# created by util/generate at Thu Feb 6 05:30:55 2025
# https://github.com/briandfoy/cpan-security-advisory.git 361ca2c3c003696aacf88f6918ce41eaa92400af
=encoding utf8
=head1 NAME
CPANSA::DB - the CPAN Security Advisory data as a Perl data structure, mostly for CPAN::Audit
=head1 SYNOPSIS
This module is primarily used by L<CPAN::Audit>.
use CPANSA::DB;
my $db = CPANSA::DB->db;
=head1 DESCRIPTION
The C<db> subroutine returns the CPAN Security Advisory (CPANSA) reports
as a Perl data structure. However, anything can use this.
Each release also comes with a F<.gpg> file that has the signature
for the file. If you cannot confirm that the module file has the
right signature, it might have been corrupted or modified.
This module is available outside of CPAN as a release on GitHub:
L<https://github.com/briandfoy/cpan-security-advisory/releases>.
Each release on GitHub includes an attestation.
There is also a JSON file that provides the same datastructure.
=head2 Subroutines
There is exactly one subroutine:
=over 4
=item * db
Returns the hashref of all the CPANSA reports.
=back
=head1 VERIFYING
This distribution now uses
L<GitHub Attestations|https://github.blog/2024-05-02-introducing-artifact-attestations-now-in-public-beta/>,
which allow you to verify that the archive file you have was made from
the official repo.
You need a GitHub account and the L<gh tool|https://github.com/larsks/ghcli>.
# download the distro file from GitHub, MetaCPAN, or a CPAN mirror
$ gh auth login
...follow instructions...
$ gh attestation verify CPANSA-DB-20241111.tar.gz --owner briandfoy
Additionally, each release codes with GPG signature that allows you to
verify that this. The key is the same one used when the database was
distributed with L<CPAN::Audit>:
$ gpg --verify lib/CPANSA/DB.pm.gpg lib/CPANSA/DB.pm
gpg: Signature made Mon Nov 18 11:00:10 2024 EST
gpg: using RSA key 75AAB42CBA0D7F37F0D6886DF83F8D5E878B6041
gpg: Good signature from "CPAN::Audit (brian d foy) (https://github.com/briandfoy/cpan-audit) <bdfoy@cpan.org>" [ultimate]
=head1 SEE ALSO
Everything is managed in GitHub:
=over 4
=item * L<https://github.com/briandfoy/cpan-security-advisory/releases>
=back
=cut
package CPANSA::DB;
use strict;
use warnings;
our $VERSION = '20250206.001';
sub db {
{
'dists' => {
'ActivePerl' => {
'advisories' => [
{
'affected_versions' => [
'=5.16.1.1601'
],
'cves' => [
'CVE-2012-5377'
],
'darkpan' => 'true',
'description' => 'Untrusted search path vulnerability in the installation functionality in ActivePerl 5.16.1.1601, when installed in the top-level C:\\ directory, allows local users to gain privileges via a Trojan horse DLL in the C:\\Perl\\Site\\bin directory, which is added to the PATH system environment variable, as demonstrated by a Trojan horse wlbsctrl.dll file used by the "IKE and AuthIP IPsec Keying Modules" system service in Windows Vista SP1, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 Release Preview.
',
'distribution' => 'ActivePerl',
'fixed_versions' => [],
'id' => 'CPANSA-ActivePerl-2012-5377',
'references' => [
'https://www.htbridge.com/advisory/HTB23108',
'http://osvdb.org/86177'
],
'reported' => '2012-10-11',
'severity' => undef
},
{
'affected_versions' => [
'=5.8.8.817'
],
'cves' => [
'CVE-2006-2856'
],
'darkpan' => 'true',
'description' => 'ActiveState ActivePerl 5.8.8.817 for Windows configures the site/lib directory with "Users" group permissions for changing files, which allows local users to gain privileges by creating a malicious sitecustomize.pl file in that directory. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
',
'distribution' => 'ActivePerl',
'fixed_versions' => [],
'id' => 'CPANSA-ActivePerl-2006-2856',
'references' => [
'http://secunia.com/advisories/20328',
'http://www.securityfocus.com/bid/18269',
'http://www.osvdb.org/25974',
'http://www.vupen.com/english/advisories/2006/2140',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/26915'
],
'reported' => '2006-06-06',
'severity' => undef
},
{
'affected_versions' => [
'<=5.8.1'
],
'cves' => [
'CVE-2004-2286'
],
'darkpan' => 'true',
'description' => 'Integer overflow in the duplication operator in ActivePerl allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large multiplier, which may trigger a buffer overflow.
',
'distribution' => 'ActivePerl',
'fixed_versions' => [],
'id' => 'CPANSA-ActivePerl-2004-2286',
'references' => [
'http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0878.html',
'http://www.securityfocus.com/bid/10380',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/16224'
],
'reported' => '2004-12-31',
'severity' => undef
},
{
'affected_versions' => [
'<5.10'
],
'cves' => [
'CVE-2004-2022'
],
'darkpan' => 'true',
'description' => 'ActivePerl 5.8.x and others, and Larry Wall\'s Perl 5.6.1 and others, when running on Windows systems, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the system command, which leads to a stack-based buffer overflow. NOTE: it is unclear whether this bug is in Perl or the OS API that is used by Perl.
',
'distribution' => 'ActivePerl',
'fixed_versions' => [],
'id' => 'CPANSA-ActivePerl-2004-2022',
'references' => [
'http://www.oliverkarow.de/research/ActivePerlSystemBOF.txt',
'http://www.perlmonks.org/index.pl?node_id=354145',
'http://www.securityfocus.com/bid/10375',
'http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0905.html',
'http://marc.info/?l=full-disclosure&m=108489112131099&w=2',
'http://marc.info/?l=full-disclosure&m=108482796105922&w=2',
'http://marc.info/?l=full-disclosure&m=108483058514596&w=2',
'http://marc.info/?l=bugtraq&m=108489894009025&w=2',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/16169'
],
'reported' => '2004-12-31',
'severity' => undef
},
{
'affected_versions' => [],
'cves' => [
'CVE-2004-0377'
],
'darkpan' => 'true',
'description' => 'Buffer overflow in the win32_stat function for (1) ActiveState\'s ActivePerl and (2) Larry Wall\'s Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character.
',
'distribution' => 'ActivePerl',
'fixed_versions' => [],
'id' => 'CPANSA-ActivePerl-2004-0377',
'references' => [
'http://www.kb.cert.org/vuls/id/722414',
'http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/019794.html',
'http://public.activestate.com/cgi-bin/perlbrowse?patch=22552',
'http://www.idefense.com/application/poi/display?id=93&type=vulnerabilities',
'http://marc.info/?l=bugtraq&m=108118694327979&w=2',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/15732'
],
'reported' => '2004-05-04',
'severity' => undef
},
{
'affected_versions' => [
'<=5.6.1.629'
],
'cves' => [
'CVE-2001-0815'
],
'darkpan' => 'true',
'description' => 'Buffer overflow in PerlIS.dll in Activestate ActivePerl 5.6.1.629 and earlier allows remote attackers to execute arbitrary code via an HTTP request for a long filename that ends in a .pl extension.
',
'distribution' => 'ActivePerl',
'fixed_versions' => [],
'id' => 'CPANSA-ActivePerl-2001-0815',
'references' => [
'http://bugs.activestate.com/show_bug.cgi?id=18062',
'http://www.securityfocus.com/bid/3526',
'http://www.osvdb.org/678',
'http://marc.info/?l=bugtraq&m=100583978302585&w=2',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/7539'
],
'reported' => '2001-12-06',
'severity' => undef
}
],
'main_module' => '',
'versions' => []
},
'Alien-PCRE2' => {
'advisories' => [
{
'affected_versions' => [
'<0.016000'
],
'comment' => 'This Alien module fetches libpcre2 sources from the network. It tries to get the latest unless you set environment variables to get a different version.
',
'cves' => [
'CVE-2019-20454'
],
'description' => 'An out-of-bounds read was discovered in PCRE before 10.34 when the pattern \\X is JIT compiled and used to match specially crafted subjects in non-UTF mode. Applications that use PCRE to parse untrusted input may be vulnerable to this flaw, which would allow an attacker to crash the application. The flaw occurs in do_extuni_no_utf in pcre2_jit_compile.c.
',
'distribution' => 'Alien-PCRE2',
'fixed_versions' => [
'>=0.016000'
],
'id' => 'CPANSA-Alien-PCRE2-2019-20454',
'references' => [
'https://bugs.php.net/bug.php?id=78338',
'https://bugs.exim.org/show_bug.cgi?id=2421',
'https://bugzilla.redhat.com/show_bug.cgi?id=1735494',
'https://vcs.pcre.org/pcre2?view=revision&revision=1092',
'https://security.gentoo.org/glsa/202006-16',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQRAHYHLRNMBTPR3KXVM27NSZP3KTOPI/'
],
'reported' => '2020-02-14',
'severity' => 'high'
}
],
'main_module' => 'Alien::PCRE2',
'versions' => [
{
'date' => '2017-06-30T23:18:21',
'version' => '0.001000'
},
{
'date' => '2017-07-01T02:48:02',
'version' => '0.002000'
},
{
'date' => '2017-07-02T04:51:35',
'version' => '0.003000'
},
{
'date' => '2017-07-02T06:53:29',
'version' => '0.004000'
},
{
'date' => '2017-07-02T09:21:41',
'version' => '0.005000'
},
{
'date' => '2017-07-03T01:03:23',
'version' => '0.006000'
},
{
'date' => '2017-07-12T17:40:07',
'version' => '0.007000'
},
{
'date' => '2017-07-13T07:43:28',
'version' => '0.008000'
},
{
'date' => '2017-07-15T10:31:20',
'version' => '0.009000'
},
{
'date' => '2017-07-17T04:44:54',
'version' => '0.010000'
},
{
'date' => '2017-07-18T18:30:06',
'version' => '0.011000'
},
{
'date' => '2017-07-19T05:07:21',
'version' => '0.012000'
},
{
'date' => '2017-07-23T04:43:01',
'version' => '0.013000'
},
{
'date' => '2017-11-01T02:50:14',
'version' => '0.014000'
},
{
'date' => '2017-11-08T00:42:33',
'version' => '0.015000'
},
{
'date' => '2022-05-08T20:22:53',
'version' => '0.016000'
},
{
'date' => '2023-02-04T00:21:59',
'version' => '0.017000'
}
]
},
'Apache-ASP' => {
'advisories' => [
{
'affected_versions' => [
'<1.95'
],
'cves' => [],
'description' => 'A bug would allow a malicious user possible writing of files in the same directory as the source.asp script.
',
'distribution' => 'Apache-ASP',
'fixed_versions' => [
'>=1.95'
],
'id' => 'CPANSA-Apache-ASP-2000-01',
'references' => [
'https://metacpan.org/release/CHAMAS/Apache-ASP-2.63/source/README'
],
'reported' => '2000-07-10',
'severity' => undef
}
],
'main_module' => 'Apache::ASP',
'versions' => [
{
'date' => '1998-06-24T02:10:51',
'version' => '0.01'
},
{
'date' => '1998-07-11T01:48:14',
'version' => '0.02'
},
{
'date' => '1998-09-14T11:13:32',
'version' => '0.03'
},
{
'date' => '1998-10-12T07:50:56',
'version' => '0.04'
},
{
'date' => '1998-10-18T21:29:19',
'version' => '0.05'
},
{
'date' => '1999-02-06T06:04:50',
'version' => '0.08'
},
{
'date' => '1999-04-22T08:30:57',
'version' => '0.09'
},
{
'date' => '1999-06-24T20:04:52',
'version' => '0.11'
},
{
'date' => '1999-07-02T07:05:05',
'version' => '0.12'
},
{
'date' => '1999-07-29T10:58:20',
'version' => '0.14'
},
{
'date' => '1999-08-25T02:02:31',
'version' => '0.15'
},
{
'date' => '1999-09-22T20:54:01',
'version' => '0.16'
},
{
'date' => '1999-11-16T04:44:48',
'version' => '0.17'
},
{
'date' => '2000-02-04T02:14:14',
'version' => '0.18'
},
{
'date' => '2000-07-03T13:08:54',
'version' => '1.91'
},
{
'date' => '2000-07-03T22:43:45',
'version' => '1.93'
},
{
'date' => '2000-07-11T01:44:02',
'version' => '1.95'
},
{
'date' => '2000-07-16T07:17:39',
'version' => '2.00'
},
{
'date' => '2000-07-22T23:31:36',
'version' => '2.01'
},
{
'date' => '2000-08-02T00:11:15',
'version' => '2.03'
},
{
'date' => '2000-11-26T19:15:48',
'version' => '2.07'
},
{
'date' => '2001-01-31T04:03:17',
'version' => '2.09'
},
{
'date' => '2001-05-30T01:37:39',
'version' => '2.11'
},
{
'date' => '2001-06-12T00:41:33',
'version' => '2.15'
},
{
'date' => '2001-06-18T02:35:48',
'version' => '2.17'
},
{
'date' => '2001-07-11T05:27:22',
'version' => '2.19'
},
{
'date' => '2001-08-05T23:01:50',
'version' => '2.21'
},
{
'date' => '2001-10-11T07:54:39',
'version' => '2.23'
},
{
'date' => '2001-10-11T23:34:01',
'version' => '2.25'
},
{
'date' => '2001-11-01T01:11:12',
'version' => '2.27'
},
{
'date' => '2001-11-19T21:41:12',
'version' => '2.29'
},
{
'date' => '2002-01-22T09:52:49',
'version' => '2.31'
},
{
'date' => '2002-04-30T09:12:20',
'version' => '2.33'
},
{
'date' => '2002-05-30T19:47:22',
'version' => '2.35'
},
{
'date' => '2002-07-03T21:11:15',
'version' => '2.37'
},
{
'date' => '2002-09-12T08:16:20',
'version' => '2.39'
},
{
'date' => '2002-09-30T06:35:47',
'version' => '2.41'
},
{
'date' => '2002-10-14T04:01:36',
'version' => '2.45'
},
{
'date' => '2002-11-07T02:03:41',
'version' => '2.47'
},
{
'date' => '2002-11-11T07:15:21',
'version' => '2.49'
},
{
'date' => '2003-02-10T21:11:34',
'version' => '2.51'
},
{
'date' => '2003-04-10T16:27:14',
'version' => '2.53'
},
{
'date' => '2003-08-10T07:39:57',
'version' => '2.55'
},
{
'date' => '2004-01-29T08:30:48',
'version' => '2.57'
},
{
'date' => '2005-05-24T05:52:39',
'version' => '2.59'
},
{
'date' => '2008-05-25T23:07:57',
'version' => '2.61'
},
{
'date' => '2011-10-02T19:18:10',
'version' => '2.62'
},
{
'date' => '2012-02-13T23:15:04',
'version' => '2.62'
},
{
'date' => '2018-03-15T05:28:37',
'version' => '2.63'
}
]
},
'Apache-AuthCAS' => {
'advisories' => [
{
'affected_versions' => [
'<0.5'
],
'cves' => [
'CVE-2007-6342'
],
'description' => 'A tainted cookie could be sent by a malicious user and it would be used in an SQL query without protection against SQL injection.
',
'distribution' => 'Apache-AuthCAS',
'fixed_versions' => [
'>=0.5'
],
'id' => 'CPANSA-Apache-AuthCAS-2007-01',
'references' => [
'https://metacpan.org/changes/distribution/Apache-AuthCAS',
'https://cxsecurity.com/issue/WLB-2007120031'
],
'reported' => '2007-12-13',
'severity' => 'high'
}
],
'main_module' => 'Apache::AuthCAS',
'versions' => [
{
'date' => '2004-09-15T19:17:43',
'version' => '0.1'
},
{
'date' => '2004-09-15T20:11:40',
'version' => '0.2'
},
{
'date' => '2004-10-05T22:51:50',
'version' => '0.3'
},
{
'date' => '2004-10-13T00:45:52',
'version' => '0.4'
},
{
'date' => '2008-03-23T23:03:16',
'version' => '0.5'
}
]
},
'Apache-AuthenHook' => {
'advisories' => [
{
'affected_versions' => [
'>=2.00_04'
],
'cves' => [
'CVE-2010-3845'
],
'description' => 'libapache-authenhook-perl 2.00-04 stores usernames and passwords in plaintext in the vhost error log.
',
'distribution' => 'Apache-AuthenHook',
'fixed_versions' => [],
'id' => 'CPANSA-Apache-AuthenHook-2010-3845',
'references' => [
'https://rt.cpan.org/Public/Bug/Display.html?id=62040',
'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599712',
'http://seclists.org/oss-sec/2010/q4/63'
],
'reported' => '2017-08-08',
'severity' => 'critical'
}
],
'main_module' => 'Apache::AuthenHook',
'versions' => [
{
'date' => '2003-06-20T19:05:21',
'version' => '2.00_01'
},
{
'date' => '2004-04-06T01:20:10',
'version' => '2.00_03'
},
{
'date' => '2005-04-14T12:57:55',
'version' => '2.00_04'
}
]
},
'Apache-MP3' => {
'advisories' => [
{
'affected_versions' => [
'<2.15'
],
'cves' => [],
'description' => 'A security bug allowed people to bypass the AllowDownload setting.
',
'distribution' => 'Apache-MP3',
'fixed_versions' => [
'>=2.15'
],
'id' => 'CPANSA-Apache-MP3-2001-01',
'references' => [
'https://metacpan.org/dist/Apache-MP3/changes'
],
'reported' => '2001-01-01',
'severity' => undef
}
],
'main_module' => 'Apache::MP3',
'versions' => [
{
'date' => '2000-03-20T13:00:07',
'version' => '1.00'
},
{
'date' => '2000-05-27T04:19:21',
'version' => '2.00'
},
{
'date' => '2000-05-27T04:34:42',
'version' => '2.01'
},
{
'date' => '2000-05-28T16:17:59',
'version' => '2.02'
},
{
'date' => '2000-08-23T13:46:23',
'version' => '2.04'
},
{
'date' => '2000-08-25T14:45:54',
'version' => '2.05'
},
{
'date' => '2000-08-26T03:41:07',
'version' => '2.06'
},
{
'date' => '2000-08-31T20:28:28',
'version' => '2.08'
},
{
'date' => '2000-09-03T18:31:17',
'version' => '2.10'
},
{
'date' => '2000-09-09T22:12:04',
'version' => '2.11'
},
{
'date' => '2000-11-21T22:15:07',
'version' => '2.12'
},
{
'date' => '2000-12-31T04:29:03',
'version' => '2.14'
},
{
'date' => '2001-01-02T03:37:33',
'version' => '2.15'
},
{
'date' => '2001-05-01T02:43:47',
'version' => '2.16'
},
{
'date' => '2001-06-10T22:02:46',
'version' => '2.18'
},
{
'date' => '2001-07-17T01:39:59',
'version' => '2.19'
},
{
'date' => '2001-09-26T01:14:42',
'version' => '2.20'
},
{
'date' => '2002-01-06T20:38:33',
'version' => '2.22'
},
{
'date' => '2002-05-31T01:12:04',
'version' => '2.26'
},
{
'date' => '2002-08-16T04:18:25',
'version' => '3.00'
},
{
'date' => '2002-08-18T17:41:46',
'version' => '3.01'
},
{
'date' => '2002-10-14T03:26:03',
'version' => '3.03'
},
{
'date' => '2003-02-15T00:51:19',
'version' => '3.04'
},
{
'date' => '2003-10-06T14:12:34',
'version' => '3.05'
},
{
'date' => '2006-04-15T01:26:38',
'version' => '4.00'
}
]
},
'Apache-Session-Browseable' => {
'advisories' => [
{
'affected_versions' => [
'<1.3.6'
],
'cves' => [
'CVE-2020-36659'
],
'description' => 'In Apache::Session::Browseable before 1.3.6, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can, for example, be fixed in conjunction with the CVE-2020-16093 fix.
',
'distribution' => 'Apache-Session-Browseable',
'fixed_versions' => [
'>=1.3.6'
],
'id' => 'CPANSA-Apache-Session-Browseable-2020-36659',
'references' => [
'https://github.com/LemonLDAPNG/Apache-Session-Browseable/commit/fdf393235140b293cae5578ef136055a78f3574f',
'https://lists.debian.org/debian-lts-announce/2023/01/msg00025.html'
],
'reported' => '2023-01-27',
'severity' => undef
}
],
'main_module' => 'Apache::Session::Browseable',
'versions' => [
{
'date' => '2009-10-31T08:09:42',
'version' => '0.1'
},
{
'date' => '2009-11-01T09:10:13',
'version' => '0.2'
},
{
'date' => '2009-11-01T16:21:16',
'version' => '0.3'
},
{
'date' => '2010-08-16T15:26:19',
'version' => '0.4'
},
{
'date' => '2010-12-06T21:08:25',
'version' => '0.5'
},
{
'date' => '2010-12-08T15:45:21',
'version' => '0.6'
},
{
'date' => '2012-06-24T07:14:37',
'version' => '0.7'
},
{
'date' => '2012-10-13T16:15:41',
'version' => '0.8'
},
{
'date' => '2013-02-28T06:05:09',
'version' => '0.9'
},
{
'date' => '2013-08-28T04:42:23',
'version' => '1.0'
},
{
'date' => '2013-08-30T04:47:02',
'version' => '1.0'
},
{
'date' => '2013-10-20T05:39:14',
'version' => 'v1.0.2'
},
{
'date' => '2015-06-12T15:56:45',
'version' => '1.1'
},
{
'date' => '2016-03-09T05:31:13',
'version' => '1.2'
},
{
'date' => '2016-03-10T06:30:41',
'version' => 'v1.2.1'
},
{
'date' => '2016-04-01T11:34:51',
'version' => 'v1.2.2'
},
{
'date' => '2016-06-07T13:59:19',
'version' => 'v1.2.3'
},
{
'date' => '2017-02-19T07:34:18',
'version' => 'v1.2.4'
},
{
'date' => '2017-04-04T05:18:26',
'version' => 'v1.2.5'
},
{
'date' => '2017-09-12T09:35:30',
'version' => 'v1.2.5'
},
{
'date' => '2017-10-03T05:00:07',
'version' => 'v1.2.7'
},
{
'date' => '2017-10-03T10:42:35',
'version' => 'v1.2.8'
},
{
'date' => '2019-02-08T06:29:20',
'version' => 'v1.2.9'
},
{
'date' => '2019-02-08T09:31:22',
'version' => 'v1.3.0'
},
{
'date' => '2019-05-04T10:55:48',
'version' => 'v1.3.1'
},
{
'date' => '2019-07-04T18:30:30',
'version' => 'v1.3.2'
},
{
'date' => '2019-09-19T20:44:43',
'version' => 'v1.3.3'
},
{
'date' => '2019-11-20T19:43:04',
'version' => 'v1.3.4'
},
{
'date' => '2020-01-21T10:20:26',
'version' => 'v1.3.5'
},
{
'date' => '2020-09-04T13:23:31',
'version' => 'v1.3.6'
},
{
'date' => '2020-09-04T13:39:40',
'version' => 'v1.3.7'
},
{
'date' => '2020-09-06T21:03:06',
'version' => 'v1.3.8'
},
{
'date' => '2021-08-10T04:44:06',
'version' => 'v1.3.9'
},
{
'date' => '2022-03-08T13:51:31',
'version' => 'v1.3.10'
},
{
'date' => '2022-09-26T16:41:24',
'version' => 'v1.3.11'
},
{
'date' => '2023-07-06T10:43:25',
'version' => 'v1.3.12'
},
{
'date' => '2023-07-06T11:38:32',
'version' => 'v1.3.13'
},
{
'date' => '2024-12-19T07:59:19',
'version' => 'v1.3.13'
}
]
},
'Apache-Session-LDAP' => {
'advisories' => [
{
'affected_versions' => [
'<0.5'
],
'cves' => [
'CVE-2020-36658'
],
'description' => 'In Apache::Session::LDAP before 0.5, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can, for example, be fixed in conjunction with the CVE-2020-16093 fix.
',
'distribution' => 'Apache-Session-LDAP',
'fixed_versions' => [
'>=0.5'
],
'id' => 'CPANSA-Apache-Session-LDAP-2020-36658',
'references' => [
'https://github.com/LemonLDAPNG/Apache-Session-LDAP/commit/490722b71eed1ed1ab33d58c78578f23e043561f',
'https://lists.debian.org/debian-lts-announce/2023/01/msg00024.html'
],
'reported' => '2023-01-27',
'severity' => undef
}
],
'main_module' => 'Apache::Session::LDAP',
'versions' => [
{
'date' => '2009-04-18T17:09:10',
'version' => '0.01'
},
{
'date' => '2009-04-18T19:43:50',
'version' => '0.02'
},
{
'date' => '2010-12-08T15:30:51',
'version' => '0.1'
},
{
'date' => '2012-06-26T04:22:47',
'version' => '0.2'
},
{
'date' => '2014-10-24T12:21:07',
'version' => '0.2'
},
{
'date' => '2015-06-12T15:47:40',
'version' => '0.4'
},
{
'date' => '2020-09-06T13:13:20',
'version' => '0.2'
}
]
},
'Apache-SessionX' => {
'advisories' => [
{
'affected_versions' => [
'<2.01'
],
'cves' => [],
'description' => 'Problem in session_id validation, which allows creation of session with invalid ids.
',
'distribution' => 'Apache-SessionX',
'fixed_versions' => [
'>=2.01'
],
'id' => 'CPANSA-Apache-SessionX-2005-01',
'references' => [
'https://metacpan.org/changes/distribution/Apache-SessionX'
],
'reported' => '2005-11-15'
}
],
'main_module' => 'Apache::SessionX',
'versions' => [
{
'date' => '2001-11-20T15:36:53',
'version' => '2.00'
},
{
'date' => '2003-03-02T14:18:57',
'version' => '2.00'
},
{
'date' => '2005-11-15T05:21:49',
'version' => '2.01'
}
]
},
'Apache-Wyrd' => {
'advisories' => [
{
'affected_versions' => [
'<0.97'
],
'cves' => [],
'description' => 'User-submitted data cab be executed if it is displayed on a page, if the data contains a string that can be interpreted as a Wyrd.
',
'distribution' => 'Apache-Wyrd',
'fixed_versions' => [
'>=0.97'
],
'id' => 'CPANSA-Apache-Wyrd-2008-01',
'references' => [
'https://metacpan.org/dist/Apache-Wyrd/changes'
],
'reported' => '2008-04-14',
'severity' => undef
}
],
'main_module' => 'Apache::Wyrd',
'versions' => [
{
'date' => '2004-03-17T21:36:52',
'version' => '0.8'
},
{
'date' => '2004-03-18T22:52:04',
'version' => '0.81'
},
{
'date' => '2004-03-25T23:52:49',
'version' => '0.82'
},
{
'date' => '2004-08-19T15:42:55',
'version' => '0.83'
},
{
'date' => '2004-09-03T19:44:01',
'version' => '0.84'
},
{
'date' => '2004-09-22T16:08:23',
'version' => '0.85'
},
{
'date' => '2004-09-23T02:04:43',
'version' => '0.86'
},
{
'date' => '2004-10-31T20:59:42',
'version' => '0.87'
},
{
'date' => '2004-12-16T20:56:33',
'version' => '0.90'
},
{
'date' => '2005-01-09T21:52:49',
'version' => '0.91'
},
{
'date' => '2005-01-13T17:42:18',
'version' => '0.92'
},
{
'date' => '2005-03-25T21:22:56',
'version' => '0.93'
},
{
'date' => '2006-10-22T22:57:04',
'version' => '0.94'
},
{
'date' => '2007-04-30T23:02:05',
'version' => '0.95'
},
{
'date' => '2007-05-01T15:20:02',
'version' => '0.96'
},
{
'date' => '2008-04-14T18:49:14',
'version' => '0.97'
},
{
'date' => '2008-04-15T21:32:47',
'version' => '0.98'
}
]
},
'App-Context' => {
'advisories' => [
{
'affected_versions' => [
'>=0.01,<=0.968'
],
'cves' => [
'CVE-2012-6141'
],
'description' => 'The App::Context module 0.01 through 0.968 for Perl does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via a crafted request to (1) App::Session::Cookie or (2) App::Session::HTMLHidden, which is not properly handled when it is deserialized.
',
'distribution' => 'App-Context',
'fixed_versions' => [
'>0.968'
],
'id' => 'CPANSA-App-Context-2012-6141',
'references' => [
'http://seclists.org/oss-sec/2013/q2/318',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/84198'
],
'reported' => '2014-06-04',
'severity' => undef
}
],
'main_module' => 'App::Context',
'versions' => [
{
'date' => '2002-10-10T21:31:39',
'version' => '0.01'
},
{
'date' => '2004-09-02T21:17:44',
'version' => '0.90'
},
{
'date' => '2005-01-07T14:02:06',
'version' => '0.93'
},
{
'date' => '2005-08-09T20:05:02',
'version' => '0.95'
},
{
'date' => '2006-03-10T04:24:13',
'version' => '0.96'
},
{
'date' => '2006-03-12T01:30:11',
'version' => '0.962'
},
{
'date' => '2006-07-25T02:30:21',
'version' => '0.963'
},
{
'date' => '2006-09-04T19:41:12',
'version' => '0.964'
},
{
'date' => '2007-04-17T13:33:24',
'version' => '0.965'
},
{
'date' => '2008-02-27T03:13:41',
'version' => '0.966'
},
{
'date' => '2008-02-27T14:19:23',
'version' => '0.9661'
},
{
'date' => '2009-09-11T14:31:52',
'version' => '0.967'
},
{
'date' => '2010-06-09T21:33:19',
'version' => '0.968'
}
]
},
'App-Genpass' => {
'advisories' => [
{
'affected_versions' => [
'<0.2400'
],
'cves' => [],
'description' => 'App-genpass before v0.2400 generated passwords using build in rand()
',
'distribution' => 'App-Genpass',
'fixed_versions' => [
'>=0.2400'
],
'id' => 'CPANSA-App-Genpass-2024-001',
'references' => [
'https://metacpan.org/dist/App-Genpass/changes',
'https://github.com/xsawyerx/app-genpass/pull/5',
'https://github.com/briandfoy/cpan-security-advisory/issues/178'
],
'reported' => undef,
'severity' => undef
}
],
'main_module' => 'App::Genpass',
'versions' => [
{
'date' => '2009-12-14T22:15:31',
'version' => '0.03'
},
{
'date' => '2010-01-01T18:06:50',
'version' => '0.04'
},
{
'date' => '2010-01-02T07:45:49',
'version' => '0.05'
},
{
'date' => '2010-05-28T21:46:01',
'version' => '0.06'
},
{
'date' => '2010-05-29T21:37:11',
'version' => '0.07'
},
{
'date' => '2010-05-30T08:35:54',
'version' => '0.08'
},
{
'date' => '2010-05-31T18:39:55',
'version' => '0.09'
},
{
'date' => '2010-06-07T10:16:54',
'version' => '0.10'
},
{
'date' => '2010-07-16T21:15:53',
'version' => '0.11'
},
{
'date' => '2010-07-16T22:36:16',
'version' => '1.00'
},
{
'date' => '2010-07-18T15:20:18',
'version' => '1.01'
},
{
'date' => '2011-02-17T10:52:08',
'version' => '2.00'
},
{
'date' => '2011-03-10T12:26:49',
'version' => '2.01'
},
{
'date' => '2011-08-03T11:58:46',
'version' => '2.02'
},
{
'date' => '2011-08-03T16:05:37',
'version' => '2.03'
},
{
'date' => '2011-08-06T07:36:59',
'version' => '2.04'
},
{
'date' => '2011-08-08T12:51:57',
'version' => '2.10'
},
{
'date' => '2011-11-27T17:45:15',
'version' => '2.20'
},
{
'date' => '2012-03-26T19:55:19',
'version' => '2.30'
},
{
'date' => '2012-06-26T08:16:36',
'version' => '2.31'
},
{
'date' => '2012-06-30T23:12:23',
'version' => '2.32'
},
{
'date' => '2012-11-20T08:48:46',
'version' => '2.33'
},
{
'date' => '2014-08-04T20:00:26',
'version' => '2.34'
},
{
'date' => '2016-10-12T08:56:56',
'version' => '2.400'
},
{
'date' => '2016-10-14T21:27:13',
'version' => '2.401'
}
]
},
'App-Github-Email' => {
'advisories' => [
{
'affected_versions' => [
'<0.3.3'
],
'cves' => [
'CVE-2015-7686'
],
'description' => 'Insecure dependency on Email::Address.
',
'distribution' => 'App-Github-Email',
'fixed_versions' => [
'>=0.3.3'
],
'id' => 'CPANSA-App-Github-Email-2018-01',
'references' => [
'https://metacpan.org/changes/distribution/App-Github-Email',
'https://github.com/faraco/App-Github-Email/commit/b7f052280d1c8ae97bdefc106ca3cbba4aea7213'
],
'reported' => '2018-01-20'
}
],
'main_module' => 'App::Github::Email',
'versions' => [
{
'date' => '2017-01-16T08:03:02',
'version' => '0.0.1'
},
{
'date' => '2017-01-16T12:56:51',
'version' => '0.0.2'
},
{
'date' => '2017-01-16T17:38:16',
'version' => '0.0.3'
},
{
'date' => '2017-03-11T10:45:23',
'version' => '0.0.4'
},
{
'date' => '2017-04-05T11:19:02',
'version' => '0.0.5'
},
{
'date' => '2017-04-15T17:35:18',
'version' => '0.0.6'
},
{
'date' => '2017-05-19T05:05:24',
'version' => '0.0.7'
},
{
'date' => '2017-12-18T14:11:19',
'version' => '0.1.0'
},
{
'date' => '2017-12-21T08:24:12',
'version' => '0.1.1'
},
{
'date' => '2018-01-15T03:18:05',
'version' => '0.2.0'
},
{
'date' => '2018-01-20T12:55:34',
'version' => '0.2.1'
},
{
'date' => '2018-08-30T16:07:18',
'version' => '0.3.1'
},
{
'date' => '2018-08-30T16:13:54',
'version' => '0.3.2'
},
{
'date' => '2018-08-31T03:49:31',
'version' => '0.3.3'
}
]
},
'App-cpanminus' => {
'advisories' => [
{
'affected_versions' => [
'<=1.7044'
],
'cves' => [
'CVE-2020-16154'
],
'description' => 'The App::cpanminus package 1.7044 for Perl allows Signature Verification Bypass.
',
'distribution' => 'App-cpanminus',
'fixed_versions' => [
'>=1.7045'
],
'id' => 'CPANSA-App-cpanminus-2020-01',
'references' => [
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DENFY4CRTIZL5WYYUYUM4VKCJNXO4QIW/',
'https://metacpan.org/pod/App::cpanminus',
'https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/',
'https://access.redhat.com/security/cve/cve-2020-16154',
'https://security-tracker.debian.org/tracker/CVE-2020-16154',
'https://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html',
'https://github.com/miyagawa/cpanminus/pull/638'
],
'reported' => '2020-07-30'
},
{
'affected_versions' => [
'<=1.7047'
],
'cves' => [
'CVE-2024-45321'
],
'description' => 'The App::cpanminus package through 1.7047 for Perl downloads code via insecure HTTP, enabling code execution for network attackers.
',
'distribution' => 'App-cpanminus',
'fixed_versions' => [],
'id' => 'CPANSA-App-cpanminus-2024-45321',
'references' => [
'https://github.com/miyagawa/cpanminus/issues/611',
'https://github.com/miyagawa/cpanminus/pull/674',
'https://security.metacpan.org/2024/08/26/cpanminus-downloads-code-using-insecure-http.html'
],
'reported' => '2024-08-27'
}
],
'main_module' => 'App::cpanminus',
'versions' => [
{
'date' => '2010-02-20T02:27:00',
'version' => '0.01'
},
{
'date' => '2010-02-20T03:14:10',
'version' => '0.02'
},
{
'date' => '2010-02-20T03:39:56',
'version' => '0.03'
},
{
'date' => '2010-02-20T05:04:01',
'version' => '0.04'
},
{
'date' => '2010-02-20T05:16:03',
'version' => '0.05'
},
{
'date' => '2010-02-20T05:48:44',
'version' => '0.06'
},
{
'date' => '2010-02-20T20:20:08',
'version' => '0.07'
},
{
'date' => '2010-02-20T23:41:01',
'version' => '0.08'
},
{
'date' => '2010-02-21T07:48:49',
'version' => '0.09'
},
{
'date' => '2010-02-23T20:52:46',
'version' => '0.99_01'
},
{
'date' => '2010-02-24T06:20:33',
'version' => '0.99_02'
},
{
'date' => '2010-02-24T07:05:47',
'version' => '0.99_03'
},
{
'date' => '2010-02-25T17:20:05',
'version' => '0.99_04'
},
{
'date' => '2010-02-25T22:42:22',
'version' => '0.99_05'
},
{
'date' => '2010-02-25T22:51:43',
'version' => '0.99_06'
},
{
'date' => '2010-02-28T05:14:30',
'version' => '0.99_07'
},
{
'date' => '2010-03-01T05:59:15',
'version' => '0.9910'
},
{
'date' => '2010-03-02T00:29:51',
'version' => '0.9911'
},
{
'date' => '2010-03-03T02:55:22',
'version' => '0.9912'
},
{
'date' => '2010-03-03T03:21:59',
'version' => '0.9913'
},
{
'date' => '2010-03-04T08:42:03',
'version' => '0.9914'
},
{
'date' => '2010-03-04T09:58:11',
'version' => '0.9915'
},
{
'date' => '2010-03-04T19:35:22',
'version' => '0.9916'
},
{
'date' => '2010-03-09T13:58:32',
'version' => '0.9917'
},
{
'date' => '2010-03-10T02:26:03',
'version' => '0.9918'
},
{
'date' => '2010-03-10T02:41:31',
'version' => '0.9919'
},
{
'date' => '2010-03-10T09:49:22',
'version' => '0.99_20'
},
{
'date' => '2010-03-10T15:03:38',
'version' => '0.9921'
},
{
'date' => '2010-03-11T02:01:28',
'version' => '0.9922'
},
{
'date' => '2010-03-16T00:07:01',
'version' => '0.9923'
},
{
'date' => '2010-03-22T05:05:33',
'version' => '0.99_24'
},
{
'date' => '2010-03-23T02:54:44',
'version' => '0.99_25'
},
{
'date' => '2010-03-23T03:24:34',
'version' => '0.99_26'
},
{
'date' => '2010-03-23T18:24:55',
'version' => '0.9927'
},
{
'date' => '2010-03-26T05:09:12',
'version' => '0.9928'
},
{
'date' => '2010-03-27T04:42:41',
'version' => '0.9929'
},
{
'date' => '2010-03-30T21:29:41',
'version' => '0.9930'
},
{
'date' => '2010-04-05T01:18:12',
'version' => '0.9931'
},
{
'date' => '2010-04-05T23:28:11',
'version' => '0.9932'
},
{
'date' => '2010-04-11T07:51:27',
'version' => '0.99_33'
},
{
'date' => '2010-04-11T11:55:44',
'version' => '0.9934'
},
{
'date' => '2010-04-12T11:09:47',
'version' => '0.999_01'
},
{
'date' => '2010-04-13T07:11:08',
'version' => '0.999_02'
},
{
'date' => '2010-04-14T09:29:25',
'version' => '0.999_03'
},
{
'date' => '2010-04-14T09:30:52',
'version' => '0.9935'
},
{
'date' => '2010-04-19T06:23:01',
'version' => '0.999_04'
},
{
'date' => '2010-04-21T11:40:46',
'version' => '0.999_05'
},
{
'date' => '2010-04-21T11:53:47',
'version' => '0.9936'
},
{
'date' => '2010-04-24T08:23:24',
'version' => '1.0000'
},
{
'date' => '2010-04-24T08:26:40',
'version' => '1.0001'
},
{
'date' => '2010-05-02T03:51:09',
'version' => '1.0002'
},
{
'date' => '2010-05-04T23:16:18',
'version' => '1.0003'
},
{
'date' => '2010-05-14T23:10:54',
'version' => '1.0004'
},
{
'date' => '2010-07-02T23:39:32',
'version' => '1.0005'
},
{
'date' => '2010-07-02T23:54:14',
'version' => '1.0006'
},
{
'date' => '2010-07-30T19:55:47',
'version' => '1.0010'
},
{
'date' => '2010-08-18T23:42:36',
'version' => '1.0011'
},
{
'date' => '2010-08-20T19:58:19',
'version' => '1.0012'
},
{
'date' => '2010-09-12T19:54:17',
'version' => '1.0013'
},
{
'date' => '2010-09-21T19:43:20',
'version' => '1.0014'
},
{
'date' => '2010-09-24T23:52:00',
'version' => '1.0015'
},
{
'date' => '2010-11-12T07:57:33',
'version' => '1.1000'
},
{
'date' => '2010-11-12T20:37:49',
'version' => '1.1001'
},
{
'date' => '2010-11-17T02:28:44',
'version' => '1.1002'
},
{
'date' => '2010-11-25T09:18:34',
'version' => '1.1003'
},
{
'date' => '2010-11-30T18:07:12',
'version' => '1.1004'
},
{
'date' => '2010-12-14T23:08:40',
'version' => '1.1005'
},
{
'date' => '2010-12-16T19:32:01',
'version' => '1.1006'
},
{
'date' => '2011-01-18T17:40:16',
'version' => '1.1007'
},
{
'date' => '2011-01-18T20:54:34',
'version' => '1.19_01'
},
{
'date' => '2011-01-18T22:11:52',
'version' => '1.19_02'
},
{
'date' => '2011-01-26T22:08:11',
'version' => '1.1008'
},
{
'date' => '2011-02-16T18:11:52',
'version' => '1.2000'
},
{
'date' => '2011-02-16T18:55:46',
'version' => '1.2001'
},
{
'date' => '2011-03-01T02:59:25',
'version' => '1.29_01'
},
{
'date' => '2011-03-02T00:09:00',
'version' => '1.29_02'
},
{
'date' => '2011-03-02T22:41:40',
'version' => '1.3000'
},
{
'date' => '2011-03-04T02:35:03',
'version' => '1.3001'
},
{
'date' => '2011-03-04T03:54:53',
'version' => '1.30_02'
},
{
'date' => '2011-03-04T08:32:56',
'version' => '1.30_03'
},
{
'date' => '2011-03-04T08:53:22',
'version' => '1.30_04'
},
{
'date' => '2011-03-04T09:41:34',
'version' => '1.30_05'
},
{
'date' => '2011-03-04T22:57:43',
'version' => '1.30_06'
},
{
'date' => '2011-03-04T23:20:45',
'version' => '1.30_07'
},
{
'date' => '2011-03-05T00:07:44',
'version' => '1.30_08'
},
{
'date' => '2011-03-05T02:16:54',
'version' => '1.30_09'
},
{
'date' => '2011-03-05T22:57:38',
'version' => '1.30_10'
},
{
'date' => '2011-03-06T09:37:36',
'version' => '1.30_11'
},
{
'date' => '2011-03-07T03:00:09',
'version' => '1.30_12'
},
{
'date' => '2011-03-07T18:54:03',
'version' => '1.30_13'
},
{
'date' => '2011-03-08T09:11:33',
'version' => '1.4000'
},
{
'date' => '2011-03-08T18:11:57',
'version' => '1.4001'
},
{
'date' => '2011-03-09T01:57:18',
'version' => '1.4002'
},
{
'date' => '2011-03-10T02:15:19',
'version' => '1.4003'
},
{
'date' => '2011-03-10T18:09:34',
'version' => '1.4004'
},
{
'date' => '2011-05-11T19:49:38',
'version' => '1.4005'
},
{
'date' => '2011-05-16T17:17:29',
'version' => '1.4006'
},
{
'date' => '2011-05-17T17:54:45',
'version' => '1.4007'
},
{
'date' => '2011-06-16T01:00:00',
'version' => '1.4008'
},
{
'date' => '2011-06-26T17:59:17',
'version' => '1.49_01'
},
{
'date' => '2011-10-12T09:57:03',
'version' => '1.49_02'
},
{
'date' => '2011-10-13T06:40:49',
'version' => '1.5000'
},
{
'date' => '2011-10-13T15:21:16',
'version' => '1.5001'
},
{
'date' => '2011-10-18T00:13:36',
'version' => '1.5002'
},
{
'date' => '2011-10-19T07:31:10',
'version' => '1.5003'
},
{
'date' => '2011-11-08T22:29:31',
'version' => '1.5004'
},
{
'date' => '2011-11-22T21:31:21',
'version' => '1.5005'
},
{
'date' => '2011-11-29T19:49:42',
'version' => '1.5006'
},
{
'date' => '2011-12-20T18:18:50',
'version' => '1.5007'
},
{
'date' => '2012-03-18T01:23:40',
'version' => '1.5008'
},
{
'date' => '2012-03-30T16:45:43',
'version' => '1.5009'
},
{
'date' => '2012-03-31T11:01:47',
'version' => '1.5010'
},
{
'date' => '2012-04-12T09:59:39',
'version' => '1.5011'
},
{
'date' => '2012-05-11T03:50:22',
'version' => '1.5012'
},
{
'date' => '2012-05-12T03:18:19',
'version' => '1.5013'
},
{
'date' => '2012-06-13T01:34:12',
'version' => '1.5014'
},
{
'date' => '2012-06-24T22:37:49',
'version' => '1.5015'
},
{
'date' => '2012-07-17T19:02:48',
'version' => '1.5016'
},
{
'date' => '2012-07-18T15:41:26',
'version' => '1.5017'
},
{
'date' => '2012-09-19T05:42:19',
'version' => '1.5018'
},
{
'date' => '2012-12-22T17:22:02',
'version' => '1.5019'
},
{
'date' => '2013-01-29T18:32:26',
'version' => '1.5020'
},
{
'date' => '2013-01-31T08:45:31',
'version' => '1.5021'
},
{
'date' => '2013-01-31T18:07:46',
'version' => '1.59_01'
},
{
'date' => '2013-02-01T03:12:10',
'version' => '1.59_02'
},
{
'date' => '2013-02-01T18:54:58',
'version' => '1.59_03'
},
{
'date' => '2013-02-03T17:07:16',
'version' => '1.59_04'
},
{
'date' => '2013-02-04T19:52:48',
'version' => '1.59_05'
},
{
'date' => '2013-02-05T20:40:30',
'version' => '1.59_06'
},
{
'date' => '2013-02-06T19:17:51',
'version' => '1.59_07'
},
{
'date' => '2013-02-06T19:32:27',
'version' => '1.59_08'
},
{
'date' => '2013-02-07T09:59:04',
'version' => '1.59_09'
},
{
'date' => '2013-02-08T00:29:16',
'version' => '1.59_10'
},
{
'date' => '2013-02-11T22:12:12',
'version' => '1.59_11'
},
{
'date' => '2013-02-14T02:15:12',
'version' => '1.59_12'
},
{
'date' => '2013-02-25T20:16:34',
'version' => '1.59_13'
},
{
'date' => '2013-02-26T17:57:00',
'version' => '1.6000'
},
{
'date' => '2013-02-27T01:04:54',
'version' => '1.6001'
},
{
'date' => '2013-02-27T20:13:45',
'version' => '1.6002'
},
{
'date' => '2013-03-08T19:03:47',
'version' => '1.6003'
},
{
'date' => '2013-03-08T19:32:25',
'version' => '1.6004'
},
{
'date' => '2013-03-08T19:48:06',
'version' => '1.6005'
},
{
'date' => '2013-03-14T06:00:27',
'version' => '1.6006'
},
{
'date' => '2013-03-17T21:34:17',
'version' => '1.6007'
},
{
'date' => '2013-03-19T17:03:36',
'version' => '1.6008'
},
{
'date' => '2013-03-25T04:10:51',
'version' => '1.6100'
},
{
'date' => '2013-03-25T20:41:37',
'version' => '1.6101'
},
{
'date' => '2013-03-28T00:16:09',
'version' => '1.6102'
},
{
'date' => '2013-03-30T21:36:49',
'version' => '1.6103'
},
{
'date' => '2013-04-03T01:04:42',
'version' => '1.6104'
},
{
'date' => '2013-04-05T05:17:38',
'version' => '1.6105'
},
{
'date' => '2013-04-06T21:19:18',
'version' => '1.6106'
},
{
'date' => '2013-04-07T04:19:16',
'version' => '1.6107'
},
{
'date' => '2013-04-13T06:32:52',
'version' => '1.6108'
},
{
'date' => '2013-04-13T11:48:43',
'version' => '1.6190'
},
{
'date' => '2013-04-14T03:09:40',
'version' => '1.6191'
},
{
'date' => '2013-04-14T08:17:32',
'version' => '1.6192'
},
{
'date' => '2013-04-15T07:37:08',
'version' => '1.6193'
},
{
'date' => '2013-04-15T07:42:51',
'version' => '1.6900'
},
{
'date' => '2013-04-21T00:50:44',
'version' => '1.6901'
},
{
'date' => '2013-04-21T01:06:02',
'version' => '1.6109'
},
{
'date' => '2013-04-21T01:18:10',
'version' => '1.6902'
},
{
'date' => '2013-04-22T01:07:09',
'version' => '1.6903'
},
{
'date' => '2013-04-24T02:24:37',
'version' => '1.6904'
},
{
'date' => '2013-04-24T03:05:21',
'version' => '1.6905'
},
{
'date' => '2013-04-25T06:20:23',
'version' => '1.6906'
},
{
'date' => '2013-04-26T18:40:08',
'version' => '1.6907'
},
{
'date' => '2013-04-27T01:12:17',
'version' => '1.6908'
},
{
'date' => '2013-04-29T08:49:53',
'version' => '1.6909'
},
{
'date' => '2013-05-03T07:29:32',
'version' => '1.6910'
},
{
'date' => '2013-05-04T20:28:02',
'version' => '1.6911'
},
{
'date' => '2013-05-06T20:59:52',
'version' => '1.6912'
},
{
'date' => '2013-05-10T00:05:10',
'version' => '1.6913'
},
{
'date' => '2013-05-12T23:03:52',
'version' => '1.6914'
},
{
'date' => '2013-05-16T02:01:33',
'version' => '1.6915'
},
{
'date' => '2013-06-04T10:55:37',
'version' => '1.6916'
},
{
'date' => '2013-06-05T01:07:33',
'version' => '1.6917'
},
{
'date' => '2013-06-10T20:03:21',
'version' => '1.6918'
},
{
'date' => '2013-06-12T15:33:22',
'version' => '1.6919'
},
{
'date' => '2013-06-14T21:09:54',
'version' => '1.6920'
},
{
'date' => '2013-06-18T10:19:43',
'version' => '1.6921'
},
{
'date' => '2013-06-19T20:57:09',
'version' => '1.6922'
},
{
'date' => '2013-07-04T05:17:11',
'version' => '1.6923'
},
{
'date' => '2013-07-16T18:38:21',
'version' => '1.6924'
},
{
'date' => '2013-07-20T05:08:06',
'version' => '1.6925'
},
{
'date' => '2013-07-20T16:03:14',
'version' => '1.6926'
},
{
'date' => '2013-07-23T07:45:33',
'version' => '1.6927'
},
{
'date' => '2013-07-23T21:07:02',
'version' => '1.6928'
},
{
'date' => '2013-07-24T18:46:29',
'version' => '1.6929'
},
{
'date' => '2013-07-24T20:48:14',
'version' => '1.6930'
},
{
'date' => '2013-07-24T21:51:33',
'version' => '1.6931'
},
{
'date' => '2013-07-24T22:29:04',
'version' => '1.6932'
},
{
'date' => '2013-07-25T16:58:24',
'version' => '1.6933'
},
{
'date' => '2013-07-26T23:17:21',
'version' => '1.6934'
},
{
'date' => '2013-07-31T18:36:57',
'version' => '1.6935'
},
{
'date' => '2013-08-05T04:37:54',
'version' => '1.6936'
},
{
'date' => '2013-08-06T01:55:29',
'version' => '1.6937'
},
{
'date' => '2013-08-06T06:12:45',
'version' => '1.6938'
},
{
'date' => '2013-08-06T09:55:55',
'version' => '1.6939'
},
{
'date' => '2013-08-08T19:36:34',
'version' => '1.6940'
},
{
'date' => '2013-08-20T18:32:44',
'version' => '1.6941'
},
{
'date' => '2013-08-27T18:11:47',
'version' => '1.6942'
},
{
'date' => '2013-09-03T23:40:37',
'version' => '1.6943'
},
{
'date' => '2013-09-04T22:02:21',
'version' => '1.7000'
},
{
'date' => '2013-09-08T20:12:16',
'version' => '1.7001'
},
{
'date' => '2013-09-19T05:31:34',
'version' => '1.7100'
},
{
'date' => '2013-09-19T11:15:59',
'version' => '1.7101'
},
{
'date' => '2013-09-20T04:33:50',
'version' => '1.7102'
},
{
'date' => '2014-04-27T05:46:31',
'version' => '1.7002'
},
{
'date' => '2014-04-27T15:11:46',
'version' => '1.7003'
},
{
'date' => '2014-04-27T16:23:35',
'version' => '1.7004'
},
{
'date' => '2014-09-02T04:00:49',
'version' => '1.7005'
},
{
'date' => '2014-09-02T06:27:35',
'version' => '1.7006'
},
{
'date' => '2014-09-05T12:04:41',
'version' => '1.7005'
},
{
'date' => '2014-09-05T22:45:37',
'version' => '1.7006'
},
{
'date' => '2014-09-09T16:26:54',
'version' => '1.7007'
},
{
'date' => '2014-09-10T08:19:24',
'version' => '1.7008'
},
{
'date' => '2014-09-10T08:44:00',
'version' => '1.7009'
},
{
'date' => '2014-09-17T09:28:23',
'version' => '1.7010'
},
{
'date' => '2014-09-22T06:08:51',
'version' => '1.7011'
},
{
'date' => '2014-09-27T02:29:33',
'version' => '1.7012'
},
{
'date' => '2014-10-07T06:52:45',
'version' => '1.7013'
},
{
'date' => '2014-10-08T03:54:02',
'version' => '1.7014'
},
{
'date' => '2014-11-14T21:14:40',
'version' => '1.7015'
},
{
'date' => '2014-11-16T19:47:26',
'version' => '1.7016'
},
{
'date' => '2014-11-25T22:01:56',
'version' => '1.7017'
},
{
'date' => '2014-11-25T22:08:49',
'version' => '1.7018'
},
{
'date' => '2014-12-04T20:52:24',
'version' => '1.7019'
},
{
'date' => '2014-12-09T01:54:37',
'version' => '1.7020'
},
{
'date' => '2014-12-12T05:43:01',
'version' => '1.7021'
},
{
'date' => '2014-12-13T00:42:15',
'version' => '1.7022'
},
{
'date' => '2015-01-04T23:00:30',
'version' => '1.7023'
},
{
'date' => '2015-01-12T21:32:45',
'version' => '1.7024'
},
{
'date' => '2015-02-07T06:59:17',
'version' => '1.7025'
},
{
'date' => '2015-02-14T01:12:18',
'version' => '1.7026'
},
{
'date' => '2015-02-14T20:15:20',
'version' => '1.7027'
},
{
'date' => '2015-04-17T17:24:16',
'version' => '1.7028'
},
{
'date' => '2015-04-18T22:16:17',
'version' => '1.7029'
},
{
'date' => '2015-04-19T12:15:59',
'version' => '1.7030'
},
{
'date' => '2015-04-22T21:14:17',
'version' => '1.7031'
},
{
'date' => '2015-04-30T01:52:49',
'version' => '1.7032'
},
{
'date' => '2015-05-02T00:18:54',
'version' => '1.7033'
},
{
'date' => '2015-05-07T21:21:07',
'version' => '1.7034'
},
{
'date' => '2015-06-05T17:51:53',
'version' => '1.7035'
},
{
'date' => '2015-06-06T05:08:20',
'version' => '1.7036'
},
{
'date' => '2015-06-18T21:38:47',
'version' => '1.7037'
},
{
'date' => '2015-06-23T01:05:25',
'version' => '1.7038'
},
{
'date' => '2015-06-29T01:06:18',
'version' => '1.7039'
},
{
'date' => '2016-01-07T19:29:19',
'version' => '1.7040'
},
{
'date' => '2016-05-08T18:29:30',
'version' => '1.7041'
},
{
'date' => '2016-05-24T07:49:34',
'version' => '1.7042'
},
{
'date' => '2017-04-03T03:57:15',
'version' => '1.7043'
},
{
'date' => '2018-04-19T11:54:56',
'version' => '1.7044'
},
{
'date' => '2018-04-20T12:17:48',
'version' => '1.7900'
},
{
'date' => '2018-04-20T12:20:35',
'version' => '1.7901'
},
{
'date' => '2018-04-20T12:43:24',
'version' => '1.7902'
},
{
'date' => '2018-04-20T14:54:30',
'version' => '1.7903'
},
{
'date' => '2018-04-20T21:22:56',
'version' => '1.7904'
},
{
'date' => '2018-04-21T09:40:47',
'version' => '1.7905'
},
{
'date' => '2018-04-21T10:57:20',
'version' => '1.9015'
},
{
'date' => '2018-04-21T11:17:58',
'version' => '1.9016'
},
{
'date' => '2018-04-21T17:31:13',
'version' => '1.9017'
},
{
'date' => '2018-04-22T13:54:32',
'version' => '1.9018'
},
{
'date' => '2018-04-25T09:27:31',
'version' => '1.7906'
},
{
'date' => '2018-04-26T11:36:59',
'version' => '1.7907'
},
{
'date' => '2022-01-27T03:05:02',
'version' => '1.7045'
},
{
'date' => '2022-04-27T06:01:26',
'version' => '1.7046'
},
{
'date' => '2023-07-30T06:01:02',
'version' => '1.7047'
},
{
'date' => '2024-10-29T18:49:03',
'version' => '1.7048'
}
]
},
'App-japerl' => {
'advisories' => [
{
'affected_versions' => [
'<0.09'
],
'cves' => [
'CVE-2016-1238'
],
'description' => '(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.
',
'distribution' => 'App-japerl',
'fixed_versions' => [
'>=0.09'
],
'id' => 'CPANSA-App-japerl-2016-1238',
'references' => [
'http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html',
'http://www.securitytracker.com/id/1036440',
'http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab',
'https://rt.perl.org/Public/Bug/Display.html?id=127834',
'http://www.securityfocus.com/bid/92136',
'http://www.debian.org/security/2016/dsa-3628',
'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/',
'https://security.gentoo.org/glsa/201701-75',
'https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E',
'https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html',
'https://security.gentoo.org/glsa/201812-07',
'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html'
],
'reported' => '2016-08-02',
'severity' => 'high'
}
],
'main_module' => 'App::japerl',
'versions' => [
{
'date' => '2018-09-07T15:19:24',
'version' => '0.10'
},
{
'date' => '2018-09-08T15:07:20',
'version' => '0.11'
},
{
'date' => '2019-07-14T03:35:18',
'version' => '0.12'
},
{
'date' => '2021-02-18T14:03:58',
'version' => '0.13'
},
{
'date' => '2021-09-18T18:20:37',
'version' => '0.14'
},
{
'date' => '2023-03-25T01:04:11',
'version' => '0.15'
}
]
},
'App-perlall' => {
'advisories' => [
{
'affected_versions' => [
'<0.33'
],
'cves' => [
'CVE-2013-1667'
],
'description' => 'The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key.
',
'distribution' => 'App-perlall',
'fixed_versions' => [
'>=0.33'
],
'id' => 'CPANSA-App-perlall-2013-1667',
'references' => [
'http://www.securityfocus.com/bid/58311',
'http://perl5.git.perl.org/perl.git/commitdiff/d59e31f',
'http://perl5.git.perl.org/perl.git/commitdiff/9d83adc',
'http://www.nntp.perl.org/group/perl.perl5.porters/2013/03/msg199755.html',
'http://www.debian.org/security/2013/dsa-2641',
'http://secunia.com/advisories/52499',
'http://secunia.com/advisories/52472',
'https://bugzilla.redhat.com/show_bug.cgi?id=912276',
'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702296',
'http://perl5.git.perl.org/perl.git/commitdiff/6e79fe5',
'http://osvdb.org/90892',
'http://www.ubuntu.com/usn/USN-1770-1',
'http://rhn.redhat.com/errata/RHSA-2013-0685.html',
'http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html',
'http://marc.info/?l=bugtraq&m=137891988921058&w=2',
'http://www.mandriva.com/security/advisories?name=MDVSA-2013:113',
'https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0094',
'http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html',
'http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735',
'http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/82598',
'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18771'
],
'reported' => '2013-03-14',
'severity' => undef
}
],
'main_module' => 'App::perlall',
'versions' => [
{
'date' => '2011-12-23T21:52:22',
'version' => '0.01'
},
{
'date' => '2011-12-24T00:56:03',
'version' => '0.02'
},
{
'date' => '2012-01-06T17:07:08',
'version' => '0.03'
},
{
'date' => '2012-01-09T22:05:35',
'version' => '0.04'
},
{
'date' => '2012-01-31T21:18:20',
'version' => '0.05'
},
{
'date' => '2012-02-06T23:12:27',
'version' => '0.06'
},
{
'date' => '2012-02-07T20:52:55',
'version' => '0.07'
},
{
'date' => '2012-02-23T10:35:50',
'version' => '0.08'
},
{
'date' => '2012-03-22T18:24:53',
'version' => '0.09'
},
{
'date' => '2012-05-03T13:44:26',
'version' => '0.10'
},
{
'date' => '2012-05-05T02:22:56',
'version' => '0.11'
},
{
'date' => '2012-05-05T14:18:09',
'version' => '0.12'
},
{
'date' => '2012-05-29T15:34:02',
'version' => '0.13'
},
{
'date' => '2012-06-07T16:07:09',
'version' => '0.14'
},
{
'date' => '2012-07-18T17:55:03',
'version' => '0.15'
},
{
'date' => '2012-07-18T18:05:33',
'version' => '0.15_01'
},
{
'date' => '2012-07-19T19:07:14',
'version' => '0.16'
},
{
'date' => '2012-08-06T15:11:54',
'version' => '0.17'
},
{
'date' => '2012-11-06T22:12:59',
'version' => '0.18'
},
{
'date' => '2012-11-08T15:37:31',
'version' => '0.19'
},
{
'date' => '2012-11-08T15:50:30',
'version' => '0.20'
},
{
'date' => '2012-11-08T18:53:37',
'version' => '0.21'
},
{
'date' => '2012-11-09T22:04:21',
'version' => '0.22'
},
{
'date' => '2012-11-11T19:50:41',
'version' => '0.23'
},
{
'date' => '2012-11-13T20:46:09',
'version' => '0.25'
},
{
'date' => '2012-11-13T22:45:49',
'version' => '0.26'
},
{
'date' => '2012-11-15T16:26:40',
'version' => '0.27'
},
{
'date' => '2012-12-13T20:09:18',
'version' => '0.28'
},
{
'date' => '2012-12-20T22:29:59',
'version' => '0.29'
},
{
'date' => '2013-01-09T20:22:21',
'version' => '0.30'
},
{
'date' => '2013-02-04T19:58:18',
'version' => '0.31'
},
{
'date' => '2013-02-23T21:35:31',
'version' => '0.32'
},
{
'date' => '2013-03-05T01:04:28',
'version' => '0.33'
},
{
'date' => '2013-03-05T15:34:37',
'version' => '0.34'
},
{
'date' => '2013-03-22T22:34:57',
'version' => '0.35'
},
{
'date' => '2013-07-11T19:58:07',
'version' => '0.36'
},
{
'date' => '2013-07-13T19:53:25',
'version' => '0.37'
},
{
'date' => '2013-10-23T15:58:48',
'version' => '0.39'
},
{
'date' => '2013-11-18T16:12:38',
'version' => '0.40'
},
{
'date' => '2013-12-03T17:08:11',
'version' => '0.41'
},
{
'date' => '2013-12-06T18:40:51',
'version' => '0.42'
},
{
'date' => '2013-12-09T18:31:19',
'version' => '0.43'
},
{
'date' => '2014-01-11T23:39:19',
'version' => '0.44'
},
{
'date' => '2014-07-25T13:36:23',
'version' => '0.45'
},
{
'date' => '2014-08-10T01:42:03',
'version' => '0.46'
},
{
'date' => '2015-07-08T07:43:56',
'version' => '0.47'
},
{
'date' => '2015-10-06T09:33:35',
'version' => '0.48'
},
{
'date' => '2015-11-27T15:53:11',
'version' => '0.49'
},
{
'date' => '2016-06-12T12:48:37',
'version' => '0.50'
},
{
'date' => '2019-12-10T20:02:45',
'version' => '0.51'
}
]
},
'Archive-Tar' => {
'advisories' => [
{
'affected_versions' => [
'<2.28'
],
'cves' => [
'CVE-2018-12015'
],
'description' => 'In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypass a directory-traversal protection mechanism, and overwrite arbitrary files, via an archive file containing a symlink and a regular file with the same name.
',
'distribution' => 'Archive-Tar',
'fixed_versions' => [],
'id' => 'CPANSA-Archive-Tar-2018-01',
'references' => [
'https://security-tracker.debian.org/tracker/CVE-2018-12015',
'https://github.com/jib/archive-tar-new/commit/ae65651eab053fc6dc4590dbb863a268215c1fc5'
],
'reported' => '2018-06-12',
'severity' => 'medium'
},
{
'affected_versions' => [
'<=1.36'
],
'cves' => [
'CVE-2007-4829'
],
'description' => 'Directory traversal vulnerability in the Archive::Tar Perl module 1.36 and earlier allows user-assisted remote attackers to overwrite arbitrary files via a TAR archive that contains a file whose name is an absolute path or has ".." sequences.
',
'distribution' => 'Archive-Tar',
'fixed_versions' => [
'>1.36'
],
'id' => 'CPANSA-Archive-Tar-2007-4829',
'references' => [
'http://rt.cpan.org/Public/Bug/Display.html?id=29517',
'https://bugzilla.redhat.com/show_bug.cgi?id=295021',
'http://rt.cpan.org/Public/Bug/Display.html?id=30380',
'https://issues.rpath.com/browse/RPL-1716',
'http://www.securityfocus.com/bid/26355',
'http://secunia.com/advisories/27539',
'http://osvdb.org/40410',
'http://www.ubuntu.com/usn/usn-700-1',
'http://secunia.com/advisories/33314',
'http://www.ubuntu.com/usn/usn-700-2',
'http://www.gentoo.org/security/en/glsa/glsa-200812-10.xml',
'http://secunia.com/advisories/33116',
'http://www.vupen.com/english/advisories/2007/3755',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/38285',
'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11658'
],
'reported' => '2007-11-02',
'severity' => undef
},
{
'affected_versions' => [
'<2.10'
],
'cves' => [
'CVE-2016-1238'
],
'description' => '\'(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.\'
',
'distribution' => 'Archive-Tar',
'fixed_versions' => [
'>=2.10'
],
'id' => 'CPANSA-Archive-Tar-2016-1238',
'references' => [
'http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html',
'http://www.securitytracker.com/id/1036440',
'http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab',
'https://rt.perl.org/Public/Bug/Display.html?id=127834',
'http://www.securityfocus.com/bid/92136',
'http://www.debian.org/security/2016/dsa-3628',
'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/',
'https://security.gentoo.org/glsa/201701-75',
'https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E',
'https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html',
'https://security.gentoo.org/glsa/201812-07',
'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html'
],
'reported' => '2016-08-02',
'severity' => 'high'
}
],
'main_module' => 'Archive::Tar',
'versions' => [
{
'date' => '1998-02-02T06:13:59',
'version' => '0.071'
},
{
'date' => '1998-04-10T17:07:35',
'version' => '0.072'
},
{
'date' => '1998-07-30T00:56:03',
'version' => '0.08'
},
{
'date' => '1999-01-10T02:22:23',
'version' => '0.20'
},
{
'date' => '1999-02-02T19:01:41',
'version' => '0.21'
},
{
'date' => '2000-04-28T00:37:46',
'version' => '0.22'
},
{
'date' => '2003-01-21T23:07:30',
'version' => '0.23'
},
{
'date' => '2003-03-18T17:08:50',
'version' => '0.99_01'
},
{
'date' => '2003-03-26T14:57:35',
'version' => '0.99_02'
},
{
'date' => '2003-04-28T16:01:24',
'version' => '0.99_03'
},
{
'date' => '2003-04-28T16:57:58',
'version' => '0.99_04'
},
{
'date' => '2003-04-30T12:52:19',
'version' => '0.99_05'
},
{
'date' => '2003-05-05T12:06:35',
'version' => '0.99_06'
},
{
'date' => '2003-05-31T09:27:33',
'version' => '1.00'
},
{
'date' => '2003-06-08T10:46:56',
'version' => '1.01'
},
{
'date' => '2003-06-12T09:47:58',
'version' => '1.02'
},
{
'date' => '2003-06-26T12:52:19',
'version' => '1.03'
},
{
'date' => '2003-07-27T17:07:50',
'version' => '1.04'
},
{
'date' => '2003-08-25T13:38:44',
'version' => '1.05'
},
{
'date' => '2003-10-15T14:35:12',
'version' => '1.06'
},
{
'date' => '2003-10-17T11:42:14',
'version' => '1.07'
},
{
'date' => '2004-01-05T12:59:23',
'version' => '1.08'
},
{
'date' => '2004-05-22T12:32:02',
'version' => '1.09'
},
{
'date' => '2004-06-11T19:24:06',
'version' => '1.10'
},
{
'date' => '2004-11-09T16:12:40',
'version' => '1.20'
},
{
'date' => '2004-11-10T16:04:13',
'version' => '1.21'
},
{
'date' => '2004-11-21T10:09:52',
'version' => '1.22'
},
{
'date' => '2004-12-03T15:53:06',
'version' => '1.23'
},
{
'date' => '2005-05-03T13:11:19',
'version' => '1.24'
},
{
'date' => '2005-08-20T10:14:40',
'version' => '1.25'
},
{
'date' => '2005-08-22T09:29:53',
'version' => '1.26'
},
{
'date' => '2006-01-19T13:31:53',
'version' => '1.28'
},
{
'date' => '2006-03-03T13:56:20',
'version' => '1.29'
},
{
'date' => '2006-08-02T15:00:41',
'version' => '1.30'
},
{
'date' => '2007-05-18T12:18:49',
'version' => '1.31'
},
{
'date' => '2007-05-25T09:32:48',
'version' => '1.32'
},
{
'date' => '2007-08-15T14:20:33',
'version' => '1.34'
},
{
'date' => '2007-09-16T09:13:21',
'version' => '1.36'
},
{
'date' => '2007-11-11T11:59:00',
'version' => '1.37_01'
},
{
'date' => '2007-12-24T11:02:07',
'version' => '1.38'
},
{
'date' => '2008-08-22T16:33:49',
'version' => '1.39_01'
},
{
'date' => '2008-08-25T03:56:58',
'version' => '1.39_02'
},
{
'date' => '2008-08-25T22:07:56',
'version' => '1.39_03'
},
{
'date' => '2008-09-08T12:14:37',
'version' => '1.39_04'
},
{
'date' => '2008-10-13T13:42:10',
'version' => '1.40'
},
{
'date' => '2008-12-13T17:10:15',
'version' => '1.42'
},
{
'date' => '2009-01-19T17:08:08',
'version' => '1.44'
},
{
'date' => '2009-03-05T16:10:06',
'version' => '1.46'
},
{
'date' => '2009-04-20T17:07:30',
'version' => '1.48'
},
{
'date' => '2009-06-12T12:01:54',
'version' => '1.50'
},
{
'date' => '2009-06-13T11:29:50',
'version' => '1.52'
},
{
'date' => '2009-09-10T12:13:03',
'version' => '1.54'
},
{
'date' => '2010-02-03T14:40:15',
'version' => '1.56'
},
{
'date' => '2010-02-17T21:47:16',
'version' => '1.58'
},
{
'date' => '2010-04-23T14:12:31',
'version' => '1.60'
},
{
'date' => '2010-06-28T21:02:59',
'version' => '1.62'
},
{
'date' => '2010-07-09T11:04:45',
'version' => '1.64'
},
{
'date' => '2010-07-26T08:44:00',
'version' => '1.66'
},
{
'date' => '2010-08-17T16:06:19',
'version' => '1.68'
},
{
'date' => '2010-11-15T22:02:53',
'version' => '1.70'
},
{
'date' => '2010-11-18T19:22:01',
'version' => '1.72'
},
{
'date' => '2010-12-18T21:19:51',
'version' => '1.74'
},
{
'date' => '2011-01-07T22:27:40',
'version' => '1.76'
},
{
'date' => '2011-09-08T22:13:33',
'version' => '1.78'
},
{
'date' => '2011-10-13T10:25:39',
'version' => '1.80'
},
{
'date' => '2011-11-21T12:14:43',
'version' => '1.82'
},
{
'date' => '2012-03-03T00:00:05',
'version' => '1.84'
},
{
'date' => '2012-05-24T11:38:09',
'version' => '1.86'
},
{
'date' => '2012-06-01T11:06:25',
'version' => '1.88'
},
{
'date' => '2012-09-05T18:19:00',
'version' => '1.90'
},
{
'date' => '2013-06-18T15:13:27',
'version' => '1.92'
},
{
'date' => '2013-10-22T14:28:22',
'version' => '0.93_01'
},
{
'date' => '2013-10-22T14:36:08',
'version' => '1.93_02'
},
{
'date' => '2013-10-24T18:02:48',
'version' => '1.94'
},
{
'date' => '2013-10-24T19:10:34',
'version' => '1.96'
},
{
'date' => '2014-06-14T17:12:02',
'version' => '1.98'
},
{
'date' => '2014-06-15T14:59:24',
'version' => '2.00'
},
{
'date' => '2014-09-14T18:03:23',
'version' => '2.02'
},
{
'date' => '2014-12-14T20:13:33',
'version' => '2.04'
},
{
'date' => '2016-04-24T14:05:11',
'version' => '2.06'
},
{
'date' => '2016-05-12T08:57:35',
'version' => '2.08'
},
{
'date' => '2016-07-27T12:40:29',
'version' => '2.10'
},
{
'date' => '2016-10-16T11:27:58',
'version' => '2.12'
},
{
'date' => '2016-10-20T12:38:57',
'version' => '2.14'
},
{
'date' => '2016-11-01T19:19:36',
'version' => '2.16'
},
{
'date' => '2016-11-07T13:36:15',
'version' => '2.18'
},
{
'date' => '2016-12-15T10:54:40',
'version' => '2.20'
},
{
'date' => '2016-12-16T09:46:28',
'version' => '2.22'
},
{
'date' => '2016-12-16T15:27:38',
'version' => '2.24'
},
{
'date' => '2017-05-12T12:46:05',
'version' => '2.26'
},
{
'date' => '2018-06-08T10:57:04',
'version' => '2.28'
},
{
'date' => '2018-06-19T11:55:28',
'version' => '2.30'
},
{
'date' => '2018-09-13T07:17:10',
'version' => '2.32'
},
{
'date' => '2020-02-01T16:41:47',
'version' => '2.34'
},
{
'date' => '2020-02-02T13:34:34',
'version' => '2.36'
},
{
'date' => '2020-06-25T07:51:56',
'version' => '2.38'
},
{
'date' => '2021-07-27T09:51:54',
'version' => '2.40'
},
{
'date' => '2023-03-25T12:10:20',
'version' => '3.00'
},
{
'date' => '2023-04-12T23:09:11',
'version' => '3.02'
}
]
},
'Archive-Zip' => {
'advisories' => [
{
'affected_versions' => [
'<1.61'
],
'cves' => [
'CVE-2018-10860'
],
'description' => 'perl-archive-zip is vulnerable to a directory traversal in Archive::Zip. It was found that the Archive::Zip module did not properly sanitize paths while extracting zip files. An attacker able to provide a specially crafted archive for processing could use this flaw to write or overwrite arbitrary files in the context of the perl interpreter.
',
'distribution' => 'Archive-Zip',
'fixed_versions' => [],
'id' => 'CPANSA-Archive-Zip-2018-01',
'references' => [
'https://security-tracker.debian.org/tracker/CVE-2018-10860',
'https://github.com/redhotpenguin/perl-Archive-Zip/pull/33'
],
'reported' => '2018-06-28',
'severity' => 'medium'
},
{
'affected_versions' => [
'<1.14'
],
'cves' => [
'CVE-2004-1096'
],
'description' => 'Archive::Zip Perl module before 1.14, when used by antivirus programs such as amavisd-new, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.
',
'distribution' => 'Archive-Zip',
'fixed_versions' => [],
'id' => 'CPANSA-Archive-Zip-2004-1096',
'references' => [
'http://www.securityfocus.com/bid/11448',
'http://www.gentoo.org/security/en/glsa/glsa-200410-31.xml',
'http://www.idefense.com/application/poi/display?id=153&type=vulnerabilities&flashstatus=true',
'http://www.kb.cert.org/vuls/id/492545',
'http://secunia.com/advisories/13038/',
'http://www.mandriva.com/security/advisories?name=MDKSA-2004:118',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/17761'
],
'reported' => '2005-01-10',
'severity' => undef
}
],
'main_module' => 'Archive::Zip',
'versions' => [
{
'date' => '2000-03-22T00:10:21',
'version' => '0.06'
},
{
'date' => '2000-03-29T17:03:46',
'version' => '0.07'
},
{
'date' => '2000-06-16T16:48:41',
'version' => '0.09'
},
{
'date' => '2000-08-08T20:56:31',
'version' => '0.10'
},
{
'date' => '2001-01-17T08:06:58',
'version' => '0.11'
},
{
'date' => '2002-04-22T15:32:49',
'version' => '1.00'
},
{
'date' => '2002-05-11T02:45:20',
'version' => '1.01'
},
{
'date' => '2002-08-24T00:19:19',
'version' => '1.02'
},
{
'date' => '2002-09-03T04:40:33',
'version' => '1.03'
},
{
'date' => '2002-09-11T15:17:37',
'version' => '1.04'
},
{
'date' => '2002-09-11T19:35:26',
'version' => '1.05'
},
{
'date' => '2003-07-17T18:18:14',
'version' => '1.06'
},
{
'date' => '2003-10-20T13:59:00',
'version' => '1.07'
},
{
'date' => '2003-10-21T17:04:03',
'version' => '1.08'
},
{
'date' => '2003-11-27T18:02:03',
'version' => '1.09'
},
{
'date' => '2004-03-25T14:39:05',
'version' => '1.10'
},
{
'date' => '2004-07-05T23:25:19',
'version' => '1_11'
},
{
'date' => '2004-07-08T17:31:27',
'version' => '1.11'
},
{
'date' => '2004-07-08T19:14:46',
'version' => '1.12'
},
{
'date' => '2004-07-27T22:50:39',
'version' => '1.12_02'
},
{
'date' => '2004-07-29T15:15:49',
'version' => '1.12_03'
},
{
'date' => '2004-08-23T15:39:23',
'version' => '1.13'
},
{
'date' => '2004-10-21T15:28:12',
'version' => '1.14'
},
{
'date' => '2005-03-10T04:34:04',
'version' => '1.15_01'
},
{
'date' => '2005-03-12T15:29:48',
'version' => '1.15_02'
},
{
'date' => '2005-06-22T18:29:34',
'version' => '1.15'
},
{
'date' => '2005-07-04T17:55:17',
'version' => '1.16'
},
{
'date' => '2006-04-30T03:53:15',
'version' => '1.17_01'
},
{
'date' => '2006-05-07T02:49:30',
'version' => '1.17_02'
},
{
'date' => '2006-09-15T15:56:10',
'version' => '1.17_03'
},
{
'date' => '2006-10-24T15:06:32',
'version' => '1.17_05'
},
{
'date' => '2006-10-25T12:24:52',
'version' => '1.18'
},
{
'date' => '2007-06-05T01:50:42',
'version' => '1.20'
},
{
'date' => '2007-11-01T02:59:20',
'version' => '1.21'
},
{
'date' => '2007-11-02T01:52:47',
'version' => '1.22'
},
{
'date' => '2007-11-07T13:04:41',
'version' => '1.23'
},
{
'date' => '2008-08-23T23:35:50',
'version' => '1.24'
},
{
'date' => '2008-10-10T05:28:17',
'version' => '1.25'
},
{
'date' => '2008-10-12T14:13:05',
'version' => '1.26'
},
{
'date' => '2008-12-16T13:23:21',
'version' => '1.27_01'
},
{
'date' => '2009-06-16T10:09:03',
'version' => '1.28'
},
{
'date' => '2009-06-29T13:27:17',
'version' => '1.29'
},
{
'date' => '2009-06-30T14:13:29',
'version' => '1.30'
},
{
'date' => '2010-03-05T05:11:20',
'version' => '1.31_01'
},
{
'date' => '2011-03-08T15:52:02',
'version' => '1.31_02'
},
{
'date' => '2011-08-23T03:42:14',
'version' => '1.31_03'
},
{
'date' => '2012-01-23T06:28:16',
'version' => '1.31_04'
},
{
'date' => '2013-11-09T00:05:06',
'version' => '1.32'
},
{
'date' => '2013-11-10T03:50:45',
'version' => '1.33'
},
{
'date' => '2013-12-02T22:16:54',
'version' => '1.34'
},
{
'date' => '2013-12-30T19:16:52',
'version' => '1.35'
},
{
'date' => '2013-12-30T22:12:14',
'version' => '1.36'
},
{
'date' => '2014-01-13T18:32:19',
'version' => '1.37'
},
{
'date' => '2014-09-02T23:23:11',
'version' => '1.38'
},
{
'date' => '2014-10-22T04:17:15',
'version' => '1.39'
},
{
'date' => '2015-01-05T05:58:46',
'version' => '1.40'
},
{
'date' => '2015-01-10T02:47:42',
'version' => '1.41'
},
{
'date' => '2015-01-12T00:46:36',
'version' => '1.42'
},
{
'date' => '2015-01-15T06:37:32',
'version' => '1.43'
},
{
'date' => '2015-01-24T06:12:21',
'version' => '1.44'
},
{
'date' => '2015-01-27T07:51:17',
'version' => '1.45'
},
{
'date' => '2015-03-25T05:19:23',
'version' => '1.46'
},
{
'date' => '2015-06-17T18:26:02',
'version' => '1.47'
},
{
'date' => '2015-06-18T21:13:37',
'version' => '1.48'
},
{
'date' => '2015-07-31T19:01:40',
'version' => '1.49'
},
{
'date' => '2015-08-26T00:11:35',
'version' => '1.50'
},
{
'date' => '2015-09-22T06:03:54',
'version' => '1.51'
},
{
'date' => '2015-09-23T17:43:44',
'version' => '1.53'
},
{
'date' => '2015-12-04T19:36:41',
'version' => '1.55'
},
{
'date' => '2015-12-17T18:29:06',
'version' => '1.56'
},
{
'date' => '2016-04-01T18:06:36',
'version' => '1.57'
},
{
'date' => '2016-08-02T17:50:20',
'version' => '1.58'
},
{
'date' => '2016-08-11T20:09:16',
'version' => '1.59'
},
{
'date' => '2017-12-19T18:44:16',
'version' => '1.60'
},
{
'date' => '2018-08-19T03:35:10',
'version' => '1.61'
},
{
'date' => '2018-08-20T03:29:01',
'version' => '1.62'
},
{
'date' => '2018-08-22T15:42:15',
'version' => '1.63'
},
{
'date' => '2018-09-12T15:50:29',
'version' => '1.64'
},
{
'date' => '2019-09-08T05:20:03',
'version' => '1.65'
},
{
'date' => '2019-09-17T04:37:32',
'version' => '1.66'
},
{
'date' => '2019-10-07T04:30:05',
'version' => '1.67'
},
{
'date' => '2020-03-12T17:59:46',
'version' => '1.68'
}
]
},
'Batch-Batchrun' => {
'advisories' => [
{
'affected_versions' => [
'>=1.03'
],
'cves' => [
'CVE-2011-4117'
],
'description' => 'The Batch::Batchrun module 1.03 for Perl does not properly handle temporary files.
',
'distribution' => 'Batch-Batchrun',
'fixed_versions' => [],
'id' => 'CPANSA-Batch-Batchrun-2011-4117',
'references' => [
'http://www.openwall.com/lists/oss-security/2011/11/04/2',
'http://www.openwall.com/lists/oss-security/2011/11/04/4',
'https://rt.cpan.org/Public/Bug/Display.html?id=69594'
],
'reported' => '2020-01-31',
'severity' => 'high'
}
],
'main_module' => 'Batch::Batchrun',
'versions' => [
{
'date' => '1999-08-21T20:25:47',
'version' => '1.03'
}
]
},
'CBOR-XS' => {
'advisories' => [
{
'affected_versions' => [
'<1.7'
],
'cves' => [],
'description' => 'An out-of bound sharedref or stringref index could cause an out of bounds access - might be exploitable. A decoding error during indefinite array or hash decoding could cause an endless loop.
',
'distribution' => 'CBOR-XS',
'fixed_versions' => [
'>=1.7'
],
'id' => 'CPANSA-CBOR-XS-2017-01',
'references' => [
'https://metacpan.org/dist/CBOR-XS/changes'
],
'reported' => '2017-07-27',
'severity' => undef
}
],
'main_module' => 'CBOR::XS',
'versions' => [
{
'date' => '2013-10-25T23:10:42',
'version' => '0.01'
},
{
'date' => '2013-10-26T11:09:56',
'version' => '0.02'
},
{
'date' => '2013-10-26T23:04:01',
'version' => '0.03'
},
{
'date' => '2013-10-27T22:48:22',
'version' => '0.04'
},
{
'date' => '2013-10-28T21:28:30',
'version' => '0.05'
},
{
'date' => '2013-10-29T15:57:13',
'version' => '0.06'
},
{
'date' => '2013-10-29T22:05:30',
'version' => '0.07'
},
{
'date' => '2013-10-30T10:11:46',
'version' => '0.08'
},
{
'date' => '2013-11-22T16:19:26',
'version' => '0.09'
},
{
'date' => '2013-11-28T16:09:19',
'version' => '1.0'
},
{
'date' => '2013-11-30T18:42:59',
'version' => '1.1'
},
{
'date' => '2013-12-01T17:11:47',
'version' => '1.11'
},
{
'date' => '2013-12-03T10:25:03',
'version' => '1.12'
},
{
'date' => '2013-12-10T21:07:58',
'version' => '1.2'
},
{
'date' => '2014-01-05T14:25:36',
'version' => '1.25'
},
{
'date' => '2014-10-25T06:37:38',
'version' => '1.26'
},
{
'date' => '2015-04-27T20:22:15',
'version' => '1.3'
},
{
'date' => '2016-02-08T04:38:25',
'version' => '1.4'
},
{
'date' => '2016-02-25T14:23:47',
'version' => '1.41'
},
{
'date' => '2016-04-27T09:40:38',
'version' => '1.5'
},
{
'date' => '2016-12-07T14:14:49',
'version' => '1.6'
},
{
'date' => '2017-06-27T02:03:48',
'version' => '1.7'
},
{
'date' => '2018-11-15T19:53:50',
'version' => '1.71'
},
{
'date' => '2020-11-29T21:36:13',
'version' => '1.8'
},
{
'date' => '2020-11-30T18:31:32',
'version' => '1.81'
},
{
'date' => '2020-12-01T01:50:49',
'version' => '1.82'
},
{
'date' => '2020-12-08T08:30:59',
'version' => '1.83'
},
{
'date' => '2021-10-21T01:16:11',
'version' => '1.84'
},
{
'date' => '2021-10-23T03:00:48',
'version' => '1.85'
},
{
'date' => '2021-11-04T16:50:24',
'version' => '1.86'
},
{
'date' => '2023-09-10T20:45:43',
'version' => '1.87'
}
]
},
'CGI' => {
'advisories' => [
{
'affected_versions' => [
'<3.63'
],
'cves' => [
'CVE-2012-5526'
],
'description' => 'CGI.pm module before 3.63 for Perl does not properly escape newlines in (1) Set-Cookie or (2) P3P headers, which might allow remote attackers to inject arbitrary headers into responses from applications that use CGI.pm.
',
'distribution' => 'CGI',
'fixed_versions' => [
'>=3.63'
],
'id' => 'CPANSA-CGI-2012-5526',
'references' => [
'http://www.securityfocus.com/bid/56562',
'http://www.openwall.com/lists/oss-security/2012/11/15/6',
'https://github.com/markstos/CGI.pm/pull/23',
'http://www.securitytracker.com/id?1027780',
'http://cpansearch.perl.org/src/MARKSTOS/CGI.pm-3.63/Changes',
'http://secunia.com/advisories/51457',
'http://www.ubuntu.com/usn/USN-1643-1',
'http://www.debian.org/security/2012/dsa-2586',
'http://rhn.redhat.com/errata/RHSA-2013-0685.html',
'http://secunia.com/advisories/55314',
'http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html',
'http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735',
'http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/80098'
],
'reported' => '2012-11-21',
'severity' => undef
},
{
'affected_versions' => [
'<3.56'
],
'cves' => [
'CVE-2011-2766'
],
'description' => 'Usage of deprecated FCGI.pm API.
',
'distribution' => 'CGI',
'fixed_versions' => [
'>=3.56'
],
'id' => 'CPANSA-CGI-2011-2766',
'references' => [
'https://rt.cpan.org/Public/Bug/Display.html?id=68380',
'http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-2766'
],
'reported' => '2011-11-08'
},
{
'affected_versions' => [
'<3.50'
],
'cves' => [],
'description' => 'Non-random MIME boundary.
',
'distribution' => 'CGI',
'fixed_versions' => [
'>=3.50'
],
'id' => 'CPANSA-CGI-2010-02',
'reported' => '2010-11-08'
},
{
'affected_versions' => [
'<3.49'
],
'cves' => [],
'description' => 'Newlines in headers.
',
'distribution' => 'CGI',
'fixed_versions' => [
'>=3.49'
],
'id' => 'CPANSA-CGI-2010-01',
'reported' => '2010-02-05'
},
{
'affected_versions' => [
'<3.50'
],
'cves' => [
'CVE-2010-4411'
],
'description' => 'Unspecified vulnerability in CGI.pm 3.50 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unknown vectors. NOTE: this issue exists because of an incomplete fix for CVE-2010-2761.
