUtils":"XAO-Web","MHonArc::UTF8::BIG5_HKSCS":"MHonArc","Net::DNS::RR::LOC":"Net-DNS","DBD::ExampleP::db":"DBI","Net::LDAP::Message::Dummy":"perl-ldap","Imager::IO":"Imager","Crypt::Perl::X::ECDSA::CharacteristicTwoUnsupported":"Crypt-Perl","Net::SNMP::Transport::IPv6::UDP":"Net-SNMP","Opcode":"perl","GitLab::API::v4::RESTClient":"GitLab-API-v4","Image::ExifTool::PPM":"Image-ExifTool","Catalyst::Script::Create":"Catalyst-Runtime","MIME::Parser::Results":"MIME-tools","Jifty::Script::Action":"Jifty","App::cpanminus":"App-cpanminus","Dpkg::Version":"Dpkg","Spoon::Installer":"Spoon","DBD::SQLite":"DBD-SQLite","Bio::Graphics::Browser2::GFFhelper":"GBrowse","DBM_Filter::int32":"perl","Galileo::Command::setup":"Galileo","YAML::LibYAML":"YAML-LibYAML","XAO::DO::CGI":"XAO-Web","OS2::Process":"perl","RPC::XML::Method":"RPC-XML","XML::LibXML::Element":"XML-LibXML","Lemonldap::NG::Portal::Auth::Facebook":"Lemonldap-NG-Portal","CPAN::HandleConfig":"CPAN","Dpkg::Source::Package::V3::Git":"Dpkg","YAML::Dumper::Base":"YAML","Crypt::Perl::X509::Extension::authorityInfoAccess":"Crypt-Perl","DBD::Gofer::Policy::rush":"DBI","App::Exceptions":"App-Context","Lemonldap::NG::Portal::Main::Init":"Lemonldap-NG-Portal","SOAP::Data":"SOAP-Lite","Plack::Server":"Plack","LWP::Protocol":"libwww-perl","Apache2::compat":"mod_perl","DBD::Pg":"DBD-Pg","Mojo::IOLoop::TLS":"Mojolicious","Test::Simply":"Fake-Our","Dpkg::Changelog":"Dpkg","Dpkg::Gettext":"Dpkg","Net::DNS::RR::PTR":"Net-DNS","IO::Compress::Adapter::Bzip2":"IO-Compress","POE::Component::IRC::Plugin::CycleEmpty":"POE-Component-IRC","SOAP::XMLSchema1999::Serializer":"SOAP-Lite","Net::DNS::RR::NSEC3PARAM":"Net-DNS","Encode::JP::JIS7":"Encode","Perlbal::ClientManage":"Perlbal","Apache::ASP::CollectionItem":"Apache-ASP","CGI::apacheSSI::Gmt":"CGI-apacheSSI","Image::Info::XBM":"Image-Info","Config::Model::SearchElement":"Config-Model","Data::FormValidator":"Data-FormValidator","APR::PerlIO":"mod_perl","Net::Server":"Net-Server","Test::Dpkg":"Dpkg","ExtUtils::MakeMaker::version":"ExtUtils-MakeMaker","Crypt::DSA::Key::SSH2":"Crypt-DSA","Jifty::Test::WWW::WebDriver":"Jifty","Dancer::Hook::Properties":"Dancer","App::Pinto::Command::diff":"Pinto","DBI::DBD::SqlEngine::DataSource":"DBI","CPAN::Distroprefs::Result":"CPAN","Image::ExifTool::Lang::sv":"Image-ExifTool","Crypt::PK":"CryptX","ExtUtils::MakeMaker::Config":"ExtUtils-MakeMaker","Image::ExifTool::AFCP":"Image-ExifTool","PAR::Filter::Bleach":"PAR-Packer","Config::Model::Backend::IniFile":"Config-Model","Valiant::HTML::FormBuilder::RadioButton":"Valiant","LWP::Protocol::ldapi":"perl-ldap","MHonArc::UTF8::ISO8859_2":"MHonArc","Catalyst::ActionChain":"Catalyst-Runtime","XAO::DO::Web::TextTable":"XAO-Web","Net::DNS::RR::NSEC":"Net-DNS","Lemonldap::NG::Portal::Lib::CustomModule":"Lemonldap-NG-Portal","Elive::Entity::Meeting":"Elive","YAML::XS::LibYAML":"YAML-LibYAML","Net::servent":"perl","Elive::DAO":"Elive","Moxy::Plugin::HTTPHeader":"Moxy","Imager::Test::OverUtf8":"Imager","FakeHomol":"GBrowse","MIME::Decoder::Base64":"MIME-tools","Jifty::DBI::Handle::Oracle":"Jifty-DBI","Image::ExifTool::GPS":"Image-ExifTool","Catalyst::ActionRole::Scheme":"Catalyst-Runtime","APR::Request::Error":"libapreq2","Tk::Panedwindow":"Tk","re":"perl","Jifty::Plugin::REST::Dispatcher":"Jifty","ExtUtils::Miniperl":"perl","XML::LibXML::SAX":"XML-LibXML","XAO::Web":"XAO-Web","MojoMojo::Formatter::File::Text":"MojoMojo","Jifty::Plugin::SetupWizard::Action::TestDatabaseConnectivity":"Jifty","Elive::Entity::Participants":"Elive","Crypt::Stream::Sosemanuk":"CryptX","Dezi::Server":"Dezi","Net::DNS::RR::TLSA":"Net-DNS","MHonArc::CharEnt::ISO8859_4":"MHonArc","Tk::PNG":"Tk","Jifty::I18N":"Jifty","File::Spec::Unix":"PathTools","Catalyst::Middleware::Stash":"Catalyst-Runtime","CGI::Session::Driver::DBI":"CGI-Session","MojoMojo::Schema::Result::Person":"MojoMojo","CBOR::XS":"CBOR-XS","Apache::Wyrd::MySQLForm":"Apache-Wyrd","Crypt::Perl::RSA":"Crypt-Perl","Perlbal::CommandContext":"Perlbal","Image::ExifTool::Samsung":"Image-ExifTool","Lemonldap::NG::Portal::Password::Combination":"Lemonldap-NG-Portal","Plack::TempBuffer":"Plack","DBI::DBD::SqlEngine::dr":"DBI","CGI::Session::ID::SHA1":"CGI-Session","MojoMojo::Schema":"MojoMojo","File::Compare":"perl","Sys::Hostname":"perl","Pinto::Globals":"Pinto","Crypt::Perl::X509::Extension::keyUsage":"Crypt-Perl","Lemonldap::NG::Portal::Register::AD":"Lemonldap-NG-Portal","MIME::Parser::InnerFile":"MIME-tools","App::Pinto::Command::add":"Pinto","Crypt::DSA::Key::PEM":"Crypt-DSA","Lemonldap::NG::Portal::Plugins::CertificateResetByMail":"Lemonldap-NG-Portal","Valiant::HTML::SafeString":"Valiant","Mojolicious::Plugin::EPLRenderer":"Mojolicious","Kelp::Module::Template::Null":"Kelp","MHonArc::CharEnt::ISO8859_7":"MHonArc","File::Spec::Functions":"PathTools","Kelp::Util":"Kelp","SOAP::Packager::MIME":"SOAP-Lite","Image::ExifTool::M2TS":"Image-ExifTool","Image::ExifTool":"Image-ExifTool","App::Request":"App-Context","Apache::ASP":"Apache-ASP","Crypt::Mode::CTR":"CryptX","Moxy::Plugin::Scrubber":"Moxy","Bio::Graphics::Browser2::Render::Slave::AWS_Balancer":"GBrowse","Image::ExifTool::Text":"Image-ExifTool","App::Context::ModPerl":"App-Context","Image::ExifTool::OOXML":"Image-ExifTool","Pinto::Action::Copy":"Pinto","Tk::Animation":"Tk","IPC::Run::Win32Pump":"IPC-Run","Valiant::Filter::Numberize":"Valiant","Mail::Cap":"MailTools","Dancer::Logger::File":"Dancer","Locale::Maketext":"Locale-Maketext","MIME::Body::InCore":"MIME-tools","Jifty::Web::Form::Link":"Jifty","SOAP::Cloneable":"SOAP-Lite","XML::LibXML::Node":"XML-LibXML","CPAN::Admin":"CPAN","Apache::Wyrd::Site::MySQLIndexBot":"Apache-Wyrd","Image::ExifTool::Panasonic":"Image-ExifTool","XML::LibXML::SAX::AttributeNode":"XML-LibXML","IO::Uncompress::Inflate":"IO-Compress","Data::FormValidator::Constraints::Upload":"Data-FormValidator","SOAP::Transport::LOOPBACK":"SOAP-Lite","Bio::Graphics::Browser2::I18n":"GBrowse","CPAN::Debug":"CPAN","Dancer::Serializer::JSONP":"Dancer","MojoMojo::Extensions::Counter":"MojoMojo","XML::Atom::Person":"XML-Atom","MHonArc::CharEnt::KOI8_R":"MHonArc","Moxy::Plugin::LocationBar":"Moxy","Mojo::Reactor::Poll":"Mojolicious","MojoMojo::Controller::Page":"MojoMojo","Net::LDAP::Control":"perl-ldap","Mojo::Asset::File":"Mojolicious","Pinto::Server::Router":"Pinto","Clipboard::Pb":"Clipboard","Kossy::BodyParser::UrlEncoded":"Kossy","Tie::Memoize":"perl","DBD::NullP::db":"DBI","Image::ExifTool::Canon":"Image-ExifTool","Zonemaster::Backend::Validator":"Zonemaster-Backend","Perlbal::Plugin::NotModified":"Perlbal","Net::Server::Proto::TCP":"Net-Server","B::Op_private":"perl","Net::DNS::RR::DELEG":"Net-DNS","Net::LDAP::Control::MatchedValues":"perl-ldap","Jifty::Web::Form::Field::ResetButton":"Jifty","MailTools":"MailTools","IO::Uncompress::Adapter::Bunzip2":"IO-Compress","YAML::Tag":"YAML","Fcntl":"perl","Jifty::Web::Menu":"Jifty","App::Context::POE::ClusterController":"App-Context","Mail::Mailer":"MailTools","Dpkg::OpenPGP":"Dpkg","Dancer::Logger::Capture":"Dancer","Crypt::Digest::RIPEMD320":"CryptX","Apache::AuthCAS":"Apache-AuthCAS","MojoMojo::I18N":"MojoMojo","Moxy::Request":"Moxy","Image::ExifTool::Lang::en_gb":"Image-ExifTool","Mail::Mailer::smtps::pipe":"MailTools","IO::Compress":"IO-Compress","IPTables::Parse":"IPTables-Parse","HTTP::Session2::Base":"HTTP-Session2","XAO::DO::Web::Styler":"XAO-Web","Pinto::Action::Merge":"Pinto","Spreadsheet::ParseExcel::SaveParser::Workbook":"Spreadsheet-ParseExcel","OS2::ExtAttr":"perl","Dancer::Template::TemplateToolkit":"Dancer","UI::Dialog::Backend::KDialog":"UI-Dialog","SOAP::Transport::TCP":"SOAP-Lite","Valiant::HTML::Util::Collection":"Valiant","Lemonldap::NG::Portal::Auth::SAML":"Lemonldap-NG-Portal","Tk::DragDrop::SunDrop":"Tk","Mojo::Log":"Mojolicious","Crypt::AuthEnc":"CryptX","Dancer::Plugin::Ajax":"Dancer","Apache::Wyrd::Form::View":"Apache-Wyrd","Imager::Font::BBox":"Imager","Valiant::Proxy::Hash":"Valiant","Lemonldap::NG::Portal::2F::Register::TOTP":"Lemonldap-NG-Portal","POE::Component::IRC::State":"POE-Component-IRC","Plack::App::XAO":"XAO-Web","Jifty::Web::Session::None":"Jifty","Mojo::DOM":"Mojolicious","Jifty::Filter::JSON":"Jifty","Catalyst::Engine::HTTP::Restarter::Watcher":"Catalyst-Runtime","App::Serializer::XMLDumper":"App-Context","Dpkg::Vendor::Devuan":"Dpkg","APR::XSLoader":"mod_perl","MIME::Field::ConTraEnc":"MIME-tools","App::Pinto::Command::list":"Pinto","Image::ExifTool::Lang::fi":"Image-ExifTool","Apache2::CmdParms":"mod_perl","RPC::PlServer":"PlRPC","Mojo::WebSocket":"Mojolicious","APR::FunctionTable":"mod_perl","ExtUtils::MakeMaker::_version":"ExtUtils-MakeMaker","Net::Ping::External":"Net-Ping-External","Crypt::Perl::Ed25519::Parse":"Crypt-Perl","Net::OpenID::VerifiedIdentity":"Net-OpenID-Consumer","OptreeCheck":"perl","Jifty::CAS":"Jifty","GDBM_File":"perl","Dpkg::Build::Info":"Dpkg","IO::Uncompress::RawInflate":"IO-Compress","Crypt::Perl::ECDSA::EC::Curve":"Crypt-Perl","Apache::fork":"mod_perl","MojoMojo::Controller::Gallery":"MojoMojo","Valiant::Util::Exception::UnexpectedUseModuleError":"Valiant","Mojo::Content":"Mojolicious","Lemonldap::NG::Portal::Lib::Captcha":"Lemonldap-NG-Portal","Crypt::Perl::X509::SCT":"Crypt-Perl","Lemonldap::NG::Portal::UserDB::Demo":"Lemonldap-NG-Portal","Image::ExifTool::MNG":"Image-ExifTool","YAML::Node":"YAML","Net::SNMP::Transport::IPv6":"Net-SNMP","Net::DNS::RR::HIP":"Net-DNS","ExtUtils::MM_OS390":"ExtUtils-MakeMaker","SOAP::Lite::Packager":"SOAP-Lite","SOAP::Transport":"SOAP-Lite","MojoMojo::Formatter::DocBook::Colorize":"MojoMojo","DBI::Library::Database":"MySQL-Admin","DBI::ProxyServer::db":"DBI","Crypt::Digest::BLAKE2b_256":"CryptX","Module::Provision::TraitFor::CPANDistributions":"Module-Provision","Mojolicious::Plugin::TagHelpers":"Mojolicious","Dancer::Logger::Capture::Trap":"Dancer","Apache::PerlRunXS":"mod_perl","XAO::DO::Web::FS":"XAO-Web","Zonemaster::Backend::Config::DCPlugin":"Zonemaster-Backend","Apache::MP3::L10N::nl_nl":"Apache-MP3","XML::LibXML::Common":"XML-LibXML","Jifty::Plugin::CompressedCSSandJS":"Jifty","Image::ExifTool::PhotoCD":"Image-ExifTool","DBI::Library::Database::st":"MySQL-Admin","Pinto::IndexReader":"Pinto","Imager::Color::Table":"Imager","Valiant::Filter::With":"Valiant","Batch::Batchrun::TableFunctions":"Batch-Batchrun","Spreadsheet::ParseExcel::FmtDefault":"Spreadsheet-ParseExcel","Crypt::PK::RSA":"CryptX","Catalyst::Stats":"Catalyst-Runtime","Lemonldap::NG::Portal::Lib::RESTProxy":"Lemonldap-NG-Portal","subs":"perl","SVG::Sparkline::Line":"SVG-Sparkline","Elive::Entity::Participant":"Elive","Net::DNS::RR::OPT::COOKIE":"Net-DNS","Jifty::View::Declare::CoreTemplates":"Jifty","DBD::Mem::Statement":"DBI","MojoMojo::Schema::ResultSet::Content":"MojoMojo","HTML::Perlinfo::Modules":"HTML-Perlinfo","Crypt::Passwd::XS":"Crypt-Passwd-XS","MojoMojo::Formatter::Main":"MojoMojo","WWW::Mechanize::Link":"WWW-Mechanize","MHonArc::UTF8::MapUTF8":"MHonArc","Kelp::Context":"Kelp","Dancer::Object":"Dancer","Dpkg::Deps":"Dpkg","App::Security":"App-Context","MIME::Head":"MIME-tools","Archive::Tar::Std":"Archive-Tar","Apache::Wyrd::Datum::Enum":"Apache-Wyrd","Valiant::Util::Exception::NameNotFilter":"Valiant","Dancer::Hook":"Dancer","Mojo::UserAgent::Proxy":"Mojolicious","Config::IniFiles":"Config-IniFiles","attrs":"perl","Jifty::Script::Help":"Jifty","App::Pinto::Command::lock":"Pinto","Crypt::Perl::ECDSA::EC::FieldElement":"Crypt-Perl","XML::Twig::XPath::Attribute":"XML-Twig","CGI::Session::BluePrint":"CGI-Session","Lemonldap::NG::Portal::Lib::CAS":"Lemonldap-NG-Portal","Apache::ModuleConfig":"mod_perl","XML::Twig::Notation_list":"XML-Twig","Imager::File::ICO":"Imager","Apache::Wyrd::Interfaces::GetUser":"Apache-Wyrd","Apache::Framework::App":"App-Context","Net::IPAddress::Util::Range":"Net-IPAddress-Util","Dpkg::Deps::KnownFacts":"Dpkg","ExtUtils::MM_UWIN":"ExtUtils-MakeMaker","YAML::Error":"YAML","Module::Provision::TraitFor::Badges":"Module-Provision","Tk::FBox":"Tk","Tk::TextEdit":"Tk","Config::Model::Backend::Json":"Config-Model","MHonArc::UTF8::CP932":"MHonArc","Moxy::Plugin::UserID":"Moxy","Catalyst::Request":"Catalyst-Runtime","Crypt::Perl::ECDSA::PrivateKey":"Crypt-Perl","Image::ExifTool::FotoStation":"Image-ExifTool","MHonArc::CharEnt::KOI_7":"MHonArc","Pinto::Schema::ResultSet::Registration":"Pinto","I18N::Langinfo":"perl","Image::TIFF::Rational":"Image-Info","CPAN::Distroprefs::Result::Warning":"CPAN","Image::ExifTool::MPF":"Image-ExifTool","PApp::DataRef::Hash::Proxy":"PApp","Lemonldap::NG::Portal::Plugins::Refresh":"Lemonldap-NG-Portal","Jifty::Web::Session::JDBI":"Jifty","PApp::Util":"PApp","CGI::Session::Serialize::json":"CGI-Session","OS2::PrfDB::Sub":"perl","PApp::UserObs":"PApp","Image::ExifTool::Charset":"Image-ExifTool","Module::Provision::MetaData":"Module-Provision","XML::LibXML::Dtd":"XML-LibXML","DBD::Mem::DataSource":"DBI","Tie::ExtraHash":"perl","MHonArc::CharEnt::HP_ROMAN8":"MHonArc","Lemonldap::NG::Portal::2F::Password":"Lemonldap-NG-Portal","Pinto::Editor::Clip":"Pinto","IO::Uncompress::Base":"IO-Compress","MojoMojo::Formatter::Pod::Simple::HTML":"MojoMojo","Moxy::Plugin::GPS::ThirdForce":"Moxy","MojoMojo::Controller::Tag":"MojoMojo","XAO::DO::Web::Debug":"XAO-Web","Jifty::Module::Pluggable":"Jifty","Tk::Clipboard":"Tk","Elive::DAO::Singleton":"Elive","Apache::Session::Browseable::Store::Sybase":"Apache-Session-Browseable","Apache2::SubProcess":"mod_perl","Apache::ASP::CGI::Test":"Apache-ASP","Bio::Graphics::Browser2::Realign":"GBrowse","POE::Component::IRC::Constants":"POE-Component-IRC","Bio::Graphics::Browser2::CAlign":"GBrowse","Dpkg::Compression::Process":"Dpkg","Spoon::Template":"Spoon","Pinto::Target::Package":"Pinto","Lemonldap::NG::Portal::Auth::OpenID":"Lemonldap-NG-Portal","Apache::Session::Browseable::File":"Apache-Session-Browseable","Pinto::ModlistWriter":"Pinto","Plack::Middleware::Runtime":"Plack","Bio::Graphics::Browser2::DataLoader::wiggle":"GBrowse","App::Serializer::Html":"App-Context","Tk::install":"Tk","Tk::DragDrop":"Tk","MHonArc::UTF8::CP1258":"MHonArc","Jifty::DateTime":"Jifty","Archive::Zip":"Archive-Zip","Jifty::Plugin::Authentication::Password::Action::Login":"Jifty","Dancer2::Core::Types":"Dancer2","Moxy::Plugin::RefererCutter":"Moxy","LWP::RobotUA":"libwww-perl","Crypt::Digest::Tiger192":"CryptX","DBD::Gofer::Transport::pipeone":"DBI","Lemonldap::NG::Portal::Main::Run":"Lemonldap-NG-Portal","Module::Provision::TraitFor::PrereqDifferences":"Module-Provision","Mojolicious::Command::inflate":"Mojolicious","Plack::TempBuffer::PerlIO":"Plack","Plack::Server::Apache2":"Plack","MHonArc::CharEnt::EUC_JP":"MHonArc","File::Spec::Epoc":"PathTools","Dpkg::Source::Package":"Dpkg","Plack::Middleware::IIS7KeepAliveFix":"Plack","ModPerl::ParseSource":"mod_perl","Jifty::Web::Form::Field::Collection":"Jifty","CGI::Session::CookBook":"CGI-Session","Crypt::Digest::BLAKE2b_160":"CryptX","Apache::Session::Browseable::Informix":"Apache-Session-Browseable","Crypt::Perl::JWK":"Crypt-Perl","Amiga::ARexx::Msg":"perl","SOAP::Trace":"SOAP-Lite","Jifty::DBI::Collection":"Jifty-DBI","Bio::Graphics::Browser2::AdminTracks":"GBrowse","Net::CIDR::Lite::Span":"Net-CIDR-Lite","Tk::Xrm":"Tk","Apache::Wyrd::Form::Preload":"Apache-Wyrd","CGI::Session::Serialize::default":"CGI-Session","Bio::Graphics::Browser2::Render":"GBrowse","Mojo::Headers":"Mojolicious","MHonArc::UTF8::ISO8859_14":"MHonArc","Dancer2::Core::Error":"Dancer2","Net::LDAP::Control::ProxyAuth":"perl-ldap","SOAP::Transport::LOCAL::Client":"SOAP-Lite","Image::ExifTool::NikonCapture":"Image-ExifTool","Tk::Event::IO":"Tk","Lemonldap::NG::Portal::Main::SecondFactor":"Lemonldap-NG-Portal","MojoMojo::Model::Search":"MojoMojo","Config::Model::Exception::ObsoleteElement":"Config-Model","Jifty::DBI::Record::Cachable":"Jifty-DBI","Valiant::Validator::Inclusion":"Valiant","Tk::Dialog":"Tk","Tk::ReindexedROText":"Tk","Apache::Wyrd::ErrTag":"Apache-Wyrd","MHonArc::CharEnt::AppleTurkish":"MHonArc","DBI::Util::_accessor":"DBI","Lemonldap::NG::Portal::Auth::Twitter":"Lemonldap-NG-Portal","Dancer2::Core::Response::Delayed":"Dancer2","CGI::Session":"CGI-Session","Tk::LabeledEntryLabeledRadiobutton":"Tk","Catalyst::ActionRole::QueryMatching":"Catalyst-Runtime","Crypt::Cipher::XTEA":"CryptX","Mojo::Reactor":"Mojolicious","DBI::Gofer::Transport::Base":"DBI","Lemonldap::NG::Portal::Auth::Radius":"Lemonldap-NG-Portal","CPAN::Author":"CPAN","FCGI":"FCGI","Mojo::Cookie::Response":"Mojolicious","Lemonldap::NG::Portal::Main::UserDB":"Lemonldap-NG-Portal","XAO::DO::Web::Clipboard":"XAO-Web","Net::Dropbear::XS":"Net-Dropbear","XML::DT":"XML-DT","CGI::MultipartBuffer":"CGI","Jifty::I18N::en":"Jifty","Lemonldap::NG::Portal::Plugins::Status":"Lemonldap-NG-Portal","Jifty::Plugin::ViewDeclarePage":"Jifty","Encode::Encoder":"Encode","Lemonldap::NG::Portal::UserDB::Slave":"Lemonldap-NG-Portal","Jifty::Plugin::Halo::Mason":"Jifty","XAO::DO::Web::IdentifyAgent":"XAO-Web","Dpkg::Control::Changelog":"Dpkg","Mojo::IOLoop::Client":"Mojolicious","Net::DNS::RR::RP":"Net-DNS","Valiant::Filters":"Valiant","Graphics::ColorNames::X":"Graphics-ColorNames","MHonArc::UTF8::CP1254":"MHonArc","PApp::Admin":"PApp","Lemonldap::NG::Portal::UserDB::Combination":"Lemonldap-NG-Portal","Jifty::Test::WWW::Mechanize":"Jifty","Bio::Graphics::Browser2::OptionPick":"GBrowse","Galileo::Command::dump":"Galileo","Jifty::Schema":"Jifty","Net::LDAP::Control::SyncDone":"perl-ldap","Apache::Session::Serialize::JSON":"Apache-Session-Browseable","Jifty::DBI::Filter::base64":"Jifty-DBI","Dancer::Error":"Dancer","MHonArc::UTF8::ISO8859_15":"MHonArc","Jifty::CAS::Store::Nested":"Jifty","APR::SockAddr":"mod_perl","Jifty::Action::Record::Bulk":"Jifty","Lemonldap::NG::Portal::Plugins::History":"Lemonldap-NG-Portal","Image::ExifTool::ITC":"Image-ExifTool","POE::Component::IRC::Plugin::BotTraffic":"POE-Component-IRC","Image::ExifTool::Lang::ja":"Image-ExifTool","IO::Uncompress::AnyUncompress":"IO-Compress","Net::LDAP::Control::DontUseCopy":"perl-ldap","Dancer::Handler::PSGI":"Dancer","Pinto::Action::New":"Pinto","Email::MIME::Encode":"Email-MIME","MHonArc::UTF8::CP936":"MHonArc","Jifty::Action::Redirect":"Jifty","Net::SSLeay::Handle":"Net-SSLeay","Bio::Graphics::Browser2::Render::Slave::StagingServer":"GBrowse","Net::DNS::RR::IPSECKEY":"Net-DNS","Net::SNMP::PDU":"Net-SNMP","Pinto::Server::Responder":"Pinto","Tk::Menu::Separator":"Tk","Mojolicious::Command::Author::generate::app":"Mojolicious","Perlbal::Plugin::Highpri":"Perlbal","XML::LibXML::Comment":"XML-LibXML","Jifty::ClassLoader":"Jifty","Plack::Util::Prototype":"Plack","Apache::Table":"mod_perl","Crypt::Perl::X::TooLongToSign":"Crypt-Perl","Config::Model::AnyId":"Config-Model","Mojo::Server::Morbo::Backend::Poll":"Mojolicious","IO::Compress::Deflate":"IO-Compress","Dpkg::BuildTree":"Dpkg","Mojo::Server::PSGI":"Mojolicious","Net::LDAP::Control::Paged":"perl-ldap","Mail::Field::Generic":"MailTools","Dancer2::Logger::Diag":"Dancer2","MHonArc::CharEnt::AppleCyrillic":"MHonArc","Lemonldap::NG::Portal::Plugins::BasePasswordPolicy":"Lemonldap-NG-Portal","Crypt::Mac::BLAKE2b":"CryptX","Win32CORE":"perl","Jifty::Plugin::ErrorTemplates::View":"Jifty","XML::Twig::Elt":"XML-Twig","Lemonldap::NG::Portal::Password::Null":"Lemonldap-NG-Portal","Tk::IO":"Tk","Pinto::Store":"Pinto","Dpkg::Vendor::Ubuntu":"Dpkg","Encode::Byte":"Encode","Log::Any::Proxy::Null":"Log-Any","Mojo::Loader":"Mojolicious","Catalyst::View":"Catalyst-Runtime","CPAN::HTTP::Credentials":"CPAN","File::DataClass::Types":"File-DataClass","Apache::Wyrd::Lattice":"Apache-Wyrd","POSIX::SigAction":"perl","Mojolicious::Plugin::PODRenderer":"Mojolicious","Image::ExifTool::Scalado":"Image-ExifTool","HTML::Parser":"HTML-Parser","PApp::Config":"PApp","Mojolicious::Plugin::EPRenderer":"Mojolicious","App::Pinto::Command::thanks":"Pinto","Apache2::Status":"mod_perl","Apache::Session::Browseable::Store::Informix":"Apache-Session-Browseable","Kelp":"Kelp","Tk::ColorDialog":"Tk","Dpkg::Source::Functions":"Dpkg","Lemonldap::NG::Portal::Lib::U2F":"Lemonldap-NG-Portal","File::DataClass::IO":"File-DataClass","Lemonldap::NG::Portal::2F::Radius":"Lemonldap-NG-Portal","RPC::XML::array":"RPC-XML","DBIx::Class::Valiant::Result::HTML::FormFields":"Valiant","Pinto::Action::Unpin":"Pinto","OS2::REXX::_HASH":"perl","Apache2::Request":"libapreq2","Image::ExifTool::Lang::es":"Image-ExifTool","Jifty::Web::Form::Field::Hidden":"Jifty","Tk::Button":"Tk","Imager::Expr::Postfix":"Imager","ModPerl::TestRun":"mod_perl","Jifty::Plugin::Config::Action::AddConfig":"Jifty","Crypt::Perl::PKCS10::Attribute::extensionRequest":"Crypt-Perl","Apache::XMLRPC::Lite":"SOAP-Lite","Crypt::Cipher::IDEA":"CryptX","Capture::Tiny":"Capture-Tiny","overloading":"perl","LWP::Protocol::Net::Curl":"LWP-Protocol-Net-Curl","Crypt::Perl::X509::Extension::tlsFeature":"Crypt-Perl","GPIB::hp33120a":"GPIB","Jifty::Response":"Jifty","Kossy::Exception":"Kossy","File::Spec::AmigaOS":"PathTools","Jifty::Plugin::SkeletonApp::Dispatcher":"Jifty","Apache2::porting":"mod_perl","Plack::Loader::Delayed":"Plack","Elive::Entity::Preload":"Elive","HTML::Template::Pro":"HTML-Template-Pro","APR::ThreadMutex":"mod_perl","Valiant::HTML::Util::Collection::Item":"Valiant","Dancer2::Serializer::JSON":"Dancer2","Pod::Perldoc::GetOptsOO":"Pod-Perldoc","Apache::Opcode":"mod_perl","Image::ExifTool::BZZ":"Image-ExifTool","Jifty::Request::Fragment":"Jifty","App::CallDispatcher::HTTPSimple":"App-Context","XML::LibXML::Schema":"XML-LibXML","Pinto::Remote::Action":"Pinto","MojoMojo::Schema::ResultSet::Page":"MojoMojo","MojoMojo::Controller::Root":"MojoMojo","Jifty::TestServer::Inline":"Jifty","Elive::Entity::InvitedGuest":"Elive","LWP::MemberMixin":"libwww-perl","Tie::Array":"perl","App::Pinto::Command::revert":"Pinto","Bio::Graphics::Browser2::ExternalData":"GBrowse","Mail::Audit::MAPS":"Mail-Audit","Log::Any::Manager":"Log-Any","Apache2::StructureTable":"mod_perl","Apache2::SourceTables":"mod_perl","Apache::MP3::L10N::ms":"Apache-MP3","Spoon::Formatter::Phrase":"Spoon","ExtUtils::MM_BeOS":"ExtUtils-MakeMaker","Moxy::Plugin::ControlPanel":"Moxy","Plack::Handler::FCGI":"Plack","Elive::Entity::Session":"Elive","Mojo::Cookie::Request":"Mojolicious","WWW::Mechanize":"WWW-Mechanize","Net::DNS::RR::OPT::KEY_TAG":"Net-DNS","Lemonldap::NG::Portal::Plugins::MailPasswordReset":"Lemonldap-NG-Portal","test_in_further_subdir":"PAR","Kossy::BodyParser::OctetStream":"Kossy","Valiant::HTML::FormBuilder::Model":"Valiant","CGI::Session::Serialize::freezethaw":"CGI-Session","Tie::Hash::NamedCapture":"perl","Net::Netmask":"Net-Netmask","MIME::WordDecoder::ISO_8859":"MIME-tools","Moped::Msg":"perl","Compress::Raw::Bzip2":"Compress-Raw-Bzip2","Lemonldap::NG::Portal::Register::Base":"Lemonldap-NG-Portal","MY":"ExtUtils-MakeMaker","Apache::Session::Browseable::Store::File":"Apache-Session-Browseable","Tk::Trace":"Tk","Mojolicious::Command::prefork":"Mojolicious","Log::Any":"Log-Any","LWP::ConnCache":"libwww-perl","Dancer2::Serializer::Dumper":"Dancer2","Elive::Connection":"Elive","Apache::Wyrd::Site::TagPull":"Apache-Wyrd","SDBM_File":"perl","Pinto::Locator::Stratopan":"Pinto","Dancer2::Core::MIME":"Dancer2","UDDI::Constants":"SOAP-Lite","DBI::Gofer::Serializer::DataDumper":"DBI","Image::ExifTool::XMP":"Image-ExifTool","UI::Dialog::Backend::Nautilus":"UI-Dialog","Apache::Session::Store::LDAP":"Apache-Session-LDAP","Valiant::HTML::Tag":"Valiant","Crypt::Digest::SHA224":"CryptX","Image::ExifTool::Lang::zh_tw":"Image-ExifTool","Dpkg::Control::FieldsCore":"Dpkg","Apache::Session::Browseable::PgJSON":"Apache-Session-Browseable","overload":"perl","Convert::UUlib":"Convert-UUlib","Catalyst::DispatchType::Index":"Catalyst-Runtime","Bio::Graphics::GBrowseFeature":"GBrowse","Config::Model::Role::Grab":"Config-Model","Crypt::Perl::X509::Extensions":"Crypt-Perl","Jifty::Plugin::Authentication::Password::Action::Logout":"Jifty","Image::ExifTool::JVC":"Image-ExifTool","yaml_mapping":"YAML","Net::Server::Proto::UNIXDGRAM":"Net-Server","Mojo::Transaction":"Mojolicious","Zonemaster::Backend::RPCAPI":"Zonemaster-Backend","Crypt::Perl::RSA::Generate":"Crypt-Perl","Net::SNMP::Transport::IPv4::TCP":"Net-SNMP","CPAN":"CPAN","Dancer2::Core::Factory":"Dancer2","Tk::Scrollbar":"Tk","Apache::ExtUtils":"mod_perl","PApp::Recode":"PApp","HTML::Menu::Pages":"MySQL-Admin","CGI::Pretty":"CGI","Mojo::JSON":"Mojolicious","ModPerl::Registry":"mod_perl","WWW::Mechanize::Image":"WWW-Mechanize","Zonemaster::Backend":"Zonemaster-Backend","Lemonldap::NG::Portal::Auth::Combination":"Lemonldap-NG-Portal","Catalyst::Engine::CGI":"Catalyst-Runtime","PAR::Filter":"PAR-Packer","Mojo::IOLoop":"Mojolicious","Catalyst::Action::Serialize::JSONP":"Catalyst-Action-REST","Clipboard::WaylandClipboard":"Clipboard","App::Pinto::Command::props":"Pinto","SOAP::Server::Parameters":"SOAP-Lite","POE::Component::IRC":"POE-Component-IRC","MojoMojo::Formatter::Textile":"MojoMojo","Image::ExifTool::Flash":"Image-ExifTool","App::Pinto::Command::rename":"Pinto","DBI::Library::Database::db":"MySQL-Admin","Config::Model::Exception::Syntax":"Config-Model","IPC::Cmd::System":"IPC-Cmd","Mojolicious::Routes::Match":"Mojolicious","Image::ExifTool::Lang::ko":"Image-ExifTool","Mojolicious::Routes::Route":"Mojolicious","DBD::Gofer::db":"DBI","Tk::Menubutton":"Tk","Dancer::Session":"Dancer","Pod::Html::Util":"perl","Apache::Wyrd::Interfaces::Stealth":"Apache-Wyrd","Lemonldap::NG::Portal::Lib::Okta":"Lemonldap-NG-Portal","Jifty::Model::Metadata":"Jifty","Legacy::Graphics::Browser::I18n":"GBrowse","Perlbal::Util":"Perlbal","Crypt::Perl::X509::Extension::extKeyUsage":"Crypt-Perl","Plack::Loader":"Plack","Jifty::Plugin::Config::View":"Jifty","Jifty::Web::Form::Field::Select":"Jifty","Jifty::Plugin":"Jifty","Dpkg::Deps::Multiple":"Dpkg","Imager::Transform":"Imager","Image::ExifTool::PSP":"Image-ExifTool","Net::DNS::RR::EUI48":"Net-DNS","Tk":"Tk","Mail::Header":"MailTools","Imager::Regops":"Imager","Net::DNS::RR::CAA":"Net-DNS","Jifty::DBI::Handle::Informix":"Jifty-DBI","Apache::ASP::ApacheCommon":"Apache-ASP","Plack::Middleware::StaticShared":"Plack-Middleware-StaticShared","Jifty::Plugin::Authentication::Password::Action::SendPasswordReminder":"Jifty","Crypt::Mac::XCBC":"CryptX","Kelp::Module::JSON":"Kelp","Parse::ePerl":"eperl","RPC::XML::Parser":"RPC-XML","App::SessionObject":"App-Context","User::pwent":"perl","Data::FormValidator::Constraints":"Data-FormValidator","MIME::WordDecoder::US_ASCII":"MIME-tools","MojoMojo::Model::Themes":"MojoMojo","GPIB::llp":"GPIB","PApp::DataRef::Scalar::Proxy":"PApp","Net::DNS::RR::AAAA":"Net-DNS","Dancer::Route::Registry":"Dancer","Moxy::Plugin::DisplayWidth":"Moxy","Catalyst::ScriptRole":"Catalyst-Runtime","Crypt::Cipher::Anubis":"CryptX","Tk::Reindex":"Tk","Image::Info::AVIF":"Image-Info","Lemonldap::NG::Portal::Plugins::GlobalLogout":"Lemonldap-NG-Portal","POE::Component::IRC::Plugin::AutoJoin":"POE-Component-IRC","Tk::LabEntry":"Tk","Lemonldap::NG::Portal::Main::Process":"Lemonldap-NG-Portal","DBI::Util::CacheMemory":"DBI","DBI::SQL::Nano::Table_":"DBI","Apache2::ParseSource":"mod_perl","Crypt::Cipher::Noekeon":"CryptX","Spoon":"Spoon","SOAP::MIMEParser":"SOAP-Lite","MHonArc::CharEnt::KOI8_E":"MHonArc","Apache2::XSLoader":"mod_perl","Net::CIDR::Lite":"Net-CIDR-Lite","Jifty::Bootstrap":"Jifty","Otogiri":"Otogiri","Apache2::Connection":"mod_perl","MojoMojo::Formatter::Wiki":"MojoMojo","Jifty::TestServer":"Jifty","SOAP::Schema::Deserializer":"SOAP-Lite","Net::Server::INET":"Net-Server","XML::Twig::Notation":"XML-Twig","YAML::Loader::Base":"YAML","Image::Info::SVG":"Image-Info","Zonemaster::Backend::TestAgent":"Zonemaster-Backend","IO::Uncompress::Unzip":"IO-Compress","GD::Polyline":"GD","Apache::Wyrd::Debug":"Apache-Wyrd","Jifty::Script::Adopt":"Jifty","DBD::mysqlPP::st":"DBD-mysqlPP","Plack::Middleware":"Plack","DBD::Gofer::Transport::null":"DBI","Mojolicious::Commands":"Mojolicious","Plack::Session::Cleanup":"Plack-Middleware-Session","GitLab::API::v4::Mock::RESTClient":"GitLab-API-v4","Net::LDAPS":"perl-ldap","Mail::Audit::Util::Tempdir":"Mail-Audit","Net::DNS::RR::SPF":"Net-DNS","Apache::Wyrd::Site::MySQLIndex":"Apache-Wyrd","Jifty::Config":"Jifty","Crypt::Cipher::Twofish":"CryptX","MIME::Body::Scalar":"MIME-tools","Dancer::Template":"Dancer","Jifty::Action":"Jifty","Crypt::Cipher::SEED":"CryptX","DBI::Const::GetInfoType":"DBI","Perlbal::Plugin::Stats":"Perlbal","Bio::DB::SeqFeature::Store::Alias::Iterator":"GBrowse","Jifty::Plugin::ClassLoader":"Jifty","Jifty::Plugin::LetMe":"Jifty","GitLab::API::v4":"GitLab-API-v4","SOAP::Lite":"SOAP-Lite","DBD::mysqlPP::db":"DBD-mysqlPP","Perlbal::ClientHTTPBase":"Perlbal","XAO::DO::Web::Action":"XAO-Web","Jifty::View::Declare":"Jifty","Net::LDAP::Control::ManageDsaIT":"perl-ldap","CPAN::Distrostatus":"CPAN","ModPerl::RegistryCooker":"mod_perl","MojoMojo::View::Email":"MojoMojo","Image::Info::SVG::XMLSimple":"Image-Info","Jifty::Script::Model":"Jifty","HTML::Filter":"HTML-Parser","Image::ExifTool::Photoshop":"Image-ExifTool","Jifty::DBI::Filter::DateTime":"Jifty-DBI","Apache::ASP::Collection":"Apache-ASP","MDK::Common":"MDK-Common","GitLab::API::v4::Constants":"GitLab-API-v4","Net::DNS::RR::KEY":"Net-DNS","DBD::Gofer":"DBI","Catalyst::DispatchType::Chained":"Catalyst-Runtime","Imager::Probe":"Imager","PApp::PCode":"PApp","Plack::Component":"Plack","Valiant::Validator::Absence":"Valiant","DBI::Library":"MySQL-Admin","Module::Provision":"Module-Provision","LWP::Protocol::nntp":"libwww-perl","Dpkg::Control::Fields":"Dpkg","Image::ExifTool::Minolta":"Image-ExifTool","Crypt::Perl::X509::Extension::ct_precert_scts":"Crypt-Perl","Valiant::HTML::Util::TagBuilder::_tags":"Valiant","Lemonldap::NG::Portal::2F::Engines::Default":"Lemonldap-NG-Portal","Bundle::Image::Info::XPM":"Image-Info","PApp::Storable":"PApp","Imager":"Imager","Catalyst::ActionRole::ConsumesContent":"Catalyst-Runtime","Bundle::LWP":"libwww-perl","DBI::Const::GetInfo::ODBC":"DBI","CGI::Application":"CGI-Application","Mojo::Reactor::EV":"Mojolicious","GitLab::API::v4::WWWClient":"GitLab-API-v4","Apache::Wyrd::Input::Condenser":"Apache-Wyrd","Tk::Stdio::Handle":"PAR","CGI::Application::Dispatch::PSGI":"CGI-Application-Dispatch","Valiant::Filter::HtmlEscape":"Valiant","App::Documentation":"App-Context","Moxy::Component::Context":"Moxy","Catalyst::Action::Deserialize::Callback":"Catalyst-Action-REST","Net::DNS::RR::HTTPS":"Net-DNS","Socket":"Socket","Search::OpenSearch::Server":"Search-OpenSearch-Server","MojoMojo::Model::DBIC":"MojoMojo","DBD::File::st":"DBI","Image::ExifTool::7Z":"Image-ExifTool","Time::localtime":"perl","Pinto::Action::Stacks":"Pinto","Image::ExifTool::Theora":"Image-ExifTool","YAML::Any":"YAML","App::Pinto::Command::clean":"Pinto","CGI::Auth::Basic":"CGI-Auth-Basic","Net::DNS::Resolver":"Net-DNS","Imager::Font::Test":"Imager","Catalyst::Script::FastCGI":"Catalyst-Runtime","Encode::Alias":"Encode","Spreadsheet::ParseXLSX::Decryptor":"Spreadsheet-ParseXLSX","Tk::DialogBox":"Tk","MHonArc::UTF8::KOI_7":"MHonArc","MojoMojo::Controller::Journal":"MojoMojo","Mojo::Transaction::HTTP":"Mojolicious","IPC::Run::Win32Process":"IPC-Run","Net::DNS::RR::TSIG":"Net-DNS","Apache::Session::Browseable::PgHstore":"Apache-Session-Browseable","Term::ReadLine::Gnu::AU":"Term-ReadLine-Gnu","MojoMojo::Formatter::File":"MojoMojo","MHonArc::UTF8::MhaEncode":"MHonArc","Jifty::DBI::Collection::Unique":"Jifty-DBI","Jifty::YAML":"Jifty","Apache::MP3::L10N::sr":"Apache-MP3","SVN::Look":"SVN-Look","APR::URI":"mod_perl","Imager::Filter::DynTest":"Imager","DBD::Gofer::dr":"DBI","Crypt::PK::X25519":"CryptX","Apache::SessionX::Generate::MD5":"Apache-SessionX","APR::OS":"mod_perl","Jifty::DBI::Filter::Time":"Jifty-DBI","Dancer::Session::YAML":"Dancer","mod_perl":"mod_perl","IO::Compress::RawDeflate":"IO-Compress","MHonArc::Char::JP":"MHonArc","Lemonldap::NG::Portal::2F::Okta":"Lemonldap-NG-Portal","Elive::Entity::MeetingParameters":"Elive","Lemonldap::NG::Portal::Password::Choice":"Lemonldap-NG-Portal","DBI::Gofer::Serializer::Storable":"DBI","Crypt::Perl::ECDSA::EC::CurvesDB":"Crypt-Perl","Crypt::Perl::RNG":"Crypt-Perl","Net::DNS::RR::NSEC3":"Net-DNS","Valiant::Validator::Hash":"Valiant","Elive":"Elive","DBI::Profile":"DBI","Dpkg::Vendor::Debian":"Dpkg","DBD::DBM::Statement":"DBI","Plack::Session::Store":"Plack-Middleware-Session","Plack::Session::Store::Null":"Plack-Middleware-Session","Cwd":"PathTools","Dancer::Route::Cache":"Dancer","Module::Metadata":"Module-Metadata","Legacy::DB::SyntenyIO":"GBrowse","Valiant::HTML::FormBuilder::Renderer::TextField":"Valiant","Config::Model::IdElementReference":"Config-Model","GPIB::hpe3631a":"GPIB","Symbol":"perl","FindExt":"perl","Archive::Zip::Member":"Archive-Zip","Mojo::Cookie":"Mojolicious","Valiant::Filter::Flatten":"Valiant","Mojo::Exception":"Mojolicious","DBIx::Custom":"DBIx-Custom","PerlIO::scalar":"perl","Bio::Graphics::Browser2::DataLoader::bed":"GBrowse","Apache::Session::Browseable::MySQLJSON":"Apache-Session-Browseable","Dancer2::Logger::Console":"Dancer2","Config::Model::Value::LayeredInclude":"Config-Model","Spoon::Hooked":"Spoon","Dancer2::Core::Role::SessionFactory::File":"Dancer2","Dpkg::Changelog::Debian":"Dpkg","Image::ExifTool::Nintendo":"Image-ExifTool","Image::ExifTool::H264":"Image-ExifTool","Tk::Balloon":"Tk","Config::Model::Backend::Any":"Config-Model","Jifty::View::Declare::Helpers":"Jifty","Proc::Killfam":"Proc-ProcessTable","HTML::Perlinfo::Common":"HTML-Perlinfo","Jifty::View::Static::Handler":"Jifty","Crypt::AuthEnc::EAX":"CryptX","Lemonldap::NG::Portal::Password::Custom":"Lemonldap-NG-Portal","Devel::PatchPerl::Plugin::Asan":"App-perlall","Jifty::Model::SessionCollection":"Jifty","ExtUtils::MakeMaker":"ExtUtils-MakeMaker","Perlbal::Cache":"Perlbal","File::Path":"File-Path","Log::Any::Proxy::WithStackTrace":"Log-Any","Lemonldap::NG::Portal::Lib::Remote":"Lemonldap-NG-Portal","Crypt::Cipher::Camellia":"CryptX","Valiant::Validator::Confirmation":"Valiant","Win32::File::Summary":"Win32-File-Summary","DBD::Proxy::RPC::PlClient":"DBI","App::ValueDomain":"App-Context","Lemonldap::NG::Portal::Main::Auth":"Lemonldap-NG-Portal","Batch::Batchrun::Retain":"Batch-Batchrun","YAML":"YAML","charnames":"perl","Jifty::Result":"Jifty","Image::ExifTool::Lytro":"Image-ExifTool","Dancer::FileUtils":"Dancer","PApp::HTML":"PApp","Pinto::Schema::ResultSet::Distribution":"Pinto","Net::DNS::Parameters":"Net-DNS","POSIX":"perl","Encode::TW":"Encode","Mojolicious::Renderer":"Mojolicious","Catalyst::Action::DeserializeMultiPart":"Catalyst-Action-REST","Mail::Audit::MimeEntity":"Mail-Audit","Image::ExifTool::MIE":"Image-ExifTool","Crypt::Perl::X509::Extension::authorityKeyIdentifier":"Crypt-Perl","Jifty::Plugin::Prototypism":"Jifty","Apache2::Command":"mod_perl","Lemonldap::NG::Portal::Main::Plugin":"Lemonldap-NG-Portal","Apache::EP":"HTML-EP","Net::DNS::RR::DLV":"Net-DNS","ExtUtils::testlib":"ExtUtils-MakeMaker","Valiant::HTML::Form":"Valiant","Config::Model::Report":"Config-Model","Dancer2::Core::Hook":"Dancer2","MojoMojo::Formatter::YouTube":"MojoMojo","ModPerl::Code":"mod_perl","Bundle::PlRPC":"PlRPC","Encode::utf8":"Encode","Config::Model::Exception::AncestorClass":"Config-Model","MHonArc::UTF8::AppleTurkish":"MHonArc","MHonArc::UTF8::CP1251":"MHonArc","Plack::Middleware::XSendfile":"Plack","Tk::ItemStyle":"Tk","XAO::DO::Web::MultiPageNav":"XAO-Web","ModPerl::Global":"mod_perl","Dancer::Serializer::XML":"Dancer","Net::LDAP::Control::PostRead":"perl-ldap","XAO::DO::Web::URL":"XAO-Web","Apache::RegistryBB":"mod_perl","Image::Info::TIFF":"Image-Info","Catalyst::ClassData":"Catalyst-Runtime","vars":"perl","XAO::DO::Web::SetArg":"XAO-Web","Catalyst::Controller":"Catalyst-Runtime","Image::ExifTool::PGF":"Image-ExifTool","XML::LibXML::Reader":"XML-LibXML","Zonemaster::Backend::Error":"Zonemaster-Backend","Lemonldap::NG::Portal::Lib::Code2F":"Lemonldap-NG-Portal","CPAN::Exception::RecursiveDependency":"CPAN","Lemonldap::NG::Portal::UserDB::SAML":"Lemonldap-NG-Portal","Bio::Graphics::Karyotype":"GBrowse","Crypt::CBC::PBKDF":"Crypt-CBC","Apache::RPC::Server":"RPC-XML","Dpkg::Shlibs::Objdump":"Dpkg","Lemonldap::NG::Portal::Main::Menu":"Lemonldap-NG-Portal","Apache2::RequestIO":"mod_perl","Bio::DB::SeqFeature::Store::Alias":"GBrowse","Crypt::Mode::ECB":"CryptX","UI::Dialog::KDE":"UI-Dialog","Lemonldap::NG::Portal::UserDB::Choice":"Lemonldap-NG-Portal","diagnostics":"perl","App::Pinto::Command::register":"Pinto","Jifty::Filter::DateTime":"Jifty","PApp::EditForm":"PApp","Bio::Graphics::Browser2::DataLoader::wig2bigwig":"GBrowse","Plack::Middleware::Writer":"Plack","Jifty::Client":"Jifty","Mojo::Promise":"Mojolicious","HTML::EP::Examples::Admin":"HTML-EP","Crypt::Mode::CBC":"CryptX","ExtUtils::Command::MM":"ExtUtils-MakeMaker","PAR::Filter::PodStrip":"PAR-Packer","Mail::Mailer::sendmail":"MailTools","Imager::Filter::Flines":"Imager","B::OBJECT":"perl","GPIB::hp3585a":"GPIB","Mojo::Message":"Mojolicious","Crypt::Perl::X509::Extension::certificatePolicies":"Crypt-Perl","Tk::Image":"Tk","Pod::Perldoc::ToChecker":"Pod-Perldoc","DBIx::Class::Valiant::Util::Exception::TooManyRows":"Valiant","SVG::Sparkline::RangeArea":"SVG-Sparkline","HTML::Perlinfo::Base":"HTML-Perlinfo","Apache::Session::Browseable::Store::SQLite":"Apache-Session-Browseable","Jifty::Plugin::Authentication::Password::Notification::ConfirmEmail":"Jifty","MIME::ToolUtils":"MIME-tools","Plack::Session::Store::File":"Plack-Middleware-Session","XML::Atom::Category":"XML-Atom","Mojolicious::Plugin::Mount":"Mojolicious","Image::ExifTool::iWork":"Image-ExifTool","MojoMojo::Controller::Export":"MojoMojo","CGI::Session::ID::incr":"CGI-Session","Plack::MIME":"Plack","Mojolicious::Command::Author::generate":"Mojolicious","File::DataClass::Functions":"File-DataClass","warnings":"perl","Apache2::PerlSections":"mod_perl","Tk::X11Font":"Tk","Net::LDAP::Reference":"perl-ldap","MHonArc::UTF8::CP866":"MHonArc","Bio::Graphics::Browser2::RenderPanels":"GBrowse","CGI::Session::Driver::db_file":"CGI-Session","Perlbal::ChunkedUploadState":"Perlbal","Tk::Widget":"Tk","PApp::XML::Pod2xml":"PApp","Dancer2::Handler::File":"Dancer2","APR::Request":"libapreq2","Lemonldap::NG::Portal::Auth::Kerberos":"Lemonldap-NG-Portal","Image::ExifTool::Unknown":"Image-ExifTool","Tk::Entry":"Tk","Jifty::Plugin::Authentication::Password::View":"Jifty","XML::Simple":"XML-Simple","Moxy::Session::State::BasicAuth":"Moxy","Tk::Pane":"Tk","Cpanel::JSON::XS::Type":"Cpanel-JSON-XS","DBD::MariaDB":"DBD-MariaDB","Pinto::Manual::Installing":"Pinto","Bio::Graphics::Browser2::UserTracks":"GBrowse","CGI::Session::MySQL":"CGI-Session","Pinto::Schema::Result::Ancestry":"Pinto","SOAP::Transport::HTTP::FCGI":"SOAP-Lite","Crypt::Perl::X::Generic":"Crypt-Perl","Mojo::Asset":"Mojolicious","Galileo::Menu":"Galileo","Crypt::Perl::ECDSA::Generate":"Crypt-Perl","Image::ExifTool::FlashPix":"Image-ExifTool","OS2::DLL":"perl","Jifty::View::Mason::Halo":"Jifty","Lemonldap::NG::Portal::Plugins::FindUser":"Lemonldap-NG-Portal","Bio::DB::GFF::Aggregator::reftranscript":"GBrowse","CGI::Push":"CGI","DBD::SQLite::VirtualTable::PerlData":"DBD-SQLite","MojoMojo::Schema::ResultSet::Tag":"MojoMojo","Jifty::Script::Po":"Jifty","Dancer::Serializer::Abstract":"Dancer","IO::Uncompress::Gunzip":"IO-Compress","DBI":"DBI","Net::Dropbear":"Net-Dropbear","Apache::MP3::L10N::zh_tw":"Apache-MP3","Haiku":"perl","Image::ExifTool::Import":"Image-ExifTool","Plack::Middleware::Session":"Plack-Middleware-Session","Lemonldap::NG::Portal::Plugins::SOAPServer":"Lemonldap-NG-Portal","Config::Model::Exception::WrongValue":"Config-Model","Config::Model::Node":"Config-Model","MHonArc::CharEnt::GOST19768_87":"MHonArc","Crypt::Digest::SHA3_256":"CryptX","Dancer2::Logger::Capture":"Dancer2","Net::OpenID::ClaimedIdentity":"Net-OpenID-Consumer","Apache::MP3::L10N::nb":"Apache-MP3","Net::LDAP::FilterList":"perl-ldap","Image::ExifTool::FLIR":"Image-ExifTool","Image::ExifTool::Opus":"Image-ExifTool","Jifty::Plugin::SetupWizard":"Jifty","overload::numbers":"perl","APR::IpSubnet":"mod_perl","MojoMojo::Formatter::File::Pod":"MojoMojo","Image::ExifTool::DPX":"Image-ExifTool","Bio::Graphics::Browser2::Session":"GBrowse","SOAP::XMLSchemaSOAP1_1::Deserializer":"SOAP-Lite","Lemonldap::NG::Portal::Captcha::ReCaptcha3":"Lemonldap-NG-Portal","Lemonldap::NG::Portal::Lib::Choice":"Lemonldap-NG-Portal","Jifty::Action::Record::Search":"Jifty","Bio::Graphics::Browser2::UserTracks::Database":"GBrowse","Net::LDAP::Control::Assertion":"perl-ldap","Image::ExifTool::KyoceraRaw":"Image-ExifTool","Encode::CN":"Encode","Jifty::Script::Schema":"Jifty","Mojo::ByteStream":"Mojolicious","MHonArc::UTF8::CP950":"MHonArc","Term::ReadLine::Gnu::XS":"Term-ReadLine-Gnu","Pod::Perldoc::ToRtf":"Pod-Perldoc","Crypt::Digest::BLAKE2s_160":"CryptX","Jifty::Script::ModPerl2":"Jifty","Jifty::Plugin::SkeletonApp::View":"Jifty","Tk::DummyEncode":"Tk","App::Context::HTTP":"App-Context","Lemonldap::NG::Portal::Lib::OIDCTokenExchange":"Lemonldap-NG-Portal","Apache::Wyrd::Site::Widget":"Apache-Wyrd","locale":"perl","Apache::Wyrd::Services::MetaTable":"Apache-Wyrd","Plack::Middleware::JSONP":"Plack","Valiant::Filter::Upper":"Valiant","Dancer::MIME":"Dancer","Image::ExifTool::FITS":"Image-ExifTool","CPAN::Kwalify":"CPAN","Plack::Middleware::Session::Cookie":"Plack-Middleware-Session","Mojo::Collection::Role::Extra":"Mojo-DOM-Role-Analyzer","Image::ExifTool::Sanyo":"Image-ExifTool","PApp::XML::Template":"PApp","App::Pinto::Command::migrate":"Pinto","File::DataClass::List":"File-DataClass","Bio::Graphics::Browser2::DataLoader::archive":"GBrowse","CPAN::Checksums":"CPAN-Checksums","Crypt::Perl::X509::Extension::policyMappings":"Crypt-Perl","MHonArc::UTF8::ISO8859_10":"MHonArc","Image::Info::JPEG":"Image-Info","Dancer::Continuation":"Dancer","Lemonldap::NG::Portal::Lib::LazyLoadedConfiguration":"Lemonldap-NG-Portal","Net::DNS::RR::TXT":"Net-DNS","Galileo::Page":"Galileo","Archive::Tar::Constant":"Archive-Tar","mod_perl2":"mod_perl","APR::BucketAlloc":"mod_perl","ExtUtils::XSSymSet":"perl","Lemonldap::NG::Portal::2F::Ext2F":"Lemonldap-NG-Portal","MHonArc::UTF8::CP949":"MHonArc","Perlbal::SocketSSL":"Perlbal","CryptX":"CryptX","Dancer2::Core::Response":"Dancer2","Mojo::Base":"Mojolicious","Plack::Handler::Apache1":"Plack","Net::DNS":"Net-DNS","Compress::Raw::Zlib":"Compress-Raw-Zlib","Pod::Perldoc::ToNroff":"Pod-Perldoc","Bio::Graphics::Browser2::RegionSearch":"GBrowse","Apache::Wyrd::Defaults":"Apache-Wyrd","App::Session":"App-Context","Apache::Debug":"mod_perl","Zonemaster::Backend::Log":"Zonemaster-Backend","Image::ExifTool::Pentax":"Image-ExifTool","Elive::Entity::Preloads":"Elive","Net::LDAP::Intermediate":"perl-ldap","SOAP::Transport::TCP::Server":"SOAP-Lite","Pinto::Action::Pin":"Pinto","YAML::Type::blessed":"YAML","HTML::EP::Install":"HTML-EP","Term::ReadLine::Gnu":"Term-ReadLine-Gnu","Amiga::ARexx":"perl","Moxy::Plugin::AuthorizationCutter":"Moxy","MHonArc::CharEnt::AppleRomanian":"MHonArc","Tk::NoteBook":"Tk","CGI::Session::DB_File":"CGI-Session","Jifty::Web::Form::Clickable":"Jifty","Apache::Wyrd::Form":"Apache-Wyrd","RPC::PlServer::Comm":"PlRPC","Kelp::Test":"Kelp","Pinto::DistributionSpec":"Pinto","Crypt::Cipher":"CryptX","Tk::Xlib":"Tk","Bio::Graphics::Browser2::Action":"GBrowse","Mojo::IOLoop::Stream":"Mojolicious","Archive::Tar::_io":"Archive-Tar","Module::Signature":"Module-Signature","Lemonldap::NG::Portal::2F::Register::Base":"Lemonldap-NG-Portal","Encode::Guess":"Encode","RT::Authen::ExternalAuth::LDAP":"RT-Authen-ExternalAuth","Image::Info::WBMP":"Image-Info","Crypt::Cipher::MULTI2":"CryptX","MojoMojo::Schema::Base::Result":"MojoMojo","Apache::Session::Browseable::Store::DBI":"Apache-Session-Browseable","ModPerl::TiPoolConfig":"mod_perl","Moxy::Plugin::OpenSocial":"Moxy","Lemonldap::NG::Portal::Main::Request":"Lemonldap-NG-Portal","APR::Request::Param":"libapreq2","Mojo::UserAgent::Transactor":"Mojolicious","Apache::SessionX::Store::File":"Apache-SessionX","Catalyst::Engine::HTTP":"Catalyst-Runtime","Net::DNS::RR::L64":"Net-DNS","Catalyst::Script::Test":"Catalyst-Runtime","XML::LibXML::NodeList":"XML-LibXML","Dezi":"Dezi","Plack::Session":"Plack-Middleware-Session","Pod::Perldoc::ToANSI":"Pod-Perldoc","Mojo::DynamicMethods":"Mojolicious","Net::LDAP::DSML":"perl-ldap","Kelp::Test::CookieJar":"Kelp","Perlbal::Plugin::Throttle::Store::Memcached":"Perlbal","Net::Server::Multiplex":"Net-Server","Kossy::BodyParser::MultiPart":"Kossy","Encode::Unicode":"Encode","Plack::Loader::Shotgun":"Plack","Catalyst::Exception::Go":"Catalyst-Runtime","Dancer::Response":"Dancer","Batch::Batchrun::Initialize":"Batch-Batchrun","PApp::I18n::PO_Writer":"PApp","MHonArc::UTF8::AppleCenteuro":"MHonArc","Pinto::Action::Unregister":"Pinto","ExtUtils::Liblist::Kid":"ExtUtils-MakeMaker","MHonArc::UTF8::CP1257":"MHonArc","Apache::Wyrd::ErrField":"Apache-Wyrd","Apache::Wyrd::Query":"Apache-Wyrd","Jifty::Plugin::OnlineDocs::Dispatcher":"Jifty","Log::Any::Proxy::Test":"Log-Any","Image::ExifTool::Geotag":"Image-ExifTool","Valiant::Filter::UcFirst":"Valiant","Mojo::Server::Morbo::Backend":"Mojolicious","Crypt::Perl::X::ASN1::Encode":"Crypt-Perl","GitLab::API::v4::Mock":"GitLab-API-v4","LWP::Protocol::gopher":"libwww-perl","Net::LDAP::Extension::SetPassword":"perl-ldap","GPIB::hp59306a":"GPIB","Dancer2::Session::YAML":"Dancer2","Image::ExifTool::PhaseOne":"Image-ExifTool","Crypt::Perl::X509v3":"Crypt-Perl","XML::Atom::Feed":"XML-Atom","MHonArc::UTF8::ISO8859_9":"MHonArc","Dancer::Renderer":"Dancer","Net::Server::Proto::SSL":"Net-Server","YAML::Mo":"YAML","Catalyst::Action::Serialize::YAML":"Catalyst-Action-REST","Net::Dropbear::XS::AuthState":"Net-Dropbear","Dancer::Logger::Note":"Dancer","Plack::Server::ServerSimple":"Plack","FileCache":"perl","ModPerl::RegistryLoader":"mod_perl","Zlib::OldDeflate":"IO-Compress","Imager::Color":"Imager","Catalyst::Response::Writer":"Catalyst-Runtime","Jifty::Script::Plugin":"Jifty","PApp::Lock":"PApp","Zonemaster::Backend::DB::MySQL":"Zonemaster-Backend","Image::ExifTool::PICT":"Image-ExifTool","Valiant::I18N::Tag":"Valiant","RPC::XML":"RPC-XML","Parallel::ForkManager::Child":"Parallel-ForkManager","Jifty::Plugin::Compat::CGI":"Jifty","Net::Dropbear::SSH":"Net-Dropbear","File::DataClass::Result":"File-DataClass","Dancer2::Core::Role::StandardResponses":"Dancer2","MojoMojo::Formatter::Emote":"MojoMojo","MojoMojo::Formatter::WikipediaLink":"MojoMojo","Apache::MP3::L10N::fr":"Apache-MP3","Mojolicious::Routes":"Mojolicious","Crypt::Mac::Poly1305":"CryptX","Apache::ReadConfig":"mod_perl","Plack::Request":"Plack","Bundle::Image::Info::Everything":"Image-Info","Test::Mojo":"Mojolicious","Net::LDAP::DSML::pp":"perl-ldap","Plack::App::URLMap":"Plack","CGI::Application::Plugin::RunmodeDeclare":"CGI-Application-Plugin-RunmodeDeclare","MojoMojo::Formatter::IDLink":"MojoMojo","IO::Uncompress::Adapter::Inflate":"IO-Compress","SOAP::Test":"SOAP-Lite","UI::Dialog::Screen::Druid":"UI-Dialog","Lemonldap::NG::Portal::Auth::_Ajax":"Lemonldap-NG-Portal","Galileo::DB::Schema":"Galileo","Catalyst::Action::SerializeBase":"Catalyst-Action-REST","attributes":"perl","App::Conf::File":"App-Context","Tk::Labelframe":"Tk","Spoon::Lookup":"Spoon","SOAP::Transport::POP3::Server":"SOAP-Lite","Dancer2::Core::Runner":"Dancer2","Pinto::Action::Diff":"Pinto","Tk::DragDrop::Local":"Tk","Dancer2::Core::Role::ConfigReader":"Dancer2","Lemonldap::NG::Portal::Plugins::CDA":"Lemonldap-NG-Portal","Crypt::PRNG::Fortuna":"CryptX","App::Authorization":"App-Context","ExtUtils::MM_Unix":"ExtUtils-MakeMaker","Mojolicious::Validator::Validation":"Mojolicious","Pinto::Locator::Mirror":"Pinto","Catalyst":"Catalyst-Runtime","Lemonldap::NG::Portal::Plugins::LocationDetect":"Lemonldap-NG-Portal","t::Markers":"perl","ModPerl::RegistryBB":"mod_perl","Bio::Graphics::Browser2::PadAlignment":"GBrowse","LWP::Protocol::ftp":"libwww-perl","UI::Dialog::Backend::Zenity":"UI-Dialog","Dancer::Exceptions":"Dancer","MojoMojo::Formatter::SyntaxHighlight":"MojoMojo","Dancer2::Core::Role::Template":"Dancer2","Crypt::Perl::ASN1::Encodee":"Crypt-Perl","Mail::Mailer::qmail":"MailTools","Net::SNMP::Transport::UDP6":"Net-SNMP","DBI::FAQ":"DBI","RPC::XML::datetime_iso8601":"RPC-XML","App::Pinto::Command::unpin":"Pinto","Net::Server::HTTP":"Net-Server","App::Conf":"App-Context","Plack::Session::State":"Plack-Middleware-Session","Image::ExifTool::GM":"Image-ExifTool","App::Pinto::Command::pull":"Pinto","Lemonldap::NG::Portal::Plugins::InitializePasswordReset":"Lemonldap-NG-Portal","Image::ExifTool::Lang::nl":"Image-ExifTool","DBIx::Class::Valiant::Util::Exception::BadParameterFK":"Valiant","Apache::MP3::L10N::no_no":"Apache-MP3","App::Context::Server":"App-Context","Mojo::Server::CGI":"Mojolicious","Bundle::Apache::ASP::Extra":"Apache-ASP","Proc::Daemon":"Proc-Daemon","Net::DNS::RR::SOA":"Net-DNS","XML::Twig::XPath::Namespace":"XML-Twig","APR::UUID":"mod_perl","Galileo::DB::Schema::Result::User":"Galileo","DBD::NullP::st":"DBI","MHonArc::UTF8::BIG5_ETEN":"MHonArc","Archive::Zip::BufferedFileHandle":"Archive-Zip","Lemonldap::NG::Portal::Plugins::DecryptValue":"Lemonldap-NG-Portal","RPC::XML::string":"RPC-XML","XML::LibXML::Boolean":"XML-LibXML","Jifty::Web::Form::Field::Uploads":"Jifty","Devel::StackTrace":"Devel-StackTrace","Image::ExifTool::Kodak":"Image-ExifTool","Net::IPAddress::Util::Collection::Tie":"Net-IPAddress-Util","Dancer::Object::Singleton":"Dancer","Apache::Wyrd::ShowParams":"Apache-Wyrd","Crypt::Digest::MD5":"CryptX","Crypt::Cipher::Skipjack":"CryptX","Apache::MP3::L10N::tr":"Apache-MP3","Lemonldap::NG::Portal::UserDB::DBI":"Lemonldap-NG-Portal","Tk::Photo":"Tk","Jifty::Plugin::User":"Jifty","Perlbal::ClientProxy":"Perlbal","Apache::ASP::CGI":"Apache-ASP","Tk::Stats":"Tk","Mojo::UserAgent::Server":"Mojolicious","Net::LDAP::Control::PasswordPolicy":"perl-ldap","Dancer::Timer":"Dancer","Apache::MP3::L10N::fi":"Apache-MP3","XAO::DO::Web::Page":"XAO-Web","DBD::Gofer::Policy::classic":"DBI","Crypt::Perl::X::ECDSA::NoCurveForNISTName":"Crypt-Perl","Log::Any::Adapter::Multiplex":"Log-Any","Image::ExifTool::OpenEXR":"Image-ExifTool","Jifty::DBI::Filter::SaltHash":"Jifty-DBI","Image::ExifTool::HTML":"Image-ExifTool","XML::LibXML::DocumentFragment":"XML-LibXML","Valiant::Validator::Format":"Valiant","Dpkg::Deps::Union":"Dpkg","Lemonldap::NG::Portal::UserDB::LDAP":"Lemonldap-NG-Portal","MojoMojo::Formatter::DocBook":"MojoMojo","Archive::Tar::Std::_io":"Archive-Tar","deprecate":"perl","Valiant::HTML::FormBuilder::DefaultModel":"Valiant","integer":"perl","DBI::Gofer::Execute":"DBI","Jifty::Action::Record::Execute":"Jifty","App::Cpan":"CPAN","ExtUtils::MM_Win32":"ExtUtils-MakeMaker","HTTP::Session2::ServerStore":"HTTP-Session2","CPAN::Queue::Item":"CPAN","Catalyst::Engine::HTTP::Restarter":"Catalyst-Runtime","DBI::common":"DBI","File::Spec::Win32":"PathTools","Lemonldap::NG::Portal::Plugins::SingleSession":"Lemonldap-NG-Portal","MHonArc::CharEnt::KOI8_U":"MHonArc","Lemonldap::NG::Portal::Captcha::ReCaptcha":"Lemonldap-NG-Portal","Apache::MP3::L10N::nn_no":"Apache-MP3","PalImg":"Perlbal","Encode::JP::H2Z":"Encode","LWP::DebugFile":"libwww-perl","Storable":"Storable","Image::ExifTool::BigTIFF":"Image-ExifTool"},"meta":{"commit":"5257f7b2ee4894009a4d5c4560fd9e54be4692ba","repo":"https://github.com/briandfoy/cpan-security-advisory.git","epoch":1734366400,"date":"Mon Dec 16 16:26:40 2024","generator":"util/generate"},"dists":{"YAML-LibYAML":{"main_module":"YAML::LibYAML","advisories":[{"cves":[],"distribution":"YAML-LibYAML","reported":"2016-03-10","affected_versions":["<0.69"],"references":["https://github.com/ingydotnet/yaml-libyaml-pm/issues/45"],"description":"Need SafeLoad and SafeDump analog to python\n","id":"CPANSA-YAML-LibYAML-2016-01","severity":null,"fixed_versions":[">=0.69"]},{"description":"scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.\n","references":["http://www.openwall.com/lists/oss-security/2014/11/29/3","http://www.openwall.com/lists/oss-security/2014/11/28/8","https://bitbucket.org/xi/libyaml/commits/2b9156756423e967cfd09a61d125d883fca6f4f2","http://www.securityfocus.com/bid/71349","http://secunia.com/advisories/59947","https://bitbucket.org/xi/libyaml/issue/10/wrapped-strings-cause-assert-failure","http://secunia.com/advisories/60944","http://www.openwall.com/lists/oss-security/2014/11/28/1","http://linux.oracle.com/errata/ELSA-2015-0100.html","http://secunia.com/advisories/62723","http://secunia.com/advisories/62705","http://secunia.com/advisories/62774","http://www.ubuntu.com/usn/USN-2461-2","http://www.ubuntu.com/usn/USN-2461-3","http://www.ubuntu.com/usn/USN-2461-1","http://rhn.redhat.com/errata/RHSA-2015-0100.html","http://www.debian.org/security/2014/dsa-3103","http://rhn.redhat.com/errata/RHSA-2015-0112.html","http://www.debian.org/security/2014/dsa-3102","http://www.debian.org/security/2014/dsa-3115","http://rhn.redhat.com/errata/RHSA-2015-0260.html","http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html","http://www.mandriva.com/security/advisories?name=MDVSA-2015:060","http://www.mandriva.com/security/advisories?name=MDVSA-2014:242","http://advisories.mageia.org/MGASA-2014-0508.html","http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html","http://secunia.com/advisories/62176","http://secunia.com/advisories/62174","http://secunia.com/advisories/62164","https://exchange.xforce.ibmcloud.com/vulnerabilities/99047","https://puppet.com/security/cve/cve-2014-9130"],"id":"CPANSA-YAML-LibYAML-2014-9130","severity":null,"fixed_versions":[">=0.54"],"cves":["CVE-2014-9130"],"reported":"2014-12-08","distribution":"YAML-LibYAML","affected_versions":["<0.53"]},{"cves":["CVE-2012-1152"],"affected_versions":[">0.38,<0.57"],"reported":"2012-09-09","distribution":"YAML-LibYAML","references":["https://bugzilla.redhat.com/show_bug.cgi?id=801738","https://rt.cpan.org/Public/Bug/Display.html?id=46507","http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077023.html","http://www.openwall.com/lists/oss-security/2012/03/10/4","http://www.openwall.com/lists/oss-security/2012/03/09/6","http://www.debian.org/security/2012/dsa-2432","http://www.securityfocus.com/bid/52381","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661548","http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077782.html","https://rt.cpan.org/Public/Bug/Display.html?id=75365","http://secunia.com/advisories/48317","http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077004.html","http://lists.opensuse.org/opensuse-updates/2012-08/msg00029.html","http://secunia.com/advisories/50277","http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html","https://exchange.xforce.ibmcloud.com/vulnerabilities/73856"],"description":"Multiple format string vulnerabilities in the error reporting functionality in the YAML::LibYAML (aka YAML-LibYAML and perl-YAML-LibYAML) module 0.38 for Perl allow remote attackers to cause a denial of service (process crash) via format string specifiers in a (1) YAML stream to the Load function, (2) YAML node to the load_node function, (3) YAML mapping to the load_mapping function, or (4) YAML sequence to the load_sequence function.\n","fixed_versions":[">=0.57"],"id":"CPANSA-YAML-LibYAML-2012-1152","severity":null}],"versions":[{"date":"2007-05-11T21:37:19","version":"0.01"},{"version":"0.02","date":"2007-05-15T06:37:59"},{"version":"0.03","date":"2007-05-19T22:23:53"},{"version":"0.04","date":"2007-05-21T05:19:05"},{"date":"2007-05-21T07:45:35","version":"0.05"},{"date":"2007-05-23T06:56:11","version":"0.06"},{"date":"2007-05-23T07:10:14","version":"0.07"},{"version":"0.08","date":"2007-05-26T04:58:43"},{"date":"2007-05-28T07:47:31","version":"0.09"},{"version":"0.10","date":"2007-05-28T10:30:28"},{"date":"2007-05-30T00:30:09","version":"0.11"},{"date":"2007-05-30T08:13:24","version":"0.12"},{"version":"0.14","date":"2007-05-30T09:38:37"},{"date":"2007-05-31T07:48:16","version":"0.15"},{"version":"0.16","date":"2007-05-31T21:05:50"},{"date":"2007-06-07T02:55:10","version":"0.17"},{"date":"2007-06-18T01:35:48","version":"0.18"},{"version":"0.19","date":"2007-06-18T08:06:43"},{"date":"2007-06-18T23:34:20","version":"0.20"},{"date":"2007-06-21T23:27:47","version":"0.21"},{"version":"0.22","date":"2007-06-22T07:42:47"},{"version":"0.23","date":"2007-06-23T01:17:58"},{"date":"2007-06-24T18:37:51","version":"0.24"},{"date":"2007-06-25T01:40:09","version":"0.25"},{"date":"2007-06-26T21:00:04","version":"0.26"},{"version":"0.27","date":"2008-06-07T05:37:26"},{"version":"0.29","date":"2008-11-12T07:09:30"},{"date":"2009-01-11T11:00:54","version":"0.30"},{"date":"2009-01-12T09:26:53","version":"0.31"},{"date":"2009-01-12T09:34:50","version":"0.32"},{"version":"0.33","date":"2010-04-15T01:01:10"},{"date":"2010-09-23T22:43:36","version":"0.34"},{"version":"0.35","date":"2011-04-03T16:41:03"},{"version":"0.37","date":"2011-09-29T18:10:52"},{"date":"2012-01-04T06:58:09","version":"0.38"},{"date":"2013-02-12T02:09:38","version":"0.39"},{"version":"0.40","date":"2013-03-12T18:07:29"},{"version":"0.41","date":"2013-03-13T17:36:09"},{"date":"2014-07-11T22:30:03","version":"0.42"},{"version":"0.43","date":"2014-07-12T17:05:47"},{"date":"2014-07-13T22:24:47","version":"0.44"},{"version":"0.45","date":"2014-08-04T08:23:39"},{"version":"0.46","date":"2014-08-05T17:33:54"},{"date":"2014-08-09T07:30:51","version":"0.47"},{"date":"2014-08-16T04:07:46","version":"0.48"},{"version":"0.49","date":"2014-08-16T14:31:04"},{"version":"0.50","date":"2014-08-16T19:58:18"},{"date":"2014-08-16T21:29:48","version":"0.51"},{"date":"2014-08-23T04:04:49","version":"0.52"},{"version":"0.53","date":"2014-11-28T17:22:06"},{"version":"0.54","date":"2014-11-29T19:48:26"},{"date":"2014-12-23T01:27:43","version":"0.55"},{"date":"2015-01-16T03:23:05","version":"0.56"},{"date":"2015-01-16T04:06:00","version":"0.57"},{"date":"2015-01-21T05:02:46","version":"0.58"},{"version":"0.59","date":"2015-01-26T23:05:30"},{"version":"0.60","date":"2016-02-09T19:36:50"},{"version":"0.61","date":"2016-02-20T18:05:06"},{"version":"0.62","date":"2016-02-22T15:47:18"},{"date":"2016-07-03T17:33:17","version":"0.62_001"},{"date":"2016-07-03T17:40:25","version":"0.62_002"},{"version":"0.63","date":"2016-07-08T14:41:45"},{"version":"0.71","date":"2016-09-08T09:56:51"},{"date":"2016-09-13T14:44:45","version":"0.73"},{"date":"2017-01-03T04:10:44","version":"0.63_001"},{"version":"0.63_002","date":"2017-04-03T18:56:26"},{"version":"0.64","date":"2017-04-07T18:32:36"},{"date":"2017-05-18T21:10:50","version":"0.65"},{"date":"2017-08-13T11:49:59","version":"0.65_001"},{"date":"2017-08-17T18:07:26","version":"0.66"},{"version":"0.66_001","date":"2017-11-10T21:07:40"},{"version":"0.66_002","date":"2017-11-14T20:03:09"},{"version":"0.67","date":"2017-11-15T18:00:42"},{"date":"2017-12-16T21:50:01","version":"0.67_001"},{"date":"2017-12-18T19:01:27","version":"0.68"},{"date":"2017-12-20T18:38:40","version":"0.68_001"},{"date":"2017-12-22T11:40:39","version":"0.68_002"},{"version":"0.69","date":"2017-12-26T17:37:54"},{"version":"0.69_001","date":"2018-06-07T20:16:52"},{"date":"2018-06-09T19:53:37","version":"0.70"},{"version":"0.70_001","date":"2018-06-27T17:14:44"},{"version":"0.72","date":"2018-07-08T15:04:37"},{"version":"0.72_01","date":"2018-08-31T15:38:28"},{"version":"0.74","date":"2018-09-01T01:07:45"},{"date":"2018-10-14T14:09:48","version":"0.74_001"},{"version":"0.75","date":"2018-11-03T13:17:49"},{"date":"2018-12-16T17:28:49","version":"0.75_001"},{"date":"2018-12-30T19:11:20","version":"0.76"},{"date":"2019-03-13T18:47:41","version":"0.76_001"},{"date":"2019-04-15T20:56:14","version":"0.77"},{"date":"2019-05-15T18:20:47","version":"0.77_001"},{"version":"0.78","date":"2019-05-18T16:36:19"},{"version":"0.78_001","date":"2019-05-30T16:01:02"},{"version":"0.78_002","date":"2019-06-10T11:10:47"},{"version":"0.79","date":"2019-06-11T19:36:40"},{"date":"2019-08-21T16:49:31","version":"0.79_001"},{"date":"2019-08-22T11:18:19","version":"0.80"},{"date":"2020-01-27T22:06:22","version":"0.81"},{"date":"2020-05-02T18:40:13","version":"0.82"},{"version":"0.82_001","date":"2021-05-02T00:16:51"},{"date":"2021-05-08T21:52:55","version":"0.83"},{"date":"2022-09-03T19:20:07","version":"0.84"},{"version":"0.84_001","date":"2022-09-09T15:31:45"},{"version":"0.84_002","date":"2022-09-09T18:12:56"},{"date":"2022-09-09T19:01:06","version":"0.84_003"},{"version":"0.85","date":"2022-09-12T12:21:48"},{"version":"0.86","date":"2023-01-26T02:35:03"},{"version":"0.86_001","date":"2023-05-04T10:47:26"},{"date":"2023-05-04T19:38:30","version":"0.87"},{"version":"0.88","date":"2023-05-12T12:28:46"},{"version":"0.88_001","date":"2024-01-24T21:55:26"},{"version":"0.89","date":"2024-01-27T00:45:43"},{"version":"0.89_001","date":"2024-05-26T13:07:57"},{"version":"0.90","date":"2024-09-06T21:47:43"},{"date":"2024-09-06T22:09:50","version":"v0.901.0"},{"version":"v0.901.1","date":"2024-09-09T20:42:09"},{"version":"v0.902.0","date":"2024-09-20T19:48:00"}]},"CGI-Session":{"versions":[{"date":"2001-10-30T08:59:10","version":"0.01"},{"date":"2002-05-10T12:04:15","version":"2.0"},{"version":"2.1","date":"2002-05-10T17:38:46"},{"version":"2.2","date":"2002-05-14T18:21:39"},{"version":"2.4","date":"2002-05-17T18:02:23"},{"date":"2002-05-27T09:52:46","version":"2.7"},{"version":"2.9","date":"2002-06-06T08:08:21"},{"date":"2002-06-06T08:36:26","version":"2.91"},{"version":"2.92","date":"2002-06-18T18:15:57"},{"date":"2002-08-26T08:23:54","version":"2.94"},{"date":"2002-11-27T07:20:47","version":"3.1"},{"version":"3.2","date":"2002-11-27T12:27:59"},{"date":"2002-11-28T03:19:31","version":"v3.2.2.1"},{"date":"2002-11-28T03:26:41","version":"3.3"},{"version":"3.4","date":"2002-11-28T03:44:39"},{"date":"2002-11-28T06:55:29","version":"3.5"},{"date":"2002-11-28T17:12:32","version":"3.6"},{"version":"3.7","date":"2002-11-29T21:29:53"},{"date":"2002-12-03T16:26:55","version":"3.8"},{"version":"3.9","date":"2002-12-04T07:37:02"},{"date":"2002-12-09T09:02:18","version":"3.10"},{"date":"2002-12-09T20:09:24","version":"3.11"},{"date":"2003-03-09T11:26:21","version":"3.91"},{"date":"2003-03-10T02:42:16","version":"3.92"},{"date":"2003-03-14T13:21:20","version":"3.93"},{"version":"3.94","date":"2003-05-02T20:12:40"},{"version":"3.95","date":"2003-07-26T13:51:31"},{"version":"4.00_01","date":"2005-02-09T08:35:23"},{"version":"4.00_02","date":"2005-02-09T09:54:17"},{"version":"4.00_03","date":"2005-02-11T08:23:00"},{"version":"4.00_04","date":"2005-02-17T03:24:21"},{"date":"2005-02-22T17:56:43","version":"4.00_05"},{"version":"4.00_06","date":"2005-02-24T18:46:45"},{"date":"2005-03-13T19:18:37","version":"4.00_07"},{"date":"2005-03-15T16:48:17","version":"4.00_08"},{"version":"4.00_09","date":"2005-07-22T02:00:21"},{"date":"2005-09-01T05:57:49","version":"4.00"},{"version":"4.01","date":"2005-09-01T16:25:46"},{"date":"2005-09-02T15:51:20","version":"4.02"},{"version":"4.02_01","date":"2005-09-24T02:12:22"},{"date":"2005-10-05T23:22:54","version":"4.03"},{"date":"2006-03-02T03:00:28","version":"4.04"},{"date":"2006-03-04T00:08:26","version":"4.05"},{"version":"4.06","date":"2006-03-09T03:13:06"},{"version":"4.07","date":"2006-03-09T12:09:28"},{"date":"2006-03-16T02:38:25","version":"4.08"},{"date":"2006-03-17T04:08:57","version":"4.09"},{"version":"4.10","date":"2006-03-28T07:00:52"},{"date":"2006-04-03T19:33:30","version":"4.11"},{"version":"4.12","date":"2006-04-07T14:34:06"},{"version":"4.13","date":"2006-04-12T17:05:18"},{"date":"2006-06-11T11:36:57","version":"4.14"},{"date":"2006-11-24T14:10:38","version":"4.20_1"},{"version":"4.20","date":"2006-12-05T02:08:37"},{"date":"2008-03-22T02:42:57","version":"4.29_1"},{"version":"4.29_2","date":"2008-03-28T01:45:56"},{"date":"2008-04-26T01:31:34","version":"4.30"},{"date":"2008-06-16T14:44:06","version":"4.31"},{"date":"2008-06-17T21:35:03","version":"4.32"},{"version":"4.33","date":"2008-07-08T01:27:59"},{"version":"4.34","date":"2008-07-13T02:39:59"},{"version":"4.35","date":"2008-07-16T00:36:46"},{"date":"2008-09-13T15:45:06","version":"4.36"},{"version":"4.37","date":"2008-10-23T02:57:30"},{"date":"2008-11-01T03:47:46","version":"4.38"},{"date":"2008-12-16T01:22:42","version":"4.39"},{"date":"2009-01-03T01:18:15","version":"4.40"},{"version":"4.41","date":"2009-03-21T02:01:09"},{"date":"2009-08-26T13:38:39","version":"4.42"},{"date":"2010-12-12T00:32:27","version":"4.43"},{"date":"2011-06-06T20:48:07","version":"4.44"},{"date":"2011-07-02T01:33:33","version":"4.45"},{"date":"2011-07-08T14:34:42","version":"4.46"},{"version":"4.47","date":"2011-07-08T19:31:44"},{"version":"4.48","date":"2011-07-11T13:02:37"},{"date":"2021-02-08T07:00:20","version":"4.49"}],"main_module":"CGI::Session","advisories":[{"severity":null,"id":"CPANSA-CGI-Session-2006-1279","fixed_versions":[],"description":"CGI::Session 4.03-1 allows local users to overwrite arbitrary files via a symlink attack on temporary files used by (1) Driver::File, (2) Driver::db_file, and possibly (3) Driver::sqlite.\n","references":["http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=356555","http://secunia.com/advisories/19211","http://www.securityfocus.com/bid/17177","http://www.osvdb.org/23865","http://www.vupen.com/english/advisories/2006/0946","https://exchange.xforce.ibmcloud.com/vulnerabilities/25285"],"distribution":"CGI-Session","reported":"2006-03-19","affected_versions":["<4.10"],"cves":["CVE-2006-1279"]},{"distribution":"CGI-Session","reported":"2006-04-06","affected_versions":["<4.12"],"cves":[],"id":"CPANSA-CGI-Session-2006-01","severity":null,"fixed_versions":[">=4.12"],"description":"possible SQL injection attack\n","references":["https://rt.cpan.org/Public/Bug/Display.html?id=18578"]}]},"Apache-ASP":{"versions":[{"date":"1998-06-24T02:10:51","version":"0.01"},{"date":"1998-07-11T01:48:14","version":"0.02"},{"date":"1998-09-14T11:13:32","version":"0.03"},{"version":"0.04","date":"1998-10-12T07:50:56"},{"date":"1998-10-18T21:29:19","version":"0.05"},{"version":"0.08","date":"1999-02-06T06:04:50"},{"version":"0.09","date":"1999-04-22T08:30:57"},{"date":"1999-06-24T20:04:52","version":"0.11"},{"date":"1999-07-02T07:05:05","version":"0.12"},{"version":"0.14","date":"1999-07-29T10:58:20"},{"version":"0.15","date":"1999-08-25T02:02:31"},{"date":"1999-09-22T20:54:01","version":"0.16"},{"version":"0.17","date":"1999-11-16T04:44:48"},{"version":"0.18","date":"2000-02-04T02:14:14"},{"date":"2000-07-03T13:08:54","version":"1.91"},{"date":"2000-07-03T22:43:45","version":"1.93"},{"date":"2000-07-11T01:44:02","version":"1.95"},{"date":"2000-07-16T07:17:39","version":"2.00"},{"date":"2000-07-22T23:31:36","version":"2.01"},{"date":"2000-08-02T00:11:15","version":"2.03"},{"date":"2000-11-26T19:15:48","version":"2.07"},{"version":"2.09","date":"2001-01-31T04:03:17"},{"version":"2.11","date":"2001-05-30T01:37:39"},{"date":"2001-06-12T00:41:33","version":"2.15"},{"version":"2.17","date":"2001-06-18T02:35:48"},{"version":"2.19","date":"2001-07-11T05:27:22"},{"date":"2001-08-05T23:01:50","version":"2.21"},{"version":"2.23","date":"2001-10-11T07:54:39"},{"version":"2.25","date":"2001-10-11T23:34:01"},{"version":"2.27","date":"2001-11-01T01:11:12"},{"date":"2001-11-19T21:41:12","version":"2.29"},{"version":"2.31","date":"2002-01-22T09:52:49"},{"date":"2002-04-30T09:12:20","version":"2.33"},{"version":"2.35","date":"2002-05-30T19:47:22"},{"date":"2002-07-03T21:11:15","version":"2.37"},{"version":"2.39","date":"2002-09-12T08:16:20"},{"version":"2.41","date":"2002-09-30T06:35:47"},{"version":"2.45","date":"2002-10-14T04:01:36"},{"date":"2002-11-07T02:03:41","version":"2.47"},{"date":"2002-11-11T07:15:21","version":"2.49"},{"date":"2003-02-10T21:11:34","version":"2.51"},{"version":"2.53","date":"2003-04-10T16:27:14"},{"version":"2.55","date":"2003-08-10T07:39:57"},{"date":"2004-01-29T08:30:48","version":"2.57"},{"date":"2005-05-24T05:52:39","version":"2.59"},{"version":"2.61","date":"2008-05-25T23:07:57"},{"date":"2011-10-02T19:18:10","version":"2.62"},{"version":"2.62","date":"2012-02-13T23:15:04"},{"version":2.63,"date":"2018-03-15T05:28:37"}],"main_module":"Apache::ASP","advisories":[{"distribution":"Apache-ASP","reported":"2000-07-10","affected_versions":["<1.95"],"cves":[],"id":"CPANSA-Apache-ASP-2000-01","severity":null,"fixed_versions":[">=1.95"],"references":["https://metacpan.org/release/CHAMAS/Apache-ASP-2.63/source/README"],"description":"A bug would allow a malicious user possible writing of files in the same directory as the source.asp script.\n"}]},"WWW-Mechanize":{"advisories":[{"fixed_versions":[">=1.05_03"],"id":"CPANSA-WWW-Mechanize-2004-01","severity":null,"description":"find_link() uses eval().\n","references":["https://metacpan.org/dist/WWW-Mechanize/changes"],"affected_versions":["<1.05_03"],"reported":"2004-10-31","distribution":"WWW-Mechanize","cves":[]}],"main_module":"WWW::Mechanize","versions":[{"version":"0.30","date":"2002-09-10T21:50:10"},{"date":"2002-09-13T20:19:21","version":"0.31"},{"date":"2002-10-24T04:25:30","version":"0.32"},{"version":"0.33","date":"2003-01-16T16:05:31"},{"date":"2003-01-22T23:57:57","version":"0.35"},{"date":"2003-02-04T17:40:03","version":"0.36"},{"date":"2003-03-04T21:13:29","version":"0.37"},{"version":"0.38","date":"2003-03-25T05:52:17"},{"version":"0.39","date":"2003-04-02T05:31:16"},{"version":"0.40","date":"2003-04-20T02:56:53"},{"date":"2003-05-23T04:29:22","version":"0.41"},{"version":"0.42","date":"2003-05-27T03:44:25"},{"date":"2003-05-29T14:30:01","version":"0.43"},{"version":"0.44","date":"2003-06-05T17:16:31"},{"version":"0.45","date":"2003-06-17T04:25:04"},{"date":"2003-06-20T16:17:58","version":"0.46"},{"date":"2003-06-22T03:54:22","version":"0.47"},{"version":"0.48","date":"2003-06-22T18:56:42"},{"version":"0.49","date":"2003-06-23T19:49:13"},{"date":"2003-06-24T14:54:50","version":"0.50"},{"version":"0.51","date":"2003-06-30T02:43:06"},{"date":"2003-07-08T23:52:55","version":"0.52"},{"date":"2003-07-17T17:26:47","version":"0.53"},{"version":"0.54","date":"2003-07-20T05:50:27"},{"version":"0.55","date":"2003-07-22T17:15:43"},{"date":"2003-07-24T17:25:57","version":"0.56"},{"version":"0.57","date":"2003-08-01T04:36:32"},{"version":"0.58","date":"2003-08-15T04:41:26"},{"date":"2003-09-04T05:33:00","version":"0.59"},{"version":"0.60","date":"2003-09-23T04:32:57"},{"version":"0.61","date":"2003-10-06T23:41:02"},{"version":"0.62","date":"2003-10-08T01:55:58"},{"version":"0.63","date":"2003-10-13T20:24:52"},{"version":"0.64","date":"2003-10-24T04:57:15"},{"date":"2003-11-10T06:19:18","version":"0.65"},{"version":"0.66","date":"2003-11-13T21:09:41"},{"date":"2003-11-26T05:21:34","version":"0.69_01"},{"date":"2003-12-01T05:52:38","version":"0.70"},{"version":"0.71_01","date":"2003-12-22T05:53:11"},{"version":"0.71_02","date":"2003-12-22T21:01:12"},{"date":"2004-01-13T04:45:37","version":"0.72"},{"version":"0.73_01","date":"2004-02-29T05:58:51"},{"date":"2004-03-03T05:57:51","version":"0.73_02"},{"date":"2004-03-21T06:08:45","version":"0.73_03"},{"version":"0.74","date":"2004-03-23T05:41:11"},{"version":"0.75_01","date":"2004-03-28T04:54:18"},{"date":"2004-04-05T05:01:50","version":"0.75_02"},{"date":"2004-04-08T03:05:29","version":"0.76"},{"date":"2004-04-10T05:55:21","version":"1.00"},{"version":"1.02","date":"2004-04-14T04:14:17"},{"version":"1.03_01","date":"2004-05-27T20:23:15"},{"version":"1.03_02","date":"2004-08-17T04:10:41"},{"date":"2004-09-16T04:32:03","version":"1.04"},{"version":"1.05_01","date":"2004-10-01T02:18:55"},{"date":"2004-10-02T22:08:55","version":"1.05_02"},{"date":"2004-11-01T03:25:19","version":"1.05_03"},{"version":"1.05_04","date":"2004-11-06T05:39:06"},{"date":"2004-12-08T21:25:06","version":"1.06"},{"date":"2004-12-24T07:08:27","version":"1.08"},{"version":"1.10","date":"2005-02-02T05:58:14"},{"date":"2005-02-14T06:21:29","version":"1.11_01"},{"date":"2005-02-22T04:05:23","version":"1.11_02"},{"date":"2005-02-25T05:50:52","version":"1.12"},{"version":"1.13_01","date":"2005-04-12T19:32:06"},{"version":"1.14","date":"2005-08-30T22:32:23"},{"version":"1.16","date":"2005-10-28T22:38:43"},{"version":"1.17_01","date":"2006-01-12T22:26:07"},{"date":"2006-02-02T06:32:25","version":"1.18"},{"date":"2006-08-08T05:13:01","version":"1.19_02"},{"version":"1.20","date":"2006-08-19T06:44:58"},{"version":"1.21_01","date":"2006-09-18T22:22:26"},{"version":"1.21_02","date":"2006-10-04T18:17:54"},{"version":"1.21_03","date":"2006-10-07T06:26:26"},{"version":"1.21_04","date":"2006-10-08T02:39:57"},{"date":"2007-03-02T06:09:51","version":"1.22"},{"date":"2007-05-11T21:01:11","version":"1.24"},{"date":"2007-05-16T05:27:55","version":"1.26"},{"version":"1.29_01","date":"2007-05-22T19:16:39"},{"version":"1.30","date":"2007-05-25T02:37:45"},{"date":"2007-09-18T04:39:11","version":"1.31_01"},{"version":"1.31_02","date":"2007-10-25T16:59:57"},{"date":"2007-10-30T17:09:44","version":"1.32"},{"date":"2007-12-10T06:39:14","version":"1.34"},{"date":"2008-09-28T04:52:28","version":"1.49_01"},{"version":"1.50","date":"2008-10-27T04:12:02"},{"date":"2008-11-06T21:12:28","version":"1.51_01"},{"version":"1.51_02","date":"2008-11-18T07:34:58"},{"date":"2008-11-20T17:07:18","version":"1.51_03"},{"version":"1.52","date":"2008-11-25T15:56:37"},{"version":"1.54","date":"2009-01-12T06:51:13"},{"version":"1.55_01","date":"2009-07-06T17:20:24"},{"date":"2009-07-10T22:13:25","version":"1.56"},{"version":"1.58","date":"2009-07-14T03:40:28"},{"version":"1.60","date":"2009-08-17T06:04:34"},{"date":"2010-04-11T04:14:18","version":"1.62"},{"version":"1.64","date":"2010-07-01T15:49:38"},{"date":"2010-09-10T22:10:32","version":"1.66"},{"version":"1.67_01","date":"2011-04-07T05:12:31"},{"date":"2011-04-21T15:11:30","version":"1.68"},{"date":"2011-08-01T21:49:08","version":"1.69_01"},{"version":"1.70","date":"2011-08-26T17:52:15"},{"version":"1.71","date":"2011-11-25T18:39:23"},{"version":"1.72","date":"2012-02-02T23:40:39"},{"version":"1.72_01","date":"2012-03-24T16:20:29"},{"version":"1.72_02","date":"2012-04-27T00:35:00"},{"version":"1.73","date":"2013-08-24T04:33:44"},{"version":"1.74","date":"2015-01-24T05:52:57"},{"version":"1.75","date":"2015-06-03T03:27:34"},{"version":"1.76","date":"2016-07-29T16:21:58"},{"date":"2016-08-05T16:58:03","version":"1.77"},{"date":"2016-08-08T13:30:07","version":"1.78"},{"date":"2016-09-17T04:05:20","version":"1.79"},{"version":"1.80","date":"2016-09-25T02:46:39"},{"version":"1.81","date":"2016-10-06T12:55:47"},{"date":"2016-10-07T13:50:48","version":"1.82"},{"date":"2016-10-14T20:59:34","version":"1.83"},{"date":"2017-03-07T18:46:19","version":"1.84"},{"date":"2017-06-28T22:11:34","version":"1.85"},{"version":"1.86","date":"2017-07-04T15:51:05"},{"date":"2018-02-07T22:07:28","version":"1.87"},{"date":"2018-03-23T15:41:01","version":"1.88"},{"version":"1.89","date":"2018-10-18T19:56:43"},{"version":"1.90","date":"2018-11-12T18:53:49"},{"date":"2019-01-10T19:04:12","version":"1.91"},{"version":"1.92","date":"2019-08-24T01:02:55"},{"date":"2019-10-04T21:10:14","version":"1.93"},{"date":"2019-10-10T13:15:13","version":"1.94"},{"date":"2019-10-28T13:17:10","version":"1.95"},{"version":"1.96","date":"2020-02-21T02:27:01"},{"version":"1.97","date":"2020-05-14T00:48:07"},{"date":"2020-05-25T17:08:10","version":"1.98"},{"version":"1.99","date":"2020-06-08T15:44:13"},{"date":"2020-06-09T19:17:21","version":"2.00"},{"version":"2.01","date":"2020-09-18T17:52:29"},{"version":"2.02","date":"2020-10-13T13:53:04"},{"date":"2020-11-10T14:49:20","version":"2.03"},{"version":"2.04","date":"2021-08-06T12:35:04"},{"date":"2021-09-21T14:23:14","version":"2.05"},{"date":"2021-10-25T21:00:18","version":"2.06"},{"date":"2022-04-29T15:40:57","version":"2.07"},{"date":"2022-05-30T17:33:59","version":"2.08"},{"version":"2.09","date":"2022-06-14T14:22:59"},{"version":"2.10","date":"2022-07-04T21:09:58"},{"date":"2022-07-17T17:27:26","version":"2.11"},{"version":"2.12","date":"2022-07-20T06:47:33"},{"version":"2.13","date":"2022-07-29T09:50:42"},{"date":"2022-08-15T19:26:39","version":"2.14"},{"version":"2.15","date":"2022-08-21T08:24:07"},{"version":"2.16","date":"2023-02-11T12:11:44"},{"date":"2023-04-27T15:49:35","version":"2.17"},{"date":"2024-01-30T14:34:27","version":"2.18"},{"version":"2.19","date":"2024-09-16T15:28:35"}]},"Apache-MP3":{"versions":[{"version":"1.00","date":"2000-03-20T13:00:07"},{"version":"2.00","date":"2000-05-27T04:19:21"},{"version":"2.01","date":"2000-05-27T04:34:42"},{"date":"2000-05-28T16:17:59","version":"2.02"},{"date":"2000-08-23T13:46:23","version":"2.04"},{"version":"2.05","date":"2000-08-25T14:45:54"},{"date":"2000-08-26T03:41:07","version":"2.06"},{"date":"2000-08-31T20:28:28","version":"2.08"},{"date":"2000-09-03T18:31:17","version":"2.10"},{"version":"2.11","date":"2000-09-09T22:12:04"},{"version":"2.12","date":"2000-11-21T22:15:07"},{"date":"2000-12-31T04:29:03","version":"2.14"},{"version":"2.15","date":"2001-01-02T03:37:33"},{"date":"2001-05-01T02:43:47","version":"2.16"},{"version":"2.18","date":"2001-06-10T22:02:46"},{"date":"2001-07-17T01:39:59","version":"2.19"},{"version":"2.20","date":"2001-09-26T01:14:42"},{"version":"2.22","date":"2002-01-06T20:38:33"},{"date":"2002-05-31T01:12:04","version":"2.26"},{"date":"2002-08-16T04:18:25","version":"3.00"},{"version":"3.01","date":"2002-08-18T17:41:46"},{"date":"2002-10-14T03:26:03","version":"3.03"},{"version":"3.04","date":"2003-02-15T00:51:19"},{"version":"3.05","date":"2003-10-06T14:12:34"},{"date":"2006-04-15T01:26:38","version":"4.00"}],"advisories":[{"fixed_versions":[">=2.15"],"severity":null,"id":"CPANSA-Apache-MP3-2001-01","description":"A security bug allowed people to bypass the AllowDownload setting.\n","references":["https://metacpan.org/dist/Apache-MP3/changes"],"affected_versions":["<2.15"],"reported":"2001-01-01","distribution":"Apache-MP3","cves":[]}],"main_module":"Apache::MP3"},"Mojolicious-Plugin-LazyImage":{"versions":[{"date":"2017-12-28T10:40:31","version":"0.01"}],"main_module":"Mojolicious::Plugin::LazyImage","advisories":[{"description":"pdoc provides API Documentation for Python Projects. Documentation generated with `pdoc --math` linked to JavaScript files from polyfill.io. The polyfill.io CDN has been sold and now serves malicious code. This issue has been fixed in pdoc 14.5.1.\n","references":["https://github.com/mitmproxy/pdoc/pull/703","https://github.com/mitmproxy/pdoc/security/advisories/GHSA-5vgj-ggm4-fg62","https://sansec.io/research/polyfill-supply-chain-attack","https://github.com/briandfoy/cpan-security-advisory/issues/155","https://stackdiary.com/polyfill-compromise-hits-100000-sites-in-a-supply-chain-attack/"],"severity":null,"fixed_versions":[],"cves":["CVE-2024-38526"],"reported":"2024-06-26","distribution":"Mojolicious-Plugin-LazyImage","affected_versions":["<=0.01"],"id":"CPANSA-Mojolicious-Plugin-LazyImage-2024-38526","embedded_vulnerability":{"name":"polyfill.io","distributed_version":null}}]},"Alien-PCRE2":{"advisories":[{"references":["https://bugs.php.net/bug.php?id=78338","https://bugs.exim.org/show_bug.cgi?id=2421","https://bugzilla.redhat.com/show_bug.cgi?id=1735494","https://vcs.pcre.org/pcre2?view=revision&revision=1092","https://security.gentoo.org/glsa/202006-16","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQRAHYHLRNMBTPR3KXVM27NSZP3KTOPI/"],"description":"An out-of-bounds read was discovered in PCRE before 10.34 when the pattern \\X is JIT compiled and used to match specially crafted subjects in non-UTF mode. Applications that use PCRE to parse untrusted input may be vulnerable to this flaw, which would allow an attacker to crash the application. The flaw occurs in do_extuni_no_utf in pcre2_jit_compile.c.\n","severity":"high","fixed_versions":[">=0.016000"],"comment":"This Alien module fetches libpcre2 sources from the network. It tries to get the latest unless you set environment variables to get a different version.\n","cves":["CVE-2019-20454"],"reported":"2020-02-14","distribution":"Alien-PCRE2","affected_versions":["<0.016000"],"id":"CPANSA-Alien-PCRE2-2019-20454"}],"main_module":"Alien::PCRE2","versions":[{"version":"0.001000","date":"2017-06-30T23:18:21"},{"date":"2017-07-01T02:48:02","version":"0.002000"},{"version":"0.003000","date":"2017-07-02T04:51:35"},{"date":"2017-07-02T06:53:29","version":"0.004000"},{"version":"0.005000","date":"2017-07-02T09:21:41"},{"version":"0.006000","date":"2017-07-03T01:03:23"},{"version":"0.007000","date":"2017-07-12T17:40:07"},{"version":"0.008000","date":"2017-07-13T07:43:28"},{"version":"0.009000","date":"2017-07-15T10:31:20"},{"version":"0.010000","date":"2017-07-17T04:44:54"},{"date":"2017-07-18T18:30:06","version":"0.011000"},{"date":"2017-07-19T05:07:21","version":"0.012000"},{"date":"2017-07-23T04:43:01","version":"0.013000"},{"date":"2017-11-01T02:50:14","version":"0.014000"},{"date":"2017-11-08T00:42:33","version":"0.015000"},{"date":"2022-05-08T20:22:53","version":"0.016000"},{"version":"0.017000","date":"2023-02-04T00:21:59"}]},"DBI":{"versions":[{"version":"0.64","date":"1995-10-27T08:14:00"},{"version":"0.67","date":"1996-02-15T22:07:00"},{"version":"0.68","date":"1996-04-22T10:22:00"},{"date":"1996-05-07T19:46:00","version":"0.69"},{"date":"1996-06-16T21:08:00","version":"0.70"},{"version":"0.71","date":"1996-07-10T00:49:00"},{"date":"1996-09-23T16:33:00","version":"0.72"},{"date":"1996-10-15T00:58:00","version":"0.73"},{"date":"1997-01-14T16:59:00","version":"0.74"},{"version":"0.75","date":"1997-01-27T21:59:00"},{"date":"1997-02-03T18:54:00","version":"0.76"},{"date":"1997-02-21T14:27:00","version":"0.77"},{"version":"0.78","date":"1997-03-28T14:36:00"},{"version":"0.79","date":"1997-04-07T18:28:00"},{"date":"1997-05-07T11:45:00","version":"0.80"},{"version":"0.81","date":"1997-05-07T14:05:00"},{"version":"0.82","date":"1997-05-23T15:56:00"},{"version":"0.83","date":"1997-06-11T21:40:00"},{"date":"1997-06-20T15:36:00","version":"0.84"},{"version":"0.85","date":"1997-06-25T10:25:00"},{"version":"0.001","date":"1997-07-16T16:38:00"},{"version":"0.87","date":"1997-07-18T11:27:00"},{"date":"1997-07-22T21:27:00","version":"0.88"},{"version":"0.89","date":"1997-07-25T13:46:55"},{"date":"1997-09-05T19:38:52","version":"0.90"},{"version":"0.91","date":"1997-12-10T17:15:14"},{"version":"0.92","date":"1998-02-05T20:45:45"},{"date":"1998-02-13T15:21:52","version":"0.93"},{"version":"0.94","date":"1998-08-10T03:23:46"},{"version":"0.95","date":"1998-08-11T13:21:19"},{"date":"1998-08-14T20:38:42","version":"1.00"},{"version":"1.01","date":"1998-09-02T14:59:47"},{"date":"1998-09-04T12:29:52","version":"1.02"},{"version":"1.06","date":"1999-01-18T21:52:15"},{"date":"1999-05-13T01:49:11","version":"1.08"},{"date":"1999-06-02T13:44:40","version":"1.08"},{"version":"1.09","date":"1999-06-09T20:57:59"},{"version":"1.10","date":"1999-06-13T23:52:03"},{"version":"1.11","date":"1999-06-17T13:22:36"},{"date":"1999-06-29T23:07:41","version":"1.12"},{"date":"1999-07-12T03:28:41","version":"1.13"},{"date":"2000-06-11T02:39:59","version":"1.03_80"},{"date":"2000-06-14T20:30:57","version":"1.14"},{"version":"1.15","date":"2001-03-30T15:03:31"},{"version":"1.16","date":"2001-05-29T23:25:57"},{"version":"1.17","date":"2001-06-04T17:12:30"},{"date":"2001-06-04T19:00:37","version":"1.18"},{"version":"1.19","date":"2001-07-20T22:29:24"},{"date":"2001-08-24T23:32:10","version":"1.20"},{"date":"2002-01-10T15:25:45","version":"1.201"},{"date":"2002-02-07T03:30:16","version":"1.21"},{"date":"2002-03-13T14:18:00","version":"1.21"},{"date":"2002-05-22T13:42:15","version":"1.22"},{"date":"2002-05-25T17:38:03","version":"1.23"},{"date":"2002-06-05T03:32:38","version":"1.24"},{"date":"2002-06-05T22:42:04","version":"1.25"},{"date":"2002-06-13T12:30:47","version":"1.26"},{"date":"2002-06-13T15:19:06","version":"1.27"},{"date":"2002-06-14T13:13:53","version":"1.28"},{"date":"2002-06-26T09:34:24","version":"1.28"},{"version":"1.29","date":"2002-07-15T11:24:40"},{"version":"1.30","date":"2002-07-18T14:27:25"},{"version":"1.31","date":"2002-11-30T00:49:54"},{"version":"1.32","date":"2002-12-01T23:01:26"},{"date":"2002-12-20T16:23:29","version":"1.32"},{"version":"1.32_90","date":"2003-02-26T18:01:24"},{"version":"1.33","date":"2003-02-27T00:25:32"},{"version":"1.34","date":"2003-02-28T17:53:35"},{"version":"1.35","date":"2003-03-07T22:02:20"},{"version":"1.36","date":"2003-05-14T11:13:39"},{"version":"1.37","date":"2003-05-15T18:02:26"},{"date":"2003-08-25T20:36:26","version":"1.38"},{"date":"2003-11-27T23:46:40","version":"1.39"},{"version":"1.39","date":"2004-01-08T14:04:59"},{"date":"2004-02-23T14:54:21","version":"1.41"},{"version":"1.41","date":"2004-03-12T16:40:08"},{"version":"1.43","date":"2004-07-05T10:02:05"},{"date":"2004-10-05T21:27:23","version":"1.44"},{"version":"1.45","date":"2004-10-06T13:49:20"},{"date":"2004-11-16T12:38:32","version":"1.46"},{"version":"1.47","date":"2005-02-02T11:28:46"},{"version":"1.48","date":"2005-03-14T17:03:33"},{"version":"1.49","date":"2005-11-29T19:59:40"},{"date":"2005-12-14T16:55:16","version":"1.50"},{"version":"1.45","date":"2006-04-19T15:56:38"},{"version":"1.51","date":"2006-06-06T12:08:36"},{"date":"2006-08-08T21:13:32","version":"1.52"},{"version":"1.53","date":"2006-11-02T00:38:01"},{"version":"1.54","date":"2007-02-23T17:15:23"},{"version":"1.55","date":"2007-05-04T14:56:38"},{"version":"1.56","date":"2007-05-10T14:04:04"},{"version":"1.56","date":"2007-05-13T22:00:58"},{"version":"1.57","date":"2007-06-13T16:45:34"},{"version":"1.57","date":"2007-06-15T17:06:42"},{"date":"2007-06-18T15:15:31","version":"1.57"},{"date":"2007-06-25T22:11:47","version":"1.58"},{"version":"1.59","date":"2007-08-22T17:02:10"},{"date":"2007-08-23T12:22:26","version":"1.59"},{"date":"2007-08-23T13:59:53","version":"1.59"},{"date":"2007-08-24T09:19:29","version":"1.59"},{"date":"2007-10-16T13:12:55","version":"1.601"},{"version":"1.601","date":"2007-10-21T22:12:52"},{"date":"2008-02-09T22:06:13","version":"1.602"},{"date":"2008-03-22T00:11:03","version":"1.603"},{"version":"1.604","date":"2008-03-24T14:11:41"},{"version":"1.605","date":"2008-06-16T19:19:43"},{"version":"1.606","date":"2008-07-22T21:01:09"},{"version":"1.607","date":"2008-07-22T21:50:54"},{"version":"1.608","date":"2009-05-02T22:58:48"},{"date":"2009-05-05T12:05:19","version":"1.608"},{"version":"1.609","date":"2009-06-05T22:57:34"},{"version":"1.609","date":"2009-06-08T10:29:18"},{"version":"1.611","date":"2010-03-02T21:26:39"},{"date":"2010-04-22T11:06:31","version":"1.611"},{"version":"1.611","date":"2010-04-27T15:13:32"},{"version":"1.611","date":"2010-04-29T19:54:44"},{"version":"1.612","date":"2010-05-28T10:29:17"},{"version":"1.612","date":"2010-06-15T22:47:23"},{"version":"1.612","date":"2010-06-16T19:18:05"},{"date":"2010-07-02T14:26:03","version":"1.612"},{"version":"1.612","date":"2010-07-15T15:00:53"},{"version":"1.612","date":"2010-07-16T19:36:42"},{"date":"2010-07-22T17:34:16","version":"1.613"},{"version":"1.613","date":"2010-07-25T15:50:15"},{"version":"1.614","date":"2010-07-30T14:17:33"},{"version":"1.614","date":"2010-08-16T16:34:58"},{"date":"2010-08-30T20:11:00","version":"1.614"},{"date":"2010-08-30T20:26:37","version":"1.614"},{"version":"1.614","date":"2010-08-30T20:56:09"},{"version":"1.614","date":"2010-09-02T15:44:21"},{"date":"2010-09-09T10:24:11","version":"1.614"},{"version":"1.614","date":"2010-09-16T16:23:50"},{"date":"2010-09-17T09:48:02","version":"1.614"},{"version":"1.615","date":"2010-09-21T10:14:29"},{"version":"1.615","date":"2010-09-22T12:28:20"},{"date":"2010-12-18T21:51:52","version":"1.616"},{"date":"2010-12-21T23:26:46","version":"1.616"},{"date":"2010-12-29T14:39:48","version":"1.616"},{"version":"1.616","date":"2010-12-30T10:26:51"},{"version":"1.617","date":"2012-01-02T17:12:53"},{"date":"2012-01-28T09:34:18","version":"1.617"},{"version":"1.617","date":"2012-01-30T10:06:49"},{"version":"1.618","date":"2012-02-07T22:54:02"},{"version":"1.618","date":"2012-02-13T18:24:33"},{"date":"2012-02-23T11:05:45","version":"1.618"},{"date":"2012-02-25T14:24:39","version":"1.618"},{"date":"2012-04-18T11:57:55","version":"1.619"},{"version":"1.619","date":"2012-04-20T20:21:54"},{"version":"1.619","date":"2012-04-23T22:09:14"},{"version":"1.620","date":"2012-04-25T12:46:54"},{"date":"2012-05-21T13:06:09","version":"1.621"},{"version":"1.621","date":"2012-05-22T22:17:06"},{"date":"2012-06-06T16:51:00","version":"1.622"},{"date":"2012-07-13T15:24:35","version":"1.623"},{"date":"2012-10-30T13:01:14","version":"1.623"},{"date":"2012-11-19T23:27:04","version":"1.623"},{"date":"2012-12-13T16:26:23","version":"1.623"},{"version":"1.623","date":"2012-12-21T17:22:01"},{"date":"2013-01-02T10:09:42","version":"1.623"},{"date":"2013-03-22T20:41:50","version":"1.624"},{"version":"1.625","date":"2013-03-28T21:59:38"},{"version":"1.626","date":"2013-05-15T11:28:03"},{"version":"1.627","date":"2013-05-16T20:30:50"},{"version":"1.628","date":"2013-06-24T21:56:27"},{"version":"1.628","date":"2013-06-24T22:12:23"},{"date":"2013-06-30T19:08:08","version":"1.628"},{"version":"1.628","date":"2013-07-02T11:27:23"},{"version":"1.628","date":"2013-07-22T13:22:40"},{"version":"1.629","date":"2013-10-11T12:28:12"},{"date":"2013-10-13T16:02:52","version":"1.629"},{"date":"2013-10-15T12:24:53","version":"1.629"},{"date":"2013-10-22T11:58:53","version":"1.629_50"},{"version":"1.630","date":"2013-10-28T12:51:39"},{"version":"1.631","date":"2014-01-13T13:51:01"},{"version":"1.631","date":"2014-01-16T11:34:34"},{"version":"1.631","date":"2014-01-20T11:12:44"},{"version":"1.631","date":"2014-10-23T14:08:22"},{"date":"2014-11-05T11:15:07","version":"1.632"},{"version":"1.632","date":"2015-01-08T14:31:52"},{"date":"2015-01-11T13:26:05","version":"1.633"},{"version":"1.633","date":"2015-07-18T13:16:07"},{"version":"1.633_91","date":"2015-07-19T14:34:22"},{"version":"1.633_92","date":"2015-07-22T15:27:59"},{"date":"2015-08-02T16:52:48","version":"1.633_93"},{"date":"2015-08-03T14:52:56","version":"1.634"},{"date":"2016-04-23T15:28:02","version":"1.634"},{"date":"2016-04-24T11:57:03","version":"1.635"},{"version":"1.636","date":"2016-04-24T22:20:56"},{"version":"1.637","date":"2017-08-14T10:10:55"},{"date":"2017-08-16T09:02:40","version":"1.637"},{"version":"1.639","date":"2017-12-28T14:40:44"},{"date":"2018-01-28T20:50:53","version":"1.640"},{"date":"2018-03-19T18:06:08","version":"1.641"},{"date":"2018-10-28T15:08:54","version":"1.641_90"},{"version":"1.642","date":"2018-10-29T10:43:41"},{"date":"2020-01-26T20:48:52","version":"1.642_90"},{"version":"1.643","date":"2020-01-31T19:02:41"},{"version":"1.643_01","date":"2024-08-20T11:29:56"},{"version":"1.643_02","date":"2024-08-22T07:09:52"},{"version":"1.644","date":"2024-08-23T17:54:09"},{"date":"2024-09-03T09:25:33","version":"1.645"}],"main_module":"DBI","advisories":[{"affected_versions":["<1.643"],"reported":"2020-09-16","distribution":"DBI","cves":["CVE-2020-14393"],"fixed_versions":[">=1.643"],"id":"CPANSA-DBI-2020-01","severity":"high","description":"A buffer overflow was found in perl-DBI < 1.643 in DBI.xs. A local attacker who is able to supply a string longer than 300 characters could cause an out-of-bounds write, affecting the availability of the service or integrity of data.\n","references":["https://metacpan.org/changes/distribution/DBI","https://bugzilla.redhat.com/show_bug.cgi?id=1877409"]},{"cves":["CVE-2020-14392"],"reported":"2020-06-17","distribution":"DBI","affected_versions":["<1.643"],"description":"An untrusted pointer dereference flaw was found in Perl-DBI < 1.643. A local attacker who is able to manipulate calls to dbd_db_login6_sv() could cause memory corruption, affecting the service's availability.\n","references":["https://metacpan.org/changes/distribution/DBI","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXLKODJ7B57GITDEZZXNSHPK4VBYXYHR/","https://bugzilla.redhat.com/show_bug.cgi?id=1877402","https://bugzilla.redhat.com/show_bug.cgi?id=1877402","https://lists.debian.org/debian-lts-announce/2020/09/msg00026.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00067.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00074.html","https://usn.ubuntu.com/4503-1/"],"id":"CPANSA-DBI-2020-03","severity":"high","fixed_versions":[">=1.643"]},{"distribution":"DBI","reported":"2020-09-17","affected_versions":["<1.643"],"cves":["CVE-2019-20919"],"severity":"high","id":"CPANSA-DBI-2020-02","fixed_versions":[">=1.643"],"references":["https://metacpan.org/changes/distribution/DBI","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXLKODJ7B57GITDEZZXNSHPK4VBYXYHR/","https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20919","https://github.com/perl5-dbi/dbi/commit/eca7d7c8f43d96f6277e86d1000e842eb4cc67ff","https://bugzilla.redhat.com/show_bug.cgi?id=1877405","https://lists.debian.org/debian-lts-announce/2020/09/msg00026.html","https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/US6VXPKVAYHOKNFSAFLM3FWNYZSJKQHS/","https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KJN7E27GD6QQ2CRGEJ3TNW2DJFXA2AKN/","https://ubuntu.com/security/notices/USN-4534-1"],"description":"An issue was discovered in the DBI module before 1.643 for Perl. The hv_fetch() documentation requires checking for NULL and the code does that. But, shortly thereafter, it calls SvOK(profile), causing a NULL pointer dereference.\n"},{"references":["https://metacpan.org/changes/distribution/DBI","https://rt.cpan.org/Public/Bug/Display.html?id=99508"],"description":"DBD::File drivers open files from folders other than specifically passed using the f_dir attribute.\n","fixed_versions":[">=1.632"],"severity":"high","id":"CPANSA-DBI-2014-01","cves":[],"affected_versions":["<1.632"],"reported":"2014-10-15","distribution":"DBI"},{"id":"CPANSA-DBI-2005-01","fixed_versions":[">=1.47"],"references":["https://metacpan.org/changes/distribution/DBI"],"description":"Allows local users to overwrite arbitrary files via a symlink attack on a temporary PID file.\n","distribution":"DBI","reported":"2005-05-02","affected_versions":["<1.47"],"cves":["CVE-2005-0077"]},{"cves":["CVE-2014-10402"],"distribution":"DBI","reported":"2020-09-16","affected_versions":["<1.643"],"description":"An issue was discovered in the DBI module through 1.643 for Perl. DBD::File drivers can open files from folders other than those specifically passed via the f_dir attribute in the data source name (DSN). NOTE: this issue exists because of an incomplete fix for CVE-2014-10401.\n","references":["https://rt.cpan.org/Public/Bug/Display.html?id=99508#txn-1911590","https://metacpan.org/release/HMBRAND/DBI-1.643_01/view/Changes"],"id":"CPANSA-DBI-2014-10402","severity":"medium","fixed_versions":[">=1.644"]},{"fixed_versions":[">=1.644"],"severity":"medium","id":"CPANSA-DBI-2014-10401","references":["https://rt.cpan.org/Public/Bug/Display.html?id=99508","https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.632-9th-Nov-2014","https://github.com/perl5-dbi/dbi/commit/caedc0d7d602f5b2ae5efc1b00f39efeafb7b05a","https://usn.ubuntu.com/4509-1/","https://metacpan.org/release/HMBRAND/DBI-1.643_01/view/Changes"],"description":"An issue was discovered in the DBI module before 1.632 for Perl. DBD::File drivers can open files from folders other than those specifically passed via the f_dir attribute.\n","affected_versions":["<1.632"],"distribution":"DBI","reported":"2020-09-11","cves":["CVE-2014-10401"]},{"cves":["CVE-2013-7491"],"affected_versions":["<1.628"],"distribution":"DBI","reported":"2020-09-11","references":["https://github.com/perl5-dbi/dbi/commit/401f1221311c71f760e21c98772f0f7e3cbead1d","https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.628-22nd-July-2013","https://rt.cpan.org/Public/Bug/Display.html?id=85562"],"description":"An issue was discovered in the DBI module before 1.628 for Perl. Stack corruption occurs when a user-defined function requires a non-trivial amount of memory and the Perl stack gets reallocated.\n","fixed_versions":[],"severity":"medium","id":"CPANSA-DBI-2013-7491"},{"severity":"medium","id":"CPANSA-DBI-2013-7490","fixed_versions":[],"description":"An issue was discovered in the DBI module before 1.632 for Perl. Using many arguments to methods for Callbacks may lead to memory corruption.\n","references":["https://github.com/perl5-dbi/dbi/commit/a8b98e988d6ea2946f5f56691d6d5ead53f65766","https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.632-9th-Nov-2014","https://rt.cpan.org/Public/Bug/Display.html?id=86744#txn-1880941","https://usn.ubuntu.com/4509-1/"],"distribution":"DBI","reported":"2020-09-11","affected_versions":["<1.632"],"cves":["CVE-2013-7490"]}]},"Net-CIDR-Lite":{"advisories":[{"reported":"2024-03-18","distribution":"Net-CIDR-Lite","affected_versions":["<0.22"],"cves":["CVE-2021-47154"],"severity":null,"id":"CPANSA-Net-CIDR-Lite-2021-47154","fixed_versions":[">=0.22"],"description":"The Net::CIDR::Lite module before 0.22 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.\n","references":["https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/","https://github.com/stigtsp/Net-CIDR-Lite/commit/23b6ff0590dc279521863a502e890ef19a5a76fc","https://metacpan.org/dist/Net-CIDR-Lite/changes","https://metacpan.org/pod/Net::CIDR::Lite"]}],"main_module":"Net::CIDR::Lite","versions":[{"version":"0.02","date":"2001-10-23T22:54:21"},{"version":"0.03","date":"2001-10-24T00:14:02"},{"version":"0.04","date":"2001-10-24T00:55:11"},{"version":"0.05","date":"2001-10-25T17:20:05"},{"date":"2001-10-31T01:40:19","version":"0.06"},{"version":"0.07","date":"2001-10-31T23:51:49"},{"version":"0.08","date":"2001-11-26T23:12:47"},{"version":"0.09","date":"2001-11-27T05:47:30"},{"date":"2001-11-27T18:25:47","version":"0.10"},{"date":"2002-04-16T05:44:00","version":"0.11"},{"date":"2002-07-15T07:07:02","version":"0.12"},{"date":"2002-07-15T09:46:34","version":"0.13"},{"date":"2002-07-15T16:31:01","version":"0.14"},{"date":"2003-04-16T20:20:04","version":"0.15"},{"version":"0.16","date":"2005-05-18T19:01:44"},{"version":"0.17","date":"2005-05-18T19:43:12"},{"date":"2005-05-21T08:14:32","version":"0.18"},{"date":"2006-01-30T19:34:31","version":"0.19"},{"date":"2006-02-14T00:58:01","version":"0.20"},{"date":"2010-03-26T00:38:30","version":"0.21"},{"version":"0.22","date":"2021-04-04T21:03:12"}]},"Module-Provision":{"versions":[{"version":"v0.3.43","date":"2013-04-14T19:20:34"},{"version":"v0.3.44","date":"2013-04-15T12:46:30"},{"date":"2013-04-15T17:33:39","version":"v0.3.45"},{"version":"v0.4.47","date":"2013-04-21T16:14:43"},{"date":"2013-04-22T15:09:36","version":"v0.4.51"},{"version":"v0.6.59","date":"2013-04-24T04:13:42"},{"version":"v0.7.4","date":"2013-04-24T23:34:41"},{"date":"2013-04-27T01:18:07","version":"v0.7.6"},{"version":"v0.7.7","date":"2013-04-27T11:36:59"},{"version":"v0.8.3","date":"2013-04-30T22:32:47"},{"version":"v0.9.5","date":"2013-05-02T18:45:43"},{"date":"2013-05-04T00:14:46","version":"v0.10.1"},{"version":"v0.11.1","date":"2013-05-04T20:22:41"},{"version":"v0.12.1","date":"2013-05-06T15:08:18"},{"version":"v0.12.3","date":"2013-05-08T15:51:41"},{"date":"2013-05-09T23:42:20","version":"v0.12.5"},{"date":"2013-05-10T19:29:24","version":"v0.12.6"},{"version":"v0.13.1","date":"2013-05-11T02:15:00"},{"date":"2013-05-11T13:59:50","version":"v0.14.2"},{"date":"2013-05-12T18:03:55","version":"v0.15.3"},{"date":"2013-05-14T12:49:37","version":"v0.15.5"},{"version":"v0.15.6","date":"2013-05-15T17:55:40"},{"date":"2013-05-15T20:59:19","version":"v0.15.7"},{"date":"2013-05-16T23:02:48","version":"v0.15.8"},{"date":"2013-05-19T12:59:15","version":"v0.15.9"},{"date":"2013-06-08T17:12:50","version":"v0.16.1"},{"date":"2013-07-28T18:42:27","version":"v0.17.16"},{"version":"v0.17.17","date":"2013-07-29T16:10:28"},{"version":"v0.17.18","date":"2013-07-29T23:51:34"},{"date":"2013-07-30T13:06:37","version":"v0.17.19"},{"date":"2013-08-07T17:56:55","version":"v0.18.0"},{"date":"2013-08-07T17:58:22","version":"v0.18.1"},{"date":"2013-08-08T13:39:44","version":"v0.18.2"},{"date":"2013-08-10T08:51:08","version":"v0.18.3"},{"date":"2013-08-10T21:18:54","version":"v0.18.4"},{"version":"0.20.1","date":"2013-08-17T15:47:30"},{"version":"0.21.1","date":"2013-08-21T12:36:06"},{"date":"2013-08-21T12:56:35","version":"0.22.1"},{"date":"2013-09-14T09:38:12","version":"0.23.1"},{"date":"2013-09-16T20:23:50","version":"0.24.1"},{"date":"2013-11-23T13:38:55","version":"0.25.1"},{"version":"0.26.1","date":"2013-11-25T21:30:21"},{"date":"2013-12-11T17:25:32","version":"0.27.1"},{"date":"2013-12-12T14:23:50","version":"0.28.1"},{"version":"0.29.1","date":"2013-12-12T21:54:50"},{"version":"0.31.2","date":"2014-01-24T21:05:50"},{"version":"0.32.1","date":"2014-05-01T14:42:10"},{"date":"2014-05-15T20:55:59","version":"0.33.1"},{"version":"0.34.1","date":"2014-05-19T11:47:05"},{"date":"2014-10-28T13:51:21","version":"0.36.1"},{"date":"2015-02-11T17:52:30","version":"0.38.1"},{"date":"2015-02-11T19:03:04","version":"0.39.1"},{"version":"0.40.1","date":"2015-06-08T21:47:29"},{"date":"2016-04-04T12:15:12","version":"0.41.1"},{"date":"2017-05-08T19:30:17","version":"0.42.1"}],"advisories":[{"references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"description":"(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.\n","id":"CPANSA-Module-Provision-2016-1238","severity":"high","fixed_versions":[">=0.42.1"],"cves":["CVE-2016-1238"],"distribution":"Module-Provision","reported":"2016-08-02","affected_versions":["<0.42.1"]}],"main_module":"Module::Provision"},"Pinto":{"versions":[{"date":"2011-07-26T21:17:47","version":"0.001"},{"date":"2011-07-27T00:22:00","version":"0.002"},{"date":"2011-08-04T06:00:27","version":"0.003"},{"date":"2011-08-04T07:24:59","version":"0.004"},{"version":"0.005","date":"2011-08-04T07:46:03"},{"version":"0.006","date":"2011-08-04T07:54:24"},{"date":"2011-08-04T15:07:03","version":"0.007"},{"version":"0.008","date":"2011-08-09T21:49:02"},{"date":"2011-08-13T00:51:56","version":"0.009"},{"version":"0.010","date":"2011-08-14T20:32:00"},{"version":"0.011","date":"2011-08-15T04:14:45"},{"date":"2011-08-17T16:12:20","version":"0.012"},{"date":"2011-08-17T23:14:14","version":"0.014"},{"version":"0.015","date":"2011-08-18T08:57:36"},{"version":"0.016","date":"2011-08-18T09:03:09"},{"date":"2011-08-24T07:53:18","version":"0.017"},{"date":"2011-08-24T08:48:57","version":"0.018"},{"date":"2011-08-24T11:16:38","version":"0.019"},{"date":"2011-08-29T03:46:11","version":"0.020"},{"version":"0.021","date":"2011-08-30T08:20:49"},{"date":"2011-08-31T08:35:52","version":"0.022"},{"version":"0.023","date":"2011-08-31T21:22:32"},{"date":"2011-09-01T22:29:05","version":"0.024"},{"version":"0.025_001","date":"2011-12-02T11:21:54"},{"version":"0.025_002","date":"2011-12-02T12:42:45"},{"version":"0.025_003","date":"2011-12-03T12:16:42"},{"date":"2011-12-07T15:26:36","version":"0.025_004"},{"date":"2011-12-07T20:09:02","version":"0.026"},{"date":"2011-12-08T23:27:07","version":"0.027"},{"date":"2011-12-12T09:32:39","version":"0.028"},{"date":"2011-12-15T08:31:43","version":"0.029"},{"date":"2012-01-27T06:05:38","version":"0.030"},{"date":"2012-02-28T13:23:36","version":"0.031"},{"version":"0.032","date":"2012-03-01T18:43:41"},{"version":"0.033","date":"2012-03-15T14:00:07"},{"version":"0.035","date":"2012-04-05T02:08:20"},{"version":"0.036","date":"2012-04-09T07:18:50"},{"version":"0.037","date":"2012-04-11T03:02:41"},{"date":"2012-04-17T01:21:11","version":"0.038"},{"version":"0.040_001","date":"2012-05-01T20:52:05"},{"date":"2012-05-04T23:28:00","version":"0.040_002"},{"date":"2012-05-05T04:42:35","version":"0.040_003"},{"date":"2012-05-15T18:18:01","version":"0.041"},{"version":"0.042","date":"2012-05-18T04:59:37"},{"version":"0.043","date":"2012-06-19T17:58:05"},{"date":"2012-07-15T08:45:52","version":"0.044"},{"version":"0.045","date":"2012-07-24T06:18:49"},{"date":"2012-08-13T22:50:28","version":"0.046"},{"version":"0.047","date":"2012-08-14T00:27:03"},{"version":"0.048","date":"2012-08-15T16:28:03"},{"date":"2012-08-15T21:30:01","version":"0.050"},{"version":"0.051","date":"2012-08-16T01:31:42"},{"version":"0.052","date":"2012-09-18T23:20:20"},{"version":"0.053","date":"2012-09-20T04:03:53"},{"date":"2012-09-20T05:07:44","version":"0.054"},{"date":"2012-09-20T20:40:05","version":"0.055"},{"date":"2012-09-27T20:45:51","version":"0.056"},{"version":"0.057","date":"2012-10-07T21:25:33"},{"date":"2012-10-12T06:19:44","version":"0.058"},{"date":"2012-10-20T08:01:03","version":"0.059"},{"version":"0.060","date":"2012-10-23T21:41:47"},{"date":"2012-10-31T00:23:58","version":"0.061"},{"version":"0.062","date":"2012-11-08T18:57:09"},{"version":"0.063","date":"2012-11-12T20:03:29"},{"version":"0.064","date":"2012-11-12T21:58:57"},{"date":"2012-11-14T18:00:34","version":"0.065"},{"version":"0.065_01","date":"2013-03-15T23:28:13"},{"version":"0.065_02","date":"2013-03-16T06:44:49"},{"date":"2013-03-19T22:58:08","version":"0.065_03"},{"version":"0.065_04","date":"2013-03-20T23:12:44"},{"version":"0.065_05","date":"2013-03-20T23:28:07"},{"version":"0.065_06","date":"2013-03-23T07:33:37"},{"version":"0.066","date":"2013-03-26T23:29:22"},{"version":"0.067","date":"2013-03-30T07:51:45"},{"date":"2013-04-05T05:47:08","version":"0.068"},{"date":"2013-04-21T16:55:30","version":"0.079_01"},{"date":"2013-04-23T07:53:34","version":"0.079_04"},{"date":"2013-04-26T17:50:55","version":"0.080"},{"version":"0.081","date":"2013-04-26T21:00:35"},{"version":"0.082","date":"2013-04-29T17:02:33"},{"date":"2013-05-13T21:45:43","version":"0.083"},{"date":"2013-05-15T00:34:13","version":"0.084"},{"version":"0.084_01","date":"2013-06-16T08:05:08"},{"version":"0.084_02","date":"2013-06-17T04:08:49"},{"version":"0.085","date":"2013-06-17T20:09:55"},{"date":"2013-06-18T10:08:10","version":"0.086"},{"date":"2013-06-20T01:50:39","version":"0.087"},{"version":"0.087_01","date":"2013-07-09T08:19:39"},{"version":"0.087_03","date":"2013-07-21T08:38:23"},{"date":"2013-07-27T03:21:44","version":"0.087_04"},{"date":"2013-07-30T07:00:31","version":"0.087_05"},{"date":"2013-08-15T18:00:31","version":"0.088"},{"version":"0.089","date":"2013-08-19T20:34:32"},{"date":"2013-08-23T22:02:45","version":"0.090"},{"date":"2013-10-25T19:22:19","version":"0.091"},{"date":"2013-11-20T19:18:40","version":"0.092"},{"version":"0.093","date":"2013-12-22T00:41:08"},{"version":"0.094","date":"2013-12-22T09:07:09"},{"version":"0.095","date":"2013-12-23T07:49:14"},{"version":"0.096","date":"2014-01-07T18:57:51"},{"date":"2014-01-08T07:10:26","version":"0.097"},{"version":"0.097_01","date":"2014-01-17T20:57:05"},{"date":"2014-01-23T08:46:47","version":"0.097_02"},{"date":"2014-01-23T22:17:10","version":"0.097_03"},{"date":"2014-01-25T23:24:17","version":"0.097_04"},{"date":"2014-01-28T01:01:18","version":"0.098"},{"version":"0.098_01","date":"2014-01-28T10:07:29"},{"version":"0.099","date":"2014-01-28T20:44:00"},{"version":"0.0991","date":"2014-02-01T01:30:41"},{"version":"0.0992","date":"2014-02-10T10:11:30"},{"date":"2014-02-23T22:14:22","version":"0.0993"},{"version":"0.0994","date":"2014-03-02T00:14:38"},{"date":"2014-03-05T09:16:04","version":"0.0994_01"},{"version":"0.0994_02","date":"2014-03-16T06:18:21"},{"date":"2014-03-16T07:56:27","version":"0.0994_03"},{"version":"0.0994_04","date":"2014-03-18T04:44:49"},{"version":"0.0995","date":"2014-03-19T04:24:14"},{"date":"2014-03-23T04:23:21","version":"0.0996"},{"date":"2014-03-24T04:02:32","version":"0.0997"},{"date":"2014-03-31T22:44:44","version":"0.0998"},{"date":"2014-04-04T06:05:12","version":"0.0999"},{"date":"2014-04-05T12:41:39","version":"0.09991"},{"version":"0.09992","date":"2014-04-23T22:27:50"},{"version":"0.09992_01","date":"2014-04-28T17:43:44"},{"version":"0.09992_02","date":"2014-04-29T21:34:32"},{"version":"0.09993","date":"2014-05-03T01:04:46"},{"version":"0.09995","date":"2014-08-20T01:44:36"},{"version":"0.09996","date":"2014-11-04T19:15:26"},{"version":"0.09997","date":"2015-03-24T08:26:01"},{"version":"0.09998","date":"2015-06-10T15:22:03"},{"date":"2015-06-14T05:30:55","version":"0.09999"},{"version":"0.11","date":"2015-08-12T08:48:47"},{"version":"0.11_01","date":"2016-07-17T05:04:20"},{"date":"2016-07-26T04:18:25","version":"0.12"},{"date":"2017-08-06T05:59:13","version":"0.13"},{"date":"2017-08-06T07:31:17","version":"0.14"}],"main_module":"Pinto","advisories":[{"affected_versions":["<0.09995"],"reported":"2014-08-19","distribution":"Pinto","cves":[],"reviewed_by":[{"name":"Robert Rothenberg","date":"2022-06-28","email":"rrwo@cpan.org"}],"fixed_versions":[">=0.09995"],"id":"CPANSA-Pinto-2014-01","references":["https://metacpan.org/dist/Pinto/changes","https://github.com/thaljef/Pinto/commit/195d46eb4488a7dec6c39d6eb1c48dc872ab2b3b"],"description":"Pinto server allowed directory traveral.\n"}]},"Digest-MD5":{"advisories":[{"affected_versions":["<2.25"],"reported":"2002-07-26","distribution":"Digest-MD5","cves":["CVE-2002-0703"],"fixed_versions":[],"severity":null,"id":"CPANSA-Digest-MD5-2002-0703","references":["http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-035.php","http://www.iss.net/security_center/static/9051.php","http://www.securityfocus.com/bid/4716","http://rhn.redhat.com/errata/RHSA-2002-081.html"],"description":"An interaction between the Perl MD5 module (perl-Digest-MD5) and Perl could produce incorrect MD5 checksums for UTF-8 data, which could prevent a system from properly verifying the integrity of the data.\n"}],"main_module":"Digest::MD5","versions":[{"version":"1.99_53","date":"1998-10-23T12:30:56"},{"version":"1.99_54","date":"1998-10-24T13:58:24"},{"date":"1998-10-24T22:44:03","version":"1.99_55"},{"date":"1998-10-24T23:07:15","version":"1.99_56"},{"date":"1998-10-27T21:09:37","version":"1.99_57"},{"version":"1.99_58","date":"1998-10-28T14:11:30"},{"version":"1.99_59","date":"1998-10-28T20:57:10"},{"date":"1998-10-30T17:23:27","version":"1.99_60"},{"date":"1998-11-04T22:27:42","version":"2.00"},{"version":"2.01","date":"1998-12-30T04:01:06"},{"version":"2.02","date":"1999-01-31T16:44:38"},{"version":"2.02","date":"1999-02-01T20:25:06"},{"version":"2.03","date":"1999-02-27T21:39:24"},{"date":"1999-03-05T21:17:35","version":"2.04"},{"version":"2.05","date":"1999-03-15T10:58:32"},{"date":"1999-03-19T05:05:36","version":"2.05"},{"version":"2.06","date":"1999-03-26T13:51:38"},{"date":"1999-04-26T09:45:43","version":"2.07"},{"date":"1999-06-02T13:44:41","version":"2.07"},{"date":"1999-07-28T10:55:54","version":"2.08"},{"date":"1999-08-05T23:29:15","version":"2.09"},{"date":"1999-09-02T12:45:17","version":"2.09"},{"date":"2000-08-18T08:49:59","version":"2.10"},{"version":"2.11","date":"2000-08-19T17:39:04"},{"version":"2.12","date":"2000-09-18T15:10:45"},{"version":"2.12","date":"2001-01-19T06:08:47"},{"version":"2.13","date":"2001-03-14T05:56:41"},{"date":"2001-03-17T04:35:32","version":"2.13"},{"version":"2.13","date":"2001-06-24T07:37:20"},{"version":"2.14","date":"2001-07-18T13:40:13"},{"date":"2001-08-27T17:53:29","version":"2.15"},{"version":"2.15","date":"2001-08-29T06:32:30"},{"version":"2.16","date":"2001-09-07T05:52:46"},{"version":"2.17","date":"2002-04-25T17:24:14"},{"version":"2.18","date":"2002-05-01T23:34:50"},{"date":"2002-05-02T03:21:40","version":"2.19"},{"version":"2.20","date":"2002-05-06T05:20:38"},{"version":"2.21","date":"2002-12-28T05:33:19"},{"version":"2.22","date":"2003-01-05T01:04:07"},{"version":"2.23","date":"2003-01-19T04:55:24"},{"version":"2.24","date":"2003-03-09T15:26:49"},{"version":"2.25","date":"2003-07-05T05:33:54"},{"version":"2.26","date":"2003-07-22T06:15:03"},{"version":"2.27","date":"2003-08-05T06:12:31"},{"date":"2003-10-06T13:16:20","version":"2.28"},{"date":"2003-10-06T17:37:30","version":"2.29"},{"version":"2.30","date":"2003-10-09T09:40:47"},{"version":"2.31","date":"2003-11-28T13:10:59"},{"version":"2.32","date":"2003-12-05T10:15:43"},{"version":"2.33","date":"2003-12-07T10:31:15"},{"date":"2005-11-26T10:05:19","version":"2.34"},{"version":"2.35","date":"2005-11-26T11:15:35"},{"version":"2.36","date":"2005-11-30T13:55:38"},{"version":"2.37","date":"2008-11-12T09:36:42"},{"date":"2008-11-14T13:50:45","version":"2.38"},{"date":"2009-06-09T20:21:55","version":"2.39"},{"date":"2010-07-03T14:01:25","version":"2.40"},{"version":"2.50","date":"2010-09-25T22:12:42"},{"version":"2.51","date":"2010-09-30T19:46:29"},{"date":"2012-06-07T22:37:00","version":"2.52"},{"date":"2013-07-02T17:56:06","version":"2.53"},{"version":"2.54","date":"2015-01-12T21:19:42"},{"version":"2.55","date":"2016-03-09T21:17:10"},{"version":"2.56","date":"2020-10-05T17:19:37"},{"date":"2020-10-05T17:42:48","version":"2.57"},{"date":"2020-10-05T21:53:32","version":"2.58"},{"version":"2.59","date":"2023-12-30T21:01:56"}]},"libapreq2":{"main_module":"Apache2::Cookie","advisories":[{"description":"Unspecified vulnerability in apreq_parse_headers and apreq_parse_urlencoded functions in Apache2::Request (Libapreq2) allows remote attackers to cause a denial of service (CPU consumption) via unknown attack vectors that result in quadratic computational complexity.\n","references":["https://metacpan.org/changes/distribution/libapreq2"],"id":"CPANSA-libapreq2-2006-01","fixed_versions":[">=2.07"],"cves":["CVE-2006-0042"],"reported":"2007-04-17","distribution":"libapreq2","affected_versions":["<2.07"]}],"versions":[{"version":"2.01_03","date":"2003-11-11T01:28:48"},{"date":"2003-11-16T04:16:12","version":"2.02_02"},{"date":"2004-06-12T14:52:49","version":"2.03_04"},{"version":"2.04_03","date":"2004-08-30T16:13:45"},{"version":"2.05","date":"2005-05-04T23:38:05"},{"date":"2005-07-20T17:10:48","version":"2.06"},{"date":"2006-02-12T18:10:47","version":"2.07"},{"version":"2.08","date":"2006-08-09T04:54:07"},{"date":"2009-03-13T22:47:11","version":"2.12"},{"version":"2.13","date":"2010-12-02T18:41:57"},{"date":"2021-02-23T13:26:47","version":"2.15"},{"version":"2.16","date":"2021-03-22T17:59:11"}]},"Filesys-SmbClientParser":{"main_module":"Filesys::SmbClientParser","advisories":[{"severity":null,"id":"CPANSA-Filesys-SmbClientParser-2008-3285","fixed_versions":[],"description":"The Filesys::SmbClientParser module 2.7 and earlier for Perl allows remote SMB servers to execute arbitrary code via a folder name containing shell metacharacters.\n","references":["http://www.securityfocus.com/bid/30290","http://secunia.com/advisories/31175","http://securityreason.com/securityalert/4027","https://exchange.xforce.ibmcloud.com/vulnerabilities/43910","http://www.securityfocus.com/archive/1/494536/100/0/threaded"],"reported":"2008-07-24","distribution":"Filesys-SmbClientParser","affected_versions":["<=2.7"],"cves":["CVE-2008-3285"]}],"versions":[{"date":"2000-11-19T21:10:38","version":"0.01"},{"date":"2000-11-20T19:41:09","version":"0.2"},{"date":"2001-01-12T00:31:50","version":"0.3"},{"date":"2001-04-15T22:37:14","version":"1.2"},{"version":"1.3","date":"2001-04-19T17:38:19"},{"version":"1.4","date":"2001-05-30T08:04:44"},{"version":"2.0","date":"2002-01-25T12:18:47"},{"date":"2002-04-19T21:56:09","version":"2.1"},{"date":"2002-08-09T11:24:20","version":"2.2"},{"date":"2002-08-13T14:55:48","version":"2.3"},{"date":"2002-11-08T23:57:07","version":"2.4"},{"date":"2002-11-12T18:59:33","version":"2.5"},{"date":"2004-01-28T23:06:58","version":"2.6"},{"date":"2004-04-14T21:56:02","version":"2.7"}]},"Storable":{"advisories":[{"references":["https://metacpan.org/changes/distribution/Storable","https://cxsecurity.com/issue/WLB-2007120031"],"description":"Malcrafted storable files or buffers.\n","id":"CPANSA-Storable-2017-01","fixed_versions":[">=3.05"],"cves":[],"reported":"2017-01-29","distribution":"Storable","affected_versions":["<3.05"]}],"main_module":"Storable","versions":[{"version":"0.1","date":"1995-10-02T10:50:02"},{"date":"1997-01-13T11:42:25","version":"0.2"},{"date":"1997-01-13T17:18:01","version":"0.2"},{"version":"0.3","date":"1997-01-14T15:12:36"},{"version":"0.4","date":"1997-01-15T18:25:57"},{"version":"0.4","date":"1997-01-22T14:47:23"},{"version":"0.4","date":"1997-02-27T15:02:37"},{"version":"0.4","date":"1997-02-27T15:38:18"},{"date":"1997-03-25T10:32:00","version":"0.4"},{"version":"0.4","date":"1997-05-16T09:24:59"},{"date":"1997-06-03T09:38:38","version":"0.4"},{"version":"0.5","date":"1997-06-10T16:47:47"},{"version":"0.5","date":"1997-11-05T10:05:11"},{"version":"0.5","date":"1998-01-13T16:59:38"},{"version":"0.5","date":"1998-01-20T08:32:03"},{"version":"0.5","date":"1998-03-06T20:52:28"},{"date":"1998-03-25T14:10:24","version":"0.5"},{"version":"0.5","date":"1998-04-08T11:20:48"},{"date":"1998-04-09T16:17:05","version":"0.5"},{"date":"1998-04-24T15:29:23","version":"0.5"},{"version":"0.5","date":"1998-04-30T13:13:58"},{"date":"1998-05-12T07:15:48","version":"0.5"},{"date":"1998-06-04T16:19:02","version":"0.6"},{"version":"0.6","date":"1998-06-12T09:54:35"},{"date":"1998-06-22T09:00:32","version":"0.6"},{"date":"1998-07-03T13:53:55","version":"0.6"},{"version":"0.6","date":"1998-07-21T12:10:39"},{"version":"0.6","date":"1999-01-31T18:01:47"},{"version":"0.6","date":"1999-07-12T13:05:25"},{"date":"1999-09-02T12:47:03","version":"0.6"},{"version":"v0.6.5","date":"1999-09-14T20:27:23"},{"version":"v0.6.6","date":"1999-10-19T19:33:43"},{"date":"1999-10-20T17:10:19","version":"v0.6.7"},{"date":"2000-03-02T22:29:53","version":"v0.6.9"},{"version":"v0.6.10","date":"2000-03-29T18:00:09"},{"date":"2000-04-02T22:12:47","version":"v0.6.11"},{"version":"v0.7.0","date":"2000-08-03T22:12:31"},{"version":"v0.7.1","date":"2000-08-13T20:17:55"},{"version":"v0.7.2","date":"2000-08-14T07:27:17"},{"date":"2000-08-23T23:12:01","version":"v0.7.4"},{"version":"v1.0.0","date":"2000-09-01T19:44:37"},{"version":"v1.0.1","date":"2000-09-17T16:56:12"},{"version":"v1.0.2","date":"2000-09-28T21:50:42"},{"date":"2000-09-29T19:55:57","version":"v1.0.3"},{"version":"v1.0.4","date":"2000-10-23T18:12:41"},{"version":"v1.0.5","date":"2000-10-26T17:18:33"},{"date":"2000-11-05T17:30:34","version":"v1.0.6"},{"date":"2001-01-03T09:48:40","version":"v1.0.7"},{"version":"v1.0.10","date":"2001-02-17T12:43:23"},{"date":"2001-03-15T00:30:04","version":"v1.0.11"},{"date":"2001-07-01T11:30:39","version":"v1.0.12"},{"date":"2001-08-28T21:59:16","version":"v1.0.13"},{"version":"v1.0.14","date":"2001-12-01T13:48:14"},{"version":"2.00","date":"2002-05-18T16:48:08"},{"date":"2002-05-28T20:34:47","version":"2.02"},{"date":"2002-06-01T04:35:47","version":"2.03"},{"date":"2002-06-08T02:11:56","version":"2.04"},{"date":"2002-10-03T03:37:51","version":"2.05"},{"date":"2002-11-25T12:34:01","version":"2.06"},{"version":"2.07","date":"2003-05-05T05:21:16"},{"date":"2003-09-05T20:01:37","version":"2.08"},{"version":"2.09","date":"2004-01-06T01:47:55"},{"date":"2004-03-01T04:28:16","version":"2.10"},{"date":"2004-03-17T15:11:57","version":"2.11"},{"date":"2004-03-24T03:24:16","version":"2.12"},{"version":"2.13","date":"2004-06-28T16:41:47"},{"version":"2.14","date":"2005-04-25T02:15:51"},{"version":"2.15","date":"2005-05-23T17:21:53"},{"date":"2007-03-31T00:51:12","version":"2.16"},{"date":"2007-11-16T20:48:24","version":"2.17"},{"version":"2.18","date":"2007-11-23T18:18:24"},{"version":"2.20","date":"2009-05-18T04:18:09"},{"version":"2.21","date":"2009-08-06T05:30:04"},{"date":"2010-11-12T17:12:42","version":"2.23"},{"date":"2010-11-12T17:29:29","version":"2.24"},{"date":"2010-12-11T06:08:33","version":"2.25"},{"version":"2.29","date":"2011-07-03T04:04:14"},{"date":"2011-07-12T03:59:06","version":"2.30"},{"date":"2012-06-07T01:16:46","version":"2.35"},{"version":"2.38","date":"2012-09-11T01:30:44"},{"version":"2.39","date":"2012-09-11T01:38:57"},{"version":"2.45","date":"2013-07-13T16:49:48"},{"version":"2.51","date":"2014-07-02T11:09:04"},{"date":"2017-01-29T11:41:00","version":"3.05"},{"version":"3.05_01","date":"2017-01-30T14:25:11"},{"version":"3.05_02","date":"2017-01-30T18:55:50"},{"date":"2017-01-31T01:58:36","version":"3.05_03"},{"date":"2017-02-02T11:22:12","version":"3.05_04"},{"version":"3.05_06","date":"2017-03-05T10:48:10"},{"version":"3.05_07","date":"2017-03-05T12:52:10"},{"version":"3.05_09","date":"2017-03-11T07:51:19"},{"date":"2017-03-14T09:03:54","version":"3.05_10"},{"date":"2017-03-29T20:00:48","version":"3.05_11"},{"version":"3.05_12","date":"2017-04-19T07:20:42"},{"version":"3.05_14","date":"2017-10-15T12:06:30"},{"date":"2017-10-21T09:30:17","version":"3.05_15"},{"date":"2017-10-21T16:17:28","version":"3.05_16"},{"date":"2018-04-19T08:29:33","version":"3.06"},{"version":"3.05_17","date":"2018-04-20T16:11:03"},{"date":"2018-04-21T10:08:56","version":"3.08"},{"version":"3.09","date":"2018-04-21T16:50:30"},{"date":"2018-04-27T17:46:19","version":"3.11"},{"version":"3.11_01","date":"2018-09-05T15:12:26"},{"version":"3.12_03","date":"2019-03-06T12:42:01"},{"date":"2019-03-12T09:31:55","version":"3.12_04"},{"version":"3.14_04","date":"2019-04-16T07:32:16"},{"date":"2019-04-23T13:29:25","version":"3.15"},{"version":"3.15_04","date":"2019-05-05T12:46:33"},{"version":"3.24_50","date":"2021-08-25T09:06:32"},{"date":"2021-08-30T08:39:08","version":"3.25"}]},"Fake-Encode":{"main_module":"Fake::Encode","advisories":[{"reported":"2017-01-23","distribution":"Fake-Encode","affected_versions":["<0.08"],"cves":["CVE-2016-1238"],"id":"CPANSA-Fake-Encode-2017-01","fixed_versions":[">=0.08"],"references":["https://metacpan.org/changes/distribution/Fake-Encode"],"description":"Loading modules from . (current directory).