',
'distribution' => 'CGI',
'fixed_versions' => [
'>=3.50'
],
'id' => 'CPANSA-CGI-2010-4411',
'references' => [
'http://openwall.com/lists/oss-security/2010/12/01/3',
'http://www.mandriva.com/security/advisories?name=MDVSA-2011:008',
'http://www.vupen.com/english/advisories/2011/0106',
'http://www.bugzilla.org/security/3.2.9/',
'http://secunia.com/advisories/43033',
'https://bugzilla.mozilla.org/show_bug.cgi?id=591165',
'http://www.vupen.com/english/advisories/2011/0207',
'http://www.vupen.com/english/advisories/2011/0271',
'http://www.vupen.com/english/advisories/2011/0212',
'http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html',
'http://secunia.com/advisories/43068',
'http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html',
'http://secunia.com/advisories/43165',
'http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html',
'http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html'
],
'reported' => '2010-12-06',
'severity' => undef
},
{
'affected_versions' => [
'<3.50'
],
'cves' => [
'CVE-2010-2761'
],
'description' => 'The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172.
',
'distribution' => 'CGI',
'fixed_versions' => [
'>=3.50'
],
'id' => 'CPANSA-CGI-2010-2761',
'references' => [
'https://github.com/AndyA/CGI--Simple/commit/e4942b871a26c1317a175a91ebb7262eea59b380',
'http://cpansearch.perl.org/src/LDS/CGI.pm-3.50/Changes',
'http://openwall.com/lists/oss-security/2010/12/01/1',
'http://www.nntp.perl.org/group/perl.perl5.changes/2010/11/msg28043.html',
'http://perl5.git.perl.org/perl.git/blobdiff/a0b94c2432b1d8c20653453a0f6970cb10f59aec..84601d63a7e34958da47dad1e61e27cb3bd467d1:/cpan/CGI/lib/CGI.pm',
'http://perl5.git.perl.org/perl.git/commit/84601d63a7e34958da47dad1e61e27cb3bd467d1',
'http://openwall.com/lists/oss-security/2010/12/01/2',
'http://openwall.com/lists/oss-security/2010/12/01/3',
'https://bugzilla.mozilla.org/show_bug.cgi?id=600464',
'http://osvdb.org/69588',
'http://osvdb.org/69589',
'http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html',
'http://www.mandriva.com/security/advisories?name=MDVSA-2010:237',
'http://www.vupen.com/english/advisories/2011/0076',
'http://www.mandriva.com/security/advisories?name=MDVSA-2010:250',
'http://secunia.com/advisories/42877',
'https://bugzilla.mozilla.org/show_bug.cgi?id=591165',
'http://www.vupen.com/english/advisories/2011/0207',
'http://www.bugzilla.org/security/3.2.9/',
'http://secunia.com/advisories/43033',
'http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053591.html',
'http://secunia.com/advisories/43147',
'http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053576.html',
'http://www.vupen.com/english/advisories/2011/0249',
'http://www.vupen.com/english/advisories/2011/0271',
'http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html',
'http://www.vupen.com/english/advisories/2011/0212',
'http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html',
'http://secunia.com/advisories/43165',
'http://secunia.com/advisories/43068',
'http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html',
'http://www.redhat.com/support/errata/RHSA-2011-1797.html',
'http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html',
'http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735',
'http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705'
],
'reported' => '2010-12-06',
'severity' => undef
}
],
'main_module' => 'CGI',
'versions' => [
{
'date' => '1995-11-25T09:21:00',
'version' => '2.10'
},
{
'date' => '1995-12-28T09:08:00',
'version' => '2.13'
},
{
'date' => '1996-05-22T22:30:00',
'version' => '2.20'
},
{
'date' => '1996-05-31T05:31:00',
'version' => '2.21'
},
{
'date' => '1996-08-07T09:24:00',
'version' => '2.22'
},
{
'date' => '1996-08-14T08:17:00',
'version' => '2.23'
},
{
'date' => '1996-08-21T09:09:00',
'version' => '2.24'
},
{
'date' => '1996-09-10T14:23:00',
'version' => '2.25'
},
{
'date' => '1996-10-22T11:17:00',
'version' => '2.26'
},
{
'date' => '1996-10-24T18:21:00',
'version' => '2.27'
},
{
'date' => '1996-12-02T11:48:00',
'version' => '2.28'
},
{
'date' => '1996-12-09T13:39:00',
'version' => '2.29'
},
{
'date' => '1997-01-02T16:40:00',
'version' => '2.30'
},
{
'date' => '1997-02-15T15:36:00',
'version' => '2.31'
},
{
'date' => '1997-03-25T08:58:00',
'version' => '2.32'
},
{
'date' => '1997-04-04T20:45:00',
'version' => '2.33'
},
{
'date' => '1997-04-10T15:41:00',
'version' => '2.34'
},
{
'date' => '1997-04-20T18:29:00',
'version' => '2.35'
},
{
'date' => '1997-05-09T09:33:00',
'version' => '2.36'
},
{
'date' => '1997-08-29T04:42:00',
'version' => '2.37'
},
{
'date' => '1997-09-15T17:51:00',
'version' => '2.37'
},
{
'date' => '1997-10-01T04:15:00',
'version' => '2.37'
},
{
'date' => '1997-10-12T07:10:00',
'version' => '2.37'
},
{
'date' => '1997-11-23T11:37:00',
'version' => '2.37'
},
{
'date' => '1997-12-20T09:57:00',
'version' => '2.37'
},
{
'date' => '1998-01-16T12:22:00',
'version' => '2.37'
},
{
'date' => '1998-01-19T11:34:00',
'version' => '2.37'
},
{
'date' => '1998-01-26T11:00:00',
'version' => '2.37'
},
{
'date' => '1998-01-29T19:48:00',
'version' => '2.37'
},
{
'date' => '1998-02-02T13:37:00',
'version' => '2.37'
},
{
'date' => '1998-02-05T08:25:00',
'version' => '2.37'
},
{
'date' => '1998-02-09T13:58:00',
'version' => '2.37'
},
{
'date' => '1998-02-16T16:21:00',
'version' => '2.37'
},
{
'date' => '1998-02-23T08:33:00',
'version' => '2.37'
},
{
'date' => '1998-02-24T16:52:00',
'version' => '2.37'
},
{
'date' => '1998-03-13T15:33:00',
'version' => '2.37'
},
{
'date' => '1998-03-22T21:12:00',
'version' => '2.38'
},
{
'date' => '1998-03-24T22:37:08',
'version' => '2.39'
},
{
'date' => '1998-05-20T09:17:00',
'version' => '2.40'
},
{
'date' => '1998-05-28T15:03:00',
'version' => '2.41'
},
{
'date' => '1998-06-09T09:00:00',
'version' => '2.42'
},
{
'date' => '1998-10-14T19:06:31',
'version' => '2.43'
},
{
'date' => '1998-11-24T19:41:41',
'version' => '2.44'
},
{
'date' => '1998-11-26T11:07:27',
'version' => '2.45'
},
{
'date' => '1998-12-06T10:22:46',
'version' => '2.46'
},
{
'date' => '1999-02-18T03:50:16',
'version' => '2.47'
},
{
'date' => '1999-02-19T14:10:25',
'version' => '2.48'
},
{
'date' => '1999-02-23T22:00:33',
'version' => '2.49'
},
{
'date' => '1999-06-08T15:13:15',
'version' => '2.52'
},
{
'date' => '1999-06-09T14:56:06',
'version' => '2.53'
},
{
'date' => '1999-08-09T14:18:33',
'version' => '2.54'
},
{
'date' => '1999-08-31T17:11:00',
'version' => '2.55'
},
{
'date' => '1999-09-13T21:11:51',
'version' => '2.56'
},
{
'date' => '2000-03-23T23:00:12',
'version' => '2.58'
},
{
'date' => '2000-03-24T12:31:52',
'version' => '2.59'
},
{
'date' => '2000-03-27T22:11:34',
'version' => '2.60'
},
{
'date' => '2000-03-28T02:50:18',
'version' => '2.61'
},
{
'date' => '2000-03-28T21:38:03',
'version' => '2.62'
},
{
'date' => '2000-04-10T15:19:54',
'version' => '2.63'
},
{
'date' => '2000-04-11T15:25:13',
'version' => '2.64'
},
{
'date' => '2000-04-11T15:55:40',
'version' => '2.65'
},
{
'date' => '2000-04-12T20:16:46',
'version' => '2.66'
},
{
'date' => '2000-05-16T01:38:08',
'version' => '2.67'
},
{
'date' => '2000-05-18T17:55:55',
'version' => '2.68'
},
{
'date' => '2000-07-28T03:06:11',
'version' => '2.69'
},
{
'date' => '2000-08-04T19:37:27',
'version' => '2.70'
},
{
'date' => '2000-08-13T16:09:25',
'version' => '2.71'
},
{
'date' => '2000-08-20T17:35:50',
'version' => '2.72'
},
{
'date' => '2000-08-24T13:33:37',
'version' => '3.'
},
{
'date' => '2000-09-13T02:55:51',
'version' => '2.73'
},
{
'date' => '2000-09-13T16:35:14',
'version' => '2.74'
},
{
'date' => '2001-02-02T15:43:07',
'version' => '2.75'
},
{
'date' => '2001-02-02T15:50:53',
'version' => '2.751'
},
{
'date' => '2001-02-04T23:49:27',
'version' => '2.752'
},
{
'date' => '2001-03-12T17:00:13',
'version' => '2.753'
},
{
'date' => '2001-06-15T15:33:28',
'version' => '3.02'
},
{
'date' => '2001-06-29T14:47:39',
'version' => '3.02_'
},
{
'date' => '2001-07-05T16:13:55',
'version' => '3.03_01'
},
{
'date' => '2001-07-26T21:29:22',
'version' => '2.76'
},
{
'date' => '2001-08-07T12:33:22',
'version' => '2.77'
},
{
'date' => '2001-09-26T02:26:36',
'version' => '2.78'
},
{
'date' => '2001-12-09T21:39:11',
'version' => '2.79'
},
{
'date' => '2002-01-12T02:47:17',
'version' => '2.80'
},
{
'date' => '2002-04-10T19:39:49',
'version' => '2.81'
},
{
'date' => '2002-09-11T12:27:48',
'version' => '2.84'
},
{
'date' => '2002-09-11T14:01:02',
'version' => '2.85'
},
{
'date' => '2002-09-12T03:58:40',
'version' => '2.86'
},
{
'date' => '2002-10-07T02:00:58',
'version' => '2.87'
},
{
'date' => '2002-10-14T13:58:09',
'version' => '2.88'
},
{
'date' => '2002-10-16T17:50:26',
'version' => '2.89'
},
{
'date' => '2002-11-22T23:03:39',
'version' => 0
},
{
'date' => '2003-02-10T20:11:57',
'version' => '2.90'
},
{
'date' => '2003-02-11T14:15:15',
'version' => '2.91'
},
{
'date' => '2003-04-28T00:44:10',
'version' => '2.92'
},
{
'date' => '2003-04-28T13:37:43',
'version' => '2.93'
},
{
'date' => '2003-06-09T12:15:29',
'version' => '2.94'
},
{
'date' => '2003-06-13T02:35:42',
'version' => '2.95'
},
{
'date' => '2003-06-16T18:42:38',
'version' => '2.96'
},
{
'date' => '2003-06-17T23:32:52',
'version' => '2.97'
},
{
'date' => '2003-07-16T17:06:29',
'version' => '2.98'
},
{
'date' => '2003-08-01T14:43:54',
'version' => '2.99'
},
{
'date' => '2003-08-18T17:51:48',
'version' => '3.00'
},
{
'date' => '2003-12-10T17:05:47',
'version' => '3.01'
},
{
'date' => '2004-01-13T16:34:47',
'version' => '3.03'
},
{
'date' => '2004-01-19T12:44:30',
'version' => '3.04'
},
{
'date' => '2004-04-12T20:39:57',
'version' => '3.05'
},
{
'date' => '2005-03-09T21:06:46',
'version' => '3.06'
},
{
'date' => '2005-03-14T16:34:03',
'version' => '3.07'
},
{
'date' => '2005-04-20T15:31:11',
'version' => '3.08'
},
{
'date' => '2005-05-05T20:16:55',
'version' => '3.09'
},
{
'date' => '2005-05-13T21:48:46',
'version' => '3.10'
},
{
'date' => '2005-08-03T21:17:14',
'version' => '3.11'
},
{
'date' => '2005-12-04T16:46:53',
'version' => '3.12'
},
{
'date' => '2005-12-05T13:54:26',
'version' => '3.13'
},
{
'date' => '2005-12-06T22:14:19',
'version' => '3.14'
},
{
'date' => '2005-12-07T20:16:49',
'version' => '3.15'
},
{
'date' => '2006-02-08T18:50:56',
'version' => '3.16'
},
{
'date' => '2006-02-24T19:04:58',
'version' => '3.17'
},
{
'date' => '2006-04-17T13:56:06',
'version' => '3.19'
},
{
'date' => '2006-04-23T14:27:55',
'version' => '3.20'
},
{
'date' => '2006-08-21T19:12:36',
'version' => '3.21'
},
{
'date' => '2006-08-23T15:24:41',
'version' => '3.22'
},
{
'date' => '2006-08-24T11:53:26',
'version' => '3.23'
},
{
'date' => '2006-09-28T17:09:45',
'version' => '3.25'
},
{
'date' => '2007-02-27T15:42:54',
'version' => '3.27'
},
{
'date' => '2007-03-29T15:38:01',
'version' => '3.28'
},
{
'date' => '2007-04-16T17:00:18',
'version' => '3.29'
},
{
'date' => '2007-11-30T19:06:19',
'version' => '3.31'
},
{
'date' => '2007-12-27T18:41:32',
'version' => '3.32'
},
{
'date' => '2008-01-03T15:03:17',
'version' => '3.33'
},
{
'date' => '2008-03-18T16:04:41',
'version' => '3.34'
},
{
'date' => '2008-03-27T14:26:48',
'version' => '3.35'
},
{
'date' => '2008-04-23T13:09:44',
'version' => '3.37'
},
{
'date' => '2008-06-25T14:58:32',
'version' => '3.38'
},
{
'date' => '2008-07-29T15:01:52',
'version' => '3.39'
},
{
'date' => '2008-08-06T18:21:51',
'version' => '3.40'
},
{
'date' => '2008-08-26T13:56:27',
'version' => '3.41'
},
{
'date' => '2008-09-08T14:15:41',
'version' => '3.42'
},
{
'date' => '2009-04-06T18:35:19',
'version' => '3.43'
},
{
'date' => '2009-07-30T16:34:17',
'version' => '3.44'
},
{
'date' => '2009-08-14T13:37:12',
'version' => '3.45'
},
{
'date' => '2009-09-09T15:39:42',
'version' => '3.46'
},
{
'date' => '2009-09-09T20:03:01',
'version' => '3.47'
},
{
'date' => '2009-09-25T15:07:03',
'version' => '3.48'
},
{
'date' => '2010-02-05T16:24:53',
'version' => '3.49'
},
{
'date' => '2010-11-08T21:53:26',
'version' => '3.50'
},
{
'date' => '2011-01-05T18:28:41',
'version' => '3.51'
},
{
'date' => '2011-01-25T04:30:05',
'version' => '3.52'
},
{
'date' => '2011-04-25T23:01:21',
'version' => '3.53'
},
{
'date' => '2011-04-28T14:36:41',
'version' => '3.54'
},
{
'date' => '2011-06-03T15:39:16',
'version' => '3.55'
},
{
'date' => '2011-11-09T02:00:20',
'version' => '3.56'
},
{
'date' => '2011-11-09T15:59:18',
'version' => '3.57'
},
{
'date' => '2011-11-12T03:36:07',
'version' => '3.58'
},
{
'date' => '2011-12-30T13:35:35',
'version' => '3.59'
},
{
'date' => '2012-08-16T03:21:13',
'version' => '3.60'
},
{
'date' => '2012-11-03T02:10:42',
'version' => '3.61'
},
{
'date' => '2012-11-10T01:40:50',
'version' => '3.62'
},
{
'date' => '2012-11-14T23:45:29',
'version' => '3.63'
},
{
'date' => '2013-11-24T01:22:00',
'version' => '3.64'
},
{
'date' => '2014-02-12T03:13:58',
'version' => '3.65'
},
{
'date' => '2014-05-15T12:59:58',
'version' => '3.65_01'
},
{
'date' => '2014-05-16T11:43:33',
'version' => '3.65_02'
},
{
'date' => '2014-05-20T12:31:46',
'version' => '3.65_03'
},
{
'date' => '2014-05-22T19:58:14',
'version' => '4.00'
},
{
'date' => '2014-05-27T13:13:51',
'version' => '4.01'
},
{
'date' => '2014-06-09T13:55:49',
'version' => '4.02'
},
{
'date' => '2014-07-02T14:53:06',
'version' => '4.03'
},
{
'date' => '2014-07-28T18:30:34',
'version' => '4.03_01'
},
{
'date' => '2014-07-30T14:26:40',
'version' => '4.03_02'
},
{
'date' => '2014-08-13T11:40:14',
'version' => '4.03_03'
},
{
'date' => '2014-09-04T14:42:14',
'version' => '4.04'
},
{
'date' => '2014-09-20T16:08:55',
'version' => '4.04_01'
},
{
'date' => '2014-09-28T19:57:05',
'version' => '4.04_02'
},
{
'date' => '2014-09-29T09:50:07',
'version' => '4.04_03'
},
{
'date' => '2014-10-06T12:01:14',
'version' => '4.04_04'
},
{
'date' => '2014-10-06T12:24:10',
'version' => '4.04_05'
},
{
'date' => '2014-10-08T07:42:49',
'version' => '4.05'
},
{
'date' => '2014-10-10T11:35:49',
'version' => '4.06'
},
{
'date' => '2014-10-12T16:29:35',
'version' => '4.07'
},
{
'date' => '2014-10-18T11:00:38',
'version' => '4.08'
},
{
'date' => '2014-10-21T07:33:36',
'version' => '4.09'
},
{
'date' => '2014-11-25T21:06:50',
'version' => '4.09_01'
},
{
'date' => '2014-11-27T12:53:51',
'version' => '4.10'
},
{
'date' => '2014-11-30T12:12:26',
'version' => '4.10_01'
},
{
'date' => '2014-12-03T07:25:15',
'version' => '4.11'
},
{
'date' => '2014-12-18T08:35:52',
'version' => '4.12'
},
{
'date' => '2014-12-18T09:21:52',
'version' => '4.13'
},
{
'date' => '2015-02-12T14:19:13',
'version' => '4.13_01'
},
{
'date' => '2015-02-13T08:01:29',
'version' => '4.13_02'
},
{
'date' => '2015-03-01T13:28:25',
'version' => '4.13_03'
},
{
'date' => '2015-03-08T16:09:21',
'version' => '4.13_04'
},
{
'date' => '2015-03-25T17:55:15',
'version' => '4.13_05'
},
{
'date' => '2015-04-01T06:51:57',
'version' => '4.14'
},
{
'date' => '2015-04-17T14:27:39',
'version' => '4.14_01'
},
{
'date' => '2015-04-20T07:15:45',
'version' => '4.15'
},
{
'date' => '2015-05-29T14:48:42',
'version' => '4.20'
},
{
'date' => '2015-06-22T07:50:02',
'version' => '4.21'
},
{
'date' => '2015-10-16T09:46:31',
'version' => '4.22'
},
{
'date' => '2015-12-20T18:33:35',
'version' => '4.24'
},
{
'date' => '2015-12-21T09:29:19',
'version' => '4.25'
},
{
'date' => '2016-02-04T16:37:12',
'version' => '4.26'
},
{
'date' => '2016-03-02T08:03:46',
'version' => '4.27'
},
{
'date' => '2016-03-14T07:21:48',
'version' => '4.28'
},
{
'date' => '2016-05-22T12:23:19',
'version' => '4.28_01'
},
{
'date' => '2016-05-22T12:54:23',
'version' => '4.28_02'
},
{
'date' => '2016-05-23T08:25:25',
'version' => '4.28_03'
},
{
'date' => '2016-06-09T12:01:20',
'version' => '4.29'
},
{
'date' => '2016-06-09T12:11:54',
'version' => '4.30'
},
{
'date' => '2016-06-14T07:14:00',
'version' => '4.31'
},
{
'date' => '2016-07-19T07:05:46',
'version' => '4.32'
},
{
'date' => '2016-09-16T09:47:49',
'version' => '4.33'
},
{
'date' => '2016-10-13T11:58:55',
'version' => '4.34'
},
{
'date' => '2016-10-13T13:56:21',
'version' => '4.35'
},
{
'date' => '2017-03-29T08:56:26',
'version' => '4.35_01'
},
{
'date' => '2017-04-06T14:42:12',
'version' => '4.36'
},
{
'date' => '2017-11-01T10:17:40',
'version' => '4.37'
},
{
'date' => '2017-12-01T08:41:02',
'version' => '4.38'
},
{
'date' => '2018-08-13T15:57:52',
'version' => '4.39'
},
{
'date' => '2018-08-15T08:39:39',
'version' => '4.40'
},
{
'date' => '2019-03-26T15:58:49',
'version' => '4.41'
},
{
'date' => '2019-03-26T16:33:27',
'version' => '4.42'
},
{
'date' => '2019-05-01T14:28:45',
'version' => '4.43'
},
{
'date' => '2019-06-03T09:00:55',
'version' => '4.44'
},
{
'date' => '2020-01-13T07:03:55',
'version' => '4.45'
},
{
'date' => '2020-02-03T14:49:22',
'version' => '4.46'
},
{
'date' => '2020-05-01T13:01:44',
'version' => '4.47'
},
{
'date' => '2020-06-02T08:22:41',
'version' => '4.48'
},
{
'date' => '2020-06-08T09:46:25',
'version' => '4.49'
},
{
'date' => '2020-06-22T07:35:25',
'version' => '4.50'
},
{
'date' => '2020-10-05T06:14:39',
'version' => '4.51'
},
{
'date' => '2021-05-04T08:02:27',
'version' => '4.52'
},
{
'date' => '2021-06-03T06:45:55',
'version' => '4.53'
},
{
'date' => '2022-02-03T07:52:34',
'version' => '4.54'
},
{
'date' => '2023-01-03T07:45:53',
'version' => '4.55'
},
{
'date' => '2023-03-03T08:51:51',
'version' => '4.56'
},
{
'date' => '2023-05-02T13:16:01',
'version' => '4.57'
},
{
'date' => '2023-10-02T07:08:45',
'version' => '4.58'
},
{
'date' => '2023-10-02T07:14:30',
'version' => '4.59'
},
{
'date' => '2023-11-01T07:57:12',
'version' => '4.60'
},
{
'date' => '2024-01-08T15:17:04',
'version' => '4.61'
},
{
'date' => '2024-03-01T13:46:49',
'version' => '4.62'
},
{
'date' => '2024-03-06T15:20:30',
'version' => '4.63'
},
{
'date' => '2024-03-18T12:10:48',
'version' => '4.64'
},
{
'date' => '2024-06-04T15:15:17',
'version' => '4.65'
},
{
'date' => '2024-06-19T08:59:52',
'version' => '4.66'
},
{
'date' => '2025-01-08T15:27:45',
'version' => '4.67'
}
]
},
'CGI-Application' => {
'advisories' => [
{
'affected_versions' => [
'<4.50_51'
],
'cves' => [
'CVE-2013-7329'
],
'description' => 'The CGI::Application module before 4.50_50 and 4.50_51 for Perl, when run modes are not specified, allows remote attackers to obtain sensitive information (web queries and environment details) via vectors related to the dump_html function.
',
'distribution' => 'CGI-Application',
'fixed_versions' => [],
'id' => 'CPANSA-CGI-Application-2013-7329',
'references' => [
'https://github.com/markstos/CGI--Application/pull/15',
'http://openwall.com/lists/oss-security/2014/02/19/11',
'http://lists.fedoraproject.org/pipermail/package-announce/2014-March/129436.html',
'http://lists.fedoraproject.org/pipermail/package-announce/2014-March/129444.html',
'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=739505',
'http://www.securityfocus.com/bid/65687',
'https://rt.cpan.org/Public/Bug/Display.html?id=84403',
'https://bugzilla.redhat.com/show_bug.cgi?id=1067180',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/91735'
],
'reported' => '2014-10-06',
'severity' => undef
}
],
'main_module' => 'CGI::Application',
'versions' => [
{
'date' => '2000-07-11T04:23:51',
'version' => '1.0'
},
{
'date' => '2000-07-12T15:21:41',
'version' => '1.1'
},
{
'date' => '2000-07-18T21:11:44',
'version' => '1.2'
},
{
'date' => '2001-05-21T12:03:59',
'version' => '1.3'
},
{
'date' => '2001-05-28T18:29:06',
'version' => '1.31'
},
{
'date' => '2001-06-25T03:17:50',
'version' => '2.0'
},
{
'date' => '2001-08-11T22:18:28',
'version' => '2.1'
},
{
'date' => '2002-05-06T03:21:57',
'version' => '2.2'
},
{
'date' => '2002-05-06T11:57:30',
'version' => '2.3'
},
{
'date' => '2002-05-27T01:01:18',
'version' => '2.4'
},
{
'date' => '2002-07-18T11:59:16',
'version' => '2.5'
},
{
'date' => '2002-10-07T13:03:27',
'version' => '2.6'
},
{
'date' => '2003-02-01T13:52:45',
'version' => '3.0'
},
{
'date' => '2003-06-02T13:01:50',
'version' => '3.1'
},
{
'date' => '2004-02-04T03:23:56',
'version' => '3.2'
},
{
'date' => '2004-02-04T15:53:56',
'version' => '3.2'
},
{
'date' => '2004-02-14T01:47:53',
'version' => '3.22'
},
{
'date' => '2004-09-26T19:22:20',
'version' => '3.30'
},
{
'date' => '2004-09-26T19:35:26',
'version' => '3.31'
},
{
'date' => '2005-03-19T14:42:14',
'version' => '4.0_2'
},
{
'date' => '2005-06-07T03:25:55',
'version' => '4.0_4'
},
{
'date' => '2005-06-11T04:00:57',
'version' => '4.0'
},
{
'date' => '2005-06-13T19:15:12',
'version' => '4.01_01'
},
{
'date' => '2005-06-14T14:37:30',
'version' => '4.01'
},
{
'date' => '2005-07-24T19:08:18',
'version' => '4.02_1'
},
{
'date' => '2005-07-31T03:11:25',
'version' => '4.02'
},
{
'date' => '2005-08-04T23:45:52',
'version' => '4.03'
},
{
'date' => '2005-09-01T02:54:00',
'version' => '4.04_01'
},
{
'date' => '2005-09-09T01:12:21',
'version' => '4.04_02'
},
{
'date' => '2005-10-12T02:12:18',
'version' => '4.04'
},
{
'date' => '2006-03-02T01:58:41',
'version' => '4.05'
},
{
'date' => '2006-04-13T02:34:40',
'version' => '4.06'
},
{
'date' => '2006-07-02T05:05:34',
'version' => '4.07_01'
},
{
'date' => '2007-10-31T23:34:31',
'version' => '4.07_02'
},
{
'date' => '2008-06-16T20:09:18',
'version' => '4.07_03'
},
{
'date' => '2008-06-18T03:30:33',
'version' => '4.10'
},
{
'date' => '2008-08-10T15:36:00',
'version' => '4.11'
},
{
'date' => '2008-09-27T04:18:05',
'version' => '4.11'
},
{
'date' => '2008-11-02T00:43:18',
'version' => '4.11'
},
{
'date' => '2009-01-03T16:13:59',
'version' => '4.21'
},
{
'date' => '2009-07-30T01:35:48',
'version' => '4.30'
},
{
'date' => '2009-07-30T01:42:34',
'version' => '4.31'
},
{
'date' => '2010-02-14T00:33:00',
'version' => '4.32_1'
},
{
'date' => '2011-06-16T17:07:16',
'version' => '4.50'
},
{
'date' => '2015-01-23T12:19:21',
'version' => '4.50_50'
},
{
'date' => '2015-07-18T12:57:01',
'version' => '4.50_51'
},
{
'date' => '2018-02-28T13:57:05',
'version' => '4.60'
},
{
'date' => '2018-03-01T13:29:17',
'version' => '4.60_1'
},
{
'date' => '2018-03-02T09:20:24',
'version' => '4.61'
}
]
},
'CGI-Application-Dispatch' => {
'advisories' => [
{
'affected_versions' => [
'<1.02'
],
'cves' => [],
'description' => 'Untainted module names.
',
'distribution' => 'CGI-Application-Dispatch',
'fixed_versions' => [
'>=1.02'
],
'id' => 'CPANSA-CGI-Application-Dispatch-2005-001',
'references' => [
'https://metacpan.org/changes/distribution/CGI-Application-Dispatch'
],
'reported' => '2005-01-20'
}
],
'main_module' => 'CGI::Application::Dispatch',
'versions' => [
{
'date' => '2004-09-13T01:35:58',
'version' => '0.01'
},
{
'date' => '2004-10-19T18:26:01',
'version' => '0.02'
},
{
'date' => '2004-10-29T16:53:40',
'version' => '0.03'
},
{
'date' => '2005-01-06T15:34:49',
'version' => '1.00'
},
{
'date' => '2005-01-08T12:42:00',
'version' => '1.01'
},
{
'date' => '2005-01-20T14:43:28',
'version' => '1.02'
},
{
'date' => '2005-03-04T16:28:16',
'version' => '1.03'
},
{
'date' => '2005-07-12T21:44:54',
'version' => '1.04'
},
{
'date' => '2006-01-12T15:56:53',
'version' => '2.00_02'
},
{
'date' => '2006-02-06T15:50:52',
'version' => '2.00_03'
},
{
'date' => '2006-02-14T15:41:25',
'version' => '2.00_04'
},
{
'date' => '2006-04-12T14:18:22',
'version' => '2.00_05'
},
{
'date' => '2006-06-27T04:29:04',
'version' => '2.00_06'
},
{
'date' => '2006-07-03T15:52:12',
'version' => '2.00'
},
{
'date' => '2006-08-14T14:14:10',
'version' => '2.01'
},
{
'date' => '2006-08-17T14:57:55',
'version' => '2.02'
},
{
'date' => '2006-09-30T02:13:40',
'version' => '2.03'
},
{
'date' => '2007-01-03T18:12:57',
'version' => '2.10_01'
},
{
'date' => '2007-01-11T18:55:41',
'version' => '2.10_02'
},
{
'date' => '2007-01-15T14:08:30',
'version' => '2.10'
},
{
'date' => '2007-12-28T20:23:49',
'version' => '2.11'
},
{
'date' => '2007-12-31T20:43:51',
'version' => '2.12_01'
},
{
'date' => '2008-01-03T14:39:57',
'version' => '2.12'
},
{
'date' => '2008-03-08T18:33:34',
'version' => '2.13_01'
},
{
'date' => '2008-03-11T16:41:27',
'version' => '2.13_02'
},
{
'date' => '2008-09-17T00:44:02',
'version' => '2.13'
},
{
'date' => '2008-11-03T01:33:21',
'version' => '2.14'
},
{
'date' => '2008-12-04T16:00:05',
'version' => '2.15'
},
{
'date' => '2009-03-24T02:03:51',
'version' => '2.16'
},
{
'date' => '2009-12-30T19:06:27',
'version' => '2.17'
},
{
'date' => '2011-01-05T03:42:59',
'version' => '2.18'
},
{
'date' => '2011-06-16T17:42:14',
'version' => '3.00'
},
{
'date' => '2011-06-24T02:53:20',
'version' => '3.01'
},
{
'date' => '2011-06-24T22:33:01',
'version' => '3.02'
},
{
'date' => '2011-06-26T03:52:14',
'version' => '3.03'
},
{
'date' => '2011-06-29T13:45:53',
'version' => '3.04'
},
{
'date' => '2011-09-07T22:21:15',
'version' => '3.05'
},
{
'date' => '2011-09-09T15:29:58',
'version' => '3.06'
},
{
'date' => '2011-09-09T17:32:11',
'version' => '3.07'
},
{
'date' => '2012-09-03T04:04:19',
'version' => '3.10'
},
{
'date' => '2012-09-14T01:02:58',
'version' => '3.11'
},
{
'date' => '2012-09-14T01:19:52',
'version' => '3.12'
}
]
},
'CGI-Application-Plugin-AutoRunmode' => {
'advisories' => [
{
'affected_versions' => [
'<0.04'
],
'cves' => [],
'description' => 'Non-word characters are allowed in runmode name.
',
'distribution' => 'CGI-Application-Plugin-AutoRunmode',
'fixed_versions' => [
'>=0.04'
],
'id' => 'CPANSA-CGI-Application-Plugin-AutoRunmode-2005-01',
'references' => [
'https://metacpan.org/changes/distribution/CGI-Application-Plugin-AutoRunmode'
],
'reported' => '2005-03-04'
}
],
'main_module' => 'CGI::Application::Plugin::AutoRunmode',
'versions' => [
{
'date' => '2005-03-04T06:59:51',
'version' => '0.04'
},
{
'date' => '2005-03-10T07:22:55',
'version' => '0.05'
},
{
'date' => '2005-06-15T10:20:17',
'version' => '0.06'
},
{
'date' => '2005-06-18T02:09:08',
'version' => '0.07'
},
{
'date' => '2005-07-17T00:49:10',
'version' => '0.08'
},
{
'date' => '2005-09-22T12:31:22',
'version' => '0.09'
},
{
'date' => '2005-10-16T00:17:47',
'version' => '0.10'
},
{
'date' => '2005-10-18T13:23:50',
'version' => '0.11'
},
{
'date' => '2005-11-03T01:10:37',
'version' => '0.12'
},
{
'date' => '2006-04-08T07:18:44',
'version' => '0.13'
},
{
'date' => '2006-05-21T05:04:48',
'version' => '0.14'
},
{
'date' => '2006-12-17T07:46:24',
'version' => '0.15'
},
{
'date' => '2009-02-14T09:16:39',
'version' => '0.16'
},
{
'date' => '2010-05-21T04:24:45',
'version' => '0.17'
},
{
'date' => '2011-02-18T09:23:15',
'version' => '0.18'
}
]
},
'CGI-Application-Plugin-CAPTCHA' => {
'advisories' => [
{
'affected_versions' => [
'<0.02'
],
'cves' => [],
'description' => 'A malicious programmer creating an application to use the service can just have his application send along a cookie that he has created himself, and with that supply an appropriate verification string for his cookie. To avoid that you need to include som kind of hidden server-side password in the string being encrypted, and also include it when you verify.
',
'distribution' => 'CGI-Application-Plugin-CAPTCHA',
'fixed_versions' => [
'>=0.02'
],
'id' => 'CPANSA-CGI-Application-Plugin-CAPTCHA-2024-001',
'references' => [
'https://rt.cpan.org/Public/Bug/Display.html?id=30759',
'https://metacpan.org/release/CROMEDOME/CGI-Application-Plugin-CAPTCHA-0.02/changes',
'https://github.com/cromedome/cgi-application-plugin-captcha/commit/9acb5b6561a9983787ad85f55b01c69a895014e6'
],
'reported' => undef,
'severity' => undef
}
],
'main_module' => 'CGI::Application::Plugin::CAPTCHA',
'versions' => [
{
'date' => '2005-08-28T18:31:21',
'version' => '0.01'
},
{
'date' => '2011-01-05T05:07:55',
'version' => '0.02'
},
{
'date' => '2011-01-05T05:10:54',
'version' => '0.03'
},
{
'date' => '2011-01-06T14:08:56',
'version' => '0.04'
}
]
},
'CGI-Application-Plugin-RunmodeDeclare' => {
'advisories' => [
{
'affected_versions' => [
'<0.03'
],
'cves' => [],
'description' => 'Wrong order of arguments.
',
'distribution' => 'CGI-Application-Plugin-RunmodeDeclare',
'fixed_versions' => [
'>=0.03'
],
'id' => 'CPANSA-CGI-Application-Plugin-RunmodeDeclare-2008-01',
'references' => [
'https://metacpan.org/changes/distribution/CGI-Application-Plugin-RunmodeDeclare'
],
'reported' => '2008-10-20'
}
],
'main_module' => 'CGI::Application::Plugin::RunmodeDeclare',
'versions' => [
{
'date' => '2008-09-26T19:59:14',
'version' => '0.01'
},
{
'date' => '2008-09-26T21:37:11',
'version' => '0.02'
},
{
'date' => '2008-10-19T23:22:06',
'version' => '0.03'
},
{
'date' => '2008-10-23T14:18:23',
'version' => '0.03_01'
},
{
'date' => '2008-10-24T13:32:43',
'version' => '0.03_02'
},
{
'date' => '2008-10-24T16:20:27',
'version' => '0.03_03'
},
{
'date' => '2008-10-25T10:54:25',
'version' => '0.04'
},
{
'date' => '2008-10-25T11:46:28',
'version' => '0.05'
},
{
'date' => '2008-10-25T16:39:34',
'version' => '0.06'
},
{
'date' => '2009-01-10T02:32:39',
'version' => '0.07'
},
{
'date' => '2009-05-17T22:29:18',
'version' => '0.08'
},
{
'date' => '2010-01-07T13:24:09',
'version' => '0.09'
},
{
'date' => '2012-02-10T00:53:54',
'version' => '0.10'
}
]
},
'CGI-Auth-Basic' => {
'advisories' => [
{
'affected_versions' => [
'<1.11'
],
'cves' => [],
'description' => 'TBD
',
'distribution' => 'CGI-Auth-Basic',
'fixed_versions' => [
'>=1.11'
],
'id' => 'CPANSA-CGI-Auth-Basic-2007-01',
'references' => [
'https://metacpan.org/changes/distribution/CGI-Auth-Basic'
],
'reported' => '2007-12-30'
}
],
'main_module' => 'CGI::Auth::Basic',
'versions' => [
{
'date' => '2004-02-21T14:58:09',
'version' => '1.0'
},
{
'date' => '2004-08-31T13:29:28',
'version' => '1.01'
},
{
'date' => '2004-11-07T03:34:32',
'version' => '1.02'
},
{
'date' => '2006-06-18T01:12:15',
'version' => '1.10'
},
{
'date' => '2007-12-30T20:53:33',
'version' => '1.11'
},
{
'date' => '2009-04-18T04:22:51',
'version' => '1.20'
},
{
'date' => '2009-04-23T17:00:50',
'version' => '1.21'
},
{
'date' => '2009-04-24T15:07:48',
'version' => '1.21'
},
{
'date' => '2012-08-27T01:50:53',
'version' => '1.22'
},
{
'date' => '2015-01-21T00:26:01',
'version' => '1.23'
},
{
'date' => '2018-12-23T21:03:03',
'version' => '1.24'
}
]
},
'CGI-Session' => {
'advisories' => [
{
'affected_versions' => [
'<4.10'
],
'cves' => [
'CVE-2006-1279'
],
'description' => 'CGI::Session 4.03-1 allows local users to overwrite arbitrary files via a symlink attack on temporary files used by (1) Driver::File, (2) Driver::db_file, and possibly (3) Driver::sqlite.
',
'distribution' => 'CGI-Session',
'fixed_versions' => [],
'id' => 'CPANSA-CGI-Session-2006-1279',
'references' => [
'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=356555',
'http://secunia.com/advisories/19211',
'http://www.securityfocus.com/bid/17177',
'http://www.osvdb.org/23865',
'http://www.vupen.com/english/advisories/2006/0946',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/25285'
],
'reported' => '2006-03-19',
'severity' => undef
},
{
'affected_versions' => [
'<4.12'
],
'cves' => [],
'description' => 'possible SQL injection attack
',
'distribution' => 'CGI-Session',
'fixed_versions' => [
'>=4.12'
],
'id' => 'CPANSA-CGI-Session-2006-01',
'references' => [
'https://rt.cpan.org/Public/Bug/Display.html?id=18578'
],
'reported' => '2006-04-06',
'severity' => undef
}
],
'main_module' => 'CGI::Session',
'versions' => [
{
'date' => '2001-10-30T08:59:10',
'version' => '0.01'
},
{
'date' => '2002-05-10T12:04:15',
'version' => '2.0'
},
{
'date' => '2002-05-10T17:38:46',
'version' => '2.1'
},
{
'date' => '2002-05-14T18:21:39',
'version' => '2.2'
},
{
'date' => '2002-05-17T18:02:23',
'version' => '2.4'
},
{
'date' => '2002-05-27T09:52:46',
'version' => '2.7'
},
{
'date' => '2002-06-06T08:08:21',
'version' => '2.9'
},
{
'date' => '2002-06-06T08:36:26',
'version' => '2.91'
},
{
'date' => '2002-06-18T18:15:57',
'version' => '2.92'
},
{
'date' => '2002-08-26T08:23:54',
'version' => '2.94'
},
{
'date' => '2002-11-27T07:20:47',
'version' => '3.1'
},
{
'date' => '2002-11-27T12:27:59',
'version' => '3.2'
},
{
'date' => '2002-11-28T03:19:31',
'version' => 'v3.2.2.1'
},
{
'date' => '2002-11-28T03:26:41',
'version' => '3.3'
},
{
'date' => '2002-11-28T03:44:39',
'version' => '3.4'
},
{
'date' => '2002-11-28T06:55:29',
'version' => '3.5'
},
{
'date' => '2002-11-28T17:12:32',
'version' => '3.6'
},
{
'date' => '2002-11-29T21:29:53',
'version' => '3.7'
},
{
'date' => '2002-12-03T16:26:55',
'version' => '3.8'
},
{
'date' => '2002-12-04T07:37:02',
'version' => '3.9'
},
{
'date' => '2002-12-09T09:02:18',
'version' => '3.10'
},
{
'date' => '2002-12-09T20:09:24',
'version' => '3.11'
},
{
'date' => '2003-03-09T11:26:21',
'version' => '3.91'
},
{
'date' => '2003-03-10T02:42:16',
'version' => '3.92'
},
{
'date' => '2003-03-14T13:21:20',
'version' => '3.93'
},
{
'date' => '2003-05-02T20:12:40',
'version' => '3.94'
},
{
'date' => '2003-07-26T13:51:31',
'version' => '3.95'
},
{
'date' => '2005-02-09T08:35:23',
'version' => '4.00_01'
},
{
'date' => '2005-02-09T09:54:17',
'version' => '4.00_02'
},
{
'date' => '2005-02-11T08:23:00',
'version' => '4.00_03'
},
{
'date' => '2005-02-17T03:24:21',
'version' => '4.00_04'
},
{
'date' => '2005-02-22T17:56:43',
'version' => '4.00_05'
},
{
'date' => '2005-02-24T18:46:45',
'version' => '4.00_06'
},
{
'date' => '2005-03-13T19:18:37',
'version' => '4.00_07'
},
{
'date' => '2005-03-15T16:48:17',
'version' => '4.00_08'
},
{
'date' => '2005-07-22T02:00:21',
'version' => '4.00_09'
},
{
'date' => '2005-09-01T05:57:49',
'version' => '4.00'
},
{
'date' => '2005-09-01T16:25:46',
'version' => '4.01'
},
{
'date' => '2005-09-02T15:51:20',
'version' => '4.02'
},
{
'date' => '2005-09-24T02:12:22',
'version' => '4.02_01'
},
{
'date' => '2005-10-05T23:22:54',
'version' => '4.03'
},
{
'date' => '2006-03-02T03:00:28',
'version' => '4.04'
},
{
'date' => '2006-03-04T00:08:26',
'version' => '4.05'
},
{
'date' => '2006-03-09T03:13:06',
'version' => '4.06'
},
{
'date' => '2006-03-09T12:09:28',
'version' => '4.07'
},
{
'date' => '2006-03-16T02:38:25',
'version' => '4.08'
},
{
'date' => '2006-03-17T04:08:57',
'version' => '4.09'
},
{
'date' => '2006-03-28T07:00:52',
'version' => '4.10'
},
{
'date' => '2006-04-03T19:33:30',
'version' => '4.11'
},
{
'date' => '2006-04-07T14:34:06',
'version' => '4.12'
},
{
'date' => '2006-04-12T17:05:18',
'version' => '4.13'
},
{
'date' => '2006-06-11T11:36:57',
'version' => '4.14'
},
{
'date' => '2006-11-24T14:10:38',
'version' => '4.20_1'
},
{
'date' => '2006-12-05T02:08:37',
'version' => '4.20'
},
{
'date' => '2008-03-22T02:42:57',
'version' => '4.29_1'
},
{
'date' => '2008-03-28T01:45:56',
'version' => '4.29_2'
},
{
'date' => '2008-04-26T01:31:34',
'version' => '4.30'
},
{
'date' => '2008-06-16T14:44:06',
'version' => '4.31'
},
{
'date' => '2008-06-17T21:35:03',
'version' => '4.32'
},
{
'date' => '2008-07-08T01:27:59',
'version' => '4.33'
},
{
'date' => '2008-07-13T02:39:59',
'version' => '4.34'
},
{
'date' => '2008-07-16T00:36:46',
'version' => '4.35'
},
{
'date' => '2008-09-13T15:45:06',
'version' => '4.36'
},
{
'date' => '2008-10-23T02:57:30',
'version' => '4.37'
},
{
'date' => '2008-11-01T03:47:46',
'version' => '4.38'
},
{
'date' => '2008-12-16T01:22:42',
'version' => '4.39'
},
{
'date' => '2009-01-03T01:18:15',
'version' => '4.40'
},
{
'date' => '2009-03-21T02:01:09',
'version' => '4.41'
},
{
'date' => '2009-08-26T13:38:39',
'version' => '4.42'
},
{
'date' => '2010-12-12T00:32:27',
'version' => '4.43'
},
{
'date' => '2011-06-06T20:48:07',
'version' => '4.44'
},
{
'date' => '2011-07-02T01:33:33',
'version' => '4.45'
},
{
'date' => '2011-07-08T14:34:42',
'version' => '4.46'
},
{
'date' => '2011-07-08T19:31:44',
'version' => '4.47'
},
{
'date' => '2011-07-11T13:02:37',
'version' => '4.48'
},
{
'date' => '2021-02-08T07:00:20',
'version' => '4.49'
}
]
},
'CGI-Simple' => {
'advisories' => [
{
'affected_versions' => [
'<1.113'
],
'cves' => [
'CVE-2010-4410'
],
'description' => 'Newlines in headers, which could lead to header injection attacks.
',
'distribution' => 'CGI-Simple',
'fixed_versions' => [
'>=1.113'
],
'id' => 'CPANSA-CGI-Simple-2010-02',
'references' => [
'https://metacpan.org/changes/distribution/CGI-Simple'
],
'reported' => '2010-12-27'
},
{
'affected_versions' => [
'<1.113'
],
'cves' => [],
'description' => 'Non-random multipart boundary.
',
'distribution' => 'CGI-Simple',
'fixed_versions' => [
'>=1.113'
],
'id' => 'CPANSA-CGI-Simple-2010-01',
'references' => [
'https://metacpan.org/changes/distribution/CGI-Simple'
],
'reported' => '2010-12-27'
},
{
'affected_versions' => [
'<=1.112'
],
'cves' => [
'CVE-2010-2761'
],
'description' => 'The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172.
',
'distribution' => 'CGI-Simple',
'fixed_versions' => [],
'id' => 'CPANSA-CGI-Simple-2010-2761',
'references' => [
'https://github.com/AndyA/CGI--Simple/commit/e4942b871a26c1317a175a91ebb7262eea59b380',
'http://cpansearch.perl.org/src/LDS/CGI.pm-3.50/Changes',
'http://openwall.com/lists/oss-security/2010/12/01/1',
'http://www.nntp.perl.org/group/perl.perl5.changes/2010/11/msg28043.html',
'http://perl5.git.perl.org/perl.git/blobdiff/a0b94c2432b1d8c20653453a0f6970cb10f59aec..84601d63a7e34958da47dad1e61e27cb3bd467d1:/cpan/CGI/lib/CGI.pm',
'http://perl5.git.perl.org/perl.git/commit/84601d63a7e34958da47dad1e61e27cb3bd467d1',
'http://openwall.com/lists/oss-security/2010/12/01/2',
'http://openwall.com/lists/oss-security/2010/12/01/3',
'https://bugzilla.mozilla.org/show_bug.cgi?id=600464',
'http://osvdb.org/69588',
'http://osvdb.org/69589',
'http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html',
'http://www.mandriva.com/security/advisories?name=MDVSA-2010:237',
'http://www.vupen.com/english/advisories/2011/0076',
'http://www.mandriva.com/security/advisories?name=MDVSA-2010:250',
'http://secunia.com/advisories/42877',
'https://bugzilla.mozilla.org/show_bug.cgi?id=591165',
'http://www.vupen.com/english/advisories/2011/0207',
'http://www.bugzilla.org/security/3.2.9/',
'http://secunia.com/advisories/43033',
'http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053591.html',
'http://secunia.com/advisories/43147',
'http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053576.html',
'http://www.vupen.com/english/advisories/2011/0249',
'http://www.vupen.com/english/advisories/2011/0271',
'http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html',
'http://www.vupen.com/english/advisories/2011/0212',
'http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html',
'http://secunia.com/advisories/43165',
'http://secunia.com/advisories/43068',
'http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html',
'http://www.redhat.com/support/errata/RHSA-2011-1797.html',
'http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html',
'http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735',
'http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705'
],
'reported' => '2010-12-06',
'severity' => undef
}
],
'main_module' => 'CGI::Simple',
'versions' => [
{
'date' => '2007-01-09T22:31:27',
'version' => '0.078'
},
{
'date' => '2007-02-23T16:22:19',
'version' => '0.079'
},
{
'date' => '2007-03-30T20:15:35',
'version' => '0.080'
},
{
'date' => '2007-05-20T19:19:40',
'version' => '0.081'
},
{
'date' => '2007-05-22T18:43:01',
'version' => '0.082'
},
{
'date' => '2007-05-22T18:54:06',
'version' => '0.83'
},
{
'date' => '2007-05-24T03:15:01',
'version' => '1.0'
},
{
'date' => '2007-07-13T18:58:16',
'version' => '1.1'
},
{
'date' => '2007-07-31T01:57:01',
'version' => '1.1.1'
},
{
'date' => '2007-07-31T02:04:25',
'version' => '1.1.2'
},
{
'date' => '2007-07-31T02:10:47',
'version' => '1.103'
},
{
'date' => '2008-05-13T15:46:18',
'version' => '1.104'
},
{
'date' => '2008-05-16T14:37:31',
'version' => '1.105'
},
{
'date' => '2008-09-14T13:29:51',
'version' => '1.106'
},
{
'date' => '2009-03-07T21:24:59',
'version' => '1.107'
},
{
'date' => '2009-03-13T14:06:24',
'version' => '1.108'
},
{
'date' => '2009-04-16T17:54:13',
'version' => '1.109'
},
{
'date' => '2009-05-24T21:25:22',
'version' => '1.110'
},
{
'date' => '2009-05-28T18:02:08',
'version' => '1.111'
},
{
'date' => '2009-05-31T10:43:56',
'version' => '1.112'
},
{
'date' => '2010-12-27T13:11:56',
'version' => '1.113'
},
{
'date' => '2014-10-19T12:53:24',
'version' => '1.115'
},
{
'date' => '2018-03-01T15:09:42',
'version' => '1.13'
},
{
'date' => '2018-03-03T10:42:06',
'version' => '1.14'
},
{
'date' => '2018-03-04T03:42:20',
'version' => '1.15'
},
{
'date' => '2018-07-25T15:17:39',
'version' => '1.16'
},
{
'date' => '2018-10-02T09:48:08',
'version' => '1.17'
},
{
'date' => '2018-10-03T14:21:12',
'version' => '1.18'
},
{
'date' => '2018-10-04T12:05:58',
'version' => '1.19'
},
{
'date' => '2018-10-05T11:30:05',
'version' => '1.20'
},
{
'date' => '2018-10-06T07:21:31',
'version' => '1.21'
},
{
'date' => '2019-09-07T04:28:17',
'version' => '1.22'
},
{
'date' => '2020-02-06T06:12:09',
'version' => '1.23'
},
{
'date' => '2020-02-07T11:11:56',
'version' => '1.24'
},
{
'date' => '2020-02-10T13:00:54',
'version' => '1.25'
},
{
'date' => '2022-01-02T18:00:56',
'version' => '1.26'
},
{
'date' => '2022-01-06T16:00:18',
'version' => '1.27'
},
{
'date' => '2022-01-11T15:16:20',
'version' => '1.280'
},
{
'date' => '2024-01-31T14:19:02',
'version' => '1.281'
}
]
},
'CGI-apacheSSI' => {
'advisories' => [
{
'affected_versions' => [
'<0.95'
],
'cves' => [],
'description' => 'Security and parsing problems with "include" calls.
',
'distribution' => 'CGI-apacheSSI',
'fixed_versions' => [
'>=0.95'
],
'id' => 'CPANSA-CGI-apacheSSI-2016-01',
'references' => [
'https://metacpan.org/changes/distribution/CGI-apacheSSI'
],
'reported' => '2016-01-31'
}
],
'main_module' => 'CGI::apacheSSI',
'versions' => [
{
'date' => '2014-08-20T22:55:20',
'version' => '0.93'
},
{
'date' => '2016-01-30T12:57:47',
'version' => '0.94'
},
{
'date' => '2016-01-31T22:48:55',
'version' => '0.95'
},
{
'date' => '2016-02-01T00:36:49',
'version' => '0.96'
}
]
},
'CPAN' => {
'advisories' => [
{
'affected_versions' => [
'<2.35'
],
'cves' => [
'CVE-2023-31484'
],
'description' => 'The verify_SSL flag is missing from HTTP::Tiny, and allows a network attacker to MITM the connection if it is used by the CPAN client
',
'distribution' => 'CPAN',
'fixed_versions' => [
'>=2.35'
],
'id' => 'CPANSA-CPAN-2023-31484',
'previous_id' => [
'CPANSA-CPAN-2023-01'
],
'references' => [
'https://github.com/andk/cpanpm/commit/9c98370287f4e709924aee7c58ef21c85289a7f0',
'https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/',
'https://github.com/andk/cpanpm/pull/175',
'https://www.openwall.com/lists/oss-security/2023/04/18/14'
],
'reported' => '2023-02-28'
},
{
'affected_versions' => [
'<1.93'
],
'cves' => [],
'description' => 'Archive::Tar preserves permissions in the tarball; extracted file permissions will be set from users umask instead.
',
'distribution' => 'CPAN',
'fixed_versions' => [
'>=1.93'
],
'id' => 'CPANSA-CPAN-2009-01',
'references' => [
'https://github.com/andk/cpanpm/commit/079fa2e7ee77d626eab8bb06d0465c6a05f6c8b6',
'https://rt.cpan.org/Ticket/Display.html?id=46384'
],
'reported' => '2009-09-23'
},
{
'affected_versions' => [
'<2.28'
],
'cves' => [
'CVE-2020-16156'
],
'description' => 'CPAN 2.28 allows Signature Verification Bypass.',
'distribution' => 'CPAN',
'fixed_versions' => [
'>=2.29'
],
'id' => 'CPANSA-CPAN-2020-16156',
'references' => [
'https://metacpan.org/pod/distribution/CPAN/scripts/cpan',
'https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/',
'http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/'
],
'reported' => '2021-12-13',
'severity' => 'high'
}
],
'main_module' => 'CPAN',
'versions' => [
{
'date' => '1996-09-10T17:13:59',
'version' => '0.17'
},
{
'date' => '1996-09-10T20:51:00',
'version' => '0.20'
},
{
'date' => '1996-09-12T05:53:35',
'version' => '0.26'
},
{
'date' => '1996-09-12T14:01:39',
'version' => '0.27'
},
{
'date' => '1996-09-16T20:18:59',
'version' => '0.28'
},
{
'date' => '1996-09-17T17:14:51',
'version' => '0.29'
},
{
'date' => '1996-09-19T05:24:17',
'version' => '0.30'
},
{
'date' => '1996-09-20T10:40:01',
'version' => '0.31'
},
{
'date' => '1996-09-22T19:30:33',
'version' => '0.35'
},
{
'date' => '1996-09-23T12:55:23',
'version' => '0.36'
},
{
'date' => '1996-09-23T14:05:44',
'version' => '0.37'
},
{
'date' => '1996-09-27T12:52:07',
'version' => '0.39'
},
{
'date' => '1996-09-28T20:51:31',
'version' => '0.40'
},
{
'date' => '1996-10-01T21:14:27',
'version' => '0.41'
},
{
'date' => '1996-11-17T07:56:02',
'version' => '0.42'
},
{
'date' => '1996-11-17T14:51:59',
'version' => '0.43'
},
{
'date' => '1996-11-30T17:04:28',
'version' => '0.44'
},
{
'date' => '1996-12-01T12:19:19',
'version' => '0.45'
},
{
'date' => '1996-12-01T18:24:17',
'version' => '0.46'
},
{
'date' => '1996-12-10T00:58:25',
'version' => '1.00'
},
{
'date' => '1996-12-10T10:17:15',
'version' => '1.01'
},
{
'date' => '1996-12-11T01:31:55',
'version' => '1.02'
},
{
'date' => '1996-12-21T03:10:23',
'version' => '1.03'
},
{
'date' => '1996-12-21T20:08:49',
'version' => '1.04'
},
{
'date' => '1996-12-22T13:04:58',
'version' => '1.05'
},
{
'date' => '1996-12-22T14:16:08',
'version' => '1.06'
},
{
'date' => '1996-12-23T04:05:01',
'version' => '1.07'
},
{
'date' => '1996-12-23T13:18:01',
'version' => '1.08'
},
{
'date' => '1996-12-24T00:46:19',
'version' => '1.09'
},
{
'date' => '1997-01-17T02:29:49',
'version' => '1.09_01'
},
{
'date' => '1997-01-21T01:06:40',
'version' => '1.10'
},
{
'date' => '1997-01-22T18:50:00',
'version' => '1.11'
},
{
'date' => '1997-01-23T00:07:58',
'version' => '1.12'
},
{
'date' => '1997-01-24T01:07:44',
'version' => '1.14'
},
{
'date' => '1997-01-24T12:32:12',
'version' => '1.15'
},
{
'date' => '1997-02-02T13:51:48',
'version' => '1.16_01'
},
{
'date' => '1997-02-02T21:05:12',
'version' => '1.17'
},
{
'date' => '1997-02-03T00:38:36',
'version' => '1.18'
},
{
'date' => '1997-02-03T09:13:48',
'version' => '1.19'
},
{
'date' => '1997-02-05T09:38:00',
'version' => '1.20'
},
{
'date' => '1997-02-11T06:32:42',
'version' => '1.21'
},
{
'date' => '1997-03-13T23:14:59',
'version' => '1.22_01'
},
{
'date' => '1997-03-31T12:03:55',
'version' => '1.23'
},
{
'date' => '1997-03-31T22:47:11',
'version' => '1.24'
},
{
'date' => '1997-06-30T18:13:23',
'version' => '1.25'
},
{
'date' => '1997-07-28T13:58:09',
'version' => '1.27'
},
{
'date' => '1997-08-04T06:09:33',
'version' => '1.28'
},
{
'date' => '1997-08-11T23:33:58',
'version' => '1.29'
},
{
'date' => '1997-08-29T14:34:37',
'version' => '1.30'
},
{
'date' => '1997-09-21T08:53:03',
'version' => '1.31'
},
{
'date' => '1997-09-23T18:45:50',
'version' => '1.3101'
},
{
'date' => '1998-01-02T18:22:35',
'version' => '1.32'
},
{
'date' => '1998-01-10T18:24:23',
'version' => '1.33'
},
{
'date' => '1998-02-03T18:06:41',
'version' => '1.35'
},
{
'date' => '1998-02-08T08:55:55',
'version' => '1.36'
},
{
'date' => '1998-06-12T06:51:25',
'version' => '1.37'
},
{
'date' => '1998-06-14T20:18:08',
'version' => '1.38'
},
{
'date' => '1998-07-24T20:13:41',
'version' => '1.40'
},
{
'date' => '1998-12-01T02:20:32',
'version' => '1.41'
},
{
'date' => '1998-12-01T07:58:35',
'version' => '1.42'
},
{
'date' => '1998-12-01T22:16:27',
'version' => '1.43'
},
{
'date' => '1998-12-03T17:07:54',
'version' => '1.43'
},
{
'date' => '1999-01-09T18:38:33',
'version' => '1.44'
},
{
'date' => '1999-01-10T19:38:27',
'version' => '1.44_51'
},
{
'date' => '1999-01-13T12:15:42',
'version' => '1.44_52'
},
{
'date' => '1999-01-15T09:26:40',
'version' => '1.44_53'
},
{
'date' => '1999-01-15T09:27:45',
'version' => '1.44_54'
},
{
'date' => '1999-01-23T14:56:16',
'version' => '1.45'
},
{
'date' => '1999-01-25T01:43:42',
'version' => '1.46'
},
{
'date' => '1999-01-25T13:11:23',
'version' => '1.47'
},
{
'date' => '1999-03-06T19:34:54',
'version' => '1.48'
},
{
'date' => '1999-05-22T16:45:00',
'version' => '1.49'
},
{
'date' => '1999-05-23T14:32:20',
'version' => '1.50'
},
{
'date' => '1999-10-23T03:06:39',
'version' => '1.50_01'
},
{
'date' => '1999-12-29T22:30:22',
'version' => '1.51'
},
{
'date' => '2000-01-08T15:32:55',
'version' => '1.52'
},
{
'date' => '2000-03-23T23:39:41',
'version' => '1.53'
},
{
'date' => '2000-03-25T22:51:15',
'version' => '1.54'
},
{
'date' => '2000-07-30T11:15:04',
'version' => '1.55'
},
{
'date' => '2000-08-01T20:47:09',
'version' => '1.56'
},
{
'date' => '2000-08-16T12:54:07',
'version' => '1.57'
},
{
'date' => '2000-08-21T19:44:18',
'version' => '1.57_51'
},
{
'date' => '2000-08-27T22:09:36',
'version' => '1.57_53'
},
{
'date' => '2000-08-30T16:54:50',
'version' => '1.57_54'
},
{
'date' => '2000-08-31T08:11:01',
'version' => '1.57_55'
},
{
'date' => '2000-08-31T22:16:21',
'version' => '1.57_56'
},
{
'date' => '2000-09-01T12:18:43',
'version' => '1.57_57'
},
{
'date' => '2000-09-03T22:19:20',
'version' => '1.57_58'
},
{
'date' => '2000-09-05T09:44:05',
'version' => '1.57_59'
},
{
'date' => '2000-09-05T19:55:34',
'version' => '1.57_60'
},
{
'date' => '2000-09-06T10:54:07',
'version' => '1.57_61'
},
{
'date' => '2000-09-08T02:19:06',
'version' => '1.57_62'
},
{
'date' => '2000-09-10T08:54:37',
'version' => '1.57_65'
},
{
'date' => '2000-09-12T08:46:40',
'version' => '1.57_66'
},
{
'date' => '2000-09-17T10:24:31',
'version' => '1.57_67'
},
{
'date' => '2000-10-08T14:25:04',
'version' => '1.57_68'
},
{
'date' => '2000-10-18T14:53:45',
'version' => '1.58'
},
{
'date' => '2000-10-21T14:21:06',
'version' => '1.58_51'
},
{
'date' => '2000-10-25T07:05:38',
'version' => '1.58_52'
},
{
'date' => '2000-10-26T11:03:29',
'version' => '1.58_53'
},
{
'date' => '2000-10-26T15:34:21',
'version' => '1.58_54'
},
{
'date' => '2000-10-27T07:59:03',
'version' => '1.58_55'
},
{
'date' => '2000-11-04T09:36:53',
'version' => '1.58_56'
},
{
'date' => '2000-11-06T19:30:27',
'version' => '1.58_57'
},
{
'date' => '2000-11-08T08:10:51',
'version' => '1.58_90'
},
{
'date' => '2000-11-13T10:26:38',
'version' => '1.58_91'
},
{
'date' => '2000-11-14T18:24:18',
'version' => '1.58_92'
},
{
'date' => '2000-11-15T07:19:56',
'version' => '1.58_93'
},
{
'date' => '2000-12-01T06:05:58',
'version' => '1.59'
},
{
'date' => '2000-12-01T08:19:58',
'version' => '1.59_51'
},
{
'date' => '2000-12-26T13:54:06',
'version' => '1.59_52'
},
{
'date' => '2001-01-02T16:37:24',
'version' => '1.59_53'
},
{
'date' => '2001-02-09T21:44:55',
'version' => '1.59_54'
},
{
'date' => '2002-04-19T13:29:54',
'version' => '1.60'
},
{
'date' => '2002-04-20T02:18:41',
'version' => '1.60'
},
{
'date' => '2002-04-21T11:31:25',
'version' => '1.60'
},
{
'date' => '2002-05-07T10:38:54',
'version' => '1.61'
},
{
'date' => '2002-07-28T10:51:47',
'version' => '1.62'
},
{
'date' => '2002-08-30T08:58:10',
'version' => '1.63'
},
{
'date' => '2003-02-06T10:04:06',
'version' => '1.64'
},
{
'date' => '2003-02-08T17:10:13',
'version' => '1.65'
},
{
'date' => '2003-03-04T19:38:21',
'version' => '1.70'
},
{
'date' => '2003-04-11T04:33:18',
'version' => '1.70_52'
},
{
'date' => '2003-04-13T12:43:40',
'version' => '1.70_53'
},
{
'date' => '2003-05-15T21:04:52',
'version' => '1.70_54'
},
{
'date' => '2003-07-04T09:48:08',
'version' => '1.71'
},
{
'date' => '2003-07-27T20:35:05',
'version' => '1.72'
},
{
'date' => '2003-07-28T08:21:47',
'version' => '1.73'
},
{
'date' => '2003-07-28T22:58:08',
'version' => '1.74'
},
{
'date' => '2003-07-29T15:14:13',
'version' => '1.75'
},
{
'date' => '2003-07-31T15:14:02',
'version' => '1.76'
},
{
'date' => '2003-09-21T21:25:41',
'version' => '1.76_01'
},
{
'date' => '2005-09-19T06:37:38',
'version' => '1.76_51'
},
{
'date' => '2005-09-22T07:02:02',
'version' => '1.76_52'
},
{
'date' => '2005-09-22T07:09:48',
'version' => '1.76_53'
},
{
'date' => '2005-10-01T08:23:38',
'version' => '1.76_54'
},
{
'date' => '2005-10-19T06:10:58',
'version' => '1.76_55'
},
{
'date' => '2005-10-21T04:59:36',
'version' => '1.76_56'
},
{
'date' => '2005-10-27T07:08:29',
'version' => '1.76_57'
},
{
'date' => '2005-11-02T04:03:28',
'version' => '1.76_58'
},
{
'date' => '2005-11-03T06:37:52',
'version' => '1.76_59'
},
{
'date' => '2005-11-03T07:38:40',
'version' => '1.76_60'
},
{
'date' => '2005-11-06T10:36:53',
'version' => '1.76_61'
},
{
'date' => '2005-11-07T04:22:19',
'version' => '1.76_62'
},
{
'date' => '2005-11-07T04:47:05',
'version' => '1.76_63'
},
{
'date' => '2005-11-07T21:58:06',
'version' => '1.76_64'
},
{
'date' => '2005-11-07T22:18:44',
'version' => '1.76_65'
},
{
'date' => '2005-12-03T10:12:08',
'version' => '1.80'
},
{
'date' => '2005-12-18T11:29:26',
'version' => '1.80_51'
},
{
'date' => '2005-12-21T12:13:15',
'version' => '1.80_53'
},
{
'date' => '2005-12-22T08:42:59',
'version' => '1.80_54'
},
{
'date' => '2005-12-24T07:25:34',
'version' => '1.80_55'
},
{
'date' => '2005-12-24T09:59:47',
'version' => '1.80_56'
},
{
'date' => '2005-12-31T11:58:10',
'version' => '1.80_57'
},
{
'date' => '2006-01-01T09:01:43',
'version' => '1.80_58'
},
{
'date' => '2006-01-02T23:15:15',
'version' => '1.81'
},
{
'date' => '2006-01-04T07:47:25',
'version' => '1.82'
},
{
'date' => '2006-01-05T08:03:36',
'version' => '1.83'
},
{
'date' => '2006-01-08T13:35:16',
'version' => '1.83_51'
},
{
'date' => '2006-01-10T05:00:26',
'version' => '1.83_52'
},
{
'date' => '2006-01-12T07:54:36',
'version' => '1.83_53'
},
{
'date' => '2006-01-13T08:20:42',
'version' => '1.83_54'
},
{
'date' => '2006-01-14T11:34:47',
'version' => '1.83_55'
},
{
'date' => '2006-01-18T06:03:44',
'version' => '1.83_56'
},
{
'date' => '2006-01-19T08:00:02',
'version' => '1.83_57'
},
{
'date' => '2006-01-22T12:05:01',
'version' => '1.83_58'
},
{
'date' => '2006-01-25T13:10:20',
'version' => '1.83_59'
},
{
'date' => '2006-01-30T10:35:47',
'version' => '1.83_60'
},
{
'date' => '2006-01-30T23:18:09',
'version' => '1.83_61'
},
{
'date' => '2006-01-31T10:28:57',
'version' => '1.83_62'
},
{
'date' => '2006-02-01T07:49:36',
'version' => '1.83_63'
},
{
'date' => '2006-02-02T09:17:39',
'version' => '1.83_64'
},
{
'date' => '2006-02-04T11:20:05',
'version' => '1.83_65'
},
{
'date' => '2006-02-04T17:05:00',
'version' => '1.83_66'
},
{
'date' => '2006-02-06T00:46:27',
'version' => '1.83_67'
},
{
'date' => '2006-02-08T07:43:36',
'version' => '1.83_68'
},
{
'date' => '2006-02-14T08:17:55',
'version' => '1.83_69'
},
{
'date' => '2006-02-15T07:01:02',
'version' => '1.84'
},
{
'date' => '2006-02-19T17:05:36',
'version' => '1.85'
},
{
'date' => '2006-02-20T08:36:51',
'version' => '1.86'
},
{
'date' => '2006-02-21T06:05:05',
'version' => '1.86_51'
},
{
'date' => '2006-02-22T22:29:54',
'version' => '1.86_52'
},
{
'date' => '2006-02-24T08:24:09',
'version' => '1.86_53'
},
{
'date' => '2006-02-27T07:01:10',
'version' => '1.87'
},
{
'date' => '2006-03-06T08:02:28',
'version' => '1.87_51'
},
{
'date' => '2006-07-21T22:33:11',
'version' => '1.87_52'
},
{
'date' => '2006-07-22T18:55:13',
'version' => '1.87_53'
},
{
'date' => '2006-07-23T21:37:11',
'version' => '1.87_54'
},
{
'date' => '2006-07-29T19:36:50',
'version' => '1.87_55'
},
{
'date' => '2006-08-24T05:57:41',
'version' => '1.87_56'
},
{
'date' => '2006-08-26T17:05:56',
'version' => '1.87_57'
},
{
'date' => '2006-08-31T06:50:49',
'version' => '1.87_58'
},
{
'date' => '2006-09-03T21:05:29',
'version' => '1.87_59'
},
{
'date' => '2006-09-10T11:57:33',
'version' => '1.87_61'
},
{
'date' => '2006-09-11T21:24:18',
'version' => '1.87_62'
},
{
'date' => '2006-09-13T05:44:15',
'version' => '1.87_63'
},
{
'date' => '2006-09-16T11:02:25',
'version' => '1.87_64'
},
{
'date' => '2006-09-19T03:44:51',
'version' => '1.87_65'
},
{
'date' => '2006-09-21T20:30:41',
'version' => '1.88'
},
{
'date' => '2006-09-22T20:40:40',
'version' => '1.8801'
},
{
'date' => '2006-09-30T10:41:20',
'version' => '1.88_51'
},
{
'date' => '2006-10-03T09:51:49',
'version' => '1.88_52'
},
{
'date' => '2006-10-09T19:31:56',
'version' => '1.88_53'
},
{
'date' => '2006-10-14T09:37:15',
'version' => '1.88_54'
},
{
'date' => '2006-10-16T06:59:27',
'version' => '1.88_55'
},
{
'date' => '2006-10-22T10:34:16',
'version' => '1.88_56'
},
{
'date' => '2006-10-23T07:17:30',
'version' => '1.8802'
},
{
'date' => '2006-10-24T07:18:16',
'version' => '1.88_57'
},
{
'date' => '2006-10-28T15:00:07',
'version' => '1.88_58'
},
{
'date' => '2006-11-05T21:24:52',
'version' => '1.88_59'
},
{
'date' => '2006-11-10T08:39:55',
'version' => '1.88_61'
},
{
'date' => '2006-11-13T07:44:27',
'version' => '1.88_62'
},
{
'date' => '2006-11-29T08:11:50',
'version' => '1.88_63'
},
{
'date' => '2006-12-04T07:53:37',
'version' => '1.88_64'
},
{
'date' => '2006-12-11T21:36:04',
'version' => '1.88_65'
},
{
'date' => '2006-12-19T08:21:17',
'version' => '1.88_66'
},
{
'date' => '2006-12-31T17:18:53',
'version' => '1.88_67'
},
{
'date' => '2007-01-07T21:22:12',
'version' => '1.88_68'
},
{
'date' => '2007-01-08T03:42:56',
'version' => '1.88_69'
},
{
'date' => '2007-01-27T16:57:49',
'version' => '1.88_71'
},
{
'date' => '2007-01-31T07:11:33',
'version' => '1.88_72'
},
{
'date' => '2007-02-13T05:24:13',
'version' => '1.88_73'
},
{
'date' => '2007-02-15T07:12:17',
'version' => '1.88_74'
},
{
'date' => '2007-02-18T16:52:49',
'version' => '1.88_75'
},
{
'date' => '2007-02-19T06:20:20',
'version' => '1.88_76'
},
{
'date' => '2007-02-19T21:26:47',
'version' => '1.88_77'
},
{
'date' => '2007-03-05T23:26:57',
'version' => '1.88_78'
},
{
'date' => '2007-03-16T01:54:55',
'version' => '1.88_79'
},
{
'date' => '2007-04-07T07:41:18',
'version' => '1.90'
},
{
'date' => '2007-04-19T07:03:03',
'version' => '1.91'
},
{
'date' => '2007-04-23T00:09:11',
'version' => '1.9101'
},
{
'date' => '2007-05-08T20:35:04',
'version' => '1.9102'
},
{
'date' => '2007-07-07T16:15:40',
'version' => '1.91_51'
},
{
'date' => '2007-07-14T18:45:58',
'version' => '1.91_52'
},
{
'date' => '2007-08-09T06:49:38',
'version' => '1.91_53'
},
{
'date' => '2007-09-14T21:18:33',
'version' => '1.91_54'
},
{
'date' => '2007-09-15T07:14:26',
'version' => '1.91_55'
},
{
'date' => '2007-09-23T11:15:08',
'version' => '1.92'
},
{
'date' => '2007-09-27T07:11:10',
'version' => '1.9201'
},
{
'date' => '2007-09-28T06:58:04',
'version' => '1.9202'
},
{
'date' => '2007-09-28T07:13:26',
'version' => '1.9203'
},
{
'date' => '2007-11-04T23:04:18',
'version' => '1.92_51'
},
{
'date' => '2007-11-05T23:30:06',
'version' => '1.9204'
},
{
'date' => '2007-11-11T11:27:20',
'version' => '1.92_52'
},
{
'date' => '2007-11-11T18:49:37',
'version' => '1.9205'
},
{
'date' => '2007-12-09T23:27:18',
'version' => '1.92_53'
},
{
'date' => '2007-12-27T04:57:34',
'version' => '1.92_54'
},
{
'date' => '2007-12-30T15:24:13',
'version' => '1.92_55'
},
{
'date' => '2008-02-04T21:56:28',
'version' => '1.92_56'
},
{
'date' => '2008-02-27T05:13:49',
'version' => '1.92_57'
},
{
'date' => '2008-03-12T07:56:18',
'version' => '1.92_58'
},
{
'date' => '2008-03-16T18:57:04',
'version' => '1.92_59'
},
{
'date' => '2008-03-26T07:53:08',
'version' => '1.92_60'
},
{
'date' => '2008-04-25T04:47:52',
'version' => '1.92_61'
},
{
'date' => '2008-05-23T04:07:04',
'version' => '1.92_62'
},
{
'date' => '2008-06-19T06:42:18',
'version' => '1.92_63'
},
{
'date' => '2008-09-03T05:27:35',
'version' => '1.92_64'
},
{
'date' => '2008-09-14T09:54:03',
'version' => '1.92_65'
},
{
'date' => '2008-09-29T23:15:10',
'version' => '1.92_66'
},
{
'date' => '2008-10-12T16:07:51',
'version' => '1.93'
},
{
'date' => '2008-10-13T19:37:43',
'version' => '1.9301'
},
{
'date' => '2009-01-11T22:07:01',
'version' => '1.93_02'
},
{
'date' => '2009-02-01T12:38:23',
'version' => '1.93_03'
},
{
'date' => '2009-02-01T21:06:21',
'version' => '1.93_51'
},
{
'date' => '2009-02-28T15:58:39',
'version' => '1.9304'
},
{
'date' => '2009-04-13T19:24:43',
'version' => '1.93_52'
},
{
'date' => '2009-05-04T06:11:28',
'version' => '1.93_53'
},
{
'date' => '2009-05-07T20:13:16',
'version' => '1.93_54'
},
{
'date' => '2009-05-24T05:37:28',
'version' => '1.94'
},
{
'date' => '2009-06-14T19:53:52',
'version' => '1.94_01'
},
{
'date' => '2009-06-27T02:55:22',
'version' => '1.9402'
},
{
'date' => '2009-09-14T02:47:24',
'version' => '1.94_51'
},
{
'date' => '2009-10-15T19:33:19',
'version' => '1.94_52'
},
{
'date' => '2009-12-18T07:00:09',
'version' => '1.94_53'
},
{
'date' => '2010-01-14T08:01:42',
'version' => '1.94_54'
},
{
'date' => '2010-02-03T03:43:49',
'version' => '1.94_55'
},
{
'date' => '2010-02-17T13:39:33',
'version' => '1.94_56'
},
{
'date' => '2010-05-24T19:33:41',
'version' => '1.94_57'
},
{
'date' => '2010-06-24T06:34:13',
'version' => '1.94_58'
},
{
'date' => '2010-09-26T20:23:30',
'version' => '1.94_59'
},
{
'date' => '2010-09-28T20:44:58',
'version' => '1.94_60'
},
{
'date' => '2010-10-03T17:29:37',
'version' => '1.94_61'
},
{
'date' => '2010-10-26T06:43:51',
'version' => '1.94_62'
},
{
'date' => '2011-01-16T17:58:10',
'version' => '1.94_63'
},
{
'date' => '2011-01-21T04:58:35',
'version' => '1.94_64'
},
{
'date' => '2011-02-14T12:10:12',
'version' => '1.94_65'
},
{
'date' => '2011-03-12T11:30:03',
'version' => '1.9600'
},
{
'date' => '2011-06-27T06:56:01',
'version' => '1.97_51'
},
{
'date' => '2011-08-07T09:40:33',
'version' => '1.9800'
},
{
'date' => '2012-10-16T21:42:49',
'version' => '1.99_51'
},
{
'date' => '2013-02-06T07:41:54',
'version' => '2.00-TRIAL'
},
{
'date' => '2013-04-12T16:57:44',
'version' => '2.00'
},
{
'date' => '2013-06-22T20:27:32',
'version' => '2.01-TRIAL'
},
{
'date' => '2013-06-23T07:33:40',
'version' => '2.02-TRIAL'
},
{
'date' => '2013-09-15T09:42:33',
'version' => '2.03-TRIAL'
},
{
'date' => '2014-03-18T22:33:22',
'version' => '2.04-TRIAL'
},
{
'date' => '2014-03-31T20:55:24',
'version' => '2.05-TRIAL'
},
{
'date' => '2014-04-04T02:07:20',
'version' => '2.05-TRIAL2'
},
{
'date' => '2014-04-18T13:35:51',
'version' => '2.05'
},
{
'date' => '2014-08-06T19:32:53',
'version' => '2.06-TRIAL'
},
{
'date' => '2015-01-04T18:54:54',
'version' => '2.06-TRIAL'
},
{
'date' => '2015-01-05T06:31:55',
'version' => '2.08-TRIAL'
},
{
'date' => '2015-02-02T04:41:02',
'version' => '2.09-TRIAL'
},
{
'date' => '2015-02-22T15:57:42',
'version' => '2.10-TRIAL'
},
{
'date' => '2015-03-13T07:45:04',
'version' => '2.10'
},
{
'date' => '2015-12-31T11:00:08',
'version' => '2.12-TRIAL'
},
{
'date' => '2016-05-16T09:56:01',
'version' => '2.13-TRIAL'
},
{
'date' => '2016-06-04T14:41:28',
'version' => '2.14-TRIAL'
},
{
'date' => '2016-06-25T04:32:45',
'version' => '2.14'
},
{
'date' => '2016-07-17T12:10:30',
'version' => '2.15-TRIAL'
},
{
'date' => '2017-01-16T16:20:27',
'version' => '2.16-TRIAL'
},
{
'date' => '2017-01-16T21:27:06',
'version' => '2.16-TRIAL2'
},
{
'date' => '2017-02-14T16:22:20',
'version' => '2.16'
},
{
'date' => '2017-02-15T09:37:10',
'version' => '2.17-TRIAL'
},
{
'date' => '2017-02-16T09:48:46',
'version' => '2.17-TRIAL2'
},
{
'date' => '2017-03-30T21:38:23',
'version' => '2.18-TRIAL'
},
{
'date' => '2017-11-04T23:27:47',
'version' => '2.19-TRIAL'
},
{
'date' => '2017-11-26T22:10:39',
'version' => '2.20-TRIAL'
},
{
'date' => '2018-09-22T20:46:35',
'version' => '2.21-TRIAL'
},
{
'date' => '2018-12-16T10:35:04',
'version' => '2.22-TRIAL'
},
{
'date' => '2018-12-23T09:11:29',
'version' => '2.22'
},
{
'date' => '2019-02-10T20:28:53',
'version' => '2.23-TRIAL'
},
{
'date' => '2019-02-14T21:21:03',
'version' => '2.24-TRIAL'
},
{
'date' => '2019-02-16T05:56:23',
'version' => '2.25-TRIAL'
},
{
'date' => '2019-03-03T06:27:10',
'version' => '2.25'
},
{
'date' => '2019-03-19T00:04:34',
'version' => '2.26'
},
{
'date' => '2019-05-31T21:11:50',
'version' => '2.27-TRIAL'
},
{
'date' => '2019-06-09T05:48:20',
'version' => '2.27-TRIAL2'
},
{
'date' => '2019-07-03T20:15:40',
'version' => '2.27'
},
{
'date' => '2020-04-03T02:52:43',
'version' => '2.28-TRIAL'
},
{
'date' => '2020-06-13T04:57:39',
'version' => '2.28'
},
{
'date' => '2021-11-23T16:58:45',
'version' => '2.29'
},
{
'date' => '2021-12-12T09:16:03',
'version' => '2.30-TRIAL'
},
{
'date' => '2021-12-14T20:52:30',
'version' => '2.31-TRIAL'
},
{
'date' => '2021-12-26T21:35:55',
'version' => '2.32-TRIAL'
},
{
'date' => '2022-01-21T04:09:07',
'version' => '2.33-TRIAL'
},
{
'date' => '2022-03-27T17:53:47',
'version' => '2.33'
},
{
'date' => '2022-04-03T19:19:13',
'version' => '2.34-TRIAL'
},
{
'date' => '2022-04-17T17:40:25',
'version' => '2.34'
},
{
'date' => '2023-04-15T14:44:27',
'version' => '2.35-TRIAL'
},
{
'date' => '2023-04-27T13:05:07',
'version' => '2.35'
},
{
'date' => '2023-05-10T07:08:30',
'version' => '2.36-TRIAL'
},
{
'date' => '2023-05-14T19:36:11',
'version' => '2.36'
},
{
'date' => '2024-08-18T17:03:50',
'version' => '2.37-TRIAL'
},
{
'date' => '2024-08-30T17:18:31',
'version' => '2.37'
},
{
'date' => '2024-10-03T10:21:39',
'version' => '2.38-TRIAL'
},
{
'date' => '2024-10-13T11:32:53',
'version' => '2.38-TRIAL2'
},
{
'date' => '2024-11-17T19:52:34',
'version' => '2.38'
}
]
},
'CPAN-Checksums' => {
'advisories' => [
{
'affected_versions' => [
'>=2.12'
],
'cves' => [
'CVE-2020-16155'
],
'description' => 'The CPAN::Checksums package 2.12 for Perl does not uniquely define signed data.
',
'distribution' => 'CPAN-Checksums',
'fixed_versions' => [],
'id' => 'CPANSA-CPAN-Checksums-2020-16155',
'references' => [
'https://metacpan.org/pod/CPAN::Checksums',
'https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/'
],
'reported' => '2021-12-13',
'severity' => 'medium'
}
],
'main_module' => 'CPAN::Checksums',
'versions' => [
{
'date' => '2000-12-10T09:31:19',
'version' => '1.003'
},
{
'date' => '2000-12-11T08:49:05',
'version' => '1.004'
},
{
'date' => '2000-12-11T10:20:16',
'version' => '1.006'
},
{
'date' => '2000-12-11T13:38:18',
'version' => '1.007'
},
{
'date' => '2000-12-13T11:24:09',
'version' => '1.008'
},
{
'date' => '2002-03-31T20:27:49',
'version' => '1.009'
},
{
'date' => '2002-10-06T17:22:35',
'version' => '1.0'
},
{
'date' => '2002-10-07T08:56:12',
'version' => '1.011'
},
{
'date' => '2003-02-02T10:26:00',
'version' => '1.014'
},
{
'date' => '2003-02-03T15:44:57',
'version' => '1.015'
},
{
'date' => '2003-02-03T19:21:46',
'version' => '1.016'
},
{
'date' => '2005-01-24T07:59:41',
'version' => '1.018'
},
{
'date' => '2005-10-31T07:27:02',
'version' => '1.032'
},
{
'date' => '2005-11-11T07:16:04',
'version' => '1.039'
},
{
'date' => '2006-05-01T13:34:41',
'version' => '1.048'
},
{
'date' => '2006-05-09T03:30:39',
'version' => '1.050'
},
{
'date' => '2007-08-05T12:10:58',
'version' => '1.061'
},
{
'date' => '2007-10-09T03:09:45',
'version' => '1.064'
},
{
'date' => '2008-05-17T05:26:24',
'version' => '2.00'
},
{
'date' => '2008-09-03T19:33:28',
'version' => '2.01'
},
{
'date' => '2008-10-31T06:54:59',
'version' => '2.02'
},
{
'date' => '2009-09-20T01:50:36',
'version' => '2.03'
},
{
'date' => '2009-09-28T04:10:09',
'version' => '2.04'
},
{
'date' => '2010-01-23T05:39:17',
'version' => '2.05'
},
{
'date' => '2010-10-24T12:13:44',
'version' => '2.06'
},
{
'date' => '2010-11-20T22:18:39',
'version' => '2.07'
},
{
'date' => '2011-08-30T06:32:02',
'version' => '2.08'
},
{
'date' => '2014-04-04T04:06:11',
'version' => '2.09'
},
{
'date' => '2015-04-11T05:48:38',
'version' => '2.10'
},
{
'date' => '2016-04-09T05:42:27',
'version' => '2.11'
},
{
'date' => '2016-06-14T02:42:03',
'version' => '2.12'
},
{
'date' => '2021-11-23T16:57:18',
'version' => '2.13'
},
{
'date' => '2021-12-04T10:00:42',
'version' => '2.14'
}
]
},
'Capture-Tiny' => {
'advisories' => [
{
'affected_versions' => [
'<0.24'
],
'cves' => [
'CVE-2014-1875'
],
'description' => 'The Capture::Tiny module before 0.24 for Perl allows local users to write to arbitrary files via a symlink attack on a temporary file.
',
'distribution' => 'Capture-Tiny',
'fixed_versions' => [],
'id' => 'CPANSA-Capture-Tiny-2014-1875',
'references' => [
'http://osvdb.org/102963',
'https://bugzilla.redhat.com/show_bug.cgi?id=1062424',
'http://www.securityfocus.com/bid/65475',
'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737835',
'https://github.com/dagolden/Capture-Tiny/issues/16',
'http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128882.html',
'https://github.com/dagolden/Capture-Tiny/commit/635c9eabd52ab8042b0c841823bd6e692de87924',
'http://cpansearch.perl.org/src/DAGOLDEN/Capture-Tiny-0.24/Changes',
'http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128823.html',
'http://seclists.org/oss-sec/2014/q1/272',
'http://seclists.org/oss-sec/2014/q1/267',
'http://secunia.com/advisories/56823',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/91464'
],
'reported' => '2014-10-06',
'severity' => undef
}
],
'main_module' => 'Capture::Tiny',
'versions' => [
{
'date' => '2009-02-14T04:25:26',
'version' => '0.01'
},
{
'date' => '2009-02-17T22:26:18',
'version' => '0.02'
},
{
'date' => '2009-02-20T18:09:46',
'version' => '0.03'
},
{
'date' => '2009-02-25T14:29:32',
'version' => '0.04'
},
{
'date' => '2009-03-03T11:58:12',
'version' => '0.05'
},
{
'date' => '2009-04-21T11:07:47',
'version' => '0.05_51'
},
{
'date' => '2009-05-07T10:57:33',
'version' => '0.06'
},
{
'date' => '2010-01-24T05:21:56',
'version' => '0.07'
},
{
'date' => '2010-06-20T23:17:16',
'version' => '0.08'
},
{
'date' => '2011-01-28T04:53:00',
'version' => '0.09'
},
{
'date' => '2011-02-07T12:02:15',
'version' => '0.10'
},
{
'date' => '2011-05-20T03:35:28',
'version' => '0.11'
},
{
'date' => '2011-12-01T22:00:04',
'version' => '0.12'
},
{
'date' => '2011-12-02T18:40:05',
'version' => '0.13'
},
{
'date' => '2011-12-22T15:16:31',
'version' => '0.14'
},
{
'date' => '2011-12-23T16:12:30',
'version' => '0.15'
},
{
'date' => '2012-02-13T02:06:15',
'version' => '0.16'
},
{
'date' => '2012-02-22T13:09:42',
'version' => '0.17'
},
{
'date' => '2012-03-07T23:25:31',
'version' => '0.17_51'
},
{
'date' => '2012-03-09T16:46:53',
'version' => '0.17_52'
},
{
'date' => '2012-05-04T20:33:43',
'version' => '0.18'
},
{
'date' => '2012-08-07T00:28:08',
'version' => '0.19'
},
{
'date' => '2012-09-19T17:22:24',
'version' => '0.20'
},
{
'date' => '2012-11-15T00:13:08',
'version' => '0.21'
},
{
'date' => '2013-03-27T19:52:10',
'version' => '0.22'
},
{
'date' => '2013-10-20T15:28:15',
'version' => '0.23'
},
{
'date' => '2014-02-06T22:18:06',
'version' => '0.24'
},
{
'date' => '2014-08-16T14:09:48',
'version' => '0.25'
},
{
'date' => '2014-11-04T11:57:19',
'version' => '0.26'
},
{
'date' => '2014-11-05T04:12:33',
'version' => '0.27'
},
{
'date' => '2015-02-11T11:41:44',
'version' => '0.28'
},
{
'date' => '2015-04-19T16:44:50',
'version' => '0.29'
},
{
'date' => '2015-05-16T00:45:01',
'version' => '0.30'
},
{
'date' => '2016-02-14T14:39:55',
'version' => '0.31'
},
{
'date' => '2016-02-18T15:14:06',
'version' => '0.32'
},
{
'date' => '2016-02-19T04:29:41',
'version' => '0.34'
},
{
'date' => '2016-02-29T02:38:12',
'version' => '0.36'
},
{
'date' => '2016-05-02T11:09:27',
'version' => '0.37'
},
{
'date' => '2016-05-02T14:24:23',
'version' => '0.39'
},
{
'date' => '2016-05-23T15:45:16',
'version' => '0.40'
},
{
'date' => '2016-05-23T16:01:05',
'version' => '0.41'
},
{
'date' => '2016-05-31T16:41:30',
'version' => '0.42'
},
{
'date' => '2016-08-05T18:02:43',
'version' => '0.44'
},
{
'date' => '2017-02-23T18:32:44',
'version' => '0.45'
},
{
'date' => '2017-02-25T19:26:54',
'version' => '0.46'
},
{
'date' => '2017-07-26T14:36:03',
'version' => '0.47'
},
{
'date' => '2018-04-22T07:09:08',
'version' => '0.48'
},
{
'date' => '2024-12-16T13:11:27',
'version' => '0.49'
},
{
'date' => '2024-12-19T13:16:05',
'version' => '0.50'
}
]
},
'Catalyst-Action-REST' => {
'advisories' => [
{
'affected_versions' => [
'<1.12'
],
'cves' => [],
'description' => 'YAML and YAML::HTML parsers are a potential security hole, as they may allow arbitrary Perl objects to be instantiated.
',
'distribution' => 'Catalyst-Action-REST',
'fixed_versions' => [
'>=1.12'
],
'id' => 'CPANSA-Catalyst-Action-REST-2013-01',
'references' => [
'https://metacpan.org/dist/Catalyst-Action-REST/changes'
],
'reported' => '2013-09-03',
'severity' => undef
}
],
'main_module' => 'Catalyst::Action::REST',
'versions' => [
{
'date' => '2006-11-20T03:15:08',
'version' => '0.1'
},
{
'date' => '2006-12-01T01:42:22',
'version' => '0.2'
},
{
'date' => '2006-12-04T00:22:45',
'version' => '0.30'
},
{
'date' => '2006-12-06T08:48:49',
'version' => '0.31'
},
{
'date' => '2007-03-10T00:44:35',
'version' => '0.40'
},
{
'date' => '2007-05-24T21:09:40',
'version' => '0.41'
},
{
'date' => '2007-07-07T19:33:22',
'version' => '0.50'
},
{
'date' => '2008-01-04T01:33:04',
'version' => '0.60'
},
{
'date' => '2008-06-30T19:30:56',
'version' => '0.61'
},
{
'date' => '2008-07-02T15:25:10',
'version' => '0.62'
},
{
'date' => '2008-08-07T17:14:34',
'version' => '0.63'
},
{
'date' => '2008-08-14T16:09:53',
'version' => '0.64'
},
{
'date' => '2008-08-20T17:45:46',
'version' => '0.65'
},
{
'date' => '2008-08-22T18:24:57',
'version' => '0.66'
},
{
'date' => '2009-03-25T16:38:07',
'version' => '0.67_01'
},
{
'date' => '2009-03-26T05:04:33',
'version' => '0.67'
},
{
'date' => '2009-03-26T05:37:53',
'version' => '0.68'
},
{
'date' => '2009-03-26T21:19:43',
'version' => '0.69'
},
{
'date' => '2009-03-28T06:23:19',
'version' => '0.70'
},
{
'date' => '2009-03-28T16:19:10',
'version' => '0.71'
},
{
'date' => '2009-06-25T18:56:47',
'version' => '0.72'
},
{
'date' => '2009-06-28T00:22:51',
'version' => '0.73'
},
{
'date' => '2009-07-22T23:12:44',
'version' => '0.74'
},
{
'date' => '2009-08-17T13:11:15',
'version' => '0.75'
},
{
'date' => '2009-08-21T20:42:44',
'version' => '0.76'
},
{
'date' => '2009-08-27T01:26:49',
'version' => '0.77'
},
{
'date' => '2009-09-28T14:05:11',
'version' => '0.78'
},
{
'date' => '2009-12-11T01:11:49',
'version' => '0.79'
},
{
'date' => '2009-12-19T14:59:13',
'version' => '0.80'
},
{
'date' => '2010-01-14T20:56:56',
'version' => '0.81'
},
{
'date' => '2010-02-04T22:35:05',
'version' => '0.82'
},
{
'date' => '2010-02-08T22:24:29',
'version' => '0.83'
},
{
'date' => '2010-05-06T08:34:09',
'version' => '0.84'
},
{
'date' => '2010-05-13T08:15:30',
'version' => '0.85'
},
{
'date' => '2010-09-01T22:17:14',
'version' => '0.86'
},
{
'date' => '2010-11-03T19:48:23',
'version' => '0.87'
},
{
'date' => '2011-01-11T23:12:42',
'version' => '0.88'
},
{
'date' => '2011-01-24T21:59:02',
'version' => '0.89'
},
{
'date' => '2011-02-25T13:58:06',
'version' => '0.90'
},
{
'date' => '2011-08-04T12:46:05',
'version' => '0.91'
},
{
'date' => '2011-10-01T10:11:59',
'version' => '0.91'
},
{
'date' => '2011-10-12T18:35:31',
'version' => '0.93'
},
{
'date' => '2011-12-09T08:51:25',
'version' => '0.94'
},
{
'date' => '2012-01-04T19:54:14',
'version' => '0.95'
},
{
'date' => '2012-01-30T11:32:44',
'version' => '0.96'
},
{
'date' => '2012-02-21T10:06:13',
'version' => '0.97'
},
{
'date' => '2012-02-21T11:44:32',
'version' => '0.98'
},
{
'date' => '2012-02-28T09:14:17',
'version' => '0.99'
},
{
'date' => '2012-04-13T08:37:31',
'version' => '1.00'
},
{
'date' => '2012-05-29T20:02:44',
'version' => '1.01'
},
{
'date' => '2012-06-05T21:45:05',
'version' => '1.02'
},
{
'date' => '2012-06-27T23:52:31',
'version' => '1.03'
},
{
'date' => '2012-06-30T09:32:24',
'version' => '1.04'
},
{
'date' => '2012-07-02T19:16:30',
'version' => '1.05'
},
{
'date' => '2012-12-11T22:13:48',
'version' => '1.06'
},
{
'date' => '2013-04-11T19:25:51',
'version' => '1.07'
},
{
'date' => '2013-04-16T07:36:02',
'version' => '1.08'
},
{
'date' => '2013-04-19T12:43:57',
'version' => '1.09'
},
{
'date' => '2013-04-22T13:43:09',
'version' => '1.10'
},
{
'date' => '2013-06-16T14:28:48',
'version' => '1.11'
},
{
'date' => '2013-09-11T17:50:54',
'version' => '1.12'
},
{
'date' => '2013-11-08T15:49:54',
'version' => '1.13'
},
{
'date' => '2013-12-27T21:33:09',
'version' => '1.14'
},
{
'date' => '2014-05-07T14:04:03',
'version' => '1.15'
},
{
'date' => '2014-09-12T18:22:35',
'version' => '1.16'
},
{
'date' => '2014-10-24T00:59:39',
'version' => '1.17'
},
{
'date' => '2015-01-20T18:22:02',
'version' => '1.18'
},
{
'date' => '2015-02-06T15:40:56',
'version' => '1.19'
},
{
'date' => '2015-10-29T20:34:02',
'version' => '1.20'
},
{
'date' => '2017-12-05T15:16:47',
'version' => '1.21'
}
]
},
'Catalyst-Authentication-Store-LDAP' => {
'advisories' => [
{
'affected_versions' => [
'<1.013'
],
'cves' => [],
'description' => 'Incorrect password check binds to the unauthenticated user.
',
'distribution' => 'Catalyst-Authentication-Store-LDAP',
'fixed_versions' => [
'>=1.013'
],
'id' => 'CPANSA-Catalyst-Authentication-Store-LDAP-2012-01',
'references' => [
'https://rt.cpan.org/Public/Bug/Display.html?id=81908'
],
'reported' => '2012-12-11',
'severity' => 'high'
}
],
'main_module' => 'Catalyst::Authentication::Store::LDAP',
'versions' => [
{
'date' => '2008-02-05T18:18:24',
'version' => '0.1000'
},
{
'date' => '2008-04-10T02:06:58',
'version' => '0.1001'
},
{
'date' => '2008-07-09T20:45:43',
'version' => '0.1002'
},
{
'date' => '2008-09-10T13:21:33',
'version' => '0.1003'
},
{
'date' => '2008-10-22T01:57:27',
'version' => '0.1003'
},
{
'date' => '2009-05-01T02:34:18',
'version' => '0.1005'
},
{
'date' => '2009-12-11T18:54:26',
'version' => '1.006'
},
{
'date' => '2010-03-19T10:07:13',
'version' => '1.007'
},
{
'date' => '2010-04-03T03:04:13',
'version' => '1.008'
},
{
'date' => '2010-05-15T07:14:41',
'version' => '1.009'
},
{
'date' => '2010-07-06T21:39:55',
'version' => '1.010'
},
{
'date' => '2010-07-07T20:41:22',
'version' => '1.011'
},
{
'date' => '2010-10-05T08:11:56',
'version' => '1.012'
},
{
'date' => '2013-01-09T14:58:46',
'version' => '1.013'
},
{
'date' => '2013-04-26T19:51:28',
'version' => '1.014'
},
{
'date' => '2015-02-20T18:07:31',
'version' => '1.015'
},
{
'date' => '2016-02-11T17:50:52',
'version' => '1.016'
},
{
'date' => '2021-05-26T09:59:28',
'version' => '1.017'
}
]
},
'Catalyst-Controller-Combine' => {
'advisories' => [
{
'affected_versions' => [
'<0.12'
],
'cves' => [],
'description' => 'Allows to use url-encoded path-parts to crawl along the file system and read files outside the intended directory.
',
'distribution' => 'Catalyst-Controller-Combine',
'fixed_versions' => [
'>=0.12'
],
'id' => 'CPANSA-Catalyst-Controller-Combine-2010-01',
'references' => [
'https://metacpan.org/changes/distribution/Catalyst-Controller-Combine'
],
'reported' => '2010-05-21'
}
],
'main_module' => 'Catalyst::Controller::Combine',
'versions' => [
{
'date' => '2009-07-11T17:58:25',
'version' => '0.06'
},
{
'date' => '2009-07-13T06:49:00',
'version' => '0.07'
},
{
'date' => '2009-10-24T12:48:21',
'version' => '0.08'
},
{
'date' => '2010-03-13T19:31:13',
'version' => '0.09'
},
{
'date' => '2010-03-27T18:44:05',
'version' => '0.10'
},
{
'date' => '2010-06-21T20:47:02',
'version' => '0.12'
},
{
'date' => '2011-07-28T19:53:12',
'version' => '0.13'
},
{
'date' => '2012-02-20T20:59:00',
'version' => '0.14'
},
{
'date' => '2012-05-04T10:43:12',
'version' => '0.15'
}
]
},
'Catalyst-Plugin-Static' => {
'advisories' => [
{
'affected_versions' => [
'<0.10'
],
'cves' => [],
'description' => 'Serving files outside of $config->{root} directory.
',
'distribution' => 'Catalyst-Plugin-Static',
'fixed_versions' => [
'>=0.10'
],
'id' => 'CPANSA-Catalyst-Plugin-Static-2005-01',
'reported' => '2005-11-14'
}
],
'main_module' => 'Catalyst::Plugin::Static',
'versions' => [
{
'date' => '2005-01-29T00:00:20',
'version' => '0.01'
},
{
'date' => '2005-02-19T20:28:50',
'version' => '0.02'
},
{
'date' => '2005-03-17T01:01:03',
'version' => '0.03'
},
{
'date' => '2005-03-17T19:10:36',
'version' => '0.04'
},
{
'date' => '2005-03-21T13:34:27',
'version' => '0.05'
},
{
'date' => '2005-03-23T06:48:05',
'version' => '0.05'
},
{
'date' => '2005-04-15T16:58:18',
'version' => '0.06'
},
{
'date' => '2005-04-17T14:50:45',
'version' => '0.07'
},
{
'date' => '2005-09-06T13:42:42',
'version' => '0.08'
},
{
'date' => '2005-11-14T08:38:35',
'version' => '0.09'
},
{
'date' => '2005-11-14T10:26:31',
'version' => '0.10'
},
{
'date' => '2009-10-18T18:13:00',
'version' => '0.11'
}
]
},
'Catalyst-Plugin-Static-Simple' => {
'advisories' => [
{
'affected_versions' => [
'<0.34'
],
'cves' => [
'CVE-2017-16248'
],
'description' => 'The Catalyst-Plugin-Static-Simple module before 0.34 for Perl allows remote attackers to read arbitrary files if there is a \'.\' character anywhere in the pathname, which differs from the intended policy of allowing access only when the filename itself has a \'.\' character.
',
'distribution' => 'Catalyst-Plugin-Static-Simple',
'fixed_versions' => [
'>=0.34'
],
'id' => 'CPANSA-Catalyst-Plugin-Static-Simple-2017-01',
'references' => [
'https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/',
'https://metacpan.org/pod/CPAN::Checksums'
],
'reported' => '2017-10-31'
}
],
'main_module' => 'Catalyst::Plugin::Static::Simple',
'versions' => [
{
'date' => '2005-08-12T01:37:04',
'version' => '0.01'
},
{
'date' => '2005-08-16T22:09:54',
'version' => '0.02'
},
{
'date' => '2005-08-22T03:44:24',
'version' => '0.03'
},
{
'date' => '2005-08-22T15:59:08',
'version' => '0.04'
},
{
'date' => '2005-08-26T15:58:06',
'version' => '0.05'
},
{
'date' => '2005-09-05T19:36:58',
'version' => '0.06'
},
{
'date' => '2005-09-06T01:07:28',
'version' => '0.07'
},
{
'date' => '2005-09-07T22:52:21',
'version' => '0.08'
},
{
'date' => '2005-10-07T17:40:16',
'version' => '0.09'
},
{
'date' => '2005-10-19T21:19:04',
'version' => '0.10'
},
{
'date' => '2005-11-14T00:28:01',
'version' => '0.11'
},
{
'date' => '2005-12-15T14:56:40',
'version' => '0.13'
},
{
'date' => '2006-03-24T16:18:59',
'version' => '0.14'
},
{
'date' => '2006-07-05T16:35:54',
'version' => '0.14'
},
{
'date' => '2006-12-09T03:25:57',
'version' => '0.15'
},
{
'date' => '2007-04-30T18:48:25',
'version' => '0.16'
},
{
'date' => '2007-05-11T14:52:16',
'version' => '0.17'
},
{
'date' => '2007-07-01T04:12:31',
'version' => '0.18'
},
{
'date' => '2007-07-02T20:54:05',
'version' => '0.19'
},
{
'date' => '2007-09-24T13:50:15',
'version' => '0.20'
},
{
'date' => '2009-03-29T18:47:56',
'version' => '0.21'
},
{
'date' => '2009-08-21T16:21:17',
'version' => '0.22'
},
{
'date' => '2009-10-06T16:51:19',
'version' => '0.23'
},
{
'date' => '2009-10-18T18:12:48',
'version' => '0.24'
},
{
'date' => '2009-10-22T20:49:26',
'version' => '0.25'
},
{
'date' => '2009-12-06T12:32:46',
'version' => '0.26'
},
{
'date' => '2010-01-03T14:56:26',
'version' => '0.27'
},
{
'date' => '2010-01-04T13:18:25',
'version' => '0.28'
},
{
'date' => '2010-02-01T18:48:45',
'version' => '0.29'
},
{
'date' => '2012-05-04T17:17:29',
'version' => '0.30'
},
{
'date' => '2013-09-09T14:32:43',
'version' => '0.31'
},
{
'date' => '2014-06-05T12:44:48',
'version' => '0.32'
},
{
'date' => '2014-10-29T16:02:17',
'version' => '0.33'
},
{
'date' => '2017-08-02T17:00:14',
'version' => '0.34'
},
{
'date' => '2018-03-14T12:13:30',
'version' => '0.35'
},
{
'date' => '2018-03-15T11:41:17',
'version' => '0.36'
},
{
'date' => '2021-05-05T14:30:07',
'version' => '0.37'
}
]
},
'Catalyst-Runtime' => {
'advisories' => [
{
'affected_versions' => [
'<5.90020'
],
'cves' => [],
'description' => 'Passing a special host to the redirect page link makes it vulnerable to XSS attack.
',
'distribution' => 'Catalyst-Runtime',
'fixed_versions' => [
'>=5.90020'
],
'id' => 'CPANSA-Catalyst-Runtime-2013-01',
'references' => [
'http://git.shadowcat.co.uk/gitweb/gitweb.cgi?p=catagits/Catalyst-Runtime.git;a=commitdiff;h=7af54927870a7c6f89323ac1876d49f92e7841f5'
],
'reported' => '2013-01-23'
},
{
'affected_versions' => [
'<5.58'
],
'cves' => [],
'description' => 'Path traversal in Static::Simple plugin.
',
'distribution' => 'Catalyst-Runtime',
'fixed_versions' => [
'>=5.58'
],
'id' => 'CPANSA-Catalyst-Runtime-2005-01',
'reported' => '2005-11-24'
}
],
'main_module' => 'Catalyst::Runtime',
'versions' => [
{
'date' => '2006-06-25T19:20:53',
'version' => '5.70_01'
},
{
'date' => '2006-06-27T18:10:20',
'version' => '5.70_02'
},
{
'date' => '2006-06-28T21:50:30',
'version' => '5.70_03'
},
{
'date' => '2006-07-07T22:47:30',
'version' => '5.7000'
},
{
'date' => '2006-07-20T06:00:58',
'version' => '5.7001'
},
{
'date' => '2006-09-19T07:36:29',
'version' => '5.7002'
},
{
'date' => '2006-09-23T17:43:12',
'version' => '5.7003'
},
{
'date' => '2006-11-06T23:28:40',
'version' => '5.7004'
},
{
'date' => '2006-11-07T19:43:56',
'version' => '5.7005'
},
{
'date' => '2006-11-15T08:27:59',
'version' => '5.7006'
},
{
'date' => '2007-03-14T11:13:37',
'version' => '5.7007'
},
{
'date' => '2007-08-13T06:36:11',
'version' => '5.7008'
},
{
'date' => '2007-08-21T22:23:53',
'version' => '5.7009'
},
{
'date' => '2007-08-22T05:51:41',
'version' => '5.7010'
},
{
'date' => '2007-10-18T18:11:24',
'version' => '5.7011'
},
{
'date' => '2007-12-17T08:19:28',
'version' => '5.7012'
},
{
'date' => '2008-05-17T12:41:13',
'version' => '5.7013'
},
{
'date' => '2008-05-25T21:16:45',
'version' => '5.7013'
},
{
'date' => '2008-06-25T20:43:41',
'version' => '5.7099_01'
},
{
'date' => '2008-07-18T11:41:25',
'version' => '5.7099_02'
},
{
'date' => '2008-07-20T08:15:02',
'version' => '5.7099_02'
},
{
'date' => '2008-10-13T20:55:41',
'version' => '5.7099_02'
},
{
'date' => '2008-10-14T06:06:06',
'version' => '5.7099_02'
},
{
'date' => '2008-10-15T21:44:15',
'version' => '5.7015'
},
{
'date' => '2008-10-17T12:42:53',
'version' => '5.8000_03'
},
{
'date' => '2008-12-05T15:11:14',
'version' => '5.8000_04'
},
{
'date' => '2009-01-12T15:46:59',
'version' => '5.7099_04'
},
{
'date' => '2009-01-19T17:36:04',
'version' => '5.71000'
},
{
'date' => '2009-01-29T08:56:09',
'version' => '5.8000_05'
},
{
'date' => '2009-02-04T20:08:22',
'version' => '5.8000_06'
},
{
'date' => '2009-03-27T09:21:12',
'version' => '5.71001'
},
{
'date' => '2009-04-13T19:03:36',
'version' => '5.8000_07'
},
{
'date' => '2009-04-18T20:26:00',
'version' => '5.80001'
},
{
'date' => '2009-04-21T23:45:45',
'version' => '5.80002'
},
{
'date' => '2009-04-29T14:39:21',
'version' => '5.80003'
},
{
'date' => '2009-05-18T15:16:38',
'version' => '5.80004'
},
{
'date' => '2009-06-06T12:49:15',
'version' => '5.80005'
},
{
'date' => '2009-06-29T22:11:48',
'version' => '5.80006'
},
{
'date' => '2009-06-30T22:11:36',
'version' => '5.80007'
},
{
'date' => '2009-08-21T16:14:33',
'version' => '5.80008'
},
{
'date' => '2009-08-21T20:29:33',
'version' => '5.80009'
},
{
'date' => '2009-08-21T21:42:08',
'version' => '5.80010'
},
{
'date' => '2009-08-23T11:57:26',
'version' => '5.80011'
},
{
'date' => '2009-09-09T18:01:32',
'version' => '5.80012'
},
{
'date' => '2009-09-17T09:35:20',
'version' => '5.80013'
},
{
'date' => '2009-11-21T02:32:20',
'version' => '5.80014'
},
{
'date' => '2009-11-22T20:24:47',
'version' => '5.80014_01'
},
{
'date' => '2009-12-01T01:14:00',
'version' => '5.80014_02'
},
{
'date' => '2009-12-02T15:42:50',
'version' => '5.80015'
},
{
'date' => '2009-12-11T23:37:44',
'version' => '5.80016'
},
{
'date' => '2010-01-10T02:01:50',
'version' => '5.80017'
},
{
'date' => '2010-01-12T21:39:47',
'version' => '5.80018'
},
{
'date' => '2010-01-29T00:18:07',
'version' => '5.80019'
},
{
'date' => '2010-02-04T06:19:31',
'version' => '5.80020'
},
{
'date' => '2010-03-03T23:16:29',
'version' => '5.80021'
},
{
'date' => '2010-03-28T19:25:48',
'version' => '5.80022'
},
{
'date' => '2010-05-07T22:07:08',
'version' => '5.80023'
},
{
'date' => '2010-05-15T09:57:52',
'version' => '5.80024'
},
{
'date' => '2010-07-29T00:59:16',
'version' => '5.80025'
},
{
'date' => '2010-09-01T15:10:42',
'version' => '5.80026'
},
{
'date' => '2010-09-02T11:33:03',
'version' => '5.80027'
},
{
'date' => '2010-09-28T20:14:11',
'version' => '5.80028'
},
{
'date' => '2010-10-03T16:24:08',
'version' => '5.80029'
},
{
'date' => '2011-01-04T12:56:30',
'version' => '5.80030'
},
{
'date' => '2011-01-24T10:50:27',
'version' => '5.89000'
},
{
'date' => '2011-01-31T08:25:21',
'version' => '5.80031'
},
{
'date' => '2011-02-23T08:28:58',
'version' => '5.80032'
},
{
'date' => '2011-03-01T14:56:37',
'version' => '5.89001'
},
{
'date' => '2011-03-02T10:37:42',
'version' => '5.89002'
},
{
'date' => '2011-07-24T15:58:37',
'version' => '5.80033'
},
{
'date' => '2011-07-28T20:05:01',
'version' => '5.89003'
},
{
'date' => '2011-08-15T21:35:34',
'version' => '5.9000'
},
{
'date' => '2011-08-15T21:59:58',
'version' => '5.90001'
},
{
'date' => '2011-08-22T20:55:10',
'version' => '5.90002'
},
{
'date' => '2011-10-05T07:48:57',
'version' => '5.90003'
},
{
'date' => '2011-10-11T15:19:05',
'version' => '5.90004'
},
{
'date' => '2011-10-22T21:01:24',
'version' => '5.90005'
},
{
'date' => '2011-10-25T17:54:34',
'version' => '5.90006'
},
{
'date' => '2011-11-22T20:40:44',
'version' => '5.90007'
},
{
'date' => '2012-02-06T21:08:28',
'version' => '5.90008'
},
{
'date' => '2012-02-16T09:29:44',
'version' => '5.90009'
},
{
'date' => '2012-02-18T00:49:30',
'version' => '5.90010'
},
{
'date' => '2012-03-08T21:53:00',
'version' => '5.90011'
},
{
'date' => '2012-05-19T07:13:21',
'version' => '5.90012'
},
{
'date' => '2012-06-08T00:37:40',
'version' => '5.90013'
},
{
'date' => '2012-06-21T20:41:41',
'version' => '5.90013'
},
{
'date' => '2012-06-26T14:34:56',
'version' => '5.90014'
},
{
'date' => '2012-06-30T18:00:53',
'version' => '5.90015'
},
{
'date' => '2012-08-17T01:39:42',
'version' => '5.90016'
},
{
'date' => '2012-10-19T21:51:54',
'version' => '5.90017'
},
{
'date' => '2012-10-24T01:01:44',
'version' => '5.90018'
},
{
'date' => '2012-12-04T22:04:19',
'version' => '5.90019'
},
{
'date' => '2013-02-22T14:05:39',
'version' => '5.90020'
},
{
'date' => '2013-04-12T17:09:27',
'version' => '5.90030'
},
{
'date' => '2013-06-12T21:26:14',
'version' => '5.90040'
},
{
'date' => '2013-06-15T02:10:17',
'version' => '5.90041'
},
{
'date' => '2013-06-16T01:57:47',
'version' => '5.90042'
},
{
'date' => '2013-07-26T19:13:01',
'version' => '5.90049_001'
},
{
'date' => '2013-08-21T02:39:45',
'version' => '5.90049_002'
},
{
'date' => '2013-09-20T19:03:54',
'version' => '5.90049_003'
},
{
'date' => '2013-10-18T22:19:33',
'version' => '5.90049_004'
},
{
'date' => '2013-10-31T20:48:42',
'version' => '5.90049_005'
},
{
'date' => '2013-11-05T03:25:31',
'version' => '5.90049_006'
},
{
'date' => '2013-11-05T22:35:22',
'version' => '5.90050'
},
{
'date' => '2013-11-07T17:14:35',
'version' => '5.90051'
},
{
'date' => '2013-12-18T20:03:22',
'version' => '5.90052'
},
{
'date' => '2013-12-19T14:33:08',
'version' => '5.90059_001'
},
{
'date' => '2013-12-22T16:18:16',
'version' => '5.90053'
},
{
'date' => '2013-12-22T16:34:11',
'version' => '5.90059_002'
},
{
'date' => '2013-12-27T02:27:08',
'version' => '5.90059_003'
},
{
'date' => '2014-01-27T17:20:51',
'version' => '5.90059_004'
},
{
'date' => '2014-01-28T19:36:58',
'version' => '5.90059_005'
},
{
'date' => '2014-02-06T20:41:25',
'version' => '5.90059_006'
},
{
'date' => '2014-02-08T03:11:11',
'version' => '5.90060'
},
{
'date' => '2014-03-10T14:46:10',
'version' => '5.90061'
},
{
'date' => '2014-04-14T18:53:26',
'version' => '5.90062'
},
{
'date' => '2014-05-02T00:15:16',
'version' => '5.90063'
},
{
'date' => '2014-05-05T14:55:25',
'version' => '5.90064'
},
{
'date' => '2014-05-27T18:08:08',
'version' => '5.90069_001'
},
{
'date' => '2014-06-05T12:44:59',
'version' => '5.90065'
},
{
'date' => '2014-06-10T00:22:42',
'version' => '5.90069_002'
},
{
'date' => '2014-08-06T15:09:29',
'version' => '5.90069_003'
},
{
'date' => '2014-08-07T15:59:15',
'version' => '5.90069_004'
},
{
'date' => '2014-08-07T21:49:59',
'version' => '5.90070'
},
{
'date' => '2014-08-10T13:15:52',
'version' => '5.90071'
},
{
'date' => '2014-09-15T16:30:58',
'version' => '5.90072'
},
{
'date' => '2014-09-23T17:24:54',
'version' => '5.90073'
},
{
'date' => '2014-10-01T21:45:12',
'version' => '5.90074'
},
{
'date' => '2014-10-07T00:07:51',
'version' => '5.90075'
},
{
'date' => '2014-11-14T00:20:16',
'version' => '5.90076'
},
{
'date' => '2014-11-19T00:28:27',
'version' => '5.90077'
},
{
'date' => '2014-12-02T21:50:30',
'version' => '5.90079_001'
},
{
'date' => '2014-12-02T23:22:07',
'version' => '5.90079_002'
},
{
'date' => '2014-12-03T19:45:16',
'version' => '5.90079_003'
},
{
'date' => '2014-12-26T23:05:46',
'version' => '5.90079_004'
},
{
'date' => '2014-12-31T16:26:20',
'version' => '5.90078'
},
{
'date' => '2014-12-31T21:04:56',
'version' => '5.90079_005'
},
{
'date' => '2015-01-02T15:11:55',
'version' => '5.90079_006'
},
{
'date' => '2015-01-02T18:11:38',
'version' => '5.90079'
},
{
'date' => '2015-01-07T20:01:40',
'version' => '5.90079_007'
},
{
'date' => '2015-01-07T23:26:17',
'version' => '5.90079_008'
},
{
'date' => '2015-01-09T17:04:47',
'version' => '5.90080'
},
{
'date' => '2015-01-10T22:39:56',
'version' => '5.90081'
},
{
'date' => '2015-01-10T23:33:56',
'version' => '5.90082'
},
{
'date' => '2015-02-17T02:29:50',
'version' => '5.90083'
},
{
'date' => '2015-02-23T22:24:50',
'version' => '5.90084'
},
{
'date' => '2015-03-25T18:58:11',
'version' => '5.90085'
},
{
'date' => '2015-03-26T21:30:15',
'version' => '5.90089_001'
},
{
'date' => '2015-04-17T21:32:30',
'version' => '5.90089_002'
},
{
'date' => '2015-04-27T20:20:40',
'version' => '5.90089_003'
},
{
'date' => '2015-04-28T18:24:12',
'version' => '5.90089_004'
},
{
'date' => '2015-04-29T14:04:24',
'version' => '5.90090'
},
{
'date' => '2015-05-08T20:36:59',
'version' => '5.90091'
},
{
'date' => '2015-05-19T16:48:30',
'version' => '5.90092'
},
{
'date' => '2015-05-29T17:06:23',
'version' => '5.90093'
},
{
'date' => '2015-07-24T20:17:46',
'version' => '5.90094'
},
{
'date' => '2015-07-27T14:32:30',
'version' => '5.90095'
},
{
'date' => '2015-07-27T15:44:59',
'version' => '5.90096'
},
{
'date' => '2015-07-28T20:33:41',
'version' => '5.90097'
},
{
'date' => '2015-08-24T16:30:12',
'version' => '5.90100'
},
{
'date' => '2015-09-04T22:57:40',
'version' => '5.90101'
},
{
'date' => '2015-10-29T19:39:24',
'version' => '5.90102'
},
{
'date' => '2015-11-12T10:19:42',
'version' => '5.90103'
},
{
'date' => '2016-04-04T17:18:38',
'version' => '5.90104'
},
{
'date' => '2016-06-08T20:06:53',
'version' => '5.90105'
},
{
'date' => '2016-07-06T01:21:42',
'version' => '5.90106'
},
{
'date' => '2016-07-20T19:12:32',
'version' => '5.90110'
},
{
'date' => '2016-07-20T20:07:16',
'version' => '5.90111'
},
{
'date' => '2016-07-25T21:03:05',
'version' => '5.90112'
},
{
'date' => '2016-12-15T21:35:30',
'version' => '5.90113'
},
{
'date' => '2016-12-19T16:54:08',
'version' => '5.90114'
},
{
'date' => '2017-05-01T16:42:46',
'version' => '5.90115'
},
{
'date' => '2018-01-19T20:55:15',
'version' => '5.90116'
},
{
'date' => '2018-01-21T23:47:21',
'version' => '5.90117'
},
{
'date' => '2018-05-01T09:59:20',
'version' => '5.90118'
},
{
'date' => '2018-09-24T00:25:48',
'version' => '5.90119'
},
{
'date' => '2018-10-19T06:13:58',
'version' => '5.90120'
},
{
'date' => '2018-10-22T20:39:48',
'version' => '5.90_121'
},
{
'date' => '2018-11-03T14:52:06',
'version' => '5.90122'
},
{
'date' => '2018-11-27T15:39:35',
'version' => '5.90123'
},
{
'date' => '2019-01-18T22:36:07',
'version' => '5.90124'
},
{
'date' => '2020-01-19T01:11:05',
'version' => '5.90125'
},
{
'date' => '2020-01-20T01:40:16',
'version' => '5.90126'
},
{
'date' => '2020-07-27T01:25:21',
'version' => '5.90_127'
},
{
'date' => '2020-09-11T12:38:26',
'version' => '5.90128'
},
{
'date' => '2022-07-23T13:13:34',
'version' => '5.90129'
},
{
'date' => '2022-11-09T15:37:01',
'version' => '5.90130'
},
{
'date' => '2023-07-20T23:09:29',
'version' => '5.90131'
},
{
'date' => '2024-11-08T19:56:41',
'version' => '5.90132'
}
]
},
'Clipboard' => {
'advisories' => [
{
'affected_versions' => [
'<0.16'
],
'cves' => [
'CVE-2014-5509'
],
'description' => 'clipedit in the Clipboard module for Perl allows local users to delete arbitrary files via a symlink attack on /tmp/clipedit$$.
',
'distribution' => 'Clipboard',
'fixed_versions' => [],
'id' => 'CPANSA-Clipboard-2014-5509',
'references' => [
'https://rt.cpan.org/Public/Bug/Display.html?id=98435',
'https://bugzilla.redhat.com/show_bug.cgi?id=1135624',
'http://www.securityfocus.com/bid/69473',
'http://www.openwall.com/lists/oss-security/2014/08/30/2'
],
'reported' => '2018-01-08',
'severity' => 'medium'
}
],
'main_module' => 'Clipboard',
'versions' => [
{
'date' => '2005-05-01T17:19:57',
'version' => '0.01'
},
{
'date' => '2005-05-02T06:17:33',
'version' => '0.02'
},
{
'date' => '2005-05-04T06:17:44',
'version' => '0.03'
},
{
'date' => '2005-05-08T05:54:44',
'version' => '0.04'
},
{
'date' => '2005-06-01T17:00:34',
'version' => '0.06'
},
{
'date' => '2005-06-02T05:06:37',
'version' => '0.07'
},
{
'date' => '2005-06-22T17:05:15',
'version' => '0.08'
},
{
'date' => '2005-11-19T06:12:48',
'version' => '0.09'
},
{
'date' => '2010-10-07T01:39:10',
'version' => '0.10'
},
{
'date' => '2010-10-07T04:49:39',
'version' => '0.11'
},
{
'date' => '2010-10-11T06:13:22',
'version' => '0.12'
},
{
'date' => '2010-10-13T04:46:50',
'version' => '0.13'
},
{
'date' => '2019-01-30T10:47:45',
'version' => '0.14'
},
{
'date' => '2019-01-30T11:00:22',
'version' => '0.15'
},
{
'date' => '2019-01-30T11:22:23',
'version' => '0.16'
},
{
'date' => '2019-01-30T14:00:52',
'version' => '0.17'
},
{
'date' => '2019-01-30T20:12:11',
'version' => '0.18'
},
{
'date' => '2019-01-31T11:00:20',
'version' => '0.19'
},
{
'date' => '2019-04-17T20:55:35',
'version' => '0.20'
},
{
'date' => '2019-12-02T06:04:27',
'version' => '0.21'
},
{
'date' => '2020-01-28T18:10:34',
'version' => '0.22'
},
{
'date' => '2020-03-06T15:43:11',
'version' => '0.23'
},
{
'date' => '2020-03-07T08:25:07',
'version' => '0.24'
},
{
'date' => '2020-05-14T06:33:28',
'version' => '0.25'
},
{
'date' => '2020-05-16T07:56:58',
'version' => '0.26'
},
{
'date' => '2021-02-13T18:13:34',
'version' => '0.27'
},
{
'date' => '2021-02-23T07:47:20',
'version' => '0.28'
},
{
'date' => '2024-04-07T03:11:57',
'version' => '0.29'
},
{
'date' => '2024-06-16T12:03:21',
'version' => '0.30'
},
{
'date' => '2025-01-21T17:04:47',
'version' => '0.31'
}
]
},
'Cmd-Dwarf' => {
'advisories' => [
{
'affected_versions' => [
'<1.20'
],
'cves' => [],
'description' => 'JSON highjacking possibility.
',
'distribution' => 'Cmd-Dwarf',
'fixed_versions' => [
'>=1.20'
],
'id' => 'CPANSA-Cmd-Dwarf-2014-01',
'references' => [
'https://github.com/seagirl/dwarf/commit/14cf7a1d55db635a07f4838e16f3d9a28e63f529',
'https://metacpan.org/changes/distribution/Cmd-Dwarf'
],
'reported' => '2014-12-03'
}
],
'main_module' => 'Cmd::Dwarf',
'versions' => [
{
'date' => '2015-07-30T06:48:35',
'version' => '1.27'
},
{
'date' => '2015-08-26T13:27:51',
'version' => '1.28'
},
{
'date' => '2015-08-28T08:58:33',
'version' => '1.29'
},
{
'date' => '2015-09-17T08:17:32',
'version' => '1.30'
},
{
'date' => '2016-01-20T06:39:15',
'version' => '1.31'
},
{
'date' => '2016-10-25T05:56:33',
'version' => '1.41'
},
{
'date' => '2017-03-29T04:42:05',
'version' => '1.42'
},
{
'date' => '2017-06-21T07:06:05',
'version' => '1.50'
},
{
'date' => '2017-10-05T08:08:01',
'version' => '1.60'
},
{
'date' => '2018-03-17T07:35:19',
'version' => '1.70'
},
{
'date' => '2018-08-18T11:43:10',
'version' => '1.80'
},
{
'date' => '2019-04-05T05:22:33',
'version' => '1.81'
},
{
'date' => '2019-04-05T05:36:46',
'version' => '1.82'
},
{
'date' => '2019-04-05T09:06:55',
'version' => '1.83'
}
]
},
'Compress-LZ4' => {
'advisories' => [
{
'affected_versions' => [
'<0.20'
],
'cves' => [],
'description' => 'Outdated LZ4 source code with security issue on 32bit systems.
',
'distribution' => 'Compress-LZ4',
'fixed_versions' => [
'>=0.20'
],
'id' => 'CPANSA-Compress-LZ4-2014-01',
'references' => [
'https://metacpan.org/changes/distribution/Compress-LZ4',
'https://github.com/gray/compress-lz4/commit/fc503812b4cbba16429658e1dfe20ad8bbfd77a0'
],
'reported' => '2014-07-07'
}
],
'main_module' => 'Compress::LZ4',
'versions' => [
{
'date' => '2012-02-11T16:33:26',
'version' => '0.01'
},
{
'date' => '2012-02-20T21:26:48',
'version' => '0.02'
},
{
'date' => '2012-03-02T04:47:50',
'version' => '0.03'
},
{
'date' => '2012-03-18T07:09:30',
'version' => '0.04'
},
{
'date' => '2012-03-18T19:45:25',
'version' => '0.05'
},
{
'date' => '2012-03-22T09:23:45',
'version' => '0.06'
},
{
'date' => '2012-03-22T16:12:43',
'version' => '0.07'
},
{
'date' => '2012-03-23T16:29:14',
'version' => '0.08'
},
{
'date' => '2012-03-23T17:27:12',
'version' => '0.09'
},
{
'date' => '2012-03-26T11:28:24',
'version' => '0.10'
},
{
'date' => '2012-04-03T21:36:24',
'version' => '0.11'
},
{
'date' => '2012-04-04T12:55:22',
'version' => '0.12'
},
{
'date' => '2012-06-01T18:55:41',
'version' => '0.13'
},
{
'date' => '2012-08-10T00:21:56',
'version' => '0.14'
},
{
'date' => '2012-08-11T16:37:53',
'version' => '0.15'
},
{
'date' => '2012-09-08T18:18:41',
'version' => '0.16'
},
{
'date' => '2013-03-19T00:39:07',
'version' => '0.17'
},
{
'date' => '2013-11-19T00:56:57',
'version' => '0.18'
},
{
'date' => '2014-02-08T00:35:09',
'version' => '0.19'
},
{
'date' => '2014-07-07T21:08:49',
'version' => '0.20'
},
{
'date' => '2015-05-12T19:01:36',
'version' => '0.21'
},
{
'date' => '2015-05-20T06:16:53',
'version' => '0.22'
},
{
'date' => '2016-07-25T20:45:05',
'version' => '0.23'
},
{
'date' => '2017-03-23T04:34:45',
'version' => '0.24'
},
{
'date' => '2017-04-06T16:38:31',
'version' => '0.25'
}
]
},
'Compress-Raw-Bzip2' => {
'advisories' => [
{
'affected_versions' => [
'<2.031'
],
'cves' => [
'CVE-2010-0405'
],
'description' => 'Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file.
',
'distribution' => 'Compress-Raw-Bzip2',
'fixed_versions' => [
'>=2.031'
],
'id' => 'CPANSA-Compress-Raw-Bzip2-2010-0405',
'references' => [
'https://metacpan.org/changes/distribution/Compress-Raw-Bzip2'
],
'reported' => '2010-01-27'
},
{
'affected_versions' => [
'<2.018'
],
'cves' => [
'CVE-2009-1884'
],
'description' => 'Off-by-one error in the bzinflate function in Bzip2.xs in the Compress-Raw-Bzip2 module before 2.018 for Perl allows context-dependent attackers to cause a denial of service (application hang or crash) via a crafted bzip2 compressed stream that triggers a buffer overflow, a related issue to CVE-2009-1391.
',
'distribution' => 'Compress-Raw-Bzip2',
'fixed_versions' => [
'>=2.018'
],
'id' => 'CPANSA-Compress-Raw-Bzip2-2009-1884',
'references' => [
'http://security.gentoo.org/glsa/glsa-200908-07.xml',
'https://bugs.gentoo.org/show_bug.cgi?id=281955',
'https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00999.html',
'https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00982.html',
'http://www.securityfocus.com/bid/36082',
'http://secunia.com/advisories/36386',
'https://bugzilla.redhat.com/show_bug.cgi?id=518278',
'http://secunia.com/advisories/36415',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/52628'
],
'reported' => '2009-08-19',
'severity' => undef
}
],
'main_module' => 'Compress::Raw::Bzip2',
'versions' => [
{
'date' => '2006-03-13T16:14:00',
'version' => '2.000_10'
},
{
'date' => '2006-04-15T21:23:09',
'version' => '2.000_11'
},
{
'date' => '2006-05-17T12:43:30',
'version' => '2.000_12'
},
{
'date' => '2006-06-20T12:43:47',
'version' => '2.000_13'
},
{
'date' => '2006-10-26T14:15:45',
'version' => '2.000_14'
},
{
'date' => '2006-11-01T10:35:27',
'version' => '2.001'
},
{
'date' => '2006-12-29T20:40:23',
'version' => '2.002'
},
{
'date' => '2007-01-02T13:03:45',
'version' => '2.003'
},
{
'date' => '2007-03-03T15:50:04',
'version' => '2.004'
},
{
'date' => '2007-07-01T00:06:51',
'version' => '2.005'
},
{
'date' => '2007-09-01T19:44:48',
'version' => '2.006'
},
{
'date' => '2007-11-10T11:59:25',
'version' => '2.008'
},
{
'date' => '2008-04-20T14:41:25',
'version' => '2.009'
},
{
'date' => '2008-05-05T17:18:15',
'version' => '2.010'
},
{
'date' => '2008-05-17T11:16:17',
'version' => '2.011'
},
{
'date' => '2008-07-15T22:23:56',
'version' => '2.012'
},
{
'date' => '2008-09-02T20:20:05',
'version' => '2.014'
},
{
'date' => '2008-09-03T20:47:15',
'version' => '2.015'
},
{
'date' => '2009-04-04T09:47:36',
'version' => '2.017'
},
{
'date' => '2009-05-03T16:26:57',
'version' => '2.018'
},
{
'date' => '2009-05-04T09:42:06',
'version' => '2.019'
},
{
'date' => '2009-06-03T17:48:18',
'version' => '2.020'
},
{
'date' => '2009-08-30T20:25:24',
'version' => '2.021'
},
{
'date' => '2009-11-09T23:25:19',
'version' => '2.023'
},
{
'date' => '2010-01-09T17:56:12',
'version' => '2.024'
},
{
'date' => '2010-03-28T12:56:33',
'version' => '2.025'
},
{
'date' => '2010-04-07T19:49:29',
'version' => '2.026'
},
{
'date' => '2010-04-24T19:15:32',
'version' => '2.027'
},
{
'date' => '2010-07-24T14:29:17',
'version' => '2.030'
},
{
'date' => '2010-09-21T19:44:52',
'version' => '2.031'
},
{
'date' => '2011-01-06T11:26:00',
'version' => '2.032'
},
{
'date' => '2011-01-11T14:02:05',
'version' => '2.033'
},
{
'date' => '2011-05-02T21:50:15',
'version' => '2.034'
},
{
'date' => '2011-05-07T08:30:09',
'version' => '2.035'
},
{
'date' => '2011-06-18T21:45:13',
'version' => '2.036'
},
{
'date' => '2011-06-22T07:17:56',
'version' => '2.037'
},
{
'date' => '2011-10-28T14:27:59',
'version' => '2.039'
},
{
'date' => '2011-10-28T22:18:59',
'version' => '2.040'
},
{
'date' => '2011-11-17T23:44:58',
'version' => '2.042'
},
{
'date' => '2011-11-20T21:31:34',
'version' => '2.043'
},
{
'date' => '2011-12-03T22:48:47',
'version' => '2.044'
},
{
'date' => '2011-12-04T19:19:58',
'version' => '2.045'
},
{
'date' => '2012-01-28T23:26:44',
'version' => '2.047'
},
{
'date' => '2012-01-29T16:58:55',
'version' => '2.048'
},
{
'date' => '2012-02-18T15:56:34',
'version' => '2.049'
},
{
'date' => '2012-04-29T12:40:06',
'version' => '2.052'
},
{
'date' => '2012-08-05T20:35:37',
'version' => '2.055'
},
{
'date' => '2012-11-10T19:08:29',
'version' => '2.057'
},
{
'date' => '2012-11-12T22:14:16',
'version' => '2.058'
},
{
'date' => '2012-11-25T13:38:19',
'version' => '2.059'
},
{
'date' => '2013-01-07T20:02:08',
'version' => '2.060'
},
{
'date' => '2013-05-27T09:54:30',
'version' => '2.061'
},
{
'date' => '2013-08-12T19:06:20',
'version' => '2.062'
},
{
'date' => '2013-11-02T17:14:54',
'version' => '2.063'
},
{
'date' => '2014-02-01T23:19:50',
'version' => '2.064'
},
{
'date' => '2014-09-21T12:40:58',
'version' => '2.066'
},
{
'date' => '2014-12-08T15:12:21',
'version' => '2.067'
},
{
'date' => '2014-12-23T17:44:34',
'version' => '2.068'
},
{
'date' => '2015-09-27T14:33:57',
'version' => '2.069'
},
{
'date' => '2016-12-28T23:07:42',
'version' => '2.070'
},
{
'date' => '2017-02-12T20:39:20',
'version' => '2.072'
},
{
'date' => '2017-02-19T20:35:17',
'version' => '2.073'
},
{
'date' => '2017-02-19T22:11:17',
'version' => '2.074'
},
{
'date' => '2018-04-03T18:20:04',
'version' => '2.080'
},
{
'date' => '2018-04-08T15:01:21',
'version' => '2.081'
},
{
'date' => '2018-12-30T22:38:05',
'version' => '2.083'
},
{
'date' => '2019-01-06T08:56:52',
'version' => '2.084'
},
{
'date' => '2019-03-31T19:13:22',
'version' => '2.086'
},
{
'date' => '2019-08-10T18:11:44',
'version' => '2.087'
},
{
'date' => '2019-11-03T08:56:50',
'version' => '2.088'
},
{
'date' => '2019-11-03T19:53:42',
'version' => '2.089'
},
{
'date' => '2019-11-09T18:35:48',
'version' => '2.090'
},
{
'date' => '2019-11-23T19:34:12',
'version' => '2.091'
},
{
'date' => '2019-12-04T22:08:25',
'version' => '2.092'
},
{
'date' => '2019-12-07T16:05:12',
'version' => '2.093'
},
{
'date' => '2020-07-13T10:53:44',
'version' => '2.094'
},
{
'date' => '2020-07-20T19:13:40',
'version' => '2.095'
},
{
'date' => '2020-07-31T20:50:12',
'version' => '2.096'
},
{
'date' => '2021-01-07T13:00:00',
'version' => '2.100'
},
{
'date' => '2021-02-20T14:08:53',
'version' => '2.101'
},
{
'date' => '2022-04-03T19:48:28',
'version' => '2.103'
},
{
'date' => '2022-06-25T09:02:32',
'version' => '2.201'
},
{
'date' => '2023-02-08T19:23:39',
'version' => '2.204'
},
{
'date' => '2023-07-16T15:36:44',
'version' => '2.205'
},
{
'date' => '2023-07-25T15:36:59',
'version' => '2.206'
},
{
'date' => '2024-02-18T22:19:11',
'version' => '2.207'
},
{
'date' => '2024-02-19T09:28:45',
'version' => '2.208'
},
{
'date' => '2024-02-20T13:23:07',
'version' => '2.209'
},
{
'date' => '2024-02-26T09:33:37',
'version' => '2.210'
},
{
'date' => '2024-04-06T13:40:27',
'version' => '2.211'
},
{
'date' => '2024-04-27T12:52:31',
'version' => '2.212'
},
{
'date' => '2024-08-28T15:29:28',
'version' => '2.213'
}
]
},
'Compress-Raw-Zlib' => {
'advisories' => [
{
'affected_versions' => [
'<2.017'
],
'cves' => [
'CVE-2009-1391'
],
'description' => 'Off-by-one error in the inflate function in Zlib.xs in Compress::Raw::Zlib Perl module before 2.017, as used in AMaViS, SpamAssassin, and possibly other products, allows context-dependent attackers to cause a denial of service (hang or crash) via a crafted zlib compressed stream that triggers a heap-based buffer overflow, as exploited in the wild by Trojan.Downloader-71014 in June 2009.
',
'distribution' => 'Compress-Raw-Zlib',
'fixed_versions' => [],
'id' => 'CPANSA-Compress-Raw-Zlib-2009-1391',
'references' => [
'http://article.gmane.org/gmane.mail.virus.amavis.user/33635',
'http://article.gmane.org/gmane.mail.virus.amavis.user/33638',
'http://www.securityfocus.com/bid/35307',
'http://secunia.com/advisories/35422',
'https://bugzilla.redhat.com/show_bug.cgi?id=504386',
'http://www.vupen.com/english/advisories/2009/1571',
'http://thread.gmane.org/gmane.mail.virus.amavis.user/33635',
'http://osvdb.org/55041',
'http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html',
'http://secunia.com/advisories/35876',
'http://secunia.com/advisories/35685',
'https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00607.html',
'http://secunia.com/advisories/35689',
'http://www.mandriva.com/security/advisories?name=MDVSA-2009:157',
'http://security.gentoo.org/glsa/glsa-200908-07.xml',
'https://bugs.gentoo.org/show_bug.cgi?id=273141',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/51062',
'https://usn.ubuntu.com/794-1/'
],
'reported' => '2009-06-16',
'severity' => undef
}
],
'main_module' => 'Compress::Raw::Zlib',
'versions' => [
{
'date' => '2006-03-03T23:06:38',
'version' => '2.000_09'
},
{
'date' => '2006-03-13T16:14:20',
'version' => '2.000_10'
},
{
'date' => '2006-04-15T21:23:24',
'version' => '2.000_11'
},
{
'date' => '2006-05-17T12:43:41',
'version' => '2.000_12'
},
{
'date' => '2006-06-20T12:45:30',
'version' => '2.000_13'
},
{
'date' => '2006-10-26T14:15:34',
'version' => '2.000_09'
},
{
'date' => '2006-11-01T10:35:38',
'version' => '2.001'
},
{
'date' => '2006-12-29T20:40:35',
'version' => '2.002'
},
{
'date' => '2007-01-02T13:03:57',
'version' => '2.003'
},
{
'date' => '2007-03-03T15:50:15',
'version' => '2.004'
},
{
'date' => '2007-07-01T00:07:02',
'version' => '2.005'
},
{
'date' => '2007-09-01T19:44:59',
'version' => '2.006'
},
{
'date' => '2007-11-10T11:59:36',
'version' => '2.008'
},
{
'date' => '2008-04-20T14:42:52',
'version' => '2.009'
},
{
'date' => '2008-05-05T17:18:27',
'version' => '2.010'
},
{
'date' => '2008-05-17T11:16:28',
'version' => '2.011'
},
{
'date' => '2008-07-15T22:24:07',
'version' => '2.012'
},
{
'date' => '2008-09-02T20:20:16',
'version' => '2.014'
},
{
'date' => '2008-09-03T20:47:27',
'version' => '2.015'
},
{
'date' => '2009-04-04T09:49:03',
'version' => '2.017'
},
{
'date' => '2009-05-03T16:27:08',
'version' => '2.018'
},
{
'date' => '2009-05-04T09:42:17',
'version' => '2.019'
},
{
'date' => '2009-06-03T17:48:30',
'version' => '2.020'
},
{
'date' => '2009-08-30T20:25:35',
'version' => '2.021'
},
{
'date' => '2009-11-09T23:26:59',
'version' => '2.023'
},
{
'date' => '2010-01-09T17:56:35',
'version' => '2.024'
},
{
'date' => '2010-03-28T12:57:08',
'version' => '2.025'
},
{
'date' => '2010-04-07T19:51:09',
'version' => '2.026'
},
{
'date' => '2010-04-24T19:15:54',
'version' => '2.027'
},
{
'date' => '2010-07-24T14:31:01',
'version' => '2.030'
},
{
'date' => '2011-01-06T11:23:45',
'version' => '2.032'
},
{
'date' => '2011-01-11T14:03:45',
'version' => '2.033'
},
{
'date' => '2011-05-02T22:05:37',
'version' => '2.034'
},
{
'date' => '2011-05-07T08:31:57',
'version' => '2.035'
},
{
'date' => '2011-06-18T21:45:36',
'version' => '2.036'
},
{
'date' => '2011-06-22T07:18:22',
'version' => '2.037'
},
{
'date' => '2011-10-28T14:28:35',
'version' => '2.039'
},
{
'date' => '2011-10-28T22:20:38',
'version' => '2.040'
},
{
'date' => '2011-11-17T23:45:21',
'version' => '2.042'
},
{
'date' => '2011-11-20T21:33:33',
'version' => '2.043'
},
{
'date' => '2011-12-03T22:49:10',
'version' => '2.044'
},
{
'date' => '2011-12-04T19:21:36',
'version' => '2.045'
},
{
'date' => '2012-01-28T23:28:28',
'version' => '2.047'
},
{
'date' => '2012-01-29T17:00:33',
'version' => '2.048'
},
{
'date' => '2012-02-18T15:58:12',
'version' => '2.049'
},
{
'date' => '2012-02-21T19:35:18',
'version' => '2.050'
},
{
'date' => '2012-02-22T20:43:23',
'version' => '2.051'
},
{
'date' => '2012-04-29T12:41:57',
'version' => '2.052'
},
{
'date' => '2012-05-06T08:40:06',
'version' => '2.053'
},
{
'date' => '2012-05-08T19:22:47',
'version' => '2.054'
},
{
'date' => '2012-08-05T20:36:06',
'version' => '2.055'
},
{
'date' => '2012-08-10T22:20:09',
'version' => '2.056'
},
{
'date' => '2012-11-10T19:08:56',
'version' => '2.057'
},
{
'date' => '2012-11-12T22:14:42',
'version' => '2.058'
},
{
'date' => '2012-11-25T13:38:42',
'version' => '2.059'
},
{
'date' => '2013-01-07T20:02:22',
'version' => '2.060'
},
{
'date' => '2013-05-27T09:54:54',
'version' => '2.061'
},
{
'date' => '2013-08-12T19:08:05',
'version' => '2.062'
},
{
'date' => '2013-11-02T17:15:17',
'version' => '2.063'
},
{
'date' => '2014-02-01T23:21:28',
'version' => '2.064'
},
{
'date' => '2014-02-03T20:23:00',
'version' => '2.065'
},
{
'date' => '2014-09-21T12:42:35',
'version' => '2.066'
},
{
'date' => '2014-12-08T15:14:00',
'version' => '2.067'
},
{
'date' => '2014-12-23T17:44:57',
'version' => '2.068'
},
{
'date' => '2015-09-26T18:41:58',
'version' => '2.069'
},
{
'date' => '2016-12-28T23:09:21',
'version' => '2.070'
},
{
'date' => '2016-12-30T22:58:08',
'version' => '2.071'
},
{
'date' => '2017-02-12T20:41:25',
'version' => '2.072'
},
{
'date' => '2017-02-19T20:37:20',
'version' => '2.073'
},
{
'date' => '2017-02-19T22:11:41',
'version' => '2.074'
},
{
'date' => '2017-11-14T15:43:26',
'version' => '2.075'
},
{
'date' => '2017-11-21T22:29:23',
'version' => '2.076'
},
{
'date' => '2018-04-03T18:22:06',
'version' => '2.080'
},
{
'date' => '2018-04-08T15:02:55',
'version' => '2.081'
},
{
'date' => '2018-12-30T22:40:08',
'version' => '2.083'
},
{
'date' => '2019-01-06T08:57:15',
'version' => '2.084'
},
{
'date' => '2019-03-31T19:11:54',
'version' => '2.086'
},
{
'date' => '2019-08-10T18:12:03',
'version' => '2.087'
},
{
'date' => '2019-11-03T08:55:23',
'version' => '2.088'
},
{
'date' => '2019-11-03T19:54:04',
'version' => '2.089'
},
{
'date' => '2019-11-09T15:58:48',
'version' => '2.090'
},
{
'date' => '2019-11-23T19:34:34',
'version' => '2.091'
},
{
'date' => '2019-12-04T22:08:37',
'version' => '2.092'
},
{
'date' => '2019-12-07T16:05:34',
'version' => '2.093'
},
{
'date' => '2020-07-13T10:54:06',
'version' => '2.094'
},
{
'date' => '2020-07-21T06:57:01',
'version' => '2.095'
},
{
'date' => '2020-07-31T20:48:45',
'version' => '2.096'
},
{
'date' => '2021-01-07T13:00:23',
'version' => '2.100'
},
{
'date' => '2021-02-20T14:10:43',
'version' => '2.101'
},
{
'date' => '2022-04-03T19:48:50',
'version' => '2.103'
},
{
'date' => '2022-05-13T06:30:30',
'version' => '2.104'
},
{
'date' => '2022-05-14T14:24:32',
'version' => '2.105'
},
{
'date' => '2022-06-21T21:19:21',
'version' => '2.200'
},
{
'date' => '2022-06-25T09:04:10',
'version' => '2.201'
},
{
'date' => '2022-06-27T08:18:10',
'version' => '2.202'
},
{
'date' => '2023-02-08T19:26:25',
'version' => '2.204'
},
{
'date' => '2023-07-16T15:32:41',
'version' => '2.205'
},
{
'date' => '2023-07-25T15:35:40',
'version' => '2.206'
},
{
'date' => '2024-02-18T22:16:24',
'version' => '2.207'
},
{
'date' => '2024-02-19T09:27:19',
'version' => '2.208'
},
{
'date' => '2024-02-26T16:11:33',
'version' => '2.209'
},
{
'date' => '2024-04-06T13:41:58',
'version' => '2.211'
},
{
'date' => '2024-04-27T12:55:28',
'version' => '2.212'
},
{
'date' => '2024-08-28T15:27:59',
'version' => '2.213'
}
]
},
'Config-IniFiles' => {
'advisories' => [
{
'affected_versions' => [
'<2.71'
],
'cves' => [
'CVE-2012-2451'
],
'description' => 'The Config::IniFiles module before 2.71 for Perl creates temporary files with predictable names, which allows local users to overwrite arbitrary files via a symlink attack. NOTE: some of these details are obtained from third party information. NOTE: it has been reported that this might only be exploitable by writing in the same directory as the .ini file. If this is the case, then this issue might not cross privilege boundaries.
',
'distribution' => 'Config-IniFiles',
'fixed_versions' => [],
'id' => 'CPANSA-Config-IniFiles-2012-2451',
'references' => [
'http://www.openwall.com/lists/oss-security/2012/05/02/6',
'http://www.osvdb.org/81671',
'http://secunia.com/advisories/48990',
'https://bitbucket.org/shlomif/perl-config-inifiles/changeset/a08fa26f4f59',
'https://bugzilla.redhat.com/show_bug.cgi?id=818386',
'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080713.html',
'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080716.html',
'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081207.html',
'http://www.securityfocus.com/bid/53361',
'http://www.ubuntu.com/usn/USN-1543-1',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/75328'
],
'reported' => '2012-06-27',
'severity' => undef
}
],
'main_module' => 'Config::IniFiles',
'versions' => [
{
'date' => '2000-06-20T02:07:11',
'version' => '0.05'
},
{
'date' => '2000-06-26T02:38:13',
'version' => '0.06'
},
{
'date' => '2000-07-31T01:32:53',
'version' => '0.08'
},
{
'date' => '2000-07-31T01:51:15',
'version' => '0.09'
},
{
'date' => '2000-09-17T03:29:50',
'version' => '0.11'
},
{
'date' => '2000-09-20T01:06:10',
'version' => '1.6'
},
{
'date' => '2000-10-17T02:01:37',
'version' => '1.8'
},
{
'date' => '2000-11-25T03:36:14',
'version' => '1.11'
},
{
'date' => '2000-11-28T14:09:00',
'version' => '1.12'
},
{
'date' => '2000-11-28T14:09:15',
'version' => '1.13'
},
{
'date' => '2000-12-13T17:45:25',
'version' => '2.10'
},
{
'date' => '2000-12-18T17:56:28',
'version' => '2.13'
},
{
'date' => '2001-01-08T18:27:24',
'version' => '2.14'
},
{
'date' => '2001-03-24T21:54:18',
'version' => '2.17'
},
{
'date' => '2001-03-30T04:48:27',
'version' => '2.18'
},
{
'date' => '2001-04-05T01:06:51',
'version' => '2.19'
},
{
'date' => '2001-08-28T11:05:35',
'version' => '2.21'
},
{
'date' => '2001-12-06T17:15:03',
'version' => '2.22'
},
{
'date' => '2001-12-07T16:24:14',
'version' => '2.23'
},
{
'date' => '2001-12-07T17:27:08',
'version' => '2.24'
},
{
'date' => '2001-12-12T20:50:06',
'version' => '2.25'
},
{
'date' => '2001-12-19T22:26:32',
'version' => '2.26'
},
{
'date' => '2001-12-20T16:11:24',
'version' => '2.27'
},
{
'date' => '2002-08-15T21:41:35',
'version' => '2.29'
},
{
'date' => '2002-10-15T18:59:21',
'version' => '2.30'
},
{
'date' => '2002-12-18T01:58:55',
'version' => '2.36'
},
{
'date' => '2003-01-31T23:06:08',
'version' => '2.37'
},
{
'date' => '2003-05-14T01:38:13',
'version' => '2.38'
},
{
'date' => '2005-04-29T20:33:23',
'version' => '2.39'
},
{
'date' => '2008-12-04T17:02:19',
'version' => '2.43'
},
{
'date' => '2008-12-25T09:47:08',
'version' => '2.44'
},
{
'date' => '2008-12-27T15:25:59',
'version' => '2.45'
},
{
'date' => '2009-01-17T14:40:26',
'version' => '2.46'
},
{
'date' => '2009-01-21T09:41:11',
'version' => '2.47'
},
{
'date' => '2009-04-07T12:26:44',
'version' => '2.48'
},
{
'date' => '2009-05-02T14:27:53',
'version' => '2.49'
},
{
'date' => '2009-05-31T11:58:04',
'version' => '2.50'
},
{
'date' => '2009-06-08T09:41:11',
'version' => '2.51'
},
{
'date' => '2009-06-28T13:21:57',
'version' => '2.52'
},
{
'date' => '2009-11-13T09:58:28',
'version' => '2.53'
},
{
'date' => '2009-11-18T11:15:13',
'version' => '2.54'
},
{
'date' => '2009-12-22T15:48:07',
'version' => '2.55'
},
{
'date' => '2009-12-31T04:57:40',
'version' => '2.56'
},
{
'date' => '2010-03-01T13:51:57',
'version' => '2.57'
},
{
'date' => '2010-05-17T07:45:33',
'version' => '2.58'
},
{
'date' => '2010-11-12T11:33:52',
'version' => '2.59'
},
{
'date' => '2010-11-13T07:22:50',
'version' => '2.60'
},
{
'date' => '2010-11-14T08:57:26',
'version' => '2.61'
},
{
'date' => '2010-11-19T13:37:37',
'version' => '2.62'
},
{
'date' => '2010-11-19T14:54:12',
'version' => '2.63'
},
{
'date' => '2010-11-20T09:55:05',
'version' => '2.64'
},
{
'date' => '2010-11-25T18:48:52',
'version' => '2.65'
},
{
'date' => '2011-01-29T16:40:18',
'version' => '2.66'
},
{
'date' => '2011-06-21T11:59:37',
'version' => '2.67'
},
{
'date' => '2011-06-21T19:18:33',
'version' => '2.68'
},
{
'date' => '2012-04-05T09:10:11',
'version' => '2.69'
},
{
'date' => '2012-04-06T09:52:14',
'version' => '2.70'
},
{
'date' => '2012-05-02T08:05:15',
'version' => '2.71'
},
{
'date' => '2012-05-05T16:56:55',
'version' => '2.72'
},
{
'date' => '2012-05-14T07:49:33',
'version' => '2.73'
},
{
'date' => '2012-05-23T21:47:46',
'version' => '2.74'
},
{
'date' => '2012-05-25T12:29:48',
'version' => '2.75'
},
{
'date' => '2012-06-15T14:47:10',
'version' => '2.76'
},
{
'date' => '2012-06-21T16:39:23',
'version' => '2.77'
},
{
'date' => '2012-10-21T11:18:39',
'version' => '2.78'
},
{
'date' => '2013-05-06T07:10:33',
'version' => '2.79'
},
{
'date' => '2013-05-14T19:25:07',
'version' => '2.80'
},
{
'date' => '2013-05-16T10:36:17',
'version' => '2.81'
},
{
'date' => '2013-05-21T15:35:10',
'version' => '2.82'
},
{
'date' => '2014-01-27T09:01:28',
'version' => '2.83'
},
{
'date' => '2015-04-13T18:40:30',
'version' => '2.84'
},
{
'date' => '2015-04-13T19:08:57',
'version' => '2.85'
},
{
'date' => '2015-04-14T07:55:59',
'version' => '2.86'
},
{
'date' => '2015-06-16T09:06:37',
'version' => '2.87'
},
{
'date' => '2015-07-10T08:38:11',
'version' => '2.88'
},
{
'date' => '2016-05-03T09:14:13',
'version' => '2.89'
},
{
'date' => '2016-06-02T13:09:19',
'version' => '2.90'
},
{
'date' => '2016-06-03T03:11:38',
'version' => '2.91'
},
{
'date' => '2016-06-17T09:34:08',
'version' => '2.92'
},
{
'date' => '2016-07-24T08:34:00',
'version' => '2.93'
},
{
'date' => '2016-11-29T17:31:38',
'version' => '2.94'
},
{
'date' => '2018-03-16T11:14:39',
'version' => '2.95'
},
{
'date' => '2018-04-07T08:45:56',
'version' => '2.96'
},
{
'date' => '2018-04-21T09:13:56',
'version' => '2.97'
},
{
'date' => '2018-04-21T11:50:34',
'version' => '2.98'
},
{
'date' => '2018-09-13T07:11:41',
'version' => '3.000000'
},
{
'date' => '2019-01-16T09:54:40',
'version' => '3.000001'
},
{
'date' => '2019-03-14T13:34:40',
'version' => '3.000002'
},
{
'date' => '2020-03-24T15:45:08',
'version' => '3.000003'
}
]
},
'Config-Model' => {
'advisories' => [
{
'affected_versions' => [
'<2.102'
],
'cves' => [
'CVE-2017-0373'
],
'description' => 'The gen_class_pod implementation in lib/Config/Model/Utils/GenClassPod.pm in Config-Model (aka libconfig-model-perl) before 2.102 has a dangerous "use lib" line, which allows remote attackers to have an unspecified impact via a crafted Debian package file.
',
'distribution' => 'Config-Model',
'fixed_versions' => [
'>=2.102'
],
'id' => 'CPANSA-Config-Model-2017-03',
'references' => [
'https://metacpan.org/changes/distribution/Config-Model',
'https://github.com/dod38fr/config-model/commit/9bd64d9ec6c0939166a2216a37d58dd19a725951'
],
'reported' => '2017-05-10'
},
{
'affected_versions' => [
'<2.102'
],
'cves' => [
'CVE-2017-0374'
],
'description' => 'Loads models from a local directory, making it possible to substitute the model.
',
'distribution' => 'Config-Model',
'fixed_versions' => [
'>=2.102'
],
'id' => 'CPANSA-Config-Model-2017-02',
'references' => [
'https://metacpan.org/changes/distribution/Config-Model',
'https://github.com/dod38fr/config-model/commit/4d37c75b0c4f9633b67999f8260b08027a6bc524'
],
'reported' => '2017-05-10'
},
{
'affected_versions' => [
'<2.102'
],
'cves' => [],
'description' => 'YAML or YAML::XS can be loaded automatically making it possible to run arbitrary code loading a specially crafted YAML file.
',
'distribution' => 'Config-Model',
'fixed_versions' => [
'>=2.102'
],
'id' => 'CPANSA-Config-Model-2017-01',
'references' => [
'https://metacpan.org/changes/distribution/Config-Model',
'https://github.com/dod38fr/config-model/commit/01d212348bfbadf31bd74aadd26b1e391ff2fd92'
],
'reported' => '2017-05-10'
}
],
'main_module' => 'Config::Model',
'versions' => [
{
'date' => '2006-04-21T12:27:44',
'version' => '0.505'
},
{
'date' => '2006-05-19T13:32:14',
'version' => '0.506'
},
{
'date' => '2006-06-15T12:10:38',
'version' => '0.507'
},
{
'date' => '2006-07-20T12:28:36',
'version' => '0.601'
},
{
'date' => '2006-09-07T12:06:17',
'version' => '0.602'
},
{
'date' => '2006-10-19T11:24:40',
'version' => '0.603'
},
{
'date' => '2006-12-06T12:58:35',
'version' => '0.604'
},
{
'date' => '2007-01-08T13:16:42',
'version' => '0.605'
},
{
'date' => '2007-01-11T12:42:09',
'version' => '0.606'
},
{
'date' => '2007-01-12T13:06:38',
'version' => '0.607'
},
{
'date' => '2007-02-23T13:00:34',
'version' => '0.608'
},
{
'date' => '2007-05-14T11:41:18',
'version' => '0.609'
},
{
'date' => '2007-06-06T12:28:06',
'version' => '0.610'
},
{
'date' => '2007-07-03T15:35:21',
'version' => '0.611'
},
{
'date' => '2007-07-27T11:38:57',
'version' => '0.612'
},
{
'date' => '2007-10-01T15:52:56',
'version' => '0.613'
},
{
'date' => '2007-10-23T16:10:29',
'version' => '0.614'
},
{
'date' => '2007-11-15T12:36:18',
'version' => '0.615'
},
{
'date' => '2007-12-04T12:41:22',
'version' => '0.616'
},
{
'date' => '2008-01-28T11:55:50',
'version' => '0.617'
},
{
'date' => '2008-02-14T12:56:25',
'version' => '0.618'
},
{
'date' => '2008-02-29T12:08:41',
'version' => '0.619'
},
{
'date' => '2008-03-18T17:40:57',
'version' => '0.620'
},
{
'date' => '2008-03-20T07:49:00',
'version' => '0.6201'
},
{
'date' => '2008-04-04T11:38:49',
'version' => '0.621'
},
{
'date' => '2008-04-25T16:23:31',
'version' => '0.622'
},
{
'date' => '2008-05-19T11:47:46',
'version' => '0.623'
},
{
'date' => '2008-07-25T11:35:07',
'version' => '0.624'
},
{
'date' => '2008-07-30T12:02:43',
'version' => '0.625'
},
{
'date' => '2008-09-22T12:20:00',
'version' => '0.626'
},
{
'date' => '2008-09-23T11:05:58',
'version' => '0.627'
},
{
'date' => '2008-09-29T12:35:05',
'version' => '0.628'
},
{
'date' => '2008-10-13T15:09:27',
'version' => '0.629'
},
{
'date' => '2008-10-21T11:59:27',
'version' => '0.630'
},
{
'date' => '2008-11-10T14:37:44',
'version' => '0.631'
},
{
'date' => '2008-12-16T13:32:26',
'version' => '0.632'
},
{
'date' => '2008-12-23T15:36:48',
'version' => '0.633'
},
{
'date' => '2009-03-05T13:06:32',
'version' => '0.634'
},
{
'date' => '2009-04-20T12:21:46',
'version' => '0.635'
},
{
'date' => '2009-05-30T16:19:54',
'version' => '0.636'
},
{
'date' => '2009-06-23T12:07:41',
'version' => '0.637'
},
{
'date' => '2009-06-30T11:31:35',
'version' => '0.638'
},
{
'date' => '2009-09-08T11:35:25',
'version' => '0.639'
},
{
'date' => '2009-09-09T16:10:41',
'version' => '0.640'
},
{
'date' => '2010-01-20T17:30:14',
'version' => '0.641'
},
{
'date' => '2010-01-21T17:17:34',
'version' => '0.642'
},
{
'date' => '2010-02-25T13:04:52',
'version' => '0.643'
},
{
'date' => '2010-03-12T15:24:45',
'version' => '0.644'
},
{
'date' => '2010-03-28T14:53:46',
'version' => '1.001'
},
{
'date' => '2010-04-22T12:22:00',
'version' => '1.202'
},
{
'date' => '2010-06-03T11:09:45',
'version' => '1.203'
},
{
'date' => '2010-06-03T11:20:09',
'version' => '1.204'
},
{
'date' => '2010-06-07T16:04:03',
'version' => '1.205'
},
{
'date' => '2010-08-13T10:53:09',
'version' => '1.206'
},
{
'date' => '2010-09-14T16:14:40',
'version' => '1.207'
},
{
'date' => '2010-09-16T11:46:11',
'version' => '1.208'
},
{
'date' => '2010-09-20T12:29:12',
'version' => '1.209'
},
{
'date' => '2010-09-30T16:34:27',
'version' => '1.210'
},
{
'date' => '2010-10-08T10:46:45',
'version' => '1.211'
},
{
'date' => '2010-10-15T11:08:52',
'version' => '1.212'
},
{
'date' => '2010-10-19T12:29:03',
'version' => '1.213'
},
{
'date' => '2010-10-19T15:17:01',
'version' => '1.214'
},
{
'date' => '2010-10-19T15:28:56',
'version' => '1.215'
},
{
'date' => '2010-10-26T12:16:51',
'version' => '1.216'
},
{
'date' => '2010-10-30T12:44:11',
'version' => '1.217'
},
{
'date' => '2010-11-05T11:53:14',
'version' => '1.218'
},
{
'date' => '2010-11-09T13:20:51',
'version' => '1.219'
},
{
'date' => '2010-11-10T08:41:22',
'version' => '1.220'
},
{
'date' => '2010-11-21T17:40:10',
'version' => '1.221'
},
{
'date' => '2010-11-22T14:01:55',
'version' => '1.222'
},
{
'date' => '2010-11-28T17:34:03',
'version' => '1.223'
},
{
'date' => '2010-12-06T13:18:53',
'version' => '1.224'
},
{
'date' => '2010-12-07T08:01:43',
'version' => '1.225'
},
{
'date' => '2010-12-08T18:48:08',
'version' => '1.226'
},
{
'date' => '2011-01-07T18:12:45',
'version' => '1.227'
},
{
'date' => '2011-01-09T12:27:15',
'version' => '1.228'
},
{
'date' => '2011-01-10T19:57:53',
'version' => '1.229'
},
{
'date' => '2011-01-20T16:47:27',
'version' => '1.230'
},
{
'date' => '2011-01-30T11:30:23',
'version' => '1.231'
},
{
'date' => '2011-01-30T13:51:34',
'version' => '1.232'
},
{
'date' => '2011-02-11T12:25:32',
'version' => '1.233'
},
{
'date' => '2011-02-21T17:11:22',
'version' => '1.234'
},
{
'date' => '2011-03-01T13:06:28',
'version' => '1.235'
},
{
'date' => '2011-04-01T14:09:03',
'version' => '1.236'
},
{
'date' => '2011-04-04T12:57:04',
'version' => '1.237'
},
{
'date' => '2011-04-05T14:45:45',
'version' => '1.238'
},
{
'date' => '2011-04-05T17:40:17',
'version' => '1.240'
},
{
'date' => '2011-04-07T18:09:49',
'version' => '1.241'
},
{
'date' => '2011-04-25T15:28:14',
'version' => '1.242'
},
{
'date' => '2011-05-02T12:33:33',
'version' => '1.243'
},
{
'date' => '2011-05-16T15:52:46',
'version' => '1.244'
},
{
'date' => '2011-06-17T12:10:22',
'version' => '1.245'
},
{
'date' => '2011-06-20T12:32:24',
'version' => '1.246'
},
{
'date' => '2011-06-27T14:14:52',
'version' => '1.247'
},
{
'date' => '2011-07-05T15:48:52',
'version' => '1.248'
},
{
'date' => '2011-07-12T09:54:39',
'version' => '1.249'
},
{
'date' => '2011-07-22T12:40:47',
'version' => '1.250'
},
{
'date' => '2011-08-30T12:16:32',
'version' => '1.251'
},
{
'date' => '2011-09-01T16:06:19',
'version' => '1.252'
},
{
'date' => '2011-09-02T16:03:35',
'version' => '1.253'
},
{
'date' => '2011-09-04T15:21:52',
'version' => '1.254'
},
{
'date' => '2011-09-15T15:23:39',
'version' => '1.255'
},
{
'date' => '2011-09-16T12:28:51',
'version' => '1.256'
},
{
'date' => '2011-09-23T10:52:00',
'version' => '1.257'
},
{
'date' => '2011-10-14T14:45:06',
'version' => '1.258'
},
{
'date' => '2011-10-16T10:17:53',
'version' => '1.259'
},
{
'date' => '2011-10-28T13:28:02',
'version' => '1.260'
},
{
'date' => '2011-11-18T17:02:26',
'version' => '1.261'
},
{
'date' => '2011-11-19T11:55:30',
'version' => '1.262'
},
{
'date' => '2011-11-29T15:43:38',
'version' => '1.263'
},
{
'date' => '2011-11-30T07:50:25',
'version' => '1.264'
},
{
'date' => '2011-12-06T18:26:54',
'version' => '1.265'
},
{
'date' => '2012-02-06T11:55:29',
'version' => '2.001'
},
{
'date' => '2012-02-08T09:49:49',
'version' => '2.002'
},
{
'date' => '2012-02-08T13:14:22',
'version' => '2.003'
},
{
'date' => '2012-02-09T11:28:18',
'version' => '2.004'
},
{
'date' => '2012-02-23T18:25:32',
'version' => '2.005'
},
{
'date' => '2012-02-25T11:30:41',
'version' => '2.006'
},
{
'date' => '2012-02-26T16:34:50',
'version' => '2.007'
},
{
'date' => '2012-03-01T12:40:23',
'version' => '2.008'
},
{
'date' => '2012-03-13T13:11:49',
'version' => '2.009'
},
{
'date' => '2012-03-13T13:15:03',
'version' => '2.010'
},
{
'date' => '2012-03-19T21:41:44',
'version' => '2.011'
},
{
'date' => '2012-04-05T11:41:54',
'version' => '2.012'
},
{
'date' => '2012-04-06T12:10:46',
'version' => '2.013'
},
{
'date' => '2012-05-04T13:57:13',
'version' => '2.014'
},
{
'date' => '2012-05-14T10:06:13',
'version' => '2.015'
},
{
'date' => '2012-05-20T08:38:36',
'version' => '2.016'
},
{
'date' => '2012-05-21T10:56:35',
'version' => '2.017'
},
{
'date' => '2012-05-29T13:53:06',
'version' => '2.018'
},
{
'date' => '2012-06-05T12:34:15',
'version' => '2.019'
},
{
'date' => '2012-06-18T08:34:26',
'version' => '2.020'
},
{
'date' => '2012-06-27T14:44:55',
'version' => '2.021_01'
},
{
'date' => '2012-06-28T15:30:52',
'version' => '2.021'
},
{
'date' => '2012-07-03T14:47:31',
'version' => '2.022'
},
{
'date' => '2012-07-04T13:50:37',
'version' => '2.023'
},
{
'date' => '2012-09-04T11:30:02',
'version' => '2.024'
},
{
'date' => '2012-09-10T10:52:02',
'version' => '2.025'
},
{
'date' => '2012-09-20T17:12:09',
'version' => '2.026_1'
},
{
'date' => '2012-09-21T10:38:47',
'version' => '2.026_2'
},
{
'date' => '2012-09-27T11:53:42',
'version' => '2.026'
},
{
'date' => '2012-10-30T12:48:16',
'version' => '2.027'
},
{
'date' => '2012-11-27T12:44:55',
'version' => '2.028'
},
{
'date' => '2012-11-28T13:31:04',
'version' => '2.029'
},
{
'date' => '2013-02-27T18:37:05',
'version' => '2.030_01'
},
{
'date' => '2013-03-23T09:47:53',
'version' => '2.030'
},
{
'date' => '2013-04-03T17:22:28',
'version' => '2.031'
},
{
'date' => '2013-04-15T11:28:33',
'version' => '2.032'
},
{
'date' => '2013-04-15T19:27:14',
'version' => '2.033'
},
{
'date' => '2013-04-17T19:29:52',
'version' => '2.034'
},
{
'date' => '2013-04-27T15:05:09',
'version' => '2.035'
},
{
'date' => '2013-05-25T17:53:04',
'version' => '2.036'
},
{
'date' => '2013-06-15T17:46:45',
'version' => '2.037'
},
{
'date' => '2013-07-03T19:30:32',
'version' => '2.038'
},
{
'date' => '2013-07-18T18:12:07',
'version' => '2.039'
},
{
'date' => '2013-07-20T09:46:11',
'version' => '2.040'
},
{
'date' => '2013-08-14T17:58:40',
'version' => '2.041'
},
{
'date' => '2013-09-15T17:41:45',
'version' => '2.042'
},
{
'date' => '2013-09-20T17:35:06',
'version' => '2.043'
},
{
'date' => '2013-10-13T16:02:40',
'version' => '2.044'
},
{
'date' => '2013-10-18T17:48:15',
'version' => '2.045'
},
{
'date' => '2013-12-15T13:07:37',
'version' => '2.046'
},
{
'date' => '2014-01-25T15:54:37',
'version' => '2.047'
},
{
'date' => '2014-02-23T18:02:19',
'version' => '2.048'
},
{
'date' => '2014-02-26T19:45:44',
'version' => '2.049'
},
{
'date' => '2014-02-27T18:12:32',
'version' => '2.050'
},
{
'date' => '2014-03-06T18:23:11',
'version' => '2.051'
},
{
'date' => '2014-03-23T16:20:43',
'version' => '2.052'
},
{
'date' => '2014-03-25T19:11:57',
'version' => '2.053'
},
{
'date' => '2014-04-01T17:51:50',
'version' => '2.054'
},
{
'date' => '2014-05-02T11:33:28',
'version' => '2.055'
},
{
'date' => '2014-05-18T19:34:53',
'version' => '2.056'
},
{
'date' => '2014-06-12T19:32:47',
'version' => '2.057'
},
{
'date' => '2014-06-19T19:43:18',
'version' => '2.058'
},
{
'date' => '2014-06-29T15:08:02',
'version' => '2.059'
},
{
'date' => '2014-08-19T12:43:59',
'version' => '2.060'
},
{
'date' => '2014-09-23T19:21:04',
'version' => '2.061'
},
{
'date' => '2014-11-23T19:45:05',
'version' => '2.062'
},
{
'date' => '2014-11-28T17:55:21',
'version' => '2.063'
},
{
'date' => '2014-12-04T18:47:05',
'version' => '2.064'
},
{
'date' => '2015-01-06T20:16:15',
'version' => '2.065'
},
{
'date' => '2015-02-15T16:13:00',
'version' => '2.066'
},
{
'date' => '2015-03-01T18:38:28',
'version' => '2.067'
},
{
'date' => '2015-03-29T13:39:56',
'version' => '2.068'
},
{
'date' => '2015-04-25T19:29:15',
'version' => '2.069'
},
{
'date' => '2015-05-03T14:00:52',
'version' => '2.070'
},
{
'date' => '2015-05-23T11:15:16',
'version' => '2.071'
},
{
'date' => '2015-07-18T19:31:43',
'version' => '2.072'
},
{
'date' => '2015-07-19T07:35:51',
'version' => '2.073'
},
{
'date' => '2015-09-30T18:56:39',
'version' => '2.074'
},
{
'date' => '2015-11-22T20:11:19',
'version' => '2.075'
},
{
'date' => '2016-01-14T18:13:20',
'version' => '2.076'
},
{
'date' => '2016-01-20T19:55:36',
'version' => '2.077'
},
{
'date' => '2016-01-24T18:48:46',
'version' => '2.078'
},
{
'date' => '2016-02-12T20:44:28',
'version' => '2.079'
},
{
'date' => '2016-02-27T17:59:55',
'version' => '2.080'
},
{
'date' => '2016-02-29T19:01:45',
'version' => '2.081'
},
{
'date' => '2016-03-29T18:22:30',
'version' => '2.082'
},
{
'date' => '2016-04-20T18:32:29',
'version' => '2.083'
},
{
'date' => '2016-05-26T17:35:53',
'version' => '2.084'
},
{
'date' => '2016-05-29T17:13:14',
'version' => '2.085'
},
{
'date' => '2016-06-04T19:28:08',
'version' => '2.086'
},
{
'date' => '2016-06-29T17:35:35',
'version' => '2.087'
},
{
'date' => '2016-07-09T18:06:03',
'version' => '2.088'
},
{
'date' => '2016-09-04T13:17:52',
'version' => '2.089'
},
{
'date' => '2016-09-10T16:07:07',
'version' => '2.090'
},
{
'date' => '2016-09-13T17:05:56',
'version' => '2.091'
},
{
'date' => '2016-09-23T17:46:04',
'version' => '2.092'
},
{
'date' => '2016-11-08T18:33:39',
'version' => '2.093'
},
{
'date' => '2016-11-09T18:23:05',
'version' => '2.094'
},
{
'date' => '2016-12-06T18:01:00',
'version' => '2.095'
},
{
'date' => '2016-12-11T20:28:14',
'version' => '2.096'
},
{
'date' => '2016-12-22T17:35:34',
'version' => '2.097'
},
{
'date' => '2017-02-26T18:58:23',
'version' => '2.098'
},
{
'date' => '2017-03-05T17:09:37',
'version' => '2.099'
},
{
'date' => '2017-03-18T12:06:34',
'version' => '2.100'
},
{
'date' => '2017-04-28T17:40:56',
'version' => '2.101'
},
{
'date' => '2017-05-14T19:10:40',
'version' => '2.102'
},
{
'date' => '2017-05-25T08:15:17',
'version' => '2.103'
},
{
'date' => '2017-06-03T13:23:33',
'version' => '2.104'
},
{
'date' => '2017-06-09T17:26:55',
'version' => '2.105'
},
{
'date' => '2017-07-16T14:07:23',
'version' => '2.106'
},
{
'date' => '2017-08-30T19:12:10',
'version' => '2.107'
},
{
'date' => '2017-08-31T17:23:43',
'version' => '2.108'
},
{
'date' => '2017-09-18T17:52:57',
'version' => '2.109'
},
{
'date' => '2017-09-21T19:12:32',
'version' => '2.110'
},
{
'date' => '2017-09-22T18:41:04',
'version' => '2.111'
},
{
'date' => '2017-10-01T09:12:45',
'version' => '2.112'
},
{
'date' => '2017-10-12T19:07:46',
'version' => '2.113'
},
{
'date' => '2017-11-11T16:35:03',
'version' => '2.114'
},
{
'date' => '2017-12-14T18:03:18',
'version' => '2.115'
},
{
'date' => '2017-12-16T09:52:09',
'version' => '2.116'
},
{
'date' => '2018-02-03T18:09:35',
'version' => '2.117'
},
{
'date' => '2018-03-26T18:33:19',
'version' => '2.118'
},
{
'date' => '2018-04-02T16:55:50',
'version' => '2.119'
},
{
'date' => '2018-04-08T07:56:03',
'version' => '2.120'
},
{
'date' => '2018-04-15T17:08:18',
'version' => '2.121'
},
{
'date' => '2018-04-17T17:20:14',
'version' => '2.122'
},
{
'date' => '2018-05-01T17:18:09',
'version' => '2.123'
},
{
'date' => '2018-06-09T17:16:59',
'version' => '2.124'
},
{
'date' => '2018-06-24T12:47:24',
'version' => '2.125'
},
{
'date' => '2018-08-20T13:10:09',
'version' => '2.126'
},
{
'date' => '2018-09-30T16:44:13',
'version' => '2.127'
},
{
'date' => '2018-11-21T19:33:41',
'version' => '2.128'
},
{
'date' => '2018-12-05T18:44:58',
'version' => '2.129'
},
{
'date' => '2018-12-07T19:02:10',
'version' => '2.130'
},
{
'date' => '2018-12-16T18:32:58',
'version' => '2.131'
},
{
'date' => '2018-12-22T17:50:27',
'version' => '2.132'
},
{
'date' => '2019-01-13T20:17:07',
'version' => '2.133'
},
{
'date' => '2019-05-05T10:51:38',
'version' => '2.134'
},
{
'date' => '2019-06-05T17:21:24',
'version' => '2.135'
},
{
'date' => '2019-07-29T15:44:09',
'version' => '2.136'
},
{
'date' => '2019-12-01T17:32:00',
'version' => '2.137'
},
{
'date' => '2019-12-27T14:43:21',
'version' => '2.138'
},
{
'date' => '2020-07-18T14:38:14',
'version' => '2.139'
},
{
'date' => '2020-07-31T08:24:37',
'version' => '2.140'
},
{
'date' => '2021-01-17T18:04:01',
'version' => '2.141'
},
{
'date' => '2021-04-07T17:08:47',
'version' => '2.142'
},
{
'date' => '2021-10-31T17:28:44',
'version' => '2.143'
},
{
'date' => '2021-11-04T17:26:40',
'version' => '2.144'
},
{
'date' => '2021-11-06T18:23:25',
'version' => '2.145'
},
{
'date' => '2021-11-28T18:13:47',
'version' => '2.146'
},
{
'date' => '2021-11-29T18:42:25',
'version' => '2.147'
},
{
'date' => '2022-01-09T15:02:17',
'version' => '2.148'
},
{
'date' => '2022-01-13T16:42:50',
'version' => '2.149'
},
{
'date' => '2022-05-08T15:10:12',
'version' => '2.150'
},
{
'date' => '2022-07-26T14:32:41',
'version' => '2.151'
},
{
'date' => '2022-07-28T08:07:07',
'version' => '2.152'
},
{
'date' => '2023-07-14T14:05:14',
'version' => '2.153'
},
{
'date' => '2023-07-14T17:35:53',
'version' => '2.153'
},
{
'date' => '2024-06-15T14:47:56',
'version' => '2.154'
},
{
'date' => '2024-11-24T15:11:43',
'version' => '2.155'
}
]
},
'Convert-ASN1' => {
'advisories' => [
{
'affected_versions' => [
'<0.27'
],
'cves' => [
'CVE-2013-7488'
],
'description' => 'perl-Convert-ASN1 (aka the Convert::ASN1 module for Perl) through 0.27 allows remote attackers to cause an infinite loop via unexpected input.