\n"}],"versions":[{"version":"0.01","date":"2016-05-31T14:11:49"},{"date":"2017-01-23T12:34:23","version":"0.02"},{"date":"2017-01-25T15:52:13","version":"0.03"},{"date":"2017-01-26T15:17:01","version":"0.04"},{"version":"0.05","date":"2017-03-06T16:01:40"},{"date":"2017-09-08T17:54:14","version":"0.06"},{"date":"2017-09-09T15:27:50","version":"0.07"},{"version":"0.08","date":"2018-02-03T14:50:49"},{"date":"2018-02-19T12:21:04","version":"0.09"},{"version":"0.10","date":"2019-07-11T16:26:06"},{"date":"2023-03-25T02:26:13","version":"0.11"}]},"CGI":{"versions":[{"version":"2.10","date":"1995-11-25T09:21:00"},{"date":"1995-12-28T09:08:00","version":"2.13"},{"date":"1996-05-22T22:30:00","version":"2.20"},{"version":"2.21","date":"1996-05-31T05:31:00"},{"date":"1996-08-07T09:24:00","version":"2.22"},{"version":"2.23","date":"1996-08-14T08:17:00"},{"date":"1996-08-21T09:09:00","version":"2.24"},{"date":"1996-09-10T14:23:00","version":"2.25"},{"date":"1996-10-22T11:17:00","version":"2.26"},{"version":"2.27","date":"1996-10-24T18:21:00"},{"date":"1996-12-02T11:48:00","version":"2.28"},{"version":"2.29","date":"1996-12-09T13:39:00"},{"date":"1997-01-02T16:40:00","version":"2.30"},{"version":"2.31","date":"1997-02-15T15:36:00"},{"date":"1997-03-25T08:58:00","version":"2.32"},{"version":"2.33","date":"1997-04-04T20:45:00"},{"version":"2.34","date":"1997-04-10T15:41:00"},{"date":"1997-04-20T18:29:00","version":"2.35"},{"version":"2.36","date":"1997-05-09T09:33:00"},{"version":"2.37","date":"1997-08-29T04:42:00"},{"version":"2.37","date":"1997-09-15T17:51:00"},{"date":"1997-10-01T04:15:00","version":"2.37"},{"date":"1997-10-12T07:10:00","version":"2.37"},{"date":"1997-11-23T11:37:00","version":"2.37"},{"date":"1997-12-20T09:57:00","version":"2.37"},{"version":"2.37","date":"1998-01-16T12:22:00"},{"date":"1998-01-19T11:34:00","version":"2.37"},{"version":"2.37","date":"1998-01-26T11:00:00"},{"version":"2.37","date":"1998-01-29T19:48:00"},{"date":"1998-02-02T13:37:00","version":"2.37"},{"date":"1998-02-05T08:25:00","version":"2.37"},{"date":"1998-02-09T13:58:00","version":"2.37"},{"date":"1998-02-16T16:21:00","version":"2.37"},{"date":"1998-02-23T08:33:00","version":"2.37"},{"version":"2.37","date":"1998-02-24T16:52:00"},{"date":"1998-03-13T15:33:00","version":"2.37"},{"date":"1998-03-22T21:12:00","version":"2.38"},{"date":"1998-03-24T22:37:08","version":"2.39"},{"version":"2.40","date":"1998-05-20T09:17:00"},{"version":"2.41","date":"1998-05-28T15:03:00"},{"version":"2.42","date":"1998-06-09T09:00:00"},{"date":"1998-10-14T19:06:31","version":"2.43"},{"date":"1998-11-24T19:41:41","version":"2.44"},{"date":"1998-11-26T11:07:27","version":"2.45"},{"date":"1998-12-06T10:22:46","version":"2.46"},{"date":"1999-02-18T03:50:16","version":"2.47"},{"version":"2.48","date":"1999-02-19T14:10:25"},{"date":"1999-02-23T22:00:33","version":"2.49"},{"date":"1999-06-08T15:13:15","version":"2.52"},{"date":"1999-06-09T14:56:06","version":"2.53"},{"date":"1999-08-09T14:18:33","version":"2.54"},{"date":"1999-08-31T17:11:00","version":"2.55"},{"version":"2.56","date":"1999-09-13T21:11:51"},{"version":"2.58","date":"2000-03-23T23:00:12"},{"version":"2.59","date":"2000-03-24T12:31:52"},{"date":"2000-03-27T22:11:34","version":"2.60"},{"date":"2000-03-28T02:50:18","version":"2.61"},{"version":"2.62","date":"2000-03-28T21:38:03"},{"date":"2000-04-10T15:19:54","version":"2.63"},{"date":"2000-04-11T15:25:13","version":"2.64"},{"date":"2000-04-11T15:55:40","version":"2.65"},{"version":"2.66","date":"2000-04-12T20:16:46"},{"version":"2.67","date":"2000-05-16T01:38:08"},{"version":"2.68","date":"2000-05-18T17:55:55"},{"version":"2.69","date":"2000-07-28T03:06:11"},{"version":"2.70","date":"2000-08-04T19:37:27"},{"date":"2000-08-13T16:09:25","version":"2.71"},{"date":"2000-08-20T17:35:50","version":"2.72"},{"version":"3.","date":"2000-08-24T13:33:37"},{"date":"2000-09-13T02:55:51","version":"2.73"},{"version":"2.74","date":"2000-09-13T16:35:14"},{"version":"2.75","date":"2001-02-02T15:43:07"},{"date":"2001-02-02T15:50:53","version":"2.751"},{"date":"2001-02-04T23:49:27","version":"2.752"},{"date":"2001-03-12T17:00:13","version":"2.753"},{"version":"3.02","date":"2001-06-15T15:33:28"},{"date":"2001-06-29T14:47:39","version":"3.02_"},{"version":"3.03_01","date":"2001-07-05T16:13:55"},{"version":"2.76","date":"2001-07-26T21:29:22"},{"version":"2.77","date":"2001-08-07T12:33:22"},{"version":"2.78","date":"2001-09-26T02:26:36"},{"date":"2001-12-09T21:39:11","version":"2.79"},{"date":"2002-01-12T02:47:17","version":"2.80"},{"date":"2002-04-10T19:39:49","version":"2.81"},{"date":"2002-09-11T12:27:48","version":"2.84"},{"version":"2.85","date":"2002-09-11T14:01:02"},{"version":"2.86","date":"2002-09-12T03:58:40"},{"date":"2002-10-07T02:00:58","version":"2.87"},{"version":"2.88","date":"2002-10-14T13:58:09"},{"version":"2.89","date":"2002-10-16T17:50:26"},{"version":0,"date":"2002-11-22T23:03:39"},{"version":"2.90","date":"2003-02-10T20:11:57"},{"date":"2003-02-11T14:15:15","version":"2.91"},{"version":"2.92","date":"2003-04-28T00:44:10"},{"date":"2003-04-28T13:37:43","version":"2.93"},{"date":"2003-06-09T12:15:29","version":"2.94"},{"version":"2.95","date":"2003-06-13T02:35:42"},{"version":"2.96","date":"2003-06-16T18:42:38"},{"date":"2003-06-17T23:32:52","version":"2.97"},{"version":"2.98","date":"2003-07-16T17:06:29"},{"version":"2.99","date":"2003-08-01T14:43:54"},{"date":"2003-08-18T17:51:48","version":"3.00"},{"date":"2003-12-10T17:05:47","version":"3.01"},{"version":"3.03","date":"2004-01-13T16:34:47"},{"date":"2004-01-19T12:44:30","version":"3.04"},{"version":"3.05","date":"2004-04-12T20:39:57"},{"date":"2005-03-09T21:06:46","version":"3.06"},{"version":"3.07","date":"2005-03-14T16:34:03"},{"date":"2005-04-20T15:31:11","version":"3.08"},{"version":"3.09","date":"2005-05-05T20:16:55"},{"version":"3.10","date":"2005-05-13T21:48:46"},{"date":"2005-08-03T21:17:14","version":"3.11"},{"date":"2005-12-04T16:46:53","version":"3.12"},{"date":"2005-12-05T13:54:26","version":"3.13"},{"date":"2005-12-06T22:14:19","version":"3.14"},{"version":"3.15","date":"2005-12-07T20:16:49"},{"version":"3.16","date":"2006-02-08T18:50:56"},{"date":"2006-02-24T19:04:58","version":"3.17"},{"date":"2006-04-17T13:56:06","version":"3.19"},{"version":"3.20","date":"2006-04-23T14:27:55"},{"date":"2006-08-21T19:12:36","version":"3.21"},{"version":"3.22","date":"2006-08-23T15:24:41"},{"date":"2006-08-24T11:53:26","version":"3.23"},{"date":"2006-09-28T17:09:45","version":"3.25"},{"version":"3.27","date":"2007-02-27T15:42:54"},{"version":"3.28","date":"2007-03-29T15:38:01"},{"date":"2007-04-16T17:00:18","version":"3.29"},{"version":"3.31","date":"2007-11-30T19:06:19"},{"date":"2007-12-27T18:41:32","version":"3.32"},{"version":"3.33","date":"2008-01-03T15:03:17"},{"version":"3.34","date":"2008-03-18T16:04:41"},{"version":"3.35","date":"2008-03-27T14:26:48"},{"date":"2008-04-23T13:09:44","version":"3.37"},{"date":"2008-06-25T14:58:32","version":"3.38"},{"date":"2008-07-29T15:01:52","version":"3.39"},{"version":"3.40","date":"2008-08-06T18:21:51"},{"date":"2008-08-26T13:56:27","version":"3.41"},{"version":"3.42","date":"2008-09-08T14:15:41"},{"version":"3.43","date":"2009-04-06T18:35:19"},{"version":"3.44","date":"2009-07-30T16:34:17"},{"version":"3.45","date":"2009-08-14T13:37:12"},{"date":"2009-09-09T15:39:42","version":"3.46"},{"version":"3.47","date":"2009-09-09T20:03:01"},{"date":"2009-09-25T15:07:03","version":"3.48"},{"version":"3.49","date":"2010-02-05T16:24:53"},{"version":"3.50","date":"2010-11-08T21:53:26"},{"date":"2011-01-05T18:28:41","version":"3.51"},{"version":"3.52","date":"2011-01-25T04:30:05"},{"version":"3.53","date":"2011-04-25T23:01:21"},{"date":"2011-04-28T14:36:41","version":"3.54"},{"date":"2011-06-03T15:39:16","version":"3.55"},{"version":"3.56","date":"2011-11-09T02:00:20"},{"date":"2011-11-09T15:59:18","version":"3.57"},{"date":"2011-11-12T03:36:07","version":"3.58"},{"version":"3.59","date":"2011-12-30T13:35:35"},{"date":"2012-08-16T03:21:13","version":"3.60"},{"date":"2012-11-03T02:10:42","version":"3.61"},{"date":"2012-11-10T01:40:50","version":"3.62"},{"version":"3.63","date":"2012-11-14T23:45:29"},{"version":"3.64","date":"2013-11-24T01:22:00"},{"version":"3.65","date":"2014-02-12T03:13:58"},{"date":"2014-05-15T12:59:58","version":"3.65_01"},{"date":"2014-05-16T11:43:33","version":"3.65_02"},{"version":"3.65_03","date":"2014-05-20T12:31:46"},{"date":"2014-05-22T19:58:14","version":"4.00"},{"version":"4.01","date":"2014-05-27T13:13:51"},{"date":"2014-06-09T13:55:49","version":"4.02"},{"version":"4.03","date":"2014-07-02T14:53:06"},{"date":"2014-07-28T18:30:34","version":"4.03_01"},{"date":"2014-07-30T14:26:40","version":"4.03_02"},{"version":"4.03_03","date":"2014-08-13T11:40:14"},{"date":"2014-09-04T14:42:14","version":"4.04"},{"version":"4.04_01","date":"2014-09-20T16:08:55"},{"date":"2014-09-28T19:57:05","version":"4.04_02"},{"version":"4.04_03","date":"2014-09-29T09:50:07"},{"date":"2014-10-06T12:01:14","version":"4.04_04"},{"date":"2014-10-06T12:24:10","version":"4.04_05"},{"date":"2014-10-08T07:42:49","version":"4.05"},{"version":"4.06","date":"2014-10-10T11:35:49"},{"version":"4.07","date":"2014-10-12T16:29:35"},{"date":"2014-10-18T11:00:38","version":"4.08"},{"date":"2014-10-21T07:33:36","version":"4.09"},{"date":"2014-11-25T21:06:50","version":"4.09_01"},{"date":"2014-11-27T12:53:51","version":"4.10"},{"date":"2014-11-30T12:12:26","version":"4.10_01"},{"version":"4.11","date":"2014-12-03T07:25:15"},{"version":"4.12","date":"2014-12-18T08:35:52"},{"date":"2014-12-18T09:21:52","version":"4.13"},{"date":"2015-02-12T14:19:13","version":"4.13_01"},{"date":"2015-02-13T08:01:29","version":"4.13_02"},{"version":"4.13_03","date":"2015-03-01T13:28:25"},{"version":"4.13_04","date":"2015-03-08T16:09:21"},{"date":"2015-03-25T17:55:15","version":"4.13_05"},{"date":"2015-04-01T06:51:57","version":"4.14"},{"version":"4.14_01","date":"2015-04-17T14:27:39"},{"date":"2015-04-20T07:15:45","version":"4.15"},{"version":"4.20","date":"2015-05-29T14:48:42"},{"date":"2015-06-22T07:50:02","version":"4.21"},{"date":"2015-10-16T09:46:31","version":"4.22"},{"version":"4.24","date":"2015-12-20T18:33:35"},{"date":"2015-12-21T09:29:19","version":"4.25"},{"version":"4.26","date":"2016-02-04T16:37:12"},{"date":"2016-03-02T08:03:46","version":"4.27"},{"version":"4.28","date":"2016-03-14T07:21:48"},{"date":"2016-05-22T12:23:19","version":"4.28_01"},{"date":"2016-05-22T12:54:23","version":"4.28_02"},{"version":"4.28_03","date":"2016-05-23T08:25:25"},{"version":"4.29","date":"2016-06-09T12:01:20"},{"date":"2016-06-09T12:11:54","version":"4.30"},{"date":"2016-06-14T07:14:00","version":"4.31"},{"date":"2016-07-19T07:05:46","version":"4.32"},{"date":"2016-09-16T09:47:49","version":"4.33"},{"date":"2016-10-13T11:58:55","version":"4.34"},{"version":"4.35","date":"2016-10-13T13:56:21"},{"date":"2017-03-29T08:56:26","version":"4.35_01"},{"date":"2017-04-06T14:42:12","version":"4.36"},{"date":"2017-11-01T10:17:40","version":"4.37"},{"date":"2017-12-01T08:41:02","version":"4.38"},{"date":"2018-08-13T15:57:52","version":"4.39"},{"date":"2018-08-15T08:39:39","version":"4.40"},{"date":"2019-03-26T15:58:49","version":"4.41"},{"version":"4.42","date":"2019-03-26T16:33:27"},{"version":"4.43","date":"2019-05-01T14:28:45"},{"date":"2019-06-03T09:00:55","version":"4.44"},{"version":"4.45","date":"2020-01-13T07:03:55"},{"version":"4.46","date":"2020-02-03T14:49:22"},{"date":"2020-05-01T13:01:44","version":"4.47"},{"version":"4.48","date":"2020-06-02T08:22:41"},{"version":"4.49","date":"2020-06-08T09:46:25"},{"version":"4.50","date":"2020-06-22T07:35:25"},{"version":"4.51","date":"2020-10-05T06:14:39"},{"date":"2021-05-04T08:02:27","version":"4.52"},{"version":"4.53","date":"2021-06-03T06:45:55"},{"date":"2022-02-03T07:52:34","version":"4.54"},{"date":"2023-01-03T07:45:53","version":"4.55"},{"date":"2023-03-03T08:51:51","version":"4.56"},{"version":"4.57","date":"2023-05-02T13:16:01"},{"date":"2023-10-02T07:08:45","version":"4.58"},{"date":"2023-10-02T07:14:30","version":"4.59"},{"date":"2023-11-01T07:57:12","version":"4.60"},{"version":"4.61","date":"2024-01-08T15:17:04"},{"date":"2024-03-01T13:46:49","version":"4.62"},{"version":"4.63","date":"2024-03-06T15:20:30"},{"version":"4.64","date":"2024-03-18T12:10:48"},{"version":"4.65","date":"2024-06-04T15:15:17"},{"date":"2024-06-19T08:59:52","version":"4.66"}],"main_module":"CGI","advisories":[{"fixed_versions":[">=3.63"],"id":"CPANSA-CGI-2012-5526","severity":null,"references":["http://www.securityfocus.com/bid/56562","http://www.openwall.com/lists/oss-security/2012/11/15/6","https://github.com/markstos/CGI.pm/pull/23","http://www.securitytracker.com/id?1027780","http://cpansearch.perl.org/src/MARKSTOS/CGI.pm-3.63/Changes","http://secunia.com/advisories/51457","http://www.ubuntu.com/usn/USN-1643-1","http://www.debian.org/security/2012/dsa-2586","http://rhn.redhat.com/errata/RHSA-2013-0685.html","http://secunia.com/advisories/55314","http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","https://exchange.xforce.ibmcloud.com/vulnerabilities/80098"],"description":"CGI.pm module before 3.63 for Perl does not properly escape newlines in (1) Set-Cookie or (2) P3P headers, which might allow remote attackers to inject arbitrary headers into responses from applications that use CGI.pm.\n","affected_versions":["<3.63"],"reported":"2012-11-21","distribution":"CGI","cves":["CVE-2012-5526"]},{"affected_versions":["<3.56"],"distribution":"CGI","reported":"2011-11-08","cves":["CVE-2011-2766"],"fixed_versions":[">=3.56"],"id":"CPANSA-CGI-2011-2766","description":"Usage of deprecated FCGI.pm API.\n","references":["https://rt.cpan.org/Public/Bug/Display.html?id=68380","http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-2766"]},{"id":"CPANSA-CGI-2010-02","fixed_versions":[">=3.50"],"description":"Non-random MIME boundary.\n","distribution":"CGI","reported":"2010-11-08","affected_versions":["<3.50"],"cves":[]},{"id":"CPANSA-CGI-2010-01","fixed_versions":[">=3.49"],"description":"Newlines in headers.\n","reported":"2010-02-05","distribution":"CGI","affected_versions":["<3.49"],"cves":[]},{"description":"Unspecified vulnerability in CGI.pm 3.50 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unknown vectors. NOTE: this issue exists because of an incomplete fix for CVE-2010-2761.\n","references":["http://openwall.com/lists/oss-security/2010/12/01/3","http://www.mandriva.com/security/advisories?name=MDVSA-2011:008","http://www.vupen.com/english/advisories/2011/0106","http://www.bugzilla.org/security/3.2.9/","http://secunia.com/advisories/43033","https://bugzilla.mozilla.org/show_bug.cgi?id=591165","http://www.vupen.com/english/advisories/2011/0207","http://www.vupen.com/english/advisories/2011/0271","http://www.vupen.com/english/advisories/2011/0212","http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html","http://secunia.com/advisories/43068","http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html","http://secunia.com/advisories/43165","http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html","http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"],"fixed_versions":[">=3.50"],"severity":null,"id":"CPANSA-CGI-2010-4411","cves":["CVE-2010-4411"],"affected_versions":["<3.50"],"reported":"2010-12-06","distribution":"CGI"},{"reported":"2010-12-06","distribution":"CGI","affected_versions":["<3.50"],"cves":["CVE-2010-2761"],"severity":null,"id":"CPANSA-CGI-2010-2761","fixed_versions":[">=3.50"],"references":["https://github.com/AndyA/CGI--Simple/commit/e4942b871a26c1317a175a91ebb7262eea59b380","http://cpansearch.perl.org/src/LDS/CGI.pm-3.50/Changes","http://openwall.com/lists/oss-security/2010/12/01/1","http://www.nntp.perl.org/group/perl.perl5.changes/2010/11/msg28043.html","http://perl5.git.perl.org/perl.git/blobdiff/a0b94c2432b1d8c20653453a0f6970cb10f59aec..84601d63a7e34958da47dad1e61e27cb3bd467d1:/cpan/CGI/lib/CGI.pm","http://perl5.git.perl.org/perl.git/commit/84601d63a7e34958da47dad1e61e27cb3bd467d1","http://openwall.com/lists/oss-security/2010/12/01/2","http://openwall.com/lists/oss-security/2010/12/01/3","https://bugzilla.mozilla.org/show_bug.cgi?id=600464","http://osvdb.org/69588","http://osvdb.org/69589","http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html","http://www.mandriva.com/security/advisories?name=MDVSA-2010:237","http://www.vupen.com/english/advisories/2011/0076","http://www.mandriva.com/security/advisories?name=MDVSA-2010:250","http://secunia.com/advisories/42877","https://bugzilla.mozilla.org/show_bug.cgi?id=591165","http://www.vupen.com/english/advisories/2011/0207","http://www.bugzilla.org/security/3.2.9/","http://secunia.com/advisories/43033","http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053591.html","http://secunia.com/advisories/43147","http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053576.html","http://www.vupen.com/english/advisories/2011/0249","http://www.vupen.com/english/advisories/2011/0271","http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html","http://www.vupen.com/english/advisories/2011/0212","http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html","http://secunia.com/advisories/43165","http://secunia.com/advisories/43068","http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html","http://www.redhat.com/support/errata/RHSA-2011-1797.html","http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"],"description":"The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172.\n"}]},"Encode":{"advisories":[{"references":["https://metacpan.org/changes/distribution/Encode","https://github.com/dankogai/p5-encode/pull/58/commits/12be15d64ce089154c4367dc1842cd0dc0993ec6"],"description":"Loading optional modules from . (current directory).\n","id":"CPANSA-Encode-2016-01","fixed_versions":[">=2.85"],"cves":["CVE-2016-1238"],"distribution":"Encode","reported":"2016-07-27","affected_versions":["<2.85"]},{"fixed_versions":[">3.11"],"id":"CPANSA-Encode-2021-01","references":["https://github.com/Perl/perl5/commit/c1a937fef07c061600a0078f4cb53fe9c2136bb9","https://github.com/dankogai/p5-encode/commit/527e482dc70b035d0df4f8c77a00d81f8d775c74","https://metacpan.org/dist/Encode/changes","https://news.cpanel.com/unscheduled-tsr-10-august-2021/","https://security.netapp.com/advisory/ntap-20210909-0003/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5NDGQSGMEZ75FJGBKNYC75OTO7TF7XHB/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6KOZYD7BH2DNIAEZ2ZL4PJ4QUVQI6Y33/","https://security-tracker.debian.org/tracker/CVE-2021-36770"],"description":"Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value.\n","affected_versions":[">=3.05","<=3.11"],"distribution":"Encode","reported":"2021-07-17","cves":["CVE-2021-36770"]},{"id":"CPANSA-Encode-2011-2939","x-commit":"Encode CVE-2011-2939 GitHub #13","cves":["CVE-2011-2939"],"reported":"2012-01-13","distribution":"Encode","affected_versions":["<2.44"],"references":["http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5","https://bugzilla.redhat.com/show_bug.cgi?id=731246","http://www.openwall.com/lists/oss-security/2011/08/19/17","http://www.redhat.com/support/errata/RHSA-2011-1424.html","http://www.openwall.com/lists/oss-security/2011/08/18/8","http://secunia.com/advisories/46989","http://www.mandriva.com/security/advisories?name=MDVSA-2012:008","http://secunia.com/advisories/51457","http://www.ubuntu.com/usn/USN-1643-1","http://www.securityfocus.com/bid/49858","http://secunia.com/advisories/46172","http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod","http://secunia.com/advisories/55314","http://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_(CVE-2011-2939)"],"description":"Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow.\n","severity":null,"fixed_versions":[">=2.44"]}],"main_module":"Encode","versions":[{"date":"2002-03-20T08:30:40","version":"0.93"},{"version":"0.94","date":"2002-03-20T20:15:52"},{"version":"0.95","date":"2002-03-21T16:07:21"},{"date":"2002-03-22T22:33:15","version":"0.96"},{"version":"0.97","date":"2002-03-23T20:36:05"},{"version":"0.98","date":"2002-03-24T16:07:09"},{"date":"2002-03-25T19:45:16","version":"0.99"},{"date":"2002-03-28T23:39:49","version":"1.00"},{"version":"1.01","date":"2002-03-29T21:43:17"},{"version":"1.10","date":"2002-03-31T21:40:25"},{"date":"2002-03-31T22:27:07","version":"1.11"},{"date":"2002-04-04T20:02:40","version":"1.20"},{"date":"2002-04-07T15:36:48","version":"1.26"},{"date":"2002-04-07T18:49:41","version":"1.27"},{"date":"2002-04-07T19:05:34","version":"1.28"},{"date":"2002-04-08T02:49:31","version":"1.30"},{"version":"1.31","date":"2002-04-08T18:51:14"},{"date":"2002-04-09T20:26:37","version":"1.32"},{"version":"1.33","date":"2002-04-10T22:44:19"},{"date":"2002-04-14T22:49:10","version":"1.40"},{"version":"1.41","date":"2002-04-16T23:47:16"},{"version":"1.50","date":"2002-04-19T06:18:26"},{"version":"1.51","date":"2002-04-20T10:08:39"},{"version":"1.52","date":"2002-04-20T23:55:45"},{"version":"1.56","date":"2002-04-22T09:56:04"},{"date":"2002-04-22T20:37:12","version":"1.57"},{"version":"1.58","date":"2002-04-23T00:22:06"},{"version":"1.60","date":"2002-04-24T20:23:42"},{"date":"2002-04-26T03:19:40","version":"1.61"},{"version":"1.62","date":"2002-04-27T11:43:39"},{"date":"2002-04-27T19:52:51","version":"1.63"},{"date":"2002-04-29T07:20:38","version":"1.64"},{"version":"1.65","date":"2002-04-30T16:40:07"},{"date":"2002-05-01T05:51:35","version":"1.66"},{"version":"1.67","date":"2002-05-02T07:43:35"},{"date":"2002-05-03T12:29:47","version":"1.68"},{"version":"1.69","date":"2002-05-04T16:50:40"},{"version":"1.70","date":"2002-05-06T10:36:39"},{"date":"2002-05-07T16:30:42","version":"1.71"},{"version":"1.72","date":"2002-05-20T16:04:48"},{"date":"2002-05-28T18:41:36","version":"1.74"},{"version":"1.75","date":"2002-06-01T18:17:49"},{"version":"1.76","date":"2002-08-25T15:18:49"},{"date":"2002-10-06T03:59:19","version":"1.77"},{"date":"2002-10-20T15:55:16","version":"1.78"},{"date":"2002-10-21T06:11:36","version":"1.79"},{"version":"1.80","date":"2002-10-21T20:42:56"},{"version":"1.81","date":"2002-11-08T18:42:11"},{"version":"1.82","date":"2002-11-14T23:17:11"},{"version":"1.83","date":"2002-11-18T18:06:47"},{"version":"1.84","date":"2003-01-10T12:09:05"},{"date":"2003-01-21T22:23:28","version":"1.85"},{"date":"2003-01-22T03:36:42","version":"1.86"},{"date":"2003-02-06T02:01:00","version":"1.87"},{"date":"2003-02-20T14:46:12","version":"1.88"},{"date":"2003-02-28T01:45:53","version":"1.89"},{"version":"1.90","date":"2003-03-09T17:54:26"},{"date":"2003-03-09T20:12:08","version":"1.91"},{"date":"2003-03-31T03:51:31","version":"1.92"},{"version":"1.93","date":"2003-04-24T17:50:54"},{"version":"1.94","date":"2003-05-10T18:31:48"},{"version":"1.95","date":"2003-05-21T09:22:43"},{"version":"1.96","date":"2003-06-18T09:41:21"},{"version":"1.97","date":"2003-07-08T22:01:28"},{"date":"2003-08-25T11:47:32","version":"1.98"},{"date":"2003-12-29T02:52:28","version":"1.99"},{"date":"2004-05-16T21:05:06","version":"2.00"},{"version":"2.01","date":"2004-05-25T16:31:35"},{"date":"2004-08-31T11:01:51","version":"2.02"},{"date":"2004-10-06T06:50:47","version":"2.03"},{"version":"2.04","date":"2004-10-16T21:26:58"},{"version":"2.05","date":"2004-10-19T05:03:32"},{"date":"2004-10-22T06:29:14","version":"2.06"},{"date":"2004-10-22T19:43:19","version":"2.07"},{"date":"2004-10-24T13:04:29","version":"2.08"},{"version":"2.09","date":"2004-12-03T19:21:42"},{"version":"2.10","date":"2005-05-16T18:54:53"},{"date":"2005-08-05T11:26:06","version":"2.11"},{"version":"2.12","date":"2005-09-08T14:23:38"},{"version":"2.13","date":"2006-01-15T15:12:01"},{"version":"2.14","date":"2006-01-15T15:57:41"},{"date":"2006-04-06T16:01:30","version":"2.15"},{"version":"2.16","date":"2006-05-03T18:38:44"},{"version":"2.17","date":"2006-05-09T17:14:04"},{"date":"2006-06-03T20:34:08","version":"2.18"},{"date":"2007-04-06T13:05:52","version":"2.19"},{"date":"2007-04-22T15:17:34","version":"2.20"},{"date":"2007-05-12T06:50:09","version":"2.21"},{"version":"2.22","date":"2007-05-29T07:43:07"},{"version":"2.23","date":"2007-05-29T18:21:25"},{"date":"2008-03-12T10:12:18","version":"2.24"},{"date":"2008-05-07T21:06:08","version":"2.25"},{"version":"2.26","date":"2008-07-01T21:03:33"},{"date":"2009-01-21T23:01:50","version":"2.27"},{"version":"2.29","date":"2009-02-01T13:16:44"},{"date":"2009-02-15T17:48:01","version":"2.30"},{"date":"2009-02-16T06:25:32","version":"2.31"},{"version":"2.32","date":"2009-03-07T07:45:00"},{"date":"2009-03-25T08:01:10","version":"2.33"},{"date":"2009-07-08T13:53:25","version":"2.34"},{"version":"2.35","date":"2009-07-13T02:32:45"},{"date":"2009-09-06T09:20:21","version":"2.36"},{"version":"2.37","date":"2009-09-06T14:37:23"},{"date":"2009-11-16T14:34:43","version":"2.38"},{"date":"2009-11-26T09:31:02","version":"2.39"},{"version":"2.40","date":"2010-09-18T18:47:17"},{"date":"2010-12-23T11:12:33","version":"2.41"},{"version":"2.42","date":"2010-12-31T22:52:35"},{"version":"2.43","date":"2011-05-21T23:21:24"},{"date":"2011-08-09T08:01:30","version":"2.44"},{"date":"2012-08-05T23:15:11","version":"2.45"},{"version":"2.46","date":"2012-08-12T05:52:45"},{"version":"2.47","date":"2012-08-15T05:40:21"},{"date":"2013-02-18T02:43:35","version":"2.48"},{"date":"2013-03-05T03:19:15","version":"2.49"},{"version":"2.50","date":"2013-04-26T18:36:59"},{"date":"2013-04-29T22:21:31","version":"2.51"},{"version":"2.52","date":"2013-08-14T02:33:46"},{"date":"2013-08-29T15:27:02","version":"2.53"},{"version":"2.54","date":"2013-08-29T16:50:08"},{"date":"2013-09-14T07:58:54","version":"2.55"},{"date":"2013-12-22T04:12:07","version":"2.56"},{"version":"2.57","date":"2014-01-03T04:55:36"},{"version":"2.58","date":"2014-03-28T02:41:54"},{"version":"2.59","date":"2014-04-06T17:41:19"},{"version":"2.60","date":"2014-04-29T16:34:10"},{"version":"2.61","date":"2014-05-31T09:55:56"},{"date":"2014-05-31T12:20:28","version":"2.62"},{"date":"2014-10-19T07:13:44","version":"2.63"},{"version":"2.64","date":"2014-10-29T15:42:04"},{"date":"2014-11-27T14:12:57","version":"2.65"},{"version":"2.66","date":"2014-12-02T23:37:28"},{"date":"2014-12-04T20:28:33","version":"2.67"},{"version":"2.68","date":"2015-01-22T10:29:46"},{"date":"2015-02-05T10:43:34","version":"2.69"},{"version":"2.70","date":"2015-02-05T10:56:52"},{"date":"2015-03-12T00:14:19","version":"2.71"},{"date":"2015-03-14T02:51:25","version":"2.72"},{"version":"2.73","date":"2015-04-15T23:27:13"},{"version":"2.74","date":"2015-06-25T00:59:20"},{"version":"2.75","date":"2015-06-30T10:10:03"},{"version":"2.76","date":"2015-07-31T02:26:51"},{"version":"2.77","date":"2015-09-15T14:03:35"},{"date":"2015-09-24T02:29:52","version":"2.78"},{"date":"2016-01-22T07:08:25","version":"2.79"},{"date":"2016-01-25T15:04:42","version":"2.80"},{"date":"2016-02-06T19:34:58","version":"2.81"},{"date":"2016-02-06T20:21:37","version":"2.82"},{"date":"2016-03-24T08:00:30","version":"2.83"},{"version":"2.84","date":"2016-04-11T07:24:26"},{"date":"2016-08-04T03:37:23","version":"2.85"},{"date":"2016-08-10T18:25:39","version":"2.86"},{"version":"2.87","date":"2016-10-28T05:15:33"},{"date":"2016-11-29T23:38:19","version":"2.88"},{"date":"2017-04-21T05:24:59","version":"2.89"},{"version":"2.90","date":"2017-06-10T17:46:11"},{"date":"2017-06-22T08:18:22","version":"2.91"},{"date":"2017-07-18T07:23:39","version":"2.92"},{"date":"2017-10-06T22:33:35","version":"2.93"},{"date":"2018-01-09T06:04:38","version":"2.94"},{"version":"2.95","date":"2018-02-08T00:41:02"},{"version":"2.96","date":"2018-02-11T05:41:37"},{"version":"2.97","date":"2018-02-21T12:30:05"},{"version":"2.98","date":"2018-04-22T09:14:59"},{"version":"2.99","date":"2019-01-21T03:28:35"},{"version":"2.100","date":"2019-01-31T04:42:29"},{"date":"2019-01-31T05:05:06","version":"3.00"},{"date":"2019-03-13T00:45:28","version":"3.01"},{"date":"2019-12-25T09:47:36","version":"3.02"},{"version":"3.03","date":"2020-03-02T04:45:26"},{"version":"3.04","date":"2020-03-10T22:40:35"},{"version":"3.05","date":"2020-03-18T05:03:23"},{"version":"3.06","date":"2020-05-02T02:40:38"},{"date":"2020-07-25T13:08:13","version":"3.07"},{"date":"2020-12-02T09:20:23","version":"3.08"},{"version":"3.09","date":"2021-05-14T11:03:11"},{"date":"2021-05-18T07:51:48","version":"3.10"},{"date":"2021-07-23T02:41:38","version":"3.11"},{"date":"2021-08-09T14:30:33","version":"3.12"},{"date":"2021-10-06T00:57:50","version":"3.13"},{"date":"2021-10-08T00:35:29","version":"3.14"},{"date":"2021-10-08T15:45:44","version":"3.15"},{"version":"3.16","date":"2021-10-13T08:39:09"},{"version":"3.17","date":"2022-04-07T03:18:23"},{"version":"3.18","date":"2022-06-25T02:14:35"},{"version":"3.19","date":"2022-08-04T04:51:01"},{"date":"2023-11-10T01:26:15","version":"3.20"},{"date":"2024-02-25T23:19:43","version":"3.21"}]},"Valiant":{"versions":[{"date":"2021-02-25T17:30:04","version":"0.001001"},{"date":"2021-02-25T17:57:04","version":"0.001002"},{"version":"0.001003","date":"2021-03-04T15:56:07"},{"version":"0.001004","date":"2021-04-07T14:42:08"},{"date":"2021-04-18T12:44:18","version":"0.001005"},{"date":"2021-04-20T01:13:20","version":"0.001006"},{"version":"0.001007","date":"2021-09-07T01:06:25"},{"version":"0.001008","date":"2021-09-14T14:58:28"},{"date":"2021-10-01T17:54:48","version":"0.001009"},{"version":"0.001010","date":"2021-10-26T17:09:00"},{"date":"2021-11-03T21:55:14","version":"0.001011"},{"version":"0.001012","date":"2022-02-27T23:39:59"},{"date":"2022-03-03T14:37:57","version":"0.001013"},{"version":"0.001014","date":"2022-03-04T15:43:13"},{"version":"0.001015","date":"2022-08-03T23:46:42"},{"version":"0.001016","date":"2022-09-11T19:09:30"},{"version":"0.001017","date":"2022-12-06T23:57:19"},{"version":"0.001018","date":"2023-04-06T18:14:16"},{"date":"2023-04-08T22:55:02","version":"0.001019"},{"date":"2023-04-09T19:34:57","version":"0.001020"},{"date":"2023-04-10T21:53:58","version":"0.001021"},{"date":"2023-04-18T13:17:26","version":"0.001022"},{"date":"2023-07-13T01:06:07","version":"0.001023"},{"date":"2023-07-14T12:59:23","version":"0.001024"},{"version":"0.001025","date":"2023-08-02T23:49:48"},{"date":"2023-08-03T22:50:38","version":"0.001026"},{"version":"0.002001","date":"2023-08-11T22:44:06"},{"date":"2023-08-27T14:18:29","version":"0.002002"},{"version":"0.002003","date":"2023-10-04T17:28:16"},{"version":"0.002004","date":"2024-07-29T19:33:48"},{"version":"0.002005","date":"2024-10-02T00:46:07"},{"date":"2024-11-11T21:41:15","version":"0.002006"},{"version":"0.002007","date":"2024-11-26T18:52:22"},{"version":"0.002008","date":"2024-11-29T16:12:40"},{"version":"0.002009","date":"2024-12-05T17:37:52"},{"version":"0.002010","date":"2024-12-07T15:43:12"},{"version":"0.002011","date":"2024-12-07T19:59:50"},{"version":"0.002012","date":"2024-12-12T22:53:06"}],"advisories":[{"description":"closed potential security issue with deeply nested paramters in the DBIC glue code. This was a hack that could let someone create a child record if you were allowing find_by_unique rather than find by primary key.\n","references":["https://github.com/briandfoy/cpan-security-advisory/issues/175","https://github.com/jjn1056/Valiant/commit/242348776cc01e736397767f11f86cc4055817c4"],"fixed_versions":[">=0.002011"],"severity":null,"id":"CPANSA-Valiant-2024-001","cves":[],"affected_versions":["<0.002011"],"reported":null,"distribution":"Valiant"}],"main_module":"Valiant"},"Jifty-DBI":{"advisories":[{"affected_versions":["<0.68"],"reported":"2011-04-04","distribution":"Jifty-DBI","cves":[],"fixed_versions":[">=0.68"],"id":"CPANSA-Jifty-DBI-2011-01","description":"SQL injection in column names, operators, order and group by.\n","references":["https://metacpan.org/dist/Jifty-DBI/changes","https://metacpan.org/dist/Jifty/changes"]}],"main_module":"Jifty::DBI","versions":[{"date":"2005-11-08T21:32:52","version":"0.02"},{"date":"2005-11-26T07:21:20","version":"0.05_01"},{"version":"0.06","date":"2005-12-23T20:48:59"},{"date":"2005-12-24T04:29:10","version":"0.06"},{"version":"0.08","date":"2005-12-25T19:37:31"},{"date":"2005-12-29T13:31:40","version":"0.09"},{"version":"0.10","date":"2006-01-08T10:05:05"},{"date":"2006-01-15T17:22:14","version":"0.11"},{"version":"0.15","date":"2006-03-05T01:55:32"},{"date":"2006-03-05T02:07:03","version":"0.15"},{"date":"2006-03-31T13:22:16","version":"0.18"},{"date":"2006-04-02T10:05:36","version":"0.19"},{"version":"0.20","date":"2006-04-21T16:27:47"},{"date":"2006-05-03T18:26:47","version":"0.20"},{"version":"0.21","date":"2006-06-15T12:17:00"},{"date":"2006-09-12T22:56:59","version":"0.25"},{"version":"0.25","date":"2006-11-13T16:15:30"},{"version":"0.25","date":"2006-11-24T03:15:46"},{"date":"2007-01-17T20:34:50","version":"0.25"},{"version":"0.31","date":"2007-01-26T11:55:26"},{"version":"0.39_99","date":"2007-01-26T12:22:07"},{"date":"2007-01-26T12:56:35","version":"0.32"},{"version":"0.39_999","date":"2007-01-26T13:34:03"},{"version":"0.32","date":"2007-01-28T13:30:21"},{"version":"0.39_9999","date":"2007-04-15T15:26:52"},{"date":"2007-04-16T20:21:33","version":"0.41"},{"date":"2007-08-24T04:20:36","version":"0.43"},{"date":"2007-10-26T16:48:22","version":"0.43"},{"date":"2007-11-07T17:27:17","version":"0.46"},{"date":"2007-11-16T21:28:33","version":"0.46"},{"version":"0.46","date":"2007-11-29T21:38:34"},{"date":"2008-04-08T03:05:48","version":"0.49"},{"date":"2009-03-25T19:32:29","version":"0.53"},{"version":"0.53","date":"2009-05-19T12:33:45"},{"date":"2009-07-14T07:29:33","version":"0.53"},{"date":"2009-11-19T01:16:21","version":"0.59"},{"date":"2010-01-04T18:04:58","version":"0.60"},{"date":"2010-12-08T20:15:10","version":"0.63"},{"version":"0.64","date":"2010-12-08T20:24:47"},{"date":"2011-02-14T21:27:51","version":"0.66"},{"date":"2011-02-28T16:00:37","version":"0.67"},{"version":"0.68","date":"2011-04-14T16:20:25"},{"date":"2011-05-17T19:54:33","version":"0.69"},{"date":"2011-06-15T20:46:39","version":"0.70"},{"date":"2011-06-17T20:39:50","version":"0.71"},{"date":"2011-10-17T16:45:06","version":"0.72"},{"date":"2012-01-25T21:39:16","version":"0.73"},{"version":"0.74","date":"2012-01-25T21:45:14"},{"version":"0.75","date":"2013-01-29T20:18:33"},{"version":"0.76","date":"2013-06-17T22:14:37"},{"version":"0.77","date":"2013-12-01T18:11:35"},{"version":"0.78","date":"2015-04-30T19:16:36"}]},"urxvt-bgdsl":{"advisories":[{"references":["https://bugzilla.redhat.com/show_bug.cgi?id=2151597","https://www.openwall.com/lists/oss-security/2022/12/05/1"],"description":"The rxvt-unicode package is vulnerable to a remote code execution, in the Perl background extension, when an attacker can control the data written to the user's terminal and certain options are set.\n","fixed_versions":[">=9.29"],"severity":null,"id":"CPANSA-urxvt-bgdsl-2022-4170","cves":["CVE-2022-4170"],"darkpan":"true","affected_versions":[">=9.25,<=9.26"],"reported":"2022-12-09","distribution":"urxvt-bgdsl"}],"main_module":"","versions":[]},"Image-Info":{"main_module":"Image::Info","advisories":[{"cves":["CVE-2016-9181"],"affected_versions":[">=2.12"],"distribution":"Image-Info","reported":"2016-11-04","description":"perl-Image-Info: When parsing an SVG file, external entity expansion (XXE) was not disabled. An attacker could craft an SVG file which, when processed by an application using perl-Image-Info, could cause denial of service or, potentially, information disclosure.\n","references":["http://www.securityfocus.com/bid/94220","http://www.openwall.com/lists/oss-security/2016/11/04/2"],"fixed_versions":[],"id":"CPANSA-Image-Info-2016-01"}],"versions":[{"version":"0.01","date":"1999-12-19T07:09:24"},{"version":"0.02","date":"1999-12-22T00:03:22"},{"version":"0.03","date":"1999-12-25T22:43:22"},{"version":"0.04","date":"2000-01-07T18:20:42"},{"date":"2000-08-24T09:09:25","version":"0.05"},{"date":"2000-10-18T19:55:02","version":"1.00"},{"version":"1.01","date":"2000-10-31T17:32:56"},{"date":"2000-11-10T18:21:41","version":"1.02"},{"date":"2000-11-13T19:44:44","version":"1.03"},{"version":"1.04","date":"2000-11-30T20:25:46"},{"date":"2001-03-24T20:20:31","version":"0.06"},{"version":"1.05","date":"2001-03-24T20:40:20"},{"version":"1.06","date":"2001-03-26T19:28:11"},{"date":"2001-04-11T00:53:39","version":"1.07"},{"version":"1.08","date":"2001-08-24T18:29:39"},{"date":"2001-12-14T23:07:08","version":"1.09"},{"version":"1.10","date":"2002-05-29T00:04:22"},{"version":"1.11","date":"2002-07-04T17:37:20"},{"date":"2002-12-31T00:09:32","version":"1.12"},{"version":"1.13","date":"2003-10-06T17:27:43"},{"date":"2003-10-06T21:50:56","version":"1.14"},{"date":"2003-10-06T22:10:09","version":"1.15"},{"date":"2004-01-07T12:47:37","version":"1.16"},{"version":"1.17","date":"2006-01-28T12:41:59"},{"version":"1.18","date":"2006-03-03T15:31:07"},{"version":"1.18","date":"2006-03-05T09:19:05"},{"version":"1.18","date":"2006-03-13T20:52:28"},{"date":"2006-05-01T14:33:54","version":"1.18"},{"version":"1.18","date":"2006-07-16T12:43:58"},{"date":"2006-09-30T12:35:03","version":"1.23"},{"date":"2007-02-25T12:39:30","version":"1.24"},{"version":"1.25","date":"2007-05-14T19:11:49"},{"version":"1.26","date":"2007-09-09T11:23:15"},{"version":"1.27","date":"2007-12-15T13:50:50"},{"date":"2008-03-30T19:16:37","version":"1.28"},{"version":"1.28_50","date":"2009-07-08T20:39:39"},{"date":"2009-07-09T22:26:22","version":"1.28_51"},{"date":"2009-07-17T18:24:54","version":"1.28_52"},{"date":"2009-07-31T21:09:25","version":"1.29"},{"version":"1.29_50","date":"2009-08-14T20:25:31"},{"date":"2009-09-14T19:04:17","version":"1.29_51"},{"date":"2009-09-16T19:23:40","version":"1.29_51"},{"date":"2009-10-23T20:45:13","version":"1.29_51"},{"version":"1.29_51","date":"2009-10-31T09:21:38"},{"date":"2009-11-14T16:30:54","version":"1.30_50"},{"date":"2009-11-22T22:10:25","version":"1.30_51"},{"version":"1.30_52","date":"2010-02-09T20:08:40"},{"version":"1.30_53","date":"2010-02-09T20:43:56"},{"date":"2010-09-25T15:42:44","version":"1.31"},{"date":"2011-12-28T21:32:21","version":"1.31_50"},{"date":"2011-12-28T21:53:50","version":"1.31_51"},{"version":"1.32","date":"2012-02-21T21:03:11"},{"version":"1.32_50","date":"2012-10-23T19:59:15"},{"date":"2012-10-24T20:24:17","version":"1.32_51"},{"version":"1.32_52","date":"2012-10-25T21:49:45"},{"date":"2012-11-03T19:12:43","version":"1.33"},{"date":"2013-01-27T13:49:04","version":"1.33_50"},{"version":"1.33_51","date":"2013-01-28T11:15:59"},{"date":"2013-01-29T16:18:27","version":"1.34"},{"date":"2013-04-03T20:29:08","version":"1.34_50"},{"date":"2013-04-10T19:22:43","version":"1.35"},{"date":"2013-05-06T10:32:44","version":"1.35_50"},{"version":"1.35_51","date":"2013-06-28T08:29:45"},{"version":"1.36","date":"2013-07-05T08:23:26"},{"version":"1.36_51","date":"2014-12-19T23:10:31"},{"date":"2014-12-29T22:23:42","version":"1.36_52"},{"version":"1.37","date":"2014-12-31T08:44:32"},{"version":"1.38","date":"2015-04-20T05:00:55"},{"version":"1.38_50","date":"2016-10-01T15:35:13"},{"version":"1.38_51","date":"2016-10-01T17:43:27"},{"date":"2016-10-08T09:00:58","version":"1.39"},{"version":"1.39_50","date":"2017-03-19T20:16:19"},{"date":"2017-03-21T19:05:30","version":"1.40"},{"version":"1.40_50","date":"2017-06-30T17:22:28"},{"version":"1.41","date":"2017-07-12T16:34:02"},{"version":"1.41_50","date":"2019-10-16T19:12:33"},{"version":"1.42","date":"2019-10-19T06:46:49"},{"date":"2022-07-17T15:58:54","version":"1.42_50"},{"date":"2022-10-03T17:54:30","version":"1.43"},{"version":"1.43_50","date":"2023-07-25T18:26:43"},{"date":"2023-08-03T17:14:43","version":"1.44"},{"version":"1.44_50","date":"2024-11-20T08:40:18"},{"version":"1.44_51","date":"2024-11-23T10:43:42"},{"date":"2024-11-24T09:58:13","version":"1.45"}]},"Perlbal":{"versions":[{"version":"1.3","date":"2005-07-26T20:21:09"},{"version":"1.35","date":"2005-08-17T06:04:13"},{"version":"1.36","date":"2005-08-19T17:27:29"},{"version":"1.38","date":"2005-10-19T16:57:48"},{"date":"2006-02-06T19:25:44","version":"1.41"},{"date":"2006-08-04T04:56:17","version":"1.42"},{"version":"1.43","date":"2006-08-09T18:09:23"},{"date":"2006-08-10T21:49:57","version":"1.44"},{"version":"1.45","date":"2006-08-10T23:04:14"},{"version":"1.46","date":"2006-08-10T23:55:32"},{"version":"1.47","date":"2006-08-15T23:17:40"},{"version":"1.50","date":"2006-09-08T20:42:55"},{"version":"1.51","date":"2006-10-04T18:55:28"},{"date":"2006-11-13T18:01:56","version":"1.52"},{"date":"2006-12-05T09:32:56","version":"1.53"},{"date":"2007-02-05T20:00:01","version":"1.54"},{"date":"2007-03-21T07:32:33","version":"1.55"},{"version":"1.56","date":"2007-04-16T21:02:13"},{"date":"2007-04-26T20:37:24","version":"1.57"},{"date":"2007-05-11T18:20:57","version":"1.58"},{"date":"2007-05-22T17:31:31","version":"1.59"},{"date":"2007-10-24T04:09:35","version":"1.60"},{"version":"1.70","date":"2008-03-09T04:28:27"},{"date":"2008-09-14T00:41:35","version":"1.71"},{"date":"2008-09-22T01:40:20","version":"1.72"},{"date":"2009-10-05T20:51:59","version":"1.73"},{"date":"2010-03-20T07:59:03","version":"1.74"},{"date":"2010-04-02T22:32:03","version":"1.75"},{"date":"2010-06-18T01:52:54","version":"1.76"},{"version":"1.77","date":"2011-01-16T05:20:16"},{"version":"1.78","date":"2011-01-23T05:33:07"},{"date":"2011-06-15T23:59:19","version":"1.79"},{"date":"2012-02-27T07:02:28","version":"1.80"}],"advisories":[{"distribution":"Perlbal","reported":"2008-04-02","affected_versions":["<1.70"],"cves":["CVE-2008-1652"],"id":"CPANSA-Perlbal-2008-1652","severity":null,"fixed_versions":[],"references":["http://search.cpan.org/src/BRADFITZ/Perlbal-1.70/CHANGES","http://secunia.com/advisories/29565","http://www.vupen.com/english/advisories/2008/1045/references","https://exchange.xforce.ibmcloud.com/vulnerabilities/41540"],"description":"Directory traversal vulnerability in the _serve_request_multiple function in lib/Perlbal/ClientHTTPBase.pm in Perlbal before 1.70, when concat get is enabled, allows remote attackers to read arbitrary files in a parent directory via a directory traversal sequence in an unspecified parameter. NOTE: some of these details are obtained from third party information.\n"}],"main_module":"Perlbal"},"Data-Validate-IP":{"versions":[{"version":"0.02","date":"2005-03-04T16:46:50"},{"date":"2005-03-04T20:06:14","version":"0.03"},{"version":"0.04","date":"2005-04-28T15:11:20"},{"date":"2007-03-06T19:45:16","version":"0.05"},{"date":"2007-05-16T16:08:59","version":"0.06"},{"version":"0.07","date":"2007-05-18T02:42:07"},{"date":"2007-12-06T18:48:53","version":"0.08"},{"version":"0.10","date":"2009-06-04T17:52:28"},{"version":"0.11","date":"2010-03-01T19:40:48"},{"version":"0.12","date":"2010-12-29T21:23:08"},{"date":"2011-01-06T14:25:53","version":"0.13"},{"date":"2011-01-06T14:45:14","version":"0.14"},{"version":"0.15","date":"2013-02-05T00:19:11"},{"date":"2013-02-06T15:18:38","version":"0.16"},{"date":"2013-02-19T15:58:21","version":"0.17"},{"version":"0.18","date":"2013-02-20T00:31:32"},{"date":"2013-03-13T15:48:07","version":"0.19"},{"version":"0.20","date":"2013-07-13T19:21:15"},{"version":"0.21","date":"2013-12-05T21:16:41"},{"date":"2013-12-05T22:47:38","version":"0.22"},{"date":"2014-03-09T16:00:20","version":"0.23"},{"date":"2014-08-28T16:00:00","version":"0.24"},{"date":"2016-02-02T16:17:46","version":"0.25"},{"version":"0.26","date":"2016-05-31T17:31:50"},{"version":0.27,"date":"2016-11-17T18:05:57"},{"version":"0.28","date":"2021-03-29T17:01:17"},{"version":"0.29","date":"2021-03-29T17:07:58"},{"date":"2021-03-29T21:50:39","version":"0.30"},{"version":"0.31","date":"2022-11-28T18:19:55"}],"main_module":"Data::Validate::IP","advisories":[{"cves":["CVE-2021-29662"],"affected_versions":["<=0.29"],"reported":"2021-03-31","distribution":"Data-Validate-IP","references":["https://security.netapp.com/advisory/ntap-20210604-0002/","https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/","https://github.com/houseabsolute/Data-Validate-IP","https://github.com/houseabsolute/Data-Validate-IP/commit/3bba13c819d616514a75e089badd75002fd4f14e","https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-018.md","https://sick.codes/sick-2021-018/"],"description":"The Data::Validate::IP module through 0.29 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.\n","fixed_versions":[">0.29"],"id":"CPANSA-Data-Validate-IP-2021-01"}]},"PAR-Packer":{"versions":[{"date":"2006-12-01T14:20:06","version":"0.969_01"},{"version":"0.970","date":"2006-12-03T17:36:32"},{"version":"0.973","date":"2007-02-03T12:27:07"},{"version":"0.975","date":"2007-05-07T18:21:52"},{"version":"0.976","date":"2007-07-29T11:50:15"},{"version":"0.977","date":"2007-12-20T21:39:30"},{"version":"0.978","date":"2008-02-29T18:37:56"},{"version":"0.979","date":"2008-05-13T15:45:56"},{"date":"2008-05-14T10:27:09","version":"0.980"},{"date":"2008-07-29T15:44:11","version":"0.982"},{"version":"0.980","date":"2009-03-10T15:55:06"},{"version":"0.991","date":"2009-03-21T11:20:02"},{"version":"0.992_01","date":"2009-07-19T16:47:51"},{"version":"0.992_02","date":"2009-07-23T13:18:32"},{"version":"0.992_03","date":"2009-07-24T18:30:24"},{"date":"2009-09-11T07:38:47","version":"0.992_04"},{"version":"0.992_05","date":"2009-11-13T09:01:15"},{"version":"0.992_06","date":"2009-11-20T13:59:38"},{"version":"1.000","date":"2009-11-22T13:08:12"},{"version":"1.001","date":"2009-11-24T11:16:58"},{"version":"1.002","date":"2009-12-17T20:55:25"},{"version":"1.003","date":"2010-04-10T17:57:57"},{"date":"2010-04-20T12:10:24","version":"1.004"},{"date":"2010-06-05T15:54:54","version":"1.005"},{"version":"1.006","date":"2010-06-26T11:23:34"},{"date":"2010-09-09T16:42:00","version":"1.007"},{"version":"1.008","date":"2010-11-21T17:11:43"},{"date":"2011-03-26T13:36:55","version":"1.009"},{"version":"1.010","date":"2011-07-13T14:10:05"},{"date":"2011-12-01T21:08:37","version":"1.011"},{"date":"2011-12-02T17:53:42","version":"1.012"},{"version":"1.013","date":"2012-02-22T09:58:04"},{"date":"2012-12-21T15:55:13","version":"1.014"},{"version":"1.015","date":"2013-10-09T12:06:04"},{"date":"2013-11-30T19:03:48","version":"1.016"},{"date":"2013-12-03T23:53:51","version":"1.017"},{"version":"1.018","date":"2014-05-18T16:52:34"},{"date":"2014-07-07T14:25:15","version":"1.019"},{"version":"1.020","date":"2014-08-24T13:27:57"},{"date":"2014-09-14T13:49:37","version":"1.021"},{"date":"2014-09-19T10:07:30","version":"1.022"},{"version":"1.023","date":"2014-11-02T14:32:42"},{"version":"1.024","date":"2014-11-07T09:04:07"},{"date":"2015-01-24T16:52:17","version":"1.025"},{"version":"1.026","date":"2015-07-19T13:14:40"},{"version":"1.027","date":"2015-11-18T16:58:33"},{"version":"1.027","date":"2015-11-19T09:05:09"},{"date":"2016-01-12T16:24:46","version":"1.029"},{"date":"2016-02-02T14:54:21","version":"1.029_01"},{"date":"2016-02-11T14:08:57","version":"1.029_02"},{"date":"2016-02-25T08:41:55","version":"1.029_03"},{"date":"2016-02-29T08:36:46","version":"1.029_04"},{"date":"2016-03-29T08:29:59","version":"1.030"},{"date":"2016-04-10T17:15:52","version":"1.031"},{"version":"1.031_01","date":"2016-04-29T17:01:57"},{"date":"2016-05-07T09:59:28","version":"1.032"},{"date":"2016-05-19T09:50:49","version":"1.033"},{"version":"1.034","date":"2016-07-17T12:38:31"},{"version":"1.035","date":"2016-07-23T12:04:14"},{"version":"1.035_001","date":"2016-12-04T17:13:20"},{"date":"2016-12-19T19:35:16","version":"1.035_002"},{"date":"2016-12-30T11:06:25","version":"1.036"},{"date":"2017-03-22T19:29:19","version":"1.036_001"},{"date":"2017-05-14T11:54:43","version":"1.036_002"},{"date":"2017-05-28T11:33:53","version":"1.037"},{"version":"1.038","date":"2017-09-27T19:40:44"},{"version":"1.039","date":"2017-09-28T05:13:05"},{"date":"2017-10-10T17:00:14","version":"1.039_001"},{"date":"2017-10-13T12:05:52","version":"1.039_002"},{"version":"1.039_003","date":"2017-10-16T20:46:49"},{"date":"2017-10-17T17:07:49","version":"1.039_004"},{"date":"2017-10-21T16:09:18","version":"1.040"},{"version":"1.041","date":"2017-11-08T17:07:11"},{"date":"2018-04-02T21:46:01","version":"1.042"},{"date":"2018-04-03T11:26:08","version":"1.043"},{"date":"2018-06-06T22:03:32","version":"1.044"},{"version":"1.045","date":"2018-06-12T19:04:22"},{"date":"2018-08-17T22:20:28","version":"1.046"},{"version":"1.047","date":"2018-08-19T09:17:57"},{"date":"2019-03-04T09:42:35","version":"1.047_001"},{"version":"1.047_002","date":"2019-03-04T15:33:14"},{"date":"2019-03-06T17:39:18","version":"1.047_003"},{"version":"1.048","date":"2019-04-29T11:53:04"},{"date":"2019-05-31T11:58:05","version":"1.049"},{"version":"1.049_001","date":"2020-03-08T15:56:09"},{"version":"1.049_002","date":"2020-03-08T22:53:16"},{"version":"1.049_003","date":"2020-03-08T22:58:32"},{"date":"2020-03-10T13:51:31","version":"1.049_004"},{"version":"1.050","date":"2020-03-18T08:14:29"},{"date":"2020-11-29T22:25:00","version":"1.051"},{"date":"2021-01-13T15:44:24","version":"1.052"},{"version":"1.053","date":"2022-01-25T15:25:10"},{"date":"2022-01-27T11:05:32","version":"1.054"},{"version":"1.055","date":"2022-07-03T16:27:19"},{"date":"2022-08-31T07:56:09","version":"1.055_01"},{"version":"1.056","date":"2022-09-05T10:12:07"},{"date":"2022-11-25T09:12:00","version":"1.056_01"},{"version":"1.056_02","date":"2022-11-27T15:25:29"},{"date":"2022-11-29T11:33:29","version":"1.057"},{"version":"1.057_001","date":"2023-05-24T11:53:27"},{"version":"1.057_002","date":"2023-06-07T14:56:47"},{"version":"1.058","date":"2023-06-12T09:14:24"},{"version":"1.059","date":"2023-07-20T14:13:30"},{"version":"1.061","date":"2023-12-15T14:05:16"},{"version":"1.062","date":"2024-03-05T14:01:26"},{"version":"1.062_001","date":"2024-03-10T13:46:23"},{"date":"2024-03-11T13:08:45","version":"1.062_002"},{"version":"1.063","date":"2024-03-15T12:57:23"},{"date":"2024-06-24T09:05:18","version":"1.063_001"}],"advisories":[{"id":"CPANSA-PAR-Packer-2011-01","fixed_versions":[">=1.011"],"references":["https://metacpan.org/changes/distribution/PAR-Packer","https://rt.cpan.org/Public/Bug/Display.html?id=69560"],"description":"PAR packed files are extracted to unsafe and predictable temporary directories.\n","distribution":"PAR-Packer","reported":"2011-07-18","affected_versions":["<1.011"],"cves":["CVE-2011-4114"]}],"main_module":"PAR::Packer"},"XML-DT":{"versions":[{"version":"0.11","date":"1999-07-30T13:04:11"},{"date":"2000-04-07T09:24:55","version":"0.14"},{"date":"2000-09-19T17:03:40","version":"0.15"},{"date":"2000-10-16T16:21:54","version":"0.16"},{"version":"0.19","date":"2000-11-30T12:37:27"},{"version":"0.20","date":"2002-03-07T17:54:06"},{"version":"0.21","date":"2002-05-28T12:35:07"},{"date":"2002-12-20T17:31:58","version":"0.22"},{"date":"2002-12-27T09:10:47","version":"0.23"},{"version":"0.24","date":"2003-02-20T16:16:43"},{"date":"2003-06-17T10:15:16","version":"v0.24.1"},{"date":"2003-10-09T08:12:32","version":"0.25"},{"version":"0.25","date":"2003-10-13T07:47:22"},{"version":"0.27","date":"2003-11-14T10:55:50"},{"version":"0.28","date":"2003-12-16T14:25:13"},{"version":"0.29","date":"2004-01-07T11:38:24"},{"date":"2004-01-22T11:25:21","version":"0.30"},{"version":"0.31","date":"2004-08-09T17:43:41"},{"version":"0.32","date":"2004-09-20T19:15:56"},{"version":"0.33","date":"2004-10-03T19:21:18"},{"version":"0.34","date":"2004-10-30T14:43:29"},{"version":"0.35","date":"2004-11-15T16:39:19"},{"date":"2004-11-19T17:29:05","version":"0.36"},{"version":"0.37","date":"2004-11-21T16:27:45"},{"version":"0.38","date":"2004-12-24T16:34:24"},{"version":"0.39","date":"2005-03-22T12:05:18"},{"version":"0.40","date":"2005-04-06T08:14:46"},{"date":"2005-07-20T20:28:06","version":"0.41"},{"date":"2005-09-18T16:06:11","version":"0.42"},{"version":"0.43","date":"2006-05-15T09:08:21"},{"date":"2006-05-15T09:33:07","version":"0.44"},{"date":"2006-05-16T14:14:36","version":"0.45"},{"date":"2006-11-03T09:39:12","version":"0.46"},{"version":"0.47","date":"2006-11-23T18:14:09"},{"version":"0.48","date":"2008-02-20T22:00:02"},{"date":"2008-02-20T22:16:45","version":"0.49"},{"version":"0.50","date":"2008-02-21T22:02:53"},{"date":"2008-02-22T17:19:12","version":"0.51"},{"date":"2008-10-22T09:12:08","version":"0.52"},{"date":"2009-01-18T20:10:36","version":"0.53"},{"version":"0.54","date":"2010-11-19T16:27:23"},{"version":"0.55","date":"2011-02-12T22:08:27"},{"version":"0.56","date":"2011-02-12T22:09:55"},{"date":"2012-04-07T20:30:58","version":"0.57"},{"version":"0.58","date":"2012-04-09T10:19:15"},{"version":"0.59","date":"2012-06-05T13:37:08"},{"version":"0.60","date":"2012-06-25T16:57:54"},{"date":"2012-06-25T17:04:58","version":"0.61"},{"date":"2012-06-25T19:02:40","version":"0.62"},{"date":"2013-03-25T22:27:48","version":"0.63"},{"version":"0.64","date":"2014-07-31T19:46:44"},{"date":"2014-08-01T13:00:43","version":"0.65"},{"date":"2014-08-15T20:17:39","version":"0.66"},{"date":"2015-03-15T18:28:49","version":"0.67"},{"date":"2015-09-29T08:06:14","version":"0.68"},{"date":"2019-04-22T17:01:30","version":"0.69"}],"main_module":"XML::DT","advisories":[{"description":"The (1) mkxmltype and (2) mkdtskel scripts in XML-DT before 0.64 allow local users to overwrite arbitrary files via a symlink attack on a /tmp/_xml_##### temporary file.\n","references":["http://openwall.com/lists/oss-security/2014/08/15/8","https://metacpan.org/diff/file?target=AMBS/XML-DT-0.64/&source=AMBS/XML-DT-0.63/","https://metacpan.org/source/AMBS/XML-DT-0.66/Changes","https://bugs.debian.org/756566"],"id":"CPANSA-XML-DT-2014-5260","severity":null,"fixed_versions":[],"cves":["CVE-2014-5260"],"reported":"2014-08-16","distribution":"XML-DT","affected_versions":["<0.64"]}]},"Sys-Syslog":{"versions":[{"version":"0.09","date":"2005-12-06T22:19:29"},{"date":"2005-12-08T01:10:57","version":"0.10"},{"version":"0.11","date":"2005-12-27T23:49:31"},{"version":"0.12","date":"2006-01-07T04:07:20"},{"date":"2006-01-11T01:03:02","version":"0.13"},{"version":"0.14","date":"2006-05-25T22:42:27"},{"version":"0.15","date":"2006-06-10T23:57:12"},{"date":"2006-06-20T21:26:29","version":"0.16"},{"version":"0.17","date":"2006-07-23T01:51:16"},{"version":"0.18","date":"2006-08-28T22:18:29"},{"version":"0.19","date":"2007-09-05T09:39:56"},{"date":"2007-09-05T10:23:25","version":"0.20"},{"version":"0.21","date":"2007-09-13T23:01:59"},{"date":"2007-11-08T00:58:57","version":"0.22"},{"date":"2007-11-12T22:42:29","version":"0.23"},{"date":"2007-12-31T17:18:56","version":"0.24"},{"version":"0.25","date":"2008-06-05T23:16:19"},{"date":"2008-06-15T23:49:12","version":"0.25"},{"version":"0.27","date":"2008-09-21T17:05:08"},{"date":"2009-03-14T03:24:36","version":"1.00"},{"version":"0.28","date":"2011-04-16T17:01:20"},{"date":"2011-04-18T14:10:00","version":"0.29"},{"version":"0.30","date":"2012-08-15T01:27:23"},{"date":"2012-08-18T18:07:17","version":"0.31"},{"date":"2012-09-14T12:36:22","version":"0.32"},{"version":"0.33","date":"2013-05-24T00:13:07"},{"date":"2016-05-05T23:20:00","version":"0.34"},{"date":"2016-09-01T16:56:39","version":"0.35"},{"version":"0.36","date":"2019-10-21T22:41:02"}],"advisories":[{"cves":["CVE-2016-1238"],"affected_versions":["<0.35"],"distribution":"Sys-Syslog","reported":"2016-07-27","description":"Optional modules loaded from loading optional modules from \".\"\n","references":["https://metacpan.org/dist/Sys-Syslog/changes","https://rt.cpan.org/Public/Bug/Display.html?id=116543"],"fixed_versions":[">=0.35"],"severity":"high","id":"CPANSA-Sys-Syslog-2016-1238"}],"main_module":"Sys::Syslog"},"Otogiri":{"versions":[{"date":"2013-10-30T06:45:51","version":"0.01"},{"date":"2013-11-08T08:36:50","version":"0.02"},{"version":"0.03","date":"2013-11-09T05:00:47"},{"version":"0.04","date":"2013-12-27T00:15:23"},{"date":"2013-12-28T15:54:15","version":"0.05"},{"date":"2014-01-14T09:13:18","version":"0.06"},{"date":"2014-02-25T06:25:50","version":"0.07"},{"date":"2014-03-18T04:14:12","version":"0.08"},{"date":"2014-03-18T05:07:37","version":"0.09"},{"version":"0.10","date":"2014-05-13T12:58:21"},{"version":"0.11","date":"2014-05-30T10:11:18"},{"version":"0.12","date":"2014-06-05T08:30:13"},{"version":"0.13","date":"2014-07-03T12:40:28"},{"date":"2014-12-18T08:37:33","version":"0.14"},{"version":"0.15","date":"2015-01-11T04:56:15"},{"version":"0.16","date":"2015-11-13T07:18:18"},{"version":"0.17","date":"2016-02-02T05:58:26"},{"date":"2017-05-19T01:37:05","version":"0.18"},{"date":"2020-01-17T11:12:52","version":"0.19"},{"version":"0.20","date":"2023-10-15T02:01:31"},{"version":"0.21","date":"2023-10-15T02:02:58"},{"date":"2023-12-10T00:23:20","version":"0.22"},{"date":"2024-06-08T13:42:18","version":"0.23"}],"main_module":"Otogiri","advisories":[{"reported":"2014-07-03","distribution":"Otogiri","affected_versions":["<0.13"],"cves":[],"id":"CPANSA-Otogiri-2014-01","fixed_versions":[">=0.13"],"description":"A dependant module SQL::Maker without strict mode is vulnerable to SQL injection.\n","references":["https://github.com/ytnobody/Otogiri/commit/fac1592b3d153a6871ff1aed8016a6888cff9095","https://metacpan.org/changes/distribution/Otogiri"]}]},"Convert-UUlib":{"versions":[{"date":"1999-05-08T20:44:28","version":"0.03"},{"date":"1999-05-25T19:26:16","version":"0.05"},{"version":"0.06","date":"1999-07-29T21:35:05"},{"version":"0.11","date":"2000-07-16T20:52:56"},{"version":"0.111","date":"2001-05-04T21:14:40"},{"date":"2001-06-14T16:49:29","version":"0.2"},{"date":"2001-09-16T01:45:11","version":"0.201"},{"date":"2002-03-31T22:10:15","version":"0.21"},{"version":"0.21","date":"2002-03-31T22:52:00"},{"version":"0.211","date":"2002-04-05T22:18:55"},{"date":"2002-04-06T02:39:32","version":"0.212"},{"date":"2002-07-27T19:20:26","version":"0.213"},{"date":"2002-10-13T18:14:28","version":"0.3"},{"date":"2002-10-15T23:26:09","version":"0.31"},{"version":"1.0","date":"2003-11-24T16:10:49"},{"version":"1.01","date":"2004-03-16T20:05:14"},{"version":"1.02","date":"2004-04-18T14:51:27"},{"version":"1.03","date":"2004-04-18T20:16:15"},{"version":"1.04","date":"2004-12-28T14:12:40"},{"version":"1.051","date":"2005-03-03T17:52:16"},{"date":"2005-12-05T23:58:50","version":"1.06"},{"version":"1.07","date":"2006-12-10T16:45:11"},{"version":"1.08","date":"2006-12-16T22:31:30"},{"date":"2007-05-25T17:40:35","version":"1.09"},{"version":"1.10","date":"2008-06-13T13:27:38"},{"version":"1.11","date":"2008-06-13T13:34:18"},{"version":"1.12","date":"2008-10-13T12:13:26"},{"date":"2009-08-28T23:26:34","version":"1.3"},{"date":"2009-09-16T07:05:05","version":"1.31"},{"date":"2009-09-16T18:10:46","version":"1.32"},{"date":"2009-10-28T08:05:40","version":"1.33"},{"version":"1.34","date":"2010-12-14T21:21:33"},{"version":"1.4","date":"2011-05-29T15:23:57"},{"date":"2015-07-11T01:57:19","version":1.5},{"date":"2019-10-24T15:19:15","version":1.6},{"version":1.62,"date":"2020-02-17T22:21:21"},{"version":1.7,"date":"2020-02-29T21:09:26"},{"version":1.71,"date":"2020-03-16T23:54:43"},{"version":1.8,"date":"2020-12-17T01:25:02"}],"main_module":"Convert::UUlib","advisories":[{"distribution":"Convert-UUlib","reported":"2005-05-02","affected_versions":["<1.051"],"cves":["CVE-2005-1349"],"severity":null,"id":"CPANSA-Convert-UUlib-2005-1349","fixed_versions":[],"references":["http://www.gentoo.org/security/en/glsa/glsa-200504-26.xml","http://secunia.com/advisories/15130","http://www.securityfocus.com/bid/13401","http://www.mandriva.com/security/advisories?name=MDKSA-2006:022","https://exchange.xforce.ibmcloud.com/vulnerabilities/20275"],"description":"Buffer overflow in Convert-UUlib (Convert::UUlib) before 1.051 allows remote attackers to execute arbitrary code via a malformed parameter to a read operation.\n"}]},"File-Slurp":{"main_module":"File::Slurp","advisories":[{"id":"CPANSA-File-Slurp-2013-01","fixed_versions":[">=9999.26"],"description":"Use of sysread treats any :encoding(...) as effectively :utf8.\n","references":["https://rt.cpan.org/Public/Bug/Display.html?id=83126","https://rt.perl.org/Ticket/Display.html?id=121870"],"reported":"2013-02-04","distribution":"File-Slurp","affected_versions":["<9999.26"],"cves":[]}],"versions":[{"date":"1996-04-22T21:18:00","version":"96.042202"},{"date":"1998-07-19T16:25:00","version":"98.071901"},{"version":"2001.1103","date":"2001-11-04T03:17:00"},{"version":"2002.0305","date":"2002-03-08T05:22:00"},{"date":"2002-11-01T03:14:00","version":"2002.1031"},{"date":"2003-09-04T16:28:00","version":"2004.0904"},{"date":"2003-11-24T07:45:57","version":"0.01"},{"version":"9999.01","date":"2003-11-24T08:02:47"},{"date":"2003-12-17T09:20:57","version":"9999.02"},{"version":"9999.03","date":"2003-12-22T06:54:57"},{"date":"2004-02-23T19:27:53","version":"9999.04"},{"version":"9999.06","date":"2004-09-21T05:23:58"},{"date":"2005-01-30T10:01:07","version":"9999.07"},{"date":"2005-04-16T05:06:09","version":"9999.08"},{"version":"9999.09","date":"2005-04-29T06:09:11"},{"version":"9999.10","date":"2006-01-19T18:29:42"},{"date":"2006-01-20T06:45:13","version":"9999.11"},{"version":"9999.12","date":"2006-03-07T07:13:42"},{"date":"2008-01-24T04:57:12","version":"9999.13"},{"date":"2011-03-22T22:41:08","version":"9999.14"},{"date":"2011-03-24T22:52:42","version":"9999.15"},{"date":"2011-04-24T04:26:18","version":"9999.16"},{"version":"9999.17","date":"2011-05-13T06:23:08"},{"version":"9999.18","date":"2011-05-13T07:03:44"},{"version":"9999.19","date":"2011-06-07T08:08:06"},{"version":"9999.20_01","date":"2018-09-28T01:57:50"},{"version":"9999.20_02","date":"2018-10-05T01:23:09"},{"version":"9999.21","date":"2018-10-08T21:16:27"},{"date":"2018-10-16T03:15:39","version":"9999.22"},{"date":"2018-10-20T20:06:53","version":"9999.23"},{"date":"2018-10-30T02:45:09","version":"9999.24"},{"date":"2018-11-16T16:11:34","version":"9999.25"},{"date":"2019-02-13T16:35:40","version":"9999.26"},{"version":"9999.27","date":"2019-04-05T13:28:05"},{"version":"9999.28","date":"2019-09-13T00:36:22"},{"date":"2019-11-27T20:40:47","version":"9999.29"},{"version":"9999.30","date":"2020-03-09T14:31:40"},{"date":"2020-06-28T22:33:21","version":"9999.31"},{"date":"2020-07-01T00:34:08","version":"9999.32"}]},"FCGI":{"advisories":[{"cves":["CVE-2011-2766"],"affected_versions":["<0.74"],"reported":"2011-09-24","distribution":"FCGI","description":"Leaking information across requests when using the deprecated and undocumented old FCGI interface.\n","references":["https://metacpan.org/changes/distribution/FCGI","https://github.com/perl-catalyst/FCGI/commit/297693dc8362d25bb25e473899c72508a0f71d2e"],"fixed_versions":[">=0.74"],"id":"CPANSA-FCGI-2011-01"}],"main_module":"FCGI","versions":[{"date":"1996-09-25T17:48:57","version":"0.25"},{"version":"0.26","date":"1996-10-15T21:51:06"},{"version":"0.27","date":"1997-02-20T08:55:44"},{"version":"0.28","date":"1997-02-25T07:14:13"},{"date":"1997-06-10T18:16:17","version":"0.29"},{"date":"1997-06-24T17:17:05","version":"0.30"},{"date":"1997-07-24T11:05:43","version":"0.31"},{"version":"0.34","date":"1998-06-17T10:24:17"},{"date":"1998-06-22T15:38:51","version":"0.35"},{"date":"1998-06-24T19:42:57","version":"0.36"},{"version":"0.37","date":"1998-06-27T16:08:39"},{"version":"0.40","date":"1998-07-15T15:24:00"},{"date":"1998-07-29T16:05:51","version":"0.41"},{"version":"0.42","date":"1998-08-28T15:30:49"},{"version":"0.43","date":"1998-12-22T22:34:14"},{"version":"0.44","date":"1998-12-23T11:28:39"},{"date":"1999-03-08T17:04:02","version":"0.45"},{"date":"1999-07-30T08:26:31","version":"0.46"},{"version":"0.47","date":"1999-07-31T21:58:01"},{"date":"1999-08-27T13:41:54","version":"0.48"},{"version":"0.49","date":"2000-04-09T18:58:32"},{"date":"2000-04-10T07:04:43","version":"0.50"},{"version":"0.51","date":"2000-04-12T12:27:09"},{"date":"2000-04-12T14:10:02","version":"0.52"},{"version":"0.53","date":"2000-07-10T10:01:51"},{"version":"0.54","date":"2000-10-08T19:52:29"},{"version":"0.55","date":"2000-10-18T21:22:46"},{"date":"2000-11-03T15:44:28","version":"0.56"},{"date":"2000-11-12T15:15:01","version":"0.57"},{"date":"2000-11-14T23:20:24","version":"0.58"},{"version":"0.59","date":"2000-12-31T22:05:44"},{"date":"2001-06-08T15:19:08","version":"0.60"},{"date":"2001-09-20T12:34:13","version":"0.61"},{"version":"0.62","date":"2001-09-21T16:19:42"},{"date":"2001-09-24T20:43:48","version":"0.63"},{"version":"0.64","date":"2001-09-25T08:26:24"},{"version":"0.65","date":"2002-02-19T14:16:27"},{"version":"0.66","date":"2002-09-05T16:23:07"},{"version":"0.67","date":"2002-12-23T10:21:36"},{"version":"0.67_01","date":"2009-12-20T21:05:48"},{"date":"2010-01-06T10:07:05","version":"0.68"},{"version":"0.68_01","date":"2010-01-10T01:35:11"},{"version":"0.68_02","date":"2010-01-13T19:25:40"},{"version":"0.69","date":"2010-02-15T23:08:12"},{"date":"2010-03-22T14:35:03","version":"0.70"},{"date":"2010-04-01T00:55:33","version":"0.71"},{"date":"2010-08-24T21:32:56","version":"0.71_01"},{"date":"2011-04-28T08:50:09","version":"0.71_02"},{"version":"0.71_03","date":"2011-04-28T09:05:42"},{"version":"0.72","date":"2011-05-19T09:06:02"},{"version":"0.73","date":"2011-05-28T01:35:17"},{"date":"2011-09-24T08:31:47","version":"0.74"},{"version":"0.75","date":"2014-07-17T00:19:02"},{"date":"2014-08-05T01:29:06","version":"0.76"},{"version":"0.77","date":"2014-08-05T15:53:28"},{"date":"2016-03-07T00:08:23","version":"0.78"},{"date":"2019-12-14T18:29:19","version":"0.79"},{"date":"2021-07-25T04:54:49","version":"0.80"},{"date":"2021-07-30T23:19:01","version":"0.81"},{"version":"0.82","date":"2021-07-31T03:26:34"}]},"Spoon":{"main_module":"Spoon","advisories":[{"references":["https://rt.cpan.org/Public/Bug/Display.html?id=85217","http://www.securityfocus.com/bid/59834","http://seclists.org/oss-sec/2013/q2/318","https://exchange.xforce.ibmcloud.com/vulnerabilities/84197"],"description":"Spoon::Cookie in the Spoon module 0.24 for Perl does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via a crafted request, which is not properly handled when it is deserialized.\n","fixed_versions":[],"id":"CPANSA-Spoon-Cookie-2012-6143","severity":null,"cves":["CVE-2012-6143"],"affected_versions":[">0.24"],"distribution":"Spoon","reported":"2014-06-04"}],"versions":[{"date":"2004-03-21T10:04:10","version":"0.10"},{"version":"0.11","date":"2004-03-23T07:50:48"},{"date":"2004-03-30T16:23:32","version":"0.12"},{"version":"0.13","date":"2004-05-07T16:21:27"},{"version":"0.14","date":"2004-06-02T10:15:14"},{"version":"0.15","date":"2004-06-21T17:39:05"},{"date":"2004-06-22T17:43:16","version":"0.16"},{"version":"0.17","date":"2004-07-20T20:01:22"},{"version":"0.18","date":"2004-08-12T05:59:51"},{"date":"2004-12-16T00:12:10","version":"0.19"},{"version":"0.20","date":"2004-12-18T09:04:38"},{"date":"2005-01-11T16:27:02","version":"0.21"},{"version":"0.22","date":"2005-04-04T14:49:45"},{"date":"2005-04-07T03:44:14","version":"0.23"},{"version":"0.24","date":"2006-12-09T23:29:37"}]},"Mojolicious-Plugin-OAuth2":{"versions":[{"date":"2011-01-08T11:03:42","version":"0.01"},{"version":"0.02","date":"2011-01-09T18:00:14"},{"version":"0.1","date":"2011-04-03T16:00:38"},{"version":"0.2","date":"2011-08-01T16:56:18"},{"version":"0.3","date":"2011-09-04T19:42:29"},{"version":"0.4","date":"2011-09-07T16:59:50"},{"date":"2011-10-19T11:55:32","version":"0.5"},{"date":"2012-03-09T21:15:39","version":"0.6"},{"date":"2012-05-30T11:49:29","version":"0.7"},{"version":"0.8","date":"2012-08-23T20:18:41"},{"date":"2013-05-20T05:55:18","version":"0.9"},{"date":"2013-11-06T13:24:52","version":"1.0"},{"version":"1.1","date":"2014-03-13T08:18:10"},{"version":"1.2","date":"2014-09-06T13:49:59"},{"version":"1.3","date":"2014-10-07T05:49:16"},{"version":"1.4","date":"2015-03-01T20:09:19"},{"date":"2015-03-02T07:32:59","version":"1.5"},{"version":"1.51","date":"2015-03-18T16:40:18"},{"date":"2015-04-06T20:46:39","version":"1.52"},{"date":"2015-09-08T07:27:41","version":"1.53"},{"version":"1.54","date":"2018-08-30T10:48:55"},{"date":"2018-09-08T18:30:54","version":"1.55"},{"date":"2018-09-23T22:04:16","version":"1.56"},{"date":"2018-09-24T08:55:14","version":"1.57"},{"date":"2019-07-03T12:24:11","version":"1.58"},{"version":"1.59","date":"2021-02-16T23:34:41"},{"date":"2021-10-27T10:37:42","version":"2.00"},{"version":"2.01","date":"2021-10-28T09:30:06"},{"date":"2022-02-08T09:50:33","version":"2.02"}],"advisories":[{"cves":[],"reported":"2014-10-07","distribution":"Mojolicious-Plugin-OAuth2","affected_versions":["<1.3"],"references":["https://metacpan.org/changes/distribution/Mojolicious-Plugin-OAuth2","https://github.com/marcusramberg/Mojolicious-Plugin-OAuth2/commit/68315d329059b427e13d486c0e10733f728709aa"],"description":"Param injection in case of several parameters of the same name are present.\n","id":"CPANSA-Mojolicious-Plugin-OAuth2-2014-01","fixed_versions":[">=1.3"]}],"main_module":"Mojolicious::Plugin::OAuth2"},"RT-Authen-ExternalAuth":{"versions":[{"version":"0.01","date":"2008-03-13T16:16:36"},{"version":"0.02","date":"2008-03-17T13:34:40"},{"date":"2008-03-31T14:55:18","version":"0.03"},{"date":"2008-04-03T14:20:36","version":"0.04"},{"version":"0.05","date":"2008-04-09T08:57:51"},{"date":"2008-10-17T13:22:11","version":"0.06_01"},{"date":"2008-10-17T16:41:34","version":"0.06_02"},{"date":"2008-10-31T12:08:54","version":"0.06_02"},{"version":"0.06_02","date":"2008-11-01T18:23:27"},{"version":"0.06_02","date":"2008-11-06T21:16:42"},{"version":"0.07_02","date":"2008-12-22T22:08:06"},{"version":"0.07_02","date":"2009-01-20T21:09:48"},{"date":"2009-01-24T13:52:42","version":"0.07_02"},{"version":"0.08_01","date":"2011-02-19T00:43:35"},{"version":"0.08_02","date":"2011-04-15T19:46:43"},{"version":"0.09","date":"2011-05-06T21:08:52"},{"version":"0.09_01","date":"2012-01-23T17:51:41"},{"version":"0.09_02","date":"2012-01-26T18:48:51"},{"version":"0.09_03","date":"2012-01-27T23:07:12"},{"date":"2012-02-17T16:34:10","version":"0.10"},{"version":"0.10_01","date":"2012-02-23T16:31:54"},{"version":"0.11","date":"2012-07-25T08:57:21"},{"date":"2012-07-25T18:36:36","version":"0.11"},{"version":"0.12","date":"2012-10-26T19:59:54"},{"date":"2013-01-31T19:22:43","version":"0.13"},{"version":"0.14","date":"2013-05-22T21:28:15"},{"version":"0.15","date":"2013-05-23T00:20:43"},{"date":"2013-06-27T19:24:37","version":"0.16"},{"date":"2013-07-10T19:43:08","version":"0.17"},{"date":"2014-03-07T22:19:49","version":"0.18"},{"version":"0.19","date":"2014-04-04T17:21:04"},{"date":"2014-04-09T19:34:29","version":"0.20"},{"date":"2014-07-02T02:20:30","version":"0.21"},{"date":"2014-08-14T04:04:28","version":"0.22_01"},{"date":"2014-08-14T17:28:53","version":"0.23"},{"version":"0.23_01","date":"2014-09-30T22:04:16"},{"date":"2014-10-09T16:24:49","version":"0.24"},{"date":"2014-10-16T20:59:29","version":"0.25"},{"version":"0.26","date":"2016-08-02T16:14:34"},{"version":"0.27","date":"2017-06-15T18:44:24"}],"main_module":"RT::Authen::ExternalAuth","advisories":[{"description":"Timing sidechannel vulnerability in password checking.\n","references":["https://metacpan.org/changes/distribution/RT-Authen-ExternalAuth"],"id":"CPANSA-RT-Authen-ExternalAuth-2017-01","fixed_versions":[">=0.27"],"cves":["CVE-2017-5361"],"reported":"2017-06-15","distribution":"RT-Authen-ExternalAuth","affected_versions":["<0.27"]}]},"Plack-Middleware-XSRFBlock":{"main_module":"Plack::Middleware::XSRFBlock","advisories":[{"cves":["CVE-2023-52431"],"reported":"2023-07-14","distribution":"Plack-Middleware-XSRFBlock","affected_versions":["<0.0.19"],"references":["https://metacpan.org/dist/Plack-Middleware-XSRFBlock/changes","https://metacpan.org/release/DAKKAR/Plack-Middleware-XSRFBlock-0.0.19/source/Changes","https://nvd.nist.gov/vuln/detail/CVE-2023-52431"],"description":"When not using signed cookies, it was possible to bypass XSRFBlock by POSTing an empty form value and an empty cookie\n","severity":null,"id":"CPANSA-Plack-Middleware-XSRFBlock-20230714-01","fixed_versions":[">=0.0.19"]}],"versions":[{"version":"0.0.0_01","date":"2013-06-20T11:01:27"},{"version":"0.0.0_02","date":"2013-06-21T14:07:31"},{"date":"2013-06-21T14:48:20","version":"0.0.0_03"},{"version":"0.0.0_04","date":"2013-06-21T15:04:00"},{"version":"0.0.0_05","date":"2013-06-23T23:30:14"},{"date":"2013-10-21T15:36:45","version":"0.0.1"},{"version":"0.0.2","date":"2014-03-28T11:34:07"},{"version":"0.0.3","date":"2014-06-24T15:02:09"},{"version":"0.0.4","date":"2014-07-09T12:44:23"},{"date":"2014-07-22T15:29:19","version":"0.0.5"},{"date":"2014-08-05T20:48:41","version":"0.0.6"},{"date":"2014-08-28T16:51:49","version":"0.0.7"},{"version":"0.0.8","date":"2014-09-18T08:03:26"},{"date":"2014-10-13T10:16:45","version":"0.0.9"},{"version":"0.0.10","date":"2015-07-18T22:04:22"},{"version":"0.0.11","date":"2015-09-07T16:45:50"},{"date":"2017-07-13T10:36:46","version":"0.0.12"},{"date":"2018-07-23T11:02:29","version":"0.0.13"},{"version":"0.0.14","date":"2018-07-23T16:19:18"},{"version":"0.0.15","date":"2018-07-24T12:45:15"},{"version":"0.0.16","date":"2018-07-25T13:24:47"},{"date":"2022-10-17T09:58:14","version":"0.0.17"},{"version":"0.0.18","date":"2023-07-13T09:16:48"},{"date":"2023-07-14T09:17:25","version":"0.0.19"}]},"Spreadsheet-ParseXLSX":{"versions":[{"date":"2013-07-17T02:45:07","version":"0.01"},{"date":"2013-07-17T15:14:43","version":"0.02"},{"date":"2013-07-26T07:34:38","version":"0.03"},{"date":"2013-07-31T18:28:38","version":"0.04"},{"date":"2013-07-31T22:15:56","version":"0.05"},{"version":"0.06","date":"2013-08-29T20:02:30"},{"version":"0.07","date":"2013-09-05T18:34:35"},{"version":"0.08","date":"2013-09-10T18:21:15"},{"version":"0.09","date":"2013-10-09T14:52:49"},{"date":"2013-11-06T18:36:10","version":"0.10"},{"version":"0.11","date":"2013-11-14T00:30:46"},{"version":"0.12","date":"2013-12-09T20:27:26"},{"version":"0.13","date":"2014-01-29T21:32:54"},{"date":"2014-04-03T16:56:25","version":"0.14"},{"date":"2014-07-05T01:39:06","version":"0.15"},{"date":"2014-07-05T18:55:08","version":"0.16"},{"date":"2015-03-26T03:38:16","version":"0.17"},{"date":"2015-09-19T06:08:07","version":"0.18"},{"date":"2015-12-04T07:38:39","version":"0.19"},{"date":"2015-12-05T18:45:32","version":"0.20"},{"date":"2016-05-23T07:09:47","version":"0.21"},{"date":"2016-05-25T05:39:15","version":"0.22"},{"version":"0.23","date":"2016-05-29T03:01:59"},{"date":"2016-06-25T18:03:32","version":"0.24"},{"date":"2016-07-15T02:36:28","version":"0.25"},{"date":"2016-08-16T06:35:10","version":"0.26"},{"date":"2016-08-16T07:12:41","version":"0.27"},{"version":"0.28","date":"2024-01-02T13:45:35"},{"date":"2024-01-02T17:49:11","version":"0.29"},{"version":"0.30","date":"2024-01-17T11:34:43"},{"date":"2024-01-18T11:30:17","version":"0.31"},{"version":"0.32","date":"2024-03-08T11:04:50"},{"version":"0.33","date":"2024-03-08T12:50:37"},{"version":"0.34","date":"2024-03-13T10:28:28"},{"date":"2024-03-19T16:22:17","version":"0.35"}],"main_module":"Spreadsheet::ParseXLSX","advisories":[{"references":["https://github.com/haile01/perl_spreadsheet_excel_rce_poc/blob/main/parse_xlsx_bomb.md","https://github.com/briandfoy/cpan-security-advisory/issues/131","https://nvd.nist.gov/vuln/detail/CVE-2024-22368","https://github.com/haile01/perl_spreadsheet_excel_rce_poc/blob/main/parse_xlsx_bomb.md","https://metacpan.org/dist/Spreadsheet-ParseXLSX/changes","https://github.com/advisories/GHSA-x2hg-844v-frvh"],"description":"The Spreadsheet::ParseXLSX package before 0.28 for Perl can encounter an out-of-memory condition during parsing of a crafted XLSX document. This occurs because the memoize implementation does not have appropriate constraints on merged cells.\n","fixed_versions":[">=0.28"],"id":"CPANSA-Spreadsheet-ParseXLSX-2024-22368","cves":["CVE-2024-22368"],"affected_versions":["<0.28"],"reported":"2024-01-03","distribution":"Spreadsheet-ParseXLSX"},{"cves":["CVE-2024-23525"],"distribution":"Spreadsheet-ParseXLSX","reported":"2024-01-17","affected_versions":["<0.30"],"references":["https://metacpan.org/release/NUDDLEGG/Spreadsheet-ParseXLSX-0.30/changes","https://gist.github.com/phvietan/d1c95a88ab6e17047b0248d6bf9eac4a","https://github.com/briandfoy/cpan-security-advisory/issues/134","https://github.com/MichaelDaum/spreadsheet-parsexlsx/issues/10","https://github.com/advisories/GHSA-cxjh-j6f8-vrmf","https://nvd.nist.gov/vuln/detail/CVE-2024-23525"],"description":"In default configuration of Spreadsheet::ParseXLSX, whenever we call Spreadsheet::ParseXLSX->new()->parse('user_input_file.xlsx'), we'd be vulnerable for XXE vulnerability if the XLSX file that we are parsing is from user input.\n","id":"CPANSA-Spreadsheet-ParseXLSX-2024-23525","fixed_versions":[">=0.30"]}]},"Compress-Raw-Zlib":{"versions":[{"date":"2006-03-03T23:06:38","version":"2.000_09"},{"version":"2.000_10","date":"2006-03-13T16:14:20"},{"version":"2.000_11","date":"2006-04-15T21:23:24"},{"date":"2006-05-17T12:43:41","version":"2.000_12"},{"date":"2006-06-20T12:45:30","version":"2.000_13"},{"date":"2006-10-26T14:15:34","version":"2.000_09"},{"version":"2.001","date":"2006-11-01T10:35:38"},{"version":"2.002","date":"2006-12-29T20:40:35"},{"version":"2.003","date":"2007-01-02T13:03:57"},{"version":"2.004","date":"2007-03-03T15:50:15"},{"date":"2007-07-01T00:07:02","version":"2.005"},{"version":"2.006","date":"2007-09-01T19:44:59"},{"version":"2.008","date":"2007-11-10T11:59:36"},{"version":"2.009","date":"2008-04-20T14:42:52"},{"date":"2008-05-05T17:18:27","version":"2.010"},{"date":"2008-05-17T11:16:28","version":"2.011"},{"date":"2008-07-15T22:24:07","version":"2.012"},{"version":"2.014","date":"2008-09-02T20:20:16"},{"date":"2008-09-03T20:47:27","version":"2.015"},{"version":"2.017","date":"2009-04-04T09:49:03"},{"version":"2.018","date":"2009-05-03T16:27:08"},{"version":"2.019","date":"2009-05-04T09:42:17"},{"version":"2.020","date":"2009-06-03T17:48:30"},{"version":"2.021","date":"2009-08-30T20:25:35"},{"version":"2.023","date":"2009-11-09T23:26:59"},{"date":"2010-01-09T17:56:35","version":"2.024"},{"version":"2.025","date":"2010-03-28T12:57:08"},{"version":"2.026","date":"2010-04-07T19:51:09"},{"date":"2010-04-24T19:15:54","version":"2.027"},{"date":"2010-07-24T14:31:01","version":"2.030"},{"version":"2.032","date":"2011-01-06T11:23:45"},{"date":"2011-01-11T14:03:45","version":"2.033"},{"version":"2.034","date":"2011-05-02T22:05:37"},{"version":"2.035","date":"2011-05-07T08:31:57"},{"date":"2011-06-18T21:45:36","version":"2.036"},{"version":"2.037","date":"2011-06-22T07:18:22"},{"date":"2011-10-28T14:28:35","version":"2.039"},{"date":"2011-10-28T22:20:38","version":"2.040"},{"date":"2011-11-17T23:45:21","version":"2.042"},{"version":"2.043","date":"2011-11-20T21:33:33"},{"date":"2011-12-03T22:49:10","version":"2.044"},{"date":"2011-12-04T19:21:36","version":"2.045"},{"version":"2.047","date":"2012-01-28T23:28:28"},{"version":"2.048","date":"2012-01-29T17:00:33"},{"version":"2.049","date":"2012-02-18T15:58:12"},{"date":"2012-02-21T19:35:18","version":"2.050"},{"date":"2012-02-22T20:43:23","version":"2.051"},{"date":"2012-04-29T12:41:57","version":"2.052"},{"date":"2012-05-06T08:40:06","version":"2.053"},{"date":"2012-05-08T19:22:47","version":"2.054"},{"version":"2.055","date":"2012-08-05T20:36:06"},{"version":"2.056","date":"2012-08-10T22:20:09"},{"version":"2.057","date":"2012-11-10T19:08:56"},{"date":"2012-11-12T22:14:42","version":"2.058"},{"version":"2.059","date":"2012-11-25T13:38:42"},{"version":"2.060","date":"2013-01-07T20:02:22"},{"date":"2013-05-27T09:54:54","version":"2.061"},{"date":"2013-08-12T19:08:05","version":"2.062"},{"date":"2013-11-02T17:15:17","version":"2.063"},{"version":"2.064","date":"2014-02-01T23:21:28"},{"version":"2.065","date":"2014-02-03T20:23:00"},{"date":"2014-09-21T12:42:35","version":"2.066"},{"date":"2014-12-08T15:14:00","version":"2.067"},{"date":"2014-12-23T17:44:57","version":"2.068"},{"version":"2.069","date":"2015-09-26T18:41:58"},{"version":"2.070","date":"2016-12-28T23:09:21"},{"version":"2.071","date":"2016-12-30T22:58:08"},{"version":"2.072","date":"2017-02-12T20:41:25"},{"date":"2017-02-19T20:37:20","version":"2.073"},{"version":"2.074","date":"2017-02-19T22:11:41"},{"version":"2.075","date":"2017-11-14T15:43:26"},{"version":"2.076","date":"2017-11-21T22:29:23"},{"version":"2.080","date":"2018-04-03T18:22:06"},{"date":"2018-04-08T15:02:55","version":"2.081"},{"date":"2018-12-30T22:40:08","version":"2.083"},{"date":"2019-01-06T08:57:15","version":"2.084"},{"version":"2.086","date":"2019-03-31T19:11:54"},{"version":"2.087","date":"2019-08-10T18:12:03"},{"version":"2.088","date":"2019-11-03T08:55:23"},{"date":"2019-11-03T19:54:04","version":"2.089"},{"version":"2.090","date":"2019-11-09T15:58:48"},{"date":"2019-11-23T19:34:34","version":"2.091"},{"date":"2019-12-04T22:08:37","version":"2.092"},{"date":"2019-12-07T16:05:34","version":"2.093"},{"version":"2.094","date":"2020-07-13T10:54:06"},{"version":"2.095","date":"2020-07-21T06:57:01"},{"version":"2.096","date":"2020-07-31T20:48:45"},{"date":"2021-01-07T13:00:23","version":"2.100"},{"version":"2.101","date":"2021-02-20T14:10:43"},{"version":"2.103","date":"2022-04-03T19:48:50"},{"version":"2.104","date":"2022-05-13T06:30:30"},{"date":"2022-05-14T14:24:32","version":"2.105"},{"version":"2.200","date":"2022-06-21T21:19:21"},{"date":"2022-06-25T09:04:10","version":"2.201"},{"version":"2.202","date":"2022-06-27T08:18:10"},{"date":"2023-02-08T19:26:25","version":"2.204"},{"version":"2.205","date":"2023-07-16T15:32:41"},{"version":"2.206","date":"2023-07-25T15:35:40"},{"version":"2.207","date":"2024-02-18T22:16:24"},{"date":"2024-02-19T09:27:19","version":"2.208"},{"version":"2.209","date":"2024-02-26T16:11:33"},{"date":"2024-04-06T13:41:58","version":"2.211"},{"version":"2.212","date":"2024-04-27T12:55:28"},{"date":"2024-08-28T15:27:59","version":"2.213"}],"main_module":"Compress::Raw::Zlib","advisories":[{"affected_versions":["<2.017"],"reported":"2009-06-16","distribution":"Compress-Raw-Zlib","cves":["CVE-2009-1391"],"fixed_versions":[],"severity":null,"id":"CPANSA-Compress-Raw-Zlib-2009-1391","description":"Off-by-one error in the inflate function in Zlib.xs in Compress::Raw::Zlib Perl module before 2.017, as used in AMaViS, SpamAssassin, and possibly other products, allows context-dependent attackers to cause a denial of service (hang or crash) via a crafted zlib compressed stream that triggers a heap-based buffer overflow, as exploited in the wild by Trojan.Downloader-71014 in June 2009.\n","references":["http://article.gmane.org/gmane.mail.virus.amavis.user/33635","http://article.gmane.org/gmane.mail.virus.amavis.user/33638","http://www.securityfocus.com/bid/35307","http://secunia.com/advisories/35422","https://bugzilla.redhat.com/show_bug.cgi?id=504386","http://www.vupen.com/english/advisories/2009/1571","http://thread.gmane.org/gmane.mail.virus.amavis.user/33635","http://osvdb.org/55041","http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html","http://secunia.com/advisories/35876","http://secunia.com/advisories/35685","https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00607.html","http://secunia.com/advisories/35689","http://www.mandriva.com/security/advisories?name=MDVSA-2009:157","http://security.gentoo.org/glsa/glsa-200908-07.xml","https://bugs.gentoo.org/show_bug.cgi?id=273141","https://exchange.xforce.ibmcloud.com/vulnerabilities/51062","https://usn.ubuntu.com/794-1/"]}]},"DBD-Pg":{"versions":[{"date":"1997-03-13T21:11:59","version":"0.1"},{"date":"1997-04-28T20:48:18","version":"0.3"},{"version":"0.5","date":"1997-08-10T20:45:01"},{"version":"0.51","date":"1997-08-16T06:48:54"},{"date":"1997-08-17T09:14:26","version":"0.52"},{"date":"1997-08-23T20:41:48","version":"0.61"},{"version":"0.62","date":"1997-08-26T21:39:36"},{"version":"0.63","date":"1997-10-05T18:41:32"},{"date":"1998-02-02T21:05:57","version":"0.64"},{"date":"1998-02-15T09:59:55","version":"0.65"},{"version":"0.66","date":"1998-02-19T21:13:44"},{"date":"1998-02-21T16:49:34","version":"0.67"},{"date":"1998-03-03T21:22:18","version":"0.68"},{"version":"0.69","date":"1998-03-06T22:15:44"},{"date":"1998-04-20T20:14:28","version":"0.72"},{"version":"0.73","date":"1998-06-03T15:15:54"},{"date":"1998-11-05T21:41:28","version":"0.89"},{"version":"0.90","date":"1999-01-16T06:10:32"},{"date":"1999-02-14T20:41:05","version":"0.91"},{"version":"0.92","date":"1999-06-16T19:06:21"},{"version":"0.93","date":"1999-09-29T21:25:02"},{"version":"0.94","date":"2000-07-07T10:45:34"},{"date":"2000-07-10T18:07:30","version":"0.95"},{"version":"0.96","date":"2001-04-09T17:58:20"},{"version":"0.97","date":"2001-04-20T21:11:46"},{"version":"0.98","date":"2001-04-25T14:13:22"},{"version":"0.99","date":"2001-05-24T17:36:05"},{"date":"2001-05-27T14:14:13","version":"1.00"},{"version":"1.01","date":"2001-06-27T18:03:08"},{"date":"2002-03-06T23:05:52","version":"1.10"},{"date":"2002-03-07T01:34:18","version":"1.11"},{"date":"2002-04-10T02:03:57","version":"1.12"},{"date":"2002-04-27T20:50:11","version":"1.13"},{"version":"1.20","date":"2002-11-27T17:57:11"},{"version":"1.21","date":"2003-01-13T06:46:43"},{"date":"2003-03-27T04:46:08","version":"1.22"},{"date":"2003-09-10T02:12:07","version":"1.31_5"},{"version":"1.31_7","date":"2003-10-29T21:33:29"},{"date":"2003-11-10T03:52:37","version":"1.31_8"},{"version":"1.31_9","date":"2003-11-14T22:17:30"},{"date":"2003-11-18T18:34:28","version":"1.31"},{"date":"2004-02-13T18:57:25","version":"1.32_1"},{"version":"1.32_2","date":"2004-02-19T02:40:51"},{"version":"1.32","date":"2004-02-25T19:23:08"},{"date":"2005-02-06T21:18:12","version":"1.39_02"},{"date":"2005-02-22T06:07:17","version":"1.40"},{"version":"1.40_1","date":"2005-03-31T12:35:04"},{"date":"2005-03-31T23:34:15","version":"1.40_2"},{"date":"2005-04-01T23:56:01","version":"1.40_03"},{"version":"1.40_04","date":"2005-04-05T02:47:47"},{"version":"1.41","date":"2005-04-06T22:53:50"},{"date":"2005-05-07T18:48:36","version":"1.41_1"},{"version":"1.41_2","date":"2005-05-19T03:23:24"},{"date":"2005-05-21T14:56:23","version":"1.42"},{"date":"2005-06-22T00:42:23","version":"1.42_1"},{"version":"1.43","date":"2005-06-23T12:09:13"},{"version":"1.43_1","date":"2005-09-13T01:39:06"},{"date":"2006-02-13T03:50:51","version":"1.43_2"},{"version":"1.44","date":"2006-02-22T03:00:40"},{"version":"1.45","date":"2006-02-26T19:15:10"},{"date":"2006-03-17T17:17:03","version":"1.46"},{"date":"2006-03-19T21:19:12","version":"1.47"},{"version":"1.48","date":"2006-04-05T15:39:30"},{"date":"2006-05-05T16:40:59","version":"1.49"},{"version":"2.0.0","date":"2008-01-17T14:34:38"},{"version":"2.0.0_2","date":"2008-01-17T22:47:38"},{"version":"2.0.0_3","date":"2008-01-18T04:21:25"},{"date":"2008-01-18T16:25:19","version":"2.0.0_4"},{"version":"2.0.0_5","date":"2008-01-19T19:05:27"},{"date":"2008-01-23T19:19:45","version":"2.0.0_6"},{"version":"2.0.0_7","date":"2008-01-26T17:48:03"},{"date":"2008-01-28T17:08:31","version":"2.0.0_8"},{"date":"2008-01-28T21:21:19","version":"2.0.0_9"},{"version":"2.0.0","date":"2008-02-10T19:34:31"},{"version":"2.0.0_1","date":"2008-02-17T04:58:29"},{"version":"2.0.0_2","date":"2008-02-17T13:10:04"},{"version":"2.0.1_1","date":"2008-02-17T18:17:25"},{"date":"2008-02-18T02:28:30","version":"2.0.1_2"},{"date":"2008-02-18T23:52:09","version":"2.0.1_3"},{"date":"2008-02-19T02:09:09","version":"2.1.0"},{"version":"2.1.1","date":"2008-02-19T04:45:29"},{"date":"2008-02-19T15:36:06","version":"2.1.1_1"},{"version":"2.1.2","date":"2008-02-20T02:56:37"},{"date":"2008-02-21T00:31:43","version":"2.1.3"},{"date":"2008-02-26T01:59:20","version":"2.1.3_1"},{"date":"2008-02-26T13:50:47","version":"2.1.3_2"},{"version":"2.2.0","date":"2008-02-28T04:08:34"},{"version":"2.2.1","date":"2008-03-02T03:01:12"},{"date":"2008-03-03T17:14:01","version":"2.2.2"},{"version":"2.3.0","date":"2008-03-19T14:50:06"},{"date":"2008-03-21T16:41:42","version":"2.4.0"},{"version":"2.5.0","date":"2008-03-23T16:55:36"},{"version":"2.5.1","date":"2008-04-07T19:16:57"},{"date":"2008-04-14T15:57:23","version":"2.5.2_1"},{"version":"2.6.0","date":"2008-04-16T18:16:11"},{"date":"2008-04-22T18:06:55","version":"2.6.1"},{"version":"2.6.1_1","date":"2008-04-28T21:15:56"},{"version":"2.6.2","date":"2008-04-30T23:18:14"},{"version":"2.6.3","date":"2008-05-01T16:03:12"},{"date":"2008-05-02T17:09:20","version":"2.6.4"},{"date":"2008-05-07T14:10:57","version":"2.6.5"},{"version":"2.6.6","date":"2008-05-07T20:41:03"},{"date":"2008-05-10T22:37:02","version":"2.7.0"},{"date":"2008-05-11T20:58:52","version":"2.7.1"},{"date":"2008-05-14T13:19:24","version":"2.7.2"},{"date":"2008-06-02T01:33:26","version":"2.8.0"},{"version":"2.8.1","date":"2008-06-12T04:06:28"},{"version":"2.8.2","date":"2008-06-30T02:21:03"},{"version":"2.8.3","date":"2008-07-07T02:09:01"},{"version":"2.8.4","date":"2008-07-10T18:18:54"},{"version":"2.8.5","date":"2008-07-13T14:41:49"},{"version":"2.8.6","date":"2008-07-21T15:23:39"},{"date":"2008-07-24T05:27:41","version":"2.8.7"},{"version":"2.9.0","date":"2008-08-03T19:48:22"},{"date":"2008-08-18T03:49:13","version":"2.9.1"},{"date":"2008-08-18T14:00:03","version":"2.9.2"},{"version":"2.10.0","date":"2008-08-27T02:46:34"},{"version":"2.10.1","date":"2008-08-31T16:29:33"},{"date":"2008-09-01T01:40:52","version":"2.10.2"},{"date":"2008-09-01T01:48:43","version":"2.10.3"},{"version":"2.10.4","date":"2008-09-16T15:35:48"},{"date":"2008-09-16T15:43:37","version":"2.10.5"},{"version":"2.10.6","date":"2008-09-19T13:38:32"},{"version":"2.10.7","date":"2008-09-23T03:13:47"},{"date":"2008-10-13T11:50:18","version":"2.11.0"},{"date":"2008-10-14T04:21:14","version":"2.11.1"},{"version":"2.11.2","date":"2008-10-16T00:55:38"},{"version":"2.11.3","date":"2008-11-03T13:51:55"},{"date":"2008-11-12T22:11:37","version":"2.11.4"},{"version":"2.11.5","date":"2008-11-24T23:56:25"},{"date":"2008-11-30T23:05:28","version":"2.11.6"},{"date":"2008-12-13T17:02:24","version":"2.11.7"},{"date":"2008-12-28T19:24:29","version":"2.11.8"},{"version":"2.11.8_1","date":"2009-03-24T02:23:04"},{"date":"2009-03-26T18:53:00","version":"2.11.8_2"},{"version":"2.12.0","date":"2009-03-28T14:56:16"},{"version":"2.13.0","date":"2009-04-14T02:14:44"},{"date":"2009-04-23T16:30:10","version":"2.13.1"},{"date":"2009-07-13T19:43:16","version":"2.13.1_1"},{"version":"2.13.1_2","date":"2009-07-14T14:34:31"},{"date":"2009-07-15T21:12:47","version":"2.13.1_3"},{"version":"2.13.1_4","date":"2009-07-17T01:15:13"},{"date":"2009-07-20T23:54:06","version":"2.13.1_5"},{"version":"2.13.1_6","date":"2009-07-21T16:03:25"},{"version":"2.13.1_7","date":"2009-07-21T21:43:56"},{"version":"2.14.0","date":"2009-07-27T22:45:52"},{"date":"2009-07-28T17:05:35","version":"2.14.1"},{"date":"2009-08-04T04:08:56","version":"2.14.1_1"},{"version":"2.15.0","date":"2009-08-04T18:18:51"},{"date":"2009-08-07T15:05:27","version":"2.15.1"},{"version":"2.8.8","date":"2009-12-17T15:41:55"},{"date":"2009-12-17T17:14:41","version":"2.16.0"},{"date":"2010-01-20T21:13:23","version":"2.16.1"},{"date":"2010-04-06T18:56:34","version":"2.17.0"},{"version":"2.17.1","date":"2010-04-08T15:32:24"},{"date":"2010-11-21T05:14:52","version":"2.17.2"},{"version":"2.17.2_1","date":"2011-03-27T03:53:00"},{"version":"2.18.0","date":"2011-03-29T00:36:37"},{"version":"2.18.1","date":"2011-05-09T16:40:13"},{"version":"2.99.9_1","date":"2011-06-19T18:46:40"},{"date":"2011-06-20T20:47:06","version":"2.99.9_2"},{"version":"2.19.0","date":"2012-03-09T22:51:54"},{"date":"2012-03-11T03:28:47","version":"2.19.1"},{"date":"2012-03-12T20:58:56","version":"2.19.2"},{"version":"2.19.3","date":"2012-08-21T17:18:39"},{"version":"2.20.1_1","date":"2013-11-16T03:47:03"},{"version":"2.20.1_2","date":"2013-11-21T03:22:26"},{"date":"2013-11-26T19:03:57","version":"2.20.1_3"},{"version":"2.20.1_4","date":"2013-11-27T19:35:07"},{"version":"2.20.1_6","date":"2014-01-11T20:31:09"},{"version":"3.0.0","date":"2014-02-04T01:38:37"},{"version":"3.1.0","date":"2014-04-05T11:08:15"},{"version":"3.1.1","date":"2014-04-06T13:17:49"},{"date":"2014-05-15T17:20:49","version":"3.2.0"},{"version":"3.2.1","date":"2014-05-20T16:38:44"},{"version":"3.3.0","date":"2014-05-31T18:50:07"},{"date":"2014-08-16T19:09:15","version":"3.4.0"},{"version":"3.4.1","date":"2014-08-20T20:38:19"},{"date":"2014-09-25T21:16:23","version":"3.4.2"},{"version":"3.5.0","date":"2015-01-06T20:41:04"},{"version":"3.5.0_1","date":"2015-02-07T13:09:54"},{"date":"2015-02-16T19:17:14","version":"3.5.0_2"},{"date":"2015-02-17T21:20:22","version":"3.5.1"},{"version":"3.5.2","date":"2015-09-29T15:46:33"},{"date":"2015-10-01T14:06:04","version":"3.5.3"},{"version":"3.5.9_1","date":"2017-04-05T10:23:22"},{"version":"3.6.0","date":"2017-04-17T13:34:12"},{"date":"2017-05-22T16:49:32","version":"3.6.1"},{"version":"3.6.2","date":"2017-05-23T14:25:49"},{"version":"3.6.9_1","date":"2017-09-22T16:30:49"},{"version":"3.6.9_2","date":"2017-09-23T02:10:34"},{"version":"3.7.0","date":"2017-09-24T19:30:09"},{"version":"3.7.1","date":"2018-02-11T19:23:39"},{"version":"v3.7.3","date":"2018-02-12T13:39:58"},{"version":"3.7.4","date":"2018-02-13T04:10:10"},{"date":"2019-04-26T02:20:41","version":"3.8.0"},{"date":"2019-07-06T19:44:25","version":"3.8.1"},{"version":"3.8.9_1","date":"2019-07-25T15:48:44"},{"date":"2019-08-13T21:10:51","version":"3.9.0"},{"version":"3.9.1","date":"2019-08-15T19:46:43"},{"date":"2019-09-03T15:18:09","version":"3.10.0"},{"version":"3.10.1","date":"2020-01-14T03:27:38"},{"version":"3.10.2","date":"2020-01-17T22:34:46"},{"version":"3.10.3","date":"2020-01-20T21:01:45"},{"date":"2020-02-03T17:19:38","version":"3.10.4"},{"date":"2020-03-23T17:47:23","version":"3.10.5"},{"version":"3.11.0","date":"2020-04-23T16:46:52"},{"date":"2020-04-28T15:12:38","version":"3.11.1"},{"date":"2020-05-07T18:35:28","version":"3.12.0"},{"version":"3.12.1","date":"2020-06-03T13:39:22"},{"version":"3.12.2","date":"2020-06-04T15:30:54"},{"date":"2020-06-05T17:59:13","version":"3.12.3"},{"date":"2020-06-08T20:38:00","version":"3.12.3_1"},{"date":"2020-06-15T21:25:55","version":"3.12.3_2"},{"version":"3.13.0","date":"2020-06-17T15:53:25"},{"version":"3.14.0","date":"2020-07-20T00:24:23"},{"version":"3.14.1","date":"2020-08-12T16:17:33"},{"date":"2020-08-13T13:36:09","version":"3.14.2"},{"version":"3.15.0","date":"2021-05-21T21:20:28"},{"version":"3.15.1","date":"2022-02-14T15:39:15"},{"date":"2022-08-08T18:03:02","version":"3.16.0"},{"date":"2023-03-06T00:06:35","version":"3.16.1"},{"date":"2023-04-04T19:49:11","version":"3.16.2"},{"date":"2023-04-04T20:43:26","version":"3.16.3"},{"version":"3.17.0","date":"2023-08-24T00:42:24"},{"version":"3.18.0","date":"2023-12-06T23:47:13"}],"advisories":[{"cves":["CVE-2012-1151"],"distribution":"DBD-Pg","reported":"2012-09-09","affected_versions":["<2.19.0"],"references":["http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661536","https://rt.cpan.org/Public/Bug/Display.html?id=75642","http://secunia.com/advisories/48319","https://bugzilla.redhat.com/show_bug.cgi?id=801733","http://www.openwall.com/lists/oss-security/2012/03/10/4","http://secunia.com/advisories/48307","http://www.debian.org/security/2012/dsa-2431","http://cpansearch.perl.org/src/TURNSTEP/DBD-Pg-2.19.1/Changes","http://www.openwall.com/lists/oss-security/2012/03/09/6","http://rhn.redhat.com/errata/RHSA-2012-1116.html","http://secunia.com/advisories/48824","http://security.gentoo.org/glsa/glsa-201204-08.xml","http://www.mandriva.com/security/advisories?name=MDVSA-2012:112","https://exchange.xforce.ibmcloud.com/vulnerabilities/73855","https://exchange.xforce.ibmcloud.com/vulnerabilities/73854"],"description":"Multiple format string vulnerabilities in dbdimp.c in DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.19.0 for Perl allow remote PostgreSQL database servers to cause a denial of service (process crash) via format string specifiers in (1) a crafted database warning to the pg_warn function or (2) a crafted DBD statement to the dbd_st_prepare function.\n","id":"CPANSA-DBD-Pg-2012-1151","severity":null,"fixed_versions":[]},{"description":"Heap-based buffer overflow in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module 1.49 for Perl might allow context-dependent attackers to execute arbitrary code via unspecified input to an application that uses the getline and pg_getline functions to read database rows.\n","references":["http://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49-2+etch1.diff.gz","https://launchpad.net/bugs/cve/2009-0663","http://www.debian.org/security/2009/dsa-1780","http://secunia.com/advisories/34909","http://www.securityfocus.com/bid/34755","http://www.redhat.com/support/errata/RHSA-2009-0479.html","http://secunia.com/advisories/35058","http://www.redhat.com/support/errata/RHSA-2009-1067.html","http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html","http://secunia.com/advisories/35685","https://exchange.xforce.ibmcloud.com/vulnerabilities/50467","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9499"],"severity":null,"id":"CPANSA-DBD-Pg-2009-0663","fixed_versions":[],"cves":["CVE-2009-0663"],"reported":"2009-04-30","distribution":"DBD-Pg","affected_versions":["=1.49"]},{"fixed_versions":[">=2.0.0"],"severity":null,"id":"CPANSA-DBD-Pg-2009-1341","references":["http://rt.cpan.org/Public/Bug/Display.html?id=21392","https://launchpad.net/bugs/cve/2009-1341","http://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49-2+etch1.diff.gz","http://www.debian.org/security/2009/dsa-1780","http://cpansearch.perl.org/src/TURNSTEP/DBD-Pg-2.13.1/Changes","http://secunia.com/advisories/34909","http://www.securityfocus.com/bid/34757","http://www.redhat.com/support/errata/RHSA-2009-0479.html","http://secunia.com/advisories/35058","http://www.redhat.com/support/errata/RHSA-2009-1067.html","http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html","http://secunia.com/advisories/35685","https://exchange.xforce.ibmcloud.com/vulnerabilities/50387","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9680"],"description":"Memory leak in the dequote_bytea function in quote.c in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.0.0 for Perl allows context-dependent attackers to cause a denial of service (memory consumption) by fetching data with BYTEA columns.\n","affected_versions":["<2.0.0"],"distribution":"DBD-Pg","reported":"2009-04-30","cves":["CVE-2009-1341"]}],"main_module":"DBD::Pg"},"Apache-Session-LDAP":{"advisories":[{"fixed_versions":[">=0.5"],"id":"CPANSA-Apache-Session-LDAP-2020-36658","severity":null,"description":"In Apache::Session::LDAP before 0.5, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can, for example, be fixed in conjunction with the CVE-2020-16093 fix.\n","references":["https://github.com/LemonLDAPNG/Apache-Session-LDAP/commit/490722b71eed1ed1ab33d58c78578f23e043561f","https://lists.debian.org/debian-lts-announce/2023/01/msg00024.html"],"affected_versions":["<0.5"],"reported":"2023-01-27","distribution":"Apache-Session-LDAP","cves":["CVE-2020-36658"]}],"main_module":"Apache::Session::LDAP","versions":[{"version":"0.01","date":"2009-04-18T17:09:10"},{"date":"2009-04-18T19:43:50","version":"0.02"},{"date":"2010-12-08T15:30:51","version":"0.1"},{"date":"2012-06-26T04:22:47","version":"0.2"},{"version":"0.2","date":"2014-10-24T12:21:07"},{"version":"0.4","date":"2015-06-12T15:47:40"},{"date":"2020-09-06T13:13:20","version":"0.2"}]},"CGI-Auth-Basic":{"main_module":"CGI::Auth::Basic","advisories":[{"cves":[],"affected_versions":["<1.11"],"distribution":"CGI-Auth-Basic","reported":"2007-12-30","references":["https://metacpan.org/changes/distribution/CGI-Auth-Basic"],"description":"TBD\n","fixed_versions":[">=1.11"],"id":"CPANSA-CGI-Auth-Basic-2007-01"}],"versions":[{"date":"2004-02-21T14:58:09","version":"1.0"},{"date":"2004-08-31T13:29:28","version":"1.01"},{"version":"1.02","date":"2004-11-07T03:34:32"},{"version":"1.10","date":"2006-06-18T01:12:15"},{"date":"2007-12-30T20:53:33","version":"1.11"},{"version":"1.20","date":"2009-04-18T04:22:51"},{"date":"2009-04-23T17:00:50","version":"1.21"},{"version":"1.21","date":"2009-04-24T15:07:48"},{"date":"2012-08-27T01:50:53","version":"1.22"},{"date":"2015-01-21T00:26:01","version":"1.23"},{"date":"2018-12-23T21:03:03","version":"1.24"}]},"Zonemaster-Backend":{"advisories":[{"fixed_versions":[">=7.0.0"],"id":"CPANSA-Zonemaster-Backend-2021-001","severity":null,"references":["https://github.com/zonemaster/zonemaster-backend/issues/838","https://metacpan.org/dist/Zonemaster-Backend/changes"],"description":"When running the API behind a reverse proxy on the same machine (like it is using the configuration example provided by the GUI) the remote ip might always be localhost even if the query was done from elsewher\n","affected_versions":["<7.0.0"],"reported":"2021-08-05","distribution":"Zonemaster-Backend","cves":[]},{"distribution":"Zonemaster-Backend","reported":"2015-01-28","affected_versions":["<1.0.1"],"cves":[],"id":"CPANSA-Zonemaster-Backend-2015-001","severity":null,"fixed_versions":[">=1.0.1"],"description":"Potential SQL injection.\n","references":["https://github.com/zonemaster/zonemaster-backend/issues/25","https://metacpan.org/dist/Zonemaster-Backend/changes"]}],"main_module":"Zonemaster::Backend","versions":[{"date":"2017-11-02T13:57:24","version":"2.0.0"},{"date":"2018-01-12T17:25:15","version":"2.0.1"},{"date":"2018-02-23T13:09:41","version":"2.0.2"},{"date":"2018-06-25T08:43:15","version":"2.1.0"},{"date":"2019-05-24T07:07:47","version":"4.0.0"},{"date":"2019-05-31T16:42:26","version":"4.0.1"},{"date":"2020-05-01T14:49:55","version":"5.0.0"},{"version":"5.0.1","date":"2020-05-15T12:59:00"},{"date":"2020-05-22T07:31:56","version":"5.0.2"},{"date":"2020-11-09T09:49:51","version":"6.0.0"},{"date":"2020-11-10T10:02:13","version":"6.0.1"},{"date":"2020-11-18T09:08:50","version":"6.0.2"},{"version":"6.1.0","date":"2021-02-09T11:02:57"},{"version":"6.2.0","date":"2021-05-31T20:39:03"},{"date":"2021-09-18T14:05:03","version":"7.0.0"},{"date":"2021-12-06T00:20:51","version":"8.0.0"},{"date":"2021-12-20T10:08:13","version":"8.1.0"},{"date":"2022-06-10T11:39:25","version":"9.0.0"},{"date":"2022-07-08T08:40:31","version":"9.0.1"},{"version":"10.0.0","date":"2022-12-19T09:29:40"},{"date":"2023-01-31T16:06:19","version":"10.0.1"},{"version":"10.0.2","date":"2023-03-01T17:37:05"},{"date":"2023-06-21T16:14:40","version":"11.0.0"},{"date":"2023-08-08T02:40:32","version":"11.0.1"},{"date":"2023-09-08T09:18:30","version":"11.0.2"},{"version":"11.1.0","date":"2024-03-18T15:59:50"},{"date":"2024-03-28T10:49:24","version":"11.1.1"},{"date":"2024-07-01T15:45:21","version":"11.2.0"},{"date":"2024-12-09T13:52:41","version":"11.3.0"}]},"IPC-Cmd":{"versions":[{"date":"2003-05-10T16:57:39","version":"0.02"},{"date":"2003-05-11T08:50:33","version":"0.03"},{"version":"0.04","date":"2003-09-25T10:34:58"},{"version":"0.20","date":"2004-06-18T11:43:01"},{"date":"2004-08-16T10:26:03","version":"0.22"},{"version":"0.23","date":"2004-12-03T15:53:45"},{"version":"0.24","date":"2004-12-09T09:56:18"},{"date":"2006-09-06T15:57:50","version":"0.25"},{"date":"2006-10-05T14:42:36","version":"0.29_01"},{"version":"0.30","date":"2006-10-11T11:11:24"},{"version":"0.32","date":"2006-10-13T11:18:04"},{"version":"0.34","date":"2006-10-20T13:16:49"},{"version":"0.36","date":"2006-11-24T14:01:10"},{"version":"0.38","date":"2007-10-11T15:17:44"},{"version":"0.40","date":"2007-10-17T09:29:57"},{"date":"2008-05-18T15:50:12","version":"0.41_01"},{"date":"2008-06-29T15:41:17","version":"0.41_02"},{"version":"0.41_03","date":"2008-07-13T13:08:43"},{"version":"0.41_04","date":"2008-07-14T13:57:54"},{"date":"2008-09-22T13:12:26","version":"0.41_05"},{"version":"0.41_06","date":"2008-09-24T15:46:32"},{"version":"0.41_07","date":"2008-10-05T16:24:49"},{"date":"2008-10-10T09:47:07","version":"0.42"},{"date":"2009-05-04T08:15:08","version":"0.44"},{"date":"2009-06-12T11:38:40","version":"0.46"},{"date":"2009-09-07T14:15:59","version":"0.48"},{"date":"2009-09-07T15:21:24","version":"0.50"},{"version":"0.51_01","date":"2009-11-08T23:24:39"},{"date":"2009-11-13T16:17:59","version":"0.52"},{"version":"0.54","date":"2009-11-15T22:04:56"},{"version":"0.56","date":"2010-02-03T14:21:25"},{"version":"0.58","date":"2010-04-29T20:06:40"},{"version":"0.60","date":"2010-07-05T08:10:45"},{"version":"0.62","date":"2010-10-19T14:53:57"},{"date":"2010-10-19T18:09:00","version":"0.64"},{"version":"0.66","date":"2010-11-23T12:11:55"},{"date":"2011-01-07T22:28:30","version":"0.68"},{"version":"0.70","date":"2011-01-31T20:40:13"},{"version":"0.71_01","date":"2011-05-10T13:07:15"},{"date":"2011-05-26T12:01:30","version":"0.71_02"},{"version":"0.71_03","date":"2011-05-26T12:46:44"},{"date":"2011-06-22T11:34:08","version":"0.72"},{"date":"2012-01-30T10:35:24","version":"0.74"},{"date":"2012-01-30T11:34:12","version":"0.76"},{"date":"2012-04-30T18:52:04","version":"0.78"},{"version":"0.80","date":"2013-03-02T22:15:43"},{"date":"2013-06-29T21:17:06","version":"0.82"},{"version":"0.84","date":"2013-08-06T09:28:59"},{"date":"2013-09-05T19:34:47","version":"0.85_01"},{"version":"0.85_02","date":"2013-10-10T13:09:11"},{"date":"2013-11-04T14:18:01","version":"0.86"},{"version":"0.88","date":"2013-11-15T14:47:57"},{"version":"0.90","date":"2013-11-18T15:12:15"},{"version":"0.92","date":"2014-01-22T20:01:22"},{"date":"2016-02-12T19:01:25","version":"0.94"},{"date":"2016-07-28T10:19:44","version":"0.96"},{"date":"2017-05-12T16:05:02","version":"0.98"},{"date":"2018-02-14T16:21:01","version":"1.00"},{"version":"1.02","date":"2018-05-03T08:53:01"},{"date":"2019-07-13T09:17:39","version":"1.04"}],"main_module":"IPC::Cmd","advisories":[{"reported":"2016-08-02","distribution":"IPC-Cmd","affected_versions":["<0.96"],"cves":["CVE-2016-1238"],"severity":"high","id":"CPANSA-IPC-Cmd-2016-1238","fixed_versions":[">=0.96"],"description":"(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.\n","references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"]}]},"Safe":{"versions":[{"date":"1995-08-24T12:36:38","version":0},{"date":"1995-09-01T21:17:14","version":0},{"date":"1996-02-10T20:04:44","version":"2.01"},{"date":"2002-10-05T18:38:39","version":"2.08"},{"version":"2.09","date":"2002-10-06T12:17:23"},{"version":"2.11","date":"2004-07-02T13:08:36"},{"version":"2.13","date":"2008-01-28T17:33:00"},{"version":"2.14","date":"2008-01-30T16:30:34"},{"version":"2.15","date":"2008-02-06T12:34:21"},{"version":"2.16","date":"2008-03-13T10:54:21"},{"version":"2.17","date":"2009-06-28T14:20:14"},{"date":"2009-08-25T07:44:28","version":"2.19"},{"version":"2.20","date":"2009-11-30T23:33:41"},{"version":"2.21","date":"2010-01-14T21:51:28"},{"version":"2.22","date":"2010-02-11T21:59:56"},{"version":"2.23","date":"2010-02-22T22:45:10"},{"version":"2.24","date":"2010-03-06T21:42:25"},{"date":"2010-03-07T21:51:36","version":"2.25"},{"version":"2.26","date":"2010-03-09T10:56:56"},{"date":"2010-04-29T20:37:15","version":"2.27"},{"date":"2010-09-13T13:50:58","version":"2.28"},{"version":"2.29","date":"2010-10-31T13:20:32"},{"version":"2.30","date":"2011-12-07T08:22:34"},{"date":"2012-03-31T15:27:57","version":"2.32"},{"version":"2.33","date":"2012-04-03T10:12:30"},{"version":"2.35","date":"2013-02-21T07:31:30"}],"advisories":[{"cves":["CVE-2010-1447"],"affected_versions":["<=2.26"],"reported":"2010-05-19","distribution":"Safe","description":"The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution.\n","references":["https://bugs.launchpad.net/bugs/cve/2010-1447","http://www.vupen.com/english/advisories/2010/1167","http://secunia.com/advisories/39845","http://www.postgresql.org/about/news.1203","http://security-tracker.debian.org/tracker/CVE-2010-1447","https://bugzilla.redhat.com/show_bug.cgi?id=588269","http://www.securitytracker.com/id?1023988","http://osvdb.org/64756","http://www.securityfocus.com/bid/40305","http://secunia.com/advisories/40052","http://www.redhat.com/support/errata/RHSA-2010-0458.html","http://www.openwall.com/lists/oss-security/2010/05/20/5","http://www.mandriva.com/security/advisories?name=MDVSA-2010:116","http://www.redhat.com/support/errata/RHSA-2010-0457.html","http://www.mandriva.com/security/advisories?name=MDVSA-2010:115","http://secunia.com/advisories/40049","http://www.debian.org/security/2011/dsa-2267","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7320","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11530"],"fixed_versions":[">=2.27"],"severity":null,"id":"CPANSA-Safe-2010-1447"},{"references":["http://www.openwall.com/lists/oss-security/2010/05/20/5","http://www.redhat.com/support/errata/RHSA-2010-0457.html","http://www.redhat.com/support/errata/RHSA-2010-0458.html","http://secunia.com/advisories/40049","http://cpansearch.perl.org/src/RGARCIA/Safe-2.27/Changes","http://www.mandriva.com/security/advisories?name=MDVSA-2010:115","http://blogs.perl.org/users/rafael_garcia-suarez/2010/03/new-safepm-fixes-security-hole.html","http://www.mandriva.com/security/advisories?name=MDVSA-2010:116","https://bugzilla.redhat.com/show_bug.cgi?id=576508","http://secunia.com/advisories/40052","http://securitytracker.com/id?1024062","http://secunia.com/advisories/42402","http://blogs.sun.com/security/entry/cve_2010_1168_vulnerability_in","http://www.vupen.com/english/advisories/2010/3075","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9807","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7424"],"description":"The Safe (aka Safe.pm) module before 2.25 for Perl allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving implicitly called methods and implicitly blessed objects, as demonstrated by the (a) DESTROY and (b) AUTOLOAD methods, related to \"automagic methods.\"\n","fixed_versions":[],"severity":null,"id":"CPANSA-Safe-2010-1168","cves":["CVE-2010-1168"],"affected_versions":["<2.25"],"distribution":"Safe","reported":"2010-06-21"},{"affected_versions":["<=2.07"],"reported":"2002-12-11","distribution":"Safe","cves":["CVE-2002-1323"],"fixed_versions":[">=2.08"],"id":"CPANSA-Safe-2002-1323","severity":null,"references":["http://use.perl.org/articles/02/10/06/1118222.shtml?tid=5","http://www.securityfocus.com/bid/6111","http://www.debian.org/security/2002/dsa-208","http://www.iss.net/security_center/static/10574.php","http://bugs6.perl.org/rt2/Ticket/Display.html?id=17744","http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0061.html","http://www.redhat.com/support/errata/RHSA-2003-256.html","http://www.redhat.com/support/errata/RHSA-2003-257.html","ftp://patches.sgi.com/support/free/security/advisories/20030606-01-A","ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2004-007.0.txt","ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2004.1/SCOSA-2004.1.txt","http://www.osvdb.org/2183","http://www.osvdb.org/3814","http://marc.info/?l=bugtraq&m=104040175522502&w=2","http://marc.info/?l=bugtraq&m=104033126305252&w=2","http://marc.info/?l=bugtraq&m=104005919814869&w=2","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1160"],"description":"Safe.pm 2.0.7 and earlier, when used in Perl 5.8.0 and earlier, may allow attackers to break out of safe compartments in (1) Safe::reval or (2) Safe::rdo using a redefined @_ variable, which is not reset between successive calls.\n"}],"main_module":"Safe"},"Config-Model":{"main_module":"Config::Model","advisories":[{"id":"CPANSA-Config-Model-2017-03","fixed_versions":[">=2.102"],"description":"The gen_class_pod implementation in lib/Config/Model/Utils/GenClassPod.pm in Config-Model (aka libconfig-model-perl) before 2.102 has a dangerous \"use lib\" line, which allows remote attackers to have an unspecified impact via a crafted Debian package file.\n","references":["https://metacpan.org/changes/distribution/Config-Model","https://github.com/dod38fr/config-model/commit/9bd64d9ec6c0939166a2216a37d58dd19a725951"],"reported":"2017-05-10","distribution":"Config-Model","affected_versions":["<2.102"],"cves":["CVE-2017-0373"]},{"fixed_versions":[">=2.102"],"id":"CPANSA-Config-Model-2017-02","description":"Loads models from a local directory, making it possible to substitute the model.\n","references":["https://metacpan.org/changes/distribution/Config-Model","https://github.com/dod38fr/config-model/commit/4d37c75b0c4f9633b67999f8260b08027a6bc524"],"affected_versions":["<2.102"],"reported":"2017-05-10","distribution":"Config-Model","cves":["CVE-2017-0374"]},{"description":"YAML or YAML::XS can be loaded automatically making it possible to run arbitrary code loading a specially crafted YAML file.\n","references":["https://metacpan.org/changes/distribution/Config-Model","https://github.com/dod38fr/config-model/commit/01d212348bfbadf31bd74aadd26b1e391ff2fd92"],"id":"CPANSA-Config-Model-2017-01","fixed_versions":[">=2.102"],"cves":[],"distribution":"Config-Model","reported":"2017-05-10","affected_versions":["<2.102"]}],"versions":[{"date":"2006-04-21T12:27:44","version":"0.505"},{"version":"0.506","date":"2006-05-19T13:32:14"},{"date":"2006-06-15T12:10:38","version":"0.507"},{"date":"2006-07-20T12:28:36","version":"0.601"},{"date":"2006-09-07T12:06:17","version":"0.602"},{"date":"2006-10-19T11:24:40","version":"0.603"},{"version":"0.604","date":"2006-12-06T12:58:35"},{"date":"2007-01-08T13:16:42","version":"0.605"},{"date":"2007-01-11T12:42:09","version":"0.606"},{"version":"0.607","date":"2007-01-12T13:06:38"},{"date":"2007-02-23T13:00:34","version":"0.608"},{"date":"2007-05-14T11:41:18","version":"0.609"},{"version":"0.610","date":"2007-06-06T12:28:06"},{"date":"2007-07-03T15:35:21","version":"0.611"},{"date":"2007-07-27T11:38:57","version":"0.612"},{"version":"0.613","date":"2007-10-01T15:52:56"},{"date":"2007-10-23T16:10:29","version":"0.614"},{"date":"2007-11-15T12:36:18","version":"0.615"},{"date":"2007-12-04T12:41:22","version":"0.616"},{"version":"0.617","date":"2008-01-28T11:55:50"},{"version":"0.618","date":"2008-02-14T12:56:25"},{"date":"2008-02-29T12:08:41","version":"0.619"},{"date":"2008-03-18T17:40:57","version":"0.620"},{"version":"0.6201","date":"2008-03-20T07:49:00"},{"version":"0.621","date":"2008-04-04T11:38:49"},{"version":"0.622","date":"2008-04-25T16:23:31"},{"date":"2008-05-19T11:47:46","version":"0.623"},{"version":"0.624","date":"2008-07-25T11:35:07"},{"date":"2008-07-30T12:02:43","version":"0.625"},{"version":"0.626","date":"2008-09-22T12:20:00"},{"version":"0.627","date":"2008-09-23T11:05:58"},{"date":"2008-09-29T12:35:05","version":"0.628"},{"version":"0.629","date":"2008-10-13T15:09:27"},{"date":"2008-10-21T11:59:27","version":"0.630"},{"date":"2008-11-10T14:37:44","version":"0.631"},{"date":"2008-12-16T13:32:26","version":"0.632"},{"date":"2008-12-23T15:36:48","version":"0.633"},{"date":"2009-03-05T13:06:32","version":"0.634"},{"version":"0.635","date":"2009-04-20T12:21:46"},{"date":"2009-05-30T16:19:54","version":"0.636"},{"date":"2009-06-23T12:07:41","version":"0.637"},{"version":"0.638","date":"2009-06-30T11:31:35"},{"date":"2009-09-08T11:35:25","version":"0.639"},{"date":"2009-09-09T16:10:41","version":"0.640"},{"date":"2010-01-20T17:30:14","version":"0.641"},{"version":"0.642","date":"2010-01-21T17:17:34"},{"version":"0.643","date":"2010-02-25T13:04:52"},{"version":"0.644","date":"2010-03-12T15:24:45"},{"version":"1.001","date":"2010-03-28T14:53:46"},{"date":"2010-04-22T12:22:00","version":"1.202"},{"version":"1.203","date":"2010-06-03T11:09:45"},{"version":"1.204","date":"2010-06-03T11:20:09"},{"version":"1.205","date":"2010-06-07T16:04:03"},{"date":"2010-08-13T10:53:09","version":"1.206"},{"date":"2010-09-14T16:14:40","version":"1.207"},{"date":"2010-09-16T11:46:11","version":"1.208"},{"version":"1.209","date":"2010-09-20T12:29:12"},{"date":"2010-09-30T16:34:27","version":"1.210"},{"date":"2010-10-08T10:46:45","version":"1.211"},{"version":"1.212","date":"2010-10-15T11:08:52"},{"date":"2010-10-19T12:29:03","version":"1.213"},{"version":"1.214","date":"2010-10-19T15:17:01"},{"version":"1.215","date":"2010-10-19T15:28:56"},{"version":"1.216","date":"2010-10-26T12:16:51"},{"version":"1.217","date":"2010-10-30T12:44:11"},{"date":"2010-11-05T11:53:14","version":"1.218"},{"date":"2010-11-09T13:20:51","version":"1.219"},{"date":"2010-11-10T08:41:22","version":"1.220"},{"version":"1.221","date":"2010-11-21T17:40:10"},{"date":"2010-11-22T14:01:55","version":"1.222"},{"date":"2010-11-28T17:34:03","version":"1.223"},{"date":"2010-12-06T13:18:53","version":"1.224"},{"version":"1.225","date":"2010-12-07T08:01:43"},{"version":"1.226","date":"2010-12-08T18:48:08"},{"version":"1.227","date":"2011-01-07T18:12:45"},{"version":"1.228","date":"2011-01-09T12:27:15"},{"date":"2011-01-10T19:57:53","version":"1.229"},{"version":"1.230","date":"2011-01-20T16:47:27"},{"version":"1.231","date":"2011-01-30T11:30:23"},{"version":"1.232","date":"2011-01-30T13:51:34"},{"version":"1.233","date":"2011-02-11T12:25:32"},{"date":"2011-02-21T17:11:22","version":"1.234"},{"date":"2011-03-01T13:06:28","version":"1.235"},{"version":"1.236","date":"2011-04-01T14:09:03"},{"version":"1.237","date":"2011-04-04T12:57:04"},{"date":"2011-04-05T14:45:45","version":"1.238"},{"version":"1.240","date":"2011-04-05T17:40:17"},{"date":"2011-04-07T18:09:49","version":"1.241"},{"date":"2011-04-25T15:28:14","version":"1.242"},{"version":"1.243","date":"2011-05-02T12:33:33"},{"date":"2011-05-16T15:52:46","version":"1.244"},{"date":"2011-06-17T12:10:22","version":"1.245"},{"version":"1.246","date":"2011-06-20T12:32:24"},{"date":"2011-06-27T14:14:52","version":"1.247"},{"version":"1.248","date":"2011-07-05T15:48:52"},{"date":"2011-07-12T09:54:39","version":"1.249"},{"date":"2011-07-22T12:40:47","version":"1.250"},{"date":"2011-08-30T12:16:32","version":"1.251"},{"version":"1.252","date":"2011-09-01T16:06:19"},{"date":"2011-09-02T16:03:35","version":"1.253"},{"version":"1.254","date":"2011-09-04T15:21:52"},{"date":"2011-09-15T15:23:39","version":"1.255"},{"version":"1.256","date":"2011-09-16T12:28:51"},{"date":"2011-09-23T10:52:00","version":"1.257"},{"version":"1.258","date":"2011-10-14T14:45:06"},{"version":"1.259","date":"2011-10-16T10:17:53"},{"date":"2011-10-28T13:28:02","version":"1.260"},{"version":"1.261","date":"2011-11-18T17:02:26"},{"date":"2011-11-19T11:55:30","version":"1.262"},{"date":"2011-11-29T15:43:38","version":"1.263"},{"version":"1.264","date":"2011-11-30T07:50:25"},{"date":"2011-12-06T18:26:54","version":"1.265"},{"date":"2012-02-06T11:55:29","version":"2.001"},{"date":"2012-02-08T09:49:49","version":"2.002"},{"date":"2012-02-08T13:14:22","version":"2.003"},{"date":"2012-02-09T11:28:18","version":"2.004"},{"date":"2012-02-23T18:25:32","version":"2.005"},{"date":"2012-02-25T11:30:41","version":"2.006"},{"date":"2012-02-26T16:34:50","version":"2.007"},{"version":"2.008","date":"2012-03-01T12:40:23"},{"version":"2.009","date":"2012-03-13T13:11:49"},{"date":"2012-03-13T13:15:03","version":"2.010"},{"version":"2.011","date":"2012-03-19T21:41:44"},{"version":"2.012","date":"2012-04-05T11:41:54"},{"version":"2.013","date":"2012-04-06T12:10:46"},{"version":"2.014","date":"2012-05-04T13:57:13"},{"date":"2012-05-14T10:06:13","version":"2.015"},{"date":"2012-05-20T08:38:36","version":"2.016"},{"date":"2012-05-21T10:56:35","version":"2.017"},{"version":"2.018","date":"2012-05-29T13:53:06"},{"version":"2.019","date":"2012-06-05T12:34:15"},{"version":"2.020","date":"2012-06-18T08:34:26"},{"date":"2012-06-27T14:44:55","version":"2.021_01"},{"version":"2.021","date":"2012-06-28T15:30:52"},{"version":"2.022","date":"2012-07-03T14:47:31"},{"version":"2.023","date":"2012-07-04T13:50:37"},{"date":"2012-09-04T11:30:02","version":"2.024"},{"version":"2.025","date":"2012-09-10T10:52:02"},{"version":"2.026_1","date":"2012-09-20T17:12:09"},{"date":"2012-09-21T10:38:47","version":"2.026_2"},{"version":"2.026","date":"2012-09-27T11:53:42"},{"date":"2012-10-30T12:48:16","version":"2.027"},{"date":"2012-11-27T12:44:55","version":"2.028"},{"date":"2012-11-28T13:31:04","version":"2.029"},{"version":"2.030_01","date":"2013-02-27T18:37:05"},{"version":"2.030","date":"2013-03-23T09:47:53"},{"version":"2.031","date":"2013-04-03T17:22:28"},{"version":"2.032","date":"2013-04-15T11:28:33"},{"version":"2.033","date":"2013-04-15T19:27:14"},{"date":"2013-04-17T19:29:52","version":"2.034"},{"version":"2.035","date":"2013-04-27T15:05:09"},{"version":"2.036","date":"2013-05-25T17:53:04"},{"date":"2013-06-15T17:46:45","version":"2.037"},{"date":"2013-07-03T19:30:32","version":"2.038"},{"version":"2.039","date":"2013-07-18T18:12:07"},{"version":"2.040","date":"2013-07-20T09:46:11"},{"version":"2.041","date":"2013-08-14T17:58:40"},{"date":"2013-09-15T17:41:45","version":"2.042"},{"date":"2013-09-20T17:35:06","version":"2.043"},{"version":"2.044","date":"2013-10-13T16:02:40"},{"version":"2.045","date":"2013-10-18T17:48:15"},{"version":"2.046","date":"2013-12-15T13:07:37"},{"version":"2.047","date":"2014-01-25T15:54:37"},{"date":"2014-02-23T18:02:19","version":"2.048"},{"version":"2.049","date":"2014-02-26T19:45:44"},{"date":"2014-02-27T18:12:32","version":"2.050"},{"version":"2.051","date":"2014-03-06T18:23:11"},{"date":"2014-03-23T16:20:43","version":"2.052"},{"version":"2.053","date":"2014-03-25T19:11:57"},{"date":"2014-04-01T17:51:50","version":"2.054"},{"date":"2014-05-02T11:33:28","version":"2.055"},{"version":"2.056","date":"2014-05-18T19:34:53"},{"version":"2.057","date":"2014-06-12T19:32:47"},{"date":"2014-06-19T19:43:18","version":"2.058"},{"date":"2014-06-29T15:08:02","version":"2.059"},{"date":"2014-08-19T12:43:59","version":"2.060"},{"date":"2014-09-23T19:21:04","version":"2.061"},{"date":"2014-11-23T19:45:05","version":"2.062"},{"version":"2.063","date":"2014-11-28T17:55:21"},{"date":"2014-12-04T18:47:05","version":"2.064"},{"date":"2015-01-06T20:16:15","version":"2.065"},{"date":"2015-02-15T16:13:00","version":"2.066"},{"date":"2015-03-01T18:38:28","version":"2.067"},{"version":"2.068","date":"2015-03-29T13:39:56"},{"version":"2.069","date":"2015-04-25T19:29:15"},{"date":"2015-05-03T14:00:52","version":"2.070"},{"date":"2015-05-23T11:15:16","version":"2.071"},{"date":"2015-07-18T19:31:43","version":"2.072"},{"date":"2015-07-19T07:35:51","version":"2.073"},{"date":"2015-09-30T18:56:39","version":"2.074"},{"date":"2015-11-22T20:11:19","version":"2.075"},{"version":"2.076","date":"2016-01-14T18:13:20"},{"date":"2016-01-20T19:55:36","version":"2.077"},{"version":"2.078","date":"2016-01-24T18:48:46"},{"date":"2016-02-12T20:44:28","version":"2.079"},{"date":"2016-02-27T17:59:55","version":"2.080"},{"version":"2.081","date":"2016-02-29T19:01:45"},{"version":"2.082","date":"2016-03-29T18:22:30"},{"version":"2.083","date":"2016-04-20T18:32:29"},{"version":"2.084","date":"2016-05-26T17:35:53"},{"version":"2.085","date":"2016-05-29T17:13:14"},{"version":"2.086","date":"2016-06-04T19:28:08"},{"date":"2016-06-29T17:35:35","version":"2.087"},{"version":"2.088","date":"2016-07-09T18:06:03"},{"date":"2016-09-04T13:17:52","version":"2.089"},{"version":"2.090","date":"2016-09-10T16:07:07"},{"version":"2.091","date":"2016-09-13T17:05:56"},{"version":"2.092","date":"2016-09-23T17:46:04"},{"version":"2.093","date":"2016-11-08T18:33:39"},{"date":"2016-11-09T18:23:05","version":"2.094"},{"date":"2016-12-06T18:01:00","version":"2.095"},{"version":"2.096","date":"2016-12-11T20:28:14"},{"date":"2016-12-22T17:35:34","version":"2.097"},{"date":"2017-02-26T18:58:23","version":"2.098"},{"version":"2.099","date":"2017-03-05T17:09:37"},{"version":"2.100","date":"2017-03-18T12:06:34"},{"date":"2017-04-28T17:40:56","version":"2.101"},{"version":"2.102","date":"2017-05-14T19:10:40"},{"version":"2.103","date":"2017-05-25T08:15:17"},{"version":"2.104","date":"2017-06-03T13:23:33"},{"version":"2.105","date":"2017-06-09T17:26:55"},{"version":"2.106","date":"2017-07-16T14:07:23"},{"date":"2017-08-30T19:12:10","version":"2.107"},{"version":"2.108","date":"2017-08-31T17:23:43"},{"date":"2017-09-18T17:52:57","version":"2.109"},{"date":"2017-09-21T19:12:32","version":"2.110"},{"date":"2017-09-22T18:41:04","version":"2.111"},{"version":"2.112","date":"2017-10-01T09:12:45"},{"date":"2017-10-12T19:07:46","version":"2.113"},{"version":"2.114","date":"2017-11-11T16:35:03"},{"date":"2017-12-14T18:03:18","version":"2.115"},{"date":"2017-12-16T09:52:09","version":"2.116"},{"version":"2.117","date":"2018-02-03T18:09:35"},{"version":"2.118","date":"2018-03-26T18:33:19"},{"date":"2018-04-02T16:55:50","version":"2.119"},{"version":"2.120","date":"2018-04-08T07:56:03"},{"date":"2018-04-15T17:08:18","version":"2.121"},{"date":"2018-04-17T17:20:14","version":"2.122"},{"version":"2.123","date":"2018-05-01T17:18:09"},{"date":"2018-06-09T17:16:59","version":"2.124"},{"version":"2.125","date":"2018-06-24T12:47:24"},{"version":"2.126","date":"2018-08-20T13:10:09"},{"version":"2.127","date":"2018-09-30T16:44:13"},{"version":"2.128","date":"2018-11-21T19:33:41"},{"version":"2.129","date":"2018-12-05T18:44:58"},{"date":"2018-12-07T19:02:10","version":"2.130"},{"date":"2018-12-16T18:32:58","version":"2.131"},{"date":"2018-12-22T17:50:27","version":"2.132"},{"date":"2019-01-13T20:17:07","version":"2.133"},{"version":"2.134","date":"2019-05-05T10:51:38"},{"version":"2.135","date":"2019-06-05T17:21:24"},{"date":"2019-07-29T15:44:09","version":"2.136"},{"date":"2019-12-01T17:32:00","version":"2.137"},{"version":"2.138","date":"2019-12-27T14:43:21"},{"date":"2020-07-18T14:38:14","version":"2.139"},{"version":"2.140","date":"2020-07-31T08:24:37"},{"date":"2021-01-17T18:04:01","version":"2.141"},{"date":"2021-04-07T17:08:47","version":"2.142"},{"date":"2021-10-31T17:28:44","version":"2.143"},{"version":"2.144","date":"2021-11-04T17:26:40"},{"date":"2021-11-06T18:23:25","version":"2.145"},{"date":"2021-11-28T18:13:47","version":"2.146"},{"version":"2.147","date":"2021-11-29T18:42:25"},{"date":"2022-01-09T15:02:17","version":"2.148"},{"version":"2.149","date":"2022-01-13T16:42:50"},{"version":"2.150","date":"2022-05-08T15:10:12"},{"date":"2022-07-26T14:32:41","version":"2.151"},{"date":"2022-07-28T08:07:07","version":"2.152"},{"version":"2.153","date":"2023-07-14T14:05:14"},{"version":"2.153","date":"2023-07-14T17:35:53"},{"date":"2024-06-15T14:47:56","version":"2.154"},{"version":"2.155","date":"2024-11-24T15:11:43"}]},"Proc-ProcessTable":{"versions":[{"date":"1998-07-23T12:59:39","version":"0.01"},{"version":"0.02","date":"1998-07-24T12:50:40"},{"date":"1998-07-26T13:18:26","version":"0.03"},{"date":"1998-08-15T21:22:20","version":"0.04"},{"version":"0.05","date":"1998-12-09T23:53:30"},{"date":"1998-12-10T04:51:19","version":"0.06"},{"date":"1999-02-05T03:21:51","version":"0.08"},{"date":"1999-02-20T04:27:53","version":"0.09"},{"date":"1999-02-20T16:36:14","version":"0.10"},{"date":"1999-03-07T00:16:52","version":"0.11"},{"date":"1999-03-21T16:07:46","version":"0.12"},{"date":"1999-05-14T02:10:41","version":"0.13"},{"version":"0.14","date":"1999-05-16T01:22:45"},{"version":"0.15","date":"1999-06-02T02:39:22"},{"version":"0.16","date":"1999-08-10T03:45:58"},{"version":"0.17","date":"1999-08-19T15:45:19"},{"date":"1999-08-19T17:44:22","version":"0.18"},{"version":"0.20","date":"1999-09-09T02:45:48"},{"version":"0.21","date":"1999-09-10T16:51:02"},{"version":"0.22","date":"1999-10-05T12:34:33"},{"version":"0.23","date":"1999-11-01T13:55:15"},{"version":"0.24","date":"2000-01-20T20:57:35"},{"version":"0.25","date":"2000-02-03T16:28:46"},{"version":"0.26","date":"2000-02-11T21:56:23"},{"date":"2000-06-29T12:38:46","version":"0.27"},{"version":"0.28","date":"2000-08-14T09:25:19"},{"version":"0.29","date":"2001-01-09T12:47:49"},{"version":"0.30","date":"2001-03-08T02:57:16"},{"version":"0.31","date":"2001-06-01T12:39:15"},{"date":"2001-08-20T02:41:52","version":"0.32"},{"date":"2001-10-16T13:32:04","version":"0.33"},{"version":"0.34","date":"2002-02-25T03:17:15"},{"date":"2002-07-03T04:31:57","version":"0.35"},{"version":"0.36","date":"2002-11-08T02:31:59"},{"date":"2002-11-08T14:59:11","version":"0.37"},{"date":"2002-12-07T03:33:51","version":"0.38"},{"version":"0.39","date":"2003-10-03T17:45:51"},{"date":"2005-07-11T01:33:32","version":"0.40"},{"date":"2006-07-01T04:27:59","version":"0.41"},{"version":"0.42","date":"2008-01-26T05:34:53"},{"version":"0.43","date":"2008-07-18T04:05:51"},{"date":"2008-07-25T14:29:08","version":"0.44"},{"date":"2008-09-08T15:39:40","version":"0.45"},{"version":"0.46","date":"2012-10-19T13:58:48"},{"date":"2013-02-16T16:06:35","version":"0.47"},{"version":"0.48","date":"2013-05-26T22:20:21"},{"version":"0.49","date":"2013-12-05T23:31:39"},{"version":"0.50","date":"2013-12-15T15:47:54"},{"date":"2014-05-17T21:03:43","version":"0.50_01"},{"date":"2014-10-17T22:56:58","version":"0.51"},{"version":"0.52","date":"2015-08-23T10:12:37"},{"date":"2015-08-24T19:36:41","version":"0.53"},{"version":"0.54","date":"2018-02-01T21:02:36"},{"date":"2018-02-01T21:57:51","version":"0.55"},{"version":"0.56","date":"2019-02-07T22:38:02"},{"version":"0.56_01","date":"2019-06-14T21:16:11"},{"date":"2019-06-15T11:28:52","version":"0.56_02"},{"version":"0.57","date":"2019-06-15T18:56:51"},{"version":"0.58","date":"2019-06-15T19:20:02"},{"version":"0.59","date":"2019-06-20T19:35:05"},{"version":"0.60","date":"2021-08-14T16:19:38"},{"date":"2021-08-17T22:50:12","version":"0.61"},{"version":"0.611","date":"2021-08-18T06:57:20"},{"version":"0.612","date":"2021-09-08T10:39:21"},{"version":"0.62","date":"2021-09-13T14:03:14"},{"version":"0.631","date":"2021-09-26T21:58:24"},{"date":"2021-09-26T22:35:32","version":"0.632"},{"version":"0.633","date":"2021-09-26T23:01:20"},{"date":"2021-09-26T23:04:23","version":"0.634"},{"version":"0.635","date":"2023-05-08T06:51:59"},{"version":"0.636","date":"2023-06-21T06:25:43"}],"advisories":[{"cves":["CVE-2011-4363"],"distribution":"Proc-ProcessTable","reported":"2012-10-07","affected_versions":[">=0.45,<0.47"],"references":["http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650500","http://www.osvdb.org/77428","http://www.openwall.com/lists/oss-security/2011/11/30/2","http://www.securityfocus.com/bid/50868","https://rt.cpan.org/Public/Bug/Display.html?id=72862","http://www.openwall.com/lists/oss-security/2011/11/30/3","http://secunia.com/advisories/47015","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4363"],"description":"ProcessTable.pm in the Proc::ProcessTable module 0.45 for Perl, when TTY information caching is enabled, allows local users to overwrite arbitrary files via a symlink attack on /tmp/TTYDEVS.\n","id":"CPANSA-Proc-ProcessTable-2011-4363","severity":null,"fixed_versions":[">=0.47"]}],"main_module":"Proc::ProcessTable"},"PApp":{"versions":[{"version":"0.02","date":"2000-04-11T19:29:07"},{"date":"2000-04-14T01:33:03","version":"0.03"},{"date":"2000-05-11T01:27:39","version":"0.04"},{"date":"2000-05-27T20:43:50","version":"0.05"},{"version":"0.06","date":"2000-06-07T19:56:36"},{"date":"2000-06-09T20:15:48","version":"0.07"},{"date":"2000-06-18T21:57:46","version":"0.08"},{"date":"2001-02-25T17:23:00","version":"0.12"},{"date":"2001-11-30T10:35:30","version":"0.121"},{"version":"0.122","date":"2001-12-03T18:35:13"},{"version":"0.142","date":"2002-04-16T17:20:02"},{"date":"2002-09-27T09:55:48","version":"0.143"},{"date":"2002-11-15T19:09:27","version":"0.2"},{"date":"2003-11-01T21:22:27","version":"0.22"},{"version":"0.95","date":"2004-04-24T07:18:03"},{"version":"1","date":"2004-11-23T17:16:58"},{"date":"2005-09-04T14:32:15","version":"1.1"},{"date":"2007-01-06T19:32:19","version":"1.2"},{"date":"2008-01-20T12:37:14","version":"1.4"},{"date":"2008-01-28T20:07:08","version":"1.41"},{"date":"2008-11-26T07:18:45","version":"1.42"},{"date":"2008-12-09T17:23:32","version":"1.43"},{"date":"2010-01-30T03:08:38","version":"1.44"},{"version":"1.45","date":"2010-11-21T07:30:21"},{"version":"2.0","date":"2013-03-19T12:24:55"},{"date":"2016-02-11T07:21:31","version":2.1},{"date":"2020-02-17T11:04:59","version":2.2},{"version":2.3,"date":"2023-08-02T22:30:09"}],"advisories":[{"id":"CPANSA-PApp-2001-01","severity":null,"fixed_versions":[">=0.11"],"references":["https://metacpan.org/dist/PApp/changes"],"description":"Testing for nonexistant access rights always returned true.\n","reported":"2001-10-27","distribution":"PApp","affected_versions":["<0.11"],"cves":[]}],"main_module":"PApp"},"Net-IPAddress-Util":{"main_module":"Net::IPAddress::Util","advisories":[{"cves":["CVE-2021-47156"],"affected_versions":["<5.000"],"reported":"2024-03-18","distribution":"Net-IPAddress-Util","references":["https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/","https://metacpan.org/release/Net-IPAddress-Util","https://metacpan.org/release/PWBENNETT/Net-IPAddress-Util-5.000/changes"],"description":"The Net::IPAddress::Util module before 5.000 for Perl does not properly consider extraneous zero characters in an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.\n","fixed_versions":[">=5.000"],"severity":null,"id":"CPANSA-Net-IPAddress-Util-2021-47156"}],"versions":[{"date":"2010-03-21T17:13:19","version":"0.01"},{"version":"0.02","date":"2010-03-21T21:58:11"},{"version":"0.03","date":"2010-03-21T23:54:15"},{"date":"2010-03-22T00:50:40","version":"0.04"},{"version":"0.05","date":"2010-03-23T11:38:32"},{"date":"2010-03-24T10:42:02","version":"0.06"},{"version":"0.07","date":"2010-03-25T10:58:12"},{"date":"2010-03-26T11:06:58","version":"0.08"},{"version":"0.09","date":"2010-03-27T15:38:27"},{"date":"2010-04-29T01:26:36","version":"0.10"},{"date":"2011-03-26T22:10:10","version":"0.11"},{"version":"0.12","date":"2011-03-27T00:22:54"},{"version":"1.000","date":"2012-05-30T10:03:21"},{"version":"1.001","date":"2012-05-31T10:48:35"},{"date":"2012-06-09T08:44:51","version":"1.002"},{"version":"2.000","date":"2013-10-29T14:27:36"},{"version":"2.000_TRIAL","date":"2013-10-29T14:31:44"},{"date":"2013-10-30T03:01:39","version":"2.001_TRIAL"},{"date":"2013-10-30T03:32:06","version":"2.002_TRIAL"},{"date":"2013-10-30T11:47:01","version":"2.003_TRIAL"},{"date":"2013-10-30T15:53:55","version":"2.004_TRIAL"},{"version":"1.500","date":"2013-11-01T02:53:47"},{"date":"2013-11-02T02:04:49","version":"3.000"},{"version":"3.001","date":"2014-04-29T10:09:11"},{"date":"2014-06-10T06:38:16","version":"3.002"},{"date":"2014-06-14T21:40:33","version":"3.003"},{"version":"3.010","date":"2014-09-24T11:29:12"},{"date":"2014-09-24T13:12:04","version":"3.011"},{"date":"2014-09-26T05:01:04","version":"3.012"},{"date":"2014-09-27T15:52:03","version":"3.013"},{"date":"2014-09-27T15:59:49","version":"3.014"},{"version":"3.015","date":"2014-09-30T03:35:57"},{"version":"3.016","date":"2014-09-30T03:47:35"},{"date":"2014-09-30T05:30:38","version":"3.017"},{"date":"2014-09-30T06:56:39","version":"3.018"},{"date":"2015-01-11T03:59:42","version":"3.019"},{"version":"3.020","date":"2015-01-11T23:29:32"},{"date":"2015-02-18T06:04:51","version":"3.021"},{"date":"2015-03-21T16:22:56","version":"3.022"},{"date":"2016-03-30T16:54:57","version":"3.024"},{"version":"3.025","date":"2016-03-30T23:56:29"},{"date":"2016-04-07T19:36:23","version":"3.026"},{"date":"2016-04-13T13:40:55","version":"3.027"},{"version":"3.028","date":"2017-08-17T16:40:13"},{"date":"2017-08-17T21:11:21","version":"3.029"},{"date":"2017-08-18T18:07:20","version":"3.030"},{"date":"2017-08-18T19:01:22","version":"3.031"},{"date":"2017-08-31T16:41:45","version":"3.032"},{"date":"2017-08-31T19:39:56","version":"3.033"},{"version":"3.034","date":"2017-09-20T19:26:27"},{"date":"2017-09-21T10:14:03","version":"4.000"},{"version":"4.001","date":"2017-09-22T13:04:11"},{"date":"2017-10-04T18:28:54","version":"4.002"},{"date":"2017-10-05T18:08:46","version":"4.003"},{"date":"2017-10-05T18:44:53","version":"4.004"},{"version":"5.000","date":"2021-04-05T18:40:34"},{"date":"2021-04-11T04:34:22","version":"5.001"}]},"Crypt-CBC":{"advisories":[{"fixed_versions":[">=3.04"],"id":"CPANSA-Crypt-CBC-2021-0001","severity":null,"references":["https://metacpan.org/changes/distribution/Crypt-CBC","https://github.com/briandfoy/cpan-security-advisory/issues/165"],"description":"Fixed bug involving manually-specified IV not being used in some circumstances.\n","affected_versions":["<3.04"],"reported":"2021-05-17","distribution":"Crypt-CBC","cves":[]},{"id":"CPANSA-Crypt-CBC-2006-0898","severity":null,"fixed_versions":[">=2.17"],"references":["https://metacpan.org/changes/distribution/Crypt-CBC","http://www.securityfocus.com/bid/16802","http://secunia.com/advisories/18755","http://www.debian.org/security/2006/dsa-996","http://secunia.com/advisories/19187","http://www.gentoo.org/security/en/glsa/glsa-200603-15.xml","http://secunia.com/advisories/19303","http://www.novell.com/linux/security/advisories/2006_38_security.html","http://secunia.com/advisories/20899","http://securityreason.com/securityalert/488","http://www.redhat.com/support/errata/RHSA-2008-0261.html","http://secunia.com/advisories/31493","http://rhn.redhat.com/errata/RHSA-2008-0630.html","https://exchange.xforce.ibmcloud.com/vulnerabilities/24954","http://www.securityfocus.com/archive/1/425966/100/0/threaded"],"description":"Crypt::CBC Perl module 2.16 and earlier, when running in RandomIV mode, uses an initialization vector (IV) of 8 bytes, which results in weaker encryption when used with a cipher that requires a larger block size than 8 bytes, such as Rijndael.\n","reported":"2006-02-25","distribution":"Crypt-CBC","affected_versions":["<2.17"],"cves":["CVE-2006-0898"]}],"main_module":"Crypt::CBC","versions":[{"date":"1998-06-19T19:48:52","version":"1.00"},{"date":"1998-09-22T18:30:35","version":"1.10"},{"date":"1998-12-20T23:36:49","version":"1.20"},{"version":"1.22","date":"2000-01-27T00:27:56"},{"version":"1.23","date":"2000-02-22T15:20:56"},{"version":"1.24","date":"2000-06-07T18:55:59"},{"version":"1.25","date":"2000-06-08T15:59:07"},{"date":"2001-12-10T17:16:25","version":"2.01"},{"version":"2.02","date":"2002-01-24T05:30:16"},{"date":"2002-06-02T18:40:15","version":"2.03"},{"date":"2002-06-12T02:20:51","version":"2.04"},{"version":"2.05","date":"2002-06-22T13:02:09"},{"date":"2002-08-08T18:47:49","version":"2.07"},{"version":"2.08","date":"2002-09-11T12:17:23"},{"date":"2004-05-27T15:20:52","version":"2.09"},{"version":"2.10","date":"2004-05-29T17:29:19"},{"version":"2.11","date":"2004-06-03T16:22:32"},{"date":"2004-06-17T15:55:19","version":"2.11"},{"version":"2.14","date":"2005-05-05T20:11:50"},{"date":"2005-08-01T14:02:45","version":"2.15"},{"version":"2.17","date":"2006-02-16T14:08:57"},{"version":"2.18","date":"2006-06-06T23:22:02"},{"version":"2.19","date":"2006-08-12T19:52:11"},{"date":"2006-10-16T23:40:13","version":"2.21"},{"version":"2.22","date":"2006-10-29T21:55:34"},{"version":"2.24","date":"2007-09-28T15:25:53"},{"date":"2008-03-28T14:17:29","version":"2.27"},{"version":"2.28","date":"2008-03-31T14:56:52"},{"version":"2.29","date":"2008-04-22T14:27:07"},{"version":"2.30","date":"2008-09-30T15:17:58"},{"version":"2.31","date":"2012-10-30T11:08:06"},{"version":"2.32","date":"2012-12-14T19:30:14"},{"version":"2.33","date":"2013-07-30T20:03:53"},{"version":"3.00","date":"2021-02-07T15:30:51"},{"version":"3.01","date":"2021-02-08T21:38:16"},{"version":"3.02","date":"2021-04-11T22:16:48"},{"version":"3.03","date":"2021-04-19T02:59:12"},{"version":"3.04","date":"2021-05-17T15:03:53"}]},"Plack":{"advisories":[{"id":"CPANSA-Plack-2015-0202","fixed_versions":[">=1.0034"],"references":[],"description":"Fixed a possible directory traversal with Plack::App::File on Win32.\n","reported":"2015-02-02","distribution":"Plack","affected_versions":["<1.0034"],"cves":[]},{"fixed_versions":[">=1.0031"],"id":"CPANSA-Plack-2014-0801","references":["https://github.com/plack/Plack/pull/446"],"description":"Plack::App::File would previously strip trailing slashes off provided paths. This in combination with the common pattern of serving files with Plack::Middleware::Static could allow an attacker to bypass a whitelist of generated files\n","affected_versions":["<1.0031"],"reported":"2014-08-01","distribution":"Plack","cves":[]},{"references":[],"description":"Fixed directory traversal bug in Plack::App::File on win32 environments\n","fixed_versions":[">=1.0016"],"id":"CPANSA-Plack-2013-0131","cves":[],"affected_versions":["<1.0016"],"distribution":"Plack","reported":"2013-01-31"}],"main_module":"Plack","versions":[{"version":"0.9000","date":"2009-10-13T07:21:14"},{"date":"2009-10-13T07:59:20","version":"0.9001"},{"date":"2009-10-14T18:28:32","version":"0.9002"},{"date":"2009-10-19T02:19:08","version":"0.9003"},{"version":"0.9004","date":"2009-10-21T05:59:54"},{"version":"0.9005","date":"2009-10-22T03:55:53"},{"date":"2009-10-23T08:22:57","version":"0.9006"},{"version":"0.9007","date":"2009-10-25T00:49:12"},{"version":"0.9008","date":"2009-10-27T21:20:52"},{"date":"2009-11-08T04:51:25","version":"0.9009"},{"version":"0.9010","date":"2009-11-12T07:23:02"},{"date":"2009-11-12T11:57:16","version":"0.9011"},{"date":"2009-11-17T21:48:12","version":"0.9012"},{"date":"2009-11-19T02:29:16","version":"0.9013"},{"date":"2009-11-21T05:54:55","version":"0.9014"},{"version":"0.9015","date":"2009-11-26T08:39:53"},{"version":"0.9016","date":"2009-11-29T07:41:55"},{"version":"0.9017","date":"2009-11-29T08:40:10"},{"version":"0.9018","date":"2009-12-03T08:52:20"},{"version":"0.9019","date":"2009-12-06T06:01:48"},{"date":"2009-12-07T10:39:46","version":"0.9020"},{"date":"2009-12-08T22:32:02","version":"0.9021"},{"version":"0.9022","date":"2009-12-13T19:03:10"},{"date":"2009-12-17T21:22:18","version":"0.9023"},{"version":"0.9024","date":"2009-12-19T20:28:45"},{"version":"0.9025","date":"2009-12-26T01:16:08"},{"version":"0.9026","date":"2010-01-01T01:38:39"},{"version":"0.9027","date":"2010-01-04T00:36:24"},{"date":"2010-01-06T02:44:35","version":"0.9028"},{"date":"2010-01-08T03:13:27","version":"0.9029"},{"date":"2010-01-09T21:17:38","version":"0.9030"},{"date":"2010-01-11T19:34:54","version":"0.9031"},{"version":"0.99_01","date":"2010-01-29T22:44:12"},{"version":"0.99_02","date":"2010-01-31T06:15:25"},{"version":"0.99_03","date":"2010-02-04T00:15:09"},{"date":"2010-02-06T07:17:08","version":"0.99_04"},{"version":"0.99_05","date":"2010-02-10T20:55:18"},{"version":"0.9910","date":"2010-02-23T03:10:40"},{"version":"0.9911","date":"2010-02-23T09:58:27"},{"date":"2010-02-25T09:32:19","version":"0.9912"},{"version":"0.9913","date":"2010-02-26T03:16:42"},{"version":"0.9914","date":"2010-03-04T00:07:15"},{"version":"0.9915","date":"2010-03-08T09:35:55"},{"version":"0.9916","date":"2010-03-12T03:56:59"},{"date":"2010-03-17T22:41:16","version":"0.9917"},{"version":"0.9918","date":"2010-03-18T05:42:29"},{"date":"2010-03-18T05:56:03","version":"0.9919"},{"version":"0.9920","date":"2010-03-19T07:05:16"},{"version":"0.99_21","date":"2010-03-25T22:10:09"},{"version":"0.99_22","date":"2010-03-26T02:51:33"},{"version":"0.99_23","date":"2010-03-27T08:06:00"},{"date":"2010-03-27T20:36:26","version":"0.99_24"},{"version":"0.9925","date":"2010-03-28T02:06:23"},{"date":"2010-03-28T21:49:52","version":"0.9926"},{"date":"2010-03-29T19:51:35","version":"0.9927"},{"version":"0.9928","date":"2010-03-30T00:07:33"},{"date":"2010-03-31T07:37:38","version":"0.9929"},{"date":"2010-04-14T03:22:29","version":"0.9930"},{"date":"2010-04-17T06:54:58","version":"0.9931"},{"version":"0.9932","date":"2010-04-19T06:29:10"},{"version":"0.9933","date":"2010-04-27T21:35:45"},{"version":"0.9934","date":"2010-05-04T22:51:24"},{"date":"2010-05-05T22:21:08","version":"0.9935"},{"date":"2010-05-14T23:01:23","version":"0.9936"},{"version":"0.9937","date":"2010-05-15T06:14:20"},{"version":"0.9938","date":"2010-05-24T00:16:59"},{"date":"2010-07-03T01:04:03","version":"0.9938"},{"version":"0.9940","date":"2010-07-03T06:43:20"},{"date":"2010-07-09T01:22:49","version":"0.9941"},{"version":"0.9942","date":"2010-07-24T06:46:17"},{"version":"0.9943","date":"2010-07-30T20:26:59"},{"version":"0.9944","date":"2010-08-09T06:40:55"},{"version":"0.9945","date":"2010-08-19T23:32:19"},{"version":"0.9946","date":"2010-08-29T05:49:19"},{"version":"0.9947","date":"2010-09-09T09:27:05"},{"version":"0.9948","date":"2010-09-09T23:04:59"},{"date":"2010-09-14T19:01:11","version":"0.9949"},{"version":"0.9950","date":"2010-09-30T21:14:53"},{"version":"0.9951","date":"2010-10-25T21:19:36"},{"date":"2010-12-02T22:06:47","version":"0.9952"},{"date":"2010-12-03T22:52:23","version":"0.9953"},{"date":"2010-12-10T01:48:11","version":"0.9954"},{"version":"0.9955","date":"2010-12-10T02:03:59"},{"date":"2010-12-10T03:39:26","version":"0.9956"},{"date":"2010-12-16T19:33:28","version":"0.9957"},{"version":"0.9958","date":"2010-12-20T23:23:17"},{"date":"2010-12-21T19:58:23","version":"0.9959"},{"version":"0.9960","date":"2010-12-25T19:18:11"},{"date":"2011-01-08T05:54:56","version":"0.9961"},{"date":"2011-01-09T05:21:23","version":"0.9962"},{"version":"0.9963","date":"2011-01-11T00:51:33"},{"version":"0.9964","date":"2011-01-25T00:50:49"},{"date":"2011-01-25T07:13:52","version":"0.9965"},{"date":"2011-01-25T20:03:38","version":"0.9966"},{"version":"0.9967","date":"2011-01-25T22:27:44"},{"date":"2011-02-10T03:09:10","version":"0.9968"},{"date":"2011-02-19T05:56:47","version":"0.9969"},{"date":"2011-02-22T16:44:11","version":"0.9970"},{"date":"2011-02-23T22:07:39","version":"0.9971"},{"date":"2011-02-24T19:57:46","version":"0.9972"},{"version":"0.9973","date":"2011-02-26T17:48:50"},{"date":"2011-03-04T04:56:59","version":"0.9974"},{"version":"0.99_75","date":"2011-03-24T18:38:08"},{"date":"2011-04-09T01:29:10","version":"0.9976"},{"date":"2011-05-01T19:24:37","version":"0.9977"},{"date":"2011-05-04T18:31:01","version":"0.9978"},{"version":"0.9979","date":"2011-05-17T16:59:59"},{"version":"0.9980","date":"2011-06-07T03:29:28"},{"version":"0.9981","date":"2011-07-19T00:35:19"},{"date":"2011-07-19T20:14:06","version":"0.9982"},{"date":"2011-09-27T17:23:29","version":"0.9983"},{"version":"0.9984","date":"2011-10-03T16:57:23"},{"version":"0.9985","date":"2011-10-31T20:17:46"},{"version":"0.9986","date":"2012-03-12T18:29:44"},{"version":"0.9987","date":"2012-05-10T05:13:38"},{"version":"0.9988","date":"2012-05-11T10:27:33"},{"version":"0.9989","date":"2012-06-21T20:49:15"},{"version":"0.9990","date":"2012-07-18T18:17:16"},{"version":"0.9991","date":"2012-07-20T00:30:44"},{"date":"2012-07-20T02:12:14","version":"1.0000"},{"version":"1.0001","date":"2012-07-26T23:28:35"},{"version":"1.0002","date":"2012-08-14T00:09:45"},{"date":"2012-08-29T20:49:18","version":"1.0003"},{"version":"1.0004","date":"2012-09-20T02:21:25"},{"date":"2012-10-09T20:37:58","version":"1.0005"},{"version":"1.0006","date":"2012-10-18T23:10:01"},{"version":"1.0007","date":"2012-10-21T06:23:22"},{"version":"1.0008","date":"2012-10-23T01:54:12"},{"date":"2012-10-23T07:59:59","version":"1.0009"},{"date":"2012-11-02T20:33:36","version":"1.0010"},{"version":"1.0011","date":"2012-11-11T19:09:23"},{"version":"1.0012","date":"2012-11-14T20:02:29"},{"version":"1.0013","date":"2012-11-15T03:49:43"},{"date":"2012-12-03T18:30:20","version":"1.0014"},{"date":"2013-01-10T23:23:32","version":"1.0015"},{"version":"1.0016","date":"2013-01-31T21:28:36"},{"version":"1.0017","date":"2013-02-08T03:43:51"},{"version":"1.0018","date":"2013-03-08T18:47:51"},{"date":"2013-04-02T01:39:27","version":"1.0019"},{"version":"1.0020","date":"2013-04-02T02:39:03"},{"date":"2013-04-02T18:21:32","version":"1.0021"},{"date":"2013-04-02T19:38:30","version":"1.0022"},{"date":"2013-04-08T18:14:06","version":"1.0023"},{"date":"2013-05-01T17:07:27","version":"1.0024"},{"version":"1.0025","date":"2013-06-12T20:10:31"},{"version":"1.0026","date":"2013-06-13T06:01:17"},{"date":"2013-06-14T04:31:09","version":"1.0027"},{"date":"2013-06-15T08:44:43","version":"1.0028"},{"version":"1.0029","date":"2013-08-22T21:06:25"},{"version":"1.0030","date":"2013-11-23T07:55:52"},{"version":"1.0031","date":"2014-08-01T20:20:15"},{"version":"1.0032","date":"2014-10-04T18:14:01"},{"version":"1.0033","date":"2014-10-23T20:32:28"},{"date":"2015-02-02T20:44:19","version":"1.0034"},{"date":"2015-04-16T08:09:20","version":"1.0035"},{"version":"1.0036","date":"2015-06-03T19:03:39"},{"date":"2015-06-19T17:02:08","version":"1.0037"},{"date":"2015-11-25T20:37:51","version":"1.0038"},{"version":"1.0039","date":"2015-12-06T11:29:40"},{"date":"2016-04-01T16:58:21","version":"1.0040"},{"date":"2016-09-25T21:25:47","version":"1.0041"},{"version":"1.0042","date":"2016-09-29T05:38:42"},{"version":"1.0043","date":"2017-02-22T03:02:05"},{"version":"1.0044","date":"2017-04-27T17:48:20"},{"date":"2017-12-31T20:42:50","version":"1.0045"},{"date":"2018-02-10T07:52:31","version":"1.0046"},{"version":"1.0047","date":"2018-02-10T09:25:30"},{"date":"2020-11-30T00:21:36","version":"1.0048"},{"date":"2022-09-01T17:44:48","version":"1.0049"},{"date":"2022-09-05T15:48:11","version":"1.0050"},{"version":"1.0051","date":"2024-01-05T23:11:02"},{"date":"2024-09-30T20:39:33","version":"1.0052"},{"version":"1.0053","date":"2024-12-12T21:11:55"}]},"MailTools":{"versions":[{"date":"1995-10-21T04:25:33","version":"1.03"},{"version":"1.04","date":"1995-11-21T11:54:38"},{"date":"1996-08-13T09:42:17","version":"1.06"},{"date":"1997-01-02T10:39:44","version":"1.07"},{"date":"1997-01-07T13:38:49","version":"1.08"},{"version":"1.09","date":"1997-02-24T09:04:31"},{"date":"1997-11-13T02:23:35","version":"1.10"},{"version":"1.1001","date":"1997-11-16T16:16:12"},{"date":"1997-11-18T01:49:48","version":"1.1002"},{"version":"1.1003","date":"1997-11-26T02:32:07"},{"date":"1998-01-03T03:56:45","version":"1.11"},{"version":"1.12","date":"1998-09-26T14:47:35"},{"version":"1.13","date":"1999-03-31T17:45:02"},{"version":"1.14","date":"2000-03-29T12:35:40"},{"version":"1.1401","date":"2000-04-14T10:53:46"},{"date":"2000-09-04T14:01:06","version":"1.15"},{"version":"1.16","date":"2001-08-08T09:13:27"},{"version":"1.40","date":"2001-08-24T18:19:52"},{"date":"2001-11-14T10:36:58","version":"1.41"},{"version":"1.42","date":"2001-12-10T18:28:08"},{"version":"1.43","date":"2002-02-08T09:41:37"},{"date":"2002-03-23T09:36:15","version":"1.44"},{"date":"2002-05-23T08:17:57","version":"1.45"},{"date":"2002-05-29T13:09:54","version":"1.46"},{"date":"2002-07-05T10:03:43","version":"1.47"},{"version":"1.48","date":"2002-08-07T21:07:03"},{"version":"1.49","date":"2002-08-28T06:38:30"},{"date":"2002-09-03T22:35:45","version":"1.50"},{"version":"1.51","date":"2002-10-29T13:24:48"},{"date":"2002-11-29T12:50:47","version":"1.52"},{"date":"2002-12-09T16:47:38","version":"1.53"},{"version":"1.54","date":"2003-01-06T07:02:35"},{"date":"2003-01-06T07:07:36","version":"1.55"},{"version":"1.56","date":"2003-01-06T16:16:54"},{"version":"1.57","date":"2003-01-14T08:49:45"},{"version":"1.58","date":"2003-01-14T13:45:20"},{"date":"2003-08-13T06:16:07","version":"1.59"},{"date":"2003-09-24T07:21:11","version":"1.60"},{"version":"1.61","date":"2004-03-10T09:55:12"},{"date":"2004-03-24T12:32:28","version":"1.62"},{"date":"2004-08-16T15:30:07","version":"1.63"},{"version":"1.64","date":"2004-08-17T20:26:08"},{"date":"2004-11-24T15:05:58","version":"1.65"},{"date":"2005-01-20T09:18:51","version":"1.66"},{"date":"2005-03-31T10:07:53","version":"1.67"},{"version":"1.68","date":"2006-01-05T09:33:09"},{"version":"1.70","date":"2006-01-05T10:19:56"},{"version":"1.71","date":"2006-01-05T10:22:10"},{"date":"2006-01-17T08:11:53","version":"1.72"},{"version":"1.73","date":"2006-01-21T08:58:00"},{"date":"2006-02-28T07:44:59","version":"1.74"},{"date":"2007-04-10T07:27:15","version":"1.76"},{"version":"1.77","date":"2007-05-11T12:17:49"},{"version":"2.00_01","date":"2007-06-20T12:42:21"},{"version":"2.00_02","date":"2007-07-21T10:31:51"},{"version":"2.00_03","date":"2007-09-25T10:30:00"},{"version":"2.01","date":"2007-11-28T09:50:07"},{"version":"2.02","date":"2007-11-30T09:00:20"},{"version":"2.03","date":"2008-04-14T09:14:48"},{"date":"2008-07-29T09:46:50","version":"2.04"},{"version":"2.05","date":"2009-12-18T22:01:23"},{"date":"2010-01-26T09:04:49","version":"2.06"},{"date":"2010-10-01T10:39:38","version":"2.07"},{"date":"2011-06-01T11:56:43","version":"2.08"},{"version":"2.09","date":"2012-02-25T13:51:23"},{"version":"2.10","date":"2012-08-28T08:28:08"},{"version":"2.11","date":"2012-08-29T07:13:34"},{"date":"2012-12-21T11:27:10","version":"2.12"},{"version":"2.13","date":"2014-01-05T18:36:21"},{"date":"2014-11-21T16:15:46","version":"2.14"},{"date":"2016-04-18T12:11:57","version":"2.15"},{"date":"2016-04-18T16:00:17","version":"2.16"},{"date":"2016-05-11T15:27:31","version":"2.17"},{"date":"2016-05-18T21:54:30","version":"2.18"},{"version":"2.19","date":"2017-08-22T11:37:34"},{"date":"2018-01-23T12:52:56","version":"2.20"},{"version":"2.21","date":"2019-05-21T14:28:18"},{"date":"2024-11-18T10:23:29","version":"2.22"}],"main_module":"MailTools","advisories":[{"affected_versions":["<1.51"],"distribution":"MailTools","reported":"2002-11-12","cves":["CVE-2002-1271"],"fixed_versions":[">=1.51"],"severity":null,"id":"CPANSA-Mail-Mailer-2002-1271","description":"The Mail::Mailer Perl module in the perl-MailTools package 1.47 and earlier uses mailx as the default mailer, which allows remote attackers to execute arbitrary commands by inserting them into the mail body, which is then processed by mailx.\n","references":["http://www.iss.net/security_center/static/10548.php","http://www.debian.org/security/2003/dsa-386","http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-076.php","http://www.novell.com/linux/security/advisories/2002_041_perl_mailtools.html","http://www.securityfocus.com/bid/6104","http://marc.info/?l=bugtraq&m=103659723101369&w=2","http://marc.info/?l=bugtraq&m=103679569705086&w=2"]}]},"Plack-Middleware-StaticShared":{"main_module":"Plack::Middleware::StaticShared","advisories":[{"severity":null,"id":"CPANSA-Plack-Middleware-StaticShared-2012-01","fixed_versions":[">=0.04"],"references":["https://metacpan.org/dist/Plack-Middleware-StaticShared/changes"],"description":"Vulnerability of directory traversal.\n","reported":"2012-04-26","distribution":"Plack-Middleware-StaticShared","affected_versions":["<0.04"],"cves":[]}],"versions":[{"version":"0.01","date":"2010-12-03T11:42:11"},{"version":"0.02","date":"2011-08-03T00:32:41"},{"date":"2011-08-10T14:36:03","version":"0.03"},{"version":"0.04","date":"2012-04-26T03:37:11"},{"date":"2013-01-24T10:40:54","version":"0.05"},{"date":"2016-06-09T03:53:36","version":"0.06"}]},"Apache-AuthCAS":{"advisories":[{"references":["https://metacpan.org/changes/distribution/Apache-AuthCAS","https://cxsecurity.com/issue/WLB-2007120031"],"description":"A tainted cookie could be sent by a malicious user and it would be used in an SQL query without protection against SQL injection.\n","fixed_versions":[">=0.5"],"severity":"high","id":"CPANSA-Apache-AuthCAS-2007-01","cves":["CVE-2007-6342"],"affected_versions":["<0.5"],"distribution":"Apache-AuthCAS","reported":"2007-12-13"}],"main_module":"Apache::AuthCAS","versions":[{"date":"2004-09-15T19:17:43","version":"0.1"},{"date":"2004-09-15T20:11:40","version":"0.2"},{"date":"2004-10-05T22:51:50","version":"0.3"},{"version":"0.4","date":"2004-10-13T00:45:52"},{"version":"0.5","date":"2008-03-23T23:03:16"}]},"PathTools":{"versions":[{"date":"2004-09-03T03:40:00","version":"3.00"},{"date":"2004-09-07T03:39:26","version":"3.01"},{"date":"2004-11-19T04:26:35","version":"3.01_01"},{"version":"3.01_02","date":"2004-11-29T04:20:10"},{"date":"2004-11-30T02:34:46","version":"3.01_03"},{"version":"3.02","date":"2005-01-10T01:33:05"},{"version":"3.03","date":"2005-01-22T03:59:59"},{"date":"2005-02-07T00:28:43","version":"3.04"},{"date":"2005-02-28T13:27:37","version":"3.05"},{"date":"2005-04-14T02:06:10","version":"3.06"},{"date":"2005-05-06T12:50:38","version":"3.07"},{"date":"2005-05-28T15:13:27","version":"3.08"},{"date":"2005-06-15T23:45:19","version":"3.09"},{"version":"3.10","date":"2005-08-26T03:29:11"},{"version":"3.11","date":"2005-08-28T01:16:38"},{"date":"2005-10-04T03:14:00","version":"3.12"},{"date":"2005-11-16T05:58:53","version":"3.13"},{"date":"2005-11-18T00:15:37","version":"3.14"},{"version":"3.14_01","date":"2005-12-10T04:51:57"},{"version":"3.14_02","date":"2005-12-14T05:11:27"},{"version":"3.15","date":"2005-12-27T20:32:26"},{"date":"2006-01-31T02:52:07","version":"3.16"},{"date":"2006-03-03T22:55:18","version":"3.17"},{"version":"3.18","date":"2006-04-28T03:04:00"},{"version":"3.19","date":"2006-07-12T03:43:15"},{"date":"2006-10-05T02:18:51","version":"3.21"},{"version":"3.22","date":"2006-10-10T02:53:23"},{"date":"2006-10-11T17:13:59","version":"3.23"},{"date":"2006-11-20T04:53:56","version":"3.24"},{"version":"3.25","date":"2007-05-22T02:08:53"},{"version":"3.25_01","date":"2007-10-14T02:15:40"},{"version":"3.2501","date":"2007-12-25T02:34:28"},{"version":"3.26","date":"2008-01-14T12:02:28"},{"date":"2008-01-15T23:27:33","version":"3.26_01"},{"version":"3.27","date":"2008-01-17T02:21:47"},{"version":"3.2701","date":"2008-02-12T03:46:01"},{"date":"2008-07-26T02:19:45","version":"3.28_01"},{"date":"2008-10-27T19:27:37","version":"3.28_02"},{"version":"3.28_03","date":"2008-10-27T21:16:35"},{"version":"3.29","date":"2008-10-29T20:11:52"},{"date":"2009-05-07T18:27:46","version":"3.29_01"},{"date":"2009-05-10T08:59:46","version":"3.30"},{"version":"3.30_01","date":"2009-09-21T12:46:15"},{"version":"3.30_02","date":"2009-09-29T06:22:30"},{"version":"3.31","date":"2009-11-01T14:22:36"},{"version":"3.31_02","date":"2010-07-23T08:10:31"},{"version":"3.31_03","date":"2010-09-17T13:24:05"},{"version":"3.32","date":"2010-09-19T15:53:14"},{"version":"3.33","date":"2010-09-20T07:54:00"},{"version":"3.39_01","date":"2011-12-20T07:42:29"},{"date":"2013-01-16T06:35:08","version":"3.40"},{"date":"2014-05-01T18:34:31","version":"3.46_01"},{"version":"3.47","date":"2014-05-23T17:00:38"},{"date":"2015-07-11T22:18:08","version":"3.56_01"},{"date":"2015-07-16T15:33:27","version":"3.56_02"},{"date":"2015-11-09T22:09:25","version":"3.58_01"},{"version":"3.59","date":"2015-11-13T23:46:00"},{"version":"3.60","date":"2015-11-19T02:32:50"},{"version":"3.62","date":"2016-01-11T13:49:31"},{"version":"3.73","date":"2018-02-18T20:27:27"},{"date":"2018-02-19T08:41:14","version":"3.74"},{"date":"2018-08-29T19:53:19","version":"3.75"}],"advisories":[{"fixed_versions":[">=3.65"],"id":"CPANSA-PathTools-2016-02","description":"Does not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.\n","references":["https://metacpan.org/changes/distribution/PathTools"],"affected_versions":["<3.65"],"reported":"2016-02-08","distribution":"PathTools","cves":["CVE-2016-1238"]},{"cves":["CVE-2015-8607"],"reported":"2016-01-11","distribution":"PathTools","affected_versions":["<3.62"],"references":["https://metacpan.org/changes/distribution/PathTools"],"description":"Does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.\n","id":"CPANSA-PathTools-2016-01","fixed_versions":[">=3.62"]}],"main_module":"Cwd"},"SVG-Sparkline":{"advisories":[{"id":"CPANSA-SVG-Sparkline-2017-01","fixed_versions":[">=1.12"],"references":["https://metacpan.org/changes/distribution/SVG-Sparkline","https://github.com/gwadej/svg-sparkline/commit/ca83d6eb56aa86f3ca735866ffa9aa97acc2e708"],"description":"Invalid data input validation makes it possible to pass arbitrary strings to module loading eval.\n","distribution":"SVG-Sparkline","reported":"2017-05-15","affected_versions":["<1.12"],"cves":[]}],"main_module":"SVG::Sparkline","versions":[{"version":"0.1.0","date":"2009-04-02T02:42:59"},{"date":"2009-04-03T01:30:19","version":"0.1.1"},{"version":"0.2.0","date":"2009-04-05T21:43:08"},{"version":"0.2.5","date":"2009-04-18T04:46:33"},{"version":"0.2.6","date":"2009-04-21T00:31:44"},{"date":"2009-04-27T03:42:24","version":"0.2.7"},{"version":"0.3","date":"2009-05-06T23:20:05"},{"version":"0.31","date":"2009-05-07T22:11:10"},{"version":"0.32","date":"2009-10-19T04:12:52"},{"version":"0.33","date":"2009-10-21T00:27:30"},{"version":"0.34","date":"2010-05-01T04:50:06"},{"version":"0.35","date":"2010-10-30T22:01:18"},{"version":"0.36","date":"2012-09-04T00:09:32"},{"date":"2013-10-24T14:01:00","version":"1"},{"version":"1.1","date":"2014-09-04T02:01:54"},{"date":"2015-03-03T19:38:44","version":"1.11"},{"date":"2017-05-15T01:32:51","version":"1.12"}]},"Tk":{"advisories":[{"description":"Buffer overflow in the LWZReadByte_ function in the GD extension in allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.\n","references":["https://metacpan.org/changes/distribution/Tk"],"fixed_versions":[">=804.029"],"id":"CPANSA-Tk-2008-01","cves":["CVE-2006-4484"],"affected_versions":["<804.029"],"distribution":"Tk","reported":"2008-10-01"}],"main_module":"Tk","versions":[{"date":"1995-08-22T23:03:30","version":0},{"version":0,"date":"1995-12-19T01:56:04"},{"version":0,"date":"1996-08-29T00:19:01"},{"version":"400.200","date":"1996-09-07T01:08:44"},{"date":"1997-01-08T23:27:30","version":"400.201"},{"date":"1997-01-25T12:33:02","version":"400.202"},{"date":"1997-05-04T20:05:58","version":"402.000"},{"version":"402.001","date":"1997-06-14T19:17:26"},{"version":"402.002","date":"1997-07-18T17:01:40"},{"version":"402.003","date":"1997-10-04T15:32:53"},{"version":"402.004","date":"1998-01-25T17:07:27"},{"date":"1998-02-07T21:22:00","version":"402.003"},{"version":"800.000","date":"1998-02-22T19:34:11"},{"version":"800.0_01","date":"1998-03-02T00:12:00"},{"version":"800.0_02","date":"1998-03-09T22:37:37"},{"date":"1998-03-17T13:43:00","version":"402.003"},{"date":"1998-04-01T04:36:00","version":"402.003"},{"version":"402.003","date":"1998-04-02T18:32:00"},{"version":"800.003","date":"1998-04-05T08:37:23"},{"date":"1998-04-19T17:23:45","version":"800.004"},{"date":"1998-05-17T18:07:11","version":"800.005"},{"date":"1998-06-14T20:30:35","version":"800.006"},{"date":"1998-06-26T16:30:23","version":"800.007"},{"version":"800.008","date":"1998-07-17T16:47:42"},{"date":"1998-08-08T19:31:23","version":"800.010"},{"date":"1998-09-01T17:20:02","version":"800.011"},{"version":"800.012","date":"1998-11-15T14:28:04"},{"version":"800.013","date":"1999-03-16T22:13:10"},{"date":"1999-04-05T20:15:39","version":"800.014"},{"version":"800.015","date":"1999-07-28T22:10:03"},{"date":"2000-01-08T12:48:56","version":"800.017"},{"version":"800.0_16","date":"2000-01-08T12:58:16"},{"version":"800.018","date":"2000-01-22T19:44:55"},{"version":"800.019","date":"2000-03-13T16:39:08"},{"date":"2000-03-27T17:01:22","version":"800.020"},{"date":"2000-04-21T13:38:21","version":"800.021"},{"version":"800.022","date":"2000-05-13T09:48:51"},{"version":"800.023","date":"2001-05-15T15:07:21"},{"date":"2001-07-14T21:06:00","version":"800.012"},{"date":"2002-03-05T16:38:25","version":"800.024"},{"date":"2002-03-17T20:30:42","version":"800.024"},{"date":"2002-10-13T17:20:55","version":"804.0_24"},{"version":"v804.024.","date":"2003-05-02T01:10:54"},{"version":"800.025","date":"2003-09-08T08:13:16"},{"date":"2003-09-28T18:01:55","version":"804.025"},{"version":"804.025","date":"2003-10-10T18:24:24"},{"version":"804.025","date":"2003-10-20T20:44:44"},{"version":"804.025","date":"2003-10-27T08:23:07"},{"date":"2003-11-02T22:28:10","version":"804.025"},{"version":"804.025","date":"2003-11-16T22:15:42"},{"version":"804.025","date":"2003-12-02T21:26:56"},{"version":"804.025_","date":"2003-12-08T08:01:15"},{"date":"2003-12-11T08:03:20","version":"804.025"},{"version":"804.025","date":"2003-12-14T20:22:05"},{"version":"804.025","date":"2003-12-19T17:42:32"},{"date":"2003-12-21T21:09:10","version":"804.025_"},{"date":"2003-12-23T23:19:20","version":"804.025"},{"date":"2004-01-12T21:59:01","version":"804.025"},{"version":"804.025_","date":"2004-02-28T17:33:01"},{"date":"2004-03-07T20:33:56","version":"804.025_"},{"date":"2004-03-19T08:10:49","version":"804.026"},{"version":"804.026","date":"2004-04-11T19:04:25"},{"version":"804.027_500","date":"2007-02-11T08:49:16"},{"date":"2007-09-21T22:57:57","version":"804.027_501"},{"version":"804.027_502","date":"2007-12-04T21:03:29"},{"date":"2007-12-18T22:01:39","version":"804.028"},{"version":"804.0285","date":"2008-10-01T21:48:52"},{"version":"804.028501","date":"2008-11-04T22:27:51"},{"date":"2010-01-30T17:54:07","version":"804.028502"},{"date":"2010-05-13T00:00:04","version":"804.028503"},{"version":"804.029","date":"2010-05-27T19:25:41"},{"version":"804.0295","date":"2011-06-13T17:53:20"},{"version":"804.029501","date":"2011-10-14T19:22:48"},{"date":"2011-10-17T21:12:41","version":"804.029502"},{"date":"2011-10-20T21:08:12","version":"804.03"},{"date":"2013-05-17T22:16:24","version":"804.030500"},{"date":"2013-05-18T05:01:41","version":"804.030501"},{"date":"2013-05-21T07:30:50","version":"804.030502"},{"version":"804.031","date":"2013-05-25T12:57:05"},{"date":"2013-11-17T11:24:41","version":"804.031500"},{"date":"2013-11-18T20:19:08","version":"804.031501"},{"date":"2013-12-01T15:07:28","version":"804.031502"},{"date":"2013-12-07T13:00:14","version":"804.031503"},{"version":"804.032","date":"2014-01-26T17:01:07"},{"date":"2014-11-06T21:01:44","version":"804.032500"},{"date":"2015-01-31T10:28:08","version":"804.032501"},{"version":"804.033","date":"2015-02-21T15:54:08"},{"version":"804.033500","date":"2017-08-20T09:29:42"},{"version":"804.034","date":"2017-08-26T15:26:56"},{"version":"804.034500","date":"2020-02-23T16:12:23"},{"date":"2020-03-19T21:02:47","version":"804.034501"},{"date":"2020-03-28T19:28:42","version":"804.035"},{"date":"2021-02-07T19:55:40","version":"804.035501"},{"date":"2021-02-14T12:53:44","version":"804.036"}]},"App-Context":{"advisories":[{"fixed_versions":[">0.968"],"id":"CPANSA-App-Context-2012-6141","severity":null,"references":["http://seclists.org/oss-sec/2013/q2/318","https://exchange.xforce.ibmcloud.com/vulnerabilities/84198"],"description":"The App::Context module 0.01 through 0.968 for Perl does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via a crafted request to (1) App::Session::Cookie or (2) App::Session::HTMLHidden, which is not properly handled when it is deserialized.\n","affected_versions":[">=0.01,<=0.968"],"distribution":"App-Context","reported":"2014-06-04","cves":["CVE-2012-6141"]}],"main_module":"App::Context","versions":[{"version":"0.01","date":"2002-10-10T21:31:39"},{"date":"2004-09-02T21:17:44","version":"0.90"},{"date":"2005-01-07T14:02:06","version":"0.93"},{"date":"2005-08-09T20:05:02","version":"0.95"},{"date":"2006-03-10T04:24:13","version":"0.96"},{"date":"2006-03-12T01:30:11","version":"0.962"},{"date":"2006-07-25T02:30:21","version":"0.963"},{"version":"0.964","date":"2006-09-04T19:41:12"},{"version":"0.965","date":"2007-04-17T13:33:24"},{"date":"2008-02-27T03:13:41","version":"0.966"},{"date":"2008-02-27T14:19:23","version":"0.9661"},{"date":"2009-09-11T14:31:52","version":"0.967"},{"date":"2010-06-09T21:33:19","version":"0.968"}]},"Fake-Our":{"versions":[{"date":"2014-02-09T05:36:09","version":"0.01"},{"date":"2014-08-06T17:33:15","version":"0.02"},{"version":"0.03","date":"2014-08-09T02:35:25"},{"version":"0.04","date":"2014-08-10T15:33:58"},{"version":"0.05","date":"2015-06-21T04:09:47"},{"date":"2017-01-23T12:34:34","version":"0.06"},{"date":"2017-01-26T15:21:45","version":"0.07"},{"date":"2017-01-27T15:18:56","version":"0.08"},{"date":"2017-01-28T15:07:50","version":"0.09"},{"version":"0.10","date":"2017-03-06T16:01:51"},{"version":"0.11","date":"2018-02-03T11:05:49"},{"date":"2018-02-16T17:54:00","version":"0.12"},{"date":"2018-02-17T01:35:58","version":"0.13"},{"version":"0.14","date":"2018-02-18T15:32:17"},{"date":"2019-07-11T16:27:42","version":"0.15"},{"version":"0.16","date":"2019-07-14T00:51:24"},{"version":"0.17","date":"2023-03-25T02:32:44"}],"main_module":"Fake::Our","advisories":[{"cves":["CVE-2016-1238"],"affected_versions":["<0.06"],"reported":"2017-01-23","distribution":"Fake-Our","references":["https://metacpan.org/changes/distribution/Fake-Our"],"description":"Loading modules from . (current directory).\n","fixed_versions":[">=0.06"],"id":"CPANSA-Fake-Our-2017-01"}]},"HTTP-Daemon":{"versions":[{"version":"6.00","date":"2011-02-27T22:49:28"},{"version":"6.01","date":"2012-02-18T12:26:43"},{"date":"2019-04-01T16:05:05","version":"6.02"},{"date":"2019-04-01T20:58:35","version":"6.03"},{"version":"6.04","date":"2019-04-02T13:12:12"},{"date":"2019-07-26T20:42:43","version":"6.05"},{"date":"2019-08-29T14:24:33","version":"6.06"},{"version":"6.07","date":"2020-05-19T19:20:38"},{"date":"2020-05-22T15:27:22","version":"6.08"},{"date":"2020-05-25T16:53:41","version":"6.09"},{"date":"2020-05-26T16:22:18","version":"6.10"},{"version":"6.11","date":"2020-06-03T14:48:37"},{"version":"6.12","date":"2020-06-04T16:03:28"},{"version":"6.13","date":"2022-02-09T20:41:36"},{"date":"2022-03-03T20:49:07","version":"6.14"},{"date":"2023-02-22T22:03:32","version":"6.15"},{"version":"6.16","date":"2023-02-24T03:09:01"}],"advisories":[{"cves":["CVE-2022-31081"],"reported":"2022-06-27","distribution":"HTTP-Daemon","affected_versions":["<6.15"],"description":"HTTP::Daemon is a simple http server class written in perl. Versions prior to 6.15 are subject to a vulnerability which could potentially be exploited to gain privileged access to APIs or poison intermediate caches. It is uncertain how large the risks are, most Perl based applications are served on top of Nginx or Apache, not on the `HTTP::Daemon`. This library is commonly used for local development and tests. Users are advised to update to resolve this issue. Users unable to upgrade may add additional request handling logic as a mitigation. After calling `my $rqst = $conn->get_request()` one could inspect the returned `HTTP::Request` object. Querying the 'Content-Length' (`my $cl = $rqst->header('Content-Length')`) will show any abnormalities that should be dealt with by a `400` response. Expected strings of 'Content-Length' SHOULD consist of either a single non-negative integer, or, a comma separated repetition of that number. (that is `42` or `42, 42, 42`). Anything else MUST be rejected.\n","references":["https://github.com/libwww-perl/HTTP-Daemon/commit/e84475de51d6fd7b29354a997413472a99db70b2","https://github.com/libwww-perl/HTTP-Daemon/commit/8dc5269d59e2d5d9eb1647d82c449ccd880f7fd0","https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn","https://datatracker.ietf.org/doc/html/rfc7230#section-9.5","https://github.com/libwww-perl/HTTP-Daemon/security/advisories/GHSA-cg8c-pxmv-w7cf","http://metacpan.org/release/HTTP-Daemon/","https://cwe.mitre.org/data/definitions/444.html","https://github.com/libwww-perl/HTTP-Daemon/issues/56","https://github.com/NixOS/nixpkgs/pull/181632"],"severity":"medium","id":"CPANSA-HTTP-Daemon-2022-31081","fixed_versions":[">=6.15"]}],"main_module":"HTTP::Daemon"},"Net-Dropbear":{"main_module":"Net::Dropbear","advisories":[{"comment":"From the author: \"I have reviewed Dropbear's usage of libtomcrypt, and the function in question for CVE-2019-17362, der_decode_utf8_string, is not used in Dropbear. None of the DER parsing from libtomcrypt is used in Dropbear at all, I have confirmed that the flag to include it is not set, and confirmed that the resultant Dropbear.so that is built by Net::Dropbear does not include any of the der_* symbols.\"\n","cves":["CVE-2019-17362"],"distribution":"Net-Dropbear","reported":"2019-10-09","affected_versions":["<0"],"references":["https://github.com/atrodo/Net-Dropbear/issues/6","https://github.com/libtom/libtomcrypt/pull/508","https://github.com/libtom/libtomcrypt/issues/507","https://vuldb.com/?id.142995","https://lists.debian.org/debian-lts-announce/2019/10/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00020.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00041.html"],"description":"In LibTomCrypt through 1.18.2, the der_decode_utf8_string function (in der_decode_utf8_string.c) does not properly detect certain invalid UTF-8 sequences. This allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) or read information from other memory locations via carefully crafted DER-encoded data.\n","severity":"critical","fixed_versions":[">0"],"embedded_vulnerability":{"affected_versions":"<0","name":"libtomcrypt","distributed_version":"1.8.2"},"id":"CPANSA-Net-Dropbear-2019-17362"}],"versions":[{"version":"0.01","date":"2015-11-03T18:31:23"},{"version":"0.02","date":"2015-11-04T04:17:39"},{"date":"2015-11-05T06:49:56","version":"0.03"},{"date":"2015-11-07T03:40:31","version":"0.04"},{"date":"2015-11-29T00:37:40","version":"0.06"},{"version":"0.07","date":"2016-01-02T05:57:50"},{"version":"0.08","date":"2016-08-04T05:36:45"},{"date":"2016-08-08T05:56:46","version":"0.09"},{"date":"2016-08-10T05:05:32","version":"0.10"},{"version":"0.11","date":"2020-03-17T04:05:13"},{"version":"0.12","date":"2020-03-20T02:33:34"},{"version":"0.13","date":"2020-03-21T14:51:53"},{"version":"0.14","date":"2021-05-28T04:07:12"},{"date":"2022-07-01T04:48:35","version":"0.15"},{"date":"2022-07-08T03:18:20","version":"0.16"}]},"PGObject-Util-DBAdmin":{"advisories":[{"references":["https://archive.ledgersmb.org/ledger-smb-announce/msg00280.html"],"description":"The PGObject::Util::DBAdmin module before 0.120.0 for Perl, as used in LedgerSMB through 1.5.x, insufficiently sanitizes or escapes variable values used as part of shell command execution, resulting in shell code injection via the create(), run_file(), backup(), or restore() function. The vulnerability allows unauthorized users to execute code with the same privileges as the running application.\n","id":"CPANSA-PGObject-Util-DBAdmin-2018-01","fixed_versions":[">=1.6.0"],"cves":["CVE-2018-9246"],"reported":"2018-06-18","distribution":"PGObject-Util-DBAdmin","affected_versions":["<1.6.0"]}],"main_module":"PGObject::Util::DBAdmin","versions":[{"version":"0.01","date":"2014-09-11T11:20:13"},{"date":"2014-09-12T02:45:35","version":"0.02"},{"date":"2014-09-13T02:03:16","version":"0.03"},{"date":"2014-09-13T14:37:42","version":"0.04"},{"version":"0.05","date":"2014-09-14T07:48:28"},{"version":"0.06","date":"2014-09-17T08:27:06"},{"date":"2015-07-16T14:55:28","version":"0.07"},{"date":"2016-02-11T18:01:16","version":"0.08"},{"version":"0.09","date":"2016-07-18T11:03:07"},{"version":"v0.09.0","date":"2016-12-16T21:20:09"},{"date":"2016-12-16T21:36:46","version":"v0.10.0"},{"date":"2016-12-16T21:43:21","version":"v0.100.0"},{"version":"v0.120.0","date":"2018-03-31T14:06:25"},{"date":"2018-05-06T09:28:39","version":"v0.130.0"},{"date":"2018-06-05T19:29:29","version":"v0.130.1"},{"version":"v0.131.0","date":"2019-07-07T08:06:48"},{"date":"2019-07-08T20:46:34","version":"v1.0.0"},{"date":"2019-07-09T18:04:14","version":"v1.0.1"},{"version":"v1.0.2","date":"2019-09-20T06:49:02"},{"version":"v1.0.3","date":"2019-09-29T18:24:55"},{"version":"v1.1.0","date":"2020-09-21T21:20:33"},{"date":"2020-10-21T20:17:28","version":"v1.2.0"},{"date":"2020-10-21T22:24:41","version":"v1.2.1"},{"date":"2020-10-23T18:46:24","version":"v1.2.2"},{"date":"2020-10-24T07:08:10","version":"v1.2.3"},{"date":"2020-10-24T19:58:09","version":"v1.3.0"},{"version":"v1.4.0","date":"2020-10-25T12:15:26"},{"date":"2021-09-24T12:47:40","version":"v1.5.0"},{"version":"v1.6.0","date":"2021-11-07T12:22:17"},{"version":"v1.6.1","date":"2021-11-07T14:17:22"},{"version":"v1.6.2","date":"2024-09-13T19:24:01"}]},"Capture-Tiny":{"versions":[{"version":"0.01","date":"2009-02-14T04:25:26"},{"version":"0.02","date":"2009-02-17T22:26:18"},{"version":"0.03","date":"2009-02-20T18:09:46"},{"version":"0.04","date":"2009-02-25T14:29:32"},{"version":"0.05","date":"2009-03-03T11:58:12"},{"version":"0.05_51","date":"2009-04-21T11:07:47"},{"date":"2009-05-07T10:57:33","version":"0.06"},{"version":"0.07","date":"2010-01-24T05:21:56"},{"version":"0.08","date":"2010-06-20T23:17:16"},{"date":"2011-01-28T04:53:00","version":"0.09"},{"version":"0.10","date":"2011-02-07T12:02:15"},{"date":"2011-05-20T03:35:28","version":"0.11"},{"version":"0.12","date":"2011-12-01T22:00:04"},{"version":"0.13","date":"2011-12-02T18:40:05"},{"version":"0.14","date":"2011-12-22T15:16:31"},{"version":"0.15","date":"2011-12-23T16:12:30"},{"date":"2012-02-13T02:06:15","version":"0.16"},{"date":"2012-02-22T13:09:42","version":"0.17"},{"version":"0.17_51","date":"2012-03-07T23:25:31"},{"version":"0.17_52","date":"2012-03-09T16:46:53"},{"date":"2012-05-04T20:33:43","version":"0.18"},{"date":"2012-08-07T00:28:08","version":"0.19"},{"version":"0.20","date":"2012-09-19T17:22:24"},{"date":"2012-11-15T00:13:08","version":"0.21"},{"version":"0.22","date":"2013-03-27T19:52:10"},{"version":"0.23","date":"2013-10-20T15:28:15"},{"version":"0.24","date":"2014-02-06T22:18:06"},{"version":"0.25","date":"2014-08-16T14:09:48"},{"date":"2014-11-04T11:57:19","version":"0.26"},{"version":"0.27","date":"2014-11-05T04:12:33"},{"date":"2015-02-11T11:41:44","version":"0.28"},{"version":"0.29","date":"2015-04-19T16:44:50"},{"version":"0.30","date":"2015-05-16T00:45:01"},{"date":"2016-02-14T14:39:55","version":"0.31"},{"version":"0.32","date":"2016-02-18T15:14:06"},{"date":"2016-02-19T04:29:41","version":"0.34"},{"version":"0.36","date":"2016-02-29T02:38:12"},{"date":"2016-05-02T11:09:27","version":"0.37"},{"version":"0.39","date":"2016-05-02T14:24:23"},{"date":"2016-05-23T15:45:16","version":"0.40"},{"date":"2016-05-23T16:01:05","version":"0.41"},{"version":"0.42","date":"2016-05-31T16:41:30"},{"version":"0.44","date":"2016-08-05T18:02:43"},{"date":"2017-02-23T18:32:44","version":"0.45"},{"date":"2017-02-25T19:26:54","version":"0.46"},{"version":"0.47","date":"2017-07-26T14:36:03"},{"date":"2018-04-22T07:09:08","version":"0.48"},{"version":"0.49","date":"2024-12-16T13:11:27"}],"advisories":[{"reported":"2014-10-06","distribution":"Capture-Tiny","affected_versions":["<0.24"],"cves":["CVE-2014-1875"],"id":"CPANSA-Capture-Tiny-2014-1875","severity":null,"fixed_versions":[],"references":["http://osvdb.org/102963","https://bugzilla.redhat.com/show_bug.cgi?id=1062424","http://www.securityfocus.com/bid/65475","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737835","https://github.com/dagolden/Capture-Tiny/issues/16","http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128882.html","https://github.com/dagolden/Capture-Tiny/commit/635c9eabd52ab8042b0c841823bd6e692de87924","http://cpansearch.perl.org/src/DAGOLDEN/Capture-Tiny-0.24/Changes","http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128823.html","http://seclists.org/oss-sec/2014/q1/272","http://seclists.org/oss-sec/2014/q1/267","http://secunia.com/advisories/56823","https://exchange.xforce.ibmcloud.com/vulnerabilities/91464"],"description":"The Capture::Tiny module before 0.24 for Perl allows local users to write to arbitrary files via a symlink attack on a temporary file.\n"}],"main_module":"Capture::Tiny"},"Data-FormValidator":{"advisories":[{"cves":["CVE-2011-2201"],"affected_versions":["<=4.66"],"distribution":"Data-FormValidator","reported":"2011-09-14","description":"The Data::FormValidator module 4.66 and earlier for Perl, when untaint_all_constraints is enabled, does not properly preserve the taint attribute of data, which might allow remote attackers to bypass the taint protection mechanism via form input.\n","references":["http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629511","http://www.openwall.com/lists/oss-security/2011/06/13/13","https://bugzilla.redhat.com/show_bug.cgi?id=712694","http://www.openwall.com/lists/oss-security/2011/06/12/3","http://www.securityfocus.com/bid/48167","https://rt.cpan.org/Public/Bug/Display.html?id=61792","http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065416.html","http://www.openwall.com/lists/oss-security/2011/06/13/5"],"fixed_versions":[">4.66"],"id":"CPANSA-Data-FormValidator-2011-2201","severity":null}],"main_module":"Data::FormValidator","versions":[{"date":"2001-06-19T21:43:01","version":"1.3"},{"date":"2001-06-22T16:36:08","version":"1.4"},{"version":"1.4","date":"2001-06-25T17:02:43"},{"version":"1.5","date":"2001-06-28T15:13:01"},{"date":"2001-07-18T14:23:17","version":"v1.5.1"},{"date":"2001-09-23T22:42:22","version":"1.6"},{"version":"1.7","date":"2001-11-03T18:16:00"},{"version":"1.8","date":"2002-02-14T22:45:46"},{"version":"1.9","date":"2002-02-18T02:20:12"},{"date":"2002-04-21T13:42:36","version":"1.10"},{"date":"2002-06-29T21:04:14","version":"1.11"},{"version":"1.91","date":"2002-10-07T02:06:39"},{"version":"1.92","date":"2002-12-23T23:36:37"},{"date":"2003-03-08T13:10:33","version":"1.93"},{"date":"2003-03-23T03:01:57","version":"2.00"},{"date":"2003-04-02T15:18:15","version":"2.01"},{"date":"2003-04-09T15:54:50","version":"2.02"},{"date":"2003-04-10T16:12:40","version":"2.03"},{"date":"2003-04-12T02:58:35","version":"2.04"},{"version":"2.10","date":"2003-04-20T22:23:44"},{"version":"2.10","date":"2003-04-24T02:51:03"},{"version":"3.00","date":"2003-05-11T21:29:55"},{"version":"3.01","date":"2003-05-16T04:06:05"},{"version":"3.1","date":"2003-05-26T23:18:18"},{"version":"3.11","date":"2003-05-27T19:41:01"},{"version":"3.12","date":"2003-06-23T01:27:03"},{"date":"2003-11-02T21:19:10","version":"3.13"},{"version":"3.14","date":"2003-11-03T17:59:41"},{"date":"2003-11-30T20:36:41","version":"3.15"},{"date":"2004-01-04T01:37:01","version":"3.49_1"},{"version":"3.50","date":"2004-01-12T22:04:27"},{"date":"2004-02-27T04:19:47","version":"3.51"},{"version":"3.52","date":"2004-03-21T17:42:11"},{"date":"2004-03-23T02:33:53","version":"3.53"},{"version":"3.54","date":"2004-03-24T14:55:49"},{"version":"3.56","date":"2004-04-17T02:30:02"},{"date":"2004-04-22T02:26:41","version":"3.57"},{"version":"3.58","date":"2004-05-05T21:55:00"},{"version":"3.59","date":"2004-07-02T17:48:51"},{"date":"2004-09-28T02:25:35","version":"3.61"},{"date":"2004-10-09T04:00:51","version":"3.62"},{"version":"3.63","date":"2004-11-17T22:27:13"},{"date":"2005-05-20T01:25:45","version":"4.00_01"},{"date":"2005-07-03T19:37:11","version":"4.00_02"},{"version":"3.70","date":"2005-07-20T02:07:36"},{"version":"3.71","date":"2005-07-31T17:36:02"},{"version":"4.00","date":"2005-08-14T16:09:26"},{"version":"4.01","date":"2005-08-20T18:20:14"},{"date":"2005-09-01T02:31:29","version":"4.02"},{"date":"2005-12-23T01:00:49","version":"4.10"},{"version":"4.11","date":"2006-01-03T23:49:53"},{"version":"4.12","date":"2006-01-06T02:14:25"},{"date":"2006-02-10T02:48:33","version":"4.13"},{"version":"4.14","date":"2006-02-17T18:48:14"},{"date":"2006-06-13T01:12:23","version":"4.20"},{"date":"2006-07-01T15:42:37","version":"4.21_01"},{"version":"4.30","date":"2006-07-11T01:45:51"},{"date":"2006-08-21T23:43:58","version":"4.40"},{"version":"4.49_1","date":"2006-10-03T18:16:57"},{"version":"4.50","date":"2006-12-05T02:41:19"},{"date":"2007-07-14T03:36:00","version":"4.51"},{"date":"2007-10-19T19:41:46","version":"4.52"},{"version":"4.50","date":"2007-10-20T20:02:19"},{"date":"2007-10-21T13:30:20","version":"4.54"},{"version":"4.55","date":"2007-10-21T15:50:42"},{"version":"4.56","date":"2007-10-31T16:49:55"},{"date":"2007-11-02T02:55:19","version":"4.57"},{"date":"2008-06-16T18:28:54","version":"4.60"},{"version":"4.61","date":"2008-06-16T18:46:47"},{"date":"2009-01-03T17:14:18","version":"4.62"},{"date":"2009-01-03T17:49:48","version":"4.63"},{"date":"2009-12-31T03:22:00","version":"4.65"},{"date":"2010-02-24T14:33:48","version":"4.66"},{"date":"2011-11-12T02:18:45","version":"4.67"},{"date":"2011-11-12T03:11:55","version":"4.70"},{"version":"4.71","date":"2012-10-02T20:40:09"},{"date":"2012-11-01T15:14:05","version":"4.80"},{"version":"4.81","date":"2013-07-19T12:31:06"},{"version":"4.82","date":"2017-02-23T15:15:37"},{"date":"2017-02-23T16:39:53","version":"4.83"},{"date":"2017-02-25T15:12:25","version":"4.84"},{"version":4.85,"date":"2017-02-25T20:34:08"},{"date":"2017-03-26T19:39:49","version":4.86},{"version":4.88,"date":"2017-08-28T12:41:42"}]},"POSIX-2008":{"advisories":[{"description":"POSIX::2008's implementation of readlink() and readlinkat(). The underlying syscalls do not add any null terminator byte at the end of the output buffer, but _readlink50c() in 2008.XS also fails to add a null terminator before returning the result string to perl. This results in arbitrary memory contents being visible in the result returned to perl code by readlink() and readlinkat(). At the very least, this causes failures in any downstream code that attempts to access whatever filename (plus the erroneous garbage) was linked to.\n","references":["https://rt.cpan.org/Public/Bug/Display.html?id=96644"],"id":"CPANSA-POSIX-2008-001","severity":null,"fixed_versions":[">=0.04"],"cves":[],"distribution":"POSIX-2008","reported":null,"affected_versions":["<0.04"]},{"references":["https://metacpan.org/release/CGPAN/POSIX-2008-0.24/source/Changes"],"description":"Fixed potential env buffer overflow in _execve50c()\n","id":"CPANSA-POSIX-2008-002","severity":null,"fixed_versions":[">=0.24"],"cves":["CVE-2024-55564"],"distribution":"POSIX-2008","reported":null,"affected_versions":["<0.24"]}],"main_module":"POSIX::2008","versions":[{"date":"2013-09-13T17:14:53","version":"0.01"},{"date":"2013-09-14T16:20:56","version":"0.02"},{"version":"0.03","date":"2013-09-16T09:32:15"},{"version":"0.04","date":"2015-05-25T13:51:17"},{"version":"0.05","date":"2017-08-25T20:52:28"},{"date":"2017-08-26T17:21:09","version":"0.06"},{"version":"0.07","date":"2017-08-27T14:55:54"},{"date":"2017-08-31T18:14:24","version":"0.08"},{"version":"0.09","date":"2017-09-01T10:14:04"},{"date":"2017-09-02T09:15:21","version":"0.10"},{"version":"0.11","date":"2017-09-02T13:11:19"},{"version":"0.12","date":"2017-09-03T20:02:26"},{"date":"2017-09-08T11:50:51","version":"0.13"},{"date":"2017-09-09T18:04:53","version":"0.14"},{"date":"2017-09-10T12:50:52","version":"0.15"},{"version":"0.16","date":"2017-09-15T14:59:53"},{"date":"2023-06-01T13:51:43","version":"0.18"},{"version":"0.19","date":"2023-07-07T13:52:59"},{"date":"2023-07-08T12:09:34","version":"0.20_01"},{"date":"2023-07-09T08:25:58","version":"0.20_02"},{"date":"2023-07-11T15:26:35","version":"0.20_03"},{"version":"0.20_04","date":"2023-07-12T17:47:09"},{"version":"0.20_05","date":"2023-07-13T17:26:29"},{"date":"2023-07-14T15:57:30","version":"0.20"},{"date":"2023-11-16T19:54:40","version":"0.21"},{"date":"2024-01-26T16:30:56","version":"0.22"},{"version":"0.23","date":"2024-01-27T15:34:00"},{"date":"2024-06-14T12:10:38","version":"0.24"}]},"Digest":{"versions":[{"version":"1.00","date":"2001-03-14T06:33:08"},{"date":"2003-01-05T01:23:53","version":"1.01"},{"version":"1.02","date":"2003-01-19T04:35:36"},{"date":"2003-11-28T12:29:42","version":"1.03"},{"date":"2003-11-29T12:08:20","version":"1.04"},{"date":"2003-12-01T07:58:06","version":"1.05"},{"date":"2004-04-01T10:55:24","version":"1.06"},{"date":"2004-04-25T14:39:53","version":"1.07"},{"version":"1.08","date":"2004-04-29T07:56:42"},{"date":"2004-11-05T12:20:28","version":"1.09"},{"date":"2004-11-08T09:41:14","version":"1.10"},{"version":"1.11","date":"2005-09-11T11:14:33"},{"version":"1.12","date":"2005-09-29T10:20:20"},{"version":"1.13","date":"2005-10-18T11:59:24"},{"date":"2005-11-26T10:10:21","version":"1.14"},{"version":"1.15","date":"2006-03-20T15:18:01"},{"date":"2009-06-09T18:58:26","version":"1.16"},{"date":"2011-10-02T10:14:32","version":"1.17"},{"date":"2020-10-13T19:16:47","version":"1.18"},{"date":"2020-10-13T20:02:35","version":"1.19"},{"version":"1.20","date":"2021-08-24T13:51:51"}],"main_module":"Digest","advisories":[{"severity":null,"fixed_versions":[">=0.17"],"references":["http://aix.software.ibm.com/aix/efixes/security/perl_advisory2.asc","http://www.redhat.com/support/errata/RHSA-2011-1797.html","http://www.redhat.com/support/errata/RHSA-2011-1424.html","https://bugzilla.redhat.com/show_bug.cgi?id=743010","http://www.securityfocus.com/bid/49911","http://secunia.com/advisories/46279","http://cpansearch.perl.org/src/GAAS/Digest-1.17/Changes","http://www.mandriva.com/security/advisories?name=MDVSA-2012:009","http://www.mandriva.com/security/advisories?name=MDVSA-2012:008","http://secunia.com/advisories/51457","http://www.ubuntu.com/usn/USN-1643-1","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19446"],"description":"Eval injection vulnerability in the Digest module before 1.17 for Perl allows context-dependent attackers to execute arbitrary commands via the new constructor.\n","distribution":"Digest","reported":"2012-01-13","affected_versions":["<1.17"],"cves":["CVE-2011-3597"],"id":"CPANSA-Digest-2011-3597","reviewed_by":[{"name":"Robert Rothenberg","date":"2022-07-05","email":"rrwo@cpan.org"}]},{"cves":["CVE-2016-1238"],"reported":"2016-08-02","distribution":"Digest","affected_versions":["<1.19"],"description":"Includes . in @INC which might allow local users to gain privileges via a Trojan horse module under the current working directory.\n","references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"id":"CPANSA-Digest-2016-1238","severity":"high","fixed_versions":[">=1.19"]}]},"CBOR-XS":{"advisories":[{"description":"An out-of bound sharedref or stringref index could cause an out of bounds access - might be exploitable. A decoding error during indefinite array or hash decoding could cause an endless loop.\n","references":["https://metacpan.org/dist/CBOR-XS/changes"],"severity":null,"id":"CPANSA-CBOR-XS-2017-01","fixed_versions":[">=1.7"],"cves":[],"distribution":"CBOR-XS","reported":"2017-07-27","affected_versions":["<1.7"]}],"main_module":"CBOR::XS","versions":[{"date":"2013-10-25T23:10:42","version":"0.01"},{"version":"0.02","date":"2013-10-26T11:09:56"},{"version":"0.03","date":"2013-10-26T23:04:01"},{"version":"0.04","date":"2013-10-27T22:48:22"},{"date":"2013-10-28T21:28:30","version":"0.05"},{"version":"0.06","date":"2013-10-29T15:57:13"},{"version":"0.07","date":"2013-10-29T22:05:30"},{"version":"0.08","date":"2013-10-30T10:11:46"},{"version":"0.09","date":"2013-11-22T16:19:26"},{"date":"2013-11-28T16:09:19","version":"1.0"},{"version":"1.1","date":"2013-11-30T18:42:59"},{"version":"1.11","date":"2013-12-01T17:11:47"},{"version":"1.12","date":"2013-12-03T10:25:03"},{"date":"2013-12-10T21:07:58","version":"1.2"},{"version":"1.25","date":"2014-01-05T14:25:36"},{"version":1.26,"date":"2014-10-25T06:37:38"},{"date":"2015-04-27T20:22:15","version":1.3},{"version":1.4,"date":"2016-02-08T04:38:25"},{"date":"2016-02-25T14:23:47","version":1.41},{"date":"2016-04-27T09:40:38","version":1.5},{"version":1.6,"date":"2016-12-07T14:14:49"},{"date":"2017-06-27T02:03:48","version":1.7},{"version":1.71,"date":"2018-11-15T19:53:50"},{"version":1.8,"date":"2020-11-29T21:36:13"},{"date":"2020-11-30T18:31:32","version":1.81},{"date":"2020-12-01T01:50:49","version":1.82},{"version":1.83,"date":"2020-12-08T08:30:59"},{"version":1.84,"date":"2021-10-21T01:16:11"},{"date":"2021-10-23T03:00:48","version":1.85},{"date":"2021-11-04T16:50:24","version":1.86},{"version":1.87,"date":"2023-09-10T20:45:43"}]},"Log-Any":{"versions":[{"date":"2009-07-11T14:11:33","version":"0.01"},{"version":"0.02","date":"2009-07-14T23:34:51"},{"date":"2009-07-18T03:41:02","version":"0.03"},{"date":"2009-09-04T00:32:59","version":"0.03"},{"date":"2009-10-27T22:26:20","version":"0.05"},{"date":"2009-10-31T23:24:23","version":"0.06"},{"version":"0.07","date":"2009-12-07T17:57:19"},{"version":"0.08","date":"2009-12-16T01:31:06"},{"date":"2010-01-05T21:20:31","version":"0.09"},{"version":"0.10","date":"2010-01-05T21:27:46"},{"version":"0.11","date":"2010-02-12T13:08:17"},{"date":"2011-03-23T21:55:43","version":"0.12"},{"date":"2011-08-02T13:27:07","version":"0.13"},{"version":"0.14","date":"2011-08-31T22:51:22"},{"version":"0.15","date":"2013-04-10T17:16:43"},{"version":"0.90","date":"2014-12-12T22:09:51"},{"date":"2014-12-15T03:15:09","version":"0.91"},{"date":"2014-12-15T12:13:47","version":"0.92"},{"date":"2014-12-26T03:04:57","version":"1.00"},{"version":"1.01","date":"2014-12-27T03:26:31"},{"date":"2014-12-28T12:07:41","version":"1.02"},{"date":"2015-01-02T03:43:07","version":"1.03"},{"version":"1.031","date":"2015-03-26T10:09:30"},{"date":"2015-03-26T21:24:48","version":"1.032"},{"version":"1.033","date":"2016-02-03T15:34:02"},{"date":"2016-02-04T19:48:49","version":"1.035"},{"date":"2016-02-06T01:27:07","version":"1.037"},{"date":"2016-02-10T21:18:02","version":"1.038"},{"version":"1.040","date":"2016-02-24T22:48:34"},{"version":"1.041","date":"2016-08-18T05:02:37"},{"date":"2016-08-27T04:38:20","version":"1.042"},{"version":"1.043","date":"2016-11-04T02:48:06"},{"date":"2016-11-06T21:53:19","version":"1.044"},{"version":"1.045","date":"2016-11-12T03:54:03"},{"date":"2017-01-12T03:44:21","version":"1.046"},{"version":"1.047","date":"2017-03-23T01:25:09"},{"version":"1.048","date":"2017-03-27T20:17:22"},{"date":"2017-03-28T21:03:30","version":"1.049"},{"date":"2017-08-04T03:30:12","version":"1.050"},{"date":"2017-08-07T01:43:24","version":"1.051"},{"date":"2017-09-28T22:00:06","version":"1.700"},{"version":"1.701","date":"2017-10-02T19:38:09"},{"version":"1.702","date":"2017-11-28T21:20:01"},{"version":"1.703","date":"2017-11-29T16:57:31"},{"date":"2017-12-18T00:14:35","version":"1.704"},{"date":"2018-01-17T19:50:35","version":"1.705"},{"version":"1.706","date":"2018-07-07T01:21:05"},{"version":"1.707","date":"2018-08-02T03:56:11"},{"date":"2020-01-13T03:58:06","version":"1.708"},{"date":"2021-02-17T21:17:28","version":"1.709"},{"version":"1.710","date":"2021-08-02T15:11:51"},{"version":"1.711","date":"2022-11-22T17:29:07"},{"date":"2022-12-09T17:06:31","version":"1.712"},{"version":"1.713","date":"2022-12-12T18:45:32"},{"date":"2023-03-20T16:49:03","version":"1.714"},{"version":"1.715","date":"2023-05-04T18:09:55"},{"date":"2023-06-26T19:15:29","version":"1.716"},{"version":"1.717","date":"2023-08-17T15:53:05"}],"advisories":[{"affected_versions":[">=1.712,<=1.715"],"reported":null,"distribution":"Log-Any","cves":[],"fixed_versions":["1.716"],"severity":null,"id":"CPANSA-Log-Any-2023-001","description":"The WithStackTrace proxy may expose sensitive information\n","references":["https://metacpan.org/dist/Log-Any/changes","https://github.com/preaction/Log-Any/pull/97"]}],"main_module":"Log::Any"},"Catalyst-Controller-Combine":{"advisories":[{"description":"Allows to use url-encoded path-parts to crawl along the file system and read files outside the intended directory.\n","references":["https://metacpan.org/changes/distribution/Catalyst-Controller-Combine"],"id":"CPANSA-Catalyst-Controller-Combine-2010-01","fixed_versions":[">=0.12"],"cves":[],"distribution":"Catalyst-Controller-Combine","reported":"2010-05-21","affected_versions":["<0.12"]}],"main_module":"Catalyst::Controller::Combine","versions":[{"version":"0.06","date":"2009-07-11T17:58:25"},{"date":"2009-07-13T06:49:00","version":"0.07"},{"date":"2009-10-24T12:48:21","version":"0.08"},{"version":"0.09","date":"2010-03-13T19:31:13"},{"date":"2010-03-27T18:44:05","version":"0.10"},{"version":"0.12","date":"2010-06-21T20:47:02"},{"date":"2011-07-28T19:53:12","version":"0.13"},{"version":"0.14","date":"2012-02-20T20:59:00"},{"date":"2012-05-04T10:43:12","version":"0.15"}]},"MHonArc":{"advisories":[{"id":"CPANSA-MHonArc-2011-01","fixed_versions":[">=2.6.17"],"references":["https://metacpan.org/changes/distribution/MHonArc"],"description":"Improper escaping of certain HTML sequences (XSS).\n","distribution":"MHonArc","reported":"2011-01-09","affected_versions":["<2.6.17"],"cves":["CVE-2010-4524"]},{"affected_versions":["<2.6.17"],"distribution":"MHonArc","reported":"2011-01-09","cves":["CVE-2010-1677"],"fixed_versions":[">=2.6.17"],"id":"CPANSA-MHonArc-2011-02","description":"DoS when processing html messages with deep tag nesting.\n","references":["https://metacpan.org/changes/distribution/MHonArc"]}],"main_module":"MHonArc::UTF8","versions":[{"date":"1997-12-11T20:44:41","version":"2.1"},{"date":"1998-03-04T01:06:00","version":"v2.2.0"},{"date":"1998-10-11T02:56:10","version":"v2.3.0"},{"date":"1998-10-25T19:27:37","version":"v2.3.1"},{"date":"1998-11-01T20:02:48","version":"v2.3.2"},{"date":"1998-11-08T21:59:21","version":"v2.3.3"},{"version":"v2.4.0","date":"1999-06-26T07:57:53"},{"date":"1999-07-26T19:30:51","version":"v2.4.1"},{"version":"v2.4.2","date":"1999-08-12T07:16:14"},{"date":"1999-08-16T06:25:39","version":"v2.4.3"},{"date":"1999-10-01T19:43:07","version":"v2.4.4"},{"version":"v2.4.5","date":"2000-02-15T03:44:03"},{"version":"v2.4.6","date":"2000-04-24T08:35:56"},{"date":"2000-10-29T04:18:32","version":"v2.4.7"},{"version":"v2.4.7","date":"2000-10-30T06:29:47"},{"version":"v2.4.8","date":"2001-04-14T21:48:01"},{"date":"2001-06-11T03:09:13","version":"v2.4.9"},{"version":"v2.5.0","date":"2001-08-26T19:46:53"},{"version":"v2.5.0","date":"2001-09-07T15:24:19"},{"date":"2001-10-17T16:03:13","version":"v2.5.0"},{"version":"v2.5.1","date":"2001-11-14T05:09:59"},{"date":"2001-11-25T06:46:19","version":"v2.5.2"},{"date":"2002-04-18T07:23:29","version":"v2.5.3"},{"date":"2002-05-03T05:06:16","version":"v2.5.4"},{"version":"v2.5.5","date":"2002-05-28T05:43:00"},{"version":"v2.5.6","date":"2002-06-18T18:07:38"},{"version":"v2.5.7","date":"2002-06-21T22:59:36"},{"date":"2002-06-29T03:22:26","version":"v2.5.8"},{"version":"v2.5.9","date":"2002-07-20T02:39:53"},{"version":"v2.5.10","date":"2002-07-29T00:10:32"},{"version":"v2.5.11","date":"2002-08-04T04:25:22"},{"version":"v2.5.12","date":"2002-09-04T04:32:14"},{"version":"v2.5.13","date":"2002-10-21T17:13:35"},{"date":"2002-12-22T01:07:40","version":"v2.5.14"},{"version":"v2.6.0","date":"2003-02-10T05:23:02"},{"date":"2003-02-23T00:39:05","version":"v2.6.1"},{"version":"v2.6.2","date":"2003-03-12T01:55:48"},{"version":"v2.6.3","date":"2003-04-06T02:11:59"},{"version":"v2.6.4","date":"2003-06-22T21:54:52"},{"version":"v2.6.5","date":"2003-07-20T04:51:56"},{"version":"v2.6.6","date":"2003-07-21T17:20:07"},{"version":"v2.6.7","date":"2003-08-07T23:49:43"},{"version":"v2.6.8","date":"2003-08-13T04:47:02"},{"date":"2004-05-17T06:24:46","version":"v2.6.9"},{"version":"v2.6.10","date":"2004-05-17T06:25:16"},{"date":"2005-05-20T17:15:40","version":"v2.6.11"},{"version":"v2.6.12","date":"2005-06-09T02:30:11"},{"version":"v2.6.13","date":"2005-07-06T05:15:55"},{"date":"2005-07-23T07:15:49","version":"2.6.14"},{"version":"2.6.15","date":"2005-07-27T03:46:13"},{"version":"2.6.16","date":"2006-06-10T03:21:01"},{"date":"2011-01-09T10:04:06","version":"2.6.17"},{"version":"2.6.18","date":"2011-01-09T16:35:39"},{"version":"2.6.19","date":"2014-04-22T03:33:53"},{"version":"v2.6.20","date":"2020-09-14T09:22:58"},{"version":"v2.6.21","date":"2020-09-14T11:54:14"},{"version":"v2.6.22","date":"2020-09-21T07:06:18"},{"version":"v2.6.23","date":"2020-11-12T12:54:55"},{"version":"v2.6.24","date":"2020-11-16T14:24:54"}]},"Net-Server-Coro":{"advisories":[{"cves":["CVE-2011-0411"],"reported":"2011-03-16","distribution":"Net-Server-Coro","affected_versions":["<1.0"],"references":["https://www.itsecdb.com/oval/definition/oval/org.opensuse.security/def/20110411/CVE-2011-0411.html","https://metacpan.org/dist/Net-Server-Coro/changes"],"description":"Remaining contents of the read buffer could allow plaintext injection attacks wherein attackers could cause nominally SSL-only commands to be executed by appending them to the end of a STARTTLS.\n","severity":null,"id":"CPANSA-Net-Server-Coro-2011-0411","fixed_versions":[">=1.0"]}],"main_module":"Net::Server::Coro","versions":[{"date":"2008-03-10T20:46:24","version":"0.2"},{"date":"2008-10-22T17:26:30","version":"0.3"},{"date":"2008-10-22T17:41:55","version":"0.4"},{"date":"2009-10-16T03:46:28","version":"0.5"},{"date":"2009-10-16T14:56:53","version":"0.6"},{"date":"2009-12-16T03:28:15","version":"0.7"},{"version":"0.8","date":"2010-01-30T16:11:57"},{"date":"2010-11-15T04:56:09","version":"0.9"},{"version":"1.0","date":"2011-09-05T05:33:01"},{"version":"1.1","date":"2011-09-05T05:37:09"},{"version":"1.2","date":"2011-10-29T06:29:11"},{"version":"1.3","date":"2012-11-12T08:14:39"}]},"Crypt-OpenSSL-RSA":{"versions":[{"date":"2001-04-02T04:24:26","version":"0.08"},{"version":"0.09","date":"2001-04-02T16:43:12"},{"date":"2001-04-10T20:56:43","version":"0.10"},{"version":"0.11","date":"2001-04-11T02:58:01"},{"version":"0.12","date":"2001-09-07T03:14:26"},{"date":"2002-03-22T04:46:17","version":"0.13"},{"date":"2002-05-19T16:54:53","version":"0.14"},{"date":"2002-06-07T13:25:40","version":"0.15"},{"version":"0.16","date":"2002-06-12T02:15:47"},{"version":"0.17","date":"2003-01-07T04:08:58"},{"date":"2003-02-24T02:27:12","version":"0.18"},{"version":"0.19","date":"2003-04-27T22:48:40"},{"date":"2004-02-15T20:43:41","version":"0.20"},{"date":"2004-02-16T02:19:45","version":"0.21"},{"version":"0.22","date":"2005-06-06T10:51:24"},{"date":"2005-11-15T04:34:15","version":"0.22"},{"version":"0.23","date":"2006-04-13T04:38:04"},{"version":"0.24","date":"2006-11-13T15:34:59"},{"date":"2007-05-20T19:06:56","version":"0.25"},{"date":"2009-11-22T20:40:31","version":"0.26"},{"date":"2011-06-29T18:49:35","version":"0.26_01"},{"date":"2011-07-03T20:14:52","version":"0.27"},{"version":"0.28","date":"2011-08-24T23:04:56"},{"version":"0.28","date":"2017-11-27T03:36:04"},{"version":"0.29_01","date":"2018-04-14T05:01:11"},{"date":"2018-04-15T18:55:41","version":"0.29_02"},{"date":"2018-04-16T20:47:56","version":"0.29_03"},{"version":"0.30","date":"2018-05-01T16:37:12"},{"date":"2018-09-24T17:36:24","version":"0.31"},{"version":"0.32","date":"2021-09-08T15:50:47"},{"version":"0.33","date":"2022-07-08T11:25:11"}],"advisories":[{"distribution":"Crypt-OpenSSL-RSA","reported":"2024-04-25","affected_versions":[">0"],"cves":["CVE-2024-2467"],"id":"CPANSA-Crypt-OpenSSL-RSA-2024-2467","severity":null,"fixed_versions":[],"references":["https://access.redhat.com/security/cve/CVE-2024-2467","https://bugzilla.redhat.com/show_bug.cgi?id=2269567","https://github.com/toddr/Crypt-OpenSSL-RSA/issues/42","https://people.redhat.com/~hkario/marvin/"],"description":"A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.\n"}],"main_module":"Crypt::OpenSSL::RSA"},"Image-ExifTool":{"versions":[{"version":"3.60","date":"2004-10-04T15:37:06"},{"date":"2004-11-02T12:46:54","version":"3.72"},{"date":"2004-11-05T12:41:52","version":"3.74"},{"version":"3.82","date":"2004-11-11T18:24:18"},{"version":"3.93","date":"2004-11-24T18:42:42"},{"version":"3.94","date":"2004-11-25T16:34:47"},{"date":"2005-01-24T13:15:55","version":"4.36"},{"date":"2005-02-07T15:56:43","version":"4.53"},{"version":"4.64","date":"2005-02-18T00:42:59"},{"version":"4.73","date":"2005-03-01T19:23:29"},{"date":"2005-03-15T12:09:56","version":"4.87"},{"date":"2005-04-02T19:46:41","version":"4.93"},{"date":"2005-04-20T12:41:30","version":"5.05"},{"version":"5.18","date":"2005-05-16T15:54:07"},{"version":"5.25","date":"2005-06-03T19:21:17"},{"version":"5.32","date":"2005-06-15T17:21:33"},{"date":"2005-07-19T18:16:02","version":"5.46"},{"version":"5.55","date":"2005-08-24T14:58:18"},{"version":"5.67","date":"2005-10-13T13:15:01"},{"date":"2005-11-18T13:04:29","version":"5.77"},{"version":"5.87","date":"2005-12-22T16:42:56"},{"date":"2006-02-19T20:26:14","version":"6.00"},{"date":"2006-05-12T12:10:32","version":"6.17"},{"date":"2006-07-24T13:18:05","version":"6.29"},{"version":"6.36","date":"2006-09-06T20:26:16"},{"version":"6.42","date":"2006-09-21T15:39:52"},{"date":"2006-11-20T13:52:55","version":"6.57"},{"version":"6.66","date":"2006-12-20T13:07:23"},{"date":"2007-02-14T13:28:50","version":"6.75"},{"date":"2007-02-16T13:21:27","version":"6.76"},{"version":"6.90","date":"2007-05-10T18:53:15"},{"version":"7.00","date":"2007-10-24T11:39:52"},{"date":"2008-02-05T17:21:39","version":"7.15"},{"version":"7.21","date":"2008-03-12T12:24:57"},{"date":"2008-04-18T13:09:00","version":"7.25"},{"version":"7.30","date":"2008-05-31T11:39:35"},{"version":"7.50","date":"2008-10-26T19:00:34"},{"date":"2008-10-27T13:48:39","version":"7.51"},{"date":"2009-01-06T13:48:18","version":"7.60"},{"version":"7.67","date":"2009-02-09T14:25:12"},{"date":"2009-07-02T15:42:38","version":"7.82"},{"date":"2009-08-18T01:30:53","version":"7.88"},{"version":"7.89","date":"2009-08-18T12:03:19"},{"version":"8.00","date":"2009-11-20T19:06:24"},{"version":"8.10","date":"2010-02-08T20:49:00"},{"version":"8.15","date":"2010-03-18T14:09:58"},{"version":"8.25","date":"2010-07-13T12:35:33"},{"version":"8.40","date":"2010-11-21T21:29:00"},{"date":"2011-03-01T12:43:02","version":"8.50"},{"date":"2011-06-27T11:52:50","version":"8.60"},{"version":"8.65","date":"2011-09-24T10:53:29"},{"date":"2012-01-08T13:48:19","version":"8.75"},{"date":"2012-01-27T14:19:10","version":"8.77"},{"version":"8.85","date":"2012-03-25T12:07:06"},{"date":"2012-04-28T12:06:48","version":"8.90"},{"date":"2012-08-25T12:28:04","version":"9.01"},{"date":"2012-11-03T16:37:48","version":"9.04"},{"date":"2013-01-02T21:07:34","version":"9.11"},{"date":"2013-01-03T01:49:33","version":"9.12"},{"date":"2013-01-10T15:05:11","version":"9.13"},{"version":"9.25","date":"2013-04-06T11:38:39"},{"date":"2013-04-15T11:20:13","version":"9.27"},{"date":"2014-01-11T22:58:56","version":"9.46"},{"version":"9.53","date":"2014-02-22T14:40:30"},{"version":"9.60","date":"2014-05-11T13:34:36"},{"date":"2014-09-03T12:19:55","version":"9.70"},{"date":"2014-11-15T15:14:24","version":"9.76"},{"date":"2015-03-14T11:33:58","version":"9.90"},{"version":"10.00","date":"2015-08-18T13:30:08"},{"date":"2016-01-22T15:51:06","version":"10.10"},{"date":"2016-04-20T13:25:01","version":"10.15"},{"version":"10.20","date":"2016-06-13T14:05:58"},{"version":"10.36","date":"2016-11-24T16:55:55"},{"version":"10.39","date":"2017-01-13T16:02:53"},{"version":"10.40","date":"2017-01-14T17:30:45"},{"version":"10.50","date":"2017-04-20T12:54:29"},{"version":"10.55","date":"2017-06-05T14:41:23"},{"date":"2018-02-22T13:27:40","version":"10.80"},{"date":"2018-06-07T11:44:16","version":"11.00"},{"version":"11.01","date":"2018-06-11T12:18:41"},{"version":"11.11","date":"2018-09-28T01:34:43"},{"date":"2019-03-06T15:14:28","version":"11.30"},{"version":"11.50","date":"2019-06-11T15:29:41"},{"version":"11.70","date":"2019-10-10T13:04:36"},{"version":"11.85","date":"2020-01-28T15:40:58"},{"version":"12.00","date":"2020-06-11T20:36:48"},{"version":"12.15","date":"2021-01-18T14:03:50"},{"date":"2021-01-21T17:51:28","version":"12.16"},{"version":"12.26","date":"2021-05-21T00:37:46"},{"date":"2021-08-12T13:13:43","version":"12.30"},{"version":"12.42","date":"2022-06-07T11:39:06"},{"version":"12.42","date":"2022-06-07T20:05:13"},{"date":"2022-11-09T11:41:50","version":"12.50"},{"version":"12.60","date":"2023-04-05T15:01:59"},{"date":"2023-11-19T16:15:22","version":"12.70"},{"version":"12.75","date":"2024-01-31T01:08:08"},{"version":"12.76","date":"2024-01-31T15:31:14"},{"date":"2024-10-29T17:10:24","version":"13.00"}],"advisories":[{"fixed_versions":[">12.38"],"id":"CPANSA-Image-ExifTool-2022-23935","severity":"critical","references":["https://github.com/exiftool/exiftool/commit/74dbab1d2766d6422bb05b033ac6634bf8d1f582","https://gist.github.com/ert-plus/1414276e4cb5d56dd431c2f0429e4429"],"description":"lib/Image/ExifTool.pm in ExifTool before 12.38 mishandles a $file =~ /\\|$/ check, leading to command injection.\n","affected_versions":["<=12.37"],"distribution":"Image-ExifTool","reported":"2022-01-25","cves":["CVE-2022-23935"]},{"cves":["CVE-2021-22204"],"reported":"2021-04-23","distribution":"Image-ExifTool","affected_versions":[">=7.44,<=12.23"],"description":"Improper neutralization of user data in the DjVu file format in ExifTool versions 7.44 and up allows arbitrary code execution when parsing the malicious image\n","references":["http://packetstormsecurity.com/files/162558/ExifTool-DjVu-ANT-Perl-Injection.html","http://packetstormsecurity.com/files/164768/GitLab-Unauthenticated-Remote-ExifTool-Command-Injection.html","http://packetstormsecurity.com/files/164994/GitLab-13.10.2-Remote-Code-Execution.html","http://packetstormsecurity.com/files/167038/ExifTool-12.23-Arbitrary-Code-Execution.html","http://www.openwall.com/lists/oss-security/2021/05/09/1","http://www.openwall.com/lists/oss-security/2021/05/10/5","https://github.com/exiftool/exiftool/commit/cf0f4e7dcd024ca99615bfd1102a841a25dde031#diff-fa0d652d10dbcd246e6b1df16c1e992931d3bb717a7e36157596b76bdadb3800","https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22204.json","https://hackerone.com/reports/1154542","https://lists.debian.org/debian-lts-announce/2021/05/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DDKDLJLBTBBR66OOPXSXCG2PQRM5KCZL/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F6UOBPU3LSHAPRRJNISNVXZ5DSUIALLV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U4RF6PJCJ6NQOVJJJF6HN6BORUQVIXY6/","https://www.debian.org/security/2021/dsa-4910"],"id":"CPANSA-Image-ExifTool-2021-22204","severity":null,"fixed_versions":[">12.23"]},{"fixed_versions":[">8"],"id":"CPANSA-Image-ExifTool-2018-20211","severity":null,"references":["http://packetstormsecurity.com/files/150892/Exiftool-8.3.2.0-DLL-Hijacking.html","http://seclists.org/fulldisclosure/2018/Dec/44"],"description":"ExifTool 8.32 allows local users to gain privileges by creating a %TEMP%\\\\par-%username%\\\\cache-exiftool-8.32 folder with a victim's username, and then copying a Trojan horse ws32_32.dll file into this new folder, aka DLL Hijacking. NOTE: 8.32 is an obsolete version from 2010 (9.x was released starting in 2012, and 10.x was released starting in 2015).\n","affected_versions":["=8.32"],"distribution":"Image-ExifTool","reported":"2019-01-02","cves":["CVE-2018-20211"]}],"main_module":"Image::ExifTool"},"Convert-ASN1":{"versions":[{"date":"2000-04-03T21:52:45","version":"0.04"},{"date":"2000-05-12T10:14:51","version":"0.05"},{"date":"2000-05-22T11:08:54","version":"0.06"},{"date":"2000-05-30T14:31:54","version":"0.07"},{"date":"2001-02-05T22:44:53","version":"0.08"},{"version":"0.09","date":"2001-04-19T23:07:25"},{"date":"2001-04-20T06:40:05","version":"0.10"},{"version":"0.11","date":"2001-06-11T13:37:41"},{"version":"0.12","date":"2001-07-31T17:11:59"},{"version":"0.13","date":"2001-08-26T07:23:52"},{"version":"0.14","date":"2001-09-10T18:07:31"},{"version":"0.15","date":"2002-01-22T11:33:25"},{"date":"2002-08-20T00:05:24","version":"0.16"},{"date":"2003-05-12T17:52:00","version":"0.17"},{"version":"0.18","date":"2003-10-08T14:31:56"},{"date":"2005-04-19T00:51:07","version":"0.19"},{"date":"2006-02-22T01:29:15","version":"0.20"},{"date":"2007-02-03T02:50:32","version":"0.21"},{"date":"2008-09-15T19:39:08","version":"0.22"},{"date":"2012-05-03T21:33:29","version":"0.23"},{"date":"2012-06-04T22:12:03","version":"0.24"},{"date":"2012-06-09T00:32:31","version":"0.25"},{"date":"2012-06-09T18:31:05","version":"0.26"},{"date":"2014-06-25T18:49:11","version":"0.27"},{"version":"0.28","date":"2021-05-23T21:05:04"},{"date":"2021-05-24T21:29:37","version":"0.29"},{"version":"0.30","date":"2021-05-30T00:58:54"},{"date":"2021-06-03T01:30:40","version":"0.31"},{"version":"0.32","date":"2021-09-21T21:46:25"},{"date":"2021-09-22T22:51:23","version":"0.33"},{"date":"2023-08-07T22:47:22","version":"0.34"}],"main_module":"Convert::ASN1","advisories":[{"cves":["CVE-2013-7488"],"affected_versions":["<0.27"],"distribution":"Convert-ASN1","reported":"2020-04-07","references":["https://github.com/gbarr/perl-Convert-ASN1/issues/14","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONNQSW4SSKMG5RUEFZJZA5T5R2WXEGQF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6V3PJEQOT47ZO77263XPGS3Y3AJROI4X/"],"description":"perl-Convert-ASN1 (aka the Convert::ASN1 module for Perl) through 0.27 allows remote attackers to cause an infinite loop via unexpected input.\n","fixed_versions":[],"id":"CPANSA-Convert-ASN1-2013-7488","severity":"high"}]},"Catalyst-Action-REST":{"main_module":"Catalyst::Action::REST","advisories":[{"severity":null,"id":"CPANSA-Catalyst-Action-REST-2013-01","fixed_versions":[">=1.12"],"description":"YAML and YAML::HTML parsers are a potential security hole, as they may allow arbitrary Perl objects to be instantiated.\n","references":["https://metacpan.org/dist/Catalyst-Action-REST/changes"],"distribution":"Catalyst-Action-REST","reported":"2013-09-03","affected_versions":["<1.12"],"cves":[]}],"versions":[{"version":"0.1","date":"2006-11-20T03:15:08"},{"version":"0.2","date":"2006-12-01T01:42:22"},{"date":"2006-12-04T00:22:45","version":"0.30"},{"date":"2006-12-06T08:48:49","version":"0.31"},{"date":"2007-03-10T00:44:35","version":"0.40"},{"version":"0.41","date":"2007-05-24T21:09:40"},{"date":"2007-07-07T19:33:22","version":"0.50"},{"date":"2008-01-04T01:33:04","version":"0.60"},{"version":"0.61","date":"2008-06-30T19:30:56"},{"version":"0.62","date":"2008-07-02T15:25:10"},{"version":"0.63","date":"2008-08-07T17:14:34"},{"version":"0.64","date":"2008-08-14T16:09:53"},{"date":"2008-08-20T17:45:46","version":"0.65"},{"date":"2008-08-22T18:24:57","version":"0.66"},{"version":"0.67_01","date":"2009-03-25T16:38:07"},{"date":"2009-03-26T05:04:33","version":"0.67"},{"version":"0.68","date":"2009-03-26T05:37:53"},{"date":"2009-03-26T21:19:43","version":"0.69"},{"version":"0.70","date":"2009-03-28T06:23:19"},{"version":"0.71","date":"2009-03-28T16:19:10"},{"date":"2009-06-25T18:56:47","version":"0.72"},{"version":"0.73","date":"2009-06-28T00:22:51"},{"date":"2009-07-22T23:12:44","version":"0.74"},{"version":"0.75","date":"2009-08-17T13:11:15"},{"version":"0.76","date":"2009-08-21T20:42:44"},{"version":"0.77","date":"2009-08-27T01:26:49"},{"date":"2009-09-28T14:05:11","version":"0.78"},{"version":"0.79","date":"2009-12-11T01:11:49"},{"version":"0.80","date":"2009-12-19T14:59:13"},{"version":"0.81","date":"2010-01-14T20:56:56"},{"date":"2010-02-04T22:35:05","version":"0.82"},{"date":"2010-02-08T22:24:29","version":"0.83"},{"version":"0.84","date":"2010-05-06T08:34:09"},{"version":"0.85","date":"2010-05-13T08:15:30"},{"version":"0.86","date":"2010-09-01T22:17:14"},{"version":"0.87","date":"2010-11-03T19:48:23"},{"date":"2011-01-11T23:12:42","version":"0.88"},{"date":"2011-01-24T21:59:02","version":"0.89"},{"version":"0.90","date":"2011-02-25T13:58:06"},{"version":"0.91","date":"2011-08-04T12:46:05"},{"date":"2011-10-01T10:11:59","version":"0.91"},{"date":"2011-10-12T18:35:31","version":"0.93"},{"version":"0.94","date":"2011-12-09T08:51:25"},{"date":"2012-01-04T19:54:14","version":"0.95"},{"date":"2012-01-30T11:32:44","version":"0.96"},{"date":"2012-02-21T10:06:13","version":"0.97"},{"version":"0.98","date":"2012-02-21T11:44:32"},{"date":"2012-02-28T09:14:17","version":"0.99"},{"date":"2012-04-13T08:37:31","version":"1.00"},{"version":"1.01","date":"2012-05-29T20:02:44"},{"version":"1.02","date":"2012-06-05T21:45:05"},{"date":"2012-06-27T23:52:31","version":"1.03"},{"version":"1.04","date":"2012-06-30T09:32:24"},{"version":"1.05","date":"2012-07-02T19:16:30"},{"version":"1.06","date":"2012-12-11T22:13:48"},{"date":"2013-04-11T19:25:51","version":"1.07"},{"version":"1.08","date":"2013-04-16T07:36:02"},{"date":"2013-04-19T12:43:57","version":"1.09"},{"date":"2013-04-22T13:43:09","version":"1.10"},{"version":"1.11","date":"2013-06-16T14:28:48"},{"version":"1.12","date":"2013-09-11T17:50:54"},{"date":"2013-11-08T15:49:54","version":"1.13"},{"version":"1.14","date":"2013-12-27T21:33:09"},{"version":"1.15","date":"2014-05-07T14:04:03"},{"date":"2014-09-12T18:22:35","version":"1.16"},{"date":"2014-10-24T00:59:39","version":"1.17"},{"version":"1.18","date":"2015-01-20T18:22:02"},{"date":"2015-02-06T15:40:56","version":"1.19"},{"date":"2015-10-29T20:34:02","version":"1.20"},{"version":"1.21","date":"2017-12-05T15:16:47"}]},"Net-IPv4Addr":{"main_module":"Net::IPv4Addr","advisories":[{"reported":"2024-03-18","distribution":"Net-IPv4Addr","affected_versions":[">=0.10"],"cves":["CVE-2021-47155"],"id":"CPANSA-Net-IPV4Addr-2021-47155","severity":null,"fixed_versions":[],"description":"The Net::IPAddress::Util module before 5.000 for Perl does not properly consider extraneous zero characters in an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.\n","references":["https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/","https://metacpan.org/release/Net-IPAddress-Util","https://metacpan.org/release/PWBENNETT/Net-IPAddress-Util-5.000/changes"]}],"versions":[{"version":"0.07","date":"1999-10-20T01:18:13"},{"date":"1999-12-17T23:08:34","version":"0.08"},{"date":"1999-12-17T23:10:21","version":"0.8"},{"version":"0.09","date":"2000-05-03T20:24:59"},{"date":"2000-08-07T19:39:33","version":"0.10"}]},"Net-SSLeay":{"advisories":[{"affected_versions":["<1.25"],"distribution":"Net-SSLeay","reported":"2005-05-03","cves":["CVE-2005-0106"],"fixed_versions":[">=1.25"],"id":"CPANSA-Net-SSLeay-2005-0106","severity":null,"description":"SSLeay.pm in libnet-ssleay-perl before 1.25 uses the /tmp/entropy file for entropy if a source is not set in the EGD_PATH variable, which allows local users to reduce the cryptographic strength of certain operations by modifying the file.\n","references":["http://secunia.com/advisories/18639","http://www.securityfocus.com/bid/13471","http://www.mandriva.com/security/advisories?name=MDKSA-2006:023","https://usn.ubuntu.com/113-1/"]}],"main_module":"Net::SSLeay","versions":[{"date":"2007-07-03T14:02:04","version":"1.31_01"},{"version":"1.31_02","date":"2007-07-14T20:12:31"},{"date":"2007-09-03T21:16:05","version":"1.32"},{"date":"2008-02-14T13:43:47","version":"1.33_01"},{"version":"1.34","date":"2008-07-24T01:16:26"},{"version":"1.35","date":"2008-07-24T22:14:14"},{"version":"1.36","date":"2010-01-30T21:16:14"},{"date":"2011-09-15T22:28:53","version":"1.37"},{"version":"1.38","date":"2011-09-16T11:48:42"},{"date":"2011-09-21T06:57:15","version":"1.39"},{"version":"1.40","date":"2011-09-23T02:41:56"},{"date":"2011-09-24T22:11:30","version":"1.41"},{"version":"1.42","date":"2011-10-03T06:27:18"},{"version":"1.42","date":"2012-02-23T22:42:58"},{"version":"1.42","date":"2012-02-24T21:44:59"},{"date":"2012-02-24T22:54:26","version":"1.42"},{"date":"2012-04-02T21:16:31","version":"1.46"},{"version":"1.47","date":"2012-04-04T00:54:15"},{"version":"1.48","date":"2012-04-25T07:03:14"},{"version":"1.49","date":"2012-09-24T22:12:48"},{"date":"2012-12-12T21:00:17","version":"1.49"},{"version":"1.49","date":"2012-12-14T05:38:34"},{"version":"1.51","date":"2013-01-08T23:13:16"},{"date":"2013-03-22T07:31:43","version":"1.51"},{"version":"1.53","date":"2013-03-22T22:14:08"},{"version":"1.53","date":"2013-06-07T22:33:01"},{"date":"2014-01-07T22:12:16","version":"1.56"},{"version":"1.56","date":"2014-01-11T21:39:27"},{"date":"2014-01-14T23:29:28","version":"1.58"},{"version":"1.59","date":"2014-05-09T22:10:47"},{"version":"1.60","date":"2014-05-10T21:41:25"},{"date":"2014-05-12T10:07:16","version":"1.61"},{"date":"2014-05-18T21:22:05","version":"1.61"},{"version":"1.63","date":"2014-05-19T10:44:07"},{"date":"2014-06-11T02:56:20","version":"1.64"},{"version":"1.65","date":"2014-07-14T10:26:12"},{"version":"1.66","date":"2014-08-21T01:09:39"},{"date":"2015-01-16T22:22:07","version":"1.67"},{"version":"1.68","date":"2015-01-24T00:27:20"},{"date":"2015-06-03T21:47:53","version":"1.68"},{"date":"2015-06-25T23:10:05","version":"1.70"},{"date":"2015-09-18T03:19:23","version":"1.71"},{"version":"1.72","date":"2015-09-21T21:54:16"},{"version":"1.73","date":"2016-04-11T00:17:37"},{"date":"2016-04-11T21:48:54","version":"1.74"},{"date":"2016-07-31T01:22:50","version":"1.75"},{"version":"1.76","date":"2016-07-31T02:53:16"},{"date":"2016-07-31T20:27:29","version":"1.77"},{"date":"2016-08-13T08:42:51","version":"1.78"},{"version":"1.79","date":"2017-01-03T07:57:10"},{"date":"2017-01-04T21:41:24","version":"1.80"},{"date":"2017-03-27T21:02:27","version":"1.81"},{"version":"1.82","date":"2017-10-31T04:50:54"},{"version":"1.83","date":"2018-01-16T04:44:04"},{"date":"2018-01-17T03:12:01","version":"1.84"},{"version":"1.85","date":"2018-03-13T22:28:12"},{"date":"2018-07-04T20:41:16","version":"1.86_01"},{"date":"2018-07-06T12:18:38","version":"1.86_02"},{"version":"1.86_03","date":"2018-07-19T19:42:35"},{"version":"1.86_04","date":"2018-07-30T17:01:10"},{"version":"1.86_05","date":"2018-08-23T08:31:09"},{"date":"2018-09-29T15:52:57","version":"1.86_06"},{"version":"1.86_07","date":"2018-12-13T09:56:46"},{"date":"2019-03-12T14:20:11","version":"1.86_08"},{"date":"2019-03-12T21:00:55","version":"1.86_09"},{"date":"2019-05-05T01:38:23","version":"1.86_10"},{"date":"2019-05-08T16:24:16","version":"1.86_11"},{"version":"1.88","date":"2019-05-10T20:36:42"},{"date":"2020-03-22T13:48:11","version":"1.89_01"},{"version":"1.89_02","date":"2020-08-06T23:48:51"},{"version":"1.89_03","date":"2020-12-12T16:47:00"},{"date":"2021-01-13T19:01:50","version":"1.89_04"},{"version":"1.89_05","date":"2021-01-21T00:51:03"},{"version":"1.90","date":"2021-01-21T19:08:38"},{"version":"1.91_01","date":"2021-10-24T18:14:27"},{"version":"1.91_02","date":"2021-12-29T22:30:53"},{"date":"2022-01-10T19:21:16","version":"1.91_03"},{"version":"1.92","date":"2022-01-12T22:47:57"},{"version":"1.93_01","date":"2022-03-20T18:24:35"},{"date":"2023-02-23T01:08:20","version":"1.93_02"},{"date":"2024-01-02T14:34:40","version":"1.93_03"},{"date":"2024-01-05T00:45:35","version":"1.93_04"},{"date":"2024-01-06T18:39:23","version":"1.93_05"},{"date":"2024-01-08T01:22:27","version":"1.94"}]},"CGI-Application":{"versions":[{"version":"1.0","date":"2000-07-11T04:23:51"},{"version":"1.1","date":"2000-07-12T15:21:41"},{"version":"1.2","date":"2000-07-18T21:11:44"},{"date":"2001-05-21T12:03:59","version":"1.3"},{"date":"2001-05-28T18:29:06","version":"1.31"},{"version":"2.0","date":"2001-06-25T03:17:50"},{"version":"2.1","date":"2001-08-11T22:18:28"},{"date":"2002-05-06T03:21:57","version":"2.2"},{"version":"2.3","date":"2002-05-06T11:57:30"},{"version":"2.4","date":"2002-05-27T01:01:18"},{"version":"2.5","date":"2002-07-18T11:59:16"},{"version":"2.6","date":"2002-10-07T13:03:27"},{"date":"2003-02-01T13:52:45","version":"3.0"},{"date":"2003-06-02T13:01:50","version":"3.1"},{"version":"3.2","date":"2004-02-04T03:23:56"},{"date":"2004-02-04T15:53:56","version":"3.2"},{"date":"2004-02-14T01:47:53","version":"3.22"},{"date":"2004-09-26T19:22:20","version":"3.30"},{"version":"3.31","date":"2004-09-26T19:35:26"},{"date":"2005-03-19T14:42:14","version":"4.0_2"},{"date":"2005-06-07T03:25:55","version":"4.0_4"},{"date":"2005-06-11T04:00:57","version":"4.0"},{"version":"4.01_01","date":"2005-06-13T19:15:12"},{"version":"4.01","date":"2005-06-14T14:37:30"},{"version":"4.02_1","date":"2005-07-24T19:08:18"},{"date":"2005-07-31T03:11:25","version":"4.02"},{"version":"4.03","date":"2005-08-04T23:45:52"},{"version":"4.04_01","date":"2005-09-01T02:54:00"},{"version":"4.04_02","date":"2005-09-09T01:12:21"},{"version":"4.04","date":"2005-10-12T02:12:18"},{"version":"4.05","date":"2006-03-02T01:58:41"},{"version":"4.06","date":"2006-04-13T02:34:40"},{"version":"4.07_01","date":"2006-07-02T05:05:34"},{"version":"4.07_02","date":"2007-10-31T23:34:31"},{"date":"2008-06-16T20:09:18","version":"4.07_03"},{"version":"4.10","date":"2008-06-18T03:30:33"},{"date":"2008-08-10T15:36:00","version":"4.11"},{"date":"2008-09-27T04:18:05","version":"4.11"},{"date":"2008-11-02T00:43:18","version":"4.11"},{"version":"4.21","date":"2009-01-03T16:13:59"},{"date":"2009-07-30T01:35:48","version":"4.30"},{"version":"4.31","date":"2009-07-30T01:42:34"},{"version":"4.32_1","date":"2010-02-14T00:33:00"},{"version":"4.50","date":"2011-06-16T17:07:16"},{"version":"4.50_50","date":"2015-01-23T12:19:21"},{"version":"4.50_51","date":"2015-07-18T12:57:01"},{"date":"2018-02-28T13:57:05","version":"4.60"},{"date":"2018-03-01T13:29:17","version":"4.60_1"},{"version":"4.61","date":"2018-03-02T09:20:24"}],"main_module":"CGI::Application","advisories":[{"cves":["CVE-2013-7329"],"distribution":"CGI-Application","reported":"2014-10-06","affected_versions":["<4.50_51"],"references":["https://github.com/markstos/CGI--Application/pull/15","http://openwall.com/lists/oss-security/2014/02/19/11","http://lists.fedoraproject.org/pipermail/package-announce/2014-March/129436.html","http://lists.fedoraproject.org/pipermail/package-announce/2014-March/129444.html","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=739505","http://www.securityfocus.com/bid/65687","https://rt.cpan.org/Public/Bug/Display.html?id=84403","https://bugzilla.redhat.com/show_bug.cgi?id=1067180","https://exchange.xforce.ibmcloud.com/vulnerabilities/91735"],"description":"The CGI::Application module before 4.50_50 and 4.50_51 for Perl, when run modes are not specified, allows remote attackers to obtain sensitive information (web queries and environment details) via vectors related to the dump_html function.\n","id":"CPANSA-CGI-Application-2013-7329","severity":null,"fixed_versions":[]}]},"GitLab-API-v4":{"versions":[{"date":"2017-12-11T18:40:52","version":"0.01"},{"date":"2017-12-16T00:11:18","version":"0.02"},{"version":"0.03","date":"2018-01-12T21:26:23"},{"date":"2018-02-03T23:15:40","version":"0.04"},{"date":"2018-03-06T18:26:52","version":"0.05"},{"version":"0.06","date":"2018-04-09T20:06:01"},{"date":"2018-05-10T21:33:05","version":"0.07"},{"date":"2018-05-14T17:33:39","version":"0.08"},{"date":"2018-05-29T04:48:13","version":"0.09"},{"version":"0.10","date":"2018-06-06T06:47:41"},{"version":"0.11","date":"2018-09-02T05:24:51"},{"date":"2018-09-12T01:04:05","version":"0.12"},{"version":"0.13","date":"2018-11-08T13:44:56"},{"version":"0.14","date":"2018-12-04T20:39:42"},{"date":"2019-01-09T18:13:46","version":"0.15"},{"version":"0.16","date":"2019-02-18T06:21:38"},{"date":"2019-02-20T22:49:13","version":"0.17"},{"date":"2019-04-01T04:36:27","version":"0.18"},{"version":"0.19","date":"2019-05-17T20:41:31"},{"version":"0.20","date":"2019-07-23T21:42:57"},{"version":"0.21","date":"2019-08-24T18:56:25"},{"version":"0.22","date":"2019-09-13T15:03:00"},{"version":"0.23","date":"2019-10-18T19:55:54"},{"date":"2020-02-12T22:10:58","version":"0.24"},{"date":"2020-02-12T22:21:40","version":"0.25"},{"version":"0.26","date":"2021-01-30T07:11:26"},{"date":"2023-06-07T20:51:14","version":"0.27"}],"main_module":"GitLab::API::v4","advisories":[{"cves":["CVE-2023-31485"],"affected_versions":[">=0.26"],"distribution":"GitLab-API-v4","reported":"2023-02-28","description":"GitLab::API::v4 is missing the verify_SSL=>1 flag in HTTP::Tiny, allowing a network attacker to MITM connections to the GitLab server.\n","references":["https://github.com/bluefeet/GitLab-API-v4/pull/57","https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/","https://www.openwall.com/lists/oss-security/2023/04/18/14","https://github.com/chansen/p5-http-tiny/pull/151"],"fixed_versions":[],"id":"CPANSA-GitLab-API-v4-2023-31485"}]},"LWP-Protocol-Net-Curl":{"versions":[{"version":"0.001","date":"2012-10-24T18:49:20"},{"date":"2012-10-26T20:05:13","version":"0.002"},{"version":"0.003","date":"2012-10-29T18:55:46"},{"date":"2012-10-31T13:01:46","version":"0.004"},{"date":"2012-11-01T15:17:14","version":"0.005"},{"version":"0.006","date":"2012-11-12T12:23:09"},{"date":"2012-11-13T14:33:10","version":"0.007"},{"version":"0.008","date":"2012-11-25T22:38:58"},{"date":"2012-11-28T19:03:10","version":"0.009"},{"date":"2012-12-07T00:13:55","version":"0.010"},{"date":"2012-12-18T12:05:00","version":"0.011"},{"date":"2013-02-08T11:00:04","version":"0.012"},{"version":"0.013","date":"2013-02-11T01:56:30"},{"version":"0.014","date":"2013-02-16T12:51:03"},{"date":"2013-05-13T21:41:47","version":"0.015"},{"version":"0.016","date":"2013-05-18T22:12:03"},{"version":"0.017","date":"2013-07-13T12:22:34"},{"version":"0.018","date":"2013-08-17T11:34:49"},{"date":"2013-10-11T12:33:53","version":"0.019"},{"date":"2013-10-13T09:02:17","version":"0.020"},{"version":"0.021","date":"2014-01-21T17:46:37"},{"date":"2014-07-09T15:04:06","version":"0.022"},{"date":"2014-12-23T17:06:56","version":"0.023"},{"version":"0.024","date":"2019-07-12T12:27:08"},{"version":"0.025","date":"2019-07-15T11:29:17"},{"date":"2019-10-08T12:01:54","version":"0.026"}],"advisories":[{"cves":[],"reported":"2012-11-28","distribution":"LWP-Protocol-Net-Curl","affected_versions":["<0.009"],"references":["https://metacpan.org/changes/distribution/LWP-Protocol-Net-Curl","https://github.com/creaktive/LWP-Protocol-Net-Curl/commit/dc8b183c6520a2b6bcde685de635675ee4a7e019"],"description":"Misconfiguration with libcurl v7.28.1 causes a HTTPS validation issues.\n","id":"CPANSA-LWP-Protocol-Net-Curl-2012-01","fixed_versions":[">=0.009"]}],"main_module":"LWP::Protocol::Net::Curl"},"IO-Socket-SSL":{"main_module":"IO::Socket::SSL","advisories":[{"cves":["CVE-2010-4334"],"affected_versions":["<=1.35"],"distribution":"IO-Socket-SSL","reported":"2011-01-14","references":["http://osvdb.org/69626","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606058","http://www.securityfocus.com/bid/45189","http://cpansearch.perl.org/src/SULLR/IO-Socket-SSL-1.35/Changes","http://secunia.com/advisories/42508","http://secunia.com/advisories/42757","http://www.openwall.com/lists/oss-security/2010/12/09/8","http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052594.html","http://www.openwall.com/lists/oss-security/2010/12/24/1","http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052601.html","http://www.mandriva.com/security/advisories?name=MDVSA-2011:092"],"description":"The IO::Socket::SSL module 1.35 for Perl, when verify_mode is not VERIFY_NONE, fails open to VERIFY_NONE instead of throwing an error when a ca_file/ca_path cannot be verified, which allows remote attackers to bypass intended certificate restrictions.\n","fixed_versions":[">1.35"],"severity":null,"id":"CPANSA-IO-Socket-SSL-2010-4334"},{"cves":["CVE-2009-3024"],"distribution":"IO-Socket-SSL","reported":"2009-08-31","affected_versions":[">=1.14","<=1.25"],"description":"The verify_hostname_of_cert function in the certificate checking feature in IO-Socket-SSL (IO::Socket::SSL) 1.14 through 1.25 only matches the prefix of a hostname when no wildcard is used, which allows remote attackers to bypass the hostname check for a certificate.\n","references":["http://www.openwall.com/lists/oss-security/2009/08/31/4","http://www.openwall.com/lists/oss-security/2009/08/28/1","http://cpansearch.perl.org/src/SULLR/IO-Socket-SSL-1.30/Changes","http://www.openwall.com/lists/oss-security/2009/08/29/1","http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html","http://www.vupen.com/english/advisories/2011/0118","http://www.gentoo.org/security/en/glsa/glsa-201101-06.xml","http://secunia.com/advisories/42893"],"id":"CPANSA-IO-Socket-SSL-2009-3024","severity":null,"fixed_versions":[">=1.26"]}],"versions":[{"version":"0.70","date":"1999-06-18T14:54:49"},{"version":"0.72","date":"1999-07-21T19:45:05"},{"version":"0.73","date":"1999-07-29T17:28:04"},{"version":"0.74","date":"2000-07-04T11:46:51"},{"version":"0.75","date":"2000-08-08T06:59:10"},{"version":"0.76","date":"2000-11-17T14:26:45"},{"date":"2001-01-15T13:57:06","version":"0.77"},{"version":"0.78","date":"2001-04-24T07:00:38"},{"version":"0.79","date":"2001-06-04T08:01:01"},{"date":"2001-08-19T08:28:53","version":"0.80"},{"date":"2002-04-10T12:43:43","version":"0.81"},{"version":"0.90","date":"2002-08-13T21:42:55"},{"date":"2002-08-19T15:28:09","version":"0.901"},{"version":"0.91","date":"2002-09-01T01:13:14"},{"version":"0.92","date":"2002-10-22T06:15:30"},{"date":"2003-06-24T19:24:37","version":"0.93"},{"date":"2003-06-26T19:41:04","version":"0.94"},{"date":"2003-08-25T22:47:30","version":"0.95"},{"version":"0.96","date":"2004-04-30T17:43:07"},{"version":"0.97","date":"2005-07-17T09:20:02"},{"date":"2006-06-12T14:37:33","version":"0.98"},{"version":"0.98","date":"2006-06-12T14:48:30"},{"date":"2006-07-17T15:05:06","version":"0.99"},{"date":"2006-07-18T13:33:27","version":"0.99"},{"version":"0.99","date":"2006-07-20T05:59:15"},{"date":"2006-07-20T08:35:45","version":"0.99"},{"date":"2006-07-24T14:27:43","version":"0.99"},{"version":"0.99","date":"2006-08-02T07:30:04"},{"version":"0.99","date":"2006-08-02T07:37:59"},{"date":"2006-08-02T20:43:25","version":"0.99"},{"date":"2006-08-11T10:01:10","version":"0.99"},{"date":"2006-08-15T20:22:28","version":"0.99"},{"version":"0.99","date":"2006-09-12T14:16:38"},{"date":"2006-09-13T11:10:06","version":"0.99"},{"version":"0.99","date":"2006-12-01T09:57:52"},{"version":"0.99","date":"2007-03-06T18:12:09"},{"version":"0.99","date":"2007-03-28T19:06:21"},{"version":"0.99","date":"2007-04-16T19:35:58"},{"date":"2007-04-30T07:45:00","version":"0.99"},{"date":"2007-06-03T19:46:51","version":"0.99"},{"version":"0.99","date":"2007-06-06T13:59:06"},{"date":"2007-08-10T09:07:39","version":"0.99"},{"date":"2007-09-13T19:40:43","version":"0.99"},{"date":"2007-10-09T21:18:11","version":"0.99"},{"version":"0.99","date":"2007-10-10T18:49:29"},{"date":"2007-10-26T06:29:26","version":"0.99"},{"date":"2008-01-11T17:59:06","version":"0.99"},{"date":"2008-01-28T06:44:08","version":"0.99"},{"version":"0.99","date":"2008-02-22T09:07:12"},{"version":"0.99","date":"2008-02-24T09:42:37"},{"version":"0.99","date":"2008-02-25T21:18:02"},{"date":"2008-03-10T08:46:06","version":"0.99"},{"date":"2008-07-16T09:27:07","version":"0.99"},{"date":"2008-08-28T20:03:28","version":"0.99"},{"version":"0.99","date":"2008-09-19T06:34:13"},{"date":"2008-09-19T16:54:30","version":"0.99"},{"date":"2008-09-24T07:52:48","version":"0.99"},{"version":"0.99","date":"2008-09-25T09:24:39"},{"date":"2008-10-13T09:06:13","version":"0.99"},{"version":"0.99","date":"2008-11-17T17:21:39"},{"date":"2008-12-31T14:47:59","version":"0.99"},{"date":"2009-01-15T20:52:54","version":"0.99"},{"date":"2009-01-22T20:59:47","version":"0.99"},{"date":"2009-01-24T06:34:00","version":"0.99"},{"date":"2009-02-23T09:59:39","version":"1.23"},{"version":"1.24","date":"2009-04-01T08:02:14"},{"version":"1.25","date":"2009-07-02T18:15:35"},{"date":"2009-07-03T07:36:23","version":"1.26"},{"version":"1.27","date":"2009-07-24T06:37:32"},{"version":"1.28","date":"2009-08-19T10:46:35"},{"version":"1.29","date":"2009-08-19T10:54:30"},{"version":"1.30","date":"2009-08-19T14:41:37"},{"date":"2009-09-01T07:44:10","version":"1.30_2"},{"version":"1.30_3","date":"2009-09-02T05:57:30"},{"date":"2009-09-25T19:10:53","version":"1.31"},{"date":"2010-02-22T09:39:43","version":"1.32"},{"date":"2010-03-17T12:53:27","version":"1.33"},{"date":"2010-11-01T08:55:36","version":"1.34"},{"version":"1.35","date":"2010-12-06T08:16:23"},{"date":"2010-12-08T19:28:31","version":"1.36"},{"version":"1.37","date":"2010-12-09T08:38:47"},{"version":"1.38","date":"2011-01-18T08:45:03"},{"date":"2011-03-03T11:39:29","version":"1.39"},{"date":"2011-05-02T10:32:52","version":"1.40"},{"version":"1.41","date":"2011-05-10T05:14:22"},{"date":"2011-05-10T14:15:57","version":"1.42"},{"date":"2011-05-11T08:23:15","version":"1.43"},{"version":"1.43_1","date":"2011-05-12T19:35:25"},{"date":"2011-05-27T11:46:14","version":"1.44"},{"version":"1.45","date":"2011-10-13T08:42:32"},{"version":"1.46","date":"2011-10-18T06:30:07"},{"date":"2011-10-21T07:09:03","version":"1.47"},{"date":"2011-10-26T16:35:42","version":"1.48"},{"date":"2011-10-28T08:26:49","version":"1.49"},{"date":"2011-12-06T21:14:17","version":"1.50"},{"date":"2011-12-06T21:25:05","version":"1.51"},{"version":"1.52","date":"2011-12-07T08:12:01"},{"date":"2011-12-11T21:45:13","version":"1.53"},{"version":"1.54","date":"2012-01-11T08:15:23"},{"date":"2012-02-20T06:49:04","version":"1.55"},{"version":"1.56","date":"2012-02-22T15:49:39"},{"version":"1.57","date":"2012-02-26T21:57:54"},{"version":"1.58","date":"2012-02-26T22:09:30"},{"date":"2012-03-08T10:44:05","version":"1.59"},{"date":"2012-03-20T18:59:41","version":"1.60"},{"date":"2012-03-27T14:34:36","version":"1.61"},{"date":"2012-03-28T05:53:19","version":"1.62"},{"version":"1.63","date":"2012-04-06T20:33:58"},{"version":"1.64","date":"2012-04-06T21:04:54"},{"version":"1.65","date":"2012-04-16T16:51:54"},{"date":"2012-04-16T18:52:52","version":"1.66"},{"version":"1.67","date":"2012-05-07T09:39:11"},{"version":"1.68","date":"2012-05-07T13:01:38"},{"date":"2012-05-08T08:24:35","version":"1.69"},{"version":"1.70","date":"2012-05-08T09:18:24"},{"date":"2012-05-09T08:41:48","version":"1.71"},{"version":"1.72","date":"2012-05-10T11:10:15"},{"version":"1.73","date":"2012-05-11T19:29:42"},{"version":"1.74","date":"2012-05-13T15:19:26"},{"date":"2012-06-07T17:42:47","version":"1.74_1"},{"version":"1.74_2","date":"2012-06-07T21:59:28"},{"version":"1.75","date":"2012-06-15T12:42:21"},{"date":"2012-06-18T06:20:09","version":"1.76"},{"version":"1.77","date":"2012-10-05T05:36:56"},{"version":"1.78","date":"2012-11-25T14:08:27"},{"version":"1.79","date":"2012-11-25T15:50:09"},{"date":"2012-11-30T07:47:23","version":"1.80"},{"version":"1.81","date":"2012-12-06T09:14:04"},{"date":"2013-01-28T07:41:50","version":"1.82"},{"version":"1.83","date":"2013-02-03T19:04:27"},{"version":"1.831","date":"2013-02-14T08:05:20"},{"version":"1.84","date":"2013-02-15T20:48:12"},{"date":"2013-04-14T08:59:30","version":"1.85"},{"date":"2013-04-17T11:31:18","version":"1.86"},{"version":"1.87","date":"2013-04-24T18:16:01"},{"date":"2013-05-02T05:59:47","version":"1.88"},{"date":"2013-05-14T13:36:49","version":"1.89"},{"version":"1.90","date":"2013-05-29T18:58:35"},{"version":"1.91","date":"2013-05-30T09:36:07"},{"date":"2013-05-30T19:20:11","version":"1.92"},{"version":"1.93","date":"2013-05-31T06:14:58"},{"version":"1.94","date":"2013-06-01T12:46:14"},{"date":"2013-07-03T08:44:53","version":"1.950"},{"date":"2013-07-03T10:02:42","version":"1.951"},{"date":"2013-07-11T20:14:18","version":"1.952"},{"date":"2013-07-22T06:34:31","version":"1.953"},{"date":"2013-09-15T13:05:33","version":"1.954"},{"date":"2013-10-11T16:54:45","version":"1.955"},{"version":"1.956","date":"2013-11-10T18:00:08"},{"date":"2013-11-11T08:42:30","version":"1.957"},{"version":"1.958","date":"2013-11-11T18:28:16"},{"date":"2013-11-12T15:39:42","version":"1.959"},{"date":"2013-11-13T00:10:43","version":"1.960"},{"date":"2013-11-26T14:47:11","version":"1.961"},{"date":"2013-11-27T21:19:25","version":"1.962"},{"date":"2014-01-13T13:05:48","version":"1.963"},{"version":"1.964","date":"2014-01-15T11:36:49"},{"date":"2014-01-16T19:11:32","version":"1.965"},{"version":"1.966","date":"2014-01-21T16:53:39"},{"date":"2014-02-06T22:06:14","version":"1.967"},{"date":"2014-03-13T06:38:27","version":"1.968"},{"date":"2014-03-16T16:41:39","version":"1.969"},{"date":"2014-03-19T05:04:51","version":"1.970"},{"version":"1.971","date":"2014-03-22T19:54:06"},{"date":"2014-03-23T06:48:23","version":"1.972"},{"date":"2014-03-26T07:10:22","version":"1.973"},{"version":"1.974","date":"2014-04-02T06:53:53"},{"date":"2014-04-02T10:14:38","version":"1.975"},{"date":"2014-04-04T04:36:04","version":"1.976"},{"version":"1.977","date":"2014-04-04T13:25:28"},{"version":"1.978","date":"2014-04-04T14:21:32"},{"version":"1.979","date":"2014-04-06T06:24:29"},{"date":"2014-04-08T01:25:10","version":"1.980"},{"date":"2014-04-08T11:09:59","version":"1.981"},{"date":"2014-04-24T20:14:47","version":"1.982"},{"version":"1.982_1","date":"2014-04-27T12:02:16"},{"date":"2014-05-04T08:03:37","version":"1.983"},{"date":"2014-05-10T13:11:17","version":"1.984"},{"version":"1.985","date":"2014-05-15T06:30:28"},{"version":"1.986","date":"2014-05-16T17:41:46"},{"version":"1.987","date":"2014-05-17T15:03:37"},{"version":"1.988","date":"2014-05-17T22:15:10"},{"date":"2014-05-24T08:16:00","version":"1.989"},{"version":"1.989_1","date":"2014-05-26T05:46:04"},{"version":"1.990","date":"2014-05-27T11:00:11"},{"date":"2014-05-27T19:43:31","version":"1.991"},{"version":"1.992","date":"2014-06-01T21:47:49"},{"date":"2014-06-13T20:45:52","version":"1.993"},{"date":"2014-06-22T09:53:11","version":"1.994"},{"date":"2014-07-11T21:50:48","version":"1.995"},{"date":"2014-07-12T11:49:12","version":"1.996"},{"date":"2014-07-12T17:24:04","version":"1.997"},{"version":"1.998","date":"2014-09-07T14:59:47"},{"date":"2014-10-09T19:56:19","version":"1.999"},{"version":"2.000","date":"2014-10-16T05:05:11"},{"version":"2.001","date":"2014-10-21T09:46:39"},{"date":"2014-10-21T21:00:54","version":"2.002"},{"date":"2014-11-14T20:12:08","version":"2.003"},{"date":"2014-11-15T10:05:06","version":"2.004"},{"version":"2.004_1","date":"2014-11-15T10:14:17"},{"date":"2014-11-15T16:29:13","version":"2.005"},{"version":"2.005_1","date":"2014-11-15T16:34:37"},{"version":"2.006","date":"2014-11-22T20:51:08"},{"date":"2014-11-26T22:00:05","version":"2.007"},{"date":"2014-12-16T06:36:16","version":"2.008"},{"version":"2.009","date":"2015-01-12T10:48:21"},{"date":"2015-01-14T20:13:41","version":"2.010"},{"date":"2015-02-01T16:00:22","version":"2.011"},{"date":"2015-02-02T07:46:57","version":"2.012"},{"date":"2015-05-01T15:39:14","version":"2.013"},{"date":"2015-05-05T06:31:37","version":"2.014"},{"version":"2.015","date":"2015-05-13T20:43:55"},{"date":"2015-05-26T21:15:38","version":"2.015_001"},{"version":"2.015_002","date":"2015-05-27T05:39:14"},{"date":"2015-05-27T17:24:09","version":"2.015_003"},{"version":"2.015_004","date":"2015-05-28T07:07:25"},{"date":"2015-05-29T06:01:37","version":"2.015_005"},{"version":"2.015_006","date":"2015-06-02T19:35:20"},{"date":"2015-06-02T20:41:45","version":"2.016"},{"date":"2015-06-04T14:38:29","version":"2.016_001"},{"version":"2.016_002","date":"2015-06-14T17:05:06"},{"date":"2015-08-24T15:45:30","version":"2.017"},{"version":"2.018","date":"2015-08-27T11:31:55"},{"version":"2.019","date":"2015-09-01T05:32:47"},{"date":"2015-09-20T10:33:59","version":"2.020"},{"date":"2015-12-02T19:55:29","version":"2.021"},{"date":"2015-12-10T07:12:46","version":"2.022"},{"version":"2.023","date":"2016-01-30T11:12:14"},{"date":"2016-02-06T19:38:18","version":"2.024"},{"version":"2.025","date":"2016-04-04T07:23:02"},{"version":"2.026","date":"2016-04-20T06:11:37"},{"date":"2016-04-20T14:22:50","version":"2.027"},{"date":"2016-06-27T14:22:02","version":"2.028"},{"version":"2.029","date":"2016-06-27T15:53:16"},{"date":"2016-07-08T08:53:04","version":"2.030"},{"version":"2.031","date":"2016-07-08T11:40:31"},{"version":"2.032","date":"2016-07-12T13:12:57"},{"date":"2016-07-15T09:00:38","version":"2.033"},{"version":"2.034","date":"2016-08-08T08:19:05"},{"date":"2016-08-11T14:25:18","version":"2.035"},{"version":"2.036","date":"2016-08-11T19:03:38"},{"version":"2.037","date":"2016-08-22T17:39:32"},{"version":"2.038","date":"2016-09-17T09:36:29"},{"version":"2.039","date":"2016-11-20T21:01:59"},{"date":"2016-12-17T15:18:35","version":"2.040"},{"date":"2017-01-04T05:17:55","version":"2.041"},{"version":"2.042","date":"2017-01-05T18:32:13"},{"version":"2.043","date":"2017-01-06T13:27:56"},{"date":"2017-01-26T10:46:57","version":"2.044"},{"version":"2.045","date":"2017-02-13T15:26:59"},{"version":"2.046","date":"2017-02-15T18:41:05"},{"version":"2.047","date":"2017-02-16T19:01:01"},{"date":"2017-04-16T18:33:09","version":"2.048"},{"date":"2017-06-12T05:15:34","version":"2.049"},{"version":"2.050","date":"2017-08-18T06:07:18"},{"version":"2.051","date":"2017-09-05T09:28:25"},{"version":"2.052","date":"2017-10-22T08:48:29"},{"date":"2018-01-21T19:41:38","version":"2.053"},{"date":"2018-01-22T05:11:45","version":"2.054"},{"date":"2018-02-15T13:45:54","version":"2.055"},{"version":"2.056","date":"2018-02-19T06:35:28"},{"date":"2018-07-18T19:16:28","version":"2.057"},{"date":"2018-07-19T07:54:24","version":"2.058"},{"date":"2018-08-15T16:13:05","version":"2.059"},{"version":"2.060","date":"2018-09-16T19:15:07"},{"date":"2019-02-23T02:08:16","version":"2.061"},{"version":"2.062","date":"2019-02-24T00:14:55"},{"date":"2019-03-01T14:48:40","version":"2.063"},{"version":"2.064","date":"2019-03-04T12:28:12"},{"version":"2.065","date":"2019-03-05T18:50:40"},{"date":"2019-03-06T06:55:56","version":"2.066"},{"version":"2.067","date":"2020-02-14T17:49:51"},{"date":"2020-03-31T06:15:39","version":"2.068"},{"date":"2021-01-22T16:55:49","version":"2.069"},{"date":"2021-02-26T08:03:24","version":"2.070"},{"version":"2.071","date":"2021-05-23T08:12:02"},{"date":"2021-08-16T13:06:40","version":"2.072"},{"version":"2.073","date":"2021-12-22T19:30:42"},{"version":"2.074","date":"2022-01-07T15:09:53"},{"version":"2.075","date":"2022-09-02T18:18:33"},{"version":"2.076","date":"2022-11-14T13:41:15"},{"version":"2.077","date":"2022-11-21T11:44:16"},{"version":"2.078","date":"2022-12-11T20:10:13"},{"date":"2023-01-16T06:28:01","version":"2.079"},{"date":"2023-01-18T16:28:53","version":"2.080"},{"version":"2.081","date":"2023-01-25T10:49:10"},{"version":"2.082","date":"2023-05-17T20:41:22"},{"date":"2023-05-18T09:15:20","version":"2.083"},{"version":"2.084","date":"2023-11-06T21:02:36"},{"version":"2.085","date":"2024-01-22T19:07:08"},{"date":"2024-07-03T12:14:36","version":"2.086"},{"version":"2.087","date":"2024-07-08T05:33:53"},{"version":"2.088","date":"2024-07-14T05:05:54"},{"date":"2024-08-29T14:46:00","version":"2.089"}]},"Catalyst-Runtime":{"versions":[{"version":"5.70_01","date":"2006-06-25T19:20:53"},{"version":"5.70_02","date":"2006-06-27T18:10:20"},{"version":"5.70_03","date":"2006-06-28T21:50:30"},{"version":"5.7000","date":"2006-07-07T22:47:30"},{"date":"2006-07-20T06:00:58","version":"5.7001"},{"date":"2006-09-19T07:36:29","version":"5.7002"},{"date":"2006-09-23T17:43:12","version":"5.7003"},{"version":"5.7004","date":"2006-11-06T23:28:40"},{"version":"5.7005","date":"2006-11-07T19:43:56"},{"date":"2006-11-15T08:27:59","version":"5.7006"},{"date":"2007-03-14T11:13:37","version":"5.7007"},{"date":"2007-08-13T06:36:11","version":"5.7008"},{"date":"2007-08-21T22:23:53","version":"5.7009"},{"version":"5.7010","date":"2007-08-22T05:51:41"},{"version":"5.7011","date":"2007-10-18T18:11:24"},{"version":"5.7012","date":"2007-12-17T08:19:28"},{"date":"2008-05-17T12:41:13","version":"5.7013"},{"version":"5.7013","date":"2008-05-25T21:16:45"},{"version":"5.7099_01","date":"2008-06-25T20:43:41"},{"version":"5.7099_02","date":"2008-07-18T11:41:25"},{"version":"5.7099_02","date":"2008-07-20T08:15:02"},{"version":"5.7099_02","date":"2008-10-13T20:55:41"},{"date":"2008-10-14T06:06:06","version":"5.7099_02"},{"version":"5.7015","date":"2008-10-15T21:44:15"},{"version":"5.8000_03","date":"2008-10-17T12:42:53"},{"date":"2008-12-05T15:11:14","version":"5.8000_04"},{"date":"2009-01-12T15:46:59","version":"5.7099_04"},{"date":"2009-01-19T17:36:04","version":"5.71000"},{"date":"2009-01-29T08:56:09","version":"5.8000_05"},{"version":"5.8000_06","date":"2009-02-04T20:08:22"},{"version":"5.71001","date":"2009-03-27T09:21:12"},{"date":"2009-04-13T19:03:36","version":"5.8000_07"},{"date":"2009-04-18T20:26:00","version":"5.80001"},{"version":"5.80002","date":"2009-04-21T23:45:45"},{"date":"2009-04-29T14:39:21","version":"5.80003"},{"version":"5.80004","date":"2009-05-18T15:16:38"},{"version":"5.80005","date":"2009-06-06T12:49:15"},{"version":"5.80006","date":"2009-06-29T22:11:48"},{"version":"5.80007","date":"2009-06-30T22:11:36"},{"date":"2009-08-21T16:14:33","version":"5.80008"},{"version":"5.80009","date":"2009-08-21T20:29:33"},{"version":"5.80010","date":"2009-08-21T21:42:08"},{"version":"5.80011","date":"2009-08-23T11:57:26"},{"date":"2009-09-09T18:01:32","version":"5.80012"},{"version":"5.80013","date":"2009-09-17T09:35:20"},{"version":"5.80014","date":"2009-11-21T02:32:20"},{"version":"5.80014_01","date":"2009-11-22T20:24:47"},{"date":"2009-12-01T01:14:00","version":"5.80014_02"},{"version":"5.80015","date":"2009-12-02T15:42:50"},{"date":"2009-12-11T23:37:44","version":"5.80016"},{"version":"5.80017","date":"2010-01-10T02:01:50"},{"version":"5.80018","date":"2010-01-12T21:39:47"},{"date":"2010-01-29T00:18:07","version":"5.80019"},{"date":"2010-02-04T06:19:31","version":"5.80020"},{"date":"2010-03-03T23:16:29","version":"5.80021"},{"version":"5.80022","date":"2010-03-28T19:25:48"},{"version":"5.80023","date":"2010-05-07T22:07:08"},{"date":"2010-05-15T09:57:52","version":"5.80024"},{"date":"2010-07-29T00:59:16","version":"5.80025"},{"date":"2010-09-01T15:10:42","version":"5.80026"},{"date":"2010-09-02T11:33:03","version":"5.80027"},{"version":"5.80028","date":"2010-09-28T20:14:11"},{"date":"2010-10-03T16:24:08","version":"5.80029"},{"date":"2011-01-04T12:56:30","version":"5.80030"},{"date":"2011-01-24T10:50:27","version":"5.89000"},{"date":"2011-01-31T08:25:21","version":"5.80031"},{"date":"2011-02-23T08:28:58","version":"5.80032"},{"version":"5.89001","date":"2011-03-01T14:56:37"},{"date":"2011-03-02T10:37:42","version":"5.89002"},{"version":"5.80033","date":"2011-07-24T15:58:37"},{"date":"2011-07-28T20:05:01","version":"5.89003"},{"date":"2011-08-15T21:35:34","version":"5.9000"},{"date":"2011-08-15T21:59:58","version":"5.90001"},{"date":"2011-08-22T20:55:10","version":"5.90002"},{"version":"5.90003","date":"2011-10-05T07:48:57"},{"date":"2011-10-11T15:19:05","version":"5.90004"},{"date":"2011-10-22T21:01:24","version":"5.90005"},{"version":"5.90006","date":"2011-10-25T17:54:34"},{"date":"2011-11-22T20:40:44","version":"5.90007"},{"version":"5.90008","date":"2012-02-06T21:08:28"},{"date":"2012-02-16T09:29:44","version":"5.90009"},{"version":"5.90010","date":"2012-02-18T00:49:30"},{"date":"2012-03-08T21:53:00","version":"5.90011"},{"date":"2012-05-19T07:13:21","version":"5.90012"},{"version":"5.90013","date":"2012-06-08T00:37:40"},{"date":"2012-06-21T20:41:41","version":"5.90013"},{"date":"2012-06-26T14:34:56","version":"5.90014"},{"version":"5.90015","date":"2012-06-30T18:00:53"},{"version":"5.90016","date":"2012-08-17T01:39:42"},{"date":"2012-10-19T21:51:54","version":"5.90017"},{"date":"2012-10-24T01:01:44","version":"5.90018"},{"date":"2012-12-04T22:04:19","version":"5.90019"},{"version":"5.90020","date":"2013-02-22T14:05:39"},{"version":"5.90030","date":"2013-04-12T17:09:27"},{"version":"5.90040","date":"2013-06-12T21:26:14"},{"version":"5.90041","date":"2013-06-15T02:10:17"},{"date":"2013-06-16T01:57:47","version":"5.90042"},{"version":"5.90049_001","date":"2013-07-26T19:13:01"},{"date":"2013-08-21T02:39:45","version":"5.90049_002"},{"version":"5.90049_003","date":"2013-09-20T19:03:54"},{"date":"2013-10-18T22:19:33","version":"5.90049_004"},{"date":"2013-10-31T20:48:42","version":"5.90049_005"},{"date":"2013-11-05T03:25:31","version":"5.90049_006"},{"version":"5.90050","date":"2013-11-05T22:35:22"},{"version":"5.90051","date":"2013-11-07T17:14:35"},{"version":"5.90052","date":"2013-12-18T20:03:22"},{"version":"5.90059_001","date":"2013-12-19T14:33:08"},{"date":"2013-12-22T16:18:16","version":"5.90053"},{"version":"5.90059_002","date":"2013-12-22T16:34:11"},{"version":"5.90059_003","date":"2013-12-27T02:27:08"},{"date":"2014-01-27T17:20:51","version":"5.90059_004"},{"version":"5.90059_005","date":"2014-01-28T19:36:58"},{"date":"2014-02-06T20:41:25","version":"5.90059_006"},{"version":"5.90060","date":"2014-02-08T03:11:11"},{"version":"5.90061","date":"2014-03-10T14:46:10"},{"date":"2014-04-14T18:53:26","version":"5.90062"},{"version":"5.90063","date":"2014-05-02T00:15:16"},{"version":"5.90064","date":"2014-05-05T14:55:25"},{"date":"2014-05-27T18:08:08","version":"5.90069_001"},{"date":"2014-06-05T12:44:59","version":"5.90065"},{"version":"5.90069_002","date":"2014-06-10T00:22:42"},{"version":"5.90069_003","date":"2014-08-06T15:09:29"},{"date":"2014-08-07T15:59:15","version":"5.90069_004"},{"version":"5.90070","date":"2014-08-07T21:49:59"},{"version":"5.90071","date":"2014-08-10T13:15:52"},{"date":"2014-09-15T16:30:58","version":"5.90072"},{"date":"2014-09-23T17:24:54","version":"5.90073"},{"date":"2014-10-01T21:45:12","version":"5.90074"},{"date":"2014-10-07T00:07:51","version":"5.90075"},{"date":"2014-11-14T00:20:16","version":"5.90076"},{"version":"5.90077","date":"2014-11-19T00:28:27"},{"date":"2014-12-02T21:50:30","version":"5.90079_001"},{"date":"2014-12-02T23:22:07","version":"5.90079_002"},{"date":"2014-12-03T19:45:16","version":"5.90079_003"},{"date":"2014-12-26T23:05:46","version":"5.90079_004"},{"date":"2014-12-31T16:26:20","version":"5.90078"},{"date":"2014-12-31T21:04:56","version":"5.90079_005"},{"date":"2015-01-02T15:11:55","version":"5.90079_006"},{"date":"2015-01-02T18:11:38","version":"5.90079"},{"date":"2015-01-07T20:01:40","version":"5.90079_007"},{"version":"5.90079_008","date":"2015-01-07T23:26:17"},{"version":"5.90080","date":"2015-01-09T17:04:47"},{"version":"5.90081","date":"2015-01-10T22:39:56"},{"version":"5.90082","date":"2015-01-10T23:33:56"},{"date":"2015-02-17T02:29:50","version":"5.90083"},{"version":"5.90084","date":"2015-02-23T22:24:50"},{"version":"5.90085","date":"2015-03-25T18:58:11"},{"version":"5.90089_001","date":"2015-03-26T21:30:15"},{"version":"5.90089_002","date":"2015-04-17T21:32:30"},{"version":"5.90089_003","date":"2015-04-27T20:20:40"},{"version":"5.90089_004","date":"2015-04-28T18:24:12"},{"date":"2015-04-29T14:04:24","version":"5.90090"},{"version":"5.90091","date":"2015-05-08T20:36:59"},{"version":"5.90092","date":"2015-05-19T16:48:30"},{"version":"5.90093","date":"2015-05-29T17:06:23"},{"date":"2015-07-24T20:17:46","version":"5.90094"},{"date":"2015-07-27T14:32:30","version":"5.90095"},{"date":"2015-07-27T15:44:59","version":"5.90096"},{"version":"5.90097","date":"2015-07-28T20:33:41"},{"version":"5.90100","date":"2015-08-24T16:30:12"},{"version":"5.90101","date":"2015-09-04T22:57:40"},{"version":"5.90102","date":"2015-10-29T19:39:24"},{"version":"5.90103","date":"2015-11-12T10:19:42"},{"version":"5.90104","date":"2016-04-04T17:18:38"},{"version":"5.90105","date":"2016-06-08T20:06:53"},{"date":"2016-07-06T01:21:42","version":"5.90106"},{"date":"2016-07-20T19:12:32","version":"5.90110"},{"date":"2016-07-20T20:07:16","version":"5.90111"},{"date":"2016-07-25T21:03:05","version":"5.90112"},{"version":"5.90113","date":"2016-12-15T21:35:30"},{"version":"5.90114","date":"2016-12-19T16:54:08"},{"version":"5.90115","date":"2017-05-01T16:42:46"},{"version":"5.90116","date":"2018-01-19T20:55:15"},{"date":"2018-01-21T23:47:21","version":"5.90117"},{"date":"2018-05-01T09:59:20","version":"5.90118"},{"date":"2018-09-24T00:25:48","version":"5.90119"},{"version":"5.90120","date":"2018-10-19T06:13:58"},{"version":"5.90_121","date":"2018-10-22T20:39:48"},{"version":"5.90122","date":"2018-11-03T14:52:06"},{"date":"2018-11-27T15:39:35","version":"5.90123"},{"date":"2019-01-18T22:36:07","version":"5.90124"},{"version":"5.90125","date":"2020-01-19T01:11:05"},{"version":"5.90126","date":"2020-01-20T01:40:16"},{"date":"2020-07-27T01:25:21","version":"5.90_127"},{"date":"2020-09-11T12:38:26","version":"5.90128"},{"date":"2022-07-23T13:13:34","version":"5.90129"},{"date":"2022-11-09T15:37:01","version":"5.90130"},{"date":"2023-07-20T23:09:29","version":"5.90131"},{"date":"2024-11-08T19:56:41","version":"5.90132"}],"main_module":"Catalyst::Runtime","advisories":[{"fixed_versions":[">=5.90020"],"id":"CPANSA-Catalyst-Runtime-2013-01","description":"Passing a special host to the redirect page link makes it vulnerable to XSS attack.\n","references":["http://git.shadowcat.co.uk/gitweb/gitweb.cgi?p=catagits/Catalyst-Runtime.git;a=commitdiff;h=7af54927870a7c6f89323ac1876d49f92e7841f5"],"affected_versions":["<5.90020"],"reported":"2013-01-23","distribution":"Catalyst-Runtime","cves":[]},{"cves":[],"affected_versions":["<5.58"],"reported":"2005-11-24","distribution":"Catalyst-Runtime","description":"Path traversal in Static::Simple plugin.\n","fixed_versions":[">=5.58"],"id":"CPANSA-Catalyst-Runtime-2005-01"}]},"libwww-perl":{"main_module":"LWP","advisories":[{"id":"CPANSA-libwww-perl-2017-01","fixed_versions":[">=6.27"],"description":"LWP::Protocol::file can open existent file from file:// scheme. However, current version of LWP uses open FILEHANDLE,EXPR and it has ability to execute arbitrary command\n","references":["https://github.com/libwww-perl/libwww-perl/pull/270"],"distribution":"libwww-perl","reported":"2017-11-06","affected_versions":["<6.28"],"reviewed_by":[{"date":"2022-06-23","email":"rrwo@cpan.org","name":"Robert Rothenberg"}],"cves":[]},{"id":"CPANSA-libwww-perl-2011-01","fixed_versions":[">=6.00"],"description":"The Net::HTTPS module in libwww-perl (LWP) before 6.00, as used in WWW::Mechanize, LWP::UserAgent, and other products, when running in environments that do not set the If-SSL-Cert-Subject header, does not enable full validation of SSL certificates by default, which allows remote attackers to spoof servers via man-in-the-middle (MITM) attacks involving hostnames that are not properly validated.\n","references":["http://vttynotes.blogspot.com/2010/12/man-in-middle-fun-with-perl-lwp.html","http://vttynotes.blogspot.com/2011/03/quick-note-on-lwp-and-perl-security-cve.html"],"reported":"2011-01-20","distribution":"libwww-perl","affected_versions":["<6.00"],"cves":["CVE-2011-0633"]},{"references":["http://vttynotes.blogspot.com/2010/12/man-in-middle-fun-with-perl-lwp.html","http://vttynotes.blogspot.com/2011/03/quick-note-on-lwp-and-perl-security-cve.html"],"description":"lwp-download in libwww-perl before 5.835 does not reject downloads to filenames that begin with a . (dot) character, which allows remote servers to create or overwrite files via (1) a 3xx redirect to a URL with a crafted filename or (2) a Content-Disposition header that suggests a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory.\n","id":"CPANSA-libwww-perl-2010-01","fixed_versions":[">=5.835"],"cves":["CVE-2010-2253"],"reported":"2010-07-06","distribution":"libwww-perl","affected_versions":["<5.835"]},{"description":"If LWP::UserAgent::env_proxy is called in a CGI environment, the case-insensitivity when looking for \"http_proxy\" permits \"HTTP_PROXY\" to be found, but this can be trivially set by the web client using the \"Proxy:\" header.\n","id":"CPANSA-libwww-perl-2001-01","fixed_versions":[">=5.51"],"cves":[],"reported":"2001-03-14","distribution":"libwww-perl","affected_versions":["<5.51"]},{"cves":[],"affected_versions":["<0.04"],"distribution":"libwww-perl","reported":"1995-09-06","description":"There is a security hole with the implementation of getBasicCredentials().