',
'distribution' => 'Convert-ASN1',
'fixed_versions' => [],
'id' => 'CPANSA-Convert-ASN1-2013-7488',
'references' => [
'https://github.com/gbarr/perl-Convert-ASN1/issues/14',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONNQSW4SSKMG5RUEFZJZA5T5R2WXEGQF/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6V3PJEQOT47ZO77263XPGS3Y3AJROI4X/'
],
'reported' => '2020-04-07',
'severity' => 'high'
}
],
'main_module' => 'Convert::ASN1',
'versions' => [
{
'date' => '2000-04-03T21:52:45',
'version' => '0.04'
},
{
'date' => '2000-05-12T10:14:51',
'version' => '0.05'
},
{
'date' => '2000-05-22T11:08:54',
'version' => '0.06'
},
{
'date' => '2000-05-30T14:31:54',
'version' => '0.07'
},
{
'date' => '2001-02-05T22:44:53',
'version' => '0.08'
},
{
'date' => '2001-04-19T23:07:25',
'version' => '0.09'
},
{
'date' => '2001-04-20T06:40:05',
'version' => '0.10'
},
{
'date' => '2001-06-11T13:37:41',
'version' => '0.11'
},
{
'date' => '2001-07-31T17:11:59',
'version' => '0.12'
},
{
'date' => '2001-08-26T07:23:52',
'version' => '0.13'
},
{
'date' => '2001-09-10T18:07:31',
'version' => '0.14'
},
{
'date' => '2002-01-22T11:33:25',
'version' => '0.15'
},
{
'date' => '2002-08-20T00:05:24',
'version' => '0.16'
},
{
'date' => '2003-05-12T17:52:00',
'version' => '0.17'
},
{
'date' => '2003-10-08T14:31:56',
'version' => '0.18'
},
{
'date' => '2005-04-19T00:51:07',
'version' => '0.19'
},
{
'date' => '2006-02-22T01:29:15',
'version' => '0.20'
},
{
'date' => '2007-02-03T02:50:32',
'version' => '0.21'
},
{
'date' => '2008-09-15T19:39:08',
'version' => '0.22'
},
{
'date' => '2012-05-03T21:33:29',
'version' => '0.23'
},
{
'date' => '2012-06-04T22:12:03',
'version' => '0.24'
},
{
'date' => '2012-06-09T00:32:31',
'version' => '0.25'
},
{
'date' => '2012-06-09T18:31:05',
'version' => '0.26'
},
{
'date' => '2014-06-25T18:49:11',
'version' => '0.27'
},
{
'date' => '2021-05-23T21:05:04',
'version' => '0.28'
},
{
'date' => '2021-05-24T21:29:37',
'version' => '0.29'
},
{
'date' => '2021-05-30T00:58:54',
'version' => '0.30'
},
{
'date' => '2021-06-03T01:30:40',
'version' => '0.31'
},
{
'date' => '2021-09-21T21:46:25',
'version' => '0.32'
},
{
'date' => '2021-09-22T22:51:23',
'version' => '0.33'
},
{
'date' => '2023-08-07T22:47:22',
'version' => '0.34'
}
]
},
'Convert-UUlib' => {
'advisories' => [
{
'affected_versions' => [
'<1.051'
],
'cves' => [
'CVE-2005-1349'
],
'description' => 'Buffer overflow in Convert-UUlib (Convert::UUlib) before 1.051 allows remote attackers to execute arbitrary code via a malformed parameter to a read operation.
',
'distribution' => 'Convert-UUlib',
'fixed_versions' => [],
'id' => 'CPANSA-Convert-UUlib-2005-1349',
'references' => [
'http://www.gentoo.org/security/en/glsa/glsa-200504-26.xml',
'http://secunia.com/advisories/15130',
'http://www.securityfocus.com/bid/13401',
'http://www.mandriva.com/security/advisories?name=MDKSA-2006:022',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/20275'
],
'reported' => '2005-05-02',
'severity' => undef
}
],
'main_module' => 'Convert::UUlib',
'versions' => [
{
'date' => '1999-05-08T20:44:28',
'version' => '0.03'
},
{
'date' => '1999-05-25T19:26:16',
'version' => '0.05'
},
{
'date' => '1999-07-29T21:35:05',
'version' => '0.06'
},
{
'date' => '2000-07-16T20:52:56',
'version' => '0.11'
},
{
'date' => '2001-05-04T21:14:40',
'version' => '0.111'
},
{
'date' => '2001-06-14T16:49:29',
'version' => '0.2'
},
{
'date' => '2001-09-16T01:45:11',
'version' => '0.201'
},
{
'date' => '2002-03-31T22:10:15',
'version' => '0.21'
},
{
'date' => '2002-03-31T22:52:00',
'version' => '0.21'
},
{
'date' => '2002-04-05T22:18:55',
'version' => '0.211'
},
{
'date' => '2002-04-06T02:39:32',
'version' => '0.212'
},
{
'date' => '2002-07-27T19:20:26',
'version' => '0.213'
},
{
'date' => '2002-10-13T18:14:28',
'version' => '0.3'
},
{
'date' => '2002-10-15T23:26:09',
'version' => '0.31'
},
{
'date' => '2003-11-24T16:10:49',
'version' => '1.0'
},
{
'date' => '2004-03-16T20:05:14',
'version' => '1.01'
},
{
'date' => '2004-04-18T14:51:27',
'version' => '1.02'
},
{
'date' => '2004-04-18T20:16:15',
'version' => '1.03'
},
{
'date' => '2004-12-28T14:12:40',
'version' => '1.04'
},
{
'date' => '2005-03-03T17:52:16',
'version' => '1.051'
},
{
'date' => '2005-12-05T23:58:50',
'version' => '1.06'
},
{
'date' => '2006-12-10T16:45:11',
'version' => '1.07'
},
{
'date' => '2006-12-16T22:31:30',
'version' => '1.08'
},
{
'date' => '2007-05-25T17:40:35',
'version' => '1.09'
},
{
'date' => '2008-06-13T13:27:38',
'version' => '1.10'
},
{
'date' => '2008-06-13T13:34:18',
'version' => '1.11'
},
{
'date' => '2008-10-13T12:13:26',
'version' => '1.12'
},
{
'date' => '2009-08-28T23:26:34',
'version' => '1.3'
},
{
'date' => '2009-09-16T07:05:05',
'version' => '1.31'
},
{
'date' => '2009-09-16T18:10:46',
'version' => '1.32'
},
{
'date' => '2009-10-28T08:05:40',
'version' => '1.33'
},
{
'date' => '2010-12-14T21:21:33',
'version' => '1.34'
},
{
'date' => '2011-05-29T15:23:57',
'version' => '1.4'
},
{
'date' => '2015-07-11T01:57:19',
'version' => '1.5'
},
{
'date' => '2019-10-24T15:19:15',
'version' => '1.6'
},
{
'date' => '2020-02-17T22:21:21',
'version' => '1.62'
},
{
'date' => '2020-02-29T21:09:26',
'version' => '1.7'
},
{
'date' => '2020-03-16T23:54:43',
'version' => '1.71'
},
{
'date' => '2020-12-17T01:25:02',
'version' => '1.8'
}
]
},
'Cpanel-JSON-XS' => {
'advisories' => [
{
'affected_versions' => [
'<3.0225'
],
'cves' => [],
'description' => 'Overflow during processing of ill-formed UTF-8 strings.
',
'distribution' => 'Cpanel-JSON-XS',
'fixed_versions' => [
'>=3.0225'
],
'id' => 'CPANSA-Cpanel-JSON-XS-2016-02',
'references' => [
'https://metacpan.org/changes/distribution/Cpanel-JSON-XS',
'https://github.com/rurban/Cpanel-JSON-XS/commit/f71768984ba7f50b0476c17a4f3b3f2ca88a6951',
'https://github.com/dankogai/p5-encode/issues/64'
],
'reported' => '2016-11-23'
},
{
'affected_versions' => [
'<3.0218'
],
'cves' => [],
'description' => 'Possible overflows in av and hv length types.
',
'distribution' => 'Cpanel-JSON-XS',
'fixed_versions' => [
'>=3.0218'
],
'id' => 'CPANSA-Cpanel-JSON-XS-2016-01',
'references' => [
'https://metacpan.org/changes/distribution/Cpanel-JSON-XS',
'https://github.com/rurban/Cpanel-JSON-XS/commit/6554531b39fac236321d8601d35eaaa75ae45e20'
],
'reported' => undef
},
{
'affected_versions' => [
'<4.033'
],
'cves' => [
'CVE-2022-48623'
],
'description' => 'Wrong error messages/sometimes crashes or endless loops with invalid JSON in relaxed mode
',
'distribution' => 'Cpanel-JSON-XS',
'fixed_versions' => [
'>=4.033'
],
'id' => 'CPANSA-Cpanel-JSON-XS-2023-01',
'references' => [
'https://metacpan.org/changes/distribution/Cpanel-JSON-XS',
'https://github.com/rurban/Cpanel-JSON-XS/issues/208',
'https://metacpan.org/release/RURBAN/Cpanel-JSON-XS-4.33/changes',
'https://nvd.nist.gov/vuln/detail/CVE-2022-48623',
'https://github.com/rurban/Cpanel-JSON-XS/commit/41f32396eee9395a40f9ed80145c37622560de9b',
'https://github.com/advisories/GHSA-44qr-8pf6-6q33'
],
'reported' => '2023-02-21'
}
],
'main_module' => 'Cpanel::JSON::XS',
'versions' => [
{
'date' => '2013-03-01T00:52:41',
'version' => '2.33_03'
},
{
'date' => '2013-03-01T22:07:06',
'version' => '2.33_04'
},
{
'date' => '2013-03-27T16:53:34',
'version' => '2.3305'
},
{
'date' => '2013-03-27T17:17:51',
'version' => '2.3306'
},
{
'date' => '2013-03-27T22:58:47',
'version' => '2.3307'
},
{
'date' => '2013-03-28T14:28:56',
'version' => '2.3308'
},
{
'date' => '2013-03-28T15:12:42',
'version' => '2.3309'
},
{
'date' => '2013-03-28T17:33:21',
'version' => '2.3310'
},
{
'date' => '2013-06-26T16:24:40',
'version' => '2.3313'
},
{
'date' => '2013-09-09T05:54:40',
'version' => '2.3314'
},
{
'date' => '2013-10-02T20:06:47',
'version' => '2.3401'
},
{
'date' => '2013-11-02T14:42:20',
'version' => '2.3402'
},
{
'date' => '2013-11-02T15:17:41',
'version' => '2.3403'
},
{
'date' => '2014-01-30T15:58:58',
'version' => '2.3404'
},
{
'date' => '2014-04-15T21:17:11',
'version' => '3.0101'
},
{
'date' => '2014-04-17T18:37:34',
'version' => '3.0102'
},
{
'date' => '2014-04-21T17:49:09',
'version' => '3.0103'
},
{
'date' => '2014-04-26T16:04:39',
'version' => '3.0104'
},
{
'date' => '2014-11-06T10:38:31',
'version' => '3.0105'
},
{
'date' => '2014-11-11T21:57:49',
'version' => '3.0106'
},
{
'date' => '2014-11-28T12:16:29',
'version' => '3.0107'
},
{
'date' => '2014-12-11T17:02:07',
'version' => '3.0108'
},
{
'date' => '2014-12-12T10:24:33',
'version' => '3.0109'
},
{
'date' => '2014-12-12T22:35:37',
'version' => '3.0110'
},
{
'date' => '2014-12-13T18:40:06',
'version' => '3.0111'
},
{
'date' => '2014-12-14T16:34:01',
'version' => '3.0112'
},
{
'date' => '2014-12-15T12:23:32',
'version' => '3.0113'
},
{
'date' => '2015-01-04T14:06:03',
'version' => '3.0114'
},
{
'date' => '2015-01-31T21:42:51',
'version' => '3.0115'
},
{
'date' => '2015-11-26T08:58:33',
'version' => '3.0201'
},
{
'date' => '2015-11-26T13:16:40',
'version' => '3.0202'
},
{
'date' => '2015-11-26T13:42:02',
'version' => '3.0203'
},
{
'date' => '2015-11-26T22:30:26',
'version' => '3.0204'
},
{
'date' => '2015-11-29T14:09:00',
'version' => '3.0205'
},
{
'date' => '2015-11-30T16:16:48',
'version' => '3.0206'
},
{
'date' => '2015-12-02T16:34:35',
'version' => '3.0207'
},
{
'date' => '2015-12-02T22:46:58',
'version' => '3.0208'
},
{
'date' => '2015-12-03T09:45:04',
'version' => '3.0209'
},
{
'date' => '2015-12-03T11:59:24',
'version' => '3.0210'
},
{
'date' => '2016-01-10T17:38:25',
'version' => '3.0211'
},
{
'date' => '2016-02-27T13:30:04',
'version' => '3.0212'
},
{
'date' => '2016-03-02T10:28:37',
'version' => '3.0213'
},
{
'date' => '2016-04-12T08:40:05',
'version' => '3.0213_01'
},
{
'date' => '2016-04-13T10:40:03',
'version' => '3.0213_02'
},
{
'date' => '2016-06-02T16:18:51',
'version' => '3.0214'
},
{
'date' => '2016-06-06T13:28:49',
'version' => '3.0215'
},
{
'date' => '2016-06-12T12:14:20',
'version' => '3.0216'
},
{
'date' => '2016-06-18T09:59:27',
'version' => '3.0217'
},
{
'date' => '2016-10-04T10:11:33',
'version' => '3.0217_01'
},
{
'date' => '2016-10-04T14:47:29',
'version' => '3.0217_02'
},
{
'date' => '2016-10-06T08:46:17',
'version' => '3.0217_03'
},
{
'date' => '2016-10-07T12:11:03',
'version' => '3.0217_04'
},
{
'date' => '2016-10-07T17:22:48',
'version' => '3.0217_05'
},
{
'date' => '2016-10-08T08:01:50',
'version' => '3.0217_06'
},
{
'date' => '2016-10-13T12:47:31',
'version' => '3.0218'
},
{
'date' => '2016-10-26T11:45:35',
'version' => '3.0219'
},
{
'date' => '2016-10-28T08:34:28',
'version' => '3.0220'
},
{
'date' => '2016-10-30T12:27:36',
'version' => '3.0221'
},
{
'date' => '2016-10-30T15:04:32',
'version' => '3.0222'
},
{
'date' => '2016-11-16T11:47:38',
'version' => '3.0223'
},
{
'date' => '2016-11-20T11:31:34',
'version' => '3.0224'
},
{
'date' => '2016-11-23T18:43:00',
'version' => '3.0225'
},
{
'date' => '2017-02-11T13:24:48',
'version' => '3.0226'
},
{
'date' => '2017-02-13T10:57:06',
'version' => '3.0227'
},
{
'date' => '2017-03-07T23:57:39',
'version' => '3.0228'
},
{
'date' => '2017-03-10T14:08:07',
'version' => '3.0229'
},
{
'date' => '2017-03-12T09:52:13',
'version' => '3.0230'
},
{
'date' => '2017-03-29T09:51:51',
'version' => '3.0231'
},
{
'date' => '2017-05-01T05:35:12',
'version' => '3.0232'
},
{
'date' => '2017-05-01T14:54:56',
'version' => '3.0233'
},
{
'date' => '2017-07-27T15:43:41',
'version' => '3.0234'
},
{
'date' => '2017-07-27T16:21:47',
'version' => '3.0235'
},
{
'date' => '2017-07-27T20:15:25',
'version' => '3.0236'
},
{
'date' => '2017-07-28T11:15:05',
'version' => '3.0237'
},
{
'date' => '2017-08-25T20:53:56',
'version' => '3.0238'
},
{
'date' => '2017-08-28T20:48:37',
'version' => '3.0239'
},
{
'date' => '2018-01-30T11:52:27',
'version' => '3.99_01'
},
{
'date' => '2018-01-31T12:58:24',
'version' => '3.99_02'
},
{
'date' => '2018-01-31T17:18:58',
'version' => '3.99_03'
},
{
'date' => '2018-02-02T01:57:54',
'version' => '4.00'
},
{
'date' => '2018-02-03T11:50:36',
'version' => '4.01'
},
{
'date' => '2018-02-27T16:08:55',
'version' => '4.02'
},
{
'date' => '2018-06-21T11:16:14',
'version' => '4.03'
},
{
'date' => '2018-06-22T17:37:07',
'version' => '4.04'
},
{
'date' => '2018-08-19T16:55:22',
'version' => '4.05'
},
{
'date' => '2018-08-23T07:50:22',
'version' => '4.06'
},
{
'date' => '2018-11-02T09:51:34',
'version' => '4.07'
},
{
'date' => '2018-11-28T14:26:40',
'version' => '4.08'
},
{
'date' => '2019-02-15T10:09:53',
'version' => '4.09'
},
{
'date' => '2019-03-18T07:50:15',
'version' => '4.10'
},
{
'date' => '2019-03-26T16:46:53',
'version' => '4.11'
},
{
'date' => '2019-06-11T08:04:04',
'version' => '4.12'
},
{
'date' => '2019-10-14T14:14:37',
'version' => '4.13'
},
{
'date' => '2019-10-15T15:16:21',
'version' => '4.14'
},
{
'date' => '2019-10-22T07:01:03',
'version' => '4.15'
},
{
'date' => '2019-11-04T15:51:01',
'version' => '4.16'
},
{
'date' => '2019-11-05T13:48:29',
'version' => '4.17'
},
{
'date' => '2019-12-13T15:54:58',
'version' => '4.18'
},
{
'date' => '2020-02-06T15:07:47',
'version' => '4.19'
},
{
'date' => '2020-08-12T12:18:46',
'version' => '4.20'
},
{
'date' => '2020-08-13T06:56:18',
'version' => '4.21'
},
{
'date' => '2020-09-04T19:26:28',
'version' => '4.22'
},
{
'date' => '2020-09-05T10:21:25',
'version' => '4.23'
},
{
'date' => '2020-10-02T09:05:37',
'version' => '4.24'
},
{
'date' => '2020-10-28T07:04:49',
'version' => '4.25'
},
{
'date' => '2021-04-12T06:34:32',
'version' => '4.26'
},
{
'date' => '2021-10-14T19:19:01',
'version' => '4.27'
},
{
'date' => '2022-05-05T14:46:07',
'version' => '4.28'
},
{
'date' => '2022-05-27T15:32:51',
'version' => '4.29'
},
{
'date' => '2022-06-16T19:19:38',
'version' => '4.30'
},
{
'date' => '2022-08-10T14:25:08',
'version' => '4.31'
},
{
'date' => '2022-08-13T07:13:40',
'version' => '4.32'
},
{
'date' => '2023-02-21T16:34:10',
'version' => '4.33'
},
{
'date' => '2023-02-21T18:39:09',
'version' => '4.34'
},
{
'date' => '2023-02-22T15:40:53',
'version' => '4.35'
},
{
'date' => '2023-03-02T15:11:52',
'version' => '4.36'
},
{
'date' => '2023-07-04T10:35:53',
'version' => '4.37'
},
{
'date' => '2024-05-28T07:42:37',
'version' => '4.38'
},
{
'date' => '2024-12-12T21:17:16',
'version' => '4.39'
}
]
},
'Crypt-CBC' => {
'advisories' => [
{
'affected_versions' => [
'<3.04'
],
'cves' => [],
'description' => 'Fixed bug involving manually-specified IV not being used in some circumstances.
',
'distribution' => 'Crypt-CBC',
'fixed_versions' => [
'>=3.04'
],
'id' => 'CPANSA-Crypt-CBC-2021-0001',
'references' => [
'https://metacpan.org/changes/distribution/Crypt-CBC',
'https://github.com/briandfoy/cpan-security-advisory/issues/165'
],
'reported' => '2021-05-17',
'severity' => undef
},
{
'affected_versions' => [
'<2.17'
],
'cves' => [
'CVE-2006-0898'
],
'description' => 'Crypt::CBC Perl module 2.16 and earlier, when running in RandomIV mode, uses an initialization vector (IV) of 8 bytes, which results in weaker encryption when used with a cipher that requires a larger block size than 8 bytes, such as Rijndael.
',
'distribution' => 'Crypt-CBC',
'fixed_versions' => [
'>=2.17'
],
'id' => 'CPANSA-Crypt-CBC-2006-0898',
'references' => [
'https://metacpan.org/changes/distribution/Crypt-CBC',
'http://www.securityfocus.com/bid/16802',
'http://secunia.com/advisories/18755',
'http://www.debian.org/security/2006/dsa-996',
'http://secunia.com/advisories/19187',
'http://www.gentoo.org/security/en/glsa/glsa-200603-15.xml',
'http://secunia.com/advisories/19303',
'http://www.novell.com/linux/security/advisories/2006_38_security.html',
'http://secunia.com/advisories/20899',
'http://securityreason.com/securityalert/488',
'http://www.redhat.com/support/errata/RHSA-2008-0261.html',
'http://secunia.com/advisories/31493',
'http://rhn.redhat.com/errata/RHSA-2008-0630.html',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/24954',
'http://www.securityfocus.com/archive/1/425966/100/0/threaded'
],
'reported' => '2006-02-25',
'severity' => undef
}
],
'main_module' => 'Crypt::CBC',
'versions' => [
{
'date' => '1998-06-19T19:48:52',
'version' => '1.00'
},
{
'date' => '1998-09-22T18:30:35',
'version' => '1.10'
},
{
'date' => '1998-12-20T23:36:49',
'version' => '1.20'
},
{
'date' => '2000-01-27T00:27:56',
'version' => '1.22'
},
{
'date' => '2000-02-22T15:20:56',
'version' => '1.23'
},
{
'date' => '2000-06-07T18:55:59',
'version' => '1.24'
},
{
'date' => '2000-06-08T15:59:07',
'version' => '1.25'
},
{
'date' => '2001-12-10T17:16:25',
'version' => '2.01'
},
{
'date' => '2002-01-24T05:30:16',
'version' => '2.02'
},
{
'date' => '2002-06-02T18:40:15',
'version' => '2.03'
},
{
'date' => '2002-06-12T02:20:51',
'version' => '2.04'
},
{
'date' => '2002-06-22T13:02:09',
'version' => '2.05'
},
{
'date' => '2002-08-08T18:47:49',
'version' => '2.07'
},
{
'date' => '2002-09-11T12:17:23',
'version' => '2.08'
},
{
'date' => '2004-05-27T15:20:52',
'version' => '2.09'
},
{
'date' => '2004-05-29T17:29:19',
'version' => '2.10'
},
{
'date' => '2004-06-03T16:22:32',
'version' => '2.11'
},
{
'date' => '2004-06-17T15:55:19',
'version' => '2.11'
},
{
'date' => '2005-05-05T20:11:50',
'version' => '2.14'
},
{
'date' => '2005-08-01T14:02:45',
'version' => '2.15'
},
{
'date' => '2006-02-16T14:08:57',
'version' => '2.17'
},
{
'date' => '2006-06-06T23:22:02',
'version' => '2.18'
},
{
'date' => '2006-08-12T19:52:11',
'version' => '2.19'
},
{
'date' => '2006-10-16T23:40:13',
'version' => '2.21'
},
{
'date' => '2006-10-29T21:55:34',
'version' => '2.22'
},
{
'date' => '2007-09-28T15:25:53',
'version' => '2.24'
},
{
'date' => '2008-03-28T14:17:29',
'version' => '2.27'
},
{
'date' => '2008-03-31T14:56:52',
'version' => '2.28'
},
{
'date' => '2008-04-22T14:27:07',
'version' => '2.29'
},
{
'date' => '2008-09-30T15:17:58',
'version' => '2.30'
},
{
'date' => '2012-10-30T11:08:06',
'version' => '2.31'
},
{
'date' => '2012-12-14T19:30:14',
'version' => '2.32'
},
{
'date' => '2013-07-30T20:03:53',
'version' => '2.33'
},
{
'date' => '2021-02-07T15:30:51',
'version' => '3.00'
},
{
'date' => '2021-02-08T21:38:16',
'version' => '3.01'
},
{
'date' => '2021-04-11T22:16:48',
'version' => '3.02'
},
{
'date' => '2021-04-19T02:59:12',
'version' => '3.03'
},
{
'date' => '2021-05-17T15:03:53',
'version' => '3.04'
}
]
},
'Crypt-DSA' => {
'advisories' => [
{
'affected_versions' => [
'<1.18'
],
'cves' => [
'CVE-2011-3599'
],
'description' => 'The Crypt::DSA (aka Crypt-DSA) module 1.17 and earlier for Perl, when /dev/random is absent, uses the Data::Random module, which makes it easier for remote attackers to spoof a signature, or determine the signing key of a signed message, via a brute-force attack.
',
'distribution' => 'Crypt-DSA',
'fixed_versions' => [],
'id' => 'CPANSA-Crypt-DSA-2011-3599',
'references' => [
'https://rt.cpan.org/Public/Bug/Display.html?id=71421',
'https://bugzilla.redhat.com/show_bug.cgi?id=743567',
'http://www.openwall.com/lists/oss-security/2011/10/05/9',
'http://www.openwall.com/lists/oss-security/2011/10/05/5',
'http://secunia.com/advisories/46275',
'http://www.securityfocus.com/bid/49928',
'http://osvdb.org/76025'
],
'reported' => '2011-10-10',
'severity' => undef
}
],
'main_module' => 'Crypt::DSA',
'versions' => [
{
'date' => '2001-03-24T01:21:08',
'version' => '0.02'
},
{
'date' => '2001-04-07T07:44:41',
'version' => '0.03'
},
{
'date' => '2001-04-23T00:09:38',
'version' => '0.10'
},
{
'date' => '2001-05-02T23:26:09',
'version' => '0.11'
},
{
'date' => '2001-05-04T06:12:08',
'version' => '0.12'
},
{
'date' => '2005-05-26T16:19:59',
'version' => '0.13'
},
{
'date' => '2006-05-08T18:43:01',
'version' => '0.14'
},
{
'date' => '2009-08-19T11:11:31',
'version' => '0.15_01'
},
{
'date' => '2009-09-11T12:47:36',
'version' => '1.16'
},
{
'date' => '2011-06-17T01:49:57',
'version' => '1.17'
},
{
'date' => '2024-12-04T04:25:53',
'version' => '1.18'
},
{
'date' => '2024-12-04T13:54:34',
'version' => '1.18'
},
{
'date' => '2024-12-04T14:50:02',
'version' => '1.19'
}
]
},
'Crypt-JWT' => {
'advisories' => [
{
'affected_versions' => [
'<0.023'
],
'cves' => [
'CVE-2019-1010263'
],
'description' => 'Perl Crypt::JWT prior to 0.023 is affected by: Incorrect Access Control. The impact is: allow attackers to bypass authentication by providing a token by crafting with hmac(). The component is: JWT.pm, line 614. The attack vector is: network connectivity. The fixed version is: after commit b98a59b42ded9f9e51b2560410106207c2152d6c.
',
'distribution' => 'Crypt-JWT',
'fixed_versions' => [
'>=0.023'
],
'id' => 'CPANSA-Crypt-JWT-2019-01',
'references' => [
'https://github.com/DCIT/perl-Crypt-JWT/commit/b98a59b42ded9f9e51b2560410106207c2152d6c',
'https://www.openwall.com/lists/oss-security/2018/09/07/1'
],
'reported' => '2019-03-20',
'severity' => 'high'
},
{
'affected_versions' => [
'<0.022'
],
'cves' => [
'CVE-2019-1010161'
],
'description' => 'perl-CRYPT-JWT 0.022 and earlier is affected by: Incorrect Access Control. The impact is: bypass authentication. The component is: JWT.pm for JWT security token, line 614 in _decode_jws(). The attack vector is: network connectivity(crafting user-controlled input to bypass authentication). The fixed version is: 0.023.
',
'distribution' => 'Crypt-JWT',
'fixed_versions' => [
'>=0.022'
],
'id' => 'CPANSA-Crypt-JWT-2019-01',
'references' => [
'https://github.com/DCIT/perl-Crypt-JWT/issues/3#issuecomment-417947483'
],
'reported' => '2019-03-20',
'severity' => 'high'
}
],
'main_module' => 'Crypt::JWT',
'versions' => [
{
'date' => '2015-07-02T22:24:01',
'version' => '0.004'
},
{
'date' => '2015-07-02T22:54:29',
'version' => '0.005'
},
{
'date' => '2015-07-07T19:43:45',
'version' => '0.010'
},
{
'date' => '2015-10-22T07:08:48',
'version' => '0.011'
},
{
'date' => '2016-05-02T17:33:01',
'version' => '0.012'
},
{
'date' => '2016-05-03T07:10:15',
'version' => '0.013'
},
{
'date' => '2016-05-04T05:48:13',
'version' => '0.014'
},
{
'date' => '2016-05-12T05:38:49',
'version' => '0.015'
},
{
'date' => '2016-05-12T08:03:49',
'version' => '0.016'
},
{
'date' => '2016-06-03T10:17:48',
'version' => '0.017'
},
{
'date' => '2016-08-31T19:49:41',
'version' => '0.018'
},
{
'date' => '2018-01-26T16:07:54',
'version' => '0.019'
},
{
'date' => '2018-02-02T15:02:28',
'version' => '0.020'
},
{
'date' => '2018-03-15T11:59:25',
'version' => '0.021'
},
{
'date' => '2018-06-24T20:29:50',
'version' => '0.022'
},
{
'date' => '2018-09-01T16:09:10',
'version' => '0.023'
},
{
'date' => '2019-03-26T11:11:25',
'version' => '0.024'
},
{
'date' => '2019-09-29T15:23:58',
'version' => '0.025'
},
{
'date' => '2020-02-02T08:44:56',
'version' => '0.026'
},
{
'date' => '2020-06-04T22:35:39',
'version' => '0.027'
},
{
'date' => '2020-06-14T18:17:45',
'version' => '0.028'
},
{
'date' => '2020-06-22T13:13:53',
'version' => '0.029'
},
{
'date' => '2021-01-08T14:22:56',
'version' => '0.030'
},
{
'date' => '2021-01-10T14:18:25',
'version' => '0.031'
},
{
'date' => '2021-03-18T21:02:33',
'version' => '0.032'
},
{
'date' => '2021-05-01T17:18:31',
'version' => '0.033'
},
{
'date' => '2021-11-28T22:08:38',
'version' => '0.034'
},
{
'date' => '2023-10-03T10:20:23',
'version' => '0.035'
},
{
'date' => '2025-01-26T10:17:48',
'version' => '0.036'
}
]
},
'Crypt-OpenSSL-DSA' => {
'advisories' => [
{
'affected_versions' => [
'<0.14'
],
'cves' => [
'CVE-2009-0129'
],
'description' => 'Missing error check in do_verify, which might allow remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature.
',
'distribution' => 'Crypt-OpenSSL-DSA',
'fixed_versions' => [
'>=0.14'
],
'id' => 'CPANSA-Crypt-OpenSSL-DSA-2009-01',
'references' => [
'https://metacpan.org/changes/distribution/Crypt-OpenSSL-DSA',
'https://www.openwall.com/lists/oss-security/2009/01/12/4',
'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511519'
],
'reported' => '2009-01-15'
}
],
'main_module' => 'Crypt::OpenSSL::DSA',
'versions' => [
{
'date' => '2001-09-19T04:45:14',
'version' => '0.01'
},
{
'date' => '2001-09-24T17:32:49',
'version' => '0.02'
},
{
'date' => '2002-02-07T05:57:36',
'version' => '0.03'
},
{
'date' => '2002-09-24T04:52:06',
'version' => '0.04'
},
{
'date' => '2002-09-26T00:21:17',
'version' => '0.10'
},
{
'date' => '2003-01-06T19:08:08',
'version' => '0.11'
},
{
'date' => '2005-05-23T01:44:36',
'version' => '0.12'
},
{
'date' => '2005-10-15T21:37:10',
'version' => '0.13'
},
{
'date' => '2012-10-16T22:55:16',
'version' => '0.14'
},
{
'date' => '2015-02-03T21:57:37',
'version' => '0.15'
},
{
'date' => '2016-10-27T11:25:18',
'version' => '0.16'
},
{
'date' => '2016-10-27T18:54:42',
'version' => '0.17'
},
{
'date' => '2016-11-17T10:33:35',
'version' => '0.18'
},
{
'date' => '2017-01-13T08:24:56',
'version' => '0.19'
},
{
'date' => '2021-03-20T12:31:50',
'version' => '0.20'
}
]
},
'Crypt-OpenSSL-RSA' => {
'advisories' => [
{
'affected_versions' => [
'>0'
],
'cves' => [
'CVE-2024-2467'
],
'description' => 'A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.
',
'distribution' => 'Crypt-OpenSSL-RSA',
'fixed_versions' => [],
'id' => 'CPANSA-Crypt-OpenSSL-RSA-2024-2467',
'references' => [
'https://access.redhat.com/security/cve/CVE-2024-2467',
'https://bugzilla.redhat.com/show_bug.cgi?id=2269567',
'https://github.com/toddr/Crypt-OpenSSL-RSA/issues/42',
'https://people.redhat.com/~hkario/marvin/'
],
'reported' => '2024-04-25',
'severity' => undef
}
],
'main_module' => 'Crypt::OpenSSL::RSA',
'versions' => [
{
'date' => '2001-04-02T04:24:26',
'version' => '0.08'
},
{
'date' => '2001-04-02T16:43:12',
'version' => '0.09'
},
{
'date' => '2001-04-10T20:56:43',
'version' => '0.10'
},
{
'date' => '2001-04-11T02:58:01',
'version' => '0.11'
},
{
'date' => '2001-09-07T03:14:26',
'version' => '0.12'
},
{
'date' => '2002-03-22T04:46:17',
'version' => '0.13'
},
{
'date' => '2002-05-19T16:54:53',
'version' => '0.14'
},
{
'date' => '2002-06-07T13:25:40',
'version' => '0.15'
},
{
'date' => '2002-06-12T02:15:47',
'version' => '0.16'
},
{
'date' => '2003-01-07T04:08:58',
'version' => '0.17'
},
{
'date' => '2003-02-24T02:27:12',
'version' => '0.18'
},
{
'date' => '2003-04-27T22:48:40',
'version' => '0.19'
},
{
'date' => '2004-02-15T20:43:41',
'version' => '0.20'
},
{
'date' => '2004-02-16T02:19:45',
'version' => '0.21'
},
{
'date' => '2005-06-06T10:51:24',
'version' => '0.22'
},
{
'date' => '2005-11-15T04:34:15',
'version' => '0.22'
},
{
'date' => '2006-04-13T04:38:04',
'version' => '0.23'
},
{
'date' => '2006-11-13T15:34:59',
'version' => '0.24'
},
{
'date' => '2007-05-20T19:06:56',
'version' => '0.25'
},
{
'date' => '2009-11-22T20:40:31',
'version' => '0.26'
},
{
'date' => '2011-06-29T18:49:35',
'version' => '0.26_01'
},
{
'date' => '2011-07-03T20:14:52',
'version' => '0.27'
},
{
'date' => '2011-08-24T23:04:56',
'version' => '0.28'
},
{
'date' => '2017-11-27T03:36:04',
'version' => '0.28'
},
{
'date' => '2018-04-14T05:01:11',
'version' => '0.29_01'
},
{
'date' => '2018-04-15T18:55:41',
'version' => '0.29_02'
},
{
'date' => '2018-04-16T20:47:56',
'version' => '0.29_03'
},
{
'date' => '2018-05-01T16:37:12',
'version' => '0.30'
},
{
'date' => '2018-09-24T17:36:24',
'version' => '0.31'
},
{
'date' => '2021-09-08T15:50:47',
'version' => '0.32'
},
{
'date' => '2022-07-08T11:25:11',
'version' => '0.33'
}
]
},
'Crypt-Passwd-XS' => {
'advisories' => [
{
'affected_versions' => [
'<0.601'
],
'cves' => [
'CVE-2012-2143'
],
'description' => 'The crypt_des (aka DES-based crypt) function does not process the complete cleartext password if this password contains a 0x80 character, which makes it easier for context-dependent attackers to obtain access via an authentication attempt with an initial substring of the intended password, as demonstrated by a Unicode password.
',
'distribution' => 'Crypt-Passwd-XS',
'fixed_versions' => [
'>=0.601'
],
'id' => 'CPANSA-Crypt-Passwd-XS-2012-01',
'references' => [
'https://metacpan.org/changes/distribution/Crypt-Passwd-XS'
],
'reported' => '2012-05-07'
}
],
'main_module' => 'Crypt::Passwd::XS',
'versions' => [
{
'date' => '2010-11-14T21:18:18',
'version' => '0.4'
},
{
'date' => '2010-11-17T02:03:54',
'version' => '0.501'
},
{
'date' => '2010-11-17T23:25:17',
'version' => '0.503'
},
{
'date' => '2010-11-20T00:37:33',
'version' => '0.504'
},
{
'date' => '2010-11-24T00:59:34',
'version' => '0.505'
},
{
'date' => '2011-03-09T16:18:01',
'version' => '0.506'
},
{
'date' => '2011-03-09T21:40:38',
'version' => '0.507'
},
{
'date' => '2011-07-26T16:37:20',
'version' => '0.600'
},
{
'date' => '2012-12-06T19:57:57',
'version' => '0.601'
}
]
},
'Crypt-Perl' => {
'advisories' => [
{
'affected_versions' => [
'<0.33'
],
'cves' => [
'CVE-2020-17478'
],
'description' => 'ECDSA/EC/Point.pm in Crypt::Perl before 0.33 does not properly consider timing attacks against the EC point multiplication algorithm.
',
'distribution' => 'Crypt-Perl',
'fixed_versions' => [
'>=0.33'
],
'id' => 'CPANSA-Crypt-Perl-2020-01',
'references' => [
'https://github.com/FGasper/p5-Crypt-Perl/compare/0.32...0.33'
],
'reported' => '2020-08-10',
'severity' => 'high'
},
{
'affected_versions' => [
'<0.32'
],
'cves' => [
'CVE-2020-13895'
],
'description' => 'Crypt::Perl::ECDSA in the Crypt::Perl (aka p5-Crypt-Perl) module before 0.32 for Perl fails to verify correct ECDSA signatures when r and s are small and when s = 1. This happens when using the curve secp256r1 (prime256v1). This could conceivably have a security-relevant impact if an attacker wishes to use public r and s values when guessing whether signature verification will fail.
',
'distribution' => 'Crypt-Perl',
'fixed_versions' => [
'>=0.32'
],
'id' => 'CPANSA-Crypt-Perl-2020-02',
'references' => [
'https://github.com/FGasper/p5-Crypt-Perl/commit/f960ce75502acf7404187231a706672f8369acb2',
'https://github.com/FGasper/p5-Crypt-Perl/issues/14'
],
'reported' => '2020-06-07',
'severity' => 'high'
}
],
'main_module' => 'Crypt::Perl',
'versions' => [
{
'date' => '2016-12-14T06:20:54',
'version' => '0.01'
},
{
'date' => '2016-12-17T05:33:45',
'version' => '0.02'
},
{
'date' => '2016-12-19T14:55:23',
'version' => '0.021'
},
{
'date' => '2016-12-19T22:19:39',
'version' => '0.022'
},
{
'date' => '2016-12-20T08:45:47',
'version' => '0.03'
},
{
'date' => '2016-12-20T18:44:49',
'version' => '0.031'
},
{
'date' => '2016-12-21T05:18:09',
'version' => '0.032'
},
{
'date' => '2016-12-23T05:59:32',
'version' => '0.033'
},
{
'date' => '2016-12-29T16:03:59',
'version' => '0.1'
},
{
'date' => '2016-12-31T06:23:01',
'version' => '0.11'
},
{
'date' => '2017-01-02T21:24:31',
'version' => '0.12'
},
{
'date' => '2017-01-03T14:55:13',
'version' => '0.13'
},
{
'date' => '2017-01-03T16:30:45',
'version' => '0.14'
},
{
'date' => '2017-01-04T00:12:29',
'version' => '0.15'
},
{
'date' => '2017-02-02T09:09:40',
'version' => '0.15_1'
},
{
'date' => '2017-02-03T03:31:34',
'version' => '0.16_rc1'
},
{
'date' => '2017-02-03T03:38:07',
'version' => '0.15_2'
},
{
'date' => '2017-02-03T07:21:32',
'version' => '0.15_3'
},
{
'date' => '2017-02-07T04:16:06',
'version' => '0.16'
},
{
'date' => '2017-02-08T07:56:45',
'version' => '0.16_1'
},
{
'date' => '2017-02-08T09:25:41',
'version' => '0.17'
},
{
'date' => '2017-02-09T04:07:34',
'version' => '0.17_1'
},
{
'date' => '2018-06-18T01:48:20',
'version' => '0.18-TRIAL1'
},
{
'date' => '2018-06-18T02:52:52',
'version' => '0.18-TRIAL2'
},
{
'date' => '2018-06-18T12:03:17',
'version' => '0.18-TRIAL3'
},
{
'date' => '2018-06-18T15:07:20',
'version' => '0.18-TRIAL4'
},
{
'date' => '2018-06-18T20:34:04',
'version' => '0.18-TRIAL5'
},
{
'date' => '2018-06-18T21:06:07',
'version' => '0.18-TRIAL6'
},
{
'date' => '2018-06-18T21:47:43',
'version' => '0.18-TRIAL7'
},
{
'date' => '2018-06-18T22:42:19',
'version' => '0.18'
},
{
'date' => '2018-06-19T04:25:06',
'version' => '0.19'
},
{
'date' => '2018-06-19T06:14:32',
'version' => '0.20-TRIAL1'
},
{
'date' => '2018-06-19T14:23:57',
'version' => '0.20-TRIAL2'
},
{
'date' => '2018-06-19T15:50:08',
'version' => '0.20'
},
{
'date' => '2018-06-19T15:56:15',
'version' => '0.21'
},
{
'date' => '2018-06-21T03:33:59',
'version' => '0.22-TRIAL1'
},
{
'date' => '2018-06-21T13:31:18',
'version' => '0.22-TRIAL2'
},
{
'date' => '2018-06-22T14:43:21',
'version' => '0.22'
},
{
'date' => '2018-06-23T00:40:40',
'version' => '0.23-TRIAL1'
},
{
'date' => '2018-06-25T14:35:15',
'version' => '0.23'
},
{
'date' => '2018-07-23T03:11:37',
'version' => '0.24_TRIAL1'
},
{
'date' => '2018-07-23T03:13:05',
'version' => '0.24_TRIAL2'
},
{
'date' => '2018-07-23T03:16:58',
'version' => '0.24-TRIAL3'
},
{
'date' => '2018-07-23T12:12:48',
'version' => '0.24-TRIAL4'
},
{
'date' => '2018-07-24T22:03:18',
'version' => '0.24'
},
{
'date' => '2018-07-25T01:54:45',
'version' => '0.25'
},
{
'date' => '2018-07-28T19:52:07',
'version' => '0.26-TRIAL1'
},
{
'date' => '2018-07-28T22:07:05',
'version' => '0.26'
},
{
'date' => '2018-07-28T22:26:02',
'version' => '0.27-TRIAL1'
},
{
'date' => '2018-07-29T02:05:05',
'version' => '0.27'
},
{
'date' => '2018-08-25T00:24:23',
'version' => '0.28'
},
{
'date' => '2018-08-25T02:38:45',
'version' => '0.29'
},
{
'date' => '2018-12-22T02:29:37',
'version' => '0.30-TRIAL1'
},
{
'date' => '2018-12-22T15:18:25',
'version' => '0.30-TRIAL2'
},
{
'date' => '2018-12-24T03:14:46',
'version' => '0.30-TRIAL3'
},
{
'date' => '2019-09-12T03:13:59',
'version' => '0.30'
},
{
'date' => '2020-02-11T00:54:58',
'version' => '0.31_01'
},
{
'date' => '2020-02-11T02:50:09',
'version' => '0.31_02'
},
{
'date' => '2020-02-12T01:19:36',
'version' => '0.31'
},
{
'date' => '2020-06-04T12:31:25',
'version' => '0.32_01'
},
{
'date' => '2020-06-04T12:56:11',
'version' => '0.32_02'
},
{
'date' => '2020-06-05T02:53:59',
'version' => '0.32'
},
{
'date' => '2020-08-10T15:39:12',
'version' => '0.33'
},
{
'date' => '2020-09-24T07:31:56',
'version' => '0.34_02'
},
{
'date' => '2020-09-24T07:37:16',
'version' => '0.34_03'
},
{
'date' => '2020-09-25T01:38:34',
'version' => '0.34_04'
},
{
'date' => '2020-09-26T03:44:57',
'version' => '0.34_05'
},
{
'date' => '2020-09-26T12:38:56',
'version' => '0.34_06'
},
{
'date' => '2020-09-26T18:03:25',
'version' => '0.34_07'
},
{
'date' => '2020-09-27T13:00:26',
'version' => '0.34_08'
},
{
'date' => '2020-09-27T23:51:08',
'version' => '0.34_09'
},
{
'date' => '2020-09-28T07:22:06',
'version' => '0.34'
},
{
'date' => '2021-11-17T15:13:58',
'version' => '0.35_02'
},
{
'date' => '2021-11-18T03:39:19',
'version' => '0.35'
},
{
'date' => '2021-11-18T03:44:32',
'version' => '0.36'
},
{
'date' => '2021-11-20T13:20:35',
'version' => '0.37_01'
},
{
'date' => '2021-11-21T03:44:48',
'version' => '0.37_02'
},
{
'date' => '2021-11-22T04:28:59',
'version' => '0.37_03'
},
{
'date' => '2021-11-29T02:09:35',
'version' => '0.37_04'
},
{
'date' => '2021-11-30T02:16:10',
'version' => '0.37_05'
},
{
'date' => '2021-11-30T16:09:14',
'version' => '0.37_06'
},
{
'date' => '2021-12-01T01:39:08',
'version' => '0.37_07'
},
{
'date' => '2021-12-02T21:42:02',
'version' => '0.37_08'
},
{
'date' => '2021-12-06T15:38:41',
'version' => '0.37_09'
},
{
'date' => '2021-12-08T01:12:53',
'version' => '0.37_10'
},
{
'date' => '2021-12-09T13:42:15',
'version' => '0.37_11'
},
{
'date' => '2021-12-14T02:08:33',
'version' => '0.37_12'
},
{
'date' => '2021-12-15T05:19:53',
'version' => '0.37_13'
},
{
'date' => '2021-12-17T19:36:38',
'version' => '0.37'
},
{
'date' => '2022-10-17T15:04:13',
'version' => '0.38'
}
]
},
'Crypt-Primes' => {
'advisories' => [
{
'affected_versions' => [
'<0.52'
],
'cves' => [],
'description' => 'bin/largeprimes uses a custom shebang, which allows it to load modules from several locations: \'..\', \'../lib\', \'lib\'. This could lead to load modules from an unpredictable location depending from where the script is run and what user is running it.
',
'distribution' => 'Crypt-Primes',
'fixed_versions' => [
'>=0.52'
],
'id' => 'CPANSA-Crypt-Primes-2024-001',
'references' => [
'https://rt.cpan.org/Public/Bug/Display.html?id=128058',
'https://github.com/atoomic/Crypt-Primes/pull/2',
'https://github.com/perl-Crypt-OpenPGP/Crypt-Primes/blob/main/Changes'
],
'reported' => undef,
'severity' => undef
}
],
'main_module' => 'Crypt::Primes',
'versions' => [
{
'date' => '2000-11-09T23:33:04',
'version' => '0.38'
},
{
'date' => '2001-03-05T09:29:12',
'version' => '0.46'
},
{
'date' => '2001-06-11T09:15:28',
'version' => '0.49'
},
{
'date' => '2003-01-16T20:11:04',
'version' => '0.50'
},
{
'date' => '2025-01-25T02:41:34',
'version' => '0.51'
},
{
'date' => '2025-01-25T13:14:32',
'version' => '0.52'
}
]
},
'Crypt-Random' => {
'advisories' => [
{
'affected_versions' => [
'>0'
],
'cves' => [],
'description' => 'The makerandom program that comes with Crypt::Random adds module search paths in its shebang line, potentially leading to issues with unexpected modules being loaded
',
'distribution' => 'Crypt-Random',
'fixed_versions' => [],
'id' => 'CPANSA-Crypt-Random-2024-001',
'references' => [
'https://metacpan.org/dist/Crypt-Random/changes',
'https://rt.cpan.org/Ticket/Display.html?id=128062',
'https://github.com/atoomic/Crypt-Random/pull/1'
],
'reported' => undef,
'severity' => undef
}
],
'main_module' => 'Crypt::Random',
'versions' => [
{
'date' => '1999-04-09T19:08:40',
'version' => '0.17'
},
{
'date' => '1999-10-13T23:27:57',
'version' => '0.18'
},
{
'date' => '2000-09-18T22:56:56',
'version' => '0.23'
},
{
'date' => '2001-02-14T08:55:34',
'version' => '0.32'
},
{
'date' => '2001-03-05T09:27:27',
'version' => '0.33'
},
{
'date' => '2001-04-17T22:01:25',
'version' => '0.34'
},
{
'date' => '2001-06-22T22:11:42',
'version' => '1.07'
},
{
'date' => '2001-06-23T02:22:55',
'version' => '1.08'
},
{
'date' => '2001-07-09T19:07:34',
'version' => '1.10'
},
{
'date' => '2001-07-12T16:02:21',
'version' => '1.11'
},
{
'date' => '2003-01-08T13:41:34',
'version' => '1.12'
},
{
'date' => '2003-03-11T18:44:11',
'version' => '1.13'
},
{
'date' => '2004-05-21T21:18:13',
'version' => '1.20'
},
{
'date' => '2004-05-24T23:04:52',
'version' => '1.21'
},
{
'date' => '2004-06-01T22:58:47',
'version' => '1.22'
},
{
'date' => '2004-06-02T18:52:24',
'version' => '1.23'
},
{
'date' => '2005-03-07T23:05:09',
'version' => '1.24'
},
{
'date' => '2005-03-07T23:18:08',
'version' => '1.25'
},
{
'date' => '2018-12-22T16:21:07',
'version' => '1.51'
},
{
'date' => '2018-12-22T19:30:28',
'version' => '1.52'
},
{
'date' => '2021-06-03T18:19:46',
'version' => '1.53'
},
{
'date' => '2021-06-03T18:31:44',
'version' => '1.54'
},
{
'date' => '2025-01-30T05:20:08',
'version' => '1.55'
},
{
'date' => '2025-02-05T01:49:00',
'version' => '1.56'
}
]
},
'Crypt-Random-Source' => {
'advisories' => [
{
'affected_versions' => [
'<=0.12'
],
'cves' => [
'CVE-2018-25107'
],
'description' => 'In versions prior to 0.13, rand could be used as a result of calling get_weak, or get, if no random device was available. This implies that not explicitly asking for get_strong on a non POSIX operating system (e.g. Win32 without the Win32 backend) could have resulted in non cryptographically random data.
',
'distribution' => 'Crypt-Random-Source',
'fixed_versions' => [
'>=0.13'
],
'id' => 'CPANSA-Crypt-Random-Source-2024-001',
'references' => [
'https://metacpan.org/dist/Crypt-Random-Source/changes',
'https://nvd.nist.gov/vuln/detail/CVE-2018-25107',
'https://github.com/karenetheridge/Crypt-Random-Source/pull/3',
'https://metacpan.org/release/ETHER/Crypt-Random-Source-0.13/changes'
],
'reported' => undef,
'severity' => undef
}
],
'main_module' => 'Crypt::Random::Source',
'versions' => [
{
'date' => '2008-06-17T00:15:09',
'version' => '0.01_01'
},
{
'date' => '2008-06-17T01:51:37',
'version' => '0.01'
},
{
'date' => '2008-06-17T01:53:15',
'version' => '0.02'
},
{
'date' => '2008-06-17T06:01:16',
'version' => '0.03'
},
{
'date' => '2009-11-25T17:09:48',
'version' => '0.04'
},
{
'date' => '2009-11-25T17:11:14',
'version' => '0.05'
},
{
'date' => '2010-12-23T03:04:46',
'version' => '0.06'
},
{
'date' => '2011-01-05T08:42:20',
'version' => '0.07'
},
{
'date' => '2014-08-05T00:05:07',
'version' => '0.08'
},
{
'date' => '2014-08-30T17:12:48',
'version' => '0.09'
},
{
'date' => '2014-08-31T18:06:40',
'version' => '0.10'
},
{
'date' => '2015-10-24T04:00:11',
'version' => '0.11'
},
{
'date' => '2016-03-11T03:43:41',
'version' => '0.12'
},
{
'date' => '2018-04-08T01:09:20',
'version' => '0.13'
},
{
'date' => '2018-04-10T02:58:59',
'version' => '0.14'
}
]
},
'CryptX' => {
'advisories' => [
{
'affected_versions' => [
'<0.062'
],
'cves' => [
'CVE-2018-25099'
],
'description' => 'A user can pass anything as the tag into gcm_decrypt_verify() and it will return decrypted plaintext.
',
'distribution' => 'CryptX',
'fixed_versions' => [],
'id' => 'CPANSA-CryptX-2018-01',
'references' => [
'https://github.com/DCIT/perl-CryptX/issues/47',
'https://github.com/libtom/libtomcrypt/pull/451'
],
'reported' => '2018-10-26',
'severity' => undef
}
],
'main_module' => 'CryptX',
'versions' => [
{
'date' => '2013-04-11T15:10:25',
'version' => '0.002'
},
{
'date' => '2013-04-16T07:29:07',
'version' => '0.003'
},
{
'date' => '2013-04-16T07:37:29',
'version' => '0.004'
},
{
'date' => '2013-04-18T12:09:09',
'version' => '0.005'
},
{
'date' => '2013-04-19T09:05:57',
'version' => '0.006'
},
{
'date' => '2013-04-23T10:03:54',
'version' => '0.007'
},
{
'date' => '2013-05-02T08:52:42',
'version' => '0.008'
},
{
'date' => '2013-05-19T20:25:17',
'version' => '0.009'
},
{
'date' => '2013-06-14T22:37:18',
'version' => '0.011'
},
{
'date' => '2013-06-17T20:00:17',
'version' => '0.012'
},
{
'date' => '2013-08-28T07:12:15',
'version' => '0.013'
},
{
'date' => '2013-09-11T14:31:01',
'version' => '0.013_1'
},
{
'date' => '2013-09-11T21:11:18',
'version' => '0.014'
},
{
'date' => '2013-09-12T08:21:21',
'version' => '0.014_1'
},
{
'date' => '2013-09-12T09:12:21',
'version' => '0.014_2'
},
{
'date' => '2013-09-12T09:32:06',
'version' => '0.015'
},
{
'date' => '2013-09-15T19:36:52',
'version' => '0.016'
},
{
'date' => '2013-09-22T19:20:20',
'version' => '0.016_1'
},
{
'date' => '2013-09-23T14:24:27',
'version' => '0.016_2'
},
{
'date' => '2013-09-24T05:00:07',
'version' => '0.016_3'
},
{
'date' => '2013-09-24T08:54:42',
'version' => '0.017'
},
{
'date' => '2013-10-18T13:21:35',
'version' => '0.018'
},
{
'date' => '2013-10-20T21:13:35',
'version' => '0.019'
},
{
'date' => '2014-01-14T21:30:37',
'version' => '0.019_1'
},
{
'date' => '2014-01-15T21:59:30',
'version' => '0.019_2'
},
{
'date' => '2014-01-16T21:26:19',
'version' => '0.019_3'
},
{
'date' => '2014-01-17T09:42:29',
'version' => '0.019_4'
},
{
'date' => '2014-01-18T08:29:06',
'version' => '0.020'
},
{
'date' => '2014-01-23T15:47:50',
'version' => '0.021'
},
{
'date' => '2015-04-17T01:18:47',
'version' => '0.021_1'
},
{
'date' => '2015-04-17T10:12:01',
'version' => '0.021_3'
},
{
'date' => '2015-05-06T07:55:21',
'version' => '0.021_4'
},
{
'date' => '2015-05-11T21:56:39',
'version' => '0.021_5'
},
{
'date' => '2015-05-12T05:52:15',
'version' => '0.021_6'
},
{
'date' => '2015-05-12T07:10:42',
'version' => '0.021_7'
},
{
'date' => '2015-05-14T09:27:41',
'version' => '0.021_8'
},
{
'date' => '2015-05-15T11:08:26',
'version' => '0.021_9'
},
{
'date' => '2015-05-22T16:57:26',
'version' => '0.022'
},
{
'date' => '2015-06-10T20:37:54',
'version' => '0.023'
},
{
'date' => '2015-06-26T06:13:25',
'version' => '0.023_1'
},
{
'date' => '2015-06-26T09:18:06',
'version' => '0.023_2'
},
{
'date' => '2015-06-29T20:09:16',
'version' => '0.024'
},
{
'date' => '2015-07-08T07:56:50',
'version' => '0.025'
},
{
'date' => '2015-10-22T15:14:53',
'version' => '0.025_01'
},
{
'date' => '2015-11-28T18:58:17',
'version' => '0.026'
},
{
'date' => '2015-12-29T21:20:15',
'version' => '0.026_01'
},
{
'date' => '2015-12-29T21:20:27',
'version' => '0.026_02'
},
{
'date' => '2016-01-02T14:38:13',
'version' => '0.026_05'
},
{
'date' => '2016-01-02T15:57:58',
'version' => '0.026_06'
},
{
'date' => '2016-01-03T14:36:53',
'version' => '0.026_08'
},
{
'date' => '2016-01-10T09:47:31',
'version' => '0.026_15'
},
{
'date' => '2016-01-10T09:47:43',
'version' => '0.026_16'
},
{
'date' => '2016-01-10T11:52:21',
'version' => '0.026_18'
},
{
'date' => '2016-01-10T11:53:48',
'version' => '0.026_19'
},
{
'date' => '2016-01-10T17:03:45',
'version' => '0.026_23'
},
{
'date' => '2016-01-10T17:03:56',
'version' => '0.026_24'
},
{
'date' => '2016-01-10T19:02:14',
'version' => '0.026_28'
},
{
'date' => '2016-01-10T20:49:06',
'version' => '0.026_29'
},
{
'date' => '2016-01-12T22:25:58',
'version' => '0.026_30'
},
{
'date' => '2016-01-12T22:37:33',
'version' => '0.026_31'
},
{
'date' => '2016-01-13T23:53:06',
'version' => '0.026_32'
},
{
'date' => '2016-01-14T19:29:18',
'version' => '0.026_33'
},
{
'date' => '2016-01-14T19:30:45',
'version' => '0.026_34'
},
{
'date' => '2016-01-14T21:16:15',
'version' => '0.026_35'
},
{
'date' => '2016-01-14T21:19:01',
'version' => '0.026_36'
},
{
'date' => '2016-01-22T23:01:16',
'version' => '0.026_39'
},
{
'date' => '2016-01-24T22:12:32',
'version' => '0.026_40'
},
{
'date' => '2016-01-24T22:36:42',
'version' => '0.026_41'
},
{
'date' => '2016-01-25T20:44:46',
'version' => '0.027'
},
{
'date' => '2016-01-25T21:42:58',
'version' => '0.027_01'
},
{
'date' => '2016-01-26T10:06:26',
'version' => '0.027_05'
},
{
'date' => '2016-03-15T09:51:01',
'version' => '0.027_06'
},
{
'date' => '2016-03-23T19:44:54',
'version' => '0.028'
},
{
'date' => '2016-03-28T14:31:13',
'version' => '0.028_01'
},
{
'date' => '2016-03-28T19:32:58',
'version' => '0.028_02'
},
{
'date' => '2016-03-31T12:07:46',
'version' => '0.028_03'
},
{
'date' => '2016-04-13T09:30:27',
'version' => '0.029'
},
{
'date' => '2016-04-13T09:46:59',
'version' => '0.030'
},
{
'date' => '2016-05-01T16:53:05',
'version' => '0.031'
},
{
'date' => '2016-05-04T17:45:30',
'version' => '0.032'
},
{
'date' => '2016-05-09T20:20:49',
'version' => '0.033'
},
{
'date' => '2016-05-10T22:31:32',
'version' => '0.034'
},
{
'date' => '2016-06-03T10:17:59',
'version' => '0.035'
},
{
'date' => '2016-06-07T19:22:05',
'version' => '0.036'
},
{
'date' => '2016-06-16T17:04:27',
'version' => '0.037'
},
{
'date' => '2016-07-06T18:27:46',
'version' => '0.038'
},
{
'date' => '2016-08-03T05:53:42',
'version' => '0.039'
},
{
'date' => '2016-09-12T08:42:39',
'version' => '0.040'
},
{
'date' => '2016-10-12T09:32:48',
'version' => '0.041'
},
{
'date' => '2016-10-19T10:25:05',
'version' => '0.041_001'
},
{
'date' => '2016-11-02T09:00:59',
'version' => '0.041_002'
},
{
'date' => '2016-11-02T09:19:09',
'version' => '0.041_003'
},
{
'date' => '2016-11-12T15:21:01',
'version' => '0.042'
},
{
'date' => '2016-11-27T21:19:27',
'version' => '0.043'
},
{
'date' => '2016-11-28T07:45:32',
'version' => '0.044'
},
{
'date' => '2017-02-21T21:54:33',
'version' => '0.044_001'
},
{
'date' => '2017-02-23T15:58:42',
'version' => '0.044_003'
},
{
'date' => '2017-02-23T20:35:46',
'version' => '0.044_004'
},
{
'date' => '2017-02-23T20:44:50',
'version' => '0.044_005'
},
{
'date' => '2017-02-28T12:22:27',
'version' => '0.044_006'
},
{
'date' => '2017-02-28T13:58:51',
'version' => '0.044_007'
},
{
'date' => '2017-03-01T09:26:34',
'version' => '0.044_008'
},
{
'date' => '2017-03-01T09:49:29',
'version' => '0.044_009'
},
{
'date' => '2017-03-01T10:02:35',
'version' => '0.044_010'
},
{
'date' => '2017-03-31T09:28:10',
'version' => '0.045'
},
{
'date' => '2017-04-04T09:08:33',
'version' => '0.046'
},
{
'date' => '2017-04-05T20:09:35',
'version' => '0.047'
},
{
'date' => '2017-04-07T18:22:15',
'version' => '0.047_001'
},
{
'date' => '2017-04-07T21:40:24',
'version' => '0.047_002'
},
{
'date' => '2017-04-10T08:16:03',
'version' => '0.047_003'
},
{
'date' => '2017-04-24T15:23:29',
'version' => '0.047_004'
},
{
'date' => '2017-04-26T15:36:02',
'version' => '0.047_005'
},
{
'date' => '2017-05-01T19:11:50',
'version' => '0.047_006'
},
{
'date' => '2017-05-31T20:22:56',
'version' => '0.048'
},
{
'date' => '2017-07-09T19:38:38',
'version' => '0.048_001'
},
{
'date' => '2017-07-14T17:43:25',
'version' => '0.048_002'
},
{
'date' => '2017-07-18T05:56:42',
'version' => '0.049'
},
{
'date' => '2017-07-18T20:37:45',
'version' => '0.050'
},
{
'date' => '2017-08-08T08:14:05',
'version' => '0.051'
},
{
'date' => '2017-09-15T12:32:56',
'version' => '0.053'
},
{
'date' => '2017-09-19T07:51:19',
'version' => '0.053_001'
},
{
'date' => '2017-09-19T18:46:56',
'version' => '0.053_002'
},
{
'date' => '2017-09-20T09:56:04',
'version' => '0.053_003'
},
{
'date' => '2017-10-10T21:04:53',
'version' => '0.053_004'
},
{
'date' => '2017-10-12T07:27:42',
'version' => '0.054'
},
{
'date' => '2017-10-23T13:18:12',
'version' => '0.054_001'
},
{
'date' => '2017-10-23T17:44:49',
'version' => '0.054_002'
},
{
'date' => '2017-10-25T07:43:53',
'version' => '0.054_003'
},
{
'date' => '2017-10-30T17:53:14',
'version' => '0.054_004'
},
{
'date' => '2017-10-31T18:27:22',
'version' => '0.054_005'
},
{
'date' => '2017-11-20T18:51:03',
'version' => '0.054_006'
},
{
'date' => '2017-11-24T08:15:31',
'version' => '0.054_007'
},
{
'date' => '2017-11-24T14:21:46',
'version' => '0.054_008'
},
{
'date' => '2017-11-24T16:33:40',
'version' => '0.054_009'
},
{
'date' => '2017-11-28T10:19:52',
'version' => '0.055'
},
{
'date' => '2017-12-18T19:05:35',
'version' => '0.055_001'
},
{
'date' => '2017-12-22T13:22:16',
'version' => '0.056'
},
{
'date' => '2018-01-26T16:05:07',
'version' => '0.056_001'
},
{
'date' => '2018-01-29T06:18:08',
'version' => '0.056_002'
},
{
'date' => '2018-01-29T10:02:58',
'version' => '0.056_003'
},
{
'date' => '2018-01-29T23:05:27',
'version' => '0.056_004'
},
{
'date' => '2018-01-30T10:23:40',
'version' => '0.056_005'
},
{
'date' => '2018-01-30T14:11:33',
'version' => '0.056_006'
},
{
'date' => '2018-01-30T16:08:38',
'version' => '0.056_007'
},
{
'date' => '2018-01-30T16:29:41',
'version' => '0.056_008'
},
{
'date' => '2018-01-30T16:43:48',
'version' => '0.056_009'
},
{
'date' => '2018-01-31T08:56:12',
'version' => '0.057'
},
{
'date' => '2018-02-27T17:13:52',
'version' => '0.058'
},
{
'date' => '2018-03-08T09:30:22',
'version' => '0.058_001'
},
{
'date' => '2018-03-18T16:27:43',
'version' => '0.058_002'
},
{
'date' => '2018-03-25T15:45:36',
'version' => '0.059'
},
{
'date' => '2018-04-27T17:14:03',
'version' => '0.059_001'
},
{
'date' => '2018-04-28T20:59:58',
'version' => '0.059_002'
},
{
'date' => '2018-04-29T18:12:50',
'version' => '0.059_003'
},
{
'date' => '2018-05-01T09:32:27',
'version' => '0.060'
},
{
'date' => '2018-05-27T19:05:34',
'version' => '0.060_001'
},
{
'date' => '2018-05-28T07:18:37',
'version' => '0.060_002'
},
{
'date' => '2018-06-06T15:49:28',
'version' => '0.060_003'
},
{
'date' => '2018-06-07T05:25:50',
'version' => '0.061'
},
{
'date' => '2018-10-24T20:35:24',
'version' => '0.061_001'
},
{
'date' => '2018-10-26T17:10:16',
'version' => '0.061_002'
},
{
'date' => '2018-10-29T10:46:25',
'version' => '0.061_003'
},
{
'date' => '2018-10-30T06:27:48',
'version' => '0.062'
},
{
'date' => '2018-11-22T10:43:01',
'version' => '0.062_001'
},
{
'date' => '2018-11-28T10:48:28',
'version' => '0.063'
},
{
'date' => '2019-06-06T09:36:14',
'version' => '0.063_001'
},
{
'date' => '2019-06-06T17:35:59',
'version' => '0.063_002'
},
{
'date' => '2019-06-10T17:24:53',
'version' => '0.063_003'
},
{
'date' => '2019-06-12T13:33:28',
'version' => '0.063_004'
},
{
'date' => '2019-06-12T23:12:09',
'version' => '0.063_005'
},
{
'date' => '2019-06-14T07:01:03',
'version' => '0.064'
},
{
'date' => '2019-10-19T18:49:19',
'version' => '0.065'
},
{
'date' => '2019-10-20T16:30:22',
'version' => '0.066'
},
{
'date' => '2020-01-26T20:23:46',
'version' => '0.066_001'
},
{
'date' => '2020-01-30T10:21:29',
'version' => '0.066_002'
},
{
'date' => '2020-02-01T13:24:27',
'version' => '0.067'
},
{
'date' => '2020-03-08T19:21:55',
'version' => '0.067_001'
},
{
'date' => '2020-03-10T13:04:08',
'version' => '0.068'
},
{
'date' => '2020-08-02T08:51:06',
'version' => '0.068_001'
},
{
'date' => '2020-08-25T07:12:43',
'version' => '0.069'
},
{
'date' => '2021-02-12T14:44:41',
'version' => '0.070'
},
{
'date' => '2021-03-30T09:39:33',
'version' => '0.071'
},
{
'date' => '2021-04-29T08:23:01',
'version' => '0.072'
},
{
'date' => '2021-07-12T16:40:01',
'version' => '0.072_001'
},
{
'date' => '2021-07-13T07:03:12',
'version' => '0.072_002'
},
{
'date' => '2021-07-13T20:54:22',
'version' => '0.072_003'
},
{
'date' => '2021-07-18T12:16:09',
'version' => '0.073'
},
{
'date' => '2021-10-04T18:34:39',
'version' => '0.073_001'
},
{
'date' => '2021-10-10T18:41:04',
'version' => '0.073_002'
},
{
'date' => '2021-10-13T18:32:43',
'version' => '0.073_003'
},
{
'date' => '2021-11-06T09:26:22',
'version' => '0.074'
},
{
'date' => '2021-12-25T09:39:17',
'version' => '0.075'
},
{
'date' => '2022-01-01T00:36:25',
'version' => '0.075_001'
},
{
'date' => '2022-01-01T13:19:24',
'version' => '0.075_002'
},
{
'date' => '2022-01-01T19:48:49',
'version' => '0.075_003'
},
{
'date' => '2022-01-07T20:55:06',
'version' => '0.076'
},
{
'date' => '2022-06-09T18:18:34',
'version' => '0.076_001'
},
{
'date' => '2022-08-20T15:42:12',
'version' => '0.076_002'
},
{
'date' => '2022-08-20T18:14:10',
'version' => '0.076_003'
},
{
'date' => '2022-08-21T07:46:06',
'version' => '0.077'
},
{
'date' => '2023-04-28T12:31:25',
'version' => '0.078'
},
{
'date' => '2023-07-25T18:36:58',
'version' => '0.078_001'
},
{
'date' => '2023-10-01T12:20:32',
'version' => '0.079'
},
{
'date' => '2023-10-01T17:35:55',
'version' => '0.079_002'
},
{
'date' => '2023-10-01T17:36:06',
'version' => '0.079_003'
},
{
'date' => '2023-10-02T07:47:50',
'version' => '0.079_004'
},
{
'date' => '2023-10-02T11:22:48',
'version' => '0.079_005'
},
{
'date' => '2023-10-02T15:06:17',
'version' => '0.079_006'
},
{
'date' => '2023-10-03T10:16:25',
'version' => '0.079_007'
},
{
'date' => '2023-10-04T11:07:16',
'version' => '0.080'
},
{
'date' => '2023-10-07T11:45:30',
'version' => '0.080_001'
},
{
'date' => '2024-08-17T10:06:21',
'version' => '0.080_003'
},
{
'date' => '2024-08-17T17:16:06',
'version' => '0.080_004'
},
{
'date' => '2024-08-17T20:28:14',
'version' => '0.080_005'
},
{
'date' => '2024-08-30T18:43:56',
'version' => '0.080_006'
},
{
'date' => '2024-09-01T08:32:21',
'version' => '0.080_007'
},
{
'date' => '2024-09-01T09:26:40',
'version' => '0.080_008'
},
{
'date' => '2024-09-01T11:23:19',
'version' => '0.080_009'
},
{
'date' => '2024-09-02T14:51:29',
'version' => '0.080_010'
},
{
'date' => '2024-09-03T11:32:03',
'version' => '0.080_011'
},
{
'date' => '2024-09-03T18:01:58',
'version' => '0.080_012'
},
{
'date' => '2024-09-08T16:12:50',
'version' => '0.081'
},
{
'date' => '2024-10-03T11:12:24',
'version' => '0.081_001'
},
{
'date' => '2024-10-07T13:31:29',
'version' => '0.082'
},
{
'date' => '2024-10-14T11:36:41',
'version' => '0.082_001'
},
{
'date' => '2024-10-15T09:31:49',
'version' => '0.083'
},
{
'date' => '2024-10-15T15:09:00',
'version' => '0.083_001'
},
{
'date' => '2024-10-16T11:23:26',
'version' => '0.084'
},
{
'date' => '2025-01-25T22:45:03',
'version' => '0.084_001'
}
]
},
'DBD-MariaDB' => {
'advisories' => [
{
'affected_versions' => [
'<1.00'
],
'cves' => [
'CVE-2018-2767'
],
'description' => 'SSL problems of MySQL and MariaDB clients.
',
'distribution' => 'DBD-MariaDB',
'fixed_versions' => [
'>=1.00'
],
'id' => 'CPANSA-DBD-MariaDB-2018-01',
'references' => [
'https://metacpan.org/changes/distribution/DBD-MariaDB'
],
'reported' => '2017-07-01'
},
{
'affected_versions' => [
'<1.00'
],
'cves' => [
'CVE-2017-10788'
],
'description' => 'Use-after-free after calling mysql_stmt_close().
',
'distribution' => 'DBD-MariaDB',
'fixed_versions' => [
'>=1.00'
],
'id' => 'CPANSA-DBD-MariaDB-2017-02',
'references' => [
'https://metacpan.org/changes/distribution/DBD-MariaDB'
],
'reported' => '2017-07-01'
},
{
'affected_versions' => [
'<1.00'
],
'cves' => [
'CVE-2017-3302'
],
'description' => 'Leaking dangling pointers.
',
'distribution' => 'DBD-MariaDB',
'fixed_versions' => [
'>=1.00'
],
'id' => 'CPANSA-DBD-MariaDB-2017-01',
'references' => [
'https://metacpan.org/changes/distribution/DBD-MariaDB'
],
'reported' => '2017-07-01'
}
],
'main_module' => 'DBD::MariaDB',
'versions' => [
{
'date' => '2018-06-26T14:23:29',
'version' => '0.90_01'
},
{
'date' => '2018-07-12T13:36:05',
'version' => '1.00'
},
{
'date' => '2018-12-05T12:21:26',
'version' => '1.10'
},
{
'date' => '2019-01-02T15:38:57',
'version' => '1.11'
},
{
'date' => '2019-02-22T16:31:33',
'version' => '1.20'
},
{
'date' => '2019-02-27T11:08:40',
'version' => '1.21'
},
{
'date' => '2022-04-21T23:16:33',
'version' => '1.22'
},
{
'date' => '2023-09-10T14:27:09',
'version' => '1.23'
}
]
},
'DBD-Pg' => {
'advisories' => [
{
'affected_versions' => [
'<2.19.0'
],
'cves' => [
'CVE-2012-1151'
],
'description' => 'Multiple format string vulnerabilities in dbdimp.c in DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.19.0 for Perl allow remote PostgreSQL database servers to cause a denial of service (process crash) via format string specifiers in (1) a crafted database warning to the pg_warn function or (2) a crafted DBD statement to the dbd_st_prepare function.
',
'distribution' => 'DBD-Pg',
'fixed_versions' => [],
'id' => 'CPANSA-DBD-Pg-2012-1151',
'references' => [
'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661536',
'https://rt.cpan.org/Public/Bug/Display.html?id=75642',
'http://secunia.com/advisories/48319',
'https://bugzilla.redhat.com/show_bug.cgi?id=801733',
'http://www.openwall.com/lists/oss-security/2012/03/10/4',
'http://secunia.com/advisories/48307',
'http://www.debian.org/security/2012/dsa-2431',
'http://cpansearch.perl.org/src/TURNSTEP/DBD-Pg-2.19.1/Changes',
'http://www.openwall.com/lists/oss-security/2012/03/09/6',
'http://rhn.redhat.com/errata/RHSA-2012-1116.html',
'http://secunia.com/advisories/48824',
'http://security.gentoo.org/glsa/glsa-201204-08.xml',
'http://www.mandriva.com/security/advisories?name=MDVSA-2012:112',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/73855',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/73854'
],
'reported' => '2012-09-09',
'severity' => undef
},
{
'affected_versions' => [
'=1.49'
],
'cves' => [
'CVE-2009-0663'
],
'description' => 'Heap-based buffer overflow in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module 1.49 for Perl might allow context-dependent attackers to execute arbitrary code via unspecified input to an application that uses the getline and pg_getline functions to read database rows.
',
'distribution' => 'DBD-Pg',
'fixed_versions' => [],
'id' => 'CPANSA-DBD-Pg-2009-0663',
'references' => [
'http://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49-2+etch1.diff.gz',
'https://launchpad.net/bugs/cve/2009-0663',
'http://www.debian.org/security/2009/dsa-1780',
'http://secunia.com/advisories/34909',
'http://www.securityfocus.com/bid/34755',
'http://www.redhat.com/support/errata/RHSA-2009-0479.html',
'http://secunia.com/advisories/35058',
'http://www.redhat.com/support/errata/RHSA-2009-1067.html',
'http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html',
'http://secunia.com/advisories/35685',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/50467',
'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9499'
],
'reported' => '2009-04-30',
'severity' => undef
},
{
'affected_versions' => [
'<2.0.0'
],
'cves' => [
'CVE-2009-1341'
],
'description' => 'Memory leak in the dequote_bytea function in quote.c in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.0.0 for Perl allows context-dependent attackers to cause a denial of service (memory consumption) by fetching data with BYTEA columns.