\n","references":["https://metacpan.org/dist/libwww-perl/changes"],"fixed_versions":[">=0.04"],"id":"CPANSA-libwww-perl-1995-01"}],"versions":[{"version":"5","date":"1995-09-16T13:51:35"},{"version":"5","date":"1995-11-06T14:29:13"},{"date":"1996-05-09T22:43:16","version":"5"},{"date":"1996-05-26T14:01:51","version":"5.00"},{"version":"5.01","date":"1996-08-02T16:38:58"},{"date":"1996-09-11T16:19:57","version":"5.02"},{"version":"5.03","date":"1996-09-30T22:58:37"},{"date":"1996-10-22T10:39:33","version":"5.04"},{"date":"1996-12-04T23:36:17","version":"5.05"},{"date":"1997-01-27T23:53:38","version":"5.06"},{"date":"1997-02-11T14:20:18","version":"5.07"},{"version":"5.08","date":"1997-04-05T13:10:16"},{"version":"5.09","date":"1997-06-10T11:07:01"},{"date":"1997-06-20T10:51:10","version":"5.10"},{"date":"1997-08-06T08:41:11","version":"5.11"},{"version":"5.12","date":"1997-09-05T09:38:58"},{"date":"1997-09-20T12:50:59","version":"5.13"},{"date":"1997-10-12T20:55:32","version":"5.14"},{"version":"5.15","date":"1997-11-06T20:23:06"},{"version":"5.18","date":"1997-12-12T17:44:29"},{"version":"5.18_03","date":"1997-12-16T22:25:00"},{"date":"1997-12-17T10:08:54","version":"5.18_04"},{"date":"1998-01-20T18:16:51","version":"5.18_05"},{"date":"1998-01-26T23:55:39","version":"5.19"},{"date":"1998-02-12T23:43:23","version":"5.20"},{"version":"5.21","date":"1998-03-12T18:39:08"},{"version":"5.22","date":"1998-03-24T19:42:54"},{"version":"5.30","date":"1998-03-31T22:25:14"},{"date":"1998-04-10T15:07:10","version":"5.31"},{"version":"5.32","date":"1998-04-17T05:23:45"},{"version":"5.33","date":"1998-05-07T15:10:00"},{"date":"1998-07-07T16:06:51","version":"5.34"},{"version":"5.35","date":"1998-07-09T23:05:12"},{"version":"5.36","date":"1998-08-04T15:15:44"},{"date":"1998-10-12T17:42:28","version":"5.40_01"},{"date":"1998-11-19T22:17:29","version":"5.41"},{"date":"1999-03-20T07:52:48","version":"5.42"},{"date":"1999-05-09T19:26:17","version":"5.43"},{"version":"5.44","date":"1999-06-25T20:34:40"},{"version":"5.45","date":"1999-09-20T13:36:22"},{"date":"1999-10-28T12:30:45","version":"5.46"},{"version":"5.47","date":"1999-11-16T14:59:58"},{"date":"2000-04-09T19:45:32","version":"5.48"},{"date":"2001-01-01T06:35:20","version":"5.49"},{"date":"2001-01-12T20:58:43","version":"5.50"},{"version":"5.51","date":"2001-03-14T21:33:03"},{"date":"2001-03-29T21:39:12","version":"5.52"},{"version":"5.53","date":"2001-04-10T23:15:00"},{"version":"5.53_90","date":"2001-04-19T06:13:35"},{"date":"2001-04-21T05:02:13","version":"5.53_91"},{"version":"5.53_92","date":"2001-04-25T17:37:11"},{"date":"2001-04-29T06:28:31","version":"5.53_93"},{"version":"5.53_94","date":"2001-05-05T13:57:20"},{"date":"2001-08-07T00:46:18","version":"5.53_95"},{"date":"2001-08-28T05:59:46","version":"5.53_96"},{"version":"5.53_97","date":"2001-09-20T00:33:20"},{"version":"5.60","date":"2001-10-26T23:30:57"},{"date":"2001-11-17T02:56:46","version":"5.61"},{"version":"5.62","date":"2001-11-21T19:00:47"},{"date":"2001-12-14T21:01:09","version":"5.63"},{"date":"2002-02-09T18:54:35","version":"5.64"},{"date":"2002-05-31T20:59:15","version":"5.65"},{"version":"5.66","date":"2002-12-20T19:28:34"},{"version":"5.67","date":"2003-01-01T16:53:11"},{"date":"2003-01-03T05:04:44","version":"5.68"},{"date":"2003-01-24T16:55:35","version":"5.69"},{"version":"5.70","date":"2003-10-13T20:56:35"},{"date":"2003-10-14T19:12:56","version":"5.71"},{"date":"2003-10-15T19:53:47","version":"5.72"},{"date":"2003-10-19T20:04:40","version":"5.73"},{"version":"5.74","date":"2003-10-23T19:26:57"},{"date":"2003-10-26T22:10:48","version":"5.75"},{"version":"5.76","date":"2003-11-21T19:33:09"},{"date":"2004-04-06T13:41:45","version":"5.77"},{"date":"2004-04-07T11:13:36","version":"5.78"},{"version":"5.79","date":"2004-04-13T08:09:08"},{"date":"2004-06-16T10:43:42","version":"5.800"},{"date":"2004-11-12T18:32:17","version":"5.801"},{"date":"2004-11-30T13:06:01","version":"5.802"},{"version":"5.803","date":"2004-12-11T15:48:30"},{"version":"5.804","date":"2005-12-06T09:36:12"},{"version":"5.805","date":"2005-12-08T12:29:02"},{"date":"2007-07-19T21:31:44","version":"5.806"},{"date":"2007-07-31T13:14:54","version":"5.807"},{"version":"5.808","date":"2007-08-05T13:29:17"},{"date":"2008-04-08T11:47:19","version":"5.810"},{"version":"5.811","date":"2008-04-14T08:28:19"},{"version":"5.812","date":"2008-04-16T10:32:51"},{"version":"5.813","date":"2008-06-17T20:37:17"},{"version":"5.814","date":"2008-07-25T09:09:53"},{"date":"2008-09-24T18:10:11","version":"5.815"},{"date":"2008-09-29T09:27:09","version":"5.816"},{"date":"2008-10-10T21:31:27","version":"5.817"},{"version":"5.818","date":"2008-10-16T10:32:24"},{"date":"2008-10-20T11:43:37","version":"5.819"},{"version":"5.820","date":"2008-11-05T18:07:29"},{"date":"2008-11-25T00:16:49","version":"5.821"},{"date":"2008-12-05T19:18:40","version":"5.822"},{"date":"2009-01-12T16:50:02","version":"5.823"},{"date":"2009-02-13T14:12:29","version":"5.824"},{"version":"5.825","date":"2009-02-16T10:00:35"},{"version":"5.826","date":"2009-04-24T20:42:45"},{"date":"2009-06-15T19:36:37","version":"5.827"},{"date":"2009-06-25T19:44:55","version":"5.828"},{"date":"2009-07-08T20:03:11","version":"5.829"},{"version":"5.830","date":"2009-07-26T19:39:49"},{"version":"5.831","date":"2009-08-13T20:53:34"},{"version":"5.832","date":"2009-09-21T18:24:41"},{"date":"2009-10-06T21:23:39","version":"5.833"},{"version":"5.834","date":"2009-11-21T13:09:14"},{"version":"5.835","date":"2010-05-05T21:13:47"},{"version":"5.836","date":"2010-05-13T07:34:58"},{"date":"2010-09-20T21:24:38","version":"5.837"},{"date":"2010-11-04T15:16:35","version":"5.837"},{"version":"6.00","date":"2011-03-08T19:25:05"},{"version":"6.01","date":"2011-03-09T23:30:57"},{"version":"6.02","date":"2011-03-27T11:35:01"},{"date":"2011-10-15T13:38:28","version":"6.03"},{"date":"2012-02-18T22:13:13","version":"6.04"},{"date":"2013-03-11T21:47:56","version":"6.05"},{"version":"6.06","date":"2014-04-16T18:38:49"},{"version":"6.07","date":"2014-07-02T05:10:47"},{"date":"2014-07-25T03:19:43","version":"6.08"},{"date":"2015-02-10T02:58:40","version":"6.09"},{"version":"6.10","date":"2015-02-12T17:40:48"},{"version":"6.11","date":"2015-02-13T21:38:49"},{"date":"2015-02-14T00:16:15","version":"6.12"},{"date":"2015-02-14T18:45:12","version":"6.13"},{"version":"6.14_001","date":"2015-11-25T20:23:47"},{"version":"6.15","date":"2015-12-05T06:01:09"},{"date":"2016-01-05T00:29:20","version":"6.15_001"},{"date":"2016-01-14T01:52:18","version":"6.15_002"},{"version":"6.15_003","date":"2016-01-14T02:01:20"},{"version":"6.15_004","date":"2016-02-13T06:18:45"},{"version":"6.16","date":"2017-01-18T14:22:22"},{"date":"2017-01-31T19:39:10","version":"6.17"},{"version":"6.18","date":"2017-02-03T20:31:54"},{"version":"6.19","date":"2017-02-14T19:56:20"},{"version":"6.20","date":"2017-02-21T15:19:06"},{"date":"2017-02-21T20:38:03","version":"6.21"},{"version":"6.22","date":"2017-03-01T15:27:43"},{"date":"2017-03-07T03:49:52","version":"6.23"},{"date":"2017-03-14T16:36:38","version":"6.24"},{"version":"6.25","date":"2017-04-03T17:20:06"},{"version":"6.26","date":"2017-04-12T15:36:20"},{"version":"6.27","date":"2017-09-21T22:32:37"},{"version":"6.28","date":"2017-11-06T15:43:47"},{"version":"6.29","date":"2017-11-06T20:34:56"},{"version":"6.30","date":"2017-12-08T01:57:23"},{"date":"2017-12-11T01:57:47","version":"6.31"},{"version":"6.32","date":"2018-02-20T19:41:40"},{"version":"6.33","date":"2018-02-27T04:04:55"},{"date":"2018-06-05T18:50:45","version":"6.34"},{"version":"6.35","date":"2018-07-16T04:51:16"},{"version":"6.36","date":"2018-10-10T02:21:49"},{"version":"6.37","date":"2019-03-06T20:51:05"},{"date":"2019-03-25T19:00:53","version":"6.38"},{"version":"6.39","date":"2019-05-06T14:19:25"},{"date":"2019-10-24T13:08:25","version":"6.40"},{"version":"6.41","date":"2019-10-28T14:45:05"},{"date":"2019-11-20T17:41:59","version":"6.42"},{"date":"2019-11-26T13:56:02","version":"6.43"},{"version":"6.44","date":"2020-04-14T19:39:37"},{"date":"2020-06-08T14:52:52","version":"6.45"},{"date":"2020-06-23T21:20:14","version":"6.46"},{"date":"2020-08-18T15:28:34","version":"6.47"},{"date":"2020-09-20T15:26:52","version":"6.48"},{"version":"6.49","date":"2020-09-24T00:29:49"},{"version":"6.50","date":"2020-12-16T18:36:35"},{"date":"2020-12-29T22:09:46","version":"6.51"},{"date":"2021-01-07T21:58:27","version":"6.52"},{"date":"2021-03-07T16:55:35","version":"6.53"},{"date":"2021-05-06T17:55:38","version":"6.54"},{"date":"2021-06-17T13:58:40","version":"6.55"},{"date":"2021-08-17T13:58:19","version":"6.56"},{"version":"6.57","date":"2021-09-20T20:29:02"},{"date":"2021-10-25T20:44:12","version":"6.58"},{"date":"2021-12-02T21:20:00","version":"6.59"},{"date":"2021-12-17T22:33:53","version":"6.60"},{"version":"6.61","date":"2022-01-21T21:44:31"},{"version":"6.62","date":"2022-04-05T01:05:20"},{"version":"6.63","date":"2022-04-25T15:25:43"},{"date":"2022-04-26T13:17:45","version":"6.64"},{"date":"2022-05-09T18:42:27","version":"6.65"},{"version":"6.66","date":"2022-05-18T16:57:21"},{"version":"6.67","date":"2022-06-14T20:24:12"},{"version":"6.68","date":"2023-02-27T19:20:03"},{"version":"6.69","date":"2023-04-29T13:15:34"},{"date":"2023-04-30T13:26:14","version":"6.70"},{"date":"2023-06-20T19:46:00","version":"6.71"},{"date":"2023-07-17T22:02:15","version":"6.72"},{"version":"6.73","date":"2024-01-13T20:26:02"},{"version":"6.74","date":"2024-01-22T17:49:13"},{"date":"2024-01-24T14:30:24","version":"6.75"},{"version":"6.76","date":"2024-01-25T18:33:12"},{"version":"6.77","date":"2024-03-11T00:58:25"}]},"XAO-Web":{"versions":[{"version":"1.0","date":"2002-01-03T03:05:25"},{"version":"1.01","date":"2002-01-04T02:47:11"},{"date":"2002-01-04T03:44:00","version":"1.02"},{"version":"1.03","date":"2002-03-19T04:56:54"},{"date":"2002-11-09T02:33:07","version":"1.04"},{"date":"2003-11-13T02:15:48","version":"1.05"},{"date":"2003-11-13T07:09:31","version":"1.05"},{"date":"2005-01-14T01:48:49","version":"1.06"},{"version":"1.07","date":"2005-02-01T03:24:39"},{"version":"1.45","date":"2017-04-19T20:26:55"},{"version":"1.46","date":"2017-04-20T00:32:26"},{"version":"1.47","date":"2017-05-01T19:57:48"},{"version":"1.68","date":"2018-07-07T00:42:57"},{"date":"2018-07-07T03:29:38","version":"1.69"},{"version":"1.70","date":"2018-07-07T16:38:26"},{"date":"2018-07-30T13:35:32","version":"1.71"},{"date":"2018-10-20T00:50:11","version":"1.72"},{"date":"2018-10-25T19:16:09","version":"1.73"},{"version":"1.74","date":"2018-10-30T01:27:58"},{"date":"2019-01-10T02:17:29","version":"1.75"},{"version":"1.76","date":"2019-03-02T17:38:20"},{"version":"1.77","date":"2019-04-26T23:13:56"},{"date":"2019-11-20T20:52:59","version":"1.78"},{"version":"1.79","date":"2019-12-24T02:26:57"},{"date":"2020-01-10T01:19:32","version":"1.80"},{"version":"1.81","date":"2020-07-21T02:08:41"},{"version":"1.82","date":"2020-08-26T22:28:48"},{"version":"1.83","date":"2020-08-26T23:19:26"},{"date":"2020-09-18T03:22:46","version":"1.84"},{"version":"1.85","date":"2020-09-22T23:47:44"},{"version":"1.86","date":"2020-09-23T00:51:16"},{"version":"1.87","date":"2021-06-08T22:38:04"},{"version":"1.88","date":"2022-04-09T02:06:50"},{"version":"1.89","date":"2022-07-02T00:05:43"},{"version":"1.90","date":"2022-12-08T04:50:55"},{"version":"1.91","date":"2023-05-22T21:52:57"}],"advisories":[{"distribution":"XAO-Web","reported":"2020-09-18","affected_versions":["<1.84"],"cves":[],"severity":null,"id":"CPANSA-XAO-Web-2020-01","fixed_versions":[">=1.84"],"description":"Embedded HTML in JSON data was not escaped.\n","references":["https://github.com/amaltsev/XAO-Web/commit/20dd1d3bc5b811503f5722a16037b60197fe7ef4","https://metacpan.org/release/AMALTSEV/XAO-Web-1.84/changes"]}],"main_module":"XAO::Web"},"App-Github-Email":{"versions":[{"date":"2017-01-16T08:03:02","version":"0.0.1"},{"date":"2017-01-16T12:56:51","version":"0.0.2"},{"date":"2017-01-16T17:38:16","version":"0.0.3"},{"version":"0.0.4","date":"2017-03-11T10:45:23"},{"date":"2017-04-05T11:19:02","version":"0.0.5"},{"version":"0.0.6","date":"2017-04-15T17:35:18"},{"date":"2017-05-19T05:05:24","version":"0.0.7"},{"version":"0.1.0","date":"2017-12-18T14:11:19"},{"date":"2017-12-21T08:24:12","version":"0.1.1"},{"version":"0.2.0","date":"2018-01-15T03:18:05"},{"version":"0.2.1","date":"2018-01-20T12:55:34"},{"version":"0.3.1","date":"2018-08-30T16:07:18"},{"version":"0.3.2","date":"2018-08-30T16:13:54"},{"date":"2018-08-31T03:49:31","version":"0.3.3"}],"advisories":[{"distribution":"App-Github-Email","reported":"2018-01-20","affected_versions":["<0.3.3"],"cves":["CVE-2015-7686"],"id":"CPANSA-App-Github-Email-2018-01","fixed_versions":[">=0.3.3"],"description":"Insecure dependency on Email::Address.\n","references":["https://metacpan.org/changes/distribution/App-Github-Email","https://github.com/faraco/App-Github-Email/commit/b7f052280d1c8ae97bdefc106ca3cbba4aea7213"]}],"main_module":"App::Github::Email"},"IO-Compress":{"main_module":"IO::Compress","advisories":[{"cves":["CVE-2016-1238"],"reported":"2016-08-02","distribution":"IO-Compress","affected_versions":["<2.070"],"references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"description":"(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.\n","severity":"high","id":"CPANSA-IO-Compress-2016-1238","fixed_versions":[">=2.070"]}],"versions":[{"date":"2009-04-04T09:49:11","version":"2.017"},{"version":"2.018","date":"2009-05-03T16:27:20"},{"date":"2009-05-04T09:43:44","version":"2.019"},{"version":"2.020","date":"2009-06-03T17:48:41"},{"date":"2009-08-30T20:27:02","version":"2.021"},{"version":"2.022","date":"2009-10-09T21:56:08"},{"date":"2009-11-09T23:43:07","version":"2.023"},{"version":"2.024","date":"2010-01-09T17:56:46"},{"date":"2010-03-28T12:57:23","version":"2.025"},{"date":"2010-04-07T19:51:37","version":"2.026"},{"version":"2.027","date":"2010-04-24T19:16:06"},{"version":"2.030","date":"2010-07-24T14:46:19"},{"date":"2011-01-06T11:24:01","version":"2.032"},{"version":"2.033","date":"2011-01-11T14:03:58"},{"version":"2.034","date":"2011-05-02T21:50:29"},{"date":"2011-05-07T08:32:12","version":"2.035"},{"version":"2.036","date":"2011-06-18T21:45:50"},{"version":"2.037","date":"2011-06-22T07:19:49"},{"date":"2011-10-28T14:28:46","version":"2.039"},{"version":"2.040","date":"2011-10-28T22:20:49"},{"date":"2011-11-17T23:45:33","version":"2.042"},{"version":"2.043","date":"2011-11-20T21:34:13"},{"date":"2011-12-03T22:49:21","version":"2.044"},{"version":"2.045","date":"2011-12-04T19:21:48"},{"version":"2.046","date":"2011-12-18T22:38:32"},{"version":"2.047","date":"2012-01-28T23:28:39"},{"version":"2.048","date":"2012-01-29T17:00:45"},{"version":"2.049","date":"2012-02-18T15:58:24"},{"date":"2012-04-29T12:42:10","version":"2.052"},{"date":"2012-08-05T20:37:36","version":"2.055"},{"version":"2.057","date":"2012-11-10T19:09:13"},{"date":"2012-11-12T22:15:00","version":"2.058"},{"version":"2.059","date":"2012-12-15T13:41:23"},{"date":"2013-01-07T20:02:34","version":"2.060"},{"date":"2013-05-27T09:55:05","version":"2.061"},{"version":"2.062","date":"2013-08-12T19:08:16"},{"date":"2013-11-02T17:15:29","version":"2.063"},{"date":"2014-02-01T23:21:32","version":"2.064"},{"date":"2014-09-21T12:42:45","version":"2.066"},{"date":"2014-12-08T15:14:06","version":"2.067"},{"date":"2014-12-23T17:46:25","version":"2.068"},{"date":"2015-09-26T18:42:09","version":"2.069"},{"date":"2016-12-28T23:09:27","version":"2.070"},{"version":"2.072","date":"2017-02-12T20:41:37"},{"version":"2.073","date":"2017-02-19T20:37:27"},{"date":"2017-02-19T22:11:53","version":"2.074"},{"version":"2.080","date":"2018-04-03T18:22:13"},{"version":"2.081","date":"2018-04-08T15:03:07"},{"date":"2018-12-30T22:40:20","version":"2.083"},{"date":"2019-01-06T08:57:26","version":"2.084"},{"version":"2.086","date":"2019-03-31T19:16:41"},{"date":"2019-08-10T18:12:14","version":"2.087"},{"date":"2019-11-03T09:29:00","version":"2.088"},{"version":"2.089","date":"2019-11-03T19:54:15"},{"date":"2019-11-09T16:00:26","version":"2.090"},{"date":"2019-11-23T19:44:59","version":"2.091"},{"date":"2019-12-04T22:10:26","version":"2.092"},{"date":"2019-12-07T16:05:46","version":"2.093"},{"version":"2.094","date":"2020-07-14T15:32:09"},{"date":"2020-07-20T19:25:09","version":"2.095"},{"version":"2.096","date":"2020-07-31T20:53:32"},{"version":"2.100","date":"2021-01-07T13:57:52"},{"date":"2021-02-20T14:25:27","version":"2.101"},{"date":"2021-02-28T08:57:41","version":"2.102"},{"date":"2022-04-03T19:50:28","version":"2.103"},{"version":"2.104","date":"2022-04-09T15:43:24"},{"version":"2.105","date":"2022-04-09T21:36:46"},{"version":"2.106","date":"2022-04-12T16:10:04"},{"date":"2022-06-25T09:04:18","version":"2.201"},{"date":"2023-02-08T21:49:30","version":"2.204"},{"date":"2023-07-16T19:41:51","version":"2.205"},{"version":"2.206","date":"2023-07-25T15:56:21"},{"version":"2.207","date":"2024-02-18T22:20:49"},{"date":"2024-03-31T15:17:06","version":"2.208"},{"version":"2.211","date":"2024-04-06T13:44:44"},{"date":"2024-04-27T12:55:39","version":"2.212"},{"date":"2024-08-28T15:36:27","version":"2.213"}]},"CGI-apacheSSI":{"versions":[{"version":"0.93","date":"2014-08-20T22:55:20"},{"version":"0.94","date":"2016-01-30T12:57:47"},{"date":"2016-01-31T22:48:55","version":"0.95"},{"date":"2016-02-01T00:36:49","version":"0.96"}],"main_module":"CGI::apacheSSI","advisories":[{"cves":[],"affected_versions":["<0.95"],"distribution":"CGI-apacheSSI","reported":"2016-01-31","description":"Security and parsing problems with \"include\" calls.\n","references":["https://metacpan.org/changes/distribution/CGI-apacheSSI"],"fixed_versions":[">=0.95"],"id":"CPANSA-CGI-apacheSSI-2016-01"}]},"HTML-Template-Pro":{"main_module":"HTML::Template::Pro","advisories":[{"severity":null,"id":"CPANSA-HTML-Template-Pro-2011-4616","fixed_versions":[">=0.9507"],"description":"Cross-site scripting (XSS) vulnerability in the HTML-Template-Pro module before 0.9507 for Perl allows remote attackers to inject arbitrary web script or HTML via template parameters, related to improper handling of > (greater than) and < (less than) characters.\n","references":["http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652587","http://openwall.com/lists/oss-security/2011/12/19/1","http://metacpan.org/diff/release/VIY/HTML-Template-Pro-0.9505/VIY/HTML-Template-Pro-0.9507","http://secunia.com/advisories/47184","http://cpansearch.perl.org/src/VIY/HTML-Template-Pro-0.9507/Changes","http://www.securityfocus.com/bid/51117","http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089603.html","http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089889.html","http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089888.html"],"reported":"2012-01-06","distribution":"HTML-Template-Pro","affected_versions":["<0.9507"],"cves":["CVE-2011-4616"]}],"versions":[{"version":"0.38","date":"2005-06-09T11:07:59"},{"date":"2005-06-22T09:55:37","version":"0.39"},{"date":"2005-07-07T09:11:59","version":"0.40"},{"version":"0.41","date":"2005-07-26T16:58:29"},{"date":"2005-08-04T15:58:27","version":"0.42"},{"date":"2005-08-04T17:36:21","version":"0.43"},{"date":"2005-08-12T16:32:44","version":"0.44"},{"date":"2005-08-19T19:10:08","version":"0.45"},{"version":"0.46","date":"2005-08-26T18:24:23"},{"version":"0.48","date":"2005-08-31T17:43:09"},{"version":"0.50","date":"2005-09-08T17:43:14"},{"version":"0.52","date":"2005-09-30T15:59:34"},{"version":"0.53","date":"2005-10-06T17:14:51"},{"version":"0.54","date":"2005-10-17T13:37:05"},{"date":"2005-10-26T12:18:18","version":"0.55"},{"version":"0.56","date":"2005-11-03T16:46:06"},{"version":"0.57","date":"2005-11-13T16:12:39"},{"version":"0.58","date":"2005-12-02T08:10:18"},{"date":"2006-01-22T20:07:54","version":"0.59"},{"version":"0.60","date":"2006-02-02T16:32:55"},{"date":"2006-02-06T20:45:02","version":"0.61"},{"date":"2006-02-22T20:05:55","version":"0.62"},{"date":"2006-04-18T20:24:51","version":"0.64"},{"version":"0.65","date":"2007-06-01T14:46:48"},{"date":"2007-10-04T11:08:55","version":"0.66"},{"date":"2007-12-02T23:20:56","version":"0.67"},{"date":"2008-01-08T18:01:32","version":"0.68"},{"date":"2008-01-08T20:03:26","version":"0.68"},{"version":"0.69","date":"2008-03-01T19:46:47"},{"date":"2008-06-09T09:06:12","version":"0.70"},{"version":"0.71","date":"2008-09-05T19:36:06"},{"date":"2008-12-19T08:16:12","version":"0.72"},{"date":"2009-04-02T20:36:25","version":"0.73"},{"date":"2009-04-10T20:41:07","version":"0.74"},{"date":"2009-07-05T16:40:09","version":"0.75"},{"date":"2009-07-13T08:33:36","version":"0.76"},{"version":"0.80","date":"2009-07-23T17:37:10"},{"version":"0.81","date":"2009-07-28T15:58:37"},{"date":"2009-08-04T15:46:34","version":"0.82"},{"version":"0.83","date":"2009-08-05T20:27:52"},{"version":"0.84","date":"2009-08-08T18:13:20"},{"version":"0.85","date":"2009-08-09T16:45:02"},{"version":"0.86","date":"2009-08-24T08:00:34"},{"date":"2009-08-29T19:22:41","version":"0.87"},{"date":"2009-09-11T16:53:57","version":"0.90"},{"version":"0.91","date":"2009-09-24T15:48:49"},{"date":"2009-09-29T20:14:35","version":"0.92"},{"date":"2009-11-23T20:25:34","version":"0.93"},{"version":"0.94","date":"2010-03-26T19:12:55"},{"date":"2010-05-21T19:34:29","version":"0.95"},{"date":"2010-06-16T19:00:45","version":"0.9501"},{"date":"2010-06-24T18:50:34","version":"0.9502"},{"date":"2010-08-29T12:45:12","version":"0.9503"},{"version":"0.9504","date":"2010-09-29T07:16:03"},{"version":"0.9505","date":"2011-07-01T10:40:21"},{"date":"2011-10-04T20:31:16","version":"0.9506"},{"version":"0.9507","date":"2011-12-09T07:59:17"},{"version":"0.9508","date":"2011-12-26T21:57:41"},{"date":"2012-02-28T19:59:05","version":"0.9509"},{"version":"0.9510","date":"2013-05-13T08:40:09"},{"version":"0.9520","date":"2021-11-30T23:21:23"},{"date":"2021-12-02T07:27:12","version":"0.9521"},{"version":"0.9522","date":"2021-12-06T17:53:48"},{"version":"0.9523","date":"2021-12-15T09:50:03"},{"version":"0.9524","date":"2022-01-16T20:42:34"}]},"CPAN":{"versions":[{"version":"0.17","date":"1996-09-10T17:13:59"},{"version":"0.20","date":"1996-09-10T20:51:00"},{"date":"1996-09-12T05:53:35","version":"0.26"},{"date":"1996-09-12T14:01:39","version":"0.27"},{"version":"0.28","date":"1996-09-16T20:18:59"},{"date":"1996-09-17T17:14:51","version":"0.29"},{"version":"0.30","date":"1996-09-19T05:24:17"},{"version":"0.31","date":"1996-09-20T10:40:01"},{"date":"1996-09-22T19:30:33","version":"0.35"},{"version":"0.36","date":"1996-09-23T12:55:23"},{"date":"1996-09-23T14:05:44","version":"0.37"},{"version":"0.39","date":"1996-09-27T12:52:07"},{"version":"0.40","date":"1996-09-28T20:51:31"},{"date":"1996-10-01T21:14:27","version":"0.41"},{"date":"1996-11-17T07:56:02","version":"0.42"},{"version":"0.43","date":"1996-11-17T14:51:59"},{"date":"1996-11-30T17:04:28","version":"0.44"},{"date":"1996-12-01T12:19:19","version":"0.45"},{"version":"0.46","date":"1996-12-01T18:24:17"},{"date":"1996-12-10T00:58:25","version":"1.00"},{"version":"1.01","date":"1996-12-10T10:17:15"},{"date":"1996-12-11T01:31:55","version":"1.02"},{"date":"1996-12-21T03:10:23","version":"1.03"},{"version":"1.04","date":"1996-12-21T20:08:49"},{"version":"1.05","date":"1996-12-22T13:04:58"},{"date":"1996-12-22T14:16:08","version":"1.06"},{"version":"1.07","date":"1996-12-23T04:05:01"},{"date":"1996-12-23T13:18:01","version":"1.08"},{"date":"1996-12-24T00:46:19","version":"1.09"},{"date":"1997-01-17T02:29:49","version":"1.09_01"},{"date":"1997-01-21T01:06:40","version":"1.10"},{"version":"1.11","date":"1997-01-22T18:50:00"},{"version":"1.12","date":"1997-01-23T00:07:58"},{"version":"1.14","date":"1997-01-24T01:07:44"},{"version":"1.15","date":"1997-01-24T12:32:12"},{"version":"1.16_01","date":"1997-02-02T13:51:48"},{"date":"1997-02-02T21:05:12","version":"1.17"},{"version":"1.18","date":"1997-02-03T00:38:36"},{"version":"1.19","date":"1997-02-03T09:13:48"},{"version":"1.20","date":"1997-02-05T09:38:00"},{"version":"1.21","date":"1997-02-11T06:32:42"},{"date":"1997-03-13T23:14:59","version":"1.22_01"},{"date":"1997-03-31T12:03:55","version":"1.23"},{"version":"1.24","date":"1997-03-31T22:47:11"},{"version":"1.25","date":"1997-06-30T18:13:23"},{"version":"1.27","date":"1997-07-28T13:58:09"},{"date":"1997-08-04T06:09:33","version":"1.28"},{"version":"1.29","date":"1997-08-11T23:33:58"},{"date":"1997-08-29T14:34:37","version":"1.30"},{"version":"1.31","date":"1997-09-21T08:53:03"},{"version":"1.3101","date":"1997-09-23T18:45:50"},{"date":"1998-01-02T18:22:35","version":"1.32"},{"version":"1.33","date":"1998-01-10T18:24:23"},{"date":"1998-02-03T18:06:41","version":"1.35"},{"date":"1998-02-08T08:55:55","version":"1.36"},{"version":"1.37","date":"1998-06-12T06:51:25"},{"version":"1.38","date":"1998-06-14T20:18:08"},{"version":"1.40","date":"1998-07-24T20:13:41"},{"date":"1998-12-01T02:20:32","version":"1.41"},{"version":"1.42","date":"1998-12-01T07:58:35"},{"version":"1.43","date":"1998-12-01T22:16:27"},{"version":"1.43","date":"1998-12-03T17:07:54"},{"date":"1999-01-09T18:38:33","version":"1.44"},{"date":"1999-01-10T19:38:27","version":"1.44_51"},{"version":"1.44_52","date":"1999-01-13T12:15:42"},{"date":"1999-01-15T09:26:40","version":"1.44_53"},{"date":"1999-01-15T09:27:45","version":"1.44_54"},{"date":"1999-01-23T14:56:16","version":"1.45"},{"date":"1999-01-25T01:43:42","version":"1.46"},{"version":"1.47","date":"1999-01-25T13:11:23"},{"version":"1.48","date":"1999-03-06T19:34:54"},{"version":"1.49","date":"1999-05-22T16:45:00"},{"date":"1999-05-23T14:32:20","version":"1.50"},{"version":"1.50_01","date":"1999-10-23T03:06:39"},{"date":"1999-12-29T22:30:22","version":"1.51"},{"date":"2000-01-08T15:32:55","version":"1.52"},{"version":"1.53","date":"2000-03-23T23:39:41"},{"date":"2000-03-25T22:51:15","version":"1.54"},{"date":"2000-07-30T11:15:04","version":"1.55"},{"version":"1.56","date":"2000-08-01T20:47:09"},{"version":"1.57","date":"2000-08-16T12:54:07"},{"date":"2000-08-21T19:44:18","version":"1.57_51"},{"version":"1.57_53","date":"2000-08-27T22:09:36"},{"date":"2000-08-30T16:54:50","version":"1.57_54"},{"version":"1.57_55","date":"2000-08-31T08:11:01"},{"date":"2000-08-31T22:16:21","version":"1.57_56"},{"date":"2000-09-01T12:18:43","version":"1.57_57"},{"date":"2000-09-03T22:19:20","version":"1.57_58"},{"date":"2000-09-05T09:44:05","version":"1.57_59"},{"date":"2000-09-05T19:55:34","version":"1.57_60"},{"version":"1.57_61","date":"2000-09-06T10:54:07"},{"version":"1.57_62","date":"2000-09-08T02:19:06"},{"version":"1.57_65","date":"2000-09-10T08:54:37"},{"date":"2000-09-12T08:46:40","version":"1.57_66"},{"version":"1.57_67","date":"2000-09-17T10:24:31"},{"date":"2000-10-08T14:25:04","version":"1.57_68"},{"version":"1.58","date":"2000-10-18T14:53:45"},{"version":"1.58_51","date":"2000-10-21T14:21:06"},{"date":"2000-10-25T07:05:38","version":"1.58_52"},{"version":"1.58_53","date":"2000-10-26T11:03:29"},{"date":"2000-10-26T15:34:21","version":"1.58_54"},{"date":"2000-10-27T07:59:03","version":"1.58_55"},{"version":"1.58_56","date":"2000-11-04T09:36:53"},{"version":"1.58_57","date":"2000-11-06T19:30:27"},{"date":"2000-11-08T08:10:51","version":"1.58_90"},{"version":"1.58_91","date":"2000-11-13T10:26:38"},{"version":"1.58_92","date":"2000-11-14T18:24:18"},{"version":"1.58_93","date":"2000-11-15T07:19:56"},{"date":"2000-12-01T06:05:58","version":"1.59"},{"date":"2000-12-01T08:19:58","version":"1.59_51"},{"date":"2000-12-26T13:54:06","version":"1.59_52"},{"version":"1.59_53","date":"2001-01-02T16:37:24"},{"date":"2001-02-09T21:44:55","version":"1.59_54"},{"version":"1.60","date":"2002-04-19T13:29:54"},{"date":"2002-04-20T02:18:41","version":"1.60"},{"version":"1.60","date":"2002-04-21T11:31:25"},{"date":"2002-05-07T10:38:54","version":"1.61"},{"date":"2002-07-28T10:51:47","version":"1.62"},{"version":"1.63","date":"2002-08-30T08:58:10"},{"version":"1.64","date":"2003-02-06T10:04:06"},{"version":"1.65","date":"2003-02-08T17:10:13"},{"date":"2003-03-04T19:38:21","version":"1.70"},{"version":"1.70_52","date":"2003-04-11T04:33:18"},{"version":"1.70_53","date":"2003-04-13T12:43:40"},{"version":"1.70_54","date":"2003-05-15T21:04:52"},{"version":"1.71","date":"2003-07-04T09:48:08"},{"version":"1.72","date":"2003-07-27T20:35:05"},{"version":"1.73","date":"2003-07-28T08:21:47"},{"version":"1.74","date":"2003-07-28T22:58:08"},{"date":"2003-07-29T15:14:13","version":"1.75"},{"date":"2003-07-31T15:14:02","version":"1.76"},{"version":"1.76_01","date":"2003-09-21T21:25:41"},{"date":"2005-09-19T06:37:38","version":"1.76_51"},{"version":"1.76_52","date":"2005-09-22T07:02:02"},{"version":"1.76_53","date":"2005-09-22T07:09:48"},{"date":"2005-10-01T08:23:38","version":"1.76_54"},{"version":"1.76_55","date":"2005-10-19T06:10:58"},{"date":"2005-10-21T04:59:36","version":"1.76_56"},{"date":"2005-10-27T07:08:29","version":"1.76_57"},{"version":"1.76_58","date":"2005-11-02T04:03:28"},{"version":"1.76_59","date":"2005-11-03T06:37:52"},{"version":"1.76_60","date":"2005-11-03T07:38:40"},{"date":"2005-11-06T10:36:53","version":"1.76_61"},{"date":"2005-11-07T04:22:19","version":"1.76_62"},{"version":"1.76_63","date":"2005-11-07T04:47:05"},{"date":"2005-11-07T21:58:06","version":"1.76_64"},{"date":"2005-11-07T22:18:44","version":"1.76_65"},{"version":"1.80","date":"2005-12-03T10:12:08"},{"date":"2005-12-18T11:29:26","version":"1.80_51"},{"date":"2005-12-21T12:13:15","version":"1.80_53"},{"date":"2005-12-22T08:42:59","version":"1.80_54"},{"version":"1.80_55","date":"2005-12-24T07:25:34"},{"date":"2005-12-24T09:59:47","version":"1.80_56"},{"version":"1.80_57","date":"2005-12-31T11:58:10"},{"date":"2006-01-01T09:01:43","version":"1.80_58"},{"version":"1.81","date":"2006-01-02T23:15:15"},{"version":"1.82","date":"2006-01-04T07:47:25"},{"version":"1.83","date":"2006-01-05T08:03:36"},{"version":"1.83_51","date":"2006-01-08T13:35:16"},{"version":"1.83_52","date":"2006-01-10T05:00:26"},{"version":"1.83_53","date":"2006-01-12T07:54:36"},{"version":"1.83_54","date":"2006-01-13T08:20:42"},{"version":"1.83_55","date":"2006-01-14T11:34:47"},{"version":"1.83_56","date":"2006-01-18T06:03:44"},{"date":"2006-01-19T08:00:02","version":"1.83_57"},{"date":"2006-01-22T12:05:01","version":"1.83_58"},{"version":"1.83_59","date":"2006-01-25T13:10:20"},{"version":"1.83_60","date":"2006-01-30T10:35:47"},{"version":"1.83_61","date":"2006-01-30T23:18:09"},{"date":"2006-01-31T10:28:57","version":"1.83_62"},{"date":"2006-02-01T07:49:36","version":"1.83_63"},{"date":"2006-02-02T09:17:39","version":"1.83_64"},{"date":"2006-02-04T11:20:05","version":"1.83_65"},{"version":"1.83_66","date":"2006-02-04T17:05:00"},{"date":"2006-02-06T00:46:27","version":"1.83_67"},{"date":"2006-02-08T07:43:36","version":"1.83_68"},{"version":"1.83_69","date":"2006-02-14T08:17:55"},{"version":"1.84","date":"2006-02-15T07:01:02"},{"version":"1.85","date":"2006-02-19T17:05:36"},{"version":"1.86","date":"2006-02-20T08:36:51"},{"date":"2006-02-21T06:05:05","version":"1.86_51"},{"version":"1.86_52","date":"2006-02-22T22:29:54"},{"version":"1.86_53","date":"2006-02-24T08:24:09"},{"version":"1.87","date":"2006-02-27T07:01:10"},{"version":"1.87_51","date":"2006-03-06T08:02:28"},{"date":"2006-07-21T22:33:11","version":"1.87_52"},{"date":"2006-07-22T18:55:13","version":"1.87_53"},{"version":"1.87_54","date":"2006-07-23T21:37:11"},{"version":"1.87_55","date":"2006-07-29T19:36:50"},{"date":"2006-08-24T05:57:41","version":"1.87_56"},{"date":"2006-08-26T17:05:56","version":"1.87_57"},{"date":"2006-08-31T06:50:49","version":"1.87_58"},{"version":"1.87_59","date":"2006-09-03T21:05:29"},{"date":"2006-09-10T11:57:33","version":"1.87_61"},{"version":"1.87_62","date":"2006-09-11T21:24:18"},{"version":"1.87_63","date":"2006-09-13T05:44:15"},{"version":"1.87_64","date":"2006-09-16T11:02:25"},{"date":"2006-09-19T03:44:51","version":"1.87_65"},{"version":"1.88","date":"2006-09-21T20:30:41"},{"date":"2006-09-22T20:40:40","version":"1.8801"},{"version":"1.88_51","date":"2006-09-30T10:41:20"},{"date":"2006-10-03T09:51:49","version":"1.88_52"},{"version":"1.88_53","date":"2006-10-09T19:31:56"},{"date":"2006-10-14T09:37:15","version":"1.88_54"},{"date":"2006-10-16T06:59:27","version":"1.88_55"},{"date":"2006-10-22T10:34:16","version":"1.88_56"},{"version":"1.8802","date":"2006-10-23T07:17:30"},{"date":"2006-10-24T07:18:16","version":"1.88_57"},{"version":"1.88_58","date":"2006-10-28T15:00:07"},{"version":"1.88_59","date":"2006-11-05T21:24:52"},{"version":"1.88_61","date":"2006-11-10T08:39:55"},{"date":"2006-11-13T07:44:27","version":"1.88_62"},{"version":"1.88_63","date":"2006-11-29T08:11:50"},{"version":"1.88_64","date":"2006-12-04T07:53:37"},{"version":"1.88_65","date":"2006-12-11T21:36:04"},{"version":"1.88_66","date":"2006-12-19T08:21:17"},{"version":"1.88_67","date":"2006-12-31T17:18:53"},{"version":"1.88_68","date":"2007-01-07T21:22:12"},{"version":"1.88_69","date":"2007-01-08T03:42:56"},{"date":"2007-01-27T16:57:49","version":"1.88_71"},{"date":"2007-01-31T07:11:33","version":"1.88_72"},{"date":"2007-02-13T05:24:13","version":"1.88_73"},{"date":"2007-02-15T07:12:17","version":"1.88_74"},{"version":"1.88_75","date":"2007-02-18T16:52:49"},{"date":"2007-02-19T06:20:20","version":"1.88_76"},{"version":"1.88_77","date":"2007-02-19T21:26:47"},{"version":"1.88_78","date":"2007-03-05T23:26:57"},{"date":"2007-03-16T01:54:55","version":"1.88_79"},{"version":"1.90","date":"2007-04-07T07:41:18"},{"version":"1.91","date":"2007-04-19T07:03:03"},{"version":"1.9101","date":"2007-04-23T00:09:11"},{"version":"1.9102","date":"2007-05-08T20:35:04"},{"date":"2007-07-07T16:15:40","version":"1.91_51"},{"version":"1.91_52","date":"2007-07-14T18:45:58"},{"version":"1.91_53","date":"2007-08-09T06:49:38"},{"version":"1.91_54","date":"2007-09-14T21:18:33"},{"date":"2007-09-15T07:14:26","version":"1.91_55"},{"date":"2007-09-23T11:15:08","version":"1.92"},{"version":"1.9201","date":"2007-09-27T07:11:10"},{"version":"1.9202","date":"2007-09-28T06:58:04"},{"date":"2007-09-28T07:13:26","version":"1.9203"},{"version":"1.92_51","date":"2007-11-04T23:04:18"},{"date":"2007-11-05T23:30:06","version":"1.9204"},{"date":"2007-11-11T11:27:20","version":"1.92_52"},{"date":"2007-11-11T18:49:37","version":"1.9205"},{"date":"2007-12-09T23:27:18","version":"1.92_53"},{"date":"2007-12-27T04:57:34","version":"1.92_54"},{"date":"2007-12-30T15:24:13","version":"1.92_55"},{"date":"2008-02-04T21:56:28","version":"1.92_56"},{"version":"1.92_57","date":"2008-02-27T05:13:49"},{"version":"1.92_58","date":"2008-03-12T07:56:18"},{"version":"1.92_59","date":"2008-03-16T18:57:04"},{"version":"1.92_60","date":"2008-03-26T07:53:08"},{"date":"2008-04-25T04:47:52","version":"1.92_61"},{"version":"1.92_62","date":"2008-05-23T04:07:04"},{"version":"1.92_63","date":"2008-06-19T06:42:18"},{"version":"1.92_64","date":"2008-09-03T05:27:35"},{"date":"2008-09-14T09:54:03","version":"1.92_65"},{"date":"2008-09-29T23:15:10","version":"1.92_66"},{"version":"1.93","date":"2008-10-12T16:07:51"},{"date":"2008-10-13T19:37:43","version":"1.9301"},{"date":"2009-01-11T22:07:01","version":"1.93_02"},{"date":"2009-02-01T12:38:23","version":"1.93_03"},{"version":"1.93_51","date":"2009-02-01T21:06:21"},{"date":"2009-02-28T15:58:39","version":"1.9304"},{"version":"1.93_52","date":"2009-04-13T19:24:43"},{"date":"2009-05-04T06:11:28","version":"1.93_53"},{"version":"1.93_54","date":"2009-05-07T20:13:16"},{"version":"1.94","date":"2009-05-24T05:37:28"},{"version":"1.94_01","date":"2009-06-14T19:53:52"},{"version":"1.9402","date":"2009-06-27T02:55:22"},{"date":"2009-09-14T02:47:24","version":"1.94_51"},{"version":"1.94_52","date":"2009-10-15T19:33:19"},{"version":"1.94_53","date":"2009-12-18T07:00:09"},{"version":"1.94_54","date":"2010-01-14T08:01:42"},{"date":"2010-02-03T03:43:49","version":"1.94_55"},{"version":"1.94_56","date":"2010-02-17T13:39:33"},{"date":"2010-05-24T19:33:41","version":"1.94_57"},{"version":"1.94_58","date":"2010-06-24T06:34:13"},{"date":"2010-09-26T20:23:30","version":"1.94_59"},{"version":"1.94_60","date":"2010-09-28T20:44:58"},{"date":"2010-10-03T17:29:37","version":"1.94_61"},{"date":"2010-10-26T06:43:51","version":"1.94_62"},{"date":"2011-01-16T17:58:10","version":"1.94_63"},{"date":"2011-01-21T04:58:35","version":"1.94_64"},{"date":"2011-02-14T12:10:12","version":"1.94_65"},{"date":"2011-03-12T11:30:03","version":"1.9600"},{"version":"1.97_51","date":"2011-06-27T06:56:01"},{"date":"2011-08-07T09:40:33","version":"1.9800"},{"version":"1.99_51","date":"2012-10-16T21:42:49"},{"version":"2.00-TRIAL","date":"2013-02-06T07:41:54"},{"version":"2.00","date":"2013-04-12T16:57:44"},{"version":"2.01-TRIAL","date":"2013-06-22T20:27:32"},{"version":"2.02-TRIAL","date":"2013-06-23T07:33:40"},{"date":"2013-09-15T09:42:33","version":"2.03-TRIAL"},{"date":"2014-03-18T22:33:22","version":"2.04-TRIAL"},{"version":"2.05-TRIAL","date":"2014-03-31T20:55:24"},{"version":"2.05-TRIAL2","date":"2014-04-04T02:07:20"},{"version":"2.05","date":"2014-04-18T13:35:51"},{"version":"2.06-TRIAL","date":"2014-08-06T19:32:53"},{"date":"2015-01-04T18:54:54","version":"2.06-TRIAL"},{"version":"2.08-TRIAL","date":"2015-01-05T06:31:55"},{"version":"2.09-TRIAL","date":"2015-02-02T04:41:02"},{"date":"2015-02-22T15:57:42","version":"2.10-TRIAL"},{"date":"2015-03-13T07:45:04","version":"2.10"},{"date":"2015-12-31T11:00:08","version":"2.12-TRIAL"},{"version":"2.13-TRIAL","date":"2016-05-16T09:56:01"},{"date":"2016-06-04T14:41:28","version":"2.14-TRIAL"},{"date":"2016-06-25T04:32:45","version":"2.14"},{"version":"2.15-TRIAL","date":"2016-07-17T12:10:30"},{"version":"2.16-TRIAL","date":"2017-01-16T16:20:27"},{"date":"2017-01-16T21:27:06","version":"2.16-TRIAL2"},{"date":"2017-02-14T16:22:20","version":"2.16"},{"version":"2.17-TRIAL","date":"2017-02-15T09:37:10"},{"version":"2.17-TRIAL2","date":"2017-02-16T09:48:46"},{"version":"2.18-TRIAL","date":"2017-03-30T21:38:23"},{"version":"2.19-TRIAL","date":"2017-11-04T23:27:47"},{"date":"2017-11-26T22:10:39","version":"2.20-TRIAL"},{"version":"2.21-TRIAL","date":"2018-09-22T20:46:35"},{"date":"2018-12-16T10:35:04","version":"2.22-TRIAL"},{"version":"2.22","date":"2018-12-23T09:11:29"},{"version":"2.23-TRIAL","date":"2019-02-10T20:28:53"},{"date":"2019-02-14T21:21:03","version":"2.24-TRIAL"},{"date":"2019-02-16T05:56:23","version":"2.25-TRIAL"},{"date":"2019-03-03T06:27:10","version":"2.25"},{"date":"2019-03-19T00:04:34","version":"2.26"},{"version":"2.27-TRIAL","date":"2019-05-31T21:11:50"},{"date":"2019-06-09T05:48:20","version":"2.27-TRIAL2"},{"date":"2019-07-03T20:15:40","version":"2.27"},{"version":"2.28-TRIAL","date":"2020-04-03T02:52:43"},{"version":"2.28","date":"2020-06-13T04:57:39"},{"date":"2021-11-23T16:58:45","version":"2.29"},{"version":"2.30-TRIAL","date":"2021-12-12T09:16:03"},{"date":"2021-12-14T20:52:30","version":"2.31-TRIAL"},{"date":"2021-12-26T21:35:55","version":"2.32-TRIAL"},{"version":"2.33-TRIAL","date":"2022-01-21T04:09:07"},{"version":"2.33","date":"2022-03-27T17:53:47"},{"date":"2022-04-03T19:19:13","version":"2.34-TRIAL"},{"version":"2.34","date":"2022-04-17T17:40:25"},{"version":"2.35-TRIAL","date":"2023-04-15T14:44:27"},{"date":"2023-04-27T13:05:07","version":"2.35"},{"version":"2.36-TRIAL","date":"2023-05-10T07:08:30"},{"version":"2.36","date":"2023-05-14T19:36:11"},{"version":"2.37-TRIAL","date":"2024-08-18T17:03:50"},{"date":"2024-08-30T17:18:31","version":"2.37"},{"version":"2.38-TRIAL","date":"2024-10-03T10:21:39"},{"version":"2.38-TRIAL2","date":"2024-10-13T11:32:53"},{"date":"2024-11-17T19:52:34","version":"2.38"}],"main_module":"CPAN","advisories":[{"cves":["CVE-2023-31484"],"reported":"2023-02-28","distribution":"CPAN","previous_id":["CPANSA-CPAN-2023-01"],"affected_versions":["<2.35"],"description":"The verify_SSL flag is missing from HTTP::Tiny, and allows a network attacker to MITM the connection if it is used by the CPAN client\n","references":["https://github.com/andk/cpanpm/commit/9c98370287f4e709924aee7c58ef21c85289a7f0","https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/","https://github.com/andk/cpanpm/pull/175","https://www.openwall.com/lists/oss-security/2023/04/18/14"],"id":"CPANSA-CPAN-2023-31484","fixed_versions":[">=2.35"]},{"affected_versions":["<1.93"],"reported":"2009-09-23","distribution":"CPAN","cves":[],"fixed_versions":[">=1.93"],"id":"CPANSA-CPAN-2009-01","description":"Archive::Tar preserves permissions in the tarball; extracted file permissions will be set from users umask instead.\n","references":["https://github.com/andk/cpanpm/commit/079fa2e7ee77d626eab8bb06d0465c6a05f6c8b6","https://rt.cpan.org/Ticket/Display.html?id=46384"]},{"cves":["CVE-2020-16156"],"affected_versions":["<2.28"],"reported":"2021-12-13","distribution":"CPAN","description":"CPAN 2.28 allows Signature Verification Bypass.","references":["https://metacpan.org/pod/distribution/CPAN/scripts/cpan","https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/","http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/"],"fixed_versions":[">=2.29"],"id":"CPANSA-CPAN-2020-16156","severity":"high"}]},"Module-ScanDeps":{"versions":[{"date":"2002-11-02T02:07:07","version":"0.01"},{"version":"0.02","date":"2002-11-02T15:56:27"},{"version":"0.03","date":"2002-11-03T19:51:24"},{"date":"2002-11-04T12:01:46","version":"0.10"},{"date":"2003-01-18T19:35:58","version":"0.12"},{"version":"0.13","date":"2003-01-18T21:08:58"},{"version":"0.14","date":"2003-01-19T15:48:47"},{"date":"2003-02-25T03:23:37","version":"0.17"},{"date":"2003-03-20T11:59:13","version":"0.18"},{"version":"0.19","date":"2003-03-22T13:20:27"},{"date":"2003-07-30T14:59:45","version":"0.20"},{"version":"0.21","date":"2003-07-30T15:18:11"},{"version":"0.22","date":"2003-08-07T18:41:51"},{"date":"2003-08-08T10:19:27","version":"0.23"},{"version":"0.24","date":"2003-08-10T05:43:06"},{"version":"0.25","date":"2003-08-10T15:46:55"},{"date":"2003-08-16T04:48:20","version":"0.27"},{"version":"0.28","date":"2003-08-17T19:03:59"},{"version":"0.29","date":"2003-09-17T09:18:20"},{"date":"2003-09-20T20:36:32","version":"0.30"},{"date":"2003-10-17T22:37:35","version":"0.31"},{"version":"0.32","date":"2003-10-26T10:53:58"},{"version":"0.33","date":"2003-12-21T01:21:51"},{"date":"2003-12-30T02:36:30","version":"0.34"},{"version":"0.35","date":"2003-12-31T12:02:59"},{"date":"2003-12-31T15:33:07","version":"0.37"},{"version":"0.38","date":"2004-01-08T11:38:10"},{"date":"2004-01-25T16:28:12","version":"0.39"},{"version":"0.40","date":"2004-02-23T21:14:41"},{"date":"2004-04-18T16:05:29","version":"0.41"},{"version":"0.42","date":"2004-04-30T20:02:44"},{"version":"0.43","date":"2004-06-02T18:05:32"},{"date":"2004-06-08T19:06:29","version":"0.44"},{"version":"0.45","date":"2004-06-30T08:03:18"},{"version":"0.46","date":"2004-07-02T10:35:16"},{"date":"2004-08-30T22:13:57","version":"0.47"},{"version":"0.48","date":"2004-09-06T20:56:31"},{"version":"0.49","date":"2004-09-26T17:45:11"},{"version":"0.50","date":"2004-10-03T17:31:23"},{"date":"2005-01-07T20:57:46","version":"0.51"},{"date":"2005-12-12T12:05:41","version":"0.52"},{"version":"0.53","date":"2006-01-09T18:07:40"},{"date":"2006-01-11T03:19:40","version":"0.54"},{"date":"2006-02-17T16:39:23","version":"0.55"},{"date":"2006-02-20T15:38:03","version":"0.56"},{"version":"0.57","date":"2006-03-03T19:30:56"},{"date":"2006-04-16T14:54:53","version":"0.58"},{"date":"2006-05-03T09:13:49","version":"0.59"},{"version":"0.60","date":"2006-05-23T15:29:09"},{"date":"2006-06-30T19:12:26","version":"0.61"},{"date":"2006-07-16T09:25:37","version":"0.62"},{"version":"0.63","date":"2006-08-27T17:26:32"},{"date":"2006-09-23T07:46:41","version":"0.64"},{"date":"2006-09-24T07:59:07","version":"0.64"},{"date":"2006-09-24T09:03:21","version":"0.66"},{"date":"2006-10-24T16:12:59","version":"0.67"},{"version":"0.68","date":"2006-10-25T19:08:27"},{"version":"0.69","date":"2006-11-07T18:16:07"},{"date":"2006-11-21T11:00:52","version":"0.70"},{"date":"2007-01-04T19:28:34","version":"0.71"},{"date":"2007-02-03T10:40:10","version":"0.72"},{"version":"0.73","date":"2007-03-25T18:35:04"},{"version":"0.73_01","date":"2007-04-14T09:17:51"},{"version":"0.74","date":"2007-04-30T18:45:05"},{"date":"2007-06-24T17:25:22","version":"0.75"},{"version":"0.76","date":"2007-07-21T15:40:54"},{"date":"2007-09-20T17:42:07","version":"0.77"},{"date":"2007-11-17T04:18:23","version":"0.78"},{"version":"0.80","date":"2007-11-30T21:08:01"},{"date":"2007-12-07T13:24:35","version":"0.81"},{"date":"2008-01-28T16:33:27","version":"0.82"},{"date":"2008-03-22T23:35:16","version":"0.83"},{"version":"0.84","date":"2008-05-13T14:39:03"},{"date":"2008-10-23T13:17:33","version":"0.86"},{"version":"0.87","date":"2008-10-28T13:10:35"},{"date":"2008-11-02T16:06:00","version":"0.83"},{"version":"0.83","date":"2008-11-03T21:38:03"},{"date":"2009-05-09T09:09:37","version":"0.90"},{"date":"2009-06-22T20:07:07","version":"0.91"},{"version":"0.92","date":"2009-07-19T08:55:54"},{"version":"0.93","date":"2009-07-19T09:51:33"},{"date":"2009-08-10T18:32:02","version":"0.94"},{"date":"2009-09-16T09:14:53","version":"0.95"},{"date":"2009-11-13T10:36:02","version":"0.96"},{"date":"2010-04-10T15:20:47","version":"0.97"},{"date":"2010-07-26T19:24:02","version":"0.98"},{"version":"1.00","date":"2011-02-19T16:00:01"},{"version":"1.01","date":"2011-03-26T12:51:17"},{"date":"2011-04-03T19:59:22","version":"1.02"},{"date":"2011-07-18T21:29:19","version":"1.03"},{"date":"2011-07-21T09:09:46","version":"1.04"},{"date":"2011-11-02T18:31:39","version":"1.05"},{"date":"2011-11-28T15:50:49","version":"1.06"},{"date":"2011-11-29T18:02:00","version":"1.07"},{"version":"1.08","date":"2012-02-21T16:07:41"},{"version":"1.09","date":"2012-09-09T11:14:11"},{"date":"2012-10-20T14:15:34","version":"1.10"},{"date":"2013-09-28T10:27:58","version":"1.11"},{"version":"1.12","date":"2013-12-01T14:49:13"},{"version":"1.13","date":"2013-12-21T12:07:54"},{"date":"2014-08-03T11:34:45","version":"1.14"},{"version":"1.15","date":"2014-08-23T15:39:26"},{"date":"2014-09-28T16:17:32","version":"1.16"},{"version":"1.17","date":"2014-10-31T11:13:34"},{"version":"1.18","date":"2015-01-19T21:56:34"},{"date":"2015-05-27T08:53:42","version":"1.19"},{"date":"2015-10-04T13:18:36","version":"1.20"},{"date":"2016-04-05T10:11:15","version":"1.21"},{"version":"1.22","date":"2016-09-17T20:57:48"},{"version":"1.23","date":"2016-11-16T19:46:41"},{"date":"2017-06-28T17:13:27","version":"1.24"},{"version":"1.25","date":"2018-08-17T22:21:56"},{"date":"2018-12-12T17:38:39","version":"1.26"},{"version":"1.26_001","date":"2018-12-13T17:16:52"},{"date":"2019-01-15T20:08:40","version":"1.27"},{"version":"1.28","date":"2020-08-06T08:02:24"},{"date":"2020-08-16T12:35:20","version":"1.29"},{"version":"1.30","date":"2021-01-13T15:02:27"},{"version":"1.31","date":"2021-04-21T14:17:01"},{"version":"1.31_001","date":"2023-06-14T09:30:00"},{"date":"2023-06-15T11:55:12","version":"1.31_002"},{"date":"2023-06-16T09:04:27","version":"1.31_003"},{"date":"2023-06-18T10:34:43","version":"1.31_004"},{"version":"1.32","date":"2023-07-05T15:58:09"},{"version":"1.33","date":"2023-08-04T15:50:23"},{"version":"1.34","date":"2023-09-24T15:21:05"},{"date":"2023-11-05T12:46:38","version":"1.35"},{"date":"2024-11-19T16:12:58","version":"1.37"}],"main_module":"Module::ScanDeps","advisories":[{"reported":"2024-11-19","distribution":"Module-ScanDeps","affected_versions":["<1.36"],"cves":["CVE-2024-10224"],"id":"CPANSA-Module-ScanDeps-2024-10224","severity":null,"fixed_versions":[">=1.36"],"description":"Qualys discovered that if unsanitized input was used with the library Modules::ScanDeps, before version 1.36 a local attacker could possibly execute arbitrary shell commands by open()ing a \"pesky pipe\" (such as passing \"commands|\" as a filename) or by passing arbitrary strings to eval().\n","references":["https://github.com/rschupp/Module-ScanDeps/security/advisories/GHSA-g597-359q-v529","https://www.cve.org/CVERecord?id=CVE-2024-10224","https://www.qualys.com/2024/11/19/needrestart/needrestart.txt","https://lists.debian.org/debian-lts-announce/2024/11/msg00015.html","https://ubuntu.com/security/CVE-2024-10224"]}]},"HTML-Scrubber":{"main_module":"HTML::Scrubber","advisories":[{"description":"Cross-site scripting (XSS) vulnerability in the HTML-Scrubber module before 0.15 for Perl, when the comment feature is enabled, allows remote attackers to inject arbitrary web script or HTML via a crafted comment.\n","references":["http://jvn.jp/en/jp/JVN53973084/index.html","http://jvndb.jvn.jp/jvndb/JVNDB-2015-000171","https://metacpan.org/release/HTML-Scrubber","http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172997.html","http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172983.html","http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172934.html"],"severity":null,"id":"CPANSA-HTML-Scrubber-2015-5667","fixed_versions":[">=0.15"],"cves":["CVE-2015-5667"],"reported":"2015-10-31","distribution":"HTML-Scrubber","affected_versions":["<0.15"]}],"versions":[{"version":"0.02","date":"2003-04-18T14:10:19"},{"date":"2003-07-21T14:57:02","version":"0.03"},{"date":"2003-10-30T02:31:36","version":"0.04"},{"date":"2003-10-31T07:27:00","version":"0.05"},{"version":"0.06","date":"2003-11-02T11:10:49"},{"version":"0.07","date":"2004-03-18T14:35:12"},{"date":"2004-04-01T22:12:20","version":"0.08"},{"version":"0.09","date":"2011-04-01T15:36:18"},{"date":"2013-09-27T14:06:41","version":"0.10"},{"date":"2013-10-11T14:13:11","version":"0.11"},{"version":"0.12","date":"2015-03-14T18:25:35"},{"version":"0.13","date":"2015-03-19T16:31:12"},{"date":"2015-04-02T16:20:48","version":"0.14"},{"date":"2015-10-10T14:02:08","version":"0.15"},{"date":"2017-06-25T19:31:24","version":"0.16"},{"version":"0.17","date":"2017-06-27T13:04:46"},{"date":"2019-09-22T11:11:50","version":"0.18"},{"version":"0.19","date":"2019-09-24T12:28:19"}]},"CPAN-Checksums":{"advisories":[{"affected_versions":[">=2.12"],"reported":"2021-12-13","distribution":"CPAN-Checksums","cves":["CVE-2020-16155"],"fixed_versions":[],"id":"CPANSA-CPAN-Checksums-2020-16155","severity":"medium","description":"The CPAN::Checksums package 2.12 for Perl does not uniquely define signed data.\n","references":["https://metacpan.org/pod/CPAN::Checksums","https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/"]}],"main_module":"CPAN::Checksums","versions":[{"date":"2000-12-10T09:31:19","version":"1.003"},{"version":"1.004","date":"2000-12-11T08:49:05"},{"version":"1.006","date":"2000-12-11T10:20:16"},{"version":"1.007","date":"2000-12-11T13:38:18"},{"date":"2000-12-13T11:24:09","version":"1.008"},{"date":"2002-03-31T20:27:49","version":"1.009"},{"version":"1.0","date":"2002-10-06T17:22:35"},{"version":"1.011","date":"2002-10-07T08:56:12"},{"date":"2003-02-02T10:26:00","version":"1.014"},{"date":"2003-02-03T15:44:57","version":"1.015"},{"date":"2003-02-03T19:21:46","version":"1.016"},{"version":"1.018","date":"2005-01-24T07:59:41"},{"date":"2005-10-31T07:27:02","version":"1.032"},{"version":"1.039","date":"2005-11-11T07:16:04"},{"date":"2006-05-01T13:34:41","version":"1.048"},{"version":"1.050","date":"2006-05-09T03:30:39"},{"date":"2007-08-05T12:10:58","version":"1.061"},{"version":"1.064","date":"2007-10-09T03:09:45"},{"version":"2.00","date":"2008-05-17T05:26:24"},{"date":"2008-09-03T19:33:28","version":"2.01"},{"date":"2008-10-31T06:54:59","version":"2.02"},{"date":"2009-09-20T01:50:36","version":"2.03"},{"date":"2009-09-28T04:10:09","version":"2.04"},{"date":"2010-01-23T05:39:17","version":"2.05"},{"version":"2.06","date":"2010-10-24T12:13:44"},{"version":"2.07","date":"2010-11-20T22:18:39"},{"date":"2011-08-30T06:32:02","version":"2.08"},{"date":"2014-04-04T04:06:11","version":"2.09"},{"version":"2.10","date":"2015-04-11T05:48:38"},{"version":"2.11","date":"2016-04-09T05:42:27"},{"version":"2.12","date":"2016-06-14T02:42:03"},{"date":"2021-11-23T16:57:18","version":"2.13"},{"date":"2021-12-04T10:00:42","version":"2.14"}]},"Plack-Middleware-Session":{"versions":[{"version":"0.01","date":"2009-12-15T18:59:13"},{"version":"0.02","date":"2009-12-19T19:27:38"},{"version":"0.03","date":"2010-01-07T22:12:43"},{"date":"2010-01-30T21:46:53","version":"0.09_01"},{"date":"2010-01-31T07:17:07","version":"0.09_02"},{"date":"2010-02-03T04:46:20","version":"0.09_03"},{"version":"0.10","date":"2010-02-23T03:16:31"},{"version":"0.11","date":"2010-02-27T10:47:17"},{"date":"2010-07-07T22:55:18","version":"0.12"},{"date":"2010-12-22T17:00:14","version":"0.13"},{"date":"2011-03-29T20:50:06","version":"0.14"},{"version":"0.15","date":"2012-09-04T21:16:35"},{"date":"2013-02-10T19:43:11","version":"0.16"},{"date":"2013-02-11T23:45:49","version":"0.17"},{"date":"2013-02-12T10:57:14","version":"0.17"},{"version":"0.20","date":"2013-06-24T23:09:39"},{"date":"2013-10-12T18:42:26","version":"0.21"},{"date":"2014-08-11T17:18:03","version":"0.22"},{"version":"0.23","date":"2014-08-11T17:23:40"},{"date":"2014-09-05T11:48:57","version":"0.24"},{"version":"0.25","date":"2014-09-29T03:07:54"},{"version":"0.26","date":"2015-02-03T08:17:55"},{"version":"0.27","date":"2015-02-14T00:52:35"},{"date":"2015-02-16T16:30:31","version":"0.28"},{"version":"0.29","date":"2015-02-17T23:57:32"},{"date":"2015-03-02T18:25:56","version":"0.30"},{"date":"2019-02-26T19:01:59","version":"0.31"},{"version":"0.32","date":"2019-02-26T21:36:43"},{"version":"0.33","date":"2019-03-09T23:19:27"},{"version":"0.34","date":"2024-09-23T16:54:44"}],"main_module":"Plack::Middleware::Session","advisories":[{"reported":"2014-08-11","distribution":"Plack-Middleware-Session","affected_versions":["<=0.21"],"cves":[],"severity":"critical","id":"CPANSA-Plack-Middleware-Session-2014-01","fixed_versions":[">0.21"],"references":["https://gist.github.com/miyagawa/2b8764af908a0dacd43d","https://metacpan.org/changes/distribution/Plack-Middleware-Session"],"description":"Plack::Middleware::Session::Cookie 0.21 has a security vulnerability where it allows an attacker to execute arbitrary code on the server, when the middleware is enabled without a secret.\n"}]},"CGI-Application-Plugin-AutoRunmode":{"versions":[{"version":"0.04","date":"2005-03-04T06:59:51"},{"version":"0.05","date":"2005-03-10T07:22:55"},{"version":"0.06","date":"2005-06-15T10:20:17"},{"date":"2005-06-18T02:09:08","version":"0.07"},{"version":"0.08","date":"2005-07-17T00:49:10"},{"version":"0.09","date":"2005-09-22T12:31:22"},{"version":"0.10","date":"2005-10-16T00:17:47"},{"version":"0.11","date":"2005-10-18T13:23:50"},{"version":"0.12","date":"2005-11-03T01:10:37"},{"date":"2006-04-08T07:18:44","version":"0.13"},{"version":"0.14","date":"2006-05-21T05:04:48"},{"date":"2006-12-17T07:46:24","version":"0.15"},{"version":"0.16","date":"2009-02-14T09:16:39"},{"version":"0.17","date":"2010-05-21T04:24:45"},{"date":"2011-02-18T09:23:15","version":"0.18"}],"advisories":[{"description":"Non-word characters are allowed in runmode name.\n","references":["https://metacpan.org/changes/distribution/CGI-Application-Plugin-AutoRunmode"],"fixed_versions":[">=0.04"],"id":"CPANSA-CGI-Application-Plugin-AutoRunmode-2005-01","cves":[],"affected_versions":["<0.04"],"distribution":"CGI-Application-Plugin-AutoRunmode","reported":"2005-03-04"}],"main_module":"CGI::Application::Plugin::AutoRunmode"},"Net-OpenID-Consumer":{"main_module":"Net::OpenID::Consumer","advisories":[{"references":["https://metacpan.org/changes/distribution/Net-OpenID-Consumer","https://github.com/wrog/Net-OpenID-Consumer/commit/4e82c7e4b6ad4bc40571c5cfcaa58f9365b147a5","http://lists.openid.net/pipermail/openid-security/2010-July/001156.html"],"description":"A potential timing attack when checking signatures.\n","id":"CPANSA-Net-OpenID-Consumer-2010-01","fixed_versions":[">=1.12"],"cves":[],"reported":"2010-11-06","distribution":"Net-OpenID-Consumer","affected_versions":["<1.12"]},{"affected_versions":["<0.06"],"distribution":"Net-OpenID-Consumer","reported":"2015-05-26","cves":[],"fixed_versions":[">=0.06"],"id":"CPANSA-Net-OpenID-Consumer-2015-05","description":"Incorrect comparison of system openssl status when doing DSA checks.\n","references":["https://metacpan.org/changes/distribution/Net-OpenID-Consumer"]}],"versions":[{"date":"2005-05-23T03:02:59","version":"0.02"},{"date":"2005-05-23T08:05:35","version":"0.03"},{"date":"2005-05-25T05:08:25","version":"0.04"},{"date":"2005-05-25T06:14:44","version":"0.05"},{"version":"0.06","date":"2005-05-26T06:18:39"},{"version":"0.07","date":"2005-05-26T06:56:30"},{"date":"2005-05-26T07:18:01","version":"0.08"},{"version":"0.09","date":"2005-06-23T23:50:47"},{"date":"2005-06-27T04:43:01","version":"0.10"},{"version":"0.11","date":"2005-06-27T21:59:47"},{"date":"2005-07-13T17:57:27","version":"0.12"},{"version":"0.13","date":"2007-04-16T17:58:45"},{"version":"0.14","date":"2007-08-03T22:07:20"},{"date":"2008-10-13T02:30:05","version":"1.01"},{"version":"1.02","date":"2008-10-14T04:39:07"},{"version":"1.03","date":"2008-11-30T02:02:17"},{"version":"1.04","date":"2010-02-18T15:32:06"},{"version":"1.05","date":"2010-02-18T16:01:19"},{"date":"2010-03-16T17:38:56","version":"1.06"},{"date":"2010-11-06T02:24:29","version":"1.030099_001"},{"date":"2010-11-07T11:21:33","version":"1.030099_002"},{"date":"2010-11-08T22:35:52","version":"1.030099_003"},{"date":"2010-12-17T21:57:03","version":"1.030099_004"},{"version":"1.030099_005","date":"2011-01-01T01:55:09"},{"date":"2011-10-23T01:35:49","version":"1.030099_006"},{"date":"2011-10-25T23:10:00","version":"1.100099_001"},{"version":"1.100099_002","date":"2011-11-02T10:38:05"},{"version":"1.11","date":"2011-11-04T23:01:32"},{"version":"1.12","date":"2011-11-07T17:16:08"},{"version":"1.13","date":"2011-11-15T03:28:36"},{"version":"1.14","date":"2013-04-01T13:17:57"},{"version":"1.15","date":"2013-09-06T23:47:04"},{"date":"2014-09-15T21:38:12","version":"1.16"},{"date":"2016-01-15T11:45:55","version":"1.17"},{"version":"1.18","date":"2016-02-08T01:40:13"}]},"Cmd-Dwarf":{"versions":[{"version":"1.27","date":"2015-07-30T06:48:35"},{"date":"2015-08-26T13:27:51","version":"1.28"},{"version":"1.29","date":"2015-08-28T08:58:33"},{"date":"2015-09-17T08:17:32","version":"1.30"},{"version":"1.31","date":"2016-01-20T06:39:15"},{"version":"1.41","date":"2016-10-25T05:56:33"},{"version":"1.42","date":"2017-03-29T04:42:05"},{"date":"2017-06-21T07:06:05","version":"1.50"},{"version":"1.60","date":"2017-10-05T08:08:01"},{"date":"2018-03-17T07:35:19","version":"1.70"},{"date":"2018-08-18T11:43:10","version":"1.80"},{"date":"2019-04-05T05:22:33","version":"1.81"},{"date":"2019-04-05T05:36:46","version":"1.82"},{"date":"2019-04-05T09:06:55","version":"1.83"}],"advisories":[{"id":"CPANSA-Cmd-Dwarf-2014-01","fixed_versions":[">=1.20"],"references":["https://github.com/seagirl/dwarf/commit/14cf7a1d55db635a07f4838e16f3d9a28e63f529","https://metacpan.org/changes/distribution/Cmd-Dwarf"],"description":"JSON highjacking possibility.\n","distribution":"Cmd-Dwarf","reported":"2014-12-03","affected_versions":["<1.20"],"cves":[]}],"main_module":"Cmd::Dwarf"},"Proc-Daemon":{"versions":[{"date":"1998-01-27T18:42:37","version":"0.01"},{"date":"1999-04-17T19:55:07","version":"0.02"},{"date":"2003-06-19T22:58:30","version":"0.03"},{"date":"2010-10-23T23:11:32","version":"0.04"},{"date":"2010-10-28T20:25:50","version":"0.05"},{"version":"0.06","date":"2011-01-17T22:14:07"},{"date":"2011-02-17T19:34:32","version":"0.07"},{"date":"2011-03-13T17:38:15","version":"0.08"},{"version":"0.09","date":"2011-03-15T07:05:00"},{"version":"0.10","date":"2011-04-01T19:26:32"},{"version":"0.11","date":"2011-05-23T14:48:37"},{"version":"0.12","date":"2011-05-24T17:12:19"},{"version":"0.13","date":"2011-06-01T11:39:51"},{"date":"2011-06-03T09:06:45","version":"0.14"},{"date":"2015-01-22T00:22:38","version":"0.15"},{"date":"2015-01-23T00:10:30","version":"0.16"},{"version":"0.17","date":"2015-01-23T23:23:49"},{"date":"2015-01-27T01:03:25","version":"0.18"},{"date":"2015-03-22T09:37:55","version":"0.19"},{"date":"2015-06-24T04:34:03","version":"0.20"},{"version":"0.21","date":"2015-08-07T01:52:52"},{"date":"2015-10-29T00:30:34","version":"0.22"},{"version":"0.23","date":"2016-01-01T18:51:05"}],"advisories":[{"cves":["CVE-2013-7135"],"affected_versions":["<0.14"],"reported":"2014-01-28","distribution":"Proc-Daemon","description":"The Proc::Daemon module 0.14 for Perl uses world-writable permissions for a file that stores a process ID, which allows local users to have an unspecified impact by modifying this file.\n","references":["http://www.openwall.com/lists/oss-security/2014/01/07/7","http://www.openwall.com/lists/oss-security/2013/12/16/5","http://www.openwall.com/lists/oss-security/2013/12/18/2","https://rt.cpan.org/Public/Bug/Display.html?id=91450","http://www.mandriva.com/security/advisories?name=MDVSA-2014:021"],"fixed_versions":[],"severity":null,"id":"CPANSA-Proc-Daemon-2013-7135"}],"main_module":"Proc::Daemon"},"Crypt-Perl":{"main_module":"Crypt::Perl","advisories":[{"cves":["CVE-2020-17478"],"reported":"2020-08-10","distribution":"Crypt-Perl","affected_versions":["<0.33"],"description":"ECDSA/EC/Point.pm in Crypt::Perl before 0.33 does not properly consider timing attacks against the EC point multiplication algorithm.\n","references":["https://github.com/FGasper/p5-Crypt-Perl/compare/0.32...0.33"],"id":"CPANSA-Crypt-Perl-2020-01","severity":"high","fixed_versions":[">=0.33"]},{"description":"Crypt::Perl::ECDSA in the Crypt::Perl (aka p5-Crypt-Perl) module before 0.32 for Perl fails to verify correct ECDSA signatures when r and s are small and when s = 1. This happens when using the curve secp256r1 (prime256v1). This could conceivably have a security-relevant impact if an attacker wishes to use public r and s values when guessing whether signature verification will fail.\n","references":["https://github.com/FGasper/p5-Crypt-Perl/commit/f960ce75502acf7404187231a706672f8369acb2","https://github.com/FGasper/p5-Crypt-Perl/issues/14"],"id":"CPANSA-Crypt-Perl-2020-02","severity":"high","fixed_versions":[">=0.32"],"cves":["CVE-2020-13895"],"distribution":"Crypt-Perl","reported":"2020-06-07","affected_versions":["<0.32"]}],"versions":[{"date":"2016-12-14T06:20:54","version":0.01},{"version":0.02,"date":"2016-12-17T05:33:45"},{"version":0.021,"date":"2016-12-19T14:55:23"},{"date":"2016-12-19T22:19:39","version":0.022},{"date":"2016-12-20T08:45:47","version":0.03},{"version":0.031,"date":"2016-12-20T18:44:49"},{"version":0.032,"date":"2016-12-21T05:18:09"},{"date":"2016-12-23T05:59:32","version":0.033},{"date":"2016-12-29T16:03:59","version":0.1},{"date":"2016-12-31T06:23:01","version":0.11},{"date":"2017-01-02T21:24:31","version":0.12},{"date":"2017-01-03T14:55:13","version":0.13},{"date":"2017-01-03T16:30:45","version":0.14},{"version":0.15,"date":"2017-01-04T00:12:29"},{"date":"2017-02-02T09:09:40","version":"0.15_1"},{"version":"0.16_rc1","date":"2017-02-03T03:31:34"},{"version":"0.15_2","date":"2017-02-03T03:38:07"},{"date":"2017-02-03T07:21:32","version":"0.15_3"},{"date":"2017-02-07T04:16:06","version":"0.16"},{"version":"0.16_1","date":"2017-02-08T07:56:45"},{"date":"2017-02-08T09:25:41","version":"0.17"},{"date":"2017-02-09T04:07:34","version":"0.17_1"},{"version":"0.18-TRIAL1","date":"2018-06-18T01:48:20"},{"version":"0.18-TRIAL2","date":"2018-06-18T02:52:52"},{"date":"2018-06-18T12:03:17","version":"0.18-TRIAL3"},{"date":"2018-06-18T15:07:20","version":"0.18-TRIAL4"},{"version":"0.18-TRIAL5","date":"2018-06-18T20:34:04"},{"date":"2018-06-18T21:06:07","version":"0.18-TRIAL6"},{"version":"0.18-TRIAL7","date":"2018-06-18T21:47:43"},{"date":"2018-06-18T22:42:19","version":"0.18"},{"version":"0.19","date":"2018-06-19T04:25:06"},{"version":"0.20-TRIAL1","date":"2018-06-19T06:14:32"},{"version":"0.20-TRIAL2","date":"2018-06-19T14:23:57"},{"date":"2018-06-19T15:50:08","version":"0.20"},{"date":"2018-06-19T15:56:15","version":"0.21"},{"date":"2018-06-21T03:33:59","version":"0.22-TRIAL1"},{"version":"0.22-TRIAL2","date":"2018-06-21T13:31:18"},{"date":"2018-06-22T14:43:21","version":"0.22"},{"date":"2018-06-23T00:40:40","version":"0.23-TRIAL1"},{"date":"2018-06-25T14:35:15","version":"0.23"},{"date":"2018-07-23T03:11:37","version":"0.24_TRIAL1"},{"date":"2018-07-23T03:13:05","version":"0.24_TRIAL2"},{"version":"0.24-TRIAL3","date":"2018-07-23T03:16:58"},{"version":"0.24-TRIAL4","date":"2018-07-23T12:12:48"},{"date":"2018-07-24T22:03:18","version":"0.24"},{"date":"2018-07-25T01:54:45","version":"0.25"},{"date":"2018-07-28T19:52:07","version":"0.26-TRIAL1"},{"date":"2018-07-28T22:07:05","version":"0.26"},{"date":"2018-07-28T22:26:02","version":"0.27-TRIAL1"},{"version":"0.27","date":"2018-07-29T02:05:05"},{"version":"0.28","date":"2018-08-25T00:24:23"},{"version":"0.29","date":"2018-08-25T02:38:45"},{"date":"2018-12-22T02:29:37","version":"0.30-TRIAL1"},{"date":"2018-12-22T15:18:25","version":"0.30-TRIAL2"},{"date":"2018-12-24T03:14:46","version":"0.30-TRIAL3"},{"version":"0.30","date":"2019-09-12T03:13:59"},{"version":"0.31_01","date":"2020-02-11T00:54:58"},{"date":"2020-02-11T02:50:09","version":"0.31_02"},{"date":"2020-02-12T01:19:36","version":"0.31"},{"date":"2020-06-04T12:31:25","version":"0.32_01"},{"date":"2020-06-04T12:56:11","version":"0.32_02"},{"version":"0.32","date":"2020-06-05T02:53:59"},{"version":"0.33","date":"2020-08-10T15:39:12"},{"date":"2020-09-24T07:31:56","version":"0.34_02"},{"version":"0.34_03","date":"2020-09-24T07:37:16"},{"date":"2020-09-25T01:38:34","version":"0.34_04"},{"version":"0.34_05","date":"2020-09-26T03:44:57"},{"date":"2020-09-26T12:38:56","version":"0.34_06"},{"date":"2020-09-26T18:03:25","version":"0.34_07"},{"version":"0.34_08","date":"2020-09-27T13:00:26"},{"version":"0.34_09","date":"2020-09-27T23:51:08"},{"version":"0.34","date":"2020-09-28T07:22:06"},{"version":"0.35_02","date":"2021-11-17T15:13:58"},{"version":"0.35","date":"2021-11-18T03:39:19"},{"date":"2021-11-18T03:44:32","version":"0.36"},{"version":"0.37_01","date":"2021-11-20T13:20:35"},{"date":"2021-11-21T03:44:48","version":"0.37_02"},{"date":"2021-11-22T04:28:59","version":"0.37_03"},{"version":"0.37_04","date":"2021-11-29T02:09:35"},{"version":"0.37_05","date":"2021-11-30T02:16:10"},{"version":"0.37_06","date":"2021-11-30T16:09:14"},{"date":"2021-12-01T01:39:08","version":"0.37_07"},{"date":"2021-12-02T21:42:02","version":"0.37_08"},{"version":"0.37_09","date":"2021-12-06T15:38:41"},{"version":"0.37_10","date":"2021-12-08T01:12:53"},{"date":"2021-12-09T13:42:15","version":"0.37_11"},{"date":"2021-12-14T02:08:33","version":"0.37_12"},{"date":"2021-12-15T05:19:53","version":"0.37_13"},{"date":"2021-12-17T19:36:38","version":"0.37"},{"date":"2022-10-17T15:04:13","version":"0.38"}]},"IPC-Run":{"versions":[{"date":"2000-05-22T05:10:41","version":"0.1"},{"date":"2000-06-01T06:12:25","version":"0.2"},{"date":"2000-06-02T16:53:04","version":"0.21"},{"version":"0.3","date":"2000-06-03T12:34:23"},{"date":"2000-06-06T18:48:56","version":"0.32"},{"version":"0.33","date":"2000-06-08T10:24:28"},{"date":"2000-06-08T10:41:19","version":"0.34"},{"version":"0.4","date":"2000-06-15T19:06:43"},{"version":"0.42","date":"2000-08-17T14:33:30"},{"date":"2000-10-02T21:20:49","version":"0.44"},{"version":"0.5","date":"2001-11-11T04:21:36"},{"version":"0.51","date":"2001-11-12T07:19:27"},{"date":"2001-12-01T06:05:11","version":"0.54"},{"version":"0.55","date":"2001-12-01T21:54:11"},{"version":"0.56","date":"2001-12-02T13:48:12"},{"date":"2001-12-06T20:33:30","version":"0.6"},{"version":"0.61","date":"2001-12-07T09:31:12"},{"date":"2002-01-01T20:42:40","version":"0.62"},{"version":"0.63","date":"2002-02-27T17:14:16"},{"version":"0.64","date":"2002-03-14T17:14:53"},{"version":"0.66","date":"2002-03-27T11:42:32"},{"version":"0.7","date":"2002-04-26T15:04:45"},{"version":"0.71","date":"2002-05-06T13:23:28"},{"date":"2002-05-09T15:58:13","version":"0.72"},{"date":"2002-05-22T13:20:13","version":"0.73"},{"date":"2002-05-23T13:48:23","version":"0.74"},{"version":"0.75","date":"2003-01-28T17:59:36"},{"version":"0.77","date":"2003-09-26T19:35:48"},{"date":"2004-03-09T06:22:24","version":"0.78"},{"date":"2005-01-19T23:50:56","version":"0.79"},{"version":"0.80_91","date":"2006-03-10T15:30:59"},{"version":"0.80","date":"2006-05-10T20:00:28"},{"version":"0.81_01","date":"2008-10-15T09:59:57"},{"date":"2008-12-18T12:01:25","version":"0.82"},{"date":"2009-07-09T16:38:18","version":"0.83"},{"date":"2009-07-13T00:59:41","version":"0.84"},{"date":"2010-03-23T05:12:54","version":"0.85"},{"date":"2010-03-24T20:11:05","version":"0.86"},{"version":"0.87","date":"2010-03-29T18:03:50"},{"version":"0.88","date":"2010-03-30T18:14:22"},{"date":"2010-04-01T04:48:26","version":"0.89"},{"date":"2011-06-03T04:41:40","version":"0.90_01"},{"version":"0.90_02","date":"2011-06-29T04:15:08"},{"version":"0.90_03","date":"2011-07-01T04:18:30"},{"version":"0.90","date":"2011-07-03T20:10:42"},{"version":"0.91_01","date":"2012-01-25T05:16:00"},{"version":"0.91","date":"2012-02-15T04:50:23"},{"version":"0.92_01","date":"2012-08-22T15:00:56"},{"date":"2012-08-30T15:26:42","version":"0.92"},{"version":"0.93","date":"2014-12-11T05:59:50"},{"version":"0.93_01","date":"2014-12-11T07:48:28"},{"date":"2014-12-14T07:23:31","version":"0.94"},{"date":"2016-04-13T03:11:26","version":"0.94_01"},{"date":"2016-04-14T05:15:22","version":"0.94_02"},{"version":"0.95","date":"2017-04-25T01:29:03"},{"version":"0.96","date":"2017-05-12T13:48:34"},{"version":"0.97","date":"2018-03-26T21:45:38"},{"date":"2018-03-29T18:52:43","version":"0.98"},{"date":"2018-03-30T22:49:37","version":"0.99"},{"version":"20180523.0","date":"2018-05-23T17:24:25"},{"version":"20200505.0","date":"2020-05-05T20:57:23"},{"version":"20220807.0","date":"2022-08-07T12:50:57"},{"date":"2023-10-03T01:09:01","version":"20231003.0"}],"main_module":"IPC::Run","advisories":[{"description":"INADDR_ANY can be your external ip, IPC::Run should only listen on localhost.\n","references":["https://metacpan.org/dist/IPC-Run/changes","https://rt.cpan.org/Public/Bug/Display.html?id=49693"],"id":"CPANSA-IPC-Run-2009-01","fixed_versions":[">=0.90"],"cves":[],"distribution":"IPC-Run","reported":"2009-09-14","affected_versions":["<0.90","=0.90_01","=0.90_02"]}]},"MIME-tools":{"versions":[{"version":"2.01","date":"1996-10-18T13:57:11"},{"date":"1996-10-23T19:20:59","version":"2.02"},{"version":"2.03","date":"1996-10-28T18:27:36"},{"date":"1996-11-03T00:35:36","version":"2.04"},{"version":"2.13","date":"1997-01-13T10:17:14"},{"version":"2.14","date":"1997-01-14T07:05:37"},{"date":"1997-01-21T03:40:48","version":"3.203"},{"date":"1997-01-22T11:24:13","version":"3.204"},{"date":"1998-01-14T15:44:55","version":"4.111"},{"version":"4.112","date":"1998-01-18T04:23:37"},{"version":"4.113","date":"1998-01-20T08:21:18"},{"version":"4.116","date":"1998-02-14T21:45:26"},{"date":"1998-05-05T14:32:36","version":"4.119"},{"date":"1998-06-04T13:30:01","version":"4.121"},{"version":"4.122","date":"1999-02-10T05:39:03"},{"version":"4.124","date":"1999-05-14T13:29:15"},{"version":"5.115","date":"2000-05-24T14:44:21"},{"date":"2000-05-26T04:46:25","version":"5.116"},{"date":"2000-06-06T16:14:02","version":"5.205"},{"version":"5.206","date":"2000-06-08T07:36:13"},{"version":"5.207","date":"2000-06-09T03:44:00"},{"version":"5.209","date":"2000-06-10T08:12:36"},{"version":"5.210","date":"2000-06-20T13:24:34"},{"version":"5.211","date":"2000-06-24T06:57:34"},{"version":"5.304","date":"2000-07-07T14:46:11"},{"date":"2000-07-20T06:47:41","version":"5.306"},{"date":"2000-08-15T14:22:44","version":"5.310"},{"date":"2000-08-16T05:28:11","version":"5.311"},{"version":"5.313","date":"2000-09-05T04:17:48"},{"version":"5.314","date":"2000-09-06T04:59:03"},{"date":"2000-09-21T06:14:25","version":"5.316"},{"version":"5.404","date":"2000-11-05T15:24:04"},{"version":"5.405","date":"2000-11-06T00:34:39"},{"version":"5.408","date":"2000-11-10T05:27:35"},{"version":"5.409","date":"2000-11-20T18:04:43"},{"date":"2000-11-23T05:31:08","version":"5.410"},{"version":"5.411","date":"2001-06-05T15:21:25"},{"version":"5.411","date":"2001-11-16T17:32:32"},{"date":"2003-06-09T16:42:00","version":"6.200_01"},{"version":"6.200_02","date":"2003-07-22T20:49:42"},{"version":"5.412","date":"2004-09-14T14:20:07"},{"date":"2004-09-15T14:11:08","version":"5.413"},{"version":"5.414","date":"2004-10-06T19:46:54"},{"date":"2004-10-27T12:51:54","version":"5.415"},{"date":"2005-01-03T15:45:29","version":"5.416"},{"version":"5.417","date":"2005-01-20T21:24:25"},{"date":"2005-09-29T19:40:53","version":"5.418"},{"version":"5.419","date":"2005-12-22T21:52:16"},{"date":"2006-03-17T21:20:12","version":"5.420"},{"version":"5.420_01","date":"2007-06-18T20:04:22"},{"version":"5.420_02","date":"2007-08-31T18:03:20"},{"version":"5.421","date":"2007-09-20T21:33:01"},{"version":"5.422","date":"2007-09-25T22:31:20"},{"date":"2007-09-27T15:50:17","version":"5.423"},{"version":"5.424","date":"2007-11-07T15:36:31"},{"version":"5.425","date":"2007-11-17T16:20:42"},{"date":"2008-03-18T13:45:38","version":"5.426"},{"version":"5.426","date":"2008-06-30T18:41:00"},{"date":"2010-04-22T15:31:33","version":"5.428"},{"version":"5.500","date":"2010-04-30T13:47:59"},{"date":"2011-01-07T15:59:19","version":"5.500"},{"version":"5.501","date":"2011-02-17T18:37:12"},{"version":"5.502","date":"2011-03-08T14:03:11"},{"date":"2012-06-08T13:44:12","version":"5.503"},{"version":"5.504","date":"2013-01-30T21:01:40"},{"version":"5.505","date":"2013-11-14T15:27:15"},{"version":"5.506","date":"2015-04-22T17:32:26"},{"version":"5.507","date":"2015-09-30T13:21:56"},{"date":"2016-08-29T14:52:28","version":"5.508"},{"date":"2017-04-05T18:13:30","version":"5.508"},{"version":"5.503","date":"2022-07-06T14:20:39"},{"date":"2024-01-02T15:38:07","version":"5.503"},{"date":"2024-01-08T18:22:18","version":"5.503"},{"version":"5.503","date":"2024-01-25T16:28:54"},{"version":"5.503","date":"2024-02-06T20:49:02"},{"version":"5.515","date":"2024-04-24T15:36:43"}],"main_module":"MIME::Body","advisories":[{"affected_versions":["<4.109"],"distribution":"MIME-tools","reported":"1998-01-10","cves":[],"fixed_versions":[">=4.109"],"id":"CPANSA-MIME-tools-1998-01","severity":null,"description":"There was a potential security hole when outputting entities with recommended filenames.\n","references":["https://metacpan.org/dist/MIME-tools/changes"]}]},"PAR":{"advisories":[{"references":["https://metacpan.org/changes/distribution/PAR","https://rt.cpan.org/Public/Bug/Display.html?id=69560"],"description":"PAR packed files are extracted to unsafe and predictable temporary directories (this bug was originally reported against PAR::Packer, but it applies to PAR as well).\n","fixed_versions":[">=1.003"],"id":"CPANSA-PAR-2011-01","cves":["CVE-2011-4114"],"affected_versions":["<1.003"],"reported":"2011-07-18","distribution":"PAR"},{"fixed_versions":[">=1.003"],"severity":null,"id":"CPANSA-PAR-2011-5060","description":"The par_mktmpdir function in the PAR module before 1.003 for Perl creates temporary files in a directory with a predictable name without verifying ownership and permissions of this directory, which allows local users to overwrite files when another user extracts a PAR packed program, a different vulnerability in a different package than CVE-2011-4114.\n","references":["http://cpansearch.perl.org/src/RSCHUPP/PAR-1.003/ChangeLog","https://bugzilla.redhat.com/show_bug.cgi?id=753955","https://rt.cpan.org/Public/Bug/Display.html?id=69560","https://exchange.xforce.ibmcloud.com/vulnerabilities/72435"],"affected_versions":["<1.003"],"distribution":"PAR","reported":"2012-01-13","cves":["CVE-2011-5060"]}],"main_module":"PAR","versions":[{"date":"2002-10-18T20:38:24","version":"0.01"},{"version":"0.02","date":"2002-10-18T21:07:35"},{"version":"0.03","date":"2002-10-18T22:18:06"},{"version":"0.04","date":"2002-10-19T02:46:52"},{"version":"0.05","date":"2002-10-19T14:33:26"},{"date":"2002-10-19T15:31:54","version":"0.06"},{"date":"2002-10-19T17:38:40","version":"0.10"},{"version":"0.11","date":"2002-10-19T22:30:34"},{"date":"2002-10-20T13:00:43","version":"0.12"},{"date":"2002-10-21T17:29:03","version":"0.13"},{"version":"0.14","date":"2002-10-27T10:38:32"},{"version":"0.15","date":"2002-10-27T17:52:07"},{"version":"0.20","date":"2002-11-02T02:20:38"},{"date":"2002-11-02T21:26:48","version":"0.21"},{"version":"0.22","date":"2002-11-03T13:05:06"},{"version":"0.30","date":"2002-11-05T14:36:58"},{"version":"0.40","date":"2002-11-05T22:23:36"},{"version":"0.41","date":"2002-11-06T12:25:00"},{"date":"2002-11-07T00:48:34","version":"0.42"},{"date":"2002-11-07T14:41:31","version":"0.43"},{"date":"2002-11-08T15:01:18","version":"0.44"},{"version":"0.45","date":"2002-11-08T21:01:12"},{"date":"2002-11-09T23:02:45","version":"0.46"},{"date":"2002-11-10T06:56:37","version":"0.47"},{"date":"2002-11-13T11:32:10","version":"0.48"},{"date":"2002-11-23T14:45:40","version":"0.49"},{"version":"0.50","date":"2002-12-03T01:00:23"},{"date":"2002-12-11T14:30:53","version":"0.51"},{"date":"2002-12-17T04:06:52","version":"0.60"},{"date":"2002-12-17T11:49:44","version":"0.61"},{"version":"0.62","date":"2003-01-09T11:16:42"},{"version":"0.63","date":"2003-02-06T00:38:33"},{"date":"2003-03-01T15:54:25","version":"0.64"},{"version":"0.65","date":"2003-03-09T14:31:52"},{"version":"0.66","date":"2003-03-19T15:54:32"},{"version":"0.66","date":"2003-03-31T19:58:56"},{"version":"0.67_89","date":"2003-05-16T17:35:22"},{"date":"2003-05-25T19:09:58","version":"0.68"},{"version":"0.69","date":"2003-05-31T13:12:53"},{"date":"2003-07-08T15:39:11","version":"0.69"},{"date":"2003-07-16T08:20:09","version":"0.69_91"},{"version":"0.69_93","date":"2003-07-27T14:13:18"},{"version":"0.70","date":"2003-07-29T08:21:31"},{"version":"0.71","date":"2003-07-30T13:57:01"},{"date":"2003-08-02T13:11:15","version":"0.72"},{"date":"2003-08-06T09:16:17","version":"0.73"},{"version":"0.74","date":"2003-08-25T13:39:35"},{"version":"0.75","date":"2003-09-21T10:58:00"},{"date":"2003-10-23T04:45:55","version":"0.75_99"},{"date":"2003-10-28T12:21:23","version":"0.76"},{"version":"0.76_98","date":"2003-12-11T23:00:26"},{"version":"0.76_99","date":"2003-12-28T02:31:29"},{"date":"2003-12-31T15:33:24","version":"0.77"},{"date":"2004-01-03T17:36:11","version":"0.77_98"},{"date":"2004-01-04T20:30:15","version":"0.77_99"},{"version":"0.78","date":"2004-01-06T21:26:43"},{"date":"2004-01-08T11:35:51","version":"0.79"},{"date":"2004-02-15T23:25:34","version":"0.79_97"},{"date":"2004-02-27T15:58:33","version":"0.79_98"},{"date":"2004-02-27T23:54:39","version":"0.79_98"},{"version":"0.79_99","date":"2004-03-03T14:49:47"},{"date":"2004-03-16T17:04:25","version":"0.80"},{"date":"2004-03-28T14:43:14","version":"0.80_99"},{"date":"2004-05-22T19:13:38","version":"0.81"},{"version":"0.82","date":"2004-05-24T14:59:45"},{"version":"0.83","date":"2004-05-29T16:02:03"},{"version":"0.85","date":"2004-07-02T10:59:55"},{"version":"0.85_01","date":"2004-08-30T22:49:15"},{"version":"0.86","date":"2004-12-11T03:49:09"},{"date":"2005-01-30T19:04:55","version":"0.87"},{"date":"2005-06-07T09:13:43","version":"0.88"},{"version":"0.89","date":"2005-06-10T15:49:20"},{"date":"2005-11-25T23:01:00","version":"0.90"},{"date":"2006-02-15T09:33:05","version":"0.91"},{"date":"2006-03-04T20:16:36","version":"0.91"},{"date":"2006-05-19T13:37:12","version":"0.93"},{"version":"0.93","date":"2006-06-02T10:25:51"},{"version":"0.93","date":"2006-06-20T20:44:56"},{"date":"2006-07-22T19:59:13","version":"0.942"},{"date":"2006-08-05T11:28:06","version":"0.950"},{"date":"2006-08-11T15:51:56","version":"0.950"},{"date":"2006-08-12T12:35:34","version":"0.950"},{"date":"2006-08-22T14:14:35","version":"0.952"},{"version":"0.954","date":"2006-09-26T20:18:06"},{"version":"0.955","date":"2006-10-03T12:35:05"},{"date":"2006-10-03T12:58:55","version":"0.956"},{"date":"2006-10-24T16:42:26","version":"0.957"},{"version":"0.958","date":"2006-11-11T14:33:23"},{"date":"2006-11-12T11:48:37","version":"0.959"},{"version":"0.960","date":"2006-11-21T12:02:35"},{"version":"0.969_01","date":"2006-12-01T14:19:55"},{"version":"0.970","date":"2006-12-03T17:25:33"},{"version":"0.970_01","date":"2007-01-10T17:58:01"},{"date":"2007-01-12T11:02:02","version":"0.971"},{"date":"2007-01-16T15:23:38","version":"0.972"},{"version":"0.973","date":"2007-02-03T11:40:25"},{"date":"2007-07-29T11:17:27","version":"0.976"},{"version":"0.977","date":"2007-12-20T21:17:26"},{"version":"0.979","date":"2008-05-13T12:44:22"},{"date":"2008-05-22T11:41:38","version":"0.980"},{"date":"2008-08-09T22:17:14","version":"0.980"},{"version":"0.980","date":"2008-08-10T21:39:41"},{"version":"0.983","date":"2008-09-12T15:02:23"},{"date":"2009-01-25T22:31:20","version":"0.984"},{"date":"2009-02-02T01:40:36","version":"0.985_01"},{"date":"2009-02-19T16:04:27","version":"0.986"},{"version":"0.987_01","date":"2009-02-20T14:30:08"},{"date":"2009-03-02T14:47:14","version":"0.988"},{"version":"0.989_01","date":"2009-03-02T14:56:44"},{"version":"0.991","date":"2009-03-10T15:11:05"},{"date":"2009-04-05T11:32:48","version":"0.992"},{"date":"2009-07-19T16:37:30","version":"0.993"},{"date":"2009-07-23T13:08:07","version":"0.994"},{"version":"1.000","date":"2010-04-10T14:05:52"},{"date":"2010-07-25T09:32:33","version":"1.001"},{"version":"1.002","date":"2010-07-25T10:07:06"},{"date":"2011-11-28T16:53:29","version":"1.003"},{"date":"2011-11-30T22:31:25","version":"1.004"},{"version":"1.005","date":"2011-12-02T13:53:02"},{"date":"2012-10-14T22:45:17","version":"1.006"},{"version":"1.007","date":"2012-10-22T21:50:20"},{"version":"1.008","date":"2015-01-24T14:11:44"},{"date":"2015-04-22T15:26:50","version":"1.009"},{"version":"1.010","date":"2015-07-13T10:56:21"},{"version":"1.011","date":"2016-09-18T11:33:22"},{"version":"1.012","date":"2016-11-25T16:06:43"},{"date":"2016-11-27T16:51:00","version":"1.013"},{"version":"1.014","date":"2016-12-18T16:36:08"},{"version":"1.015","date":"2017-04-13T15:29:12"},{"version":"1.016","date":"2019-05-20T18:13:46"},{"date":"2021-01-13T14:51:49","version":"1.017"},{"date":"2022-09-28T20:53:07","version":"1.018"},{"date":"2023-11-01T13:25:01","version":"1.019"},{"version":"1.020","date":"2024-03-04T10:49:29"}]},"HTTP-Tiny":{"main_module":"HTTP::Tiny","advisories":[{"cves":["CVE-2023-31486"],"reported":"2023-02-14","distribution":"HTTP-Tiny","affected_versions":["<0.083"],"description":"HTTP::Tiny v0.082, a Perl core module since v5.13.9 and available standalone on CPAN, does not verify TLS certs by default. Users must opt-in with the verify_SSL=>1 flag to verify certs when using HTTPS.\nResulting in a CWE-1188: Insecure Default Initialization of Resource weakness.\n","references":["https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/","https://github.com/chansen/p5-http-tiny/issues/152","https://github.com/chansen/p5-http-tiny/pull/151","https://hackeriet.github.io/cpan-http-tiny-overview/","https://www.reddit.com/r/perl/comments/111tadi/psa_httptiny_disabled_ssl_verification_by_default/","https://github.com/NixOS/nixpkgs/pull/187480","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962407","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=954089","https://salsa.debian.org/perl-team/interpreter/perl/-/commit/1490431e40e22052f75a0b3449f1f53cbd27ba92.patch","https://github.com/chansen/p5-http-tiny/issues/134","https://github.com/chansen/p5-http-tiny/issues/68"],"id":"CPANSA-HTTP-Tiny-2023-31486","fixed_versions":[">=0.083"]},{"fixed_versions":[">=0.059"],"id":"CPANSA-HTTP-Tiny-2016-1238","description":"Loading modules from . (current directory).\n","references":["https://metacpan.org/changes/distribution/HTTP-Tiny","https://github.com/chansen/p5-http-tiny/commit/b239c95ea7a256cfee9b8848f1bd4d1df6e66444"],"affected_versions":["<0.059"],"reported":"2016-07-29","distribution":"HTTP-Tiny","cves":["CVE-2016-1238"]},{"description":"Temporary file creating during mirror() not opened exclusively.\n","references":["https://metacpan.org/dist/HTTP-Tiny/changes"],"id":"CPANSA-HTTP-Tiny-2013-01","fixed_versions":[">=0.039"],"cves":[],"reported":"2013-11-27","distribution":"HTTP-Tiny","affected_versions":["<0.039"]}],"versions":[{"date":"2010-12-11T12:59:31","version":"0.001"},{"version":"0.002","date":"2010-12-14T02:59:37"},{"version":"0.003","date":"2010-12-15T17:30:49"},{"version":"0.004","date":"2010-12-16T03:53:33"},{"version":"0.005","date":"2011-01-08T11:32:21"},{"date":"2011-01-10T12:27:39","version":"0.006"},{"version":"0.007","date":"2011-01-12T09:56:28"},{"version":"0.008","date":"2011-01-14T11:34:51"},{"version":"0.009","date":"2011-01-17T21:29:27"},{"version":"0.010","date":"2011-02-04T07:45:53"},{"date":"2011-03-20T00:49:53","version":"0.011"},{"version":"0.012","date":"2011-03-31T19:49:33"},{"version":"0.013","date":"2011-07-18T03:15:12"},{"version":"0.014","date":"2011-10-20T17:55:01"},{"date":"2011-10-26T20:42:15","version":"0.015"},{"version":"0.016","date":"2011-10-27T03:06:06"},{"version":"0.017","date":"2012-02-23T02:58:42"},{"date":"2012-04-18T13:41:15","version":"0.018"},{"date":"2012-05-14T11:15:52","version":"0.019"},{"date":"2012-05-14T19:25:57","version":"0.020"},{"date":"2012-05-16T02:39:55","version":"0.021"},{"date":"2012-06-02T03:32:21","version":"0.022"},{"version":"0.023","date":"2012-09-19T16:06:37"},{"date":"2012-10-10T00:45:59","version":"0.024"},{"version":"0.025","date":"2012-12-26T17:11:23"},{"date":"2013-03-05T03:54:12","version":"0.026"},{"date":"2013-03-05T17:04:07","version":"0.027"},{"version":"0.028","date":"2013-03-05T19:13:42"},{"date":"2013-04-17T17:51:23","version":"0.029"},{"version":"0.030","date":"2013-06-13T15:47:33"},{"version":"0.031","date":"2013-06-17T03:18:45"},{"date":"2013-06-20T15:42:26","version":"0.032"},{"version":"0.033","date":"2013-06-21T10:27:45"},{"version":"0.034","date":"2013-06-26T23:03:50"},{"version":"0.035","date":"2013-09-10T16:30:04"},{"version":"0.036","date":"2013-09-25T16:11:04"},{"version":"0.037","date":"2013-10-28T17:50:02"},{"date":"2013-11-18T17:57:17","version":"0.038"},{"date":"2013-11-28T00:49:36","version":"0.039"},{"version":"0.040","date":"2014-02-17T18:05:10"},{"version":"0.041","date":"2014-02-17T18:09:12"},{"date":"2014-02-18T16:24:50","version":"0.042"},{"version":"0.043","date":"2014-02-21T01:42:05"},{"version":"0.044","date":"2014-07-17T03:47:41"},{"date":"2014-07-20T23:24:33","version":"0.045"},{"version":"0.046","date":"2014-07-21T14:33:53"},{"version":"0.047","date":"2014-07-29T18:13:01"},{"date":"2014-08-21T17:20:45","version":"0.048"},{"version":"0.049","date":"2014-09-02T15:21:17"},{"version":"0.050","date":"2014-09-23T19:32:00"},{"version":"0.051","date":"2014-11-18T03:59:56"},{"version":"0.052","date":"2014-12-11T20:25:19"},{"date":"2014-12-12T04:43:37","version":"0.053"},{"date":"2015-01-27T12:18:58","version":"0.054"},{"date":"2015-05-07T22:15:24","version":"0.055"},{"version":"0.056","date":"2015-05-19T10:01:27"},{"version":"0.057","date":"2016-04-18T14:19:09"},{"date":"2016-05-03T17:49:33","version":"0.058"},{"version":"0.059","date":"2016-07-29T20:12:12"},{"version":"0.061","date":"2016-08-05T16:12:02"},{"version":"0.063","date":"2016-08-08T16:20:33"},{"date":"2016-08-17T01:43:01","version":"0.064"},{"date":"2016-09-10T02:43:48","version":"0.065"},{"date":"2016-09-14T15:45:04","version":"0.067"},{"version":"0.068","date":"2016-09-23T20:15:05"},{"version":"0.069","date":"2016-10-05T15:37:11"},{"version":"0.070","date":"2016-10-10T03:25:33"},{"version":"0.073","date":"2018-07-24T15:35:02"},{"date":"2018-07-30T19:37:29","version":"0.074"},{"version":"0.075","date":"2018-08-01T11:10:11"},{"date":"2018-08-06T01:09:54","version":"0.076"},{"date":"2021-07-22T17:08:36","version":"0.077"},{"version":"0.078","date":"2021-08-02T13:26:31"},{"version":"0.079","date":"2021-11-04T16:34:59"},{"version":"0.080","date":"2021-11-05T12:17:42"},{"version":"0.081","date":"2022-07-17T13:02:38"},{"version":"0.082","date":"2022-07-25T13:47:22"},{"date":"2023-06-11T11:06:38","version":"0.083"},{"date":"2023-06-14T10:35:44","version":"0.084"},{"version":"0.086","date":"2023-06-22T14:07:29"},{"date":"2023-07-11T12:54:02","version":"0.088"},{"version":"0.089","date":"2024-10-21T07:38:21"},{"date":"2024-11-12T10:52:55","version":"0.090"}]},"Email-Address":{"main_module":"Email::Address","advisories":[{"references":["https://metacpan.org/changes/distribution/Email-Address"],"description":"Inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via an empty quoted string in an RFC 2822 address.\n","id":"CPANSA-Email-Address-2014-01","fixed_versions":[">=1.905"],"cves":["CVE-2014-0477"],"distribution":"Email-Address","reported":"2014-07-03","affected_versions":["<1.905"]},{"fixed_versions":[">=1.909"],"id":"CPANSA-Email-Address-2014-01","references":["https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901873","http://www.openwall.com/lists/oss-security/2018/06/19/3","http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00012.html"],"description":"The parse() method in the Email::Address module through 1.909 for Perl is vulnerable to Algorithmic complexity on specially prepared input, leading to Denial of Service. Prepared special input that caused this problem contained 30 form-field characters (\"\\f\").\n","affected_versions":["<1.909"],"distribution":"Email-Address","reported":"2018-06-19","cves":["CVE-2018-12558"]},{"reported":"2014-07-06","distribution":"Email-Address","affected_versions":["<1.904"],"cves":["CVE-2014-4720"],"id":"CPANSA-Email-Address-2014-4720","severity":null,"fixed_versions":[">=1.904"],"description":"Email::Address module before 1.904 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via vectors related to \"backtracking into the phrase,\" a different vulnerability than CVE-2014-0477.\n","references":["https://github.com/rjbs/Email-Address/blob/master/Changes","http://seclists.org/oss-sec/2014/q2/563"]}],"versions":[{"date":"2004-05-27T03:19:56","version":"1.1"},{"date":"2004-06-02T16:35:30","version":"1.2"},{"date":"2004-08-16T21:39:58","version":"1.3"},{"version":"1.5","date":"2004-10-05T18:10:42"},{"version":"1.6","date":"2004-10-05T18:20:42"},{"version":"1.7","date":"2004-10-13T10:21:17"},{"date":"2004-10-22T16:37:27","version":"1.80"},{"date":"2006-07-11T15:04:28","version":"1.85"},{"date":"2006-07-22T00:42:17","version":"1.86"},{"date":"2006-08-10T16:48:44","version":"1.870"},{"date":"2006-10-12T19:35:04","version":"1.861"},{"version":"1.871","date":"2006-10-12T22:16:28"},{"version":"1.880","date":"2006-11-11T16:01:38"},{"date":"2006-11-19T21:19:02","version":"1.881"},{"date":"2006-11-22T01:26:44","version":"1.882"},{"version":"1.883","date":"2006-11-25T13:53:46"},{"date":"2006-12-05T03:41:39","version":"1.884"},{"version":"1.885","date":"2007-03-01T01:08:16"},{"version":"1.886","date":"2007-03-01T20:18:53"},{"date":"2007-04-01T19:15:49","version":"1.887"},{"version":"1.888","date":"2007-06-23T01:27:24"},{"date":"2007-12-19T22:14:37","version":"1.889"},{"version":"1.890","date":"2010-08-22T19:03:33"},{"date":"2010-08-31T00:56:53","version":"1.891"},{"version":"1.892","date":"2010-09-03T23:45:13"},{"date":"2012-01-03T03:55:12","version":"1.893"},{"date":"2012-01-14T16:17:56","version":"1.894"},{"date":"2012-01-15T18:41:33","version":"1.895"},{"date":"2012-08-01T03:07:33","version":"1.896"},{"version":"1.897","date":"2012-12-17T15:16:33"},{"version":"1.898","date":"2013-02-07T21:41:48"},{"date":"2013-08-02T14:54:13","version":"1.899"},{"version":"1.900","date":"2013-08-08T18:46:07"},{"version":"1.901","date":"2014-01-29T03:43:28"},{"date":"2014-04-17T15:19:31","version":"1.902"},{"version":"1.903","date":"2014-04-18T01:07:10"},{"date":"2014-06-14T04:22:22","version":"1.904"},{"date":"2014-06-18T02:55:59","version":"1.905"},{"version":"1.906","date":"2015-02-03T21:49:39"},{"date":"2015-02-03T22:48:46","version":"1.907"},{"date":"2015-09-20T02:55:12","version":"1.908"},{"version":"1.909","date":"2018-03-05T03:26:56"},{"version":"1.910","date":"2018-12-18T02:29:23"},{"version":"1.911","date":"2018-12-22T16:31:37"},{"date":"2018-12-31T19:51:36","version":"1.912"},{"version":"1.913","date":"2023-01-10T00:42:33"}]},"Archive-Tar":{"versions":[{"date":"1998-02-02T06:13:59","version":"0.071"},{"version":"0.072","date":"1998-04-10T17:07:35"},{"version":"0.08","date":"1998-07-30T00:56:03"},{"date":"1999-01-10T02:22:23","version":"0.20"},{"version":"0.21","date":"1999-02-02T19:01:41"},{"version":"0.22","date":"2000-04-28T00:37:46"},{"date":"2003-01-21T23:07:30","version":"0.23"},{"date":"2003-03-18T17:08:50","version":"0.99_01"},{"date":"2003-03-26T14:57:35","version":"0.99_02"},{"version":"0.99_03","date":"2003-04-28T16:01:24"},{"date":"2003-04-28T16:57:58","version":"0.99_04"},{"version":"0.99_05","date":"2003-04-30T12:52:19"},{"date":"2003-05-05T12:06:35","version":"0.99_06"},{"date":"2003-05-31T09:27:33","version":"1.00"},{"date":"2003-06-08T10:46:56","version":"1.01"},{"date":"2003-06-12T09:47:58","version":"1.02"},{"version":"1.03","date":"2003-06-26T12:52:19"},{"version":"1.04","date":"2003-07-27T17:07:50"},{"date":"2003-08-25T13:38:44","version":"1.05"},{"date":"2003-10-15T14:35:12","version":"1.06"},{"version":"1.07","date":"2003-10-17T11:42:14"},{"version":"1.08","date":"2004-01-05T12:59:23"},{"version":"1.09","date":"2004-05-22T12:32:02"},{"date":"2004-06-11T19:24:06","version":"1.10"},{"date":"2004-11-09T16:12:40","version":"1.20"},{"date":"2004-11-10T16:04:13","version":"1.21"},{"date":"2004-11-21T10:09:52","version":"1.22"},{"date":"2004-12-03T15:53:06","version":"1.23"},{"date":"2005-05-03T13:11:19","version":"1.24"},{"date":"2005-08-20T10:14:40","version":"1.25"},{"date":"2005-08-22T09:29:53","version":"1.26"},{"date":"2006-01-19T13:31:53","version":"1.28"},{"version":"1.29","date":"2006-03-03T13:56:20"},{"version":"1.30","date":"2006-08-02T15:00:41"},{"version":"1.31","date":"2007-05-18T12:18:49"},{"version":"1.32","date":"2007-05-25T09:32:48"},{"version":"1.34","date":"2007-08-15T14:20:33"},{"date":"2007-09-16T09:13:21","version":"1.36"},{"version":"1.37_01","date":"2007-11-11T11:59:00"},{"version":"1.38","date":"2007-12-24T11:02:07"},{"version":"1.39_01","date":"2008-08-22T16:33:49"},{"version":"1.39_02","date":"2008-08-25T03:56:58"},{"date":"2008-08-25T22:07:56","version":"1.39_03"},{"date":"2008-09-08T12:14:37","version":"1.39_04"},{"version":"1.40","date":"2008-10-13T13:42:10"},{"date":"2008-12-13T17:10:15","version":"1.42"},{"version":"1.44","date":"2009-01-19T17:08:08"},{"version":"1.46","date":"2009-03-05T16:10:06"},{"date":"2009-04-20T17:07:30","version":"1.48"},{"version":"1.50","date":"2009-06-12T12:01:54"},{"version":"1.52","date":"2009-06-13T11:29:50"},{"version":"1.54","date":"2009-09-10T12:13:03"},{"date":"2010-02-03T14:40:15","version":"1.56"},{"version":"1.58","date":"2010-02-17T21:47:16"},{"version":"1.60","date":"2010-04-23T14:12:31"},{"date":"2010-06-28T21:02:59","version":"1.62"},{"date":"2010-07-09T11:04:45","version":"1.64"},{"date":"2010-07-26T08:44:00","version":"1.66"},{"date":"2010-08-17T16:06:19","version":"1.68"},{"version":"1.70","date":"2010-11-15T22:02:53"},{"date":"2010-11-18T19:22:01","version":"1.72"},{"date":"2010-12-18T21:19:51","version":"1.74"},{"date":"2011-01-07T22:27:40","version":"1.76"},{"date":"2011-09-08T22:13:33","version":"1.78"},{"version":"1.80","date":"2011-10-13T10:25:39"},{"version":"1.82","date":"2011-11-21T12:14:43"},{"version":"1.84","date":"2012-03-03T00:00:05"},{"version":"1.86","date":"2012-05-24T11:38:09"},{"version":"1.88","date":"2012-06-01T11:06:25"},{"date":"2012-09-05T18:19:00","version":"1.90"},{"date":"2013-06-18T15:13:27","version":"1.92"},{"date":"2013-10-22T14:28:22","version":"0.93_01"},{"version":"1.93_02","date":"2013-10-22T14:36:08"},{"version":"1.94","date":"2013-10-24T18:02:48"},{"version":"1.96","date":"2013-10-24T19:10:34"},{"date":"2014-06-14T17:12:02","version":"1.98"},{"version":"2.00","date":"2014-06-15T14:59:24"},{"version":"2.02","date":"2014-09-14T18:03:23"},{"version":"2.04","date":"2014-12-14T20:13:33"},{"version":"2.06","date":"2016-04-24T14:05:11"},{"date":"2016-05-12T08:57:35","version":"2.08"},{"date":"2016-07-27T12:40:29","version":"2.10"},{"date":"2016-10-16T11:27:58","version":"2.12"},{"date":"2016-10-20T12:38:57","version":"2.14"},{"version":"2.16","date":"2016-11-01T19:19:36"},{"version":"2.18","date":"2016-11-07T13:36:15"},{"date":"2016-12-15T10:54:40","version":"2.20"},{"date":"2016-12-16T09:46:28","version":"2.22"},{"date":"2016-12-16T15:27:38","version":"2.24"},{"date":"2017-05-12T12:46:05","version":"2.26"},{"date":"2018-06-08T10:57:04","version":"2.28"},{"date":"2018-06-19T11:55:28","version":"2.30"},{"date":"2018-09-13T07:17:10","version":"2.32"},{"version":"2.34","date":"2020-02-01T16:41:47"},{"date":"2020-02-02T13:34:34","version":"2.36"},{"date":"2020-06-25T07:51:56","version":"2.38"},{"version":"2.40","date":"2021-07-27T09:51:54"},{"date":"2023-03-25T12:10:20","version":"3.00"},{"date":"2023-04-12T23:09:11","version":"3.02"}],"main_module":"Archive::Tar","advisories":[{"description":"In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypass a directory-traversal protection mechanism, and overwrite arbitrary files, via an archive file containing a symlink and a regular file with the same name.\n","references":["https://security-tracker.debian.org/tracker/CVE-2018-12015","https://github.com/jib/archive-tar-new/commit/ae65651eab053fc6dc4590dbb863a268215c1fc5"],"fixed_versions":[],"id":"CPANSA-Archive-Tar-2018-01","severity":"medium","cves":["CVE-2018-12015"],"affected_versions":["<2.28"],"distribution":"Archive-Tar","reported":"2018-06-12"},{"distribution":"Archive-Tar","reported":"2007-11-02","affected_versions":["<=1.36"],"cves":["CVE-2007-4829"],"severity":null,"id":"CPANSA-Archive-Tar-2007-4829","fixed_versions":[">1.36"],"references":["http://rt.cpan.org/Public/Bug/Display.html?id=29517","https://bugzilla.redhat.com/show_bug.cgi?id=295021","http://rt.cpan.org/Public/Bug/Display.html?id=30380","https://issues.rpath.com/browse/RPL-1716","http://www.securityfocus.com/bid/26355","http://secunia.com/advisories/27539","http://osvdb.org/40410","http://www.ubuntu.com/usn/usn-700-1","http://secunia.com/advisories/33314","http://www.ubuntu.com/usn/usn-700-2","http://www.gentoo.org/security/en/glsa/glsa-200812-10.xml","http://secunia.com/advisories/33116","http://www.vupen.com/english/advisories/2007/3755","https://exchange.xforce.ibmcloud.com/vulnerabilities/38285","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11658"],"description":"Directory traversal vulnerability in the Archive::Tar Perl module 1.36 and earlier allows user-assisted remote attackers to overwrite arbitrary files via a TAR archive that contains a file whose name is an absolute path or has \"..\" sequences.\n"},{"distribution":"Archive-Tar","reported":"2016-08-02","affected_versions":["<2.10"],"cves":["CVE-2016-1238"],"id":"CPANSA-Archive-Tar-2016-1238","severity":"high","fixed_versions":[">=2.10"],"description":"'(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.'\n","references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"]}]},"HTML-Perlinfo":{"advisories":[{"id":"CPANSA-HTML-Perlinfo-2008-01","fixed_versions":[">=1.52"],"description":"Possibility of denial-of-service attack.\n","references":["https://metacpan.org/changes/release/ACCARDO/HTML-Perlinfo-1.52"],"distribution":"HTML-Perlinfo","reported":"2008-07-04","affected_versions":["<1.52"],"cves":[]}],"main_module":"HTML::Perlinfo","versions":[{"version":"1.00","date":"2005-08-18T21:39:08"},{"date":"2005-09-19T20:41:07","version":"1.05"},{"date":"2006-01-14T05:25:20","version":"1.25"},{"date":"2006-08-13T03:42:36","version":"1.40"},{"version":"1.41","date":"2006-08-13T09:29:45"},{"date":"2006-08-15T01:04:34","version":"1.42"},{"date":"2006-08-25T07:51:28","version":"1.43"},{"date":"2006-09-10T23:20:13","version":"1.44"},{"version":"1.45","date":"2006-09-24T02:22:48"},{"version":"1.46","date":"2006-09-27T20:08:12"},{"date":"2006-10-02T19:30:30","version":"1.47"},{"date":"2008-03-16T03:15:04","version":"1.48"},{"version":"1.49","date":"2008-04-26T04:17:07"},{"version":"1.50","date":"2008-04-30T20:44:40"},{"date":"2008-06-08T21:07:29","version":"1.51"},{"date":"2008-07-03T23:57:26","version":"1.52"},{"version":"1.53","date":"2008-07-21T22:24:22"},{"date":"2008-07-27T23:52:36","version":"1.54"},{"date":"2009-04-08T01:09:54","version":"1.55"},{"date":"2009-04-08T19:06:59","version":"1.56"},{"version":"1.57","date":"2009-04-16T15:57:34"},{"date":"2009-04-17T02:41:48","version":"1.58"},{"version":"1.59","date":"2009-04-22T03:29:45"},{"date":"2009-05-02T20:48:38","version":"1.60"},{"version":"1.60","date":"2009-05-02T22:21:42"},{"version":"1.61","date":"2009-05-03T23:02:35"},{"date":"2011-06-13T19:28:39","version":"1.62"},{"version":"1.63","date":"2014-08-19T21:37:30"},{"date":"2014-08-19T22:29:15","version":"1.64"},{"date":"2015-06-06T23:25:41","version":"1.65"},{"date":"2015-06-08T18:20:03","version":"1.66"},{"date":"2015-06-08T20:22:33","version":"1.67"},{"version":"1.68","date":"2015-06-12T02:03:18"},{"version":"1.69","date":"2016-11-29T19:21:00"},{"date":"2019-06-24T15:33:44","version":"1.70"},{"version":"1.71","date":"2019-06-25T02:15:30"},{"date":"2019-07-02T19:22:14","version":"1.72"},{"date":"2019-07-02T20:41:23","version":"1.73"}]},"Net-Ping-External":{"advisories":[{"fixed_versions":[],"id":"CPANSA-Net-Ping-External-2008-7319","severity":"critical","references":["https://rt.cpan.org/Public/Bug/Display.html?id=33230","https://bugs.debian.org/881097","http://www.openwall.com/lists/oss-security/2017/11/07/4","http://matthias.sdfeu.org/devel/net-ping-external-cmd-injection.patch"],"description":"The Net::Ping::External extension through 0.15 for Perl does not properly sanitize arguments (e.g., invalid hostnames) containing shell metacharacters before use of backticks in External.pm, allowing for shell command injection and arbitrary command execution if untrusted input is used.\n","affected_versions":["<=0.15"],"distribution":"Net-Ping-External","reported":"2017-11-07","cves":["CVE-2008-7319"]}],"main_module":"Net::Ping::External","versions":[{"date":"2001-03-15T21:53:04","version":"0.01"},{"date":"2001-03-22T00:15:08","version":"0.02"},{"date":"2001-03-23T08:35:49","version":"0.03"},{"version":"0.04","date":"2001-04-20T17:33:31"},{"date":"2001-04-20T18:43:34","version":"0.05"},{"date":"2001-04-26T02:59:41","version":"0.06"},{"date":"2001-09-28T02:20:34","version":"0.07"},{"date":"2001-09-30T21:39:47","version":"0.08"},{"date":"2001-11-10T06:10:33","version":"0.09"},{"version":"0.10","date":"2001-11-10T16:19:21"},{"date":"2003-02-11T22:41:33","version":"0.11"},{"version":"0.12_01","date":"2006-09-07T10:52:21"},{"date":"2007-01-31T22:09:41","version":"0.12_02"},{"version":"0.12","date":"2007-02-08T16:06:46"},{"version":"0.13","date":"2008-12-18T20:27:07"},{"date":"2013-10-29T17:05:01","version":"0.14"},{"date":"2014-04-12T21:37:12","version":"0.15"}]},"Archive-Zip":{"versions":[{"version":"0.06","date":"2000-03-22T00:10:21"},{"version":"0.07","date":"2000-03-29T17:03:46"},{"date":"2000-06-16T16:48:41","version":"0.09"},{"version":"0.10","date":"2000-08-08T20:56:31"},{"version":"0.11","date":"2001-01-17T08:06:58"},{"version":"1.00","date":"2002-04-22T15:32:49"},{"version":"1.01","date":"2002-05-11T02:45:20"},{"version":"1.02","date":"2002-08-24T00:19:19"},{"version":"1.03","date":"2002-09-03T04:40:33"},{"date":"2002-09-11T15:17:37","version":"1.04"},{"date":"2002-09-11T19:35:26","version":"1.05"},{"version":"1.06","date":"2003-07-17T18:18:14"},{"version":"1.07","date":"2003-10-20T13:59:00"},{"version":"1.08","date":"2003-10-21T17:04:03"},{"version":"1.09","date":"2003-11-27T18:02:03"},{"date":"2004-03-25T14:39:05","version":"1.10"},{"version":"1_11","date":"2004-07-05T23:25:19"},{"version":"1.11","date":"2004-07-08T17:31:27"},{"version":"1.12","date":"2004-07-08T19:14:46"},{"date":"2004-07-27T22:50:39","version":"1.12_02"},{"date":"2004-07-29T15:15:49","version":"1.12_03"},{"date":"2004-08-23T15:39:23","version":"1.13"},{"version":"1.14","date":"2004-10-21T15:28:12"},{"version":"1.15_01","date":"2005-03-10T04:34:04"},{"version":"1.15_02","date":"2005-03-12T15:29:48"},{"date":"2005-06-22T18:29:34","version":"1.15"},{"date":"2005-07-04T17:55:17","version":"1.16"},{"date":"2006-04-30T03:53:15","version":"1.17_01"},{"version":"1.17_02","date":"2006-05-07T02:49:30"},{"date":"2006-09-15T15:56:10","version":"1.17_03"},{"date":"2006-10-24T15:06:32","version":"1.17_05"},{"date":"2006-10-25T12:24:52","version":"1.18"},{"date":"2007-06-05T01:50:42","version":"1.20"},{"date":"2007-11-01T02:59:20","version":"1.21"},{"date":"2007-11-02T01:52:47","version":"1.22"},{"version":"1.23","date":"2007-11-07T13:04:41"},{"date":"2008-08-23T23:35:50","version":"1.24"},{"date":"2008-10-10T05:28:17","version":"1.25"},{"date":"2008-10-12T14:13:05","version":"1.26"},{"version":"1.27_01","date":"2008-12-16T13:23:21"},{"version":"1.28","date":"2009-06-16T10:09:03"},{"version":"1.29","date":"2009-06-29T13:27:17"},{"version":"1.30","date":"2009-06-30T14:13:29"},{"date":"2010-03-05T05:11:20","version":"1.31_01"},{"version":"1.31_02","date":"2011-03-08T15:52:02"},{"version":"1.31_03","date":"2011-08-23T03:42:14"},{"date":"2012-01-23T06:28:16","version":"1.31_04"},{"version":"1.32","date":"2013-11-09T00:05:06"},{"date":"2013-11-10T03:50:45","version":"1.33"},{"version":"1.34","date":"2013-12-02T22:16:54"},{"date":"2013-12-30T19:16:52","version":"1.35"},{"version":"1.36","date":"2013-12-30T22:12:14"},{"version":"1.37","date":"2014-01-13T18:32:19"},{"version":"1.38","date":"2014-09-02T23:23:11"},{"date":"2014-10-22T04:17:15","version":"1.39"},{"date":"2015-01-05T05:58:46","version":"1.40"},{"version":"1.41","date":"2015-01-10T02:47:42"},{"version":"1.42","date":"2015-01-12T00:46:36"},{"date":"2015-01-15T06:37:32","version":"1.43"},{"version":"1.44","date":"2015-01-24T06:12:21"},{"date":"2015-01-27T07:51:17","version":"1.45"},{"version":"1.46","date":"2015-03-25T05:19:23"},{"version":"1.47","date":"2015-06-17T18:26:02"},{"date":"2015-06-18T21:13:37","version":"1.48"},{"version":"1.49","date":"2015-07-31T19:01:40"},{"date":"2015-08-26T00:11:35","version":"1.50"},{"date":"2015-09-22T06:03:54","version":"1.51"},{"date":"2015-09-23T17:43:44","version":"1.53"},{"date":"2015-12-04T19:36:41","version":"1.55"},{"date":"2015-12-17T18:29:06","version":"1.56"},{"version":"1.57","date":"2016-04-01T18:06:36"},{"date":"2016-08-02T17:50:20","version":"1.58"},{"version":"1.59","date":"2016-08-11T20:09:16"},{"date":"2017-12-19T18:44:16","version":"1.60"},{"version":"1.61","date":"2018-08-19T03:35:10"},{"version":"1.62","date":"2018-08-20T03:29:01"},{"date":"2018-08-22T15:42:15","version":"1.63"},{"version":"1.64","date":"2018-09-12T15:50:29"},{"version":"1.65","date":"2019-09-08T05:20:03"},{"version":"1.66","date":"2019-09-17T04:37:32"},{"version":"1.67","date":"2019-10-07T04:30:05"},{"version":"1.68","date":"2020-03-12T17:59:46"}],"main_module":"Archive::Zip","advisories":[{"affected_versions":["<1.61"],"distribution":"Archive-Zip","reported":"2018-06-28","cves":["CVE-2018-10860"],"fixed_versions":[],"id":"CPANSA-Archive-Zip-2018-01","severity":"medium","references":["https://security-tracker.debian.org/tracker/CVE-2018-10860","https://github.com/redhotpenguin/perl-Archive-Zip/pull/33"],"description":"perl-archive-zip is vulnerable to a directory traversal in Archive::Zip. It was found that the Archive::Zip module did not properly sanitize paths while extracting zip files. An attacker able to provide a specially crafted archive for processing could use this flaw to write or overwrite arbitrary files in the context of the perl interpreter.\n"},{"description":"Archive::Zip Perl module before 1.14, when used by antivirus programs such as amavisd-new, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.\n","references":["http://www.securityfocus.com/bid/11448","http://www.gentoo.org/security/en/glsa/glsa-200410-31.xml","http://www.idefense.com/application/poi/display?id=153&type=vulnerabilities&flashstatus=true","http://www.kb.cert.org/vuls/id/492545","http://secunia.com/advisories/13038/","http://www.mandriva.com/security/advisories?name=MDKSA-2004:118","https://exchange.xforce.ibmcloud.com/vulnerabilities/17761"],"fixed_versions":[],"id":"CPANSA-Archive-Zip-2004-1096","severity":null,"cves":["CVE-2004-1096"],"affected_versions":["<1.14"],"reported":"2005-01-10","distribution":"Archive-Zip"}]},"XML-LibXML":{"versions":[{"date":"2001-05-18T11:31:21","version":"0.91"},{"version":"0.92","date":"2001-06-03T07:47:14"},{"version":"0.93","date":"2001-06-09T16:52:26"},{"date":"2001-06-10T08:54:23","version":"0.94"},{"version":"0.96","date":"2001-06-21T10:07:56"},{"date":"2001-06-29T20:39:47","version":"0.97"},{"date":"2001-07-20T16:08:25","version":"0.99"},{"date":"2001-08-07T10:13:29","version":"1.00"},{"version":"1.30","date":"2001-11-14T11:39:59"},{"version":"1.31","date":"2001-11-25T17:25:52"},{"date":"2002-03-13T14:24:12","version":"1.40"},{"version":"1.49","date":"2002-05-11T21:07:22"},{"version":"1.50","date":"2002-05-20T11:33:20"},{"version":"1.51","date":"2002-05-31T16:53:50"},{"date":"2002-06-12T10:16:35","version":"1.52"},{"version":"1.53","date":"2002-09-14T21:02:38"},{"date":"2002-10-26T15:21:51","version":"1.54_0"},{"version":"1.54_1","date":"2002-11-08T10:03:05"},{"date":"2002-11-08T18:15:20","version":"1.54_2"},{"version":"1.54_3","date":"2002-11-15T20:14:58"},{"date":"2003-05-22T23:44:39","version":"1.54_4"},{"date":"2003-05-30T18:46:39","version":"1.54"},{"date":"2003-08-19T21:15:43","version":"1.55"},{"version":"1.56","date":"2003-08-25T13:39:01"},{"version":"1.57","date":"2004-02-29T16:56:42"},{"version":"1.58","date":"2004-03-31T19:49:55"},{"date":"2004-04-04T11:42:03","version":"1.58_1"},{"version":"1.59","date":"2006-08-02T10:59:49"},{"date":"2006-08-26T18:11:05","version":"1.60"},{"version":"1.61","date":"2006-09-24T15:43:20"},{"version":"1.61","date":"2006-09-25T07:21:39"},{"version":"1.61","date":"2006-09-25T07:42:26"},{"version":"1.61","date":"2006-09-25T11:38:04"},{"version":"1.62","date":"2006-11-18T09:57:51"},{"date":"2006-11-25T09:10:37","version":"1.62"},{"date":"2007-04-16T11:46:21","version":"1.63"},{"date":"2007-09-09T21:51:03","version":"1.64"},{"date":"2007-09-25T16:37:46","version":"1.65"},{"date":"2008-01-29T21:10:45","version":"1.66"},{"version":"1.67","date":"2008-11-04T14:26:16"},{"version":"1.68","date":"2008-11-05T13:32:59"},{"date":"2008-11-11T21:00:56","version":"1.69"},{"date":"2009-01-23T22:30:52","version":"1.69_1"},{"version":"1.69_2","date":"2009-02-06T19:12:24"},{"version":"1.70","date":"2009-10-07T12:31:25"},{"version":"1.71","date":"2011-06-14T17:01:30"},{"date":"2011-06-16T16:40:11","version":"1.72"},{"date":"2011-06-18T08:35:40","version":"1.73"},{"version":"1.74","date":"2011-06-23T12:27:53"},{"version":"1.75","date":"2011-06-24T16:02:54"},{"date":"2011-06-30T18:20:41","version":"1.76"},{"date":"2011-07-01T19:31:51","version":"1.77"},{"date":"2011-07-06T17:27:49","version":"1.78"},{"version":"1.79","date":"2011-07-08T17:06:33"},{"version":"1.80","date":"2011-07-12T20:39:51"},{"version":"1.81","date":"2011-07-16T15:36:21"},{"version":"1.82","date":"2011-07-20T20:49:05"},{"version":"1.83","date":"2011-07-23T11:34:22"},{"date":"2011-07-23T20:17:26","version":"1.84"},{"date":"2011-08-24T14:08:28","version":"1.85"},{"date":"2011-08-25T08:46:56","version":"1.86"},{"version":"1.87","date":"2011-08-27T11:07:44"},{"version":"1.88","date":"2011-09-21T10:01:23"},{"version":"1.89","date":"2011-12-24T07:47:30"},{"date":"2012-01-08T19:01:33","version":"1.90"},{"version":"1.91","date":"2012-02-21T12:02:10"},{"date":"2012-02-21T17:03:56","version":"1.92"},{"version":"1.93","date":"2012-02-27T09:18:12"},{"date":"2012-03-03T20:10:26","version":"1.94"},{"date":"2012-03-06T08:42:27","version":"1.95"},{"date":"2012-03-16T19:05:40","version":"1.96"},{"date":"2012-04-30T17:35:11","version":"1.97"},{"version":"1.98","date":"2012-05-13T18:06:03"},{"date":"2012-05-31T07:25:35","version":"1.99"},{"date":"2012-06-19T20:07:27","version":"2.0000"},{"date":"2012-06-20T16:53:03","version":"2.0001"},{"date":"2012-07-08T15:12:36","version":"2.0002"},{"version":"2.0003","date":"2012-07-27T15:22:53"},{"date":"2012-08-07T20:06:48","version":"2.0004"},{"date":"2012-10-13T11:23:03","version":"2.0005"},{"version":"2.0006","date":"2012-10-13T20:34:57"},{"date":"2012-10-17T17:05:13","version":"2.0007"},{"date":"2012-10-22T10:13:20","version":"2.0008"},{"version":"2.0009","date":"2012-11-01T14:29:13"},{"date":"2012-11-01T18:16:34","version":"2.0010"},{"version":"2.0011","date":"2012-11-07T22:29:47"},{"version":"2.0012","date":"2012-11-09T04:42:04"},{"date":"2012-12-04T15:46:46","version":"2.0013"},{"version":"2.0014","date":"2012-12-05T09:13:26"},{"date":"2013-04-12T23:35:55","version":"2.0015"},{"date":"2013-04-13T19:39:51","version":"2.0016"},{"date":"2013-05-09T08:07:47","version":"2.0017"},{"date":"2013-05-13T10:44:19","version":"2.0018"},{"version":"2.0019","date":"2013-07-01T08:08:50"},{"date":"2013-08-14T05:27:26","version":"2.0100"},{"date":"2013-08-15T05:34:30","version":"2.0101"},{"version":"2.0102","date":"2013-08-19T12:18:31"},{"date":"2013-08-22T05:35:19","version":"2.0103"},{"version":"2.0104","date":"2013-08-30T09:38:04"},{"date":"2013-09-07T17:24:00","version":"2.0105"},{"date":"2013-09-17T16:14:51","version":"2.0106"},{"date":"2013-10-31T07:16:02","version":"2.0107"},{"version":"2.0108","date":"2013-12-17T09:10:53"},{"version":"2.0109","date":"2014-01-31T08:01:23"},{"version":"2.0110","date":"2014-02-01T14:14:02"},{"version":"2.0111","date":"2014-03-05T15:31:25"},{"date":"2014-03-13T18:19:10","version":"2.0112"},{"date":"2014-03-14T12:15:54","version":"2.0113"},{"version":"2.0114","date":"2014-04-03T13:01:06"},{"date":"2014-04-03T13:15:41","version":"2.0115"},{"version":"2.0116","date":"2014-04-12T08:10:37"},{"version":"2.0117","date":"2014-10-26T16:31:29"},{"date":"2015-02-05T10:57:03","version":"2.0118"},{"version":"2.0119","date":"2015-04-23T07:14:45"},{"version":"2.0120","date":"2015-05-01T09:50:18"},{"version":"2.0121","date":"2015-05-03T12:08:06"},{"version":"2.0122","date":"2015-09-01T09:02:29"},{"date":"2015-12-06T13:19:22","version":"2.0123"},{"date":"2016-02-27T11:21:08","version":"2.0124"},{"version":"2.0125","date":"2016-05-30T09:24:51"},{"version":"2.0126","date":"2016-06-24T16:21:00"},{"date":"2016-07-22T17:40:51","version":"2.0127"},{"date":"2016-07-24T09:15:48","version":"2.0128"},{"version":"2.0129","date":"2017-03-14T13:37:23"},{"version":"2.0130","date":"2017-10-18T08:45:49"},{"date":"2017-10-24T08:57:20","version":"2.0131"},{"date":"2017-10-28T17:58:34","version":"2.0132"},{"date":"2019-02-02T11:11:30","version":"2.0133"},{"date":"2019-02-10T15:02:55","version":"2.0134"},{"version":"2.0200","date":"2019-03-23T08:54:34"},{"version":"2.0201","date":"2019-05-25T17:46:46"},{"date":"2020-01-13T09:16:50","version":"2.0202"},{"date":"2020-03-11T06:48:19","version":"2.0203"},{"date":"2020-03-17T16:33:17","version":"2.0204"},{"version":"2.0205","date":"2020-05-08T11:36:06"},{"version":"2.0206","date":"2020-09-15T08:06:58"},{"date":"2021-04-17T08:16:22","version":"2.0207"},{"version":"2.0208","date":"2022-09-30T03:29:15"},{"date":"2023-07-15T06:04:39","version":"2.0209"},{"version":"2.0210","date":"2024-01-24T15:19:39"}],"advisories":[{"description":"The _clone function does not properly set the expand_entities option, which allows remote attackers to conduct XML external entity (XXE) attacks via crafted XML data to the (1) new or (2) load_xml function.\n","references":["https://metacpan.org/changes/distribution/XML-LibXML"],"fixed_versions":[">=2.0120"],"id":"CPANSA-XML-LibXML-2015-01","cves":["CVE-2015-3451"],"affected_versions":["<2.0120"],"reported":"2015-04-23","distribution":"XML-LibXML"},{"description":"Use-after-free in the XML-LibXML module through 2.0129 for Perl allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call.\n","references":["https://www.debian.org/security/2017/dsa-4042","https://rt.cpan.org/Public/Bug/Display.html?id=122246","https://lists.debian.org/debian-lts-announce/2017/11/msg00017.html"],"fixed_versions":[">=2.0129"],"id":"CPANSA-XML-LibXML-2017-01","cves":["CVE-2017-10672"],"affected_versions":["<2.0129"],"distribution":"XML-LibXML","reported":"2015-04-23"}],"main_module":"XML::LibXML"},"Clipboard":{"main_module":"Clipboard","advisories":[{"id":"CPANSA-Clipboard-2014-5509","severity":"medium","fixed_versions":[],"references":["https://rt.cpan.org/Public/Bug/Display.html?id=98435","https://bugzilla.redhat.com/show_bug.cgi?id=1135624","http://www.securityfocus.com/bid/69473","http://www.openwall.com/lists/oss-security/2014/08/30/2"],"description":"clipedit in the Clipboard module for Perl allows local users to delete arbitrary files via a symlink attack on /tmp/clipedit$$.\n","distribution":"Clipboard","reported":"2018-01-08","affected_versions":["<0.16"],"cves":["CVE-2014-5509"]}],"versions":[{"date":"2005-05-01T17:19:57","version":"0.01"},{"version":"0.02","date":"2005-05-02T06:17:33"},{"date":"2005-05-04T06:17:44","version":"0.03"},{"version":"0.04","date":"2005-05-08T05:54:44"},{"version":"0.06","date":"2005-06-01T17:00:34"},{"date":"2005-06-02T05:06:37","version":"0.07"},{"version":"0.08","date":"2005-06-22T17:05:15"},{"version":"0.09","date":"2005-11-19T06:12:48"},{"date":"2010-10-07T01:39:10","version":"0.10"},{"version":"0.11","date":"2010-10-07T04:49:39"},{"date":"2010-10-11T06:13:22","version":"0.12"},{"version":"0.13","date":"2010-10-13T04:46:50"},{"version":"0.14","date":"2019-01-30T10:47:45"},{"date":"2019-01-30T11:00:22","version":"0.15"},{"version":"0.16","date":"2019-01-30T11:22:23"},{"version":"0.17","date":"2019-01-30T14:00:52"},{"date":"2019-01-30T20:12:11","version":"0.18"},{"date":"2019-01-31T11:00:20","version":"0.19"},{"version":"0.20","date":"2019-04-17T20:55:35"},{"date":"2019-12-02T06:04:27","version":"0.21"},{"date":"2020-01-28T18:10:34","version":"0.22"},{"date":"2020-03-06T15:43:11","version":"0.23"},{"version":"0.24","date":"2020-03-07T08:25:07"},{"date":"2020-05-14T06:33:28","version":"0.25"},{"date":"2020-05-16T07:56:58","version":"0.26"},{"version":"0.27","date":"2021-02-13T18:13:34"},{"version":"0.28","date":"2021-02-23T07:47:20"},{"date":"2024-04-07T03:11:57","version":"0.29"},{"version":"0.30","date":"2024-06-16T12:03:21"}]},"CGI-Application-Plugin-RunmodeDeclare":{"versions":[{"version":"0.01","date":"2008-09-26T19:59:14"},{"version":"0.02","date":"2008-09-26T21:37:11"},{"date":"2008-10-19T23:22:06","version":"0.03"},{"date":"2008-10-23T14:18:23","version":"0.03_01"},{"version":"0.03_02","date":"2008-10-24T13:32:43"},{"date":"2008-10-24T16:20:27","version":"0.03_03"},{"version":"0.04","date":"2008-10-25T10:54:25"},{"date":"2008-10-25T11:46:28","version":"0.05"},{"date":"2008-10-25T16:39:34","version":"0.06"},{"version":"0.07","date":"2009-01-10T02:32:39"},{"date":"2009-05-17T22:29:18","version":"0.08"},{"date":"2010-01-07T13:24:09","version":"0.09"},{"version":"0.10","date":"2012-02-10T00:53:54"}],"main_module":"CGI::Application::Plugin::RunmodeDeclare","advisories":[{"id":"CPANSA-CGI-Application-Plugin-RunmodeDeclare-2008-01","fixed_versions":[">=0.03"],"description":"Wrong order of arguments.\n","references":["https://metacpan.org/changes/distribution/CGI-Application-Plugin-RunmodeDeclare"],"distribution":"CGI-Application-Plugin-RunmodeDeclare","reported":"2008-10-20","affected_versions":["<0.03"],"cves":[]}]},"XML-Simple":{"versions":[{"date":"1999-11-29T02:30:19","version":"1.00"},{"date":"1999-12-01T11:02:42","version":"1.01"},{"version":"1.03","date":"2000-03-05T20:58:37"},{"date":"2000-04-03T04:12:07","version":"1.04"},{"version":"1.05","date":"2000-08-30T23:40:57"},{"date":"2001-11-19T22:04:26","version":"1.06"},{"date":"2002-02-05T22:46:39","version":"1.07"},{"version":"1.08","date":"2002-02-09T22:43:03"},{"version":"1.08_01","date":"2002-02-14T22:13:24"},{"version":"2.00","date":"2002-12-08T08:23:26"},{"version":"2.01","date":"2002-12-11T09:56:59"},{"date":"2002-12-15T08:21:09","version":"2.02"},{"version":"2.03","date":"2003-01-20T07:54:05"},{"date":"2003-04-10T10:25:56","version":"2.04"},{"date":"2003-04-16T10:22:00","version":"2.05"},{"date":"2003-05-18T08:50:04","version":"2.06"},{"version":"2.07","date":"2003-05-20T08:53:19"},{"version":"2.08","date":"2003-06-13T10:31:53"},{"version":"2.09","date":"2003-09-09T09:43:24"},{"version":"2.10","date":"2004-02-29T10:18:06"},{"version":"2.11","date":"2004-03-02T08:29:33"},{"date":"2004-04-05T09:29:23","version":"2.12"},{"version":"2.13","date":"2004-11-17T09:06:18"},{"date":"2005-01-29T05:16:40","version":"2.14"},{"version":"2.15","date":"2006-10-03T01:33:47"},{"version":"2.16","date":"2006-10-30T08:33:07"},{"date":"2007-08-02T10:47:38","version":"2.17"},{"version":"2.18","date":"2007-08-15T10:39:25"},{"version":"2.19_01","date":"2012-06-17T11:28:59"},{"version":"2.19_02","date":"2012-06-19T08:34:33"},{"version":"2.20","date":"2012-06-20T10:01:37"},{"date":"2015-12-04T03:35:12","version":"2.21"},{"date":"2015-12-04T22:08:47","version":"2.22"},{"date":"2017-04-17T03:49:52","version":"2.23"},{"version":"2.24","date":"2017-04-17T04:12:48"},{"date":"2018-03-18T03:19:24","version":"2.25"}],"advisories":[{"cves":[],"distribution":"XML-Simple","reported":"2018-02-18","affected_versions":["<2.25"],"references":["https://metacpan.org/dist/XML-Simple/changes","https://github.com/grantm/xml-simple/pull/8"],"description":"The No. 4 item on the OWASP top 10 is external XML entities. When using XML::Parser, XML::Simple is currently vulnerable by default.\n","severity":null,"id":"CPANSA-XML-Simple-2018-01","fixed_versions":[">=2.25"]}],"main_module":"XML::Simple"},"HTTP-Body":{"versions":[{"date":"2005-10-06T23:31:10","version":"0.01"},{"version":"0.2","date":"2005-10-07T19:39:00"},{"version":"0.03","date":"2005-10-28T00:04:21"},{"version":"0.4","date":"2005-11-09T06:02:28"},{"date":"2005-11-17T04:03:44","version":"0.5"},{"version":"0.6","date":"2006-01-06T11:55:08"},{"version":"0.7","date":"2007-03-23T17:02:39"},{"date":"2007-03-24T01:48:23","version":"0.8"},{"version":"0.9","date":"2007-03-27T17:55:21"},{"date":"2008-02-23T16:03:17","version":"1.00"},{"version":"1.01","date":"2008-02-23T16:16:09"},{"date":"2008-02-27T22:08:06","version":"1.02"},{"version":"1.03","date":"2008-04-07T14:20:46"},{"date":"2008-06-23T19:41:56","version":"1.04"},{"date":"2008-12-01T22:14:51","version":"1.05"},{"date":"2010-01-09T18:23:07","version":"1.06"},{"date":"2010-01-24T19:42:49","version":"1.07"},{"version":"1.08","date":"2010-08-19T19:02:08"},{"date":"2010-08-19T23:11:46","version":"1.09"},{"date":"2010-10-08T14:52:40","version":"1.10"},{"date":"2010-10-26T14:38:59","version":"1.11"},{"version":"1.12","date":"2011-03-20T00:58:03"},{"version":"1.14","date":"2011-11-04T18:44:06"},{"version":"1.15","date":"2011-12-05T03:02:21"},{"version":"1.16","date":"2012-10-03T15:19:24"},{"version":"1.17","date":"2012-10-03T22:04:49"},{"version":"1.18","date":"2013-12-06T15:06:26"},{"version":"1.19","date":"2013-12-06T15:07:56"},{"date":"2015-01-28T15:21:00","version":"1.20"},{"date":"2015-01-29T03:50:10","version":"1.21"},{"date":"2015-01-29T03:53:01","version":"1.22"},{"version":"1.23","date":"2024-03-30T03:28:24"}],"advisories":[{"fixed_versions":[">=1.23"],"id":"CPANSA-HTTP-Body-2013-4407","severity":"moderate","references":["https://www.openwall.com/lists/oss-security/2024/04/07/1","https://security-tracker.debian.org/tracker/CVE-2013-4407","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721634"],"description":"HTTP::Body::Multipart in the HTTP-Body 1.08, 1.22, and earlier module for Perl uses the part of the uploaded file's name after the first \".\" character as the suffix of a temporary file, which makes it easier for remote attackers to conduct attacks by leveraging subsequent behavior that may assume the suffix is well-formed.\n","affected_versions":[">=1.08,<1.23"],"distribution":"HTTP-Body","reported":"2013-09-02","cves":["CVE-2013-4407"]}],"main_module":"HTTP::Body"},"MySQL-Admin":{"main_module":"MySQL::Admin","advisories":[{"references":["https://metacpan.org/dist/MySQL-Admin/changes"],"description":"Unspecified security issues.\n","fixed_versions":[">=0.34"],"severity":null,"id":"CPANSA-MySQL-Admin-1-1","cves":[],"affected_versions":["<0.34"],"reported":null,"distribution":"MySQL-Admin"}],"versions":[{"version":"0.41","date":"2009-04-05T07:27:17"},{"date":"2009-04-25T12:13:07","version":"0.42"},{"version":"0.43","date":"2009-05-02T16:39:11"},{"date":"2009-05-06T16:32:16","version":"0.44"},{"date":"2009-09-20T10:34:08","version":"0.47"},{"version":"0.48","date":"2009-09-20T17:52:11"},{"version":"0.5","date":"2009-09-20T19:27:03"},{"date":"2009-09-23T13:03:36","version":"0.51"},{"version":"0.52","date":"2009-09-26T10:35:54"},{"version":"0.54","date":"2009-09-28T06:12:57"},{"date":"2009-09-29T10:34:19","version":"0.55"},{"date":"2009-09-30T16:13:36","version":"0.56"},{"date":"2009-10-03T07:37:25","version":"0.57"},{"version":"0.58","date":"2009-10-04T06:02:37"},{"version":"0.59","date":"2009-10-04T09:07:10"},{"date":"2009-10-05T15:31:56","version":"0.6"},{"date":"2009-10-13T13:03:13","version":"0.61"},{"date":"2009-10-13T13:28:16","version":"0.62"},{"version":"0.65","date":"2015-03-22T15:18:03"},{"date":"2015-03-24T07:27:33","version":"0.66"},{"date":"2015-03-26T19:31:05","version":"0.67"},{"date":"2015-03-30T18:13:38","version":"0.68"},{"version":"0.69","date":"2015-04-01T20:54:59"},{"date":"2015-04-02T18:13:25","version":"0.7"},{"date":"2015-04-02T20:01:04","version":"0.71"},{"date":"2015-04-06T19:38:13","version":"0.72"},{"date":"2015-04-07T17:24:44","version":"0.73"},{"version":"0.74","date":"2015-04-09T20:30:39"},{"version":"0.75","date":"2015-04-12T19:12:02"},{"date":"2015-04-18T10:10:22","version":"0.76"},{"version":"0.77","date":"2015-04-23T19:09:21"},{"version":"0.79","date":"2015-06-19T21:18:27"},{"date":"2015-06-20T15:56:45","version":"0.8"},{"date":"2015-06-21T11:51:26","version":"0.81"},{"date":"2015-07-09T20:24:39","version":"0.84"},{"date":"2015-07-10T12:25:42","version":"0.85"},{"date":"2015-07-11T17:51:30","version":"0.86"},{"date":"2015-07-26T19:47:51","version":"0.87"},{"version":"0.89","date":"2015-10-10T14:46:47"},{"date":"2015-10-31T17:56:24","version":"0.9"},{"date":"2015-11-01T11:42:27","version":"0.91"},{"date":"2015-11-01T13:05:50","version":"0.92"},{"version":"0.93","date":"2015-12-27T20:50:17"},{"date":"2016-01-25T20:30:24","version":"0.94"},{"version":"0.95","date":"2016-01-26T09:59:39"},{"date":"2016-01-26T13:59:30","version":"0.96"},{"version":"0.97","date":"2016-01-28T09:10:44"},{"date":"2016-02-03T21:51:55","version":"0.98"},{"date":"2016-02-06T07:24:22","version":"0.99"},{"version":"1","date":"2016-02-06T10:01:55"},{"date":"2016-02-06T17:43:58","version":"1.01"},{"date":"2016-02-14T18:20:01","version":"1.02"},{"date":"2016-02-23T12:55:34","version":"1.03"},{"date":"2016-02-24T14:56:54","version":"1.04"},{"date":"2016-05-15T18:28:42","version":"1.05"},{"date":"2016-06-25T20:34:51","version":"1.06"},{"date":"2016-06-26T11:54:44","version":"1.07"},{"date":"2016-10-26T20:01:37","version":"1.08"},{"version":"1.09","date":"2016-10-26T20:17:36"},{"version":"1.1","date":"2017-01-25T20:32:12"},{"version":"1.11","date":"2017-01-26T20:40:27"},{"version":"1.12","date":"2017-01-29T19:25:00"},{"version":"1.13","date":"2018-06-03T15:06:18"},{"version":"1.14","date":"2018-06-10T16:38:09"},{"date":"2018-07-01T19:20:11","version":"1.15"},{"version":"1.16","date":"2018-07-24T05:59:11"},{"date":"2019-04-22T13:37:27","version":"1.17"},{"date":"2019-05-26T14:49:11","version":"1.18"}]},"Mozilla-CA":{"advisories":[{"references":["https://rt.cpan.org/Public/Bug/Display.html?id=70967","https://www.mozilla.org/en-US/security/advisories/mfsa2011-35/","https://www.mozilla.org/en-US/security/advisories/mfsa2011-34/"],"description":"Google Chrome user alibo encountered an active \"man in the middle\" (MITM) attack on secure SSL connections to Google servers. The fraudulent certificate was mis-issued by DigiNotar, a Dutch Certificate Authority. DigiNotar has reported evidence that other fraudulent certificates were issued and in active use but the full extent of the compromise is not known.