',
'distribution' => 'DBD-Pg',
'fixed_versions' => [
'>=2.0.0'
],
'id' => 'CPANSA-DBD-Pg-2009-1341',
'references' => [
'http://rt.cpan.org/Public/Bug/Display.html?id=21392',
'https://launchpad.net/bugs/cve/2009-1341',
'http://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49-2+etch1.diff.gz',
'http://www.debian.org/security/2009/dsa-1780',
'http://cpansearch.perl.org/src/TURNSTEP/DBD-Pg-2.13.1/Changes',
'http://secunia.com/advisories/34909',
'http://www.securityfocus.com/bid/34757',
'http://www.redhat.com/support/errata/RHSA-2009-0479.html',
'http://secunia.com/advisories/35058',
'http://www.redhat.com/support/errata/RHSA-2009-1067.html',
'http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html',
'http://secunia.com/advisories/35685',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/50387',
'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9680'
],
'reported' => '2009-04-30',
'severity' => undef
}
],
'main_module' => 'DBD::Pg',
'versions' => [
{
'date' => '1997-03-13T21:11:59',
'version' => '0.1'
},
{
'date' => '1997-04-28T20:48:18',
'version' => '0.3'
},
{
'date' => '1997-08-10T20:45:01',
'version' => '0.5'
},
{
'date' => '1997-08-16T06:48:54',
'version' => '0.51'
},
{
'date' => '1997-08-17T09:14:26',
'version' => '0.52'
},
{
'date' => '1997-08-23T20:41:48',
'version' => '0.61'
},
{
'date' => '1997-08-26T21:39:36',
'version' => '0.62'
},
{
'date' => '1997-10-05T18:41:32',
'version' => '0.63'
},
{
'date' => '1998-02-02T21:05:57',
'version' => '0.64'
},
{
'date' => '1998-02-15T09:59:55',
'version' => '0.65'
},
{
'date' => '1998-02-19T21:13:44',
'version' => '0.66'
},
{
'date' => '1998-02-21T16:49:34',
'version' => '0.67'
},
{
'date' => '1998-03-03T21:22:18',
'version' => '0.68'
},
{
'date' => '1998-03-06T22:15:44',
'version' => '0.69'
},
{
'date' => '1998-04-20T20:14:28',
'version' => '0.72'
},
{
'date' => '1998-06-03T15:15:54',
'version' => '0.73'
},
{
'date' => '1998-11-05T21:41:28',
'version' => '0.89'
},
{
'date' => '1999-01-16T06:10:32',
'version' => '0.90'
},
{
'date' => '1999-02-14T20:41:05',
'version' => '0.91'
},
{
'date' => '1999-06-16T19:06:21',
'version' => '0.92'
},
{
'date' => '1999-09-29T21:25:02',
'version' => '0.93'
},
{
'date' => '2000-07-07T10:45:34',
'version' => '0.94'
},
{
'date' => '2000-07-10T18:07:30',
'version' => '0.95'
},
{
'date' => '2001-04-09T17:58:20',
'version' => '0.96'
},
{
'date' => '2001-04-20T21:11:46',
'version' => '0.97'
},
{
'date' => '2001-04-25T14:13:22',
'version' => '0.98'
},
{
'date' => '2001-05-24T17:36:05',
'version' => '0.99'
},
{
'date' => '2001-05-27T14:14:13',
'version' => '1.00'
},
{
'date' => '2001-06-27T18:03:08',
'version' => '1.01'
},
{
'date' => '2002-03-06T23:05:52',
'version' => '1.10'
},
{
'date' => '2002-03-07T01:34:18',
'version' => '1.11'
},
{
'date' => '2002-04-10T02:03:57',
'version' => '1.12'
},
{
'date' => '2002-04-27T20:50:11',
'version' => '1.13'
},
{
'date' => '2002-11-27T17:57:11',
'version' => '1.20'
},
{
'date' => '2003-01-13T06:46:43',
'version' => '1.21'
},
{
'date' => '2003-03-27T04:46:08',
'version' => '1.22'
},
{
'date' => '2003-09-10T02:12:07',
'version' => '1.31_5'
},
{
'date' => '2003-10-29T21:33:29',
'version' => '1.31_7'
},
{
'date' => '2003-11-10T03:52:37',
'version' => '1.31_8'
},
{
'date' => '2003-11-14T22:17:30',
'version' => '1.31_9'
},
{
'date' => '2003-11-18T18:34:28',
'version' => '1.31'
},
{
'date' => '2004-02-13T18:57:25',
'version' => '1.32_1'
},
{
'date' => '2004-02-19T02:40:51',
'version' => '1.32_2'
},
{
'date' => '2004-02-25T19:23:08',
'version' => '1.32'
},
{
'date' => '2005-02-06T21:18:12',
'version' => '1.39_02'
},
{
'date' => '2005-02-22T06:07:17',
'version' => '1.40'
},
{
'date' => '2005-03-31T12:35:04',
'version' => '1.40_1'
},
{
'date' => '2005-03-31T23:34:15',
'version' => '1.40_2'
},
{
'date' => '2005-04-01T23:56:01',
'version' => '1.40_03'
},
{
'date' => '2005-04-05T02:47:47',
'version' => '1.40_04'
},
{
'date' => '2005-04-06T22:53:50',
'version' => '1.41'
},
{
'date' => '2005-05-07T18:48:36',
'version' => '1.41_1'
},
{
'date' => '2005-05-19T03:23:24',
'version' => '1.41_2'
},
{
'date' => '2005-05-21T14:56:23',
'version' => '1.42'
},
{
'date' => '2005-06-22T00:42:23',
'version' => '1.42_1'
},
{
'date' => '2005-06-23T12:09:13',
'version' => '1.43'
},
{
'date' => '2005-09-13T01:39:06',
'version' => '1.43_1'
},
{
'date' => '2006-02-13T03:50:51',
'version' => '1.43_2'
},
{
'date' => '2006-02-22T03:00:40',
'version' => '1.44'
},
{
'date' => '2006-02-26T19:15:10',
'version' => '1.45'
},
{
'date' => '2006-03-17T17:17:03',
'version' => '1.46'
},
{
'date' => '2006-03-19T21:19:12',
'version' => '1.47'
},
{
'date' => '2006-04-05T15:39:30',
'version' => '1.48'
},
{
'date' => '2006-05-05T16:40:59',
'version' => '1.49'
},
{
'date' => '2008-01-17T14:34:38',
'version' => '2.0.0'
},
{
'date' => '2008-01-17T22:47:38',
'version' => '2.0.0_2'
},
{
'date' => '2008-01-18T04:21:25',
'version' => '2.0.0_3'
},
{
'date' => '2008-01-18T16:25:19',
'version' => '2.0.0_4'
},
{
'date' => '2008-01-19T19:05:27',
'version' => '2.0.0_5'
},
{
'date' => '2008-01-23T19:19:45',
'version' => '2.0.0_6'
},
{
'date' => '2008-01-26T17:48:03',
'version' => '2.0.0_7'
},
{
'date' => '2008-01-28T17:08:31',
'version' => '2.0.0_8'
},
{
'date' => '2008-01-28T21:21:19',
'version' => '2.0.0_9'
},
{
'date' => '2008-02-10T19:34:31',
'version' => '2.0.0'
},
{
'date' => '2008-02-17T04:58:29',
'version' => '2.0.0_1'
},
{
'date' => '2008-02-17T13:10:04',
'version' => '2.0.0_2'
},
{
'date' => '2008-02-17T18:17:25',
'version' => '2.0.1_1'
},
{
'date' => '2008-02-18T02:28:30',
'version' => '2.0.1_2'
},
{
'date' => '2008-02-18T23:52:09',
'version' => '2.0.1_3'
},
{
'date' => '2008-02-19T02:09:09',
'version' => '2.1.0'
},
{
'date' => '2008-02-19T04:45:29',
'version' => '2.1.1'
},
{
'date' => '2008-02-19T15:36:06',
'version' => '2.1.1_1'
},
{
'date' => '2008-02-20T02:56:37',
'version' => '2.1.2'
},
{
'date' => '2008-02-21T00:31:43',
'version' => '2.1.3'
},
{
'date' => '2008-02-26T01:59:20',
'version' => '2.1.3_1'
},
{
'date' => '2008-02-26T13:50:47',
'version' => '2.1.3_2'
},
{
'date' => '2008-02-28T04:08:34',
'version' => '2.2.0'
},
{
'date' => '2008-03-02T03:01:12',
'version' => '2.2.1'
},
{
'date' => '2008-03-03T17:14:01',
'version' => '2.2.2'
},
{
'date' => '2008-03-19T14:50:06',
'version' => '2.3.0'
},
{
'date' => '2008-03-21T16:41:42',
'version' => '2.4.0'
},
{
'date' => '2008-03-23T16:55:36',
'version' => '2.5.0'
},
{
'date' => '2008-04-07T19:16:57',
'version' => '2.5.1'
},
{
'date' => '2008-04-14T15:57:23',
'version' => '2.5.2_1'
},
{
'date' => '2008-04-16T18:16:11',
'version' => '2.6.0'
},
{
'date' => '2008-04-22T18:06:55',
'version' => '2.6.1'
},
{
'date' => '2008-04-28T21:15:56',
'version' => '2.6.1_1'
},
{
'date' => '2008-04-30T23:18:14',
'version' => '2.6.2'
},
{
'date' => '2008-05-01T16:03:12',
'version' => '2.6.3'
},
{
'date' => '2008-05-02T17:09:20',
'version' => '2.6.4'
},
{
'date' => '2008-05-07T14:10:57',
'version' => '2.6.5'
},
{
'date' => '2008-05-07T20:41:03',
'version' => '2.6.6'
},
{
'date' => '2008-05-10T22:37:02',
'version' => '2.7.0'
},
{
'date' => '2008-05-11T20:58:52',
'version' => '2.7.1'
},
{
'date' => '2008-05-14T13:19:24',
'version' => '2.7.2'
},
{
'date' => '2008-06-02T01:33:26',
'version' => '2.8.0'
},
{
'date' => '2008-06-12T04:06:28',
'version' => '2.8.1'
},
{
'date' => '2008-06-30T02:21:03',
'version' => '2.8.2'
},
{
'date' => '2008-07-07T02:09:01',
'version' => '2.8.3'
},
{
'date' => '2008-07-10T18:18:54',
'version' => '2.8.4'
},
{
'date' => '2008-07-13T14:41:49',
'version' => '2.8.5'
},
{
'date' => '2008-07-21T15:23:39',
'version' => '2.8.6'
},
{
'date' => '2008-07-24T05:27:41',
'version' => '2.8.7'
},
{
'date' => '2008-08-03T19:48:22',
'version' => '2.9.0'
},
{
'date' => '2008-08-18T03:49:13',
'version' => '2.9.1'
},
{
'date' => '2008-08-18T14:00:03',
'version' => '2.9.2'
},
{
'date' => '2008-08-27T02:46:34',
'version' => '2.10.0'
},
{
'date' => '2008-08-31T16:29:33',
'version' => '2.10.1'
},
{
'date' => '2008-09-01T01:40:52',
'version' => '2.10.2'
},
{
'date' => '2008-09-01T01:48:43',
'version' => '2.10.3'
},
{
'date' => '2008-09-16T15:35:48',
'version' => '2.10.4'
},
{
'date' => '2008-09-16T15:43:37',
'version' => '2.10.5'
},
{
'date' => '2008-09-19T13:38:32',
'version' => '2.10.6'
},
{
'date' => '2008-09-23T03:13:47',
'version' => '2.10.7'
},
{
'date' => '2008-10-13T11:50:18',
'version' => '2.11.0'
},
{
'date' => '2008-10-14T04:21:14',
'version' => '2.11.1'
},
{
'date' => '2008-10-16T00:55:38',
'version' => '2.11.2'
},
{
'date' => '2008-11-03T13:51:55',
'version' => '2.11.3'
},
{
'date' => '2008-11-12T22:11:37',
'version' => '2.11.4'
},
{
'date' => '2008-11-24T23:56:25',
'version' => '2.11.5'
},
{
'date' => '2008-11-30T23:05:28',
'version' => '2.11.6'
},
{
'date' => '2008-12-13T17:02:24',
'version' => '2.11.7'
},
{
'date' => '2008-12-28T19:24:29',
'version' => '2.11.8'
},
{
'date' => '2009-03-24T02:23:04',
'version' => '2.11.8_1'
},
{
'date' => '2009-03-26T18:53:00',
'version' => '2.11.8_2'
},
{
'date' => '2009-03-28T14:56:16',
'version' => '2.12.0'
},
{
'date' => '2009-04-14T02:14:44',
'version' => '2.13.0'
},
{
'date' => '2009-04-23T16:30:10',
'version' => '2.13.1'
},
{
'date' => '2009-07-13T19:43:16',
'version' => '2.13.1_1'
},
{
'date' => '2009-07-14T14:34:31',
'version' => '2.13.1_2'
},
{
'date' => '2009-07-15T21:12:47',
'version' => '2.13.1_3'
},
{
'date' => '2009-07-17T01:15:13',
'version' => '2.13.1_4'
},
{
'date' => '2009-07-20T23:54:06',
'version' => '2.13.1_5'
},
{
'date' => '2009-07-21T16:03:25',
'version' => '2.13.1_6'
},
{
'date' => '2009-07-21T21:43:56',
'version' => '2.13.1_7'
},
{
'date' => '2009-07-27T22:45:52',
'version' => '2.14.0'
},
{
'date' => '2009-07-28T17:05:35',
'version' => '2.14.1'
},
{
'date' => '2009-08-04T04:08:56',
'version' => '2.14.1_1'
},
{
'date' => '2009-08-04T18:18:51',
'version' => '2.15.0'
},
{
'date' => '2009-08-07T15:05:27',
'version' => '2.15.1'
},
{
'date' => '2009-12-17T15:41:55',
'version' => '2.8.8'
},
{
'date' => '2009-12-17T17:14:41',
'version' => '2.16.0'
},
{
'date' => '2010-01-20T21:13:23',
'version' => '2.16.1'
},
{
'date' => '2010-04-06T18:56:34',
'version' => '2.17.0'
},
{
'date' => '2010-04-08T15:32:24',
'version' => '2.17.1'
},
{
'date' => '2010-11-21T05:14:52',
'version' => '2.17.2'
},
{
'date' => '2011-03-27T03:53:00',
'version' => '2.17.2_1'
},
{
'date' => '2011-03-29T00:36:37',
'version' => '2.18.0'
},
{
'date' => '2011-05-09T16:40:13',
'version' => '2.18.1'
},
{
'date' => '2011-06-19T18:46:40',
'version' => '2.99.9_1'
},
{
'date' => '2011-06-20T20:47:06',
'version' => '2.99.9_2'
},
{
'date' => '2012-03-09T22:51:54',
'version' => '2.19.0'
},
{
'date' => '2012-03-11T03:28:47',
'version' => '2.19.1'
},
{
'date' => '2012-03-12T20:58:56',
'version' => '2.19.2'
},
{
'date' => '2012-08-21T17:18:39',
'version' => '2.19.3'
},
{
'date' => '2013-11-16T03:47:03',
'version' => '2.20.1_1'
},
{
'date' => '2013-11-21T03:22:26',
'version' => '2.20.1_2'
},
{
'date' => '2013-11-26T19:03:57',
'version' => '2.20.1_3'
},
{
'date' => '2013-11-27T19:35:07',
'version' => '2.20.1_4'
},
{
'date' => '2014-01-11T20:31:09',
'version' => '2.20.1_6'
},
{
'date' => '2014-02-04T01:38:37',
'version' => '3.0.0'
},
{
'date' => '2014-04-05T11:08:15',
'version' => '3.1.0'
},
{
'date' => '2014-04-06T13:17:49',
'version' => '3.1.1'
},
{
'date' => '2014-05-15T17:20:49',
'version' => '3.2.0'
},
{
'date' => '2014-05-20T16:38:44',
'version' => '3.2.1'
},
{
'date' => '2014-05-31T18:50:07',
'version' => '3.3.0'
},
{
'date' => '2014-08-16T19:09:15',
'version' => '3.4.0'
},
{
'date' => '2014-08-20T20:38:19',
'version' => '3.4.1'
},
{
'date' => '2014-09-25T21:16:23',
'version' => '3.4.2'
},
{
'date' => '2015-01-06T20:41:04',
'version' => '3.5.0'
},
{
'date' => '2015-02-07T13:09:54',
'version' => '3.5.0_1'
},
{
'date' => '2015-02-16T19:17:14',
'version' => '3.5.0_2'
},
{
'date' => '2015-02-17T21:20:22',
'version' => '3.5.1'
},
{
'date' => '2015-09-29T15:46:33',
'version' => '3.5.2'
},
{
'date' => '2015-10-01T14:06:04',
'version' => '3.5.3'
},
{
'date' => '2017-04-05T10:23:22',
'version' => '3.5.9_1'
},
{
'date' => '2017-04-17T13:34:12',
'version' => '3.6.0'
},
{
'date' => '2017-05-22T16:49:32',
'version' => '3.6.1'
},
{
'date' => '2017-05-23T14:25:49',
'version' => '3.6.2'
},
{
'date' => '2017-09-22T16:30:49',
'version' => '3.6.9_1'
},
{
'date' => '2017-09-23T02:10:34',
'version' => '3.6.9_2'
},
{
'date' => '2017-09-24T19:30:09',
'version' => '3.7.0'
},
{
'date' => '2018-02-11T19:23:39',
'version' => '3.7.1'
},
{
'date' => '2018-02-12T13:39:58',
'version' => 'v3.7.3'
},
{
'date' => '2018-02-13T04:10:10',
'version' => '3.7.4'
},
{
'date' => '2019-04-26T02:20:41',
'version' => '3.8.0'
},
{
'date' => '2019-07-06T19:44:25',
'version' => '3.8.1'
},
{
'date' => '2019-07-25T15:48:44',
'version' => '3.8.9_1'
},
{
'date' => '2019-08-13T21:10:51',
'version' => '3.9.0'
},
{
'date' => '2019-08-15T19:46:43',
'version' => '3.9.1'
},
{
'date' => '2019-09-03T15:18:09',
'version' => '3.10.0'
},
{
'date' => '2020-01-14T03:27:38',
'version' => '3.10.1'
},
{
'date' => '2020-01-17T22:34:46',
'version' => '3.10.2'
},
{
'date' => '2020-01-20T21:01:45',
'version' => '3.10.3'
},
{
'date' => '2020-02-03T17:19:38',
'version' => '3.10.4'
},
{
'date' => '2020-03-23T17:47:23',
'version' => '3.10.5'
},
{
'date' => '2020-04-23T16:46:52',
'version' => '3.11.0'
},
{
'date' => '2020-04-28T15:12:38',
'version' => '3.11.1'
},
{
'date' => '2020-05-07T18:35:28',
'version' => '3.12.0'
},
{
'date' => '2020-06-03T13:39:22',
'version' => '3.12.1'
},
{
'date' => '2020-06-04T15:30:54',
'version' => '3.12.2'
},
{
'date' => '2020-06-05T17:59:13',
'version' => '3.12.3'
},
{
'date' => '2020-06-08T20:38:00',
'version' => '3.12.3_1'
},
{
'date' => '2020-06-15T21:25:55',
'version' => '3.12.3_2'
},
{
'date' => '2020-06-17T15:53:25',
'version' => '3.13.0'
},
{
'date' => '2020-07-20T00:24:23',
'version' => '3.14.0'
},
{
'date' => '2020-08-12T16:17:33',
'version' => '3.14.1'
},
{
'date' => '2020-08-13T13:36:09',
'version' => '3.14.2'
},
{
'date' => '2021-05-21T21:20:28',
'version' => '3.15.0'
},
{
'date' => '2022-02-14T15:39:15',
'version' => '3.15.1'
},
{
'date' => '2022-08-08T18:03:02',
'version' => '3.16.0'
},
{
'date' => '2023-03-06T00:06:35',
'version' => '3.16.1'
},
{
'date' => '2023-04-04T19:49:11',
'version' => '3.16.2'
},
{
'date' => '2023-04-04T20:43:26',
'version' => '3.16.3'
},
{
'date' => '2023-08-24T00:42:24',
'version' => '3.17.0'
},
{
'date' => '2023-12-06T23:47:13',
'version' => '3.18.0'
}
]
},
'DBD-SQLite' => {
'advisories' => [
{
'affected_versions' => [
'<1.65_03'
],
'cves' => [
'CVE-2020-15358'
],
'description' => 'In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.65_03'
],
'id' => 'CPANSA-DBD-SQLite-2020-15358',
'references' => [
'https://www.sqlite.org/src/info/10fa79d00f8091e5',
'https://www.sqlite.org/src/timeline?p=version-3.32.3&bt=version-3.32.2',
'https://www.sqlite.org/src/tktview?name=8f157e8010',
'https://security.netapp.com/advisory/ntap-20200709-0001/',
'https://security.gentoo.org/glsa/202007-26',
'https://usn.ubuntu.com/4438-1/',
'https://www.oracle.com/security-alerts/cpuoct2020.html',
'https://support.apple.com/kb/HT211931',
'https://support.apple.com/kb/HT211844',
'https://support.apple.com/kb/HT211850',
'https://support.apple.com/kb/HT211843',
'https://support.apple.com/kb/HT211847',
'http://seclists.org/fulldisclosure/2020/Nov/19',
'http://seclists.org/fulldisclosure/2020/Nov/22',
'http://seclists.org/fulldisclosure/2020/Nov/20',
'http://seclists.org/fulldisclosure/2020/Dec/32',
'https://www.oracle.com/security-alerts/cpujan2021.html',
'https://support.apple.com/kb/HT212147',
'http://seclists.org/fulldisclosure/2021/Feb/14',
'https://www.oracle.com/security-alerts/cpuApr2021.html',
'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf',
'https://www.oracle.com/security-alerts/cpuapr2022.html'
],
'reported' => '2020-06-27',
'severity' => 'medium'
},
{
'affected_versions' => [
'<1.65_03'
],
'cves' => [
'CVE-2020-13632'
],
'description' => 'ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.65_03'
],
'id' => 'CPANSA-DBD-SQLite-2020-13632',
'references' => [
'https://bugs.chromium.org/p/chromium/issues/detail?id=1080459',
'https://sqlite.org/src/info/a4dd148928ea65bd',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/',
'https://security.netapp.com/advisory/ntap-20200608-0002/',
'https://usn.ubuntu.com/4394-1/',
'https://www.oracle.com/security-alerts/cpujul2020.html',
'https://security.gentoo.org/glsa/202007-26',
'https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc',
'https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html',
'https://www.oracle.com/security-alerts/cpuoct2020.html',
'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'
],
'reported' => '2020-05-27',
'severity' => 'medium'
},
{
'affected_versions' => [
'<1.65_03'
],
'cves' => [
'CVE-2020-13631'
],
'description' => 'SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.65_03'
],
'id' => 'CPANSA-DBD-SQLite-2020-13631',
'references' => [
'https://bugs.chromium.org/p/chromium/issues/detail?id=1080459',
'https://sqlite.org/src/info/eca0ba2cf4c0fdf7',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/',
'https://security.netapp.com/advisory/ntap-20200608-0002/',
'https://usn.ubuntu.com/4394-1/',
'https://www.oracle.com/security-alerts/cpujul2020.html',
'https://security.gentoo.org/glsa/202007-26',
'https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc',
'https://www.oracle.com/security-alerts/cpuoct2020.html',
'https://support.apple.com/kb/HT211931',
'https://support.apple.com/kb/HT211844',
'https://support.apple.com/kb/HT211850',
'https://support.apple.com/kb/HT211843',
'https://support.apple.com/kb/HT211952',
'http://seclists.org/fulldisclosure/2020/Nov/19',
'http://seclists.org/fulldisclosure/2020/Nov/22',
'http://seclists.org/fulldisclosure/2020/Nov/20',
'https://support.apple.com/kb/HT211935',
'http://seclists.org/fulldisclosure/2020/Dec/32',
'https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E',
'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'
],
'reported' => '2020-05-27',
'severity' => 'medium'
},
{
'affected_versions' => [
'<1.65_03'
],
'cves' => [
'CVE-2020-13630'
],
'description' => 'ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.65_03'
],
'id' => 'CPANSA-DBD-SQLite-2020-13630',
'references' => [
'https://bugs.chromium.org/p/chromium/issues/detail?id=1080459',
'https://sqlite.org/src/info/0d69f76f0865f962',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/',
'https://security.netapp.com/advisory/ntap-20200608-0002/',
'https://usn.ubuntu.com/4394-1/',
'https://www.oracle.com/security-alerts/cpujul2020.html',
'https://security.gentoo.org/glsa/202007-26',
'https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc',
'https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html',
'https://www.oracle.com/security-alerts/cpuoct2020.html',
'https://support.apple.com/kb/HT211931',
'https://support.apple.com/kb/HT211844',
'https://support.apple.com/kb/HT211850',
'https://support.apple.com/kb/HT211843',
'https://support.apple.com/kb/HT211952',
'http://seclists.org/fulldisclosure/2020/Nov/19',
'http://seclists.org/fulldisclosure/2020/Nov/22',
'http://seclists.org/fulldisclosure/2020/Nov/20',
'https://support.apple.com/kb/HT211935',
'http://seclists.org/fulldisclosure/2020/Dec/32',
'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'
],
'reported' => '2020-05-27',
'severity' => 'high'
},
{
'affected_versions' => [
'<1.65_03'
],
'cves' => [
'CVE-2020-13435'
],
'description' => 'SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.65_03'
],
'id' => 'CPANSA-DBD-SQLite-2020-13435',
'references' => [
'https://www.sqlite.org/src/info/7a5279a25c57adf1',
'https://security.netapp.com/advisory/ntap-20200528-0004/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/',
'https://usn.ubuntu.com/4394-1/',
'https://www.oracle.com/security-alerts/cpujul2020.html',
'https://security.gentoo.org/glsa/202007-26',
'https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc',
'https://support.apple.com/kb/HT211931',
'https://support.apple.com/kb/HT211844',
'https://support.apple.com/kb/HT211850',
'https://support.apple.com/kb/HT211843',
'https://support.apple.com/kb/HT211952',
'http://seclists.org/fulldisclosure/2020/Nov/19',
'http://seclists.org/fulldisclosure/2020/Nov/22',
'http://seclists.org/fulldisclosure/2020/Nov/20',
'https://support.apple.com/kb/HT211935',
'http://seclists.org/fulldisclosure/2020/Dec/32',
'https://www.oracle.com/security-alerts/cpuApr2021.html'
],
'reported' => '2020-05-24',
'severity' => 'medium'
},
{
'affected_versions' => [
'<1.65_03'
],
'cves' => [
'CVE-2020-13434'
],
'description' => 'SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.65_03'
],
'id' => 'CPANSA-DBD-SQLite-2020-13434',
'references' => [
'https://www.sqlite.org/src/info/23439ea582241138',
'https://www.sqlite.org/src/info/d08d3405878d394e',
'https://lists.debian.org/debian-lts-announce/2020/05/msg00024.html',
'https://security.netapp.com/advisory/ntap-20200528-0004/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/',
'https://usn.ubuntu.com/4394-1/',
'https://www.oracle.com/security-alerts/cpujul2020.html',
'https://security.gentoo.org/glsa/202007-26',
'https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc',
'https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html',
'https://support.apple.com/kb/HT211931',
'https://support.apple.com/kb/HT211844',
'https://support.apple.com/kb/HT211850',
'https://support.apple.com/kb/HT211843',
'https://support.apple.com/kb/HT211952',
'http://seclists.org/fulldisclosure/2020/Nov/19',
'http://seclists.org/fulldisclosure/2020/Nov/22',
'http://seclists.org/fulldisclosure/2020/Nov/20',
'https://support.apple.com/kb/HT211935',
'http://seclists.org/fulldisclosure/2020/Dec/32',
'https://www.oracle.com/security-alerts/cpuApr2021.html',
'https://www.oracle.com/security-alerts/cpuapr2022.html'
],
'reported' => '2020-05-24',
'severity' => 'medium'
},
{
'affected_versions' => [
'<1.65_03'
],
'cves' => [
'CVE-2020-11656'
],
'description' => 'In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.65_03'
],
'id' => 'CPANSA-DBD-SQLite-2020-11656',
'references' => [
'https://www3.sqlite.org/cgi/src/info/b64674919f673602',
'https://www.sqlite.org/src/info/d09f8c3621d5f7f8',
'https://security.netapp.com/advisory/ntap-20200416-0001/',
'https://www.oracle.com/security-alerts/cpujul2020.html',
'https://security.gentoo.org/glsa/202007-26',
'https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc',
'https://www.oracle.com/security-alerts/cpuoct2020.html',
'https://www.oracle.com/security-alerts/cpujan2021.html',
'https://www.oracle.com/security-alerts/cpuApr2021.html',
'https://www.tenable.com/security/tns-2021-14',
'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'
],
'reported' => '2020-04-09',
'severity' => 'critical'
},
{
'affected_versions' => [
'<1.65_03'
],
'cves' => [
'CVE-2020-11655'
],
'description' => 'SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object\'s initialization is mishandled.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.65_03'
],
'id' => 'CPANSA-DBD-SQLite-2020-11655',
'references' => [
'https://www3.sqlite.org/cgi/src/info/4a302b42c7bf5e11',
'https://www3.sqlite.org/cgi/src/tktview?name=af4556bb5c',
'https://security.netapp.com/advisory/ntap-20200416-0001/',
'https://lists.debian.org/debian-lts-announce/2020/05/msg00006.html',
'https://usn.ubuntu.com/4394-1/',
'https://www.oracle.com/security-alerts/cpujul2020.html',
'https://security.gentoo.org/glsa/202007-26',
'https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc',
'https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html',
'https://www.oracle.com/security-alerts/cpuoct2020.html',
'https://www.oracle.com/security-alerts/cpujan2021.html',
'https://www.oracle.com/security-alerts/cpuApr2021.html',
'https://www.tenable.com/security/tns-2021-14',
'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'
],
'reported' => '2020-04-09',
'severity' => 'high'
},
{
'affected_versions' => [
'<1.65_03'
],
'cves' => [
'CVE-2020-9327'
],
'description' => 'In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.65_03'
],
'id' => 'CPANSA-DBD-SQLite-2020-9327',
'references' => [
'https://www.sqlite.org/cgi/src/info/4374860b29383380',
'https://www.sqlite.org/cgi/src/info/abc473fb8fb99900',
'https://www.sqlite.org/cgi/src/info/9d0d4ab95dc0c56e',
'https://security.netapp.com/advisory/ntap-20200313-0002/',
'https://security.gentoo.org/glsa/202003-16',
'https://usn.ubuntu.com/4298-1/',
'https://www.oracle.com/security-alerts/cpujul2020.html',
'https://www.oracle.com/security-alerts/cpuoct2020.html',
'https://www.oracle.com/security-alerts/cpujan2021.html',
'https://www.oracle.com/security-alerts/cpuApr2021.html',
'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'
],
'reported' => '2020-02-21',
'severity' => 'high'
},
{
'affected_versions' => [
'=1.65_02'
],
'cves' => [
'CVE-2019-20218'
],
'description' => 'selectExpander in select.c in SQLite 3.30.1 proceeds with WITH stack unwinding even after a parsing error.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.65_03'
],
'id' => 'CPANSA-DBD-SQLite-2019-20218',
'references' => [
'https://github.com/sqlite/sqlite/commit/a6c1a71cde082e09750465d5675699062922e387',
'https://usn.ubuntu.com/4298-1/',
'https://www.oracle.com/security-alerts/cpuapr2020.html',
'https://security.gentoo.org/glsa/202007-26',
'https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html',
'https://lists.debian.org/debian-lts-announce/2020/12/msg00016.html'
],
'reported' => '2020-01-02',
'severity' => 'high'
},
{
'affected_versions' => [
'=1.65_02'
],
'cves' => [
'CVE-2019-19959'
],
'description' => 'ext/misc/zipfile.c in SQLite 3.30.1 mishandles certain uses of INSERT INTO in situations involving embedded \'\\\\0\' characters in filenames, leading to a memory-management error that can be detected by (for example) valgrind.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.65_03'
],
'id' => 'CPANSA-DBD-SQLite-2019-19959',
'references' => [
'https://github.com/sqlite/sqlite/commit/1e490c4ca6b43a9cf8637d695907888349f69bec',
'https://github.com/sqlite/sqlite/commit/d8f2d46cbc9925e034a68aaaf60aad788d9373c1',
'https://security.netapp.com/advisory/ntap-20200204-0001/',
'https://usn.ubuntu.com/4298-1/',
'https://www.oracle.com/security-alerts/cpuapr2020.html'
],
'reported' => '2020-01-03',
'severity' => 'high'
},
{
'affected_versions' => [
'=1.65_02'
],
'cves' => [
'CVE-2019-19926',
'CVE-2019-19880'
],
'description' => 'multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.65_03'
],
'id' => 'CPANSA-DBD-SQLite-2019-19926',
'references' => [
'https://github.com/sqlite/sqlite/commit/8428b3b437569338a9d1e10c4cd8154acbe33089',
'https://security.netapp.com/advisory/ntap-20200114-0003/',
'http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html',
'http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html',
'https://access.redhat.com/errata/RHSA-2020:0514',
'http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html',
'https://www.debian.org/security/2020/dsa-4638',
'https://usn.ubuntu.com/4298-1/',
'https://www.oracle.com/security-alerts/cpuapr2020.html',
'https://usn.ubuntu.com/4298-2/',
'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'
],
'reported' => '2019-12-23',
'severity' => 'high'
},
{
'affected_versions' => [
'>=1.19_01,<1.63_03'
],
'cves' => [
'CVE-2019-8457'
],
'description' => 'SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap out-of-bound read in the rtreenode() function when handling invalid rtree tables.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.63_04'
],
'id' => 'CPANSA-DBD-SQLite-2019-8457',
'references' => [
'https://www.sqlite.org/src/info/90acdbfce9c08858',
'https://www.sqlite.org/releaselog/3_28_0.html',
'https://usn.ubuntu.com/4004-1/',
'https://usn.ubuntu.com/4004-2/',
'https://security.netapp.com/advisory/ntap-20190606-0002/',
'https://usn.ubuntu.com/4019-1/',
'https://usn.ubuntu.com/4019-2/',
'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/',
'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html',
'https://www.oracle.com/security-alerts/cpujan2020.html',
'https://www.oracle.com/security-alerts/cpuapr2020.html',
'https://www.oracle.com/security-alerts/cpujul2020.html',
'https://kc.mcafee.com/corporate/index?page=content&id=SB10365'
],
'reported' => '2019-05-30',
'severity' => 'critical'
},
{
'affected_versions' => [
'>=1.61_03,<1.63_03'
],
'cves' => [
'CVE-2019-5018'
],
'description' => 'An exploitable use after free vulnerability exists in the window function functionality of Sqlite3 3.26.0. A specially crafted SQL command can cause a use after free vulnerability, potentially resulting in remote code execution. An attacker can send a malicious SQL command to trigger this vulnerability.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.63_04'
],
'id' => 'CPANSA-DBD-SQLite-2019-5018',
'references' => [
'https://talosintelligence.com/vulnerability_reports/TALOS-2019-0777',
'http://www.securityfocus.com/bid/108294',
'http://packetstormsecurity.com/files/152809/Sqlite3-Window-Function-Remote-Code-Execution.html',
'https://security.netapp.com/advisory/ntap-20190521-0001/',
'https://security.gentoo.org/glsa/201908-09',
'https://usn.ubuntu.com/4205-1/'
],
'reported' => '2019-05-10',
'severity' => 'high'
},
{
'affected_versions' => [
'=1.65_02'
],
'cves' => [
'CVE-2019-19925'
],
'description' => 'zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.65_03'
],
'id' => 'CPANSA-DBD-SQLite-2019-19925',
'references' => [
'https://github.com/sqlite/sqlite/commit/54d501092d88c0cf89bec4279951f548fb0b8618',
'https://security.netapp.com/advisory/ntap-20200114-0003/',
'http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html',
'http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html',
'https://access.redhat.com/errata/RHSA-2020:0514',
'http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html',
'https://www.debian.org/security/2020/dsa-4638',
'https://usn.ubuntu.com/4298-1/',
'https://www.oracle.com/security-alerts/cpuapr2020.html',
'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'
],
'reported' => '2019-12-24',
'severity' => 'high'
},
{
'affected_versions' => [
'=1.65_02'
],
'cves' => [
'CVE-2019-19924'
],
'description' => 'SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.65_03'
],
'id' => 'CPANSA-DBD-SQLite-2019-19924',
'references' => [
'https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3',
'https://security.netapp.com/advisory/ntap-20200114-0003/',
'https://usn.ubuntu.com/4298-1/',
'https://www.oracle.com/security-alerts/cpuapr2020.html',
'https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E',
'https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E',
'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'
],
'reported' => '2019-12-24',
'severity' => 'medium'
},
{
'affected_versions' => [
'=1.65_02'
],
'cves' => [
'CVE-2019-19923'
],
'description' => 'flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.65_03'
],
'id' => 'CPANSA-DBD-SQLite-2019-19923',
'references' => [
'https://github.com/sqlite/sqlite/commit/396afe6f6aa90a31303c183e11b2b2d4b7956b35',
'https://security.netapp.com/advisory/ntap-20200114-0003/',
'http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html',
'http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html',
'https://access.redhat.com/errata/RHSA-2020:0514',
'http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html',
'https://www.debian.org/security/2020/dsa-4638',
'https://usn.ubuntu.com/4298-1/',
'https://www.oracle.com/security-alerts/cpuapr2020.html',
'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'
],
'reported' => '2019-12-24',
'severity' => 'high'
},
{
'affected_versions' => [
'=1.65_02'
],
'cves' => [
'CVE-2019-19880'
],
'description' => 'exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.65_03'
],
'id' => 'CPANSA-DBD-SQLite-2019-19880',
'references' => [
'https://github.com/sqlite/sqlite/commit/75e95e1fcd52d3ec8282edb75ac8cd0814095d54',
'https://security.netapp.com/advisory/ntap-20200114-0001/',
'http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html',
'http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html',
'https://access.redhat.com/errata/RHSA-2020:0514',
'http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html',
'https://www.debian.org/security/2020/dsa-4638',
'https://usn.ubuntu.com/4298-1/',
'https://www.oracle.com/security-alerts/cpuapr2020.html',
'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'
],
'reported' => '2019-12-18',
'severity' => 'high'
},
{
'affected_versions' => [
'<=1.65_02'
],
'cves' => [
'CVE-2019-19646'
],
'description' => 'pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.65_03'
],
'id' => 'CPANSA-DBD-SQLite-2019-19646',
'references' => [
'https://github.com/sqlite/sqlite/commit/ebd70eedd5d6e6a890a670b5ee874a5eae86b4dd',
'https://github.com/sqlite/sqlite/commit/926f796e8feec15f3836aa0a060ed906f8ae04d3',
'https://www.sqlite.org/',
'https://security.netapp.com/advisory/ntap-20191223-0001/',
'https://www.oracle.com/security-alerts/cpuapr2020.html',
'https://www.tenable.com/security/tns-2021-14',
'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'
],
'reported' => '2019-12-09',
'severity' => 'critical'
},
{
'affected_versions' => [
'<=1.65_02'
],
'cves' => [
'CVE-2019-19645'
],
'description' => 'alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.65_03'
],
'id' => 'CPANSA-DBD-SQLite-2019-19645',
'references' => [
'https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06',
'https://security.netapp.com/advisory/ntap-20191223-0001/',
'https://www.oracle.com/security-alerts/cpuapr2020.html',
'https://usn.ubuntu.com/4394-1/',
'https://www.tenable.com/security/tns-2021-14',
'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'
],
'reported' => '2019-12-09',
'severity' => 'medium'
},
{
'affected_versions' => [
'=1.65_02'
],
'cves' => [
'CVE-2019-19603'
],
'description' => 'SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.65_03'
],
'id' => 'CPANSA-DBD-SQLite-2019-19603',
'references' => [
'https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13',
'https://www.sqlite.org/',
'https://security.netapp.com/advisory/ntap-20191223-0001/',
'https://www.oracle.com/security-alerts/cpuapr2020.html',
'https://usn.ubuntu.com/4394-1/',
'https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E',
'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'
],
'reported' => '2019-12-09',
'severity' => 'high'
},
{
'affected_versions' => [
'=1.65_02'
],
'cves' => [
'CVE-2019-19317'
],
'description' => 'lookupName in resolve.c in SQLite 3.30.1 omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service or possibly have unspecified other impact.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.65_03'
],
'id' => 'CPANSA-DBD-SQLite-2019-19317',
'references' => [
'https://github.com/sqlite/sqlite/commit/522ebfa7cee96fb325a22ea3a2464a63485886a8',
'https://github.com/sqlite/sqlite/commit/73bacb7f93eab9f4bd5a65cbc4ae242acf63c9e3',
'https://security.netapp.com/advisory/ntap-20191223-0001/',
'https://www.oracle.com/security-alerts/cpuapr2020.html',
'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'
],
'reported' => '2019-12-05',
'severity' => 'critical'
},
{
'affected_versions' => [
'=1.65_02'
],
'cves' => [
'CVE-2019-19244'
],
'description' => 'sqlite3Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.65_03'
],
'id' => 'CPANSA-DBD-SQLite-2019-19244',
'references' => [
'https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348',
'https://usn.ubuntu.com/4205-1/',
'https://www.oracle.com/security-alerts/cpuapr2020.html',
'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'
],
'reported' => '2019-11-25',
'severity' => 'high'
},
{
'affected_versions' => [
'=1.65_02'
],
'cves' => [
'CVE-2019-19242'
],
'description' => 'SQLite 3.30.1 mishandles pExpr->y.pTab, as demonstrated by the TK_COLUMN case in sqlite3ExprCodeTarget in expr.c.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.65_03'
],
'id' => 'CPANSA-DBD-SQLite-2019-19242',
'references' => [
'https://github.com/sqlite/sqlite/commit/57f7ece78410a8aae86aa4625fb7556897db384c',
'https://usn.ubuntu.com/4205-1/',
'https://www.oracle.com/security-alerts/cpuapr2020.html',
'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'
],
'reported' => '2019-11-27',
'severity' => 'medium'
},
{
'affected_versions' => [
'<1.61_01'
],
'cves' => [
'CVE-2018-20506'
],
'description' => 'SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries in a "merge" operation that occurs after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). This is a different vulnerability than CVE-2018-20346.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.61_01'
],
'id' => 'CPANSA-DBD-SQLite-2018-20506',
'references' => [
'https://support.apple.com/kb/HT209451',
'https://support.apple.com/kb/HT209450',
'https://support.apple.com/kb/HT209448',
'https://support.apple.com/kb/HT209447',
'https://support.apple.com/kb/HT209446',
'https://support.apple.com/kb/HT209443',
'https://sqlite.org/src/info/940f2adc8541a838',
'https://seclists.org/bugtraq/2019/Jan/39',
'https://seclists.org/bugtraq/2019/Jan/33',
'https://seclists.org/bugtraq/2019/Jan/32',
'https://seclists.org/bugtraq/2019/Jan/31',
'https://seclists.org/bugtraq/2019/Jan/29',
'https://seclists.org/bugtraq/2019/Jan/28',
'http://www.securityfocus.com/bid/106698',
'http://seclists.org/fulldisclosure/2019/Jan/69',
'http://seclists.org/fulldisclosure/2019/Jan/68',
'http://seclists.org/fulldisclosure/2019/Jan/67',
'http://seclists.org/fulldisclosure/2019/Jan/66',
'http://seclists.org/fulldisclosure/2019/Jan/64',
'http://seclists.org/fulldisclosure/2019/Jan/62',
'http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html',
'https://security.netapp.com/advisory/ntap-20190502-0004/',
'https://usn.ubuntu.com/4019-1/',
'https://usn.ubuntu.com/4019-2/',
'https://www.oracle.com/security-alerts/cpuapr2020.html',
'https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html',
'https://kc.mcafee.com/corporate/index?page=content&id=SB10365'
],
'reported' => '2019-04-03',
'severity' => 'high'
},
{
'affected_versions' => [
'=1.59_02'
],
'cves' => [
'CVE-2018-20505'
],
'description' => 'SQLite 3.25.2, when queries are run on a table with a malformed PRIMARY KEY, allows remote attackers to cause a denial of service (application crash) by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases).
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.59_03'
],
'id' => 'CPANSA-DBD-SQLite-2018-20505',
'references' => [
'https://support.apple.com/kb/HT209451',
'https://support.apple.com/kb/HT209450',
'https://support.apple.com/kb/HT209448',
'https://support.apple.com/kb/HT209447',
'https://support.apple.com/kb/HT209446',
'https://support.apple.com/kb/HT209443',
'https://sqlite.org/src/info/1a84668dcfdebaf12415d',
'https://seclists.org/bugtraq/2019/Jan/39',
'https://seclists.org/bugtraq/2019/Jan/33',
'https://seclists.org/bugtraq/2019/Jan/32',
'https://seclists.org/bugtraq/2019/Jan/31',
'https://seclists.org/bugtraq/2019/Jan/29',
'https://seclists.org/bugtraq/2019/Jan/28',
'http://www.securityfocus.com/bid/106698',
'http://seclists.org/fulldisclosure/2019/Jan/69',
'http://seclists.org/fulldisclosure/2019/Jan/68',
'http://seclists.org/fulldisclosure/2019/Jan/67',
'http://seclists.org/fulldisclosure/2019/Jan/66',
'http://seclists.org/fulldisclosure/2019/Jan/64',
'http://seclists.org/fulldisclosure/2019/Jan/62',
'https://security.netapp.com/advisory/ntap-20190502-0004/',
'https://usn.ubuntu.com/4019-1/'
],
'reported' => '2019-04-03',
'severity' => 'high'
},
{
'affected_versions' => [
'<1.61_01'
],
'cves' => [
'CVE-2018-20346'
],
'description' => 'SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.61_01'
],
'id' => 'CPANSA-DBD-SQLite-2018-20346',
'references' => [
'https://www.sqlite.org/releaselog/3_25_3.html',
'https://www.mail-archive.com/sqlite-users@mailinglists.sqlite.org/msg113218.html',
'https://crbug.com/900910',
'https://chromium.googlesource.com/chromium/src/+/c368e30ae55600a1c3c9cb1710a54f9c55de786e',
'https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html',
'https://bugzilla.redhat.com/show_bug.cgi?id=1659677',
'https://bugzilla.redhat.com/show_bug.cgi?id=1659379',
'https://blade.tencent.com/magellan/index_en.html',
'https://access.redhat.com/articles/3758321',
'https://worthdoingbadly.com/sqlitebug/',
'https://sqlite.org/src/info/d44318f59044162e',
'https://sqlite.org/src/info/940f2adc8541a838',
'https://news.ycombinator.com/item?id=18685296',
'https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html',
'https://lists.debian.org/debian-lts-announce/2018/12/msg00012.html',
'https://www.synology.com/security/advisory/Synology_SA_18_61',
'http://www.securityfocus.com/bid/106323',
'https://www.freebsd.org/security/advisories/FreeBSD-EN-19:03.sqlite.asc',
'http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00040.html',
'http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html',
'https://security.gentoo.org/glsa/201904-21',
'https://usn.ubuntu.com/4019-1/',
'https://usn.ubuntu.com/4019-2/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/',
'https://support.apple.com/HT209448',
'https://support.apple.com/HT209447',
'https://support.apple.com/HT209446',
'https://support.apple.com/HT209451',
'https://support.apple.com/HT209443',
'https://support.apple.com/HT209450',
'https://www.oracle.com/security-alerts/cpuapr2020.html',
'https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html',
'https://kc.mcafee.com/corporate/index?page=content&id=SB10365'
],
'reported' => '2018-12-21',
'severity' => 'high'
},
{
'affected_versions' => [
'<1.59_01'
],
'cves' => [
'CVE-2018-8740'
],
'description' => 'In SQLite through 3.22.0, databases whose schema is corrupted using a CREATE TABLE AS statement could cause a NULL pointer dereference, related to build.c and prepare.c.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.59_01'
],
'id' => 'CPANSA-DBD-SQLite-2018-8740',
'references' => [
'https://www.sqlite.org/cgi/src/timeline?r=corrupt-schema',
'https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1756349',
'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6964',
'https://www.sqlite.org/cgi/src/vdiff?from=1774f1c3baf0bc3d&to=d75e67654aa9620b',
'http://www.securityfocus.com/bid/103466',
'https://lists.debian.org/debian-lts-announce/2019/01/msg00009.html',
'http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/',
'https://usn.ubuntu.com/4205-1/',
'https://usn.ubuntu.com/4394-1/',
'https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html',
'https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E',
'https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E'
],
'reported' => '2018-03-17',
'severity' => 'high'
},
{
'affected_versions' => [
'=1.55_06',
'<=1.55_03'
],
'cves' => [
'CVE-2017-10989'
],
'description' => 'The getNodeSize function in ext/rtree/rtree.c in SQLite through 3.19.3, as used in GDAL and other products, mishandles undersized RTree blobs in a crafted database, leading to a heap-based buffer over-read or possibly unspecified other impact.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.55_07'
],
'id' => 'CPANSA-DBD-SQLite-2017-10989',
'references' => [
'https://sqlite.org/src/info/66de6f4a',
'https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1700937',
'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2405',
'https://sqlite.org/src/vpatch?from=0db20efe201736b3&to=66de6f4a9504ec26',
'http://marc.info/?l=sqlite-users&m=149933696214713&w=2',
'http://www.securityfocus.com/bid/99502',
'http://www.securitytracker.com/id/1039427',
'https://support.apple.com/HT208144',
'https://support.apple.com/HT208115',
'https://support.apple.com/HT208113',
'https://support.apple.com/HT208112',
'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html',
'https://lists.debian.org/debian-lts-announce/2019/01/msg00009.html',
'http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html',
'https://usn.ubuntu.com/4019-1/',
'https://usn.ubuntu.com/4019-2/'
],
'reported' => '2017-07-07',
'severity' => 'critical'
},
{
'affected_versions' => [
'<=1.55_01'
],
'cves' => [
'CVE-2016-6153'
],
'description' => 'os_unix.c in SQLite before 3.13.0 improperly implements the temporary directory search algorithm, which might allow local users to obtain sensitive information, cause a denial of service (application crash), or have unspecified other impact by leveraging use of the current working directory for temporary files.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.55_01'
],
'id' => 'CPANSA-DBD-SQLite-2016-6153',
'references' => [
'http://www.openwall.com/lists/oss-security/2016/07/01/1',
'http://www.securityfocus.com/bid/91546',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IGQTH7V45QVHFDXJAEECHEO3HHD644WZ/',
'https://www.korelogic.com/Resources/Advisories/KL-001-2016-003.txt',
'https://www.sqlite.org/releaselog/3_13_0.html',
'http://www.sqlite.org/cgi/src/info/67985761aa93fb61',
'http://www.openwall.com/lists/oss-security/2016/07/01/2',
'http://lists.opensuse.org/opensuse-updates/2016-08/msg00053.html',
'https://www.tenable.com/security/tns-2016-20',
'https://usn.ubuntu.com/4019-1/',
'https://usn.ubuntu.com/4019-2/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/',
'https://github.com/briandfoy/cpan-security-advisory/issues/187',
'https://rt.cpan.org/Public/Bug/Display.html?id=118395'
],
'reported' => '2016-09-26',
'severity' => 'medium'
},
{
'affected_versions' => [
'<=1.47_01'
],
'cves' => [
'CVE-2015-3416'
],
'description' => 'The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.47_02'
],
'id' => 'CPANSA-DBD-SQLite-2015-3416',
'references' => [
'http://www.sqlite.org/src/info/c494171f77dc2e5e04cb6d865e688448f04e5920',
'http://seclists.org/fulldisclosure/2015/Apr/31',
'http://www.debian.org/security/2015/dsa-3252',
'http://www.mandriva.com/security/advisories?name=MDVSA-2015:217',
'http://www.ubuntu.com/usn/USN-2698-1',
'https://support.apple.com/HT205267',
'http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html',
'http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html',
'https://support.apple.com/HT205213',
'http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html',
'http://www.securitytracker.com/id/1033703',
'https://security.gentoo.org/glsa/201507-05',
'http://rhn.redhat.com/errata/RHSA-2015-1635.html',
'http://rhn.redhat.com/errata/RHSA-2015-1634.html',
'http://www.securityfocus.com/bid/74228',
'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'
],
'reported' => '2015-04-24',
'severity' => undef
},
{
'affected_versions' => [
'<=1.47_01'
],
'cves' => [
'CVE-2015-3415'
],
'description' => 'The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.47_02'
],
'id' => 'CPANSA-DBD-SQLite-2015-3415',
'references' => [
'https://www.sqlite.org/src/info/02e3c88fbf6abdcf3975fb0fb71972b0ab30da30',
'http://seclists.org/fulldisclosure/2015/Apr/31',
'http://www.debian.org/security/2015/dsa-3252',
'http://www.mandriva.com/security/advisories?name=MDVSA-2015:217',
'http://www.ubuntu.com/usn/USN-2698-1',
'https://support.apple.com/HT205267',
'http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html',
'http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html',
'https://support.apple.com/HT205213',
'http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html',
'http://www.securitytracker.com/id/1033703',
'https://security.gentoo.org/glsa/201507-05',
'http://rhn.redhat.com/errata/RHSA-2015-1635.html',
'http://www.securityfocus.com/bid/74228',
'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'
],
'reported' => '2015-04-24',
'severity' => undef
},
{
'affected_versions' => [
'<=1.47_01'
],
'cves' => [
'CVE-2015-3414'
],
'description' => 'SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE"""""""" at the end of a SELECT statement.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.47_02'
],
'id' => 'CPANSA-DBD-SQLite-2015-3414',
'references' => [
'https://www.sqlite.org/src/info/eddc05e7bb31fae74daa86e0504a3478b99fa0f2',
'http://seclists.org/fulldisclosure/2015/Apr/31',
'http://www.debian.org/security/2015/dsa-3252',
'http://www.mandriva.com/security/advisories?name=MDVSA-2015:217',
'http://www.ubuntu.com/usn/USN-2698-1',
'https://support.apple.com/HT205267',
'http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html',
'http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html',
'https://support.apple.com/HT205213',
'http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html',
'http://www.securitytracker.com/id/1033703',
'https://security.gentoo.org/glsa/201507-05',
'http://rhn.redhat.com/errata/RHSA-2015-1635.html',
'http://www.securityfocus.com/bid/74228',
'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html'
],
'reported' => '2015-04-24',
'severity' => undef
},
{
'affected_versions' => [
'=1.47_01'
],
'cves' => [
'CVE-2013-7443'
],
'description' => 'Buffer overflow in the skip-scan optimization in SQLite 3.8.2 allows remote attackers to cause a denial of service (crash) via crafted SQL statements.
',
'distribution' => 'DBD-SQLite',
'fixed_versions' => [
'>=1.47_02'
],
'id' => 'CPANSA-DBD-SQLite-2013-7443',
'references' => [
'https://www.sqlite.org/src/info/520070ec7fbaac73eda0e0123596b7bb3e9a6897',
'https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1448758',
'https://www.sqlite.org/src/info/ac5852d6403c9c9628ca0aa7be135c702f000698',
'http://ubuntu.com/usn/usn-2698-1',
'http://www.openwall.com/lists/oss-security/2015/07/14/5',
'http://www.openwall.com/lists/oss-security/2015/07/15/4',
'http://www.securityfocus.com/bid/76089'
],
'reported' => '2015-08-12',
'severity' => undef
}
],
'main_module' => 'DBD::SQLite',
'versions' => [
{
'date' => '2002-02-19T18:56:55',
'version' => '0.05'
},
{
'date' => '2002-02-22T07:29:26',
'version' => '0.06'
},
{
'date' => '2002-02-23T11:19:51',
'version' => '0.07'
},
{
'date' => '2002-02-25T12:59:46',
'version' => '0.08'
},
{
'date' => '2002-02-27T19:46:01',
'version' => '0.09'
},
{
'date' => '2002-02-28T11:11:10',
'version' => '0.10'
},
{
'date' => '2002-03-13T12:16:23',
'version' => '0.11'
},
{
'date' => '2002-03-21T16:49:25',
'version' => '0.12'
},
{
'date' => '2002-03-26T22:39:39',
'version' => '0.13'
},
{
'date' => '2002-03-28T15:59:02',
'version' => '0.14'
},
{
'date' => '2002-04-02T10:48:10',
'version' => '0.15'
},
{
'date' => '2002-06-17T23:50:53',
'version' => '0.16'
},
{
'date' => '2002-06-26T13:59:05',
'version' => '0.17'
},
{
'date' => '2002-07-12T13:46:37',
'version' => '0.18'
},
{
'date' => '2002-08-13T22:19:45',
'version' => '0.19'
},
{
'date' => '2002-10-17T16:25:57',
'version' => '0.20'
},
{
'date' => '2002-10-18T07:08:42',
'version' => '0.21'
},
{
'date' => '2002-12-18T18:02:11',
'version' => '0.22'
},
{
'date' => '2002-12-29T16:25:29',
'version' => '0.23'
},
{
'date' => '2003-01-29T16:47:23',
'version' => '0.24'
},
{
'date' => '2003-03-06T22:24:48',
'version' => '0.25'
},
{
'date' => '2003-07-31T15:16:06',
'version' => '0.26'
},
{
'date' => '2003-08-18T20:17:31',
'version' => '0.27'
},
{
'date' => '2003-08-25T13:42:07',
'version' => '0.28'
},
{
'date' => '2003-12-05T15:42:05',
'version' => '0.29'
},
{
'date' => '2004-02-08T18:45:02',
'version' => '0.30'
},
{
'date' => '2004-02-14T19:18:16',
'version' => '0.31'
},
{
'date' => '2004-07-21T21:19:33',
'version' => '1.00'
},
{
'date' => '2004-08-01T04:49:09',
'version' => '1.01'
},
{
'date' => '2004-08-02T18:35:42',
'version' => '1.02'
},
{
'date' => '2004-08-09T15:43:59',
'version' => '1.03'
},
{
'date' => '2004-08-23T15:14:21',
'version' => '1.04'
},
{
'date' => '2004-09-10T15:46:34',
'version' => '1.05'
},
{
'date' => '2004-09-21T17:26:28',
'version' => '1.06'
},
{
'date' => '2004-10-12T09:07:33',
'version' => '1.07'
},
{
'date' => '2005-02-26T13:47:33',
'version' => '1.08'
},
{
'date' => '2005-06-20T15:42:32',
'version' => '1.09'
},
{
'date' => '2005-12-01T20:56:30',
'version' => '1.10'
},
{
'date' => '2005-12-02T19:13:29',
'version' => '1.11'
},
{
'date' => '2006-04-10T02:24:08',
'version' => '1.12'
},
{
'date' => '2006-09-08T05:02:06',
'version' => '1.13'
},
{
'date' => '2007-09-19T19:25:09',
'version' => '1.14'
},
{
'date' => '2009-03-27T11:11:41',
'version' => '1.19_01'
},
{
'date' => '2009-03-28T16:46:41',
'version' => '1.19_02'
},
{
'date' => '2009-03-30T21:58:59',
'version' => '1.19_03'
},
{
'date' => '2009-03-31T20:31:37',
'version' => '1.19_04'
},
{
'date' => '2009-04-02T04:24:12',
'version' => '1.19_05'
},
{
'date' => '2009-04-03T19:21:54',
'version' => '1.19_06'
},
{
'date' => '2009-04-04T00:49:42',
'version' => '1.19_07'
},
{
'date' => '2009-04-04T04:29:03',
'version' => '1.19_08'
},
{
'date' => '2009-04-05T03:16:37',
'version' => '1.19_09'
},
{
'date' => '2009-04-05T19:43:04',
'version' => '1.19_10'
},
{
'date' => '2009-04-07T14:00:36',
'version' => '1.20'
},
{
'date' => '2009-04-08T01:24:11',
'version' => '1.21'
},
{
'date' => '2009-04-08T02:05:13',
'version' => '1.22_01'
},
{
'date' => '2009-04-08T11:49:36',
'version' => '1.22_02'
},
{
'date' => '2009-04-09T09:40:39',
'version' => '1.22_03'
},
{
'date' => '2009-04-11T01:58:53',
'version' => '1.22_04'
},
{
'date' => '2009-04-14T15:52:05',
'version' => '1.22_05'
},
{
'date' => '2009-04-15T14:59:20',
'version' => '1.22_06'
},
{
'date' => '2009-04-16T05:40:28',
'version' => '1.22_07'
},
{
'date' => '2009-04-17T09:08:15',
'version' => '1.22_08'
},
{
'date' => '2009-04-19T09:53:00',
'version' => '1.23'
},
{
'date' => '2009-04-22T02:14:33',
'version' => '1.24_01'
},
{
'date' => '2009-04-23T00:50:02',
'version' => '1.24_02'
},
{
'date' => '2009-04-23T10:20:49',
'version' => '1.25'
},
{
'date' => '2009-05-05T06:04:00',
'version' => '1.26_01'
},
{
'date' => '2009-06-19T06:56:29',
'version' => '1.26_02'
},
{
'date' => '2009-08-12T06:01:13',
'version' => '1.26_03'
},
{
'date' => '2009-10-06T06:23:40',
'version' => '1.26_04'
},
{
'date' => '2009-10-15T04:05:19',
'version' => '1.26_05'
},
{
'date' => '2009-10-28T11:16:12',
'version' => '1.26_06'
},
{
'date' => '2009-11-16T01:47:37',
'version' => '1.26_07'
},
{
'date' => '2009-11-23T11:15:09',
'version' => '1.27'
},
{
'date' => '2009-12-23T11:44:07',
'version' => '1.28_01'
},
{
'date' => '2010-01-03T05:56:21',
'version' => '1.28_02'
},
{
'date' => '2010-01-08T09:14:18',
'version' => '1.29'
},
{
'date' => '2010-03-10T15:55:37',
'version' => '1.30_01'
},
{
'date' => '2010-03-30T11:45:57',
'version' => '1.30_02'
},
{
'date' => '2010-05-31T03:13:24',
'version' => '1.30_03'
},
{
'date' => '2010-08-25T09:25:41',
'version' => '1.30_04'
},
{
'date' => '2010-08-27T15:31:59',
'version' => '1.30_05'
},
{
'date' => '2010-09-09T01:49:17',
'version' => '1.30_06'
},
{
'date' => '2010-09-15T07:30:11',
'version' => '1.31'
},
{
'date' => '2010-12-10T05:14:51',
'version' => '1.32_01'
},
{
'date' => '2011-03-07T06:57:51',
'version' => '1.32_02'
},
{
'date' => '2011-05-12T05:05:38',
'version' => '1.32_03'
},
{
'date' => '2011-05-20T02:39:29',
'version' => '1.32_04'
},
{
'date' => '2011-05-30T07:39:31',
'version' => '1.33'
},
{
'date' => '2011-09-21T16:26:23',
'version' => '1.34_01'
},
{
'date' => '2011-10-21T06:13:45',
'version' => '1.34_02'
},
{
'date' => '2011-11-01T03:51:19',
'version' => '1.34_03'
},
{
'date' => '2011-11-29T00:16:47',
'version' => '1.35'
},
{
'date' => '2012-01-19T06:15:08',
'version' => '1.36_01'
},
{
'date' => '2012-02-23T04:11:05',
'version' => '1.36_02'
},
{
'date' => '2012-05-07T22:56:21',
'version' => '1.36_03'
},
{
'date' => '2012-05-19T09:46:14',
'version' => '1.36_04'
},
{
'date' => '2012-06-09T14:43:03',
'version' => '1.37'
},
{
'date' => '2012-09-24T10:18:25',
'version' => '1.38_01'
},
{
'date' => '2013-04-09T05:03:21',
'version' => '1.38_02'
},
{
'date' => '2013-05-21T05:14:23',
'version' => '1.38_03'
},
{
'date' => '2013-05-29T07:11:57',
'version' => '1.38_04'
},
{
'date' => '2013-05-31T04:39:53',
'version' => '1.38_05'
},
{
'date' => '2013-06-09T15:10:40',
'version' => '1.39'
},
{
'date' => '2013-07-28T05:31:53',
'version' => '1.40'
},
{
'date' => '2013-08-27T06:41:37',
'version' => '1.41_01'
},
{
'date' => '2013-08-29T18:53:29',
'version' => '1.41_02'
},
{
'date' => '2013-09-04T17:57:50',
'version' => '1.41_03'
},
{
'date' => '2014-01-12T01:19:09',
'version' => '1.41_04'
},
{
'date' => '2014-01-22T03:53:26',
'version' => '1.41_05'
},
{
'date' => '2014-02-12T02:53:38',
'version' => '1.41_06'
},
{
'date' => '2014-03-13T13:44:52',
'version' => '1.41_07'
},
{
'date' => '2014-03-19T15:29:13',
'version' => '1.42'
},
{
'date' => '2014-03-25T18:50:08',
'version' => '1.43_01'
},
{
'date' => '2014-03-25T19:58:13',
'version' => '1.43_02'
},
{
'date' => '2014-06-12T05:01:15',
'version' => '1.43_03'
},
{
'date' => '2014-07-21T01:13:47',
'version' => '1.43_04'
},
{
'date' => '2014-07-21T05:45:41',
'version' => '1.43_05'
},
{
'date' => '2014-07-22T00:31:31',
'version' => '1.43_06'
},
{
'date' => '2014-07-29T17:03:09',
'version' => '1.43_07'
},
{
'date' => '2014-08-21T09:01:11',
'version' => '1.43_08'
},
{
'date' => '2014-10-20T07:50:46',
'version' => '1.43_09'
},
{
'date' => '2014-10-22T14:15:00',
'version' => '1.44'
},
{
'date' => '2014-10-22T15:33:37',
'version' => '1.45_01'
},
{
'date' => '2014-10-23T08:21:27',
'version' => '1.45_02'
},
{
'date' => '2014-10-24T17:57:53',
'version' => '1.45_03'
},
{
'date' => '2014-10-28T08:28:00',
'version' => '1.45_04'
},
{
'date' => '2014-11-25T04:07:43',
'version' => '1.45_05'
},
{
'date' => '2014-11-26T08:52:49',
'version' => '1.45_06'
},
{
'date' => '2014-12-10T06:23:03',
'version' => '1.46'
},
{
'date' => '2015-02-17T07:00:46',
'version' => '1.47_01'
},
{
'date' => '2015-04-16T13:30:38',
'version' => '1.47_02'
},
{
'date' => '2015-04-16T14:45:00',
'version' => '1.47_03'
},
{
'date' => '2015-05-01T17:37:17',
'version' => '1.47_04'
},
{
'date' => '2015-05-08T13:49:32',
'version' => '1.47_05'
},
{
'date' => '2015-06-11T16:10:44',
'version' => '1.48'
},
{
'date' => '2015-08-04T11:18:05',
'version' => '1.49_01'
},
{
'date' => '2015-10-10T03:43:45',
'version' => '1.49_02'
},
{
'date' => '2015-11-05T05:52:27',
'version' => '1.49_03'
},
{
'date' => '2015-11-24T12:59:11',
'version' => '1.49_04'
},
{
'date' => '2016-01-11T13:32:43',
'version' => '1.49_05'
},
{
'date' => '2016-01-15T03:40:44',
'version' => '1.49_06'
},
{
'date' => '2016-01-21T01:11:59',
'version' => '1.49_07'
},
{
'date' => '2016-01-30T00:55:58',
'version' => '1.49_08'
},
{
'date' => '2016-02-10T15:04:42',
'version' => '1.50'
},
{
'date' => '2016-02-20T01:03:50',
'version' => '1.51_01'
},
{
'date' => '2016-02-20T01:49:29',
'version' => '1.51_02'
},
{
'date' => '2016-02-20T11:06:51',
'version' => '1.51_03'
},
{
'date' => '2016-03-07T04:33:35',
'version' => '1.51_04'
},
{
'date' => '2016-06-23T01:22:57',
'version' => '1.51_05'
},
{
'date' => '2016-10-15T00:21:14',
'version' => '1.51_06'
},
{
'date' => '2016-10-16T05:16:29',
'version' => '1.51_07'
},
{
'date' => '2016-11-15T13:02:35',
'version' => '1.52'
},
{
'date' => '2016-11-26T01:34:30',
'version' => '1.53_01'
},
{
'date' => '2016-12-24T02:36:45',
'version' => '1.54'
},
{
'date' => '2017-01-03T15:42:47',
'version' => '1.55_01'
},
{
'date' => '2017-01-07T16:49:21',
'version' => '1.55_02'
},
{
'date' => '2017-02-14T01:31:43',
'version' => '1.55_03'
},
{
'date' => '2017-11-21T17:07:32',
'version' => '1.55_04'
},
{
'date' => '2017-12-15T18:52:29',
'version' => '1.55_05'
},
{
'date' => '2018-01-27T07:33:51',
'version' => '1.55_06'
},
{
'date' => '2018-01-27T07:42:58',
'version' => '1.55_07'
},
{
'date' => '2018-02-28T09:01:25',
'version' => '1.56'
},
{
'date' => '2018-03-21T06:45:29',
'version' => '1.57_01'
},
{
'date' => '2018-03-28T11:56:19',
'version' => '1.58'
},
{
'date' => '2018-09-16T19:25:50',
'version' => '1.59_01'
},
{
'date' => '2018-09-30T06:09:34',
'version' => '1.59_02'
},
{
'date' => '2018-11-03T12:14:20',
'version' => '1.59_03'
},
{
'date' => '2018-12-01T02:42:29',
'version' => '1.60'
},
{
'date' => '2018-12-01T08:01:30',
'version' => '1.61_01'
},
{
'date' => '2018-12-01T09:10:18',
'version' => '1.61_02'
},
{
'date' => '2018-12-19T13:03:22',
'version' => '1.61_03'
},
{
'date' => '2018-12-22T06:37:21',
'version' => '1.61_04'
},
{
'date' => '2018-12-28T17:59:27',
'version' => '1.62'
},
{
'date' => '2019-01-25T22:31:45',
'version' => '1.63_01'
},
{
'date' => '2019-02-13T19:09:44',
'version' => '1.63_02'
},
{
'date' => '2019-02-14T16:56:40',
'version' => '1.63_03'
},
{
'date' => '2019-05-24T16:39:18',
'version' => '1.63_04'
},
{
'date' => '2019-07-11T17:50:51',
'version' => '1.63_05'
},
{
'date' => '2019-08-12T09:02:59',
'version' => '1.64'
},
{
'date' => '2020-01-18T01:56:18',
'version' => '1.65_01'
},
{
'date' => '2020-02-08T13:02:59',
'version' => '1.65_02'
},
{
'date' => '2020-07-26T16:42:08',
'version' => '1.65_03'
},
{
'date' => '2020-08-30T02:14:15',
'version' => '1.66'
},
{
'date' => '2020-11-24T12:57:56',
'version' => '1.67_01'
},
{
'date' => '2020-12-05T17:06:24',
'version' => '1.67_02'
},
{
'date' => '2021-03-30T21:37:13',
'version' => '1.67_03'
},
{
'date' => '2021-05-30T22:56:01',
'version' => '1.67_04'
},
{
'date' => '2021-06-12T23:39:11',
'version' => '1.67_05'
},
{
'date' => '2021-06-14T03:49:54',
'version' => '1.67_06'
},
{
'date' => '2021-06-19T00:57:41',
'version' => '1.67_07'
},
{
'date' => '2021-07-22T05:30:17',
'version' => '1.68'
},
{
'date' => '2021-07-29T21:09:19',
'version' => '1.69_01'
},
{
'date' => '2021-07-30T14:21:39',
'version' => '1.69_02'
},
{
'date' => '2021-08-01T10:20:33',
'version' => '1.70'
},
{
'date' => '2021-12-01T17:03:29',
'version' => '1.71_01'
},
{
'date' => '2022-01-06T20:51:05',
'version' => '1.71_02'
},
{
'date' => '2022-02-23T10:49:28',
'version' => '1.71_03'
},
{
'date' => '2022-02-26T00:59:40',
'version' => '1.71_04'
},
{
'date' => '2022-02-26T02:49:09',
'version' => '1.71_05'
},
{
'date' => '2022-03-12T02:54:15',
'version' => '1.71_06'
},
{
'date' => '2022-10-25T18:36:30',
'version' => '1.71_07'
},
{
'date' => '2022-11-03T16:28:17',
'version' => '1.72'
},
{
'date' => '2023-07-09T01:04:52',
'version' => '1.73_01'
},
{
'date' => '2023-09-19T17:26:03',
'version' => '1.74'
},
{
'date' => '2024-09-17T14:05:40',
'version' => '1.75_01'
},
{
'date' => '2024-10-19T04:47:07',
'version' => '1.76'
}
]
},
'DBD-mysql' => {
'advisories' => [
{
'affected_versions' => [
'<4.044'
],
'cves' => [
'CVE-2017-10788'
],
'description' => 'The DBD::mysql module through 4.043 for Perl allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by triggering (1) certain error responses from a MySQL server or (2) a loss of a network connection to a MySQL server. The use-after-free defect was introduced by relying on incorrect Oracle mysql_stmt_close documentation and code examples.
',
'distribution' => 'DBD-mysql',
'fixed_versions' => [
'>=4.044'
],
'id' => 'CPANSA-DBD-mysql-2017-02',
'references' => [
'https://github.com/perl5-dbi/DBD-mysql/issues/120',
'http://www.securityfocus.com/bid/99374',
'http://seclists.org/oss-sec/2017/q2/443'
],
'reported' => '2017-04-13'
},
{
'affected_versions' => [
'<4.044'
],
'cves' => [
'CVE-2017-10789'
],
'description' => 'The DBD::mysql module through 4.043 for Perl uses the mysql_ssl=1 setting to mean that SSL is optional (even though this setting\'s documentation has a "your communication with the server will be encrypted" statement), which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152.
',
'distribution' => 'DBD-mysql',
'fixed_versions' => [
'>=4.044'
],
'id' => 'CPANSA-DBD-mysql-2017-01',
'references' => [
'https://github.com/perl5-dbi/DBD-mysql/pull/114'
],
'reported' => '2017-03-23'
},
{
'affected_versions' => [
'>=2.9003,<4.039'
],
'cves' => [
'CVE-2016-1249'
],
'description' => 'Out-of-bounds read.
',
'distribution' => 'DBD-mysql',
'fixed_versions' => [
'<2.9003,>=4.039'
],
'id' => 'CPANSA-DBD-mysql-2016-03',
'references' => [
'https://github.com/perl5-dbi/DBD-mysql/commit/793b72b1a0baa5070adacaac0e12fd995a6fbabe'
],
'reported' => '2016-11-16'
},
{
'affected_versions' => [
'<4.037'
],
'cves' => [
'CVE-2016-1246'
],
'description' => 'Buffer overflow in the DBD::mysql module before 4.037 for Perl allows context-dependent attackers to cause a denial of service (crash) via vectors related to an error message.
',
'distribution' => 'DBD-mysql',
'fixed_versions' => [
'>=4.037'
],
'id' => 'CPANSA-DBD-mysql-2016-02',
'references' => [
'https://github.com/perl5-dbi/DBD-mysql/commit/7c164a0c86cec6ee95df1d141e67b0e85dfdefd2',
'http://blogs.perl.org/users/mike_b/2016/10/security-release---buffer-overflow-in-dbdmysql-perl-library.html'
],
'reported' => '2016-10-02'
},
{
'affected_versions' => [
'<4.034'
],
'cves' => [
'CVE-2015-8949'
],
'description' => 'Use-after-free vulnerability in the my_login function in DBD::mysql before 4.033_01 allows attackers to have unspecified impact by leveraging a call to mysql_errno after a failure of my_login.
',
'distribution' => 'DBD-mysql',
'fixed_versions' => [
'>=4.034'
],
'id' => 'CPANSA-DBD-mysql-2016-01',
'references' => [
'https://github.com/perl5-dbi/DBD-mysql/commit/cf0aa7751f6ef8445e9310a64b14dc81460ca156'
],
'reported' => '2016-08-19'
},
{
'affected_versions' => [
'<4.041'
],
'cves' => [
'CVE-2016-1251'
],
'description' => 'There is a vulnerability of type use-after-free affecting DBD::mysql (aka DBD-mysql or the Database Interface (DBI) MySQL driver for Perl) 3.x and 4.x before 4.041 when used with mysql_server_prepare=1.
',
'distribution' => 'DBD-mysql',
'fixed_versions' => [
'>=4.041'
],
'id' => 'CPANSA-DBD-mysql-2015-01',
'references' => [
'https://github.com/perl5-dbi/DBD-mysql/commit/3619c170461a3107a258d1fd2d00ed4832adb1b1'
],
'reported' => '2015-12-27'
},
{
'affected_versions' => [
'<4.028'
],
'cves' => [
'CVE-2014-9906'
],
'description' => 'Use-after-free vulnerability in DBD::mysql before 4.029 allows attackers to cause a denial of service (program crash) or possibly execute arbitrary code via vectors related to a lost server connection.
',
'distribution' => 'DBD-mysql',
'fixed_versions' => [
'>=4.028'
],
'id' => 'CPANSA-DBD-mysql-2014-01',
'references' => [
'https://github.com/perl5-dbi/DBD-mysql/commit/a56ae87a4c1c1fead7d09c3653905841ccccf1cc',
'https://rt.cpan.org/Public/Bug/Display.html?id=97625'
],
'reported' => '2014-07-30'
}
],
'main_module' => 'DBD::mysql',
'versions' => [
{
'date' => '2000-04-15T20:17:36',
'version' => 'v1.2212.'
},
{
'date' => '2001-05-06T21:47:46',
'version' => '2.0900'
},
{
'date' => '2001-05-25T21:24:45',
'version' => '2.0901'
},
{
'date' => '2001-07-09T21:10:17',
'version' => '2.0902'
},
{
'date' => '2001-10-28T22:53:19',
'version' => '2.0903'
},
{
'date' => '2001-10-31T04:01:07',
'version' => '2.1000'
},
{
'date' => '2001-11-04T17:55:04',
'version' => '2.1001'
},
{
'date' => '2001-11-04T18:22:30',
'version' => '2.1002'
},
{
'date' => '2001-11-05T20:14:34',
'version' => '2.1003'
},
{
'date' => '2001-11-13T01:24:26',
'version' => '2.1004'
},
{
'date' => '2001-12-13T09:07:53',
'version' => '2.1005'
},
{
'date' => '2001-12-27T18:10:04',
'version' => '2.1007'
},
{
'date' => '2001-12-27T18:10:21',
'version' => '2.1006'
},
{
'date' => '2001-12-28T17:06:05',
'version' => '2.1008'
},
{
'date' => '2002-01-01T20:02:26',
'version' => '2.1009'
},
{
'date' => '2002-01-07T21:33:21',
'version' => '2.1010'
},
{
'date' => '2002-02-12T11:09:53',
'version' => '2.1011'
},
{
'date' => '2002-04-12T07:21:06',
'version' => '2.1012'
},
{
'date' => '2002-04-15T07:49:36',
'version' => '2.1013'
},
{
'date' => '2002-04-17T21:24:26',
'version' => '2.1014'
},
{
'date' => '2002-04-29T20:53:41',
'version' => '2.1015'
},
{
'date' => '2002-05-01T20:07:05',
'version' => '2.1016'
},
{
'date' => '2002-05-02T20:59:04',
'version' => '2.1017'
},
{
'date' => '2002-08-13T17:52:25',
'version' => '2.1018'
},
{
'date' => '2002-09-16T18:42:20',
'version' => '2.1019'
},
{
'date' => '2002-09-23T20:42:50',
'version' => '2.1020'
},
{
'date' => '2002-12-17T20:46:14',
'version' => '2.1021'
},
{
'date' => '2003-01-03T02:46:24',
'version' => '2.1022'
},
{
'date' => '2003-01-19T21:19:03',
'version' => '2.1023'
},
{
'date' => '2003-01-20T12:08:27',
'version' => '2.1024'
},
{
'date' => '2003-02-07T21:09:44',
'version' => '2.1025'
},
{
'date' => '2003-03-03T20:46:27',
'version' => '2.1026'
},
{
'date' => '2003-05-31T18:08:15',
'version' => '2.1027'
},
{
'date' => '2003-06-25T16:12:36',
'version' => '2.1028'
},
{
'date' => '2003-06-27T04:32:05',
'version' => '2.9002'
},
{
'date' => '2003-09-12T17:04:42',
'version' => '2.9003_1'
},
{
'date' => '2003-10-27T03:39:04',
'version' => '2.9003'
},
{
'date' => '2004-07-01T03:24:14',
'version' => '2.9004_2'
},
{
'date' => '2004-07-14T03:07:34',
'version' => '2.9004'
},
{
'date' => '2004-10-20T17:27:25',
'version' => '2.9005_1'
},
{
'date' => '2004-10-28T00:39:25',
'version' => '2.9005_3'
},
{
'date' => '2005-03-29T02:43:14',
'version' => '2.9005'
},
{
'date' => '2005-04-04T04:27:00',
'version' => '2.9006'
},
{
'date' => '2005-04-27T00:13:49',
'version' => '2.9015_3'
},
{
'date' => '2005-04-27T00:14:06',
'version' => '2.9007'
},
{
'date' => '2005-06-06T01:39:20',
'version' => '2.9008'
},
{
'date' => '2005-07-01T01:48:20',
'version' => '3.0000'
},
{
'date' => '2005-07-03T21:56:11',
'version' => '3.0000_0'
},
{
'date' => '2005-07-04T15:53:40',
'version' => '3.0001_0'
},
{
'date' => '2005-07-04T16:16:00',
'version' => '3.0001_1'
},
{
'date' => '2005-07-07T01:14:17',
'version' => '3.0001'
},
{
'date' => '2005-07-07T01:22:39',
'version' => '3.0001_2'
},
{
'date' => '2005-07-08T05:37:13',
'version' => '3.0001_3'
},
{
'date' => '2005-07-11T16:49:47',
'version' => '3.0002'
},
{
'date' => '2005-08-04T02:50:35',
'version' => '3.0002_1'
},
{
'date' => '2005-09-26T23:22:57',
'version' => '3.0002_2'
},
{
'date' => '2005-09-28T18:58:55',
'version' => '3.0002_3'
},
{
'date' => '2005-11-06T21:47:29',
'version' => '3.0002_4'
},
{
'date' => '2006-02-01T23:20:01',
'version' => '3.0002_5'
},
{
'date' => '2006-05-04T17:49:06',
'version' => '3.0003'
},
{
'date' => '2006-05-04T17:49:23',
'version' => '3.0003_1'
},
{
'date' => '2006-05-21T17:28:22',
'version' => '3.0004'
},
{
'date' => '2006-05-21T17:28:33',
'version' => '3.0004_1'
},
{
'date' => '2006-06-10T01:21:49',
'version' => '3.0005_1'
},
{
'date' => '2006-06-10T01:22:01',
'version' => '3.0005'
},
{
'date' => '2006-06-11T17:05:25',
'version' => '3.0006'
},
{
'date' => '2006-06-11T17:05:36',
'version' => '3.0006_1'
},
{
'date' => '2006-09-08T23:12:02',
'version' => '3.0007'
},
{
'date' => '2006-09-08T23:13:45',
'version' => '3.0007_1'
},
{
'date' => '2006-10-07T12:59:23',
'version' => '3.0007_2'
},
{
'date' => '2006-10-16T13:42:13',
'version' => '3.0008'
},
{
'date' => '2006-10-16T13:42:24',
'version' => '3.0008_1'
},
{
'date' => '2006-12-24T14:11:04',
'version' => '4.00'
},
{
'date' => '2007-01-08T01:11:12',
'version' => '4.001'
},
{
'date' => '2007-03-02T03:32:59',
'version' => '4.002'
},
{
'date' => '2007-03-02T14:13:37',
'version' => '4.003'
},
{
'date' => '2007-03-22T22:31:22',
'version' => '4.004'
},
{
'date' => '2007-06-08T15:33:34',
'version' => '4.005'
},
{
'date' => '2007-12-26T22:50:48',
'version' => '4.006'
},
{
'date' => '2008-05-11T15:56:07',
'version' => '4.007'
},
{
'date' => '2008-08-15T14:06:50',
'version' => '4.008'
},
{
'date' => '2008-10-22T01:05:54',
'version' => '4.009'
},
{
'date' => '2008-10-24T14:00:41',
'version' => '4.010'
},
{
'date' => '2009-04-14T02:40:31',
'version' => '4.011'
},
{
'date' => '2009-06-19T02:08:06',
'version' => '4.012'
},
{
'date' => '2009-09-16T18:37:29',
'version' => '4.013'
},
{
'date' => '2010-04-15T03:17:58',
'version' => '4.014'
},
{
'date' => '2010-07-09T19:48:58',
'version' => '4.015'
},
{
'date' => '2010-07-10T16:50:49',
'version' => '4.016'
},
{
'date' => '2010-08-12T05:50:17',
'version' => '4.017'
},
{
'date' => '2010-10-26T16:59:27',
'version' => '4.018'
},
{
'date' => '2011-05-09T01:28:25',
'version' => '4.019'
},
{
'date' => '2011-08-20T18:45:49',
'version' => '4.020'
},
{
'date' => '2012-04-28T14:18:16',
'version' => '4.021'
},
{
'date' => '2012-08-30T02:00:19',
'version' => '4.022'
},
{
'date' => '2013-04-12T21:48:10',
'version' => '4.023'
},
{
'date' => '2013-09-17T16:04:11',
'version' => '4.024'
},
{
'date' => '2013-11-04T18:29:18',
'version' => '4.025'
},
{
'date' => '2014-01-16T01:33:03',
'version' => '4.026'
},
{
'date' => '2014-03-19T14:25:36',
'version' => '4.027'
},
{
'date' => '2014-08-01T19:59:28',
'version' => '4.028'
},
{
'date' => '2014-12-09T02:39:44',
'version' => '4.029'
},
{
'date' => '2015-01-28T03:53:42',
'version' => '4.030_01'
},
{
'date' => '2015-03-02T20:44:31',
'version' => '4.030_02'
},
{
'date' => '2015-03-06T20:12:05',
'version' => '4.031'
},
{
'date' => '2015-04-16T22:28:43',
'version' => '4.032_01'
},
{
'date' => '2015-07-21T12:15:24',
'version' => '4.032'
},
{
'date' => '2015-10-25T19:59:17',
'version' => '4.032_03'
},
{
'date' => '2015-10-27T03:37:29',
'version' => '4.033'
},
{
'date' => '2015-12-15T07:16:36',
'version' => '4.033_01'
},
{
'date' => '2015-12-18T07:00:41',
'version' => '4.033_02'
},
{
'date' => '2016-07-04T19:32:50',
'version' => '4.033_03'
},
{
'date' => '2016-07-06T06:32:05',
'version' => '4.034'
},
{
'date' => '2016-07-09T05:50:13',
'version' => '4.035'
},
{
'date' => '2016-08-01T06:29:25',
'version' => '4.035_01'
},
{
'date' => '2016-08-11T08:11:18',
'version' => '4.035_02'
},
{
'date' => '2016-08-19T15:52:10',
'version' => '4.035_03'
},
{
'date' => '2016-08-23T05:59:26',
'version' => '4.036'
},
{
'date' => '2016-10-03T07:00:29',
'version' => '4.037'
},
{
'date' => '2016-10-14T20:56:49',
'version' => '4.037_01'
},
{
'date' => '2016-10-19T19:37:55',
'version' => '4.037_02'
},
{
'date' => '2016-10-20T02:33:04',
'version' => '4.038'
},
{
'date' => '2016-10-30T08:45:31',
'version' => '4.038_01'
},
{
'date' => '2016-11-16T03:57:57',
'version' => '4.039'
},
{
'date' => '2016-11-19T19:56:51',
'version' => '4.040'
},
{
'date' => '2016-11-28T20:40:41',
'version' => '4.041'
},
{
'date' => '2016-12-13T06:59:09',
'version' => '4.041_01'
},
{
'date' => '2017-02-28T20:57:20',
'version' => '4.041_02'
},
{
'date' => '2017-03-08T20:32:52',
'version' => '4.042'
},
{
'date' => '2017-06-29T21:12:09',
'version' => '4.043'
},
{
'date' => '2018-01-23T01:53:30',
'version' => '4.044'
},
{
'date' => '2018-02-07T21:43:00',
'version' => '4.044'
},
{
'date' => '2018-02-08T20:30:55',
'version' => '4.045'
},
{
'date' => '2018-02-08T20:48:11',
'version' => '4.046'
},
{
'date' => '2018-03-09T20:27:44',
'version' => '4.046_01'
},
{
'date' => '2018-09-09T03:02:20',
'version' => '4.047'
},
{
'date' => '2018-09-15T12:46:51',
'version' => '4.048'
},
{
'date' => '2018-11-17T18:58:09',
'version' => '4.049'
},
{
'date' => '2019-01-09T09:07:15',
'version' => '4.050'
},
{
'date' => '2019-10-07T10:06:13',
'version' => '4.018_01'
},
{
'date' => '2023-10-04T07:10:45',
'version' => '4.051'
},
{
'date' => '2023-10-04T07:20:03',
'version' => '5.001'
},
{
'date' => '2023-10-24T09:02:42',
'version' => '5.002'
},
{
'date' => '2023-12-01T07:13:15',
'version' => '4.052'
},
{
'date' => '2023-12-01T07:14:42',
'version' => '5.003'
},
{
'date' => '2024-03-19T08:16:14',
'version' => '5.004'
},
{
'date' => '2024-05-01T09:04:33',
'version' => '5.005'
},
{
'date' => '2024-06-04T19:59:44',
'version' => '5.006'
},
{
'date' => '2024-07-01T06:02:18',
'version' => '5.007'
},
{
'date' => '2024-07-30T07:47:38',
'version' => '5.008'
},
{
'date' => '2024-09-19T08:35:24',
'version' => '5.009'
},
{
'date' => '2024-11-11T06:43:01',
'version' => '5.010'
},
{
'date' => '2025-01-06T06:52:30',
'version' => '4.053'
},
{
'date' => '2025-01-06T06:55:27',
'version' => '5.011'
}
]
},
'DBD-mysqlPP' => {
'advisories' => [
{
'affected_versions' => [
'<0.93'
],
'cves' => [],
'description' => 'SQL injection.
',
'distribution' => 'DBD-mysqlPP',
'fixed_versions' => [
'>=0.03'
],
'id' => 'CPANSA-DBD-mysqlPP-2011-01',
'references' => [
'https://metacpan.org/changes/distribution/DBD-mysqlPP',
'https://jvn.jp/en/jp/JVN51216285/index.html'
],
'reported' => '2011-10-14',
'severity' => 'high'
}
],
'main_module' => 'DBD::mysqlPP',
'versions' => [
{
'date' => '2002-04-04T07:20:36',
'version' => '0.02'
},
{
'date' => '2002-04-15T10:26:39',
'version' => '0.03'
},
{
'date' => '2003-01-24T11:14:14',
'version' => '0.04'
},
{
'date' => '2011-10-21T23:07:07',
'version' => '0.05'
},
{
'date' => '2011-10-26T22:17:22',
'version' => '0.06'
},
{
'date' => '2011-11-17T22:24:50',
'version' => '0.07'
}
]
},
'DBI' => {
'advisories' => [
{
'affected_versions' => [
'<1.643'
],
'cves' => [
'CVE-2020-14393'
],
'description' => 'A buffer overflow was found in perl-DBI < 1.643 in DBI.xs. A local attacker who is able to supply a string longer than 300 characters could cause an out-of-bounds write, affecting the availability of the service or integrity of data.
',
'distribution' => 'DBI',
'fixed_versions' => [
'>=1.643'
],
'id' => 'CPANSA-DBI-2020-01',
'references' => [
'https://metacpan.org/changes/distribution/DBI',
'https://bugzilla.redhat.com/show_bug.cgi?id=1877409'
],
'reported' => '2020-09-16',
'severity' => 'high'
},
{
'affected_versions' => [
'<1.643'
],
'cves' => [
'CVE-2020-14392'
],
'description' => 'An untrusted pointer dereference flaw was found in Perl-DBI < 1.643. A local attacker who is able to manipulate calls to dbd_db_login6_sv() could cause memory corruption, affecting the service\'s availability.
',
'distribution' => 'DBI',
'fixed_versions' => [
'>=1.643'
],
'id' => 'CPANSA-DBI-2020-03',
'references' => [
'https://metacpan.org/changes/distribution/DBI',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXLKODJ7B57GITDEZZXNSHPK4VBYXYHR/',
'https://bugzilla.redhat.com/show_bug.cgi?id=1877402',
'https://bugzilla.redhat.com/show_bug.cgi?id=1877402',
'https://lists.debian.org/debian-lts-announce/2020/09/msg00026.html',
'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00067.html',
'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00074.html',
'https://usn.ubuntu.com/4503-1/'
],
'reported' => '2020-06-17',
'severity' => 'high'
},
{
'affected_versions' => [
'<1.643'
],
'cves' => [
'CVE-2019-20919'
],
'description' => 'An issue was discovered in the DBI module before 1.643 for Perl. The hv_fetch() documentation requires checking for NULL and the code does that. But, shortly thereafter, it calls SvOK(profile), causing a NULL pointer dereference.
',
'distribution' => 'DBI',
'fixed_versions' => [
'>=1.643'
],
'id' => 'CPANSA-DBI-2020-02',
'references' => [
'https://metacpan.org/changes/distribution/DBI',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXLKODJ7B57GITDEZZXNSHPK4VBYXYHR/',
'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20919',
'https://github.com/perl5-dbi/dbi/commit/eca7d7c8f43d96f6277e86d1000e842eb4cc67ff',
'https://bugzilla.redhat.com/show_bug.cgi?id=1877405',
'https://lists.debian.org/debian-lts-announce/2020/09/msg00026.html',
'https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/US6VXPKVAYHOKNFSAFLM3FWNYZSJKQHS/',
'https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KJN7E27GD6QQ2CRGEJ3TNW2DJFXA2AKN/',
'https://ubuntu.com/security/notices/USN-4534-1'
],
'reported' => '2020-09-17',
'severity' => 'high'
},
{
'affected_versions' => [
'<1.632'
],
'cves' => [],
'description' => 'DBD::File drivers open files from folders other than specifically passed using the f_dir attribute.
',
'distribution' => 'DBI',
'fixed_versions' => [
'>=1.632'
],
'id' => 'CPANSA-DBI-2014-01',
'references' => [
'https://metacpan.org/changes/distribution/DBI',
'https://rt.cpan.org/Public/Bug/Display.html?id=99508'
],
'reported' => '2014-10-15',
'severity' => 'high'
},
{
'affected_versions' => [
'<1.47'
],
'cves' => [
'CVE-2005-0077'
],
'description' => 'Allows local users to overwrite arbitrary files via a symlink attack on a temporary PID file.
',
'distribution' => 'DBI',
'fixed_versions' => [
'>=1.47'
],
'id' => 'CPANSA-DBI-2005-01',
'references' => [
'https://metacpan.org/changes/distribution/DBI'
],
'reported' => '2005-05-02'
},
{
'affected_versions' => [
'<1.643'
],
'cves' => [
'CVE-2014-10402'
],
'description' => 'An issue was discovered in the DBI module through 1.643 for Perl. DBD::File drivers can open files from folders other than those specifically passed via the f_dir attribute in the data source name (DSN). NOTE: this issue exists because of an incomplete fix for CVE-2014-10401.
',
'distribution' => 'DBI',
'fixed_versions' => [
'>=1.644'
],
'id' => 'CPANSA-DBI-2014-10402',
'references' => [
'https://rt.cpan.org/Public/Bug/Display.html?id=99508#txn-1911590',
'https://metacpan.org/release/HMBRAND/DBI-1.643_01/view/Changes'
],
'reported' => '2020-09-16',
'severity' => 'medium'
},
{
'affected_versions' => [
'<1.632'
],
'cves' => [
'CVE-2014-10401'
],
'description' => 'An issue was discovered in the DBI module before 1.632 for Perl. DBD::File drivers can open files from folders other than those specifically passed via the f_dir attribute.
',
'distribution' => 'DBI',
'fixed_versions' => [
'>=1.644'
],
'id' => 'CPANSA-DBI-2014-10401',
'references' => [
'https://rt.cpan.org/Public/Bug/Display.html?id=99508',
'https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.632-9th-Nov-2014',
'https://github.com/perl5-dbi/dbi/commit/caedc0d7d602f5b2ae5efc1b00f39efeafb7b05a',
'https://usn.ubuntu.com/4509-1/',
'https://metacpan.org/release/HMBRAND/DBI-1.643_01/view/Changes'
],
'reported' => '2020-09-11',
'severity' => 'medium'
},
{
'affected_versions' => [
'<1.628'
],
'cves' => [
'CVE-2013-7491'
],
'description' => 'An issue was discovered in the DBI module before 1.628 for Perl. Stack corruption occurs when a user-defined function requires a non-trivial amount of memory and the Perl stack gets reallocated.
',
'distribution' => 'DBI',
'fixed_versions' => [],
'id' => 'CPANSA-DBI-2013-7491',
'references' => [
'https://github.com/perl5-dbi/dbi/commit/401f1221311c71f760e21c98772f0f7e3cbead1d',
'https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.628-22nd-July-2013',
'https://rt.cpan.org/Public/Bug/Display.html?id=85562'
],
'reported' => '2020-09-11',
'severity' => 'medium'
},
{
'affected_versions' => [
'<1.632'
],
'cves' => [
'CVE-2013-7490'
],
'description' => 'An issue was discovered in the DBI module before 1.632 for Perl. Using many arguments to methods for Callbacks may lead to memory corruption.