\n","fixed_versions":[">=20110914"],"severity":null,"id":"CPANSA-Mozilla-CA-2011-34","cves":[],"affected_versions":["<20110914"],"distribution":"Mozilla-CA","reported":null},{"cves":["CVE-2024-39689"],"affected_versions":["<20240730"],"reported":"2024-06-11","distribution":"Mozilla-CA","references":["https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/XpknYMPO8dI","https://groups.google.com/a/ccadb.org/g/public/c/wRs-zec8w7k/m/G_9QprJ2AQAJ","https://github.com/certifi/python-certifi/security/advisories/GHSA-248v-346w-9cwc","https://github.com/certifi/python-certifi/commit/bd8153872e9c6fc98f4023df9c2deaffea2fa463"],"description":"ECM GlobalTrust 2000 root certificates have been distrusted\n","fixed_versions":[">=20240730"],"id":"CPANSA-Mozilla-CA-2024-39689","severity":"low"}],"main_module":"Mozilla::CA","versions":[{"date":"2011-01-22T12:13:20","version":"20110122"},{"version":"20110126","date":"2011-01-26T19:10:48"},{"version":"20110209","date":"2011-02-11T22:42:06"},{"version":"20110301","date":"2011-03-01T23:13:54"},{"date":"2011-04-09T21:15:42","version":"20110409"},{"date":"2011-09-04T03:48:06","version":"20110904"},{"date":"2011-09-15T08:01:35","version":"20110914"},{"version":"20111025","date":"2011-10-25T06:46:10"},{"version":"20120118","date":"2012-01-18T06:52:33"},{"version":"20120309","date":"2012-03-09T01:57:07"},{"version":"20120822","date":"2012-08-22T00:27:51"},{"version":"20120823","date":"2012-08-22T06:39:33"},{"date":"2013-01-14T18:34:17","version":"20130114"},{"version":"20141217","date":"2014-12-22T00:25:09"},{"version":"20150826","date":"2015-08-26T05:56:57"},{"date":"2016-01-04T01:19:28","version":"20160104"},{"date":"2018-03-01T11:34:46","version":"20180117"},{"version":"20200520","date":"2020-05-20T04:53:47"},{"date":"2021-10-01T21:38:43","version":"20211001"},{"version":"20221114","date":"2022-11-14T10:45:12"},{"date":"2023-08-01T15:43:22","version":"20230801"},{"version":"20230807","date":"2023-08-07T12:10:03"},{"date":"2023-08-21T18:15:27","version":"20230821"},{"date":"2023-12-13T20:18:41","version":"20231213"},{"date":"2024-03-13T15:19:08","version":"20240313"},{"version":"20240730","date":"2024-07-30T16:10:02"},{"version":"20240924","date":"2024-09-24T02:19:55"}]},"RT-Extension-MobileUI":{"versions":[{"version":"0.9","date":"2010-08-05T20:58:09"},{"date":"2010-08-06T15:38:53","version":"0.91"},{"date":"2010-08-06T15:58:11","version":"0.92"},{"date":"2010-08-06T17:55:08","version":"0.93"},{"version":"0.94","date":"2010-08-09T13:36:43"},{"version":"0.95","date":"2010-08-09T13:44:33"},{"date":"2010-08-26T21:28:07","version":"0.96"},{"version":"0.96","date":"2010-09-06T18:11:56"},{"version":"0.98","date":"2010-10-28T15:50:29"},{"version":"0.99","date":"2010-10-29T14:08:08"},{"version":"1.00","date":"2010-11-19T18:11:43"},{"version":"1.01","date":"2010-12-08T16:36:01"},{"version":"1.02","date":"2012-07-25T08:57:33"},{"version":"1.02","date":"2012-07-25T18:36:52"},{"version":"1.03","date":"2012-08-27T16:42:55"},{"version":"1.04","date":"2013-06-12T19:09:14"},{"date":"2013-08-13T18:06:54","version":"1.05"},{"date":"2014-04-23T20:25:25","version":"1.06"},{"version":"1.07","date":"2014-04-23T20:26:56"}],"advisories":[{"fixed_versions":[">=1.02"],"id":"CPANSA-RT-Extension-MobileUI-2012-01","references":["https://metacpan.org/changes/distribution/RT-Extension-MobileUI"],"description":"Multiple cross-site scripting (XSS) vulnerabilities in the topic administration page.\n","affected_versions":["<1.02"],"reported":"2012-05-18","distribution":"RT-Extension-MobileUI","cves":["CVE-2012-2769"]}],"main_module":"RT::Extension::MobileUI"},"Email-MIME":{"main_module":"Email::MIME","advisories":[{"cves":["CVE-2024-4140"],"affected_versions":["<1.954"],"reported":"2024-05-02","distribution":"Email-MIME","references":["https://bugs.debian.org/960062","https://github.com/rjbs/Email-MIME/commit/02bf3e26812c8f38a86a33c168571f9783365df2","https://github.com/rjbs/Email-MIME/commit/3a12edd119e493156a5a05e45dd50f4e36b702e8","https://github.com/rjbs/Email-MIME/commit/3dcf096eeccb8e4dd42738de676c8f4a5aa7a531","https://github.com/rjbs/Email-MIME/commit/7e96ecfa1da44914a407f82ae98ba817bba08f2d","https://github.com/rjbs/Email-MIME/commit/b2cb62f19e12580dd235f79e2546d44a6bec54d1","https://github.com/rjbs/Email-MIME/commit/fc0fededd24a71ccc51bcd8b1e486385d09aae63","https://github.com/rjbs/Email-MIME/issues/66","https://github.com/rjbs/Email-MIME/pull/80","https://www.cve.org/CVERecord?id=CVE-2024-4140"],"description":"An excessive memory use issue (CWE-770) exists in Email-MIME, before version 1.954, which can cause denial of service when parsing multipart MIME messages. The patch set (from 2020 and 2024) limits excessive depth and the total number of parts.\n","fixed_versions":[">=1.954"],"id":"CPANSA-Email-MIME-2024-4140","severity":null}],"versions":[{"date":"2004-01-23T12:04:54","version":"1.0_01"},{"version":"1.1","date":"2004-03-24T16:01:33"},{"date":"2004-04-02T08:52:35","version":"1.2"},{"version":"1.3","date":"2004-04-05T16:27:42"},{"date":"2004-07-01T17:38:00","version":"1.4"},{"date":"2004-07-01T17:40:06","version":"1.5"},{"version":"1.6","date":"2004-07-04T20:17:06"},{"version":"1.7","date":"2004-07-05T21:56:19"},{"version":"1.8","date":"2004-08-25T09:58:28"},{"version":"1.81","date":"2004-10-30T00:19:03"},{"version":"1.82","date":"2004-11-18T01:02:46"},{"version":"1.85","date":"2006-07-13T12:09:00"},{"date":"2006-08-22T12:15:01","version":"1.851"},{"version":"1.852","date":"2006-09-06T03:22:24"},{"date":"2006-10-12T19:23:59","version":"1.853"},{"version":"1.854","date":"2006-10-15T12:57:06"},{"version":"1.855","date":"2006-10-19T19:26:56"},{"version":"1.856","date":"2006-11-28T01:54:55"},{"version":"1.857","date":"2006-11-28T02:45:42"},{"version":"1.858","date":"2007-02-10T03:53:13"},{"date":"2007-03-21T02:13:51","version":"1.859"},{"date":"2007-07-14T02:17:11","version":"1.860"},{"version":"1.861","date":"2007-11-06T02:03:23"},{"version":"1.861_01","date":"2008-09-08T22:24:06"},{"version":"1.862","date":"2009-01-24T03:09:24"},{"date":"2009-01-30T13:35:20","version":"1.863"},{"version":"1.900","date":"2009-11-03T20:49:02"},{"version":"1.901","date":"2009-11-05T19:29:16"},{"date":"2009-11-11T20:53:15","version":"1.902"},{"date":"2009-12-23T14:14:45","version":"1.903"},{"date":"2010-09-04T22:05:49","version":"1.904"},{"version":"1.905","date":"2010-09-06T13:25:51"},{"version":"1.906","date":"2010-10-08T01:06:33"},{"date":"2011-02-02T22:52:42","version":"1.907"},{"date":"2011-06-02T03:16:50","version":"1.908"},{"version":"1.909","date":"2011-09-08T19:27:38"},{"date":"2011-09-12T16:45:52","version":"1.910"},{"version":"1.911","date":"2012-07-22T23:12:42"},{"date":"2013-04-08T19:42:09","version":"1.912_01"},{"date":"2013-06-17T15:24:37","version":"1.920"},{"version":"1.921","date":"2013-07-02T02:51:36"},{"date":"2013-07-10T12:45:29","version":"1.922"},{"version":"1.923","date":"2013-08-09T02:00:30"},{"version":"1.924","date":"2013-08-11T03:25:40"},{"version":"1.925","date":"2013-11-08T12:02:21"},{"version":"1.926","date":"2014-01-29T04:29:29"},{"date":"2014-12-04T15:22:49","version":"1.927"},{"version":"1.928","date":"2014-12-16T02:49:06"},{"date":"2015-02-17T14:32:33","version":"1.929"},{"date":"2015-03-26T03:00:09","version":"1.930"},{"date":"2015-07-12T21:32:56","version":"1.931"},{"version":"1.932","date":"2015-07-25T02:25:32"},{"version":"1.933","date":"2015-07-25T13:33:07"},{"version":"1.934","date":"2015-08-02T00:35:40"},{"date":"2015-08-31T20:49:57","version":"1.935"},{"version":"1.936","date":"2015-09-11T02:48:33"},{"date":"2016-01-28T18:33:58","version":"1.937"},{"version":"1.938","date":"2017-01-02T01:04:29"},{"date":"2017-01-14T19:59:46","version":"1.939"},{"date":"2017-01-29T15:34:49","version":"1.940"},{"version":"1.941","date":"2017-03-05T00:18:30"},{"date":"2017-03-05T13:16:39","version":"1.942"},{"date":"2017-06-09T23:01:41","version":"1.943"},{"date":"2017-07-25T16:40:42","version":"1.944"},{"version":"1.945","date":"2017-07-25T18:18:48"},{"version":"1.946","date":"2017-08-31T13:31:14"},{"date":"2020-05-09T18:30:39","version":"1.947"},{"date":"2020-05-09T19:06:22","version":"1.948"},{"date":"2020-05-24T14:27:02","version":"1.949"},{"version":"1.950","date":"2020-11-03T00:22:52"},{"version":"1.951","date":"2021-12-14T14:43:29"},{"date":"2021-12-14T14:58:13","version":"1.952"},{"version":"1.953","date":"2023-01-09T00:03:49"},{"date":"2024-05-02T21:13:55","version":"1.954"}]},"Apache-AuthenHook":{"versions":[{"date":"2003-06-20T19:05:21","version":"2.00_01"},{"version":"2.00_03","date":"2004-04-06T01:20:10"},{"version":"2.00_04","date":"2005-04-14T12:57:55"}],"advisories":[{"references":["https://rt.cpan.org/Public/Bug/Display.html?id=62040","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599712","http://seclists.org/oss-sec/2010/q4/63"],"description":"libapache-authenhook-perl 2.00-04 stores usernames and passwords in plaintext in the vhost error log.\n","fixed_versions":[],"severity":"critical","id":"CPANSA-Apache-AuthenHook-2010-3845","cves":["CVE-2010-3845"],"affected_versions":[">=2.00_04"],"distribution":"Apache-AuthenHook","reported":"2017-08-08"}],"main_module":"Apache::AuthenHook"},"YAML":{"versions":[{"version":"0.25","date":"2001-12-19T10:33:57"},{"date":"2002-01-10T06:33:41","version":"0.26"},{"date":"2002-01-15T22:34:34","version":"0.30"},{"version":"0.35","date":"2002-06-25T06:25:48"},{"date":"2004-01-20T09:22:57","version":"0.49_01"},{"date":"2005-01-31T06:49:59","version":"0.36"},{"version":"0.37","date":"2005-03-31T02:57:10"},{"version":"0.38","date":"2005-03-31T10:16:09"},{"date":"2005-04-12T22:41:53","version":"0.39"},{"date":"2005-04-25T19:42:26","version":"0.39"},{"version":"0.49_70","date":"2005-12-25T19:27:42"},{"version":"0.50","date":"2006-01-10T05:55:16"},{"date":"2006-01-14T19:47:39","version":"0.50"},{"date":"2006-01-18T23:03:28","version":"0.52"},{"date":"2006-01-19T19:13:35","version":"0.53"},{"version":"0.54","date":"2006-01-30T02:22:33"},{"version":"0.55","date":"2006-01-30T03:11:55"},{"date":"2006-01-30T18:41:21","version":"0.56"},{"date":"2006-02-02T07:36:12","version":"0.56"},{"date":"2006-02-14T21:21:22","version":"0.58"},{"version":"0.60","date":"2006-07-01T05:16:14"},{"date":"2006-07-02T20:36:06","version":"0.61"},{"date":"2006-07-03T22:52:48","version":"0.62"},{"version":"0.63","date":"2007-06-20T23:18:21"},{"date":"2007-06-21T23:29:30","version":"0.64"},{"date":"2007-06-22T00:58:23","version":"0.65"},{"date":"2007-09-27T09:16:07","version":"0.66"},{"date":"2008-12-01T10:57:39","version":"0.67"},{"date":"2008-12-04T09:07:34","version":"0.68"},{"version":"0.69_01","date":"2009-08-10T05:19:57"},{"date":"2009-08-10T12:44:33","version":"0.69_02"},{"version":"0.70","date":"2009-08-10T17:23:08"},{"date":"2010-01-03T01:52:05","version":"0.71"},{"version":"0.72","date":"2010-09-01T02:04:50"},{"date":"2011-04-19T10:57:00","version":"0.73"},{"version":"0.74","date":"2011-09-25T20:06:34"},{"date":"2011-09-26T22:47:06","version":"0.75"},{"version":"0.76","date":"2011-09-28T10:06:35"},{"version":"0.77","date":"2011-09-29T16:29:20"},{"version":"0.78","date":"2012-01-02T07:55:05"},{"version":"0.79","date":"2012-02-09T01:26:43"},{"version":"0.80","date":"2012-02-10T20:57:18"},{"date":"2012-04-19T18:04:48","version":"0.81"},{"version":"0.82","date":"2012-07-12T18:51:27"},{"version":"0.83","date":"2012-07-13T15:45:29"},{"date":"2012-07-13T18:19:24","version":"0.84"},{"date":"2013-11-24T15:44:47","version":"0.85"},{"version":"0.86","date":"2013-11-26T16:43:45"},{"date":"2013-12-01T05:53:16","version":"0.87"},{"version":"0.88","date":"2013-12-03T05:30:33"},{"version":"0.89","date":"2014-02-08T22:12:24"},{"date":"2014-02-10T16:45:22","version":"0.90"},{"date":"2014-05-27T21:16:01","version":"0.91"},{"date":"2014-05-29T03:07:13","version":"0.92"},{"version":"0.93","date":"2014-06-14T05:33:25"},{"date":"2014-06-14T17:34:58","version":"0.94"},{"date":"2014-06-20T19:10:04","version":"0.95"},{"version":"0.96","date":"2014-07-14T05:59:12"},{"version":"0.97","date":"2014-07-17T06:38:34"},{"date":"2014-07-30T19:33:24","version":"0.98"},{"date":"2014-08-07T00:57:08","version":"0.99"},{"date":"2014-08-07T07:36:47","version":"1.00"},{"date":"2014-08-07T21:49:48","version":"1.01"},{"date":"2014-08-16T04:11:27","version":"1.02"},{"version":"1.03","date":"2014-08-16T10:33:26"},{"date":"2014-08-16T15:30:43","version":"1.04"},{"version":"1.05","date":"2014-08-16T20:04:31"},{"version":"1.06","date":"2014-08-16T23:51:52"},{"date":"2014-08-18T15:40:59","version":"1.07"},{"date":"2014-08-18T17:23:04","version":"1.08"},{"date":"2014-08-19T23:42:23","version":"1.09"},{"date":"2014-08-29T05:54:45","version":"1.10"},{"version":"1.11","date":"2014-08-30T03:10:03"},{"date":"2014-09-22T15:25:30","version":"1.12"},{"date":"2014-10-11T16:07:22","version":"1.13"},{"version":"1.14","date":"2015-01-17T23:33:39"},{"date":"2015-04-18T15:04:42","version":"1.15"},{"version":"1.16","date":"2016-07-03T17:53:34"},{"date":"2016-07-05T20:04:45","version":"1.16_001"},{"version":"1.16_002","date":"2016-07-05T20:10:01"},{"date":"2016-07-05T20:21:25","version":"1.17"},{"version":"1.18","date":"2016-07-08T14:53:24"},{"date":"2016-11-11T22:44:07","version":"1.18_001"},{"version":"1.19","date":"2016-11-18T18:46:59"},{"date":"2016-11-27T20:27:37","version":"1.19_001"},{"version":"1.20","date":"2016-12-02T21:21:40"},{"date":"2016-12-02T22:00:08","version":"1.20_001"},{"version":"1.20_002","date":"2016-12-07T21:17:58"},{"date":"2016-12-23T20:20:06","version":"1.21"},{"version":"1.22","date":"2017-02-14T22:24:38"},{"version":"1.23","date":"2017-02-19T21:08:48"},{"version":"1.23_001","date":"2017-05-12T15:06:03"},{"version":"1.23_002","date":"2017-05-14T13:15:34"},{"version":"1.23_003","date":"2017-10-29T22:09:18"},{"version":"1.24","date":"2017-10-30T19:33:07"},{"date":"2018-05-06T19:10:48","version":"1.24_001"},{"version":"1.24_002","date":"2018-05-10T16:22:16"},{"date":"2018-05-11T17:59:33","version":"1.25"},{"date":"2018-05-12T11:43:38","version":"1.25_001"},{"date":"2018-05-17T13:00:07","version":"1.25_002"},{"version":"1.26","date":"2018-05-18T19:58:16"},{"version":"1.26_001","date":"2018-10-18T19:46:23"},{"version":"1.27","date":"2018-11-03T13:02:53"},{"date":"2019-04-27T13:41:56","version":"1.27_001"},{"date":"2019-04-28T09:46:43","version":"1.28"},{"version":"1.28_001","date":"2019-05-05T11:31:39"},{"version":"1.29","date":"2019-05-11T08:28:01"},{"date":"2020-01-27T22:10:33","version":"1.30"},{"version":"1.31","date":"2023-12-27T15:11:23"}],"main_module":"YAML","advisories":[{"cves":[],"distribution":"YAML","reported":"2019-04-27","affected_versions":["<1.28"],"references":["https://github.com/ingydotnet/yaml-pm/issues/212"],"description":"Loading globs is easily exploitable.\n","id":"CPANSA-YAML-2019-01","severity":null,"fixed_versions":[">=1.28"]},{"affected_versions":["<1.25"],"reported":"2017-05-10","distribution":"YAML","cves":[],"fixed_versions":[">=1.25"],"severity":null,"id":"CPANSA-YAML-2017-01","description":"YAML loader can run DESTROY method of object created with perl/* tag.\n","references":["https://github.com/ingydotnet/yaml-pm/issues/176"]}]},"Locale-Maketext":{"advisories":[{"references":["http://perl5.git.perl.org/perl.git/commit/1735f6f53ca19f99c6e9e39496c486af323ba6a8","http://sourceforge.net/mailarchive/message.php?msg_id=30219695","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695224","http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2012-6329","http://perl5.git.perl.org/perl.git/blob/HEAD:/pod/perl5177delta.pod","http://openwall.com/lists/oss-security/2012/12/11/4","http://code.activestate.com/lists/perl5-porters/187763/","http://code.activestate.com/lists/perl5-porters/187746/","https://bugzilla.redhat.com/show_bug.cgi?id=884354","http://rhn.redhat.com/errata/RHSA-2013-0685.html","http://www.mandriva.com/security/advisories?name=MDVSA-2013:113","https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0032","http://www.ubuntu.com/usn/USN-2099-1","http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","http://www.securityfocus.com/bid/56950","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"],"description":"The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application before 5.1.3, and the Foswiki application 1.0.x through 1.0.10 and 1.1.x through 1.1.6.\n","id":"CPANSA-Locale-Maketext-2012-6329","severity":null,"fixed_versions":[],"cves":["CVE-2012-6329"],"reported":"2013-01-04","distribution":"Locale-Maketext","affected_versions":["<1.25"]},{"severity":"high","id":"CPANSA-Locale-Maketext-2016-1238","fixed_versions":[">=1.28"],"description":"Does not remove . from @INC, which might allow local users to gain privileges via a Trojan horse module under the current working directory.\n","references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"distribution":"Locale-Maketext","reported":"2016-08-02","affected_versions":["<1.28"],"cves":["CVE-2016-1238"]}],"main_module":"Locale::Maketext","versions":[{"date":"1999-03-16T05:22:44","version":"0.17"},{"date":"2000-05-14T08:26:33","version":"0.18"},{"date":"2001-05-25T14:21:01","version":"1.01"},{"version":"1.02","date":"2001-06-20T08:28:48"},{"date":"2001-06-22T05:27:18","version":"1.03"},{"version":"1.04","date":"2003-04-02T20:20:43"},{"version":"1.05","date":"2003-04-19T06:11:36"},{"date":"2003-06-22T07:51:14","version":"1.06"},{"date":"2004-01-12T04:18:16","version":"1.07"},{"date":"2004-01-20T00:14:54","version":"1.08"},{"date":"2004-03-31T06:47:07","version":"1.09"},{"date":"2005-11-11T03:42:57","version":"1.10"},{"date":"2007-05-08T05:03:08","version":"1.11_01"},{"date":"2007-11-18T05:22:03","version":"1.12"},{"version":"1.13","date":"2008-05-28T15:01:40"},{"version":"1.13_80","date":"2009-06-23T18:13:14"},{"date":"2009-06-24T00:22:21","version":"1.13_81"},{"date":"2009-06-24T02:33:08","version":"1.13_82"},{"version":"1.15_01","date":"2010-09-28T22:59:25"},{"date":"2010-10-07T14:12:19","version":"1.15_02"},{"date":"2010-10-11T18:07:07","version":"1.16"},{"date":"2010-10-20T15:54:47","version":"1.16_01"},{"date":"2010-10-20T18:42:13","version":"1.17"},{"version":"1.18_01","date":"2011-05-25T15:44:55"},{"date":"2011-05-31T19:29:50","version":"1.19"},{"version":"1.19_01","date":"2011-12-15T04:02:22"},{"version":"1.21","date":"2011-12-23T15:18:14"},{"version":"1.22","date":"2012-01-15T05:02:24"},{"date":"2012-12-04T21:29:08","version":"1.23"},{"version":"1.25_01","date":"2014-04-14T03:15:07"},{"version":"1.25","date":"2014-04-15T20:10:23"},{"version":"1.26","date":"2014-12-04T20:57:02"},{"version":"1.27","date":"2016-06-22T23:30:00"},{"version":"1.28","date":"2016-07-25T17:57:25"},{"date":"2020-01-20T05:04:23","version":"1.29"},{"date":"2022-04-01T19:18:30","version":"1.30"},{"date":"2022-04-14T21:18:43","version":"1.31"},{"date":"2022-08-22T19:20:51","version":"1.32"},{"date":"2023-12-30T21:23:51","version":"1.33"}]},"Jifty":{"main_module":"Jifty","advisories":[{"id":"CPANSA-Jifty-2011-01","fixed_versions":[">=1.10518"],"references":["https://metacpan.org/dist/Jifty/changes"],"description":"The path as passed in the fragment request data structure was used verbatim in the dispatcher and other locations. This possibly allowed requests to walk around ACLs by requesting '/some/safe/place/../../../dangerous' as a fragment.\n","distribution":"Jifty","reported":"2011-03-17","affected_versions":["<1.10518"],"cves":[]},{"references":["https://metacpan.org/dist/Jifty/changes"],"description":"The REST plugin would let you call any method on the model.\n","fixed_versions":[">=0.90409"],"id":"CPANSA-Jifty-2009-01","cves":[],"affected_versions":["<0.90409"],"reported":"2009-04-09","distribution":"Jifty"},{"cves":[],"affected_versions":["<0.70408"],"distribution":"Jifty","reported":"2009-04-08","references":["https://metacpan.org/dist/Jifty/changes"],"description":"Allowed all actions on GET.\n","fixed_versions":[">=0.80408"],"id":"CPANSA-Jifty-2008-01"},{"distribution":"Jifty","reported":"2006-07-06","affected_versions":["<0.60706"],"cves":[],"id":"CPANSA-Jifty-2006-01","fixed_versions":[">=0.60706"],"references":["https://metacpan.org/dist/Jifty/changes"],"description":"Jifty did not protect users against a class of remote data access vulnerability. If an attacker knew the structure of your local filesystem and you were using the \"standalone\" webserver in production, the attacker could gain read only access to local files.\n"}],"versions":[{"version":"0.51225","date":"2005-12-25T08:19:39"},{"version":"0.51228","date":"2005-12-28T17:23:39"},{"date":"2006-02-14T04:15:03","version":"0.60213"},{"version":"0.60213","date":"2006-02-22T04:57:24"},{"version":"0.60213","date":"2006-03-21T23:10:58"},{"date":"2006-05-05T18:56:21","version":"0.60321"},{"date":"2006-05-08T14:38:03","version":"0.60507"},{"version":"0.60714","date":"2006-06-15T14:01:15"},{"version":"0.60616","date":"2006-06-16T12:16:03"},{"version":"0.60706","date":"2006-07-07T04:32:27"},{"date":"2006-07-07T05:54:06","version":"0.60707"},{"date":"2006-07-23T00:27:10","version":"0.60722"},{"version":"0.60912","date":"2006-09-13T00:25:58"},{"date":"2006-11-24T03:39:06","version":"0.61123_01"},{"version":"0.70116","date":"2007-01-17T04:52:58"},{"date":"2007-01-17T20:49:04","version":"0.70117"},{"date":"2007-04-17T18:45:55","version":"0.70415"},{"version":"0.70422","date":"2007-04-23T01:08:41"},{"version":"0.70824","date":"2007-08-24T04:20:59"},{"date":"2007-11-29T22:13:17","version":"0.71129"},{"date":"2008-04-08T21:15:29","version":"0.80408"},{"version":"0.90409","date":"2009-04-09T23:10:34"},{"date":"2009-05-20T01:14:48","version":"0.90519"},{"date":"2009-06-30T17:41:18","version":"0.90519"},{"date":"2009-07-01T19:08:14","version":"0.90519"},{"version":"0.90701","date":"2009-11-18T00:08:35"},{"date":"2010-12-09T23:08:09","version":"1.01209"},{"version":"1.10214","date":"2011-02-14T22:10:50"},{"date":"2011-02-28T16:22:26","version":"1.10228"},{"date":"2011-05-18T18:12:42","version":"1.10518"},{"date":"2015-04-30T20:48:27","version":"1.50430"}]},"GD":{"versions":[{"version":"1.00","date":"1996-05-17T08:12:00"},{"date":"1996-07-17T10:16:00","version":"1.01"},{"version":"1.10","date":"1996-09-07T16:53:00"},{"date":"1996-09-09T10:37:00","version":"1.11"},{"date":"1996-09-10T12:04:00","version":"1.12"},{"date":"1996-09-11T07:27:00","version":"1.13"},{"date":"1996-09-12T16:11:00","version":"1.14"},{"date":"1997-11-19T21:13:00","version":"1.15"},{"date":"1997-12-19T14:26:00","version":"1.16"},{"version":"1.17","date":"1998-01-16T13:34:00"},{"date":"1998-01-26T08:44:00","version":"1.18"},{"date":"1998-03-08T16:43:26","version":"1.18"},{"date":"1999-01-31T17:52:34","version":"1.18"},{"version":"1.19","date":"1999-04-26T20:35:55"},{"date":"1999-06-02T13:44:43","version":"1.19"},{"date":"1999-08-31T03:38:46","version":"1.20"},{"version":"1.21","date":"1999-08-31T14:55:24"},{"date":"1999-09-30T21:46:47","version":"1.22"},{"version":"1.23","date":"1999-11-11T14:26:14"},{"date":"2000-02-15T19:54:37","version":"1.24"},{"version":"1.25","date":"2000-02-22T15:20:41"},{"version":"1.26","date":"2000-03-18T23:21:50"},{"version":"1.27","date":"2000-03-22T19:41:56"},{"date":"2000-06-23T12:15:51","version":"1.28"},{"version":"1.29","date":"2000-06-23T18:26:31"},{"version":"1.30","date":"2000-07-07T02:42:47"},{"version":"1.32","date":"2000-11-10T16:00:09"},{"version":"1.33","date":"2001-04-05T04:42:53"},{"date":"2001-09-26T05:19:41","version":"1.31"},{"version":"1.35","date":"2001-12-06T22:57:11"},{"version":"1.36","date":"2001-12-17T19:13:23"},{"date":"2001-12-19T21:34:33","version":"1.37"},{"version":"1.38","date":"2002-01-04T15:33:18"},{"version":"1.39","date":"2002-06-12T02:09:05"},{"date":"2002-06-19T12:11:07","version":"1.40"},{"version":"1.41","date":"2002-07-22T07:33:14"},{"version":"2.00","date":"2002-08-09T16:31:00"},{"date":"2002-08-09T16:39:49","version":"2.01"},{"date":"2002-10-14T13:07:59","version":"2.02"},{"date":"2002-11-01T15:46:28","version":"2.04"},{"date":"2002-11-05T00:55:52","version":"2.041"},{"date":"2002-11-25T01:35:10","version":"2.05"},{"version":"2.06","date":"2003-01-08T16:49:15"},{"version":"2.07","date":"2003-04-24T05:06:33"},{"version":"2.10","date":"2003-10-06T23:04:15"},{"version":"2.11","date":"2003-10-07T22:33:21"},{"version":"2.12","date":"2004-02-06T14:33:56"},{"version":"2.15","date":"2004-07-22T20:32:01"},{"date":"2004-07-27T00:47:05","version":"2.16"},{"date":"2004-11-10T19:15:39","version":"2.17"},{"version":"2.18","date":"2004-11-12T15:19:40"},{"date":"2004-11-16T13:36:22","version":"2.19"},{"date":"2005-02-09T18:50:44","version":"2.21"},{"date":"2005-03-07T18:09:39","version":"2.22"},{"version":"2.23","date":"2005-03-09T21:04:40"},{"date":"2005-07-15T18:47:39","version":"2.25"},{"date":"2005-08-04T13:34:01","version":"2.26"},{"version":"2.27","date":"2005-08-06T14:52:27"},{"date":"2005-08-08T17:28:37","version":"2.28"},{"version":"2.29","date":"2005-10-19T05:44:52"},{"version":"2.30","date":"2005-10-19T07:51:48"},{"date":"2006-02-20T19:48:20","version":"2.31"},{"version":"2.32","date":"2006-03-08T20:19:06"},{"version":"2.34","date":"2006-06-01T20:02:57"},{"date":"2006-08-23T15:31:17","version":"2.35"},{"version":"2.39","date":"2008-04-21T14:15:26"},{"date":"2008-08-07T18:48:46","version":"2.40"},{"version":"2.41","date":"2008-08-07T19:17:19"},{"date":"2009-06-10T14:44:33","version":"2.43"},{"version":"2.44","date":"2009-07-10T18:12:58"},{"version":"2.45","date":"2010-04-30T18:52:21"},{"date":"2011-05-01T17:47:22","version":"2.46"},{"date":"2013-02-26T10:54:32","version":"2.48"},{"version":"2.49","date":"2013-02-26T11:04:16"},{"date":"2013-07-02T20:48:59","version":"2.50"},{"version":"2.51","date":"2014-02-04T16:53:54"},{"version":"2.52","date":"2014-02-19T04:29:23"},{"date":"2014-04-01T14:26:31","version":"2.53"},{"version":"2.55","date":"2014-10-27T02:29:14"},{"version":"2.56","date":"2014-10-28T01:35:39"},{"version":"2.56_01","date":"2017-04-19T14:45:56"},{"version":"2.56_02","date":"2017-04-19T14:56:35"},{"version":"2.56_03","date":"2017-04-19T15:19:33"},{"date":"2017-04-21T06:22:54","version":"2.57"},{"date":"2017-04-21T08:38:24","version":"2.58"},{"version":"2.59","date":"2017-04-21T10:35:21"},{"version":"2.60","date":"2017-04-21T22:11:18"},{"date":"2017-04-22T15:52:15","version":"2.61"},{"version":"2.62","date":"2017-04-22T22:27:02"},{"version":"2.63","date":"2017-04-23T08:23:06"},{"date":"2017-04-23T09:03:18","version":"2.64"},{"date":"2017-04-23T10:36:23","version":"2.65"},{"version":"2.66","date":"2017-04-23T13:08:08"},{"version":"2.67","date":"2017-11-15T08:33:16"},{"version":"2.68","date":"2018-02-18T19:56:41"},{"version":"2.69","date":"2018-08-26T15:40:02"},{"version":"2.70","date":"2019-01-10T12:57:08"},{"date":"2019-02-12T11:53:42","version":"2.71"},{"date":"2020-07-18T06:02:50","version":"2.72"},{"date":"2020-09-24T13:01:57","version":"2.73"},{"date":"2022-01-23T15:34:48","version":"2.74"},{"date":"2022-01-25T16:54:22","version":"2.75"},{"version":"2.76","date":"2022-02-01T14:50:45"},{"version":"2.77","date":"2023-05-29T07:10:47"},{"version":"2.78","date":"2023-07-04T09:13:52"},{"date":"2024-04-29T19:57:07","version":"2.79"},{"version":"2.80","date":"2024-05-03T11:16:48"},{"version":"2.81","date":"2024-05-03T17:02:57"},{"date":"2024-05-27T10:31:38","version":"2.82"},{"version":"2.83","date":"2024-06-23T15:46:01"}],"advisories":[{"distribution":"GD","reported":"2019-01-27","affected_versions":["<2.72"],"cves":["CVE-2019-6977"],"severity":"high","id":"CPANSA-GD-2019-6977","fixed_versions":[">=2.72"],"description":"gdImageColorMatch in gd_color_match.c in the GD Graphics Library (aka LibGD) 2.2.5, as used in the imagecolormatch function in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1, has a heap-based buffer overflow. This can be exploited by an attacker who is able to trigger imagecolormatch calls with crafted image data.\n","references":["https://nvd.nist.gov/vuln/detail/CVE-2019-6977","https://bugs.php.net/bug.php?id=77270","http://php.net/ChangeLog-7.php","http://php.net/ChangeLog-5.php","http://www.securityfocus.com/bid/106731","https://lists.debian.org/debian-lts-announce/2019/01/msg00028.html","https://www.debian.org/security/2019/dsa-4384","https://usn.ubuntu.com/3900-1/","https://security.netapp.com/advisory/ntap-20190315-0003/","https://security.gentoo.org/glsa/201903-18","http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00025.html","http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00031.html","http://packetstormsecurity.com/files/152459/PHP-7.2-imagecolormatch-Out-Of-Band-Heap-Write.html","https://www.exploit-db.com/exploits/46677/","https://access.redhat.com/errata/RHSA-2019:2519","https://access.redhat.com/errata/RHSA-2019:3299","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEYUUOW75YD3DENIPYMO263E6NL2NFHI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3WRUPZVT2MWFUEMVGTRAGDOBHLNMGK5R/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TTXSLRZI5BCQT3H5KALG3DHUWUMNPDX2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/"]}],"main_module":"GD"},"GBrowse":{"advisories":[{"distribution":"GBrowse","reported":"2017-01-15","affected_versions":["<2.56"],"cves":[],"id":"CPANSA-GBrowse-2017-01","fixed_versions":[">=2.56"],"references":["https://metacpan.org/changes/distribution/GBrowse"],"description":"An attacker is able to delete other users' accounts. No httponly cookie flag. Cross-site scripting vulnerability in generation of citation text.\n"},{"references":["https://metacpan.org/changes/distribution/GBrowse"],"description":"Cross-site scripting.\n","id":"CPANSA-GBrowse-2004-01","fixed_versions":[">=1.62"],"cves":[],"distribution":"GBrowse","reported":"2004-04-05","affected_versions":["<1.62"]},{"fixed_versions":[">=1.54"],"id":"CPANSA-GBrowse-2003-01","description":"Path traversal.\n","references":["https://metacpan.org/changes/distribution/GBrowse"],"affected_versions":["<1.54"],"distribution":"GBrowse","reported":"2003-08-23","cves":[]}],"main_module":"CGI::Toggle","versions":[{"version":"1.981","date":"2008-12-29T15:38:27"},{"version":"1.982","date":"2008-12-29T17:21:12"},{"date":"2009-01-06T07:42:56","version":"1.983"},{"date":"2009-01-06T09:17:54","version":"1.984"},{"date":"2009-01-10T12:37:42","version":"1.985"},{"date":"2009-01-12T16:58:20","version":"1.986"},{"version":"1.987","date":"2009-01-22T19:49:50"},{"version":"1.988","date":"2009-01-30T00:12:57"},{"version":"1.989","date":"2009-03-10T19:24:17"},{"version":"1.99","date":"2009-04-03T19:29:22"},{"date":"2009-05-04T05:30:31","version":"1.991"},{"date":"2009-05-05T23:40:00","version":"1.992"},{"version":"1.993","date":"2009-05-07T14:11:11"},{"date":"2009-05-30T22:07:17","version":"1.994"},{"date":"2009-06-08T21:27:08","version":"1.995"},{"version":"1.996","date":"2009-07-06T14:12:57"},{"version":"1.997","date":"2009-07-30T16:40:54"},{"version":"1.9971","date":"2009-08-19T19:19:44"},{"version":"1.998","date":"2009-12-09T21:39:37"},{"version":"1.9982","date":"2009-12-15T15:59:37"},{"version":"1.9983","date":"2009-12-18T19:25:25"},{"version":"1.9984","date":"2009-12-22T21:20:40"},{"date":"2009-12-23T21:56:31","version":"1.999"},{"version":"2.00","date":"2010-01-28T02:58:41"},{"date":"2010-02-09T18:13:33","version":"2.01"},{"date":"2010-03-10T05:56:50","version":"2.02"},{"version":"2.03","date":"2010-03-25T16:06:21"},{"date":"2010-04-18T21:44:27","version":"2.04"},{"version":"2.05","date":"2010-05-13T03:30:32"},{"version":"2.06","date":"2010-05-13T21:17:05"},{"date":"2010-05-17T14:49:41","version":"2.07"},{"version":"2.08","date":"2010-05-21T02:52:47"},{"date":"2010-06-10T20:17:32","version":"2.09"},{"version":"2.10","date":"2010-06-15T14:20:30"},{"date":"2010-06-30T19:15:37","version":"2.11"},{"date":"2010-06-30T19:30:03","version":"2.12"},{"version":"2.13","date":"2010-07-05T20:17:39"},{"version":"2.14","date":"2010-08-27T15:06:04"},{"date":"2010-09-13T22:17:44","version":"2.15"},{"date":"2010-11-01T16:24:01","version":"2.16"},{"date":"2010-11-18T17:08:57","version":"2.17"},{"version":"2.20","date":"2011-01-18T22:35:59"},{"date":"2011-01-22T17:17:34","version":"2.21"},{"date":"2011-01-26T14:31:35","version":"2.22"},{"date":"2011-01-30T20:03:25","version":"2.23"},{"date":"2011-01-31T17:19:08","version":"2.24"},{"version":"2.25","date":"2011-02-02T18:53:40"},{"date":"2011-02-04T18:51:54","version":"2.26"},{"version":"2.27","date":"2011-04-10T21:07:42"},{"date":"2011-04-10T21:32:05","version":"2.28"},{"version":"2.29","date":"2011-05-02T16:12:11"},{"version":"2.30","date":"2011-05-03T12:17:18"},{"version":"2.31","date":"2011-05-03T15:50:21"},{"version":"2.32","date":"2011-05-04T18:47:51"},{"date":"2011-05-07T03:27:32","version":"2.33"},{"version":"2.34","date":"2011-06-01T15:19:47"},{"date":"2011-06-03T13:41:28","version":"2.35"},{"version":"2.36","date":"2011-06-04T14:58:14"},{"version":"2.37","date":"2011-06-06T21:24:59"},{"version":"2.38","date":"2011-06-09T16:00:48"},{"date":"2011-06-29T17:45:00","version":"2.39"},{"date":"2011-09-30T16:56:29","version":"2.40"},{"version":"2.41","date":"2011-10-07T13:31:48"},{"date":"2011-10-12T19:33:22","version":"2.42"},{"date":"2011-10-24T16:43:23","version":"2.43"},{"version":"2.44","date":"2011-12-08T23:09:26"},{"version":"2.45","date":"2012-01-03T21:35:41"},{"date":"2012-02-10T17:28:20","version":"2.46"},{"version":"2.47","date":"2012-02-16T12:40:04"},{"version":"2.48","date":"2012-02-24T21:06:10"},{"version":"2.49","date":"2012-04-17T23:48:26"},{"date":"2012-09-04T16:22:21","version":"2.50"},{"version":"2.51","date":"2012-09-18T03:01:31"},{"version":"2.52","date":"2012-09-26T02:54:36"},{"date":"2012-12-10T11:23:34","version":"2.53"},{"date":"2012-12-11T15:49:03","version":"2.54"},{"version":"2.55","date":"2013-07-10T14:51:25"},{"date":"2017-01-15T21:29:11","version":"2.56"}]},"MT":{"main_module":"","advisories":[{"distribution":"MT","reported":"2013-01-23","affected_versions":[">=4.20,<=4.38"],"darkpan":"true","cves":["CVE-2013-0209"],"id":"CPANSA-MT-2013-0209","severity":null,"fixed_versions":[],"references":["http://www.sec-1.com/blog/wp-content/uploads/2013/01/movabletype_upgrade_exec.rb_.txt","http://www.movabletype.org/2013/01/movable_type_438_patch.html","http://openwall.com/lists/oss-security/2013/01/22/3","http://www.sec-1.com/blog/?p=402"],"description":"lib/MT/Upgrade.pm in mt-upgrade.cgi in Movable Type 4.2x and 4.3x through 4.38 does not require authentication for requests to database-migration functions, which allows remote attackers to conduct eval injection and SQL injection attacks via crafted parameters, as demonstrated by an eval injection attack against the core_drop_meta_for_table function, leading to execution of arbitrary Perl code.\n"},{"description":"Movable Type XMLRPC API provided by Six Apart Ltd. contains a command injection vulnerability. Sending a specially crafted message by POST method to Movable Type XMLRPC API may allow arbitrary Perl script execution, and an arbitrary OS command may be executed through it. Affected products and versions are as follows: Movable Type 7 r.5202 and earlier, Movable Type Advanced 7 r.5202 and earlier, Movable Type 6.8.6 and earlier, Movable Type Advanced 6.8.6 and earlier, Movable Type Premium 1.52 and earlier, and Movable Type Premium Advanced 1.52 and earlier. Note that all versions of Movable Type 4.0 or later including unsupported (End-of-Life, EOL) versions are also affected by this vulnerability.\n","references":["https://movabletype.org/news/2022/08/mt-795-687-released.html","https://jvn.jp/en/jp/JVN57728859/index.html"],"fixed_versions":[">=7.9.5",">=6.8.7,<7"],"severity":"critical","id":"CPANSA-MT-2022-38078","cves":["CVE-2022-38078"],"darkpan":"true","affected_versions":[">=7,<=7.9.4",">=6,<=6.8.6",">=4,<=5"],"reported":"2022-08-24","distribution":"MT"},{"cves":["CVE-2021-20837"],"darkpan":"true","affected_versions":[">=7,<=7.8.1",">=6,<=6.8.2","<6"],"distribution":"MT","reported":"2021-10-26","description":"Movable Type 7 r.5002 and earlier (Movable Type 7 Series), Movable Type 6.8.2 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.5002 and earlier (Movable Type Advanced 7 Series), Movable Type Advanced 6.8.2 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.46 and earlier, and Movable Type Premium Advanced 1.46 and earlier allow remote attackers to execute arbitrary OS commands via unspecified vectors. Note that all versions of Movable Type 4.0 or later including unsupported (End-of-Life, EOL) versions are also affected by this vulnerability.\n","references":["https://jvn.jp/en/jp/JVN41119755/index.html","https://movabletype.org/news/2021/10/mt-782-683-released.html","http://packetstormsecurity.com/files/164818/Movable-Type-7-r.5002-XMLRPC-API-Remote-Command-Injection.html","http://packetstormsecurity.com/files/164705/Movable-Type-7-r.5002-XMLRPC-API-Remote-Command-Injection.html"],"fixed_versions":[],"id":"CPANSA-MT-2021-20837","severity":"critical"},{"affected_versions":[">=7,<7.8.0"],"distribution":"MT","reported":"2021-08-26","cves":["CVE-2021-20814"],"darkpan":"true","fixed_versions":[],"severity":"medium","id":"CPANSA-MT-2021-20814","description":"Cross-site scripting vulnerability in Setting screen of ContentType Information Widget Plugin of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), and Movable Type Premium 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.\n","references":["https://movabletype.org/news/2021/08/mt-780-681-released.html","https://jvn.jp/en/jp/JVN97545738/index.html"]},{"description":"Cross-site scripting vulnerability in Edit screen of Content Data of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series) and Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series)) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.\n","references":["https://movabletype.org/news/2021/08/mt-780-681-released.html","https://jvn.jp/en/jp/JVN97545738/index.html"],"severity":"medium","id":"CPANSA-MT-2021-20813","fixed_versions":[],"darkpan":"true","cves":["CVE-2021-20813"],"distribution":"MT","reported":"2021-08-26","affected_versions":[">=7,<7.8.0"]},{"affected_versions":[">=7,<7.8.0",">=6,<=6.8.0"],"reported":"2021-08-26","distribution":"MT","cves":["CVE-2021-20815"],"darkpan":"true","fixed_versions":[],"id":"CPANSA-MT-2021-20815","severity":"medium","description":"Cross-site scripting vulnerability in Edit Boilerplate screen of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type 6.8.0 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.44 and earlier, and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.\n","references":["https://movabletype.org/news/2021/08/mt-780-681-released.html","https://jvn.jp/en/jp/JVN97545738/index.html"]},{"distribution":"MT","reported":"2021-08-26","affected_versions":[">=7,<7.8.0",">=6,<=6.8.0"],"darkpan":"true","cves":["CVE-2021-20811"],"severity":"medium","id":"CPANSA-MT-2021-20811","fixed_versions":[],"description":"Cross-site scripting vulnerability in List of Assets screen of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type 6.8.0 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.44 and earlier, and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.\n","references":["https://movabletype.org/news/2021/08/mt-780-681-released.html","https://jvn.jp/en/jp/JVN97545738/index.html"]},{"fixed_versions":[],"id":"CPANSA-MT-2021-20810","severity":"medium","references":["https://movabletype.org/news/2021/08/mt-780-681-released.html","https://jvn.jp/en/jp/JVN97545738/index.html"],"description":"Cross-site scripting vulnerability in Website Management screen of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type 6.8.0 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.44 and earlier, and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.\n","affected_versions":[">=7,<7.8.0",">=6,<=6.8.0"],"distribution":"MT","reported":"2021-08-26","cves":["CVE-2021-20810"],"darkpan":"true"},{"affected_versions":[">=7,<7.8.0",">=6,<=6.8.0"],"reported":"2021-08-26","distribution":"MT","cves":["CVE-2021-20809"],"darkpan":"true","fixed_versions":[],"severity":"medium","id":"CPANSA-MT-2021-20809","references":["https://movabletype.org/news/2021/08/mt-780-681-released.html","https://jvn.jp/en/jp/JVN97545738/index.html"],"description":"Cross-site scripting vulnerability in Create screens of Entry, Page, and Content Type of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type 6.8.0 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.44 and earlier, and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.\n"},{"description":"Cross-site scripting vulnerability in Search screen of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type 6.8.0 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.44 and earlier, and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.\n","references":["https://movabletype.org/news/2021/08/mt-780-681-released.html","https://jvn.jp/en/jp/JVN97545738/index.html"],"id":"CPANSA-MT-2021-20808","severity":"medium","fixed_versions":[],"darkpan":"true","cves":["CVE-2021-20808"],"reported":"2021-08-26","distribution":"MT","affected_versions":[">=7,<7.8.0",">=6,<=6.8.0"]},{"references":["https://www.sixapart.jp/movabletype/news/2020/11/18-1101.html","https://jvn.jp/en/jp/JVN94245475/index.html"],"description":"Cross-site scripting vulnerability in Movable Type Movable Type Premium 1.37 and earlier and Movable Type Premium Advanced 1.37 and earlier allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors.\n","severity":"medium","id":"CPANSA-MT-2020-5669","fixed_versions":[],"darkpan":"true","cves":["CVE-2020-5669"],"distribution":"MT","reported":"2021-10-26","affected_versions":["<=1.37"]},{"affected_versions":[">=7,<7.2.1",">=6,<=6.5.3"],"distribution":"MT","reported":"2020-05-14","cves":["CVE-2020-5577"],"darkpan":"true","fixed_versions":[],"severity":"high","id":"CPANSA-MT-2020-5577","description":"Movable Type series (Movable Type 7 r.4606 (7.2.1) and earlier (Movable Type 7), Movable Type Advanced 7 r.4606 (7.2.1) and earlier (Movable Type Advanced 7), Movable Type for AWS 7 r.4606 (7.2.1) and earlier (Movable Type for AWS 7), Movable Type 6.5.3 and earlier (Movable Type 6.5), Movable Type Advanced 6.5.3 and earlier (Movable Type Advanced 6.5), Movable Type 6.3.11 and earlier (Movable Type 6.3), Movable Type Advanced 6.3.11 and earlier (Movable Type 6.3), Movable Type Premium 1.29 and earlier, and Movable Type Premium Advanced 1.29 and earlier) allow remote authenticated attackers to upload arbitrary files and execute a php script via unspecified vectors.\n","references":["https://jvn.jp/en/jp/JVN28806943/index.html","https://movabletype.org/news/2020/05/mt-730-660-6312-released.html"]},{"distribution":"MT","reported":"2020-05-14","affected_versions":[">=7,<7.2.1",">=6,<=6.5.3"],"darkpan":"true","cves":["CVE-2020-5576"],"id":"CPANSA-MT-2020-5576","severity":"high","fixed_versions":[],"description":"Cross-site request forgery (CSRF) vulnerability in Movable Type series (Movable Type 7 r.4606 (7.2.1) and earlier (Movable Type 7), Movable Type Advanced 7 r.4606 (7.2.1) and earlier (Movable Type Advanced 7), Movable Type for AWS 7 r.4606 (7.2.1) and earlier (Movable Type for AWS 7), Movable Type 6.5.3 and earlier (Movable Type 6.5), Movable Type Advanced 6.5.3 and earlier (Movable Type Advanced 6.5), Movable Type 6.3.11 and earlier (Movable Type 6.3), Movable Type Advanced 6.3.11 and earlier (Movable Type 6.3), Movable Type Premium 1.29 and earlier, and Movable Type Premium Advanced 1.29 and earlier) allows remote attackers to hijack the authentication of administrators via unspecified vectors.\n","references":["https://jvn.jp/en/jp/JVN28806943/index.html","https://movabletype.org/news/2020/05/mt-730-660-6312-released.html"]},{"fixed_versions":[],"severity":"medium","id":"CPANSA-MT-2020-5575","description":"Cross-site scripting vulnerability in Movable Type series (Movable Type 7 r.4606 (7.2.1) and earlier (Movable Type 7), Movable Type Advanced 7 r.4606 (7.2.1) and earlier (Movable Type Advanced 7), Movable Type for AWS 7 r.4606 (7.2.1) and earlier (Movable Type for AWS 7), Movable Type 6.5.3 and earlier (Movable Type 6.5), Movable Type Advanced 6.5.3 and earlier (Movable Type Advanced 6.5), Movable Type 6.3.11 and earlier (Movable Type 6.3), Movable Type Advanced 6.3.11 and earlier (Movable Type 6.3), Movable Type Premium 1.29 and earlier, and Movable Type Premium Advanced 1.29 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.\n","references":["https://jvn.jp/en/jp/JVN28806943/index.html","https://movabletype.org/news/2020/05/mt-730-660-6312-released.html"],"affected_versions":[">=7,<7.2.1",">=6,<=6.5.3"],"distribution":"MT","reported":"2020-05-14","cves":["CVE-2020-5575"],"darkpan":"true"},{"darkpan":"true","cves":["CVE-2020-5574"],"distribution":"MT","reported":"2020-05-14","affected_versions":[">=7,<7.2.1",">=6,<=6.5.3"],"description":"HTML attribute value injection vulnerability in Movable Type series (Movable Type 7 r.4606 (7.2.1) and earlier (Movable Type 7), Movable Type Advanced 7 r.4606 (7.2.1) and earlier (Movable Type Advanced 7), Movable Type for AWS 7 r.4606 (7.2.1) and earlier (Movable Type for AWS 7), Movable Type 6.5.3 and earlier (Movable Type 6.5), Movable Type Advanced 6.5.3 and earlier (Movable Type Advanced 6.5), Movable Type 6.3.11 and earlier (Movable Type 6.3), Movable Type Advanced 6.3.11 and earlier (Movable Type 6.3), Movable Type Premium 1.29 and earlier, and Movable Type Premium Advanced 1.29 and earlier) allows remote attackers to inject arbitrary HTML attribute value via unspecified vectors.\n","references":["https://jvn.jp/en/jp/JVN28806943/index.html","https://movabletype.org/news/2020/05/mt-730-660-6312-released.html"],"severity":"medium","id":"CPANSA-MT-2020-5574","fixed_versions":[]},{"cves":["CVE-2020-5528"],"darkpan":"true","affected_versions":[">=7,<7.1.4",">=6,<=6.5.2"],"distribution":"MT","reported":"2020-02-06","description":"Cross-site scripting vulnerability in Movable Type series (Movable Type 7 r.4603 and earlier (Movable Type 7), Movable Type 6.5.2 and earlier (Movable Type 6.5), Movable Type Advanced 7 r.4603 and earlier (Movable Type Advanced 7), Movable Type Advanced 6.5.2 and earlier (Movable Type Advanced 6.5), Movable Type Premium 1.26 and earlier (Movable Type Premium), and Movable Type Premium Advanced 1.26 and earlier (Movable Type Premium Advanced)) allows remote attackers to inject arbitrary web script or HTML in the block editor and the rich text editor via a specially crafted URL.\n","references":["https://movabletype.org/news/2020/02/movable_type_r4605_v720_v653_and_v6311_released.html","http://jvn.jp/en/jp/JVN94435544/index.html"],"fixed_versions":[],"id":"CPANSA-MT-2020-5528","severity":"medium"},{"fixed_versions":[],"severity":"medium","id":"CPANSA-MT-2019-6025","description":"Open redirect vulnerability in Movable Type series Movable Type 7 r.4602 (7.1.3) and earlier (Movable Type 7), Movable Type 6.5.0 and 6.5.1 (Movable Type 6.5), Movable Type 6.3.9 and earlier (Movable Type 6.3.x, 6.2.x, 6.1.x, 6.0.x), Movable Type Advanced 7 r.4602 (7.1.3) and earlier (Movable Type 7), Movable Type Advanced 6.5.0 and 6.5.1 (Movable Type 6.5), Movable Type Advanced 6.3.9 and earlier (Movable Type 6.3.x, 6.2.x, 6.1.x, 6.0.x), Movable Type Premium 1.24 and earlier (Movable Type Premium), and Movable Type Premium (Advanced Edition) 1.24 and earlier (Movable Type Premium) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a specially crafted URL.\n","references":["https://movabletype.org/news/2019/11/movable_type_r4603_v714_v652_and_v6310_released.html","http://jvn.jp/en/jp/JVN65280626/index.html"],"affected_versions":[">=7,<7.1.3",">=6.5.0,<=6.5.1",">=6,<=6.3.9"],"reported":"2019-12-26","distribution":"MT","cves":["CVE-2019-6025"],"darkpan":"true"},{"affected_versions":["=6.3.1"],"reported":"2018-09-04","distribution":"MT","cves":["CVE-2018-0672"],"darkpan":"true","fixed_versions":[],"severity":"medium","id":"CPANSA-MT-2018-0672","references":["http://jvn.jp/en/jp/JVN89550319/index.html"],"description":"Cross-site scripting vulnerability in Movable Type versions prior to Ver. 6.3.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.\n"},{"severity":"critical","id":"CPANSA-MT-2016-5742","fixed_versions":[],"references":["https://movabletype.org/news/2016/06/movable_type_626_and_613_released.html","http://www.openwall.com/lists/oss-security/2016/06/22/6","http://www.openwall.com/lists/oss-security/2016/06/22/5","http://www.openwall.com/lists/oss-security/2016/06/22/3","http://www.securitytracker.com/id/1036160"],"description":"SQL injection vulnerability in the XML-RPC interface in Movable Type Pro and Advanced 6.x before 6.1.3 and 6.2.x before 6.2.6 and Movable Type Open Source 5.2.13 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.\n","distribution":"MT","reported":"2017-01-23","affected_versions":[">=6.0.0,<6.1.3",">=6.2.0,<6.2.6","<5.2.13"],"darkpan":"true","cves":["CVE-2016-5742"]},{"cves":["CVE-2015-1592"],"darkpan":"true","affected_versions":["<5.2.12",">=6.0.0,<=6.0.7"],"distribution":"MT","reported":"2015-02-19","description":"Movable Type Pro, Open Source, and Advanced before 5.2.12 and Pro and Advanced 6.0.x before 6.0.7 does not properly use the Perl Storable::thaw function, which allows remote attackers to include and execute arbitrary local Perl files and possibly execute arbitrary code via unspecified vectors.\n","references":["https://movabletype.org/news/2015/02/movable_type_607_and_5212_released_to_close_security_vulnera.html","http://www.securityfocus.com/bid/72606","http://www.openwall.com/lists/oss-security/2015/02/12/17","http://www.openwall.com/lists/oss-security/2015/02/12/2","https://www.debian.org/security/2015/dsa-3183","http://www.securitytracker.com/id/1031777","https://exchange.xforce.ibmcloud.com/vulnerabilities/100912"],"fixed_versions":[],"severity":null,"id":"CPANSA-MT-2015-1592"},{"distribution":"MT","reported":"2014-12-16","affected_versions":["<5.18",">=5.2.0,<5.2.11",">=6,<6.0.6"],"darkpan":"true","cves":["CVE-2014-9057"],"severity":null,"id":"CPANSA-MT-2014-9057","fixed_versions":[],"references":["https://movabletype.org/news/2014/12/6.0.6.html","https://movabletype.org/documentation/appendices/release-notes/6.0.6.html","http://secunia.com/advisories/61227","https://www.debian.org/security/2015/dsa-3183"],"description":"SQL injection vulnerability in the XML-RPC interface in Movable Type before 5.18, 5.2.x before 5.2.11, and 6.x before 6.0.6 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.\n"},{"distribution":"MT","reported":"2015-03-27","affected_versions":["<5.2.6"],"darkpan":"true","cves":["CVE-2013-2184"],"severity":null,"id":"CPANSA-MT-2013-2184","fixed_versions":[],"references":["https://movabletype.org/documentation/appendices/release-notes/movable-type-526-release-notes.html","http://www.debian.org/security/2015/dsa-3183","http://seclists.org/oss-sec/2013/q2/568","http://seclists.org/oss-sec/2013/q2/560"],"description":"Movable Type before 5.2.6 does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via the comment_state parameter.\n"},{"id":"CPANSA-MT-2012-1503","severity":null,"fixed_versions":[],"references":["http://www.cloudscan.me/2012/10/cve-2012-1503-movable-type-pro-513en.html","http://packetstormsecurity.org/files/117564/Movable-Type-Pro-5.13en-Cross-Site-Scripting.html","http://www.exploit-db.com/exploits/22151","http://osvdb.org/show/osvdb/86729","http://www.securityfocus.com/bid/56160","https://exchange.xforce.ibmcloud.com/vulnerabilities/79521"],"description":"Cross-site scripting (XSS) vulnerability in Six Apart (formerly Six Apart KK) Movable Type (MT) Pro 5.13 allows remote attackers to inject arbitrary web script or HTML via the comment section.\n","reported":"2014-08-29","distribution":"MT","affected_versions":["=5.13"],"darkpan":"true","cves":["CVE-2012-1503"]},{"references":["http://www.movabletype.org/2012/02/movable_type_513_507_and_438_security_updates.html","http://www.movabletype.org/documentation/appendices/release-notes/513.html","http://jvndb.jvn.jp/jvndb/JVNDB-2012-000018","http://jvn.jp/en/jp/JVN20083397/index.html","http://www.securitytracker.com/id?1026738","http://www.securityfocus.com/bid/52138","http://www.debian.org/security/2012/dsa-2423"],"description":"Movable Type before 4.38, 5.0x before 5.07, and 5.1x before 5.13 allows remote attackers to take control of sessions via unspecified vectors related to the (1) commenting feature and (2) community script.\n","fixed_versions":[],"severity":null,"id":"CPANSA-MT-2012-0320","cves":["CVE-2012-0320"],"darkpan":"true","affected_versions":["<4.38",">=5,<5.07",">=5.10,<5.13"],"reported":"2012-03-03","distribution":"MT"},{"darkpan":"true","cves":["CVE-2012-0317"],"distribution":"MT","reported":"2012-03-03","affected_versions":["<4.38",">=5,<5.07",">=5.10,<5.13"],"description":"Multiple cross-site request forgery (CSRF) vulnerabilities in Movable Type before 4.38, 5.0x before 5.07, and 5.1x before 5.13 allow remote attackers to hijack the authentication of arbitrary users for requests that modify data via the (1) commenting feature or (2) community script.\n","references":["http://jvn.jp/en/jp/JVN70683217/index.html","http://www.movabletype.org/documentation/appendices/release-notes/513.html","http://www.movabletype.org/2012/02/movable_type_513_507_and_438_security_updates.html","http://jvndb.jvn.jp/jvndb/JVNDB-2012-000015","http://www.securitytracker.com/id?1026738","http://www.securityfocus.com/bid/52138","http://www.debian.org/security/2012/dsa-2423"],"severity":null,"id":"CPANSA-MT-2012-0317","fixed_versions":[]},{"references":["http://www.movabletype.org/2011/05/movable_type_51_and_505_436_security_update.html","http://www.debian.org/security/2012/dsa-2423"],"description":"Unspecified vulnerability in Movable Type 4.x before 4.36 and 5.x before 5.05 allows remote attackers to read or modify data via unknown vectors.\n","severity":null,"id":"CPANSA-MT-2011-5085","fixed_versions":[],"darkpan":"true","cves":["CVE-2011-5085"],"distribution":"MT","reported":"2012-04-02","affected_versions":[">=4,<4.36",">=5,<5.05"]},{"references":["http://www.movabletype.org/2011/05/movable_type_51_and_505_436_security_update.html","http://www.debian.org/security/2012/dsa-2423"],"description":"Cross-site scripting (XSS) vulnerability in Movable Type 4.x before 4.36 and 5.x before 5.05 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.\n","fixed_versions":[],"severity":null,"id":"CPANSA-MT-2011-5084","cves":["CVE-2011-5084"],"darkpan":"true","affected_versions":[">=4,<4.36",">=5,<5.05"],"distribution":"MT","reported":"2012-04-02"},{"reported":"2010-05-19","distribution":"MT","affected_versions":[">=5.0,<=5.01"],"darkpan":"true","cves":["CVE-2010-1985"],"id":"CPANSA-MT-2010-1985","severity":null,"fixed_versions":[],"references":["http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000017.html","http://www.movabletype.com/blog/2010/05/movable-type-502.html","http://www.vupen.com/english/advisories/2010/1136","http://secunia.com/advisories/39741","http://www.movabletype.org/documentation/appendices/release-notes/movable-type-502.html","http://jvn.jp/en/jp/JVN92854093/index.html"],"description":"Multiple cross-site scripting (XSS) vulnerabilities in the administrative user interface in Six Apart Movable Type 5.0 and 5.01 allow remote attackers to inject arbitrary web script or HTML via unknown vectors.\n"},{"reported":"2009-07-17","distribution":"MT","affected_versions":["<4.261"],"darkpan":"true","cves":["CVE-2009-2492"],"id":"CPANSA-MT-2009-2492","severity":null,"fixed_versions":[],"description":"Cross-site scripting (XSS) vulnerability in mt-wizard.cgi in Six Apart Movable Type before 4.261 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2009-2480.\n","references":["http://jvn.jp/en/jp/JVN86472161/index.html","http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000042.html","http://www.vupen.com/english/advisories/2009/1668","http://secunia.com/advisories/35534","http://www.securityfocus.com/bid/35885"]},{"cves":["CVE-2009-2481"],"darkpan":"true","affected_versions":["<4.261"],"distribution":"MT","reported":"2009-07-16","references":["http://jvn.jp/en/jp/JVN08369659/index.html","http://www.vupen.com/english/advisories/2009/1668","http://www.securityfocus.com/bid/35471","http://secunia.com/advisories/35534","http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000043.html","https://exchange.xforce.ibmcloud.com/vulnerabilities/51330"],"description":"mt-wizard.cgi in Six Apart Movable Type before 4.261, when global templates are not initialized, allows remote attackers to bypass access restrictions and (1) send e-mail to arbitrary addresses or (2) obtain sensitive information via unspecified vectors.\n","fixed_versions":[],"id":"CPANSA-MT-2009-2481","severity":null},{"affected_versions":["<4.24"],"reported":"2009-03-03","distribution":"MT","cves":["CVE-2009-0752"],"darkpan":"true","fixed_versions":[],"severity":null,"id":"CPANSA-MT-2009-0752","references":["http://www.movabletype.com/blog/2009/02/movable-type-424-get-updated-with-better-password-recovery.html"],"description":"Unspecified vulnerability in Movable Type Pro and Community Solution 4.x before 4.24 has unknown impact and attack vectors, possibly related to the password recovery mechanism.\n"},{"severity":null,"id":"CPANSA-MT-2008-5846","fixed_versions":[],"description":"Six Apart Movable Type (MT) before 4.23 allows remote authenticated users with create permission for posts to bypass intended access restrictions and publish posts via a \"system-wide entry listing screen.\"\n","references":["http://www.movabletype.org/mt_423_change_log.html","http://www.securityfocus.com/bid/33133","https://exchange.xforce.ibmcloud.com/vulnerabilities/47759"],"distribution":"MT","reported":"2009-01-05","affected_versions":["<4.23"],"darkpan":"true","cves":["CVE-2008-5846"]},{"references":["http://www.movabletype.org/mt_423_change_log.html","http://jvndb.jvn.jp/ja/contents/2011/JVNDB-2011-000031.html","http://jvn.jp/en/jp/JVN45658190/index.html"],"description":"Multiple cross-site scripting (XSS) vulnerabilities in Six Apart Movable Type (MT) before 4.23 allow remote attackers to inject arbitrary web script or HTML via a (1) MTEntryAuthorUsername, (2) MTAuthorDisplayName, (3) MTEntryAuthorDisplayName, or (4) MTCommenterName field in a Profile View template; a (5) listing screen or (6) edit screen in the CMS app; (7) a TrackBack title, related to the HTML sanitization library; or (8) a user archive name (aka archive title) on a published Community Blog template.\n","fixed_versions":[],"id":"CPANSA-MT-2008-5845","severity":null,"cves":["CVE-2008-5845"],"darkpan":"true","affected_versions":["<4.23"],"reported":"2009-01-05","distribution":"MT"},{"distribution":"MT","reported":"2009-01-02","affected_versions":[">=3,<=3.38",">=4,<4.23"],"darkpan":"true","cves":["CVE-2008-5808"],"id":"CPANSA-MT-2008-5808","severity":null,"fixed_versions":[],"description":"Cross-site scripting (XSS) vulnerability in Six Apart Movable Type Enterprise (MTE) 1.x before 1.56; Movable Type (MT) 3.x before 3.38; and Movable Type, Movable Type Open Source (MTOS), and Movable Type Enterprise 4.x before 4.23 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, possibly related to \"application management.\"\n","references":["http://secunia.com/advisories/32935","http://www.securityfocus.com/bid/32604","http://jvn.jp/en/jp/JVN02216739/index.html","http://www.movabletype.jp/blog/_movable_type_423.html","http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000067.html","https://exchange.xforce.ibmcloud.com/vulnerabilities/47019"]},{"affected_versions":[">=7,<=7.7.1"],"distribution":"MT","reported":"2021-08-26","cves":["CVE-2021-20812"],"darkpan":"true","fixed_versions":[],"severity":"medium","id":"CPANSA-MT-2021-20812","references":["https://movabletype.org/news/2021/08/mt-780-681-released.html","https://jvn.jp/en/jp/JVN97545738/index.html"],"description":"Cross-site scripting vulnerability in Setting screen of Server Sync of Movable Type (Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series) and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.\n"},{"reported":"2022-12-07","distribution":"MT","affected_versions":["<=7"],"darkpan":"true","cves":["CVE-2022-43660"],"severity":null,"id":"CPANSA-MT-2022-43660","fixed_versions":[],"description":"Improper neutralization of Server-Side Includes (SSW) within a web page in Movable Type series allows a remote authenticated attacker with Privilege of 'Manage of Content Types' may execute an arbitrary Perl script and/or an arbitrary OS command. Affected products/versions are as follows: Movable Type 7 r.5301 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.5301 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.53 and earlier, and Movable Type Premium Advanced 1.53 and earlier.\n","references":["https://movabletype.org/news/2022/11/mt-796-688-released.html","https://jvn.jp/en/jp/JVN37014768/index.html"]}],"versions":[]},"DBD-SQLite":{"advisories":[{"reported":"2020-06-27","distribution":"DBD-SQLite","affected_versions":["<1.65_03"],"cves":["CVE-2020-15358"],"severity":"medium","id":"CPANSA-DBD-SQLite-2020-15358","fixed_versions":[">=1.65_03"],"references":["https://www.sqlite.org/src/info/10fa79d00f8091e5","https://www.sqlite.org/src/timeline?p=version-3.32.3&bt=version-3.32.2","https://www.sqlite.org/src/tktview?name=8f157e8010","https://security.netapp.com/advisory/ntap-20200709-0001/","https://security.gentoo.org/glsa/202007-26","https://usn.ubuntu.com/4438-1/","https://www.oracle.com/security-alerts/cpuoct2020.html","https://support.apple.com/kb/HT211931","https://support.apple.com/kb/HT211844","https://support.apple.com/kb/HT211850","https://support.apple.com/kb/HT211843","https://support.apple.com/kb/HT211847","http://seclists.org/fulldisclosure/2020/Nov/19","http://seclists.org/fulldisclosure/2020/Nov/22","http://seclists.org/fulldisclosure/2020/Nov/20","http://seclists.org/fulldisclosure/2020/Dec/32","https://www.oracle.com/security-alerts/cpujan2021.html","https://support.apple.com/kb/HT212147","http://seclists.org/fulldisclosure/2021/Feb/14","https://www.oracle.com/security-alerts/cpuApr2021.html","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf","https://www.oracle.com/security-alerts/cpuapr2022.html"],"description":"In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.\n"},{"description":"ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.\n","references":["https://bugs.chromium.org/p/chromium/issues/detail?id=1080459","https://sqlite.org/src/info/a4dd148928ea65bd","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/","https://security.netapp.com/advisory/ntap-20200608-0002/","https://usn.ubuntu.com/4394-1/","https://www.oracle.com/security-alerts/cpujul2020.html","https://security.gentoo.org/glsa/202007-26","https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc","https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"fixed_versions":[">=1.65_03"],"severity":"medium","id":"CPANSA-DBD-SQLite-2020-13632","cves":["CVE-2020-13632"],"affected_versions":["<1.65_03"],"reported":"2020-05-27","distribution":"DBD-SQLite"},{"references":["https://bugs.chromium.org/p/chromium/issues/detail?id=1080459","https://sqlite.org/src/info/eca0ba2cf4c0fdf7","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/","https://security.netapp.com/advisory/ntap-20200608-0002/","https://usn.ubuntu.com/4394-1/","https://www.oracle.com/security-alerts/cpujul2020.html","https://security.gentoo.org/glsa/202007-26","https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc","https://www.oracle.com/security-alerts/cpuoct2020.html","https://support.apple.com/kb/HT211931","https://support.apple.com/kb/HT211844","https://support.apple.com/kb/HT211850","https://support.apple.com/kb/HT211843","https://support.apple.com/kb/HT211952","http://seclists.org/fulldisclosure/2020/Nov/19","http://seclists.org/fulldisclosure/2020/Nov/22","http://seclists.org/fulldisclosure/2020/Nov/20","https://support.apple.com/kb/HT211935","http://seclists.org/fulldisclosure/2020/Dec/32","https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"description":"SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.\n","id":"CPANSA-DBD-SQLite-2020-13631","severity":"medium","fixed_versions":[">=1.65_03"],"cves":["CVE-2020-13631"],"reported":"2020-05-27","distribution":"DBD-SQLite","affected_versions":["<1.65_03"]},{"references":["https://bugs.chromium.org/p/chromium/issues/detail?id=1080459","https://sqlite.org/src/info/0d69f76f0865f962","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/","https://security.netapp.com/advisory/ntap-20200608-0002/","https://usn.ubuntu.com/4394-1/","https://www.oracle.com/security-alerts/cpujul2020.html","https://security.gentoo.org/glsa/202007-26","https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc","https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://support.apple.com/kb/HT211931","https://support.apple.com/kb/HT211844","https://support.apple.com/kb/HT211850","https://support.apple.com/kb/HT211843","https://support.apple.com/kb/HT211952","http://seclists.org/fulldisclosure/2020/Nov/19","http://seclists.org/fulldisclosure/2020/Nov/22","http://seclists.org/fulldisclosure/2020/Nov/20","https://support.apple.com/kb/HT211935","http://seclists.org/fulldisclosure/2020/Dec/32","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"description":"ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.\n","fixed_versions":[">=1.65_03"],"id":"CPANSA-DBD-SQLite-2020-13630","severity":"high","cves":["CVE-2020-13630"],"affected_versions":["<1.65_03"],"reported":"2020-05-27","distribution":"DBD-SQLite"},{"id":"CPANSA-DBD-SQLite-2020-13435","severity":"medium","fixed_versions":[">=1.65_03"],"description":"SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.\n","references":["https://www.sqlite.org/src/info/7a5279a25c57adf1","https://security.netapp.com/advisory/ntap-20200528-0004/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/","https://usn.ubuntu.com/4394-1/","https://www.oracle.com/security-alerts/cpujul2020.html","https://security.gentoo.org/glsa/202007-26","https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc","https://support.apple.com/kb/HT211931","https://support.apple.com/kb/HT211844","https://support.apple.com/kb/HT211850","https://support.apple.com/kb/HT211843","https://support.apple.com/kb/HT211952","http://seclists.org/fulldisclosure/2020/Nov/19","http://seclists.org/fulldisclosure/2020/Nov/22","http://seclists.org/fulldisclosure/2020/Nov/20","https://support.apple.com/kb/HT211935","http://seclists.org/fulldisclosure/2020/Dec/32","https://www.oracle.com/security-alerts/cpuApr2021.html"],"reported":"2020-05-24","distribution":"DBD-SQLite","affected_versions":["<1.65_03"],"cves":["CVE-2020-13435"]},{"fixed_versions":[">=1.65_03"],"severity":"medium","id":"CPANSA-DBD-SQLite-2020-13434","description":"SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.\n","references":["https://www.sqlite.org/src/info/23439ea582241138","https://www.sqlite.org/src/info/d08d3405878d394e","https://lists.debian.org/debian-lts-announce/2020/05/msg00024.html","https://security.netapp.com/advisory/ntap-20200528-0004/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/","https://usn.ubuntu.com/4394-1/","https://www.oracle.com/security-alerts/cpujul2020.html","https://security.gentoo.org/glsa/202007-26","https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc","https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","https://support.apple.com/kb/HT211931","https://support.apple.com/kb/HT211844","https://support.apple.com/kb/HT211850","https://support.apple.com/kb/HT211843","https://support.apple.com/kb/HT211952","http://seclists.org/fulldisclosure/2020/Nov/19","http://seclists.org/fulldisclosure/2020/Nov/22","http://seclists.org/fulldisclosure/2020/Nov/20","https://support.apple.com/kb/HT211935","http://seclists.org/fulldisclosure/2020/Dec/32","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpuapr2022.html"],"affected_versions":["<1.65_03"],"reported":"2020-05-24","distribution":"DBD-SQLite","cves":["CVE-2020-13434"]},{"cves":["CVE-2020-11656"],"affected_versions":["<1.65_03"],"reported":"2020-04-09","distribution":"DBD-SQLite","description":"In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.\n","references":["https://www3.sqlite.org/cgi/src/info/b64674919f673602","https://www.sqlite.org/src/info/d09f8c3621d5f7f8","https://security.netapp.com/advisory/ntap-20200416-0001/","https://www.oracle.com/security-alerts/cpujul2020.html","https://security.gentoo.org/glsa/202007-26","https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.tenable.com/security/tns-2021-14","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"fixed_versions":[">=1.65_03"],"id":"CPANSA-DBD-SQLite-2020-11656","severity":"critical"},{"affected_versions":["<1.65_03"],"distribution":"DBD-SQLite","reported":"2020-04-09","cves":["CVE-2020-11655"],"fixed_versions":[">=1.65_03"],"id":"CPANSA-DBD-SQLite-2020-11655","severity":"high","description":"SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled.\n","references":["https://www3.sqlite.org/cgi/src/info/4a302b42c7bf5e11","https://www3.sqlite.org/cgi/src/tktview?name=af4556bb5c","https://security.netapp.com/advisory/ntap-20200416-0001/","https://lists.debian.org/debian-lts-announce/2020/05/msg00006.html","https://usn.ubuntu.com/4394-1/","https://www.oracle.com/security-alerts/cpujul2020.html","https://security.gentoo.org/glsa/202007-26","https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc","https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.tenable.com/security/tns-2021-14","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"]},{"id":"CPANSA-DBD-SQLite-2020-9327","severity":"high","fixed_versions":[">=1.65_03"],"description":"In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.\n","references":["https://www.sqlite.org/cgi/src/info/4374860b29383380","https://www.sqlite.org/cgi/src/info/abc473fb8fb99900","https://www.sqlite.org/cgi/src/info/9d0d4ab95dc0c56e","https://security.netapp.com/advisory/ntap-20200313-0002/","https://security.gentoo.org/glsa/202003-16","https://usn.ubuntu.com/4298-1/","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"reported":"2020-02-21","distribution":"DBD-SQLite","affected_versions":["<1.65_03"],"cves":["CVE-2020-9327"]},{"cves":["CVE-2019-20218"],"distribution":"DBD-SQLite","reported":"2020-01-02","affected_versions":["=1.65_02"],"references":["https://github.com/sqlite/sqlite/commit/a6c1a71cde082e09750465d5675699062922e387","https://usn.ubuntu.com/4298-1/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://security.gentoo.org/glsa/202007-26","https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","https://lists.debian.org/debian-lts-announce/2020/12/msg00016.html"],"description":"selectExpander in select.c in SQLite 3.30.1 proceeds with WITH stack unwinding even after a parsing error.\n","severity":"high","id":"CPANSA-DBD-SQLite-2019-20218","fixed_versions":[">=1.65_03"]},{"references":["https://github.com/sqlite/sqlite/commit/1e490c4ca6b43a9cf8637d695907888349f69bec","https://github.com/sqlite/sqlite/commit/d8f2d46cbc9925e034a68aaaf60aad788d9373c1","https://security.netapp.com/advisory/ntap-20200204-0001/","https://usn.ubuntu.com/4298-1/","https://www.oracle.com/security-alerts/cpuapr2020.html"],"description":"ext/misc/zipfile.c in SQLite 3.30.1 mishandles certain uses of INSERT INTO in situations involving embedded '\\\\0' characters in filenames, leading to a memory-management error that can be detected by (for example) valgrind.\n","fixed_versions":[">=1.65_03"],"id":"CPANSA-DBD-SQLite-2019-19959","severity":"high","cves":["CVE-2019-19959"],"affected_versions":["=1.65_02"],"distribution":"DBD-SQLite","reported":"2020-01-03"},{"id":"CPANSA-DBD-SQLite-2019-19926","severity":"high","fixed_versions":[">=1.65_03"],"description":"multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.\n","references":["https://github.com/sqlite/sqlite/commit/8428b3b437569338a9d1e10c4cd8154acbe33089","https://security.netapp.com/advisory/ntap-20200114-0003/","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html","https://access.redhat.com/errata/RHSA-2020:0514","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html","https://www.debian.org/security/2020/dsa-4638","https://usn.ubuntu.com/4298-1/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://usn.ubuntu.com/4298-2/","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"distribution":"DBD-SQLite","reported":"2019-12-23","affected_versions":["=1.65_02"],"cves":["CVE-2019-19926","CVE-2019-19880"]},{"references":["https://www.sqlite.org/src/info/90acdbfce9c08858","https://www.sqlite.org/releaselog/3_28_0.html","https://usn.ubuntu.com/4004-1/","https://usn.ubuntu.com/4004-2/","https://security.netapp.com/advisory/ntap-20190606-0002/","https://usn.ubuntu.com/4019-1/","https://usn.ubuntu.com/4019-2/","http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/","https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://www.oracle.com/security-alerts/cpujan2020.html","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10365"],"description":"SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap out-of-bound read in the rtreenode() function when handling invalid rtree tables.\n","fixed_versions":[">=1.63_04"],"id":"CPANSA-DBD-SQLite-2019-8457","severity":"critical","cves":["CVE-2019-8457"],"affected_versions":[">=1.19_01,<1.63_03"],"reported":"2019-05-30","distribution":"DBD-SQLite"},{"cves":["CVE-2019-5018"],"reported":"2019-05-10","distribution":"DBD-SQLite","affected_versions":[">=1.61_03,<1.63_03"],"references":["https://talosintelligence.com/vulnerability_reports/TALOS-2019-0777","http://www.securityfocus.com/bid/108294","http://packetstormsecurity.com/files/152809/Sqlite3-Window-Function-Remote-Code-Execution.html","https://security.netapp.com/advisory/ntap-20190521-0001/","https://security.gentoo.org/glsa/201908-09","https://usn.ubuntu.com/4205-1/"],"description":"An exploitable use after free vulnerability exists in the window function functionality of Sqlite3 3.26.0. A specially crafted SQL command can cause a use after free vulnerability, potentially resulting in remote code execution. An attacker can send a malicious SQL command to trigger this vulnerability.\n","id":"CPANSA-DBD-SQLite-2019-5018","severity":"high","fixed_versions":[">=1.63_04"]},{"fixed_versions":[">=1.65_03"],"id":"CPANSA-DBD-SQLite-2019-19925","severity":"high","references":["https://github.com/sqlite/sqlite/commit/54d501092d88c0cf89bec4279951f548fb0b8618","https://security.netapp.com/advisory/ntap-20200114-0003/","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html","https://access.redhat.com/errata/RHSA-2020:0514","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html","https://www.debian.org/security/2020/dsa-4638","https://usn.ubuntu.com/4298-1/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"description":"zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.\n","affected_versions":["=1.65_02"],"distribution":"DBD-SQLite","reported":"2019-12-24","cves":["CVE-2019-19925"]},{"cves":["CVE-2019-19924"],"affected_versions":["=1.65_02"],"reported":"2019-12-24","distribution":"DBD-SQLite","description":"SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.\n","references":["https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3","https://security.netapp.com/advisory/ntap-20200114-0003/","https://usn.ubuntu.com/4298-1/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"fixed_versions":[">=1.65_03"],"severity":"medium","id":"CPANSA-DBD-SQLite-2019-19924"},{"fixed_versions":[">=1.65_03"],"id":"CPANSA-DBD-SQLite-2019-19923","severity":"high","description":"flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).\n","references":["https://github.com/sqlite/sqlite/commit/396afe6f6aa90a31303c183e11b2b2d4b7956b35","https://security.netapp.com/advisory/ntap-20200114-0003/","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html","https://access.redhat.com/errata/RHSA-2020:0514","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html","https://www.debian.org/security/2020/dsa-4638","https://usn.ubuntu.com/4298-1/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"affected_versions":["=1.65_02"],"distribution":"DBD-SQLite","reported":"2019-12-24","cves":["CVE-2019-19923"]},{"distribution":"DBD-SQLite","reported":"2019-12-18","affected_versions":["=1.65_02"],"cves":["CVE-2019-19880"],"severity":"high","id":"CPANSA-DBD-SQLite-2019-19880","fixed_versions":[">=1.65_03"],"description":"exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.\n","references":["https://github.com/sqlite/sqlite/commit/75e95e1fcd52d3ec8282edb75ac8cd0814095d54","https://security.netapp.com/advisory/ntap-20200114-0001/","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html","https://access.redhat.com/errata/RHSA-2020:0514","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html","https://www.debian.org/security/2020/dsa-4638","https://usn.ubuntu.com/4298-1/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"]},{"cves":["CVE-2019-19646"],"affected_versions":["<=1.65_02"],"reported":"2019-12-09","distribution":"DBD-SQLite","references":["https://github.com/sqlite/sqlite/commit/ebd70eedd5d6e6a890a670b5ee874a5eae86b4dd","https://github.com/sqlite/sqlite/commit/926f796e8feec15f3836aa0a060ed906f8ae04d3","https://www.sqlite.org/","https://security.netapp.com/advisory/ntap-20191223-0001/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.tenable.com/security/tns-2021-14","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"description":"pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.\n","fixed_versions":[">=1.65_03"],"severity":"critical","id":"CPANSA-DBD-SQLite-2019-19646"},{"cves":["CVE-2019-19645"],"reported":"2019-12-09","distribution":"DBD-SQLite","affected_versions":["<=1.65_02"],"description":"alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.\n","references":["https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06","https://security.netapp.com/advisory/ntap-20191223-0001/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://usn.ubuntu.com/4394-1/","https://www.tenable.com/security/tns-2021-14","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"severity":"medium","id":"CPANSA-DBD-SQLite-2019-19645","fixed_versions":[">=1.65_03"]},{"reported":"2019-12-09","distribution":"DBD-SQLite","affected_versions":["=1.65_02"],"cves":["CVE-2019-19603"],"severity":"high","id":"CPANSA-DBD-SQLite-2019-19603","fixed_versions":[">=1.65_03"],"references":["https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13","https://www.sqlite.org/","https://security.netapp.com/advisory/ntap-20191223-0001/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://usn.ubuntu.com/4394-1/","https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"description":"SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.\n"},{"affected_versions":["=1.65_02"],"distribution":"DBD-SQLite","reported":"2019-12-05","cves":["CVE-2019-19317"],"fixed_versions":[">=1.65_03"],"severity":"critical","id":"CPANSA-DBD-SQLite-2019-19317","references":["https://github.com/sqlite/sqlite/commit/522ebfa7cee96fb325a22ea3a2464a63485886a8","https://github.com/sqlite/sqlite/commit/73bacb7f93eab9f4bd5a65cbc4ae242acf63c9e3","https://security.netapp.com/advisory/ntap-20191223-0001/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"description":"lookupName in resolve.c in SQLite 3.30.1 omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service or possibly have unspecified other impact.\n"},{"affected_versions":["=1.65_02"],"reported":"2019-11-25","distribution":"DBD-SQLite","cves":["CVE-2019-19244"],"fixed_versions":[">=1.65_03"],"id":"CPANSA-DBD-SQLite-2019-19244","severity":"high","description":"sqlite3Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.\n","references":["https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348","https://usn.ubuntu.com/4205-1/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"]},{"description":"SQLite 3.30.1 mishandles pExpr->y.pTab, as demonstrated by the TK_COLUMN case in sqlite3ExprCodeTarget in expr.c.\n","references":["https://github.com/sqlite/sqlite/commit/57f7ece78410a8aae86aa4625fb7556897db384c","https://usn.ubuntu.com/4205-1/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"id":"CPANSA-DBD-SQLite-2019-19242","severity":"medium","fixed_versions":[">=1.65_03"],"cves":["CVE-2019-19242"],"distribution":"DBD-SQLite","reported":"2019-11-27","affected_versions":["=1.65_02"]},{"references":["https://support.apple.com/kb/HT209451","https://support.apple.com/kb/HT209450","https://support.apple.com/kb/HT209448","https://support.apple.com/kb/HT209447","https://support.apple.com/kb/HT209446","https://support.apple.com/kb/HT209443","https://sqlite.org/src/info/940f2adc8541a838","https://seclists.org/bugtraq/2019/Jan/39","https://seclists.org/bugtraq/2019/Jan/33","https://seclists.org/bugtraq/2019/Jan/32","https://seclists.org/bugtraq/2019/Jan/31","https://seclists.org/bugtraq/2019/Jan/29","https://seclists.org/bugtraq/2019/Jan/28","http://www.securityfocus.com/bid/106698","http://seclists.org/fulldisclosure/2019/Jan/69","http://seclists.org/fulldisclosure/2019/Jan/68","http://seclists.org/fulldisclosure/2019/Jan/67","http://seclists.org/fulldisclosure/2019/Jan/66","http://seclists.org/fulldisclosure/2019/Jan/64","http://seclists.org/fulldisclosure/2019/Jan/62","http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html","https://security.netapp.com/advisory/ntap-20190502-0004/","https://usn.ubuntu.com/4019-1/","https://usn.ubuntu.com/4019-2/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10365"],"description":"SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries in a \"merge\" operation that occurs after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). This is a different vulnerability than CVE-2018-20346.\n","id":"CPANSA-DBD-SQLite-2018-20506","severity":"high","fixed_versions":[">=1.61_01"],"cves":["CVE-2018-20506"],"reported":"2019-04-03","distribution":"DBD-SQLite","affected_versions":["<1.61_01"]},{"fixed_versions":[">=1.59_03"],"severity":"high","id":"CPANSA-DBD-SQLite-2018-20505","description":"SQLite 3.25.2, when queries are run on a table with a malformed PRIMARY KEY, allows remote attackers to cause a denial of service (application crash) by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases).\n","references":["https://support.apple.com/kb/HT209451","https://support.apple.com/kb/HT209450","https://support.apple.com/kb/HT209448","https://support.apple.com/kb/HT209447","https://support.apple.com/kb/HT209446","https://support.apple.com/kb/HT209443","https://sqlite.org/src/info/1a84668dcfdebaf12415d","https://seclists.org/bugtraq/2019/Jan/39","https://seclists.org/bugtraq/2019/Jan/33","https://seclists.org/bugtraq/2019/Jan/32","https://seclists.org/bugtraq/2019/Jan/31","https://seclists.org/bugtraq/2019/Jan/29","https://seclists.org/bugtraq/2019/Jan/28","http://www.securityfocus.com/bid/106698","http://seclists.org/fulldisclosure/2019/Jan/69","http://seclists.org/fulldisclosure/2019/Jan/68","http://seclists.org/fulldisclosure/2019/Jan/67","http://seclists.org/fulldisclosure/2019/Jan/66","http://seclists.org/fulldisclosure/2019/Jan/64","http://seclists.org/fulldisclosure/2019/Jan/62","https://security.netapp.com/advisory/ntap-20190502-0004/","https://usn.ubuntu.com/4019-1/"],"affected_versions":["=1.59_02"],"distribution":"DBD-SQLite","reported":"2019-04-03","cves":["CVE-2018-20505"]},{"references":["https://www.sqlite.org/releaselog/3_25_3.html","https://www.mail-archive.com/sqlite-users@mailinglists.sqlite.org/msg113218.html","https://crbug.com/900910","https://chromium.googlesource.com/chromium/src/+/c368e30ae55600a1c3c9cb1710a54f9c55de786e","https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html","https://bugzilla.redhat.com/show_bug.cgi?id=1659677","https://bugzilla.redhat.com/show_bug.cgi?id=1659379","https://blade.tencent.com/magellan/index_en.html","https://access.redhat.com/articles/3758321","https://worthdoingbadly.com/sqlitebug/","https://sqlite.org/src/info/d44318f59044162e","https://sqlite.org/src/info/940f2adc8541a838","https://news.ycombinator.com/item?id=18685296","https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html","https://lists.debian.org/debian-lts-announce/2018/12/msg00012.html","https://www.synology.com/security/advisory/Synology_SA_18_61","http://www.securityfocus.com/bid/106323","https://www.freebsd.org/security/advisories/FreeBSD-EN-19:03.sqlite.asc","http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00040.html","http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html","https://security.gentoo.org/glsa/201904-21","https://usn.ubuntu.com/4019-1/","https://usn.ubuntu.com/4019-2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/","https://support.apple.com/HT209448","https://support.apple.com/HT209447","https://support.apple.com/HT209446","https://support.apple.com/HT209451","https://support.apple.com/HT209443","https://support.apple.com/HT209450","https://www.oracle.com/security-alerts/cpuapr2020.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10365"],"description":"SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan.\n","id":"CPANSA-DBD-SQLite-2018-20346","severity":"high","fixed_versions":[">=1.61_01"],"cves":["CVE-2018-20346"],"reported":"2018-12-21","distribution":"DBD-SQLite","affected_versions":["<1.61_01"]},{"description":"In SQLite through 3.22.0, databases whose schema is corrupted using a CREATE TABLE AS statement could cause a NULL pointer dereference, related to build.c and prepare.c.\n","references":["https://www.sqlite.org/cgi/src/timeline?r=corrupt-schema","https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1756349","https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6964","https://www.sqlite.org/cgi/src/vdiff?from=1774f1c3baf0bc3d&to=d75e67654aa9620b","http://www.securityfocus.com/bid/103466","https://lists.debian.org/debian-lts-announce/2019/01/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/","https://usn.ubuntu.com/4205-1/","https://usn.ubuntu.com/4394-1/","https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E"],"fixed_versions":[">=1.59_01"],"id":"CPANSA-DBD-SQLite-2018-8740","severity":"high","cves":["CVE-2018-8740"],"affected_versions":["<1.59_01"],"distribution":"DBD-SQLite","reported":"2018-03-17"},{"fixed_versions":[">=1.55_07"],"id":"CPANSA-DBD-SQLite-2017-10989","severity":"critical","description":"The getNodeSize function in ext/rtree/rtree.c in SQLite through 3.19.3, as used in GDAL and other products, mishandles undersized RTree blobs in a crafted database, leading to a heap-based buffer over-read or possibly unspecified other impact.\n","references":["https://sqlite.org/src/info/66de6f4a","https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1700937","https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2405","https://sqlite.org/src/vpatch?from=0db20efe201736b3&to=66de6f4a9504ec26","http://marc.info/?l=sqlite-users&m=149933696214713&w=2","http://www.securityfocus.com/bid/99502","http://www.securitytracker.com/id/1039427","https://support.apple.com/HT208144","https://support.apple.com/HT208115","https://support.apple.com/HT208113","https://support.apple.com/HT208112","http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html","https://lists.debian.org/debian-lts-announce/2019/01/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html","https://usn.ubuntu.com/4019-1/","https://usn.ubuntu.com/4019-2/"],"affected_versions":["=1.55_06","<=1.55_03"],"reported":"2017-07-07","distribution":"DBD-SQLite","cves":["CVE-2017-10989"]},{"fixed_versions":[">=1.51_05"],"id":"CPANSA-DBD-SQLite-2016-6153","severity":"medium","description":"os_unix.c in SQLite before 3.13.0 improperly implements the temporary directory search algorithm, which might allow local users to obtain sensitive information, cause a denial of service (application crash), or have unspecified other impact by leveraging use of the current working directory for temporary files.\n","references":["http://www.openwall.com/lists/oss-security/2016/07/01/1","http://www.securityfocus.com/bid/91546","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IGQTH7V45QVHFDXJAEECHEO3HHD644WZ/","https://www.korelogic.com/Resources/Advisories/KL-001-2016-003.txt","https://www.sqlite.org/releaselog/3_13_0.html","http://www.sqlite.org/cgi/src/info/67985761aa93fb61","http://www.openwall.com/lists/oss-security/2016/07/01/2","http://lists.opensuse.org/opensuse-updates/2016-08/msg00053.html","https://www.tenable.com/security/tns-2016-20","https://usn.ubuntu.com/4019-1/","https://usn.ubuntu.com/4019-2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/"],"affected_versions":["<=1.51_04"],"distribution":"DBD-SQLite","reported":"2016-09-26","cves":["CVE-2016-6153"]},{"fixed_versions":[">=1.47_02"],"id":"CPANSA-DBD-SQLite-2015-3416","severity":null,"description":"The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.\n","references":["http://www.sqlite.org/src/info/c494171f77dc2e5e04cb6d865e688448f04e5920","http://seclists.org/fulldisclosure/2015/Apr/31","http://www.debian.org/security/2015/dsa-3252","http://www.mandriva.com/security/advisories?name=MDVSA-2015:217","http://www.ubuntu.com/usn/USN-2698-1","https://support.apple.com/HT205267","http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html","http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html","https://support.apple.com/HT205213","http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","http://www.securitytracker.com/id/1033703","https://security.gentoo.org/glsa/201507-05","http://rhn.redhat.com/errata/RHSA-2015-1635.html","http://rhn.redhat.com/errata/RHSA-2015-1634.html","http://www.securityfocus.com/bid/74228","http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"],"affected_versions":["<=1.47_01"],"distribution":"DBD-SQLite","reported":"2015-04-24","cves":["CVE-2015-3416"]},{"fixed_versions":[">=1.47_02"],"id":"CPANSA-DBD-SQLite-2015-3415","severity":null,"description":"The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement.\n","references":["https://www.sqlite.org/src/info/02e3c88fbf6abdcf3975fb0fb71972b0ab30da30","http://seclists.org/fulldisclosure/2015/Apr/31","http://www.debian.org/security/2015/dsa-3252","http://www.mandriva.com/security/advisories?name=MDVSA-2015:217","http://www.ubuntu.com/usn/USN-2698-1","https://support.apple.com/HT205267","http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html","http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html","https://support.apple.com/HT205213","http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","http://www.securitytracker.com/id/1033703","https://security.gentoo.org/glsa/201507-05","http://rhn.redhat.com/errata/RHSA-2015-1635.html","http://www.securityfocus.com/bid/74228","http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"],"affected_versions":["<=1.47_01"],"distribution":"DBD-SQLite","reported":"2015-04-24","cves":["CVE-2015-3415"]},{"references":["https://www.sqlite.org/src/info/eddc05e7bb31fae74daa86e0504a3478b99fa0f2","http://seclists.org/fulldisclosure/2015/Apr/31","http://www.debian.org/security/2015/dsa-3252","http://www.mandriva.com/security/advisories?name=MDVSA-2015:217","http://www.ubuntu.com/usn/USN-2698-1","https://support.apple.com/HT205267","http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html","http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html","https://support.apple.com/HT205213","http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","http://www.securitytracker.com/id/1033703","https://security.gentoo.org/glsa/201507-05","http://rhn.redhat.com/errata/RHSA-2015-1635.html","http://www.securityfocus.com/bid/74228","http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"],"description":"SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE\"\"\"\"\"\"\"\" at the end of a SELECT statement.\n","fixed_versions":[">=1.47_02"],"severity":null,"id":"CPANSA-DBD-SQLite-2015-3414","cves":["CVE-2015-3414"],"affected_versions":["<=1.47_01"],"distribution":"DBD-SQLite","reported":"2015-04-24"},{"cves":["CVE-2013-7443"],"affected_versions":["=1.47_01"],"distribution":"DBD-SQLite","reported":"2015-08-12","references":["https://www.sqlite.org/src/info/520070ec7fbaac73eda0e0123596b7bb3e9a6897","https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1448758","https://www.sqlite.org/src/info/ac5852d6403c9c9628ca0aa7be135c702f000698","http://ubuntu.com/usn/usn-2698-1","http://www.openwall.com/lists/oss-security/2015/07/14/5","http://www.openwall.com/lists/oss-security/2015/07/15/4","http://www.securityfocus.com/bid/76089"],"description":"Buffer overflow in the skip-scan optimization in SQLite 3.8.2 allows remote attackers to cause a denial of service (crash) via crafted SQL statements.\n","fixed_versions":[">=1.47_02"],"id":"CPANSA-DBD-SQLite-2013-7443","severity":null}],"main_module":"DBD::SQLite","versions":[{"version":"0.05","date":"2002-02-19T18:56:55"},{"date":"2002-02-22T07:29:26","version":"0.06"},{"version":"0.07","date":"2002-02-23T11:19:51"},{"version":"0.08","date":"2002-02-25T12:59:46"},{"date":"2002-02-27T19:46:01","version":"0.09"},{"version":"0.10","date":"2002-02-28T11:11:10"},{"version":"0.11","date":"2002-03-13T12:16:23"},{"version":"0.12","date":"2002-03-21T16:49:25"},{"version":"0.13","date":"2002-03-26T22:39:39"},{"version":"0.14","date":"2002-03-28T15:59:02"},{"version":"0.15","date":"2002-04-02T10:48:10"},{"version":"0.16","date":"2002-06-17T23:50:53"},{"version":"0.17","date":"2002-06-26T13:59:05"},{"version":"0.18","date":"2002-07-12T13:46:37"},{"date":"2002-08-13T22:19:45","version":"0.19"},{"version":"0.20","date":"2002-10-17T16:25:57"},{"date":"2002-10-18T07:08:42","version":"0.21"},{"version":"0.22","date":"2002-12-18T18:02:11"},{"date":"2002-12-29T16:25:29","version":"0.23"},{"version":"0.24","date":"2003-01-29T16:47:23"},{"date":"2003-03-06T22:24:48","version":"0.25"},{"version":"0.26","date":"2003-07-31T15:16:06"},{"version":"0.27","date":"2003-08-18T20:17:31"},{"version":"0.28","date":"2003-08-25T13:42:07"},{"date":"2003-12-05T15:42:05","version":"0.29"},{"date":"2004-02-08T18:45:02","version":"0.30"},{"date":"2004-02-14T19:18:16","version":"0.31"},{"date":"2004-07-21T21:19:33","version":"1.00"},{"version":"1.01","date":"2004-08-01T04:49:09"},{"date":"2004-08-02T18:35:42","version":"1.02"},{"date":"2004-08-09T15:43:59","version":"1.03"},{"date":"2004-08-23T15:14:21","version":"1.04"},{"version":"1.05","date":"2004-09-10T15:46:34"},{"date":"2004-09-21T17:26:28","version":"1.06"},{"version":"1.07","date":"2004-10-12T09:07:33"},{"version":"1.08","date":"2005-02-26T13:47:33"},{"version":"1.09","date":"2005-06-20T15:42:32"},{"version":"1.10","date":"2005-12-01T20:56:30"},{"date":"2005-12-02T19:13:29","version":"1.11"},{"version":"1.12","date":"2006-04-10T02:24:08"},{"version":"1.13","date":"2006-09-08T05:02:06"},{"version":"1.14","date":"2007-09-19T19:25:09"},{"version":"1.19_01","date":"2009-03-27T11:11:41"},{"date":"2009-03-28T16:46:41","version":"1.19_02"},{"date":"2009-03-30T21:58:59","version":"1.19_03"},{"version":"1.19_04","date":"2009-03-31T20:31:37"},{"version":"1.19_05","date":"2009-04-02T04:24:12"},{"version":"1.19_06","date":"2009-04-03T19:21:54"},{"version":"1.19_07","date":"2009-04-04T00:49:42"},{"date":"2009-04-04T04:29:03","version":"1.19_08"},{"version":"1.19_09","date":"2009-04-05T03:16:37"},{"date":"2009-04-05T19:43:04","version":"1.19_10"},{"date":"2009-04-07T14:00:36","version":"1.20"},{"version":"1.21","date":"2009-04-08T01:24:11"},{"date":"2009-04-08T02:05:13","version":"1.22_01"},{"date":"2009-04-08T11:49:36","version":"1.22_02"},{"version":"1.22_03","date":"2009-04-09T09:40:39"},{"date":"2009-04-11T01:58:53","version":"1.22_04"},{"date":"2009-04-14T15:52:05","version":"1.22_05"},{"date":"2009-04-15T14:59:20","version":"1.22_06"},{"date":"2009-04-16T05:40:28","version":"1.22_07"},{"version":"1.22_08","date":"2009-04-17T09:08:15"},{"version":"1.23","date":"2009-04-19T09:53:00"},{"version":"1.24_01","date":"2009-04-22T02:14:33"},{"date":"2009-04-23T00:50:02","version":"1.24_02"},{"version":"1.25","date":"2009-04-23T10:20:49"},{"version":"1.26_01","date":"2009-05-05T06:04:00"},{"version":"1.26_02","date":"2009-06-19T06:56:29"},{"date":"2009-08-12T06:01:13","version":"1.26_03"},{"date":"2009-10-06T06:23:40","version":"1.26_04"},{"version":"1.26_05","date":"2009-10-15T04:05:19"},{"date":"2009-10-28T11:16:12","version":"1.26_06"},{"version":"1.26_07","date":"2009-11-16T01:47:37"},{"date":"2009-11-23T11:15:09","version":"1.27"},{"version":"1.28_01","date":"2009-12-23T11:44:07"},{"version":"1.28_02","date":"2010-01-03T05:56:21"},{"version":"1.29","date":"2010-01-08T09:14:18"},{"version":"1.30_01","date":"2010-03-10T15:55:37"},{"date":"2010-03-30T11:45:57","version":"1.30_02"},{"version":"1.30_03","date":"2010-05-31T03:13:24"},{"version":"1.30_04","date":"2010-08-25T09:25:41"},{"version":"1.30_05","date":"2010-08-27T15:31:59"},{"version":"1.30_06","date":"2010-09-09T01:49:17"},{"version":"1.31","date":"2010-09-15T07:30:11"},{"version":"1.32_01","date":"2010-12-10T05:14:51"},{"date":"2011-03-07T06:57:51","version":"1.32_02"},{"date":"2011-05-12T05:05:38","version":"1.32_03"},{"date":"2011-05-20T02:39:29","version":"1.32_04"},{"date":"2011-05-30T07:39:31","version":"1.33"},{"date":"2011-09-21T16:26:23","version":"1.34_01"},{"date":"2011-10-21T06:13:45","version":"1.34_02"},{"date":"2011-11-01T03:51:19","version":"1.34_03"},{"version":"1.35","date":"2011-11-29T00:16:47"},{"date":"2012-01-19T06:15:08","version":"1.36_01"},{"version":"1.36_02","date":"2012-02-23T04:11:05"},{"date":"2012-05-07T22:56:21","version":"1.36_03"},{"date":"2012-05-19T09:46:14","version":"1.36_04"},{"version":"1.37","date":"2012-06-09T14:43:03"},{"date":"2012-09-24T10:18:25","version":"1.38_01"},{"version":"1.38_02","date":"2013-04-09T05:03:21"},{"date":"2013-05-21T05:14:23","version":"1.38_03"},{"date":"2013-05-29T07:11:57","version":"1.38_04"},{"date":"2013-05-31T04:39:53","version":"1.38_05"},{"date":"2013-06-09T15:10:40","version":"1.39"},{"version":"1.40","date":"2013-07-28T05:31:53"},{"date":"2013-08-27T06:41:37","version":"1.41_01"},{"version":"1.41_02","date":"2013-08-29T18:53:29"},{"date":"2013-09-04T17:57:50","version":"1.41_03"},{"date":"2014-01-12T01:19:09","version":"1.41_04"},{"version":"1.41_05","date":"2014-01-22T03:53:26"},{"version":"1.41_06","date":"2014-02-12T02:53:38"},{"date":"2014-03-13T13:44:52","version":"1.41_07"},{"date":"2014-03-19T15:29:13","version":"1.42"},{"date":"2014-03-25T18:50:08","version":"1.43_01"},{"version":"1.43_02","date":"2014-03-25T19:58:13"},{"version":"1.43_03","date":"2014-06-12T05:01:15"},{"date":"2014-07-21T01:13:47","version":"1.43_04"},{"date":"2014-07-21T05:45:41","version":"1.43_05"},{"date":"2014-07-22T00:31:31","version":"1.43_06"},{"date":"2014-07-29T17:03:09","version":"1.43_07"},{"date":"2014-08-21T09:01:11","version":"1.43_08"},{"date":"2014-10-20T07:50:46","version":"1.43_09"},{"version":"1.44","date":"2014-10-22T14:15:00"},{"date":"2014-10-22T15:33:37","version":"1.45_01"},{"date":"2014-10-23T08:21:27","version":"1.45_02"},{"date":"2014-10-24T17:57:53","version":"1.45_03"},{"date":"2014-10-28T08:28:00","version":"1.45_04"},{"date":"2014-11-25T04:07:43","version":"1.45_05"},{"version":"1.45_06","date":"2014-11-26T08:52:49"},{"date":"2014-12-10T06:23:03","version":"1.46"},{"date":"2015-02-17T07:00:46","version":"1.47_01"},{"date":"2015-04-16T13:30:38","version":"1.47_02"},{"version":"1.47_03","date":"2015-04-16T14:45:00"},{"date":"2015-05-01T17:37:17","version":"1.47_04"},{"date":"2015-05-08T13:49:32","version":"1.47_05"},{"date":"2015-06-11T16:10:44","version":"1.48"},{"date":"2015-08-04T11:18:05","version":"1.49_01"},{"date":"2015-10-10T03:43:45","version":"1.49_02"},{"version":"1.49_03","date":"2015-11-05T05:52:27"},{"version":"1.49_04","date":"2015-11-24T12:59:11"},{"date":"2016-01-11T13:32:43","version":"1.49_05"},{"date":"2016-01-15T03:40:44","version":"1.49_06"},{"version":"1.49_07","date":"2016-01-21T01:11:59"},{"version":"1.49_08","date":"2016-01-30T00:55:58"},{"date":"2016-02-10T15:04:42","version":"1.50"},{"date":"2016-02-20T01:03:50","version":"1.51_01"},{"date":"2016-02-20T01:49:29","version":"1.51_02"},{"version":"1.51_03","date":"2016-02-20T11:06:51"},{"date":"2016-03-07T04:33:35","version":"1.51_04"},{"date":"2016-06-23T01:22:57","version":"1.51_05"},{"version":"1.51_06","date":"2016-10-15T00:21:14"},{"version":"1.51_07","date":"2016-10-16T05:16:29"},{"date":"2016-11-15T13:02:35","version":"1.52"},{"version":"1.53_01","date":"2016-11-26T01:34:30"},{"date":"2016-12-24T02:36:45","version":"1.54"},{"date":"2017-01-03T15:42:47","version":"1.55_01"},{"date":"2017-01-07T16:49:21","version":"1.55_02"},{"version":"1.55_03","date":"2017-02-14T01:31:43"},{"date":"2017-11-21T17:07:32","version":"1.55_04"},{"version":"1.55_05","date":"2017-12-15T18:52:29"},{"date":"2018-01-27T07:33:51","version":"1.55_06"},{"date":"2018-01-27T07:42:58","version":"1.55_07"},{"date":"2018-02-28T09:01:25","version":"1.56"},{"version":"1.57_01","date":"2018-03-21T06:45:29"},{"version":"1.58","date":"2018-03-28T11:56:19"},{"date":"2018-09-16T19:25:50","version":"1.59_01"},{"version":"1.59_02","date":"2018-09-30T06:09:34"},{"version":"1.59_03","date":"2018-11-03T12:14:20"},{"version":"1.60","date":"2018-12-01T02:42:29"},{"date":"2018-12-01T08:01:30","version":"1.61_01"},{"version":"1.61_02","date":"2018-12-01T09:10:18"},{"version":"1.61_03","date":"2018-12-19T13:03:22"},{"version":"1.61_04","date":"2018-12-22T06:37:21"},{"date":"2018-12-28T17:59:27","version":"1.62"},{"date":"2019-01-25T22:31:45","version":"1.63_01"},{"date":"2019-02-13T19:09:44","version":"1.63_02"},{"version":"1.63_03","date":"2019-02-14T16:56:40"},{"date":"2019-05-24T16:39:18","version":"1.63_04"},{"date":"2019-07-11T17:50:51","version":"1.63_05"},{"version":"1.64","date":"2019-08-12T09:02:59"},{"version":"1.65_01","date":"2020-01-18T01:56:18"},{"version":"1.65_02","date":"2020-02-08T13:02:59"},{"date":"2020-07-26T16:42:08","version":"1.65_03"},{"date":"2020-08-30T02:14:15","version":"1.66"},{"date":"2020-11-24T12:57:56","version":"1.67_01"},{"date":"2020-12-05T17:06:24","version":"1.67_02"},{"version":"1.67_03","date":"2021-03-30T21:37:13"},{"version":"1.67_04","date":"2021-05-30T22:56:01"},{"date":"2021-06-12T23:39:11","version":"1.67_05"},{"version":"1.67_06","date":"2021-06-14T03:49:54"},{"version":"1.67_07","date":"2021-06-19T00:57:41"},{"version":"1.68","date":"2021-07-22T05:30:17"},{"version":"1.69_01","date":"2021-07-29T21:09:19"},{"version":"1.69_02","date":"2021-07-30T14:21:39"},{"date":"2021-08-01T10:20:33","version":"1.70"},{"date":"2021-12-01T17:03:29","version":"1.71_01"},{"date":"2022-01-06T20:51:05","version":"1.71_02"},{"date":"2022-02-23T10:49:28","version":"1.71_03"},{"version":"1.71_04","date":"2022-02-26T00:59:40"},{"date":"2022-02-26T02:49:09","version":"1.71_05"},{"date":"2022-03-12T02:54:15","version":"1.71_06"},{"date":"2022-10-25T18:36:30","version":"1.71_07"},{"date":"2022-11-03T16:28:17","version":"1.72"},{"version":"1.73_01","date":"2023-07-09T01:04:52"},{"version":"1.74","date":"2023-09-19T17:26:03"},{"date":"2024-09-17T14:05:40","version":"1.75_01"},{"date":"2024-10-19T04:47:07","version":"1.76"}]},"Compress-Raw-Bzip2":{"main_module":"Compress::Raw::Bzip2","advisories":[{"description":"Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file.\n","references":["https://metacpan.org/changes/distribution/Compress-Raw-Bzip2"],"fixed_versions":[">=2.031"],"id":"CPANSA-Compress-Raw-Bzip2-2010-0405","cves":["CVE-2010-0405"],"affected_versions":["<2.031"],"reported":"2010-01-27","distribution":"Compress-Raw-Bzip2"},{"description":"Off-by-one error in the bzinflate function in Bzip2.xs in the Compress-Raw-Bzip2 module before 2.018 for Perl allows context-dependent attackers to cause a denial of service (application hang or crash) via a crafted bzip2 compressed stream that triggers a buffer overflow, a related issue to CVE-2009-1391.\n","references":["http://security.gentoo.org/glsa/glsa-200908-07.xml","https://bugs.gentoo.org/show_bug.cgi?id=281955","https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00999.html","https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00982.html","http://www.securityfocus.com/bid/36082","http://secunia.com/advisories/36386","https://bugzilla.redhat.com/show_bug.cgi?id=518278","http://secunia.com/advisories/36415","https://exchange.xforce.ibmcloud.com/vulnerabilities/52628"],"fixed_versions":[">=2.018"],"id":"CPANSA-Compress-Raw-Bzip2-2009-1884","severity":null,"cves":["CVE-2009-1884"],"affected_versions":["<2.018"],"reported":"2009-08-19","distribution":"Compress-Raw-Bzip2"}],"versions":[{"version":"2.000_10","date":"2006-03-13T16:14:00"},{"version":"2.000_11","date":"2006-04-15T21:23:09"},{"date":"2006-05-17T12:43:30","version":"2.000_12"},{"date":"2006-06-20T12:43:47","version":"2.000_13"},{"date":"2006-10-26T14:15:45","version":"2.000_14"},{"date":"2006-11-01T10:35:27","version":"2.001"},{"date":"2006-12-29T20:40:23","version":"2.002"},{"date":"2007-01-02T13:03:45","version":"2.003"},{"date":"2007-03-03T15:50:04","version":"2.004"},{"version":"2.005","date":"2007-07-01T00:06:51"},{"date":"2007-09-01T19:44:48","version":"2.006"},{"version":"2.008","date":"2007-11-10T11:59:25"},{"date":"2008-04-20T14:41:25","version":"2.009"},{"version":"2.010","date":"2008-05-05T17:18:15"},{"date":"2008-05-17T11:16:17","version":"2.011"},{"date":"2008-07-15T22:23:56","version":"2.012"},{"version":"2.014","date":"2008-09-02T20:20:05"},{"version":"2.015","date":"2008-09-03T20:47:15"},{"version":"2.017","date":"2009-04-04T09:47:36"},{"date":"2009-05-03T16:26:57","version":"2.018"},{"date":"2009-05-04T09:42:06","version":"2.019"},{"date":"2009-06-03T17:48:18","version":"2.020"},{"version":"2.021","date":"2009-08-30T20:25:24"},{"date":"2009-11-09T23:25:19","version":"2.023"},{"version":"2.024","date":"2010-01-09T17:56:12"},{"date":"2010-03-28T12:56:33","version":"2.025"},{"date":"2010-04-07T19:49:29","version":"2.026"},{"date":"2010-04-24T19:15:32","version":"2.027"},{"date":"2010-07-24T14:29:17","version":"2.030"},{"version":"2.031","date":"2010-09-21T19:44:52"},{"version":"2.032","date":"2011-01-06T11:26:00"},{"date":"2011-01-11T14:02:05","version":"2.033"},{"version":"2.034","date":"2011-05-02T21:50:15"},{"date":"2011-05-07T08:30:09","version":"2.035"},{"version":"2.036","date":"2011-06-18T21:45:13"},{"version":"2.037","date":"2011-06-22T07:17:56"},{"version":"2.039","date":"2011-10-28T14:27:59"},{"date":"2011-10-28T22:18:59","version":"2.040"},{"version":"2.042","date":"2011-11-17T23:44:58"},{"date":"2011-11-20T21:31:34","version":"2.043"},{"version":"2.044","date":"2011-12-03T22:48:47"},{"date":"2011-12-04T19:19:58","version":"2.045"},{"version":"2.047","date":"2012-01-28T23:26:44"},{"date":"2012-01-29T16:58:55","version":"2.048"},{"date":"2012-02-18T15:56:34","version":"2.049"},{"date":"2012-04-29T12:40:06","version":"2.052"},{"date":"2012-08-05T20:35:37","version":"2.055"},{"version":"2.057","date":"2012-11-10T19:08:29"},{"date":"2012-11-12T22:14:16","version":"2.058"},{"date":"2012-11-25T13:38:19","version":"2.059"},{"version":"2.060","date":"2013-01-07T20:02:08"},{"version":"2.061","date":"2013-05-27T09:54:30"},{"version":"2.062","date":"2013-08-12T19:06:20"},{"version":"2.063","date":"2013-11-02T17:14:54"},{"date":"2014-02-01T23:19:50","version":"2.064"},{"version":"2.066","date":"2014-09-21T12:40:58"},{"version":"2.067","date":"2014-12-08T15:12:21"},{"date":"2014-12-23T17:44:34","version":"2.068"},{"version":"2.069","date":"2015-09-27T14:33:57"},{"version":"2.070","date":"2016-12-28T23:07:42"},{"date":"2017-02-12T20:39:20","version":"2.072"},{"date":"2017-02-19T20:35:17","version":"2.073"},{"date":"2017-02-19T22:11:17","version":"2.074"},{"version":"2.080","date":"2018-04-03T18:20:04"},{"version":"2.081","date":"2018-04-08T15:01:21"},{"date":"2018-12-30T22:38:05","version":"2.083"},{"date":"2019-01-06T08:56:52","version":"2.084"},{"date":"2019-03-31T19:13:22","version":"2.086"},{"date":"2019-08-10T18:11:44","version":"2.087"},{"version":"2.088","date":"2019-11-03T08:56:50"},{"date":"2019-11-03T19:53:42","version":"2.089"},{"date":"2019-11-09T18:35:48","version":"2.090"},{"version":"2.091","date":"2019-11-23T19:34:12"},{"version":"2.092","date":"2019-12-04T22:08:25"},{"date":"2019-12-07T16:05:12","version":"2.093"},{"version":"2.094","date":"2020-07-13T10:53:44"},{"date":"2020-07-20T19:13:40","version":"2.095"},{"date":"2020-07-31T20:50:12","version":"2.096"},{"date":"2021-01-07T13:00:00","version":"2.100"},{"version":"2.101","date":"2021-02-20T14:08:53"},{"date":"2022-04-03T19:48:28","version":"2.103"},{"date":"2022-06-25T09:02:32","version":"2.201"},{"date":"2023-02-08T19:23:39","version":"2.204"},{"version":"2.205","date":"2023-07-16T15:36:44"},{"version":"2.206","date":"2023-07-25T15:36:59"},{"date":"2024-02-18T22:19:11","version":"2.207"},{"date":"2024-02-19T09:28:45","version":"2.208"},{"date":"2024-02-20T13:23:07","version":"2.209"},{"date":"2024-02-26T09:33:37","version":"2.210"},{"date":"2024-04-06T13:40:27","version":"2.211"},{"version":"2.212","date":"2024-04-27T12:52:31"},{"version":"2.213","date":"2024-08-28T15:29:28"}]},"Apache-Wyrd":{"main_module":"Apache::Wyrd","advisories":[{"references":["https://metacpan.org/dist/Apache-Wyrd/changes"],"description":"User-submitted data cab be executed if it is displayed on a page, if the data contains a string that can be interpreted as a Wyrd.\n","fixed_versions":[">=0.97"],"severity":null,"id":"CPANSA-Apache-Wyrd-2008-01","cves":[],"affected_versions":["<0.97"],"reported":"2008-04-14","distribution":"Apache-Wyrd"}],"versions":[{"date":"2004-03-17T21:36:52","version":"0.8"},{"version":"0.81","date":"2004-03-18T22:52:04"},{"version":"0.82","date":"2004-03-25T23:52:49"},{"version":"0.83","date":"2004-08-19T15:42:55"},{"version":"0.84","date":"2004-09-03T19:44:01"},{"version":"0.85","date":"2004-09-22T16:08:23"},{"version":"0.86","date":"2004-09-23T02:04:43"},{"date":"2004-10-31T20:59:42","version":"0.87"},{"version":"0.90","date":"2004-12-16T20:56:33"},{"date":"2005-01-09T21:52:49","version":"0.91"},{"date":"2005-01-13T17:42:18","version":"0.92"},{"version":"0.93","date":"2005-03-25T21:22:56"},{"version":"0.94","date":"2006-10-22T22:57:04"},{"version":"0.95","date":"2007-04-30T23:02:05"},{"date":"2007-05-01T15:20:02","version":"0.96"},{"date":"2008-04-14T18:49:14","version":"0.97"},{"date":"2008-04-15T21:32:47","version":"0.98"}]},"App-perlall":{"versions":[{"version":"0.01","date":"2011-12-23T21:52:22"},{"version":"0.02","date":"2011-12-24T00:56:03"},{"version":"0.03","date":"2012-01-06T17:07:08"},{"date":"2012-01-09T22:05:35","version":"0.04"},{"date":"2012-01-31T21:18:20","version":"0.05"},{"date":"2012-02-06T23:12:27","version":"0.06"},{"date":"2012-02-07T20:52:55","version":"0.07"},{"date":"2012-02-23T10:35:50","version":"0.08"},{"date":"2012-03-22T18:24:53","version":"0.09"},{"date":"2012-05-03T13:44:26","version":"0.10"},{"version":"0.11","date":"2012-05-05T02:22:56"},{"date":"2012-05-05T14:18:09","version":"0.12"},{"date":"2012-05-29T15:34:02","version":"0.13"},{"date":"2012-06-07T16:07:09","version":"0.14"},{"version":"0.15","date":"2012-07-18T17:55:03"},{"version":"0.15_01","date":"2012-07-18T18:05:33"},{"version":"0.16","date":"2012-07-19T19:07:14"},{"date":"2012-08-06T15:11:54","version":"0.17"},{"date":"2012-11-06T22:12:59","version":"0.18"},{"version":"0.19","date":"2012-11-08T15:37:31"},{"version":"0.20","date":"2012-11-08T15:50:30"},{"date":"2012-11-08T18:53:37","version":"0.21"},{"date":"2012-11-09T22:04:21","version":"0.22"},{"version":"0.23","date":"2012-11-11T19:50:41"},{"date":"2012-11-13T20:46:09","version":"0.25"},{"version":"0.26","date":"2012-11-13T22:45:49"},{"version":"0.27","date":"2012-11-15T16:26:40"},{"version":"0.28","date":"2012-12-13T20:09:18"},{"version":"0.29","date":"2012-12-20T22:29:59"},{"version":"0.30","date":"2013-01-09T20:22:21"},{"version":"0.31","date":"2013-02-04T19:58:18"},{"version":"0.32","date":"2013-02-23T21:35:31"},{"date":"2013-03-05T01:04:28","version":"0.33"},{"date":"2013-03-05T15:34:37","version":"0.34"},{"date":"2013-03-22T22:34:57","version":"0.35"},{"date":"2013-07-11T19:58:07","version":"0.36"},{"date":"2013-07-13T19:53:25","version":"0.37"},{"date":"2013-10-23T15:58:48","version":"0.39"},{"version":"0.40","date":"2013-11-18T16:12:38"},{"date":"2013-12-03T17:08:11","version":"0.41"},{"version":"0.42","date":"2013-12-06T18:40:51"},{"version":"0.43","date":"2013-12-09T18:31:19"},{"date":"2014-01-11T23:39:19","version":"0.44"},{"date":"2014-07-25T13:36:23","version":"0.45"},{"date":"2014-08-10T01:42:03","version":"0.46"},{"version":"0.47","date":"2015-07-08T07:43:56"},{"date":"2015-10-06T09:33:35","version":"0.48"},{"date":"2015-11-27T15:53:11","version":"0.49"},{"version":"0.50","date":"2016-06-12T12:48:37"},{"version":"0.51","date":"2019-12-10T20:02:45"}],"advisories":[{"cves":["CVE-2013-1667"],"affected_versions":["<0.33"],"distribution":"App-perlall","reported":"2013-03-14","references":["http://www.securityfocus.com/bid/58311","http://perl5.git.perl.org/perl.git/commitdiff/d59e31f","http://perl5.git.perl.org/perl.git/commitdiff/9d83adc","http://www.nntp.perl.org/group/perl.perl5.porters/2013/03/msg199755.html","http://www.debian.org/security/2013/dsa-2641","http://secunia.com/advisories/52499","http://secunia.com/advisories/52472","https://bugzilla.redhat.com/show_bug.cgi?id=912276","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702296","http://perl5.git.perl.org/perl.git/commitdiff/6e79fe5","http://osvdb.org/90892","http://www.ubuntu.com/usn/USN-1770-1","http://rhn.redhat.com/errata/RHSA-2013-0685.html","http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html","http://marc.info/?l=bugtraq&m=137891988921058&w=2","http://www.mandriva.com/security/advisories?name=MDVSA-2013:113","https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0094","http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","https://exchange.xforce.ibmcloud.com/vulnerabilities/82598","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18771"],"description":"The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key.\n","fixed_versions":[">=0.33"],"severity":null,"id":"CPANSA-App-perlall-2013-1667"}],"main_module":"App::perlall"},"Search-OpenSearch-Server":{"advisories":[{"affected_versions":["<0.17"],"distribution":"Search-OpenSearch-Server","reported":"2012-08-31","cves":[],"fixed_versions":[">=0.17"],"id":"CPANSA-Search-OpenSearch-Server-2012-01","references":["https://metacpan.org/changes/distribution/Search-OpenSearch-Server","https://github.com/karpet/search-opensearch-server/commit/69d53fde9d70fe12e1f592de482601c43c45a278"],"description":"Arbitrary Perl methods could be called via HTTP like RPC.\n"}],"main_module":"Search::OpenSearch::Server","versions":[{"version":"0.01","date":"2010-05-28T03:07:46"},{"date":"2010-05-29T01:11:09","version":"0.02"},{"version":"0.03","date":"2010-06-23T01:22:53"},{"date":"2010-06-26T21:08:31","version":"0.04"},{"version":"0.05","date":"2011-01-08T04:05:22"},{"version":"0.06","date":"2011-09-26T18:12:08"},{"version":"0.07","date":"2011-09-26T18:16:12"},{"date":"2011-09-30T03:15:51","version":"0.08"},{"version":"0.09","date":"2011-10-23T01:42:30"},{"date":"2012-05-01T02:22:52","version":"0.10"},{"version":"0.11","date":"2012-07-15T03:32:57"},{"version":"0.12","date":"2012-07-27T02:42:45"},{"version":"0.13","date":"2012-08-07T01:48:25"},{"date":"2012-08-10T03:10:13","version":"0.14"},{"version":"0.15","date":"2012-08-21T02:34:37"},{"version":"0.16","date":"2012-08-21T17:47:00"},{"date":"2012-09-04T01:54:00","version":"0.17"},{"date":"2012-09-12T03:42:03","version":"0.18"},{"version":"0.19","date":"2012-09-13T14:06:58"},{"version":"0.20","date":"2012-09-20T02:21:37"},{"date":"2012-10-15T04:32:38","version":"0.21"},{"version":"0.22","date":"2012-11-08T03:20:16"},{"version":"0.23","date":"2012-11-21T19:01:22"},{"version":"0.24","date":"2012-11-26T19:37:12"},{"version":"0.25","date":"2012-12-18T19:11:36"},{"version":"0.26","date":"2013-01-04T19:08:19"},{"date":"2013-06-14T02:28:09","version":"0.27"},{"version":"0.28","date":"2014-03-02T22:22:17"},{"date":"2014-04-23T18:20:52","version":"0.299_01"},{"date":"2014-04-24T02:56:24","version":"0.299_02"},{"date":"2014-06-05T07:29:19","version":"0.299_03"},{"version":"0.300","date":"2014-06-08T04:57:40"},{"version":"0.301","date":"2015-08-14T20:04:12"}]},"LWP-Protocol-https":{"versions":[{"date":"2011-03-27T11:59:53","version":"6.02"},{"date":"2012-02-18T23:01:32","version":"6.03"},{"date":"2013-04-29T21:26:33","version":"6.04"},{"version":"6.06","date":"2014-04-18T17:03:15"},{"version":"6.07","date":"2017-02-20T02:46:43"},{"version":"6.08","date":"2020-03-23T20:20:33"},{"date":"2020-07-16T13:33:20","version":"6.09"},{"version":"6.10","date":"2020-12-17T15:44:24"},{"version":"6.11","date":"2023-07-09T15:11:15"},{"version":"6.12","date":"2024-01-22T17:51:48"},{"version":"6.13","date":"2024-02-06T01:01:15"},{"date":"2024-03-11T01:09:49","version":"6.14"}],"main_module":"LWP::Protocol::https","advisories":[{"affected_versions":[">=6.04,<=6.06"],"reported":"2020-01-28","distribution":"LWP-Protocol-https","cves":["CVE-2014-3230"],"fixed_versions":[],"id":"CPANSA-LWP-Protocol-https-2014-3230","severity":"medium","references":["http://www.openwall.com/lists/oss-security/2014/05/04/1","http://www.openwall.com/lists/oss-security/2014/05/02/8","http://www.openwall.com/lists/oss-security/2014/05/06/8","https://github.com/libwww-perl/lwp-protocol-https/pull/14","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746579"],"description":"The libwww-perl LWP::Protocol::https module 6.04 through 6.06 for Perl, when using IO::Socket::SSL as the SSL socket class, allows attackers to disable server certificate validation via the (1) HTTPS_CA_DIR or (2) HTTPS_CA_FILE environment variable.\n"}]},"ActivePerl":{"versions":[],"main_module":"","advisories":[{"affected_versions":["=5.16.1.1601"],"reported":"2012-10-11","distribution":"ActivePerl","cves":["CVE-2012-5377"],"darkpan":"true","fixed_versions":[],"severity":null,"id":"CPANSA-ActivePerl-2012-5377","references":["https://www.htbridge.com/advisory/HTB23108","http://osvdb.org/86177"],"description":"Untrusted search path vulnerability in the installation functionality in ActivePerl 5.16.1.1601, when installed in the top-level C:\\ directory, allows local users to gain privileges via a Trojan horse DLL in the C:\\Perl\\Site\\bin directory, which is added to the PATH system environment variable, as demonstrated by a Trojan horse wlbsctrl.dll file used by the \"IKE and AuthIP IPsec Keying Modules\" system service in Windows Vista SP1, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 Release Preview.\n"},{"references":["http://secunia.com/advisories/20328","http://www.securityfocus.com/bid/18269","http://www.osvdb.org/25974","http://www.vupen.com/english/advisories/2006/2140","https://exchange.xforce.ibmcloud.com/vulnerabilities/26915"],"description":"ActiveState ActivePerl 5.8.8.817 for Windows configures the site/lib directory with \"Users\" group permissions for changing files, which allows local users to gain privileges by creating a malicious sitecustomize.pl file in that directory. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.\n","fixed_versions":[],"id":"CPANSA-ActivePerl-2006-2856","severity":null,"cves":["CVE-2006-2856"],"darkpan":"true","affected_versions":["=5.8.8.817"],"reported":"2006-06-06","distribution":"ActivePerl"},{"references":["http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0878.html","http://www.securityfocus.com/bid/10380","https://exchange.xforce.ibmcloud.com/vulnerabilities/16224"],"description":"Integer overflow in the duplication operator in ActivePerl allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large multiplier, which may trigger a buffer overflow.\n","severity":null,"id":"CPANSA-ActivePerl-2004-2286","fixed_versions":[],"darkpan":"true","cves":["CVE-2004-2286"],"reported":"2004-12-31","distribution":"ActivePerl","affected_versions":["<=5.8.1"]},{"distribution":"ActivePerl","reported":"2004-12-31","affected_versions":["<5.10"],"darkpan":"true","cves":["CVE-2004-2022"],"id":"CPANSA-ActivePerl-2004-2022","severity":null,"fixed_versions":[],"description":"ActivePerl 5.8.x and others, and Larry Wall's Perl 5.6.1 and others, when running on Windows systems, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the system command, which leads to a stack-based buffer overflow. NOTE: it is unclear whether this bug is in Perl or the OS API that is used by Perl.\n","references":["http://www.oliverkarow.de/research/ActivePerlSystemBOF.txt","http://www.perlmonks.org/index.pl?node_id=354145","http://www.securityfocus.com/bid/10375","http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0905.html","http://marc.info/?l=full-disclosure&m=108489112131099&w=2","http://marc.info/?l=full-disclosure&m=108482796105922&w=2","http://marc.info/?l=full-disclosure&m=108483058514596&w=2","http://marc.info/?l=bugtraq&m=108489894009025&w=2","https://exchange.xforce.ibmcloud.com/vulnerabilities/16169"]},{"darkpan":"true","cves":["CVE-2004-0377"],"reported":"2004-05-04","distribution":"ActivePerl","affected_versions":[],"references":["http://www.kb.cert.org/vuls/id/722414","http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/019794.html","http://public.activestate.com/cgi-bin/perlbrowse?patch=22552","http://www.idefense.com/application/poi/display?id=93&type=vulnerabilities","http://marc.info/?l=bugtraq&m=108118694327979&w=2","https://exchange.xforce.ibmcloud.com/vulnerabilities/15732"],"description":"Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character.\n","severity":null,"id":"CPANSA-ActivePerl-2004-0377","fixed_versions":[]},{"affected_versions":["<=5.6.1.629"],"reported":"2001-12-06","distribution":"ActivePerl","cves":["CVE-2001-0815"],"darkpan":"true","fixed_versions":[],"severity":null,"id":"CPANSA-ActivePerl-2001-0815","description":"Buffer overflow in PerlIS.dll in Activestate ActivePerl 5.6.1.629 and earlier allows remote attackers to execute arbitrary code via an HTTP request for a long filename that ends in a .pl extension.\n","references":["http://bugs.activestate.com/show_bug.cgi?id=18062","http://www.securityfocus.com/bid/3526","http://www.osvdb.org/678","http://marc.info/?l=bugtraq&m=100583978302585&w=2","https://exchange.xforce.ibmcloud.com/vulnerabilities/7539"]}]},"Module-Signature":{"versions":[{"version":"0.02","date":"2002-08-13T14:04:00"},{"date":"2002-08-13T15:48:18","version":"0.03"},{"date":"2002-08-14T08:03:45","version":"0.04"},{"version":"0.05","date":"2002-08-14T09:28:41"},{"version":"0.06","date":"2002-10-10T15:22:33"},{"date":"2002-10-11T04:16:01","version":"0.07"},{"version":"0.08","date":"2002-10-11T19:32:19"},{"date":"2002-10-12T10:33:29","version":"0.09"},{"version":"0.10","date":"2002-10-12T11:10:21"},{"date":"2002-10-12T19:23:48","version":"0.11"},{"date":"2002-10-12T22:55:54","version":"0.12"},{"version":"0.13","date":"2002-10-13T05:22:45"},{"version":"0.14","date":"2002-10-17T06:14:07"},{"date":"2002-10-17T22:01:57","version":"0.15"},{"version":"0.16","date":"2002-10-28T23:37:00"},{"version":"0.17","date":"2002-10-30T07:05:06"},{"date":"2002-11-04T15:08:41","version":"0.18"},{"version":"0.19","date":"2002-11-04T15:13:45"},{"date":"2002-11-04T15:24:41","version":"0.20"},{"date":"2002-11-22T10:28:48","version":"0.21"},{"date":"2003-05-15T18:44:28","version":"0.23"},{"date":"2003-07-08T02:49:57","version":"0.24"},{"date":"2003-07-16T06:31:58","version":"0.25"},{"version":"0.26","date":"2003-07-17T14:03:19"},{"version":"0.27","date":"2003-07-28T14:31:54"},{"version":"0.28","date":"2003-07-29T15:30:55"},{"version":"0.29","date":"2003-08-08T02:54:01"},{"version":"0.30","date":"2003-08-10T13:35:38"},{"version":"0.31","date":"2003-08-10T17:17:19"},{"version":"0.32","date":"2003-08-11T09:15:13"},{"version":"0.33","date":"2003-08-12T04:11:59"},{"version":"0.34","date":"2003-08-18T15:32:45"},{"version":"0.35","date":"2003-08-27T07:08:31"},{"version":"0.36","date":"2003-10-28T04:22:56"},{"version":"0.37","date":"2003-11-06T10:55:07"},{"date":"2004-01-01T10:14:15","version":"0.38"},{"date":"2004-06-17T15:17:14","version":"0.39"},{"version":"0.40","date":"2004-07-01T12:18:17"},{"date":"2004-07-04T08:19:11","version":"0.41"},{"version":"0.42","date":"2004-11-20T06:19:22"},{"version":"0.43","date":"2004-12-16T06:45:55"},{"date":"2004-12-16T07:17:30","version":"0.44"},{"date":"2005-08-09T04:23:46","version":"0.45"},{"date":"2005-08-21T08:16:22","version":"0.50"},{"date":"2006-01-01T18:41:57","version":"0.51"},{"version":"0.52","date":"2006-01-18T16:32:37"},{"version":"0.53","date":"2006-01-31T05:02:24"},{"version":"0.54","date":"2006-05-11T17:12:46"},{"version":"0.55","date":"2006-07-30T01:15:07"},{"version":"0.60","date":"2009-11-16T14:59:35"},{"date":"2009-11-18T16:58:07","version":"0.61"},{"version":"0.62","date":"2010-03-23T21:21:37"},{"version":"0.62","date":"2010-03-28T02:49:21"},{"version":"0.62","date":"2010-05-08T22:55:43"},{"date":"2010-09-03T19:55:36","version":"0.65"},{"version":"0.66","date":"2010-09-06T20:58:24"},{"version":"0.67","date":"2011-04-17T15:09:22"},{"version":"0.68","date":"2011-05-13T09:55:20"},{"version":"0.69","date":"2012-11-02T15:20:28"},{"date":"2012-11-28T17:49:21","version":"0.70"},{"date":"2013-06-04T10:29:18","version":"0.71"},{"version":"0.72","date":"2013-06-05T15:21:34"},{"date":"2013-06-05T20:57:10","version":"0.73"},{"date":"2015-04-06T18:39:32","version":"0.74"},{"version":"0.75","date":"2015-04-06T20:58:34"},{"version":"0.76","date":"2015-04-08T10:13:11"},{"version":"0.77","date":"2015-04-08T11:47:26"},{"version":"0.78","date":"2015-04-09T09:00:30"},{"version":"0.79","date":"2015-05-18T15:18:02"},{"date":"2016-06-07T06:36:30","version":"0.80"},{"version":"0.81","date":"2016-09-05T06:41:06"},{"version":"0.81","date":"2018-08-26T15:19:13"},{"version":"0.83","date":"2018-08-29T08:35:25"},{"date":"2020-06-25T13:01:10","version":"0.84"},{"version":"0.86","date":"2020-06-25T13:10:23"},{"date":"2020-07-04T07:16:32","version":"0.87"},{"version":"0.87","date":"2021-12-18T03:39:32"},{"date":"2024-09-14T13:57:16","version":"0.89"},{"version":"0.89","date":"2024-09-15T22:11:10"}],"advisories":[{"distribution":"Module-Signature","reported":"2013-08-19","affected_versions":["<0.72"],"cves":["CVE-2013-2145"],"id":"CPANSA-Module-Signature-2013-01","fixed_versions":[">=0.72"],"description":"The cpansign verify functionality in the Module::Signature module before 0.72 for Perl allows attackers to bypass the signature check and execute arbitrary code via a SIGNATURE file with a \"special unknown cipher\" that references an untrusted module in Digest/.\n","references":["https://metacpan.org/changes/distribution/Module-Signature"]}],"main_module":"Module::Signature"},"perl":{"versions":[{"date":"1996-02-03T07:48:14","version":"5.002"},{"date":"1996-08-08T23:13:50","version":"5.003_02"},{"date":"1996-08-10T19:07:27","version":"5.003_02"},{"version":"5.003_03","date":"1996-08-28T16:43:47"},{"date":"1996-09-02T23:25:30","version":"5.003_04"},{"date":"1996-09-12T20:10:42","version":"5.003_05"},{"date":"1996-10-08T21:59:27","version":"5.003_06"},{"date":"1996-10-11T03:39:44","version":"5.003_07"},{"version":"5.003_08","date":"1996-11-19T07:27:23"},{"date":"1996-11-26T09:46:17","version":"5.003_09"},{"version":"5.003_10","date":"1996-11-30T01:22:23"},{"version":"5.003_11","date":"1996-12-06T09:08:18"},{"date":"1996-12-19T04:59:47","version":"5.003_12"},{"date":"1996-12-20T02:59:16","version":"5.003_13"},{"date":"1996-12-23T22:09:26","version":"5.003_15"},{"date":"1996-12-24T23:22:02","version":"5.003_16"},{"date":"1996-12-27T20:20:05","version":"5.003_17"},{"version":"5.003_18","date":"1996-12-31T21:35:40"},{"version":"5.003_19","date":"1997-01-04T06:02:28"},{"date":"1997-01-08T02:15:49","version":"5.003_20"},{"date":"1997-01-15T23:12:15","version":"5.003_21"},{"version":"5.003_22","date":"1997-01-16T20:04:16"},{"version":"5.003_23","date":"1997-01-25T10:04:29"},{"version":"5.003_24","date":"1997-01-29T06:05:11"},{"version":"5.003_25","date":"1997-02-04T05:41:02"},{"date":"1997-02-10T19:37:44","version":"5.003_26"},{"version":"5.003_27","date":"1997-02-18T01:13:23"},{"date":"1997-02-21T17:17:57","version":"5.003_28"},{"version":"5.003_90","date":"1997-02-25T03:29:59"},{"date":"1997-03-01T08:08:54","version":"5.003_91"},{"date":"1997-03-06T18:24:17","version":"5.003_92"},{"version":"5.003_93","date":"1997-03-10T12:06:55"},{"version":"5.003_94","date":"1997-03-22T05:43:00"},{"date":"1997-03-25T19:52:24","version":"5.003_95"},{"version":"5.003_96","date":"1997-04-01T00:50:13"},{"date":"1997-04-03T00:50:37","version":"5.003_97"},{"version":"5.003_97","date":"1997-04-24T00:56:53"},{"date":"1997-04-25T03:44:34","version":"5.003_97"},{"date":"1997-04-28T20:33:01","version":"5.003_97"},{"date":"1997-04-30T15:40:09","version":"5.003_98"},{"version":"5.003_99","date":"1997-05-01T18:40:08"},{"version":"5.003_99","date":"1997-05-09T05:37:58"},{"version":"5.004","date":"1997-05-15T22:54:01"},{"version":"5.004_01","date":"1997-06-13T15:08:00"},{"version":"5.004_02","date":"1997-08-07T20:07:25"},{"version":"5.004_03","date":"1997-09-05T17:46:00"},{"date":"1997-09-05T18:13:00","version":"5.004"},{"version":"5.004","date":"1997-09-19T18:22:20"},{"date":"1997-09-23T06:21:18","version":"5.004"},{"date":"1997-10-02T16:49:00","version":"5.004_51"},{"version":"5.004","date":"1997-10-09T23:16:38"},{"date":"1997-10-14T19:19:40","version":"5.004"},{"version":"5.004_52","date":"1997-10-15T16:17:00"},{"version":"5.004_04","date":"1997-10-15T16:28:24"},{"version":"5.004_53","date":"1997-10-16T16:24:00"},{"version":"5.004_54","date":"1997-11-14T17:04:00"},{"date":"1997-11-25T17:17:00","version":"5.004_55"},{"date":"1997-12-18T16:20:00","version":"5.004_56"},{"date":"1998-02-03T15:06:00","version":"5.004_57"},{"date":"1998-02-06T17:25:00","version":"5.004_58"},{"date":"1998-02-13T16:42:00","version":"5.004_59"},{"date":"1998-02-20T17:42:00","version":"5.004_60"},{"date":"1998-02-27T17:55:00","version":"5.004_61"},{"date":"1998-03-04T19:46:42","version":"5.004"},{"version":"5.004_62","date":"1998-03-06T15:27:00"},{"date":"1998-03-17T15:29:00","version":"5.004_63"},{"version":"5.004_64","date":"1998-04-03T15:44:00"},{"version":"5.004_04","date":"1998-05-01T23:37:24"},{"version":"5.004_65","date":"1998-05-15T15:57:00"},{"date":"1998-05-15T23:46:53","version":"5.004_04"},{"version":"5.004_04","date":"1998-05-19T23:51:10"},{"version":"5.004_66","date":"1998-05-29T15:23:00"},{"version":"5.004_67","date":"1998-06-15T11:47:27"},{"version":"5.004_68","date":"1998-06-23T11:50:59"},{"date":"1998-06-29T09:42:04","version":"5.004_69"},{"date":"1998-07-06T08:22:24","version":"5.004_70"},{"date":"1998-07-09T13:47:36","version":"5.004_71"},{"date":"1998-07-12T13:32:41","version":"5.004_72"},{"version":"5.004_73","date":"1998-07-13T09:17:14"},{"version":"5.004_74","date":"1998-07-14T10:31:15"},{"date":"1998-07-15T11:29:51","version":"5.005"},{"version":"5.004_05","date":"1998-07-21T05:16:24"},{"version":"5.005","date":"1998-07-21T11:36:27"},{"version":"5.005","date":"1998-07-23T00:55:19"},{"version":"5.005_50","date":"1998-07-26T06:20:30"},{"date":"1998-07-27T00:16:22","version":"5.005_01"},{"date":"1998-08-02T10:32:29","version":"5.005_02"},{"date":"1998-08-05T10:49:59","version":"5.005_02"},{"version":"5.005_02","date":"1998-08-08T05:46:05"},{"version":"5.005_51","date":"1998-08-10T08:33:23"},{"version":"5.005_52","date":"1998-09-25T11:59:38"},{"version":"5.004_05","date":"1998-10-09T17:05:49"},{"date":"1998-10-31T12:32:20","version":"5.005_53"},{"version":"5.004_05","date":"1998-11-22T23:06:16"},{"date":"1998-11-30T03:26:39","version":"5.005_03"},{"date":"1998-11-30T04:29:11","version":"5.005_54"},{"date":"1998-12-03T17:22:19","version":"5.004_05"},{"version":"5.005_03","date":"1999-01-03T20:44:49"},{"version":"5.005_03","date":"1999-01-17T18:28:14"},{"date":"1999-01-26T04:39:36","version":"5.005_03"},{"date":"1999-01-29T05:03:44","version":"5.005_03"},{"version":"5.005_55","date":"1999-02-16T07:11:42"},{"date":"1999-03-01T05:38:00","version":"5.005_56"},{"date":"1999-03-05T02:22:53","version":"5.005_03"},{"date":"1999-03-29T00:50:43","version":"5.005_03"},{"version":"5.004_05","date":"1999-04-27T00:23:40"},{"version":"5.004_05","date":"1999-04-29T20:04:24"},{"date":"1999-05-25T10:36:40","version":"5.005_57"},{"date":"1999-07-27T11:00:38","version":"5.005_58"},{"version":"5.005_59","date":"1999-08-02T08:52:25"},{"version":"5.005_60","date":"1999-08-02T21:13:44"},{"version":"5.005_61","date":"1999-08-22T20:40:16"},{"date":"1999-10-15T10:36:17","version":"5.005_62"},{"date":"1999-12-09T11:38:49","version":"5.005_63"},{"version":"v5.5.640","date":"2000-02-02T13:06:00"},{"date":"2000-02-08T08:37:47","version":"v5.5.650"},{"version":"v5.5.660","date":"2000-02-22T11:41:34"},{"date":"2000-03-01T07:34:59","version":"v5.5.670"},{"version":"v5.6.0","date":"2000-03-23T06:06:13"},{"date":"2000-09-02T18:07:32","version":"v5.7.0"},{"date":"2000-12-18T10:12:29","version":"v5.6.1"},{"version":"v5.6.1","date":"2001-01-31T16:18:51"},{"version":"v5.6.1","date":"2001-03-19T09:36:57"},{"version":"v5.6.1","date":"2001-04-09T04:47:17"},{"version":"v5.7.1","date":"2001-04-10T02:54:00"},{"version":"v5.7.2","date":"2001-07-13T14:50:55"},{"version":"v5.7.3","date":"2002-03-05T05:00:31"},{"date":"2002-06-01T19:09:00","version":"v5.8.0"},{"version":"v5.8.0","date":"2002-06-21T14:56:35"},{"date":"2002-07-14T00:26:18","version":"v5.8.0"},{"date":"2002-07-18T23:32:56","version":"v5.8.0"},{"version":"v5.8.1","date":"2003-07-10T06:52:39"},{"date":"2003-07-11T12:23:20","version":"v5.8.1"},{"version":"v5.8.1","date":"2003-07-30T20:28:59"},{"version":"v5.8.1","date":"2003-08-01T15:49:36"},{"version":"v5.8.1","date":"2003-09-22T09:14:19"},{"version":"v5.8.1","date":"2003-09-25T11:49:06"},{"version":"5.009","date":"2003-10-27T02:59:51"},{"version":"5.008001","date":"2003-10-27T23:40:16"},{"date":"2003-11-03T09:03:41","version":"5.008001"},{"date":"2003-11-05T23:34:05","version":"5.008001"},{"date":"2003-11-08T15:53:25","version":"v5.6.2"},{"version":"v5.6.2","date":"2003-11-15T12:53:43"},{"date":"2003-12-05T16:42:45","version":"5.005_03"},{"version":"5.008001","date":"2004-01-07T14:40:01"},{"date":"2004-01-14T19:03:21","version":"5.008003"},{"version":"5.005_03","date":"2004-01-20T21:48:04"},{"date":"2004-01-27T21:18:43","version":"5.005_03"},{"version":"5.005_04","date":"2004-02-04T22:55:06"},{"date":"2004-02-18T14:20:15","version":"5.005"},{"date":"2004-02-23T14:02:10","version":"5.005"},{"version":"5.009001","date":"2004-03-16T19:35:25"},{"date":"2004-04-05T21:27:48","version":"5.008003"},{"version":"5.008003","date":"2004-04-15T22:59:51"},{"version":"5.008003","date":"2004-04-21T23:03:10"},{"version":"5.008005","date":"2004-07-06T21:41:21"},{"version":"5.008005","date":"2004-07-08T21:55:05"},{"version":"5.008005","date":"2004-07-19T21:56:20"},{"version":"5.008006","date":"2004-11-11T19:56:33"},{"date":"2004-11-27T23:56:17","version":"5.008006"},{"date":"2005-04-01T09:53:24","version":"5.009002"},{"version":"5.008007","date":"2005-05-18T16:35:37"},{"date":"2005-05-30T22:19:23","version":"5.008007"},{"date":"2006-01-20T10:09:18","version":"5.008008"},{"date":"2006-01-28T11:11:38","version":"5.009003"},{"version":"5.008008","date":"2006-02-01T00:00:59"},{"version":"5.009004","date":"2006-08-15T13:48:30"},{"version":"5.009005","date":"2007-07-07T16:13:57"},{"version":"5.009005","date":"2007-11-17T15:31:20"},{"version":"5.010000","date":"2007-11-25T18:22:18"},{"version":"5.010000","date":"2007-12-18T17:41:41"},{"version":"5.008009","date":"2008-11-10T23:14:59"},{"date":"2008-12-06T22:50:35","version":"5.008009"},{"version":"5.008009","date":"2008-12-14T23:08:28"},{"version":"5.010001","date":"2009-08-06T16:11:03"},{"date":"2009-08-18T23:45:03","version":"5.010001"},{"version":"5.010001","date":"2009-08-23T14:21:38"},{"version":"5.011000","date":"2009-10-02T20:51:46"},{"date":"2009-10-20T17:51:38","version":"5.011001"},{"version":"5.011002","date":"2009-11-20T07:20:52"},{"version":"5.011003","date":"2009-12-21T04:49:14"},{"date":"2010-01-20T16:48:28","version":"5.011004"},{"version":"5.011005","date":"2010-02-21T00:45:26"},{"version":"5.012000","date":"2010-03-21T20:41:11"},{"version":"5.012000","date":"2010-03-29T18:29:49"},{"date":"2010-04-01T02:38:12","version":"5.012000"},{"version":"5.012000","date":"2010-04-03T02:40:48"},{"version":"5.012000","date":"2010-04-07T05:39:46"},{"version":"5.012000","date":"2010-04-10T03:46:04"},{"version":"5.012000","date":"2010-04-12T22:38:37"},{"version":"5.013000","date":"2010-04-20T20:06:02"},{"version":"5.012001","date":"2010-05-10T02:43:48"},{"date":"2010-05-13T22:31:41","version":"5.012001"},{"version":"5.012001","date":"2010-05-16T22:40:16"},{"version":"5.013001","date":"2010-05-20T14:03:45"},{"date":"2010-06-22T21:39:26","version":"5.013002"},{"date":"2010-07-20T10:23:23","version":"5.013003"},{"version":"5.013004","date":"2010-08-20T15:39:07"},{"date":"2010-08-31T16:48:01","version":"5.012002"},{"date":"2010-09-07T01:41:31","version":"5.012002"},{"date":"2010-09-19T21:22:47","version":"5.013005"},{"date":"2010-10-21T01:41:01","version":"5.013006"},{"version":"5.013007","date":"2010-11-21T01:14:06"},{"date":"2010-12-19T23:06:25","version":"5.013008"},{"version":"5.012003","date":"2011-01-10T02:12:53"},{"date":"2011-01-15T04:05:30","version":"5.012003"},{"version":"5.012003","date":"2011-01-18T02:13:17"},{"version":"5.013009","date":"2011-01-21T01:42:07"},{"date":"2011-01-22T03:35:35","version":"5.012003"},{"version":"5.013010","date":"2011-02-20T19:18:02"},{"version":"5.013011","date":"2011-03-20T19:49:16"},{"version":"5.014000","date":"2011-04-20T11:53:32"},{"date":"2011-05-04T16:42:27","version":"5.014000"},{"version":"5.014000","date":"2011-05-11T15:49:42"},{"version":"5.014000","date":"2011-05-14T20:34:05"},{"date":"2011-06-08T13:19:36","version":"5.012004"},{"version":"5.014001","date":"2011-06-09T23:48:04"},{"date":"2011-06-15T17:00:36","version":"5.012004"},{"date":"2011-06-17T02:42:01","version":"5.014001"},{"date":"2011-06-20T10:41:26","version":"5.012004"},{"date":"2011-06-20T23:19:05","version":"5.015000"},{"version":"5.015001","date":"2011-07-20T21:15:08"},{"date":"2011-08-21T00:05:23","version":"5.015002"},{"date":"2011-09-19T11:25:31","version":"5.014002"},{"version":"5.015003","date":"2011-09-21T03:05:05"},{"version":"5.014002","date":"2011-09-26T14:56:49"},{"version":"5.015004","date":"2011-10-20T21:17:45"},{"date":"2011-11-20T20:40:34","version":"5.015005"},{"date":"2011-12-20T17:55:58","version":"5.015006"},{"date":"2012-01-20T20:08:28","version":"5.015007"},{"date":"2012-02-20T22:38:13","version":"5.015008"},{"version":"5.015009","date":"2012-03-20T19:01:29"},{"version":"5.016000","date":"2012-05-11T03:41:02"},{"version":"5.016000","date":"2012-05-15T02:51:48"},{"version":"5.016000","date":"2012-05-16T03:22:59"},{"version":"5.016000","date":"2012-05-20T22:51:12"},{"version":"5.017000","date":"2012-05-26T16:24:02"},{"date":"2012-06-20T17:38:46","version":"5.017001"},{"version":"5.017002","date":"2012-07-20T14:27:59"},{"version":"5.016001","date":"2012-08-03T18:59:23"},{"version":"5.016001","date":"2012-08-08T22:30:11"},{"date":"2012-08-20T14:12:28","version":"5.017003"},{"date":"2012-09-20T00:40:48","version":"5.017004"},{"version":"5.014003","date":"2012-09-26T22:15:57"},{"date":"2012-10-10T19:46:29","version":"5.014003"},{"date":"2012-10-12T20:24:43","version":"5.014003"},{"version":"5.017005","date":"2012-10-20T16:31:11"},{"date":"2012-10-27T01:23:09","version":"5.016002"},{"version":"5.016002","date":"2012-11-01T13:44:07"},{"date":"2012-11-03T17:27:59","version":"5.012005"},{"version":"5.012005","date":"2012-11-08T21:12:17"},{"date":"2012-11-10T14:02:17","version":"5.012005"},{"date":"2012-11-21T00:08:12","version":"5.017006"},{"date":"2012-12-18T21:50:28","version":"5.017007"},{"version":"5.017008","date":"2013-01-20T18:48:45"},{"date":"2013-02-20T22:21:02","version":"5.017009"},{"version":"5.014004","date":"2013-03-05T17:03:49"},{"version":"5.016003","date":"2013-03-07T16:03:14"},{"date":"2013-03-07T19:52:52","version":"5.014004"},{"date":"2013-03-10T23:47:40","version":"5.014004"},{"version":"5.016003","date":"2013-03-11T21:08:33"},{"date":"2013-03-21T23:11:03","version":"5.017010"},{"version":"5.017011","date":"2013-04-21T00:52:16"},{"version":"5.018000","date":"2013-05-11T12:29:53"},{"date":"2013-05-12T23:14:51","version":"5.018000"},{"date":"2013-05-14T01:32:05","version":"5.018000"},{"version":"5.018000","date":"2013-05-16T02:53:44"},{"date":"2013-05-18T13:33:49","version":"5.018000"},{"date":"2013-05-20T13:12:38","version":"5.019000"},{"date":"2013-06-21T01:24:18","version":"5.019001"},{"version":"5.019002","date":"2013-07-22T05:59:35"},{"date":"2013-08-02T03:09:02","version":"5.018001"},{"version":"5.018001","date":"2013-08-04T12:34:33"},{"version":"5.018001","date":"2013-08-09T02:28:00"},{"date":"2013-08-12T14:31:08","version":"5.018001"},{"date":"2013-08-20T16:09:42","version":"5.019003"},{"date":"2013-09-20T15:58:20","version":"5.019004"},{"version":"5.019005","date":"2013-10-20T13:25:55"},{"date":"2013-11-20T20:37:20","version":"5.019006"},{"version":"5.018002","date":"2013-12-02T22:36:49"},{"date":"2013-12-07T13:55:43","version":"5.018002"},{"date":"2013-12-19T21:27:42","version":"5.018002"},{"version":"5.019007","date":"2013-12-20T20:55:37"},{"version":"5.018002","date":"2013-12-22T03:30:43"},{"version":"5.018002","date":"2014-01-07T01:52:57"},{"version":"5.019008","date":"2014-01-20T21:59:04"},{"date":"2014-02-20T04:24:45","version":"5.019009"},{"date":"2014-03-20T20:40:26","version":"5.019010"},{"version":"5.019011","date":"2014-04-20T15:47:12"},{"date":"2014-05-17T00:16:49","version":"5.020000"},{"version":"5.020000","date":"2014-05-27T01:35:13"},{"version":"5.021000","date":"2014-05-27T14:32:18"},{"date":"2014-06-20T15:31:10","version":"5.021001"},{"version":"5.021002","date":"2014-07-20T13:48:02"},{"version":"5.021003","date":"2014-08-21T02:26:13"},{"date":"2014-08-25T18:10:32","version":"5.020001"},{"version":"5.020001","date":"2014-09-07T17:01:11"},{"version":"5.020001","date":"2014-09-14T13:11:14"},{"version":"5.018003","date":"2014-09-17T20:29:53"},{"version":"5.021004","date":"2014-09-20T13:33:14"},{"version":"5.018003","date":"2014-09-27T12:54:08"},{"date":"2014-10-01T13:22:50","version":"5.018003"},{"date":"2014-10-02T00:48:31","version":"5.018004"},{"version":"5.021005","date":"2014-10-20T16:54:20"},{"date":"2014-11-20T23:39:06","version":"5.021006"},{"version":"5.021007","date":"2014-12-20T17:34:57"},{"date":"2015-01-20T20:20:05","version":"5.021008"},{"version":"5.020002","date":"2015-02-01T03:07:56"},{"date":"2015-02-14T18:26:43","version":"5.020002"},{"version":"5.021009","date":"2015-02-21T05:27:09"},{"version":"5.021010","date":"2015-03-20T18:30:20"},{"version":"5.021011","date":"2015-04-20T21:28:37"},{"version":"5.022000","date":"2015-05-19T14:12:19"},{"date":"2015-05-21T23:03:22","version":"5.022000"},{"date":"2015-06-01T17:51:59","version":"5.022000"},{"date":"2015-06-20T20:22:32","version":"5.023000"},{"date":"2015-07-20T19:26:31","version":"5.023001"},{"date":"2015-08-20T15:36:45","version":"5.023002"},{"date":"2015-08-22T22:12:34","version":"5.020003"},{"date":"2015-08-29T22:02:43","version":"5.020003"},{"version":"5.020003","date":"2015-09-12T19:09:14"},{"date":"2015-09-21T02:47:16","version":"5.023003"},{"date":"2015-10-20T22:17:48","version":"5.023004"},{"version":"5.022001","date":"2015-10-31T18:42:58"},{"date":"2015-11-15T15:15:03","version":"5.022001"},{"version":"5.023005","date":"2015-11-20T17:09:38"},{"date":"2015-12-02T22:07:35","version":"5.022001"},{"date":"2015-12-08T21:34:05","version":"5.022001"},{"date":"2015-12-13T19:48:31","version":"5.022001"},{"date":"2015-12-21T22:40:27","version":"5.023006"},{"date":"2016-01-20T21:52:22","version":"5.023007"},{"version":"5.023008","date":"2016-02-20T21:56:31"},{"version":"5.023009","date":"2016-03-20T16:45:40"},{"date":"2016-04-10T17:29:04","version":"5.022002"},{"version":"5.024000","date":"2016-04-14T03:27:48"},{"date":"2016-04-23T20:56:14","version":"5.024000"},{"date":"2016-04-27T01:02:55","version":"5.024000"},{"version":"5.022002","date":"2016-04-29T21:39:25"},{"date":"2016-05-02T14:41:03","version":"5.024000"},{"date":"2016-05-04T22:27:57","version":"5.024000"},{"date":"2016-05-09T11:35:29","version":"5.024000"},{"version":"5.025000","date":"2016-05-09T12:02:53"},{"date":"2016-05-20T21:33:43","version":"5.025001"},{"date":"2016-06-20T21:02:44","version":"5.025002"},{"version":"5.022003","date":"2016-07-17T22:27:32"},{"version":"5.024001","date":"2016-07-17T22:29:08"},{"version":"5.025003","date":"2016-07-20T16:22:41"},{"date":"2016-07-25T12:58:33","version":"5.022003"},{"date":"2016-07-25T13:01:21","version":"5.024001"},{"date":"2016-08-11T23:47:40","version":"5.022003"},{"date":"2016-08-11T23:50:29","version":"5.024001"},{"date":"2016-08-20T20:25:19","version":"5.025004"},{"date":"2016-09-20T17:45:06","version":"5.025005"},{"date":"2016-10-12T21:39:57","version":"5.022003"},{"version":"5.024001","date":"2016-10-12T21:40:57"},{"version":"5.025006","date":"2016-10-20T15:44:55"},{"date":"2016-11-20T21:20:07","version":"5.025007"},{"version":"5.025008","date":"2016-12-20T19:14:33"},{"date":"2017-01-02T18:54:51","version":"5.022003"},{"version":"5.024001","date":"2017-01-02T18:57:38"},{"date":"2017-01-14T20:04:05","version":"5.022003"},{"date":"2017-01-14T20:04:30","version":"5.024001"},{"date":"2017-01-20T15:25:43","version":"5.025009"},{"date":"2017-02-20T21:21:01","version":"5.025010"},{"date":"2017-03-20T20:56:49","version":"5.025011"},{"version":"5.025012","date":"2017-04-20T19:32:05"},{"date":"2017-05-11T17:07:17","version":"5.026000"},{"date":"2017-05-23T23:19:34","version":"5.026000"},{"date":"2017-05-30T19:42:51","version":"5.026000"},{"date":"2017-05-31T21:11:57","version":"5.027000"},{"version":"5.027001","date":"2017-06-20T06:39:54"},{"date":"2017-07-01T21:50:24","version":"5.022004"},{"date":"2017-07-01T21:50:55","version":"5.024002"},{"date":"2017-07-15T17:26:52","version":"5.022004"},{"date":"2017-07-15T17:29:00","version":"5.024002"},{"version":"5.027002","date":"2017-07-20T19:28:36"},{"date":"2017-08-21T20:43:51","version":"5.027003"},{"date":"2017-09-10T15:37:08","version":"5.024003"},{"version":"5.026001","date":"2017-09-10T15:38:22"},{"date":"2017-09-20T21:44:22","version":"5.027004"},{"version":"5.024003","date":"2017-09-22T21:29:50"},{"date":"2017-09-22T21:30:56","version":"5.026001"},{"date":"2017-10-20T22:08:15","version":"5.027005"},{"version":"5.027006","date":"2017-11-20T22:39:31"},{"version":"5.027007","date":"2017-12-20T22:58:25"},{"date":"2018-01-20T03:17:50","version":"5.027008"},{"date":"2018-02-20T20:46:45","version":"5.027009"},{"date":"2018-03-20T21:08:53","version":"5.027010"},{"date":"2018-03-24T19:33:50","version":"5.024004"},{"date":"2018-03-24T19:37:40","version":"5.026002"},{"version":"5.024004","date":"2018-04-14T11:25:22"},{"date":"2018-04-14T11:27:18","version":"5.026002"},{"date":"2018-04-20T15:10:52","version":"5.027011"},{"version":"5.028000","date":"2018-05-21T13:12:00"},{"date":"2018-06-06T12:34:00","version":"5.028000"},{"date":"2018-06-18T22:47:34","version":"5.028000"},{"version":"5.028000","date":"2018-06-19T20:45:05"},{"version":"5.028000","date":"2018-06-23T02:05:28"},{"version":"5.029000","date":"2018-06-26T21:25:53"},{"date":"2018-07-20T15:13:07","version":"5.029001"},{"version":"5.029002","date":"2018-08-20T21:04:27"},{"date":"2018-09-21T02:58:51","version":"5.029003"},{"date":"2018-10-20T14:20:56","version":"5.029004"},{"date":"2018-11-20T22:03:07","version":"5.029005"},{"date":"2018-11-29T19:03:17","version":"5.026003"},{"version":"5.028001","date":"2018-11-29T19:03:28"},{"date":"2018-11-30T22:02:29","version":"5.026003"},{"version":"5.028001","date":"2018-11-30T22:03:06"},{"version":"5.029006","date":"2018-12-18T12:26:18"},{"date":"2019-01-20T02:16:52","version":"5.029007"},{"version":"5.029008","date":"2019-02-21T05:30:00"},{"version":"5.029009","date":"2019-03-21T11:49:45"},{"version":"5.028002","date":"2019-04-05T19:46:23"},{"version":"5.028002","date":"2019-04-19T15:07:44"},{"version":"5.029010","date":"2019-04-20T18:11:45"},{"date":"2019-05-11T22:58:31","version":"5.030000"},{"version":"5.030000","date":"2019-05-17T20:44:42"},{"date":"2019-05-22T09:35:50","version":"5.030000"},{"version":"5.031000","date":"2019-05-24T19:28:47"},{"date":"2019-06-20T20:19:01","version":"5.031001"},{"date":"2019-07-20T17:01:20","version":"5.031002"},{"date":"2019-08-20T14:02:01","version":"5.031003"},{"date":"2019-09-20T21:27:31","version":"5.031004"},{"version":"5.031005","date":"2019-10-20T14:29:11"},{"date":"2019-10-27T16:29:27","version":"5.030001"},{"version":"5.030001","date":"2019-11-10T14:14:00"},{"version":"5.031006","date":"2019-11-20T22:14:49"},{"version":"5.031007","date":"2019-12-21T03:38:57"},{"date":"2020-01-20T17:17:53","version":"5.031008"},{"date":"2020-02-20T23:03:22","version":"5.031009"},{"version":"5.030002","date":"2020-02-29T19:25:07"},{"version":"5.030002","date":"2020-03-14T17:04:56"},{"version":"5.031010","date":"2020-03-20T20:08:58"},{"version":"5.031011","date":"2020-04-28T19:49:59"},{"date":"2020-05-30T18:47:47","version":"5.032000"},{"version":"5.028003","date":"2020-06-01T19:17:48"},{"version":"5.028003","date":"2020-06-01T19:19:30"},{"date":"2020-06-01T19:19:54","version":"5.030003"},{"date":"2020-06-01T19:21:31","version":"5.030003"},{"version":"5.032000","date":"2020-06-07T21:13:05"},{"date":"2020-06-20T20:38:54","version":"5.032000"},{"date":"2020-07-17T19:38:54","version":"5.033000"},{"date":"2020-08-20T20:36:01","version":"5.033001"},{"version":"5.033002","date":"2020-09-20T16:29:59"},{"date":"2020-10-20T21:30:28","version":"5.033003"},{"date":"2020-11-20T13:32:10","version":"5.033004"},{"date":"2020-12-20T14:00:43","version":"5.033005"},{"date":"2021-01-09T16:48:26","version":"5.032001"},{"version":"5.033006","date":"2021-01-21T01:34:41"},{"date":"2021-01-23T14:56:24","version":"5.032001"},{"date":"2021-02-20T09:58:24","version":"5.033007"},{"date":"2021-03-21T00:55:24","version":"5.033008"},{"version":"5.033009","date":"2021-04-20T23:37:29"},{"date":"2021-05-04T23:24:07","version":"5.034000"},{"version":"5.034000","date":"2021-05-15T14:56:00"},{"date":"2021-05-20T20:07:59","version":"5.034000"},{"version":"5.035000","date":"2021-05-21T02:06:41"},{"version":"5.035001","date":"2021-06-20T12:39:44"},{"date":"2021-07-23T12:53:17","version":"5.035002"},{"date":"2021-08-21T03:17:40","version":"5.035003"},{"version":"5.035004","date":"2021-09-20T19:46:41"},{"date":"2021-10-21T19:32:21","version":"5.035005"},{"version":"5.035006","date":"2021-11-21T00:22:09"},{"date":"2021-12-20T23:35:42","version":"5.035007"},{"version":"5.035008","date":"2022-01-20T22:39:08"},{"date":"2022-02-20T12:32:59","version":"5.035009"},{"date":"2022-02-27T14:18:13","version":"5.034001"},{"version":"5.034001","date":"2022-03-06T17:23:15"},{"date":"2022-03-13T08:40:18","version":"5.034001"},{"date":"2022-03-20T18:33:42","version":"5.035010"},{"date":"2022-04-20T20:33:20","version":"5.035011"},{"version":"5.036000","date":"2022-05-21T00:12:21"},{"version":"5.036000","date":"2022-05-22T19:36:07"},{"version":"5.036000","date":"2022-05-28T00:26:10"},{"version":"5.037000","date":"2022-05-28T02:33:40"},{"version":"5.037001","date":"2022-06-20T18:57:04"},{"version":"5.037002","date":"2022-07-21T01:37:24"},{"version":"5.037003","date":"2022-08-20T18:57:47"},{"version":"5.037004","date":"2022-09-21T00:25:19"},{"date":"2022-10-20T17:33:58","version":"5.037005"},{"version":"5.037006","date":"2022-11-20T11:56:16"},{"date":"2022-12-20T17:14:30","version":"5.037007"},{"date":"2023-01-20T15:20:59","version":"5.037008"},{"version":"5.037009","date":"2023-02-20T20:45:20"},{"version":"5.037010","date":"2023-03-21T08:16:37"},{"date":"2023-04-10T20:07:53","version":"5.036001"},{"version":"5.036001","date":"2023-04-11T19:50:09"},{"version":"5.036001","date":"2023-04-16T15:35:15"},{"date":"2023-04-20T19:05:36","version":"5.037011"},{"date":"2023-04-23T15:22:26","version":"5.036001"},{"version":"5.038000","date":"2023-06-16T02:09:05"},{"version":"5.038000","date":"2023-06-23T21:17:27"},{"date":"2023-07-02T23:00:28","version":"5.038000"},{"version":"5.039001","date":"2023-07-20T19:09:13"},{"version":"5.039002","date":"2023-08-20T22:46:17"},{"version":"5.039003","date":"2023-09-20T16:12:58"},{"version":"5.039004","date":"2023-10-25T19:15:57"},{"date":"2023-11-20T02:49:43","version":"5.039005"},{"version":"5.034002","date":"2023-11-25T15:19:49"},{"version":"5.036002","date":"2023-11-25T15:20:11"},{"date":"2023-11-25T15:21:49","version":"5.038001"},{"date":"2023-11-25T15:58:49","version":"5.034002"},{"version":"5.036002","date":"2023-11-25T15:59:01"},{"date":"2023-11-25T15:59:13","version":"5.038001"},{"date":"2023-11-29T13:10:30","version":"5.034003"},{"version":"5.036003","date":"2023-11-29T16:08:59"},{"date":"2023-11-29T16:10:36","version":"5.038002"},{"version":"5.039006","date":"2023-12-30T21:59:20"},{"date":"2024-01-20T12:44:12","version":"5.039007"},{"date":"2024-02-23T14:25:56","version":"5.039008"},{"date":"2024-03-20T16:26:28","version":"5.039009"},{"date":"2024-04-27T19:22:49","version":"5.039010"},{"version":"5.040000","date":"2024-05-24T20:45:21"},{"version":"5.040000","date":"2024-06-04T21:47:57"},{"version":"5.040000","date":"2024-06-09T20:45:37"},{"date":"2024-07-02T14:28:09","version":"5.041001"},{"version":"5.041002","date":"2024-07-20T20:54:48"},{"date":"2024-08-29T13:23:40","version":"5.041003"},{"date":"2024-09-20T11:18:14","version":"5.041004"},{"date":"2024-10-20T20:49:26","version":"5.041005"},{"version":"5.041006","date":"2024-11-20T08:29:25"}],"advisories":[{"id":"CPANSA-File-Glob-2011-2728","severity":null,"fixed_versions":[],"references":["http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069752.html","http://www.securityfocus.com/bid/49858","http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod","http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77","http://secunia.com/advisories/46172","https://blogs.oracle.com/sunsecurity/entry/cve_2011_2728_denial_of1","https://bugzilla.redhat.com/show_bug.cgi?id=742987"],"description":"The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference.\n","reported":"2012-12-21","distribution":"perl","affected_versions":["<1.13"],"cves":["CVE-2011-2728"]},{"fixed_versions":[">=5.24.0"],"severity":"high","id":"CPANSA-perl-2016-6185","description":"The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.\n","references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/","https://github.com/Perl/perl5/commit/08e3451d7b3b714ad63a27f1b9c2a23ee75d15ee","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/","http://www.openwall.com/lists/oss-security/2016/07/07/1","http://www.openwall.com/lists/oss-security/2016/07/08/5","https://rt.cpan.org/Public/Bug/Display.html?id=115808","http://www.debian.org/security/2016/dsa-3628","http://www.securitytracker.com/id/1036260","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/","http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html","http://www.securityfocus.com/bid/91685","https://security.gentoo.org/glsa/201701-75","https://usn.ubuntu.com/3625-2/","https://usn.ubuntu.com/3625-1/","https://github.com/Perl/perl5/blob/blead/pod/perl5260delta.pod"],"affected_versions":[">=5.22.0,<5.24.0"],"distribution":"perl","reported":"2016-08-02","cves":["CVE-2016-6185"]},{"affected_versions":[">=5.005,<5.24.0"],"distribution":"perl","reported":"2017-02-07","cves":["CVE-2015-8608"],"fixed_versions":[">=5.24.0"],"severity":"critical","id":"CPANSA-perl-2015-8608","references":["https://rt.perl.org/Public/Bug/Display.html?id=126755","https://github.com/Perl/perl5/issues/15067","https://packetstormsecurity.com/files/136649/Perl-5.22-VDir-MapPathA-W-Out-Of-Bounds-Reads-Buffer-Over-Reads.html","http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","https://www.oracle.com/security-alerts/cpujul2020.html"],"description":"The VDir::MapPathA and VDir::MapPathW functions in Perl 5.22 allow remote attackers to cause a denial of service (out-of-bounds read) and possibly execute arbitrary code via a crafted (1) drive letter or (2) pInName argument.\n"},{"description":"The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference.\n","references":["http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069752.html","http://www.securityfocus.com/bid/49858","http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod","http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77","http://secunia.com/advisories/46172","https://blogs.oracle.com/sunsecurity/entry/cve_2011_2728_denial_of1","https://bugzilla.redhat.com/show_bug.cgi?id=742987"],"fixed_versions":[],"id":"CPANSA-perl-2011-2728","severity":null,"cves":["CVE-2011-2728"],"affected_versions":["<5.14.2"],"reported":"2012-12-21","distribution":"perl"},{"cves":["CVE-2020-12723"],"distribution":"perl","reported":"2020-06-05","affected_versions":["<5.28.3",">=5.30.0,<5.30.3"],"references":["https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3","https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod","https://github.com/Perl/perl5/issues/16947","https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a","https://github.com/Perl/perl5/issues/17743","https://security.netapp.com/advisory/ntap-20200611-0001/","https://security.gentoo.org/glsa/202006-03","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuoct2021.html","https://www.oracle.com/security-alerts/cpujan2022.html","https://www.oracle.com/security-alerts/cpuapr2022.html","https://perldoc.perl.org/perl5283delta","https://perldoc.perl.org/perl5303delta","https://perldoc.perl.org/perl5320delta"],"description":"regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.\n","id":"CPANSA-perl-2020-12723","severity":"high","fixed_versions":[">=5.30.3"]},{"id":"CPANSA-perl-2020-10878","severity":"high","fixed_versions":[">=5.30.3"],"references":["https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3","https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c","https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8","https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod","https://security.netapp.com/advisory/ntap-20200611-0001/","https://security.gentoo.org/glsa/202006-03","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuoct2021.html","https://www.oracle.com/security-alerts/cpujan2022.html","https://www.oracle.com/security-alerts/cpuapr2022.html","https://perldoc.perl.org/perl5283delta","https://perldoc.perl.org/perl5303delta","https://perldoc.perl.org/perl5320delta"],"description":"Perl before 5.30.3 has an integer overflow related to mishandling of a \"PL_regkind[OP(n)] == NOTHING\" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.\n","distribution":"perl","reported":"2020-06-05","affected_versions":["<5.28.3",">=5.30.0,<5.30.3"],"cves":["CVE-2020-10878"]},{"fixed_versions":[">=5.30.3"],"id":"CPANSA-perl-2020-10543","severity":"high","references":["https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3","https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed","https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod","https://security.netapp.com/advisory/ntap-20200611-0001/","https://security.gentoo.org/glsa/202006-03","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuoct2021.html","https://www.oracle.com/security-alerts/cpujan2022.html","https://www.oracle.com/security-alerts/cpuapr2022.html","https://perldoc.perl.org/perl5283delta","https://perldoc.perl.org/perl5303delta","https://perldoc.perl.org/perl5320delta"],"description":"Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.\n","affected_versions":["<5.28.3",">=5.30.0,<5.30.3"],"distribution":"perl","reported":"2020-06-05","cves":["CVE-2020-10543"]},{"cves":["CVE-2018-6798"],"affected_versions":[">=5.22.0,<5.24.4",">=5.26.0,<5.28.2"],"reported":"2018-04-17","distribution":"perl","references":["https://www.debian.org/security/2018/dsa-4172","https://rt.perl.org/Public/Bug/Display.html?id=132063","http://www.securitytracker.com/id/1040681","https://access.redhat.com/errata/RHSA-2018:1192","https://usn.ubuntu.com/3625-1/","https://security.gentoo.org/glsa/201909-01","https://www.oracle.com/security-alerts/cpujul2020.html","https://perldoc.perl.org/perl5244delta","https://perldoc.perl.org/perl5262delta","https://github.com/Perl/perl5/issues/16143"],"description":"An issue was discovered in Perl 5.22 through 5.26. Matching a crafted locale dependent regular expression can cause a heap-based buffer over-read and potentially information disclosure.\n","fixed_versions":[">=5.28.0"],"id":"CPANSA-perl-2018-6798","severity":"high"},{"reported":"2018-04-17","distribution":"perl","affected_versions":[">=5.18.0,<5.24.4",">=5.26.0,<5.26.2"],"cves":["CVE-2018-6797"],"severity":"critical","id":"CPANSA-perl-2018-6797","fixed_versions":[">=5.28.0"],"references":["https://www.debian.org/security/2018/dsa-4172","https://rt.perl.org/Public/Bug/Display.html?id=132227","http://www.securitytracker.com/id/1040681","https://access.redhat.com/errata/RHSA-2018:1192","https://usn.ubuntu.com/3625-1/","http://www.securitytracker.com/id/1042004","https://security.gentoo.org/glsa/201909-01","https://www.oracle.com/security-alerts/cpujul2020.html","https://perldoc.perl.org/perl5244delta","https://perldoc.perl.org/perl5262delta"],"description":"An issue was discovered in Perl 5.18 through 5.26. A crafted regular expression can cause a heap-based buffer overflow, with control over the bytes written.\n"},{"distribution":"perl","reported":"2018-04-17","affected_versions":["<5.24.4",">=5.26.0,<5.26.2"],"cves":["CVE-2018-6913"],"severity":"critical","id":"CPANSA-perl-2018-6913","fixed_versions":[">=5.26.2"],"references":["https://www.debian.org/security/2018/dsa-4172","https://rt.perl.org/Public/Bug/Display.html?id=131844","https://lists.debian.org/debian-lts-announce/2018/04/msg00009.html","http://www.securitytracker.com/id/1040681","https://usn.ubuntu.com/3625-2/","https://usn.ubuntu.com/3625-1/","http://www.securityfocus.com/bid/103953","https://security.gentoo.org/glsa/201909-01","https://www.oracle.com/security-alerts/cpujul2020.html","https://perldoc.perl.org/perl5244delta","https://perldoc.perl.org/perl5262delta","https://github.com/Perl/perl5/issues/16098"],"description":"Heap-based buffer overflow in the pack function in Perl before 5.26.2 allows context-dependent attackers to execute arbitrary code via a large item count.\n"},{"fixed_versions":[">=5.26.3"],"severity":"critical","id":"CPANSA-perl-2018-18314","references":["https://www.debian.org/security/2018/dsa-4347","https://rt.perl.org/Ticket/Display.html?id=131649","https://metacpan.org/changes/release/SHAY/perl-5.26.3","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/","https://github.com/Perl/perl5/commit/19a498a461d7c81ae3507c450953d1148efecf4f","https://bugzilla.redhat.com/show_bug.cgi?id=1646751","http://www.securitytracker.com/id/1042181","https://usn.ubuntu.com/3834-1/","http://www.securityfocus.com/bid/106145","https://access.redhat.com/errata/RHSA-2019:0010","https://access.redhat.com/errata/RHSA-2019:0001","https://security.netapp.com/advisory/ntap-20190221-0003/","https://security.gentoo.org/glsa/201909-01","https://www.oracle.com/security-alerts/cpujul2020.html"],"description":"Perl before 5.26.3 has a buffer overflow via a crafted regular expression that triggers invalid write operations.\n","affected_versions":["<5.26.3"],"distribution":"perl","reported":"2018-12-07","cves":["CVE-2018-18314"]},{"cves":["CVE-2018-18313"],"affected_versions":["<5.26.3"],"reported":"2018-12-07","distribution":"perl","references":["https://www.debian.org/security/2018/dsa-4347","https://usn.ubuntu.com/3834-2/","https://rt.perl.org/Ticket/Display.html?id=133192","https://metacpan.org/changes/release/SHAY/perl-5.26.3","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/","https://github.com/Perl/perl5/commit/43b2f4ef399e2fd7240b4eeb0658686ad95f8e62","https://bugzilla.redhat.com/show_bug.cgi?id=1646738","http://www.securitytracker.com/id/1042181","https://usn.ubuntu.com/3834-1/","https://access.redhat.com/errata/RHSA-2019:0010","https://access.redhat.com/errata/RHSA-2019:0001","https://security.netapp.com/advisory/ntap-20190221-0003/","https://support.apple.com/kb/HT209600","https://seclists.org/bugtraq/2019/Mar/42","http://seclists.org/fulldisclosure/2019/Mar/49","https://security.gentoo.org/glsa/201909-01","https://www.oracle.com/security-alerts/cpujul2020.html"],"description":"Perl before 5.26.3 has a buffer over-read via a crafted regular expression that triggers disclosure of sensitive information from process memory.\n","fixed_versions":[">=5.26.3"],"id":"CPANSA-perl-2018-18313","severity":"critical"},{"cves":["CVE-2018-18312"],"affected_versions":["==5.28.0","<5.26.3"],"reported":"2018-12-05","distribution":"perl","description":"Perl before 5.26.3 and 5.28.0 before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.\n","references":["https://www.debian.org/security/2018/dsa-4347","https://rt.perl.org/Public/Bug/Display.html?id=133423","https://metacpan.org/changes/release/SHAY/perl-5.28.1","https://metacpan.org/changes/release/SHAY/perl-5.26.3","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/","https://bugzilla.redhat.com/show_bug.cgi?id=1646734","http://www.securitytracker.com/id/1042181","https://usn.ubuntu.com/3834-1/","http://www.securityfocus.com/bid/106179","https://access.redhat.com/errata/RHSA-2019:0010","https://access.redhat.com/errata/RHSA-2019:0001","https://security.netapp.com/advisory/ntap-20190221-0003/","https://security.gentoo.org/glsa/201909-01","https://www.oracle.com/security-alerts/cpujul2020.html","https://perldoc.perl.org/perl5281delta","https://perldoc.perl.org/perl5263delta"],"fixed_versions":[">=5.28.1"],"severity":"critical","id":"CPANSA-perl-2018-18312"},{"fixed_versions":[">=5.28.1"],"id":"CPANSA-perl-2018-18311","severity":"critical","description":"Perl before 5.26.3 and 5.28.x before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.\n","references":["https://www.debian.org/security/2018/dsa-4347","https://usn.ubuntu.com/3834-2/","https://rt.perl.org/Ticket/Display.html?id=133204","https://metacpan.org/changes/release/SHAY/perl-5.28.1","https://metacpan.org/changes/release/SHAY/perl-5.26.3","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/","https://lists.debian.org/debian-lts-announce/2018/11/msg00039.html","https://github.com/Perl/perl5/commit/34716e2a6ee2af96078d62b065b7785c001194be","https://bugzilla.redhat.com/show_bug.cgi?id=1646730","http://www.securitytracker.com/id/1042181","https://usn.ubuntu.com/3834-1/","http://www.securityfocus.com/bid/106145","https://access.redhat.com/errata/RHSA-2019:0010","https://access.redhat.com/errata/RHSA-2019:0001","https://access.redhat.com/errata/RHSA-2019:0109","https://security.netapp.com/advisory/ntap-20190221-0003/","https://support.apple.com/kb/HT209600","https://seclists.org/bugtraq/2019/Mar/42","http://seclists.org/fulldisclosure/2019/Mar/49","https://kc.mcafee.com/corporate/index?page=content&id=SB10278","https://access.redhat.com/errata/RHBA-2019:0327","https://access.redhat.com/errata/RHSA-2019:1790","https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html","https://access.redhat.com/errata/RHSA-2019:1942","https://access.redhat.com/errata/RHSA-2019:2400","https://security.gentoo.org/glsa/201909-01","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://perldoc.perl.org/perl5281delta","https://perldoc.perl.org/perl5263delta"],"affected_versions":["<5.26.3","==5.28.0"],"distribution":"perl","reported":"2018-12-07","cves":["CVE-2018-18311"]},{"cves":["CVE-2017-12883"],"distribution":"perl","reported":"2017-09-19","affected_versions":["==5.26.0",">=5.20.0,<5.24.3"],"references":["https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1","https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1","https://perl5.git.perl.org/perl.git/commitdiff/2be4edede4ae226e2eebd4eff28cedd2041f300f#patch1","https://bugzilla.redhat.com/show_bug.cgi?id=1492093","http://www.securityfocus.com/bid/100852","http://mirror.cucumberlinux.com/cucumber/cucumber-1.0/source/lang-base/perl/patches/CVE-2017-12883.patch","https://rt.perl.org/Public/Bug/Display.html?id=131598","http://www.debian.org/security/2017/dsa-3982","https://security.netapp.com/advisory/ntap-20180426-0001/","https://www.oracle.com/security-alerts/cpujul2020.html","https://github.com/Perl/perl5/issues/16025","https://perldoc.perl.org/perl5243delta","https://perldoc.perl.org/perl5280delta","https://perldoc.perl.org/perl5261delta"],"description":"Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to disclose sensitive information or cause a denial of service (application crash) via a crafted regular expression with an invalid '\\\\N{U+...}' escape.\n","severity":"critical","id":"CPANSA-perl-2017-12883","fixed_versions":[">=5.26.1"]},{"references":["https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1","https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1","https://perl5.git.perl.org/perl.git/commitdiff/96c83ed78aeea1a0496dd2b2d935869a822dc8a5","https://bugzilla.redhat.com/show_bug.cgi?id=1492091","http://www.securityfocus.com/bid/100860","https://rt.perl.org/Public/Bug/Display.html?id=131582","http://www.debian.org/security/2017/dsa-3982","https://security.netapp.com/advisory/ntap-20180426-0001/","https://www.oracle.com/security-alerts/cpujul2020.html","https://github.com/Perl/perl5/issues/16021","https://perldoc.perl.org/perl5243delta","https://perldoc.perl.org/perl5261delta","https://perldoc.perl.org/perl5280delta"],"description":"Heap-based buffer overflow in the S_regatom function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to cause a denial of service (out-of-bounds write) via a regular expression with a '\\\\N{}' escape and the case-insensitive modifier.\n","fixed_versions":[">=5.26.1"],"id":"CPANSA-perl-2017-12837","severity":"high","cves":["CVE-2017-12837"],"affected_versions":[">=5.18.0,<5.24.3","==5.26.0"],"reported":"2017-09-19","distribution":"perl"},{"reported":"2016-05-25","distribution":"perl","affected_versions":["<5.24.0"],"cves":["CVE-2015-8853"],"id":"CPANSA-perl-2015-8853","severity":"high","fixed_versions":[">=5.24.0"],"references":["http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html","http://www.openwall.com/lists/oss-security/2016/04/20/7","https://bugzilla.redhat.com/show_bug.cgi?id=1329106","https://rt.perl.org/Public/Bug/Display.html?id=123562","http://www.openwall.com/lists/oss-security/2016/04/20/5","http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html","http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","http://www.securityfocus.com/bid/86707","https://security.gentoo.org/glsa/201701-75","https://usn.ubuntu.com/3625-2/","https://usn.ubuntu.com/3625-1/"],"description":"The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause a denial of service (infinite loop) via crafted utf-8 data, as demonstrated by \"a\\x80.\"\n"},{"description":"The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key.\n","references":["http://www.securityfocus.com/bid/58311","http://perl5.git.perl.org/perl.git/commitdiff/d59e31f","http://perl5.git.perl.org/perl.git/commitdiff/9d83adc","http://www.nntp.perl.org/group/perl.perl5.porters/2013/03/msg199755.html","http://www.debian.org/security/2013/dsa-2641","http://secunia.com/advisories/52499","http://secunia.com/advisories/52472","https://bugzilla.redhat.com/show_bug.cgi?id=912276","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702296","http://perl5.git.perl.org/perl.git/commitdiff/6e79fe5","http://osvdb.org/90892","http://www.ubuntu.com/usn/USN-1770-1","http://rhn.redhat.com/errata/RHSA-2013-0685.html","http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html","http://marc.info/?l=bugtraq&m=137891988921058&w=2","http://www.mandriva.com/security/advisories?name=MDVSA-2013:113","https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0094","http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","https://exchange.xforce.ibmcloud.com/vulnerabilities/82598","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18771"],"id":"CPANSA-perl-2013-1667","severity":null,"fixed_versions":[">=5.26.1"],"cves":["CVE-2013-1667"],"reported":"2013-03-14","distribution":"perl","affected_versions":["<5.18.0"]},{"affected_versions":[">=5.10.0,<5.12.0"],"distribution":"perl","reported":"2011-05-13","cves":["CVE-2011-0761"],"fixed_versions":[">=5.12.0"],"severity":null,"id":"CPANSA-perl-2011-0761","description":"Perl 5.10.x allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an ability to inject arguments into a (1) getpeername, (2) readdir, (3) closedir, (4) getsockname, (5) rewinddir, (6) tell, or (7) telldir function call.\n","references":["http://www.securityfocus.com/bid/47766","http://securitytracker.com/id?1025507","http://www.toucan-system.com/advisories/tssa-2011-03.txt","http://securityreason.com/securityalert/8248","https://exchange.xforce.ibmcloud.com/vulnerabilities/67355","http://www.securityfocus.com/archive/1/517916/100/0/threaded"]},{"affected_versions":["<=5.14.0"],"reported":"2014-02-10","distribution":"perl","cves":["CVE-2010-4777"],"fixed_versions":[">5.14.0"],"severity":null,"id":"CPANSA-perl-2010-4777","references":["http://lists.opensuse.org/opensuse-updates/2011-05/msg00025.html","https://bugzilla.redhat.com/show_bug.cgi?id=694166","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=628836","https://rt.perl.org/Public/Bug/Display.html?id=76538","https://listi.jpberlin.de/pipermail/postfixbuch-users/2011-February/055885.html","http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html","http://forums.ocsinventory-ng.org/viewtopic.php?id=7215"],"description":"The Perl_reg_numbered_buff_fetch function in Perl 5.10.0, 5.12.0, 5.14.0, and other versions, when running with debugging enabled, allows context-dependent attackers to cause a denial of service (assertion failure and application exit) via crafted input that is not properly handled when using certain regular expressions, as demonstrated by causing SpamAssassin and OCSInventory to crash.\n"},{"cves":["CVE-2010-1158"],"affected_versions":["<5.10.0"],"reported":"2010-04-20","distribution":"perl","references":["http://bugs.gentoo.org/show_bug.cgi?id=313565","http://www.openwall.com/lists/oss-security/2010/04/14/3","http://perldoc.perl.org/perl5100delta.html","http://www.openwall.com/lists/oss-security/2010/04/08/9","https://bugzilla.redhat.com/show_bug.cgi?id=580605","http://secunia.com/advisories/55314"],"description":"Integer overflow in the regular expression engine in Perl 5.8.x allows context-dependent attackers to cause a denial of service (stack consumption and application crash) by matching a crafted regular expression against a long string.\n","fixed_versions":[">=5.10.0"],"severity":null,"id":"CPANSA-perl-2010-1158"},{"reported":"2009-10-29","distribution":"perl","affected_versions":["<=5.10.1"],"cves":["CVE-2009-3626"],"severity":null,"id":"CPANSA-perl-2009-3626","fixed_versions":[],"references":["http://securitytracker.com/id?1023077","http://www.vupen.com/english/advisories/2009/3023","http://perl5.git.perl.org/perl.git/commit/0abd0d78a73da1c4d13b1c700526b7e5d03b32d4","http://www.securityfocus.com/bid/36812","https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6225","http://rt.perl.org/rt3/Ticket/Attachment/617489/295383/","http://www.osvdb.org/59283","http://www.openwall.com/lists/oss-security/2009/10/23/8","http://secunia.com/advisories/37144","http://rt.perl.org/rt3/Public/Bug/Display.html?id=69973","https://exchange.xforce.ibmcloud.com/vulnerabilities/53939"],"description":"Perl 5.10.1 allows context-dependent attackers to cause a denial of service (application crash) via a UTF-8 character with a large, invalid codepoint, which is not properly handled during a regular-expression match.\n"},{"cves":["CVE-2008-1927"],"reported":"2008-04-24","distribution":"perl","affected_versions":["<=5.8.8"],"description":"Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters. NOTE: this issue might only be present on certain operating systems.\n","references":["http://rt.perl.org/rt3/Public/Bug/Display.html?id=48156","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454792","http://www.debian.org/security/2008/dsa-1556","https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00601.html","https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00607.html","http://www.gentoo.org/security/en/glsa/glsa-200805-17.xml","http://www.securityfocus.com/bid/28928","http://secunia.com/advisories/29948","http://secunia.com/advisories/30025","http://secunia.com/advisories/30326","http://www.securitytracker.com/id?1020253","http://www.redhat.com/support/errata/RHSA-2008-0522.html","http://secunia.com/advisories/30624","http://support.avaya.com/elmodocs2/security/ASA-2008-317.htm","http://support.avaya.com/elmodocs2/security/ASA-2008-361.htm","http://www.ipcop.org/index.php?name=News&file=article&sid=41","http://secunia.com/advisories/31467","http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html","http://secunia.com/advisories/31604","http://secunia.com/advisories/31208","http://secunia.com/advisories/31328","http://www.vmware.com/security/advisories/VMSA-2008-0013.html","http://www.redhat.com/support/errata/RHSA-2008-0532.html","http://secunia.com/advisories/31687","http://osvdb.org/44588","http://www.mandriva.com/security/advisories?name=MDVSA-2008:100","http://www.ubuntu.com/usn/usn-700-1","http://secunia.com/advisories/33314","http://wiki.rpath.com/Advisories:rPSA-2009-0011","http://www.ubuntu.com/usn/usn-700-2","http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html","http://secunia.com/advisories/33937","http://support.apple.com/kb/HT3438","http://www.vupen.com/english/advisories/2009/0422","http://www.vupen.com/english/advisories/2008/2361","http://www.vupen.com/english/advisories/2008/2424","http://www.vupen.com/english/advisories/2008/2265/references","https://exchange.xforce.ibmcloud.com/vulnerabilities/41996","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10579","http://www.securityfocus.com/archive/1/500210/100/0/threaded"],"severity":null,"id":"CPANSA-perl-2008-1927","fixed_versions":[]},{"cves":["CVE-2005-3962"],"affected_versions":["<5.10.0"],"reported":"2005-12-01","distribution":"perl","description":"Integer overflow in the format string functionality (Perl_sv_vcatpvfn) in Perl 5.9.2 and 5.8.6 Perl allows attackers to overwrite arbitrary memory and possibly execute arbitrary code via format string specifiers with large values, which causes an integer wrap and leads to a buffer overflow, as demonstrated using format string vulnerabilities in Perl applications.\n","references":["http://www.dyadsecurity.com/perl-0002.html","http://www.kb.cert.org/vuls/id/948385","http://www.securityfocus.com/bid/15629","http://secunia.com/advisories/17802","http://secunia.com/advisories/17844","http://secunia.com/advisories/17762","http://www.openpkg.org/security/OpenPKG-SA-2005.025-perl.html","http://www.gentoo.org/security/en/glsa/glsa-200512-01.xml","http://www.trustix.org/errata/2005/0070","http://secunia.com/advisories/17941","http://secunia.com/advisories/17952","http://www.redhat.com/support/errata/RHSA-2005-880.html","http://www.novell.com/linux/security/advisories/2005_71_perl.html","http://secunia.com/advisories/18183","http://secunia.com/advisories/18187","http://www.redhat.com/support/errata/RHSA-2005-881.html","http://secunia.com/advisories/18075","http://www.openbsd.org/errata37.html#perl","http://secunia.com/advisories/18295","ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/001_perl.patch","http://www.osvdb.org/21345","http://www.osvdb.org/22255","ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U","http://secunia.com/advisories/18517","http://secunia.com/advisories/17993","https://www.redhat.com/archives/fedora-legacy-announce/2006-February/msg00008.html","http://sunsolve.sun.com/search/document.do?assetkey=1-26-102192-1","http://secunia.com/advisories/19041","http://www.debian.org/security/2006/dsa-943","http://secunia.com/advisories/18413","http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056","http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm","http://www.novell.com/linux/security/advisories/2005_29_sr.html","http://secunia.com/advisories/20894","http://docs.info.apple.com/article.html?artnum=304829","http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html","http://www.us-cert.gov/cas/techalerts/TA06-333A.html","http://secunia.com/advisories/23155","http://www.mandriva.com/security/advisories?name=MDKSA-2005:225","http://www.ipcop.org/index.php?name=News&file=article&sid=41","http://secunia.com/advisories/31208","http://www.vupen.com/english/advisories/2006/2613","http://www.vupen.com/english/advisories/2006/0771","http://www.vupen.com/english/advisories/2006/4750","ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.7/common/007_perl.patch","http://www.vupen.com/english/advisories/2005/2688","http://marc.info/?l=full-disclosure&m=113342788118630&w=2","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1074","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10598","https://usn.ubuntu.com/222-1/","http://www.securityfocus.com/archive/1/438726/100/0/threaded","http://www.securityfocus.com/archive/1/418333/100/0/threaded"],"fixed_versions":[],"severity":null,"id":"CPANSA-perl-2005-3962"},{"severity":null,"id":"CPANSA-perl-2005-0156","fixed_versions":[],"description":"Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.\n","references":["http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml","http://www.redhat.com/support/errata/RHSA-2005-103.html","http://www.redhat.com/support/errata/RHSA-2005-105.html","http://www.trustix.org/errata/2005/0003/","http://www.securityfocus.com/bid/12426","http://secunia.com/advisories/14120","http://fedoranews.org/updates/FEDORA--.shtml","http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056","http://www.mandriva.com/security/advisories?name=MDKSA-2005:031","http://secunia.com/advisories/55314","http://marc.info/?l=bugtraq&m=110737149402683&w=2","http://marc.info/?l=full-disclosure&m=110779721503111&w=2","https://exchange.xforce.ibmcloud.com/vulnerabilities/19208","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10803","http://www.digitalmunition.com/DMA[2005-0131b].txt"],"distribution":"perl","reported":"2005-02-07","affected_versions":["=5.8.0"],"cves":["CVE-2005-0156"]},{"affected_versions":["=5.8.0"],"distribution":"perl","reported":"2005-05-02","cves":["CVE-2005-0155"],"fixed_versions":[],"id":"CPANSA-perl-2005-0155","severity":null,"references":["http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml","http://www.redhat.com/support/errata/RHSA-2005-103.html","http://www.redhat.com/support/errata/RHSA-2005-105.html","http://www.trustix.org/errata/2005/0003/","http://www.securityfocus.com/bid/12426","http://secunia.com/advisories/14120","http://fedoranews.org/updates/FEDORA--.shtml","http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056","http://support.avaya.com/elmodocs2/security/ASA-2006-163.htm","http://secunia.com/advisories/21646","http://www.mandriva.com/security/advisories?name=MDKSA-2005:031","http://marc.info/?l=bugtraq&m=110737149402683&w=2","http://marc.info/?l=full-disclosure&m=110779723332339&w=2","https://exchange.xforce.ibmcloud.com/vulnerabilities/19207","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10404","http://www.digitalmunition.com/DMA[2005-0131a].txt"],"description":"The PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to create arbitrary files via the PERLIO_DEBUG variable.\n"},{"id":"CPANSA-perl-2007-5116","severity":null,"fixed_versions":[],"references":["https://bugzilla.redhat.com/show_bug.cgi?id=323571","http://www.mandriva.com/security/advisories?name=MDKSA-2007:207","http://www.redhat.com/support/errata/RHSA-2007-0966.html","http://www.redhat.com/support/errata/RHSA-2007-1011.html","http://www.securityfocus.com/bid/26350","http://secunia.com/advisories/27531","http://secunia.com/advisories/27546","https://bugzilla.redhat.com/show_bug.cgi?id=378131","https://issues.rpath.com/browse/RPL-1813","http://www.debian.org/security/2007/dsa-1400","http://www.gentoo.org/security/en/glsa/glsa-200711-28.xml","http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.023.html","http://www.novell.com/linux/security/advisories/2007_24_sr.html","http://www.ubuntu.com/usn/usn-552-1","http://securitytracker.com/id?1018899","http://secunia.com/advisories/27479","http://secunia.com/advisories/27515","http://secunia.com/advisories/27548","http://secunia.com/advisories/27613","http://secunia.com/advisories/27570","http://secunia.com/advisories/27936","http://docs.info.apple.com/article.html?artnum=307179","ftp://aix.software.ibm.com/aix/efixes/security/README","http://www-1.ibm.com/support/docview.wss?uid=isg1IZ10220","http://www-1.ibm.com/support/docview.wss?uid=isg1IZ10244","http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html","http://www.us-cert.gov/cas/techalerts/TA07-352A.html","http://secunia.com/advisories/28167","http://lists.vmware.com/pipermail/security-announce/2008/000002.html","http://support.avaya.com/elmodocs2/security/ASA-2008-014.htm","http://secunia.com/advisories/28368","http://secunia.com/advisories/28387","http://secunia.com/advisories/27756","http://www.vmware.com/security/advisories/VMSA-2008-0001.html","http://sunsolve.sun.com/search/document.do?assetkey=1-26-31524-1","http://secunia.com/advisories/28993","http://secunia.com/advisories/29074","http://sunsolve.sun.com/search/document.do?assetkey=1-66-231524-1","http://secunia.com/advisories/31208","http://www.ipcop.org/index.php?name=News&file=article&sid=41","http://sunsolve.sun.com/search/document.do?assetkey=1-77-1018985.1-1","http://www.vupen.com/english/advisories/2007/4238","http://www.vupen.com/english/advisories/2008/0064","http://www.vupen.com/english/advisories/2008/0641","http://www.vupen.com/english/advisories/2007/3724","http://www.vupen.com/english/advisories/2007/4255","http://marc.info/?l=bugtraq&m=120352263023774&w=2","https://exchange.xforce.ibmcloud.com/vulnerabilities/38270","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10669","http://www.securityfocus.com/archive/1/486859/100/0/threaded","http://www.securityfocus.com/archive/1/485936/100/0/threaded","http://www.securityfocus.com/archive/1/483584/100/0/threaded","http://www.securityfocus.com/archive/1/483563/100/0/threaded"],"description":"Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.\n","distribution":"perl","reported":"2007-11-07","affected_versions":["<=5.8.8"],"cves":["CVE-2007-5116"]},{"severity":null,"id":"CPANSA-perl-2012-5195","fixed_versions":[">=5.16.0"],"description":"Heap-based buffer overflow in the Perl_repeatcpy function in util.c in Perl 5.12.x before 5.12.5, 5.14.x before 5.14.3, and 5.15.x before 15.15.5 allows context-dependent attackers to cause a denial of service (memory consumption and crash) or possibly execute arbitrary code via the 'x' string repeat operator.\n","references":["http://perl5.git.perl.org/perl.git/commit/2709980d5a193ce6f3a16f0d19879a6560dcde44","http://www.nntp.perl.org/group/perl.perl5.porters/2012/10/msg193886.html","http://www.securityfocus.com/bid/56287","http://www.openwall.com/lists/oss-security/2012/10/27/1","http://secunia.com/advisories/51457","http://www.openwall.com/lists/oss-security/2012/10/26/2","http://www.ubuntu.com/usn/USN-1643-1","http://www.debian.org/security/2012/dsa-2586","http://rhn.redhat.com/errata/RHSA-2013-0685.html","http://secunia.com/advisories/55314","http://www.mandriva.com/security/advisories?name=MDVSA-2013:113","https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0352","http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673"],"reported":"2012-12-18","distribution":"perl","affected_versions":["<5.16.0"],"cves":["CVE-2012-5195"]},{"affected_versions":["<5.22.1"],"reported":"2016-04-08","distribution":"perl","cves":["CVE-2016-2381"],"fixed_versions":[">=5.22.1"],"id":"CPANSA-perl-2016-2381","severity":"high","description":"Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.\n","references":["http://www.gossamer-threads.com/lists/perl/porters/326387","http://www.debian.org/security/2016/dsa-3501","http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html","http://www.securityfocus.com/bid/83802","http://www.ubuntu.com/usn/USN-2916-1","http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html","https://security.gentoo.org/glsa/201701-75","http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.oracle.com/security-alerts/cpujul2020.html"]},{"distribution":"perl","reported":"2003-12-31","affected_versions":["=5.8.1"],"cves":["CVE-2003-0900"],"severity":null,"id":"CPANSA-perl-2003-0900","fixed_versions":[],"references":["https://bugzilla.redhat.com/bugzilla/long_list.cgi?buglist=108711"],"description":"Perl 5.8.1 on Fedora Core does not properly initialize the random number generator when forking, which makes it easier for attackers to predict random numbers.\n"},{"id":"CPANSA-perl-2013-7422","severity":null,"fixed_versions":[],"references":["http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html","https://support.apple.com/kb/HT205031","http://perl5.git.perl.org/perl.git/commit/0c2990d652e985784f095bba4bc356481a66aa06","http://www.securityfocus.com/bid/75704","http://www.ubuntu.com/usn/USN-2916-1","https://security.gentoo.org/glsa/201507-11"],"description":"Integer underflow in regcomp.c in Perl before 5.20, as used in Apple OS X before 10.10.5 and other products, allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a long digit string associated with an invalid backreference within a regular expression.\n","distribution":"perl","reported":"2015-08-16","affected_versions":["<5.20.0"],"cves":["CVE-2013-7422"]},{"cves":["CVE-2015-8608"],"reported":"2017-02-07","distribution":"perl","affected_versions":["<5.22.2"],"description":"The VDir::MapPathA and VDir::MapPathW functions in Perl 5.22 allow remote attackers to cause a denial of service (out-of-bounds read) and possibly execute arbitrary code via a crafted (1) drive letter or (2) pInName argument.\n","references":["https://rt.perl.org/Public/Bug/Display.html?id=126755","https://packetstormsecurity.com/files/136649/Perl-5.22-VDir-MapPathA-W-Out-Of-Bounds-Reads-Buffer-Over-Reads.html","http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","https://www.oracle.com/security-alerts/cpujul2020.html"],"severity":"critical","id":"CPANSA-perl-2015-8608","fixed_versions":[">=5.22.2"]},{"cves":["CVE-2011-1487"],"affected_versions":["<5.14.0"],"distribution":"perl","reported":"2011-04-11","description":"The (1) lc, (2) lcfirst, (3) uc, and (4) ucfirst functions in Perl 5.10.x, 5.11.x, and 5.12.x through 5.12.3, and 5.13.x through 5.13.11, do not apply the taint attribute to the return value upon processing tainted input, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.\n","references":["https://bugzilla.redhat.com/show_bug.cgi?id=692844","http://openwall.com/lists/oss-security/2011/04/01/3","http://openwall.com/lists/oss-security/2011/04/04/35","https://bugzilla.redhat.com/show_bug.cgi?id=692898","http://rt.perl.org/rt3/Public/Bug/Display.html?id=87336","http://secunia.com/advisories/43921","http://www.securityfocus.com/bid/47124","http://perl5.git.perl.org/perl.git/commit/539689e74a3bcb04d29e4cd9396de91a81045b99","http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057971.html","http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057891.html","http://secunia.com/advisories/44168","http://www.debian.org/security/2011/dsa-2265","http://www.mandriva.com/security/advisories?name=MDVSA-2011:091","http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html","https://exchange.xforce.ibmcloud.com/vulnerabilities/66528"],"fixed_versions":[">=5.14.0"],"id":"CPANSA-perl-2011-1487","severity":null},{"reported":"1999-12-31","distribution":"perl","affected_versions":["<5.4.4"],"cves":["CVE-1999-1386"],"id":"CPANSA-perl-1999-1386","severity":null,"fixed_versions":[],"description":"Perl 5.004_04 and earlier follows symbolic links when running with the -e option, which allows local users to overwrite arbitrary files via a symlink attack on the /tmp/perl-eaXXXXX file.\n","references":["http://www.redhat.com/support/errata/rh50-errata-general.html#perl","http://www.iss.net/security_center/static/7243.php","http://marc.info/?l=bugtraq&m=88932165406213&w=2"]},{"cves":["CVE-2017-12814"],"distribution":"perl","reported":"2017-09-28","affected_versions":[">=5.24.0,<5.24.3","==5.26.0"],"description":"Stack-based buffer overflow in the CPerlHost::Add method in win32/perlhost.h in Perl before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 on Windows allows attackers to execute arbitrary code via a long environment variable.\n","references":["https://rt.perl.org/Public/Bug/Display.html?id=131665","https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1","https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1","http://www.securityfocus.com/bid/101051","https://security.netapp.com/advisory/ntap-20180426-0001/","https://www.oracle.com/security-alerts/cpujul2020.html","https://perldoc.perl.org/perl5243delta","https://github.com/Perl/perl5/issues/16051","https://perldoc.perl.org/perl5261delta","https://perldoc.perl.org/perl5280delta"],"id":"CPANSA-perl-2017-12814","severity":"critical","fixed_versions":[]},{"affected_versions":["=5.34.0"],"distribution":"perl","reported":"2023-08-22","cves":["CVE-2022-48522"],"fixed_versions":[">=5.34.1"],"severity":null,"id":"CPANSA-perl-2022-48522","description":"In Perl 5.34.0, function S_find_uninit_var in sv.c has a stack-based crash that can lead to remote code execution or local privilege escalation.\n","references":["https://github.com/Perl/perl5/blob/79a7b254d85a10b65126ad99bf10e70480569d68/sv.c#L16336-L16345","https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48522","https://security.netapp.com/advisory/ntap-20230915-0008/","https://ubuntu.com/security/CVE-2022-48522"]},{"affected_versions":[">=5.30.0,<5.34.3",">=5.36.0,<5.36.3","==5.38.0"],"distribution":"perl","reported":"2023-10-30","cves":["CVE-2023-47038"],"fixed_versions":["5.34.3","5.36.3","5.38.1"],"severity":null,"id":"CPANSA-perl-2023-47038","description":"A crafted regular expression when compiled by perl 5.30.0 through 5.38.0 can cause a one attacker controlled byte buffer overflow in a heap allocated buffer\n","references":["https://perldoc.perl.org/perl5342delta","https://perldoc.perl.org/perl5363delta","https://perldoc.perl.org/perl5381delta","https://perldoc.perl.org/perl5382delta","https://perldoc.perl.org/perl5400delta"]},{"fixed_versions":[],"severity":null,"id":"CPANSA-perl-2023-47039","references":["https://github.com/ycdxsb/WindowsPrivilegeEscalation","https://perldoc.perl.org/perl5342delta","https://perldoc.perl.org/perl5363delta","https://perldoc.perl.org/perl5381delta","https://perldoc.perl.org/perl5382delta","https://perldoc.perl.org/perl5400delta"],"description":"Perl for Windows relies on the system path environment variable to find the shell (cmd.exe). When running an executable which uses Windows Perl interpreter, Perl attempts to find and execute cmd.exe within the operating system. However, due to path search order issues, Perl initially looks for cmd.exe in the current working directory.\nAn attacker with limited privileges can exploit this behavior by placing cmd.exe in locations with weak permissions, such as C:\\ProgramData. By doing so, when an administrator attempts to use this executable from these compromised locations, arbitrary code can be executed.\n","affected_versions":["<5.34.2",">=5.36.0,<5.36.3","==5.38.0"],"distribution":"perl","reported":"2023-10-30","cves":["CVE-2023-47039"]},{"cves":["CVE-2023-47100"],"affected_versions":["<5.34.3",">=5.36.0,<5.36.3",">=5.38.0,<5.38.2"],"reported":null,"distribution":"perl","description":"In Perl before 5.38.2, S_parse_uniprop_string in regcomp.c can write to unallocated space because a property name associated with a \\p{...} regular expression construct is mishandled. The earliest affected version is 5.30.0.\n","references":["https://github.com/Perl/perl5/commit/ff1f9f59360afeebd6f75ca1502f5c3ebf077da3","https://github.com/Perl/perl5/commit/12c313ce49b36160a7ca2e9b07ad5bd92ee4a010","https://github.com/Perl/perl5/commit/7047915eef37fccd93e7cd985c29fe6be54650b6"],"fixed_versions":[">=5.38.2"],"severity":null,"id":"CPANSA-perl-2023-47100"},{"id":"CPANSA-sperl-1999-0034","severity":null,"fixed_versions":[],"description":"Buffer overflow in suidperl (sperl), Perl 4.x and 5.x.\n","references":["https://exchange.xforce.ibmcloud.com/vulnerabilities/448","https://www.cpan.org/src/5.0/CA-97.17.sperl"],"distribution":"perl","reported":"1997-05-29","affected_versions":[">=4.0,<5.4.0"],"cves":["CVE-1999-0034"]},{"affected_versions":[">=4.0,<5.6.0"],"distribution":"perl","reported":"1999-03-17","cves":["CVE-1999-0462"],"fixed_versions":[],"id":"CPANSA-sperl-1999-0462","severity":null,"description":"suidperl in Linux Perl does not check the nosuid mount option on file systems, allowing local users to gain root access by placing a setuid script in a mountable file system, e.g. a CD-ROM or floppy disk.\n","references":["http://www.securityfocus.com/bid/339"]},{"cves":["CVE-2000-0703"],"reported":"2000-10-20","distribution":"perl","affected_versions":["<5.6.1"],"description":"suidperl (aka sperl) does not properly cleanse the escape sequence \"~!\" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the \"interactive\" environmental variable and calling suidperl with a filename that contains the escape sequence.\n","references":["http://archives.neohapsis.com/archives/bugtraq/2000-08/0022.html","http://www.calderasystems.com/support/security/advisories/CSSA-2000-026.0.txt","http://www.securityfocus.com/bid/1547","http://www.novell.com/linux/security/advisories/suse_security_announce_59.html","http://www.redhat.com/support/errata/RHSA-2000-048.html","http://www.turbolinux.com/pipermail/tl-security-announce/2000-August/000017.html","http://archives.neohapsis.com/archives/bugtraq/2000-08/0153.html","http://archives.neohapsis.com/archives/bugtraq/2000-08/0086.html","http://archives.neohapsis.com/archives/bugtraq/2000-08/0113.html","https://www.cpan.org/src/5.0/sperl-2000-08-05/sperl-2000-08-05.txt"],"id":"CPANSA-sperl-2000-0703","severity":null,"fixed_versions":[]}],"main_module":"perl"},"Apache-Session-Browseable":{"advisories":[{"references":["https://github.com/LemonLDAPNG/Apache-Session-Browseable/commit/fdf393235140b293cae5578ef136055a78f3574f","https://lists.debian.org/debian-lts-announce/2023/01/msg00025.html"],"description":"In Apache::Session::Browseable before 1.3.6, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can, for example, be fixed in conjunction with the CVE-2020-16093 fix.\n","fixed_versions":[">=1.3.6"],"id":"CPANSA-Apache-Session-Browseable-2020-36659","severity":null,"cves":["CVE-2020-36659"],"affected_versions":["<1.3.6"],"reported":"2023-01-27","distribution":"Apache-Session-Browseable"}],"main_module":"Apache::Session::Browseable","versions":[{"date":"2009-10-31T08:09:42","version":"0.1"},{"version":"0.2","date":"2009-11-01T09:10:13"},{"date":"2009-11-01T16:21:16","version":"0.3"},{"date":"2010-08-16T15:26:19","version":"0.4"},{"version":"0.5","date":"2010-12-06T21:08:25"},{"version":"0.6","date":"2010-12-08T15:45:21"},{"date":"2012-06-24T07:14:37","version":"0.7"},{"date":"2012-10-13T16:15:41","version":"0.8"},{"date":"2013-02-28T06:05:09","version":"0.9"},{"date":"2013-08-28T04:42:23","version":"1.0"},{"version":"1.0","date":"2013-08-30T04:47:02"},{"version":"v1.0.2","date":"2013-10-20T05:39:14"},{"date":"2015-06-12T15:56:45","version":"1.1"},{"version":"1.2","date":"2016-03-09T05:31:13"},{"date":"2016-03-10T06:30:41","version":"v1.2.1"},{"date":"2016-04-01T11:34:51","version":"v1.2.2"},{"version":"v1.2.3","date":"2016-06-07T13:59:19"},{"version":"v1.2.4","date":"2017-02-19T07:34:18"},{"date":"2017-04-04T05:18:26","version":"v1.2.5"},{"date":"2017-09-12T09:35:30","version":"v1.2.5"},{"version":"v1.2.7","date":"2017-10-03T05:00:07"},{"version":"v1.2.8","date":"2017-10-03T10:42:35"},{"date":"2019-02-08T06:29:20","version":"v1.2.9"},{"version":"v1.3.0","date":"2019-02-08T09:31:22"},{"date":"2019-05-04T10:55:48","version":"v1.3.1"},{"version":"v1.3.2","date":"2019-07-04T18:30:30"},{"date":"2019-09-19T20:44:43","version":"v1.3.3"},{"version":"v1.3.4","date":"2019-11-20T19:43:04"},{"date":"2020-01-21T10:20:26","version":"v1.3.5"},{"date":"2020-09-04T13:23:31","version":"v1.3.6"},{"date":"2020-09-04T13:39:40","version":"v1.3.7"},{"date":"2020-09-06T21:03:06","version":"v1.3.8"},{"date":"2021-08-10T04:44:06","version":"v1.3.9"},{"version":"v1.3.10","date":"2022-03-08T13:51:31"},{"date":"2022-09-26T16:41:24","version":"v1.3.11"},{"date":"2023-07-06T10:43:25","version":"v1.3.12"},{"version":"v1.3.13","date":"2023-07-06T11:38:32"}]},"Elive":{"advisories":[{"distribution":"Elive","reported":"2011-10-15","affected_versions":["<1.20"],"cves":[],"id":"CPANSA-Elive-2011-01","severity":null,"fixed_versions":[">=1.20"],"references":["https://metacpan.org/dist/Elive/changes"],"description":"Elive::DAO->set() did not die on tainted data.\n"}],"main_module":"Elive","versions":[{"version":"0.01","date":"2009-03-17T06:37:43"},{"version":"0.02","date":"2009-04-13T23:51:59"},{"date":"2009-04-14T20:26:27","version":"0.03"},{"date":"2009-04-15T22:30:08","version":"0.04"},{"version":"0.05","date":"2009-04-17T07:27:23"},{"date":"2009-04-17T22:04:55","version":"0.06"},{"date":"2009-04-22T00:14:13","version":"0.07"},{"date":"2009-04-22T03:10:13","version":"0.08"},{"version":"0.09","date":"2009-04-24T22:26:35"},{"date":"2009-04-28T07:30:45","version":"0.10"},{"version":"0.11","date":"2009-04-29T21:49:12"},{"version":"0.12","date":"2009-05-01T23:15:47"},{"date":"2009-05-04T22:19:09","version":"0.13"},{"version":"0.14","date":"2009-05-05T20:09:18"},{"date":"2009-05-08T22:04:14","version":"0.15"},{"version":"0.16","date":"2009-05-11T20:38:56"},{"date":"2009-05-13T21:31:52","version":"0.17"},{"version":"0.18","date":"2009-05-15T03:47:36"},{"date":"2009-05-18T21:43:03","version":"0.19"},{"version":"0.20","date":"2009-05-24T00:13:36"},{"date":"2009-05-24T20:48:19","version":"0.21"},{"version":"0.22","date":"2009-05-27T22:05:37"},{"date":"2009-05-29T05:09:57","version":"0.23"},{"date":"2009-06-03T04:48:43","version":"0.24"},{"date":"2009-06-03T22:18:02","version":"0.25"},{"date":"2009-06-12T22:36:31","version":"0.26"},{"version":"0.27","date":"2009-06-19T21:34:40"},{"version":"0.28","date":"2009-06-22T03:47:43"},{"date":"2009-06-24T04:14:37","version":"0.29"},{"version":"0.30","date":"2009-06-26T23:24:47"},{"version":"0.31","date":"2009-07-03T06:18:23"},{"version":"0.32","date":"2009-07-17T22:56:55"},{"date":"2009-07-22T03:22:18","version":"0.33"},{"version":"0.34","date":"2009-07-28T06:46:45"},{"version":"0.35","date":"2009-08-02T22:36:31"},{"version":"0.36","date":"2009-08-03T22:44:25"},{"version":"0.37","date":"2009-08-05T21:02:32"},{"version":"0.38","date":"2009-08-21T08:29:37"},{"date":"2009-08-31T02:24:45","version":"0.39"},{"date":"2009-09-10T01:20:54","version":"0.40"},{"date":"2009-09-11T21:34:13","version":"0.41"},{"version":"0.42","date":"2009-10-08T00:53:22"},{"version":"0.43","date":"2009-10-20T23:09:46"},{"version":"0.44","date":"2009-10-22T00:05:22"},{"date":"2009-10-26T04:15:36","version":"0.45"},{"version":"0.46","date":"2009-10-28T08:27:27"},{"date":"2009-10-28T21:26:06","version":"0.47"},{"version":"0.48","date":"2009-10-29T00:00:43"},{"version":"0.48_01","date":"2009-11-02T21:37:24"},{"version":"0.49","date":"2009-11-06T20:36:30"},{"version":"0.50","date":"2009-11-09T21:34:02"},{"date":"2009-11-16T00:26:26","version":"0.51"},{"version":"0.52","date":"2009-11-30T20:38:39"},{"date":"2009-12-14T23:14:43","version":"0.53"},{"date":"2009-12-18T00:24:06","version":"0.53_1"},{"date":"2009-12-18T22:36:34","version":"0.54"},{"version":"0.55","date":"2009-12-20T20:02:22"},{"version":"0.56","date":"2010-01-04T06:35:00"},{"version":"0.57","date":"2010-01-04T21:18:52"},{"version":"0.58","date":"2010-01-14T00:08:40"},{"date":"2010-01-21T22:46:27","version":"0.59"},{"date":"2010-01-24T21:24:09","version":"0.60"},{"date":"2010-01-26T22:38:54","version":"0.61"},{"version":"0.62","date":"2010-02-15T23:06:41"},{"version":"0.63","date":"2010-03-06T22:34:53"},{"date":"2010-03-11T22:45:28","version":"0.64"},{"date":"2010-05-17T00:40:50","version":"0.65"},{"date":"2010-05-21T23:54:39","version":"0.66"},{"date":"2010-05-27T22:12:29","version":"0.67"},{"date":"2010-06-02T07:33:50","version":"0.68"},{"date":"2010-06-11T00:12:21","version":"0.69"},{"version":"0.70","date":"2010-06-22T05:13:22"},{"date":"2010-06-22T22:20:27","version":"0.71"},{"version":"0.72","date":"2010-08-13T01:10:30"},{"date":"2010-09-03T03:48:51","version":"0.73"},{"version":"0.74_2","date":"2010-10-14T20:54:08"},{"version":"0.74","date":"2010-10-18T01:49:41"},{"version":"0.75","date":"2010-10-27T23:52:59"},{"date":"2010-11-09T23:46:08","version":"0.76"},{"date":"2010-12-08T21:27:13","version":"0.77"},{"date":"2010-12-08T23:17:00","version":"0.78"},{"date":"2011-01-20T02:01:43","version":"0.79"},{"version":"0.80","date":"2011-01-27T19:56:34"},{"version":"0.81","date":"2011-02-03T03:17:09"},{"date":"2011-02-10T00:02:08","version":"0.82"},{"date":"2011-03-10T05:19:08","version":"0.83"},{"date":"2011-03-11T01:11:39","version":"0.84"},{"date":"2011-03-14T00:55:18","version":"0.85"},{"date":"2011-03-14T21:15:08","version":"0.86"},{"date":"2011-04-11T00:59:22","version":"0.87"},{"date":"2011-04-11T19:19:42","version":"0.87.1"},{"version":"0.87.2","date":"2011-04-15T02:12:50"},{"version":"0.88","date":"2011-04-27T02:43:51"},{"version":"0.89","date":"2011-05-20T00:15:55"},{"date":"2011-06-08T23:34:06","version":"0.90"},{"date":"2011-06-14T23:35:27","version":"0.91"},{"version":"0.95","date":"2011-06-28T07:09:46"},{"version":"0.96","date":"2011-06-29T21:42:38"},{"date":"2011-07-05T06:35:18","version":"0.97"},{"date":"2011-07-08T00:35:18","version":"0.98"},{"version":"0.99","date":"2011-07-14T03:25:12"},{"date":"2011-07-19T00:14:00","version":"1.00"},{"date":"2011-07-20T01:14:39","version":"1.01"},{"version":"1.02","date":"2011-07-21T05:49:47"},{"date":"2011-07-23T23:23:35","version":"1.03"},{"date":"2011-07-29T00:14:06","version":"1.04"},{"date":"2011-08-01T02:20:53","version":"1.05"},{"version":"1.06","date":"2011-08-05T21:36:24"},{"version":"1.07","date":"2011-08-07T01:43:31"},{"date":"2011-08-09T00:51:44","version":"1.08"},{"version":"1.09","date":"2011-08-10T05:13:13"},{"version":"1.10","date":"2011-08-10T21:06:42"},{"version":"1.11","date":"2011-08-11T22:27:24"},{"date":"2011-08-15T00:58:40","version":"1.12"},{"version":"1.13","date":"2011-08-19T00:21:11"},{"date":"2011-08-20T22:44:01","version":"1.14"},{"version":"1.15","date":"2011-08-23T21:43:48"},{"version":"1.16","date":"2011-08-26T22:25:28"},{"date":"2011-09-08T22:32:49","version":"1.17"},{"date":"2011-09-16T00:00:34","version":"1.18"},{"date":"2011-09-28T07:09:24","version":"1.19"},{"version":"1.20","date":"2011-11-15T01:28:33"},{"version":"1.21","date":"2011-12-03T01:49:03"},{"date":"2012-01-05T04:04:10","version":"1.22"},{"version":"1.23","date":"2012-01-25T20:01:01"},{"date":"2012-02-28T01:03:16","version":"1.24"},{"date":"2012-04-18T04:53:06","version":"1.25"},{"version":"1.26","date":"2012-05-04T04:11:34"},{"date":"2012-07-13T21:59:27","version":"1.27"},{"version":"1.28","date":"2012-10-12T02:45:37"},{"date":"2012-10-26T21:16:49","version":"1.29"},{"date":"2013-01-04T01:33:50","version":"1.30"},{"date":"2013-03-28T02:39:54","version":"1.31"},{"date":"2014-02-28T16:40:50","version":"1.32"},{"version":"1.33","date":"2015-01-21T21:14:50"},{"version":"1.34","date":"2015-04-03T22:38:32"},{"date":"2015-06-29T02:59:33","version":"1.35"},{"date":"2015-12-03T20:48:05","version":"1.36"},{"date":"2015-12-04T02:58:35","version":"1.37"}]},"HTML-Parser":{"advisories":[{"description":"The decode_entities function in util.c in HTML-Parser before 3.63 allows context-dependent attackers to cause a denial of service (infinite loop) via an incomplete SGML numeric character reference, which triggers generation of an invalid UTF-8 character.\n","references":["https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6225","http://www.openwall.com/lists/oss-security/2009/10/23/9","http://secunia.com/advisories/37155","http://www.securityfocus.com/bid/36807","https://bugzilla.redhat.com/show_bug.cgi?id=530604","http://www.vupen.com/english/advisories/2009/3022","http://github.com/gisle/html-parser/commit/b9aae1e43eb2c8e989510187cff0ba3e996f9a4c","https://exchange.xforce.ibmcloud.com/vulnerabilities/53941"],"id":"CPANSA-HTML-Parser-2009-3627","severity":null,"fixed_versions":[],"cves":["CVE-2009-3627"],"reported":"2009-10-29","distribution":"HTML-Parser","affected_versions":["<3.63"]}],"main_module":"HTML::Parser","versions":[{"date":"1998-03-31T22:25:05","version":"2.14"},{"date":"1998-04-02T11:40:38","version":"2.16"},{"date":"1998-04-28T08:35:12","version":"2.17"},{"date":"1998-06-22T19:45:24","version":"2.18"},{"version":"2.19","date":"1998-07-06T23:12:33"},{"date":"1998-07-08T13:05:04","version":"2.20"},{"version":"2.21","date":"1998-11-13T21:48:08"},{"version":"2.23","date":"1999-06-09T10:34:35"},{"date":"1999-11-03T07:10:32","version":"2.24"},{"version":"2.25","date":"1999-11-05T09:46:11"},{"date":"1999-12-14T23:01:49","version":"3.00"},{"date":"1999-12-19T07:07:38","version":"3.01"},{"date":"1999-12-21T09:55:56","version":"3.02"},{"version":"3.04","date":"2000-01-15T16:25:39"},{"version":"3.05","date":"2000-01-22T16:14:25"},{"version":"3.06","date":"2000-03-06T14:00:15"},{"version":"3.07","date":"2000-03-20T12:47:48"},{"version":"3.08","date":"2000-05-23T10:59:19"},{"version":"3.09","date":"2000-06-28T08:49:09"},{"version":"3.10","date":"2000-06-29T07:52:47"},{"version":"3.11","date":"2000-08-22T10:04:28"},{"version":"3.12","date":"2000-09-14T18:22:47"},{"version":"3.13","date":"2000-09-17T01:55:45"},{"version":"3.14","date":"2000-12-04T06:05:39"},{"version":"3.15","date":"2000-12-26T09:04:53"},{"date":"2001-02-23T07:21:20","version":"3.16"},{"date":"2001-02-24T06:32:38","version":"3.17"},{"version":"3.18","date":"2001-02-25T04:51:50"},{"date":"2001-03-10T04:32:27","version":"3.19"},{"version":"3.19_90","date":"2001-03-13T19:44:52"},{"version":"3.19","date":"2001-03-16T02:29:32"},{"version":"3.19_91","date":"2001-03-19T19:26:50"},{"version":"3.19_92","date":"2001-03-26T15:37:39"},{"version":"3.19_93","date":"2001-03-27T19:44:20"},{"date":"2001-03-30T08:24:11","version":"3.19_94"},{"date":"2001-04-03T00:18:14","version":"3.20"},{"version":"3.21","date":"2001-04-10T22:34:03"},{"version":"3.22","date":"2001-04-18T05:31:23"},{"date":"2001-05-02T04:18:51","version":"3.23"},{"date":"2001-05-05T06:18:21","version":"3.23"},{"date":"2001-05-09T07:23:34","version":"3.24"},{"version":"3.25","date":"2001-05-11T17:26:39"},{"date":"2001-06-12T08:35:06","version":"3.25"},{"version":"3.26","date":"2002-03-17T20:11:55"},{"version":"3.27","date":"2003-01-18T13:08:01"},{"version":"3.28","date":"2003-04-17T03:56:32"},{"version":"3.29","date":"2003-08-15T06:11:17"},{"date":"2003-08-18T05:48:21","version":"3.30"},{"version":"3.31","date":"2003-08-19T14:56:07"},{"date":"2003-10-10T14:31:48","version":"3.32"},{"version":"3.33","date":"2003-10-14T10:53:29"},{"date":"2003-10-27T21:23:09","version":"3.34"},{"date":"2003-12-12T14:27:23","version":"3.35"},{"version":"3.36","date":"2004-04-01T12:21:44"},{"version":"3.37","date":"2004-11-10T18:56:54"},{"date":"2004-11-11T10:19:56","version":"3.38"},{"date":"2004-11-17T14:33:49","version":"3.39_90"},{"date":"2004-11-23T11:46:30","version":"3.39_91"},{"date":"2004-11-23T22:25:21","version":"3.39_92"},{"date":"2004-11-29T11:14:34","version":"3.40"},{"version":"3.41","date":"2004-11-30T09:30:56"},{"version":"3.42","date":"2004-12-04T11:54:54"},{"version":"3.43","date":"2004-12-06T09:19:28"},{"date":"2004-12-28T14:07:28","version":"3.44"},{"version":"3.45","date":"2005-01-06T09:09:45"},{"date":"2005-10-24T12:34:04","version":"3.46"},{"date":"2005-11-22T21:50:09","version":"3.47"},{"date":"2005-12-02T17:41:00","version":"3.48"},{"date":"2006-02-08T10:58:39","version":"3.49"},{"date":"2006-02-14T18:32:51","version":"3.50"},{"version":"3.51","date":"2006-03-22T09:26:15"},{"date":"2006-04-26T08:43:13","version":"3.52"},{"date":"2006-04-27T11:55:34","version":"3.53"},{"version":"3.54","date":"2006-04-28T08:21:04"},{"version":"3.55","date":"2006-07-10T09:16:22"},{"date":"2007-01-12T11:00:07","version":"3.56"},{"version":"3.57","date":"2008-11-16T21:45:07"},{"date":"2008-11-17T11:35:37","version":"3.58"},{"date":"2008-11-24T09:15:09","version":"3.59"},{"date":"2009-02-09T11:26:08","version":"3.60"},{"date":"2009-06-20T09:34:17","version":"3.61"},{"date":"2009-08-13T21:01:27","version":"3.62"},{"date":"2009-10-22T20:11:52","version":"3.63"},{"version":"3.64","date":"2009-10-25T12:24:11"},{"version":"3.65","date":"2010-04-04T20:44:00"},{"date":"2010-07-09T13:27:13","version":"3.66"},{"date":"2010-08-17T17:15:19","version":"3.67"},{"version":"3.68","date":"2010-09-01T21:28:52"},{"version":"3.69","date":"2011-10-15T15:35:01"},{"date":"2013-03-28T22:21:30","version":"3.70"},{"version":"3.71","date":"2013-05-08T22:23:29"},{"version":"3.72","date":"2016-01-19T17:44:02"},{"date":"2020-08-25T17:40:17","version":"3.73"},{"date":"2020-08-30T18:40:48","version":"3.74"},{"version":"3.75","date":"2020-08-30T19:58:22"},{"date":"2021-03-04T18:06:59","version":"3.76"},{"date":"2022-03-14T22:12:49","version":"3.77"},{"date":"2022-03-28T15:23:23","version":"3.78"},{"date":"2022-10-12T15:41:58","version":"3.79"},{"date":"2022-11-01T14:19:26","version":"3.80"},{"version":"3.81","date":"2023-01-31T03:13:18"},{"date":"2024-03-13T20:11:51","version":"3.82"},{"date":"2024-07-30T16:42:50","version":"3.83"}]},"Catalyst-Authentication-Store-LDAP":{"advisories":[{"reported":"2012-12-11","distribution":"Catalyst-Authentication-Store-LDAP","affected_versions":["<1.013"],"cves":[],"severity":"high","id":"CPANSA-Catalyst-Authentication-Store-LDAP-2012-01","fixed_versions":[">=1.013"],"description":"Incorrect password check binds to the unauthenticated user.\n","references":["https://rt.cpan.org/Public/Bug/Display.html?id=81908"]}],"main_module":"Catalyst::Authentication::Store::LDAP","versions":[{"date":"2008-02-05T18:18:24","version":"0.1000"},{"date":"2008-04-10T02:06:58","version":"0.1001"},{"version":"0.1002","date":"2008-07-09T20:45:43"},{"date":"2008-09-10T13:21:33","version":"0.1003"},{"date":"2008-10-22T01:57:27","version":"0.1003"},{"version":"0.1005","date":"2009-05-01T02:34:18"},{"date":"2009-12-11T18:54:26","version":"1.006"},{"date":"2010-03-19T10:07:13","version":"1.007"},{"date":"2010-04-03T03:04:13","version":"1.008"},{"version":"1.009","date":"2010-05-15T07:14:41"},{"version":"1.010","date":"2010-07-06T21:39:55"},{"version":"1.011","date":"2010-07-07T20:41:22"},{"date":"2010-10-05T08:11:56","version":"1.012"},{"version":"1.013","date":"2013-01-09T14:58:46"},{"version":"1.014","date":"2013-04-26T19:51:28"},{"version":"1.015","date":"2015-02-20T18:07:31"},{"date":"2016-02-11T17:50:52","version":"1.016"},{"date":"2021-05-26T09:59:28","version":"1.017"}]},"Mail-Audit":{"versions":[{"version":"1.0","date":"2000-03-25T11:22:17"},{"date":"2000-06-17T08:03:59","version":"1.1"},{"version":"1.2","date":"2000-06-17T10:56:28"},{"version":"1.3","date":"2000-06-17T11:13:20"},{"date":"2001-01-04T20:17:04","version":"1.4"},{"version":"1.5","date":"2001-01-07T14:23:39"},{"date":"2001-01-13T22:45:20","version":"1.6"},{"date":"2001-01-27T11:31:56","version":"1.7"},{"version":"1.8","date":"2001-02-12T16:34:27"},{"version":"1.9","date":"2001-03-21T21:35:00"},{"date":"2001-04-23T15:45:51","version":"1.10"},{"date":"2001-05-16T23:20:35","version":"1.11"},{"version":"2.0","date":"2001-12-10T21:02:24"},{"version":"2.1","date":"2002-03-04T19:59:38"},{"date":"2006-05-27T01:36:59","version":"2.200_01"},{"date":"2006-05-31T01:58:52","version":"2.200_02"},{"date":"2006-06-02T02:17:31","version":"2.200_03"},{"date":"2006-06-04T20:18:18","version":"2.200_04"},{"date":"2006-06-05T03:39:12","version":"2.200_05"},{"date":"2006-07-16T21:50:04","version":"2.201"},{"date":"2006-07-21T12:18:37","version":"2.202"},{"version":"2.203","date":"2006-07-22T00:53:55"},{"date":"2006-09-19T11:26:30","version":"2.210"},{"version":"2.211","date":"2006-09-19T11:38:19"},{"date":"2006-10-31T15:24:49","version":"2.212"},{"date":"2007-02-15T17:05:02","version":"2.213"},{"date":"2007-02-15T19:32:24","version":"2.214"},{"date":"2007-02-19T21:14:15","version":"2.215"},{"date":"2007-02-27T01:52:17","version":"2.216"},{"version":"2.217","date":"2007-03-05T17:16:08"},{"date":"2007-03-06T16:24:21","version":"2.218"},{"version":"2.219","date":"2007-06-14T22:28:51"},{"date":"2007-07-14T19:04:32","version":"2.220"},{"date":"2007-09-17T13:26:24","version":"2.221"},{"version":"2.222","date":"2007-11-02T03:23:46"},{"version":"2.223","date":"2008-04-17T20:32:32"},{"version":"2.224","date":"2009-09-18T17:22:37"},{"date":"2009-11-23T19:27:24","version":"2.225"},{"date":"2011-11-11T16:37:46","version":"2.226"},{"date":"2011-11-14T19:21:44","version":"2.227"},{"version":"2.228","date":"2013-09-29T01:21:47"}],"advisories":[{"cves":["CVE-2005-4536"],"distribution":"Mail-Audit","reported":"2005-12-31","affected_versions":[">0"],"description":"Mail::Audit module in libmail-audit-perl 2.1-5, when logging is enabled without a default log file specified, uses predictable log filenames, which allows local users to overwrite arbitrary files via a symlink attack on the [PID]-audit.log temporary file.\n","references":["http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=344029","http://www.debian.org/security/2006/dsa-960","http://secunia.com/advisories/18652","http://secunia.com/advisories/18656","http://www.securityfocus.com/bid/16434","http://www.vupen.com/english/advisories/2006/0378","https://exchange.xforce.ibmcloud.com/vulnerabilities/24380"],"id":"CPANSA-Mail-Audit-2005-4536","severity":null,"fixed_versions":[]}],"main_module":"Mail::Audit"},"SOAP-Lite":{"advisories":[{"affected_versions":["<1.15"],"distribution":"SOAP-Lite","reported":"2015-07-21","cves":["CVE-2015-8978"],"fixed_versions":[">=1.15"],"id":"CPANSA-SOAP-Lite-2015-01","description":"An example attack consists of defining 10 or more XML entities, each defined as consisting of 10 of the previous entity, with the document consisting of a single instance of the largest entity, which expands to one billion copies of the first entity. The amount of computer memory used for handling an external SOAP call would likely exceed that available to the process parsing the XML.\n","references":["https://metacpan.org/changes/distribution/SOAP-Lite","https://www.securityfocus.com/bid/94487","https://github.com/redhotpenguin/perl-soaplite/commit/6942fe0d281be1c32c5117605f9c4e8d44f51124"]},{"references":["https://metacpan.org/changes/distribution/SOAP-Lite"],"description":"Allows remote attackers to load arbitrary Perl functions by suppling a non-existent function in a script using a SOAP::Lite module, which causes the AUTOLOAD subroutine to trigger.\n","severity":"high","id":"CPANSA-SOAP-Lite-2002-01","fixed_versions":[">=0.55"],"cves":["CVE-2002-1742"],"distribution":"SOAP-Lite","reported":"2002-04-08","affected_versions":["<0.55"]},{"reported":"2000-10-05","distribution":"SOAP-Lite","affected_versions":["<0.38"],"cves":[],"id":"CPANSA-SOAP-Lite-2000-01","fixed_versions":[">=0.38"],"description":"Security problem on server side (no more details).\n","references":["https://metacpan.org/changes/distribution/SOAP-Lite"]}],"main_module":"SOAP::Lite","versions":[{"version":"0.36","date":"2000-09-25T01:49:14"},{"date":"2000-10-06T01:58:32","version":"0.38"},{"version":"0.39","date":"2000-10-09T04:27:51"},{"version":"0.40","date":"2000-10-16T05:12:09"},{"date":"2000-10-31T15:10:52","version":"0.41"},{"version":"0.42","date":"2000-11-15T15:00:57"},{"version":"0.43","date":"2000-11-28T20:43:40"},{"date":"2000-12-13T07:37:47","version":"0.44"},{"date":"2001-01-17T17:28:31","version":"0.45"},{"date":"2001-02-01T02:23:51","version":"0.46"},{"date":"2001-02-22T07:28:20","version":"0.47"},{"version":"0.50","date":"2001-04-18T19:09:15"},{"date":"2001-07-18T22:39:30","version":"0.51"},{"version":"0.52","date":"2001-11-21T19:35:24"},{"date":"2002-04-16T05:20:54","version":"0.55"},{"version":"0.60","date":"2003-10-28T19:27:00"},{"date":"2004-02-26T16:36:26","version":"0.60"},{"date":"2005-02-22T01:57:43","version":"0.65_3"},{"version":"0.65_4","date":"2005-04-03T09:20:17"},{"date":"2005-05-06T17:24:23","version":"0.65_5"},{"date":"2005-06-03T19:23:20","version":"0.65_6"},{"version":"0.66","date":"2005-12-25T08:42:50"},{"version":"0.66.1","date":"2006-01-04T23:14:27"},{"version":"0.67","date":"2006-01-27T21:43:49"},{"version":"0.68","date":"2006-07-06T18:18:56"},{"date":"2006-08-16T14:53:50","version":"0.69"},{"version":"0.70_01","date":"2007-10-18T20:54:02"},{"version":"0.70_02","date":"2007-11-08T21:30:41"},{"version":"0.70_03","date":"2007-11-18T19:00:11"},{"date":"2008-01-02T17:06:17","version":"0.70_04"},{"date":"2008-02-13T12:28:07","version":"0.70_05"},{"version":"0.70_06","date":"2008-02-16T10:37:04"},{"version":"0.70_07","date":"2008-02-25T21:44:41"},{"date":"2008-02-25T21:50:22","version":"0.70_08"},{"version":"0.71","date":"2008-02-28T21:58:13"},{"version":"0.71.01","date":"2008-03-29T14:13:41"},{"date":"2008-04-14T17:25:25","version":"0.71.02"},{"date":"2008-04-17T20:40:23","version":"v0.71.03"},{"version":"0.71.04","date":"2008-04-22T06:03:55"},{"version":"0.710.05","date":"2008-05-05T21:50:36"},{"date":"2008-06-05T18:47:08","version":"0.710.06"},{"version":"0.710.07","date":"2008-06-13T20:27:05"},{"version":"0.710.08","date":"2008-07-13T20:41:11"},{"version":"0.710.09","date":"2009-09-29T21:20:02"},{"version":"0.710.10","date":"2009-09-30T18:40:30"},{"version":"0.711","date":"2010-03-18T20:24:42"},{"version":"0.712","date":"2010-06-03T15:41:39"},{"date":"2011-08-16T17:53:28","version":"0.713"},{"date":"2011-08-18T19:51:02","version":"0.714"},{"version":"0.715","date":"2012-07-15T09:37:20"},{"version":"0.716","date":"2013-05-11T06:44:04"},{"date":"2013-07-17T06:17:00","version":"1.0"},{"version":"1.01","date":"2013-07-29T08:26:07"},{"version":"1.02","date":"2013-07-30T02:20:34"},{"date":"2013-08-04T17:49:18","version":"1.03"},{"date":"2013-08-10T03:46:49","version":"1.04"},{"version":"1.05","date":"2013-08-19T05:31:17"},{"date":"2013-08-22T04:20:29","version":"1.06"},{"version":"1.07","date":"2013-11-08T03:09:10"},{"version":"1.08","date":"2013-11-08T17:41:10"},{"version":"1.09","date":"2014-01-14T21:41:07"},{"version":"1.10","date":"2014-01-23T18:53:42"},{"date":"2014-02-22T05:18:14","version":"1.11"},{"version":"1.12","date":"2014-11-27T07:08:11"},{"date":"2014-12-30T15:58:06","version":"1.13"},{"version":"1.14","date":"2015-03-25T05:04:34"},{"version":"1.15","date":"2015-07-21T18:12:21"},{"date":"2015-07-23T07:34:59","version":"1.16"},{"version":"1.17","date":"2015-07-31T05:59:50"},{"date":"2015-08-26T04:31:24","version":"1.18"},{"version":"1.19","date":"2015-08-26T15:38:01"},{"date":"2016-06-09T21:34:36","version":"1.20"},{"date":"2017-08-16T05:18:24","version":"1.22"},{"date":"2017-12-19T02:30:48","version":"1.23"},{"version":"1.24","date":"2017-12-19T18:36:52"},{"date":"2017-12-29T18:39:43","version":"1.25"},{"version":"1.26","date":"2017-12-30T22:19:12"},{"date":"2018-05-14T20:36:08","version":"1.27"}]},"Apache-SessionX":{"main_module":"Apache::SessionX","advisories":[{"id":"CPANSA-Apache-SessionX-2005-01","fixed_versions":[">=2.01"],"references":["https://metacpan.org/changes/distribution/Apache-SessionX"],"description":"Problem in session_id validation, which allows creation of session with invalid ids.\n","distribution":"Apache-SessionX","reported":"2005-11-15","affected_versions":["<2.01"],"cves":[]}],"versions":[{"date":"2001-11-20T15:36:53","version":"2.00"},{"version":"2.00","date":"2003-03-02T14:18:57"},{"version":"2.01","date":"2005-11-15T05:21:49"}]},"PlRPC":{"main_module":"Bundle::PlRPC","advisories":[{"cves":["CVE-2013-7284"],"affected_versions":["<=0.2020"],"distribution":"PlRPC","reported":"2014-04-29","references":["https://bugzilla.redhat.com/show_bug.cgi?id=1051108","http://seclists.org/oss-sec/2014/q1/56","http://seclists.org/oss-sec/2014/q1/62","https://bugzilla.redhat.com/show_bug.cgi?id=1030572","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734789","https://rt.cpan.org/Public/Bug/Display.html?id=90474"],"description":"The PlRPC module, possibly 0.2020 and earlier, for Perl uses the Storable module, which allows remote attackers to execute arbitrary code via a crafted request, which is not properly handled when it is deserialized.\n","fixed_versions":[],"severity":null,"id":"CPANSA-PlRPC-2013-7284"}],"versions":[{"version":"0.2001","date":"1998-10-28T23:03:06"},{"date":"1999-01-15T09:26:43","version":"0.2003"},{"version":"0.2010","date":"1999-04-09T21:18:22"},{"date":"1999-06-21T09:10:10","version":"0.2004"},{"date":"1999-06-21T09:26:45","version":"0.2011"},{"version":"0.2012","date":"1999-06-26T16:21:38"},{"version":"0.2013","date":"2001-01-23T08:17:41"},{"date":"2001-01-23T15:57:05","version":"0.2014"},{"date":"2001-03-26T13:10:50","version":"0.2015"},{"version":"0.2016","date":"2001-10-01T02:45:21"},{"date":"2003-06-09T08:55:18","version":"0.2017"},{"date":"2004-07-27T07:47:32","version":"0.2018"},{"version":"0.2018","date":"2007-05-22T20:56:36"},{"date":"2007-06-17T20:00:21","version":"0.2018"},{"date":"2012-01-27T16:55:27","version":"0.2021_01"}]},"perl-ldap":{"advisories":[{"cves":["CVE-2020-16093"],"affected_versions":[">0"],"reported":"2022-07-18","distribution":"perl-ldap","references":["https://lemonldap-ng.org/download","https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2250","https://rt.cpan.org/Ticket/Display.html?id=131045"],"description":"In LemonLDAP::NG (aka lemonldap-ng) through 2.0.8, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used.\n","fixed_versions":[],"severity":null,"id":"CPANSA-Net-LDAPS-2020-16093"}],"main_module":"Net::LDAP","versions":[{"version":"1.08","date":"1998-10-31T01:14:57"},{"date":"1998-10-31T01:19:38","version":"0.08"},{"version":"0.09","date":"1998-12-23T01:16:35"},{"version":"0.10","date":"1999-03-18T02:58:45"},{"version":"0.11","date":"1999-04-18T22:10:20"},{"version":"0.12","date":"1999-06-28T02:40:38"},{"date":"1999-08-15T23:27:41","version":"0.13"},{"version":"0.14","date":"2000-02-14T10:34:19"},{"date":"2000-03-22T10:46:21","version":"0.15"},{"date":"2000-04-27T17:02:43","version":"0.16"},{"date":"2000-05-12T10:16:37","version":"0.17"},{"version":"0.18","date":"2000-05-22T14:53:07"},{"version":"0.19","date":"2000-06-08T08:30:48"},{"version":"0.20","date":"2000-08-03T17:07:52"},{"version":"0.21","date":"2000-09-12T09:32:12"},{"date":"2000-09-14T19:08:19","version":"0.22"},{"version":"0.23","date":"2001-04-19T23:25:47"},{"date":"2001-07-17T13:01:04","version":"0.24"},{"date":"2001-08-25T08:15:47","version":"0.2401"},{"date":"2001-10-29T17:35:12","version":"0.25"},{"date":"2002-05-28T07:49:00","version":"0.251"},{"version":"0.26","date":"2002-07-18T13:13:03"},{"date":"2003-01-27T14:48:49","version":"0.27"},{"version":"0.2701","date":"2003-01-27T18:26:51"},{"version":"0.28","date":"2003-05-19T22:40:30"},{"date":"2003-06-24T10:21:09","version":"0.29"},{"version":"0.30","date":"2003-10-17T21:42:36"},{"version":"0.31","date":"2004-01-01T10:47:23"},{"date":"2004-07-01T15:59:03","version":"0.32"},{"version":"0.3201","date":"2004-07-14T21:00:39"},{"date":"2004-07-19T18:24:58","version":"0.3202"},{"version":"0.33","date":"2005-04-25T23:02:59"},{"version":"0.34","date":"2007-02-10T23:53:48"},{"date":"2008-03-30T18:58:37","version":"0.35"},{"date":"2008-04-21T15:21:03","version":"0.36"},{"version":"0.37","date":"2008-08-28T13:02:29"},{"version":"0.38","date":"2008-09-21T14:28:08"},{"date":"2008-10-27T20:10:12","version":"0.39"},{"date":"2010-03-12T03:03:48","version":"0.40"},{"date":"2010-03-24T20:01:45","version":"0.4001"},{"date":"2011-09-03T12:44:01","version":"0.41"},{"date":"2011-09-03T12:48:31","version":"0.42"},{"date":"2011-09-03T17:55:11","version":"0.43"},{"date":"2012-01-29T09:55:22","version":"0.44"},{"date":"2012-09-05T09:46:44","version":"0.45"},{"version":"0.46","date":"2012-09-05T16:17:53"},{"date":"2012-09-16T10:06:08","version":"0.47"},{"date":"2012-09-20T08:58:48","version":"0.48"},{"date":"2012-10-06T08:15:30","version":"0.49"},{"version":"0.50_01","date":"2012-11-17T17:10:16"},{"version":"0.50","date":"2012-11-24T12:11:37"},{"date":"2012-12-01T13:39:38","version":"0.51"},{"date":"2013-01-01T13:03:26","version":"0.52"},{"version":"0.53","date":"2013-01-26T17:43:28"},{"version":"0.54","date":"2013-03-29T11:25:51"},{"version":"0.55","date":"2013-04-23T09:38:16"},{"date":"2013-06-08T11:31:48","version":"0.56"},{"date":"2013-07-21T17:04:36","version":"0.57"},{"version":"0.58","date":"2013-12-23T16:50:28"},{"version":"0.59","date":"2014-03-04T17:17:26"},{"version":"0.60","date":"2014-03-08T13:14:49"},{"version":"0.61","date":"2014-03-29T16:44:29"},{"version":"0.62","date":"2014-04-06T09:39:40"},{"date":"2014-06-01T10:58:37","version":"0.63"},{"version":"0.64","date":"2014-06-19T15:59:40"},{"version":"0.65","date":"2015-04-06T18:02:34"},{"version":"0.66","date":"2019-04-16T09:42:54"},{"version":"0.67","date":"2020-12-26T14:37:52"},{"version":"0.68","date":"2021-01-03T17:37:50"}]},"POE-Component-IRC":{"versions":[{"version":"1.0","date":"2001-01-14T01:08:55"},{"version":"1.0","date":"2001-02-21T23:20:30"},{"date":"2001-03-02T11:10:34","version":"1.1"},{"date":"2001-05-24T09:39:58","version":"1.2"},{"date":"2001-07-01T00:29:06","version":"1.3"},{"date":"2001-07-03T00:23:58","version":"1.4"},{"date":"2001-07-05T22:29:01","version":"1.5"},{"date":"2001-07-07T02:07:09","version":"1.6"},{"version":"1.7","date":"2001-07-21T08:09:18"},{"version":"1.8","date":"2001-12-11T00:06:53"},{"date":"2001-12-13T07:07:40","version":"1.9"},{"version":"2.0","date":"2002-02-22T23:26:52"},{"version":"2.1","date":"2002-03-05T01:19:43"},{"version":"2.2","date":"2002-05-24T20:54:40"},{"version":"2.3","date":"2002-09-06T15:29:09"},{"version":"2.4","date":"2002-10-10T21:24:56"},{"date":"2002-10-27T19:02:42","version":"2.5"},{"date":"2002-12-12T04:30:15","version":"2.6"},{"version":"2.7","date":"2003-02-02T23:23:52"},{"version":"2.8","date":"2003-06-07T23:25:07"},{"date":"2003-07-19T20:38:58","version":"2.9"},{"date":"2004-12-31T13:57:37","version":"3.0"},{"version":"3.1","date":"2005-01-21T12:36:21"},{"date":"2005-02-02T11:58:41","version":"3.2"},{"version":"3.3","date":"2005-02-02T14:17:25"},{"date":"2005-02-18T15:40:19","version":"3.4"},{"version":"3.4","date":"2005-02-23T13:35:13"},{"version":"3.4","date":"2005-03-01T18:10:05"},{"date":"2005-03-04T17:53:49","version":"3.4"},{"version":"3.4","date":"2005-03-14T10:31:33"},{"version":"3.4","date":"2005-03-21T09:24:00"},{"date":"2005-04-05T09:50:19","version":"4.0"},{"date":"2005-04-11T10:31:43","version":"4.1"},{"date":"2005-04-14T19:46:49","version":"4.2"},{"date":"2005-04-20T08:35:06","version":"4.3"},{"date":"2005-04-28T14:23:29","version":"4.4"},{"date":"2005-05-22T15:26:46","version":"4.5"},{"date":"2005-06-01T14:33:57","version":"4.6"},{"version":"4.61","date":"2005-06-02T09:53:57"},{"version":"4.62","date":"2005-06-02T15:47:47"},{"version":"4.63","date":"2005-06-16T21:03:43"},{"date":"2005-07-05T15:28:06","version":"4.64"},{"date":"2005-07-13T16:52:52","version":"4.65"},{"date":"2005-07-28T17:16:01","version":"4.66"},{"version":"4.67","date":"2005-08-25T13:31:53"},{"date":"2005-09-02T12:35:28","version":"4.68"},{"date":"2005-09-05T11:27:29","version":"4.69"},{"version":"4.70","date":"2005-09-16T15:59:06"},{"date":"2005-10-13T18:10:10","version":"4.71"},{"version":"4.72","date":"2005-10-25T18:07:42"},{"date":"2005-10-26T06:43:59","version":"4.73"},{"version":"4.74","date":"2005-10-26T08:21:25"},{"date":"2005-12-04T17:50:30","version":"4.75"},{"date":"2005-12-23T15:22:40","version":"4.76"},{"version":"4.77","date":"2005-12-26T17:08:35"},{"date":"2006-01-10T22:07:46","version":"4.78"},{"date":"2006-01-15T17:09:57","version":"4.79"},{"version":"4.80","date":"2006-03-16T16:53:54"},{"date":"2006-03-31T16:02:38","version":"4.81"},{"version":"4.82","date":"2006-04-11T18:38:36"},{"date":"2006-04-11T19:50:58","version":"4.83"},{"date":"2006-04-12T13:40:40","version":"4.84"},{"version":"4.85","date":"2006-04-13T11:43:55"},{"date":"2006-04-27T20:45:17","version":"4.86"},{"version":"4.87","date":"2006-05-06T16:13:30"},{"version":"4.88","date":"2006-05-21T17:09:49"},{"date":"2006-05-22T08:21:25","version":"4.89"},{"date":"2006-05-22T12:56:03","version":"4.90"},{"version":"4.91","date":"2006-06-01T20:15:32"},{"date":"2006-06-11T17:15:17","version":"4.92"},{"version":"4.93","date":"2006-06-13T18:29:21"},{"version":"4.94","date":"2006-07-02T09:10:52"},{"date":"2006-07-05T10:47:35","version":"4.95"},{"date":"2006-07-16T13:37:50","version":"4.96"},{"version":"4.97","date":"2006-07-24T11:55:01"},{"version":"4.98","date":"2006-08-18T11:39:13"},{"version":"4.99","date":"2006-08-29T16:57:17"},{"date":"2006-09-01T01:32:30","version":"5.00"},{"version":"5.01","date":"2006-09-07T17:03:08"},{"version":"5.02","date":"2006-09-08T15:45:55"},{"date":"2006-09-16T13:33:43","version":"5.03"},{"version":"5.04","date":"2006-09-25T12:40:35"},{"date":"2006-10-06T14:02:37","version":"5.05"},{"date":"2006-10-12T12:29:17","version":"5.06"},{"version":"5.07","date":"2006-10-17T10:57:25"},{"date":"2006-10-23T12:43:37","version":"5.08"},{"date":"2006-10-24T14:15:06","version":"5.09"},{"version":"5.10","date":"2006-10-24T17:18:06"},{"version":"5.11","date":"2006-10-25T15:51:16"},{"version":"5.12","date":"2006-11-16T14:01:15"},{"date":"2006-11-19T14:34:09","version":"5.13"},{"version":"5.14","date":"2006-11-29T11:10:54"},{"version":"5.15","date":"2006-12-05T19:42:12"},{"date":"2006-12-06T12:27:38","version":"5.16"},{"version":"5.17","date":"2006-12-12T23:09:26"},{"version":"5.18","date":"2006-12-29T11:08:52"},{"version":"5.19","date":"2007-01-31T12:06:39"},{"version":"5.20","date":"2007-01-31T17:37:46"},{"date":"2007-02-01T12:39:18","version":"5.21"},{"date":"2007-02-02T12:55:07","version":"5.22"},{"date":"2007-04-12T15:28:46","version":"5.23"},{"date":"2007-04-16T12:51:48","version":"5.24"},{"date":"2007-04-29T12:19:32","version":"5.25"},{"version":"5.26","date":"2007-04-29T14:33:13"},{"date":"2007-05-01T13:21:57","version":"5.27"},{"date":"2007-05-01T14:14:27","version":"5.28"},{"version":"5.29","date":"2007-05-03T12:51:34"},{"date":"2007-05-08T18:38:59","version":"5.30"},{"date":"2007-05-18T09:26:43","version":"5.31_01"},{"version":"5.31_02","date":"2007-05-31T15:25:34"},{"version":"5.31_03","date":"2007-06-01T10:02:23"},{"version":"5.31_04","date":"2007-06-05T08:46:20"},{"date":"2007-06-11T09:30:57","version":"5.31_05"},{"version":"5.32","date":"2007-06-12T11:28:18"},{"version":"5.33_01","date":"2007-07-10T17:11:05"},{"version":"5.34","date":"2007-07-25T10:01:32"},{"version":"5.36","date":"2007-11-01T14:32:47"},{"date":"2007-12-05T21:26:00","version":"5.37_01"},{"date":"2007-12-06T08:53:09","version":"5.37_02"},{"version":"5.38","date":"2007-12-06T17:35:01"},{"version":"5.40","date":"2007-12-26T11:03:08"},{"version":"5.42","date":"2007-12-31T12:44:42"},{"date":"2008-01-01T14:10:56","version":"5.44"},{"version":"5.46","date":"2008-01-03T15:21:36"},{"version":"5.48","date":"2008-01-10T20:32:12"},{"date":"2008-01-13T10:30:41","version":"5.50"},{"version":"5.52","date":"2008-01-14T08:06:32"},{"date":"2008-01-27T09:43:44","version":"5.54"},{"version":"5.56","date":"2008-01-31T13:13:54"},{"date":"2008-02-04T08:13:31","version":"5.58"},{"version":"5.60","date":"2008-02-06T13:54:09"},{"version":"5.62","date":"2008-02-07T16:42:54"},{"date":"2008-02-16T08:35:10","version":"5.64"},{"version":"5.66","date":"2008-02-18T22:11:13"},{"version":"5.68","date":"2008-02-20T20:00:00"},{"version":"5.70","date":"2008-03-03T10:51:33"},{"version":"5.72","date":"2008-03-21T10:56:45"},{"version":"5.74","date":"2008-04-02T15:23:28"},{"date":"2008-04-24T15:13:29","version":"5.76"},{"version":"5.78","date":"2008-05-30T07:16:00"},{"version":"5.80","date":"2008-06-12T15:42:21"},{"version":"5.82","date":"2008-06-14T08:49:07"},{"date":"2008-06-26T19:16:22","version":"5.84"},{"version":"5.86","date":"2008-07-22T09:11:40"},{"version":"5.88","date":"2008-08-28T15:06:57"},{"date":"2009-01-22T11:04:20","version":"5.90"},{"version":"5.92","date":"2009-01-27T13:08:53"},{"version":"5.94","date":"2009-01-27T21:56:50"},{"date":"2009-01-28T12:02:40","version":"5.96"},{"date":"2009-03-02T23:16:08","version":"5.98"},{"date":"2009-03-04T23:31:34","version":"6.00"},{"date":"2009-03-06T11:07:07","version":"6.02"},{"date":"2009-03-07T23:41:08","version":"6.04"},{"date":"2009-04-11T09:24:16","version":"6.05_01"},{"version":"6.06","date":"2009-04-30T12:12:52"},{"date":"2009-05-29T11:58:02","version":"6.08"},{"date":"2009-07-09T20:20:10","version":"6.09_01"},{"version":"6.09_02","date":"2009-07-10T09:17:48"},{"date":"2009-07-10T14:24:17","version":"6.09_03"},{"date":"2009-07-12T20:52:44","version":"6.09_04"},{"date":"2009-07-16T14:20:12","version":"6.09_05"},{"version":"6.09_06","date":"2009-07-17T10:23:41"},{"version":"6.09_07","date":"2009-07-21T06:26:37"},{"version":"6.09_08","date":"2009-07-27T12:19:55"},{"version":"6.09_09","date":"2009-07-29T11:16:27"},{"date":"2009-07-30T13:40:56","version":"6.09_10"},{"version":"6.09_11","date":"2009-08-07T12:59:58"},{"version":"6.10","date":"2009-08-14T20:49:04"},{"date":"2009-08-19T09:21:27","version":"6.11_01"},{"date":"2009-09-10T09:00:17","version":"6.12"},{"date":"2009-09-24T15:13:45","version":"6.14"},{"version":"6.16","date":"2009-10-11T09:02:32"},{"date":"2009-12-11T19:28:22","version":"6.18"},{"version":"6.20","date":"2010-01-15T18:42:20"},{"version":"6.22","date":"2010-01-20T01:54:34"},{"version":"6.24","date":"2010-02-12T02:47:46"},{"date":"2010-03-14T07:34:45","version":"6.26"},{"date":"2010-03-14T10:57:17","version":"6.28"},{"version":"6.30","date":"2010-05-10T14:40:23"},{"version":"6.32","date":"2010-05-11T13:45:23"},{"date":"2010-06-21T20:28:42","version":"6.33"},{"version":"6.34","date":"2010-06-25T18:17:14"},{"version":"6.35","date":"2010-06-27T09:33:18"},{"date":"2010-07-26T03:54:08","version":"6.36"},{"date":"2010-08-17T23:08:39","version":"6.37"},{"version":"6.38","date":"2010-09-03T18:33:58"},{"version":"6.39","date":"2010-09-04T02:16:21"},{"date":"2010-09-09T06:56:17","version":"6.40"},{"date":"2010-09-23T21:34:09","version":"6.41"},{"date":"2010-09-25T09:40:47","version":"6.42"},{"version":"6.43","date":"2010-09-25T21:30:54"},{"date":"2010-09-25T23:35:19","version":"6.44"},{"version":"6.45","date":"2010-09-26T03:42:36"},{"date":"2010-09-29T04:59:09","version":"6.46"},{"version":"6.47","date":"2010-10-03T15:29:13"},{"date":"2010-10-03T19:50:31","version":"6.48"},{"date":"2010-10-16T19:05:02","version":"6.49"},{"date":"2010-11-03T02:06:04","version":"6.50"},{"date":"2010-11-05T11:29:30","version":"6.51"},{"date":"2010-11-05T17:26:55","version":"6.52"},{"date":"2011-03-10T15:39:11","version":"6.53"},{"version":"6.54","date":"2011-03-10T18:21:18"},{"date":"2011-04-01T18:38:19","version":"6.55"},{"date":"2011-04-01T20:05:44","version":"6.56"},{"version":"6.57","date":"2011-04-02T03:41:42"},{"version":"6.58","date":"2011-04-04T17:52:07"},{"version":"6.59","date":"2011-04-04T20:23:21"},{"date":"2011-04-15T06:13:37","version":"6.60"},{"date":"2011-04-19T17:04:11","version":"6.61"},{"version":"6.62","date":"2011-05-03T11:00:14"},{"date":"2011-05-15T05:08:04","version":"6.63"},{"version":"6.64","date":"2011-05-15T10:00:34"},{"version":"6.65","date":"2011-05-19T01:55:49"},{"date":"2011-05-19T22:33:07","version":"6.66"},{"version":"6.67","date":"2011-05-22T16:45:17"},{"date":"2011-05-22T17:02:27","version":"6.68"},{"date":"2011-07-29T01:54:20","version":"6.69"},{"date":"2011-08-02T03:40:17","version":"6.70"},{"version":"6.71","date":"2011-09-18T16:08:38"},{"version":"6.72","date":"2011-10-07T15:42:11"},{"version":"6.73","date":"2011-10-08T04:41:24"},{"version":"6.74","date":"2011-10-09T20:16:25"},{"date":"2011-11-13T14:26:23","version":"6.75"},{"date":"2011-11-29T03:25:52","version":"6.76"},{"date":"2011-12-02T03:56:47","version":"6.77"},{"date":"2011-12-07T20:30:42","version":"6.78"},{"date":"2012-09-19T13:26:08","version":"6.79"},{"date":"2012-09-20T08:55:35","version":"6.80"},{"version":"6.81","date":"2012-11-23T15:56:03"},{"date":"2013-03-09T22:17:24","version":"6.82"},{"version":"6.83","date":"2013-05-27T09:43:25"},{"version":"6.84","date":"2014-06-17T09:47:20"},{"version":"6.85","date":"2014-06-19T09:22:12"},{"version":"6.86","date":"2014-06-20T10:14:59"},{"version":"6.87","date":"2014-06-21T14:09:46"},{"version":"6.88","date":"2014-06-28T12:16:18"},{"version":"6.89","date":"2017-09-05T18:14:17"},{"date":"2017-09-05T18:19:13","version":"6.90"},{"version":"6.91","date":"2021-06-05T12:55:31"},{"date":"2021-06-08T13:32:11","version":"6.92"},{"version":"6.93","date":"2021-06-15T18:29:10"}],"advisories":[{"cves":["CVE-2010-3438"],"distribution":"POE-Component-IRC","reported":"2019-11-12","affected_versions":["<6.32"],"references":["https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=581194","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-3438","https://security-tracker.debian.org/tracker/CVE-2010-3438"],"description":"libpoe-component-irc-perl before v6.32 does not remove carriage returns and line feeds. This can be used to execute arbitrary IRC commands by passing an argument such as \\\"some text\\\\rQUIT\\\" to the 'privmsg' handler, which would cause the client to disconnect from the server.\n","severity":"critical","id":"CPANSA-Poe-Component-IRC-2010-3438","fixed_versions":[]}],"main_module":"POE::Component::IRC"},"File-DataClass":{"advisories":[{"description":"Loading modules from . (current directory).\n","references":["https://metacpan.org/changes/distribution/File-DataClass"],"fixed_versions":[">=0.72.1"],"id":"CPANSA-File-DataClass-2017-01","cves":["CVE-2016-1238"],"affected_versions":["<0.72.1"],"reported":"2017-04-01","distribution":"File-DataClass"}],"main_module":"File::DataClass","versions":[{"version":"0.1.228","date":"2010-09-29T16:37:04"},{"version":"0.2.234","date":"2010-10-06T14:20:31"},{"version":"0.3.238","date":"2011-01-26T18:14:50"},{"date":"2011-02-27T23:09:38","version":"0.3.239"},{"date":"2011-04-12T19:44:59","version":"0.3.259"},{"version":"0.4.268","date":"2011-05-15T17:45:09"},{"date":"2011-05-30T01:47:40","version":"0.5.271"},{"date":"2011-07-11T13:39:10","version":"0.6.286"},{"version":"0.7.321","date":"2011-11-30T00:05:18"},{"version":"0.7.325","date":"2011-12-02T04:40:20"},{"version":"0.7.326","date":"2011-12-02T22:39:25"},{"version":"0.7.328","date":"2011-12-03T18:43:58"},{"date":"2012-02-22T18:28:29","version":"0.7.330"},{"date":"2012-02-23T11:00:24","version":"0.7.331"},{"date":"2012-02-24T10:52:18","version":"0.7.332"},{"version":"0.7.335","date":"2012-03-12T17:34:58"},{"date":"2012-03-20T18:24:26","version":"0.7.336"},{"date":"2012-03-21T22:43:50","version":"0.7.338"},{"date":"2012-03-22T13:48:59","version":"0.7.339"},{"date":"2012-03-24T00:37:31","version":"0.7.343"},{"date":"2012-03-28T23:58:41","version":"0.8.351"},{"date":"2012-03-29T22:05:21","version":"0.8.355"},{"version":"0.8.357","date":"2012-04-03T00:26:12"},{"date":"2012-04-04T15:19:03","version":"0.8.360"},{"date":"2012-04-17T18:57:01","version":"0.9.368"},{"date":"2012-05-19T21:05:56","version":"0.10.380"},{"date":"2012-07-10T00:34:23","version":"0.11.401"},{"date":"2012-09-02T13:43:37","version":"0.12.406"},{"version":"0.12.409","date":"2012-09-06T14:02:06"},{"version":"0.13.416","date":"2012-11-07T07:49:39"},{"version":"0.13.418","date":"2012-11-13T20:16:27"},{"date":"2012-12-12T23:25:16","version":"0.13.420"},{"version":"0.13.421","date":"2012-12-14T17:58:08"},{"version":"0.13.422","date":"2012-12-19T22:23:08"},{"date":"2012-12-21T20:48:41","version":"0.13.424"},{"version":"0.13.427","date":"2012-12-30T03:05:28"},{"date":"2013-01-07T00:52:48","version":"0.14.429"},{"date":"2013-04-01T01:14:44","version":"0.15.431"},{"version":"0.15.434","date":"2013-04-02T14:21:13"},{"version":"v0.16.438","date":"2013-04-14T16:15:55"},{"date":"2013-04-15T20:42:56","version":"v0.16.442"},{"version":"v0.16.445","date":"2013-04-24T03:47:54"},{"date":"2013-04-29T17:12:37","version":"v0.17.450"},{"date":"2013-04-30T22:15:36","version":"v0.18.6"},{"date":"2013-05-02T14:14:57","version":"v0.19.1"},{"version":"v0.20.6","date":"2013-05-07T23:33:06"},{"version":"v0.20.7","date":"2013-05-10T14:58:03"},{"date":"2013-05-14T13:32:28","version":"v0.20.8"},{"version":"v0.20.9","date":"2013-05-15T20:03:34"},{"date":"2013-05-16T00:11:50","version":"v0.20.10"},{"date":"2013-05-17T16:07:41","version":"v0.20.12"},{"date":"2013-06-08T13:26:40","version":"v0.20.13"},{"date":"2013-07-28T17:41:14","version":"v0.22.1"},{"version":"v0.22.2","date":"2013-07-29T11:39:49"},{"date":"2013-07-29T11:46:28","version":"v0.22.3"},{"version":"v0.22.4","date":"2013-07-29T18:37:14"},{"date":"2013-07-30T10:19:23","version":"v0.22.5"},{"version":"v0.22.7","date":"2013-07-30T16:25:59"},{"date":"2013-07-31T09:54:30","version":"v0.22.8"},{"version":"v0.22.9","date":"2013-08-02T19:06:49"},{"version":"v0.23.1","date":"2013-08-06T17:19:31"},{"date":"2013-08-07T13:14:13","version":"v0.23.2"},{"version":"0.24.1","date":"2013-08-13T18:01:24"},{"date":"2013-08-16T22:49:23","version":"0.24.3"},{"version":"0.25.1","date":"2013-09-03T13:11:17"},{"version":"0.26.1","date":"2013-09-26T16:04:18"},{"version":"0.27.1","date":"2013-11-22T09:42:00"},{"version":"0.28.1","date":"2014-01-01T15:02:23"},{"version":"0.29.1","date":"2014-01-01T17:03:18"},{"version":"0.30.1","date":"2014-01-02T02:33:28"},{"date":"2014-01-13T18:41:29","version":"0.31.1"},{"date":"2014-01-24T20:56:21","version":"0.33.1"},{"version":"0.34.1","date":"2014-04-04T10:52:59"},{"version":"0.35.1","date":"2014-05-01T14:40:32"},{"version":"0.36.1","date":"2014-05-13T10:03:54"},{"version":"0.37.1","date":"2014-05-13T21:08:07"},{"date":"2014-05-15T00:11:43","version":"0.38.1"},{"date":"2014-05-16T08:19:01","version":"0.39.1"},{"date":"2014-05-22T09:37:34","version":"0.40.1"},{"date":"2014-05-22T14:10:49","version":"0.40.2"},{"date":"2014-05-28T10:28:42","version":"0.41.1"},{"date":"2014-07-03T23:27:53","version":"0.42.1"},{"date":"2014-07-04T09:25:10","version":"0.42.2"},{"date":"2014-07-04T12:19:02","version":"0.43.1"},{"version":"0.44.1","date":"2014-07-16T12:39:03"},{"date":"2014-08-18T23:00:05","version":"0.45.1"},{"version":"0.45.5","date":"2014-08-26T12:43:14"},{"date":"2014-08-26T16:41:35","version":"0.46.1"},{"version":"0.47.1","date":"2014-08-27T16:17:50"},{"version":"0.48.1","date":"2014-09-03T22:25:51"},{"date":"2014-10-02T17:39:13","version":"0.48.3"},{"date":"2014-10-02T19:59:28","version":"0.49.1"},{"version":"0.50.1","date":"2014-11-07T18:51:52"},{"date":"2014-11-08T21:45:45","version":"0.50.2"},{"date":"2014-11-09T13:19:50","version":"0.50.3"},{"version":"0.51.1","date":"2014-11-09T15:52:41"},{"version":"0.52.1","date":"2014-11-10T12:44:49"},{"version":"0.53.1","date":"2014-12-19T11:49:49"},{"version":"0.54.1","date":"2014-12-19T22:54:41"},{"version":"0.55.1","date":"2015-02-05T00:04:33"},{"date":"2015-03-19T14:59:03","version":"0.56.1"},{"version":"0.57.1","date":"2015-04-04T20:00:58"},{"date":"2015-04-04T20:16:31","version":"0.58.1"},{"date":"2015-04-05T17:58:31","version":"0.59.1"},{"date":"2015-04-08T23:10:28","version":"0.60.1"},{"version":"0.61.1","date":"2015-05-11T12:15:05"},{"date":"2015-05-24T11:52:28","version":"0.62.1"},{"date":"2015-06-21T21:42:17","version":"0.63.1"},{"date":"2015-08-29T08:58:54","version":"0.66.1"},{"date":"2016-02-01T00:18:43","version":"0.67.1"},{"date":"2016-02-01T14:33:11","version":"0.68.1"},{"version":"0.69.1","date":"2016-07-05T00:36:52"},{"date":"2016-07-29T15:24:24","version":"0.70.1"},{"version":"0.71.1","date":"2016-07-29T18:59:13"},{"date":"2017-04-02T08:23:47","version":"0.72.1"},{"date":"2017-06-02T00:03:17","version":"0.73.1"}]},"Perl-Version":{"versions":[{"version":"v0.0.1","date":"2007-02-07T19:41:42"},{"date":"2007-02-23T18:03:11","version":"v0.0.3"},{"date":"2007-02-24T18:03:42","version":"v0.0.4"},{"version":"v0.0.5","date":"2007-02-25T12:41:13"},{"version":"v0.0.6","date":"2007-02-27T12:46:07"},{"version":"v0.0.7","date":"2007-02-28T01:27:59"},{"date":"2007-06-20T16:09:31","version":"0.0.8"},{"version":"v1.000","date":"2007-09-03T14:28:35"},{"version":"v1.001","date":"2007-09-07T15:42:58"},{"version":"v1.002","date":"2007-09-07T15:58:18"},{"date":"2007-11-08T12:14:27","version":"1.003"},{"version":"1.004","date":"2007-11-08T12:24:59"},{"date":"2008-04-03T14:56:16","version":"1.005"},{"version":"1.006","date":"2008-04-07T19:14:56"},{"date":"2008-04-07T19:27:24","version":"1.007"},{"date":"2009-03-07T16:40:03","version":"1.008"},{"version":"1.009","date":"2009-03-09T16:22:08"},{"version":"1.010","date":"2010-09-19T15:37:48"},{"date":"2011-02-21T21:32:17","version":"1.011"},{"date":"2014-02-12T20:58:43","version":"1.013"},{"version":"1.013_01","date":"2014-02-14T16:08:42"},{"date":"2014-02-18T16:42:57","version":"1.013_02"},{"version":"1.013_03","date":"2015-11-21T06:05:48"},{"date":"2024-01-04T15:11:21","version":"1.015"},{"date":"2024-01-05T13:57:01","version":"1.016"},{"version":"1.017","date":"2024-03-09T01:38:25"}],"main_module":"Perl::Version","advisories":[{"cves":[],"affected_versions":["<1.013"],"distribution":"Perl-Version","reported":"2014-02-12","references":["https://metacpan.org/changes/distribution/Perl-Version","https://rt.cpan.org/Public/Bug/Display.html?id=92974"],"description":"Insecure dependency File::Slurp is used.\n","fixed_versions":[">=1.013"],"id":"CPANSA-Perl-Version-2014-01"}]},"Data-Dumper":{"main_module":"Data::Dumper","advisories":[{"references":["https://metacpan.org/changes/distribution/Data-Dumper"],"description":"Infinite recursion.