',
'distribution' => 'DBI',
'fixed_versions' => [],
'id' => 'CPANSA-DBI-2013-7490',
'references' => [
'https://github.com/perl5-dbi/dbi/commit/a8b98e988d6ea2946f5f56691d6d5ead53f65766',
'https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.632-9th-Nov-2014',
'https://rt.cpan.org/Public/Bug/Display.html?id=86744#txn-1880941',
'https://usn.ubuntu.com/4509-1/'
],
'reported' => '2020-09-11',
'severity' => 'medium'
}
],
'main_module' => 'DBI',
'versions' => [
{
'date' => '1995-10-27T08:14:00',
'version' => '0.64'
},
{
'date' => '1996-02-15T22:07:00',
'version' => '0.67'
},
{
'date' => '1996-04-22T10:22:00',
'version' => '0.68'
},
{
'date' => '1996-05-07T19:46:00',
'version' => '0.69'
},
{
'date' => '1996-06-16T21:08:00',
'version' => '0.70'
},
{
'date' => '1996-07-10T00:49:00',
'version' => '0.71'
},
{
'date' => '1996-09-23T16:33:00',
'version' => '0.72'
},
{
'date' => '1996-10-15T00:58:00',
'version' => '0.73'
},
{
'date' => '1997-01-14T16:59:00',
'version' => '0.74'
},
{
'date' => '1997-01-27T21:59:00',
'version' => '0.75'
},
{
'date' => '1997-02-03T18:54:00',
'version' => '0.76'
},
{
'date' => '1997-02-21T14:27:00',
'version' => '0.77'
},
{
'date' => '1997-03-28T14:36:00',
'version' => '0.78'
},
{
'date' => '1997-04-07T18:28:00',
'version' => '0.79'
},
{
'date' => '1997-05-07T11:45:00',
'version' => '0.80'
},
{
'date' => '1997-05-07T14:05:00',
'version' => '0.81'
},
{
'date' => '1997-05-23T15:56:00',
'version' => '0.82'
},
{
'date' => '1997-06-11T21:40:00',
'version' => '0.83'
},
{
'date' => '1997-06-20T15:36:00',
'version' => '0.84'
},
{
'date' => '1997-06-25T10:25:00',
'version' => '0.85'
},
{
'date' => '1997-07-16T16:38:00',
'version' => '0.001'
},
{
'date' => '1997-07-18T11:27:00',
'version' => '0.87'
},
{
'date' => '1997-07-22T21:27:00',
'version' => '0.88'
},
{
'date' => '1997-07-25T13:46:55',
'version' => '0.89'
},
{
'date' => '1997-09-05T19:38:52',
'version' => '0.90'
},
{
'date' => '1997-12-10T17:15:14',
'version' => '0.91'
},
{
'date' => '1998-02-05T20:45:45',
'version' => '0.92'
},
{
'date' => '1998-02-13T15:21:52',
'version' => '0.93'
},
{
'date' => '1998-08-10T03:23:46',
'version' => '0.94'
},
{
'date' => '1998-08-11T13:21:19',
'version' => '0.95'
},
{
'date' => '1998-08-14T20:38:42',
'version' => '1.00'
},
{
'date' => '1998-09-02T14:59:47',
'version' => '1.01'
},
{
'date' => '1998-09-04T12:29:52',
'version' => '1.02'
},
{
'date' => '1999-01-18T21:52:15',
'version' => '1.06'
},
{
'date' => '1999-05-13T01:49:11',
'version' => '1.08'
},
{
'date' => '1999-06-02T13:44:40',
'version' => '1.08'
},
{
'date' => '1999-06-09T20:57:59',
'version' => '1.09'
},
{
'date' => '1999-06-13T23:52:03',
'version' => '1.10'
},
{
'date' => '1999-06-17T13:22:36',
'version' => '1.11'
},
{
'date' => '1999-06-29T23:07:41',
'version' => '1.12'
},
{
'date' => '1999-07-12T03:28:41',
'version' => '1.13'
},
{
'date' => '2000-06-11T02:39:59',
'version' => '1.03_80'
},
{
'date' => '2000-06-14T20:30:57',
'version' => '1.14'
},
{
'date' => '2001-03-30T15:03:31',
'version' => '1.15'
},
{
'date' => '2001-05-29T23:25:57',
'version' => '1.16'
},
{
'date' => '2001-06-04T17:12:30',
'version' => '1.17'
},
{
'date' => '2001-06-04T19:00:37',
'version' => '1.18'
},
{
'date' => '2001-07-20T22:29:24',
'version' => '1.19'
},
{
'date' => '2001-08-24T23:32:10',
'version' => '1.20'
},
{
'date' => '2002-01-10T15:25:45',
'version' => '1.201'
},
{
'date' => '2002-02-07T03:30:16',
'version' => '1.21'
},
{
'date' => '2002-03-13T14:18:00',
'version' => '1.21'
},
{
'date' => '2002-05-22T13:42:15',
'version' => '1.22'
},
{
'date' => '2002-05-25T17:38:03',
'version' => '1.23'
},
{
'date' => '2002-06-05T03:32:38',
'version' => '1.24'
},
{
'date' => '2002-06-05T22:42:04',
'version' => '1.25'
},
{
'date' => '2002-06-13T12:30:47',
'version' => '1.26'
},
{
'date' => '2002-06-13T15:19:06',
'version' => '1.27'
},
{
'date' => '2002-06-14T13:13:53',
'version' => '1.28'
},
{
'date' => '2002-06-26T09:34:24',
'version' => '1.28'
},
{
'date' => '2002-07-15T11:24:40',
'version' => '1.29'
},
{
'date' => '2002-07-18T14:27:25',
'version' => '1.30'
},
{
'date' => '2002-11-30T00:49:54',
'version' => '1.31'
},
{
'date' => '2002-12-01T23:01:26',
'version' => '1.32'
},
{
'date' => '2002-12-20T16:23:29',
'version' => '1.32'
},
{
'date' => '2003-02-26T18:01:24',
'version' => '1.32_90'
},
{
'date' => '2003-02-27T00:25:32',
'version' => '1.33'
},
{
'date' => '2003-02-28T17:53:35',
'version' => '1.34'
},
{
'date' => '2003-03-07T22:02:20',
'version' => '1.35'
},
{
'date' => '2003-05-14T11:13:39',
'version' => '1.36'
},
{
'date' => '2003-05-15T18:02:26',
'version' => '1.37'
},
{
'date' => '2003-08-25T20:36:26',
'version' => '1.38'
},
{
'date' => '2003-11-27T23:46:40',
'version' => '1.39'
},
{
'date' => '2004-01-08T14:04:59',
'version' => '1.39'
},
{
'date' => '2004-02-23T14:54:21',
'version' => '1.41'
},
{
'date' => '2004-03-12T16:40:08',
'version' => '1.41'
},
{
'date' => '2004-07-05T10:02:05',
'version' => '1.43'
},
{
'date' => '2004-10-05T21:27:23',
'version' => '1.44'
},
{
'date' => '2004-10-06T13:49:20',
'version' => '1.45'
},
{
'date' => '2004-11-16T12:38:32',
'version' => '1.46'
},
{
'date' => '2005-02-02T11:28:46',
'version' => '1.47'
},
{
'date' => '2005-03-14T17:03:33',
'version' => '1.48'
},
{
'date' => '2005-11-29T19:59:40',
'version' => '1.49'
},
{
'date' => '2005-12-14T16:55:16',
'version' => '1.50'
},
{
'date' => '2006-04-19T15:56:38',
'version' => '1.45'
},
{
'date' => '2006-06-06T12:08:36',
'version' => '1.51'
},
{
'date' => '2006-08-08T21:13:32',
'version' => '1.52'
},
{
'date' => '2006-11-02T00:38:01',
'version' => '1.53'
},
{
'date' => '2007-02-23T17:15:23',
'version' => '1.54'
},
{
'date' => '2007-05-04T14:56:38',
'version' => '1.55'
},
{
'date' => '2007-05-10T14:04:04',
'version' => '1.56'
},
{
'date' => '2007-05-13T22:00:58',
'version' => '1.56'
},
{
'date' => '2007-06-13T16:45:34',
'version' => '1.57'
},
{
'date' => '2007-06-15T17:06:42',
'version' => '1.57'
},
{
'date' => '2007-06-18T15:15:31',
'version' => '1.57'
},
{
'date' => '2007-06-25T22:11:47',
'version' => '1.58'
},
{
'date' => '2007-08-22T17:02:10',
'version' => '1.59'
},
{
'date' => '2007-08-23T12:22:26',
'version' => '1.59'
},
{
'date' => '2007-08-23T13:59:53',
'version' => '1.59'
},
{
'date' => '2007-08-24T09:19:29',
'version' => '1.59'
},
{
'date' => '2007-10-16T13:12:55',
'version' => '1.601'
},
{
'date' => '2007-10-21T22:12:52',
'version' => '1.601'
},
{
'date' => '2008-02-09T22:06:13',
'version' => '1.602'
},
{
'date' => '2008-03-22T00:11:03',
'version' => '1.603'
},
{
'date' => '2008-03-24T14:11:41',
'version' => '1.604'
},
{
'date' => '2008-06-16T19:19:43',
'version' => '1.605'
},
{
'date' => '2008-07-22T21:01:09',
'version' => '1.606'
},
{
'date' => '2008-07-22T21:50:54',
'version' => '1.607'
},
{
'date' => '2009-05-02T22:58:48',
'version' => '1.608'
},
{
'date' => '2009-05-05T12:05:19',
'version' => '1.608'
},
{
'date' => '2009-06-05T22:57:34',
'version' => '1.609'
},
{
'date' => '2009-06-08T10:29:18',
'version' => '1.609'
},
{
'date' => '2010-03-02T21:26:39',
'version' => '1.611'
},
{
'date' => '2010-04-22T11:06:31',
'version' => '1.611'
},
{
'date' => '2010-04-27T15:13:32',
'version' => '1.611'
},
{
'date' => '2010-04-29T19:54:44',
'version' => '1.611'
},
{
'date' => '2010-05-28T10:29:17',
'version' => '1.612'
},
{
'date' => '2010-06-15T22:47:23',
'version' => '1.612'
},
{
'date' => '2010-06-16T19:18:05',
'version' => '1.612'
},
{
'date' => '2010-07-02T14:26:03',
'version' => '1.612'
},
{
'date' => '2010-07-15T15:00:53',
'version' => '1.612'
},
{
'date' => '2010-07-16T19:36:42',
'version' => '1.612'
},
{
'date' => '2010-07-22T17:34:16',
'version' => '1.613'
},
{
'date' => '2010-07-25T15:50:15',
'version' => '1.613'
},
{
'date' => '2010-07-30T14:17:33',
'version' => '1.614'
},
{
'date' => '2010-08-16T16:34:58',
'version' => '1.614'
},
{
'date' => '2010-08-30T20:11:00',
'version' => '1.614'
},
{
'date' => '2010-08-30T20:26:37',
'version' => '1.614'
},
{
'date' => '2010-08-30T20:56:09',
'version' => '1.614'
},
{
'date' => '2010-09-02T15:44:21',
'version' => '1.614'
},
{
'date' => '2010-09-09T10:24:11',
'version' => '1.614'
},
{
'date' => '2010-09-16T16:23:50',
'version' => '1.614'
},
{
'date' => '2010-09-17T09:48:02',
'version' => '1.614'
},
{
'date' => '2010-09-21T10:14:29',
'version' => '1.615'
},
{
'date' => '2010-09-22T12:28:20',
'version' => '1.615'
},
{
'date' => '2010-12-18T21:51:52',
'version' => '1.616'
},
{
'date' => '2010-12-21T23:26:46',
'version' => '1.616'
},
{
'date' => '2010-12-29T14:39:48',
'version' => '1.616'
},
{
'date' => '2010-12-30T10:26:51',
'version' => '1.616'
},
{
'date' => '2012-01-02T17:12:53',
'version' => '1.617'
},
{
'date' => '2012-01-28T09:34:18',
'version' => '1.617'
},
{
'date' => '2012-01-30T10:06:49',
'version' => '1.617'
},
{
'date' => '2012-02-07T22:54:02',
'version' => '1.618'
},
{
'date' => '2012-02-13T18:24:33',
'version' => '1.618'
},
{
'date' => '2012-02-23T11:05:45',
'version' => '1.618'
},
{
'date' => '2012-02-25T14:24:39',
'version' => '1.618'
},
{
'date' => '2012-04-18T11:57:55',
'version' => '1.619'
},
{
'date' => '2012-04-20T20:21:54',
'version' => '1.619'
},
{
'date' => '2012-04-23T22:09:14',
'version' => '1.619'
},
{
'date' => '2012-04-25T12:46:54',
'version' => '1.620'
},
{
'date' => '2012-05-21T13:06:09',
'version' => '1.621'
},
{
'date' => '2012-05-22T22:17:06',
'version' => '1.621'
},
{
'date' => '2012-06-06T16:51:00',
'version' => '1.622'
},
{
'date' => '2012-07-13T15:24:35',
'version' => '1.623'
},
{
'date' => '2012-10-30T13:01:14',
'version' => '1.623'
},
{
'date' => '2012-11-19T23:27:04',
'version' => '1.623'
},
{
'date' => '2012-12-13T16:26:23',
'version' => '1.623'
},
{
'date' => '2012-12-21T17:22:01',
'version' => '1.623'
},
{
'date' => '2013-01-02T10:09:42',
'version' => '1.623'
},
{
'date' => '2013-03-22T20:41:50',
'version' => '1.624'
},
{
'date' => '2013-03-28T21:59:38',
'version' => '1.625'
},
{
'date' => '2013-05-15T11:28:03',
'version' => '1.626'
},
{
'date' => '2013-05-16T20:30:50',
'version' => '1.627'
},
{
'date' => '2013-06-24T21:56:27',
'version' => '1.628'
},
{
'date' => '2013-06-24T22:12:23',
'version' => '1.628'
},
{
'date' => '2013-06-30T19:08:08',
'version' => '1.628'
},
{
'date' => '2013-07-02T11:27:23',
'version' => '1.628'
},
{
'date' => '2013-07-22T13:22:40',
'version' => '1.628'
},
{
'date' => '2013-10-11T12:28:12',
'version' => '1.629'
},
{
'date' => '2013-10-13T16:02:52',
'version' => '1.629'
},
{
'date' => '2013-10-15T12:24:53',
'version' => '1.629'
},
{
'date' => '2013-10-22T11:58:53',
'version' => '1.629_50'
},
{
'date' => '2013-10-28T12:51:39',
'version' => '1.630'
},
{
'date' => '2014-01-13T13:51:01',
'version' => '1.631'
},
{
'date' => '2014-01-16T11:34:34',
'version' => '1.631'
},
{
'date' => '2014-01-20T11:12:44',
'version' => '1.631'
},
{
'date' => '2014-10-23T14:08:22',
'version' => '1.631'
},
{
'date' => '2014-11-05T11:15:07',
'version' => '1.632'
},
{
'date' => '2015-01-08T14:31:52',
'version' => '1.632'
},
{
'date' => '2015-01-11T13:26:05',
'version' => '1.633'
},
{
'date' => '2015-07-18T13:16:07',
'version' => '1.633'
},
{
'date' => '2015-07-19T14:34:22',
'version' => '1.633_91'
},
{
'date' => '2015-07-22T15:27:59',
'version' => '1.633_92'
},
{
'date' => '2015-08-02T16:52:48',
'version' => '1.633_93'
},
{
'date' => '2015-08-03T14:52:56',
'version' => '1.634'
},
{
'date' => '2016-04-23T15:28:02',
'version' => '1.634'
},
{
'date' => '2016-04-24T11:57:03',
'version' => '1.635'
},
{
'date' => '2016-04-24T22:20:56',
'version' => '1.636'
},
{
'date' => '2017-08-14T10:10:55',
'version' => '1.637'
},
{
'date' => '2017-08-16T09:02:40',
'version' => '1.637'
},
{
'date' => '2017-12-28T14:40:44',
'version' => '1.639'
},
{
'date' => '2018-01-28T20:50:53',
'version' => '1.640'
},
{
'date' => '2018-03-19T18:06:08',
'version' => '1.641'
},
{
'date' => '2018-10-28T15:08:54',
'version' => '1.641_90'
},
{
'date' => '2018-10-29T10:43:41',
'version' => '1.642'
},
{
'date' => '2020-01-26T20:48:52',
'version' => '1.642_90'
},
{
'date' => '2020-01-31T19:02:41',
'version' => '1.643'
},
{
'date' => '2024-08-20T11:29:56',
'version' => '1.643_01'
},
{
'date' => '2024-08-22T07:09:52',
'version' => '1.643_02'
},
{
'date' => '2024-08-23T17:54:09',
'version' => '1.644'
},
{
'date' => '2024-09-03T09:25:33',
'version' => '1.645'
},
{
'date' => '2025-01-11T12:59:58',
'version' => '1.646'
},
{
'date' => '2025-01-20T08:14:47',
'version' => '1.647'
}
]
},
'DBIx-Custom' => {
'advisories' => [
{
'affected_versions' => [
'<0.1641'
],
'cves' => [],
'description' => 'SQL injection when passing special column names.
',
'distribution' => 'DBIx-Custom',
'fixed_versions' => [
'>=0.1641'
],
'id' => 'CPANSA-DBIx-Custom-2011-01',
'references' => [
'https://metacpan.org/changes/distribution/DBIx-Custom',
'https://github.com/yuki-kimoto/DBIx-Custom/commit/5b00b9f9a966e7abecabd91710c8fa893784d919'
],
'reported' => '2011-01-27',
'severity' => 'high'
}
],
'main_module' => 'DBIx::Custom',
'versions' => [
{
'date' => '2009-11-08T04:18:19',
'version' => '0.0101'
},
{
'date' => '2009-11-09T10:46:44',
'version' => '0.0201'
},
{
'date' => '2009-11-12T14:12:47',
'version' => '0.0301'
},
{
'date' => '2009-11-15T11:43:40',
'version' => '0.0401'
},
{
'date' => '2009-11-16T11:10:52',
'version' => '0.0501'
},
{
'date' => '2009-11-17T12:37:33',
'version' => '0.0502'
},
{
'date' => '2009-11-19T12:05:50',
'version' => '0.0601'
},
{
'date' => '2009-11-19T13:37:39',
'version' => '0.0602'
},
{
'date' => '2009-11-20T12:08:31',
'version' => '0.0603'
},
{
'date' => '2009-11-23T13:39:53',
'version' => '0.0604'
},
{
'date' => '2009-11-23T14:45:46',
'version' => '0.0605'
},
{
'date' => '2009-11-25T13:57:52',
'version' => '0.0701'
},
{
'date' => '2009-12-01T07:30:25',
'version' => '0.0702'
},
{
'date' => '2009-12-02T13:59:36',
'version' => '0.0801'
},
{
'date' => '2009-12-09T14:27:53',
'version' => '0.0901'
},
{
'date' => '2009-12-22T13:40:07',
'version' => '0.0902'
},
{
'date' => '2010-01-18T12:42:57',
'version' => '0.0903'
},
{
'date' => '2010-01-21T14:29:12',
'version' => '0.0904'
},
{
'date' => '2010-01-22T12:51:23',
'version' => '0.0905'
},
{
'date' => '2010-01-24T09:49:30',
'version' => '0.0906'
},
{
'date' => '2010-01-30T00:15:17',
'version' => '0.1001'
},
{
'date' => '2010-01-30T03:51:04',
'version' => '0.1101'
},
{
'date' => '2010-05-01T13:02:19',
'version' => '0.1301'
},
{
'date' => '2010-05-01T23:29:22',
'version' => '0.1401'
},
{
'date' => '2010-05-02T06:04:57',
'version' => '0.1402'
},
{
'date' => '2010-05-26T15:13:04',
'version' => '0.1501'
},
{
'date' => '2010-05-27T14:00:04',
'version' => '0.1502'
},
{
'date' => '2010-05-28T13:28:16',
'version' => '0.1503'
},
{
'date' => '2010-06-25T12:11:33',
'version' => '0.1602'
},
{
'date' => '2010-07-14T13:55:33',
'version' => '0.1603'
},
{
'date' => '2010-08-03T14:43:14',
'version' => '0.1604'
},
{
'date' => '2010-08-05T15:17:49',
'version' => '0.1605'
},
{
'date' => '2010-08-05T15:24:36',
'version' => '0.1606'
},
{
'date' => '2010-08-06T14:57:35',
'version' => '0.1607'
},
{
'date' => '2010-08-07T05:49:19',
'version' => '0.1608'
},
{
'date' => '2010-08-08T04:45:12',
'version' => '0.1609'
},
{
'date' => '2010-08-08T12:44:43',
'version' => '0.1610'
},
{
'date' => '2010-08-09T12:08:31',
'version' => '0.1611'
},
{
'date' => '2010-08-10T11:19:41',
'version' => '0.1612'
},
{
'date' => '2010-08-10T12:35:17',
'version' => '0.1613'
},
{
'date' => '2010-08-12T15:01:01',
'version' => '0.1614'
},
{
'date' => '2010-08-15T04:00:44',
'version' => '0.1615'
},
{
'date' => '2010-08-24T10:18:06',
'version' => '0.1616'
},
{
'date' => '2010-09-07T12:12:04',
'version' => '0.1617'
},
{
'date' => '2010-10-17T05:44:56',
'version' => '0.1618'
},
{
'date' => '2010-10-20T15:01:35',
'version' => '0.1619'
},
{
'date' => '2010-10-21T14:38:05',
'version' => '0.1620'
},
{
'date' => '2010-11-10T06:54:46',
'version' => '0.1621'
},
{
'date' => '2010-12-20T14:58:38',
'version' => '0.1622'
},
{
'date' => '2010-12-21T16:10:25',
'version' => '0.1623'
},
{
'date' => '2010-12-22T08:41:09',
'version' => '0.1624'
},
{
'date' => '2011-01-01T16:08:48',
'version' => '0.1625'
},
{
'date' => '2011-01-02T04:21:11',
'version' => '0.1626'
},
{
'date' => '2011-01-04T15:18:21',
'version' => '0.1627'
},
{
'date' => '2011-01-12T07:29:29',
'version' => '0.1628'
},
{
'date' => '2011-01-12T15:35:11',
'version' => '0.1629'
},
{
'date' => '2011-01-13T15:41:25',
'version' => '0.1630'
},
{
'date' => '2011-01-17T15:53:44',
'version' => '0.1631'
},
{
'date' => '2011-01-18T14:43:16',
'version' => '0.1632'
},
{
'date' => '2011-01-18T15:22:37',
'version' => '0.1633'
},
{
'date' => '2011-01-19T14:52:48',
'version' => '0.1634'
},
{
'date' => '2011-01-21T14:04:02',
'version' => '0.1635'
},
{
'date' => '2011-01-22T13:02:55',
'version' => '0.1636'
},
{
'date' => '2011-01-24T12:58:40',
'version' => '0.1637'
},
{
'date' => '2011-01-25T12:32:26',
'version' => '0.1638'
},
{
'date' => '2011-01-26T09:23:22',
'version' => '0.1639'
},
{
'date' => '2011-01-26T13:59:10',
'version' => '0.1640'
},
{
'date' => '2011-01-27T05:19:14',
'version' => '0.1641'
},
{
'date' => '2011-01-28T12:18:42',
'version' => '0.1642'
},
{
'date' => '2011-02-09T08:54:11',
'version' => '0.1643'
},
{
'date' => '2011-02-11T14:07:25',
'version' => '0.1644'
},
{
'date' => '2011-02-14T15:24:30',
'version' => '0.1645'
},
{
'date' => '2011-02-18T17:48:52',
'version' => '0.1646'
},
{
'date' => '2011-02-19T00:30:41',
'version' => '0.1647'
},
{
'date' => '2011-02-21T16:13:29',
'version' => '0.1648'
},
{
'date' => '2011-02-22T14:53:08',
'version' => '0.1649'
},
{
'date' => '2011-02-24T05:45:44',
'version' => '0.1650'
},
{
'date' => '2011-02-24T14:35:20',
'version' => '0.1651'
},
{
'date' => '2011-02-25T14:39:56',
'version' => '0.1652'
},
{
'date' => '2011-02-28T13:18:03',
'version' => '0.1653'
},
{
'date' => '2011-03-06T14:32:11',
'version' => '0.1654'
},
{
'date' => '2011-03-08T14:59:08',
'version' => '0.1655'
},
{
'date' => '2011-03-09T13:44:35',
'version' => '0.1656'
},
{
'date' => '2011-03-10T15:44:50',
'version' => '0.1657'
},
{
'date' => '2011-03-11T16:23:11',
'version' => '0.1658'
},
{
'date' => '2011-03-12T08:20:07',
'version' => '0.1659'
},
{
'date' => '2011-03-14T11:16:27',
'version' => '0.1660'
},
{
'date' => '2011-03-15T16:32:52',
'version' => '0.1661'
},
{
'date' => '2011-03-19T14:40:50',
'version' => '0.1662'
},
{
'date' => '2011-03-21T03:53:25',
'version' => '0.1663'
},
{
'date' => '2011-03-24T14:45:52',
'version' => '0.1664'
},
{
'date' => '2011-03-25T14:25:43',
'version' => '0.1665'
},
{
'date' => '2011-03-29T17:26:27',
'version' => '0.1666'
},
{
'date' => '2011-03-30T08:03:39',
'version' => '0.1667'
},
{
'date' => '2011-03-30T15:04:03',
'version' => '0.1668'
},
{
'date' => '2011-03-30T15:25:45',
'version' => '0.1669'
},
{
'date' => '2011-04-01T15:29:33',
'version' => '0.1670'
},
{
'date' => '2011-04-02T16:31:44',
'version' => '0.1671'
},
{
'date' => '2011-04-04T13:37:34',
'version' => '0.1672'
},
{
'date' => '2011-04-05T11:45:54',
'version' => '0.1673'
},
{
'date' => '2011-04-05T11:59:11',
'version' => '0.1674'
},
{
'date' => '2011-04-11T13:47:34',
'version' => '0.1675'
},
{
'date' => '2011-04-11T14:55:38',
'version' => '0.1676'
},
{
'date' => '2011-04-12T15:17:24',
'version' => '0.1677'
},
{
'date' => '2011-04-18T13:36:31',
'version' => '0.1678'
},
{
'date' => '2011-04-19T11:07:27',
'version' => '0.1679'
},
{
'date' => '2011-04-25T14:05:23',
'version' => '0.1680'
},
{
'date' => '2011-04-26T14:07:02',
'version' => '0.1681'
},
{
'date' => '2011-05-23T14:40:41',
'version' => '0.1682'
},
{
'date' => '2011-06-06T11:52:44',
'version' => '0.1683'
},
{
'date' => '2011-06-07T13:07:20',
'version' => '0.1684'
},
{
'date' => '2011-06-08T10:32:35',
'version' => '0.1685'
},
{
'date' => '2011-06-08T12:24:07',
'version' => '0.1686'
},
{
'date' => '2011-06-09T13:59:44',
'version' => '0.1687'
},
{
'date' => '2011-06-10T13:26:20',
'version' => '0.1688'
},
{
'date' => '2011-06-12T03:22:26',
'version' => '0.1689'
},
{
'date' => '2011-06-12T12:01:43',
'version' => '0.1690'
},
{
'date' => '2011-06-13T13:31:21',
'version' => '0.1691'
},
{
'date' => '2011-06-14T13:27:31',
'version' => '0.1692'
},
{
'date' => '2011-06-15T08:51:43',
'version' => '0.1693'
},
{
'date' => '2011-06-17T14:38:23',
'version' => '0.1694'
},
{
'date' => '2011-06-20T13:08:47',
'version' => '0.1695'
},
{
'date' => '2011-06-21T13:12:38',
'version' => '0.1696'
},
{
'date' => '2011-06-24T13:42:00',
'version' => '0.1697'
},
{
'date' => '2011-06-27T13:23:13',
'version' => '0.1698'
},
{
'date' => '2011-06-28T14:39:21',
'version' => '0.1699'
},
{
'date' => '2011-07-01T11:04:37',
'version' => '0.1700'
},
{
'date' => '2011-07-11T13:19:20',
'version' => '0.1701'
},
{
'date' => '2011-07-26T14:09:43',
'version' => '0.1702'
},
{
'date' => '2011-07-28T04:59:20',
'version' => '0.1703'
},
{
'date' => '2011-07-29T13:45:24',
'version' => '0.1704'
},
{
'date' => '2011-07-29T14:35:38',
'version' => '0.1705'
},
{
'date' => '2011-07-30T04:25:21',
'version' => '0.1706'
},
{
'date' => '2011-07-30T05:16:05',
'version' => '0.1707'
},
{
'date' => '2011-07-30T14:32:34',
'version' => '0.1708'
},
{
'date' => '2011-08-01T12:48:52',
'version' => '0.1709'
},
{
'date' => '2011-08-02T13:30:15',
'version' => '0.1710'
},
{
'date' => '2011-08-09T14:11:24',
'version' => '0.1711'
},
{
'date' => '2011-08-10T16:16:52',
'version' => '0.1712'
},
{
'date' => '2011-08-12T13:45:58',
'version' => '0.1713'
},
{
'date' => '2011-08-13T13:38:02',
'version' => '0.1714'
},
{
'date' => '2011-08-14T03:47:28',
'version' => '0.1715'
},
{
'date' => '2011-08-15T14:00:28',
'version' => '0.1716'
},
{
'date' => '2011-08-16T04:03:16',
'version' => '0.1717'
},
{
'date' => '2011-08-20T09:40:46',
'version' => '0.1718'
},
{
'date' => '2011-08-22T13:43:21',
'version' => '0.1720'
},
{
'date' => '2011-08-26T14:11:53',
'version' => '0.1721'
},
{
'date' => '2011-09-02T15:12:10',
'version' => '0.1722'
},
{
'date' => '2011-09-12T12:24:14',
'version' => '0.1723'
},
{
'date' => '2011-09-16T15:15:54',
'version' => '0.1724'
},
{
'date' => '2011-09-27T11:48:33',
'version' => '0.1725'
},
{
'date' => '2011-09-30T11:21:45',
'version' => '0.1726'
},
{
'date' => '2011-10-03T10:43:32',
'version' => '0.1727'
},
{
'date' => '2011-10-05T04:10:35',
'version' => '0.1728'
},
{
'date' => '2011-10-05T08:12:55',
'version' => '0.1729'
},
{
'date' => '2011-10-10T11:35:23',
'version' => '0.1730'
},
{
'date' => '2011-10-11T14:30:46',
'version' => '0.1731'
},
{
'date' => '2011-10-20T11:56:08',
'version' => '0.1732'
},
{
'date' => '2011-10-21T22:47:50',
'version' => '0.1733'
},
{
'date' => '2011-10-22T22:02:37',
'version' => '0.1734'
},
{
'date' => '2011-10-23T00:11:48',
'version' => '0.1735'
},
{
'date' => '2011-10-23T13:08:15',
'version' => '0.1736'
},
{
'date' => '2011-10-24T14:07:44',
'version' => '0.1737'
},
{
'date' => '2011-10-25T14:31:15',
'version' => '0.1738'
},
{
'date' => '2011-10-26T01:14:58',
'version' => '0.1739'
},
{
'date' => '2011-10-27T12:59:00',
'version' => '0.1740'
},
{
'date' => '2011-10-28T11:49:57',
'version' => '0.1741'
},
{
'date' => '2011-10-31T15:37:07',
'version' => '0.1742'
},
{
'date' => '2011-11-01T12:02:38',
'version' => '0.1743'
},
{
'date' => '2011-11-03T13:38:04',
'version' => '0.1744'
},
{
'date' => '2011-11-04T14:16:11',
'version' => '0.1745'
},
{
'date' => '2011-11-07T12:19:53',
'version' => '0.1746'
},
{
'date' => '2011-11-11T11:59:27',
'version' => '0.1747'
},
{
'date' => '2011-11-16T00:36:45',
'version' => '0.20_01'
},
{
'date' => '2011-11-16T08:50:11',
'version' => '0.2100'
},
{
'date' => '2011-11-21T11:05:36',
'version' => '0.2101'
},
{
'date' => '2011-11-25T14:34:26',
'version' => '0.2102'
},
{
'date' => '2011-11-28T10:38:56',
'version' => '0.2103'
},
{
'date' => '2011-11-29T13:48:49',
'version' => '0.2104'
},
{
'date' => '2012-01-14T13:39:10',
'version' => '0.2105'
},
{
'date' => '2012-01-20T15:16:34',
'version' => '0.2106'
},
{
'date' => '2012-01-25T08:56:44',
'version' => '0.2107'
},
{
'date' => '2012-01-29T14:30:53',
'version' => '0.2108'
},
{
'date' => '2012-02-07T13:31:49',
'version' => '0.2109'
},
{
'date' => '2012-02-10T14:51:17',
'version' => '0.2110'
},
{
'date' => '2012-02-11T14:45:41',
'version' => '0.2111'
},
{
'date' => '2012-02-28T14:33:03',
'version' => '0.22'
},
{
'date' => '2012-03-01T00:07:11',
'version' => '0.23'
},
{
'date' => '2012-03-02T14:57:03',
'version' => '0.24'
},
{
'date' => '2012-03-19T11:58:43',
'version' => '0.25'
},
{
'date' => '2012-07-11T08:20:53',
'version' => '0.26'
},
{
'date' => '2012-09-17T13:15:26',
'version' => '0.27'
},
{
'date' => '2013-03-04T11:25:17',
'version' => '0.28'
},
{
'date' => '2014-02-03T09:21:29',
'version' => '0.29'
},
{
'date' => '2014-02-04T00:17:32',
'version' => '0.30'
},
{
'date' => '2015-01-13T01:36:24',
'version' => '0.31'
},
{
'date' => '2015-01-13T05:24:10',
'version' => '0.32'
},
{
'date' => '2015-01-13T07:52:20',
'version' => '0.33'
},
{
'date' => '2015-01-15T02:04:26',
'version' => '0.34'
},
{
'date' => '2015-05-23T05:44:25',
'version' => '0.35'
},
{
'date' => '2015-05-25T02:52:16',
'version' => '0.36'
},
{
'date' => '2016-05-21T07:00:46',
'version' => '0.37'
},
{
'date' => '2017-03-16T07:48:58',
'version' => '0.38'
},
{
'date' => '2017-03-29T02:29:03',
'version' => '0.39'
},
{
'date' => '2017-03-30T01:41:11',
'version' => '0.40'
},
{
'date' => '2017-11-06T15:17:26',
'version' => '0.41'
},
{
'date' => '2019-10-15T04:14:26',
'version' => '0.41_99'
},
{
'date' => '2019-10-19T08:52:17',
'version' => '0.42'
},
{
'date' => '2020-04-01T05:39:43',
'version' => '0.43'
},
{
'date' => '2020-08-03T00:46:29',
'version' => '0.44'
},
{
'date' => '2021-12-16T00:31:02',
'version' => '0.45'
}
]
},
'Dancer' => {
'advisories' => [
{
'affected_versions' => [
'<1.3114'
],
'cves' => [
'CVE-2012-5572'
],
'description' => 'CRLF injection vulnerability in the cookie method allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a cookie name.
',
'distribution' => 'Dancer',
'fixed_versions' => [
'>=1.3114'
],
'id' => 'CPANSA-Dancer-2014-01',
'references' => [
'https://metacpan.org/changes/distribution/Dancer',
'https://github.com/PerlDancer/Dancer/commit/46ef9124f3149f697455061499ac7cee40930349'
],
'reported' => '2014-05-30'
},
{
'affected_versions' => [
'<1.3051'
],
'cves' => [
'CVE-2011-1589'
],
'description' => 'Directory traversal vulnerability (Mojolicious report, but Dancer was vulnerable as well).
',
'distribution' => 'Dancer',
'fixed_versions' => [
'>=1.3051'
],
'id' => 'CPANSA-Dancer-2011-01',
'references' => [
'https://metacpan.org/changes/distribution/Dancer',
'https://github.com/PerlDancer/Dancer/commit/91d0bf6a36705b0971b18f7d38fa2f3df8c7b994'
],
'reported' => '2011-04-05'
}
],
'main_module' => 'Dancer',
'versions' => [
{
'date' => '2009-07-27T13:18:07',
'version' => '20090727.1315'
},
{
'date' => '2009-07-27T14:14:13',
'version' => '0_0.99'
},
{
'date' => '2009-08-01T13:48:20',
'version' => '0.9901'
},
{
'date' => '2009-08-04T10:01:54',
'version' => '0.9902'
},
{
'date' => '2009-08-07T12:29:03',
'version' => '0.9003'
},
{
'date' => '2009-09-19T15:30:19',
'version' => '0.9904'
},
{
'date' => '2009-09-23T21:33:51',
'version' => '0.9905'
},
{
'date' => '2009-11-20T11:14:20',
'version' => '1.000'
},
{
'date' => '2010-01-06T13:53:28',
'version' => '1.100'
},
{
'date' => '2010-01-11T09:46:45',
'version' => '1.110'
},
{
'date' => '2010-01-15T16:03:35',
'version' => '1.120'
},
{
'date' => '2010-01-15T17:53:08',
'version' => '1.121'
},
{
'date' => '2010-01-20T07:48:38',
'version' => '1.122'
},
{
'date' => '2010-01-29T17:29:24',
'version' => '1.130'
},
{
'date' => '2010-02-09T07:55:18',
'version' => '1.140'
},
{
'date' => '2010-02-17T15:09:48',
'version' => '1.150'
},
{
'date' => '2010-03-07T17:50:01',
'version' => '1.160'
},
{
'date' => '2010-03-24T11:19:00',
'version' => '1.170'
},
{
'date' => '2010-03-24T13:44:04',
'version' => '1.171'
},
{
'date' => '2010-03-28T15:09:59',
'version' => '1.172'
},
{
'date' => '2010-04-01T14:13:30',
'version' => '1.173'
},
{
'date' => '2010-04-04T11:03:53',
'version' => '1.173_01'
},
{
'date' => '2010-04-08T13:49:39',
'version' => '1.174'
},
{
'date' => '2010-04-11T10:49:39',
'version' => '1.175'
},
{
'date' => '2010-04-19T08:43:22',
'version' => '1.175_01'
},
{
'date' => '2010-04-22T20:29:56',
'version' => '1.176'
},
{
'date' => '2010-05-05T12:21:26',
'version' => '1.178_01'
},
{
'date' => '2010-05-16T10:28:47',
'version' => '1.1800'
},
{
'date' => '2010-05-19T14:17:57',
'version' => '1.1801'
},
{
'date' => '2010-05-19T17:32:52',
'version' => '1.1802'
},
{
'date' => '2010-05-23T20:45:17',
'version' => '1.1803'
},
{
'date' => '2010-06-18T11:59:20',
'version' => '1.1804'
},
{
'date' => '2010-06-22T06:41:58',
'version' => '1.1805'
},
{
'date' => '2010-07-07T06:15:55',
'version' => '1.1806_01'
},
{
'date' => '2010-08-14T16:37:45',
'version' => '1.1806_02'
},
{
'date' => '2010-08-23T17:47:12',
'version' => '1.1807'
},
{
'date' => '2010-08-24T06:23:38',
'version' => '1.1808'
},
{
'date' => '2010-08-25T05:41:15',
'version' => '1.1809'
},
{
'date' => '2010-09-01T06:19:20',
'version' => '1.1810'
},
{
'date' => '2010-09-03T09:23:14',
'version' => '1.1811'
},
{
'date' => '2010-09-21T12:19:35',
'version' => '1.1812'
},
{
'date' => '2010-09-24T14:25:44',
'version' => '1.1901'
},
{
'date' => '2010-10-14T09:25:03',
'version' => '1.1999_01'
},
{
'date' => '2010-10-28T15:41:17',
'version' => '1.1999_02'
},
{
'date' => '2010-11-02T14:14:32',
'version' => '1.1902'
},
{
'date' => '2010-11-02T14:25:04',
'version' => '1.1902'
},
{
'date' => '2010-11-03T17:07:29',
'version' => '1.1903'
},
{
'date' => '2010-11-04T11:16:17',
'version' => '1.1904'
},
{
'date' => '2010-11-11T07:43:21',
'version' => '1.1999_03'
},
{
'date' => '2010-11-14T08:08:56',
'version' => '1.1999_04'
},
{
'date' => '2010-11-18T15:54:33',
'version' => '1.200'
},
{
'date' => '2010-11-18T16:52:47',
'version' => '1.2000'
},
{
'date' => '2010-11-29T22:05:38',
'version' => '1.2000_01'
},
{
'date' => '2010-11-30T10:00:23',
'version' => '1.2000_02'
},
{
'date' => '2010-11-30T19:59:09',
'version' => '1.2001'
},
{
'date' => '2010-12-02T12:18:12',
'version' => '1.2001_01'
},
{
'date' => '2010-12-03T20:28:56',
'version' => '1.2002'
},
{
'date' => '2010-12-07T18:05:50',
'version' => '1.2002_01'
},
{
'date' => '2010-12-08T21:38:17',
'version' => '1.2002_02'
},
{
'date' => '2010-12-10T18:28:16',
'version' => '1.2003'
},
{
'date' => '2010-12-22T17:57:55',
'version' => '1.3000_01'
},
{
'date' => '2011-01-03T15:17:14',
'version' => '1.3000_02'
},
{
'date' => '2011-01-27T10:00:22',
'version' => '1.2004'
},
{
'date' => '2011-01-27T10:09:31',
'version' => '1.3001'
},
{
'date' => '2011-02-02T15:42:28',
'version' => '1.3002'
},
{
'date' => '2011-02-05T17:07:15',
'version' => '1.2005'
},
{
'date' => '2011-02-06T13:12:28',
'version' => '1.3003'
},
{
'date' => '2011-02-10T20:48:48',
'version' => '1.3010'
},
{
'date' => '2011-02-12T12:50:18',
'version' => '1.3010_01'
},
{
'date' => '2011-02-14T15:58:10',
'version' => '1.3011'
},
{
'date' => '2011-03-01T19:00:52',
'version' => '1.3012'
},
{
'date' => '2011-03-03T08:41:00',
'version' => '1.3013'
},
{
'date' => '2011-03-04T12:56:36',
'version' => '1.3014'
},
{
'date' => '2011-03-10T14:16:24',
'version' => '1.3014_01'
},
{
'date' => '2011-03-13T13:17:43',
'version' => '1.3019_01'
},
{
'date' => '2011-03-14T07:44:57',
'version' => '1.3019_02'
},
{
'date' => '2011-03-21T13:44:17',
'version' => '1.3020'
},
{
'date' => '2011-04-01T15:22:58',
'version' => '1.3029_01'
},
{
'date' => '2011-04-08T20:07:26',
'version' => '1.3029_02'
},
{
'date' => '2011-04-10T08:18:44',
'version' => '1.3029_03'
},
{
'date' => '2011-04-13T08:26:50',
'version' => '1.3030'
},
{
'date' => '2011-04-27T14:58:57',
'version' => '1.3039_01'
},
{
'date' => '2011-05-01T14:55:49',
'version' => '1.3040'
},
{
'date' => '2011-05-14T15:03:00',
'version' => '1.3049_01'
},
{
'date' => '2011-05-20T10:57:10',
'version' => '1.3050'
},
{
'date' => '2011-05-27T12:57:27',
'version' => '1.3051'
},
{
'date' => '2011-05-27T13:07:51',
'version' => '1.3059_01'
},
{
'date' => '2011-05-29T14:06:24',
'version' => '1.3059_02'
},
{
'date' => '2011-06-11T14:02:50',
'version' => '1.3059_03'
},
{
'date' => '2011-06-12T17:31:55',
'version' => '1.3059_04'
},
{
'date' => '2011-06-15T10:35:07',
'version' => '1.3060'
},
{
'date' => '2011-07-07T13:19:45',
'version' => '1.3069_01'
},
{
'date' => '2011-07-10T16:14:53',
'version' => '1.3069_02'
},
{
'date' => '2011-07-14T13:47:19',
'version' => '1.3070'
},
{
'date' => '2011-07-26T16:21:51',
'version' => '1.3071'
},
{
'date' => '2011-08-17T15:27:53',
'version' => '1.3079_01'
},
{
'date' => '2011-08-23T09:55:46',
'version' => '1.3072'
},
{
'date' => '2011-08-28T14:13:40',
'version' => '1.3079_02'
},
{
'date' => '2011-09-10T15:10:29',
'version' => '1.3079_03'
},
{
'date' => '2011-10-02T16:07:02',
'version' => '1.3079_04'
},
{
'date' => '2011-10-18T14:43:22',
'version' => '1.3079_05'
},
{
'date' => '2011-10-25T21:16:42',
'version' => '1.3080'
},
{
'date' => '2011-11-27T06:51:43',
'version' => '1.3089_01'
},
{
'date' => '2011-12-13T14:41:24',
'version' => '1.3090'
},
{
'date' => '2011-12-17T11:09:48',
'version' => '1.3091'
},
{
'date' => '2012-01-27T14:38:05',
'version' => '1.3092'
},
{
'date' => '2012-02-29T14:34:55',
'version' => '1.3093'
},
{
'date' => '2012-03-31T09:57:40',
'version' => '1.3094'
},
{
'date' => '2012-04-01T19:22:56',
'version' => '1.3095'
},
{
'date' => '2012-06-22T20:18:54',
'version' => '1.3095_01'
},
{
'date' => '2012-07-03T07:27:28',
'version' => '1.3095_02'
},
{
'date' => '2012-07-05T23:09:20',
'version' => '1.3096'
},
{
'date' => '2012-07-08T18:36:14',
'version' => '1.3097'
},
{
'date' => '2012-07-28T14:40:15',
'version' => '1.3098'
},
{
'date' => '2012-08-11T13:54:49',
'version' => '1.3099'
},
{
'date' => '2012-08-25T19:42:47',
'version' => '1.3100'
},
{
'date' => '2012-10-06T13:24:53',
'version' => '1.3110'
},
{
'date' => '2012-12-24T13:17:58',
'version' => '1.9999_01'
},
{
'date' => '2012-12-24T13:48:35',
'version' => '1.9999_02'
},
{
'date' => '2013-01-22T21:38:11',
'version' => '2.0000_01'
},
{
'date' => '2013-02-22T15:33:14',
'version' => '2.000001'
},
{
'date' => '2013-02-24T22:51:59',
'version' => '1.3111'
},
{
'date' => '2013-03-30T16:33:05',
'version' => '1.3111_01'
},
{
'date' => '2013-04-01T22:31:08',
'version' => '1.3111_02'
},
{
'date' => '2013-04-11T01:04:37',
'version' => '1.3112'
},
{
'date' => '2013-05-09T00:36:16',
'version' => '1.3113'
},
{
'date' => '2013-06-02T16:49:58',
'version' => '1.3114'
},
{
'date' => '2013-06-09T23:54:16',
'version' => '1.3115'
},
{
'date' => '2013-07-04T01:35:27',
'version' => '1.3116'
},
{
'date' => '2013-07-31T22:40:52',
'version' => '1.3117'
},
{
'date' => '2013-09-01T16:45:13',
'version' => '1.3118'
},
{
'date' => '2013-10-26T19:42:59',
'version' => '1.3119'
},
{
'date' => '2013-12-24T16:23:20',
'version' => '1.3120'
},
{
'date' => '2014-02-02T22:26:53',
'version' => '1.3121'
},
{
'date' => '2014-04-10T23:16:40',
'version' => '1.3122'
},
{
'date' => '2014-04-12T15:47:53',
'version' => '1.3123'
},
{
'date' => '2014-05-10T16:15:17',
'version' => '1.3124'
},
{
'date' => '2014-07-12T17:19:08',
'version' => '1.3125'
},
{
'date' => '2014-07-15T02:01:21',
'version' => '1.3126'
},
{
'date' => '2014-09-09T00:49:19',
'version' => '1.3127'
},
{
'date' => '2014-09-09T11:47:21',
'version' => '1.3128'
},
{
'date' => '2014-09-10T00:50:37',
'version' => '1.3129'
},
{
'date' => '2014-09-16T01:21:25',
'version' => '1.3130'
},
{
'date' => '2014-10-11T18:59:22',
'version' => '1.3131_0'
},
{
'date' => '2014-10-13T23:25:36',
'version' => '1.3131_1'
},
{
'date' => '2014-10-20T23:14:23',
'version' => '1.3132'
},
{
'date' => '2014-11-26T22:20:35',
'version' => '1.3133'
},
{
'date' => '2015-02-23T01:33:08',
'version' => '1.3134'
},
{
'date' => '2015-04-23T01:54:25',
'version' => '1.3135'
},
{
'date' => '2015-05-24T15:48:19',
'version' => '1.3136'
},
{
'date' => '2015-06-05T20:05:21',
'version' => '1.3137'
},
{
'date' => '2015-06-12T20:55:50',
'version' => '1.3138'
},
{
'date' => '2015-06-25T20:13:45',
'version' => '1.3139'
},
{
'date' => '2015-07-03T13:56:32',
'version' => '1.3140'
},
{
'date' => '2015-09-07T15:15:26',
'version' => '1.3141'
},
{
'date' => '2015-09-15T00:52:23',
'version' => '1.3142'
},
{
'date' => '2015-10-26T21:15:31',
'version' => '1.3143'
},
{
'date' => '2015-11-04T12:36:07',
'version' => '1.3144'
},
{
'date' => '2015-11-06T22:12:42',
'version' => '1.3200'
},
{
'date' => '2015-11-07T19:27:25',
'version' => '1.3201'
},
{
'date' => '2015-11-07T21:52:17',
'version' => '1.3202'
},
{
'date' => '2016-02-15T21:33:45',
'version' => '1.3300'
},
{
'date' => '2016-02-16T22:42:44',
'version' => '1.3301'
},
{
'date' => '2018-05-20T19:52:07',
'version' => '1.3203'
},
{
'date' => '2018-05-23T13:43:34',
'version' => '1.3204'
},
{
'date' => '2018-06-13T22:02:36',
'version' => '1.3205'
},
{
'date' => '2018-06-15T22:11:45',
'version' => '1.3400'
},
{
'date' => '2018-10-01T11:53:31',
'version' => '1.3401'
},
{
'date' => '2018-10-10T10:44:29',
'version' => '1.3402'
},
{
'date' => '2018-10-11T22:45:37',
'version' => '1.3403'
},
{
'date' => '2018-10-12T20:33:54',
'version' => '1.3500'
},
{
'date' => '2019-03-14T19:27:25',
'version' => '1.3501'
},
{
'date' => '2019-03-19T14:49:14',
'version' => '1.3510'
},
{
'date' => '2019-03-29T11:18:31',
'version' => '1.3511'
},
{
'date' => '2019-03-31T19:16:29',
'version' => '1.3512'
},
{
'date' => '2020-01-29T21:03:12',
'version' => '1.3513'
},
{
'date' => '2020-06-29T16:44:22',
'version' => '1.3514'
},
{
'date' => '2020-10-02T20:51:17',
'version' => '1.3514_02'
},
{
'date' => '2020-10-06T21:24:49',
'version' => '1.3514_03'
},
{
'date' => '2022-06-29T22:00:04',
'version' => '1.3514_04'
},
{
'date' => '2023-01-02T10:57:26',
'version' => '1.3520'
},
{
'date' => '2023-02-05T23:40:49',
'version' => '1.3521'
},
{
'date' => '2023-02-08T20:58:09',
'version' => '1.3521'
}
]
},
'Dancer2' => {
'advisories' => [
{
'affected_versions' => [
'<0.206000'
],
'cves' => [],
'description' => 'There is a potential RCE with regards to Storable. We have added session ID validation to the session engine so that session backends based on Storable can reject malformed session IDs that may lead to exploitation of the RCE.
',
'distribution' => 'Dancer2',
'fixed_versions' => [
'>=0.206000'
],
'id' => 'CPANSA-Dancer2-2018-01',
'references' => [
'https://metacpan.org/changes/distribution/Dancer2',
'http://lists.preshweb.co.uk/pipermail/dancer-users/2018-April/005952.html',
'https://github.com/PerlDancer/Dancer2/commit/3580f5d0874a9abf5483528f73bda9a7fd9ec7f1'
],
'reported' => '2018-01-30',
'severity' => 'critical'
}
],
'main_module' => 'Dancer2',
'versions' => [
{
'date' => '2013-02-22T15:39:46',
'version' => '0.01'
},
{
'date' => '2013-02-24T11:04:25',
'version' => '0.02'
},
{
'date' => '2013-03-07T17:30:37',
'version' => '0.03'
},
{
'date' => '2013-04-22T19:58:02',
'version' => '0.04'
},
{
'date' => '2013-07-20T16:53:37',
'version' => '0.05'
},
{
'date' => '2013-07-30T14:29:42',
'version' => '0.06'
},
{
'date' => '2013-08-03T22:17:54',
'version' => '0.07'
},
{
'date' => '2013-08-18T12:24:31',
'version' => '0.08'
},
{
'date' => '2013-09-01T21:19:26',
'version' => '0.09'
},
{
'date' => '2013-09-28T13:29:35',
'version' => '0.10'
},
{
'date' => '2013-12-15T13:21:28',
'version' => '0.11'
},
{
'date' => '2014-04-07T21:05:16',
'version' => '0.12'
},
{
'date' => '2014-04-13T17:20:22',
'version' => '0.13'
},
{
'date' => '2014-04-28T21:16:57',
'version' => '0.140000'
},
{
'date' => '2014-05-01T08:50:43',
'version' => '0.140001'
},
{
'date' => '2014-06-07T20:35:57',
'version' => '0.140900_01'
},
{
'date' => '2014-06-08T20:29:28',
'version' => '0.141000'
},
{
'date' => '2014-06-24T19:18:07',
'version' => '0.142000'
},
{
'date' => '2014-07-05T19:43:17',
'version' => '0.143000'
},
{
'date' => '2014-07-23T19:34:51',
'version' => '0.149000_01'
},
{
'date' => '2014-08-10T11:53:37',
'version' => '0.149000_02'
},
{
'date' => '2014-08-16T23:38:39',
'version' => '0.150000'
},
{
'date' => '2014-10-08T19:51:49',
'version' => '0.151000'
},
{
'date' => '2014-10-14T02:33:06',
'version' => '0.152000'
},
{
'date' => '2014-10-23T21:48:36',
'version' => '0.153000'
},
{
'date' => '2014-10-29T21:41:13',
'version' => '0.153001'
},
{
'date' => '2014-10-30T08:29:15',
'version' => '0.153002'
},
{
'date' => '2014-11-17T14:41:14',
'version' => '0.154000'
},
{
'date' => '2014-11-28T00:21:55',
'version' => '0.155000'
},
{
'date' => '2014-11-28T16:44:27',
'version' => '0.155001'
},
{
'date' => '2014-12-02T22:02:03',
'version' => '0.155002'
},
{
'date' => '2014-12-03T21:35:35',
'version' => '0.155003'
},
{
'date' => '2014-12-04T10:57:08',
'version' => '0.155004'
},
{
'date' => '2014-12-07T17:07:21',
'version' => '0.156000'
},
{
'date' => '2014-12-08T22:08:30',
'version' => '0.156001'
},
{
'date' => '2014-12-14T17:25:53',
'version' => '0.157000'
},
{
'date' => '2014-12-21T19:42:24',
'version' => '0.157001'
},
{
'date' => '2015-01-01T17:11:48',
'version' => '0.158000'
},
{
'date' => '2015-02-24T03:54:24',
'version' => '0.159000'
},
{
'date' => '2015-02-25T14:33:59',
'version' => '0.159001'
},
{
'date' => '2015-03-03T18:25:28',
'version' => '0.159002'
},
{
'date' => '2015-03-23T14:00:19',
'version' => '0.159003'
},
{
'date' => '2015-04-26T22:15:22',
'version' => '0.160000'
},
{
'date' => '2015-05-14T18:46:02',
'version' => '0.160001'
},
{
'date' => '2015-06-04T11:07:02',
'version' => '0.160002'
},
{
'date' => '2015-06-06T09:11:43',
'version' => '0.160003'
},
{
'date' => '2015-07-08T13:04:02',
'version' => '0.161000'
},
{
'date' => '2015-08-28T13:32:02',
'version' => '0.161000_01'
},
{
'date' => '2015-09-06T11:13:10',
'version' => '0.162000'
},
{
'date' => '2015-10-13T15:08:16',
'version' => '0.162000_01'
},
{
'date' => '2015-10-15T11:00:10',
'version' => '0.163000'
},
{
'date' => '2015-12-16T22:44:32',
'version' => '0.164000'
},
{
'date' => '2015-12-17T08:23:24',
'version' => '0.165000'
},
{
'date' => '2016-01-12T18:04:57',
'version' => '0.166000'
},
{
'date' => '2016-01-22T06:57:11',
'version' => '0.166001'
},
{
'date' => '2016-04-19T19:52:27',
'version' => '0.166001_01'
},
{
'date' => '2016-04-29T14:45:41',
'version' => '0.166001_02'
},
{
'date' => '2016-05-27T11:25:55',
'version' => '0.166001_03'
},
{
'date' => '2016-05-27T12:57:04',
'version' => '0.166001_04'
},
{
'date' => '2016-05-31T13:29:37',
'version' => '0.200000'
},
{
'date' => '2016-06-16T14:00:23',
'version' => '0.200001'
},
{
'date' => '2016-06-22T14:41:29',
'version' => '0.200002'
},
{
'date' => '2016-07-05T19:36:46',
'version' => '0.200003'
},
{
'date' => '2016-07-11T15:21:33',
'version' => '0.200003'
},
{
'date' => '2016-07-22T04:41:26',
'version' => '0.200004'
},
{
'date' => '2016-07-22T13:28:45',
'version' => '0.201000'
},
{
'date' => '2016-08-13T18:53:07',
'version' => '0.202000'
},
{
'date' => '2016-08-25T03:12:19',
'version' => '0.203000'
},
{
'date' => '2016-09-04T02:01:29',
'version' => '0.203001'
},
{
'date' => '2016-10-11T01:59:49',
'version' => '0.204000'
},
{
'date' => '2016-10-17T13:32:25',
'version' => '0.204001'
},
{
'date' => '2016-12-21T21:47:24',
'version' => '0.204002'
},
{
'date' => '2017-01-25T21:23:22',
'version' => '0.204003'
},
{
'date' => '2017-01-26T17:31:30',
'version' => '0.204004'
},
{
'date' => '2017-03-10T21:40:43',
'version' => '0.205000'
},
{
'date' => '2017-07-11T13:04:56',
'version' => '0.205001'
},
{
'date' => '2017-10-17T21:10:03',
'version' => '0.205002'
},
{
'date' => '2018-04-09T00:54:25',
'version' => '0.206000_01'
},
{
'date' => '2018-04-10T01:50:18',
'version' => '0.206000_02'
},
{
'date' => '2018-04-20T02:12:22',
'version' => '0.206000'
},
{
'date' => '2018-11-14T22:26:15',
'version' => '0.207000'
},
{
'date' => '2019-06-19T14:23:06',
'version' => '0.208000'
},
{
'date' => '2019-08-05T01:12:14',
'version' => '0.208001'
},
{
'date' => '2019-12-14T21:13:32',
'version' => '0.208002'
},
{
'date' => '2019-12-24T05:57:09',
'version' => '0.300000'
},
{
'date' => '2020-04-06T16:18:33',
'version' => '0.300001'
},
{
'date' => '2020-04-07T15:49:22',
'version' => '0.300002'
},
{
'date' => '2020-04-09T14:42:55',
'version' => '0.300003'
},
{
'date' => '2020-05-27T00:54:55',
'version' => '0.300004'
},
{
'date' => '2021-01-26T20:59:33',
'version' => '0.300005'
},
{
'date' => '2021-03-15T23:12:49',
'version' => '0.301000'
},
{
'date' => '2021-03-17T12:56:09',
'version' => '0.301001'
},
{
'date' => '2021-04-18T19:33:05',
'version' => '0.301002'
},
{
'date' => '2021-06-03T13:29:26',
'version' => '0.301003'
},
{
'date' => '2021-06-06T17:32:08',
'version' => '0.301004'
},
{
'date' => '2022-03-14T02:18:12',
'version' => '0.400000'
},
{
'date' => '2023-02-05T23:42:54',
'version' => '0.400001'
},
{
'date' => '2023-10-09T14:11:25',
'version' => '1.0.0'
},
{
'date' => '2023-12-12T01:29:05',
'version' => '1.1.0'
},
{
'date' => '2024-07-18T23:49:14',
'version' => '1.1.1'
},
{
'date' => '2024-11-25T13:36:09',
'version' => '1.1.2'
}
]
},
'Data-Dumper' => {
'advisories' => [
{
'affected_versions' => [
'<2.154'
],
'cves' => [
'CVE-2014-4330'
],
'description' => 'Infinite recursion.
',
'distribution' => 'Data-Dumper',
'fixed_versions' => [
'>=2.154'
],
'id' => 'CPANSA-Data-Dumper-2014-01',
'references' => [
'https://metacpan.org/changes/distribution/Data-Dumper'
],
'reported' => '2014-09-30'
}
],
'main_module' => 'Data::Dumper',
'versions' => [
{
'date' => '1995-11-19T22:29:08',
'version' => '1.21'
},
{
'date' => '1995-11-23T05:45:27',
'version' => '1.22'
},
{
'date' => '1995-12-04T03:12:16',
'version' => '1.23'
},
{
'date' => '1996-04-09T15:54:26',
'version' => '2.00'
},
{
'date' => '1996-04-10T04:25:17',
'version' => '2.01'
},
{
'date' => '1996-04-13T07:14:35',
'version' => '2.02'
},
{
'date' => '1996-08-26T14:36:59',
'version' => '2.03'
},
{
'date' => '1996-08-28T20:11:49',
'version' => '2.04'
},
{
'date' => '1996-12-02T13:42:49',
'version' => '2.05'
},
{
'date' => '1996-12-02T23:07:56',
'version' => '2.06'
},
{
'date' => '1996-12-07T17:28:27',
'version' => '2.07'
},
{
'date' => '1997-12-07T21:27:09',
'version' => '2.08'
},
{
'date' => '1998-01-15T20:36:46',
'version' => '2.081'
},
{
'date' => '1998-03-06T21:08:49',
'version' => '2.081'
},
{
'date' => '1998-07-17T05:23:08',
'version' => '2.09'
},
{
'date' => '1998-07-21T12:08:19',
'version' => '2.09'
},
{
'date' => '1998-10-31T12:10:30',
'version' => '2.10'
},
{
'date' => '1999-05-01T02:01:03',
'version' => '2.101'
},
{
'date' => '1999-06-02T01:30:55',
'version' => '2.101'
},
{
'date' => '2003-07-20T16:59:48',
'version' => '2.12_01'
},
{
'date' => '2003-07-31T19:12:44',
'version' => '2.12_02'
},
{
'date' => '2003-08-25T11:49:41',
'version' => '2.121'
},
{
'date' => '2009-06-06T14:45:36',
'version' => '2.121_20'
},
{
'date' => '2009-06-09T15:49:12',
'version' => '2.122'
},
{
'date' => '2009-06-11T08:07:01',
'version' => '2.123'
},
{
'date' => '2009-06-13T15:22:32',
'version' => '2.124'
},
{
'date' => '2009-08-08T10:33:01',
'version' => '2.125'
},
{
'date' => '2010-04-15T19:55:01',
'version' => '2.126'
},
{
'date' => '2010-09-06T14:28:10',
'version' => '2.126_01'
},
{
'date' => '2010-09-10T07:08:41',
'version' => '2.127'
},
{
'date' => '2010-09-10T07:11:52',
'version' => '2.128'
},
{
'date' => '2011-05-20T15:53:12',
'version' => '2.130_03'
},
{
'date' => '2011-05-27T14:19:03',
'version' => '2.131'
},
{
'date' => '2011-12-19T08:23:05',
'version' => '2.135_01'
},
{
'date' => '2011-12-29T17:09:49',
'version' => '2.135_02'
},
{
'date' => '2012-08-07T06:59:51',
'version' => '2.135_07'
},
{
'date' => '2012-10-04T07:35:07',
'version' => '2.136'
},
{
'date' => '2012-12-12T06:30:48',
'version' => '2.139'
},
{
'date' => '2013-02-26T06:57:29',
'version' => '2.143'
},
{
'date' => '2013-03-15T09:46:49',
'version' => '2.145'
},
{
'date' => '2014-03-07T09:28:44',
'version' => '2.151'
},
{
'date' => '2014-09-18T15:47:37',
'version' => '2.154'
},
{
'date' => '2016-07-03T19:17:57',
'version' => '2.160'
},
{
'date' => '2016-07-11T20:13:06',
'version' => '2.161'
},
{
'date' => '2017-07-31T15:31:28',
'version' => '2.167_01'
},
{
'date' => '2017-08-04T08:05:22',
'version' => '2.167_02'
},
{
'date' => '2018-09-19T14:41:58',
'version' => '2.172'
},
{
'date' => '2018-11-10T10:10:30',
'version' => '2.173'
},
{
'date' => '2021-05-14T12:47:34',
'version' => '2.179_50'
},
{
'date' => '2021-05-17T05:53:02',
'version' => '2.180'
},
{
'date' => '2021-05-22T09:51:29',
'version' => '2.180_50'
},
{
'date' => '2021-05-23T14:14:12',
'version' => '2.180_51'
},
{
'date' => '2021-05-24T08:03:55',
'version' => '2.180_52'
},
{
'date' => '2021-05-25T05:20:34',
'version' => '2.180_53'
},
{
'date' => '2021-05-26T06:46:41',
'version' => '2.181'
},
{
'date' => '2021-06-29T10:42:11',
'version' => '2.181_50'
},
{
'date' => '2021-06-30T09:36:34',
'version' => '2.182'
},
{
'date' => '2021-07-01T07:05:45',
'version' => '2.182_50'
},
{
'date' => '2021-07-03T13:07:49',
'version' => '2.182_51'
},
{
'date' => '2021-07-05T07:07:44',
'version' => '2.183'
}
]
},
'Data-FormValidator' => {
'advisories' => [
{
'affected_versions' => [
'<=4.66'
],
'cves' => [
'CVE-2011-2201'
],
'description' => 'The Data::FormValidator module 4.66 and earlier for Perl, when untaint_all_constraints is enabled, does not properly preserve the taint attribute of data, which might allow remote attackers to bypass the taint protection mechanism via form input.
',
'distribution' => 'Data-FormValidator',
'fixed_versions' => [
'>4.66'
],
'id' => 'CPANSA-Data-FormValidator-2011-2201',
'references' => [
'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629511',
'http://www.openwall.com/lists/oss-security/2011/06/13/13',
'https://bugzilla.redhat.com/show_bug.cgi?id=712694',
'http://www.openwall.com/lists/oss-security/2011/06/12/3',
'http://www.securityfocus.com/bid/48167',
'https://rt.cpan.org/Public/Bug/Display.html?id=61792',
'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065416.html',
'http://www.openwall.com/lists/oss-security/2011/06/13/5'
],
'reported' => '2011-09-14',
'severity' => undef
}
],
'main_module' => 'Data::FormValidator',
'versions' => [
{
'date' => '2001-06-19T21:43:01',
'version' => '1.3'
},
{
'date' => '2001-06-22T16:36:08',
'version' => '1.4'
},
{
'date' => '2001-06-25T17:02:43',
'version' => '1.4'
},
{
'date' => '2001-06-28T15:13:01',
'version' => '1.5'
},
{
'date' => '2001-07-18T14:23:17',
'version' => 'v1.5.1'
},
{
'date' => '2001-09-23T22:42:22',
'version' => '1.6'
},
{
'date' => '2001-11-03T18:16:00',
'version' => '1.7'
},
{
'date' => '2002-02-14T22:45:46',
'version' => '1.8'
},
{
'date' => '2002-02-18T02:20:12',
'version' => '1.9'
},
{
'date' => '2002-04-21T13:42:36',
'version' => '1.10'
},
{
'date' => '2002-06-29T21:04:14',
'version' => '1.11'
},
{
'date' => '2002-10-07T02:06:39',
'version' => '1.91'
},
{
'date' => '2002-12-23T23:36:37',
'version' => '1.92'
},
{
'date' => '2003-03-08T13:10:33',
'version' => '1.93'
},
{
'date' => '2003-03-23T03:01:57',
'version' => '2.00'
},
{
'date' => '2003-04-02T15:18:15',
'version' => '2.01'
},
{
'date' => '2003-04-09T15:54:50',
'version' => '2.02'
},
{
'date' => '2003-04-10T16:12:40',
'version' => '2.03'
},
{
'date' => '2003-04-12T02:58:35',
'version' => '2.04'
},
{
'date' => '2003-04-20T22:23:44',
'version' => '2.10'
},
{
'date' => '2003-04-24T02:51:03',
'version' => '2.10'
},
{
'date' => '2003-05-11T21:29:55',
'version' => '3.00'
},
{
'date' => '2003-05-16T04:06:05',
'version' => '3.01'
},
{
'date' => '2003-05-26T23:18:18',
'version' => '3.1'
},
{
'date' => '2003-05-27T19:41:01',
'version' => '3.11'
},
{
'date' => '2003-06-23T01:27:03',
'version' => '3.12'
},
{
'date' => '2003-11-02T21:19:10',
'version' => '3.13'
},
{
'date' => '2003-11-03T17:59:41',
'version' => '3.14'
},
{
'date' => '2003-11-30T20:36:41',
'version' => '3.15'
},
{
'date' => '2004-01-04T01:37:01',
'version' => '3.49_1'
},
{
'date' => '2004-01-12T22:04:27',
'version' => '3.50'
},
{
'date' => '2004-02-27T04:19:47',
'version' => '3.51'
},
{
'date' => '2004-03-21T17:42:11',
'version' => '3.52'
},
{
'date' => '2004-03-23T02:33:53',
'version' => '3.53'
},
{
'date' => '2004-03-24T14:55:49',
'version' => '3.54'
},
{
'date' => '2004-04-17T02:30:02',
'version' => '3.56'
},
{
'date' => '2004-04-22T02:26:41',
'version' => '3.57'
},
{
'date' => '2004-05-05T21:55:00',
'version' => '3.58'
},
{
'date' => '2004-07-02T17:48:51',
'version' => '3.59'
},
{
'date' => '2004-09-28T02:25:35',
'version' => '3.61'
},
{
'date' => '2004-10-09T04:00:51',
'version' => '3.62'
},
{
'date' => '2004-11-17T22:27:13',
'version' => '3.63'
},
{
'date' => '2005-05-20T01:25:45',
'version' => '4.00_01'
},
{
'date' => '2005-07-03T19:37:11',
'version' => '4.00_02'
},
{
'date' => '2005-07-20T02:07:36',
'version' => '3.70'
},
{
'date' => '2005-07-31T17:36:02',
'version' => '3.71'
},
{
'date' => '2005-08-14T16:09:26',
'version' => '4.00'
},
{
'date' => '2005-08-20T18:20:14',
'version' => '4.01'
},
{
'date' => '2005-09-01T02:31:29',
'version' => '4.02'
},
{
'date' => '2005-12-23T01:00:49',
'version' => '4.10'
},
{
'date' => '2006-01-03T23:49:53',
'version' => '4.11'
},
{
'date' => '2006-01-06T02:14:25',
'version' => '4.12'
},
{
'date' => '2006-02-10T02:48:33',
'version' => '4.13'
},
{
'date' => '2006-02-17T18:48:14',
'version' => '4.14'
},
{
'date' => '2006-06-13T01:12:23',
'version' => '4.20'
},
{
'date' => '2006-07-01T15:42:37',
'version' => '4.21_01'
},
{
'date' => '2006-07-11T01:45:51',
'version' => '4.30'
},
{
'date' => '2006-08-21T23:43:58',
'version' => '4.40'
},
{
'date' => '2006-10-03T18:16:57',
'version' => '4.49_1'
},
{
'date' => '2006-12-05T02:41:19',
'version' => '4.50'
},
{
'date' => '2007-07-14T03:36:00',
'version' => '4.51'
},
{
'date' => '2007-10-19T19:41:46',
'version' => '4.52'
},
{
'date' => '2007-10-20T20:02:19',
'version' => '4.50'
},
{
'date' => '2007-10-21T13:30:20',
'version' => '4.54'
},
{
'date' => '2007-10-21T15:50:42',
'version' => '4.55'
},
{
'date' => '2007-10-31T16:49:55',
'version' => '4.56'
},
{
'date' => '2007-11-02T02:55:19',
'version' => '4.57'
},
{
'date' => '2008-06-16T18:28:54',
'version' => '4.60'
},
{
'date' => '2008-06-16T18:46:47',
'version' => '4.61'
},
{
'date' => '2009-01-03T17:14:18',
'version' => '4.62'
},
{
'date' => '2009-01-03T17:49:48',
'version' => '4.63'
},
{
'date' => '2009-12-31T03:22:00',
'version' => '4.65'
},
{
'date' => '2010-02-24T14:33:48',
'version' => '4.66'
},
{
'date' => '2011-11-12T02:18:45',
'version' => '4.67'
},
{
'date' => '2011-11-12T03:11:55',
'version' => '4.70'
},
{
'date' => '2012-10-02T20:40:09',
'version' => '4.71'
},
{
'date' => '2012-11-01T15:14:05',
'version' => '4.80'
},
{
'date' => '2013-07-19T12:31:06',
'version' => '4.81'
},
{
'date' => '2017-02-23T15:15:37',
'version' => '4.82'
},
{
'date' => '2017-02-23T16:39:53',
'version' => '4.83'
},
{
'date' => '2017-02-25T15:12:25',
'version' => '4.84'
},
{
'date' => '2017-02-25T20:34:08',
'version' => '4.85'
},
{
'date' => '2017-03-26T19:39:49',
'version' => '4.86'
},
{
'date' => '2017-08-28T12:41:42',
'version' => '4.88'
}
]
},
'Data-UUID' => {
'advisories' => [
{
'affected_versions' => [
'>1.219,<1.227'
],
'cves' => [
'CVE-2013-4184'
],
'description' => 'Perl module Data::UUID from CPAN version 1.219 vulnerable to symlink attacks
',
'distribution' => 'Data-UUID',
'fixed_versions' => [
'>=1.227'
],
'id' => 'CPANSA-Data-UUID-2013-4184',
'references' => [
'https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-4184',
'http://www.openwall.com/lists/oss-security/2013/07/31/4',
'http://www.securityfocus.com/bid/61534',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/86103',
'https://security-tracker.debian.org/tracker/CVE-2013-4184',
'https://access.redhat.com/security/cve/cve-2013-4184',
'https://bugs.gentoo.org/show_bug.cgi?id=CVE-2013-4184'
],
'reported' => '2019-12-10',
'severity' => 'medium'
}
],
'main_module' => 'Data::UUID',
'versions' => [
{
'date' => '2001-10-30T17:35:43',
'version' => '0.01'
},
{
'date' => '2001-10-31T17:16:07',
'version' => '0.02'
},
{
'date' => '2001-11-05T17:56:17',
'version' => '0.03'
},
{
'date' => '2001-12-12T21:23:28',
'version' => '0.04'
},
{
'date' => '2002-02-13T19:57:54',
'version' => '0.05'
},
{
'date' => '2002-03-11T15:42:56',
'version' => '0.06'
},
{
'date' => '2002-06-12T21:38:06',
'version' => '0.07'
},
{
'date' => '2002-11-29T17:19:21',
'version' => '0.08'
},
{
'date' => '2003-02-26T21:56:46',
'version' => '0.09'
},
{
'date' => '2003-07-17T21:55:38',
'version' => '0.10'
},
{
'date' => '2003-08-27T20:17:10',
'version' => '0.11'
},
{
'date' => '2006-02-24T00:44:57',
'version' => '0.12_01'
},
{
'date' => '2006-02-25T20:45:33',
'version' => '0.13'
},
{
'date' => '2006-03-18T13:42:09',
'version' => '0.14'
},
{
'date' => '2006-09-06T02:19:07',
'version' => '0.141'
},
{
'date' => '2006-09-06T02:46:59',
'version' => '0.142'
},
{
'date' => '2006-09-18T02:16:47',
'version' => '0.143'
},
{
'date' => '2006-09-19T22:29:33',
'version' => '0.145'
},
{
'date' => '2006-11-15T01:22:33',
'version' => '0.146'
},
{
'date' => '2006-11-16T14:16:50',
'version' => '0.147_01'
},
{
'date' => '2006-11-16T15:25:08',
'version' => '0.148'
},
{
'date' => '2007-03-08T16:05:15',
'version' => '1.148'
},
{
'date' => '2008-11-01T16:36:57',
'version' => '1.149'
},
{
'date' => '2008-11-02T03:21:27',
'version' => '1.200_01'
},
{
'date' => '2008-11-11T21:40:52',
'version' => '1.200_02'
},
{
'date' => '2009-04-18T18:12:28',
'version' => '1.201'
},
{
'date' => '2009-06-15T22:47:18',
'version' => '1.202'
},
{
'date' => '2009-11-03T21:49:20',
'version' => '1.203'
},
{
'date' => '2010-05-07T01:57:28',
'version' => '1.210'
},
{
'date' => '2010-05-07T12:00:52',
'version' => '1.211'
},
{
'date' => '2010-05-07T22:59:24',
'version' => '1.212'
},
{
'date' => '2010-05-09T19:29:59',
'version' => '1.213'
},
{
'date' => '2010-05-15T01:06:55',
'version' => '1.214'
},
{
'date' => '2010-05-25T02:47:15',
'version' => '1.215'
},
{
'date' => '2010-09-04T18:14:56',
'version' => '1.216'
},
{
'date' => '2010-09-14T01:48:04',
'version' => '1.217'
},
{
'date' => '2012-08-01T03:25:46',
'version' => '1.218'
},
{
'date' => '2013-07-07T03:00:13',
'version' => '1.219'
},
{
'date' => '2014-12-16T00:07:05',
'version' => '1.220'
},
{
'date' => '2015-08-10T12:37:32',
'version' => '1.221'
},
{
'date' => '2018-04-29T22:11:17',
'version' => '1.222'
},
{
'date' => '2019-02-25T22:28:34',
'version' => '1.223'
},
{
'date' => '2019-03-02T14:20:33',
'version' => '1.224'
},
{
'date' => '2020-04-12T18:42:29',
'version' => '1.225'
},
{
'date' => '2020-04-12T18:43:57',
'version' => '1.226'
},
{
'date' => '2024-03-18T19:39:28',
'version' => '1.227'
}
]
},
'Data-Validate-IP' => {
'advisories' => [
{
'affected_versions' => [
'<=0.29'
],
'cves' => [
'CVE-2021-29662'
],
'description' => 'The Data::Validate::IP module through 0.29 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.
',
'distribution' => 'Data-Validate-IP',
'fixed_versions' => [
'>0.29'
],
'id' => 'CPANSA-Data-Validate-IP-2021-01',
'references' => [
'https://security.netapp.com/advisory/ntap-20210604-0002/',
'https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/',
'https://github.com/houseabsolute/Data-Validate-IP',
'https://github.com/houseabsolute/Data-Validate-IP/commit/3bba13c819d616514a75e089badd75002fd4f14e',
'https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-018.md',
'https://sick.codes/sick-2021-018/'
],
'reported' => '2021-03-31'
}
],
'main_module' => 'Data::Validate::IP',
'versions' => [
{
'date' => '2005-03-04T16:46:50',
'version' => '0.02'
},
{
'date' => '2005-03-04T20:06:14',
'version' => '0.03'
},
{
'date' => '2005-04-28T15:11:20',
'version' => '0.04'
},
{
'date' => '2007-03-06T19:45:16',
'version' => '0.05'
},
{
'date' => '2007-05-16T16:08:59',
'version' => '0.06'
},
{
'date' => '2007-05-18T02:42:07',
'version' => '0.07'
},
{
'date' => '2007-12-06T18:48:53',
'version' => '0.08'
},
{
'date' => '2009-06-04T17:52:28',
'version' => '0.10'
},
{
'date' => '2010-03-01T19:40:48',
'version' => '0.11'
},
{
'date' => '2010-12-29T21:23:08',
'version' => '0.12'
},
{
'date' => '2011-01-06T14:25:53',
'version' => '0.13'
},
{
'date' => '2011-01-06T14:45:14',
'version' => '0.14'
},
{
'date' => '2013-02-05T00:19:11',
'version' => '0.15'
},
{
'date' => '2013-02-06T15:18:38',
'version' => '0.16'
},
{
'date' => '2013-02-19T15:58:21',
'version' => '0.17'
},
{
'date' => '2013-02-20T00:31:32',
'version' => '0.18'
},
{
'date' => '2013-03-13T15:48:07',
'version' => '0.19'
},
{
'date' => '2013-07-13T19:21:15',
'version' => '0.20'
},
{
'date' => '2013-12-05T21:16:41',
'version' => '0.21'
},
{
'date' => '2013-12-05T22:47:38',
'version' => '0.22'
},
{
'date' => '2014-03-09T16:00:20',
'version' => '0.23'
},
{
'date' => '2014-08-28T16:00:00',
'version' => '0.24'
},
{
'date' => '2016-02-02T16:17:46',
'version' => '0.25'
},
{
'date' => '2016-05-31T17:31:50',
'version' => '0.26'
},
{
'date' => '2016-11-17T18:05:57',
'version' => '0.27'
},
{
'date' => '2021-03-29T17:01:17',
'version' => '0.28'
},
{
'date' => '2021-03-29T17:07:58',
'version' => '0.29'
},
{
'date' => '2021-03-29T21:50:39',
'version' => '0.30'
},
{
'date' => '2022-11-28T18:19:55',
'version' => '0.31'
}
]
},
'Devel-PPPort' => {
'advisories' => [
{
'affected_versions' => [
'<3.41'
],
'cves' => [],
'description' => 'Function croak() takes first parameter printf-like format. Arbitrary string from the variable $@ can cause perl crash when contains one or more \'%\'.
',
'distribution' => 'Devel-PPPort',
'fixed_versions' => [
'>=3.41'
],
'id' => 'CPANSA-Devel-PPPort-2017-01',
'references' => [
'https://metacpan.org/dist/Devel-PPPort/changes',
'https://github.com/Dual-Life/Devel-PPPort/pull/47'
],
'reported' => '2017-02-14',
'severity' => undef
}
],
'main_module' => 'Devel::PPPort',
'versions' => [
{
'date' => '1999-03-01T05:05:50',
'version' => '1.0004'
},
{
'date' => '1999-03-08T02:57:01',
'version' => '1.0005'
},
{
'date' => '1999-03-24T16:17:40',
'version' => '1.0006'
},
{
'date' => '1999-03-29T16:29:09',
'version' => '1.0007'
},
{
'date' => '2004-08-07T14:09:53',
'version' => '2.99_01'
},
{
'date' => '2004-08-08T17:24:46',
'version' => '2.99_02'
},
{
'date' => '2004-08-09T20:40:45',
'version' => '2.99_03'
},
{
'date' => '2004-08-10T21:37:23',
'version' => '2.99_04'
},
{
'date' => '2004-08-10T21:52:34',
'version' => '2.99_05'
},
{
'date' => '2004-08-11T21:14:33',
'version' => '2.99_06'
},
{
'date' => '2004-08-13T11:05:16',
'version' => '2.99_07'
},
{
'date' => '2004-08-16T09:37:21',
'version' => '3.00'
},
{
'date' => '2004-08-17T21:45:21',
'version' => '3.00_01'
},
{
'date' => '2004-08-19T11:23:25',
'version' => '3.00_02'
},
{
'date' => '2004-08-20T13:31:59',
'version' => '3.00_03'
},
{
'date' => '2004-08-23T05:52:31',
'version' => '3.01'
},
{
'date' => '2004-09-08T19:25:27',
'version' => '3.02'
},
{
'date' => '2004-09-08T20:39:17',
'version' => '3.03'
},
{
'date' => '2004-12-29T14:03:53',
'version' => '3.04'
},
{
'date' => '2005-01-31T18:29:11',
'version' => '3.05'
},
{
'date' => '2005-02-02T21:53:39',
'version' => '3.06'
},
{
'date' => '2005-06-25T16:59:34',
'version' => '3.06_01'
},
{
'date' => '2005-10-18T19:59:34',
'version' => '3.06_02'
},
{
'date' => '2005-10-18T21:43:58',
'version' => '3.06_03'
},
{
'date' => '2005-10-30T11:10:01',
'version' => '3.06_04'
},
{
'date' => '2006-01-16T18:10:31',
'version' => '3.07'
},
{
'date' => '2006-01-19T18:40:04',
'version' => '3.08'
},
{
'date' => '2006-05-20T11:11:00',
'version' => '3.08_01'
},
{
'date' => '2006-05-22T11:17:01',
'version' => '3.08_02'
},
{
'date' => '2006-05-25T15:33:51',
'version' => '3.08_03'
},
{
'date' => '2006-05-29T17:44:18',
'version' => '3.08_04'
},
{
'date' => '2006-06-23T19:00:30',
'version' => '3.08_05'
},
{
'date' => '2006-06-25T08:09:51',
'version' => '3.08_06'
},
{
'date' => '2006-07-03T21:36:39',
'version' => '3.08_07'
},
{
'date' => '2006-07-08T16:22:49',
'version' => '3.09'
},
{
'date' => '2006-07-21T17:25:17',
'version' => '3.09_01'
},
{
'date' => '2006-07-25T18:45:27',
'version' => '3.09_02'
},
{
'date' => '2006-08-14T19:31:33',
'version' => '3.10'
},
{
'date' => '2006-12-02T16:26:47',
'version' => '3.10_01'
},
{
'date' => '2006-12-02T17:23:57',
'version' => '3.10_02'
},
{
'date' => '2007-02-14T13:10:03',
'version' => '3.11'
},
{
'date' => '2007-03-23T17:09:16',
'version' => '3.11_01'
},
{
'date' => '2007-08-12T23:08:25',
'version' => '3.11_02'
},
{
'date' => '2007-08-14T19:14:20',
'version' => '3.11_03'
},
{
'date' => '2007-08-20T16:31:23',
'version' => '3.11_04'
},
{
'date' => '2007-08-20T17:29:16',
'version' => '3.11_05'
},
{
'date' => '2007-09-11T21:41:31',
'version' => '3.11_06'
},
{
'date' => '2007-09-22T08:00:55',
'version' => '3.12'
},
{
'date' => '2007-10-04T10:33:11',
'version' => '3.13'
},
{
'date' => '2008-01-04T14:09:17',
'version' => '3.13_01'
},
{
'date' => '2008-04-13T13:11:47',
'version' => '3.13_02'
},
{
'date' => '2008-05-13T19:07:49',
'version' => '3.13_03'
},
{
'date' => '2008-06-01T12:08:17',
'version' => '3.14'
},
{
'date' => '2008-07-11T20:42:44',
'version' => '3.14_01'
},
{
'date' => '2008-10-12T19:49:45',
'version' => '3.14_02'
},
{
'date' => '2008-10-21T21:20:59',
'version' => '3.14_03'
},
{
'date' => '2008-10-30T18:55:01',
'version' => '3.14_04'
},
{
'date' => '2008-10-31T07:20:25',
'version' => '3.14_05'
},
{
'date' => '2009-01-18T13:49:22',
'version' => '3.15'
},
{
'date' => '2009-01-23T17:33:31',
'version' => '3.16'
},
{
'date' => '2009-03-15T15:45:38',
'version' => '3.17'
},
{
'date' => '2009-06-12T11:05:52',
'version' => '3.18'
},
{
'date' => '2009-06-12T11:25:31',
'version' => '3.18_01'
},
{
'date' => '2009-06-14T09:59:59',
'version' => '3.19'
},
{
'date' => '2010-02-20T18:48:07',
'version' => '3.19_01'
},
{
'date' => '2010-03-07T12:51:00',
'version' => '3.19_02'
},
{
'date' => '2011-04-13T07:49:49',
'version' => '3.19_03'
},
{
'date' => '2011-09-10T19:32:27',
'version' => '3.20'
},
{
'date' => '2013-08-17T13:27:59',
'version' => '3.21'
},
{
'date' => '2014-03-20T02:17:15',
'version' => '3.22'
},
{
'date' => '2014-04-13T00:04:17',
'version' => '3.23'
},
{
'date' => '2014-05-09T00:15:50',
'version' => '3.24'
},
{
'date' => '2014-12-02T13:08:04',
'version' => '3.25'
},
{
'date' => '2015-01-08T02:42:03',
'version' => '3.26'
},
{
'date' => '2015-01-13T15:02:40',
'version' => '3.27'
},
{
'date' => '2015-01-16T12:33:46',
'version' => '3.28'
},
{
'date' => '2015-03-05T13:22:18',
'version' => '3.29'
},
{
'date' => '2015-03-05T20:29:10',
'version' => '3.30'
},
{
'date' => '2015-03-12T14:27:15',
'version' => '3.31'
},
{
'date' => '2015-09-30T16:31:45',
'version' => '3.32'
},
{
'date' => '2016-05-06T11:01:12',
'version' => '3.32_01'
},
{
'date' => '2016-05-24T13:59:25',
'version' => '3.32_02'
},
{
'date' => '2016-06-03T13:47:32',
'version' => '3.33'
},
{
'date' => '2016-06-12T23:09:20',
'version' => '3.34'
},
{
'date' => '2016-06-17T18:22:04',
'version' => '3.35'
},
{
'date' => '2017-05-14T08:53:44',
'version' => '3.36'
},
{
'date' => '2018-04-21T12:18:05',
'version' => '3.41'
},
{
'date' => '2018-04-21T14:45:37',
'version' => '3.42'
},
{
'date' => '2018-09-19T14:47:44',
'version' => '3.43'
},
{
'date' => '2018-10-12T17:16:24',
'version' => '3.43_04'
},
{
'date' => '2019-02-20T23:05:14',
'version' => '3.44'
},
{
'date' => '2019-03-19T20:55:38',
'version' => '3.45'
},
{
'date' => '2019-04-26T19:50:59',
'version' => '3.46'
},
{
'date' => '2019-04-28T05:30:49',
'version' => '3.47'
},
{
'date' => '2019-04-28T21:43:34',
'version' => '3.48'
},
{
'date' => '2019-04-28T21:57:51',
'version' => '3.48'
},
{
'date' => '2019-04-29T17:48:49',
'version' => '3.49'
},
{
'date' => '2019-04-30T19:05:34',
'version' => '3.50'
},
{
'date' => '2019-04-30T23:09:43',
'version' => '3.51'
},
{
'date' => '2019-05-14T17:18:17',
'version' => '3.52'
},
{
'date' => '2019-06-09T16:13:03',
'version' => '3.52_04'
},
{
'date' => '2019-06-11T07:57:30',
'version' => '3.53_04'
},
{
'date' => '2019-09-28T00:25:55',
'version' => '3.53'
},
{
'date' => '2019-09-28T00:35:17',
'version' => '3.54'
},
{
'date' => '2019-11-07T21:15:22',
'version' => '3.55'
},
{
'date' => '2019-11-25T17:04:32',
'version' => '3.56'
},
{
'date' => '2020-01-31T20:46:51',
'version' => '3.57'
},
{
'date' => '2020-02-10T22:15:17',
'version' => '3.57_01'
},
{
'date' => '2020-03-04T21:32:50',
'version' => '3.57_02'
},
{
'date' => '2020-03-09T20:42:29',
'version' => '3.58'
},
{
'date' => '2020-08-06T22:31:34',
'version' => '3.58_01'
},
{
'date' => '2020-08-10T16:51:52',
'version' => '3.59'
},
{
'date' => '2020-08-11T19:44:32',
'version' => '3.60'
},
{
'date' => '2020-09-30T23:22:16',
'version' => '3.60_01'
},
{
'date' => '2020-10-07T14:59:47',
'version' => '3.60_02'
},
{
'date' => '2020-10-12T23:25:45',
'version' => '3.61'
},
{
'date' => '2020-10-16T20:01:45',
'version' => '3.62'
},
{
'date' => '2021-07-07T00:08:28',
'version' => '3.63'
},
{
'date' => '2022-02-01T18:16:40',
'version' => '3.64'
},
{
'date' => '2022-03-02T22:12:02',
'version' => '3.65'
},
{
'date' => '2022-03-02T22:41:01',
'version' => '3.66'
},
{
'date' => '2022-03-08T19:25:43',
'version' => '3.67'
},
{
'date' => '2022-03-18T22:08:30',
'version' => '3.68'
}
]
},
'Devel-StackTrace' => {
'advisories' => [
{
'affected_versions' => [
'<1.19'
],
'cves' => [
'CVE-2008-3502'
],
'description' => 'Unspecified vulnerability in Best Practical Solutions RT 3.0.0 through 3.6.6 allows remote authenticated users to cause a denial of service (CPU or memory consumption) via unspecified vectors related to the Devel::StackTrace module for Perl.
',
'distribution' => 'Devel-StackTrace',
'fixed_versions' => [
'>=1.19'
],
'id' => 'CPANSA-Devel-StackTrace-2008-3502',
'references' => [
'http://lists.bestpractical.com/pipermail/rt-announce/2008-June/000158.html',
'http://www.securityfocus.com/bid/29925',
'http://secunia.com/advisories/30830',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/43337'
],
'reported' => '2008-08-06',
'severity' => undef
}
],
'main_module' => 'Devel::StackTrace',
'versions' => [
{
'date' => '2000-06-27T19:21:12',
'version' => '0.7'
},
{
'date' => '2000-07-04T16:34:23',
'version' => '0.75'
},
{
'date' => '2000-09-03T02:55:27',
'version' => '0.8'
},
{
'date' => '2000-09-03T04:10:13',
'version' => '0.85'
},
{
'date' => '2001-11-24T06:37:34',
'version' => '0.9'
},
{
'date' => '2002-08-23T09:12:26',
'version' => '1.00'
},
{
'date' => '2002-09-18T16:19:28',
'version' => '1.01'
},
{
'date' => '2002-09-19T22:12:09',
'version' => '1.02'
},
{
'date' => '2003-01-22T20:33:08',
'version' => '1.03'
},
{
'date' => '2003-09-25T19:15:23',
'version' => '1.04'
},
{
'date' => '2004-02-17T20:35:35',
'version' => '1.05'
},
{
'date' => '2004-02-22T00:14:28',
'version' => '1.06'
},
{
'date' => '2004-02-22T00:30:48',
'version' => '1.07'
},
{
'date' => '2004-02-23T15:25:26',
'version' => '1.08'
},
{
'date' => '2004-02-26T22:30:00',
'version' => '1.09'
},
{
'date' => '2004-03-10T21:25:04',
'version' => '1.10'
},
{
'date' => '2004-04-12T05:11:33',
'version' => '1.11'
},
{
'date' => '2005-09-30T05:47:47',
'version' => '1.12'
},
{
'date' => '2006-04-01T04:51:47',
'version' => '1.13'
},
{
'date' => '2007-03-16T15:29:38',
'version' => '1.14'
},
{
'date' => '2007-04-28T20:07:57',
'version' => '1.15'
},
{
'date' => '2008-02-02T06:09:06',
'version' => '1.16'
},
{
'date' => '2008-03-30T17:20:19',
'version' => '1.17'
},
{
'date' => '2008-03-31T14:16:23',
'version' => '1.18'
},
{
'date' => '2008-06-13T18:07:37',
'version' => '1.19'
},
{
'date' => '2008-06-13T23:46:42',
'version' => '1.1901'
},
{
'date' => '2008-07-16T13:20:57',
'version' => '1.1902'
},
{
'date' => '2008-10-26T01:44:25',
'version' => '1.20'
},
{
'date' => '2009-07-02T04:50:03',
'version' => '1.21'
},
{
'date' => '2009-07-15T19:51:37',
'version' => '1.22'
},
{
'date' => '2010-08-28T01:47:36',
'version' => '1.23'
},
{
'date' => '2010-09-03T14:18:22',
'version' => '1.24'
},
{
'date' => '2010-09-06T14:54:15',
'version' => '1.25'
},
{
'date' => '2010-10-15T15:25:58',
'version' => '1.26'
},
{
'date' => '2011-01-16T18:57:01',
'version' => '1.27'
},
{
'date' => '2012-11-16T16:59:05',
'version' => '1.28'
},
{
'date' => '2012-11-16T17:47:00',
'version' => '1.29'
},
{
'date' => '2012-11-20T05:07:49',
'version' => '1.30'
},
{
'date' => '2014-01-16T22:37:16',
'version' => '1.31'
},
{
'date' => '2014-05-05T08:01:10',
'version' => '1.32'
},
{
'date' => '2014-06-26T20:43:33',
'version' => '1.33'
},
{
'date' => '2014-06-26T21:50:12',
'version' => '1.34'
},
{
'date' => '2014-11-01T18:06:29',
'version' => '2.00'
},
{
'date' => '2016-03-02T17:23:15',
'version' => '2.01'
},
{
'date' => '2016-12-07T19:51:47',
'version' => '2.02'
},
{
'date' => '2017-11-18T17:10:57',
'version' => '2.03'
},
{
'date' => '2019-05-24T18:54:07',
'version' => '2.04'
},
{
'date' => '2024-01-08T04:48:56',
'version' => '2.05'
}
]
},
'Dezi' => {
'advisories' => [
{
'affected_versions' => [
'<0.002002'
],
'cves' => [],
'description' => 'Bypassing authentication on the /index URL app with non-idempotent requests to /search URL.
',
'distribution' => 'Dezi',
'fixed_versions' => [
'>=0.002002'
],
'id' => 'CPANSA-Dezi-2012-01',
'references' => [
'https://metacpan.org/changes/distribution/Dezi',
'https://github.com/karpet/Dezi/commit/f1ad292b4dd988d1a38202c804bb7a2a3bcca3c8'
],
'reported' => '2012-09-13'
}
],
'main_module' => 'Dezi',
'versions' => [
{
'date' => '2011-06-22T04:53:57',
'version' => '0.001000'
},
{
'date' => '2011-08-03T02:42:22',
'version' => '0.001001'
},
{
'date' => '2011-09-30T03:35:08',
'version' => '0.001002'
},
{
'date' => '2011-10-23T02:12:02',
'version' => '0.001003'
},
{
'date' => '2012-03-17T02:40:15',
'version' => '0.001004'
},
{
'date' => '2012-07-11T03:20:40',
'version' => '0.001005'
},
{
'date' => '2012-08-18T02:43:23',
'version' => '0.001006'
},
{
'date' => '2012-08-22T03:58:33',
'version' => '0.001007'
},
{
'date' => '2012-09-04T02:05:34',
'version' => '0.001008'
},
{
'date' => '2012-09-12T03:51:13',
'version' => '0.002000'
},
{
'date' => '2012-09-13T01:50:59',
'version' => '0.002001'
},
{
'date' => '2012-09-13T14:10:02',
'version' => '0.002002'
},
{
'date' => '2012-10-16T00:57:46',
'version' => '0.002003'
},
{
'date' => '2012-10-18T03:15:21',
'version' => '0.002004'
},
{
'date' => '2012-12-19T05:25:13',
'version' => '0.002005'
},
{
'date' => '2013-02-03T02:49:07',
'version' => '0.002006'
},
{
'date' => '2013-02-05T15:02:54',
'version' => '0.002007'
},
{
'date' => '2013-02-09T05:37:41',
'version' => '0.002008'
},
{
'date' => '2013-02-13T02:30:33',
'version' => '0.002009'
},
{
'date' => '2013-02-13T04:31:49',
'version' => '0.002010'
},
{
'date' => '2013-11-13T17:08:03',
'version' => '0.002011'
},
{
'date' => '2014-02-27T18:08:30',
'version' => '0.002012'
},
{
'date' => '2014-06-05T06:59:12',
'version' => '0.002998_01'
},
{
'date' => '2014-06-08T04:59:17',
'version' => '0.003000'
},
{
'date' => '2014-07-30T20:40:24',
'version' => '0.004000'
},
{
'date' => '2014-09-02T02:45:00',
'version' => '0.004001'
},
{
'date' => '2015-04-30T22:01:11',
'version' => '0.004002'
},
{
'date' => '2018-05-16T02:24:24',
'version' => '0.004003'
}
]
},
'Digest' => {
'advisories' => [
{
'affected_versions' => [
'<1.17'
],
'cves' => [
'CVE-2011-3597'
],
'description' => 'Eval injection vulnerability in the Digest module before 1.17 for Perl allows context-dependent attackers to execute arbitrary commands via the new constructor.
',
'distribution' => 'Digest',
'fixed_versions' => [
'>=0.17'
],
'id' => 'CPANSA-Digest-2011-3597',
'references' => [
'http://aix.software.ibm.com/aix/efixes/security/perl_advisory2.asc',
'http://www.redhat.com/support/errata/RHSA-2011-1797.html',
'http://www.redhat.com/support/errata/RHSA-2011-1424.html',
'https://bugzilla.redhat.com/show_bug.cgi?id=743010',
'http://www.securityfocus.com/bid/49911',
'http://secunia.com/advisories/46279',
'http://cpansearch.perl.org/src/GAAS/Digest-1.17/Changes',
'http://www.mandriva.com/security/advisories?name=MDVSA-2012:009',
'http://www.mandriva.com/security/advisories?name=MDVSA-2012:008',
'http://secunia.com/advisories/51457',
'http://www.ubuntu.com/usn/USN-1643-1',
'http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735',
'http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705',
'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19446'
],
'reported' => '2012-01-13',
'reviewed_by' => [
{
'date' => '2022-07-05',
'email' => 'rrwo@cpan.org',
'name' => 'Robert Rothenberg'
}
],
'severity' => undef
},
{
'affected_versions' => [
'<1.19'
],
'cves' => [
'CVE-2016-1238'
],
'description' => 'Includes . in @INC which might allow local users to gain privileges via a Trojan horse module under the current working directory.
',
'distribution' => 'Digest',
'fixed_versions' => [
'>=1.19'
],
'id' => 'CPANSA-Digest-2016-1238',
'references' => [
'http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html',
'http://www.securitytracker.com/id/1036440',
'http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab',
'https://rt.perl.org/Public/Bug/Display.html?id=127834',
'http://www.securityfocus.com/bid/92136',
'http://www.debian.org/security/2016/dsa-3628',
'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/',
'https://security.gentoo.org/glsa/201701-75',
'https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E',
'https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html',
'https://security.gentoo.org/glsa/201812-07',
'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html'
],
'reported' => '2016-08-02',
'severity' => 'high'
}
],
'main_module' => 'Digest',
'versions' => [
{
'date' => '2001-03-14T06:33:08',
'version' => '1.00'
},
{
'date' => '2003-01-05T01:23:53',
'version' => '1.01'
},
{
'date' => '2003-01-19T04:35:36',
'version' => '1.02'
},
{
'date' => '2003-11-28T12:29:42',
'version' => '1.03'
},
{
'date' => '2003-11-29T12:08:20',
'version' => '1.04'
},
{
'date' => '2003-12-01T07:58:06',
'version' => '1.05'
},
{
'date' => '2004-04-01T10:55:24',
'version' => '1.06'
},
{
'date' => '2004-04-25T14:39:53',
'version' => '1.07'
},
{
'date' => '2004-04-29T07:56:42',
'version' => '1.08'
},
{
'date' => '2004-11-05T12:20:28',
'version' => '1.09'
},
{
'date' => '2004-11-08T09:41:14',
'version' => '1.10'
},
{
'date' => '2005-09-11T11:14:33',
'version' => '1.11'
},
{
'date' => '2005-09-29T10:20:20',
'version' => '1.12'
},
{
'date' => '2005-10-18T11:59:24',
'version' => '1.13'
},
{
'date' => '2005-11-26T10:10:21',
'version' => '1.14'
},
{
'date' => '2006-03-20T15:18:01',
'version' => '1.15'
},
{
'date' => '2009-06-09T18:58:26',
'version' => '1.16'
},
{
'date' => '2011-10-02T10:14:32',
'version' => '1.17'
},
{
'date' => '2020-10-13T19:16:47',
'version' => '1.18'
},
{
'date' => '2020-10-13T20:02:35',
'version' => '1.19'
},
{
'date' => '2021-08-24T13:51:51',
'version' => '1.20'
}
]
},
'Digest-MD5' => {
'advisories' => [
{
'affected_versions' => [
'<2.25'
],
'cves' => [
'CVE-2002-0703'
],
'description' => 'An interaction between the Perl MD5 module (perl-Digest-MD5) and Perl could produce incorrect MD5 checksums for UTF-8 data, which could prevent a system from properly verifying the integrity of the data.
',
'distribution' => 'Digest-MD5',
'fixed_versions' => [],
'id' => 'CPANSA-Digest-MD5-2002-0703',
'references' => [
'http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-035.php',
'http://www.iss.net/security_center/static/9051.php',
'http://www.securityfocus.com/bid/4716',
'http://rhn.redhat.com/errata/RHSA-2002-081.html'
],
'reported' => '2002-07-26',
'severity' => undef
}
],
'main_module' => 'Digest::MD5',
'versions' => [
{
'date' => '1998-10-23T12:30:56',
'version' => '1.99_53'
},
{
'date' => '1998-10-24T13:58:24',
'version' => '1.99_54'
},
{
'date' => '1998-10-24T22:44:03',
'version' => '1.99_55'
},
{
'date' => '1998-10-24T23:07:15',
'version' => '1.99_56'
},
{
'date' => '1998-10-27T21:09:37',
'version' => '1.99_57'
},
{
'date' => '1998-10-28T14:11:30',
'version' => '1.99_58'
},
{
'date' => '1998-10-28T20:57:10',
'version' => '1.99_59'
},
{
'date' => '1998-10-30T17:23:27',
'version' => '1.99_60'
},
{
'date' => '1998-11-04T22:27:42',
'version' => '2.00'
},
{
'date' => '1998-12-30T04:01:06',
'version' => '2.01'
},
{
'date' => '1999-01-31T16:44:38',
'version' => '2.02'
},
{
'date' => '1999-02-01T20:25:06',
'version' => '2.02'
},
{
'date' => '1999-02-27T21:39:24',
'version' => '2.03'
},
{
'date' => '1999-03-05T21:17:35',
'version' => '2.04'
},
{
'date' => '1999-03-15T10:58:32',
'version' => '2.05'
},
{
'date' => '1999-03-19T05:05:36',
'version' => '2.05'
},
{
'date' => '1999-03-26T13:51:38',
'version' => '2.06'
},
{
'date' => '1999-04-26T09:45:43',
'version' => '2.07'
},
{
'date' => '1999-06-02T13:44:41',
'version' => '2.07'
},
{
'date' => '1999-07-28T10:55:54',
'version' => '2.08'
},
{
'date' => '1999-08-05T23:29:15',
'version' => '2.09'
},
{
'date' => '1999-09-02T12:45:17',
'version' => '2.09'
},
{
'date' => '2000-08-18T08:49:59',
'version' => '2.10'
},
{
'date' => '2000-08-19T17:39:04',
'version' => '2.11'
},
{
'date' => '2000-09-18T15:10:45',
'version' => '2.12'
},
{
'date' => '2001-01-19T06:08:47',
'version' => '2.12'
},
{
'date' => '2001-03-14T05:56:41',
'version' => '2.13'
},
{
'date' => '2001-03-17T04:35:32',
'version' => '2.13'
},
{
'date' => '2001-06-24T07:37:20',
'version' => '2.13'
},
{
'date' => '2001-07-18T13:40:13',
'version' => '2.14'
},
{
'date' => '2001-08-27T17:53:29',
'version' => '2.15'
},
{
'date' => '2001-08-29T06:32:30',
'version' => '2.15'
},
{
'date' => '2001-09-07T05:52:46',
'version' => '2.16'
},
{
'date' => '2002-04-25T17:24:14',
'version' => '2.17'
},
{
'date' => '2002-05-01T23:34:50',
'version' => '2.18'
},
{
'date' => '2002-05-02T03:21:40',
'version' => '2.19'
},
{
'date' => '2002-05-06T05:20:38',
'version' => '2.20'
},
{
'date' => '2002-12-28T05:33:19',
'version' => '2.21'
},
{
'date' => '2003-01-05T01:04:07',
'version' => '2.22'
},
{
'date' => '2003-01-19T04:55:24',
'version' => '2.23'
},
{
'date' => '2003-03-09T15:26:49',
'version' => '2.24'
},
{
'date' => '2003-07-05T05:33:54',
'version' => '2.25'
},
{
'date' => '2003-07-22T06:15:03',
'version' => '2.26'
},
{
'date' => '2003-08-05T06:12:31',
'version' => '2.27'
},
{
'date' => '2003-10-06T13:16:20',
'version' => '2.28'
},
{
'date' => '2003-10-06T17:37:30',
'version' => '2.29'
},
{
'date' => '2003-10-09T09:40:47',
'version' => '2.30'
},
{
'date' => '2003-11-28T13:10:59',
'version' => '2.31'
},
{
'date' => '2003-12-05T10:15:43',
'version' => '2.32'
},
{
'date' => '2003-12-07T10:31:15',
'version' => '2.33'
},
{
'date' => '2005-11-26T10:05:19',
'version' => '2.34'
},
{
'date' => '2005-11-26T11:15:35',
'version' => '2.35'
},
{
'date' => '2005-11-30T13:55:38',
'version' => '2.36'
},
{
'date' => '2008-11-12T09:36:42',
'version' => '2.37'
},
{
'date' => '2008-11-14T13:50:45',
'version' => '2.38'
},
{
'date' => '2009-06-09T20:21:55',
'version' => '2.39'
},
{
'date' => '2010-07-03T14:01:25',
'version' => '2.40'
},
{
'date' => '2010-09-25T22:12:42',
'version' => '2.50'
},
{
'date' => '2010-09-30T19:46:29',
'version' => '2.51'
},
{
'date' => '2012-06-07T22:37:00',
'version' => '2.52'
},
{
'date' => '2013-07-02T17:56:06',
'version' => '2.53'
},
{
'date' => '2015-01-12T21:19:42',
'version' => '2.54'
},
{
'date' => '2016-03-09T21:17:10',
'version' => '2.55'
},
{
'date' => '2020-10-05T17:19:37',
'version' => '2.56'
},
{
'date' => '2020-10-05T17:42:48',
'version' => '2.57'
},
{
'date' => '2020-10-05T21:53:32',
'version' => '2.58'
},
{
'date' => '2023-12-30T21:01:56',
'version' => '2.59'
}
]
},
'Digest-SHA' => {
'advisories' => [
{
'affected_versions' => [
'<5.96'
],
'cves' => [
'CVE-2016-1238'
],
'description' => 'Digest::SHA before 5.96 with perls earlier than v5.26 included the current working directory in the module search path, which could lead to the inadvernant loading of unexpected versions of a module. The current directory was removed from the default module search path in perls from v5.26 and later.
',
'distribution' => 'Digest-SHA',
'fixed_versions' => [
'>=5.96'
],
'id' => 'CPANSA-Digest-SHA-2016-1238',
'references' => [
'https://rt.cpan.org/Public/Bug/Display.html?id=116513',
'https://github.com/advisories/GHSA-hm5v-6984-hfqp',
'https://metacpan.org/release/MSHELOR/Digest-SHA-5.96/diff/MSHELOR/Digest-SHA-5.95',
'https://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html',
'https://lists.debian.org/debian-security-announce/2016/msg00206.html',
'https://security.gentoo.org/glsa/201701-75'
],
'reported' => undef,
'severity' => 'high'
}
],
'main_module' => 'Digest::SHA',
'versions' => [
{
'date' => '2003-10-11T09:45:19',
'version' => '0.9'
},
{
'date' => '2003-10-20T09:50:18',
'version' => '1.0'
},
{
'date' => '2003-10-25T11:31:51',
'version' => '1.01'
},
{
'date' => '2003-11-01T21:22:08',
'version' => '2.0'
},
{
'date' => '2003-11-09T11:06:19',
'version' => '2.1'
},
{
'date' => '2003-11-16T11:08:06',
'version' => '2.2'
},
{
'date' => '2003-11-19T11:54:09',
'version' => '2.3'
},
{
'date' => '2003-11-23T00:52:20',
'version' => '2.4'
},
{
'date' => '2003-11-26T12:32:09',
'version' => '3.0'
},
{
'date' => '2003-11-30T07:47:28',
'version' => 'v4.0.0'
},
{
'date' => '2003-11-30T16:19:28',
'version' => '3.1-alpha1'
},
{
'date' => '2003-12-01T13:27:50',
'version' => '4.0.2'
},
{
'date' => '2003-12-03T11:20:55',
'version' => 'v4.0.3'
},
{
'date' => '2003-12-04T07:54:40',
'version' => 'v4.0.4'
},
{
'date' => '2003-12-06T09:23:46',
'version' => 'v4.0.5'
},
{
'date' => '2003-12-11T11:30:14',
'version' => 'v4.0.6'
},
{
'date' => '2003-12-13T09:30:39',
'version' => 'v4.0.7'
},
{
'date' => '2003-12-19T07:30:18',
'version' => 'v4.0.8'
},
{
'date' => '2003-12-24T10:37:28',
'version' => 'v4.0.9'
},
{
'date' => '2003-12-25T08:13:32',
'version' => 'v4.1.0'
},
{
'date' => '2003-12-28T00:09:30',
'version' => 'v4.2.0'
},
{
'date' => '2004-01-24T08:43:05',
'version' => 'v4.2.1'
},
{
'date' => '2004-02-01T08:52:29',
'version' => 'v4.2.2'
},
{
'date' => '2004-02-07T10:45:32',
'version' => 'v4.3.0'
},
{
'date' => '2004-03-04T10:41:51',
'version' => 'v4.3.1'
},
{
'date' => '2004-04-28T11:30:19',
'version' => '4.3.2'
},
{
'date' => '2004-05-05T07:56:21',
'version' => '4.3.3'
},
{
'date' => '2004-05-14T12:08:55',
'version' => '5.00'
},
{
'date' => '2004-05-21T20:20:18',
'version' => '5.01'
},
{
'date' => '2004-07-29T10:13:58',
'version' => '5.02'
},
{
'date' => '2004-07-31T07:34:46',
'version' => '5.03'
},
{
'date' => '2004-08-06T09:44:08',
'version' => '5.10'
},
{
'date' => '2004-08-15T12:25:38',
'version' => '5.20'
},
{
'date' => '2004-08-23T12:35:36',
'version' => '5.21'
},
{
'date' => '2004-09-08T08:01:56',
'version' => '5.22'
},
{
'date' => '2004-09-10T06:51:39',
'version' => '5.23'
},
{
'date' => '2004-09-12T11:33:41',
'version' => '5.24'
},
{
'date' => '2004-09-13T02:27:16',
'version' => '5.25'
},
{
'date' => '2004-10-10T09:13:00',
'version' => '5.26'
},
{
'date' => '2004-10-24T11:25:48',
'version' => '5.27'
},
{
'date' => '2004-11-17T09:23:50',
'version' => '5.28'
},
{
'date' => '2005-08-15T09:20:59',
'version' => '5.29'
},
{
'date' => '2005-08-21T00:35:30',
'version' => '5.30'
},
{
'date' => '2005-09-05T08:36:39',
'version' => '5.31'
},
{
'date' => '2005-12-02T10:13:07',
'version' => '5.32'
},
{
'date' => '2006-02-03T02:22:56',
'version' => '5.34'
},
{
'date' => '2006-05-08T01:10:50',
'version' => '5.35'
},
{
'date' => '2006-05-08T11:19:00',
'version' => '5.36'
},
{
'date' => '2006-05-15T11:31:17',
'version' => '5.37'
},
{
'date' => '2006-05-25T10:10:52',
'version' => '5.38'
},
{
'date' => '2006-05-28T10:49:11',
'version' => '5.39'
},
{
'date' => '2006-06-02T21:45:07',
'version' => '5.40'
},
{
'date' => '2006-06-03T09:31:44',
'version' => '5.41'
},
{
'date' => '2006-07-24T11:22:26',
'version' => '5.42'
},
{
'date' => '2006-08-05T10:13:57',
'version' => '5.43'
},
{
'date' => '2006-10-14T07:59:30',
'version' => '5.44'
},
{
'date' => '2007-06-26T10:20:05',
'version' => '5.45'
},
{
'date' => '2008-04-09T12:40:29',
'version' => '5.46'
},
{
'date' => '2008-04-30T11:17:26',
'version' => '5.47'
},
{
'date' => '2010-01-05T02:07:18',
'version' => '5.48'
},
{
'date' => '2010-12-12T14:44:43',
'version' => '5.49'
},
{
'date' => '2010-12-14T13:46:10',
'version' => '5.50'
},
{
'date' => '2011-03-03T13:19:38',
'version' => '5.60'
},
{
'date' => '2011-03-09T12:56:01',
'version' => '5.61'
},
{
'date' => '2011-05-14T11:11:34',
'version' => '5.62'
},
{
'date' => '2011-11-08T13:27:54',
'version' => '5.63'
},
{
'date' => '2011-12-14T10:18:37',
'version' => '5.70'
},
{
'date' => '2012-02-29T11:11:59',
'version' => '5.71'
},
{
'date' => '2012-09-25T01:14:59',
'version' => '5.72'
},
{
'date' => '2012-10-31T11:42:32',
'version' => '5.73'
},
{
'date' => '2012-11-24T11:40:47',
'version' => '5.74'
},
{
'date' => '2012-12-10T21:21:06',
'version' => '5.80'
},
{
'date' => '2013-01-14T14:32:22',
'version' => '5.81'
},
{
'date' => '2013-01-24T12:06:14',
'version' => '5.82'
},
{
'date' => '2013-03-04T16:22:03',
'version' => '5.83'
},
{
'date' => '2013-03-10T00:42:51',
'version' => '5.84'
},
{
'date' => '2013-06-26T11:11:56',
'version' => '5.85'
},
{
'date' => '2014-01-30T15:40:50',
'version' => '5.86'
},
{
'date' => '2014-02-18T01:26:20',
'version' => '5.87'
},
{
'date' => '2014-03-17T16:05:33',
'version' => '5.88'
},
{
'date' => '2014-04-19T13:09:10',
'version' => '5.89'
},
{
'date' => '2014-05-07T15:54:15',
'version' => '5.90'
},
{
'date' => '2014-05-16T17:36:12',
'version' => '5.91'
},
{
'date' => '2014-06-01T07:25:04',
'version' => '5.92'
},
{
'date' => '2014-10-26T13:15:37',
'version' => '5.93'
},
{
'date' => '2015-01-10T09:49:55',
'version' => '5.94'
},
{
'date' => '2015-01-10T20:24:40',
'version' => '5.95'
},
{
'date' => '2016-07-28T11:11:53',
'version' => '5.96'
},
{
'date' => '2017-09-06T09:38:45',
'version' => '5.97'
},
{
'date' => '2017-10-04T08:38:13',
'version' => '5.98'
},
{
'date' => '2017-12-09T06:04:13',
'version' => '6.00'
},
{
'date' => '2017-12-25T07:41:55',
'version' => '6.01'
},
{
'date' => '2018-04-20T23:47:19',
'version' => '6.02'
},
{
'date' => '2022-08-08T18:56:41',
'version' => '6.03'
},
{
'date' => '2023-02-25T19:06:34',
'version' => '6.04'
}
]
},
'Dpkg' => {
'advisories' => [
{
'affected_versions' => [
'<1.21.8'
],
'cves' => [
'CVE-2022-1664'
],
'description' => 'Dpkg::Source::Archive in dpkg, the Debian package management system, before version 1.21.8, 1.20.10, 1.19.8, 1.18.26 is prone to a directory traversal vulnerability. When extracting untrusted source packages in v2 and v3 source package formats that include a debian.tar, the in-place extraction can lead to directory traversal situations on specially crafted orig.tar and debian.tar tarballs.
',
'distribution' => 'Dpkg',
'fixed_versions' => [
'>=1.21.8'
],
'id' => 'CPANSA-Dpkg-2022-1664',
'references' => [
'https://lists.debian.org/debian-security-announce/2022/msg00115.html',
'https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=faa4c92debe45412bfcf8a44f26e827800bb24be',
'https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=7a6c03cb34d4a09f35df2f10779cbf1b70a5200b',
'https://lists.debian.org/debian-lts-announce/2022/05/msg00033.html',
'https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=58814cacee39c4ce9e2cd0e3a3b9b57ad437eff5',
'https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=1f23dddc17f69c9598477098c7fb9936e15fa495'
],
'reported' => '2022-05-26',
'severity' => 'critical'
},
{
'affected_versions' => [
'<1.18.24'
],
'cves' => [
'CVE-2017-8283'
],
'description' => 'dpkg-source in dpkg 1.3.0 through 1.18.23 is able to use a non-GNU patch program and does not offer a protection mechanism for blank-indented diff hunks, which allows remote attackers to conduct directory traversal attacks via a crafted Debian source package, as demonstrated by use of dpkg-source on NetBSD.
',
'distribution' => 'Dpkg',
'fixed_versions' => [
'>=1.18.24'
],
'id' => 'CPANSA-Dpkg-2017-8283',
'references' => [
'http://www.openwall.com/lists/oss-security/2017/04/20/2',
'http://www.securityfocus.com/bid/98064'
],
'reported' => '2017-04-26',
'severity' => 'critical'
},
{
'affected_versions' => [
'<1.18.11'
],
'cves' => [
'CVE-2016-1238'
],
'description' => '(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.
',
'distribution' => 'Dpkg',
'fixed_versions' => [
'>=1.18.11'
],
'id' => 'CPANSA-Dpkg-2016-1238',
'references' => [
'http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html',
'http://www.securitytracker.com/id/1036440',
'http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab',
'https://rt.perl.org/Public/Bug/Display.html?id=127834',
'http://www.securityfocus.com/bid/92136',
'http://www.debian.org/security/2016/dsa-3628',
'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/',
'https://security.gentoo.org/glsa/201701-75',
'https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E',
'https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html',
'https://security.gentoo.org/glsa/201812-07',
'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html'
],
'reported' => '2016-08-02',
'severity' => 'high'
},
{
'affected_versions' => [
'<1.18.4'
],
'cves' => [
'CVE-2015-0860'
],
'description' => 'Off-by-one error in the extracthalf function in dpkg-deb/extract.c in the dpkg-deb component in Debian dpkg 1.16.x before 1.16.17 and 1.17.x before 1.17.26 allows remote attackers to execute arbitrary code via the archive magic version number in an "old-style" Debian binary package, which triggers a stack-based buffer overflow.
',
'distribution' => 'Dpkg',
'fixed_versions' => [
'>=1.18.4'
],
'id' => 'CPANSA-Dpkg-2015-0860',
'references' => [
'http://www.ubuntu.com/usn/USN-2820-1',
'http://www.debian.org/security/2015/dsa-3407',
'https://blog.fuzzing-project.org/30-Stack-overflows-and-out-of-bounds-read-in-dpkg-Debian.html',
'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798324',
'https://anonscm.debian.org/cgit/dpkg/dpkg.git/commit/dpkg-deb/extract.c?id=e65aa3db04eb908c9507d5d356a95cedb890814d',
'https://security.gentoo.org/glsa/201612-07'
],
'reported' => '2015-12-03',
'severity' => undef
},
{
'affected_versions' => [
'<1.18.0'
],
'cves' => [
'CVE-2015-0840'
],
'description' => 'The dpkg-source command in Debian dpkg before 1.16.16 and 1.17.x before 1.17.25 allows remote attackers to bypass signature verification via a crafted Debian source control file (.dsc).
',
'distribution' => 'Dpkg',
'fixed_versions' => [
'>=1.18.0'
],
'id' => 'CPANSA-Dpkg-2015-0840',
'references' => [
'http://www.ubuntu.com/usn/USN-2566-1',
'http://www.debian.org/security/2015/dsa-3217',
'http://lists.opensuse.org/opensuse-updates/2015-06/msg00029.html',
'http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157387.html'
],
'reported' => '2015-04-13',
'severity' => undef
},
{
'affected_versions' => [
'<1.17.22'
],
'cves' => [
'CVE-2014-8625'
],
'description' => 'Multiple format string vulnerabilities in the parse_error_msg function in parsehelp.c in dpkg before 1.17.22 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in the (1) package or (2) architecture name.
',
'distribution' => 'Dpkg',
'fixed_versions' => [
'>=1.17.22'
],
'id' => 'CPANSA-Dpkg-2014-8625',
'references' => [
'http://seclists.org/oss-sec/2014/q4/539',
'https://bugs.launchpad.net/ubuntu/+source/dpkg/+bug/1389135',
'http://seclists.org/oss-sec/2014/q4/622',
'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768485',
'http://seclists.org/oss-sec/2014/q4/551',
'http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157387.html',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/98551'
],
'reported' => '2015-01-20',
'severity' => undef
},
{
'affected_versions' => [
'<1.17.10'
],
'cves' => [
'CVE-2014-0471'
],
'description' => 'Directory traversal vulnerability in the unpacking functionality in dpkg before 1.15.9, 1.16.x before 1.16.13, and 1.17.x before 1.17.8 allows remote attackers to write arbitrary files via a crafted source package, related to "C-style filename quoting."
',
'distribution' => 'Dpkg',
'fixed_versions' => [
'>=1.17.10'
],
'id' => 'CPANSA-Dpkg-2014-0471',
'references' => [
'http://www.debian.org/security/2014/dsa-2915',
'http://www.ubuntu.com/usn/USN-2183-1',
'http://www.securityfocus.com/bid/67106'
],
'reported' => '2014-04-30',
'severity' => undef
},
{
'affected_versions' => [
'<1.17.10'
],
'cves' => [
'CVE-2014-3127'
],
'description' => 'dpkg 1.15.9 on Debian squeeze introduces support for the "C-style encoded filenames" feature without recognizing that the squeeze patch program lacks this feature, which triggers an interaction error that allows remote attackers to conduct directory traversal attacks and modify files outside of the intended directories via a crafted source package. NOTE: this can be considered a release engineering problem in the effort to fix CVE-2014-0471.
',
'distribution' => 'Dpkg',
'fixed_versions' => [
'>=1.17.10'
],
'id' => 'CPANSA-Dpkg-2014-3127',
'references' => [
'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746306',
'http://www.securityfocus.com/bid/67181',
'http://seclists.org/oss-sec/2014/q2/227',
'http://seclists.org/oss-sec/2014/q2/191',
'http://metadata.ftp-master.debian.org/changelogs//main/d/dpkg/dpkg_1.15.10_changelog'
],
'reported' => '2014-05-14',
'severity' => undef
},
{
'affected_versions' => [
'<1.17.10'
],
'cves' => [
'CVE-2014-3864'
],
'description' => 'Directory traversal vulnerability in dpkg-source in dpkg-dev 1.3.0 allows remote attackers to modify files outside of the intended directories via a crafted source package that lacks a --- header line.
',
'distribution' => 'Dpkg',
'fixed_versions' => [
'>=1.17.10'
],
'id' => 'CPANSA-Dpkg-2014-3864',
'references' => [
'http://openwall.com/lists/oss-security/2014/05/25/2',
'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746498',
'http://www.securityfocus.com/bid/67725',
'http://www.ubuntu.com/usn/USN-2242-1',
'http://www.debian.org/security/2014/dsa-2953'
],
'reported' => '2014-05-30',
'severity' => undef
},
{
'affected_versions' => [
'<1.17.10'
],
'cves' => [
'CVE-2014-3865'
],
'description' => 'Multiple directory traversal vulnerabilities in dpkg-source in dpkg-dev 1.3.0 allow remote attackers to modify files outside of the intended directories via a source package with a crafted Index: pseudo-header in conjunction with (1) missing --- and +++ header lines or (2) a +++ header line with a blank pathname.
',
'distribution' => 'Dpkg',
'fixed_versions' => [
'>=1.17.10'
],
'id' => 'CPANSA-Dpkg-2014-3865',
'references' => [
'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=749183',
'http://openwall.com/lists/oss-security/2014/05/25/2',
'http://www.securityfocus.com/bid/67727',
'http://www.ubuntu.com/usn/USN-2242-1',
'http://www.debian.org/security/2014/dsa-2953'
],
'reported' => '2014-05-30',
'severity' => undef
},
{
'affected_versions' => [
'<1.17.9'
],
'cves' => [
'CVE-2014-0471'
],
'description' => 'Directory traversal vulnerability in the unpacking functionality in dpkg before 1.15.9, 1.16.x before 1.16.13, and 1.17.x before 1.17.8 allows remote attackers to write arbitrary files via a crafted source package, related to "C-style filename quoting."
',
'distribution' => 'Dpkg',
'fixed_versions' => [
'>=1.17.9'
],
'id' => 'CPANSA-Dpkg-2014-0471',
'references' => [
'http://www.debian.org/security/2014/dsa-2915',
'http://www.ubuntu.com/usn/USN-2183-1',
'http://www.securityfocus.com/bid/67106'
],
'reported' => '2014-04-30',
'severity' => undef
},
{
'affected_versions' => [
'<1.17.9'
],
'cves' => [
'CVE-2014-3127'
],
'description' => 'dpkg 1.15.9 on Debian squeeze introduces support for the "C-style encoded filenames" feature without recognizing that the squeeze patch program lacks this feature, which triggers an interaction error that allows remote attackers to conduct directory traversal attacks and modify files outside of the intended directories via a crafted source package. NOTE: this can be considered a release engineering problem in the effort to fix CVE-2014-0471.
',
'distribution' => 'Dpkg',
'fixed_versions' => [
'>=1.17.9'
],
'id' => 'CPANSA-Dpkg-2014-3127',
'references' => [
'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746306',
'http://www.securityfocus.com/bid/67181',
'http://seclists.org/oss-sec/2014/q2/227',
'http://seclists.org/oss-sec/2014/q2/191',
'http://metadata.ftp-master.debian.org/changelogs//main/d/dpkg/dpkg_1.15.10_changelog'
],
'reported' => '2014-05-14',
'severity' => undef
},
{
'affected_versions' => [
'<1.17.8'
],
'cves' => [
'CVE-2014-0471'
],
'description' => 'Directory traversal vulnerability in the unpacking functionality in dpkg before 1.15.9, 1.16.x before 1.16.13, and 1.17.x before 1.17.8 allows remote attackers to write arbitrary files via a crafted source package, related to "C-style filename quoting."
',
'distribution' => 'Dpkg',
'fixed_versions' => [
'>=1.17.8'
],
'id' => 'CPANSA-Dpkg-2014-0471',
'references' => [
'http://www.debian.org/security/2014/dsa-2915',
'http://www.ubuntu.com/usn/USN-2183-1',
'http://www.securityfocus.com/bid/67106'
],
'reported' => '2014-04-30',
'severity' => undef
},
{
'affected_versions' => [
'<1.15.8.8'
],
'cves' => [
'CVE-2010-1679'
],
'description' => 'Directory traversal vulnerability in dpkg-source in dpkg before 1.14.31 and 1.15.x allows user-assisted remote attackers to modify arbitrary files via directory traversal sequences in a patch for a source-format 3.0 package.
',
'distribution' => 'Dpkg',
'fixed_versions' => [
'>=1.15.8.8'
],
'id' => 'CPANSA-Dpkg-2010-1679',
'references' => [
'http://www.vupen.com/english/advisories/2011/0044',
'http://secunia.com/advisories/42831',
'http://secunia.com/advisories/42826',
'http://www.ubuntu.com/usn/USN-1038-1',
'http://www.debian.org/security/2011/dsa-2142',
'http://www.vupen.com/english/advisories/2011/0040',
'http://osvdb.org/70368',
'http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053311.html',
'http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053306.html',
'http://secunia.com/advisories/43054',
'http://www.securityfocus.com/bid/45703',
'http://www.vupen.com/english/advisories/2011/0196',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/64615'
],
'reported' => '2011-01-11',
'severity' => undef
},
{
'affected_versions' => [
'<1.15.6'
],
'cves' => [
'CVE-2010-0396'
],
'description' => 'Directory traversal vulnerability in the dpkg-source component in dpkg before 1.14.29 allows remote attackers to modify arbitrary files via a crafted Debian source archive.
',
'distribution' => 'Dpkg',
'fixed_versions' => [
'>=1.15.6'
],
'id' => 'CPANSA-Dpkg-2010-0396',
'references' => [
'http://www.debian.org/security/2010/dsa-2011',
'http://www.vupen.com/english/advisories/2010/0582',
'http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29.tar.gz',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/56887'
],
'reported' => '2010-03-15',
'severity' => undef
},
{
'affected_versions' => [
'=1.9.21'
],
'cves' => [
'CVE-2004-2768'
],
'description' => 'dpkg 1.9.21 does not properly reset the metadata of a file during replacement of the file in a package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid file, (2) setgid file, or (3) device, a related issue to CVE-2010-2059.
',
'distribution' => 'Dpkg',
'fixed_versions' => [
'>=1.9.22'
],
'id' => 'CPANSA-Dpkg-2004-2768',
'references' => [
'http://www.hackinglinuxexposed.com/articles/20031214.html',
'http://lists.jammed.com/ISN/2003/12/0056.html',
'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=225692',
'https://bugzilla.redhat.com/show_bug.cgi?id=598775',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/59428'
],
'reported' => '2010-06-08',
'severity' => undef
},
{
'affected_versions' => [
'<1.15.10'
],
'cves' => [
'CVE-2011-0402'
],
'description' => 'dpkg-source in dpkg before 1.14.31 and 1.15.x allows user-assisted remote attackers to modify arbitrary files via a symlink attack on unspecified files in the .pc directory.
',
'distribution' => 'Dpkg',
'fixed_versions' => [
'>=1.15.10'
],
'id' => 'CPANSA-Dpkg-2011-0402',
'references' => [
'http://www.ubuntu.com/usn/USN-1038-1',
'http://secunia.com/advisories/42831',
'http://www.debian.org/security/2011/dsa-2142',
'http://secunia.com/advisories/42826',
'http://www.vupen.com/english/advisories/2011/0040',
'http://www.vupen.com/english/advisories/2011/0044',
'http://osvdb.org/70367',
'http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053311.html',
'http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053306.html',
'http://www.vupen.com/english/advisories/2011/0196',
'http://www.securityfocus.com/bid/45703',
'http://secunia.com/advisories/43054',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/64614'
],
'reported' => '2011-01-11',
'severity' => undef
}
],
'main_module' => 'Dpkg',
'versions' => [
{
'date' => '2018-09-26T18:53:52',
'version' => 'v1.19.1'
},
{
'date' => '2018-10-08T10:54:58',
'version' => 'v1.19.2'
},
{
'date' => '2019-01-22T18:41:25',
'version' => 'v1.19.3'
},
{
'date' => '2019-02-23T17:40:31',
'version' => 'v1.19.5'
},
{
'date' => '2019-03-25T14:54:21',
'version' => 'v1.19.6'
},
{
'date' => '2019-06-03T21:51:58',
'version' => 'v1.19.7'
},
{
'date' => '2020-03-08T03:05:24',
'version' => 'v1.20.0'
},
{
'date' => '2020-06-27T01:26:33',
'version' => 'v1.20.1'
},
{
'date' => '2020-06-27T23:35:03',
'version' => 'v1.20.2'
},
{
'date' => '2020-06-29T11:02:10',
'version' => 'v1.20.3'
},
{
'date' => '2020-07-07T06:22:23',
'version' => 'v1.20.4'
},
{
'date' => '2020-07-08T03:55:55',
'version' => 'v1.20.5'
},
{
'date' => '2021-01-08T04:23:50',
'version' => 'v1.20.6'
},
{
'date' => '2021-01-09T00:19:44',
'version' => 'v1.20.7'
},
{
'date' => '2021-04-13T21:44:34',
'version' => 'v1.20.8'
},
{
'date' => '2021-04-13T23:33:15',
'version' => 'v1.20.9'
},
{
'date' => '2021-12-05T18:08:48',
'version' => 'v1.21.0'
},
{
'date' => '2021-12-06T20:23:10',
'version' => 'v1.21.1'
},
{
'date' => '2022-03-13T20:07:04',
'version' => 'v1.21.2'
},
{
'date' => '2022-03-24T20:19:38',
'version' => 'v1.21.3'
},
{
'date' => '2022-03-26T12:56:21',
'version' => 'v1.21.4'
},
{
'date' => '2022-03-29T01:07:10',
'version' => 'v1.21.5'
},
{
'date' => '2022-05-25T15:21:07',
'version' => 'v1.21.8'
},
{
'date' => '2022-07-01T09:48:45',
'version' => 'v1.21.9'
},
{
'date' => '2022-12-01T12:08:26',
'version' => 'v1.21.10'
},
{
'date' => '2022-12-02T23:34:17',
'version' => 'v1.21.11'
},
{
'date' => '2022-12-19T01:27:49',
'version' => 'v1.21.13'
},
{
'date' => '2023-01-01T23:04:24',
'version' => 'v1.21.14'
},
{
'date' => '2023-01-25T22:18:51',
'version' => 'v1.21.19'
},
{
'date' => '2023-05-16T22:34:01',
'version' => 'v1.21.22'
},
{
'date' => '2023-08-30T10:44:22',
'version' => 'v1.22.0'
},
{
'date' => '2023-10-30T03:47:45',
'version' => 'v1.22.1'
},
{
'date' => '2023-12-18T03:09:08',
'version' => 'v1.22.2'
},
{
'date' => '2024-01-24T12:39:35',
'version' => 'v1.22.4'
},
{
'date' => '2024-02-27T03:56:46',
'version' => 'v1.22.5'
},
{
'date' => '2024-03-10T21:52:57',
'version' => 'v1.22.6'
},
{
'date' => '2024-07-16T23:58:08',
'version' => 'v1.22.7'
},
{
'date' => '2024-07-21T18:44:31',
'version' => 'v1.22.8'
},
{
'date' => '2024-08-01T11:07:53',
'version' => 'v1.22.11'
},
{
'date' => '2025-01-02T03:22:30',
'version' => 'v1.22.12'
},
{
'date' => '2025-01-03T11:09:37',
'version' => 'v1.22.13'
}
]
},
'EasyTCP' => {
'advisories' => [
{
'affected_versions' => [
'<0.15'
],
'cves' => [
'CVE-2002-20002'
],
'description' => 'The Net::EasyTCP package before 0.15 for Perl always uses Perl\'s builtin rand(), which is not a strong random number generator, for cryptographic keys.
',
'distribution' => 'EasyTCP',
'fixed_versions' => [
'>=0.,15'
],
'id' => 'CPANSA-EasyTCP-2002-20002',
'references' => [
'https://github.com/briandfoy/cpan-security-advisory/issues/184',
'https://metacpan.org/release/MNAGUIB/EasyTCP-0.15/view/EasyTCP.pm',
'https://metacpan.org/release/MNAGUIB/EasyTCP-0.26/changes'
],
'reported' => '2025-01-02',
'severity' => 'moderate'
},
{
'affected_versions' => [
'>=0.15'
],
'cves' => [
'CVE-2024-56830'
],
'description' => 'The Net::EasyTCP package 0.15 through 0.26 for Perl uses Perl\'s builtin rand() if no strong randomization module is present.
',
'distribution' => 'EasyTCP',
'fixed_versions' => [],
'id' => 'CPANSA-EasyTCP-2024-56830',
'references' => [
'https://github.com/briandfoy/cpan-security-advisory/issues/184',
'https://metacpan.org/release/MNAGUIB/EasyTCP-0.26/changes'
],
'reported' => '2025-01-02',
'severity' => 'moderate'
}
],
'main_module' => 'Net::EasyTCP',
'versions' => [
{
'date' => '2002-01-03T20:21:16',
'version' => '0.01'
},
{
'date' => '2002-01-10T23:58:29',
'version' => '0.02'
},
{
'date' => '2002-01-12T22:23:25',
'version' => '0.03'
},
{
'date' => '2002-01-14T20:13:58',
'version' => '0.04'
},
{
'date' => '2002-01-16T16:30:59',
'version' => '0.05'
},
{
'date' => '2002-01-18T04:48:03',
'version' => '0.06'
},
{
'date' => '2002-01-21T20:26:09',
'version' => '0.07'
},
{
'date' => '2002-01-22T21:08:52',
'version' => '0.08'
},
{
'date' => '2002-01-31T16:33:35',
'version' => '0.09'
},
{
'date' => '2002-02-01T02:09:00',
'version' => '0.10'
},
{
'date' => '2002-02-05T20:35:47',
'version' => '0.11'
},
{
'date' => '2002-02-22T19:51:44',
'version' => '0.12'
},
{
'date' => '2002-03-22T20:47:32',
'version' => '0.13'
},
{
'date' => '2002-09-07T05:21:49',
'version' => '0.14'
},
{
'date' => '2002-09-25T03:02:37',
'version' => '0.15'
},
{
'date' => '2002-09-30T20:20:38',
'version' => '0.16'
},
{
'date' => '2002-11-11T19:38:16',
'version' => '0.17'
},
{
'date' => '2003-02-26T22:15:03',
'version' => '0.18'
},
{
'date' => '2003-03-02T05:47:04',
'version' => '0.19'
},
{
'date' => '2003-05-14T19:40:01',
'version' => '0.20'
},
{
'date' => '2003-05-14T20:22:30',
'version' => '0.21'
},
{
'date' => '2003-05-15T13:10:31',
'version' => '0.22'
},
{
'date' => '2003-05-24T13:19:56',
'version' => '0.23'
},
{
'date' => '2003-07-15T01:11:20',
'version' => '0.24'
},
{
'date' => '2003-08-07T12:19:25',
'version' => '0.25'
},
{
'date' => '2004-04-06T02:50:22',
'version' => '0.26'
}
]
},
'Elive' => {
'advisories' => [
{
'affected_versions' => [
'<1.20'
],
'cves' => [],
'description' => 'Elive::DAO->set() did not die on tainted data.
',
'distribution' => 'Elive',
'fixed_versions' => [
'>=1.20'
],
'id' => 'CPANSA-Elive-2011-01',
'references' => [
'https://metacpan.org/dist/Elive/changes'
],
'reported' => '2011-10-15',
'severity' => undef
}
],
'main_module' => 'Elive',
'versions' => [
{
'date' => '2009-03-17T06:37:43',
'version' => '0.01'
},
{
'date' => '2009-04-13T23:51:59',
'version' => '0.02'
},
{
'date' => '2009-04-14T20:26:27',
'version' => '0.03'
},
{
'date' => '2009-04-15T22:30:08',
'version' => '0.04'
},
{
'date' => '2009-04-17T07:27:23',
'version' => '0.05'
},
{
'date' => '2009-04-17T22:04:55',
'version' => '0.06'
},
{
'date' => '2009-04-22T00:14:13',
'version' => '0.07'
},
{
'date' => '2009-04-22T03:10:13',
'version' => '0.08'
},
{
'date' => '2009-04-24T22:26:35',
'version' => '0.09'
},
{
'date' => '2009-04-28T07:30:45',
'version' => '0.10'
},
{
'date' => '2009-04-29T21:49:12',
'version' => '0.11'
},
{
'date' => '2009-05-01T23:15:47',
'version' => '0.12'
},
{
'date' => '2009-05-04T22:19:09',
'version' => '0.13'
},
{
'date' => '2009-05-05T20:09:18',
'version' => '0.14'
},
{
'date' => '2009-05-08T22:04:14',
'version' => '0.15'
},
{
'date' => '2009-05-11T20:38:56',
'version' => '0.16'
},
{
'date' => '2009-05-13T21:31:52',
'version' => '0.17'
},
{
'date' => '2009-05-15T03:47:36',
'version' => '0.18'
},
{
'date' => '2009-05-18T21:43:03',
'version' => '0.19'
},
{
'date' => '2009-05-24T00:13:36',
'version' => '0.20'
},
{
'date' => '2009-05-24T20:48:19',
'version' => '0.21'
},
{
'date' => '2009-05-27T22:05:37',
'version' => '0.22'
},
{
'date' => '2009-05-29T05:09:57',
'version' => '0.23'
},
{
'date' => '2009-06-03T04:48:43',
'version' => '0.24'
},
{
'date' => '2009-06-03T22:18:02',
'version' => '0.25'
},
{
'date' => '2009-06-12T22:36:31',
'version' => '0.26'
},
{
'date' => '2009-06-19T21:34:40',
'version' => '0.27'
},
{
'date' => '2009-06-22T03:47:43',
'version' => '0.28'
},
{
'date' => '2009-06-24T04:14:37',
'version' => '0.29'
},
{
'date' => '2009-06-26T23:24:47',
'version' => '0.30'
},
{
'date' => '2009-07-03T06:18:23',
'version' => '0.31'
},
{
'date' => '2009-07-17T22:56:55',
'version' => '0.32'
},
{
'date' => '2009-07-22T03:22:18',
'version' => '0.33'
},
{
'date' => '2009-07-28T06:46:45',
'version' => '0.34'
},
{
'date' => '2009-08-02T22:36:31',
'version' => '0.35'
},
{
'date' => '2009-08-03T22:44:25',
'version' => '0.36'
},
{
'date' => '2009-08-05T21:02:32',
'version' => '0.37'
},
{
'date' => '2009-08-21T08:29:37',
'version' => '0.38'
},
{
'date' => '2009-08-31T02:24:45',
'version' => '0.39'
},
{
'date' => '2009-09-10T01:20:54',
'version' => '0.40'
},
{
'date' => '2009-09-11T21:34:13',
'version' => '0.41'
},
{
'date' => '2009-10-08T00:53:22',
'version' => '0.42'
},
{
'date' => '2009-10-20T23:09:46',
'version' => '0.43'
},
{
'date' => '2009-10-22T00:05:22',
'version' => '0.44'
},
{
'date' => '2009-10-26T04:15:36',
'version' => '0.45'
},
{
'date' => '2009-10-28T08:27:27',
'version' => '0.46'
},
{
'date' => '2009-10-28T21:26:06',
'version' => '0.47'
},
{
'date' => '2009-10-29T00:00:43',
'version' => '0.48'
},
{
'date' => '2009-11-02T21:37:24',
'version' => '0.48_01'
},
{
'date' => '2009-11-06T20:36:30',
'version' => '0.49'
},
{
'date' => '2009-11-09T21:34:02',
'version' => '0.50'
},
{
'date' => '2009-11-16T00:26:26',
'version' => '0.51'
},
{
'date' => '2009-11-30T20:38:39',
'version' => '0.52'
},
{
'date' => '2009-12-14T23:14:43',
'version' => '0.53'
},
{
'date' => '2009-12-18T00:24:06',
'version' => '0.53_1'
},
{
'date' => '2009-12-18T22:36:34',
'version' => '0.54'
},
{
'date' => '2009-12-20T20:02:22',
'version' => '0.55'
},
{
'date' => '2010-01-04T06:35:00',
'version' => '0.56'
},
{
'date' => '2010-01-04T21:18:52',
'version' => '0.57'
},
{
'date' => '2010-01-14T00:08:40',
'version' => '0.58'
},
{
'date' => '2010-01-21T22:46:27',
'version' => '0.59'
},
{
'date' => '2010-01-24T21:24:09',
'version' => '0.60'
},
{
'date' => '2010-01-26T22:38:54',
'version' => '0.61'
},
{
'date' => '2010-02-15T23:06:41',
'version' => '0.62'
},
{
'date' => '2010-03-06T22:34:53',
'version' => '0.63'
},
{
'date' => '2010-03-11T22:45:28',
'version' => '0.64'
},
{
'date' => '2010-05-17T00:40:50',
'version' => '0.65'
},
{
'date' => '2010-05-21T23:54:39',
'version' => '0.66'
},
{
'date' => '2010-05-27T22:12:29',
'version' => '0.67'
},
{
'date' => '2010-06-02T07:33:50',
'version' => '0.68'
},
{
'date' => '2010-06-11T00:12:21',
'version' => '0.69'
},
{
'date' => '2010-06-22T05:13:22',
'version' => '0.70'
},
{
'date' => '2010-06-22T22:20:27',
'version' => '0.71'
},
{
'date' => '2010-08-13T01:10:30',
'version' => '0.72'
},
{
'date' => '2010-09-03T03:48:51',
'version' => '0.73'
},
{
'date' => '2010-10-14T20:54:08',
'version' => '0.74_2'
},
{
'date' => '2010-10-18T01:49:41',
'version' => '0.74'
},
{
'date' => '2010-10-27T23:52:59',
'version' => '0.75'
},
{
'date' => '2010-11-09T23:46:08',
'version' => '0.76'
},
{
'date' => '2010-12-08T21:27:13',
'version' => '0.77'
},
{
'date' => '2010-12-08T23:17:00',
'version' => '0.78'
},
{
'date' => '2011-01-20T02:01:43',
'version' => '0.79'
},
{
'date' => '2011-01-27T19:56:34',
'version' => '0.80'
},
{
'date' => '2011-02-03T03:17:09',
'version' => '0.81'
},
{
'date' => '2011-02-10T00:02:08',
'version' => '0.82'
},
{
'date' => '2011-03-10T05:19:08',
'version' => '0.83'
},
{
'date' => '2011-03-11T01:11:39',
'version' => '0.84'
},
{
'date' => '2011-03-14T00:55:18',
'version' => '0.85'
},
{
'date' => '2011-03-14T21:15:08',
'version' => '0.86'
},
{
'date' => '2011-04-11T00:59:22',
'version' => '0.87'
},
{
'date' => '2011-04-11T19:19:42',
'version' => '0.87.1'
},
{
'date' => '2011-04-15T02:12:50',
'version' => '0.87.2'
},
{
'date' => '2011-04-27T02:43:51',
'version' => '0.88'
},
{
'date' => '2011-05-20T00:15:55',
'version' => '0.89'
},
{
'date' => '2011-06-08T23:34:06',
'version' => '0.90'
},
{
'date' => '2011-06-14T23:35:27',
'version' => '0.91'
},
{
'date' => '2011-06-28T07:09:46',
'version' => '0.95'
},
{
'date' => '2011-06-29T21:42:38',
'version' => '0.96'
},
{
'date' => '2011-07-05T06:35:18',
'version' => '0.97'
},
{
'date' => '2011-07-08T00:35:18',
'version' => '0.98'
},
{
'date' => '2011-07-14T03:25:12',
'version' => '0.99'
},
{
'date' => '2011-07-19T00:14:00',
'version' => '1.00'
},
{
'date' => '2011-07-20T01:14:39',
'version' => '1.01'
},
{
'date' => '2011-07-21T05:49:47',
'version' => '1.02'
},
{
'date' => '2011-07-23T23:23:35',
'version' => '1.03'
},
{
'date' => '2011-07-29T00:14:06',
'version' => '1.04'
},
{
'date' => '2011-08-01T02:20:53',
'version' => '1.05'
},
{
'date' => '2011-08-05T21:36:24',
'version' => '1.06'
},
{
'date' => '2011-08-07T01:43:31',
'version' => '1.07'
},
{
'date' => '2011-08-09T00:51:44',
'version' => '1.08'
},
{
'date' => '2011-08-10T05:13:13',
'version' => '1.09'
},
{
'date' => '2011-08-10T21:06:42',
'version' => '1.10'
},
{
'date' => '2011-08-11T22:27:24',
'version' => '1.11'
},
{
'date' => '2011-08-15T00:58:40',
'version' => '1.12'
},
{
'date' => '2011-08-19T00:21:11',
'version' => '1.13'
},
{
'date' => '2011-08-20T22:44:01',
'version' => '1.14'
},
{
'date' => '2011-08-23T21:43:48',
'version' => '1.15'
},
{
'date' => '2011-08-26T22:25:28',
'version' => '1.16'
},
{
'date' => '2011-09-08T22:32:49',
'version' => '1.17'
},
{
'date' => '2011-09-16T00:00:34',
'version' => '1.18'
},
{
'date' => '2011-09-28T07:09:24',
'version' => '1.19'
},
{
'date' => '2011-11-15T01:28:33',
'version' => '1.20'
},
{
'date' => '2011-12-03T01:49:03',
'version' => '1.21'
},
{
'date' => '2012-01-05T04:04:10',
'version' => '1.22'
},
{
'date' => '2012-01-25T20:01:01',
'version' => '1.23'
},
{
'date' => '2012-02-28T01:03:16',
'version' => '1.24'
},
{
'date' => '2012-04-18T04:53:06',
'version' => '1.25'
},
{
'date' => '2012-05-04T04:11:34',
'version' => '1.26'
},
{
'date' => '2012-07-13T21:59:27',
'version' => '1.27'
},
{
'date' => '2012-10-12T02:45:37',
'version' => '1.28'
},
{
'date' => '2012-10-26T21:16:49',
'version' => '1.29'
},
{
'date' => '2013-01-04T01:33:50',
'version' => '1.30'
},
{
'date' => '2013-03-28T02:39:54',
'version' => '1.31'
},
{
'date' => '2014-02-28T16:40:50',
'version' => '1.32'
},
{
'date' => '2015-01-21T21:14:50',
'version' => '1.33'
},
{
'date' => '2015-04-03T22:38:32',
'version' => '1.34'
},
{
'date' => '2015-06-29T02:59:33',
'version' => '1.35'
},
{
'date' => '2015-12-03T20:48:05',
'version' => '1.36'
},
{
'date' => '2015-12-04T02:58:35',
'version' => '1.37'
}
]
},
'Email-Address' => {
'advisories' => [
{
'affected_versions' => [
'<1.905'
],
'cves' => [
'CVE-2014-0477'
],
'description' => 'Inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via an empty quoted string in an RFC 2822 address.
',
'distribution' => 'Email-Address',
'fixed_versions' => [
'>=1.905'
],
'id' => 'CPANSA-Email-Address-2014-01',
'references' => [
'https://metacpan.org/changes/distribution/Email-Address'
],
'reported' => '2014-07-03'
},
{
'affected_versions' => [
'<1.909'
],
'cves' => [
'CVE-2018-12558'
],
'description' => 'The parse() method in the Email::Address module through 1.909 for Perl is vulnerable to Algorithmic complexity on specially prepared input, leading to Denial of Service. Prepared special input that caused this problem contained 30 form-field characters ("\\f").
',
'distribution' => 'Email-Address',
'fixed_versions' => [
'>=1.909'
],
'id' => 'CPANSA-Email-Address-2014-01',
'references' => [
'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901873',
'http://www.openwall.com/lists/oss-security/2018/06/19/3',
'http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00012.html'
],
'reported' => '2018-06-19'
},
{
'affected_versions' => [
'<1.904'
],
'cves' => [
'CVE-2014-4720'
],
'description' => 'Email::Address module before 1.904 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via vectors related to "backtracking into the phrase," a different vulnerability than CVE-2014-0477.
',
'distribution' => 'Email-Address',
'fixed_versions' => [
'>=1.904'
],
'id' => 'CPANSA-Email-Address-2014-4720',
'references' => [
'https://github.com/rjbs/Email-Address/blob/master/Changes',
'http://seclists.org/oss-sec/2014/q2/563'
],
'reported' => '2014-07-06',
'severity' => undef
}
],
'main_module' => 'Email::Address',
'versions' => [
{
'date' => '2004-05-27T03:19:56',
'version' => '1.1'
},
{
'date' => '2004-06-02T16:35:30',
'version' => '1.2'
},
{
'date' => '2004-08-16T21:39:58',
'version' => '1.3'
},
{
'date' => '2004-10-05T18:10:42',
'version' => '1.5'
},
{
'date' => '2004-10-05T18:20:42',
'version' => '1.6'
},
{
'date' => '2004-10-13T10:21:17',
'version' => '1.7'
},
{
'date' => '2004-10-22T16:37:27',
'version' => '1.80'
},
{
'date' => '2006-07-11T15:04:28',
'version' => '1.85'
},
{
'date' => '2006-07-22T00:42:17',
'version' => '1.86'
},
{
'date' => '2006-08-10T16:48:44',
'version' => '1.870'
},
{
'date' => '2006-10-12T19:35:04',
'version' => '1.861'
},
{
'date' => '2006-10-12T22:16:28',
'version' => '1.871'
},
{
'date' => '2006-11-11T16:01:38',
'version' => '1.880'
},
{
'date' => '2006-11-19T21:19:02',
'version' => '1.881'
},
{
'date' => '2006-11-22T01:26:44',
'version' => '1.882'
},
{
'date' => '2006-11-25T13:53:46',
'version' => '1.883'
},
{
'date' => '2006-12-05T03:41:39',
'version' => '1.884'
},
{
'date' => '2007-03-01T01:08:16',
'version' => '1.885'
},
{
'date' => '2007-03-01T20:18:53',
'version' => '1.886'
},
{
'date' => '2007-04-01T19:15:49',
'version' => '1.887'
},
{
'date' => '2007-06-23T01:27:24',
'version' => '1.888'
},
{
'date' => '2007-12-19T22:14:37',
'version' => '1.889'
},
{
'date' => '2010-08-22T19:03:33',
'version' => '1.890'
},
{
'date' => '2010-08-31T00:56:53',
'version' => '1.891'
},
{
'date' => '2010-09-03T23:45:13',
'version' => '1.892'
},
{
'date' => '2012-01-03T03:55:12',
'version' => '1.893'
},
{
'date' => '2012-01-14T16:17:56',
'version' => '1.894'
},
{
'date' => '2012-01-15T18:41:33',
'version' => '1.895'
},
{
'date' => '2012-08-01T03:07:33',
'version' => '1.896'
},
{
'date' => '2012-12-17T15:16:33',
'version' => '1.897'
},
{
'date' => '2013-02-07T21:41:48',
'version' => '1.898'
},
{
'date' => '2013-08-02T14:54:13',
'version' => '1.899'
},
{
'date' => '2013-08-08T18:46:07',
'version' => '1.900'
},
{
'date' => '2014-01-29T03:43:28',
'version' => '1.901'
},
{
'date' => '2014-04-17T15:19:31',
'version' => '1.902'
},
{
'date' => '2014-04-18T01:07:10',
'version' => '1.903'
},
{
'date' => '2014-06-14T04:22:22',
'version' => '1.904'
},
{
'date' => '2014-06-18T02:55:59',
'version' => '1.905'
},
{
'date' => '2015-02-03T21:49:39',
'version' => '1.906'
},
{
'date' => '2015-02-03T22:48:46',
'version' => '1.907'
},
{
'date' => '2015-09-20T02:55:12',
'version' => '1.908'
},
{
'date' => '2018-03-05T03:26:56',
'version' => '1.909'
},
{
'date' => '2018-12-18T02:29:23',
'version' => '1.910'
},
{
'date' => '2018-12-22T16:31:37',
'version' => '1.911'
},
{
'date' => '2018-12-31T19:51:36',
'version' => '1.912'
},
{
'date' => '2023-01-10T00:42:33',
'version' => '1.913'
}
]
},
'Email-MIME' => {
'advisories' => [
{
'affected_versions' => [
'<1.954'
],
'cves' => [
'CVE-2024-4140'
],
'description' => 'An excessive memory use issue (CWE-770) exists in Email-MIME, before version 1.954, which can cause denial of service when parsing multipart MIME messages. The patch set (from 2020 and 2024) limits excessive depth and the total number of parts.
',
'distribution' => 'Email-MIME',
'fixed_versions' => [
'>=1.954'
],
'id' => 'CPANSA-Email-MIME-2024-4140',
'references' => [
'https://bugs.debian.org/960062',
'https://github.com/rjbs/Email-MIME/commit/02bf3e26812c8f38a86a33c168571f9783365df2',
'https://github.com/rjbs/Email-MIME/commit/3a12edd119e493156a5a05e45dd50f4e36b702e8',
'https://github.com/rjbs/Email-MIME/commit/3dcf096eeccb8e4dd42738de676c8f4a5aa7a531',
'https://github.com/rjbs/Email-MIME/commit/7e96ecfa1da44914a407f82ae98ba817bba08f2d',
'https://github.com/rjbs/Email-MIME/commit/b2cb62f19e12580dd235f79e2546d44a6bec54d1',
'https://github.com/rjbs/Email-MIME/commit/fc0fededd24a71ccc51bcd8b1e486385d09aae63',
'https://github.com/rjbs/Email-MIME/issues/66',
'https://github.com/rjbs/Email-MIME/pull/80',
'https://www.cve.org/CVERecord?id=CVE-2024-4140'
],
'reported' => '2024-05-02',
'severity' => undef
}
],
'main_module' => 'Email::MIME',
'versions' => [
{
'date' => '2004-01-23T12:04:54',
'version' => '1.0_01'
},
{
'date' => '2004-03-24T16:01:33',
'version' => '1.1'
},
{
'date' => '2004-04-02T08:52:35',
'version' => '1.2'
},
{
'date' => '2004-04-05T16:27:42',
'version' => '1.3'
},
{
'date' => '2004-07-01T17:38:00',
'version' => '1.4'
},
{
'date' => '2004-07-01T17:40:06',
'version' => '1.5'
},
{
'date' => '2004-07-04T20:17:06',
'version' => '1.6'
},
{
'date' => '2004-07-05T21:56:19',
'version' => '1.7'
},
{
'date' => '2004-08-25T09:58:28',
'version' => '1.8'
},
{
'date' => '2004-10-30T00:19:03',
'version' => '1.81'
},
{
'date' => '2004-11-18T01:02:46',
'version' => '1.82'
},
{
'date' => '2006-07-13T12:09:00',
'version' => '1.85'
},
{
'date' => '2006-08-22T12:15:01',
'version' => '1.851'
},
{
'date' => '2006-09-06T03:22:24',
'version' => '1.852'
},
{
'date' => '2006-10-12T19:23:59',
'version' => '1.853'
},
{
'date' => '2006-10-15T12:57:06',
'version' => '1.854'
},
{
'date' => '2006-10-19T19:26:56',
'version' => '1.855'
},
{
'date' => '2006-11-28T01:54:55',
'version' => '1.856'
},
{
'date' => '2006-11-28T02:45:42',
'version' => '1.857'
},
{
'date' => '2007-02-10T03:53:13',
'version' => '1.858'
},
{
'date' => '2007-03-21T02:13:51',
'version' => '1.859'
},
{
'date' => '2007-07-14T02:17:11',
'version' => '1.860'
},
{
'date' => '2007-11-06T02:03:23',
'version' => '1.861'
},
{
'date' => '2008-09-08T22:24:06',
'version' => '1.861_01'
},
{
'date' => '2009-01-24T03:09:24',
'version' => '1.862'
},
{
'date' => '2009-01-30T13:35:20',
'version' => '1.863'
},
{
'date' => '2009-11-03T20:49:02',
'version' => '1.900'
},
{
'date' => '2009-11-05T19:29:16',
'version' => '1.901'
},
{
'date' => '2009-11-11T20:53:15',
'version' => '1.902'
},
{
'date' => '2009-12-23T14:14:45',
'version' => '1.903'
},
{
'date' => '2010-09-04T22:05:49',
'version' => '1.904'
},
{
'date' => '2010-09-06T13:25:51',
'version' => '1.905'
},
{
'date' => '2010-10-08T01:06:33',
'version' => '1.906'
},
{
'date' => '2011-02-02T22:52:42',
'version' => '1.907'
},
{
'date' => '2011-06-02T03:16:50',
'version' => '1.908'
},
{
'date' => '2011-09-08T19:27:38',
'version' => '1.909'
},
{
'date' => '2011-09-12T16:45:52',
'version' => '1.910'
},
{
'date' => '2012-07-22T23:12:42',
'version' => '1.911'
},
{
'date' => '2013-04-08T19:42:09',
'version' => '1.912_01'
},
{
'date' => '2013-06-17T15:24:37',
'version' => '1.920'
},
{
'date' => '2013-07-02T02:51:36',
'version' => '1.921'
},
{
'date' => '2013-07-10T12:45:29',
'version' => '1.922'
},
{
'date' => '2013-08-09T02:00:30',
'version' => '1.923'
},
{
'date' => '2013-08-11T03:25:40',
'version' => '1.924'
},
{
'date' => '2013-11-08T12:02:21',
'version' => '1.925'
},
{
'date' => '2014-01-29T04:29:29',
'version' => '1.926'
},
{
'date' => '2014-12-04T15:22:49',
'version' => '1.927'
},
{
'date' => '2014-12-16T02:49:06',
'version' => '1.928'
},
{
'date' => '2015-02-17T14:32:33',
'version' => '1.929'
},
{
'date' => '2015-03-26T03:00:09',
'version' => '1.930'
},
{
'date' => '2015-07-12T21:32:56',
'version' => '1.931'
},
{
'date' => '2015-07-25T02:25:32',
'version' => '1.932'
},
{
'date' => '2015-07-25T13:33:07',
'version' => '1.933'
},
{
'date' => '2015-08-02T00:35:40',
'version' => '1.934'
},
{
'date' => '2015-08-31T20:49:57',
'version' => '1.935'
},
{
'date' => '2015-09-11T02:48:33',
'version' => '1.936'
},
{
'date' => '2016-01-28T18:33:58',
'version' => '1.937'
},
{
'date' => '2017-01-02T01:04:29',
'version' => '1.938'
},
{
'date' => '2017-01-14T19:59:46',
'version' => '1.939'
},
{
'date' => '2017-01-29T15:34:49',
'version' => '1.940'
},
{
'date' => '2017-03-05T00:18:30',
'version' => '1.941'
},
{
'date' => '2017-03-05T13:16:39',
'version' => '1.942'
},
{
'date' => '2017-06-09T23:01:41',
'version' => '1.943'
},
{
'date' => '2017-07-25T16:40:42',
'version' => '1.944'
},
{
'date' => '2017-07-25T18:18:48',
'version' => '1.945'
},
{
'date' => '2017-08-31T13:31:14',
'version' => '1.946'
},
{
'date' => '2020-05-09T18:30:39',
'version' => '1.947'
},
{
'date' => '2020-05-09T19:06:22',
'version' => '1.948'
},
{
'date' => '2020-05-24T14:27:02',
'version' => '1.949'
},
{
'date' => '2020-11-03T00:22:52',
'version' => '1.950'
},
{
'date' => '2021-12-14T14:43:29',
'version' => '1.951'
},
{
'date' => '2021-12-14T14:58:13',
'version' => '1.952'
},
{
'date' => '2023-01-09T00:03:49',
'version' => '1.953'
},
{
'date' => '2024-05-02T21:13:55',
'version' => '1.954'
}
]
},
'Encode' => {
'advisories' => [
{
'affected_versions' => [
'<2.85'
],
'cves' => [
'CVE-2016-1238'
],
'description' => 'Loading optional modules from . (current directory).
',
'distribution' => 'Encode',
'fixed_versions' => [
'>=2.85'
],
'id' => 'CPANSA-Encode-2016-01',
'references' => [
'https://metacpan.org/changes/distribution/Encode',
'https://github.com/dankogai/p5-encode/pull/58/commits/12be15d64ce089154c4367dc1842cd0dc0993ec6'
],
'reported' => '2016-07-27',
'severity' => 'high'
},
{
'affected_versions' => [
'>=3.05',
'<=3.11'
],
'cves' => [
'CVE-2021-36770'
],
'description' => 'Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value.
',
'distribution' => 'Encode',
'fixed_versions' => [
'>3.11'
],
'id' => 'CPANSA-Encode-2021-01',
'references' => [
'https://github.com/Perl/perl5/commit/c1a937fef07c061600a0078f4cb53fe9c2136bb9',
'https://github.com/dankogai/p5-encode/commit/527e482dc70b035d0df4f8c77a00d81f8d775c74',
'https://metacpan.org/dist/Encode/changes',
'https://news.cpanel.com/unscheduled-tsr-10-august-2021/',
'https://security.netapp.com/advisory/ntap-20210909-0003/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5NDGQSGMEZ75FJGBKNYC75OTO7TF7XHB/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6KOZYD7BH2DNIAEZ2ZL4PJ4QUVQI6Y33/',
'https://security-tracker.debian.org/tracker/CVE-2021-36770'
],
'reported' => '2021-07-17'
},
{
'affected_versions' => [
'<2.44'
],
'cves' => [
'CVE-2011-2939'
],
'description' => 'Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow.
',
'distribution' => 'Encode',
'fixed_versions' => [
'>=2.44'
],
'id' => 'CPANSA-Encode-2011-2939',
'references' => [
'http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5',
'https://bugzilla.redhat.com/show_bug.cgi?id=731246',
'http://www.openwall.com/lists/oss-security/2011/08/19/17',
'http://www.redhat.com/support/errata/RHSA-2011-1424.html',
'http://www.openwall.com/lists/oss-security/2011/08/18/8',
'http://secunia.com/advisories/46989',
'http://www.mandriva.com/security/advisories?name=MDVSA-2012:008',
'http://secunia.com/advisories/51457',
'http://www.ubuntu.com/usn/USN-1643-1',
'http://www.securityfocus.com/bid/49858',
'http://secunia.com/advisories/46172',
'http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod',
'http://secunia.com/advisories/55314',
'http://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_(CVE-2011-2939)'
],
'reported' => '2012-01-13',
'severity' => undef,
'x-commit' => 'Encode CVE-2011-2939 GitHub #13'
}
],
'main_module' => 'Encode',
'versions' => [
{
'date' => '2002-03-20T08:30:40',
'version' => '0.93'
},
{
'date' => '2002-03-20T20:15:52',
'version' => '0.94'
},
{
'date' => '2002-03-21T16:07:21',
'version' => '0.95'
},
{
'date' => '2002-03-22T22:33:15',
'version' => '0.96'
},
{
'date' => '2002-03-23T20:36:05',
'version' => '0.97'
},
{
'date' => '2002-03-24T16:07:09',
'version' => '0.98'
},
{
'date' => '2002-03-25T19:45:16',
'version' => '0.99'
},
{
'date' => '2002-03-28T23:39:49',
'version' => '1.00'
},
{
'date' => '2002-03-29T21:43:17',
'version' => '1.01'
},
{
'date' => '2002-03-31T21:40:25',
'version' => '1.10'
},
{
'date' => '2002-03-31T22:27:07',
'version' => '1.11'
},
{
'date' => '2002-04-04T20:02:40',
'version' => '1.20'
},
{
'date' => '2002-04-07T15:36:48',
'version' => '1.26'
},
{
'date' => '2002-04-07T18:49:41',
'version' => '1.27'
},
{
'date' => '2002-04-07T19:05:34',
'version' => '1.28'
},
{
'date' => '2002-04-08T02:49:31',
'version' => '1.30'
},
{
'date' => '2002-04-08T18:51:14',
'version' => '1.31'
},
{
'date' => '2002-04-09T20:26:37',
'version' => '1.32'
},
{
'date' => '2002-04-10T22:44:19',
'version' => '1.33'
},
{
'date' => '2002-04-14T22:49:10',
'version' => '1.40'
},
{
'date' => '2002-04-16T23:47:16',
'version' => '1.41'
},
{
'date' => '2002-04-19T06:18:26',
'version' => '1.50'
},
{
'date' => '2002-04-20T10:08:39',
'version' => '1.51'
},
{
'date' => '2002-04-20T23:55:45',
'version' => '1.52'
},
{
'date' => '2002-04-22T09:56:04',
'version' => '1.56'
},
{
'date' => '2002-04-22T20:37:12',
'version' => '1.57'
},
{
'date' => '2002-04-23T00:22:06',
'version' => '1.58'
},
{
'date' => '2002-04-24T20:23:42',
'version' => '1.60'
},
{
'date' => '2002-04-26T03:19:40',
'version' => '1.61'
},
{
'date' => '2002-04-27T11:43:39',
'version' => '1.62'
},
{
'date' => '2002-04-27T19:52:51',
'version' => '1.63'
},
{
'date' => '2002-04-29T07:20:38',
'version' => '1.64'
},
{
'date' => '2002-04-30T16:40:07',
'version' => '1.65'
},
{
'date' => '2002-05-01T05:51:35',
'version' => '1.66'
},
{
'date' => '2002-05-02T07:43:35',
'version' => '1.67'
},
{
'date' => '2002-05-03T12:29:47',
'version' => '1.68'
},
{
'date' => '2002-05-04T16:50:40',
'version' => '1.69'
},
{
'date' => '2002-05-06T10:36:39',
'version' => '1.70'
},
{
'date' => '2002-05-07T16:30:42',
'version' => '1.71'
},
{
'date' => '2002-05-20T16:04:48',
'version' => '1.72'
},
{
'date' => '2002-05-28T18:41:36',
'version' => '1.74'
},
{
'date' => '2002-06-01T18:17:49',
'version' => '1.75'
},
{
'date' => '2002-08-25T15:18:49',
'version' => '1.76'
},
{
'date' => '2002-10-06T03:59:19',
'version' => '1.77'
},
{
'date' => '2002-10-20T15:55:16',
'version' => '1.78'
},
{
'date' => '2002-10-21T06:11:36',
'version' => '1.79'
},
{
'date' => '2002-10-21T20:42:56',
'version' => '1.80'
},
{
'date' => '2002-11-08T18:42:11',
'version' => '1.81'
},
{
'date' => '2002-11-14T23:17:11',
'version' => '1.82'
},
{
'date' => '2002-11-18T18:06:47',
'version' => '1.83'
},
{
'date' => '2003-01-10T12:09:05',
'version' => '1.84'
},
{
'date' => '2003-01-21T22:23:28',
'version' => '1.85'
},
{
'date' => '2003-01-22T03:36:42',
'version' => '1.86'
},
{
'date' => '2003-02-06T02:01:00',
'version' => '1.87'
},
{
'date' => '2003-02-20T14:46:12',
'version' => '1.88'
},
{
'date' => '2003-02-28T01:45:53',
'version' => '1.89'
},
{
'date' => '2003-03-09T17:54:26',
'version' => '1.90'
},
{
'date' => '2003-03-09T20:12:08',
'version' => '1.91'
},
{
'date' => '2003-03-31T03:51:31',
'version' => '1.92'
},
{
'date' => '2003-04-24T17:50:54',
'version' => '1.93'
},
{
'date' => '2003-05-10T18:31:48',
'version' => '1.94'
},
{
'date' => '2003-05-21T09:22:43',
'version' => '1.95'
},
{
'date' => '2003-06-18T09:41:21',
'version' => '1.96'
},
{
'date' => '2003-07-08T22:01:28',
'version' => '1.97'
},
{
'date' => '2003-08-25T11:47:32',
'version' => '1.98'
},
{
'date' => '2003-12-29T02:52:28',
'version' => '1.99'
},
{
'date' => '2004-05-16T21:05:06',
'version' => '2.00'
},
{
'date' => '2004-05-25T16:31:35',
'version' => '2.01'
},
{
'date' => '2004-08-31T11:01:51',
'version' => '2.02'
},
{
'date' => '2004-10-06T06:50:47',
'version' => '2.03'
},
{
'date' => '2004-10-16T21:26:58',
'version' => '2.04'
},
{
'date' => '2004-10-19T05:03:32',
'version' => '2.05'
},
{
'date' => '2004-10-22T06:29:14',
'version' => '2.06'
},
{
'date' => '2004-10-22T19:43:19',
'version' => '2.07'
},
{
'date' => '2004-10-24T13:04:29',
'version' => '2.08'
},
{
'date' => '2004-12-03T19:21:42',
'version' => '2.09'
},
{
'date' => '2005-05-16T18:54:53',
'version' => '2.10'
},
{
'date' => '2005-08-05T11:26:06',
'version' => '2.11'
},
{
'date' => '2005-09-08T14:23:38',
'version' => '2.12'
},
{
'date' => '2006-01-15T15:12:01',
'version' => '2.13'
},
{
'date' => '2006-01-15T15:57:41',
'version' => '2.14'
},
{
'date' => '2006-04-06T16:01:30',
'version' => '2.15'
},
{
'date' => '2006-05-03T18:38:44',
'version' => '2.16'
},
{
'date' => '2006-05-09T17:14:04',
'version' => '2.17'
},
{
'date' => '2006-06-03T20:34:08',
'version' => '2.18'
},
{
'date' => '2007-04-06T13:05:52',
'version' => '2.19'
},
{
'date' => '2007-04-22T15:17:34',
'version' => '2.20'
},
{
'date' => '2007-05-12T06:50:09',
'version' => '2.21'
},
{
'date' => '2007-05-29T07:43:07',
'version' => '2.22'
},
{
'date' => '2007-05-29T18:21:25',
'version' => '2.23'
},
{
'date' => '2008-03-12T10:12:18',
'version' => '2.24'
},
{
'date' => '2008-05-07T21:06:08',
'version' => '2.25'
},
{
'date' => '2008-07-01T21:03:33',
'version' => '2.26'
},
{
'date' => '2009-01-21T23:01:50',
'version' => '2.27'
},
{
'date' => '2009-02-01T13:16:44',
'version' => '2.29'
},
{
'date' => '2009-02-15T17:48:01',
'version' => '2.30'
},
{
'date' => '2009-02-16T06:25:32',
'version' => '2.31'
},
{
'date' => '2009-03-07T07:45:00',
'version' => '2.32'
},
{
'date' => '2009-03-25T08:01:10',
'version' => '2.33'
},
{
'date' => '2009-07-08T13:53:25',
'version' => '2.34'
},
{
'date' => '2009-07-13T02:32:45',
'version' => '2.35'
},
{
'date' => '2009-09-06T09:20:21',
'version' => '2.36'
},
{
'date' => '2009-09-06T14:37:23',
'version' => '2.37'
},
{
'date' => '2009-11-16T14:34:43',
'version' => '2.38'
},
{
'date' => '2009-11-26T09:31:02',
'version' => '2.39'
},
{
'date' => '2010-09-18T18:47:17',
'version' => '2.40'
},
{
'date' => '2010-12-23T11:12:33',
'version' => '2.41'
},
{
'date' => '2010-12-31T22:52:35',
'version' => '2.42'
},
{
'date' => '2011-05-21T23:21:24',
'version' => '2.43'
},
{
'date' => '2011-08-09T08:01:30',
'version' => '2.44'
},
{
'date' => '2012-08-05T23:15:11',
'version' => '2.45'
},
{
'date' => '2012-08-12T05:52:45',
'version' => '2.46'
},
{
'date' => '2012-08-15T05:40:21',
'version' => '2.47'
},
{
'date' => '2013-02-18T02:43:35',
'version' => '2.48'
},
{
'date' => '2013-03-05T03:19:15',
'version' => '2.49'
},
{
'date' => '2013-04-26T18:36:59',
'version' => '2.50'
},
{
'date' => '2013-04-29T22:21:31',
'version' => '2.51'
},
{
'date' => '2013-08-14T02:33:46',
'version' => '2.52'
},
{
'date' => '2013-08-29T15:27:02',
'version' => '2.53'
},
{
'date' => '2013-08-29T16:50:08',
'version' => '2.54'
},
{
'date' => '2013-09-14T07:58:54',
'version' => '2.55'
},
{
'date' => '2013-12-22T04:12:07',
'version' => '2.56'
},
{
'date' => '2014-01-03T04:55:36',
'version' => '2.57'
},
{
'date' => '2014-03-28T02:41:54',
'version' => '2.58'
},
{
'date' => '2014-04-06T17:41:19',
'version' => '2.59'
},
{
'date' => '2014-04-29T16:34:10',
'version' => '2.60'
},
{
'date' => '2014-05-31T09:55:56',
'version' => '2.61'
},
{
'date' => '2014-05-31T12:20:28',
'version' => '2.62'
},
{
'date' => '2014-10-19T07:13:44',
'version' => '2.63'
},
{
'date' => '2014-10-29T15:42:04',
'version' => '2.64'
},
{
'date' => '2014-11-27T14:12:57',
'version' => '2.65'
},
{
'date' => '2014-12-02T23:37:28',
'version' => '2.66'
},
{
'date' => '2014-12-04T20:28:33',
'version' => '2.67'
},
{
'date' => '2015-01-22T10:29:46',
'version' => '2.68'
},
{
'date' => '2015-02-05T10:43:34',
'version' => '2.69'
},
{
'date' => '2015-02-05T10:56:52',
'version' => '2.70'
},
{
'date' => '2015-03-12T00:14:19',
'version' => '2.71'
},
{
'date' => '2015-03-14T02:51:25',
'version' => '2.72'
},
{
'date' => '2015-04-15T23:27:13',
'version' => '2.73'
},
{
'date' => '2015-06-25T00:59:20',
'version' => '2.74'
},
{
'date' => '2015-06-30T10:10:03',
'version' => '2.75'
},
{
'date' => '2015-07-31T02:26:51',
'version' => '2.76'
},
{
'date' => '2015-09-15T14:03:35',
'version' => '2.77'
},
{
'date' => '2015-09-24T02:29:52',
'version' => '2.78'
},
{
'date' => '2016-01-22T07:08:25',
'version' => '2.79'
},
{
'date' => '2016-01-25T15:04:42',
'version' => '2.80'
},
{
'date' => '2016-02-06T19:34:58',
'version' => '2.81'
},
{
'date' => '2016-02-06T20:21:37',
'version' => '2.82'
},
{
'date' => '2016-03-24T08:00:30',
'version' => '2.83'
},
{
'date' => '2016-04-11T07:24:26',
'version' => '2.84'
},
{
'date' => '2016-08-04T03:37:23',
'version' => '2.85'
},
{
'date' => '2016-08-10T18:25:39',
'version' => '2.86'
},
{
'date' => '2016-10-28T05:15:33',
'version' => '2.87'
},
{
'date' => '2016-11-29T23:38:19',
'version' => '2.88'
},
{
'date' => '2017-04-21T05:24:59',
'version' => '2.89'
},
{
'date' => '2017-06-10T17:46:11',
'version' => '2.90'
},
{
'date' => '2017-06-22T08:18:22',
'version' => '2.91'
},
{
'date' => '2017-07-18T07:23:39',
'version' => '2.92'
},
{
'date' => '2017-10-06T22:33:35',
'version' => '2.93'
},
{
'date' => '2018-01-09T06:04:38',
'version' => '2.94'
},
{
'date' => '2018-02-08T00:41:02',
'version' => '2.95'
},
{
'date' => '2018-02-11T05:41:37',
'version' => '2.96'
},
{
'date' => '2018-02-21T12:30:05',
'version' => '2.97'
},
{
'date' => '2018-04-22T09:14:59',
'version' => '2.98'
},
{
'date' => '2019-01-21T03:28:35',
'version' => '2.99'
},
{
'date' => '2019-01-31T04:42:29',
'version' => '2.100'
},
{
'date' => '2019-01-31T05:05:06',
'version' => '3.00'
},
{
'date' => '2019-03-13T00:45:28',
'version' => '3.01'
},
{
'date' => '2019-12-25T09:47:36',
'version' => '3.02'
},
{
'date' => '2020-03-02T04:45:26',
'version' => '3.03'
},
{
'date' => '2020-03-10T22:40:35',
'version' => '3.04'
},
{
'date' => '2020-03-18T05:03:23',
'version' => '3.05'
},
{
'date' => '2020-05-02T02:40:38',
'version' => '3.06'
},
{
'date' => '2020-07-25T13:08:13',
'version' => '3.07'
},
{
'date' => '2020-12-02T09:20:23',
'version' => '3.08'
},
{
'date' => '2021-05-14T11:03:11',
'version' => '3.09'
},
{
'date' => '2021-05-18T07:51:48',
'version' => '3.10'
},
{
'date' => '2021-07-23T02:41:38',
'version' => '3.11'
},
{
'date' => '2021-08-09T14:30:33',
'version' => '3.12'
},
{
'date' => '2021-10-06T00:57:50',
'version' => '3.13'
},
{
'date' => '2021-10-08T00:35:29',
'version' => '3.14'
},
{
'date' => '2021-10-08T15:45:44',
'version' => '3.15'
},
{
'date' => '2021-10-13T08:39:09',
'version' => '3.16'
},
{
'date' => '2022-04-07T03:18:23',
'version' => '3.17'
},
{
'date' => '2022-06-25T02:14:35',
'version' => '3.18'
},
{
'date' => '2022-08-04T04:51:01',
'version' => '3.19'
},
{
'date' => '2023-11-10T01:26:15',
'version' => '3.20'
},
{
'date' => '2024-02-25T23:19:43',
'version' => '3.21'
}
]
},
'ExtUtils-MakeMaker' => {
'advisories' => [
{
'affected_versions' => [
'<7.22'
],
'cves' => [
'CVE-2016-1238'
],
'description' => 'Loading modules from . (current directory).