\n","id":"CPANSA-Data-Dumper-2014-01","fixed_versions":[">=2.154"],"cves":["CVE-2014-4330"],"distribution":"Data-Dumper","reported":"2014-09-30","affected_versions":["<2.154"]}],"versions":[{"version":"1.21","date":"1995-11-19T22:29:08"},{"version":"1.22","date":"1995-11-23T05:45:27"},{"version":"1.23","date":"1995-12-04T03:12:16"},{"version":"2.00","date":"1996-04-09T15:54:26"},{"date":"1996-04-10T04:25:17","version":"2.01"},{"version":"2.02","date":"1996-04-13T07:14:35"},{"date":"1996-08-26T14:36:59","version":"2.03"},{"version":"2.04","date":"1996-08-28T20:11:49"},{"version":"2.05","date":"1996-12-02T13:42:49"},{"date":"1996-12-02T23:07:56","version":"2.06"},{"version":"2.07","date":"1996-12-07T17:28:27"},{"version":"2.08","date":"1997-12-07T21:27:09"},{"version":"2.081","date":"1998-01-15T20:36:46"},{"date":"1998-03-06T21:08:49","version":"2.081"},{"version":"2.09","date":"1998-07-17T05:23:08"},{"date":"1998-07-21T12:08:19","version":"2.09"},{"date":"1998-10-31T12:10:30","version":"2.10"},{"version":"2.101","date":"1999-05-01T02:01:03"},{"date":"1999-06-02T01:30:55","version":"2.101"},{"date":"2003-07-20T16:59:48","version":"2.12_01"},{"version":"2.12_02","date":"2003-07-31T19:12:44"},{"version":"2.121","date":"2003-08-25T11:49:41"},{"date":"2009-06-06T14:45:36","version":"2.121_20"},{"date":"2009-06-09T15:49:12","version":"2.122"},{"date":"2009-06-11T08:07:01","version":"2.123"},{"version":"2.124","date":"2009-06-13T15:22:32"},{"date":"2009-08-08T10:33:01","version":"2.125"},{"version":"2.126","date":"2010-04-15T19:55:01"},{"version":"2.126_01","date":"2010-09-06T14:28:10"},{"version":"2.127","date":"2010-09-10T07:08:41"},{"date":"2010-09-10T07:11:52","version":"2.128"},{"date":"2011-05-20T15:53:12","version":"2.130_03"},{"date":"2011-05-27T14:19:03","version":"2.131"},{"version":"2.135_01","date":"2011-12-19T08:23:05"},{"date":"2011-12-29T17:09:49","version":"2.135_02"},{"date":"2012-08-07T06:59:51","version":"2.135_07"},{"version":"2.136","date":"2012-10-04T07:35:07"},{"date":"2012-12-12T06:30:48","version":"2.139"},{"date":"2013-02-26T06:57:29","version":"2.143"},{"date":"2013-03-15T09:46:49","version":"2.145"},{"version":"2.151","date":"2014-03-07T09:28:44"},{"date":"2014-09-18T15:47:37","version":"2.154"},{"date":"2016-07-03T19:17:57","version":"2.160"},{"date":"2016-07-11T20:13:06","version":"2.161"},{"version":"2.167_01","date":"2017-07-31T15:31:28"},{"version":"2.167_02","date":"2017-08-04T08:05:22"},{"date":"2018-09-19T14:41:58","version":"2.172"},{"date":"2018-11-10T10:10:30","version":"2.173"},{"version":"2.179_50","date":"2021-05-14T12:47:34"},{"version":"2.180","date":"2021-05-17T05:53:02"},{"version":"2.180_50","date":"2021-05-22T09:51:29"},{"date":"2021-05-23T14:14:12","version":"2.180_51"},{"date":"2021-05-24T08:03:55","version":"2.180_52"},{"version":"2.180_53","date":"2021-05-25T05:20:34"},{"version":"2.181","date":"2021-05-26T06:46:41"},{"version":"2.181_50","date":"2021-06-29T10:42:11"},{"date":"2021-06-30T09:36:34","version":"2.182"},{"date":"2021-07-01T07:05:45","version":"2.182_50"},{"date":"2021-07-03T13:07:49","version":"2.182_51"},{"date":"2021-07-05T07:07:44","version":"2.183"}]},"Net-DNS":{"versions":[{"version":"0.02","date":"1997-02-04T10:03:21"},{"date":"1997-02-05T05:54:07","version":"0.02"},{"date":"1997-02-10T16:24:12","version":"0.03"},{"date":"1997-02-13T23:50:40","version":"0.04"},{"version":"0.05","date":"1997-03-28T06:22:18"},{"version":"0.06","date":"1997-04-03T06:54:12"},{"version":"0.07","date":"1997-04-19T18:07:46"},{"version":"0.08","date":"1997-05-13T15:27:34"},{"date":"1997-05-29T22:16:14","version":"0.09"},{"version":"0.10","date":"1997-06-13T04:35:29"},{"version":"0.11","date":"1997-07-06T18:10:05"},{"date":"1997-10-02T05:53:19","version":"0.12"},{"date":"2002-02-01T21:32:42","version":"0.14"},{"date":"2002-04-11T23:04:19","version":"0.19"},{"version":"0.20","date":"2002-05-15T00:39:48"},{"version":"0.21","date":"2002-06-03T21:44:48"},{"version":"0.22","date":"2002-06-06T21:48:08"},{"date":"2002-06-11T22:49:07","version":"0.23"},{"date":"2002-07-06T20:17:50","version":"0.24"},{"version":"0.25","date":"2002-08-01T10:37:46"},{"version":"0.26","date":"2002-08-05T20:11:20"},{"version":"0.27","date":"2002-08-15T15:55:56"},{"version":"0.28","date":"2002-08-21T00:18:55"},{"date":"2002-10-02T06:09:09","version":"0.29"},{"date":"2002-11-07T13:19:03","version":"0.30"},{"version":"0.31","date":"2002-11-18T04:32:09"},{"version":"0.32","date":"2003-01-05T21:37:55"},{"date":"2003-01-08T18:31:53","version":"0.33"},{"date":"2003-03-06T19:19:53","version":"0.34"},{"date":"2003-05-22T02:33:15","version":"0.34_02"},{"date":"2003-05-23T01:24:00","version":"0.34_03"},{"date":"2003-05-26T07:13:38","version":"0.35"},{"date":"2003-05-28T22:24:43","version":"0.36"},{"date":"2003-05-28T22:41:56","version":"0.37"},{"date":"2003-06-05T23:55:14","version":"0.38"},{"date":"2003-06-23T00:19:28","version":"0.38_01"},{"version":"0.38_02","date":"2003-07-29T09:34:12"},{"version":"0.39","date":"2003-08-07T22:35:45"},{"date":"2003-08-12T04:10:01","version":"0.39_01"},{"version":"0.39_02","date":"2003-08-28T15:17:51"},{"version":"0.40","date":"2003-09-01T22:18:39"},{"version":"0.40_01","date":"2003-09-26T22:54:49"},{"date":"2003-10-03T15:57:27","version":"0.41"},{"version":"0.42","date":"2003-10-26T05:42:29"},{"version":"0.42_01","date":"2003-12-01T04:39:24"},{"version":"0.42_02","date":"2003-12-11T08:53:09"},{"date":"2003-12-12T00:28:17","version":"0.43"},{"date":"2003-12-13T01:55:07","version":"0.44"},{"version":"0.44_01","date":"2004-01-03T06:49:06"},{"date":"2004-01-04T04:51:25","version":"0.44_02"},{"version":"0.45","date":"2004-01-08T05:56:11"},{"version":"0.45_01","date":"2004-02-10T00:53:47"},{"version":"0.46","date":"2004-02-21T12:53:34"},{"date":"2004-04-01T07:39:00","version":"0.47"},{"date":"2004-05-06T19:18:31","version":"0.47_01"},{"date":"2004-08-13T01:11:57","version":"0.48"},{"date":"2005-03-07T14:31:55","version":"0.48_01"},{"date":"2005-03-14T20:47:20","version":"0.48_02"},{"version":"0.48_03","date":"2005-03-22T15:54:51"},{"version":"0.49","date":"2005-03-29T13:12:16"},{"date":"2005-05-24T08:07:55","version":"0.49_01"},{"date":"2005-05-28T07:07:52","version":"0.49_02"},{"version":"0.49_03","date":"2005-06-01T20:51:43"},{"date":"2005-06-08T14:15:32","version":"0.50"},{"date":"2005-06-10T11:00:29","version":"0.51"},{"date":"2005-06-14T11:42:54","version":"0.49_01"},{"version":"0.49_01","date":"2005-06-22T14:32:45"},{"date":"2005-07-01T21:50:47","version":"0.52"},{"version":"0.53","date":"2005-07-22T12:23:21"},{"version":"0.53_01","date":"2005-07-31T14:40:15"},{"date":"2005-10-18T14:39:03","version":"0.53_02"},{"version":"0.54","date":"2005-12-07T13:15:30"},{"version":"0.55","date":"2005-12-14T10:29:42"},{"version":"0.56","date":"2006-02-20T15:34:25"},{"version":"0.57","date":"2006-02-24T16:21:14"},{"version":"0.58","date":"2006-07-04T11:42:41"},{"date":"2006-09-18T19:31:10","version":"0.59"},{"version":"0.60","date":"2007-06-22T07:31:18"},{"date":"2007-08-01T12:26:55","version":"0.61"},{"version":"0.62","date":"2007-12-28T19:32:25"},{"version":"0.63","date":"2008-02-08T15:49:50"},{"date":"2008-12-30T18:11:35","version":"0.64"},{"date":"2009-01-26T18:19:23","version":"0.65"},{"version":"0.66","date":"2009-12-30T13:58:25"},{"version":"0.66_01","date":"2011-10-25T12:14:24"},{"version":"0.66_02","date":"2011-10-27T14:23:38"},{"date":"2011-10-28T14:31:06","version":"0.66_03"},{"version":"0.66_04","date":"2011-10-28T15:00:15"},{"version":"0.66_06","date":"2011-10-31T14:36:02"},{"date":"2011-10-31T19:34:01","version":"0.66_07"},{"date":"2011-11-02T21:52:59","version":"0.66_08"},{"date":"2011-11-07T09:07:56","version":"0.67"},{"date":"2012-01-23T13:41:03","version":"0.67_01"},{"version":"0.67_03","date":"2012-01-26T10:44:13"},{"date":"2012-01-27T08:47:28","version":"0.67_04"},{"version":"0.68","date":"2012-01-31T21:54:27"},{"version":"0.68","date":"2012-01-31T22:11:31"},{"date":"2012-10-29T15:35:55","version":"0.68_01"},{"date":"2012-10-31T10:25:57","version":"0.68_02"},{"version":"0.68_03","date":"2012-10-31T20:33:53"},{"date":"2012-11-12T07:15:13","version":"0.68_04"},{"version":"0.68_05","date":"2012-11-12T10:22:31"},{"date":"2012-11-19T12:57:25","version":"0.68_06"},{"date":"2012-11-21T23:12:34","version":"0.68_07"},{"date":"2012-11-23T22:12:01","version":"0.68_08"},{"date":"2012-12-04T07:18:08","version":"0.68_09"},{"date":"2012-12-05T12:07:43","version":"0.69"},{"date":"2012-12-05T14:05:12","version":"0.69_1"},{"version":"0.70","date":"2012-12-06T11:10:17"},{"version":"0.70_1","date":"2012-12-12T16:04:03"},{"date":"2012-12-15T11:18:56","version":"0.71"},{"date":"2012-12-24T21:14:23","version":"0.71_01"},{"date":"2012-12-28T15:03:57","version":"0.72"},{"version":"0.72_01","date":"2013-11-13T15:18:55"},{"version":"0.72_02","date":"2013-11-14T16:13:33"},{"date":"2013-11-18T10:49:23","version":"0.72_03"},{"date":"2013-11-19T21:52:50","version":"0.72_04"},{"version":"0.73","date":"2013-11-29T13:35:08"},{"date":"2013-12-24T15:21:50","version":"0.73_1"},{"version":"0.73_2","date":"2014-01-02T20:32:27"},{"version":"0.73_3","date":"2014-01-05T20:31:16"},{"date":"2014-01-12T10:25:24","version":"0.73_4"},{"date":"2014-01-13T15:59:49","version":"0.73_5"},{"date":"2014-01-16T10:23:47","version":"0.74"},{"version":"0.74_1","date":"2014-03-03T21:33:39"},{"version":"0.74_2","date":"2014-03-10T08:36:19"},{"date":"2014-04-03T21:00:45","version":"0.74_3"},{"date":"2014-04-30T14:05:59","version":"0.74_4"},{"version":"0.74_5","date":"2014-05-05T06:05:46"},{"version":"0.74_6","date":"2014-05-06T09:22:01"},{"version":"0.75","date":"2014-05-08T09:54:21"},{"date":"2014-05-22T20:56:00","version":"0.75_1"},{"version":"0.76","date":"2014-05-23T22:26:56"},{"date":"2014-05-29T11:26:07","version":"0.76_1"},{"version":"0.76_2","date":"2014-06-05T16:04:39"},{"version":"0.76_3","date":"2014-06-13T08:31:32"},{"version":"0.77","date":"2014-06-13T21:57:13"},{"version":"0.77_1","date":"2014-07-02T09:53:03"},{"version":"0.77_2","date":"2014-07-09T07:09:44"},{"date":"2014-07-10T14:13:33","version":"0.78"},{"version":"0.78_1","date":"2014-07-30T21:41:25"},{"version":"0.78_2","date":"2014-08-12T22:13:54"},{"date":"2014-08-15T14:40:22","version":"0.78_3"},{"date":"2014-08-19T13:24:46","version":"0.78_5"},{"date":"2014-08-22T22:29:13","version":"0.79"},{"date":"2014-09-11T11:42:35","version":"0.79_1"},{"version":"0.79_2","date":"2014-09-15T14:51:32"},{"version":"0.80","date":"2014-09-22T11:51:22"},{"version":"0.80_1","date":"2014-10-20T08:19:15"},{"date":"2014-10-24T08:21:15","version":"0.80_2"},{"date":"2014-10-29T13:44:16","version":"0.81"},{"date":"2015-01-05T10:22:06","version":"0.81_01"},{"date":"2015-01-20T14:12:38","version":"0.82"},{"version":"0.82_01","date":"2015-02-11T14:26:36"},{"date":"2015-02-18T11:05:47","version":"0.82_02"},{"date":"2015-02-26T15:48:06","version":"0.83"},{"version":"1.00_01","date":"2015-05-27T10:04:50"},{"date":"2015-06-11T17:23:10","version":"1.00_02"},{"date":"2015-06-15T10:02:08","version":"1.00_03"},{"version":"1.00_04","date":"2015-06-23T13:57:29"},{"date":"2015-06-26T09:37:11","version":"1.00_05"},{"version":"1.00_06","date":"2015-06-29T17:15:06"},{"version":"1.00_07","date":"2015-07-01T13:51:22"},{"date":"2015-07-02T08:17:44","version":"1.00_08"},{"version":"1.01","date":"2015-07-06T17:28:32"},{"date":"2015-08-26T20:44:25","version":"1.01_01"},{"version":"1.01_02","date":"2015-09-03T06:21:58"},{"version":"1.01_03","date":"2015-09-04T20:39:37"},{"version":"1.01_04","date":"2015-09-08T08:26:06"},{"version":"1.01_05","date":"2015-09-11T11:49:24"},{"date":"2015-09-15T18:51:53","version":"1.01_06"},{"version":"1.02","date":"2015-09-16T10:25:09"},{"version":"1.02_01","date":"2015-09-22T13:39:43"},{"date":"2015-10-05T08:30:03","version":"1.02_02"},{"date":"2015-10-06T20:39:36","version":"1.02_03"},{"version":"1.02_04","date":"2015-10-08T21:24:29"},{"version":"1.02_05","date":"2015-10-13T07:30:39"},{"version":"1.02_06","date":"2015-10-14T12:44:57"},{"version":"1.02_07","date":"2015-10-20T09:59:26"},{"date":"2015-10-23T08:32:04","version":"1.02_08"},{"version":"1.02_09","date":"2015-10-27T16:07:21"},{"date":"2015-11-02T06:00:09","version":"1.02_10"},{"version":"1.03","date":"2015-11-08T13:49:33"},{"version":"1.03_01","date":"2015-12-01T21:21:55"},{"version":"1.03_02","date":"2015-12-02T14:27:42"},{"version":"1.03_03","date":"2015-12-02T20:49:07"},{"version":"1.04","date":"2015-12-08T20:41:10"},{"date":"2016-02-01T16:26:27","version":"1.04_01"},{"date":"2016-02-02T08:03:42","version":"1.04_02"},{"date":"2016-02-05T12:19:57","version":"1.04_03"},{"version":"1.04_04","date":"2016-02-29T12:32:53"},{"date":"2016-03-07T21:11:01","version":"1.05"},{"date":"2016-03-21T13:15:38","version":"1.05_01"},{"date":"2016-03-24T18:45:15","version":"1.05_02"},{"date":"2016-04-04T21:53:54","version":"1.05_03"},{"version":"1.05_04","date":"2016-04-15T10:11:03"},{"date":"2016-04-17T12:05:46","version":"1.05_05"},{"version":"1.05_06","date":"2016-05-11T08:58:51"},{"version":"1.05_07","date":"2016-05-22T07:54:41"},{"version":"1.06","date":"2016-05-27T19:12:44"},{"version":"1.06_01","date":"2016-06-22T08:54:06"},{"date":"2016-08-24T11:36:13","version":"1.06_02"},{"date":"2016-08-25T15:01:31","version":"1.06_03"},{"version":"1.06_04","date":"2016-09-17T08:19:30"},{"version":"1.06_05","date":"2016-11-12T03:24:33"},{"version":"1.06_06","date":"2016-12-23T14:48:42"},{"version":"1.07","date":"2016-12-29T17:16:20"},{"date":"2017-01-18T21:51:05","version":"1.07_01"},{"date":"2017-01-27T10:44:03","version":"1.07_02"},{"date":"2017-02-09T10:28:55","version":"1.07_03"},{"date":"2017-02-13T10:08:41","version":"1.07_04"},{"date":"2017-02-20T11:12:45","version":"1.08"},{"date":"2017-03-06T09:33:06","version":"1.08_02"},{"date":"2017-03-13T10:02:22","version":"1.08_03"},{"version":"1.08_04","date":"2017-03-22T09:48:52"},{"version":"1.09","date":"2017-03-24T07:00:36"},{"date":"2017-04-19T13:10:57","version":"1.09_01"},{"date":"2017-05-05T22:21:10","version":"1.10"},{"version":"1.10_01","date":"2017-05-31T09:07:40"},{"date":"2017-06-03T20:26:47","version":"1.10_02"},{"date":"2017-06-12T12:03:07","version":"1.10_03"},{"date":"2017-06-26T12:52:57","version":"1.11"},{"date":"2017-07-07T21:50:10","version":"1.11_01"},{"date":"2017-07-28T16:17:01","version":"1.11_02"},{"version":"1.11_03","date":"2017-08-15T10:33:15"},{"date":"2017-08-17T12:48:08","version":"1.11_04"},{"date":"2017-08-18T13:15:31","version":"1.12"},{"date":"2017-09-12T09:28:26","version":"1.12_01"},{"version":"1.12_02","date":"2017-10-06T09:07:45"},{"version":"1.12_03","date":"2017-10-10T14:42:38"},{"version":"1.13","date":"2017-10-18T09:49:20"},{"version":"1.13_01","date":"2017-11-30T11:11:55"},{"date":"2017-12-07T10:17:12","version":"1.13_02"},{"version":"1.14","date":"2017-12-15T12:34:59"},{"version":"1.14_01","date":"2018-01-31T10:11:39"},{"date":"2018-02-01T14:14:07","version":"1.14_02"},{"date":"2018-02-09T11:42:14","version":"1.15"},{"version":"1.15_01","date":"2018-06-11T09:20:56"},{"date":"2018-06-14T10:46:39","version":"1.15_02"},{"date":"2018-07-03T09:05:15","version":"1.15_03"},{"date":"2018-07-06T10:03:02","version":"1.15_04"},{"version":"1.16","date":"2018-07-16T04:56:07"},{"version":"1.16_01","date":"2018-07-20T16:22:38"},{"date":"2018-07-24T15:35:14","version":"1.16_02"},{"date":"2018-07-25T07:10:24","version":"1.17"},{"date":"2018-09-11T10:24:34","version":"1.17_01"},{"date":"2018-09-11T15:32:52","version":"1.17_02"},{"version":"1.17_03","date":"2018-09-12T06:15:44"},{"version":"1.18","date":"2018-09-21T14:49:48"},{"version":"1.18_01","date":"2018-11-08T06:39:55"},{"date":"2018-11-15T06:02:14","version":"1.19"},{"date":"2018-12-31T12:23:28","version":"1.19_01"},{"version":"1.19_02","date":"2019-01-28T09:48:25"},{"date":"2019-03-22T08:40:39","version":"1.19_03"},{"version":"1.20","date":"2019-03-22T14:13:56"},{"date":"2019-07-21T09:20:43","version":"1.20_01"},{"date":"2019-07-23T14:51:08","version":"1.20_02"},{"date":"2019-08-21T13:49:42","version":"1.20_03"},{"date":"2019-08-30T08:37:40","version":"1.21"},{"version":"1.21_01","date":"2020-02-02T21:54:31"},{"date":"2020-02-13T13:56:48","version":"1.22"},{"version":"1.22_01","date":"2020-03-17T09:09:32"},{"date":"2020-03-18T14:55:27","version":"1.23"},{"version":"1.23_01","date":"2020-05-13T09:04:51"},{"date":"2020-05-27T12:47:25","version":"1.24"},{"date":"2020-06-19T10:52:05","version":"1.24_01"},{"date":"2020-06-23T13:07:04","version":"1.24_02"},{"version":"1.25","date":"2020-06-26T15:40:24"},{"version":"1.25_01","date":"2020-07-28T12:55:42"},{"version":"1.25_02","date":"2020-07-31T08:43:21"},{"date":"2020-08-06T15:55:03","version":"1.26"},{"version":"1.26_01","date":"2020-08-31T13:51:53"},{"version":"1.26_02","date":"2020-09-07T08:02:00"},{"date":"2020-09-11T18:53:08","version":"1.27"},{"version":"1.27_01","date":"2020-10-08T22:00:15"},{"version":"1.27_02","date":"2020-10-16T10:20:24"},{"date":"2020-10-19T08:09:59","version":"1.27_03"},{"date":"2020-10-23T16:53:49","version":"1.28"},{"date":"2020-11-16T16:33:26","version":"1.28_01"},{"date":"2020-11-18T13:40:46","version":"1.29"},{"version":"1.29_01","date":"2020-12-24T15:37:27"},{"version":"1.29_02","date":"2021-03-22T08:38:47"},{"version":"1.29_03","date":"2021-03-28T09:38:33"},{"date":"2021-03-30T10:06:50","version":"1.30"},{"date":"2021-05-02T12:43:26","version":"1.31"},{"date":"2021-07-09T09:57:13","version":"1.31_01"},{"date":"2021-07-16T14:24:25","version":"1.32"},{"version":"1.32_01","date":"2021-08-11T10:07:26"},{"version":"1.32_02","date":"2021-12-08T10:42:13"},{"date":"2021-12-16T12:22:39","version":"1.33"},{"date":"2022-05-21T10:05:03","version":"1.33_01"},{"date":"2022-05-30T13:39:34","version":"1.34"},{"date":"2022-09-23T13:43:05","version":"1.34_01"},{"version":"1.34_02","date":"2022-10-04T13:44:45"},{"date":"2022-10-04T20:02:07","version":"1.35"},{"date":"2022-12-20T14:45:20","version":"1.35_01"},{"date":"2022-12-21T11:28:18","version":"1.35_02"},{"date":"2022-12-28T13:12:39","version":"1.35_03"},{"date":"2022-12-30T15:53:37","version":"1.36"},{"version":"1.36_01","date":"2023-01-30T14:07:07"},{"version":"1.36_02","date":"2023-02-20T15:36:17"},{"version":"1.36_03","date":"2023-03-06T12:19:36"},{"date":"2023-03-13T18:06:16","version":"1.37"},{"date":"2023-03-30T19:26:05","version":"1.37_01"},{"version":"1.37_02","date":"2023-04-17T12:34:49"},{"date":"2023-04-20T12:38:12","version":"1.37_03"},{"date":"2023-04-25T20:37:19","version":"1.37_04"},{"date":"2023-05-09T10:50:45","version":"1.38"},{"version":"1.38_01","date":"2023-05-31T14:12:28"},{"date":"2023-06-01T11:46:37","version":"1.39"},{"version":"1.39_01","date":"2023-08-23T14:53:17"},{"date":"2023-08-25T12:50:35","version":"1.39_02"},{"version":"1.40","date":"2023-08-30T18:16:07"},{"date":"2023-11-22T08:42:22","version":"1.40_01"},{"version":"1.41","date":"2023-11-27T13:28:04"},{"date":"2023-12-24T15:48:59","version":"1.42"},{"date":"2024-01-04T11:21:08","version":"1.42_01"},{"date":"2024-01-08T09:38:46","version":"1.42_02"},{"version":"1.42_03","date":"2024-01-10T15:04:01"},{"version":"1.42_04","date":"2024-01-17T09:07:40"},{"date":"2024-01-25T11:08:34","version":"1.42_05"},{"date":"2024-01-26T14:54:33","version":"1.43"},{"date":"2024-02-14T09:22:32","version":"1.43_01"},{"version":"1.44","date":"2024-02-15T13:03:57"},{"version":"1.44_01","date":"2024-04-21T08:24:10"},{"date":"2024-05-02T11:03:24","version":"1.45"},{"version":"1.45_01","date":"2024-07-26T03:56:44"},{"version":"1.45_02","date":"2024-08-12T09:53:41"},{"date":"2024-08-19T15:12:15","version":"1.46"},{"version":"1.47","date":"2024-09-18T20:46:06"},{"date":"2024-11-07T14:13:26","version":"1.47_01"},{"version":"1.48","date":"2024-11-08T13:27:46"},{"version":"1.48_01","date":"2024-12-16T13:43:49"}],"main_module":"Net::DNS","advisories":[{"affected_versions":["<0.63"],"distribution":"Net-DNS","reported":"2008-02-08","cves":["CVE-2007-6341"],"fixed_versions":[">=0.63"],"id":"CPANSA-Net-DNS-2008-01","references":["https://metacpan.org/changes/distribution/Net-DNS"],"description":"Allows remote attackers to cause a denial of service (program \"croak\") via a crafted DNS response.\n"},{"cves":["CVE-2007-3409"],"affected_versions":["<0.60"],"reported":"2007-06-26","distribution":"Net-DNS","references":["http://rt.cpan.org/Public/Bug/Display.html?id=27285","http://www.net-dns.org/docs/Changes.html","http://www.gentoo.org/security/en/glsa/glsa-200708-06.xml","http://www.mandriva.com/security/advisories?name=MDKSA-2007:146","http://www.redhat.com/support/errata/RHSA-2007-0674.html","ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc","http://www.novell.com/linux/security/advisories/2007_17_sr.html","http://www.trustix.org/errata/2007/0023/","http://www.ubuntu.com/usn/usn-483-1","http://www.securityfocus.com/bid/24669","http://www.securitytracker.com/id?1018376","http://secunia.com/advisories/25829","http://secunia.com/advisories/26014","http://secunia.com/advisories/26055","http://secunia.com/advisories/26012","http://secunia.com/advisories/26075","http://secunia.com/advisories/26211","http://secunia.com/advisories/26231","http://secunia.com/advisories/26417","http://secunia.com/advisories/26543","http://www.debian.org/security/2008/dsa-1515","http://secunia.com/advisories/29354","http://osvdb.org/37054","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10595","http://www.securityfocus.com/archive/1/473871/100/0/threaded"],"description":"Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop.\n","fixed_versions":[">=0.60"],"id":"CPANSA-Net-DNS-2007-3409","severity":null},{"fixed_versions":[">=0.60"],"id":"CPANSA-Net-DNS-2007-3377","severity":null,"description":"Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.\n","references":["http://www.nntp.perl.org/group/perl.qpsmtpd/2006/03/msg4810.html","http://rt.cpan.org/Public/Bug/Display.html?id=23961","https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245458","http://www.net-dns.org/docs/Changes.html","http://support.avaya.com/elmodocs2/security/ASA-2007-351.htm","http://www.gentoo.org/security/en/glsa/glsa-200708-06.xml","http://www.mandriva.com/security/advisories?name=MDKSA-2007:146","http://www.redhat.com/support/errata/RHSA-2007-0674.html","http://www.redhat.com/support/errata/RHSA-2007-0675.html","ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc","http://www.novell.com/linux/security/advisories/2007_17_sr.html","http://www.trustix.org/errata/2007/0023/","http://www.ubuntu.com/usn/usn-483-1","http://www.securityfocus.com/bid/24669","http://www.securitytracker.com/id?1018377","http://secunia.com/advisories/25829","http://secunia.com/advisories/26014","http://secunia.com/advisories/26055","http://secunia.com/advisories/26012","http://secunia.com/advisories/26075","http://secunia.com/advisories/26211","http://secunia.com/advisories/26231","http://secunia.com/advisories/26417","http://secunia.com/advisories/26508","http://secunia.com/advisories/26543","http://www.debian.org/security/2008/dsa-1515","http://secunia.com/advisories/29354","http://osvdb.org/37053","https://exchange.xforce.ibmcloud.com/vulnerabilities/35112","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9904","http://www.securityfocus.com/archive/1/473871/100/0/threaded"],"affected_versions":["<0.60"],"distribution":"Net-DNS","reported":"2007-06-25","cves":["CVE-2007-3377"]}]},"Module-Metadata":{"main_module":"Module::Metadata","advisories":[{"id":"CPANSA-Module-Metadata-2013-1437","reviewed_by":[{"name":"Robert Rothenberg","email":"rrwo@cpan.org","date":"2022-07-11"}],"description":"Eval injection vulnerability in the Module-Metadata module before 1.000015 for Perl allows remote attackers to execute arbitrary Perl code via the $Version value.\n","references":["http://lists.fedoraproject.org/pipermail/package-announce/2013-August/114912.html","https://metacpan.org/changes/distribution/Module-Metadata","http://lists.fedoraproject.org/pipermail/package-announce/2013-August/114904.html"],"severity":"critical","fixed_versions":[">=1.000015"],"cves":["CVE-2013-1437"],"distribution":"Module-Metadata","reported":"2020-01-28","affected_versions":["<1.000015"]}],"versions":[{"version":"1.000000","date":"2010-07-06T21:16:54"},{"date":"2010-07-08T23:56:47","version":"1.000001"},{"date":"2010-12-10T17:07:09","version":"1.000002"},{"date":"2011-01-07T02:35:06","version":"1.000003"},{"version":"1.000004","date":"2011-02-03T07:55:40"},{"version":"1.000005","date":"2011-08-03T01:41:05"},{"version":"1.000006","date":"2011-08-29T19:48:33"},{"date":"2011-09-07T16:01:55","version":"1.000007"},{"date":"2012-02-08T03:31:54","version":"1.000008"},{"date":"2012-02-08T17:34:49","version":"1.000009"},{"date":"2012-07-29T19:21:55","version":"1.000010"},{"date":"2012-08-16T00:07:05","version":"1.000010_001"},{"version":"1.000010_002","date":"2012-08-16T00:15:02"},{"version":"1.000010_003","date":"2012-08-16T04:54:55"},{"version":"1.000011","date":"2012-08-16T19:57:31"},{"version":"1.000012","date":"2013-05-05T04:59:03"},{"version":"1.000013","date":"2013-05-08T23:00:33"},{"version":"1.000014","date":"2013-05-09T09:02:22"},{"date":"2013-08-21T15:46:56","version":"1.000015"},{"date":"2013-08-22T05:59:11","version":"1.000016"},{"version":"1.000017","date":"2013-09-11T01:06:02"},{"version":"1.000018","date":"2013-09-11T16:28:24"},{"version":"1.000019","date":"2013-10-06T16:50:13"},{"date":"2014-04-27T20:57:08","version":"1.000020"},{"version":"1.000021","date":"2014-04-29T18:29:51"},{"version":"1.000022","date":"2014-04-29T22:06:21"},{"date":"2014-06-02T02:39:20","version":"1.000023"},{"date":"2014-06-03T01:54:30","version":"1.000024"},{"date":"2015-01-04T18:57:40","version":"1.000025"},{"date":"2015-01-17T19:23:52","version":"1.000026"},{"version":"1.000027","date":"2015-04-11T00:23:53"},{"version":"1.000028","date":"2015-09-11T04:25:25"},{"version":"1.000029","date":"2015-09-11T16:26:57"},{"date":"2015-11-20T03:05:34","version":"1.000030"},{"date":"2015-11-24T03:59:40","version":"1.000031"},{"version":"1.000032","date":"2016-04-23T22:38:13"},{"date":"2016-07-24T23:34:48","version":"1.000033"},{"version":"1.000034","date":"2018-07-19T20:31:14"},{"version":"1.000035","date":"2019-04-18T02:44:48"},{"date":"2019-04-18T18:27:14","version":"1.000036"},{"version":"1.000037","date":"2019-09-07T18:34:09"},{"date":"2023-04-28T11:27:07","version":"1.000038"}]},"Crypt-Passwd-XS":{"main_module":"Crypt::Passwd::XS","advisories":[{"cves":["CVE-2012-2143"],"affected_versions":["<0.601"],"distribution":"Crypt-Passwd-XS","reported":"2012-05-07","description":"The crypt_des (aka DES-based crypt) function does not process the complete cleartext password if this password contains a 0x80 character, which makes it easier for context-dependent attackers to obtain access via an authentication attempt with an initial substring of the intended password, as demonstrated by a Unicode password.\n","references":["https://metacpan.org/changes/distribution/Crypt-Passwd-XS"],"fixed_versions":[">=0.601"],"id":"CPANSA-Crypt-Passwd-XS-2012-01"}],"versions":[{"version":"0.4","date":"2010-11-14T21:18:18"},{"date":"2010-11-17T02:03:54","version":"0.501"},{"date":"2010-11-17T23:25:17","version":"0.503"},{"version":"0.504","date":"2010-11-20T00:37:33"},{"version":"0.505","date":"2010-11-24T00:59:34"},{"version":"0.506","date":"2011-03-09T16:18:01"},{"date":"2011-03-09T21:40:38","version":"0.507"},{"date":"2011-07-26T16:37:20","version":"0.600"},{"date":"2012-12-06T19:57:57","version":"0.601"}]},"RPC-XML":{"main_module":"RPC::XML","advisories":[{"fixed_versions":[">=0.45"],"id":"CPANSA-RPC-XML-2002-01","references":["https://metacpan.org/dist/RPC-XML/changes"],"description":"A a potential security hole in the parsing of external entities.\n","affected_versions":["<0.45"],"distribution":"RPC-XML","reported":"2002-10-29","cves":[]}],"versions":[{"version":"0.25","date":"2001-06-13T06:30:46"},{"date":"2001-06-27T06:18:37","version":"0.26"},{"version":"0.27","date":"2001-07-08T23:38:52"},{"date":"2001-10-08T05:10:22","version":"0.28"},{"date":"2001-12-03T07:08:58","version":"0.29"},{"version":"0.30","date":"2002-01-03T09:49:30"},{"date":"2002-01-28T00:48:45","version":"0.35"},{"version":"0.36","date":"2002-01-29T20:03:48"},{"version":"0.37","date":"2002-03-23T06:39:00"},{"version":"0.40","date":"2002-05-04T07:56:19"},{"version":"0.41","date":"2002-05-22T10:04:14"},{"date":"2002-08-01T08:41:21","version":"0.42"},{"version":"0.43","date":"2002-08-19T05:56:10"},{"version":"0.44","date":"2002-08-31T06:58:58"},{"version":"0.45","date":"2002-10-30T05:15:04"},{"date":"2002-12-30T07:51:25","version":"0.46"},{"version":"0.50","date":"2003-01-27T11:37:20"},{"date":"2003-01-30T09:36:24","version":"0.51"},{"version":"0.52","date":"2003-02-10T09:48:58"},{"date":"2003-02-25T09:25:51","version":"0.53"},{"date":"2004-04-14T12:55:46","version":"0.54"},{"version":"0.55","date":"2004-11-30T09:27:12"},{"version":"0.56","date":"2004-12-09T09:29:34"},{"version":"0.57","date":"2004-12-24T11:07:31"},{"date":"2005-05-12T10:47:19","version":"0.58"},{"version":"0.59","date":"2006-06-30T07:56:12"},{"date":"2008-04-09T17:59:42","version":"0.60"},{"date":"2008-09-15T10:19:12","version":"0.61"},{"version":"0.62","date":"2008-09-19T09:16:21"},{"version":"0.63","date":"2008-09-19T09:28:08"},{"version":"0.64","date":"2008-09-29T11:24:26"},{"version":"0.65","date":"2009-06-17T13:19:54"},{"date":"2009-07-09T14:42:56","version":"0.66"},{"version":"0.67","date":"2009-07-10T08:34:44"},{"version":"0.69","date":"2009-09-03T17:37:20"},{"date":"2009-12-07T06:33:13","version":"0.70"},{"version":"0.71","date":"2009-12-08T04:11:10"},{"date":"2009-12-14T05:48:11","version":"0.72"},{"version":"0.73","date":"2010-03-17T05:55:29"},{"version":"0.74","date":"2011-01-23T21:08:04"},{"version":"0.75","date":"2011-08-14T00:40:40"},{"date":"2011-08-21T19:48:16","version":"0.76"},{"version":"0.77","date":"2012-09-03T18:58:22"},{"date":"2014-02-07T04:15:00","version":"0.78"},{"date":"2015-05-01T16:02:19","version":"0.79"},{"version":"0.80","date":"2016-05-08T20:17:31"},{"date":"2021-01-06T02:49:51","version":"0.81"},{"version":"0.82","date":"2021-01-06T18:05:35"}]},"Dezi":{"versions":[{"date":"2011-06-22T04:53:57","version":"0.001000"},{"date":"2011-08-03T02:42:22","version":"0.001001"},{"version":"0.001002","date":"2011-09-30T03:35:08"},{"version":"0.001003","date":"2011-10-23T02:12:02"},{"version":"0.001004","date":"2012-03-17T02:40:15"},{"version":"0.001005","date":"2012-07-11T03:20:40"},{"date":"2012-08-18T02:43:23","version":"0.001006"},{"date":"2012-08-22T03:58:33","version":"0.001007"},{"date":"2012-09-04T02:05:34","version":"0.001008"},{"version":"0.002000","date":"2012-09-12T03:51:13"},{"date":"2012-09-13T01:50:59","version":"0.002001"},{"date":"2012-09-13T14:10:02","version":"0.002002"},{"version":"0.002003","date":"2012-10-16T00:57:46"},{"date":"2012-10-18T03:15:21","version":"0.002004"},{"date":"2012-12-19T05:25:13","version":"0.002005"},{"version":"0.002006","date":"2013-02-03T02:49:07"},{"date":"2013-02-05T15:02:54","version":"0.002007"},{"date":"2013-02-09T05:37:41","version":"0.002008"},{"version":"0.002009","date":"2013-02-13T02:30:33"},{"date":"2013-02-13T04:31:49","version":"0.002010"},{"date":"2013-11-13T17:08:03","version":"0.002011"},{"version":"0.002012","date":"2014-02-27T18:08:30"},{"date":"2014-06-05T06:59:12","version":"0.002998_01"},{"date":"2014-06-08T04:59:17","version":"0.003000"},{"date":"2014-07-30T20:40:24","version":"0.004000"},{"version":"0.004001","date":"2014-09-02T02:45:00"},{"version":"0.004002","date":"2015-04-30T22:01:11"},{"version":"0.004003","date":"2018-05-16T02:24:24"}],"main_module":"Dezi","advisories":[{"reported":"2012-09-13","distribution":"Dezi","affected_versions":["<0.002002"],"cves":[],"id":"CPANSA-Dezi-2012-01","fixed_versions":[">=0.002002"],"references":["https://metacpan.org/changes/distribution/Dezi","https://github.com/karpet/Dezi/commit/f1ad292b4dd988d1a38202c804bb7a2a3bcca3c8"],"description":"Bypassing authentication on the /index URL app with non-idempotent requests to /search URL.\n"}]},"Graphics-ColorNames":{"advisories":[{"description":"A specially-named file may lead to HTML injection attacks.\n","references":["https://metacpan.org/changes/distribution/Graphics-ColorNames","https://rt.cpan.org/Public/Bug/Display.html?id=54500"],"id":"CPANSA-Graphics-ColorNames-2010-02","fixed_versions":[">3.1.2"],"cves":["CVE-2024-55918"],"distribution":"Graphics-ColorNames","reported":"2010-02-11","affected_versions":[">=2.0_01,<=3.1.2"]}],"main_module":"Graphics::ColorNames","versions":[{"version":"0.10","date":"2001-02-20T03:47:48"},{"version":"0.20","date":"2001-04-12T02:32:22"},{"date":"2001-04-13T04:37:27","version":"0.21"},{"version":"0.22","date":"2001-04-15T14:26:41"},{"version":"0.23","date":"2001-04-18T03:13:51"},{"version":"0.24","date":"2001-04-28T16:09:48"},{"date":"2001-10-05T02:42:20","version":"0.30"},{"version":"0.31","date":"2002-10-24T01:17:51"},{"version":"0.32","date":"2002-12-05T03:07:24"},{"date":"2004-07-22T00:41:35","version":"0.3901"},{"version":"0.39_02","date":"2004-07-22T20:01:47"},{"version":"0.39_03","date":"2004-07-23T01:52:58"},{"version":"0.39_04","date":"2004-07-26T06:36:47"},{"version":"1.00","date":"2004-08-01T01:21:33"},{"date":"2004-08-18T20:32:07","version":"1.01"},{"version":"1.02","date":"2004-08-24T15:53:20"},{"date":"2004-08-26T21:51:46","version":"1.03"},{"date":"2004-09-03T06:56:23","version":"1.04"},{"version":"1.05","date":"2004-09-03T07:00:16"},{"version":"1.06","date":"2005-03-29T23:06:41"},{"date":"2005-04-04T15:17:24","version":"2.0_01"},{"date":"2005-04-07T16:08:52","version":"2.0_02"},{"version":"2.0_03","date":"2005-04-08T16:48:24"},{"date":"2006-10-24T13:58:29","version":"2.0_04"},{"date":"2007-12-16T15:33:27","version":"2.01"},{"date":"2007-12-16T16:04:00","version":"2.02"},{"version":"2.03","date":"2007-12-17T12:49:37"},{"version":"2.04","date":"2007-12-17T20:01:53"},{"version":"2.10_01","date":"2007-12-20T16:01:35"},{"version":"2.10_02","date":"2008-01-04T15:55:53"},{"version":"2.10_03","date":"2008-01-05T13:14:32"},{"date":"2008-01-06T21:52:18","version":"2.10_04"},{"date":"2008-01-08T16:20:38","version":"2.10_05"},{"date":"2008-01-10T21:43:53","version":"2.11"},{"date":"2018-09-27T23:02:17","version":"v3.0.0"},{"version":"v3.0.1","date":"2018-09-28T12:40:06"},{"version":"v3.0.2","date":"2018-09-28T16:56:39"},{"date":"2018-09-30T12:37:45","version":"v3.1.0"},{"date":"2018-10-01T16:51:16","version":"v3.1.1"},{"version":"v3.1.2","date":"2018-10-01T22:15:39"},{"date":"2018-10-03T23:36:26","version":"v3.2.0"},{"date":"2018-10-06T10:00:38","version":"v3.2.1"},{"date":"2018-10-23T20:30:22","version":"v3.3.0"},{"date":"2018-10-24T15:03:58","version":"v3.3.1"},{"version":"v3.3.2","date":"2018-10-27T16:33:30"},{"date":"2018-10-27T18:31:44","version":"v3.3.3"},{"version":"v3.3.4","date":"2018-11-11T15:13:51"},{"version":"v3.4.0","date":"2018-11-18T19:13:42"},{"date":"2019-06-06T20:30:43","version":"v3.5.0"}]},"XML-Twig":{"main_module":"XML::Twig","advisories":[{"cves":["CVE-2016-9180"],"reported":"2016-12-22","distribution":"XML-Twig","affected_versions":["<1.39"],"references":["http://www.securityfocus.com/bid/94219","http://www.openwall.com/lists/oss-security/2016/11/04/2","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00020.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00033.html","https://rt.cpan.org/Public/Bug/Display.html?id=118097"],"description":"perl-XML-Twig: The option to `expand_external_ents`, documented as controlling external entity expansion in XML::Twig does not work. External entities are always expanded, regardless of the option's setting.\n","severity":"critical","id":"CPANSA-XML-Twig-2016-9180","fixed_versions":[">=1.39"]}],"versions":[{"version":"1.6","date":"1999-10-05T22:25:47"},{"version":"1.7","date":"1999-12-07T16:53:28"},{"date":"1999-12-17T17:03:18","version":"1.8"},{"date":"2000-02-18T00:39:24","version":"1.9"},{"date":"2000-03-24T23:22:37","version":"1.10"},{"version":"2.00","date":"2000-06-05T19:27:48"},{"date":"2000-08-18T12:10:46","version":"2.01"},{"version":"2.02","date":"2001-01-16T09:14:14"},{"version":"3.00","date":"2002-01-09T16:33:44"},{"date":"2002-01-09T17:01:53","version":"3.01"},{"version":"3.02","date":"2002-01-16T14:11:04"},{"date":"2002-03-26T14:40:14","version":"3.03"},{"date":"2002-04-02T04:57:42","version":"3.04"},{"version":"3.05","date":"2002-07-09T16:02:36"},{"date":"2002-09-17T17:07:34","version":"3.06"},{"version":"3.07","date":"2002-09-17T20:03:49"},{"date":"2002-09-17T21:57:09","version":"3.08"},{"date":"2002-11-11T07:42:10","version":"3.09"},{"version":"3.10","date":"2003-06-09T19:35:52"},{"date":"2003-09-24T13:23:47","version":"3.11"},{"date":"2004-01-29T15:20:30","version":"3.12"},{"version":"3.13","date":"2004-02-02T07:13:15"},{"date":"2004-03-17T15:39:18","version":"3.14"},{"date":"2004-04-05T08:30:51","version":"3.15"},{"version":"3.16","date":"2005-02-11T17:51:59"},{"date":"2005-03-16T14:06:47","version":"3.17"},{"date":"2005-08-08T12:22:25","version":"3.18"},{"date":"2005-08-10T16:22:28","version":"3.19"},{"date":"2005-08-11T13:51:56","version":"3.20"},{"version":"3.21","date":"2005-08-12T12:59:54"},{"version":"3.22","date":"2005-10-14T16:27:05"},{"version":"3.23","date":"2006-01-23T14:26:19"},{"version":"3.24","date":"2006-05-09T08:56:08"},{"version":"3.25","date":"2006-05-10T11:07:37"},{"date":"2006-07-01T11:18:04","version":"3.26"},{"date":"2007-01-05T17:23:58","version":"3.28"},{"version":"3.29","date":"2007-01-22T09:42:28"},{"version":"3.30","date":"2007-11-06T14:49:35"},{"date":"2007-11-07T19:29:27","version":"3.31"},{"version":"3.32","date":"2007-11-13T20:40:13"},{"date":"2010-01-15T17:14:59","version":"3.33"},{"date":"2010-01-18T19:31:16","version":"3.34"},{"version":"3.35","date":"2010-05-16T05:25:45"},{"version":"3.36","date":"2010-10-07T09:55:43"},{"version":"3.37","date":"2010-10-10T05:53:41"},{"date":"2011-02-27T06:57:30","version":"3.38"},{"date":"2011-09-22T01:30:24","version":"3.39"},{"date":"2012-05-10T10:44:35","version":"3.40"},{"version":"3.41","date":"2012-08-08T20:31:00"},{"date":"2012-11-08T12:28:17","version":"3.42"},{"version":"3.44","date":"2013-05-13T08:47:04"},{"date":"2014-03-01T08:34:52","version":"3.45"},{"date":"2014-03-05T11:25:33","version":"3.46"},{"date":"2014-03-29T10:30:09","version":"3.47"},{"date":"2014-03-30T09:01:59","version":"3.48"},{"date":"2015-04-12T09:17:47","version":"3.49"},{"date":"2016-11-22T15:01:43","version":"3.50"},{"date":"2016-11-23T12:34:37","version":"3.51"},{"version":"3.52","date":"2016-11-23T17:21:16"},{"version":"3.53","date":"2024-12-13T15:34:19"}]},"Dpkg":{"versions":[{"date":"2018-09-26T18:53:52","version":"v1.19.1"},{"date":"2018-10-08T10:54:58","version":"v1.19.2"},{"version":"v1.19.3","date":"2019-01-22T18:41:25"},{"version":"v1.19.5","date":"2019-02-23T17:40:31"},{"date":"2019-03-25T14:54:21","version":"v1.19.6"},{"date":"2019-06-03T21:51:58","version":"v1.19.7"},{"version":"v1.20.0","date":"2020-03-08T03:05:24"},{"date":"2020-06-27T01:26:33","version":"v1.20.1"},{"date":"2020-06-27T23:35:03","version":"v1.20.2"},{"version":"v1.20.3","date":"2020-06-29T11:02:10"},{"date":"2020-07-07T06:22:23","version":"v1.20.4"},{"date":"2020-07-08T03:55:55","version":"v1.20.5"},{"date":"2021-01-08T04:23:50","version":"v1.20.6"},{"version":"v1.20.7","date":"2021-01-09T00:19:44"},{"date":"2021-04-13T21:44:34","version":"v1.20.8"},{"date":"2021-04-13T23:33:15","version":"v1.20.9"},{"version":"v1.21.0","date":"2021-12-05T18:08:48"},{"version":"v1.21.1","date":"2021-12-06T20:23:10"},{"version":"v1.21.2","date":"2022-03-13T20:07:04"},{"date":"2022-03-24T20:19:38","version":"v1.21.3"},{"version":"v1.21.4","date":"2022-03-26T12:56:21"},{"date":"2022-03-29T01:07:10","version":"v1.21.5"},{"date":"2022-05-25T15:21:07","version":"v1.21.8"},{"version":"v1.21.9","date":"2022-07-01T09:48:45"},{"date":"2022-12-01T12:08:26","version":"v1.21.10"},{"date":"2022-12-02T23:34:17","version":"v1.21.11"},{"version":"v1.21.13","date":"2022-12-19T01:27:49"},{"version":"v1.21.14","date":"2023-01-01T23:04:24"},{"version":"v1.21.19","date":"2023-01-25T22:18:51"},{"date":"2023-05-16T22:34:01","version":"v1.21.22"},{"version":"v1.22.0","date":"2023-08-30T10:44:22"},{"version":"v1.22.1","date":"2023-10-30T03:47:45"},{"version":"v1.22.2","date":"2023-12-18T03:09:08"},{"date":"2024-01-24T12:39:35","version":"v1.22.4"},{"date":"2024-02-27T03:56:46","version":"v1.22.5"},{"date":"2024-03-10T21:52:57","version":"v1.22.6"},{"date":"2024-07-16T23:58:08","version":"v1.22.7"},{"version":"v1.22.8","date":"2024-07-21T18:44:31"},{"version":"v1.22.11","date":"2024-08-01T11:07:53"}],"advisories":[{"id":"CPANSA-Dpkg-2022-1664","severity":"critical","fixed_versions":[">=1.21.8"],"description":"Dpkg::Source::Archive in dpkg, the Debian package management system, before version 1.21.8, 1.20.10, 1.19.8, 1.18.26 is prone to a directory traversal vulnerability. When extracting untrusted source packages in v2 and v3 source package formats that include a debian.tar, the in-place extraction can lead to directory traversal situations on specially crafted orig.tar and debian.tar tarballs.\n","references":["https://lists.debian.org/debian-security-announce/2022/msg00115.html","https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=faa4c92debe45412bfcf8a44f26e827800bb24be","https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=7a6c03cb34d4a09f35df2f10779cbf1b70a5200b","https://lists.debian.org/debian-lts-announce/2022/05/msg00033.html","https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=58814cacee39c4ce9e2cd0e3a3b9b57ad437eff5","https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=1f23dddc17f69c9598477098c7fb9936e15fa495"],"reported":"2022-05-26","distribution":"Dpkg","affected_versions":["<1.21.8"],"cves":["CVE-2022-1664"]},{"description":"dpkg-source in dpkg 1.3.0 through 1.18.23 is able to use a non-GNU patch program and does not offer a protection mechanism for blank-indented diff hunks, which allows remote attackers to conduct directory traversal attacks via a crafted Debian source package, as demonstrated by use of dpkg-source on NetBSD.\n","references":["http://www.openwall.com/lists/oss-security/2017/04/20/2","http://www.securityfocus.com/bid/98064"],"fixed_versions":[">=1.18.24"],"severity":"critical","id":"CPANSA-Dpkg-2017-8283","cves":["CVE-2017-8283"],"affected_versions":["<1.18.24"],"distribution":"Dpkg","reported":"2017-04-26"},{"fixed_versions":[">=1.18.11"],"severity":"high","id":"CPANSA-Dpkg-2016-1238","description":"(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.\n","references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"affected_versions":["<1.18.11"],"distribution":"Dpkg","reported":"2016-08-02","cves":["CVE-2016-1238"]},{"references":["http://www.ubuntu.com/usn/USN-2820-1","http://www.debian.org/security/2015/dsa-3407","https://blog.fuzzing-project.org/30-Stack-overflows-and-out-of-bounds-read-in-dpkg-Debian.html","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798324","https://anonscm.debian.org/cgit/dpkg/dpkg.git/commit/dpkg-deb/extract.c?id=e65aa3db04eb908c9507d5d356a95cedb890814d","https://security.gentoo.org/glsa/201612-07"],"description":"Off-by-one error in the extracthalf function in dpkg-deb/extract.c in the dpkg-deb component in Debian dpkg 1.16.x before 1.16.17 and 1.17.x before 1.17.26 allows remote attackers to execute arbitrary code via the archive magic version number in an \"old-style\" Debian binary package, which triggers a stack-based buffer overflow.\n","severity":null,"id":"CPANSA-Dpkg-2015-0860","fixed_versions":[">=1.18.4"],"cves":["CVE-2015-0860"],"reported":"2015-12-03","distribution":"Dpkg","affected_versions":["<1.18.4"]},{"fixed_versions":[">=1.18.0"],"severity":null,"id":"CPANSA-Dpkg-2015-0840","references":["http://www.ubuntu.com/usn/USN-2566-1","http://www.debian.org/security/2015/dsa-3217","http://lists.opensuse.org/opensuse-updates/2015-06/msg00029.html","http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157387.html"],"description":"The dpkg-source command in Debian dpkg before 1.16.16 and 1.17.x before 1.17.25 allows remote attackers to bypass signature verification via a crafted Debian source control file (.dsc).\n","affected_versions":["<1.18.0"],"reported":"2015-04-13","distribution":"Dpkg","cves":["CVE-2015-0840"]},{"affected_versions":["<1.17.22"],"reported":"2015-01-20","distribution":"Dpkg","cves":["CVE-2014-8625"],"fixed_versions":[">=1.17.22"],"id":"CPANSA-Dpkg-2014-8625","severity":null,"description":"Multiple format string vulnerabilities in the parse_error_msg function in parsehelp.c in dpkg before 1.17.22 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in the (1) package or (2) architecture name.\n","references":["http://seclists.org/oss-sec/2014/q4/539","https://bugs.launchpad.net/ubuntu/+source/dpkg/+bug/1389135","http://seclists.org/oss-sec/2014/q4/622","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768485","http://seclists.org/oss-sec/2014/q4/551","http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157387.html","https://exchange.xforce.ibmcloud.com/vulnerabilities/98551"]},{"severity":null,"id":"CPANSA-Dpkg-2014-0471","fixed_versions":[">=1.17.10"],"description":"Directory traversal vulnerability in the unpacking functionality in dpkg before 1.15.9, 1.16.x before 1.16.13, and 1.17.x before 1.17.8 allows remote attackers to write arbitrary files via a crafted source package, related to \"C-style filename quoting.\"\n","references":["http://www.debian.org/security/2014/dsa-2915","http://www.ubuntu.com/usn/USN-2183-1","http://www.securityfocus.com/bid/67106"],"distribution":"Dpkg","reported":"2014-04-30","affected_versions":["<1.17.10"],"cves":["CVE-2014-0471"]},{"distribution":"Dpkg","reported":"2014-05-14","affected_versions":["<1.17.10"],"cves":["CVE-2014-3127"],"id":"CPANSA-Dpkg-2014-3127","severity":null,"fixed_versions":[">=1.17.10"],"description":"dpkg 1.15.9 on Debian squeeze introduces support for the \"C-style encoded filenames\" feature without recognizing that the squeeze patch program lacks this feature, which triggers an interaction error that allows remote attackers to conduct directory traversal attacks and modify files outside of the intended directories via a crafted source package. NOTE: this can be considered a release engineering problem in the effort to fix CVE-2014-0471.\n","references":["https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746306","http://www.securityfocus.com/bid/67181","http://seclists.org/oss-sec/2014/q2/227","http://seclists.org/oss-sec/2014/q2/191","http://metadata.ftp-master.debian.org/changelogs//main/d/dpkg/dpkg_1.15.10_changelog"]},{"references":["http://openwall.com/lists/oss-security/2014/05/25/2","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746498","http://www.securityfocus.com/bid/67725","http://www.ubuntu.com/usn/USN-2242-1","http://www.debian.org/security/2014/dsa-2953"],"description":"Directory traversal vulnerability in dpkg-source in dpkg-dev 1.3.0 allows remote attackers to modify files outside of the intended directories via a crafted source package that lacks a --- header line.\n","id":"CPANSA-Dpkg-2014-3864","severity":null,"fixed_versions":[">=1.17.10"],"cves":["CVE-2014-3864"],"reported":"2014-05-30","distribution":"Dpkg","affected_versions":["<1.17.10"]},{"fixed_versions":[">=1.17.10"],"severity":null,"id":"CPANSA-Dpkg-2014-3865","description":"Multiple directory traversal vulnerabilities in dpkg-source in dpkg-dev 1.3.0 allow remote attackers to modify files outside of the intended directories via a source package with a crafted Index: pseudo-header in conjunction with (1) missing --- and +++ header lines or (2) a +++ header line with a blank pathname.\n","references":["https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=749183","http://openwall.com/lists/oss-security/2014/05/25/2","http://www.securityfocus.com/bid/67727","http://www.ubuntu.com/usn/USN-2242-1","http://www.debian.org/security/2014/dsa-2953"],"affected_versions":["<1.17.10"],"distribution":"Dpkg","reported":"2014-05-30","cves":["CVE-2014-3865"]},{"description":"Directory traversal vulnerability in the unpacking functionality in dpkg before 1.15.9, 1.16.x before 1.16.13, and 1.17.x before 1.17.8 allows remote attackers to write arbitrary files via a crafted source package, related to \"C-style filename quoting.\"\n","references":["http://www.debian.org/security/2014/dsa-2915","http://www.ubuntu.com/usn/USN-2183-1","http://www.securityfocus.com/bid/67106"],"fixed_versions":[">=1.17.9"],"severity":null,"id":"CPANSA-Dpkg-2014-0471","cves":["CVE-2014-0471"],"affected_versions":["<1.17.9"],"reported":"2014-04-30","distribution":"Dpkg"},{"distribution":"Dpkg","reported":"2014-05-14","affected_versions":["<1.17.9"],"cves":["CVE-2014-3127"],"id":"CPANSA-Dpkg-2014-3127","severity":null,"fixed_versions":[">=1.17.9"],"references":["https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746306","http://www.securityfocus.com/bid/67181","http://seclists.org/oss-sec/2014/q2/227","http://seclists.org/oss-sec/2014/q2/191","http://metadata.ftp-master.debian.org/changelogs//main/d/dpkg/dpkg_1.15.10_changelog"],"description":"dpkg 1.15.9 on Debian squeeze introduces support for the \"C-style encoded filenames\" feature without recognizing that the squeeze patch program lacks this feature, which triggers an interaction error that allows remote attackers to conduct directory traversal attacks and modify files outside of the intended directories via a crafted source package. NOTE: this can be considered a release engineering problem in the effort to fix CVE-2014-0471.\n"},{"description":"Directory traversal vulnerability in the unpacking functionality in dpkg before 1.15.9, 1.16.x before 1.16.13, and 1.17.x before 1.17.8 allows remote attackers to write arbitrary files via a crafted source package, related to \"C-style filename quoting.\"\n","references":["http://www.debian.org/security/2014/dsa-2915","http://www.ubuntu.com/usn/USN-2183-1","http://www.securityfocus.com/bid/67106"],"id":"CPANSA-Dpkg-2014-0471","severity":null,"fixed_versions":[">=1.17.8"],"cves":["CVE-2014-0471"],"reported":"2014-04-30","distribution":"Dpkg","affected_versions":["<1.17.8"]},{"references":["http://www.vupen.com/english/advisories/2011/0044","http://secunia.com/advisories/42831","http://secunia.com/advisories/42826","http://www.ubuntu.com/usn/USN-1038-1","http://www.debian.org/security/2011/dsa-2142","http://www.vupen.com/english/advisories/2011/0040","http://osvdb.org/70368","http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053311.html","http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053306.html","http://secunia.com/advisories/43054","http://www.securityfocus.com/bid/45703","http://www.vupen.com/english/advisories/2011/0196","https://exchange.xforce.ibmcloud.com/vulnerabilities/64615"],"description":"Directory traversal vulnerability in dpkg-source in dpkg before 1.14.31 and 1.15.x allows user-assisted remote attackers to modify arbitrary files via directory traversal sequences in a patch for a source-format 3.0 package.\n","fixed_versions":[">=1.15.8.8"],"severity":null,"id":"CPANSA-Dpkg-2010-1679","cves":["CVE-2010-1679"],"affected_versions":["<1.15.8.8"],"distribution":"Dpkg","reported":"2011-01-11"},{"distribution":"Dpkg","reported":"2010-03-15","affected_versions":["<1.15.6"],"cves":["CVE-2010-0396"],"severity":null,"id":"CPANSA-Dpkg-2010-0396","fixed_versions":[">=1.15.6"],"description":"Directory traversal vulnerability in the dpkg-source component in dpkg before 1.14.29 allows remote attackers to modify arbitrary files via a crafted Debian source archive.\n","references":["http://www.debian.org/security/2010/dsa-2011","http://www.vupen.com/english/advisories/2010/0582","http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29.tar.gz","https://exchange.xforce.ibmcloud.com/vulnerabilities/56887"]},{"description":"dpkg 1.9.21 does not properly reset the metadata of a file during replacement of the file in a package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid file, (2) setgid file, or (3) device, a related issue to CVE-2010-2059.\n","references":["http://www.hackinglinuxexposed.com/articles/20031214.html","http://lists.jammed.com/ISN/2003/12/0056.html","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=225692","https://bugzilla.redhat.com/show_bug.cgi?id=598775","https://exchange.xforce.ibmcloud.com/vulnerabilities/59428"],"severity":null,"id":"CPANSA-Dpkg-2004-2768","fixed_versions":[">=1.9.22"],"cves":["CVE-2004-2768"],"distribution":"Dpkg","reported":"2010-06-08","affected_versions":["=1.9.21"]},{"fixed_versions":[">=1.15.10"],"id":"CPANSA-Dpkg-2011-0402","severity":null,"description":"dpkg-source in dpkg before 1.14.31 and 1.15.x allows user-assisted remote attackers to modify arbitrary files via a symlink attack on unspecified files in the .pc directory.\n","references":["http://www.ubuntu.com/usn/USN-1038-1","http://secunia.com/advisories/42831","http://www.debian.org/security/2011/dsa-2142","http://secunia.com/advisories/42826","http://www.vupen.com/english/advisories/2011/0040","http://www.vupen.com/english/advisories/2011/0044","http://osvdb.org/70367","http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053311.html","http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053306.html","http://www.vupen.com/english/advisories/2011/0196","http://www.securityfocus.com/bid/45703","http://secunia.com/advisories/43054","https://exchange.xforce.ibmcloud.com/vulnerabilities/64614"],"affected_versions":["<1.15.10"],"distribution":"Dpkg","reported":"2011-01-11","cves":["CVE-2011-0402"]}],"main_module":"Dpkg"},"App-cpanminus":{"advisories":[{"description":"The App::cpanminus package 1.7044 for Perl allows Signature Verification Bypass.\n","references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DENFY4CRTIZL5WYYUYUM4VKCJNXO4QIW/","https://metacpan.org/pod/App::cpanminus","https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/","https://access.redhat.com/security/cve/cve-2020-16154","https://security-tracker.debian.org/tracker/CVE-2020-16154","https://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html","https://github.com/miyagawa/cpanminus/pull/638"],"id":"CPANSA-App-cpanminus-2020-01","fixed_versions":[">=1.7045"],"cves":["CVE-2020-16154"],"reported":"2020-07-30","distribution":"App-cpanminus","affected_versions":["<=1.7044"]},{"reported":"2024-08-27","distribution":"App-cpanminus","affected_versions":["<=1.7047"],"cves":["CVE-2024-45321"],"id":"CPANSA-App-cpanminus-2024-45321","fixed_versions":[],"references":["https://github.com/miyagawa/cpanminus/issues/611","https://github.com/miyagawa/cpanminus/pull/674","https://security.metacpan.org/2024/08/26/cpanminus-downloads-code-using-insecure-http.html"],"description":"The App::cpanminus package through 1.7047 for Perl downloads code via insecure HTTP, enabling code execution for network attackers.\n"}],"main_module":"App::cpanminus","versions":[{"version":"0.01","date":"2010-02-20T02:27:00"},{"date":"2010-02-20T03:14:10","version":"0.02"},{"date":"2010-02-20T03:39:56","version":"0.03"},{"date":"2010-02-20T05:04:01","version":"0.04"},{"date":"2010-02-20T05:16:03","version":"0.05"},{"date":"2010-02-20T05:48:44","version":"0.06"},{"date":"2010-02-20T20:20:08","version":"0.07"},{"version":"0.08","date":"2010-02-20T23:41:01"},{"date":"2010-02-21T07:48:49","version":"0.09"},{"date":"2010-02-23T20:52:46","version":"0.99_01"},{"date":"2010-02-24T06:20:33","version":"0.99_02"},{"date":"2010-02-24T07:05:47","version":"0.99_03"},{"date":"2010-02-25T17:20:05","version":"0.99_04"},{"date":"2010-02-25T22:42:22","version":"0.99_05"},{"version":"0.99_06","date":"2010-02-25T22:51:43"},{"version":"0.99_07","date":"2010-02-28T05:14:30"},{"date":"2010-03-01T05:59:15","version":"0.9910"},{"date":"2010-03-02T00:29:51","version":"0.9911"},{"version":"0.9912","date":"2010-03-03T02:55:22"},{"date":"2010-03-03T03:21:59","version":"0.9913"},{"date":"2010-03-04T08:42:03","version":"0.9914"},{"version":"0.9915","date":"2010-03-04T09:58:11"},{"date":"2010-03-04T19:35:22","version":"0.9916"},{"version":"0.9917","date":"2010-03-09T13:58:32"},{"version":"0.9918","date":"2010-03-10T02:26:03"},{"version":"0.9919","date":"2010-03-10T02:41:31"},{"version":"0.99_20","date":"2010-03-10T09:49:22"},{"date":"2010-03-10T15:03:38","version":"0.9921"},{"date":"2010-03-11T02:01:28","version":"0.9922"},{"version":"0.9923","date":"2010-03-16T00:07:01"},{"version":"0.99_24","date":"2010-03-22T05:05:33"},{"date":"2010-03-23T02:54:44","version":"0.99_25"},{"date":"2010-03-23T03:24:34","version":"0.99_26"},{"version":"0.9927","date":"2010-03-23T18:24:55"},{"version":"0.9928","date":"2010-03-26T05:09:12"},{"version":"0.9929","date":"2010-03-27T04:42:41"},{"version":"0.9930","date":"2010-03-30T21:29:41"},{"version":"0.9931","date":"2010-04-05T01:18:12"},{"date":"2010-04-05T23:28:11","version":"0.9932"},{"version":"0.99_33","date":"2010-04-11T07:51:27"},{"date":"2010-04-11T11:55:44","version":"0.9934"},{"date":"2010-04-12T11:09:47","version":"0.999_01"},{"version":"0.999_02","date":"2010-04-13T07:11:08"},{"version":"0.999_03","date":"2010-04-14T09:29:25"},{"date":"2010-04-14T09:30:52","version":"0.9935"},{"date":"2010-04-19T06:23:01","version":"0.999_04"},{"date":"2010-04-21T11:40:46","version":"0.999_05"},{"version":"0.9936","date":"2010-04-21T11:53:47"},{"version":"1.0000","date":"2010-04-24T08:23:24"},{"date":"2010-04-24T08:26:40","version":"1.0001"},{"version":"1.0002","date":"2010-05-02T03:51:09"},{"date":"2010-05-04T23:16:18","version":"1.0003"},{"version":"1.0004","date":"2010-05-14T23:10:54"},{"date":"2010-07-02T23:39:32","version":"1.0005"},{"version":"1.0006","date":"2010-07-02T23:54:14"},{"version":"1.0010","date":"2010-07-30T19:55:47"},{"version":"1.0011","date":"2010-08-18T23:42:36"},{"date":"2010-08-20T19:58:19","version":"1.0012"},{"version":"1.0013","date":"2010-09-12T19:54:17"},{"date":"2010-09-21T19:43:20","version":"1.0014"},{"version":"1.0015","date":"2010-09-24T23:52:00"},{"version":"1.1000","date":"2010-11-12T07:57:33"},{"version":"1.1001","date":"2010-11-12T20:37:49"},{"date":"2010-11-17T02:28:44","version":"1.1002"},{"date":"2010-11-25T09:18:34","version":"1.1003"},{"date":"2010-11-30T18:07:12","version":"1.1004"},{"version":"1.1005","date":"2010-12-14T23:08:40"},{"version":"1.1006","date":"2010-12-16T19:32:01"},{"version":"1.1007","date":"2011-01-18T17:40:16"},{"version":"1.19_01","date":"2011-01-18T20:54:34"},{"version":"1.19_02","date":"2011-01-18T22:11:52"},{"date":"2011-01-26T22:08:11","version":"1.1008"},{"version":"1.2000","date":"2011-02-16T18:11:52"},{"date":"2011-02-16T18:55:46","version":"1.2001"},{"date":"2011-03-01T02:59:25","version":"1.29_01"},{"date":"2011-03-02T00:09:00","version":"1.29_02"},{"date":"2011-03-02T22:41:40","version":"1.3000"},{"version":"1.3001","date":"2011-03-04T02:35:03"},{"version":"1.30_02","date":"2011-03-04T03:54:53"},{"date":"2011-03-04T08:32:56","version":"1.30_03"},{"date":"2011-03-04T08:53:22","version":"1.30_04"},{"version":"1.30_05","date":"2011-03-04T09:41:34"},{"version":"1.30_06","date":"2011-03-04T22:57:43"},{"version":"1.30_07","date":"2011-03-04T23:20:45"},{"version":"1.30_08","date":"2011-03-05T00:07:44"},{"version":"1.30_09","date":"2011-03-05T02:16:54"},{"date":"2011-03-05T22:57:38","version":"1.30_10"},{"date":"2011-03-06T09:37:36","version":"1.30_11"},{"version":"1.30_12","date":"2011-03-07T03:00:09"},{"date":"2011-03-07T18:54:03","version":"1.30_13"},{"date":"2011-03-08T09:11:33","version":"1.4000"},{"version":"1.4001","date":"2011-03-08T18:11:57"},{"version":"1.4002","date":"2011-03-09T01:57:18"},{"date":"2011-03-10T02:15:19","version":"1.4003"},{"version":"1.4004","date":"2011-03-10T18:09:34"},{"date":"2011-05-11T19:49:38","version":"1.4005"},{"version":"1.4006","date":"2011-05-16T17:17:29"},{"version":"1.4007","date":"2011-05-17T17:54:45"},{"date":"2011-06-16T01:00:00","version":"1.4008"},{"version":"1.49_01","date":"2011-06-26T17:59:17"},{"date":"2011-10-12T09:57:03","version":"1.49_02"},{"version":"1.5000","date":"2011-10-13T06:40:49"},{"version":"1.5001","date":"2011-10-13T15:21:16"},{"date":"2011-10-18T00:13:36","version":"1.5002"},{"version":"1.5003","date":"2011-10-19T07:31:10"},{"version":"1.5004","date":"2011-11-08T22:29:31"},{"date":"2011-11-22T21:31:21","version":"1.5005"},{"date":"2011-11-29T19:49:42","version":"1.5006"},{"date":"2011-12-20T18:18:50","version":"1.5007"},{"version":"1.5008","date":"2012-03-18T01:23:40"},{"version":"1.5009","date":"2012-03-30T16:45:43"},{"version":"1.5010","date":"2012-03-31T11:01:47"},{"version":"1.5011","date":"2012-04-12T09:59:39"},{"version":"1.5012","date":"2012-05-11T03:50:22"},{"version":"1.5013","date":"2012-05-12T03:18:19"},{"version":"1.5014","date":"2012-06-13T01:34:12"},{"version":"1.5015","date":"2012-06-24T22:37:49"},{"version":"1.5016","date":"2012-07-17T19:02:48"},{"date":"2012-07-18T15:41:26","version":"1.5017"},{"date":"2012-09-19T05:42:19","version":"1.5018"},{"date":"2012-12-22T17:22:02","version":"1.5019"},{"version":"1.5020","date":"2013-01-29T18:32:26"},{"version":"1.5021","date":"2013-01-31T08:45:31"},{"version":"1.59_01","date":"2013-01-31T18:07:46"},{"date":"2013-02-01T03:12:10","version":"1.59_02"},{"date":"2013-02-01T18:54:58","version":"1.59_03"},{"date":"2013-02-03T17:07:16","version":"1.59_04"},{"version":"1.59_05","date":"2013-02-04T19:52:48"},{"date":"2013-02-05T20:40:30","version":"1.59_06"},{"date":"2013-02-06T19:17:51","version":"1.59_07"},{"version":"1.59_08","date":"2013-02-06T19:32:27"},{"date":"2013-02-07T09:59:04","version":"1.59_09"},{"version":"1.59_10","date":"2013-02-08T00:29:16"},{"version":"1.59_11","date":"2013-02-11T22:12:12"},{"version":"1.59_12","date":"2013-02-14T02:15:12"},{"date":"2013-02-25T20:16:34","version":"1.59_13"},{"version":"1.6000","date":"2013-02-26T17:57:00"},{"date":"2013-02-27T01:04:54","version":"1.6001"},{"version":"1.6002","date":"2013-02-27T20:13:45"},{"version":"1.6003","date":"2013-03-08T19:03:47"},{"date":"2013-03-08T19:32:25","version":"1.6004"},{"date":"2013-03-08T19:48:06","version":"1.6005"},{"date":"2013-03-14T06:00:27","version":"1.6006"},{"version":"1.6007","date":"2013-03-17T21:34:17"},{"version":"1.6008","date":"2013-03-19T17:03:36"},{"date":"2013-03-25T04:10:51","version":"1.6100"},{"date":"2013-03-25T20:41:37","version":"1.6101"},{"date":"2013-03-28T00:16:09","version":"1.6102"},{"version":"1.6103","date":"2013-03-30T21:36:49"},{"version":"1.6104","date":"2013-04-03T01:04:42"},{"date":"2013-04-05T05:17:38","version":"1.6105"},{"date":"2013-04-06T21:19:18","version":"1.6106"},{"version":"1.6107","date":"2013-04-07T04:19:16"},{"version":"1.6108","date":"2013-04-13T06:32:52"},{"version":"1.6190","date":"2013-04-13T11:48:43"},{"version":"1.6191","date":"2013-04-14T03:09:40"},{"version":"1.6192","date":"2013-04-14T08:17:32"},{"version":"1.6193","date":"2013-04-15T07:37:08"},{"date":"2013-04-15T07:42:51","version":"1.6900"},{"date":"2013-04-21T00:50:44","version":"1.6901"},{"version":"1.6109","date":"2013-04-21T01:06:02"},{"version":"1.6902","date":"2013-04-21T01:18:10"},{"version":"1.6903","date":"2013-04-22T01:07:09"},{"date":"2013-04-24T02:24:37","version":"1.6904"},{"date":"2013-04-24T03:05:21","version":"1.6905"},{"date":"2013-04-25T06:20:23","version":"1.6906"},{"version":"1.6907","date":"2013-04-26T18:40:08"},{"date":"2013-04-27T01:12:17","version":"1.6908"},{"date":"2013-04-29T08:49:53","version":"1.6909"},{"version":"1.6910","date":"2013-05-03T07:29:32"},{"version":"1.6911","date":"2013-05-04T20:28:02"},{"date":"2013-05-06T20:59:52","version":"1.6912"},{"date":"2013-05-10T00:05:10","version":"1.6913"},{"date":"2013-05-12T23:03:52","version":"1.6914"},{"date":"2013-05-16T02:01:33","version":"1.6915"},{"date":"2013-06-04T10:55:37","version":"1.6916"},{"date":"2013-06-05T01:07:33","version":"1.6917"},{"date":"2013-06-10T20:03:21","version":"1.6918"},{"version":"1.6919","date":"2013-06-12T15:33:22"},{"date":"2013-06-14T21:09:54","version":"1.6920"},{"version":"1.6921","date":"2013-06-18T10:19:43"},{"version":"1.6922","date":"2013-06-19T20:57:09"},{"version":"1.6923","date":"2013-07-04T05:17:11"},{"version":"1.6924","date":"2013-07-16T18:38:21"},{"date":"2013-07-20T05:08:06","version":"1.6925"},{"version":"1.6926","date":"2013-07-20T16:03:14"},{"date":"2013-07-23T07:45:33","version":"1.6927"},{"version":"1.6928","date":"2013-07-23T21:07:02"},{"version":"1.6929","date":"2013-07-24T18:46:29"},{"version":"1.6930","date":"2013-07-24T20:48:14"},{"date":"2013-07-24T21:51:33","version":"1.6931"},{"date":"2013-07-24T22:29:04","version":"1.6932"},{"version":"1.6933","date":"2013-07-25T16:58:24"},{"version":"1.6934","date":"2013-07-26T23:17:21"},{"version":"1.6935","date":"2013-07-31T18:36:57"},{"version":"1.6936","date":"2013-08-05T04:37:54"},{"version":"1.6937","date":"2013-08-06T01:55:29"},{"date":"2013-08-06T06:12:45","version":"1.6938"},{"date":"2013-08-06T09:55:55","version":"1.6939"},{"version":"1.6940","date":"2013-08-08T19:36:34"},{"version":"1.6941","date":"2013-08-20T18:32:44"},{"version":"1.6942","date":"2013-08-27T18:11:47"},{"version":"1.6943","date":"2013-09-03T23:40:37"},{"date":"2013-09-04T22:02:21","version":"1.7000"},{"date":"2013-09-08T20:12:16","version":"1.7001"},{"version":"1.7100","date":"2013-09-19T05:31:34"},{"version":"1.7101","date":"2013-09-19T11:15:59"},{"date":"2013-09-20T04:33:50","version":"1.7102"},{"version":"1.7002","date":"2014-04-27T05:46:31"},{"version":"1.7003","date":"2014-04-27T15:11:46"},{"date":"2014-04-27T16:23:35","version":"1.7004"},{"date":"2014-09-02T04:00:49","version":"1.7005"},{"version":"1.7006","date":"2014-09-02T06:27:35"},{"date":"2014-09-05T12:04:41","version":"1.7005"},{"version":"1.7006","date":"2014-09-05T22:45:37"},{"version":"1.7007","date":"2014-09-09T16:26:54"},{"version":"1.7008","date":"2014-09-10T08:19:24"},{"date":"2014-09-10T08:44:00","version":"1.7009"},{"date":"2014-09-17T09:28:23","version":"1.7010"},{"version":"1.7011","date":"2014-09-22T06:08:51"},{"date":"2014-09-27T02:29:33","version":"1.7012"},{"version":"1.7013","date":"2014-10-07T06:52:45"},{"version":"1.7014","date":"2014-10-08T03:54:02"},{"date":"2014-11-14T21:14:40","version":"1.7015"},{"version":"1.7016","date":"2014-11-16T19:47:26"},{"date":"2014-11-25T22:01:56","version":"1.7017"},{"version":"1.7018","date":"2014-11-25T22:08:49"},{"version":"1.7019","date":"2014-12-04T20:52:24"},{"date":"2014-12-09T01:54:37","version":"1.7020"},{"version":"1.7021","date":"2014-12-12T05:43:01"},{"date":"2014-12-13T00:42:15","version":"1.7022"},{"version":"1.7023","date":"2015-01-04T23:00:30"},{"date":"2015-01-12T21:32:45","version":"1.7024"},{"date":"2015-02-07T06:59:17","version":"1.7025"},{"date":"2015-02-14T01:12:18","version":"1.7026"},{"date":"2015-02-14T20:15:20","version":"1.7027"},{"version":"1.7028","date":"2015-04-17T17:24:16"},{"date":"2015-04-18T22:16:17","version":"1.7029"},{"date":"2015-04-19T12:15:59","version":"1.7030"},{"date":"2015-04-22T21:14:17","version":"1.7031"},{"version":"1.7032","date":"2015-04-30T01:52:49"},{"version":"1.7033","date":"2015-05-02T00:18:54"},{"date":"2015-05-07T21:21:07","version":"1.7034"},{"date":"2015-06-05T17:51:53","version":"1.7035"},{"date":"2015-06-06T05:08:20","version":"1.7036"},{"version":"1.7037","date":"2015-06-18T21:38:47"},{"version":"1.7038","date":"2015-06-23T01:05:25"},{"version":"1.7039","date":"2015-06-29T01:06:18"},{"date":"2016-01-07T19:29:19","version":"1.7040"},{"date":"2016-05-08T18:29:30","version":"1.7041"},{"version":"1.7042","date":"2016-05-24T07:49:34"},{"date":"2017-04-03T03:57:15","version":"1.7043"},{"version":"1.7044","date":"2018-04-19T11:54:56"},{"version":"1.7900","date":"2018-04-20T12:17:48"},{"version":"1.7901","date":"2018-04-20T12:20:35"},{"version":"1.7902","date":"2018-04-20T12:43:24"},{"version":"1.7903","date":"2018-04-20T14:54:30"},{"date":"2018-04-20T21:22:56","version":"1.7904"},{"date":"2018-04-21T09:40:47","version":"1.7905"},{"version":"1.9015","date":"2018-04-21T10:57:20"},{"version":"1.9016","date":"2018-04-21T11:17:58"},{"version":"1.9017","date":"2018-04-21T17:31:13"},{"version":"1.9018","date":"2018-04-22T13:54:32"},{"date":"2018-04-25T09:27:31","version":"1.7906"},{"version":"1.7907","date":"2018-04-26T11:36:59"},{"version":"1.7045","date":"2022-01-27T03:05:02"},{"version":"1.7046","date":"2022-04-27T06:01:26"},{"version":"1.7047","date":"2023-07-30T06:01:02"},{"date":"2024-10-29T18:49:03","version":"1.7048"}]},"RTMP-Client":{"main_module":"RTMP::Client","advisories":[{"cves":[],"affected_versions":["<0.04"],"reported":"2011-12-01","distribution":"RTMP-Client","references":["https://metacpan.org/changes/distribution/RTMP-Client"],"description":"TBD\n","fixed_versions":[">=0.04"],"id":"CPANSA-RTMP-Client-2011-01"}],"versions":[{"date":"2011-07-26T08:17:20","version":"0.01"},{"date":"2011-07-27T02:09:05","version":"0.02"},{"date":"2011-07-27T02:17:06","version":"0.03"},{"version":"0.04","date":"2011-12-01T08:59:19"}]},"Mojo-DOM-Role-Analyzer":{"versions":[{"date":"2020-08-04T22:48:59","version":"0.007"},{"version":"0.008","date":"2020-08-05T13:43:47"},{"version":"0.009","date":"2020-08-06T02:47:29"},{"date":"2020-08-08T13:39:18","version":"0.010"},{"date":"2020-08-09T13:43:20","version":"0.011"},{"version":"0.012","date":"2020-08-09T23:37:24"},{"version":"0.013","date":"2020-08-12T03:21:57"},{"version":"0.014","date":"2020-08-13T21:09:19"},{"date":"2020-08-16T15:39:17","version":"0.015"}],"advisories":[{"affected_versions":["<=0.015"],"distribution":"Mojo-DOM-Role-Analyzer","reported":"2024-06-26","cves":["CVE-2024-38526"],"fixed_versions":[],"severity":null,"references":["https://github.com/mitmproxy/pdoc/pull/703","https://github.com/mitmproxy/pdoc/security/advisories/GHSA-5vgj-ggm4-fg62","https://sansec.io/research/polyfill-supply-chain-attack","https://github.com/briandfoy/cpan-security-advisory/issues/155","https://github.com/sdondley/Mojo-DOM-Role-Analyzer/issues/10","https://stackdiary.com/polyfill-compromise-hits-100000-sites-in-a-supply-chain-attack/"],"description":"pdoc provides API Documentation for Python Projects. Documentation generated with `pdoc --math` linked to JavaScript files from polyfill.io. The polyfill.io CDN has been sold and now serves malicious code. This issue has been fixed in pdoc 14.5.1.\n","embedded_vulnerability":{"name":"polyfill.io","distributed_version":null},"id":"CPANSA-Mojo-DOM-Role-Analyzer-2024-38526"}],"main_module":"Mojo::DOM::Role::Analyzer"},"eperl":{"versions":[{"version":"1.4","date":"1996-09-08T09:22:26"},{"date":"1997-01-20T06:55:18","version":"v2.0.3"},{"date":"1997-03-25T09:19:29","version":"2.1"},{"date":"1997-04-03T12:24:29","version":"2.1"},{"date":"1997-04-05T08:04:08","version":"2.1"},{"date":"1997-04-18T16:36:34","version":"2.1"},{"date":"1997-04-27T15:20:23","version":"v2.1.0"},{"version":"v2.1.1","date":"1997-05-04T20:06:49"},{"version":"2.2","date":"1997-05-29T10:26:35"},{"date":"1997-05-30T06:24:00","version":"v2.1.2"},{"date":"1997-05-30T16:53:19","version":"2.2"},{"date":"1997-06-06T07:37:49","version":"2.2"},{"date":"1997-06-28T15:59:18","version":"2.2"},{"date":"1997-07-19T08:23:43","version":"v2.2.0"},{"version":"v2.2.2","date":"1997-08-14T15:16:02"},{"version":"v2.2.3","date":"1997-08-21T15:44:18"},{"date":"1997-09-01T14:16:42","version":"v2.2.4"},{"version":"v2.2.5","date":"1997-09-03T10:33:40"},{"date":"1997-10-28T13:28:21","version":"v2.2.6"},{"date":"1997-11-17T16:37:11","version":"v2.2.8"},{"date":"1998-01-02T11:42:11","version":"v2.2.12"},{"version":"v2.2.13","date":"1998-07-10T09:22:54"}],"advisories":[{"cves":["CVE-2001-0733"],"affected_versions":["<=2.2.14"],"distribution":"eperl","reported":"2001-10-18","description":"The #sinclude directive in Embedded Perl (ePerl) 2.2.14 and earlier allows a remote attacker to execute arbitrary code by modifying the 'sinclude' file to point to another file that contains a #include directive that references a file that contains the code.\n","references":["http://www.securityfocus.com/archive/1/192711","http://www.securityfocus.com/bid/2912","https://exchange.xforce.ibmcloud.com/vulnerabilities/6743"],"fixed_versions":[],"severity":null,"id":"CPANSA-ePerl-2001-0733"}],"main_module":"Parse::ePerl"},"XML-Atom":{"versions":[{"version":"0.01","date":"2003-09-08T04:47:09"},{"version":"0.02","date":"2003-09-28T23:11:32"},{"date":"2003-12-05T09:20:27","version":"0.03"},{"version":"0.04","date":"2003-12-15T08:03:04"},{"version":"0.041","date":"2003-12-15T17:10:29"},{"version":"0.05","date":"2004-01-06T05:04:22"},{"version":"0.06","date":"2004-04-24T23:47:03"},{"version":"0.07","date":"2004-05-16T01:13:46"},{"date":"2004-06-02T06:05:57","version":"0.08"},{"version":"0.09","date":"2004-07-30T05:49:54"},{"version":"0.10","date":"2005-01-01T00:20:55"},{"date":"2005-02-24T03:19:08","version":"0.11"},{"version":"0.12","date":"2005-06-07T05:13:21"},{"date":"2005-07-19T21:00:39","version":"0.12_01"},{"date":"2005-08-16T21:46:06","version":"0.12_02"},{"date":"2005-08-18T07:18:26","version":"0.13"},{"version":"0.13_01","date":"2005-09-14T05:38:53"},{"version":"0.14","date":"2005-10-21T04:55:40"},{"version":"0.15","date":"2005-11-01T05:55:40"},{"version":"0.16","date":"2005-11-22T21:17:26"},{"date":"2006-02-22T23:24:00","version":"0.17"},{"date":"2006-03-16T06:14:49","version":"0.18"},{"date":"2006-03-19T05:03:12","version":"0.19"},{"version":"0.19_01","date":"2006-04-30T16:49:38"},{"date":"2006-07-07T06:39:52","version":"0.19_03"},{"date":"2006-07-12T03:44:58","version":"0.20"},{"date":"2006-07-12T17:44:49","version":"0.21"},{"date":"2006-07-19T10:42:43","version":"0.21_01"},{"date":"2006-07-20T08:07:49","version":"0.21_02"},{"version":"0.21_03","date":"2006-07-21T10:15:06"},{"date":"2006-07-24T20:00:37","version":"0.22"},{"date":"2006-08-27T05:53:47","version":"0.22_01"},{"version":"0.23","date":"2006-08-27T06:42:17"},{"version":"0.24","date":"2006-11-25T23:03:57"},{"version":"0.25","date":"2006-11-30T23:14:23"},{"version":"0.25_01","date":"2007-04-27T20:57:39"},{"date":"2007-06-20T19:23:36","version":"0.25_02"},{"version":"0.26","date":"2007-09-16T04:24:44"},{"version":"0.27","date":"2007-09-16T04:41:58"},{"version":"0.27_01","date":"2007-10-04T20:30:48"},{"version":"0.28","date":"2007-11-06T21:08:06"},{"date":"2008-10-26T00:27:44","version":"0.29"},{"date":"2008-11-12T22:45:37","version":"0.30"},{"version":"0.31","date":"2008-11-13T21:19:34"},{"version":"0.32","date":"2008-11-23T22:07:41"},{"date":"2009-01-07T02:00:59","version":"0.33"},{"date":"2009-04-29T17:46:03","version":"0.34"},{"date":"2009-05-01T23:42:30","version":"0.35"},{"version":"0.36","date":"2009-12-21T22:02:23"},{"version":"0.37","date":"2009-12-29T02:32:53"},{"date":"2011-05-23T02:57:51","version":"0.38"},{"version":"0.39","date":"2011-06-21T04:07:51"},{"date":"2011-09-18T19:43:27","version":"0.40"},{"date":"2011-09-27T01:44:56","version":"0.41"},{"version":"0.42","date":"2017-05-12T05:34:02"},{"date":"2021-04-28T20:40:29","version":"0.43"}],"main_module":"XML::Atom","advisories":[{"affected_versions":["<0.39"],"reported":"2021-07-09","distribution":"XML-Atom","cves":["CVE-2012-1102"],"fixed_versions":[],"severity":"high","id":"CPANSA-XML-Atom-2012-1102","description":"It was discovered that the XML::Atom Perl module before version 0.39 did not disable external entities when parsing XML from potentially untrusted sources. This may allow attackers to gain read access to otherwise protected resources, depending on how the library is used.\n","references":["https://seclists.org/oss-sec/2012/q1/549","https://metacpan.org/release/MIYAGAWA/XML-Atom-0.39/source/Changes"]}]},"Config-IniFiles":{"advisories":[{"references":["http://www.openwall.com/lists/oss-security/2012/05/02/6","http://www.osvdb.org/81671","http://secunia.com/advisories/48990","https://bitbucket.org/shlomif/perl-config-inifiles/changeset/a08fa26f4f59","https://bugzilla.redhat.com/show_bug.cgi?id=818386","http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080713.html","http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080716.html","http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081207.html","http://www.securityfocus.com/bid/53361","http://www.ubuntu.com/usn/USN-1543-1","https://exchange.xforce.ibmcloud.com/vulnerabilities/75328"],"description":"The Config::IniFiles module before 2.71 for Perl creates temporary files with predictable names, which allows local users to overwrite arbitrary files via a symlink attack. NOTE: some of these details are obtained from third party information. NOTE: it has been reported that this might only be exploitable by writing in the same directory as the .ini file. If this is the case, then this issue might not cross privilege boundaries.\n","fixed_versions":[],"id":"CPANSA-Config-IniFiles-2012-2451","severity":null,"cves":["CVE-2012-2451"],"affected_versions":["<2.71"],"distribution":"Config-IniFiles","reported":"2012-06-27"}],"main_module":"Config::IniFiles","versions":[{"version":"0.05","date":"2000-06-20T02:07:11"},{"version":"0.06","date":"2000-06-26T02:38:13"},{"version":"0.08","date":"2000-07-31T01:32:53"},{"version":"0.09","date":"2000-07-31T01:51:15"},{"date":"2000-09-17T03:29:50","version":"0.11"},{"date":"2000-09-20T01:06:10","version":"1.6"},{"date":"2000-10-17T02:01:37","version":"1.8"},{"version":"1.11","date":"2000-11-25T03:36:14"},{"date":"2000-11-28T14:09:00","version":"1.12"},{"date":"2000-11-28T14:09:15","version":"1.13"},{"version":"2.10","date":"2000-12-13T17:45:25"},{"version":"2.13","date":"2000-12-18T17:56:28"},{"version":"2.14","date":"2001-01-08T18:27:24"},{"version":"2.17","date":"2001-03-24T21:54:18"},{"version":"2.18","date":"2001-03-30T04:48:27"},{"version":"2.19","date":"2001-04-05T01:06:51"},{"version":"2.21","date":"2001-08-28T11:05:35"},{"date":"2001-12-06T17:15:03","version":"2.22"},{"version":"2.23","date":"2001-12-07T16:24:14"},{"version":"2.24","date":"2001-12-07T17:27:08"},{"date":"2001-12-12T20:50:06","version":"2.25"},{"version":"2.26","date":"2001-12-19T22:26:32"},{"date":"2001-12-20T16:11:24","version":"2.27"},{"date":"2002-08-15T21:41:35","version":"2.29"},{"version":"2.30","date":"2002-10-15T18:59:21"},{"date":"2002-12-18T01:58:55","version":"2.36"},{"version":"2.37","date":"2003-01-31T23:06:08"},{"version":"2.38","date":"2003-05-14T01:38:13"},{"date":"2005-04-29T20:33:23","version":"2.39"},{"version":"2.43","date":"2008-12-04T17:02:19"},{"date":"2008-12-25T09:47:08","version":"2.44"},{"version":"2.45","date":"2008-12-27T15:25:59"},{"date":"2009-01-17T14:40:26","version":"2.46"},{"version":"2.47","date":"2009-01-21T09:41:11"},{"version":"2.48","date":"2009-04-07T12:26:44"},{"version":"2.49","date":"2009-05-02T14:27:53"},{"version":"2.50","date":"2009-05-31T11:58:04"},{"version":"2.51","date":"2009-06-08T09:41:11"},{"date":"2009-06-28T13:21:57","version":"2.52"},{"date":"2009-11-13T09:58:28","version":"2.53"},{"version":"2.54","date":"2009-11-18T11:15:13"},{"version":"2.55","date":"2009-12-22T15:48:07"},{"version":"2.56","date":"2009-12-31T04:57:40"},{"version":"2.57","date":"2010-03-01T13:51:57"},{"date":"2010-05-17T07:45:33","version":"2.58"},{"version":"2.59","date":"2010-11-12T11:33:52"},{"version":"2.60","date":"2010-11-13T07:22:50"},{"date":"2010-11-14T08:57:26","version":"2.61"},{"date":"2010-11-19T13:37:37","version":"2.62"},{"version":"2.63","date":"2010-11-19T14:54:12"},{"version":"2.64","date":"2010-11-20T09:55:05"},{"version":"2.65","date":"2010-11-25T18:48:52"},{"date":"2011-01-29T16:40:18","version":"2.66"},{"version":"2.67","date":"2011-06-21T11:59:37"},{"version":"2.68","date":"2011-06-21T19:18:33"},{"date":"2012-04-05T09:10:11","version":"2.69"},{"version":"2.70","date":"2012-04-06T09:52:14"},{"date":"2012-05-02T08:05:15","version":"2.71"},{"version":"2.72","date":"2012-05-05T16:56:55"},{"date":"2012-05-14T07:49:33","version":"2.73"},{"date":"2012-05-23T21:47:46","version":"2.74"},{"version":"2.75","date":"2012-05-25T12:29:48"},{"version":"2.76","date":"2012-06-15T14:47:10"},{"version":"2.77","date":"2012-06-21T16:39:23"},{"date":"2012-10-21T11:18:39","version":"2.78"},{"version":"2.79","date":"2013-05-06T07:10:33"},{"version":"2.80","date":"2013-05-14T19:25:07"},{"date":"2013-05-16T10:36:17","version":"2.81"},{"date":"2013-05-21T15:35:10","version":"2.82"},{"date":"2014-01-27T09:01:28","version":"2.83"},{"date":"2015-04-13T18:40:30","version":"2.84"},{"version":"2.85","date":"2015-04-13T19:08:57"},{"date":"2015-04-14T07:55:59","version":"2.86"},{"version":"2.87","date":"2015-06-16T09:06:37"},{"version":"2.88","date":"2015-07-10T08:38:11"},{"version":"2.89","date":"2016-05-03T09:14:13"},{"version":"2.90","date":"2016-06-02T13:09:19"},{"date":"2016-06-03T03:11:38","version":"2.91"},{"version":"2.92","date":"2016-06-17T09:34:08"},{"date":"2016-07-24T08:34:00","version":"2.93"},{"version":"2.94","date":"2016-11-29T17:31:38"},{"date":"2018-03-16T11:14:39","version":"2.95"},{"date":"2018-04-07T08:45:56","version":"2.96"},{"date":"2018-04-21T09:13:56","version":"2.97"},{"date":"2018-04-21T11:50:34","version":"2.98"},{"version":"3.000000","date":"2018-09-13T07:11:41"},{"date":"2019-01-16T09:54:40","version":"3.000001"},{"version":"3.000002","date":"2019-03-14T13:34:40"},{"date":"2020-03-24T15:45:08","version":"3.000003"}]},"DBD-mysql":{"main_module":"DBD::mysql","advisories":[{"references":["https://github.com/perl5-dbi/DBD-mysql/issues/120","http://www.securityfocus.com/bid/99374","http://seclists.org/oss-sec/2017/q2/443"],"description":"The DBD::mysql module through 4.043 for Perl allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by triggering (1) certain error responses from a MySQL server or (2) a loss of a network connection to a MySQL server. The use-after-free defect was introduced by relying on incorrect Oracle mysql_stmt_close documentation and code examples.\n","fixed_versions":[">=4.044"],"id":"CPANSA-DBD-mysql-2017-02","cves":["CVE-2017-10788"],"affected_versions":["<4.044"],"reported":"2017-04-13","distribution":"DBD-mysql"},{"description":"The DBD::mysql module through 4.043 for Perl uses the mysql_ssl=1 setting to mean that SSL is optional (even though this setting's documentation has a \"your communication with the server will be encrypted\" statement), which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152.\n","references":["https://github.com/perl5-dbi/DBD-mysql/pull/114"],"id":"CPANSA-DBD-mysql-2017-01","fixed_versions":[">=4.044"],"cves":["CVE-2017-10789"],"reported":"2017-03-23","distribution":"DBD-mysql","affected_versions":["<4.044"]},{"references":["https://github.com/perl5-dbi/DBD-mysql/commit/793b72b1a0baa5070adacaac0e12fd995a6fbabe"],"description":"Out-of-bounds read.\n","id":"CPANSA-DBD-mysql-2016-03","fixed_versions":["<2.9003,>=4.039"],"cves":["CVE-2016-1249"],"distribution":"DBD-mysql","reported":"2016-11-16","affected_versions":[">=2.9003,<4.039"]},{"affected_versions":["<4.037"],"reported":"2016-10-02","distribution":"DBD-mysql","cves":["CVE-2016-1246"],"fixed_versions":[">=4.037"],"id":"CPANSA-DBD-mysql-2016-02","references":["https://github.com/perl5-dbi/DBD-mysql/commit/7c164a0c86cec6ee95df1d141e67b0e85dfdefd2","http://blogs.perl.org/users/mike_b/2016/10/security-release---buffer-overflow-in-dbdmysql-perl-library.html"],"description":"Buffer overflow in the DBD::mysql module before 4.037 for Perl allows context-dependent attackers to cause a denial of service (crash) via vectors related to an error message.\n"},{"id":"CPANSA-DBD-mysql-2016-01","fixed_versions":[">=4.034"],"references":["https://github.com/perl5-dbi/DBD-mysql/commit/cf0aa7751f6ef8445e9310a64b14dc81460ca156"],"description":"Use-after-free vulnerability in the my_login function in DBD::mysql before 4.033_01 allows attackers to have unspecified impact by leveraging a call to mysql_errno after a failure of my_login.\n","distribution":"DBD-mysql","reported":"2016-08-19","affected_versions":["<4.034"],"cves":["CVE-2015-8949"]},{"fixed_versions":[">=4.041"],"id":"CPANSA-DBD-mysql-2015-01","references":["https://github.com/perl5-dbi/DBD-mysql/commit/3619c170461a3107a258d1fd2d00ed4832adb1b1"],"description":"There is a vulnerability of type use-after-free affecting DBD::mysql (aka DBD-mysql or the Database Interface (DBI) MySQL driver for Perl) 3.x and 4.x before 4.041 when used with mysql_server_prepare=1.\n","affected_versions":["<4.041"],"reported":"2015-12-27","distribution":"DBD-mysql","cves":["CVE-2016-1251"]},{"references":["https://github.com/perl5-dbi/DBD-mysql/commit/a56ae87a4c1c1fead7d09c3653905841ccccf1cc","https://rt.cpan.org/Public/Bug/Display.html?id=97625"],"description":"Use-after-free vulnerability in DBD::mysql before 4.029 allows attackers to cause a denial of service (program crash) or possibly execute arbitrary code via vectors related to a lost server connection.\n","id":"CPANSA-DBD-mysql-2014-01","fixed_versions":[">=4.028"],"cves":["CVE-2014-9906"],"distribution":"DBD-mysql","reported":"2014-07-30","affected_versions":["<4.028"]}],"versions":[{"version":"v1.2212.","date":"2000-04-15T20:17:36"},{"version":"2.0900","date":"2001-05-06T21:47:46"},{"version":"2.0901","date":"2001-05-25T21:24:45"},{"date":"2001-07-09T21:10:17","version":"2.0902"},{"version":"2.0903","date":"2001-10-28T22:53:19"},{"version":"2.1000","date":"2001-10-31T04:01:07"},{"version":"2.1001","date":"2001-11-04T17:55:04"},{"version":"2.1002","date":"2001-11-04T18:22:30"},{"version":"2.1003","date":"2001-11-05T20:14:34"},{"date":"2001-11-13T01:24:26","version":"2.1004"},{"version":"2.1005","date":"2001-12-13T09:07:53"},{"version":"2.1007","date":"2001-12-27T18:10:04"},{"date":"2001-12-27T18:10:21","version":"2.1006"},{"date":"2001-12-28T17:06:05","version":"2.1008"},{"version":"2.1009","date":"2002-01-01T20:02:26"},{"date":"2002-01-07T21:33:21","version":"2.1010"},{"version":"2.1011","date":"2002-02-12T11:09:53"},{"version":"2.1012","date":"2002-04-12T07:21:06"},{"date":"2002-04-15T07:49:36","version":"2.1013"},{"version":"2.1014","date":"2002-04-17T21:24:26"},{"version":"2.1015","date":"2002-04-29T20:53:41"},{"version":"2.1016","date":"2002-05-01T20:07:05"},{"date":"2002-05-02T20:59:04","version":"2.1017"},{"version":"2.1018","date":"2002-08-13T17:52:25"},{"date":"2002-09-16T18:42:20","version":"2.1019"},{"version":"2.1020","date":"2002-09-23T20:42:50"},{"date":"2002-12-17T20:46:14","version":"2.1021"},{"date":"2003-01-03T02:46:24","version":"2.1022"},{"version":"2.1023","date":"2003-01-19T21:19:03"},{"version":"2.1024","date":"2003-01-20T12:08:27"},{"date":"2003-02-07T21:09:44","version":"2.1025"},{"version":"2.1026","date":"2003-03-03T20:46:27"},{"date":"2003-05-31T18:08:15","version":"2.1027"},{"version":"2.1028","date":"2003-06-25T16:12:36"},{"date":"2003-06-27T04:32:05","version":"2.9002"},{"date":"2003-09-12T17:04:42","version":"2.9003_1"},{"version":"2.9003","date":"2003-10-27T03:39:04"},{"version":"2.9004_2","date":"2004-07-01T03:24:14"},{"date":"2004-07-14T03:07:34","version":"2.9004"},{"date":"2004-10-20T17:27:25","version":"2.9005_1"},{"date":"2004-10-28T00:39:25","version":"2.9005_3"},{"date":"2005-03-29T02:43:14","version":"2.9005"},{"version":"2.9006","date":"2005-04-04T04:27:00"},{"date":"2005-04-27T00:13:49","version":"2.9015_3"},{"version":"2.9007","date":"2005-04-27T00:14:06"},{"version":"2.9008","date":"2005-06-06T01:39:20"},{"date":"2005-07-01T01:48:20","version":"3.0000"},{"date":"2005-07-03T21:56:11","version":"3.0000_0"},{"version":"3.0001_0","date":"2005-07-04T15:53:40"},{"version":"3.0001_1","date":"2005-07-04T16:16:00"},{"version":"3.0001","date":"2005-07-07T01:14:17"},{"date":"2005-07-07T01:22:39","version":"3.0001_2"},{"date":"2005-07-08T05:37:13","version":"3.0001_3"},{"version":"3.0002","date":"2005-07-11T16:49:47"},{"version":"3.0002_1","date":"2005-08-04T02:50:35"},{"date":"2005-09-26T23:22:57","version":"3.0002_2"},{"date":"2005-09-28T18:58:55","version":"3.0002_3"},{"version":"3.0002_4","date":"2005-11-06T21:47:29"},{"date":"2006-02-01T23:20:01","version":"3.0002_5"},{"version":"3.0003","date":"2006-05-04T17:49:06"},{"version":"3.0003_1","date":"2006-05-04T17:49:23"},{"version":"3.0004","date":"2006-05-21T17:28:22"},{"version":"3.0004_1","date":"2006-05-21T17:28:33"},{"version":"3.0005_1","date":"2006-06-10T01:21:49"},{"date":"2006-06-10T01:22:01","version":"3.0005"},{"date":"2006-06-11T17:05:25","version":"3.0006"},{"date":"2006-06-11T17:05:36","version":"3.0006_1"},{"date":"2006-09-08T23:12:02","version":"3.0007"},{"date":"2006-09-08T23:13:45","version":"3.0007_1"},{"date":"2006-10-07T12:59:23","version":"3.0007_2"},{"version":"3.0008","date":"2006-10-16T13:42:13"},{"date":"2006-10-16T13:42:24","version":"3.0008_1"},{"date":"2006-12-24T14:11:04","version":"4.00"},{"date":"2007-01-08T01:11:12","version":"4.001"},{"date":"2007-03-02T03:32:59","version":"4.002"},{"date":"2007-03-02T14:13:37","version":"4.003"},{"version":"4.004","date":"2007-03-22T22:31:22"},{"date":"2007-06-08T15:33:34","version":"4.005"},{"date":"2007-12-26T22:50:48","version":"4.006"},{"version":"4.007","date":"2008-05-11T15:56:07"},{"version":"4.008","date":"2008-08-15T14:06:50"},{"date":"2008-10-22T01:05:54","version":"4.009"},{"version":"4.010","date":"2008-10-24T14:00:41"},{"version":"4.011","date":"2009-04-14T02:40:31"},{"version":"4.012","date":"2009-06-19T02:08:06"},{"date":"2009-09-16T18:37:29","version":"4.013"},{"date":"2010-04-15T03:17:58","version":"4.014"},{"version":"4.015","date":"2010-07-09T19:48:58"},{"date":"2010-07-10T16:50:49","version":"4.016"},{"version":"4.017","date":"2010-08-12T05:50:17"},{"date":"2010-10-26T16:59:27","version":"4.018"},{"version":"4.019","date":"2011-05-09T01:28:25"},{"version":"4.020","date":"2011-08-20T18:45:49"},{"date":"2012-04-28T14:18:16","version":"4.021"},{"date":"2012-08-30T02:00:19","version":"4.022"},{"version":"4.023","date":"2013-04-12T21:48:10"},{"date":"2013-09-17T16:04:11","version":"4.024"},{"date":"2013-11-04T18:29:18","version":"4.025"},{"date":"2014-01-16T01:33:03","version":"4.026"},{"date":"2014-03-19T14:25:36","version":"4.027"},{"version":"4.028","date":"2014-08-01T19:59:28"},{"date":"2014-12-09T02:39:44","version":"4.029"},{"version":"4.030_01","date":"2015-01-28T03:53:42"},{"version":"4.030_02","date":"2015-03-02T20:44:31"},{"version":"4.031","date":"2015-03-06T20:12:05"},{"date":"2015-04-16T22:28:43","version":"4.032_01"},{"version":"4.032","date":"2015-07-21T12:15:24"},{"date":"2015-10-25T19:59:17","version":"4.032_03"},{"date":"2015-10-27T03:37:29","version":"4.033"},{"version":"4.033_01","date":"2015-12-15T07:16:36"},{"version":"4.033_02","date":"2015-12-18T07:00:41"},{"date":"2016-07-04T19:32:50","version":"4.033_03"},{"version":"4.034","date":"2016-07-06T06:32:05"},{"version":"4.035","date":"2016-07-09T05:50:13"},{"date":"2016-08-01T06:29:25","version":"4.035_01"},{"date":"2016-08-11T08:11:18","version":"4.035_02"},{"date":"2016-08-19T15:52:10","version":"4.035_03"},{"version":"4.036","date":"2016-08-23T05:59:26"},{"date":"2016-10-03T07:00:29","version":"4.037"},{"date":"2016-10-14T20:56:49","version":"4.037_01"},{"date":"2016-10-19T19:37:55","version":"4.037_02"},{"version":"4.038","date":"2016-10-20T02:33:04"},{"version":"4.038_01","date":"2016-10-30T08:45:31"},{"date":"2016-11-16T03:57:57","version":"4.039"},{"version":"4.040","date":"2016-11-19T19:56:51"},{"date":"2016-11-28T20:40:41","version":"4.041"},{"date":"2016-12-13T06:59:09","version":"4.041_01"},{"version":"4.041_02","date":"2017-02-28T20:57:20"},{"date":"2017-03-08T20:32:52","version":"4.042"},{"version":"4.043","date":"2017-06-29T21:12:09"},{"date":"2018-01-23T01:53:30","version":"4.044"},{"version":"4.044","date":"2018-02-07T21:43:00"},{"version":"4.045","date":"2018-02-08T20:30:55"},{"date":"2018-02-08T20:48:11","version":"4.046"},{"date":"2018-03-09T20:27:44","version":"4.046_01"},{"version":"4.047","date":"2018-09-09T03:02:20"},{"version":"4.048","date":"2018-09-15T12:46:51"},{"date":"2018-11-17T18:58:09","version":"4.049"},{"version":"4.050","date":"2019-01-09T09:07:15"},{"version":"4.018_01","date":"2019-10-07T10:06:13"},{"date":"2023-10-04T07:10:45","version":"4.051"},{"version":"5.001","date":"2023-10-04T07:20:03"},{"date":"2023-10-24T09:02:42","version":"5.002"},{"date":"2023-12-01T07:13:15","version":"4.052"},{"version":"5.003","date":"2023-12-01T07:14:42"},{"version":"5.004","date":"2024-03-19T08:16:14"},{"date":"2024-05-01T09:04:33","version":"5.005"},{"date":"2024-06-04T19:59:44","version":"5.006"},{"date":"2024-07-01T06:02:18","version":"5.007"},{"date":"2024-07-30T07:47:38","version":"5.008"},{"date":"2024-09-19T08:35:24","version":"5.009"},{"date":"2024-11-11T06:43:01","version":"5.010"}]},"Batch-Batchrun":{"advisories":[{"severity":"high","id":"CPANSA-Batch-Batchrun-2011-4117","fixed_versions":[],"description":"The Batch::Batchrun module 1.03 for Perl does not properly handle temporary files.\n","references":["http://www.openwall.com/lists/oss-security/2011/11/04/2","http://www.openwall.com/lists/oss-security/2011/11/04/4","https://rt.cpan.org/Public/Bug/Display.html?id=69594"],"distribution":"Batch-Batchrun","reported":"2020-01-31","affected_versions":[">=1.03"],"cves":["CVE-2011-4117"]}],"main_module":"Batch::Batchrun","versions":[{"date":"1999-08-21T20:25:47","version":"1.03"}]},"Crypt-OpenSSL-DSA":{"advisories":[{"cves":["CVE-2009-0129"],"affected_versions":["<0.14"],"distribution":"Crypt-OpenSSL-DSA","reported":"2009-01-15","description":"Missing error check in do_verify, which might allow remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature.\n","references":["https://metacpan.org/changes/distribution/Crypt-OpenSSL-DSA","https://www.openwall.com/lists/oss-security/2009/01/12/4","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511519"],"fixed_versions":[">=0.14"],"id":"CPANSA-Crypt-OpenSSL-DSA-2009-01"}],"main_module":"Crypt::OpenSSL::DSA","versions":[{"date":"2001-09-19T04:45:14","version":"0.01"},{"date":"2001-09-24T17:32:49","version":"0.02"},{"version":"0.03","date":"2002-02-07T05:57:36"},{"version":"0.04","date":"2002-09-24T04:52:06"},{"version":"0.10","date":"2002-09-26T00:21:17"},{"date":"2003-01-06T19:08:08","version":"0.11"},{"date":"2005-05-23T01:44:36","version":"0.12"},{"date":"2005-10-15T21:37:10","version":"0.13"},{"date":"2012-10-16T22:55:16","version":"0.14"},{"version":"0.15","date":"2015-02-03T21:57:37"},{"date":"2016-10-27T11:25:18","version":"0.16"},{"date":"2016-10-27T18:54:42","version":"0.17"},{"date":"2016-11-17T10:33:35","version":"0.18"},{"date":"2017-01-13T08:24:56","version":"0.19"},{"version":"0.20","date":"2021-03-20T12:31:50"}]},"Parallel-ForkManager":{"versions":[{"date":"2000-10-19T21:52:22","version":"0.5"},{"date":"2000-11-30T11:03:55","version":"0.6"},{"version":"0.7","date":"2001-04-04T11:28:22"},{"date":"2001-05-14T14:34:23","version":"v0.7.2"},{"date":"2001-10-24T00:32:21","version":"v0.7.3"},{"date":"2002-07-04T21:16:46","version":"v0.7.4"},{"date":"2002-12-25T23:14:12","version":"v0.7.5"},{"date":"2010-08-15T10:53:20","version":"0.7.6"},{"date":"2010-09-27T22:27:36","version":"0.7.7"},{"date":"2010-10-25T16:44:43","version":"0.7.8"},{"version":"0.7.9","date":"2010-11-01T18:06:12"},{"date":"2012-12-23T10:29:10","version":"v1.0.0"},{"date":"2012-12-23T19:35:57","version":"1.01"},{"version":"1.02","date":"2012-12-24T11:30:23"},{"version":"1.03","date":"2013-03-06T09:31:14"},{"date":"2013-09-03T06:57:39","version":"1.04"},{"version":"1.05","date":"2013-09-18T08:58:10"},{"date":"2013-12-24T20:42:36","version":"1.06"},{"version":"1.07","date":"2014-11-10T07:11:25"},{"date":"2015-01-07T15:27:26","version":"1.08"},{"version":"1.09","date":"2015-01-08T14:47:12"},{"version":"1.10","date":"2015-01-15T15:22:56"},{"date":"2015-01-22T19:09:25","version":"1.10_1"},{"version":"1.10_2","date":"2015-01-26T19:32:34"},{"version":"1.11","date":"2015-01-30T16:16:43"},{"version":"1.12","date":"2015-02-23T23:22:38"},{"date":"2015-05-11T22:32:07","version":"1.13"},{"date":"2015-05-17T21:19:58","version":"1.14"},{"date":"2015-07-08T21:41:39","version":"1.15"},{"version":"1.16","date":"2015-10-08T22:51:51"},{"date":"2015-11-28T14:50:06","version":"1.17"},{"date":"2016-03-29T23:27:09","version":"1.18"},{"date":"2016-06-28T23:04:26","version":"1.19"},{"date":"2018-07-19T00:48:24","version":"1.20"},{"date":"2018-08-23T01:28:34","version":"2.00"},{"date":"2018-08-23T23:59:37","version":"2.01"},{"date":"2018-10-08T23:21:03","version":"2.02"},{"version":"2.03","date":"2024-08-24T18:13:26"}],"main_module":"Parallel::ForkManager","advisories":[{"distribution":"Parallel-ForkManager","reported":"2020-01-31","affected_versions":["<1.0.0"],"cves":["CVE-2011-4115"],"id":"CPANSA-Parallel-ForkManager-2011-4115","severity":"high","fixed_versions":[],"references":["http://www.openwall.com/lists/oss-security/2011/11/04/2","http://www.openwall.com/lists/oss-security/2011/11/04/4","https://rt.cpan.org/Public/Bug/Display.html?id=68298"],"description":"Parallel::ForkManager module before 1.0.0 for Perl does not properly handle temporary files.\n"}]},"DBD-mysqlPP":{"advisories":[{"cves":[],"affected_versions":["<0.93"],"reported":"2011-10-14","distribution":"DBD-mysqlPP","description":"SQL injection.\n","references":["https://metacpan.org/changes/distribution/DBD-mysqlPP","https://jvn.jp/en/jp/JVN51216285/index.html"],"fixed_versions":[">=0.03"],"severity":"high","id":"CPANSA-DBD-mysqlPP-2011-01"}],"main_module":"DBD::mysqlPP","versions":[{"date":"2002-04-04T07:20:36","version":"0.02"},{"version":"0.03","date":"2002-04-15T10:26:39"},{"version":"0.04","date":"2003-01-24T11:14:14"},{"version":"0.05","date":"2011-10-21T23:07:07"},{"date":"2011-10-26T22:17:22","version":"0.06"},{"date":"2011-11-17T22:24:50","version":"0.07"}]},"Catalyst-Plugin-Static-Simple":{"versions":[{"version":"0.01","date":"2005-08-12T01:37:04"},{"version":"0.02","date":"2005-08-16T22:09:54"},{"version":"0.03","date":"2005-08-22T03:44:24"},{"date":"2005-08-22T15:59:08","version":"0.04"},{"version":"0.05","date":"2005-08-26T15:58:06"},{"version":"0.06","date":"2005-09-05T19:36:58"},{"date":"2005-09-06T01:07:28","version":"0.07"},{"version":"0.08","date":"2005-09-07T22:52:21"},{"date":"2005-10-07T17:40:16","version":"0.09"},{"version":"0.10","date":"2005-10-19T21:19:04"},{"date":"2005-11-14T00:28:01","version":"0.11"},{"version":"0.13","date":"2005-12-15T14:56:40"},{"version":"0.14","date":"2006-03-24T16:18:59"},{"date":"2006-07-05T16:35:54","version":"0.14"},{"date":"2006-12-09T03:25:57","version":"0.15"},{"version":"0.16","date":"2007-04-30T18:48:25"},{"version":"0.17","date":"2007-05-11T14:52:16"},{"date":"2007-07-01T04:12:31","version":"0.18"},{"date":"2007-07-02T20:54:05","version":"0.19"},{"version":"0.20","date":"2007-09-24T13:50:15"},{"date":"2009-03-29T18:47:56","version":"0.21"},{"date":"2009-08-21T16:21:17","version":"0.22"},{"version":"0.23","date":"2009-10-06T16:51:19"},{"date":"2009-10-18T18:12:48","version":"0.24"},{"date":"2009-10-22T20:49:26","version":"0.25"},{"date":"2009-12-06T12:32:46","version":"0.26"},{"version":"0.27","date":"2010-01-03T14:56:26"},{"version":"0.28","date":"2010-01-04T13:18:25"},{"version":"0.29","date":"2010-02-01T18:48:45"},{"date":"2012-05-04T17:17:29","version":"0.30"},{"date":"2013-09-09T14:32:43","version":"0.31"},{"version":"0.32","date":"2014-06-05T12:44:48"},{"date":"2014-10-29T16:02:17","version":"0.33"},{"date":"2017-08-02T17:00:14","version":"0.34"},{"date":"2018-03-14T12:13:30","version":"0.35"},{"version":"0.36","date":"2018-03-15T11:41:17"},{"date":"2021-05-05T14:30:07","version":"0.37"}],"advisories":[{"fixed_versions":[">=0.34"],"id":"CPANSA-Catalyst-Plugin-Static-Simple-2017-01","description":"The Catalyst-Plugin-Static-Simple module before 0.34 for Perl allows remote attackers to read arbitrary files if there is a '.' character anywhere in the pathname, which differs from the intended policy of allowing access only when the filename itself has a '.' character.\n","references":["https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/","https://metacpan.org/pod/CPAN::Checksums"],"affected_versions":["<0.34"],"distribution":"Catalyst-Plugin-Static-Simple","reported":"2017-10-31","cves":["CVE-2017-16248"]}],"main_module":"Catalyst::Plugin::Static::Simple"},"Devel-PPPort":{"versions":[{"date":"1999-03-01T05:05:50","version":"1.0004"},{"date":"1999-03-08T02:57:01","version":"1.0005"},{"date":"1999-03-24T16:17:40","version":"1.0006"},{"date":"1999-03-29T16:29:09","version":"1.0007"},{"version":"2.99_01","date":"2004-08-07T14:09:53"},{"version":"2.99_02","date":"2004-08-08T17:24:46"},{"version":"2.99_03","date":"2004-08-09T20:40:45"},{"version":"2.99_04","date":"2004-08-10T21:37:23"},{"date":"2004-08-10T21:52:34","version":"2.99_05"},{"date":"2004-08-11T21:14:33","version":"2.99_06"},{"date":"2004-08-13T11:05:16","version":"2.99_07"},{"version":"3.00","date":"2004-08-16T09:37:21"},{"date":"2004-08-17T21:45:21","version":"3.00_01"},{"date":"2004-08-19T11:23:25","version":"3.00_02"},{"date":"2004-08-20T13:31:59","version":"3.00_03"},{"version":"3.01","date":"2004-08-23T05:52:31"},{"version":"3.02","date":"2004-09-08T19:25:27"},{"date":"2004-09-08T20:39:17","version":"3.03"},{"date":"2004-12-29T14:03:53","version":"3.04"},{"date":"2005-01-31T18:29:11","version":"3.05"},{"version":"3.06","date":"2005-02-02T21:53:39"},{"date":"2005-06-25T16:59:34","version":"3.06_01"},{"date":"2005-10-18T19:59:34","version":"3.06_02"},{"date":"2005-10-18T21:43:58","version":"3.06_03"},{"version":"3.06_04","date":"2005-10-30T11:10:01"},{"date":"2006-01-16T18:10:31","version":"3.07"},{"version":"3.08","date":"2006-01-19T18:40:04"},{"date":"2006-05-20T11:11:00","version":"3.08_01"},{"version":"3.08_02","date":"2006-05-22T11:17:01"},{"date":"2006-05-25T15:33:51","version":"3.08_03"},{"version":"3.08_04","date":"2006-05-29T17:44:18"},{"version":"3.08_05","date":"2006-06-23T19:00:30"},{"date":"2006-06-25T08:09:51","version":"3.08_06"},{"version":"3.08_07","date":"2006-07-03T21:36:39"},{"date":"2006-07-08T16:22:49","version":"3.09"},{"date":"2006-07-21T17:25:17","version":"3.09_01"},{"version":"3.09_02","date":"2006-07-25T18:45:27"},{"date":"2006-08-14T19:31:33","version":"3.10"},{"date":"2006-12-02T16:26:47","version":"3.10_01"},{"date":"2006-12-02T17:23:57","version":"3.10_02"},{"date":"2007-02-14T13:10:03","version":"3.11"},{"version":"3.11_01","date":"2007-03-23T17:09:16"},{"version":"3.11_02","date":"2007-08-12T23:08:25"},{"date":"2007-08-14T19:14:20","version":"3.11_03"},{"version":"3.11_04","date":"2007-08-20T16:31:23"},{"date":"2007-08-20T17:29:16","version":"3.11_05"},{"date":"2007-09-11T21:41:31","version":"3.11_06"},{"date":"2007-09-22T08:00:55","version":"3.12"},{"date":"2007-10-04T10:33:11","version":"3.13"},{"date":"2008-01-04T14:09:17","version":"3.13_01"},{"date":"2008-04-13T13:11:47","version":"3.13_02"},{"date":"2008-05-13T19:07:49","version":"3.13_03"},{"version":"3.14","date":"2008-06-01T12:08:17"},{"version":"3.14_01","date":"2008-07-11T20:42:44"},{"date":"2008-10-12T19:49:45","version":"3.14_02"},{"date":"2008-10-21T21:20:59","version":"3.14_03"},{"version":"3.14_04","date":"2008-10-30T18:55:01"},{"version":"3.14_05","date":"2008-10-31T07:20:25"},{"version":"3.15","date":"2009-01-18T13:49:22"},{"version":"3.16","date":"2009-01-23T17:33:31"},{"version":"3.17","date":"2009-03-15T15:45:38"},{"version":"3.18","date":"2009-06-12T11:05:52"},{"date":"2009-06-12T11:25:31","version":"3.18_01"},{"date":"2009-06-14T09:59:59","version":"3.19"},{"version":"3.19_01","date":"2010-02-20T18:48:07"},{"date":"2010-03-07T12:51:00","version":"3.19_02"},{"version":"3.19_03","date":"2011-04-13T07:49:49"},{"date":"2011-09-10T19:32:27","version":"3.20"},{"date":"2013-08-17T13:27:59","version":"3.21"},{"date":"2014-03-20T02:17:15","version":"3.22"},{"date":"2014-04-13T00:04:17","version":"3.23"},{"version":"3.24","date":"2014-05-09T00:15:50"},{"date":"2014-12-02T13:08:04","version":"3.25"},{"version":"3.26","date":"2015-01-08T02:42:03"},{"date":"2015-01-13T15:02:40","version":"3.27"},{"date":"2015-01-16T12:33:46","version":"3.28"},{"version":"3.29","date":"2015-03-05T13:22:18"},{"date":"2015-03-05T20:29:10","version":"3.30"},{"version":"3.31","date":"2015-03-12T14:27:15"},{"date":"2015-09-30T16:31:45","version":"3.32"},{"version":"3.32_01","date":"2016-05-06T11:01:12"},{"date":"2016-05-24T13:59:25","version":"3.32_02"},{"version":"3.33","date":"2016-06-03T13:47:32"},{"version":"3.34","date":"2016-06-12T23:09:20"},{"version":"3.35","date":"2016-06-17T18:22:04"},{"date":"2017-05-14T08:53:44","version":"3.36"},{"version":"3.41","date":"2018-04-21T12:18:05"},{"date":"2018-04-21T14:45:37","version":"3.42"},{"version":"3.43","date":"2018-09-19T14:47:44"},{"version":"3.43_04","date":"2018-10-12T17:16:24"},{"date":"2019-02-20T23:05:14","version":"3.44"},{"version":"3.45","date":"2019-03-19T20:55:38"},{"date":"2019-04-26T19:50:59","version":"3.46"},{"version":"3.47","date":"2019-04-28T05:30:49"},{"version":"3.48","date":"2019-04-28T21:43:34"},{"version":"3.48","date":"2019-04-28T21:57:51"},{"date":"2019-04-29T17:48:49","version":"3.49"},{"version":"3.50","date":"2019-04-30T19:05:34"},{"date":"2019-04-30T23:09:43","version":"3.51"},{"date":"2019-05-14T17:18:17","version":"3.52"},{"date":"2019-06-09T16:13:03","version":"3.52_04"},{"version":"3.53_04","date":"2019-06-11T07:57:30"},{"date":"2019-09-28T00:25:55","version":"3.53"},{"date":"2019-09-28T00:35:17","version":"3.54"},{"date":"2019-11-07T21:15:22","version":"3.55"},{"date":"2019-11-25T17:04:32","version":"3.56"},{"date":"2020-01-31T20:46:51","version":"3.57"},{"date":"2020-02-10T22:15:17","version":"3.57_01"},{"version":"3.57_02","date":"2020-03-04T21:32:50"},{"date":"2020-03-09T20:42:29","version":"3.58"},{"version":"3.58_01","date":"2020-08-06T22:31:34"},{"version":"3.59","date":"2020-08-10T16:51:52"},{"date":"2020-08-11T19:44:32","version":"3.60"},{"date":"2020-09-30T23:22:16","version":"3.60_01"},{"date":"2020-10-07T14:59:47","version":"3.60_02"},{"date":"2020-10-12T23:25:45","version":"3.61"},{"version":"3.62","date":"2020-10-16T20:01:45"},{"date":"2021-07-07T00:08:28","version":"3.63"},{"date":"2022-02-01T18:16:40","version":"3.64"},{"version":"3.65","date":"2022-03-02T22:12:02"},{"version":"3.66","date":"2022-03-02T22:41:01"},{"date":"2022-03-08T19:25:43","version":"3.67"},{"date":"2022-03-18T22:08:30","version":"3.68"}],"advisories":[{"severity":null,"id":"CPANSA-Devel-PPPort-2017-01","fixed_versions":[">=3.41"],"references":["https://metacpan.org/dist/Devel-PPPort/changes","https://github.com/Dual-Life/Devel-PPPort/pull/47"],"description":"Function croak() takes first parameter printf-like format. Arbitrary string from the variable $@ can cause perl crash when contains one or more '%'.\n","reported":"2017-02-14","distribution":"Devel-PPPort","affected_versions":["<3.41"],"cves":[]}],"main_module":"Devel::PPPort"},"Lemonldap-NG-Portal":{"advisories":[{"cves":[],"affected_versions":["<0.87"],"reported":"2009-02-08","distribution":"Lemonldap-NG-Portal","description":"When running on Apache with thread support setMacros and setGroups were not launched with the good datas.\n","references":["https://metacpan.org/changes/distribution/Lemonldap-NG-Portal"],"fixed_versions":[">=0.87"],"id":"CPANSA-Lemonldap-NG-Portal-2009-01"}],"main_module":"Lemonldap::NG::Portal","versions":[{"date":"2005-06-29T18:44:50","version":"0.01"},{"date":"2005-07-02T08:49:37","version":"0.02"},{"version":"0.1","date":"2006-10-07T13:24:36"},{"version":"0.11","date":"2006-10-14T13:26:07"},{"version":"0.111","date":"2006-10-14T14:11:06"},{"date":"2006-10-17T13:58:53","version":"0.2"},{"date":"2006-11-02T15:23:31","version":"0.4"},{"date":"2006-11-03T07:25:06","version":"0.41"},{"version":"0.42","date":"2006-12-07T21:02:36"},{"version":"0.5","date":"2006-12-19T18:26:07"},{"version":"0.51","date":"2006-12-31T13:03:32"},{"version":"0.6","date":"2007-01-13T19:47:36"},{"date":"2007-02-28T22:29:18","version":"0.62"},{"date":"2007-03-04T18:23:52","version":"0.63"},{"version":"0.64","date":"2007-03-09T20:18:23"},{"version":"0.7","date":"2007-03-29T19:52:31"},{"version":"0.71","date":"2007-04-01T20:26:10"},{"date":"2007-04-14T20:46:13","version":"0.72"},{"date":"2007-04-20T06:51:13","version":"0.73"},{"date":"2007-06-13T13:54:26","version":"0.74"},{"version":"0.76","date":"2007-07-22T20:35:13"},{"date":"2007-07-31T05:11:34","version":"0.77"},{"date":"2007-10-15T06:03:56","version":"0.8"},{"date":"2008-02-28T07:13:04","version":"0.81"},{"version":"0.82","date":"2008-04-11T14:53:38"},{"version":"0.83","date":"2008-06-06T05:50:06"},{"date":"2008-06-06T12:46:10","version":"0.84"},{"version":"0.85","date":"2008-08-25T19:53:48"},{"version":"0.86","date":"2008-12-25T08:26:49"},{"date":"2009-02-08T07:13:05","version":"0.87"},{"version":"0.88","date":"2009-06-29T10:14:46"},{"version":"0.89","date":"2009-07-05T11:40:59"},{"date":"2009-10-11T08:26:21","version":"0.90"},{"version":"0.99","date":"2010-10-13T21:02:21"},{"version":"0.99.1","date":"2010-10-22T05:36:29"},{"version":"0.991","date":"2010-10-22T05:45:04"},{"version":"0.992","date":"2010-10-24T06:33:29"},{"version":"1.0.0","date":"2010-11-26T13:38:59"},{"version":"1.0.2","date":"2011-02-28T13:42:23"},{"date":"2011-03-07T11:17:03","version":"v1.0.3"},{"version":"1.0.4","date":"2011-03-23T14:54:26"},{"date":"2011-04-15T14:51:44","version":"1.0.5"},{"date":"2011-05-30T08:40:46","version":"1.0.6"},{"version":"1.1.0","date":"2011-07-08T09:33:35"},{"date":"2011-07-29T13:43:35","version":"1.1.1"},{"date":"2011-10-07T12:58:06","version":"1.1.2"},{"version":"1.2.0","date":"2012-06-18T10:13:31"},{"date":"2012-07-06T09:18:54","version":"1.2.1"},{"version":"1.2.2","date":"2012-09-17T14:04:26"},{"version":"1.2.2_01","date":"2013-01-25T21:51:54"},{"date":"2013-02-08T17:11:38","version":"1.2.3"},{"date":"2013-04-23T13:19:57","version":"1.2.4"},{"version":"1.2.5","date":"2013-08-26T10:39:11"},{"date":"2013-11-02T16:31:10","version":"v1.3.0"},{"version":"v1.3.0_01","date":"2013-11-10T18:00:31"},{"version":"v1.3.1","date":"2013-11-11T14:01:21"},{"version":"1.3.2","date":"2014-02-05T09:31:50"},{"version":"1.3.3","date":"2014-03-07T13:55:23"},{"date":"2014-06-30T12:54:16","version":"v1.4.0"},{"date":"2014-07-25T09:55:37","version":"v1.4.1"},{"version":"v1.4.2","date":"2014-11-05T15:15:30"},{"date":"2014-12-19T10:31:47","version":"v1.4.3"},{"date":"2015-04-15T10:05:31","version":"v1.4.4"},{"version":"v1.4.5","date":"2015-05-22T16:54:10"},{"version":"v1.4.6","date":"2015-10-09T09:21:04"},{"version":"v1.9.0","date":"2016-03-02T09:50:24"},{"date":"2016-03-22T14:25:24","version":"v1.4.7"},{"version":"v1.9.1","date":"2016-04-05T16:02:49"},{"date":"2016-04-27T15:23:10","version":"v1.4.8"},{"version":"v1.9.2","date":"2016-05-01T19:25:36"},{"version":"v1.4.9","date":"2016-06-03T14:14:52"},{"date":"2016-06-07T15:48:38","version":"v1.9.3"},{"date":"2016-06-14T18:36:34","version":"v1.9.4"},{"date":"2016-07-13T09:08:18","version":"v1.4.10"},{"version":"v1.9.5","date":"2016-07-13T12:58:54"},{"date":"2016-10-10T13:34:33","version":"v1.4.11"},{"version":"v1.9.6","date":"2016-10-16T12:23:25"},{"version":"v1.9.7","date":"2016-12-14T19:57:55"},{"date":"2017-02-28T21:11:18","version":"v1.9.99_2.0alpha1"},{"date":"2017-03-02T14:55:34","version":"v1.9.8"},{"date":"2017-03-07T05:48:09","version":"v1.9.99_02"},{"date":"2017-03-07T06:00:28","version":"v1.9.99_03"},{"version":"v1.9.991_01","date":"2017-03-15T05:34:48"},{"date":"2017-03-17T07:21:31","version":"v1.9.9"},{"date":"2017-05-19T18:48:42","version":"v1.9.10"},{"date":"2017-09-01T10:32:34","version":"v1.9.11"},{"date":"2017-09-12T08:40:27","version":"v1.9.12"},{"version":"v1.9.13","date":"2017-09-29T14:00:36"},{"date":"2017-11-24T19:59:18","version":"v1.9.14"},{"version":"v1.9.15","date":"2018-01-23T12:50:53"},{"date":"2018-03-16T10:34:13","version":"v1.9.16"},{"date":"2018-06-16T09:27:27","version":"v1.9.17"},{"date":"2018-10-05T09:40:26","version":"v1.9.18"},{"date":"2018-11-30T10:49:52","version":"v2.0.0"},{"date":"2019-02-12T17:13:39","version":"v2.0.2"},{"version":"v2.0.3","date":"2019-04-11T12:23:10"},{"version":"v2.0.4","date":"2019-05-13T13:07:36"},{"date":"2019-06-29T21:31:33","version":"v2.0.5"},{"version":"v2.0.6","date":"2019-09-24T13:01:00"},{"version":"v2.0.7","date":"2019-12-21T21:46:38"},{"version":"v2.0.8","date":"2020-05-05T16:14:25"},{"date":"2020-09-07T06:21:08","version":"v2.0.9"},{"version":"v2.0.10","date":"2021-01-17T17:24:36"},{"date":"2021-01-31T14:52:09","version":"v2.0.11"},{"version":"v2.0.12","date":"2021-07-22T17:38:26"},{"version":"v2.0.13","date":"2021-08-23T07:09:56"},{"date":"2022-02-22T18:13:11","version":"v2.0.14"},{"version":"v2.0.15","date":"2022-09-09T17:10:35"},{"version":"v2.0.15.1","date":"2022-09-16T08:36:23"},{"date":"2023-02-01T15:29:55","version":"v2.0.16"},{"date":"2023-05-12T17:38:52","version":"v2.16.2"},{"version":"v2.17.0","date":"2023-08-30T16:24:40"},{"date":"2023-12-20T21:12:20","version":"v2.18.0"},{"date":"2023-12-22T23:41:14","version":"v2.18.1"},{"date":"2024-02-06T17:49:13","version":"v2.18.2"},{"date":"2024-04-30T15:23:21","version":"v2.19.0"},{"date":"2024-07-15T14:48:13","version":"v2.19.1"},{"date":"2024-09-04T07:30:33","version":"v2.19.2"},{"date":"2024-10-08T15:53:50","version":"v2.20.0"},{"version":"v2.20.1","date":"2024-11-08T16:34:12"}]},"HTML-EP":{"versions":[{"version":"0.1000","date":"1998-06-24T20:39:44"},{"date":"1998-06-26T12:21:47","version":"0.1002"},{"version":"0.1005","date":"1998-07-17T21:28:11"},{"date":"1998-07-18T16:05:32","version":"0.1006"},{"date":"1998-07-24T20:40:11","version":"0.1100"},{"version":"0.1106","date":"1998-09-12T20:26:57"},{"date":"1998-09-14T00:09:23","version":"0.1107"},{"date":"1998-09-18T01:41:54","version":"0.1108"},{"version":"0.1109","date":"1998-10-06T09:42:57"},{"date":"1998-10-13T16:57:33","version":"0.1111"},{"date":"1998-10-15T19:02:15","version":"0.1112"},{"version":"0.1113","date":"1998-10-21T21:58:15"},{"version":"0.1116","date":"1998-11-06T20:01:59"},{"date":"1998-11-29T18:25:07","version":"0.1117"},{"version":"0.1118","date":"1998-12-03T17:11:04"},{"version":"0.1123","date":"1999-01-26T02:07:08"},{"version":"0.1124","date":"1999-02-01T00:08:19"},{"version":"0.1125","date":"1999-02-07T20:07:50"},{"version":"0.1126","date":"1999-02-13T12:36:36"},{"date":"1999-02-23T18:47:31","version":"0.1127"},{"version":"0.1128","date":"1999-02-26T18:27:47"},{"version":"0.1130","date":"1999-05-04T22:59:11"},{"version":"0.11321","date":"1999-08-26T15:05:04"},{"date":"1999-08-27T11:29:51","version":"0.1133"},{"version":"0.1134","date":"1999-08-31T11:04:44"},{"version":"0.1135","date":"1999-09-21T10:22:21"},{"date":"1999-09-26T13:27:28","version":"0.20_00"},{"version":"0.20_01","date":"1999-09-27T10:28:51"},{"date":"1999-11-05T11:38:40","version":"0.2003"},{"version":"0.2004","date":"1999-11-08T15:38:12"},{"version":"0.2005","date":"1999-11-08T18:18:11"},{"version":"0.2006","date":"1999-11-17T12:28:55"},{"version":"0.2007","date":"1999-11-17T17:23:52"},{"version":"0.2008","date":"1999-11-25T10:15:38"},{"version":"0.2009","date":"1999-12-07T20:43:46"},{"version":"0.2010","date":"1999-12-15T22:41:39"},{"version":"0.2011","date":"2001-01-05T13:26:37"},{"date":"2001-01-05T13:27:07","version":0}],"main_module":"HTML::EP","advisories":[{"id":"CPANSA-HTML-EP-2012-6142","severity":null,"fixed_versions":[],"references":["http://www.securityfocus.com/bid/59833","http://seclists.org/oss-sec/2013/q2/318","https://exchange.xforce.ibmcloud.com/vulnerabilities/84199"],"description":"HTML::EP::Session::Cookie in the HTML::EP module 0.2011 for Perl does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via a crafted request, which is not properly handled when it is deserialized.\n","reported":"2014-06-04","distribution":"HTML-EP","affected_versions":[">=0.2011"],"cves":["CVE-2012-6142"]}]},"Win32-File-Summary":{"advisories":[{"id":"CPANSA-Win32-File-Summary-2018-01","embedded_vulnerability":{"name":"Archive::Tar","distributed_version":"0.072"},"severity":"medium","fixed_versions":[],"description":"In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypass a directory-traversal protection mechanism, and overwrite arbitrary files, via an archive file containing a symlink and a regular file with the same name.\n","references":["https://security-tracker.debian.org/tracker/CVE-2018-12015","https://github.com/jib/archive-tar-new/commit/ae65651eab053fc6dc4590dbb863a268215c1fc5"],"distribution":"Win32-File-Summary","reported":"2018-06-12","affected_versions":[">0"],"cves":["CVE-2018-12015"]},{"embedded_vulnerability":{"name":"Archive::Tar","distributed_version":"0.072"},"id":"CPANSA-Win32-File-Summary-2007-4829","distribution":"Win32-File-Summary","reported":"2007-11-02","affected_versions":[">0"],"cves":["CVE-2007-4829"],"severity":null,"fixed_versions":[],"references":["http://rt.cpan.org/Public/Bug/Display.html?id=29517","https://bugzilla.redhat.com/show_bug.cgi?id=295021","http://rt.cpan.org/Public/Bug/Display.html?id=30380","https://issues.rpath.com/browse/RPL-1716","http://www.securityfocus.com/bid/26355","http://secunia.com/advisories/27539","http://osvdb.org/40410","http://www.ubuntu.com/usn/usn-700-1","http://secunia.com/advisories/33314","http://www.ubuntu.com/usn/usn-700-2","http://www.gentoo.org/security/en/glsa/glsa-200812-10.xml","http://secunia.com/advisories/33116","http://www.vupen.com/english/advisories/2007/3755","https://exchange.xforce.ibmcloud.com/vulnerabilities/38285","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11658"],"description":"Directory traversal vulnerability in the Archive::Tar Perl module 1.36 and earlier allows user-assisted remote attackers to overwrite arbitrary files via a TAR archive that contains a file whose name is an absolute path or has \"..\" sequences.\n"},{"severity":"high","fixed_versions":[],"description":"'(1) cpan/Win32-File-Summary/bin/ptar, (2) cpan/Win32-File-Summary/bin/ptardiff, (3) cpan/Win32-File-Summary/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.'\n","references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"distribution":"Win32-File-Summary","reported":"2016-08-02","affected_versions":[">0"],"cves":["CVE-2016-1238"],"id":"CPANSA-Win32-File-Summary-2016-1238","embedded_vulnerability":{"name":"Archive::Tar","distributed_version":"0.072"}}],"main_module":"Win32::File::Summary","versions":[{"date":"2005-04-24T18:36:18","version":"0.01"},{"date":"2005-04-25T15:18:03","version":"0.01"},{"date":"2005-04-30T12:09:11","version":"0.01"},{"version":"0.01","date":"2005-05-17T09:52:46"},{"date":"2005-08-06T18:10:08","version":"0.01"},{"date":"2005-08-24T04:39:30","version":"0.01"},{"version":"0.01","date":"2006-06-11T14:15:36"}]},"MARC-File-XML":{"versions":[{"version":"v1.0.5","date":"2017-05-24T01:18:18"}],"main_module":"MARC::File::XML","advisories":[{"references":["http://www.securityfocus.com/bid/65057","http://www.nntp.perl.org/group/perl.perl4lib/2014/01/msg3073.html","http://secunia.com/advisories/55404","http://libmail.georgialibraries.org/pipermail/open-ils-general/2014-January/009442.html","https://metacpan.org/source/GMCHARLT/MARC-XML-1.0.2/Changes","http://lists.katipo.co.nz/pipermail/koha/2014-January/038430.html","http://osvdb.org/102367","https://exchange.xforce.ibmcloud.com/vulnerabilities/90620"],"description":"XML External Entity (XXE) vulnerability in MARC::File::XML module before 1.0.2 for Perl, as used in Evergreen, Koha, perl4lib, and possibly other products, allows context-dependent attackers to read arbitrary files via a crafted XML file.\n","fixed_versions":[],"severity":null,"id":"CPANSA-MARC-File-XML-2014-1626","cves":["CVE-2014-1626"],"affected_versions":["<1.0.2"],"distribution":"MARC-File-XML","reported":"2014-01-26"}]},"MojoMojo":{"advisories":[{"references":["https://metacpan.org/changes/distribution/MojoMojo","https://github.com/mojomojo/mojomojo/commit/a9b9fd4f4f037627d30f3cbaa10abe42a3439637"],"description":"Anonymous users can delete attachments.\n","fixed_versions":[">=0.999033"],"id":"CPANSA-MojoMojo-2009-01","cves":[],"affected_versions":["<0.999033"],"reported":"2009-08-14","distribution":"MojoMojo"}],"main_module":"MojoMojo","versions":[{"date":"2007-08-29T14:32:52","version":"0.05"},{"date":"2007-09-12T21:46:24","version":"0.05"},{"date":"2007-09-13T11:28:37","version":"0.05"},{"version":"0.999004","date":"2007-09-18T07:33:43"},{"date":"2007-09-18T08:02:02","version":"0.999005"},{"date":"2007-09-19T20:59:39","version":"0.999006"},{"version":"0.999007","date":"2007-09-23T23:30:59"},{"version":"0.999008","date":"2007-11-12T22:25:35"},{"date":"2008-01-20T23:15:07","version":"0.999010"},{"version":"0.999011","date":"2008-01-23T23:00:05"},{"version":"0.999012","date":"2008-02-05T23:20:47"},{"version":"0.999013","date":"2008-03-05T00:34:49"},{"date":"2008-05-02T18:11:49","version":"0.999014"},{"version":"0.999015","date":"2008-05-03T16:10:08"},{"version":"0.999016","date":"2008-06-29T13:03:39"},{"date":"2008-07-09T14:26:56","version":"0.999017"},{"version":"0.999018","date":"2008-07-16T19:26:46"},{"date":"2008-07-19T21:33:36","version":"0.999018"},{"date":"2008-07-29T16:25:08","version":"0.999018"},{"version":"0.999021","date":"2008-11-01T01:04:37"},{"date":"2008-11-15T09:09:37","version":"0.999022"},{"version":"0.999023","date":"2008-11-23T16:45:05"},{"version":"0.999024","date":"2008-12-31T17:53:50"},{"version":"0.999025","date":"2009-01-04T22:51:40"},{"date":"2009-01-07T23:28:15","version":"0.999026"},{"date":"2009-01-30T23:29:25","version":"0.999027"},{"date":"2009-04-23T10:06:20","version":"0.999028"},{"version":"0.999029","date":"2009-05-09T23:21:10"},{"version":"0.999030","date":"2009-07-18T19:39:14"},{"date":"2009-07-26T19:39:37","version":"0.999031"},{"version":"0.999032","date":"2009-08-02T21:28:51"},{"version":"0.999033","date":"2009-08-14T12:50:18"},{"version":"0.999040","date":"2009-09-04T18:27:34"},{"version":"0.999041","date":"2009-10-26T16:07:25"},{"version":"0.999042","date":"2009-12-02T08:22:24"},{"version":"1.00","date":"2010-05-11T22:58:19"},{"date":"2010-05-27T07:44:39","version":"1.01"},{"version":"1.02","date":"2010-08-30T21:24:41"},{"version":"1.03","date":"2011-01-13T12:48:10"},{"date":"2011-03-12T23:37:45","version":"1.04"},{"version":"1.05","date":"2011-09-14T10:09:05"},{"date":"2012-08-07T10:39:42","version":"1.06"},{"version":"1.07","date":"2012-11-12T23:30:00"},{"date":"2013-01-06T07:46:41","version":"1.08"},{"date":"2013-01-25T16:06:42","version":"1.09"},{"version":"1.10","date":"2013-05-12T22:59:03"},{"version":"1.11","date":"2014-12-25T17:13:24"},{"version":"1.12","date":"2017-05-13T13:47:52"}]},"UI-Dialog":{"advisories":[{"description":"Allows remote attackers to execute arbitrary commands.\n","references":["https://metacpan.org/changes/distribution/UI-Dialog"],"fixed_versions":[">=1.11"],"id":"CPANSA-UI-Dialog-2015-01","cves":[],"affected_versions":["<1.11"],"distribution":"UI-Dialog","reported":"2015-10-10"},{"id":"CPANSA-UI-Dialog-2004-01","fixed_versions":[">=1.03"],"description":"CDialog and Whiptail backends usage of the temp files.\n","references":["https://metacpan.org/changes/distribution/UI-Dialog"],"distribution":"UI-Dialog","reported":"2004-02-18","affected_versions":["<1.03"],"cves":[]},{"reported":"2017-10-10","distribution":"UI-Dialog","affected_versions":["<=1.09"],"cves":["CVE-2008-7315"],"severity":"critical","id":"CPANSA-UI-Dialog-2008-7315","fixed_versions":[">1.09"],"references":["https://security-tracker.debian.org/tracker/CVE-2008-7315/","https://rt.cpan.org/Public/Bug/Display.html?id=107364","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496448","http://www.securityfocus.com/bid/77031/info","http://www.openwall.com/lists/oss-security/2015/10/08/6"],"description":"UI-Dialog 1.09 and earlier allows remote attackers to execute arbitrary commands.\n"}],"main_module":"UI::Dialog","versions":[{"date":"2004-01-04T10:51:34","version":"1.00"},{"date":"2004-01-13T00:08:39","version":"1.01"},{"version":"1.02","date":"2004-02-15T11:03:37"},{"date":"2004-02-18T16:52:59","version":"1.03"},{"date":"2004-02-22T18:34:25","version":"1.04"},{"version":"1.05","date":"2004-03-18T02:12:03"},{"version":"1.06","date":"2004-03-18T16:01:50"},{"version":"1.07","date":"2004-07-21T19:59:51"},{"date":"2004-10-05T00:46:22","version":"1.08"},{"date":"2013-08-10T09:39:07","version":"1.09"},{"version":"1.09","date":"2013-08-10T17:09:57"},{"date":"2013-08-19T17:22:00","version":"1.09"},{"date":"2016-01-19T19:05:07","version":"1.11"},{"date":"2016-01-22T06:42:45","version":"1.12"},{"date":"2016-01-30T21:24:56","version":"1.13"},{"date":"2016-02-03T02:10:12","version":"1.14"},{"version":"1.15","date":"2016-02-09T00:11:17"},{"version":"1.16","date":"2016-02-10T02:57:43"},{"version":"1.17","date":"2016-02-12T05:25:14"},{"version":"1.18","date":"2016-02-13T02:56:26"},{"date":"2016-02-21T23:33:48","version":"1.19"},{"version":"1.20","date":"2016-03-07T02:15:26"},{"date":"2016-04-02T22:17:32","version":"1.21"}]},"Catalyst-Plugin-Static":{"versions":[{"date":"2005-01-29T00:00:20","version":"0.01"},{"version":"0.02","date":"2005-02-19T20:28:50"},{"version":"0.03","date":"2005-03-17T01:01:03"},{"date":"2005-03-17T19:10:36","version":"0.04"},{"version":"0.05","date":"2005-03-21T13:34:27"},{"version":"0.05","date":"2005-03-23T06:48:05"},{"version":"0.06","date":"2005-04-15T16:58:18"},{"date":"2005-04-17T14:50:45","version":"0.07"},{"version":"0.08","date":"2005-09-06T13:42:42"},{"date":"2005-11-14T08:38:35","version":"0.09"},{"version":"0.10","date":"2005-11-14T10:26:31"},{"date":"2009-10-18T18:13:00","version":"0.11"}],"advisories":[{"cves":[],"affected_versions":["<0.10"],"reported":"2005-11-14","distribution":"Catalyst-Plugin-Static","description":"Serving files outside of $config->{root} directory.\n","fixed_versions":[">=0.10"],"id":"CPANSA-Catalyst-Plugin-Static-2005-01"}],"main_module":"Catalyst::Plugin::Static"},"ExtUtils-MakeMaker":{"versions":[{"version":"5.47_01","date":"2001-07-06T08:23:56"},{"version":"5.48_01","date":"2002-01-16T20:19:18"},{"date":"2002-01-18T04:56:33","version":"5.48_03"},{"date":"2002-01-22T00:33:31","version":"5.48_04"},{"version":"5.49_01","date":"2002-02-04T08:46:04"},{"date":"2002-03-05T04:53:40","version":"5.50_01"},{"version":"5.51_01","date":"2002-03-25T07:53:14"},{"version":"5.52_01","date":"2002-03-26T05:56:07"},{"date":"2002-03-31T03:55:52","version":"5.54_01"},{"date":"2002-04-05T05:01:52","version":"5.55_01"},{"date":"2002-04-06T08:29:20","version":"5.55_02"},{"version":"5.55_03","date":"2002-04-07T03:04:18"},{"date":"2002-04-11T05:32:04","version":"5.90_01"},{"version":"5.91_01","date":"2002-04-24T04:21:44"},{"version":"5.92_01","date":"2002-04-30T03:43:53"},{"date":"2002-05-06T06:02:08","version":"5.93_01"},{"date":"2002-05-17T19:04:41","version":"5.94_01"},{"date":"2002-05-17T21:24:13","version":"5.94_02"},{"version":"5.95_01","date":"2002-05-18T18:43:02"},{"date":"2002-05-23T21:01:02","version":"5.96_01"},{"version":"6.00","date":"2002-05-26T01:25:25"},{"date":"2002-05-30T19:02:20","version":"6.01"},{"version":"6.02","date":"2002-06-16T05:41:28"},{"version":"6.03","date":"2002-06-19T21:24:32"},{"date":"2002-08-27T01:42:36","version":"6.04"},{"version":"6.05","date":"2002-08-27T23:24:30"},{"version":"6.06_01","date":"2002-12-19T08:42:01"},{"date":"2002-12-24T04:54:53","version":"6.06_02"},{"version":"6.06_03","date":"2003-03-30T03:49:59"},{"date":"2003-03-31T04:37:55","version":"6.06_04"},{"date":"2003-03-31T10:50:00","version":"6.06_05"},{"date":"2003-04-07T02:46:10","version":"6.10_01"},{"version":"6.10_02","date":"2003-04-07T08:33:23"},{"date":"2003-04-11T07:27:36","version":"6.10_03"},{"version":"6.10_04","date":"2003-05-23T09:05:27"},{"date":"2003-06-07T01:32:29","version":"6.10_05"},{"date":"2003-06-07T08:00:14","version":"6.10_06"},{"version":"6.10_07","date":"2003-07-05T23:40:34"},{"version":"6.10_08","date":"2003-07-22T01:23:46"},{"date":"2003-07-28T04:00:19","version":"6.11"},{"version":"6.12","date":"2003-07-30T05:28:47"},{"date":"2003-07-31T23:51:40","version":"6.13"},{"version":"6.14","date":"2003-08-03T23:27:51"},{"version":"6.15","date":"2003-08-03T23:46:11"},{"date":"2003-08-18T08:43:08","version":"6.16"},{"date":"2003-09-15T22:23:01","version":"6.17"},{"date":"2003-11-04T04:12:53","version":"6.18"},{"version":"6.19","date":"2003-11-04T07:03:30"},{"version":"6.20","date":"2003-11-06T10:37:47"},{"version":"6.21","date":"2003-11-11T08:26:17"},{"date":"2004-04-03T21:33:45","version":"6.21_03"},{"version":"6.22","date":"2004-11-24T04:06:20"},{"version":"6.23","date":"2004-11-26T21:15:45"},{"date":"2004-11-30T20:42:14","version":"6.24"},{"version":"6.24_01","date":"2004-12-09T06:00:53"},{"date":"2004-12-15T12:05:50","version":"6.25"},{"version":"6.25_01","date":"2004-12-18T02:34:56"},{"version":"6.25_02","date":"2004-12-20T08:36:56"},{"date":"2004-12-21T04:17:27","version":"6.25_03"},{"date":"2004-12-21T05:58:10","version":"6.25_04"},{"version":"6.25_05","date":"2004-12-22T13:05:53"},{"date":"2004-12-26T22:26:26","version":"6.25_06"},{"version":"6.25_07","date":"2004-12-31T08:53:31"},{"version":"6.25_08","date":"2005-02-08T14:21:17"},{"date":"2005-03-12T18:29:26","version":"6.25_09"},{"version":"6.25_10","date":"2005-03-14T00:17:26"},{"version":"6.25_11","date":"2005-03-15T10:05:07"},{"version":"6.25_12","date":"2005-03-19T00:19:47"},{"date":"2005-03-22T22:50:34","version":"6.26"},{"version":"6.26_01","date":"2005-03-29T05:48:40"},{"date":"2005-04-04T23:55:46","version":"6.27"},{"version":"6.28","date":"2005-04-12T23:23:53"},{"version":"6.29","date":"2005-05-19T21:22:00"},{"version":"6.30","date":"2005-05-20T23:14:45"},{"version":"6.30_01","date":"2005-08-17T06:59:11"},{"version":"6.30_02","date":"2006-09-01T19:07:28"},{"version":"6.30_03","date":"2006-09-01T21:06:57"},{"version":"6.30_04","date":"2006-09-11T20:20:27"},{"version":"6.31","date":"2006-10-10T01:04:44"},{"date":"2007-02-21T16:02:09","version":"6.32"},{"date":"2007-06-29T22:18:15","version":"6.33"},{"version":"6.34","date":"2007-06-30T16:10:15"},{"date":"2007-07-02T03:56:25","version":"6.35"},{"date":"2007-07-03T08:10:57","version":"6.36"},{"date":"2007-11-26T01:10:14","version":"6.37_01"},{"version":"6.37_02","date":"2007-11-26T07:35:50"},{"date":"2007-11-26T22:18:55","version":"6.37_03"},{"version":"6.38","date":"2007-11-29T00:04:35"},{"date":"2007-12-06T11:08:15","version":"6.40"},{"date":"2007-12-08T01:02:26","version":"6.42"},{"date":"2008-01-02T00:09:23","version":"6.43_01"},{"version":"6.44","date":"2008-02-29T00:08:42"},{"date":"2008-09-06T10:22:44","version":"6.45_01"},{"date":"2008-09-07T21:18:05","version":"6.45_02"},{"date":"2008-09-27T21:37:54","version":"6.46"},{"version":"6.47_01","date":"2008-10-14T16:41:49"},{"date":"2008-10-16T23:18:52","version":"6.47_02"},{"version":"6.48","date":"2008-10-20T18:20:40"},{"version":"6.49_01","date":"2009-02-20T01:11:08"},{"version":"6.50","date":"2009-03-22T19:30:00"},{"version":"6.51_01","date":"2009-04-10T21:33:29"},{"version":"6.51_02","date":"2009-04-14T04:22:58"},{"version":"6.51_03","date":"2009-05-24T05:41:35"},{"date":"2009-05-24T21:07:28","version":"6.51_04"},{"version":"6.52","date":"2009-05-30T18:41:35"},{"version":"6.53_01","date":"2009-06-08T02:05:24"},{"date":"2009-06-08T02:28:24","version":"6.53_02"},{"version":"6.53_03","date":"2009-07-02T21:55:25"},{"date":"2009-07-07T23:53:09","version":"6.54"},{"date":"2009-07-14T23:02:39","version":"6.55_01"},{"version":"6.55_02","date":"2009-08-05T07:40:59"},{"version":"6.55_03","date":"2009-12-05T07:09:23"},{"version":"6.56","date":"2009-12-17T22:06:47"},{"version":"6.57_01","date":"2010-08-24T08:38:36"},{"version":"6.57_02","date":"2010-09-07T23:43:49"},{"date":"2010-09-08T22:33:36","version":"6.57_03"},{"version":"6.57_04","date":"2010-09-09T23:52:37"},{"date":"2010-09-11T20:25:23","version":"6.57_05"},{"date":"2010-10-06T10:53:43","version":"6.57_06"},{"date":"2011-03-25T03:41:39","version":"6.57_07"},{"date":"2011-03-27T11:00:41","version":"6.57_08"},{"version":"6.57_09","date":"2011-03-28T00:15:59"},{"date":"2011-04-04T05:33:46","version":"6.57_10"},{"version":"6.57_11","date":"2011-05-20T00:34:23"},{"version":"6.58","date":"2011-07-06T21:22:27"},{"version":"6.58_01","date":"2011-08-03T20:25:34"},{"version":"6.59","date":"2011-08-05T13:07:58"},{"version":"6.61_01","date":"2011-09-25T05:23:43"},{"date":"2011-10-23T23:48:06","version":"6.62"},{"date":"2011-10-24T00:40:49","version":"6.63_01"},{"date":"2011-11-02T00:07:43","version":"6.63_02"},{"version":"6.63_03","date":"2012-11-02T03:58:40"},{"version":"6.63_04","date":"2012-11-22T21:25:35"},{"version":"6.64","date":"2012-12-17T02:35:20"},{"version":"6.65_01","date":"2013-03-18T23:21:28"},{"version":"6.65_02","date":"2013-04-14T09:59:15"},{"date":"2013-04-15T12:50:31","version":"6.65_03"},{"date":"2013-04-19T17:52:08","version":"6.66"},{"date":"2013-04-25T20:08:31","version":"6.67_01"},{"date":"2013-06-02T17:31:16","version":"6.67_02"},{"date":"2013-06-05T21:09:00","version":"6.67_03"},{"version":"6.67_04","date":"2013-06-10T19:25:22"},{"date":"2013-06-13T20:55:25","version":"6.67_05"},{"version":"6.68","date":"2013-06-14T22:35:24"},{"version":"6.69_01","date":"2013-06-20T12:00:00"},{"version":"6.69_02","date":"2013-07-02T12:16:23"},{"version":"6.69_03","date":"2013-07-09T21:47:07"},{"date":"2013-07-10T10:50:08","version":"6.69_04"},{"date":"2013-07-11T21:20:53","version":"6.69_05"},{"version":"6.69_06","date":"2013-07-12T13:51:50"},{"date":"2013-07-16T14:34:32","version":"6.69_07"},{"date":"2013-07-16T23:40:44","version":"6.69_08"},{"date":"2013-07-21T08:26:44","version":"6.69_09"},{"date":"2013-07-23T21:42:47","version":"6.70"},{"version":"6.71_01","date":"2013-07-24T08:33:58"},{"version":"6.72","date":"2013-07-24T17:42:20"},{"version":"6.73_01","date":"2013-07-24T22:53:41"},{"date":"2013-07-26T12:34:19","version":"6.73_02"},{"date":"2013-07-30T21:12:02","version":"6.73_03"},{"version":"6.73_04","date":"2013-08-01T21:41:12"},{"version":"6.73_05","date":"2013-08-05T16:45:38"},{"version":"6.73_06","date":"2013-08-05T23:52:18"},{"date":"2013-08-07T15:09:12","version":"6.73_07"},{"date":"2013-08-09T18:52:24","version":"6.73_08"},{"version":"6.73_09","date":"2013-08-09T19:00:18"},{"version":"6.73_10","date":"2013-08-16T15:43:35"},{"date":"2013-08-17T21:57:55","version":"6.73_11"},{"date":"2013-08-23T09:52:43","version":"6.73_12"},{"date":"2013-08-27T11:45:55","version":"6.74"},{"date":"2013-08-29T14:09:22","version":"6.75_01"},{"version":"6.75_02","date":"2013-09-01T20:52:29"},{"date":"2013-09-02T23:26:56","version":"6.75_03"},{"version":"6.75_04","date":"2013-09-05T11:10:20"},{"date":"2013-09-06T12:40:59","version":"6.76"},{"date":"2013-09-10T14:22:45","version":"6.77_01"},{"date":"2013-09-12T20:23:49","version":"6.77_02"},{"version":"6.77_03","date":"2013-09-16T11:23:59"},{"date":"2013-09-18T18:25:33","version":"6.77_04"},{"date":"2013-09-19T13:12:32","version":"6.77_05"},{"date":"2013-09-19T14:43:24","version":"6.77_06"},{"date":"2013-09-21T08:48:44","version":"6.77_07"},{"date":"2013-09-22T17:46:50","version":"6.77_08"},{"date":"2013-09-23T12:47:39","version":"6.78"},{"version":"6.79_01","date":"2013-10-01T14:01:33"},{"date":"2013-10-11T12:01:23","version":"6.79_02"},{"date":"2013-10-11T13:00:29","version":"6.79_03"},{"date":"2013-10-11T17:59:30","version":"6.79_04"},{"date":"2013-10-15T15:08:06","version":"6.80"},{"version":"6.81_01","date":"2013-10-16T08:04:29"},{"version":"6.81_02","date":"2013-10-17T11:24:19"},{"date":"2013-10-24T19:54:34","version":"6.81_03"},{"version":"6.81_04","date":"2013-11-01T19:56:13"},{"date":"2013-11-02T21:44:06","version":"6.81_05"},{"version":"6.82","date":"2013-11-04T19:24:38"},{"date":"2013-11-05T11:45:54","version":"6.83_01"},{"date":"2013-11-12T11:15:21","version":"6.83_02"},{"version":"6.83_03","date":"2013-11-15T09:49:39"},{"version":"6.83_04","date":"2013-11-17T11:44:01"},{"version":"6.83_05","date":"2013-11-25T22:52:46"},{"date":"2013-11-29T21:55:40","version":"6.83_06"},{"date":"2013-11-30T15:27:01","version":"6.84"},{"date":"2013-12-16T13:18:35","version":"6.85_01"},{"date":"2013-12-17T10:17:50","version":"6.85_02"},{"version":"6.85_03","date":"2013-12-23T14:59:36"},{"version":"6.85_04","date":"2013-12-23T15:02:38"},{"date":"2013-12-29T11:28:14","version":"6.85_05"},{"date":"2013-12-30T23:18:09","version":"6.85_06"},{"date":"2014-01-01T19:00:36","version":"6.85_07"},{"date":"2014-01-04T12:21:05","version":"6.86"},{"version":"6.87_01","date":"2014-01-12T10:34:38"},{"version":"6.87_02","date":"2014-01-18T13:30:15"},{"date":"2014-01-19T17:53:19","version":"6.87_03"},{"version":"6.87_04","date":"2014-01-26T19:33:34"},{"date":"2014-01-28T14:00:44","version":"6.87_05"},{"version":"6.88","date":"2014-01-31T20:59:13"},{"version":"6.89_01","date":"2014-02-17T16:23:55"},{"version":"6.90","date":"2014-02-20T20:49:24"},{"version":"6.91_01","date":"2014-03-06T13:52:24"},{"version":"6.92","date":"2014-03-13T16:34:37"},{"date":"2014-03-24T16:57:01","version":"6.93_01"},{"version":"6.94","date":"2014-03-25T20:38:21"},{"version":"6.95_01","date":"2014-04-02T20:52:53"},{"date":"2014-04-07T14:29:26","version":"6.95_02"},{"date":"2014-04-11T21:09:21","version":"6.96"},{"date":"2014-04-24T13:29:12","version":"6.97_01"},{"version":"6.97_02","date":"2014-04-28T10:55:44"},{"date":"2014-04-29T20:41:00","version":"6.98"},{"version":"6.99_01","date":"2014-06-03T21:19:42"},{"version":"6.99_02","date":"2014-06-05T11:18:25"},{"version":"6.99_03","date":"2014-07-04T10:15:23"},{"date":"2014-07-12T11:54:35","version":"6.99_04"},{"date":"2014-07-22T11:42:12","version":"6.99_05"},{"version":"6.99_06","date":"2014-07-28T14:07:14"},{"version":"6.99_07","date":"2014-07-30T16:44:02"},{"date":"2014-08-18T13:19:18","version":"6.99_08"},{"version":"6.99_09","date":"2014-08-28T10:13:30"},{"date":"2014-09-04T14:04:55","version":"6.99_10"},{"date":"2014-09-08T13:39:46","version":"6.99_11"},{"version":"6.99_12","date":"2014-09-11T14:32:19"},{"date":"2014-09-15T19:11:34","version":"6.99_13"},{"version":"6.99_14","date":"2014-09-19T14:06:14"},{"date":"2014-09-21T12:23:58","version":"6.99_15"},{"version":"6.99_16","date":"2014-10-02T18:50:08"},{"date":"2014-10-12T18:41:24","version":"6.99_17"},{"version":"6.99_18","date":"2014-10-20T09:14:39"},{"date":"2014-10-22T19:48:56","version":"7.00"},{"date":"2014-10-25T12:49:55","version":"7.01_01"},{"version":"7.01_02","date":"2014-10-25T16:49:40"},{"version":"7.01_03","date":"2014-10-30T19:48:04"},{"date":"2014-10-31T10:13:56","version":"7.01_04"},{"date":"2014-11-03T12:53:43","version":"7.01_05"},{"version":"7.01_06","date":"2014-11-03T20:55:23"},{"version":"7.01_07","date":"2014-11-04T19:40:07"},{"version":"7.01_08","date":"2014-11-04T20:29:00"},{"version":"7.01_09","date":"2014-11-06T21:59:55"},{"version":"7.02","date":"2014-11-08T10:39:16"},{"version":"7.03_01","date":"2014-11-18T21:47:11"},{"version":"7.03_02","date":"2014-11-24T13:26:46"},{"version":"7.03_03","date":"2014-11-25T16:43:06"},{"version":"7.03_04","date":"2014-11-27T14:42:51"},{"date":"2014-11-28T18:32:48","version":"7.03_05"},{"version":"7.03_06","date":"2014-12-01T15:37:46"},{"version":"7.04","date":"2014-12-02T12:56:02"},{"date":"2014-12-06T16:58:07","version":"7.05_01"},{"version":"7.05_02","date":"2014-12-15T20:13:08"},{"date":"2014-12-24T12:12:00","version":"7.05_03"},{"version":"7.05_04","date":"2014-12-24T14:49:46"},{"version":"7.05_05","date":"2014-12-31T23:21:05"},{"date":"2015-01-08T19:09:29","version":"7.05_06"},{"date":"2015-01-09T16:23:43","version":"7.05_07"},{"version":"7.05_08","date":"2015-01-20T10:13:21"},{"date":"2015-01-23T10:51:30","version":"7.05_09"},{"date":"2015-01-26T15:19:01","version":"7.05_10"},{"version":"7.05_11","date":"2015-01-31T16:40:19"},{"date":"2015-02-07T15:19:11","version":"7.05_12"},{"date":"2015-02-18T22:49:29","version":"7.05_13"},{"date":"2015-02-20T17:32:55","version":"7.05_14"},{"date":"2015-03-05T19:44:02","version":"7.05_15"},{"date":"2015-03-09T11:35:12","version":"7.05_16"},{"version":"7.05_17","date":"2015-03-24T12:27:52"},{"version":"7.05_18","date":"2015-03-27T12:20:03"},{"version":"7.05_19","date":"2015-03-27T16:59:34"},{"date":"2015-04-04T15:53:36","version":"7.05_20"},{"version":"7.05_21","date":"2015-06-13T14:19:26"},{"date":"2015-06-14T13:44:56","version":"7.05_22"},{"version":"7.05_23","date":"2015-06-24T19:51:24"},{"version":"7.05_24","date":"2015-07-01T18:30:38"},{"version":"7.05_25","date":"2015-07-07T17:18:36"},{"date":"2015-08-04T19:41:25","version":"7.05_26"},{"date":"2015-08-05T09:35:40","version":"7.05_27"},{"version":"7.05_28","date":"2015-08-19T18:10:20"},{"version":"7.05_29","date":"2015-08-24T15:26:22"},{"version":"7.06","date":"2015-08-31T18:06:48"},{"version":"7.07_01","date":"2015-09-02T11:55:33"},{"date":"2015-09-08T19:59:05","version":"7.08"},{"date":"2015-09-10T18:55:41","version":"7.10"},{"date":"2015-11-12T12:35:03","version":"7.11_01"},{"date":"2015-11-21T20:23:22","version":"7.11_02"},{"date":"2015-11-25T15:40:06","version":"7.11_03"},{"date":"2016-02-15T11:40:55","version":"7.11_04"},{"version":"7.11_05","date":"2016-03-19T10:07:11"},{"date":"2016-03-29T18:44:47","version":"7.11_06"},{"date":"2016-04-19T11:41:10","version":"7.12"},{"date":"2016-04-23T16:35:56","version":"7.13_01"},{"version":"7.14","date":"2016-04-24T13:20:40"},{"version":"7.15_01","date":"2016-04-27T18:27:25"},{"version":"7.15_02","date":"2016-04-28T12:15:28"},{"version":"7.15_03","date":"2016-05-01T13:29:10"},{"date":"2016-05-07T10:28:49","version":"7.16"},{"version":"7.17_01","date":"2016-05-09T19:14:54"},{"version":"7.17_02","date":"2016-05-09T23:07:33"},{"version":"7.17_03","date":"2016-05-11T18:22:21"},{"version":"7.18","date":"2016-05-23T15:39:08"},{"version":"7.19_01","date":"2016-06-02T14:01:28"},{"version":"7.19_02","date":"2016-06-13T09:11:52"},{"version":"7.19_03","date":"2016-06-13T13:44:33"},{"date":"2016-06-14T11:35:43","version":"7.19_04"},{"date":"2016-06-20T14:40:57","version":"7.19_05"},{"version":"7.19_06","date":"2016-06-27T12:04:29"},{"date":"2016-07-03T14:30:23","version":"7.19_07"},{"date":"2016-07-28T12:26:56","version":"7.19_08"},{"version":"7.20","date":"2016-08-05T08:57:09"},{"date":"2016-08-07T09:54:04","version":"7.21_01"},{"date":"2016-08-08T08:42:10","version":"7.22"},{"date":"2016-08-19T09:24:06","version":"7.23_01"},{"date":"2016-08-20T12:35:27","version":"7.24"},{"version":"7.25_01","date":"2017-02-03T15:21:22"},{"date":"2017-05-11T11:19:49","version":"7.25_02"},{"version":"7.25_03","date":"2017-05-11T17:09:16"},{"version":"7.25_04","date":"2017-05-12T12:25:54"},{"version":"7.25_05","date":"2017-05-15T09:41:49"},{"date":"2017-05-23T19:31:28","version":"7.25_06"},{"version":"7.26","date":"2017-05-27T20:21:06"},{"date":"2017-05-28T10:50:55","version":"7.27_01"},{"date":"2017-05-30T08:56:32","version":"7.27_02"},{"date":"2017-05-30T21:26:23","version":"7.28"},{"version":"7.29_01","date":"2017-05-31T08:32:44"},{"version":"7.29_02","date":"2017-06-11T11:17:55"},{"version":"7.30","date":"2017-06-12T12:31:08"},{"version":"7.31_01","date":"2017-06-14T15:10:23"},{"version":"7.31_02","date":"2017-06-26T13:14:10"},{"date":"2017-07-10T09:02:35","version":"7.31_03"},{"date":"2017-10-05T12:19:00","version":"7.31_04"},{"version":"7.31_05","date":"2017-11-25T09:37:04"},{"date":"2018-01-16T13:28:46","version":"7.31_06"},{"version":"7.31_07","date":"2018-01-16T16:24:23"},{"date":"2018-02-12T12:32:45","version":"7.31_08"},{"version":"7.32","date":"2018-02-16T20:25:44"},{"date":"2018-02-20T10:44:19","version":"7.33_01"},{"version":"7.33_02","date":"2018-02-24T14:05:00"},{"version":"7.33_03","date":"2018-02-24T20:21:42"},{"date":"2018-03-19T10:51:54","version":"7.34"},{"date":"2018-04-19T12:46:01","version":"7.35_01"},{"date":"2018-04-24T11:01:35","version":"7.35_02"},{"date":"2018-04-27T13:59:23","version":"7.35_03"},{"date":"2018-07-09T09:50:43","version":"7.35_04"},{"version":"7.35_05","date":"2018-07-10T09:18:31"},{"version":"7.35_06","date":"2018-07-19T19:49:08"},{"version":"7.35_07","date":"2018-11-23T11:59:44"},{"date":"2018-12-06T10:56:33","version":"7.35_08"},{"date":"2019-02-18T10:27:00","version":"7.35_09"},{"version":"7.35_10","date":"2019-02-20T10:06:48"},{"date":"2019-04-25T11:10:29","version":"7.35_11"},{"date":"2019-04-27T22:17:58","version":"7.35_12"},{"version":"7.35_13","date":"2019-04-28T11:23:25"},{"version":"7.35_14","date":"2019-04-28T13:15:57"},{"date":"2019-04-28T15:48:41","version":"7.36"},{"date":"2019-06-07T10:55:49","version":"7.37_01"},{"version":"7.37_02","date":"2019-06-27T10:35:57"},{"date":"2019-08-03T12:27:47","version":"7.37_03"},{"date":"2019-08-22T14:34:47","version":"7.37_04"},{"date":"2019-09-11T09:16:48","version":"7.38"},{"date":"2019-09-16T06:54:51","version":"7.39_01"},{"date":"2019-11-07T10:03:13","version":"7.39_02"},{"version":"7.39_03","date":"2019-11-17T20:12:14"},{"date":"2019-11-18T15:20:20","version":"7.39_04"},{"version":"7.39_05","date":"2019-11-21T12:10:17"},{"date":"2019-12-16T20:02:27","version":"7.40"},{"date":"2019-12-16T21:53:56","version":"7.41_01"},{"version":"7.42","date":"2019-12-17T22:30:33"},{"date":"2020-01-05T13:00:40","version":"7.43_01"},{"date":"2020-01-14T16:54:08","version":"7.44"},{"date":"2020-05-28T16:58:08","version":"7.45_01"},{"date":"2020-06-23T10:14:10","version":"7.46"},{"version":"7.47_01","date":"2020-06-26T10:13:17"},{"version":"7.47_02","date":"2020-07-07T07:38:50"},{"date":"2020-07-08T21:54:35","version":"7.47_03"},{"date":"2020-07-28T19:00:26","version":"7.47_04"},{"date":"2020-07-31T09:57:33","version":"7.47_05"},{"version":"7.47_06","date":"2020-08-01T13:53:05"},{"date":"2020-08-03T21:39:02","version":"7.47_07"},{"version":"7.47_08","date":"2020-08-31T09:02:22"},{"version":"7.47_09","date":"2020-09-14T13:50:45"},{"version":"7.47_10","date":"2020-09-15T18:45:02"},{"version":"7.47_11","date":"2020-09-20T09:20:24"},{"version":"7.47_12","date":"2020-09-30T15:40:12"},{"date":"2020-10-04T10:56:39","version":"7.48"},{"date":"2020-10-06T17:29:16","version":"7.49_01"},{"date":"2020-10-08T12:03:50","version":"7.49_02"},{"version":"7.49_03","date":"2020-10-09T20:46:22"},{"version":"7.49_04","date":"2020-10-13T18:34:34"},{"date":"2020-10-21T18:14:52","version":"7.50"},{"date":"2020-11-04T00:05:13","version":"7.51_01"},{"date":"2020-11-04T19:51:52","version":"7.52"},{"date":"2020-11-10T03:50:49","version":"7.53_01"},{"version":"7.54","date":"2020-11-12T19:50:41"},{"version":"7.55_01","date":"2020-11-18T18:25:16"},{"date":"2020-11-19T20:00:09","version":"7.56"},{"version":"7.57_01","date":"2020-12-18T13:45:54"},{"version":"7.57_02","date":"2020-12-18T23:07:45"},{"date":"2020-12-21T18:31:44","version":"7.58"},{"date":"2021-02-02T10:13:35","version":"7.59_01"},{"date":"2021-02-17T11:05:23","version":"7.60"},{"date":"2021-03-21T15:00:35","version":"7.61_01"},{"date":"2021-04-13T18:13:28","version":"7.62"},{"version":"7.63_01","date":"2021-05-25T18:00:03"},{"version":"7.63_02","date":"2021-06-03T19:05:10"},{"version":"7.63_03","date":"2021-06-22T13:53:51"},{"version":"7.63_04","date":"2021-06-30T14:30:46"},{"date":"2021-08-14T08:19:32","version":"7.63_05"},{"date":"2021-11-03T01:44:47","version":"7.63_06"},{"version":"7.63_07","date":"2021-11-27T11:51:29"},{"date":"2021-11-27T17:31:21","version":"7.63_08"},{"date":"2021-12-08T22:35:25","version":"7.63_09"},{"date":"2021-12-13T16:54:00","version":"7.63_10"},{"version":"7.63_11","date":"2021-12-14T17:00:18"},{"version":"7.64","date":"2021-12-17T19:24:34"},{"date":"2022-05-30T10:07:14","version":"7.65_01"},{"date":"2022-07-22T13:01:08","version":"7.65_02"},{"date":"2022-12-24T00:32:29","version":"7.65_03"},{"date":"2022-12-25T09:06:33","version":"7.66"},{"version":"7.67_01","date":"2023-03-01T13:47:08"},{"version":"7.67_02","date":"2023-03-06T11:17:11"},{"version":"7.68","date":"2023-03-14T21:41:23"},{"date":"2023-03-25T11:45:00","version":"7.69_01"},{"date":"2023-03-26T13:29:08","version":"7.70"},{"date":"2024-06-24T19:34:30","version":"7.71_01"},{"version":"7.71_02","date":"2024-11-22T19:08:50"}],"main_module":"ExtUtils::MakeMaker","advisories":[{"cves":["CVE-2016-1238"],"affected_versions":["<7.22"],"reported":"2016-08-07","distribution":"ExtUtils-MakeMaker","references":["https://metacpan.org/changes/distribution/ExtUtils-MakeMaker","https://github.com/Perl-Toolchain-Gang/ExtUtils-MakeMaker/commit/3e9df17d11c40f2561c23ec79693c8c390e0ae88"],"description":"Loading modules from . (current directory).\n","fixed_versions":[">=7.22"],"id":"CPANSA-ExtUtils-MakeMaker-2016-01"}]},"Term-ReadLine-Gnu":{"versions":[{"date":"1997-02-07T02:03:51","version":"0.06"},{"version":"0.07","date":"1997-03-26T07:17:23"},{"date":"1997-08-25T15:02:01","version":"0.09"},{"date":"1998-03-31T15:49:08","version":"0.10"},{"version":"1.00","date":"1998-04-17T05:23:29"},{"version":"1.01","date":"1998-05-13T15:45:47"},{"version":"1.03","date":"1998-09-30T16:10:02"},{"version":"1.04","date":"1999-02-22T17:28:32"},{"version":"1.05","date":"1999-04-10T16:08:54"},{"version":"1.06","date":"1999-05-05T14:55:21"},{"date":"1999-07-19T15:13:19","version":"1.07"},{"date":"1999-12-30T13:37:18","version":"1.08"},{"date":"2000-04-03T18:05:33","version":"1.09"},{"version":"1.10","date":"2001-04-22T14:23:37"},{"version":"1.11","date":"2001-10-28T04:38:19"},{"date":"2002-03-31T05:54:31","version":"1.12"},{"date":"2002-07-28T05:07:18","version":"1.13"},{"version":"1.14","date":"2003-03-17T03:59:29"},{"version":"1.15","date":"2004-10-17T20:00:06"},{"version":"1.16","date":"2006-04-02T01:36:28"},{"date":"2008-02-07T15:00:09","version":"1.17"},{"date":"2008-02-07T15:52:11","version":"1.17"},{"version":"1.18","date":"2009-02-27T14:14:29"},{"date":"2009-03-20T17:00:37","version":"1.19"},{"date":"2010-05-02T14:26:20","version":"1.20"},{"version":"1.21","date":"2014-03-01T17:19:57"},{"version":"1.22","date":"2014-03-05T14:48:24"},{"version":"1.23","date":"2014-03-19T15:53:44"},{"version":"1.24","date":"2014-03-23T11:58:51"},{"version":"1.25","date":"2014-12-20T13:25:24"},{"version":"1.26","date":"2015-01-31T12:30:45"},{"date":"2015-09-06T06:03:05","version":"1.27"},{"date":"2015-09-21T13:14:52","version":"1.28"},{"date":"2016-02-29T14:06:51","version":"1.29"},{"version":"1.30","date":"2016-03-01T15:55:22"},{"version":"1.31","date":"2016-03-06T00:45:52"},{"date":"2016-06-07T15:25:50","version":"1.32"},{"date":"2016-06-09T17:11:29","version":"1.33"},{"version":"1.34","date":"2016-06-12T14:53:40"},{"version":"1.35","date":"2016-11-03T14:36:40"},{"version":"1.36","date":"2019-01-14T05:39:06"},{"version":"1.37","date":"2020-12-27T03:26:23"},{"version":"1.38","date":"2021-02-22T09:48:52"},{"date":"2021-02-22T14:36:24","version":"1.39"},{"version":"1.40","date":"2021-02-23T07:24:27"},{"version":"1.41","date":"2021-05-01T14:45:09"},{"version":"1.42","date":"2021-05-07T03:30:02"},{"version":"1.43","date":"2022-10-01T08:45:18"},{"version":"1.44","date":"2022-11-06T14:03:08"},{"date":"2022-11-27T13:23:27","version":"1.45"},{"version":"1.46","date":"2023-07-01T09:18:33"}],"advisories":[{"description":"The _rl_tropen function in util.c in GNU readline before 6.3 patch 3 allows local users to create or overwrite arbitrary files via a symlink attack on a /var/tmp/rltrace.[PID] file.\n","references":["https://bugzilla.redhat.com/show_bug.cgi?id=1077023","http://lists.gnu.org/archive/html/bug-readline/2014-03/msg00057.html","http://seclists.org/oss-sec/2014/q1/579","http://seclists.org/oss-sec/2014/q1/587","https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135686.html","http://www.mandriva.com/security/advisories?name=MDVSA-2014:154","http://advisories.mageia.org/MGASA-2014-0319.html","http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html","http://www.mandriva.com/security/advisories?name=MDVSA-2015:132"],"external_vulnerability":{"distributed_version":"<=6.3","name":"readline"},"severity":null,"fixed_versions":[">=1.27"],"comment":"The presense of affected versions of Term-ReadLine-Gnu suggests that a vulnerable version of the readline linrary is installed on the host system.\n","cves":["CVE-2014-2524"],"distribution":"Term-ReadLine-Gnu","reported":"2014-08-20","affected_versions":["<1.27"],"id":"CPANSA-Term-ReadLine-Gnu-2014-2524"}],"main_module":"Term::ReadLine::Gnu"},"HTTP-Session2":{"main_module":"HTTP::Session2","advisories":[{"cves":[],"affected_versions":["<1.10"],"reported":"2018-01-26","distribution":"HTTP-Session2","references":["https://metacpan.org/changes/distribution/HTTP-Session2","https://github.com/tokuhirom/HTTP-Session2/commit/813838f6d08034b6a265a70e53b59b941b5d3e6d"],"description":"HTTP::Session2 1.10 does not validate session id, this causes RCE depending on the session store you use.\n","fixed_versions":[">=1.10"],"id":"CPANSA-HTTP-Session2-2018-01","severity":"critical"}],"versions":[{"version":"0.01","date":"2013-10-28T03:20:09"},{"date":"2013-10-30T00:17:21","version":"0.02"},{"version":"0.03","date":"2013-10-31T01:21:27"},{"version":"0.04","date":"2013-11-01T01:10:52"},{"version":"0.05","date":"2014-03-18T18:53:09"},{"version":"1.00","date":"2014-07-28T04:10:11"},{"date":"2014-07-28T11:44:05","version":"1.01"},{"version":"1.02","date":"2014-07-31T21:17:23"},{"version":"1.03","date":"2014-08-01T11:04:00"},{"version":"1.04","date":"2014-08-01T11:10:56"},{"date":"2014-08-01T11:20:46","version":"1.05"},{"date":"2014-08-01T14:04:04","version":"1.06"},{"date":"2014-08-01T14:08:11","version":"1.07"},{"date":"2014-08-03T07:23:00","version":"1.08"},{"version":"1.09","date":"2014-09-01T02:26:38"},{"date":"2018-01-26T05:02:08","version":"1.10"}]},"mod_perl":{"versions":[{"version":"0.60","date":"1996-05-21T02:07:05"},{"date":"1996-05-21T20:51:37","version":"0.60"},{"version":"0.60","date":"1996-06-18T19:41:55"},{"date":"1996-06-25T15:49:56","version":"0.60"},{"version":"0.70","date":"1996-07-14T23:39:07"},{"version":"0.76","date":"1996-07-26T20:39:23"},{"date":"1996-09-08T22:13:32","version":"0.81"},{"date":"1996-10-04T15:50:31","version":"0.83_02"},{"date":"1996-10-09T07:10:24","version":"0.83_03"},{"date":"1996-10-14T03:46:54","version":"0.83_04"},{"date":"1996-10-15T13:34:22","version":"0.83_05"},{"version":"0.83_06","date":"1996-10-17T03:48:27"},{"date":"1996-10-18T22:18:01","version":"0.83_07"},{"date":"1996-10-21T01:37:29","version":"0.83_09"},{"version":"0.83_10","date":"1996-10-25T14:09:06"},{"version":"0.84","date":"1996-10-28T00:01:00"},{"version":"0.85","date":"1996-11-13T05:39:14"},{"version":"0.85_01","date":"1996-11-14T07:21:01"},{"date":"1996-11-27T17:19:02","version":"0.85_02"},{"date":"1996-12-05T03:37:12","version":"0.85_03"},{"version":"0.85_04","date":"1996-12-10T23:17:33"},{"date":"1996-12-17T13:31:40","version":"0.85_06"},{"date":"1996-12-19T14:32:44","version":"0.86"},{"version":"0.87","date":"1996-12-24T04:19:35"},{"version":"0.88","date":"1996-12-24T20:41:28"},{"version":"0.89","date":"1996-12-31T04:43:25"},{"date":"1996-12-31T07:52:56","version":"0.90"},{"date":"1997-01-20T10:04:20","version":"0.90_01"},{"date":"1997-01-23T00:58:22","version":"0.91"},{"date":"1997-01-23T15:56:19","version":"0.92"},{"version":"0.93","date":"1997-01-28T02:37:30"},{"date":"1997-03-05T03:19:32","version":"0.93_01"},{"version":"0.94","date":"1997-03-10T12:07:39"},{"date":"1997-03-23T18:53:46","version":"0.95"},{"date":"1997-03-23T18:54:02","version":"0.95_02"},{"date":"1997-04-01T04:44:44","version":"0.95_03"},{"version":"0.95_04","date":"1997-04-02T01:35:22"},{"date":"1997-04-02T03:20:37","version":"0.95_05"},{"version":"0.95_06","date":"1997-04-02T04:42:28"},{"date":"1997-04-04T05:33:39","version":"0.96"},{"date":"1997-04-16T03:54:02","version":"0.97"},{"version":"0.97_01","date":"1997-04-23T03:29:01"},{"date":"1997-04-30T03:56:50","version":"0.97_02"},{"date":"1997-05-02T19:58:12","version":"0.98"},{"date":"1997-05-19T22:59:20","version":"0.98_03"},{"date":"1997-05-23T00:24:28","version":"0.98_05"},{"version":"0.98_08","date":"1997-05-30T02:07:03"},{"version":"0.98_09","date":"1997-06-02T00:05:45"},{"version":"0.98_10","date":"1997-06-03T03:15:48"},{"version":"0.98_11","date":"1997-06-04T01:54:46"},{"version":"0.98_12","date":"1997-06-06T01:14:09"},{"version":"0.99","date":"1997-06-12T00:36:43"},{"version":"1.00","date":"1997-06-30T03:04:22"},{"date":"1997-07-08T06:20:15","version":"1.00"},{"date":"1997-07-30T20:57:59","version":"1.00"},{"version":"0.85_05","date":"1997-08-25T22:00:29"},{"date":"1997-09-16T01:09:06","version":"1.00_02"},{"date":"1997-09-21T21:40:32","version":"1.00_03"},{"date":"1997-10-17T00:04:35","version":"1.01"},{"version":"1.02","date":"1997-10-17T15:40:45"},{"date":"1997-10-24T04:02:30","version":"1.03"},{"date":"1997-10-31T03:59:22","version":"1.04"},{"version":"1.05","date":"1997-11-07T04:32:07"},{"version":"1.07","date":"1997-11-26T02:09:01"},{"version":"1.07_01","date":"1997-12-02T21:34:03"},{"version":"1.07_02","date":"1997-12-22T09:29:56"},{"version":"1.07_03","date":"1998-01-08T10:21:31"},{"date":"1998-01-28T02:10:28","version":"1.07_03"},{"date":"1998-01-29T00:47:52","version":"1.07_03"},{"version":"1.07_04","date":"1998-02-10T11:04:03"},{"date":"1998-02-12T15:08:20","version":"1.07_04"},{"version":"1.08","date":"1998-02-20T03:43:49"},{"version":"1.08","date":"1998-03-07T01:06:09"},{"date":"1998-03-19T07:39:18","version":"1.09"},{"version":"1.10","date":"1998-03-21T04:14:02"},{"version":"1.10","date":"1998-03-27T16:52:20"},{"date":"1998-04-21T14:43:05","version":"1.11"},{"date":"1998-04-24T18:58:30","version":"1.11"},{"version":"1.11","date":"1998-06-09T16:51:19"},{"version":"1.12","date":"1998-06-14T19:21:25"},{"version":"1.13","date":"1998-07-14T01:13:07"},{"date":"1998-07-19T00:19:20","version":"1.14"},{"version":"1.15","date":"1998-07-24T13:52:53"},{"version":"1.15","date":"1998-07-24T15:59:13"},{"version":"1.15_01","date":"1998-09-20T00:02:57"},{"date":"1998-10-02T23:10:02","version":"1.16"},{"date":"1998-10-28T18:16:45","version":"1.16"},{"date":"1998-11-24T23:54:59","version":"1.16_01"},{"version":"1.16_02","date":"1998-12-01T00:01:25"},{"date":"1999-01-28T06:27:45","version":"1.18"},{"version":"1.20","date":"1999-06-11T17:22:35"},{"date":"1999-07-02T23:43:56","version":"1.21"},{"date":"2000-03-06T01:32:31","version":"1.21_01"},{"date":"2000-03-07T07:56:53","version":"1.21_02"},{"version":"1.21_03","date":"2000-03-15T10:25:52"},{"version":"1.22","date":"2000-03-23T06:51:53"},{"version":"1.23","date":"2000-04-21T06:51:47"},{"version":"1.24","date":"2000-05-17T05:44:34"},{"version":"1.24_01","date":"2000-10-10T16:44:39"},{"version":"1.25","date":"2001-01-30T04:33:45"},{"version":"1.25_01","date":"2001-07-06T21:27:16"},{"version":"1.26","date":"2001-07-12T02:23:32"},{"date":"2002-04-07T04:58:26","version":"1.99_01"},{"date":"2002-06-02T03:05:50","version":"1.27"},{"date":"2002-06-02T03:27:13","version":"1.99_02"},{"date":"2002-06-15T23:59:37","version":"1.99_03"},{"version":"1.99_04","date":"2002-06-21T22:45:41"},{"date":"2002-08-20T16:54:13","version":"1.99_05"},{"version":"1.99_06","date":"2002-09-27T15:19:03"},{"version":"1.99_07","date":"2002-09-27T19:41:50"},{"version":"1.99_08","date":"2003-01-11T04:22:19"},{"date":"2003-04-28T02:36:59","version":"1.99_09"},{"version":"1.28","date":"2003-07-03T03:32:20"},{"date":"2003-09-29T17:11:24","version":"1.99_10"},{"version":"1.29","date":"2003-10-08T04:54:22"},{"date":"2003-11-10T21:04:15","version":"1.99_11"},{"date":"2003-12-22T19:56:22","version":"1.99_12"},{"date":"2004-03-09T00:29:43","version":"1.99_13"},{"version":"1.99_14","date":"2004-05-21T18:02:49"},{"date":"2004-08-20T18:35:12","version":"1.99_15"},{"date":"2004-08-23T05:59:47","version":"1.99_16"},{"version":"1.99_17","date":"2004-10-22T21:38:19"},{"date":"2004-12-12T23:22:37","version":"v2.0.0"},{"version":"v2.0.0","date":"2004-12-23T23:38:49"},{"version":"v2.0.0","date":"2005-01-06T01:27:43"},{"version":"v2.0.0","date":"2005-01-22T08:55:19"},{"date":"2005-04-14T13:19:23","version":"v2.0.0"},{"date":"2005-05-04T02:48:58","version":"v2.0.0"},{"date":"2005-05-20T05:12:45","version":"v2.0.0"},{"version":"v2.0.1","date":"2005-06-17T21:05:23"},{"version":"v2.0.2","date":"2005-10-21T01:27:23"},{"version":"v2.0.3","date":"2006-11-29T08:29:30"},{"date":"2007-03-30T06:19:02","version":"1.30"},{"date":"2008-04-17T06:32:36","version":"v2.0.4"},{"date":"2009-05-13T02:29:50","version":"1.31"},{"version":"v2.0.5","date":"2011-02-07T23:31:36"},{"date":"2012-04-25T15:31:27","version":"v2.0.6"},{"date":"2012-06-06T02:40:24","version":"v2.0.7"},{"date":"2013-04-18T02:15:56","version":"2.0.8"},{"date":"2015-06-18T21:16:34","version":"2.0.9"},{"date":"2016-10-27T21:16:36","version":"2.0.10"},{"version":"2.0.11","date":"2019-10-05T11:36:44"},{"date":"2022-01-30T13:36:21","version":"2.0.12"},{"date":"2023-10-21T10:32:29","version":"2.0.13"}],"main_module":"mod_perl2","advisories":[{"references":["https://metacpan.org/changes/distribution/mod_perl"],"description":"XSS in Apache::Status.\n","fixed_versions":[">=1.31"],"id":"CPANSA-mod_perl-2009-01","cves":["CVE-2009-0796"],"affected_versions":["<1.31"],"reported":"2009-05-11","distribution":"mod_perl"},{"affected_versions":["<1.30"],"reported":"2007-03-29","distribution":"mod_perl","cves":["CVE-2007-1349"],"fixed_versions":[">=1.30"],"id":"CPANSA-mod_perl-2007-01","description":"Unescaped variable interpolation in Apache::PerlRun regular expression could cause regex engine tampering.\n","references":["https://metacpan.org/changes/distribution/mod_perl"]},{"references":["https://mail-archives.apache.org/mod_mbox/perl-modperl/201110.mbox/raw/%3C20111004084343.GA21290%40ktnx.net%3E","https://bugs.debian.org/644169","https://lists.debian.org/debian-lts-announce/2018/09/msg00018.html","https://access.redhat.com/errata/RHSA-2018:2737","https://access.redhat.com/errata/RHSA-2018:2826","https://access.redhat.com/errata/RHSA-2018:2825","http://www.securityfocus.com/bid/105195","https://usn.ubuntu.com/3825-1/","https://usn.ubuntu.com/3825-2/","https://lists.apache.org/thread.html/c8ebe8aad147a3ad2e7b0e8b2da45263171ab5d0fc7f8c100feaa94d@%3Cmodperl-cvs.perl.apache.org%3E","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00063.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00065.html"],"description":"mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator's control of HTTP request processing without also permitting unprivileged users to run Perl code in the context of the user account that runs Apache HTTP Server processes.\n","id":"CPANSA-mod_perl-2011-2767","severity":"critical","fixed_versions":[],"cves":["CVE-2011-2767"],"reported":"2018-08-26","distribution":"mod_perl","affected_versions":[">=2.0,<=2.0.10"]}]},"Crypt-JWT":{"versions":[{"date":"2015-07-02T22:24:01","version":"0.004"},{"version":"0.005","date":"2015-07-02T22:54:29"},{"version":"0.010","date":"2015-07-07T19:43:45"},{"date":"2015-10-22T07:08:48","version":"0.011"},{"date":"2016-05-02T17:33:01","version":"0.012"},{"date":"2016-05-03T07:10:15","version":"0.013"},{"date":"2016-05-04T05:48:13","version":"0.014"},{"version":"0.015","date":"2016-05-12T05:38:49"},{"date":"2016-05-12T08:03:49","version":"0.016"},{"date":"2016-06-03T10:17:48","version":"0.017"},{"date":"2016-08-31T19:49:41","version":"0.018"},{"version":"0.019","date":"2018-01-26T16:07:54"},{"version":"0.020","date":"2018-02-02T15:02:28"},{"date":"2018-03-15T11:59:25","version":"0.021"},{"version":"0.022","date":"2018-06-24T20:29:50"},{"version":"0.023","date":"2018-09-01T16:09:10"},{"version":"0.024","date":"2019-03-26T11:11:25"},{"version":"0.025","date":"2019-09-29T15:23:58"},{"date":"2020-02-02T08:44:56","version":"0.026"},{"version":"0.027","date":"2020-06-04T22:35:39"},{"version":"0.028","date":"2020-06-14T18:17:45"},{"date":"2020-06-22T13:13:53","version":"0.029"},{"version":"0.030","date":"2021-01-08T14:22:56"},{"version":"0.031","date":"2021-01-10T14:18:25"},{"version":"0.032","date":"2021-03-18T21:02:33"},{"date":"2021-05-01T17:18:31","version":"0.033"},{"date":"2021-11-28T22:08:38","version":"0.034"},{"date":"2023-10-03T10:20:23","version":"0.035"}],"main_module":"Crypt::JWT","advisories":[{"fixed_versions":[">=0.023"],"id":"CPANSA-Crypt-JWT-2019-01","severity":"high","description":"Perl Crypt::JWT prior to 0.023 is affected by: Incorrect Access Control. The impact is: allow attackers to bypass authentication by providing a token by crafting with hmac(). The component is: JWT.pm, line 614. The attack vector is: network connectivity. The fixed version is: after commit b98a59b42ded9f9e51b2560410106207c2152d6c.\n","references":["https://github.com/DCIT/perl-Crypt-JWT/commit/b98a59b42ded9f9e51b2560410106207c2152d6c","https://www.openwall.com/lists/oss-security/2018/09/07/1"],"affected_versions":["<0.023"],"distribution":"Crypt-JWT","reported":"2019-03-20","cves":["CVE-2019-1010263"]},{"cves":["CVE-2019-1010161"],"distribution":"Crypt-JWT","reported":"2019-03-20","affected_versions":["<0.022"],"description":"perl-CRYPT-JWT 0.022 and earlier is affected by: Incorrect Access Control. The impact is: bypass authentication. The component is: JWT.pm for JWT security token, line 614 in _decode_jws(). The attack vector is: network connectivity(crafting user-controlled input to bypass authentication). The fixed version is: 0.023.\n","references":["https://github.com/DCIT/perl-Crypt-JWT/issues/3#issuecomment-417947483"],"severity":"high","id":"CPANSA-Crypt-JWT-2019-01","fixed_versions":[">=0.022"]}]},"Cpanel-JSON-XS":{"main_module":"Cpanel::JSON::XS","advisories":[{"cves":[],"affected_versions":["<3.0225"],"reported":"2016-11-23","distribution":"Cpanel-JSON-XS","description":"Overflow during processing of ill-formed UTF-8 strings.\n","references":["https://metacpan.org/changes/distribution/Cpanel-JSON-XS","https://github.com/rurban/Cpanel-JSON-XS/commit/f71768984ba7f50b0476c17a4f3b3f2ca88a6951","https://github.com/dankogai/p5-encode/issues/64"],"fixed_versions":[">=3.0225"],"id":"CPANSA-Cpanel-JSON-XS-2016-02"},{"fixed_versions":[">=3.0218"],"id":"CPANSA-Cpanel-JSON-XS-2016-01","references":["https://metacpan.org/changes/distribution/Cpanel-JSON-XS","https://github.com/rurban/Cpanel-JSON-XS/commit/6554531b39fac236321d8601d35eaaa75ae45e20"],"description":"Possible overflows in av and hv length types.\n","affected_versions":["<3.0218"],"reported":null,"distribution":"Cpanel-JSON-XS","cves":[]},{"cves":["CVE-2022-48623"],"affected_versions":["<4.033"],"distribution":"Cpanel-JSON-XS","reported":"2023-02-21","references":["https://metacpan.org/changes/distribution/Cpanel-JSON-XS","https://github.com/rurban/Cpanel-JSON-XS/issues/208","https://metacpan.org/release/RURBAN/Cpanel-JSON-XS-4.33/changes","https://nvd.nist.gov/vuln/detail/CVE-2022-48623","https://github.com/rurban/Cpanel-JSON-XS/commit/41f32396eee9395a40f9ed80145c37622560de9b","https://github.com/advisories/GHSA-44qr-8pf6-6q33"],"description":"Wrong error messages/sometimes crashes or endless loops with invalid JSON in relaxed mode\n","fixed_versions":[">=4.033"],"id":"CPANSA-Cpanel-JSON-XS-2023-01"}],"versions":[{"version":"2.33_03","date":"2013-03-01T00:52:41"},{"date":"2013-03-01T22:07:06","version":"2.33_04"},{"date":"2013-03-27T16:53:34","version":"2.3305"},{"date":"2013-03-27T17:17:51","version":"2.3306"},{"date":"2013-03-27T22:58:47","version":"2.3307"},{"version":"2.3308","date":"2013-03-28T14:28:56"},{"date":"2013-03-28T15:12:42","version":"2.3309"},{"version":"2.3310","date":"2013-03-28T17:33:21"},{"version":"2.3313","date":"2013-06-26T16:24:40"},{"version":"2.3314","date":"2013-09-09T05:54:40"},{"date":"2013-10-02T20:06:47","version":"2.3401"},{"version":"2.3402","date":"2013-11-02T14:42:20"},{"version":"2.3403","date":"2013-11-02T15:17:41"},{"date":"2014-01-30T15:58:58","version":"2.3404"},{"date":"2014-04-15T21:17:11","version":"3.0101"},{"version":"3.0102","date":"2014-04-17T18:37:34"},{"version":"3.0103","date":"2014-04-21T17:49:09"},{"date":"2014-04-26T16:04:39","version":"3.0104"},{"date":"2014-11-06T10:38:31","version":"3.0105"},{"date":"2014-11-11T21:57:49","version":"3.0106"},{"date":"2014-11-28T12:16:29","version":"3.0107"},{"version":"3.0108","date":"2014-12-11T17:02:07"},{"date":"2014-12-12T10:24:33","version":"3.0109"},{"version":"3.0110","date":"2014-12-12T22:35:37"},{"version":"3.0111","date":"2014-12-13T18:40:06"},{"date":"2014-12-14T16:34:01","version":"3.0112"},{"version":"3.0113","date":"2014-12-15T12:23:32"},{"version":"3.0114","date":"2015-01-04T14:06:03"},{"version":"3.0115","date":"2015-01-31T21:42:51"},{"version":"3.0201","date":"2015-11-26T08:58:33"},{"date":"2015-11-26T13:16:40","version":"3.0202"},{"date":"2015-11-26T13:42:02","version":"3.0203"},{"version":"3.0204","date":"2015-11-26T22:30:26"},{"date":"2015-11-29T14:09:00","version":"3.0205"},{"date":"2015-11-30T16:16:48","version":"3.0206"},{"version":"3.0207","date":"2015-12-02T16:34:35"},{"date":"2015-12-02T22:46:58","version":"3.0208"},{"version":"3.0209","date":"2015-12-03T09:45:04"},{"version":"3.0210","date":"2015-12-03T11:59:24"},{"date":"2016-01-10T17:38:25","version":"3.0211"},{"version":"3.0212","date":"2016-02-27T13:30:04"},{"version":"3.0213","date":"2016-03-02T10:28:37"},{"date":"2016-04-12T08:40:05","version":"3.0213_01"},{"version":"3.0213_02","date":"2016-04-13T10:40:03"},{"version":"3.0214","date":"2016-06-02T16:18:51"},{"version":"3.0215","date":"2016-06-06T13:28:49"},{"version":"3.0216","date":"2016-06-12T12:14:20"},{"version":"3.0217","date":"2016-06-18T09:59:27"},{"version":"3.0217_01","date":"2016-10-04T10:11:33"},{"date":"2016-10-04T14:47:29","version":"3.0217_02"},{"date":"2016-10-06T08:46:17","version":"3.0217_03"},{"date":"2016-10-07T12:11:03","version":"3.0217_04"},{"version":"3.0217_05","date":"2016-10-07T17:22:48"},{"date":"2016-10-08T08:01:50","version":"3.0217_06"},{"date":"2016-10-13T12:47:31","version":"3.0218"},{"version":"3.0219","date":"2016-10-26T11:45:35"},{"date":"2016-10-28T08:34:28","version":"3.0220"},{"version":"3.0221","date":"2016-10-30T12:27:36"},{"version":"3.0222","date":"2016-10-30T15:04:32"},{"version":"3.0223","date":"2016-11-16T11:47:38"},{"version":"3.0224","date":"2016-11-20T11:31:34"},{"date":"2016-11-23T18:43:00","version":"3.0225"},{"version":"3.0226","date":"2017-02-11T13:24:48"},{"version":"3.0227","date":"2017-02-13T10:57:06"},{"date":"2017-03-07T23:57:39","version":"3.0228"},{"version":"3.0229","date":"2017-03-10T14:08:07"},{"version":"3.0230","date":"2017-03-12T09:52:13"},{"date":"2017-03-29T09:51:51","version":"3.0231"},{"version":"3.0232","date":"2017-05-01T05:35:12"},{"date":"2017-05-01T14:54:56","version":"3.0233"},{"date":"2017-07-27T15:43:41","version":"3.0234"},{"version":"3.0235","date":"2017-07-27T16:21:47"},{"version":"3.0236","date":"2017-07-27T20:15:25"},{"date":"2017-07-28T11:15:05","version":"3.0237"},{"version":"3.0238","date":"2017-08-25T20:53:56"},{"version":"3.0239","date":"2017-08-28T20:48:37"},{"version":"3.99_01","date":"2018-01-30T11:52:27"},{"version":"3.99_02","date":"2018-01-31T12:58:24"},{"date":"2018-01-31T17:18:58","version":"3.99_03"},{"date":"2018-02-02T01:57:54","version":"4.00"},{"version":"4.01","date":"2018-02-03T11:50:36"},{"date":"2018-02-27T16:08:55","version":"4.02"},{"version":"4.03","date":"2018-06-21T11:16:14"},{"date":"2018-06-22T17:37:07","version":"4.04"},{"version":"4.05","date":"2018-08-19T16:55:22"},{"date":"2018-08-23T07:50:22","version":"4.06"},{"version":"4.07","date":"2018-11-02T09:51:34"},{"version":"4.08","date":"2018-11-28T14:26:40"},{"date":"2019-02-15T10:09:53","version":"4.09"},{"date":"2019-03-18T07:50:15","version":"4.10"},{"version":"4.11","date":"2019-03-26T16:46:53"},{"date":"2019-06-11T08:04:04","version":"4.12"},{"version":"4.13","date":"2019-10-14T14:14:37"},{"version":"4.14","date":"2019-10-15T15:16:21"},{"version":"4.15","date":"2019-10-22T07:01:03"},{"date":"2019-11-04T15:51:01","version":"4.16"},{"version":"4.17","date":"2019-11-05T13:48:29"},{"version":"4.18","date":"2019-12-13T15:54:58"},{"date":"2020-02-06T15:07:47","version":"4.19"},{"date":"2020-08-12T12:18:46","version":"4.20"},{"version":"4.21","date":"2020-08-13T06:56:18"},{"version":"4.22","date":"2020-09-04T19:26:28"},{"version":"4.23","date":"2020-09-05T10:21:25"},{"date":"2020-10-02T09:05:37","version":"4.24"},{"date":"2020-10-28T07:04:49","version":"4.25"},{"date":"2021-04-12T06:34:32","version":"4.26"},{"version":"4.27","date":"2021-10-14T19:19:01"},{"version":"4.28","date":"2022-05-05T14:46:07"},{"version":"4.29","date":"2022-05-27T15:32:51"},{"version":"4.30","date":"2022-06-16T19:19:38"},{"version":"4.31","date":"2022-08-10T14:25:08"},{"date":"2022-08-13T07:13:40","version":"4.32"},{"date":"2023-02-21T16:34:10","version":"4.33"},{"date":"2023-02-21T18:39:09","version":"4.34"},{"version":"4.35","date":"2023-02-22T15:40:53"},{"date":"2023-03-02T15:11:52","version":"4.36"},{"date":"2023-07-04T10:35:53","version":"4.37"},{"date":"2024-05-28T07:42:37","version":"4.38"},{"date":"2024-12-12T21:17:16","version":"4.39"}]},"CGI-Application-Plugin-CAPTCHA":{"versions":[{"date":"2005-08-28T18:31:21","version":"0.01"},{"version":"0.02","date":"2011-01-05T05:07:55"},{"date":"2011-01-05T05:10:54","version":"0.03"},{"date":"2011-01-06T14:08:56","version":"0.04"}],"advisories":[{"cves":[],"reported":null,"distribution":"CGI-Application-Plugin-CAPTCHA","affected_versions":["<0.02"],"description":"A malicious programmer creating an application to use the service can just have his application send along a cookie that he has created himself, and with that supply an appropriate verification string for his cookie. To avoid that you need to include som kind of hidden server-side password in the string being encrypted, and also include it when you verify.\n","references":["https://rt.cpan.org/Public/Bug/Display.html?id=30759","https://metacpan.org/release/CROMEDOME/CGI-Application-Plugin-CAPTCHA-0.02/changes","https://github.com/cromedome/cgi-application-plugin-captcha/commit/9acb5b6561a9983787ad85f55b01c69a895014e6"],"id":"CPANSA-CGI-Application-Plugin-CAPTCHA-2024-001","severity":null,"fixed_versions":[">=0.02"]}],"main_module":"CGI::Application::Plugin::CAPTCHA"},"Compress-LZ4":{"versions":[{"date":"2012-02-11T16:33:26","version":"0.01"},{"date":"2012-02-20T21:26:48","version":"0.02"},{"date":"2012-03-02T04:47:50","version":"0.03"},{"date":"2012-03-18T07:09:30","version":"0.04"},{"version":"0.05","date":"2012-03-18T19:45:25"},{"date":"2012-03-22T09:23:45","version":"0.06"},{"date":"2012-03-22T16:12:43","version":"0.07"},{"date":"2012-03-23T16:29:14","version":"0.08"},{"version":"0.09","date":"2012-03-23T17:27:12"},{"version":"0.10","date":"2012-03-26T11:28:24"},{"date":"2012-04-03T21:36:24","version":"0.11"},{"version":"0.12","date":"2012-04-04T12:55:22"},{"date":"2012-06-01T18:55:41","version":"0.13"},{"date":"2012-08-10T00:21:56","version":"0.14"},{"version":"0.15","date":"2012-08-11T16:37:53"},{"date":"2012-09-08T18:18:41","version":"0.16"},{"date":"2013-03-19T00:39:07","version":"0.17"},{"version":"0.18","date":"2013-11-19T00:56:57"},{"version":"0.19","date":"2014-02-08T00:35:09"},{"version":"0.20","date":"2014-07-07T21:08:49"},{"date":"2015-05-12T19:01:36","version":"0.21"},{"version":"0.22","date":"2015-05-20T06:16:53"},{"version":"0.23","date":"2016-07-25T20:45:05"},{"date":"2017-03-23T04:34:45","version":"0.24"},{"version":"0.25","date":"2017-04-06T16:38:31"}],"main_module":"Compress::LZ4","advisories":[{"distribution":"Compress-LZ4","reported":"2014-07-07","affected_versions":["<0.20"],"cves":[],"id":"CPANSA-Compress-LZ4-2014-01","fixed_versions":[">=0.20"],"description":"Outdated LZ4 source code with security issue on 32bit systems.\n","references":["https://metacpan.org/changes/distribution/Compress-LZ4","https://github.com/gray/compress-lz4/commit/fc503812b4cbba16429658e1dfe20ad8bbfd77a0"]}]},"Net-Netmask":{"versions":[{"version":"1.0","date":"1998-06-08T05:38:00"},{"date":"1998-06-08T22:46:00","version":"1.2"},{"version":"1.3","date":"1998-06-25T17:03:00"},{"version":"1.4","date":"1998-11-29T20:50:00"},{"version":"1.6","date":"1999-03-28T03:32:00"},{"date":"1999-09-15T17:44:00","version":"1.7"},{"date":"1999-09-21T00:53:00","version":"1.8"},{"date":"2001-05-16T09:18:57","version":"1.9"},{"version":"1.9001","date":"2001-09-30T06:14:00"},{"version":"1.9002","date":"2001-11-12T18:20:00"},{"version":"1.9003","date":"2003-05-27T15:36:25"},{"date":"2003-05-29T03:36:30","version":"1.9004"},{"date":"2003-11-29T22:49:00","version":"1.9005"},{"date":"2003-12-05T22:02:00","version":"1.9006"},{"date":"2004-01-02T23:56:00","version":"1.9007"},{"version":"1.9008","date":"2004-04-06T20:15:00"},{"version":"1.9009","date":"2004-04-12T21:05:00"},{"version":"1.9011","date":"2004-05-31T19:48:00"},{"date":"2005-05-19T15:45:00","version":"1.9012"},{"version":"1.9013","date":"2006-09-06T19:27:00"},{"version":"1.9014","date":"2006-10-14T01:20:00"},{"date":"2006-11-30T21:06:00","version":"1.9015"},{"version":"1.9016","date":"2011-03-23T04:41:06"},{"date":"2013-09-21T01:56:56","version":"1.9017"},{"version":"1.9018","date":"2013-09-27T01:25:15"},{"version":"1.9019","date":"2013-10-02T00:42:56"},{"date":"2014-07-18T00:15:30","version":"1.9021"},{"version":"1.9022","date":"2015-05-05T03:36:33"},{"version":"1.9100","date":"2018-06-04T04:39:04"},{"version":"1.9101","date":"2018-06-05T01:21:39"},{"date":"2018-06-18T16:35:20","version":"1.9102"},{"date":"2018-06-18T21:31:04","version":"1.9103"},{"date":"2018-07-27T04:52:04","version":"1.9104"},{"date":"2018-07-27T23:03:36","version":"1.9104"},{"date":"2021-03-29T17:24:43","version":"2.0000"},{"date":"2021-03-29T19:31:52","version":"2.0001"},{"date":"2022-08-31T18:09:46","version":"2.0002"}],"advisories":[{"cves":["CVE-2021-29424"],"distribution":"Net-Netmask","reported":"2021-03-29","affected_versions":["<2.0000"],"references":["https://security.netapp.com/advisory/ntap-20210604-0007/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CBJVLXJSWN6DKSF5ADUEERI6M23R3GGP/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JF4CYIZELC3NISB3RMV4OCI4GYBC557B/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y7JIPQAY5OZ5D3DA7INQILU7SGHTHMWB/","https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/","https://metacpan.org/changes/distribution/Net-Netmask#L11-22"],"description":"The Net::Netmask module before 2.0000 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.\n","id":"CPANSA-Net-Netmask-2021-01","fixed_versions":[">=2.0000"]}],"main_module":"Net::Netmask"},"App-japerl":{"advisories":[{"cves":["CVE-2016-1238"],"affected_versions":["<0.09"],"distribution":"App-japerl","reported":"2016-08-02","description":"(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.\n","references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"fixed_versions":[">=0.09"],"severity":"high","id":"CPANSA-App-japerl-2016-1238"}],"main_module":"App::japerl","versions":[{"version":"0.10","date":"2018-09-07T15:19:24"},{"version":"0.11","date":"2018-09-08T15:07:20"},{"date":"2019-07-14T03:35:18","version":"0.12"},{"version":"0.13","date":"2021-02-18T14:03:58"},{"version":"0.14","date":"2021-09-18T18:20:37"},{"version":"0.15","date":"2023-03-25T01:04:11"}]},"Data-UUID":{"main_module":"Data::UUID","advisories":[{"references":["https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-4184","http://www.openwall.com/lists/oss-security/2013/07/31/4","http://www.securityfocus.com/bid/61534","https://exchange.xforce.ibmcloud.com/vulnerabilities/86103","https://security-tracker.debian.org/tracker/CVE-2013-4184","https://access.redhat.com/security/cve/cve-2013-4184","https://bugs.gentoo.org/show_bug.cgi?id=CVE-2013-4184"],"description":"Perl module Data::UUID from CPAN version 1.219 vulnerable to symlink attacks\n","fixed_versions":[">=1.227"],"severity":"medium","id":"CPANSA-Data-UUID-2013-4184","cves":["CVE-2013-4184"],"affected_versions":[">1.219,<1.227"],"reported":"2019-12-10","distribution":"Data-UUID"}],"versions":[{"version":"0.01","date":"2001-10-30T17:35:43"},{"date":"2001-10-31T17:16:07","version":"0.02"},{"date":"2001-11-05T17:56:17","version":"0.03"},{"date":"2001-12-12T21:23:28","version":"0.04"},{"date":"2002-02-13T19:57:54","version":"0.05"},{"date":"2002-03-11T15:42:56","version":"0.06"},{"date":"2002-06-12T21:38:06","version":"0.07"},{"version":"0.08","date":"2002-11-29T17:19:21"},{"date":"2003-02-26T21:56:46","version":"0.09"},{"date":"2003-07-17T21:55:38","version":"0.10"},{"date":"2003-08-27T20:17:10","version":"0.11"},{"date":"2006-02-24T00:44:57","version":"0.12_01"},{"date":"2006-02-25T20:45:33","version":"0.13"},{"date":"2006-03-18T13:42:09","version":"0.14"},{"date":"2006-09-06T02:19:07","version":"0.141"},{"date":"2006-09-06T02:46:59","version":"0.142"},{"date":"2006-09-18T02:16:47","version":"0.143"},{"version":"0.145","date":"2006-09-19T22:29:33"},{"date":"2006-11-15T01:22:33","version":"0.146"},{"version":"0.147_01","date":"2006-11-16T14:16:50"},{"version":"0.148","date":"2006-11-16T15:25:08"},{"date":"2007-03-08T16:05:15","version":"1.148"},{"version":"1.149","date":"2008-11-01T16:36:57"},{"date":"2008-11-02T03:21:27","version":"1.200_01"},{"date":"2008-11-11T21:40:52","version":"1.200_02"},{"date":"2009-04-18T18:12:28","version":"1.201"},{"version":"1.202","date":"2009-06-15T22:47:18"},{"version":"1.203","date":"2009-11-03T21:49:20"},{"date":"2010-05-07T01:57:28","version":"1.210"},{"date":"2010-05-07T12:00:52","version":"1.211"},{"version":"1.212","date":"2010-05-07T22:59:24"},{"date":"2010-05-09T19:29:59","version":"1.213"},{"version":"1.214","date":"2010-05-15T01:06:55"},{"version":"1.215","date":"2010-05-25T02:47:15"},{"date":"2010-09-04T18:14:56","version":"1.216"},{"version":"1.217","date":"2010-09-14T01:48:04"},{"version":"1.218","date":"2012-08-01T03:25:46"},{"version":"1.219","date":"2013-07-07T03:00:13"},{"version":"1.220","date":"2014-12-16T00:07:05"},{"date":"2015-08-10T12:37:32","version":"1.221"},{"version":"1.222","date":"2018-04-29T22:11:17"},{"date":"2019-02-25T22:28:34","version":"1.223"},{"version":"1.224","date":"2019-03-02T14:20:33"},{"version":"1.225","date":"2020-04-12T18:42:29"},{"date":"2020-04-12T18:43:57","version":"1.226"},{"date":"2024-03-18T19:39:28","version":"1.227"}]},"Net-SNMP":{"advisories":[{"cves":["CVE-2008-2292"],"affected_versions":[">=5.1.4,<6.0.0"],"distribution":"Net-SNMP","reported":"2008-05-18","references":["http://sourceforge.net/tracker/index.php?func=detail&aid=1826174&group_id=12694&atid=112694","http://www.securityfocus.com/bid/29212","http://secunia.com/advisories/30187","https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html","http://www.vmware.com/security/advisories/VMSA-2008-0013.html","http://secunia.com/advisories/31334","http://secunia.com/advisories/30647","http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html","https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html","http://secunia.com/advisories/31155","http://secunia.com/advisories/31351","http://security.gentoo.org/glsa/glsa-200808-02.xml","http://sunsolve.sun.com/search/document.do?assetkey=1-26-239785-1","http://www.mandriva.com/security/advisories?name=MDVSA-2008:118","http://secunia.com/advisories/31467","https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html","http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm","http://secunia.com/advisories/31568","http://www.debian.org/security/2008/dsa-1663","http://secunia.com/advisories/30615","http://www.redhat.com/support/errata/RHSA-2008-0529.html","http://secunia.com/advisories/32664","http://www.ubuntu.com/usn/usn-685-1","http://secunia.com/advisories/33003","http://www.vupen.com/english/advisories/2008/2361","http://www.vupen.com/english/advisories/2008/2141/references","http://www.vupen.com/english/advisories/2008/1528/references","http://www.securitytracker.com/id?1020527","https://exchange.xforce.ibmcloud.com/vulnerabilities/42430","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11261"],"description":"Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large OCTETSTRING in an attribute value pair (AVP).\n","fixed_versions":[">=6.0.0"],"severity":null,"id":"CPANSA-Net-SNMP-2008-2292"},{"description":"Untrusted search path vulnerability in Net-SNMP 5.2.1.2 and earlier, on Gentoo Linux, installs certain Perl modules with an insecure DT_RPATH, which could allow local users to gain privileges.\n","references":["http://www.gentoo.org/security/en/glsa/glsa-200509-05.xml"],"fixed_versions":[],"id":"CPANSA-Net-SNMP-2005-2811","severity":null,"cves":["CVE-2005-2811"],"affected_versions":["<=5.2.1.2"],"distribution":"Net-SNMP","reported":"2005-09-07"},{"id":"CPANSA-Net-SNMP-2014-2285","severity":null,"fixed_versions":[],"references":["http://lists.opensuse.org/opensuse-updates/2014-03/msg00060.html","http://comments.gmane.org/gmane.comp.security.oss.general/12284","https://bugzilla.redhat.com/show_bug.cgi?id=1072778","http://sourceforge.net/p/net-snmp/patches/1275/","http://www.nntp.perl.org/group/perl.perl5.porters/2006/09/msg116250.html","https://bugzilla.redhat.com/show_bug.cgi?id=1072044","http://lists.opensuse.org/opensuse-updates/2014-03/msg00061.html","http://secunia.com/advisories/59974","http://www.gentoo.org/security/en/glsa/glsa-201409-02.xml","https://rhn.redhat.com/errata/RHSA-2014-0322.html","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"],"description":"The perl_trapd_handler function in perl/TrapReceiver/TrapReceiver.xs in Net-SNMP 5.7.3.pre3 and earlier, when using certain Perl versions, allows remote attackers to cause a denial of service (snmptrapd crash) via an empty community string in an SNMP trap, which triggers a NULL pointer dereference within the newSVpv function in Perl.\n","distribution":"Net-SNMP","reported":"2014-04-27","affected_versions":["<=5.7.3"],"cves":["CVE-2014-2285"]}],"main_module":"Net::SNMP","versions":[{"date":"1998-10-14T13:13:11","version":"1.10"},{"version":"1.20","date":"1998-11-06T14:25:38"},{"version":"1.30","date":"1999-03-17T13:51:17"},{"date":"1999-04-26T13:39:02","version":"1.40"},{"version":"2.00","date":"1999-05-06T16:25:03"},{"date":"1999-08-12T15:23:21","version":"2.99"},{"version":"3.00","date":"1999-09-09T13:30:41"},{"version":"3.01","date":"2000-01-01T18:12:05"},{"version":"3.50","date":"2000-05-06T04:35:25"},{"date":"2000-09-09T15:00:00","version":"3.60"},{"version":"3.65","date":"2001-09-09T13:33:46"},{"version":"v4.0.0","date":"2001-11-09T14:14:48"},{"date":"2002-01-01T14:16:29","version":"v4.0.1"},{"version":"v4.0.2","date":"2002-05-06T12:51:31"},{"version":"v4.0.3","date":"2002-09-09T12:55:22"},{"date":"2003-05-06T11:06:55","version":"v4.1.0"},{"date":"2003-09-09T12:50:16","version":"v4.1.1"},{"date":"2003-09-11T19:19:45","version":"v4.1.2"},{"version":"v5.0.0","date":"2004-07-20T13:49:08"},{"date":"2004-09-09T17:06:35","version":"v5.0.1"},{"version":"v5.1.0","date":"2005-07-20T13:58:05"},{"version":"v5.2.0","date":"2005-10-20T14:25:07"},{"date":"2009-09-09T15:17:46","version":"v6.0.0"},{"date":"2010-09-10T00:15:52","version":"v6.0.1"}]},"CryptX":{"versions":[{"date":"2013-04-11T15:10:25","version":"0.002"},{"version":"0.003","date":"2013-04-16T07:29:07"},{"version":"0.004","date":"2013-04-16T07:37:29"},{"date":"2013-04-18T12:09:09","version":"0.005"},{"date":"2013-04-19T09:05:57","version":"0.006"},{"date":"2013-04-23T10:03:54","version":"0.007"},{"version":"0.008","date":"2013-05-02T08:52:42"},{"version":"0.009","date":"2013-05-19T20:25:17"},{"date":"2013-06-14T22:37:18","version":"0.011"},{"date":"2013-06-17T20:00:17","version":"0.012"},{"version":"0.013","date":"2013-08-28T07:12:15"},{"version":"0.013_1","date":"2013-09-11T14:31:01"},{"date":"2013-09-11T21:11:18","version":"0.014"},{"version":"0.014_1","date":"2013-09-12T08:21:21"},{"date":"2013-09-12T09:12:21","version":"0.014_2"},{"date":"2013-09-12T09:32:06","version":"0.015"},{"version":"0.016","date":"2013-09-15T19:36:52"},{"date":"2013-09-22T19:20:20","version":"0.016_1"},{"date":"2013-09-23T14:24:27","version":"0.016_2"},{"version":"0.016_3","date":"2013-09-24T05:00:07"},{"date":"2013-09-24T08:54:42","version":"0.017"},{"date":"2013-10-18T13:21:35","version":"0.018"},{"date":"2013-10-20T21:13:35","version":"0.019"},{"version":"0.019_1","date":"2014-01-14T21:30:37"},{"version":"0.019_2","date":"2014-01-15T21:59:30"},{"version":"0.019_3","date":"2014-01-16T21:26:19"},{"version":"0.019_4","date":"2014-01-17T09:42:29"},{"version":"0.020","date":"2014-01-18T08:29:06"},{"date":"2014-01-23T15:47:50","version":"0.021"},{"version":"0.021_1","date":"2015-04-17T01:18:47"},{"date":"2015-04-17T10:12:01","version":"0.021_3"},{"version":"0.021_4","date":"2015-05-06T07:55:21"},{"date":"2015-05-11T21:56:39","version":"0.021_5"},{"date":"2015-05-12T05:52:15","version":"0.021_6"},{"version":"0.021_7","date":"2015-05-12T07:10:42"},{"date":"2015-05-14T09:27:41","version":"0.021_8"},{"date":"2015-05-15T11:08:26","version":"0.021_9"},{"version":"0.022","date":"2015-05-22T16:57:26"},{"version":"0.023","date":"2015-06-10T20:37:54"},{"version":"0.023_1","date":"2015-06-26T06:13:25"},{"version":"0.023_2","date":"2015-06-26T09:18:06"},{"date":"2015-06-29T20:09:16","version":"0.024"},{"version":"0.025","date":"2015-07-08T07:56:50"},{"version":"0.025_01","date":"2015-10-22T15:14:53"},{"version":"0.026","date":"2015-11-28T18:58:17"},{"version":"0.026_01","date":"2015-12-29T21:20:15"},{"date":"2015-12-29T21:20:27","version":"0.026_02"},{"date":"2016-01-02T14:38:13","version":"0.026_05"},{"version":"0.026_06","date":"2016-01-02T15:57:58"},{"date":"2016-01-03T14:36:53","version":"0.026_08"},{"version":"0.026_15","date":"2016-01-10T09:47:31"},{"version":"0.026_16","date":"2016-01-10T09:47:43"},{"version":"0.026_18","date":"2016-01-10T11:52:21"},{"date":"2016-01-10T11:53:48","version":"0.026_19"},{"date":"2016-01-10T17:03:45","version":"0.026_23"},{"date":"2016-01-10T17:03:56","version":"0.026_24"},{"date":"2016-01-10T19:02:14","version":"0.026_28"},{"version":"0.026_29","date":"2016-01-10T20:49:06"},{"date":"2016-01-12T22:25:58","version":"0.026_30"},{"date":"2016-01-12T22:37:33","version":"0.026_31"},{"date":"2016-01-13T23:53:06","version":"0.026_32"},{"version":"0.026_33","date":"2016-01-14T19:29:18"},{"date":"2016-01-14T19:30:45","version":"0.026_34"},{"date":"2016-01-14T21:16:15","version":"0.026_35"},{"version":"0.026_36","date":"2016-01-14T21:19:01"},{"date":"2016-01-22T23:01:16","version":"0.026_39"},{"date":"2016-01-24T22:12:32","version":"0.026_40"},{"version":"0.026_41","date":"2016-01-24T22:36:42"},{"version":"0.027","date":"2016-01-25T20:44:46"},{"version":"0.027_01","date":"2016-01-25T21:42:58"},{"version":"0.027_05","date":"2016-01-26T10:06:26"},{"date":"2016-03-15T09:51:01","version":"0.027_06"},{"version":"0.028","date":"2016-03-23T19:44:54"},{"version":"0.028_01","date":"2016-03-28T14:31:13"},{"date":"2016-03-28T19:32:58","version":"0.028_02"},{"version":"0.028_03","date":"2016-03-31T12:07:46"},{"date":"2016-04-13T09:30:27","version":"0.029"},{"date":"2016-04-13T09:46:59","version":"0.030"},{"version":"0.031","date":"2016-05-01T16:53:05"},{"date":"2016-05-04T17:45:30","version":"0.032"},{"version":"0.033","date":"2016-05-09T20:20:49"},{"version":"0.034","date":"2016-05-10T22:31:32"},{"date":"2016-06-03T10:17:59","version":"0.035"},{"version":"0.036","date":"2016-06-07T19:22:05"},{"version":"0.037","date":"2016-06-16T17:04:27"},{"version":"0.038","date":"2016-07-06T18:27:46"},{"version":"0.039","date":"2016-08-03T05:53:42"},{"version":"0.040","date":"2016-09-12T08:42:39"},{"version":"0.041","date":"2016-10-12T09:32:48"},{"date":"2016-10-19T10:25:05","version":"0.041_001"},{"date":"2016-11-02T09:00:59","version":"0.041_002"},{"version":"0.041_003","date":"2016-11-02T09:19:09"},{"date":"2016-11-12T15:21:01","version":"0.042"},{"date":"2016-11-27T21:19:27","version":"0.043"},{"date":"2016-11-28T07:45:32","version":"0.044"},{"version":"0.044_001","date":"2017-02-21T21:54:33"},{"date":"2017-02-23T15:58:42","version":"0.044_003"},{"date":"2017-02-23T20:35:46","version":"0.044_004"},{"version":"0.044_005","date":"2017-02-23T20:44:50"},{"version":"0.044_006","date":"2017-02-28T12:22:27"},{"version":"0.044_007","date":"2017-02-28T13:58:51"},{"date":"2017-03-01T09:26:34","version":"0.044_008"},{"date":"2017-03-01T09:49:29","version":"0.044_009"},{"version":"0.044_010","date":"2017-03-01T10:02:35"},{"date":"2017-03-31T09:28:10","version":"0.045"},{"date":"2017-04-04T09:08:33","version":"0.046"},{"version":"0.047","date":"2017-04-05T20:09:35"},{"date":"2017-04-07T18:22:15","version":"0.047_001"},{"version":"0.047_002","date":"2017-04-07T21:40:24"},{"version":"0.047_003","date":"2017-04-10T08:16:03"},{"date":"2017-04-24T15:23:29","version":"0.047_004"},{"date":"2017-04-26T15:36:02","version":"0.047_005"},{"version":"0.047_006","date":"2017-05-01T19:11:50"},{"date":"2017-05-31T20:22:56","version":"0.048"},{"version":"0.048_001","date":"2017-07-09T19:38:38"},{"version":"0.048_002","date":"2017-07-14T17:43:25"},{"version":"0.049","date":"2017-07-18T05:56:42"},{"date":"2017-07-18T20:37:45","version":"0.050"},{"version":"0.051","date":"2017-08-08T08:14:05"},{"version":"0.053","date":"2017-09-15T12:32:56"},{"version":"0.053_001","date":"2017-09-19T07:51:19"},{"version":"0.053_002","date":"2017-09-19T18:46:56"},{"date":"2017-09-20T09:56:04","version":"0.053_003"},{"version":"0.053_004","date":"2017-10-10T21:04:53"},{"date":"2017-10-12T07:27:42","version":"0.054"},{"version":"0.054_001","date":"2017-10-23T13:18:12"},{"date":"2017-10-23T17:44:49","version":"0.054_002"},{"version":"0.054_003","date":"2017-10-25T07:43:53"},{"version":"0.054_004","date":"2017-10-30T17:53:14"},{"version":"0.054_005","date":"2017-10-31T18:27:22"},{"date":"2017-11-20T18:51:03","version":"0.054_006"},{"date":"2017-11-24T08:15:31","version":"0.054_007"},{"version":"0.054_008","date":"2017-11-24T14:21:46"},{"version":"0.054_009","date":"2017-11-24T16:33:40"},{"version":"0.055","date":"2017-11-28T10:19:52"},{"version":"0.055_001","date":"2017-12-18T19:05:35"},{"date":"2017-12-22T13:22:16","version":"0.056"},{"date":"2018-01-26T16:05:07","version":"0.056_001"},{"date":"2018-01-29T06:18:08","version":"0.056_002"},{"date":"2018-01-29T10:02:58","version":"0.056_003"},{"date":"2018-01-29T23:05:27","version":"0.056_004"},{"date":"2018-01-30T10:23:40","version":"0.056_005"},{"date":"2018-01-30T14:11:33","version":"0.056_006"},{"date":"2018-01-30T16:08:38","version":"0.056_007"},{"date":"2018-01-30T16:29:41","version":"0.056_008"},{"version":"0.056_009","date":"2018-01-30T16:43:48"},{"version":"0.057","date":"2018-01-31T08:56:12"},{"version":"0.058","date":"2018-02-27T17:13:52"},{"date":"2018-03-08T09:30:22","version":"0.058_001"},{"version":"0.058_002","date":"2018-03-18T16:27:43"},{"date":"2018-03-25T15:45:36","version":"0.059"},{"version":"0.059_001","date":"2018-04-27T17:14:03"},{"date":"2018-04-28T20:59:58","version":"0.059_002"},{"date":"2018-04-29T18:12:50","version":"0.059_003"},{"version":"0.060","date":"2018-05-01T09:32:27"},{"date":"2018-05-27T19:05:34","version":"0.060_001"},{"version":"0.060_002","date":"2018-05-28T07:18:37"},{"date":"2018-06-06T15:49:28","version":"0.060_003"},{"version":"0.061","date":"2018-06-07T05:25:50"},{"date":"2018-10-24T20:35:24","version":"0.061_001"},{"version":"0.061_002","date":"2018-10-26T17:10:16"},{"date":"2018-10-29T10:46:25","version":"0.061_003"},{"date":"2018-10-30T06:27:48","version":"0.062"},{"date":"2018-11-22T10:43:01","version":"0.062_001"},{"date":"2018-11-28T10:48:28","version":"0.063"},{"version":"0.063_001","date":"2019-06-06T09:36:14"},{"version":"0.063_002","date":"2019-06-06T17:35:59"},{"date":"2019-06-10T17:24:53","version":"0.063_003"},{"date":"2019-06-12T13:33:28","version":"0.063_004"},{"version":"0.063_005","date":"2019-06-12T23:12:09"},{"date":"2019-06-14T07:01:03","version":"0.064"},{"version":"0.065","date":"2019-10-19T18:49:19"},{"date":"2019-10-20T16:30:22","version":"0.066"},{"version":"0.066_001","date":"2020-01-26T20:23:46"},{"version":"0.066_002","date":"2020-01-30T10:21:29"},{"date":"2020-02-01T13:24:27","version":"0.067"},{"date":"2020-03-08T19:21:55","version":"0.067_001"},{"version":"0.068","date":"2020-03-10T13:04:08"},{"version":"0.068_001","date":"2020-08-02T08:51:06"},{"date":"2020-08-25T07:12:43","version":"0.069"},{"date":"2021-02-12T14:44:41","version":"0.070"},{"date":"2021-03-30T09:39:33","version":"0.071"},{"date":"2021-04-29T08:23:01","version":"0.072"},{"version":"0.072_001","date":"2021-07-12T16:40:01"},{"date":"2021-07-13T07:03:12","version":"0.072_002"},{"date":"2021-07-13T20:54:22","version":"0.072_003"},{"version":"0.073","date":"2021-07-18T12:16:09"},{"version":"0.073_001","date":"2021-10-04T18:34:39"},{"date":"2021-10-10T18:41:04","version":"0.073_002"},{"version":"0.073_003","date":"2021-10-13T18:32:43"},{"date":"2021-11-06T09:26:22","version":"0.074"},{"date":"2021-12-25T09:39:17","version":"0.075"},{"date":"2022-01-01T00:36:25","version":"0.075_001"},{"date":"2022-01-01T13:19:24","version":"0.075_002"},{"version":"0.075_003","date":"2022-01-01T19:48:49"},{"version":"0.076","date":"2022-01-07T20:55:06"},{"date":"2022-06-09T18:18:34","version":"0.076_001"},{"version":"0.076_002","date":"2022-08-20T15:42:12"},{"version":"0.076_003","date":"2022-08-20T18:14:10"},{"version":"0.077","date":"2022-08-21T07:46:06"},{"date":"2023-04-28T12:31:25","version":"0.078"},{"date":"2023-07-25T18:36:58","version":"0.078_001"},{"date":"2023-10-01T12:20:32","version":"0.079"},{"version":"0.079_002","date":"2023-10-01T17:35:55"},{"version":"0.079_003","date":"2023-10-01T17:36:06"},{"version":"0.079_004","date":"2023-10-02T07:47:50"},{"date":"2023-10-02T11:22:48","version":"0.079_005"},{"date":"2023-10-02T15:06:17","version":"0.079_006"},{"date":"2023-10-03T10:16:25","version":"0.079_007"},{"date":"2023-10-04T11:07:16","version":"0.080"},{"date":"2023-10-07T11:45:30","version":"0.080_001"},{"date":"2024-08-17T10:06:21","version":"0.080_003"},{"date":"2024-08-17T17:16:06","version":"0.080_004"},{"version":"0.080_005","date":"2024-08-17T20:28:14"},{"date":"2024-08-30T18:43:56","version":"0.080_006"},{"version":"0.080_007","date":"2024-09-01T08:32:21"},{"version":"0.080_008","date":"2024-09-01T09:26:40"},{"version":"0.080_009","date":"2024-09-01T11:23:19"},{"version":"0.080_010","date":"2024-09-02T14:51:29"},{"date":"2024-09-03T11:32:03","version":"0.080_011"},{"version":"0.080_012","date":"2024-09-03T18:01:58"},{"date":"2024-09-08T16:12:50","version":"0.081"},{"date":"2024-10-03T11:12:24","version":"0.081_001"},{"date":"2024-10-07T13:31:29","version":"0.082"},{"date":"2024-10-14T11:36:41","version":"0.082_001"},{"version":"0.083","date":"2024-10-15T09:31:49"},{"version":"0.083_001","date":"2024-10-15T15:09:00"},{"version":"0.084","date":"2024-10-16T11:23:26"}],"advisories":[{"id":"CPANSA-CryptX-2018-01","severity":null,"fixed_versions":[],"references":["https://github.com/DCIT/perl-CryptX/issues/47","https://github.com/libtom/libtomcrypt/pull/451"],"description":"A user can pass anything as the tag into gcm_decrypt_verify() and it will return decrypted plaintext.\n","distribution":"CryptX","reported":"2018-10-26","affected_versions":["<0.062"],"cves":["CVE-2018-25099"]}],"main_module":"CryptX"},"Imager":{"advisories":[{"description":"Imager would search the default current directory entry in @INC when searching for file format support modules.\n","references":["https://metacpan.org/dist/Imager/changes","http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"severity":"high","fixed_versions":[">=1.006"],"cves":["CVE-2016-1238"],"distribution":"Imager","reported":"2016-08-02","affected_versions":["<1.006"],"id":"CPANSA-Imager-2016-1238","reviewed_by":[{"date":"2022-06-23","email":"rrwo@cpan.org","name":"Robert Rothenberg"}]},{"id":"CPANSA-Imager-2008-1928","reviewed_by":[{"date":"2022-06-23","email":"rrwo@cpan.org","name":"Robert Rothenberg"}],"fixed_versions":[">=0.64"],"severity":null,"references":["https://metacpan.org/dist/Imager/changes","http://rt.cpan.org/Public/Bug/Display.html?id=35324","http://imager.perl.org/i/release064/Imager_0_64","https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00569.html","http://www.securityfocus.com/bid/28980","http://secunia.com/advisories/30030","http://secunia.com/advisories/30011","http://www.vupen.com/english/advisories/2008/1387/references","https://exchange.xforce.ibmcloud.com/vulnerabilities/41986"],"description":"Buffer overflow in Imager 0.42 through 0.63 allows attackers to cause a denial of service (crash) via an image based fill in which the number of input channels is different from the number of output channels.\n","affected_versions":[">=0.42,<=0.63"],"distribution":"Imager","reported":"2008-04-24","cves":["CVE-2008-1928"]},{"reviewed_by":[{"date":"2022-06-23","email":"rrwo@cpan.org","name":"Robert Rothenberg"}],"id":"CPANSA-Imager-2007-2459","reported":"2007-05-02","distribution":"Imager","affected_versions":[">=0.21,<=0.56"],"cves":["CVE-2007-2459"],"severity":null,"fixed_versions":[">=0.57"],"description":"Heap-based buffer overflow in the BMP reader (bmp.c) in Imager perl module (libimager-perl) 0.45 through 0.56 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted 8-bit/pixel compressed BMP files.\n","references":["http://imager.perl.org/a/65.html","http://rt.cpan.org/Public/Bug/Display.html?id=26811","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=421582","http://www.debian.org/security/2008/dsa-1498","http://www.securityfocus.com/bid/23711","http://secunia.com/advisories/25038","http://secunia.com/advisories/28868","http://osvdb.org/39846","http://www.vupen.com/english/advisories/2007/1587","http://osvdb.org/35470","https://exchange.xforce.ibmcloud.com/vulnerabilities/34010"]},{"fixed_versions":[">=0.98"],"id":"CPANSA-Imager-2014-01","severity":null,"description":"When drawing on an image with an alpha channel where the source minimum is greater than zero, Imager would read from beyond the end of a malloc() allocated buffer. In rare circumstances this could lead to some of the source image not being written to the target image, or possibly to a segmentation fault.\n","references":["https://metacpan.org/dist/Imager/changes"],"affected_versions":["<0.98"],"reported":"2014-01-03","distribution":"Imager","cves":[]},{"cves":["CVE-2024-53901"],"affected_versions":["<=1.024"],"reported":"2024-11-17","distribution":"Imager","description":"\"invalid next size\" backtrace on use of trim on certain images\n","references":["https://metacpan.org/dist/Imager/changes","https://github.com/tonycoz/imager/issues/534"],"fixed_versions":[">1.024"],"id":"CPANSA-Imager-2024-001","severity":"moderate"}],"main_module":"Imager","versions":[{"version":"0.21","date":"1999-07-19T14:26:37"},{"date":"2000-01-03T20:14:03","version":"0.27"},{"date":"2000-01-04T11:16:56","version":"0.28"},{"version":"0.29","date":"2000-01-05T10:48:05"},{"date":"2000-01-16T12:52:22","version":"0.31"},{"date":"2000-03-04T13:28:32","version":"0.32"},{"version":"0.35","date":"2001-01-29T00:50:14"},{"version":"0.36","date":"2001-01-29T15:06:27"},{"version":"0.37","date":"2001-01-31T05:02:15"},{"version":"0.38","date":"2001-05-21T16:21:08"},{"date":"2001-11-02T21:39:20","version":"0.39"},{"date":"2002-04-11T15:09:57","version":"0.40"},{"version":"0.41","date":"2002-04-12T12:07:29"},{"version":"0.42","date":"2004-01-04T12:47:37"},{"date":"2004-02-17T07:53:52","version":"0.43"},{"version":"0.43_03","date":"2004-12-07T23:58:16"},{"version":"0.44","date":"2004-12-15T13:02:40"},{"date":"2005-05-24T07:08:15","version":"0.44_01"},{"version":"0.45","date":"2005-05-30T04:41:43"},{"date":"2005-12-12T04:07:30","version":"0.45_02"},{"version":"0.46","date":"2005-12-20T00:13:31"},{"date":"2005-12-30T06:05:50","version":"0.47"},{"date":"2006-02-21T06:09:30","version":"0.47_01"},{"date":"2006-03-03T05:06:46","version":"0.48"},{"date":"2006-03-07T01:04:03","version":"0.49"},{"date":"2006-03-28T04:31:56","version":"0.49_01"},{"date":"2006-03-29T00:31:03","version":"0.50"},{"version":"0.51","date":"2006-04-23T14:29:42"},{"date":"2006-06-28T13:38:48","version":"0.51_01"},{"version":"0.51_02","date":"2006-07-04T14:03:23"},{"date":"2006-07-19T00:58:22","version":"0.51_03"},{"date":"2006-07-25T05:09:08","version":"0.52"},{"date":"2006-07-27T01:01:57","version":"0.53"},{"version":"0.54","date":"2006-09-14T07:58:27"},{"date":"2006-12-16T22:31:19","version":"0.55"},{"date":"2007-04-01T12:30:34","version":"0.56"},{"version":"0.57","date":"2007-04-30T08:49:39"},{"date":"2007-05-11T11:00:18","version":"0.57_01"},{"date":"2007-05-16T12:49:23","version":"0.58"},{"date":"2007-06-14T07:33:05","version":"0.59"},{"version":"0.60","date":"2007-08-30T07:51:36"},{"date":"2007-11-05T07:53:45","version":"0.61"},{"version":"0.61_02","date":"2007-11-28T10:06:27"},{"date":"2007-12-10T08:31:12","version":"0.62"},{"version":"0.63","date":"2008-04-07T08:49:14"},{"version":"0.64","date":"2008-04-23T04:10:18"},{"version":"0.65","date":"2008-05-20T06:34:48"},{"version":"0.67","date":"2008-12-12T11:57:40"},{"version":"0.67_01","date":"2009-09-02T07:05:11"},{"date":"2009-09-07T05:14:24","version":"0.68"},{"version":"0.69","date":"2009-09-08T09:23:38"},{"date":"2009-09-21T03:36:15","version":"0.70"},{"version":"0.71","date":"2009-11-16T04:15:54"},{"date":"2009-11-30T07:17:33","version":"0.71_01"},{"version":"0.71_02","date":"2009-12-01T09:06:53"},{"date":"2009-12-04T14:21:49","version":"0.71_03"},{"date":"2009-12-10T00:44:51","version":"0.72"},{"date":"2010-03-15T07:24:59","version":"0.73"},{"date":"2010-05-06T14:29:21","version":"0.74"},{"date":"2010-06-20T10:47:23","version":"0.75"},{"version":"0.75_01","date":"2010-08-06T10:49:44"},{"version":"0.75_02","date":"2010-08-07T01:48:37"},{"version":"0.75_03","date":"2010-08-09T12:49:36"},{"date":"2010-08-11T09:33:24","version":"0.77"},{"version":"0.77_01","date":"2010-09-13T10:48:57"},{"date":"2010-09-27T04:59:03","version":"0.77_02"},{"version":"0.78","date":"2010-10-04T09:00:26"},{"date":"2010-12-11T01:09:12","version":"0.79"},{"version":"0.80","date":"2011-01-17T07:43:35"},{"version":"0.81","date":"2011-02-14T08:22:57"},{"date":"2011-03-14T12:18:07","version":"0.82"},{"version":"0.82_01","date":"2011-05-17T11:15:02"},{"version":"0.83","date":"2011-05-20T14:07:44"},{"version":"0.84","date":"2011-06-20T12:54:05"},{"version":"0.84_01","date":"2011-08-08T12:39:58"},{"version":"0.84_02","date":"2011-08-22T09:28:25"},{"version":"0.85","date":"2011-08-29T09:19:04"},{"version":"0.85_01","date":"2011-10-10T07:22:51"},{"version":"0.85_02","date":"2011-10-24T10:14:57"},{"version":"0.86","date":"2011-10-31T10:37:15"},{"version":"0.87","date":"2012-01-03T05:27:14"},{"version":"0.88","date":"2012-02-22T05:13:09"},{"date":"2012-03-18T01:45:35","version":"0.89"},{"version":"0.90","date":"2012-04-30T09:09:02"},{"date":"2012-06-04T12:27:17","version":"0.91"},{"version":"0.92","date":"2012-08-14T09:53:38"},{"date":"2012-08-18T01:41:22","version":"0.92_01"},{"date":"2012-10-15T10:15:07","version":"0.93"},{"date":"2012-11-12T10:44:54","version":"0.93_01"},{"version":"0.93_02","date":"2012-11-25T00:13:16"},{"date":"2012-12-14T22:59:55","version":"0.94"},{"version":"0.94_01","date":"2013-03-02T08:34:07"},{"version":"0.94_02","date":"2013-04-05T06:19:32"},{"version":"0.95","date":"2013-04-19T12:13:27"},{"date":"2013-05-19T04:27:19","version":"0.96"},{"version":"0.96_01","date":"2013-07-01T13:21:32"},{"version":"0.96_02","date":"2013-07-09T13:46:48"},{"date":"2013-07-15T09:52:06","version":"0.97"},{"date":"2014-01-02T22:22:03","version":"0.98"},{"version":"0.99","date":"2014-06-25T11:36:29"},{"version":"0.99_01","date":"2014-06-29T05:06:45"},{"date":"2014-07-21T09:16:17","version":"0.99_02"},{"date":"2014-07-29T09:13:55","version":"1.000"},{"version":"1.001","date":"2015-01-02T03:34:59"},{"date":"2015-04-03T01:31:26","version":"1.002"},{"version":"1.003","date":"2015-05-12T08:11:18"},{"version":"1.004","date":"2015-11-08T09:45:59"},{"version":"1.004_001","date":"2016-03-16T08:35:26"},{"date":"2016-03-20T01:27:53","version":"1.004_002"},{"version":"1.004_003","date":"2016-03-23T09:34:13"},{"version":"1.004_004","date":"2016-04-15T05:58:07"},{"version":"1.005","date":"2016-04-16T00:01:33"},{"version":"1.006","date":"2017-08-26T04:27:06"},{"version":"1.007","date":"2018-11-24T01:47:34"},{"date":"2018-12-31T10:04:02","version":"1.008"},{"date":"2019-01-11T09:10:13","version":"1.009"},{"date":"2019-02-13T08:14:07","version":"1.010"},{"date":"2019-03-07T03:20:03","version":"1.011"},{"date":"2020-06-14T03:26:02","version":"1.012"},{"date":"2022-04-27T05:18:23","version":"1.013"},{"date":"2022-04-28T07:22:51","version":"1.014"},{"date":"2022-05-07T04:35:16","version":"1.015"},{"version":"1.016","date":"2022-06-12T05:27:23"},{"version":"1.017","date":"2022-06-14T09:55:03"},{"date":"2022-06-19T12:04:12","version":"1.018"},{"date":"2022-07-09T03:41:29","version":"1.019"},{"version":"1.020","date":"2023-11-12T06:55:05"},{"date":"2023-12-01T06:53:47","version":"1.021"},{"version":"1.022","date":"2023-12-02T23:32:54"},{"version":"1.023","date":"2024-01-19T03:18:43"},{"date":"2024-04-06T02:24:09","version":"1.024"},{"version":"1.024_001","date":"2024-04-14T12:28:26"},{"version":"1.024_002","date":"2024-04-20T07:15:38"},{"version":"1.024_003","date":"2024-04-22T12:51:23"},{"version":"1.024_004","date":"2024-04-24T08:35:58"},{"version":"1.024_005","date":"2024-04-27T01:24:42"},{"date":"2024-06-11T11:35:22","version":"1.024_006"},{"date":"2024-06-12T09:58:08","version":"1.024_007"},{"version":"1.024_008","date":"2024-06-13T10:45:14"},{"version":"1.025","date":"2024-11-16T05:30:21"}]},"Dancer2":{"advisories":[{"references":["https://metacpan.org/changes/distribution/Dancer2","http://lists.preshweb.co.uk/pipermail/dancer-users/2018-April/005952.html","https://github.com/PerlDancer/Dancer2/commit/3580f5d0874a9abf5483528f73bda9a7fd9ec7f1"],"description":"There is a potential RCE with regards to Storable. We have added session ID validation to the session engine so that session backends based on Storable can reject malformed session IDs that may lead to exploitation of the RCE.\n","severity":"critical","id":"CPANSA-Dancer2-2018-01","fixed_versions":[">=0.206000"],"cves":[],"distribution":"Dancer2","reported":"2018-01-30","affected_versions":["<0.206000"]}],"main_module":"Dancer2","versions":[{"version":"0.01","date":"2013-02-22T15:39:46"},{"date":"2013-02-24T11:04:25","version":"0.02"},{"version":"0.03","date":"2013-03-07T17:30:37"},{"version":"0.04","date":"2013-04-22T19:58:02"},{"version":"0.05","date":"2013-07-20T16:53:37"},{"date":"2013-07-30T14:29:42","version":"0.06"},{"version":"0.07","date":"2013-08-03T22:17:54"},{"version":"0.08","date":"2013-08-18T12:24:31"},{"version":"0.09","date":"2013-09-01T21:19:26"},{"version":"0.10","date":"2013-09-28T13:29:35"},{"version":"0.11","date":"2013-12-15T13:21:28"},{"version":"0.12","date":"2014-04-07T21:05:16"},{"date":"2014-04-13T17:20:22","version":"0.13"},{"version":"0.140000","date":"2014-04-28T21:16:57"},{"version":"0.140001","date":"2014-05-01T08:50:43"},{"date":"2014-06-07T20:35:57","version":"0.140900_01"},{"date":"2014-06-08T20:29:28","version":"0.141000"},{"version":"0.142000","date":"2014-06-24T19:18:07"},{"date":"2014-07-05T19:43:17","version":"0.143000"},{"version":"0.149000_01","date":"2014-07-23T19:34:51"},{"date":"2014-08-10T11:53:37","version":"0.149000_02"},{"version":"0.150000","date":"2014-08-16T23:38:39"},{"version":"0.151000","date":"2014-10-08T19:51:49"},{"date":"2014-10-14T02:33:06","version":"0.152000"},{"version":"0.153000","date":"2014-10-23T21:48:36"},{"date":"2014-10-29T21:41:13","version":"0.153001"},{"version":"0.153002","date":"2014-10-30T08:29:15"},{"date":"2014-11-17T14:41:14","version":"0.154000"},{"version":"0.155000","date":"2014-11-28T00:21:55"},{"date":"2014-11-28T16:44:27","version":"0.155001"},{"version":"0.155002","date":"2014-12-02T22:02:03"},{"date":"2014-12-03T21:35:35","version":"0.155003"},{"version":"0.155004","date":"2014-12-04T10:57:08"},{"date":"2014-12-07T17:07:21","version":"0.156000"},{"date":"2014-12-08T22:08:30","version":"0.156001"},{"version":"0.157000","date":"2014-12-14T17:25:53"},{"date":"2014-12-21T19:42:24","version":"0.157001"},{"date":"2015-01-01T17:11:48","version":"0.158000"},{"date":"2015-02-24T03:54:24","version":"0.159000"},{"version":"0.159001","date":"2015-02-25T14:33:59"},{"version":"0.159002","date":"2015-03-03T18:25:28"},{"date":"2015-03-23T14:00:19","version":"0.159003"},{"date":"2015-04-26T22:15:22","version":"0.160000"},{"date":"2015-05-14T18:46:02","version":"0.160001"},{"version":"0.160002","date":"2015-06-04T11:07:02"},{"version":"0.160003","date":"2015-06-06T09:11:43"},{"date":"2015-07-08T13:04:02","version":"0.161000"},{"version":"0.161000_01","date":"2015-08-28T13:32:02"},{"version":"0.162000","date":"2015-09-06T11:13:10"},{"version":"0.162000_01","date":"2015-10-13T15:08:16"},{"date":"2015-10-15T11:00:10","version":"0.163000"},{"version":"0.164000","date":"2015-12-16T22:44:32"},{"date":"2015-12-17T08:23:24","version":"0.165000"},{"date":"2016-01-12T18:04:57","version":"0.166000"},{"date":"2016-01-22T06:57:11","version":"0.166001"},{"version":"0.166001_01","date":"2016-04-19T19:52:27"},{"date":"2016-04-29T14:45:41","version":"0.166001_02"},{"date":"2016-05-27T11:25:55","version":"0.166001_03"},{"date":"2016-05-27T12:57:04","version":"0.166001_04"},{"version":"0.200000","date":"2016-05-31T13:29:37"},{"date":"2016-06-16T14:00:23","version":"0.200001"},{"version":"0.200002","date":"2016-06-22T14:41:29"},{"date":"2016-07-05T19:36:46","version":"0.200003"},{"version":"0.200003","date":"2016-07-11T15:21:33"},{"date":"2016-07-22T04:41:26","version":"0.200004"},{"date":"2016-07-22T13:28:45","version":"0.201000"},{"version":"0.202000","date":"2016-08-13T18:53:07"},{"version":"0.203000","date":"2016-08-25T03:12:19"},{"date":"2016-09-04T02:01:29","version":"0.203001"},{"date":"2016-10-11T01:59:49","version":"0.204000"},{"version":"0.204001","date":"2016-10-17T13:32:25"},{"version":"0.204002","date":"2016-12-21T21:47:24"},{"date":"2017-01-25T21:23:22","version":"0.204003"},{"date":"2017-01-26T17:31:30","version":"0.204004"},{"date":"2017-03-10T21:40:43","version":"0.205000"},{"date":"2017-07-11T13:04:56","version":"0.205001"},{"version":"0.205002","date":"2017-10-17T21:10:03"},{"date":"2018-04-09T00:54:25","version":"0.206000_01"},{"version":"0.206000_02","date":"2018-04-10T01:50:18"},{"version":"0.206000","date":"2018-04-20T02:12:22"},{"version":"0.207000","date":"2018-11-14T22:26:15"},{"date":"2019-06-19T14:23:06","version":"0.208000"},{"date":"2019-08-05T01:12:14","version":"0.208001"},{"date":"2019-12-14T21:13:32","version":"0.208002"},{"date":"2019-12-24T05:57:09","version":"0.300000"},{"version":"0.300001","date":"2020-04-06T16:18:33"},{"version":"0.300002","date":"2020-04-07T15:49:22"},{"date":"2020-04-09T14:42:55","version":"0.300003"},{"date":"2020-05-27T00:54:55","version":"0.300004"},{"date":"2021-01-26T20:59:33","version":"0.300005"},{"date":"2021-03-15T23:12:49","version":"0.301000"},{"date":"2021-03-17T12:56:09","version":"0.301001"},{"version":"0.301002","date":"2021-04-18T19:33:05"},{"version":"0.301003","date":"2021-06-03T13:29:26"},{"date":"2021-06-06T17:32:08","version":"0.301004"},{"date":"2022-03-14T02:18:12","version":"0.400000"},{"date":"2023-02-05T23:42:54","version":"0.400001"},{"version":"1.0.0","date":"2023-10-09T14:11:25"},{"version":"1.1.0","date":"2023-12-12T01:29:05"},{"version":"1.1.1","date":"2024-07-18T23:49:14"},{"version":"1.1.2","date":"2024-11-25T13:36:09"}]},"Module-Load-Conditional":{"advisories":[{"id":"CPANSA-Module-Load-Conditional-2016-1238","severity":"high","fixed_versions":[">=0.66"],"description":"(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.\n","references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"reported":"2016-08-02","distribution":"Module-Load-Conditional","affected_versions":["<0.66"],"cves":["CVE-2016-1238"]}],"main_module":"Module::Load::Conditional","versions":[{"date":"2003-05-10T16:59:45","version":"0.02"},{"date":"2003-05-31T12:30:25","version":"0.03"},{"date":"2003-10-05T15:11:11","version":"0.04"},{"version":"0.05","date":"2004-05-22T14:34:33"},{"date":"2004-12-03T15:53:27","version":"0.06"},{"version":"0.07","date":"2005-01-13T18:59:45"},{"date":"2005-01-14T17:32:34","version":"0.08"},{"version":"0.10","date":"2006-08-01T20:05:30"},{"date":"2006-08-13T13:08:40","version":"0.12"},{"date":"2007-01-03T17:38:46","version":"0.14"},{"version":"0.16","date":"2007-01-25T21:40:29"},{"version":"0.18","date":"2007-09-15T14:20:27"},{"version":"0.20","date":"2007-10-03T15:27:25"},{"version":"0.22","date":"2007-10-15T08:19:21"},{"date":"2008-01-02T15:57:46","version":"0.24"},{"date":"2008-02-29T16:01:59","version":"0.26"},{"date":"2008-12-17T12:56:57","version":"0.28"},{"version":"0.30","date":"2009-01-19T15:56:22"},{"version":"0.31_01","date":"2009-10-23T09:16:58"},{"version":"0.32","date":"2009-10-23T20:58:24"},{"version":"0.34","date":"2009-10-29T09:27:23"},{"date":"2010-02-09T14:20:49","version":"0.36"},{"version":"0.38","date":"2010-04-23T15:03:33"},{"date":"2011-01-07T22:28:54","version":"0.40"},{"version":"0.42","date":"2011-02-09T15:29:28"},{"date":"2011-02-09T21:54:40","version":"0.44"},{"date":"2011-09-07T23:02:16","version":"0.46"},{"version":"0.48","date":"2012-03-15T13:58:36"},{"date":"2012-04-27T21:29:11","version":"0.50"},{"date":"2012-07-29T09:13:49","version":"0.52"},{"version":"0.54","date":"2012-08-12T08:13:47"},{"version":"0.56","date":"2013-08-29T20:32:38"},{"version":"0.58","date":"2013-09-01T10:25:33"},{"version":"0.60","date":"2014-01-16T12:31:47"},{"version":"0.62","date":"2014-01-24T15:55:28"},{"date":"2015-01-17T13:36:11","version":"0.64"},{"version":"0.66","date":"2016-07-27T07:37:34"},{"version":"0.68","date":"2016-07-29T07:05:40"},{"version":"0.70","date":"2019-11-10T14:37:30"},{"date":"2020-06-25T07:23:00","version":"0.72"},{"version":"0.74","date":"2020-08-21T08:09:10"}]},"File-KeePass":{"versions":[{"version":"0.01","date":"2010-06-29T14:52:50"},{"date":"2010-12-04T04:33:41","version":"0.02"},{"version":"0.03","date":"2010-12-07T06:06:57"},{"date":"2012-09-13T04:48:56","version":"2.00"},{"date":"2012-09-13T14:17:11","version":"2.01"},{"version":"2.02","date":"2012-09-13T15:22:40"},{"date":"2012-09-15T22:25:43","version":"2.03"}],"main_module":"File::KeePass","advisories":[{"cves":[],"affected_versions":[">0"],"distribution":"File-KeePass","reported":"2016-09-14","references":["https://rt.cpan.org/Ticket/Display.html?id=117836"],"description":"The module is making use of the perl rand function for key and iv generation (for Crypt::Rijndael).\n","fixed_versions":[],"severity":null,"id":"CPANSA-File-KeePass-2016-01"}]},"HTML-StripScripts":{"main_module":"HTML::StripScripts","advisories":[{"fixed_versions":[],"id":"CPANSA-HTML-StripScripts-2023-24038","severity":"high","references":["https://github.com/clintongormley/perl-html-stripscripts/issues/3","https://lists.debian.org/debian-lts-announce/2023/01/msg00036.html","https://www.debian.org/security/2023/dsa-5339"],"description":"The HTML-StripScripts module through 1.06 for Perl allows _hss_attval_style ReDoS because of catastrophic backtracking for HTML content with certain style attributes.\n","affected_versions":["<=1.06"],"reported":"2023-01-21","distribution":"HTML-StripScripts","cves":["CVE-2023-24038"]}],"versions":[{"version":"0.01","date":"2003-03-30T10:08:51"},{"version":"0.02","date":"2003-07-25T18:13:42"},{"date":"2004-04-27T16:45:34","version":"0.03"},{"version":"0.90","date":"2007-05-28T11:57:07"},{"date":"2007-05-28T12:31:03","version":"0.99"},{"version":"0.991","date":"2007-05-29T13:15:46"},{"version":"1.00","date":"2007-06-05T12:44:56"},{"version":"1.01","date":"2007-10-22T14:30:52"},{"date":"2007-10-22T15:47:44","version":"1.02"},{"version":"1.03","date":"2007-10-22T17:21:36"},{"date":"2007-11-16T17:53:46","version":"1.04"},{"version":"1.05","date":"2009-11-05T10:25:59"},{"date":"2016-05-12T09:44:35","version":"1.06"}]},"MDK-Common":{"versions":[{"version":"1.2.29","date":"2012-09-14T16:23:25"},{"version":"v1.2.30","date":"2014-05-06T17:14:10"},{"date":"2017-10-27T22:31:26","version":"v1.2.32"},{"date":"2017-10-27T23:18:48","version":"v1.2.33"},{"version":"v1.2.34","date":"2017-10-28T01:09:39"},{"version":"v1.2.34.1","date":"2017-10-28T03:37:17"},{"date":"2017-10-28T04:28:13","version":"v1.2.34.2"}],"main_module":"MDK::Common","advisories":[{"cves":["CVE-2009-0912"],"reported":"2009-03-16","distribution":"MDK-Common","affected_versions":["=1.1.11","=1.1.24",">=1.2.9,<=1.2.14"],"references":["http://www.securityfocus.com/bid/34089","http://www.vupen.com/english/advisories/2009/0688","http://www.mandriva.com/security/advisories?name=MDVSA-2009:072","https://exchange.xforce.ibmcloud.com/vulnerabilities/49220"],"description":"perl-MDK-Common 1.1.11 and 1.1.24, 1.2.9 through 1.2.14, and possibly other versions, in Mandriva Linux does not properly handle strings when writing them to configuration files, which allows attackers to gain privileges via \"special characters\" in unspecified vectors.'\n","severity":null,"id":"CPANSA-MDK-Common-2009-0912","fixed_versions":[]}]},"Mojolicious":{"versions":[{"date":"2010-02-11T02:04:14","version":"0.999920"},{"version":"0.999921","date":"2010-02-11T02:55:03"},{"date":"2010-02-26T18:50:34","version":"0.999922"},{"date":"2010-03-08T20:03:52","version":"0.999923"},{"version":"0.999924","date":"2010-03-20T22:56:55"},{"version":"0.999925","date":"2010-06-07T22:33:12"},{"version":"0.999926","date":"2010-06-11T10:33:01"},{"date":"2010-08-15T13:48:19","version":"0.999927"},{"version":"0.999928","date":"2010-08-17T17:41:47"},{"version":"0.999929","date":"2010-08-17T17:54:45"},{"version":"0.999930","date":"2010-10-19T13:57:49"},{"date":"2010-10-26T04:44:54","version":"0.999931"},{"date":"2010-10-30T00:54:42","version":"0.999932"},{"version":"0.999933","date":"2010-10-30T19:46:09"},{"date":"2010-11-01T00:33:14","version":"0.999934"},{"date":"2010-11-03T20:34:11","version":"0.999935"},{"version":"0.999936","date":"2010-11-04T23:48:46"},{"date":"2010-11-09T20:13:52","version":"0.999937"},{"date":"2010-11-09T21:24:17","version":"0.999938"},{"version":"0.999939","date":"2010-11-15T17:56:49"},{"date":"2010-11-15T23:18:40","version":"0.999940"},{"date":"2010-11-19T14:22:51","version":"0.999941"},{"version":"0.999950","date":"2010-12-01T18:57:50"},{"date":"2010-12-26T14:55:33","version":"1.0"},{"version":"1.01","date":"2011-01-06T12:00:46"},{"version":"1.1","date":"2011-02-14T03:22:27"},{"date":"2011-02-18T17:07:03","version":"1.11"},{"version":"1.12","date":"2011-03-10T10:05:32"},{"version":"1.13","date":"2011-03-14T11:58:23"},{"version":"1.14","date":"2011-03-17T13:24:28"},{"date":"2011-03-18T18:31:34","version":"1.15"},{"date":"2011-04-15T09:07:17","version":"1.16"},{"version":"1.17","date":"2011-04-18T21:49:07"},{"date":"2011-04-19T21:03:20","version":"1.18"},{"version":"1.19","date":"2011-04-19T22:17:44"},{"version":"1.20","date":"2011-04-20T10:39:46"},{"version":"1.21","date":"2011-04-20T15:29:17"},{"version":"1.22","date":"2011-05-02T07:00:00"},{"date":"2011-05-08T17:00:10","version":"1.31"},{"date":"2011-05-11T13:29:59","version":"1.32"},{"version":"1.33","date":"2011-05-20T12:32:57"},{"date":"2011-05-22T13:20:40","version":"1.34"},{"date":"2011-06-02T09:03:36","version":"1.4"},{"date":"2011-06-03T10:12:43","version":"1.41"},{"date":"2011-06-09T14:12:56","version":"1.42"},{"version":"1.43","date":"2011-06-13T14:05:24"},{"date":"2011-06-18T18:14:22","version":"1.44"},{"date":"2011-06-20T00:25:16","version":"1.45"},{"version":"1.46","date":"2011-06-21T04:56:47"},{"version":"1.47","date":"2011-06-22T13:03:42"},{"version":"1.48","date":"2011-06-24T12:01:47"},{"version":"1.49","date":"2011-06-30T15:18:18"},{"version":"1.50","date":"2011-07-01T10:26:00"},{"date":"2011-07-01T13:59:47","version":"1.51"},{"date":"2011-07-01T17:48:50","version":"1.52"},{"date":"2011-07-02T11:48:49","version":"1.53"},{"version":"1.54","date":"2011-07-03T18:04:37"},{"date":"2011-07-04T21:23:51","version":"1.55"},{"date":"2011-07-05T20:49:36","version":"1.56"},{"date":"2011-07-07T02:00:07","version":"1.57"},{"version":"1.58","date":"2011-07-07T19:52:59"},{"date":"2011-07-08T04:58:56","version":"1.59"},{"date":"2011-07-08T20:44:55","version":"1.60"},{"date":"2011-07-09T19:36:58","version":"1.61"},{"date":"2011-07-10T00:40:32","version":"1.62"},{"version":"1.63","date":"2011-07-10T03:19:49"},{"version":"1.64","date":"2011-07-10T05:51:47"},{"date":"2011-07-25T18:13:25","version":"1.65"},{"version":"1.66","date":"2011-07-26T23:14:38"},{"date":"2011-07-27T13:57:06","version":"1.67"},{"version":"1.68","date":"2011-07-29T18:39:20"},{"date":"2011-08-03T14:32:24","version":"1.69"},{"date":"2011-08-04T15:34:41","version":"1.70"},{"date":"2011-08-05T04:01:50","version":"1.71"},{"version":"1.72","date":"2011-08-05T20:07:50"},{"date":"2011-08-09T10:07:19","version":"1.73"},{"date":"2011-08-09T12:09:49","version":"1.74"},{"date":"2011-08-12T13:14:07","version":"1.75"},{"date":"2011-08-12T14:54:00","version":"1.76"},{"date":"2011-08-14T20:48:58","version":"1.77"},{"date":"2011-08-16T13:22:48","version":"1.78"},{"version":"1.79","date":"2011-08-17T17:43:58"},{"date":"2011-08-17T19:08:11","version":"1.80"},{"version":"1.81","date":"2011-08-19T02:48:39"},{"version":"1.82","date":"2011-08-19T04:55:49"},{"version":"1.83","date":"2011-08-19T05:21:15"},{"date":"2011-08-19T18:08:30","version":"1.84"},{"date":"2011-08-20T00:19:42","version":"1.85"},{"date":"2011-08-21T18:59:13","version":"1.86"},{"version":"1.87","date":"2011-08-23T00:49:19"},{"date":"2011-08-23T19:20:37","version":"1.88"},{"date":"2011-08-23T21:15:42","version":"1.89"},{"date":"2011-08-24T19:01:47","version":"1.90"},{"version":"1.91","date":"2011-08-25T05:54:05"},{"version":"1.92","date":"2011-08-26T00:47:54"},{"version":"1.93","date":"2011-08-27T09:11:59"},{"version":"1.94","date":"2011-08-27T10:52:14"},{"date":"2011-09-01T20:50:35","version":"1.95"},{"date":"2011-09-01T22:42:14","version":"1.96"},{"date":"2011-09-03T10:32:15","version":"1.97"},{"date":"2011-09-14T18:21:20","version":"1.98"},{"version":"1.99","date":"2011-09-29T08:27:22"},{"version":"2.0","date":"2011-10-17T16:25:55"},{"version":"2.01","date":"2011-10-19T12:49:44"},{"version":"2.02","date":"2011-10-19T23:41:41"},{"date":"2011-10-20T12:24:36","version":"2.03"},{"date":"2011-10-21T15:37:59","version":"2.04"},{"date":"2011-10-22T16:36:22","version":"2.05"},{"date":"2011-10-22T21:44:31","version":"2.06"},{"version":"2.07","date":"2011-10-23T00:39:23"},{"date":"2011-10-23T01:30:44","version":"2.08"},{"version":"2.09","date":"2011-10-23T02:13:30"},{"version":"2.10","date":"2011-10-25T02:22:41"},{"version":"2.11","date":"2011-10-25T18:47:46"},{"version":"2.12","date":"2011-10-27T01:54:39"},{"date":"2011-10-27T19:15:21","version":"2.13"},{"version":"2.14","date":"2011-10-28T20:28:23"},{"version":"2.15","date":"2011-10-29T04:29:30"},{"version":"2.16","date":"2011-10-29T20:52:07"},{"version":"2.17","date":"2011-10-30T00:55:35"},{"date":"2011-10-30T18:03:30","version":"2.18"},{"date":"2011-10-31T09:07:02","version":"2.19"},{"version":"2.20","date":"2011-11-01T00:40:20"},{"date":"2011-11-02T01:29:01","version":"2.21"},{"date":"2011-11-03T15:21:43","version":"2.22"},{"version":"2.23","date":"2011-11-04T18:45:33"},{"date":"2011-11-05T16:16:00","version":"2.24"},{"version":"2.25","date":"2011-11-08T21:13:48"},{"date":"2011-11-10T16:53:32","version":"2.26"},{"version":"2.27","date":"2011-11-16T20:59:52"},{"date":"2011-11-17T23:44:36","version":"2.28"},{"version":"2.29","date":"2011-11-19T20:10:28"},{"version":"2.30","date":"2011-11-20T00:19:04"},{"version":"2.31","date":"2011-11-20T22:25:03"},{"version":"2.32","date":"2011-11-24T10:31:31"},{"date":"2011-11-28T12:32:13","version":"2.33"},{"version":"2.34","date":"2011-11-28T14:02:31"},{"date":"2011-12-01T14:19:35","version":"2.35"},{"version":"2.36","date":"2011-12-05T10:52:35"},{"date":"2011-12-10T18:18:16","version":"2.37"},{"date":"2011-12-17T12:03:38","version":"2.38"},{"date":"2011-12-22T12:31:43","version":"2.39"},{"version":"2.40","date":"2011-12-24T13:04:21"},{"date":"2011-12-28T16:09:18","version":"2.41"},{"date":"2012-01-02T17:15:52","version":"2.42"},{"date":"2012-01-08T03:43:27","version":"2.43"},{"version":"2.44","date":"2012-01-17T23:21:12"},{"date":"2012-01-18T15:23:03","version":"2.45"},{"version":"2.46","date":"2012-01-25T18:20:48"},{"version":"2.47","date":"2012-02-06T16:28:27"},{"date":"2012-02-09T07:04:28","version":"2.48"},{"date":"2012-02-13T19:45:00","version":"2.49"},{"version":"2.50","date":"2012-02-18T01:18:38"},{"version":"2.51","date":"2012-02-19T12:32:58"},{"date":"2012-02-24T15:01:33","version":"2.52"},{"version":"2.53","date":"2012-02-25T05:53:29"},{"version":"2.54","date":"2012-02-27T15:31:19"},{"version":"2.55","date":"2012-02-27T19:26:41"},{"version":"2.56","date":"2012-03-01T21:07:06"},{"version":"2.57","date":"2012-03-03T22:01:50"},{"version":"2.58","date":"2012-03-09T18:38:46"},{"date":"2012-03-09T19:02:23","version":"2.59"},{"date":"2012-03-13T16:50:25","version":"2.60"},{"date":"2012-03-14T00:41:48","version":"2.61"},{"version":"2.62","date":"2012-03-17T09:05:12"},{"version":"2.63","date":"2012-03-20T18:39:51"},{"version":"2.64","date":"2012-03-21T01:23:59"},{"date":"2012-03-22T22:06:10","version":"2.65"},{"version":"2.66","date":"2012-03-23T16:16:55"},{"version":"2.67","date":"2012-03-24T14:29:35"},{"version":"2.68","date":"2012-03-24T14:59:52"},{"version":"2.69","date":"2012-03-27T12:53:44"},{"version":"2.70","date":"2012-03-30T21:24:44"},{"version":"2.71","date":"2012-04-03T01:46:31"},{"date":"2012-04-03T13:16:07","version":"2.72"},{"date":"2012-04-03T17:10:05","version":"2.73"},{"version":"2.74","date":"2012-04-03T22:33:05"},{"date":"2012-04-05T01:57:10","version":"2.75"},{"date":"2012-04-05T03:52:05","version":"2.76"},{"date":"2012-04-09T12:36:15","version":"2.77"},{"version":"2.78","date":"2012-04-09T18:54:51"},{"date":"2012-04-10T10:58:23","version":"2.79"},{"date":"2012-04-10T14:25:57","version":"2.80"},{"version":"2.81","date":"2012-04-15T18:49:31"},{"version":"2.82","date":"2012-04-16T21:09:32"},{"date":"2012-04-18T18:51:37","version":"2.83"},{"date":"2012-04-18T21:29:14","version":"2.84"},{"version":"2.85","date":"2012-04-19T15:37:54"},{"date":"2012-04-23T12:21:14","version":"2.86"},{"version":"2.87","date":"2012-04-23T14:19:09"},{"date":"2012-04-24T02:15:58","version":"2.88"},{"version":"2.89","date":"2012-04-24T20:08:49"},{"version":"2.90","date":"2012-04-25T11:35:38"},{"date":"2012-04-26T19:20:37","version":"2.91"},{"date":"2012-04-30T16:50:01","version":"2.92"},{"date":"2012-05-05T22:00:26","version":"2.93"},{"date":"2012-05-10T03:49:57","version":"2.94"},{"date":"2012-05-10T20:08:54","version":"2.95"},{"date":"2012-05-21T08:26:37","version":"2.96"},{"version":"2.97","date":"2012-05-28T12:11:13"},{"version":"2.98","date":"2012-05-30T18:21:26"},{"date":"2012-06-26T06:45:51","version":"3.0"},{"date":"2012-07-01T10:00:07","version":"3.01"},{"date":"2012-07-03T19:21:54","version":"3.02"},{"version":"3.03","date":"2012-07-06T21:17:36"},{"version":"3.04","date":"2012-07-07T11:29:24"},{"date":"2012-07-07T21:49:48","version":"3.05"},{"version":"3.06","date":"2012-07-11T17:27:01"},{"version":"3.07","date":"2012-07-13T00:25:44"},{"version":"3.08","date":"2012-07-13T21:53:56"},{"date":"2012-07-16T19:46:15","version":"3.09"},{"date":"2012-07-16T20:00:50","version":"3.10"},{"version":"3.11","date":"2012-07-19T01:44:35"},{"date":"2012-07-20T12:30:03","version":"3.12"},{"date":"2012-07-24T17:03:04","version":"3.13"},{"version":"3.14","date":"2012-07-27T11:05:47"},{"version":"3.15","date":"2012-07-28T11:32:31"},{"date":"2012-07-31T18:55:11","version":"3.16"},{"date":"2012-08-01T00:38:50","version":"3.17"},{"date":"2012-08-01T19:15:21","version":"3.18"},{"date":"2012-08-02T15:40:34","version":"3.19"},{"version":"3.20","date":"2012-08-03T23:32:38"},{"date":"2012-08-05T22:32:21","version":"3.21"},{"date":"2012-08-06T19:53:03","version":"3.22"},{"date":"2012-08-07T03:37:26","version":"3.23"},{"version":"3.24","date":"2012-08-07T20:56:45"},{"date":"2012-08-08T00:31:31","version":"3.25"},{"date":"2012-08-08T04:04:18","version":"3.26"},{"date":"2012-08-08T21:18:27","version":"3.27"},{"version":"3.28","date":"2012-08-10T12:18:38"},{"date":"2012-08-13T13:42:56","version":"3.29"},{"version":"3.30","date":"2012-08-13T16:14:35"},{"date":"2012-08-15T09:37:25","version":"3.31"},{"version":"3.32","date":"2012-08-20T12:37:26"},{"version":"3.33","date":"2012-08-23T18:34:00"},{"date":"2012-08-24T01:17:41","version":"3.34"},{"date":"2012-08-27T22:52:31","version":"3.35"},{"date":"2012-08-30T00:59:43","version":"3.36"},{"version":"3.37","date":"2012-09-04T20:50:40"},{"date":"2012-09-07T00:05:53","version":"3.38"},{"date":"2012-09-10T11:58:00","version":"3.39"},{"date":"2012-09-11T18:03:47","version":"3.40"},{"version":"3.41","date":"2012-09-13T18:22:49"},{"date":"2012-09-16T17:29:48","version":"3.42"},{"version":"3.43","date":"2012-09-22T19:40:59"},{"date":"2012-09-29T11:20:17","version":"3.44"},{"date":"2012-10-09T20:39:26","version":"3.45"},{"version":"3.46","date":"2012-10-10T20:55:33"},{"version":"3.47","date":"2012-10-12T23:10:49"},{"date":"2012-10-16T22:51:05","version":"3.48"},{"date":"2012-10-19T16:34:25","version":"3.49"},{"date":"2012-10-20T01:34:34","version":"3.50"},{"date":"2012-10-23T20:23:54","version":"3.51"},{"version":"3.52","date":"2012-10-26T14:41:25"},{"version":"3.53","date":"2012-10-31T02:41:01"},{"version":"3.54","date":"2012-11-01T04:36:00"},{"version":"3.55","date":"2012-11-08T11:20:15"},{"version":"3.56","date":"2012-11-09T20:09:37"},{"date":"2012-11-12T19:47:57","version":"3.57"},{"date":"2012-11-19T16:05:13","version":"3.58"},{"version":"3.59","date":"2012-11-20T19:53:03"},{"date":"2012-11-22T05:12:27","version":"3.60"},{"version":"3.61","date":"2012-11-25T04:19:47"},{"date":"2012-11-26T00:57:00","version":"3.62"},{"date":"2012-11-28T10:17:51","version":"3.63"},{"date":"2012-12-01T16:39:26","version":"3.64"},{"version":"3.65","date":"2012-12-08T22:47:54"},{"date":"2012-12-14T01:03:29","version":"3.66"},{"date":"2012-12-14T23:48:00","version":"3.67"},{"date":"2012-12-16T00:55:55","version":"3.68"},{"date":"2012-12-20T22:47:53","version":"3.69"},{"version":"3.70","date":"2012-12-23T22:18:59"},{"date":"2013-01-02T11:57:12","version":"3.71"},{"version":"3.72","date":"2013-01-04T22:16:16"},{"version":"3.73","date":"2013-01-06T22:46:48"},{"version":"3.74","date":"2013-01-07T18:47:06"},{"version":"3.75","date":"2013-01-08T16:15:03"},{"version":"3.76","date":"2013-01-10T00:00:19"},{"date":"2013-01-12T00:36:11","version":"3.77"},{"date":"2013-01-12T23:47:49","version":"3.78"},{"date":"2013-01-13T00:50:13","version":"3.79"},{"version":"3.80","date":"2013-01-15T05:02:52"},{"date":"2013-01-17T21:32:48","version":"3.81"},{"version":"3.82","date":"2013-01-18T15:50:23"},{"version":"3.83","date":"2013-01-27T15:28:40"},{"date":"2013-01-30T00:32:12","version":"3.84"},{"date":"2013-02-13T00:56:23","version":"3.85"},{"date":"2013-02-22T02:01:13","version":"3.86"},{"date":"2013-02-23T19:36:00","version":"3.87"},{"version":"3.88","date":"2013-03-03T21:53:52"},{"version":"3.89","date":"2013-03-04T16:12:24"},{"version":"3.90","date":"2013-03-14T20:08:14"},{"version":"3.91","date":"2013-03-17T22:59:42"},{"date":"2013-04-03T19:48:34","version":"3.92"},{"version":"3.93","date":"2013-04-05T21:46:38"},{"date":"2013-04-08T21:48:55","version":"3.94"},{"version":"3.95","date":"2013-04-12T03:49:59"},{"version":"3.96","date":"2013-04-22T21:34:16"},{"date":"2013-04-25T21:49:41","version":"3.97"},{"version":"4.0","date":"2013-05-15T20:02:05"},{"date":"2013-05-19T17:24:38","version":"4.01"},{"date":"2013-05-20T16:55:00","version":"4.02"},{"version":"4.03","date":"2013-05-21T05:24:56"},{"version":"4.04","date":"2013-05-23T21:25:32"},{"version":"4.05","date":"2013-05-24T02:59:59"},{"date":"2013-05-24T14:23:41","version":"4.06"},{"version":"4.07","date":"2013-05-25T18:07:30"},{"version":"4.08","date":"2013-05-30T21:45:51"},{"date":"2013-05-31T02:24:29","version":"4.09"},{"date":"2013-06-01T02:09:07","version":"4.10"},{"version":"4.11","date":"2013-06-03T04:34:37"},{"version":"4.12","date":"2013-06-07T01:51:09"},{"version":"4.13","date":"2013-06-09T00:25:21"},{"version":"4.14","date":"2013-06-10T00:23:12"},{"version":"4.15","date":"2013-06-18T08:02:11"},{"version":"4.16","date":"2013-06-19T01:27:29"},{"date":"2013-07-04T16:14:27","version":"4.17"},{"date":"2013-07-08T09:17:43","version":"4.18"},{"date":"2013-07-21T21:47:46","version":"4.19"},{"version":"4.20","date":"2013-07-28T12:53:38"},{"date":"2013-07-28T20:17:31","version":"4.21"},{"date":"2013-07-29T19:13:38","version":"4.22"},{"date":"2013-07-31T20:35:17","version":"4.23"},{"date":"2013-08-08T21:10:52","version":"4.24"},{"version":"4.25","date":"2013-08-17T20:16:56"},{"version":"4.26","date":"2013-08-18T15:06:51"},{"version":"4.27","date":"2013-08-26T15:29:36"},{"date":"2013-08-29T16:11:59","version":"4.28"},{"date":"2013-08-31T02:01:44","version":"4.29"},{"version":"4.30","date":"2013-09-01T21:48:28"},{"date":"2013-09-04T20:09:26","version":"4.31"},{"date":"2013-09-06T21:19:59","version":"4.32"},{"version":"4.33","date":"2013-09-07T20:38:03"},{"date":"2013-09-08T20:58:54","version":"4.34"},{"version":"4.35","date":"2013-09-10T21:40:13"},{"date":"2013-09-12T21:31:22","version":"4.36"},{"date":"2013-09-13T01:32:54","version":"4.37"},{"version":"4.38","date":"2013-09-16T22:01:40"},{"date":"2013-09-17T04:53:49","version":"4.39"},{"date":"2013-09-21T01:15:17","version":"4.40"},{"version":"4.41","date":"2013-09-21T17:25:38"},{"date":"2013-09-30T07:46:05","version":"4.42"},{"version":"4.43","date":"2013-10-02T19:16:26"},{"version":"4.44","date":"2013-10-04T21:18:14"},{"version":"4.45","date":"2013-10-06T15:46:08"},{"version":"4.46","date":"2013-10-12T17:11:54"},{"version":"4.47","date":"2013-10-14T23:51:30"},{"version":"4.48","date":"2013-10-16T05:28:45"},{"version":"4.49","date":"2013-10-17T16:53:59"},{"version":"4.50","date":"2013-10-23T01:18:55"},{"date":"2013-10-28T17:20:46","version":"4.51"},{"date":"2013-10-29T06:27:25","version":"4.52"},{"date":"2013-10-30T00:21:27","version":"4.53"},{"date":"2013-11-07T00:45:35","version":"4.54"},{"version":"4.55","date":"2013-11-07T02:38:24"},{"version":"4.56","date":"2013-11-10T02:56:56"},{"date":"2013-11-11T20:30:04","version":"4.57"},{"date":"2013-11-19T20:46:01","version":"4.58"},{"date":"2013-12-04T21:35:49","version":"4.59"},{"date":"2013-12-11T16:33:35","version":"4.60"},{"date":"2013-12-16T16:59:25","version":"4.61"},{"version":"4.62","date":"2013-12-17T20:35:36"},{"date":"2013-12-19T22:59:01","version":"4.63"},{"date":"2014-01-01T16:20:28","version":"4.64"},{"date":"2014-01-02T22:36:45","version":"4.65"},{"version":"4.66","date":"2014-01-04T21:48:06"},{"version":"4.67","date":"2014-01-11T17:20:18"},{"date":"2014-01-21T22:24:03","version":"4.68"},{"version":"4.69","date":"2014-01-24T04:06:26"},{"version":"4.70","date":"2014-01-26T22:08:54"},{"version":"4.71","date":"2014-01-28T03:10:15"},{"version":"4.72","date":"2014-01-29T21:29:25"},{"version":"4.73","date":"2014-02-01T05:20:38"},{"date":"2014-02-02T04:30:05","version":"4.74"},{"date":"2014-02-02T06:54:56","version":"4.75"},{"date":"2014-02-04T22:41:32","version":"4.76"},{"date":"2014-02-06T23:19:13","version":"4.77"},{"version":"4.78","date":"2014-02-08T23:02:08"},{"version":"4.79","date":"2014-02-11T02:49:44"},{"date":"2014-02-13T04:30:43","version":"4.80"},{"date":"2014-02-15T03:27:30","version":"4.81"},{"date":"2014-02-19T04:11:47","version":"4.82"},{"date":"2014-02-19T06:20:46","version":"4.83"},{"date":"2014-02-22T22:59:02","version":"4.84"},{"version":"4.85","date":"2014-02-26T22:48:41"},{"version":"4.86","date":"2014-03-03T05:45:32"},{"date":"2014-03-04T07:14:15","version":"4.87"},{"date":"2014-03-09T22:42:42","version":"4.88"},{"date":"2014-03-13T21:30:57","version":"4.89"},{"date":"2014-03-16T21:22:35","version":"4.90"},{"date":"2014-03-29T00:05:17","version":"4.91"},{"version":"4.92","date":"2014-04-08T20:41:54"},{"version":"4.93","date":"2014-04-13T02:17:03"},{"version":"4.94","date":"2014-04-19T23:39:22"},{"date":"2014-04-27T03:27:43","version":"4.95"},{"version":"4.96","date":"2014-04-27T20:04:36"},{"date":"2014-04-29T22:12:52","version":"4.97"},{"date":"2014-05-09T01:57:34","version":"4.98"},{"date":"2014-05-12T00:46:43","version":"4.99"},{"version":"5.0","date":"2014-05-29T20:15:51"},{"version":"5.01","date":"2014-05-30T14:51:14"},{"version":"5.02","date":"2014-05-31T21:51:34"},{"date":"2014-06-02T22:07:46","version":"5.03"},{"date":"2014-06-03T21:11:50","version":"5.04"},{"version":"5.05","date":"2014-06-08T21:50:53"},{"version":"5.06","date":"2014-06-12T02:08:01"},{"version":"5.07","date":"2014-06-13T19:28:04"},{"date":"2014-06-16T23:44:48","version":"5.08"},{"date":"2014-06-24T15:02:21","version":"5.09"},{"date":"2014-06-28T23:25:12","version":"5.10"},{"version":"5.11","date":"2014-07-03T04:01:24"},{"version":"5.12","date":"2014-07-03T23:06:55"},{"version":"5.13","date":"2014-07-13T00:44:29"},{"date":"2014-07-14T22:01:49","version":"5.14"},{"date":"2014-07-17T17:58:05","version":"5.15"},{"date":"2014-07-21T16:01:56","version":"5.16"},{"version":"5.17","date":"2014-07-24T12:40:41"},{"version":"5.18","date":"2014-07-25T20:25:29"},{"date":"2014-07-26T21:03:13","version":"5.19"},{"version":"5.20","date":"2014-07-26T23:36:18"},{"version":"5.21","date":"2014-07-27T18:48:25"},{"date":"2014-07-30T16:42:35","version":"5.22"},{"date":"2014-07-31T21:32:03","version":"5.23"},{"date":"2014-08-02T21:56:32","version":"5.24"},{"date":"2014-08-07T01:29:20","version":"5.25"},{"version":"5.26","date":"2014-08-09T21:26:37"},{"date":"2014-08-11T14:26:47","version":"5.27"},{"version":"5.28","date":"2014-08-13T00:32:33"},{"date":"2014-08-16T12:40:15","version":"5.29"},{"version":"5.30","date":"2014-08-17T21:49:15"},{"date":"2014-08-19T17:40:27","version":"5.31"},{"date":"2014-08-21T18:19:53","version":"5.32"},{"date":"2014-08-23T22:25:32","version":"5.33"},{"date":"2014-08-29T21:53:02","version":"5.34"},{"date":"2014-08-30T21:57:50","version":"5.35"},{"date":"2014-09-02T00:20:21","version":"5.36"},{"date":"2014-09-03T20:55:45","version":"5.37"},{"version":"5.38","date":"2014-09-05T21:57:34"},{"version":"5.39","date":"2014-09-07T03:18:45"},{"date":"2014-09-12T01:06:33","version":"5.40"},{"date":"2014-09-13T21:24:03","version":"5.41"},{"version":"5.42","date":"2014-09-17T21:54:39"},{"date":"2014-09-22T00:14:24","version":"5.43"},{"version":"5.44","date":"2014-09-23T00:49:52"},{"date":"2014-09-27T03:21:55","version":"5.46"},{"date":"2014-09-27T03:24:38","version":"5.45"},{"version":"5.47","date":"2014-09-28T03:31:15"},{"date":"2014-10-07T23:08:14","version":"5.48"},{"version":"5.49","date":"2014-10-10T21:12:14"},{"version":"5.50","date":"2014-10-15T22:00:04"},{"version":"5.51","date":"2014-10-17T21:48:17"},{"date":"2014-10-18T20:49:34","version":"5.52"},{"version":"5.53","date":"2014-10-20T23:34:37"},{"date":"2014-10-23T22:51:06","version":"5.54"},{"date":"2014-10-29T00:58:34","version":"5.55"},{"date":"2014-10-30T00:23:25","version":"5.56"},{"version":"5.57","date":"2014-11-02T22:52:07"},{"date":"2014-11-07T00:04:47","version":"5.58"},{"version":"5.59","date":"2014-11-08T00:26:41"},{"date":"2014-11-12T01:31:36","version":"5.60"},{"date":"2014-11-15T00:46:43","version":"5.61"},{"version":"5.62","date":"2014-11-18T18:24:54"},{"version":"5.63","date":"2014-11-22T03:52:56"},{"version":"5.64","date":"2014-11-23T02:12:00"},{"version":"5.65","date":"2014-11-25T03:23:01"},{"version":"5.66","date":"2014-11-27T03:13:19"},{"version":"5.67","date":"2014-11-27T06:19:49"},{"version":"5.68","date":"2014-12-03T04:36:04"},{"version":"5.69","date":"2014-12-13T02:19:36"},{"date":"2014-12-18T00:12:31","version":"5.70"},{"date":"2015-01-01T22:44:58","version":"5.71"},{"version":"5.72","date":"2015-01-11T20:02:04"},{"version":"5.73","date":"2015-01-23T16:29:22"},{"date":"2015-01-24T13:32:51","version":"5.74"},{"version":"5.75","date":"2015-01-27T04:08:19"},{"version":"5.76","date":"2015-02-02T19:36:16"},{"version":"5.77","date":"2015-02-03T02:37:04"},{"version":"5.78","date":"2015-02-13T00:21:48"},{"date":"2015-02-13T05:32:50","version":"5.79"},{"version":"5.80","date":"2015-02-18T05:24:00"},{"version":"5.81","date":"2015-02-21T03:30:18"},{"version":"5.82","date":"2015-02-23T03:05:04"},{"version":"6.0","date":"2015-02-26T22:17:01"},{"date":"2015-03-03T16:12:16","version":"6.01"},{"date":"2015-03-10T02:53:22","version":"6.02"},{"version":"6.03","date":"2015-03-16T04:43:10"},{"version":"6.04","date":"2015-03-23T04:42:27"},{"version":"6.05","date":"2015-03-25T05:08:15"},{"date":"2015-04-07T00:55:21","version":"6.06"},{"date":"2015-04-07T17:38:01","version":"6.07"},{"version":"6.08","date":"2015-04-09T22:03:46"},{"date":"2015-04-26T05:10:45","version":"6.09"},{"version":"6.10","date":"2015-04-27T02:01:03"},{"date":"2015-05-16T22:14:01","version":"6.11"},{"version":"6.12","date":"2015-06-18T21:48:20"},{"date":"2015-08-20T06:09:39","version":"6.16"},{"date":"2015-08-22T19:38:51","version":"6.17"},{"date":"2015-09-02T17:26:36","version":"6.18"},{"date":"2015-09-12T23:37:29","version":"6.19"},{"date":"2015-09-16T22:50:30","version":"6.20"},{"version":"6.21","date":"2015-09-23T01:05:04"},{"version":"6.22","date":"2015-09-27T01:03:32"},{"version":"6.23","date":"2015-10-07T18:17:26"},{"version":"6.24","date":"2015-10-13T22:54:46"},{"date":"2015-10-22T02:49:47","version":"6.25"},{"date":"2015-10-29T00:29:07","version":"6.26"},{"date":"2015-10-30T00:07:08","version":"6.27"},{"version":"6.28","date":"2015-11-02T15:17:16"},{"version":"6.30","date":"2015-11-12T02:59:43"},{"version":"6.31","date":"2015-11-14T19:38:51"},{"version":"6.32","date":"2015-11-18T18:16:15"},{"date":"2015-11-22T16:47:00","version":"6.33"},{"date":"2016-01-13T20:08:22","version":"6.40"},{"version":"6.42","date":"2016-01-24T22:01:52"},{"version":"6.43","date":"2016-02-01T16:15:40"},{"date":"2016-02-05T22:42:51","version":"6.44"},{"version":"6.45","date":"2016-02-09T23:29:35"},{"date":"2016-02-14T00:51:10","version":"6.46"},{"date":"2016-02-19T23:09:15","version":"6.47"},{"version":"6.48","date":"2016-02-24T17:07:45"},{"date":"2016-02-26T22:47:33","version":"6.49"},{"date":"2016-02-27T00:12:03","version":"6.50"},{"date":"2016-02-29T23:03:44","version":"6.51"},{"date":"2016-03-02T22:24:28","version":"6.52"},{"version":"6.53","date":"2016-03-04T00:58:55"},{"version":"6.54","date":"2016-03-07T15:09:42"},{"version":"6.55","date":"2016-03-08T20:42:43"},{"version":"6.56","date":"2016-03-16T02:42:45"},{"date":"2016-03-23T04:23:41","version":"6.57"},{"date":"2016-04-10T17:11:22","version":"6.58"},{"version":"6.59","date":"2016-04-22T18:45:19"},{"version":"6.60","date":"2016-04-26T13:16:04"},{"version":"6.61","date":"2016-05-02T17:31:34"},{"date":"2016-05-14T21:05:47","version":"6.62"},{"version":"6.63","date":"2016-06-03T21:10:48"},{"date":"2016-06-09T16:41:51","version":"6.64"},{"date":"2016-06-14T16:15:21","version":"6.65"},{"version":"6.66","date":"2016-06-16T22:35:28"},{"version":"7.0","date":"2016-07-19T06:21:07"},{"version":"7.01","date":"2016-08-01T18:46:35"},{"version":"7.02","date":"2016-08-17T16:34:19"},{"version":"7.03","date":"2016-08-17T16:40:11"},{"version":"7.04","date":"2016-08-29T13:59:45"},{"version":"7.05","date":"2016-08-29T16:44:18"},{"version":"7.06","date":"2016-09-17T21:05:37"},{"version":"7.07","date":"2016-09-20T12:30:54"},{"version":"7.08","date":"2016-09-23T17:19:00"},{"date":"2016-10-23T09:46:35","version":"7.09"},{"date":"2016-11-01T19:02:03","version":"7.10"},{"date":"2016-11-30T09:23:48","version":"7.11"},{"date":"2016-12-20T08:41:05","version":"7.12"},{"version":"7.13","date":"2016-12-29T19:40:25"},{"date":"2017-01-04T22:58:20","version":"7.14"},{"date":"2017-01-10T11:42:59","version":"7.15"},{"version":"7.16","date":"2017-01-10T23:52:50"},{"version":"7.17","date":"2017-01-11T08:35:01"},{"date":"2017-01-11T22:05:10","version":"7.18"},{"date":"2017-01-15T16:05:23","version":"7.19"},{"version":"7.20","date":"2017-01-18T09:38:55"},{"date":"2017-01-22T14:29:35","version":"7.21"},{"version":"7.22","date":"2017-01-25T23:09:32"},{"date":"2017-01-29T21:43:19","version":"7.23"},{"version":"7.24","date":"2017-02-05T21:09:47"},{"date":"2017-02-09T22:51:35","version":"7.25"},{"version":"7.26","date":"2017-02-15T23:08:52"},{"date":"2017-02-27T17:02:21","version":"7.27"},{"version":"7.28","date":"2017-03-07T21:36:36"},{"date":"2017-03-14T23:27:54","version":"7.29"},{"date":"2017-04-06T12:04:02","version":"7.30"},{"date":"2017-04-24T07:50:54","version":"7.31"},{"version":"7.32","date":"2017-05-30T17:08:40"},{"date":"2017-06-05T22:14:35","version":"7.33"},{"date":"2017-07-02T22:04:01","version":"7.34"},{"version":"7.35","date":"2017-07-05T07:50:23"},{"version":"7.36","date":"2017-07-10T07:48:45"},{"date":"2017-07-24T07:55:46","version":"7.37"},{"version":"7.38","date":"2017-08-01T21:56:47"},{"date":"2017-08-03T08:50:10","version":"7.39"},{"version":"7.40","date":"2017-08-14T08:32:54"},{"date":"2017-08-16T08:19:30","version":"7.41"},{"date":"2017-08-17T11:15:42","version":"7.42"},{"version":"7.43","date":"2017-08-18T08:26:45"},{"date":"2017-09-03T16:04:13","version":"7.44"},{"version":"7.45","date":"2017-09-07T08:41:40"},{"version":"7.46","date":"2017-09-12T12:27:00"},{"date":"2017-10-12T08:26:53","version":"7.47"},{"date":"2017-10-21T13:33:01","version":"7.48"},{"date":"2017-10-30T13:18:49","version":"7.49"},{"date":"2017-10-30T18:18:13","version":"7.50"},{"version":"7.51","date":"2017-10-31T19:14:43"},{"date":"2017-11-02T22:29:23","version":"7.52"},{"date":"2017-11-04T15:24:07","version":"7.53"},{"date":"2017-11-04T22:50:30","version":"7.54"},{"date":"2017-11-07T10:58:56","version":"7.55"},{"date":"2017-11-16T13:33:27","version":"7.56"},{"date":"2017-11-18T16:10:38","version":"7.57"},{"date":"2017-12-03T22:14:41","version":"7.58"},{"date":"2017-12-17T17:58:55","version":"7.59"},{"version":"7.60","date":"2018-01-03T14:00:44"},{"date":"2018-01-15T15:35:28","version":"7.61"},{"version":"7.62","date":"2018-02-03T19:53:39"},{"version":"7.63","date":"2018-02-06T20:52:51"},{"date":"2018-02-07T10:17:57","version":"7.64"},{"date":"2018-02-11T21:55:33","version":"7.65"},{"version":"7.66","date":"2018-02-14T08:55:35"},{"version":"7.67","date":"2018-02-19T23:11:52"},{"date":"2018-02-23T18:44:15","version":"7.68"},{"version":"7.69","date":"2018-02-24T21:58:41"},{"date":"2018-02-28T23:47:08","version":"7.70"},{"version":"7.71","date":"2018-03-16T16:41:58"},{"date":"2018-04-02T21:01:43","version":"7.72"},{"date":"2018-04-06T14:10:03","version":"7.73"},{"version":"7.74","date":"2018-04-07T22:15:16"},{"version":"7.75","date":"2018-04-10T16:04:41"},{"version":"7.76","date":"2018-04-24T16:55:32"},{"version":"7.77","date":"2018-05-01T17:18:20"},{"date":"2018-05-11T16:36:16","version":"7.78"},{"date":"2018-05-14T22:13:04","version":"7.79"},{"date":"2018-05-20T22:46:20","version":"7.80"},{"date":"2018-05-21T22:39:30","version":"7.81"},{"date":"2018-05-27T21:59:59","version":"7.82"},{"date":"2018-06-03T21:10:42","version":"7.83"},{"date":"2018-06-06T14:04:49","version":"7.84"},{"version":"7.85","date":"2018-06-19T15:57:43"},{"version":"7.86","date":"2018-07-03T11:30:46"},{"version":"7.87","date":"2018-07-04T10:20:11"},{"date":"2018-07-13T11:00:52","version":"7.88"},{"version":"7.89","date":"2018-08-07T09:38:35"},{"date":"2018-08-08T22:19:36","version":"7.90"},{"version":"7.91","date":"2018-08-09T08:39:58"},{"version":"7.92","date":"2018-08-09T16:52:45"},{"version":"7.93","date":"2018-08-12T14:23:08"},{"date":"2018-08-31T12:53:17","version":"7.94"},{"date":"2018-09-14T22:17:06","version":"8.0"},{"version":"8.01","date":"2018-09-25T16:14:07"},{"version":"8.02","date":"2018-10-01T21:34:50"},{"version":"8.03","date":"2018-10-16T22:41:46"},{"date":"2018-10-21T20:23:27","version":"8.04"},{"version":"8.05","date":"2018-11-01T17:15:20"},{"date":"2018-11-08T23:31:57","version":"8.06"},{"version":"8.07","date":"2018-11-18T22:09:07"},{"date":"2018-12-01T18:26:15","version":"8.08"},{"version":"8.09","date":"2018-12-04T20:59:01"},{"version":"8.10","date":"2018-12-20T10:28:28"},{"version":"8.11","date":"2019-01-02T18:04:35"},{"version":"8.12","date":"2019-02-01T16:34:38"},{"date":"2019-03-21T22:06:21","version":"8.13"},{"date":"2019-04-18T19:11:08","version":"8.14"},{"version":"8.15","date":"2019-04-26T17:54:06"},{"date":"2019-05-19T19:50:45","version":"8.16"},{"date":"2019-05-23T20:50:59","version":"8.17"},{"version":"8.18","date":"2019-06-28T21:29:47"},{"version":"8.19","date":"2019-07-08T10:26:46"},{"version":"8.20","date":"2019-07-09T21:02:16"},{"version":"8.21","date":"2019-07-14T17:08:55"},{"version":"8.22","date":"2019-07-17T10:46:26"},{"version":"8.23","date":"2019-08-12T22:52:14"},{"version":"8.24","date":"2019-09-11T22:33:49"},{"date":"2019-09-29T13:16:15","version":"8.25"},{"date":"2019-11-03T15:48:59","version":"8.26"},{"version":"8.27","date":"2019-12-04T19:48:08"},{"date":"2019-12-26T16:09:10","version":"8.28"},{"version":"8.29","date":"2019-12-28T16:58:30"},{"date":"2020-01-09T20:35:42","version":"8.30"},{"version":"8.31","date":"2020-01-14T20:19:13"},{"version":"8.32","date":"2020-01-19T14:35:03"},{"version":"8.33","date":"2020-02-11T20:25:08"},{"version":"8.34","date":"2020-03-16T17:27:27"},{"version":"8.35","date":"2020-03-21T15:12:26"},{"version":"8.36","date":"2020-04-02T09:05:58"},{"date":"2020-04-19T19:47:37","version":"8.37"},{"date":"2020-04-21T19:54:01","version":"8.38"},{"version":"8.39","date":"2020-04-22T12:49:38"},{"version":"8.40","date":"2020-04-23T09:24:25"},{"version":"8.41","date":"2020-05-01T13:34:44"},{"date":"2020-05-04T17:15:38","version":"8.42"},{"date":"2020-05-21T12:51:12","version":"8.43"},{"version":"8.50","date":"2020-05-25T19:06:44"},{"version":"8.51","date":"2020-05-31T12:29:16"},{"date":"2020-06-03T20:01:13","version":"8.52"},{"version":"8.53","date":"2020-06-10T18:02:24"},{"date":"2020-06-14T17:42:03","version":"8.54"},{"version":"8.55","date":"2020-06-18T09:42:34"},{"date":"2020-06-26T20:08:07","version":"8.56"},{"date":"2020-07-17T09:08:51","version":"8.57"},{"date":"2020-08-10T18:14:24","version":"8.58"},{"version":"8.59","date":"2020-09-13T16:04:24"},{"version":"8.60","date":"2020-09-27T15:50:48"},{"date":"2020-10-02T11:01:53","version":"8.61"},{"version":"8.62","date":"2020-10-12T09:57:55"},{"date":"2020-10-13T08:18:36","version":"8.63"},{"version":"8.64","date":"2020-11-06T18:38:59"},{"date":"2020-11-11T19:55:44","version":"8.65"},{"version":"8.66","date":"2020-11-30T10:42:18"},{"version":"8.67","date":"2020-12-05T16:45:53"},{"version":"8.68","date":"2020-12-27T23:38:05"},{"version":"8.69","date":"2020-12-28T14:38:20"},{"version":"8.70","date":"2020-12-30T14:43:19"},{"date":"2021-01-17T17:06:28","version":"8.71"},{"date":"2021-01-27T15:33:24","version":"8.72"},{"version":"8.73","date":"2021-02-06T16:08:52"},{"date":"2021-02-14T18:44:04","version":"9.0"},{"date":"2021-02-16T21:32:29","version":"9.01"},{"date":"2021-03-01T19:16:02","version":"9.02"},{"date":"2021-03-07T18:49:12","version":"9.03"},{"version":"9.07","date":"2021-03-11T21:04:03"},{"date":"2021-03-12T16:47:37","version":"9.08"},{"date":"2021-03-14T18:32:57","version":"9.09"},{"version":"9.10","date":"2021-03-15T13:26:22"},{"date":"2021-03-20T16:41:03","version":"9.11"},{"date":"2021-03-20T21:25:26","version":"9.12"},{"version":"9.13","date":"2021-03-22T11:33:00"},{"version":"9.14","date":"2021-03-23T22:54:21"},{"version":"9.15","date":"2021-04-06T09:10:10"},{"version":"9.16","date":"2021-04-09T11:31:09"},{"version":"9.17","date":"2021-04-13T10:11:02"},{"date":"2021-05-23T14:06:27","version":"9.18"},{"date":"2021-06-02T09:14:48","version":"9.19"},{"date":"2021-08-09T17:26:54","version":"9.20"},{"version":"9.21","date":"2021-08-13T19:14:43"},{"version":"9.22","date":"2021-10-21T11:53:53"},{"date":"2022-03-25T11:37:40","version":"9.23"},{"date":"2022-04-18T18:28:00","version":"9.24"},{"date":"2022-04-28T15:21:32","version":"9.25"},{"date":"2022-05-23T15:17:22","version":"9.26"},{"date":"2022-09-12T11:10:27","version":"9.27"},{"date":"2022-10-14T18:55:13","version":"9.28"},{"date":"2022-11-11T10:15:54","version":"9.29"},{"date":"2022-11-23T11:52:17","version":"9.30"},{"version":"9.31","date":"2022-12-21T00:36:31"},{"date":"2023-05-08T22:09:51","version":"9.32"},{"date":"2023-06-14T19:25:48","version":"9.33"},{"version":"9.34","date":"2023-09-11T18:34:53"},{"date":"2023-10-27T17:11:42","version":"9.35"},{"date":"2024-03-08T22:16:38","version":"9.36"},{"version":"9.37","date":"2024-05-13T17:48:56"},{"version":"9.38","date":"2024-08-17T14:52:48"},{"version":"9.39","date":"2024-11-23T14:16:18"}],"main_module":"Mojolicious","advisories":[{"cves":[],"distribution":"Mojolicious","reported":"2022-12-10","affected_versions":["<9.31"],"references":["https://github.com/mojolicious/mojo/commit/6f195d85db6756022d3599f7d2634975688c9550","https://github.com/mojolicious/mojo/issues/2014","https://github.com/mojolicious/mojo/issues/2015"],"description":"Mojo::DOM did not correctly parse