',
'distribution' => 'ExtUtils-MakeMaker',
'fixed_versions' => [
'>=7.22'
],
'id' => 'CPANSA-ExtUtils-MakeMaker-2016-01',
'references' => [
'https://metacpan.org/changes/distribution/ExtUtils-MakeMaker',
'https://github.com/Perl-Toolchain-Gang/ExtUtils-MakeMaker/commit/3e9df17d11c40f2561c23ec79693c8c390e0ae88'
],
'reported' => '2016-08-07',
'severity' => 'high'
}
],
'main_module' => 'ExtUtils::MakeMaker',
'versions' => [
{
'date' => '2001-07-06T08:23:56',
'version' => '5.47_01'
},
{
'date' => '2002-01-16T20:19:18',
'version' => '5.48_01'
},
{
'date' => '2002-01-18T04:56:33',
'version' => '5.48_03'
},
{
'date' => '2002-01-22T00:33:31',
'version' => '5.48_04'
},
{
'date' => '2002-02-04T08:46:04',
'version' => '5.49_01'
},
{
'date' => '2002-03-05T04:53:40',
'version' => '5.50_01'
},
{
'date' => '2002-03-25T07:53:14',
'version' => '5.51_01'
},
{
'date' => '2002-03-26T05:56:07',
'version' => '5.52_01'
},
{
'date' => '2002-03-31T03:55:52',
'version' => '5.54_01'
},
{
'date' => '2002-04-05T05:01:52',
'version' => '5.55_01'
},
{
'date' => '2002-04-06T08:29:20',
'version' => '5.55_02'
},
{
'date' => '2002-04-07T03:04:18',
'version' => '5.55_03'
},
{
'date' => '2002-04-11T05:32:04',
'version' => '5.90_01'
},
{
'date' => '2002-04-24T04:21:44',
'version' => '5.91_01'
},
{
'date' => '2002-04-30T03:43:53',
'version' => '5.92_01'
},
{
'date' => '2002-05-06T06:02:08',
'version' => '5.93_01'
},
{
'date' => '2002-05-17T19:04:41',
'version' => '5.94_01'
},
{
'date' => '2002-05-17T21:24:13',
'version' => '5.94_02'
},
{
'date' => '2002-05-18T18:43:02',
'version' => '5.95_01'
},
{
'date' => '2002-05-23T21:01:02',
'version' => '5.96_01'
},
{
'date' => '2002-05-26T01:25:25',
'version' => '6.00'
},
{
'date' => '2002-05-30T19:02:20',
'version' => '6.01'
},
{
'date' => '2002-06-16T05:41:28',
'version' => '6.02'
},
{
'date' => '2002-06-19T21:24:32',
'version' => '6.03'
},
{
'date' => '2002-08-27T01:42:36',
'version' => '6.04'
},
{
'date' => '2002-08-27T23:24:30',
'version' => '6.05'
},
{
'date' => '2002-12-19T08:42:01',
'version' => '6.06_01'
},
{
'date' => '2002-12-24T04:54:53',
'version' => '6.06_02'
},
{
'date' => '2003-03-30T03:49:59',
'version' => '6.06_03'
},
{
'date' => '2003-03-31T04:37:55',
'version' => '6.06_04'
},
{
'date' => '2003-03-31T10:50:00',
'version' => '6.06_05'
},
{
'date' => '2003-04-07T02:46:10',
'version' => '6.10_01'
},
{
'date' => '2003-04-07T08:33:23',
'version' => '6.10_02'
},
{
'date' => '2003-04-11T07:27:36',
'version' => '6.10_03'
},
{
'date' => '2003-05-23T09:05:27',
'version' => '6.10_04'
},
{
'date' => '2003-06-07T01:32:29',
'version' => '6.10_05'
},
{
'date' => '2003-06-07T08:00:14',
'version' => '6.10_06'
},
{
'date' => '2003-07-05T23:40:34',
'version' => '6.10_07'
},
{
'date' => '2003-07-22T01:23:46',
'version' => '6.10_08'
},
{
'date' => '2003-07-28T04:00:19',
'version' => '6.11'
},
{
'date' => '2003-07-30T05:28:47',
'version' => '6.12'
},
{
'date' => '2003-07-31T23:51:40',
'version' => '6.13'
},
{
'date' => '2003-08-03T23:27:51',
'version' => '6.14'
},
{
'date' => '2003-08-03T23:46:11',
'version' => '6.15'
},
{
'date' => '2003-08-18T08:43:08',
'version' => '6.16'
},
{
'date' => '2003-09-15T22:23:01',
'version' => '6.17'
},
{
'date' => '2003-11-04T04:12:53',
'version' => '6.18'
},
{
'date' => '2003-11-04T07:03:30',
'version' => '6.19'
},
{
'date' => '2003-11-06T10:37:47',
'version' => '6.20'
},
{
'date' => '2003-11-11T08:26:17',
'version' => '6.21'
},
{
'date' => '2004-04-03T21:33:45',
'version' => '6.21_03'
},
{
'date' => '2004-11-24T04:06:20',
'version' => '6.22'
},
{
'date' => '2004-11-26T21:15:45',
'version' => '6.23'
},
{
'date' => '2004-11-30T20:42:14',
'version' => '6.24'
},
{
'date' => '2004-12-09T06:00:53',
'version' => '6.24_01'
},
{
'date' => '2004-12-15T12:05:50',
'version' => '6.25'
},
{
'date' => '2004-12-18T02:34:56',
'version' => '6.25_01'
},
{
'date' => '2004-12-20T08:36:56',
'version' => '6.25_02'
},
{
'date' => '2004-12-21T04:17:27',
'version' => '6.25_03'
},
{
'date' => '2004-12-21T05:58:10',
'version' => '6.25_04'
},
{
'date' => '2004-12-22T13:05:53',
'version' => '6.25_05'
},
{
'date' => '2004-12-26T22:26:26',
'version' => '6.25_06'
},
{
'date' => '2004-12-31T08:53:31',
'version' => '6.25_07'
},
{
'date' => '2005-02-08T14:21:17',
'version' => '6.25_08'
},
{
'date' => '2005-03-12T18:29:26',
'version' => '6.25_09'
},
{
'date' => '2005-03-14T00:17:26',
'version' => '6.25_10'
},
{
'date' => '2005-03-15T10:05:07',
'version' => '6.25_11'
},
{
'date' => '2005-03-19T00:19:47',
'version' => '6.25_12'
},
{
'date' => '2005-03-22T22:50:34',
'version' => '6.26'
},
{
'date' => '2005-03-29T05:48:40',
'version' => '6.26_01'
},
{
'date' => '2005-04-04T23:55:46',
'version' => '6.27'
},
{
'date' => '2005-04-12T23:23:53',
'version' => '6.28'
},
{
'date' => '2005-05-19T21:22:00',
'version' => '6.29'
},
{
'date' => '2005-05-20T23:14:45',
'version' => '6.30'
},
{
'date' => '2005-08-17T06:59:11',
'version' => '6.30_01'
},
{
'date' => '2006-09-01T19:07:28',
'version' => '6.30_02'
},
{
'date' => '2006-09-01T21:06:57',
'version' => '6.30_03'
},
{
'date' => '2006-09-11T20:20:27',
'version' => '6.30_04'
},
{
'date' => '2006-10-10T01:04:44',
'version' => '6.31'
},
{
'date' => '2007-02-21T16:02:09',
'version' => '6.32'
},
{
'date' => '2007-06-29T22:18:15',
'version' => '6.33'
},
{
'date' => '2007-06-30T16:10:15',
'version' => '6.34'
},
{
'date' => '2007-07-02T03:56:25',
'version' => '6.35'
},
{
'date' => '2007-07-03T08:10:57',
'version' => '6.36'
},
{
'date' => '2007-11-26T01:10:14',
'version' => '6.37_01'
},
{
'date' => '2007-11-26T07:35:50',
'version' => '6.37_02'
},
{
'date' => '2007-11-26T22:18:55',
'version' => '6.37_03'
},
{
'date' => '2007-11-29T00:04:35',
'version' => '6.38'
},
{
'date' => '2007-12-06T11:08:15',
'version' => '6.40'
},
{
'date' => '2007-12-08T01:02:26',
'version' => '6.42'
},
{
'date' => '2008-01-02T00:09:23',
'version' => '6.43_01'
},
{
'date' => '2008-02-29T00:08:42',
'version' => '6.44'
},
{
'date' => '2008-09-06T10:22:44',
'version' => '6.45_01'
},
{
'date' => '2008-09-07T21:18:05',
'version' => '6.45_02'
},
{
'date' => '2008-09-27T21:37:54',
'version' => '6.46'
},
{
'date' => '2008-10-14T16:41:49',
'version' => '6.47_01'
},
{
'date' => '2008-10-16T23:18:52',
'version' => '6.47_02'
},
{
'date' => '2008-10-20T18:20:40',
'version' => '6.48'
},
{
'date' => '2009-02-20T01:11:08',
'version' => '6.49_01'
},
{
'date' => '2009-03-22T19:30:00',
'version' => '6.50'
},
{
'date' => '2009-04-10T21:33:29',
'version' => '6.51_01'
},
{
'date' => '2009-04-14T04:22:58',
'version' => '6.51_02'
},
{
'date' => '2009-05-24T05:41:35',
'version' => '6.51_03'
},
{
'date' => '2009-05-24T21:07:28',
'version' => '6.51_04'
},
{
'date' => '2009-05-30T18:41:35',
'version' => '6.52'
},
{
'date' => '2009-06-08T02:05:24',
'version' => '6.53_01'
},
{
'date' => '2009-06-08T02:28:24',
'version' => '6.53_02'
},
{
'date' => '2009-07-02T21:55:25',
'version' => '6.53_03'
},
{
'date' => '2009-07-07T23:53:09',
'version' => '6.54'
},
{
'date' => '2009-07-14T23:02:39',
'version' => '6.55_01'
},
{
'date' => '2009-08-05T07:40:59',
'version' => '6.55_02'
},
{
'date' => '2009-12-05T07:09:23',
'version' => '6.55_03'
},
{
'date' => '2009-12-17T22:06:47',
'version' => '6.56'
},
{
'date' => '2010-08-24T08:38:36',
'version' => '6.57_01'
},
{
'date' => '2010-09-07T23:43:49',
'version' => '6.57_02'
},
{
'date' => '2010-09-08T22:33:36',
'version' => '6.57_03'
},
{
'date' => '2010-09-09T23:52:37',
'version' => '6.57_04'
},
{
'date' => '2010-09-11T20:25:23',
'version' => '6.57_05'
},
{
'date' => '2010-10-06T10:53:43',
'version' => '6.57_06'
},
{
'date' => '2011-03-25T03:41:39',
'version' => '6.57_07'
},
{
'date' => '2011-03-27T11:00:41',
'version' => '6.57_08'
},
{
'date' => '2011-03-28T00:15:59',
'version' => '6.57_09'
},
{
'date' => '2011-04-04T05:33:46',
'version' => '6.57_10'
},
{
'date' => '2011-05-20T00:34:23',
'version' => '6.57_11'
},
{
'date' => '2011-07-06T21:22:27',
'version' => '6.58'
},
{
'date' => '2011-08-03T20:25:34',
'version' => '6.58_01'
},
{
'date' => '2011-08-05T13:07:58',
'version' => '6.59'
},
{
'date' => '2011-09-25T05:23:43',
'version' => '6.61_01'
},
{
'date' => '2011-10-23T23:48:06',
'version' => '6.62'
},
{
'date' => '2011-10-24T00:40:49',
'version' => '6.63_01'
},
{
'date' => '2011-11-02T00:07:43',
'version' => '6.63_02'
},
{
'date' => '2012-11-02T03:58:40',
'version' => '6.63_03'
},
{
'date' => '2012-11-22T21:25:35',
'version' => '6.63_04'
},
{
'date' => '2012-12-17T02:35:20',
'version' => '6.64'
},
{
'date' => '2013-03-18T23:21:28',
'version' => '6.65_01'
},
{
'date' => '2013-04-14T09:59:15',
'version' => '6.65_02'
},
{
'date' => '2013-04-15T12:50:31',
'version' => '6.65_03'
},
{
'date' => '2013-04-19T17:52:08',
'version' => '6.66'
},
{
'date' => '2013-04-25T20:08:31',
'version' => '6.67_01'
},
{
'date' => '2013-06-02T17:31:16',
'version' => '6.67_02'
},
{
'date' => '2013-06-05T21:09:00',
'version' => '6.67_03'
},
{
'date' => '2013-06-10T19:25:22',
'version' => '6.67_04'
},
{
'date' => '2013-06-13T20:55:25',
'version' => '6.67_05'
},
{
'date' => '2013-06-14T22:35:24',
'version' => '6.68'
},
{
'date' => '2013-06-20T12:00:00',
'version' => '6.69_01'
},
{
'date' => '2013-07-02T12:16:23',
'version' => '6.69_02'
},
{
'date' => '2013-07-09T21:47:07',
'version' => '6.69_03'
},
{
'date' => '2013-07-10T10:50:08',
'version' => '6.69_04'
},
{
'date' => '2013-07-11T21:20:53',
'version' => '6.69_05'
},
{
'date' => '2013-07-12T13:51:50',
'version' => '6.69_06'
},
{
'date' => '2013-07-16T14:34:32',
'version' => '6.69_07'
},
{
'date' => '2013-07-16T23:40:44',
'version' => '6.69_08'
},
{
'date' => '2013-07-21T08:26:44',
'version' => '6.69_09'
},
{
'date' => '2013-07-23T21:42:47',
'version' => '6.70'
},
{
'date' => '2013-07-24T08:33:58',
'version' => '6.71_01'
},
{
'date' => '2013-07-24T17:42:20',
'version' => '6.72'
},
{
'date' => '2013-07-24T22:53:41',
'version' => '6.73_01'
},
{
'date' => '2013-07-26T12:34:19',
'version' => '6.73_02'
},
{
'date' => '2013-07-30T21:12:02',
'version' => '6.73_03'
},
{
'date' => '2013-08-01T21:41:12',
'version' => '6.73_04'
},
{
'date' => '2013-08-05T16:45:38',
'version' => '6.73_05'
},
{
'date' => '2013-08-05T23:52:18',
'version' => '6.73_06'
},
{
'date' => '2013-08-07T15:09:12',
'version' => '6.73_07'
},
{
'date' => '2013-08-09T18:52:24',
'version' => '6.73_08'
},
{
'date' => '2013-08-09T19:00:18',
'version' => '6.73_09'
},
{
'date' => '2013-08-16T15:43:35',
'version' => '6.73_10'
},
{
'date' => '2013-08-17T21:57:55',
'version' => '6.73_11'
},
{
'date' => '2013-08-23T09:52:43',
'version' => '6.73_12'
},
{
'date' => '2013-08-27T11:45:55',
'version' => '6.74'
},
{
'date' => '2013-08-29T14:09:22',
'version' => '6.75_01'
},
{
'date' => '2013-09-01T20:52:29',
'version' => '6.75_02'
},
{
'date' => '2013-09-02T23:26:56',
'version' => '6.75_03'
},
{
'date' => '2013-09-05T11:10:20',
'version' => '6.75_04'
},
{
'date' => '2013-09-06T12:40:59',
'version' => '6.76'
},
{
'date' => '2013-09-10T14:22:45',
'version' => '6.77_01'
},
{
'date' => '2013-09-12T20:23:49',
'version' => '6.77_02'
},
{
'date' => '2013-09-16T11:23:59',
'version' => '6.77_03'
},
{
'date' => '2013-09-18T18:25:33',
'version' => '6.77_04'
},
{
'date' => '2013-09-19T13:12:32',
'version' => '6.77_05'
},
{
'date' => '2013-09-19T14:43:24',
'version' => '6.77_06'
},
{
'date' => '2013-09-21T08:48:44',
'version' => '6.77_07'
},
{
'date' => '2013-09-22T17:46:50',
'version' => '6.77_08'
},
{
'date' => '2013-09-23T12:47:39',
'version' => '6.78'
},
{
'date' => '2013-10-01T14:01:33',
'version' => '6.79_01'
},
{
'date' => '2013-10-11T12:01:23',
'version' => '6.79_02'
},
{
'date' => '2013-10-11T13:00:29',
'version' => '6.79_03'
},
{
'date' => '2013-10-11T17:59:30',
'version' => '6.79_04'
},
{
'date' => '2013-10-15T15:08:06',
'version' => '6.80'
},
{
'date' => '2013-10-16T08:04:29',
'version' => '6.81_01'
},
{
'date' => '2013-10-17T11:24:19',
'version' => '6.81_02'
},
{
'date' => '2013-10-24T19:54:34',
'version' => '6.81_03'
},
{
'date' => '2013-11-01T19:56:13',
'version' => '6.81_04'
},
{
'date' => '2013-11-02T21:44:06',
'version' => '6.81_05'
},
{
'date' => '2013-11-04T19:24:38',
'version' => '6.82'
},
{
'date' => '2013-11-05T11:45:54',
'version' => '6.83_01'
},
{
'date' => '2013-11-12T11:15:21',
'version' => '6.83_02'
},
{
'date' => '2013-11-15T09:49:39',
'version' => '6.83_03'
},
{
'date' => '2013-11-17T11:44:01',
'version' => '6.83_04'
},
{
'date' => '2013-11-25T22:52:46',
'version' => '6.83_05'
},
{
'date' => '2013-11-29T21:55:40',
'version' => '6.83_06'
},
{
'date' => '2013-11-30T15:27:01',
'version' => '6.84'
},
{
'date' => '2013-12-16T13:18:35',
'version' => '6.85_01'
},
{
'date' => '2013-12-17T10:17:50',
'version' => '6.85_02'
},
{
'date' => '2013-12-23T14:59:36',
'version' => '6.85_03'
},
{
'date' => '2013-12-23T15:02:38',
'version' => '6.85_04'
},
{
'date' => '2013-12-29T11:28:14',
'version' => '6.85_05'
},
{
'date' => '2013-12-30T23:18:09',
'version' => '6.85_06'
},
{
'date' => '2014-01-01T19:00:36',
'version' => '6.85_07'
},
{
'date' => '2014-01-04T12:21:05',
'version' => '6.86'
},
{
'date' => '2014-01-12T10:34:38',
'version' => '6.87_01'
},
{
'date' => '2014-01-18T13:30:15',
'version' => '6.87_02'
},
{
'date' => '2014-01-19T17:53:19',
'version' => '6.87_03'
},
{
'date' => '2014-01-26T19:33:34',
'version' => '6.87_04'
},
{
'date' => '2014-01-28T14:00:44',
'version' => '6.87_05'
},
{
'date' => '2014-01-31T20:59:13',
'version' => '6.88'
},
{
'date' => '2014-02-17T16:23:55',
'version' => '6.89_01'
},
{
'date' => '2014-02-20T20:49:24',
'version' => '6.90'
},
{
'date' => '2014-03-06T13:52:24',
'version' => '6.91_01'
},
{
'date' => '2014-03-13T16:34:37',
'version' => '6.92'
},
{
'date' => '2014-03-24T16:57:01',
'version' => '6.93_01'
},
{
'date' => '2014-03-25T20:38:21',
'version' => '6.94'
},
{
'date' => '2014-04-02T20:52:53',
'version' => '6.95_01'
},
{
'date' => '2014-04-07T14:29:26',
'version' => '6.95_02'
},
{
'date' => '2014-04-11T21:09:21',
'version' => '6.96'
},
{
'date' => '2014-04-24T13:29:12',
'version' => '6.97_01'
},
{
'date' => '2014-04-28T10:55:44',
'version' => '6.97_02'
},
{
'date' => '2014-04-29T20:41:00',
'version' => '6.98'
},
{
'date' => '2014-06-03T21:19:42',
'version' => '6.99_01'
},
{
'date' => '2014-06-05T11:18:25',
'version' => '6.99_02'
},
{
'date' => '2014-07-04T10:15:23',
'version' => '6.99_03'
},
{
'date' => '2014-07-12T11:54:35',
'version' => '6.99_04'
},
{
'date' => '2014-07-22T11:42:12',
'version' => '6.99_05'
},
{
'date' => '2014-07-28T14:07:14',
'version' => '6.99_06'
},
{
'date' => '2014-07-30T16:44:02',
'version' => '6.99_07'
},
{
'date' => '2014-08-18T13:19:18',
'version' => '6.99_08'
},
{
'date' => '2014-08-28T10:13:30',
'version' => '6.99_09'
},
{
'date' => '2014-09-04T14:04:55',
'version' => '6.99_10'
},
{
'date' => '2014-09-08T13:39:46',
'version' => '6.99_11'
},
{
'date' => '2014-09-11T14:32:19',
'version' => '6.99_12'
},
{
'date' => '2014-09-15T19:11:34',
'version' => '6.99_13'
},
{
'date' => '2014-09-19T14:06:14',
'version' => '6.99_14'
},
{
'date' => '2014-09-21T12:23:58',
'version' => '6.99_15'
},
{
'date' => '2014-10-02T18:50:08',
'version' => '6.99_16'
},
{
'date' => '2014-10-12T18:41:24',
'version' => '6.99_17'
},
{
'date' => '2014-10-20T09:14:39',
'version' => '6.99_18'
},
{
'date' => '2014-10-22T19:48:56',
'version' => '7.00'
},
{
'date' => '2014-10-25T12:49:55',
'version' => '7.01_01'
},
{
'date' => '2014-10-25T16:49:40',
'version' => '7.01_02'
},
{
'date' => '2014-10-30T19:48:04',
'version' => '7.01_03'
},
{
'date' => '2014-10-31T10:13:56',
'version' => '7.01_04'
},
{
'date' => '2014-11-03T12:53:43',
'version' => '7.01_05'
},
{
'date' => '2014-11-03T20:55:23',
'version' => '7.01_06'
},
{
'date' => '2014-11-04T19:40:07',
'version' => '7.01_07'
},
{
'date' => '2014-11-04T20:29:00',
'version' => '7.01_08'
},
{
'date' => '2014-11-06T21:59:55',
'version' => '7.01_09'
},
{
'date' => '2014-11-08T10:39:16',
'version' => '7.02'
},
{
'date' => '2014-11-18T21:47:11',
'version' => '7.03_01'
},
{
'date' => '2014-11-24T13:26:46',
'version' => '7.03_02'
},
{
'date' => '2014-11-25T16:43:06',
'version' => '7.03_03'
},
{
'date' => '2014-11-27T14:42:51',
'version' => '7.03_04'
},
{
'date' => '2014-11-28T18:32:48',
'version' => '7.03_05'
},
{
'date' => '2014-12-01T15:37:46',
'version' => '7.03_06'
},
{
'date' => '2014-12-02T12:56:02',
'version' => '7.04'
},
{
'date' => '2014-12-06T16:58:07',
'version' => '7.05_01'
},
{
'date' => '2014-12-15T20:13:08',
'version' => '7.05_02'
},
{
'date' => '2014-12-24T12:12:00',
'version' => '7.05_03'
},
{
'date' => '2014-12-24T14:49:46',
'version' => '7.05_04'
},
{
'date' => '2014-12-31T23:21:05',
'version' => '7.05_05'
},
{
'date' => '2015-01-08T19:09:29',
'version' => '7.05_06'
},
{
'date' => '2015-01-09T16:23:43',
'version' => '7.05_07'
},
{
'date' => '2015-01-20T10:13:21',
'version' => '7.05_08'
},
{
'date' => '2015-01-23T10:51:30',
'version' => '7.05_09'
},
{
'date' => '2015-01-26T15:19:01',
'version' => '7.05_10'
},
{
'date' => '2015-01-31T16:40:19',
'version' => '7.05_11'
},
{
'date' => '2015-02-07T15:19:11',
'version' => '7.05_12'
},
{
'date' => '2015-02-18T22:49:29',
'version' => '7.05_13'
},
{
'date' => '2015-02-20T17:32:55',
'version' => '7.05_14'
},
{
'date' => '2015-03-05T19:44:02',
'version' => '7.05_15'
},
{
'date' => '2015-03-09T11:35:12',
'version' => '7.05_16'
},
{
'date' => '2015-03-24T12:27:52',
'version' => '7.05_17'
},
{
'date' => '2015-03-27T12:20:03',
'version' => '7.05_18'
},
{
'date' => '2015-03-27T16:59:34',
'version' => '7.05_19'
},
{
'date' => '2015-04-04T15:53:36',
'version' => '7.05_20'
},
{
'date' => '2015-06-13T14:19:26',
'version' => '7.05_21'
},
{
'date' => '2015-06-14T13:44:56',
'version' => '7.05_22'
},
{
'date' => '2015-06-24T19:51:24',
'version' => '7.05_23'
},
{
'date' => '2015-07-01T18:30:38',
'version' => '7.05_24'
},
{
'date' => '2015-07-07T17:18:36',
'version' => '7.05_25'
},
{
'date' => '2015-08-04T19:41:25',
'version' => '7.05_26'
},
{
'date' => '2015-08-05T09:35:40',
'version' => '7.05_27'
},
{
'date' => '2015-08-19T18:10:20',
'version' => '7.05_28'
},
{
'date' => '2015-08-24T15:26:22',
'version' => '7.05_29'
},
{
'date' => '2015-08-31T18:06:48',
'version' => '7.06'
},
{
'date' => '2015-09-02T11:55:33',
'version' => '7.07_01'
},
{
'date' => '2015-09-08T19:59:05',
'version' => '7.08'
},
{
'date' => '2015-09-10T18:55:41',
'version' => '7.10'
},
{
'date' => '2015-11-12T12:35:03',
'version' => '7.11_01'
},
{
'date' => '2015-11-21T20:23:22',
'version' => '7.11_02'
},
{
'date' => '2015-11-25T15:40:06',
'version' => '7.11_03'
},
{
'date' => '2016-02-15T11:40:55',
'version' => '7.11_04'
},
{
'date' => '2016-03-19T10:07:11',
'version' => '7.11_05'
},
{
'date' => '2016-03-29T18:44:47',
'version' => '7.11_06'
},
{
'date' => '2016-04-19T11:41:10',
'version' => '7.12'
},
{
'date' => '2016-04-23T16:35:56',
'version' => '7.13_01'
},
{
'date' => '2016-04-24T13:20:40',
'version' => '7.14'
},
{
'date' => '2016-04-27T18:27:25',
'version' => '7.15_01'
},
{
'date' => '2016-04-28T12:15:28',
'version' => '7.15_02'
},
{
'date' => '2016-05-01T13:29:10',
'version' => '7.15_03'
},
{
'date' => '2016-05-07T10:28:49',
'version' => '7.16'
},
{
'date' => '2016-05-09T19:14:54',
'version' => '7.17_01'
},
{
'date' => '2016-05-09T23:07:33',
'version' => '7.17_02'
},
{
'date' => '2016-05-11T18:22:21',
'version' => '7.17_03'
},
{
'date' => '2016-05-23T15:39:08',
'version' => '7.18'
},
{
'date' => '2016-06-02T14:01:28',
'version' => '7.19_01'
},
{
'date' => '2016-06-13T09:11:52',
'version' => '7.19_02'
},
{
'date' => '2016-06-13T13:44:33',
'version' => '7.19_03'
},
{
'date' => '2016-06-14T11:35:43',
'version' => '7.19_04'
},
{
'date' => '2016-06-20T14:40:57',
'version' => '7.19_05'
},
{
'date' => '2016-06-27T12:04:29',
'version' => '7.19_06'
},
{
'date' => '2016-07-03T14:30:23',
'version' => '7.19_07'
},
{
'date' => '2016-07-28T12:26:56',
'version' => '7.19_08'
},
{
'date' => '2016-08-05T08:57:09',
'version' => '7.20'
},
{
'date' => '2016-08-07T09:54:04',
'version' => '7.21_01'
},
{
'date' => '2016-08-08T08:42:10',
'version' => '7.22'
},
{
'date' => '2016-08-19T09:24:06',
'version' => '7.23_01'
},
{
'date' => '2016-08-20T12:35:27',
'version' => '7.24'
},
{
'date' => '2017-02-03T15:21:22',
'version' => '7.25_01'
},
{
'date' => '2017-05-11T11:19:49',
'version' => '7.25_02'
},
{
'date' => '2017-05-11T17:09:16',
'version' => '7.25_03'
},
{
'date' => '2017-05-12T12:25:54',
'version' => '7.25_04'
},
{
'date' => '2017-05-15T09:41:49',
'version' => '7.25_05'
},
{
'date' => '2017-05-23T19:31:28',
'version' => '7.25_06'
},
{
'date' => '2017-05-27T20:21:06',
'version' => '7.26'
},
{
'date' => '2017-05-28T10:50:55',
'version' => '7.27_01'
},
{
'date' => '2017-05-30T08:56:32',
'version' => '7.27_02'
},
{
'date' => '2017-05-30T21:26:23',
'version' => '7.28'
},
{
'date' => '2017-05-31T08:32:44',
'version' => '7.29_01'
},
{
'date' => '2017-06-11T11:17:55',
'version' => '7.29_02'
},
{
'date' => '2017-06-12T12:31:08',
'version' => '7.30'
},
{
'date' => '2017-06-14T15:10:23',
'version' => '7.31_01'
},
{
'date' => '2017-06-26T13:14:10',
'version' => '7.31_02'
},
{
'date' => '2017-07-10T09:02:35',
'version' => '7.31_03'
},
{
'date' => '2017-10-05T12:19:00',
'version' => '7.31_04'
},
{
'date' => '2017-11-25T09:37:04',
'version' => '7.31_05'
},
{
'date' => '2018-01-16T13:28:46',
'version' => '7.31_06'
},
{
'date' => '2018-01-16T16:24:23',
'version' => '7.31_07'
},
{
'date' => '2018-02-12T12:32:45',
'version' => '7.31_08'
},
{
'date' => '2018-02-16T20:25:44',
'version' => '7.32'
},
{
'date' => '2018-02-20T10:44:19',
'version' => '7.33_01'
},
{
'date' => '2018-02-24T14:05:00',
'version' => '7.33_02'
},
{
'date' => '2018-02-24T20:21:42',
'version' => '7.33_03'
},
{
'date' => '2018-03-19T10:51:54',
'version' => '7.34'
},
{
'date' => '2018-04-19T12:46:01',
'version' => '7.35_01'
},
{
'date' => '2018-04-24T11:01:35',
'version' => '7.35_02'
},
{
'date' => '2018-04-27T13:59:23',
'version' => '7.35_03'
},
{
'date' => '2018-07-09T09:50:43',
'version' => '7.35_04'
},
{
'date' => '2018-07-10T09:18:31',
'version' => '7.35_05'
},
{
'date' => '2018-07-19T19:49:08',
'version' => '7.35_06'
},
{
'date' => '2018-11-23T11:59:44',
'version' => '7.35_07'
},
{
'date' => '2018-12-06T10:56:33',
'version' => '7.35_08'
},
{
'date' => '2019-02-18T10:27:00',
'version' => '7.35_09'
},
{
'date' => '2019-02-20T10:06:48',
'version' => '7.35_10'
},
{
'date' => '2019-04-25T11:10:29',
'version' => '7.35_11'
},
{
'date' => '2019-04-27T22:17:58',
'version' => '7.35_12'
},
{
'date' => '2019-04-28T11:23:25',
'version' => '7.35_13'
},
{
'date' => '2019-04-28T13:15:57',
'version' => '7.35_14'
},
{
'date' => '2019-04-28T15:48:41',
'version' => '7.36'
},
{
'date' => '2019-06-07T10:55:49',
'version' => '7.37_01'
},
{
'date' => '2019-06-27T10:35:57',
'version' => '7.37_02'
},
{
'date' => '2019-08-03T12:27:47',
'version' => '7.37_03'
},
{
'date' => '2019-08-22T14:34:47',
'version' => '7.37_04'
},
{
'date' => '2019-09-11T09:16:48',
'version' => '7.38'
},
{
'date' => '2019-09-16T06:54:51',
'version' => '7.39_01'
},
{
'date' => '2019-11-07T10:03:13',
'version' => '7.39_02'
},
{
'date' => '2019-11-17T20:12:14',
'version' => '7.39_03'
},
{
'date' => '2019-11-18T15:20:20',
'version' => '7.39_04'
},
{
'date' => '2019-11-21T12:10:17',
'version' => '7.39_05'
},
{
'date' => '2019-12-16T20:02:27',
'version' => '7.40'
},
{
'date' => '2019-12-16T21:53:56',
'version' => '7.41_01'
},
{
'date' => '2019-12-17T22:30:33',
'version' => '7.42'
},
{
'date' => '2020-01-05T13:00:40',
'version' => '7.43_01'
},
{
'date' => '2020-01-14T16:54:08',
'version' => '7.44'
},
{
'date' => '2020-05-28T16:58:08',
'version' => '7.45_01'
},
{
'date' => '2020-06-23T10:14:10',
'version' => '7.46'
},
{
'date' => '2020-06-26T10:13:17',
'version' => '7.47_01'
},
{
'date' => '2020-07-07T07:38:50',
'version' => '7.47_02'
},
{
'date' => '2020-07-08T21:54:35',
'version' => '7.47_03'
},
{
'date' => '2020-07-28T19:00:26',
'version' => '7.47_04'
},
{
'date' => '2020-07-31T09:57:33',
'version' => '7.47_05'
},
{
'date' => '2020-08-01T13:53:05',
'version' => '7.47_06'
},
{
'date' => '2020-08-03T21:39:02',
'version' => '7.47_07'
},
{
'date' => '2020-08-31T09:02:22',
'version' => '7.47_08'
},
{
'date' => '2020-09-14T13:50:45',
'version' => '7.47_09'
},
{
'date' => '2020-09-15T18:45:02',
'version' => '7.47_10'
},
{
'date' => '2020-09-20T09:20:24',
'version' => '7.47_11'
},
{
'date' => '2020-09-30T15:40:12',
'version' => '7.47_12'
},
{
'date' => '2020-10-04T10:56:39',
'version' => '7.48'
},
{
'date' => '2020-10-06T17:29:16',
'version' => '7.49_01'
},
{
'date' => '2020-10-08T12:03:50',
'version' => '7.49_02'
},
{
'date' => '2020-10-09T20:46:22',
'version' => '7.49_03'
},
{
'date' => '2020-10-13T18:34:34',
'version' => '7.49_04'
},
{
'date' => '2020-10-21T18:14:52',
'version' => '7.50'
},
{
'date' => '2020-11-04T00:05:13',
'version' => '7.51_01'
},
{
'date' => '2020-11-04T19:51:52',
'version' => '7.52'
},
{
'date' => '2020-11-10T03:50:49',
'version' => '7.53_01'
},
{
'date' => '2020-11-12T19:50:41',
'version' => '7.54'
},
{
'date' => '2020-11-18T18:25:16',
'version' => '7.55_01'
},
{
'date' => '2020-11-19T20:00:09',
'version' => '7.56'
},
{
'date' => '2020-12-18T13:45:54',
'version' => '7.57_01'
},
{
'date' => '2020-12-18T23:07:45',
'version' => '7.57_02'
},
{
'date' => '2020-12-21T18:31:44',
'version' => '7.58'
},
{
'date' => '2021-02-02T10:13:35',
'version' => '7.59_01'
},
{
'date' => '2021-02-17T11:05:23',
'version' => '7.60'
},
{
'date' => '2021-03-21T15:00:35',
'version' => '7.61_01'
},
{
'date' => '2021-04-13T18:13:28',
'version' => '7.62'
},
{
'date' => '2021-05-25T18:00:03',
'version' => '7.63_01'
},
{
'date' => '2021-06-03T19:05:10',
'version' => '7.63_02'
},
{
'date' => '2021-06-22T13:53:51',
'version' => '7.63_03'
},
{
'date' => '2021-06-30T14:30:46',
'version' => '7.63_04'
},
{
'date' => '2021-08-14T08:19:32',
'version' => '7.63_05'
},
{
'date' => '2021-11-03T01:44:47',
'version' => '7.63_06'
},
{
'date' => '2021-11-27T11:51:29',
'version' => '7.63_07'
},
{
'date' => '2021-11-27T17:31:21',
'version' => '7.63_08'
},
{
'date' => '2021-12-08T22:35:25',
'version' => '7.63_09'
},
{
'date' => '2021-12-13T16:54:00',
'version' => '7.63_10'
},
{
'date' => '2021-12-14T17:00:18',
'version' => '7.63_11'
},
{
'date' => '2021-12-17T19:24:34',
'version' => '7.64'
},
{
'date' => '2022-05-30T10:07:14',
'version' => '7.65_01'
},
{
'date' => '2022-07-22T13:01:08',
'version' => '7.65_02'
},
{
'date' => '2022-12-24T00:32:29',
'version' => '7.65_03'
},
{
'date' => '2022-12-25T09:06:33',
'version' => '7.66'
},
{
'date' => '2023-03-01T13:47:08',
'version' => '7.67_01'
},
{
'date' => '2023-03-06T11:17:11',
'version' => '7.67_02'
},
{
'date' => '2023-03-14T21:41:23',
'version' => '7.68'
},
{
'date' => '2023-03-25T11:45:00',
'version' => '7.69_01'
},
{
'date' => '2023-03-26T13:29:08',
'version' => '7.70'
},
{
'date' => '2024-06-24T19:34:30',
'version' => '7.71_01'
},
{
'date' => '2024-11-22T19:08:50',
'version' => '7.71_02'
}
]
},
'ExtUtils-ParseXS' => {
'advisories' => [
{
'affected_versions' => [
'<3.35'
],
'cves' => [
'CVE-2016-1238'
],
'description' => '(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.',
'distribution' => 'ExtUtils-ParseXS',
'fixed_versions' => [
'>=3.35'
],
'id' => 'CPANSA-ExtUtils-ParseXS-2016-1238',
'references' => [
'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html',
'http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab',
'http://www.debian.org/security/2016/dsa-3628',
'http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html',
'http://www.securityfocus.com/bid/92136',
'http://www.securitytracker.com/id/1036440',
'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731',
'https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c%40%3Cannounce.apache.org%3E',
'https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html',
'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/',
'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/',
'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/',
'https://rt.perl.org/Public/Bug/Display.html?id=127834',
'https://security.gentoo.org/glsa/201701-75',
'https://security.gentoo.org/glsa/201812-07',
'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html',
'http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab',
'http://www.debian.org/security/2016/dsa-3628',
'http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html',
'http://www.securityfocus.com/bid/92136',
'http://www.securitytracker.com/id/1036440',
'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731',
'https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c%40%3Cannounce.apache.org%3E',
'https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html',
'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/',
'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/',
'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/',
'https://rt.perl.org/Public/Bug/Display.html?id=127834',
'https://security.gentoo.org/glsa/201701-75',
'https://security.gentoo.org/glsa/201812-07'
],
'reported' => '2016-08-02',
'severity' => 'high'
}
],
'main_module' => 'ExtUtils::ParseXS',
'versions' => [
{
'date' => '2002-12-09T00:53:36',
'version' => '1.98_01'
},
{
'date' => '2003-02-05T18:22:19',
'version' => '1.99'
},
{
'date' => '2003-02-23T22:45:04',
'version' => '2.00'
},
{
'date' => '2003-03-20T15:25:07',
'version' => '2.01'
},
{
'date' => '2003-03-31T00:25:32',
'version' => '2.02'
},
{
'date' => '2003-08-16T22:57:00',
'version' => '2.03'
},
{
'date' => '2003-09-04T18:14:59',
'version' => '2.04'
},
{
'date' => '2003-09-29T15:35:39',
'version' => '2.05'
},
{
'date' => '2003-12-26T15:05:42',
'version' => '2.06'
},
{
'date' => '2004-01-25T23:04:13',
'version' => '2.07'
},
{
'date' => '2004-02-21T03:46:57',
'version' => '2.08'
},
{
'date' => '2005-03-27T17:18:20',
'version' => '2.09'
},
{
'date' => '2005-05-31T02:37:25',
'version' => '2.10'
},
{
'date' => '2005-06-14T04:04:10',
'version' => '2.11'
},
{
'date' => '2005-08-25T01:07:16',
'version' => '2.12'
},
{
'date' => '2005-10-04T03:02:19',
'version' => '2.13'
},
{
'date' => '2005-10-09T01:52:46',
'version' => '2.14'
},
{
'date' => '2005-10-10T15:09:54',
'version' => '2.15'
},
{
'date' => '2006-09-16T03:35:22',
'version' => '2.16'
},
{
'date' => '2006-11-20T23:08:18',
'version' => '2.17'
},
{
'date' => '2007-01-30T02:58:43',
'version' => '2.18'
},
{
'date' => '2008-02-17T20:29:31',
'version' => '2.19'
},
{
'date' => '2008-08-07T03:20:09',
'version' => '2.19_02'
},
{
'date' => '2009-06-28T03:01:41',
'version' => '2.19_03'
},
{
'date' => '2009-06-29T15:51:33',
'version' => '2.19_04'
},
{
'date' => '2009-07-01T17:49:20',
'version' => '2.20'
},
{
'date' => '2009-07-08T16:47:56',
'version' => '2.20_01'
},
{
'date' => '2009-07-18T21:23:28',
'version' => '2.2002'
},
{
'date' => '2009-07-24T03:16:46',
'version' => '2.20_03'
},
{
'date' => '2009-08-10T15:44:42',
'version' => '2.20_04'
},
{
'date' => '2009-08-23T01:50:17',
'version' => '2.20_05'
},
{
'date' => '2009-09-15T02:36:48',
'version' => '2.200401'
},
{
'date' => '2009-10-02T05:28:52',
'version' => '2.200402'
},
{
'date' => '2009-10-02T06:06:00',
'version' => '2.200403'
},
{
'date' => '2009-10-03T03:49:34',
'version' => '2.20_06'
},
{
'date' => '2009-10-03T15:28:29',
'version' => '2.20_07'
},
{
'date' => '2009-10-05T15:25:07',
'version' => '2.21'
},
{
'date' => '2009-12-19T12:43:55',
'version' => '2.21_01'
},
{
'date' => '2009-12-19T15:58:28',
'version' => '2.21_02'
},
{
'date' => '2010-01-11T20:03:31',
'version' => '2.22'
},
{
'date' => '2010-01-25T21:14:41',
'version' => '2.2201'
},
{
'date' => '2010-01-27T20:07:51',
'version' => '2.2202'
},
{
'date' => '2010-02-11T19:04:49',
'version' => '2.2203'
},
{
'date' => '2010-03-10T19:27:43',
'version' => '2.2204'
},
{
'date' => '2010-03-10T23:17:47',
'version' => '2.2205'
},
{
'date' => '2010-07-04T19:53:47',
'version' => '2.2206'
},
{
'date' => '2011-07-12T20:42:45',
'version' => '3.00_01'
},
{
'date' => '2011-07-14T13:21:26',
'version' => '3.00_02'
},
{
'date' => '2011-07-23T15:09:23',
'version' => '3.00_03'
},
{
'date' => '2011-07-27T20:24:26',
'version' => '3.00_04'
},
{
'date' => '2011-07-27T20:57:56',
'version' => '3.00_05'
},
{
'date' => '2011-08-04T16:06:39',
'version' => '3.01'
},
{
'date' => '2011-08-04T18:09:18',
'version' => '3.02'
},
{
'date' => '2011-08-11T06:25:52',
'version' => '3.03'
},
{
'date' => '2011-08-21T11:40:28',
'version' => '3.03_02'
},
{
'date' => '2011-08-24T17:51:31',
'version' => '3.03_03'
},
{
'date' => '2011-08-25T06:33:30',
'version' => '3.04'
},
{
'date' => '2011-08-28T15:57:42',
'version' => '3.04_01'
},
{
'date' => '2011-09-03T13:31:37',
'version' => '3.04_02'
},
{
'date' => '2011-09-04T16:55:05',
'version' => '3.04_03'
},
{
'date' => '2011-09-12T06:28:10',
'version' => '3.04_04'
},
{
'date' => '2011-10-05T06:18:44',
'version' => '3.05'
},
{
'date' => '2011-12-07T07:35:08',
'version' => '3.06'
},
{
'date' => '2011-12-07T13:15:12',
'version' => '3.07'
},
{
'date' => '2011-12-19T17:10:40',
'version' => '3.08'
},
{
'date' => '2011-12-28T18:05:57',
'version' => '3.09'
},
{
'date' => '2011-12-29T17:00:16',
'version' => '3.11'
},
{
'date' => '2012-01-28T12:07:45',
'version' => '3.13_01'
},
{
'date' => '2012-02-01T17:51:52',
'version' => '3.14'
},
{
'date' => '2012-02-02T07:15:27',
'version' => '3.15'
},
{
'date' => '2012-11-19T06:42:48',
'version' => '3.18'
},
{
'date' => '2013-04-11T18:19:45',
'version' => '3.18_01'
},
{
'date' => '2013-04-15T05:41:18',
'version' => '3.18_02'
},
{
'date' => '2013-04-19T16:47:41',
'version' => '3.18_03'
},
{
'date' => '2013-06-20T15:51:15',
'version' => '3.18_04'
},
{
'date' => '2013-08-09T17:14:04',
'version' => '3.21'
},
{
'date' => '2013-08-29T17:31:29',
'version' => '3.22'
},
{
'date' => '2014-03-07T09:35:16',
'version' => '3.24'
},
{
'date' => '2015-08-10T08:49:21',
'version' => '3.29_01'
},
{
'date' => '2015-08-31T08:44:00',
'version' => '3.30'
},
{
'date' => '2017-07-31T15:52:17',
'version' => '3.35'
},
{
'date' => '2017-12-18T12:31:00',
'version' => '3.36_03'
},
{
'date' => '2021-04-17T17:48:59',
'version' => '3.43_02'
},
{
'date' => '2022-01-06T23:02:34',
'version' => '3.44'
},
{
'date' => '2023-09-02T13:28:52',
'version' => '3.51'
}
]
},
'FCGI' => {
'advisories' => [
{
'affected_versions' => [
'<0.74'
],
'cves' => [
'CVE-2011-2766'
],
'description' => 'Leaking information across requests when using the deprecated and undocumented old FCGI interface.
',
'distribution' => 'FCGI',
'fixed_versions' => [
'>=0.74'
],
'id' => 'CPANSA-FCGI-2011-01',
'references' => [
'https://metacpan.org/changes/distribution/FCGI',
'https://github.com/perl-catalyst/FCGI/commit/297693dc8362d25bb25e473899c72508a0f71d2e'
],
'reported' => '2011-09-24'
}
],
'main_module' => 'FCGI',
'versions' => [
{
'date' => '1996-09-25T17:48:57',
'version' => '0.25'
},
{
'date' => '1996-10-15T21:51:06',
'version' => '0.26'
},
{
'date' => '1997-02-20T08:55:44',
'version' => '0.27'
},
{
'date' => '1997-02-25T07:14:13',
'version' => '0.28'
},
{
'date' => '1997-06-10T18:16:17',
'version' => '0.29'
},
{
'date' => '1997-06-24T17:17:05',
'version' => '0.30'
},
{
'date' => '1997-07-24T11:05:43',
'version' => '0.31'
},
{
'date' => '1998-06-17T10:24:17',
'version' => '0.34'
},
{
'date' => '1998-06-22T15:38:51',
'version' => '0.35'
},
{
'date' => '1998-06-24T19:42:57',
'version' => '0.36'
},
{
'date' => '1998-06-27T16:08:39',
'version' => '0.37'
},
{
'date' => '1998-07-15T15:24:00',
'version' => '0.40'
},
{
'date' => '1998-07-29T16:05:51',
'version' => '0.41'
},
{
'date' => '1998-08-28T15:30:49',
'version' => '0.42'
},
{
'date' => '1998-12-22T22:34:14',
'version' => '0.43'
},
{
'date' => '1998-12-23T11:28:39',
'version' => '0.44'
},
{
'date' => '1999-03-08T17:04:02',
'version' => '0.45'
},
{
'date' => '1999-07-30T08:26:31',
'version' => '0.46'
},
{
'date' => '1999-07-31T21:58:01',
'version' => '0.47'
},
{
'date' => '1999-08-27T13:41:54',
'version' => '0.48'
},
{
'date' => '2000-04-09T18:58:32',
'version' => '0.49'
},
{
'date' => '2000-04-10T07:04:43',
'version' => '0.50'
},
{
'date' => '2000-04-12T12:27:09',
'version' => '0.51'
},
{
'date' => '2000-04-12T14:10:02',
'version' => '0.52'
},
{
'date' => '2000-07-10T10:01:51',
'version' => '0.53'
},
{
'date' => '2000-10-08T19:52:29',
'version' => '0.54'
},
{
'date' => '2000-10-18T21:22:46',
'version' => '0.55'
},
{
'date' => '2000-11-03T15:44:28',
'version' => '0.56'
},
{
'date' => '2000-11-12T15:15:01',
'version' => '0.57'
},
{
'date' => '2000-11-14T23:20:24',
'version' => '0.58'
},
{
'date' => '2000-12-31T22:05:44',
'version' => '0.59'
},
{
'date' => '2001-06-08T15:19:08',
'version' => '0.60'
},
{
'date' => '2001-09-20T12:34:13',
'version' => '0.61'
},
{
'date' => '2001-09-21T16:19:42',
'version' => '0.62'
},
{
'date' => '2001-09-24T20:43:48',
'version' => '0.63'
},
{
'date' => '2001-09-25T08:26:24',
'version' => '0.64'
},
{
'date' => '2002-02-19T14:16:27',
'version' => '0.65'
},
{
'date' => '2002-09-05T16:23:07',
'version' => '0.66'
},
{
'date' => '2002-12-23T10:21:36',
'version' => '0.67'
},
{
'date' => '2009-12-20T21:05:48',
'version' => '0.67_01'
},
{
'date' => '2010-01-06T10:07:05',
'version' => '0.68'
},
{
'date' => '2010-01-10T01:35:11',
'version' => '0.68_01'
},
{
'date' => '2010-01-13T19:25:40',
'version' => '0.68_02'
},
{
'date' => '2010-02-15T23:08:12',
'version' => '0.69'
},
{
'date' => '2010-03-22T14:35:03',
'version' => '0.70'
},
{
'date' => '2010-04-01T00:55:33',
'version' => '0.71'
},
{
'date' => '2010-08-24T21:32:56',
'version' => '0.71_01'
},
{
'date' => '2011-04-28T08:50:09',
'version' => '0.71_02'
},
{
'date' => '2011-04-28T09:05:42',
'version' => '0.71_03'
},
{
'date' => '2011-05-19T09:06:02',
'version' => '0.72'
},
{
'date' => '2011-05-28T01:35:17',
'version' => '0.73'
},
{
'date' => '2011-09-24T08:31:47',
'version' => '0.74'
},
{
'date' => '2014-07-17T00:19:02',
'version' => '0.75'
},
{
'date' => '2014-08-05T01:29:06',
'version' => '0.76'
},
{
'date' => '2014-08-05T15:53:28',
'version' => '0.77'
},
{
'date' => '2016-03-07T00:08:23',
'version' => '0.78'
},
{
'date' => '2019-12-14T18:29:19',
'version' => '0.79'
},
{
'date' => '2021-07-25T04:54:49',
'version' => '0.80'
},
{
'date' => '2021-07-30T23:19:01',
'version' => '0.81'
},
{
'date' => '2021-07-31T03:26:34',
'version' => '0.82'
}
]
},
'Fake-Encode' => {
'advisories' => [
{
'affected_versions' => [
'<0.08'
],
'cves' => [
'CVE-2016-1238'
],
'description' => 'Loading modules from . (current directory).
',
'distribution' => 'Fake-Encode',
'fixed_versions' => [
'>=0.08'
],
'id' => 'CPANSA-Fake-Encode-2017-01',
'references' => [
'https://metacpan.org/changes/distribution/Fake-Encode'
],
'reported' => '2017-01-23'
}
],
'main_module' => 'Fake::Encode',
'versions' => [
{
'date' => '2016-05-31T14:11:49',
'version' => '0.01'
},
{
'date' => '2017-01-23T12:34:23',
'version' => '0.02'
},
{
'date' => '2017-01-25T15:52:13',
'version' => '0.03'
},
{
'date' => '2017-01-26T15:17:01',
'version' => '0.04'
},
{
'date' => '2017-03-06T16:01:40',
'version' => '0.05'
},
{
'date' => '2017-09-08T17:54:14',
'version' => '0.06'
},
{
'date' => '2017-09-09T15:27:50',
'version' => '0.07'
},
{
'date' => '2018-02-03T14:50:49',
'version' => '0.08'
},
{
'date' => '2018-02-19T12:21:04',
'version' => '0.09'
},
{
'date' => '2019-07-11T16:26:06',
'version' => '0.10'
},
{
'date' => '2023-03-25T02:26:13',
'version' => '0.11'
}
]
},
'Fake-Our' => {
'advisories' => [
{
'affected_versions' => [
'<0.06'
],
'cves' => [
'CVE-2016-1238'
],
'description' => 'Loading modules from . (current directory).
',
'distribution' => 'Fake-Our',
'fixed_versions' => [
'>=0.06'
],
'id' => 'CPANSA-Fake-Our-2017-01',
'references' => [
'https://metacpan.org/changes/distribution/Fake-Our'
],
'reported' => '2017-01-23'
}
],
'main_module' => 'Fake::Our',
'versions' => [
{
'date' => '2014-02-09T05:36:09',
'version' => '0.01'
},
{
'date' => '2014-08-06T17:33:15',
'version' => '0.02'
},
{
'date' => '2014-08-09T02:35:25',
'version' => '0.03'
},
{
'date' => '2014-08-10T15:33:58',
'version' => '0.04'
},
{
'date' => '2015-06-21T04:09:47',
'version' => '0.05'
},
{
'date' => '2017-01-23T12:34:34',
'version' => '0.06'
},
{
'date' => '2017-01-26T15:21:45',
'version' => '0.07'
},
{
'date' => '2017-01-27T15:18:56',
'version' => '0.08'
},
{
'date' => '2017-01-28T15:07:50',
'version' => '0.09'
},
{
'date' => '2017-03-06T16:01:51',
'version' => '0.10'
},
{
'date' => '2018-02-03T11:05:49',
'version' => '0.11'
},
{
'date' => '2018-02-16T17:54:00',
'version' => '0.12'
},
{
'date' => '2018-02-17T01:35:58',
'version' => '0.13'
},
{
'date' => '2018-02-18T15:32:17',
'version' => '0.14'
},
{
'date' => '2019-07-11T16:27:42',
'version' => '0.15'
},
{
'date' => '2019-07-14T00:51:24',
'version' => '0.16'
},
{
'date' => '2023-03-25T02:32:44',
'version' => '0.17'
}
]
},
'File-DataClass' => {
'advisories' => [
{
'affected_versions' => [
'<0.72.1'
],
'cves' => [
'CVE-2016-1238'
],
'description' => 'Loading modules from . (current directory).
',
'distribution' => 'File-DataClass',
'fixed_versions' => [
'>=0.72.1'
],
'id' => 'CPANSA-File-DataClass-2017-01',
'references' => [
'https://metacpan.org/changes/distribution/File-DataClass'
],
'reported' => '2017-04-01'
}
],
'main_module' => 'File::DataClass',
'versions' => [
{
'date' => '2010-09-29T16:37:04',
'version' => '0.1.228'
},
{
'date' => '2010-10-06T14:20:31',
'version' => '0.2.234'
},
{
'date' => '2011-01-26T18:14:50',
'version' => '0.3.238'
},
{
'date' => '2011-02-27T23:09:38',
'version' => '0.3.239'
},
{
'date' => '2011-04-12T19:44:59',
'version' => '0.3.259'
},
{
'date' => '2011-05-15T17:45:09',
'version' => '0.4.268'
},
{
'date' => '2011-05-30T01:47:40',
'version' => '0.5.271'
},
{
'date' => '2011-07-11T13:39:10',
'version' => '0.6.286'
},
{
'date' => '2011-11-30T00:05:18',
'version' => '0.7.321'
},
{
'date' => '2011-12-02T04:40:20',
'version' => '0.7.325'
},
{
'date' => '2011-12-02T22:39:25',
'version' => '0.7.326'
},
{
'date' => '2011-12-03T18:43:58',
'version' => '0.7.328'
},
{
'date' => '2012-02-22T18:28:29',
'version' => '0.7.330'
},
{
'date' => '2012-02-23T11:00:24',
'version' => '0.7.331'
},
{
'date' => '2012-02-24T10:52:18',
'version' => '0.7.332'
},
{
'date' => '2012-03-12T17:34:58',
'version' => '0.7.335'
},
{
'date' => '2012-03-20T18:24:26',
'version' => '0.7.336'
},
{
'date' => '2012-03-21T22:43:50',
'version' => '0.7.338'
},
{
'date' => '2012-03-22T13:48:59',
'version' => '0.7.339'
},
{
'date' => '2012-03-24T00:37:31',
'version' => '0.7.343'
},
{
'date' => '2012-03-28T23:58:41',
'version' => '0.8.351'
},
{
'date' => '2012-03-29T22:05:21',
'version' => '0.8.355'
},
{
'date' => '2012-04-03T00:26:12',
'version' => '0.8.357'
},
{
'date' => '2012-04-04T15:19:03',
'version' => '0.8.360'
},
{
'date' => '2012-04-17T18:57:01',
'version' => '0.9.368'
},
{
'date' => '2012-05-19T21:05:56',
'version' => '0.10.380'
},
{
'date' => '2012-07-10T00:34:23',
'version' => '0.11.401'
},
{
'date' => '2012-09-02T13:43:37',
'version' => '0.12.406'
},
{
'date' => '2012-09-06T14:02:06',
'version' => '0.12.409'
},
{
'date' => '2012-11-07T07:49:39',
'version' => '0.13.416'
},
{
'date' => '2012-11-13T20:16:27',
'version' => '0.13.418'
},
{
'date' => '2012-12-12T23:25:16',
'version' => '0.13.420'
},
{
'date' => '2012-12-14T17:58:08',
'version' => '0.13.421'
},
{
'date' => '2012-12-19T22:23:08',
'version' => '0.13.422'
},
{
'date' => '2012-12-21T20:48:41',
'version' => '0.13.424'
},
{
'date' => '2012-12-30T03:05:28',
'version' => '0.13.427'
},
{
'date' => '2013-01-07T00:52:48',
'version' => '0.14.429'
},
{
'date' => '2013-04-01T01:14:44',
'version' => '0.15.431'
},
{
'date' => '2013-04-02T14:21:13',
'version' => '0.15.434'
},
{
'date' => '2013-04-14T16:15:55',
'version' => 'v0.16.438'
},
{
'date' => '2013-04-15T20:42:56',
'version' => 'v0.16.442'
},
{
'date' => '2013-04-24T03:47:54',
'version' => 'v0.16.445'
},
{
'date' => '2013-04-29T17:12:37',
'version' => 'v0.17.450'
},
{
'date' => '2013-04-30T22:15:36',
'version' => 'v0.18.6'
},
{
'date' => '2013-05-02T14:14:57',
'version' => 'v0.19.1'
},
{
'date' => '2013-05-07T23:33:06',
'version' => 'v0.20.6'
},
{
'date' => '2013-05-10T14:58:03',
'version' => 'v0.20.7'
},
{
'date' => '2013-05-14T13:32:28',
'version' => 'v0.20.8'
},
{
'date' => '2013-05-15T20:03:34',
'version' => 'v0.20.9'
},
{
'date' => '2013-05-16T00:11:50',
'version' => 'v0.20.10'
},
{
'date' => '2013-05-17T16:07:41',
'version' => 'v0.20.12'
},
{
'date' => '2013-06-08T13:26:40',
'version' => 'v0.20.13'
},
{
'date' => '2013-07-28T17:41:14',
'version' => 'v0.22.1'
},
{
'date' => '2013-07-29T11:39:49',
'version' => 'v0.22.2'
},
{
'date' => '2013-07-29T11:46:28',
'version' => 'v0.22.3'
},
{
'date' => '2013-07-29T18:37:14',
'version' => 'v0.22.4'
},
{
'date' => '2013-07-30T10:19:23',
'version' => 'v0.22.5'
},
{
'date' => '2013-07-30T16:25:59',
'version' => 'v0.22.7'
},
{
'date' => '2013-07-31T09:54:30',
'version' => 'v0.22.8'
},
{
'date' => '2013-08-02T19:06:49',
'version' => 'v0.22.9'
},
{
'date' => '2013-08-06T17:19:31',
'version' => 'v0.23.1'
},
{
'date' => '2013-08-07T13:14:13',
'version' => 'v0.23.2'
},
{
'date' => '2013-08-13T18:01:24',
'version' => '0.24.1'
},
{
'date' => '2013-08-16T22:49:23',
'version' => '0.24.3'
},
{
'date' => '2013-09-03T13:11:17',
'version' => '0.25.1'
},
{
'date' => '2013-09-26T16:04:18',
'version' => '0.26.1'
},
{
'date' => '2013-11-22T09:42:00',
'version' => '0.27.1'
},
{
'date' => '2014-01-01T15:02:23',
'version' => '0.28.1'
},
{
'date' => '2014-01-01T17:03:18',
'version' => '0.29.1'
},
{
'date' => '2014-01-02T02:33:28',
'version' => '0.30.1'
},
{
'date' => '2014-01-13T18:41:29',
'version' => '0.31.1'
},
{
'date' => '2014-01-24T20:56:21',
'version' => '0.33.1'
},
{
'date' => '2014-04-04T10:52:59',
'version' => '0.34.1'
},
{
'date' => '2014-05-01T14:40:32',
'version' => '0.35.1'
},
{
'date' => '2014-05-13T10:03:54',
'version' => '0.36.1'
},
{
'date' => '2014-05-13T21:08:07',
'version' => '0.37.1'
},
{
'date' => '2014-05-15T00:11:43',
'version' => '0.38.1'
},
{
'date' => '2014-05-16T08:19:01',
'version' => '0.39.1'
},
{
'date' => '2014-05-22T09:37:34',
'version' => '0.40.1'
},
{
'date' => '2014-05-22T14:10:49',
'version' => '0.40.2'
},
{
'date' => '2014-05-28T10:28:42',
'version' => '0.41.1'
},
{
'date' => '2014-07-03T23:27:53',
'version' => '0.42.1'
},
{
'date' => '2014-07-04T09:25:10',
'version' => '0.42.2'
},
{
'date' => '2014-07-04T12:19:02',
'version' => '0.43.1'
},
{
'date' => '2014-07-16T12:39:03',
'version' => '0.44.1'
},
{
'date' => '2014-08-18T23:00:05',
'version' => '0.45.1'
},
{
'date' => '2014-08-26T12:43:14',
'version' => '0.45.5'
},
{
'date' => '2014-08-26T16:41:35',
'version' => '0.46.1'
},
{
'date' => '2014-08-27T16:17:50',
'version' => '0.47.1'
},
{
'date' => '2014-09-03T22:25:51',
'version' => '0.48.1'
},
{
'date' => '2014-10-02T17:39:13',
'version' => '0.48.3'
},
{
'date' => '2014-10-02T19:59:28',
'version' => '0.49.1'
},
{
'date' => '2014-11-07T18:51:52',
'version' => '0.50.1'
},
{
'date' => '2014-11-08T21:45:45',
'version' => '0.50.2'
},
{
'date' => '2014-11-09T13:19:50',
'version' => '0.50.3'
},
{
'date' => '2014-11-09T15:52:41',
'version' => '0.51.1'
},
{
'date' => '2014-11-10T12:44:49',
'version' => '0.52.1'
},
{
'date' => '2014-12-19T11:49:49',
'version' => '0.53.1'
},
{
'date' => '2014-12-19T22:54:41',
'version' => '0.54.1'
},
{
'date' => '2015-02-05T00:04:33',
'version' => '0.55.1'
},
{
'date' => '2015-03-19T14:59:03',
'version' => '0.56.1'
},
{
'date' => '2015-04-04T20:00:58',
'version' => '0.57.1'
},
{
'date' => '2015-04-04T20:16:31',
'version' => '0.58.1'
},
{
'date' => '2015-04-05T17:58:31',
'version' => '0.59.1'
},
{
'date' => '2015-04-08T23:10:28',
'version' => '0.60.1'
},
{
'date' => '2015-05-11T12:15:05',
'version' => '0.61.1'
},
{
'date' => '2015-05-24T11:52:28',
'version' => '0.62.1'
},
{
'date' => '2015-06-21T21:42:17',
'version' => '0.63.1'
},
{
'date' => '2015-08-29T08:58:54',
'version' => '0.66.1'
},
{
'date' => '2016-02-01T00:18:43',
'version' => '0.67.1'
},
{
'date' => '2016-02-01T14:33:11',
'version' => '0.68.1'
},
{
'date' => '2016-07-05T00:36:52',
'version' => '0.69.1'
},
{
'date' => '2016-07-29T15:24:24',
'version' => '0.70.1'
},
{
'date' => '2016-07-29T18:59:13',
'version' => '0.71.1'
},
{
'date' => '2017-04-02T08:23:47',
'version' => '0.72.1'
},
{
'date' => '2017-06-02T00:03:17',
'version' => '0.73.1'
}
]
},
'File-KeePass' => {
'advisories' => [
{
'affected_versions' => [
'>0'
],
'cves' => [],
'description' => 'The module is making use of the perl rand function for key and iv generation (for Crypt::Rijndael).
',
'distribution' => 'File-KeePass',
'fixed_versions' => [],
'id' => 'CPANSA-File-KeePass-2016-01',
'references' => [
'https://rt.cpan.org/Ticket/Display.html?id=117836'
],
'reported' => '2016-09-14',
'severity' => undef
}
],
'main_module' => 'File::KeePass',
'versions' => [
{
'date' => '2010-06-29T14:52:50',
'version' => '0.01'
},
{
'date' => '2010-12-04T04:33:41',
'version' => '0.02'
},
{
'date' => '2010-12-07T06:06:57',
'version' => '0.03'
},
{
'date' => '2012-09-13T04:48:56',
'version' => '2.00'
},
{
'date' => '2012-09-13T14:17:11',
'version' => '2.01'
},
{
'date' => '2012-09-13T15:22:40',
'version' => '2.02'
},
{
'date' => '2012-09-15T22:25:43',
'version' => '2.03'
}
]
},
'File-Path' => {
'advisories' => [
{
'affected_versions' => [
'<2.13'
],
'cves' => [
'CVE-2017-6512'
],
'description' => 'Race condition in the rmtree and remove_tree functions allows attackers to set the mode on arbitrary files via vectors involving directory-permission loosening logic.
',
'distribution' => 'File-Path',
'fixed_versions' => [
'>=2.13'
],
'id' => 'CPANSA-File-Path-2017-01',
'references' => [
'https://metacpan.org/changes/distribution/File-Path',
'https://github.com/jkeenan/File-Path/commit/e5ef95276ee8ad471c66ee574a5d42552b3a6af2'
],
'reported' => '2017-05-02'
},
{
'affected_versions' => [
'<=1.08'
],
'cves' => [
'CVE-2008-5303'
],
'description' => 'Race condition in the rmtree function in File::Path 1.08 (lib/File/Path.pm) in Perl 5.8.8 allows local users to to delete arbitrary files via a symlink attack, a different vulnerability than CVE-2005-0448, CVE-2004-0452, and CVE-2008-2827. NOTE: this is a regression error related to CVE-2005-0448. It is different from CVE-2008-5302 due to affected versions.
',
'distribution' => 'File-Path',
'fixed_versions' => [],
'id' => 'CPANSA-File-Path-2008-5303',
'references' => [
'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286905',
'http://www.openwall.com/lists/oss-security/2008/11/28/2',
'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286922#36',
'http://www.gossamer-threads.com/lists/perl/porters/233695#233695',
'http://www.debian.org/security/2008/dsa-1678',
'http://www.ubuntu.com/usn/usn-700-1',
'http://secunia.com/advisories/33314',
'http://wiki.rpath.com/Advisories:rPSA-2009-0011',
'http://www.ubuntu.com/usn/usn-700-2',
'http://secunia.com/advisories/32980',
'http://support.apple.com/kb/HT4077',
'http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html',
'http://www.redhat.com/support/errata/RHSA-2010-0458.html',
'http://secunia.com/advisories/40052',
'http://www.mandriva.com/security/advisories?name=MDVSA-2010:116',
'http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735',
'http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/47044',
'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9699',
'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6680',
'http://www.securityfocus.com/archive/1/500210/100/0/threaded'
],
'reported' => '2008-12-01',
'severity' => undef
},
{
'affected_versions' => [
'=1.08',
'=2.07'
],
'cves' => [
'CVE-2008-5302'
],
'description' => 'Race condition in the rmtree function in File::Path 1.08 and 2.07 (lib/File/Path.pm) in Perl 5.8.8 and 5.10.0 allows local users to create arbitrary setuid binaries via a symlink attack, a different vulnerability than CVE-2005-0448, CVE-2004-0452, and CVE-2008-2827. NOTE: this is a regression error related to CVE-2005-0448. It is different from CVE-2008-5303 due to affected versions.
',
'distribution' => 'File-Path',
'fixed_versions' => [],
'id' => 'CPANSA-File-Path-2008-5302',
'references' => [
'http://www.gossamer-threads.com/lists/perl/porters/233695#233695',
'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286922#36',
'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286905',
'http://www.openwall.com/lists/oss-security/2008/11/28/2',
'http://www.debian.org/security/2008/dsa-1678',
'http://secunia.com/advisories/33314',
'http://www.ubuntu.com/usn/usn-700-1',
'http://wiki.rpath.com/Advisories:rPSA-2009-0011',
'http://www.ubuntu.com/usn/usn-700-2',
'http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html',
'http://secunia.com/advisories/32980',
'http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html',
'http://support.apple.com/kb/HT4077',
'http://secunia.com/advisories/40052',
'http://www.mandriva.com/security/advisories?name=MDVSA-2010:116',
'http://www.redhat.com/support/errata/RHSA-2010-0458.html',
'http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735',
'http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/47043',
'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6890',
'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11076',
'http://www.securityfocus.com/archive/1/500210/100/0/threaded'
],
'reported' => '2008-12-01',
'severity' => undef
},
{
'affected_versions' => [
'>=2.04,<2.07'
],
'cves' => [
'CVE-2008-2827'
],
'description' => 'The rmtree function in lib/File/Path.pm in Perl 5.10 does not properly check permissions before performing a chmod, which allows local users to modify the permissions of arbitrary files via a symlink attack, a different vulnerability than CVE-2005-0448 and CVE-2004-0452.
',
'distribution' => 'File-Path',
'fixed_versions' => [
'>=2.07'
],
'id' => 'CPANSA-File-Path-2008-2827',
'references' => [
'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=487319',
'http://rt.cpan.org/Public/Bug/Display.html?id=36982',
'http://www.securityfocus.com/bid/29902',
'http://secunia.com/advisories/30790',
'http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html',
'http://www.mandriva.com/security/advisories?name=MDVSA-2008:165',
'https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01025.html',
'http://secunia.com/advisories/30837',
'http://secunia.com/advisories/31687',
'http://www.securitytracker.com/id?1020373',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/43308'
],
'reported' => '2008-06-23',
'severity' => undef
},
{
'affected_versions' => [
'<1.07'
],
'cves' => [
'CVE-2005-0448'
],
'description' => 'Race condition in the rmtree function in File::Path.pm in Perl before 5.8.4 allows local users to create arbitrary setuid binaries in the tree being deleted, a different vulnerability than CVE-2004-0452.
',
'distribution' => 'File-Path',
'fixed_versions' => [],
'id' => 'CPANSA-File-Path-2005-0448',
'references' => [
'http://www.debian.org/security/2005/dsa-696',
'http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml',
'http://www.redhat.com/support/errata/RHSA-2005-881.html',
'http://secunia.com/advisories/18075',
'http://www.securityfocus.com/bid/12767',
'ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U',
'http://secunia.com/advisories/14531',
'http://secunia.com/advisories/18517',
'http://fedoranews.org/updates/FEDORA--.shtml',
'http://www.redhat.com/support/errata/RHSA-2005-674.html',
'http://secunia.com/advisories/17079',
'http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056',
'http://www.mandriva.com/security/advisories?name=MDKSA-2005:079',
'http://www.securityfocus.com/advisories/8704',
'http://secunia.com/advisories/55314',
'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A728',
'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10475',
'https://usn.ubuntu.com/94-1/'
],
'reported' => '2005-05-02',
'severity' => undef
},
{
'affected_versions' => [
'>=1.06,<=1.404'
],
'cves' => [
'CVE-2004-0452'
],
'description' => 'Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/write permissions for the world, which allows local users to delete arbitrary files and directories, and possibly read files and directories, via a symlink attack.
',
'distribution' => 'File-Path',
'fixed_versions' => [],
'id' => 'CPANSA-File-Path-2004-0452',
'references' => [
'http://www.debian.org/security/2004/dsa-620',
'http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml',
'http://www.redhat.com/support/errata/RHSA-2005-103.html',
'ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U',
'http://www.securityfocus.com/bid/12072',
'http://secunia.com/advisories/12991',
'http://secunia.com/advisories/18517',
'http://fedoranews.org/updates/FEDORA--.shtml',
'http://www.redhat.com/support/errata/RHSA-2005-105.html',
'http://secunia.com/advisories/55314',
'http://marc.info/?l=bugtraq&m=110547693019788&w=2',
'https://www.ubuntu.com/usn/usn-44-1/',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/18650',
'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9938'
],
'reported' => '2004-12-21',
'severity' => undef
}
],
'main_module' => 'File::Path',
'versions' => [
{
'date' => '2007-05-17T13:46:15',
'version' => '1.99_01'
},
{
'date' => '2007-05-27T09:29:48',
'version' => '1.99_02'
},
{
'date' => '2007-06-27T19:23:09',
'version' => '2.00_05'
},
{
'date' => '2007-07-04T21:37:13',
'version' => '2.00_06'
},
{
'date' => '2007-07-09T19:37:02',
'version' => '2.00_07'
},
{
'date' => '2007-08-01T00:10:43',
'version' => '2.00_08'
},
{
'date' => '2007-08-20T18:15:55',
'version' => '2.00_09'
},
{
'date' => '2007-09-04T17:20:45',
'version' => '2.00_10'
},
{
'date' => '2007-09-08T12:53:07',
'version' => '2.00_11'
},
{
'date' => '2007-09-29T10:29:32',
'version' => '2.01'
},
{
'date' => '2007-10-24T10:36:09',
'version' => '2.02'
},
{
'date' => '2007-11-04T18:36:19',
'version' => '2.03'
},
{
'date' => '2007-11-24T09:53:23',
'version' => '2.04'
},
{
'date' => '2008-05-07T08:25:05',
'version' => '2.05'
},
{
'date' => '2008-05-08T09:36:50',
'version' => '2.06'
},
{
'date' => '2008-05-10T21:02:47',
'version' => '2.06_01'
},
{
'date' => '2008-05-12T10:07:46',
'version' => '2.06_02'
},
{
'date' => '2008-05-12T21:43:43',
'version' => '2.06_03'
},
{
'date' => '2008-05-13T14:40:30',
'version' => '2.06_04'
},
{
'date' => '2008-10-01T20:41:37',
'version' => '2.06_05'
},
{
'date' => '2008-10-05T21:59:58',
'version' => '2.06_06'
},
{
'date' => '2008-10-29T17:55:36',
'version' => '2.06_07'
},
{
'date' => '2008-11-05T00:12:29',
'version' => '2.06_08'
},
{
'date' => '2008-11-09T13:11:17',
'version' => '2.07'
},
{
'date' => '2009-06-21T13:23:32',
'version' => '2.07_03'
},
{
'date' => '2009-10-04T10:31:05',
'version' => '2.08'
},
{
'date' => '2013-01-16T21:36:05',
'version' => '2.09'
},
{
'date' => '2015-06-24T17:03:22',
'version' => '2.10_001'
},
{
'date' => '2015-06-26T17:28:20',
'version' => '2.10_002'
},
{
'date' => '2015-07-08T16:59:11',
'version' => '2.10_003'
},
{
'date' => '2015-07-10T11:34:44',
'version' => '2.10_004'
},
{
'date' => '2015-07-17T15:03:07',
'version' => '2.10_005'
},
{
'date' => '2015-07-18T02:28:14',
'version' => '2.11'
},
{
'date' => '2015-07-24T23:01:36',
'version' => '2.11_001'
},
{
'date' => '2015-07-25T09:56:18',
'version' => '2.11_002'
},
{
'date' => '2015-08-03T18:07:05',
'version' => '2.11_003'
},
{
'date' => '2015-10-01T19:34:07',
'version' => '2.11_004'
},
{
'date' => '2015-10-09T12:11:52',
'version' => '2.12'
},
{
'date' => '2016-09-18T13:35:39',
'version' => '2.12_001'
},
{
'date' => '2017-03-12T22:09:35',
'version' => '2.12_002'
},
{
'date' => '2017-04-07T13:59:30',
'version' => '2.12_003'
},
{
'date' => '2017-04-18T18:37:56',
'version' => '2.12_004'
},
{
'date' => '2017-04-21T12:03:20',
'version' => '2.12_005'
},
{
'date' => '2017-04-21T21:58:56',
'version' => '2.12_006'
},
{
'date' => '2017-04-22T20:09:24',
'version' => '2.12_007'
},
{
'date' => '2017-05-07T17:48:35',
'version' => '2.12_008'
},
{
'date' => '2017-05-31T23:44:51',
'version' => '2.13'
},
{
'date' => '2017-06-07T21:34:52',
'version' => '2.14'
},
{
'date' => '2017-07-30T02:40:36',
'version' => '2.15'
},
{
'date' => '2018-08-31T13:04:13',
'version' => '2.16'
},
{
'date' => '2020-07-18T18:29:28',
'version' => '2.17'
},
{
'date' => '2020-11-04T12:38:02',
'version' => '2.18_001'
},
{
'date' => '2020-11-05T01:30:15',
'version' => '2.18'
}
]
},
'File-Slurp' => {
'advisories' => [
{
'affected_versions' => [
'<9999.26'
],
'cves' => [],
'description' => 'Use of sysread treats any :encoding(...) as effectively :utf8.
',
'distribution' => 'File-Slurp',
'fixed_versions' => [
'>=9999.26'
],
'id' => 'CPANSA-File-Slurp-2013-01',
'references' => [
'https://rt.cpan.org/Public/Bug/Display.html?id=83126',
'https://rt.perl.org/Ticket/Display.html?id=121870'
],
'reported' => '2013-02-04'
}
],
'main_module' => 'File::Slurp',
'versions' => [
{
'date' => '1996-04-22T21:18:00',
'version' => '96.042202'
},
{
'date' => '1998-07-19T16:25:00',
'version' => '98.071901'
},
{
'date' => '2001-11-04T03:17:00',
'version' => '2001.1103'
},
{
'date' => '2002-03-08T05:22:00',
'version' => '2002.0305'
},
{
'date' => '2002-11-01T03:14:00',
'version' => '2002.1031'
},
{
'date' => '2003-09-04T16:28:00',
'version' => '2004.0904'
},
{
'date' => '2003-11-24T07:45:57',
'version' => '0.01'
},
{
'date' => '2003-11-24T08:02:47',
'version' => '9999.01'
},
{
'date' => '2003-12-17T09:20:57',
'version' => '9999.02'
},
{
'date' => '2003-12-22T06:54:57',
'version' => '9999.03'
},
{
'date' => '2004-02-23T19:27:53',
'version' => '9999.04'
},
{
'date' => '2004-09-21T05:23:58',
'version' => '9999.06'
},
{
'date' => '2005-01-30T10:01:07',
'version' => '9999.07'
},
{
'date' => '2005-04-16T05:06:09',
'version' => '9999.08'
},
{
'date' => '2005-04-29T06:09:11',
'version' => '9999.09'
},
{
'date' => '2006-01-19T18:29:42',
'version' => '9999.10'
},
{
'date' => '2006-01-20T06:45:13',
'version' => '9999.11'
},
{
'date' => '2006-03-07T07:13:42',
'version' => '9999.12'
},
{
'date' => '2008-01-24T04:57:12',
'version' => '9999.13'
},
{
'date' => '2011-03-22T22:41:08',
'version' => '9999.14'
},
{
'date' => '2011-03-24T22:52:42',
'version' => '9999.15'
},
{
'date' => '2011-04-24T04:26:18',
'version' => '9999.16'
},
{
'date' => '2011-05-13T06:23:08',
'version' => '9999.17'
},
{
'date' => '2011-05-13T07:03:44',
'version' => '9999.18'
},
{
'date' => '2011-06-07T08:08:06',
'version' => '9999.19'
},
{
'date' => '2018-09-28T01:57:50',
'version' => '9999.20_01'
},
{
'date' => '2018-10-05T01:23:09',
'version' => '9999.20_02'
},
{
'date' => '2018-10-08T21:16:27',
'version' => '9999.21'
},
{
'date' => '2018-10-16T03:15:39',
'version' => '9999.22'
},
{
'date' => '2018-10-20T20:06:53',
'version' => '9999.23'
},
{
'date' => '2018-10-30T02:45:09',
'version' => '9999.24'
},
{
'date' => '2018-11-16T16:11:34',
'version' => '9999.25'
},
{
'date' => '2019-02-13T16:35:40',
'version' => '9999.26'
},
{
'date' => '2019-04-05T13:28:05',
'version' => '9999.27'
},
{
'date' => '2019-09-13T00:36:22',
'version' => '9999.28'
},
{
'date' => '2019-11-27T20:40:47',
'version' => '9999.29'
},
{
'date' => '2020-03-09T14:31:40',
'version' => '9999.30'
},
{
'date' => '2020-06-28T22:33:21',
'version' => '9999.31'
},
{
'date' => '2020-07-01T00:34:08',
'version' => '9999.32'
}
]
},
'File-Temp' => {
'advisories' => [
{
'affected_versions' => [
'>0'
],
'cves' => [
'CVE-2011-4116'
],
'description' => '_is_safe in the File::Temp module for Perl does not properly handle symlinks.
',
'distribution' => 'File-Temp',
'fixed_versions' => [],
'id' => 'CPANSA-File-Temp-2011-4116',
'references' => [
'http://www.openwall.com/lists/oss-security/2011/11/04/2',
'https://rt.cpan.org/Public/Bug/Display.html?id=69106',
'https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14',
'http://www.openwall.com/lists/oss-security/2011/11/04/4',
'https://seclists.org/oss-sec/2011/q4/238'
],
'reported' => '2020-01-31',
'severity' => 'high'
}
],
'main_module' => 'File::Temp',
'versions' => [
{
'date' => '2000-03-14T20:15:55',
'version' => '0.05'
},
{
'date' => '2000-04-28T04:48:55',
'version' => '0.07'
},
{
'date' => '2000-05-16T01:10:28',
'version' => '0.08'
},
{
'date' => '2000-07-26T20:30:30',
'version' => '0.09'
},
{
'date' => '2000-12-12T21:04:53',
'version' => '0.11'
},
{
'date' => '2001-02-23T00:37:44',
'version' => '0.12'
},
{
'date' => '2003-08-16T04:06:11',
'version' => '0.13'
},
{
'date' => '2003-08-17T04:42:50',
'version' => '0.14'
},
{
'date' => '2005-02-22T05:40:33',
'version' => '0.15'
},
{
'date' => '2005-02-22T21:42:47',
'version' => '0.16'
},
{
'date' => '2006-08-18T22:40:10',
'version' => '0.17'
},
{
'date' => '2007-01-22T00:18:40',
'version' => '0.18'
},
{
'date' => '2007-11-20T08:28:08',
'version' => '0.19'
},
{
'date' => '2007-12-21T00:46:29',
'version' => '0.20'
},
{
'date' => '2008-11-14T01:30:09',
'version' => '0.21'
},
{
'date' => '2009-06-29T07:41:24',
'version' => '0.22'
},
{
'date' => '2013-02-07T17:03:45',
'version' => '0.22_90'
},
{
'date' => '2013-03-14T21:57:42',
'version' => '0.23'
},
{
'date' => '2013-04-11T15:31:13',
'version' => '0.2301'
},
{
'date' => '2013-09-26T13:48:13',
'version' => '0.2302'
},
{
'date' => '2013-10-09T13:59:01',
'version' => '0.2303'
},
{
'date' => '2013-10-10T13:17:32',
'version' => '0.2304'
},
{
'date' => '2018-04-19T12:01:34',
'version' => '0.2305'
},
{
'date' => '2018-06-24T19:34:31',
'version' => '0.2306'
},
{
'date' => '2018-06-24T19:41:28',
'version' => '0.2307'
},
{
'date' => '2018-07-11T21:07:49',
'version' => '0.2308'
},
{
'date' => '2019-01-06T20:32:53',
'version' => '0.2309'
},
{
'date' => '2020-09-26T17:39:38',
'version' => '0.2310'
},
{
'date' => '2020-10-03T04:04:55',
'version' => '0.2311'
}
]
},
'Filesys-SmbClientParser' => {
'advisories' => [
{
'affected_versions' => [
'<=2.7'
],
'cves' => [
'CVE-2008-3285'
],
'description' => 'The Filesys::SmbClientParser module 2.7 and earlier for Perl allows remote SMB servers to execute arbitrary code via a folder name containing shell metacharacters.
',
'distribution' => 'Filesys-SmbClientParser',
'fixed_versions' => [],
'id' => 'CPANSA-Filesys-SmbClientParser-2008-3285',
'references' => [
'http://www.securityfocus.com/bid/30290',
'http://secunia.com/advisories/31175',
'http://securityreason.com/securityalert/4027',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/43910',
'http://www.securityfocus.com/archive/1/494536/100/0/threaded'
],
'reported' => '2008-07-24',
'severity' => undef
}
],
'main_module' => 'Filesys::SmbClientParser',
'versions' => [
{
'date' => '2000-11-19T21:10:38',
'version' => '0.01'
},
{
'date' => '2000-11-20T19:41:09',
'version' => '0.2'
},
{
'date' => '2001-01-12T00:31:50',
'version' => '0.3'
},
{
'date' => '2001-04-15T22:37:14',
'version' => '1.2'
},
{
'date' => '2001-04-19T17:38:19',
'version' => '1.3'
},
{
'date' => '2001-05-30T08:04:44',
'version' => '1.4'
},
{
'date' => '2002-01-25T12:18:47',
'version' => '2.0'
},
{
'date' => '2002-04-19T21:56:09',
'version' => '2.1'
},
{
'date' => '2002-08-09T11:24:20',
'version' => '2.2'
},
{
'date' => '2002-08-13T14:55:48',
'version' => '2.3'
},
{
'date' => '2002-11-08T23:57:07',
'version' => '2.4'
},
{
'date' => '2002-11-12T18:59:33',
'version' => '2.5'
},
{
'date' => '2004-01-28T23:06:58',
'version' => '2.6'
},
{
'date' => '2004-04-14T21:56:02',
'version' => '2.7'
}
]
},
'GBrowse' => {
'advisories' => [
{
'affected_versions' => [
'<2.56'
],
'cves' => [],
'description' => 'An attacker is able to delete other users\' accounts. No httponly cookie flag. Cross-site scripting vulnerability in generation of citation text.
',
'distribution' => 'GBrowse',
'fixed_versions' => [
'>=2.56'
],
'id' => 'CPANSA-GBrowse-2017-01',
'references' => [
'https://metacpan.org/changes/distribution/GBrowse'
],
'reported' => '2017-01-15'
},
{
'affected_versions' => [
'<1.62'
],
'cves' => [],
'description' => 'Cross-site scripting.
',
'distribution' => 'GBrowse',
'fixed_versions' => [
'>=1.62'
],
'id' => 'CPANSA-GBrowse-2004-01',
'references' => [
'https://metacpan.org/changes/distribution/GBrowse'
],
'reported' => '2004-04-05'
},
{
'affected_versions' => [
'<1.54'
],
'cves' => [],
'description' => 'Path traversal.
',
'distribution' => 'GBrowse',
'fixed_versions' => [
'>=1.54'
],
'id' => 'CPANSA-GBrowse-2003-01',
'references' => [
'https://metacpan.org/changes/distribution/GBrowse'
],
'reported' => '2003-08-23'
}
],
'main_module' => 'CGI::Toggle',
'versions' => [
{
'date' => '2008-12-29T15:38:27',
'version' => '1.981'
},
{
'date' => '2008-12-29T17:21:12',
'version' => '1.982'
},
{
'date' => '2009-01-06T07:42:56',
'version' => '1.983'
},
{
'date' => '2009-01-06T09:17:54',
'version' => '1.984'
},
{
'date' => '2009-01-10T12:37:42',
'version' => '1.985'
},
{
'date' => '2009-01-12T16:58:20',
'version' => '1.986'
},
{
'date' => '2009-01-22T19:49:50',
'version' => '1.987'
},
{
'date' => '2009-01-30T00:12:57',
'version' => '1.988'
},
{
'date' => '2009-03-10T19:24:17',
'version' => '1.989'
},
{
'date' => '2009-04-03T19:29:22',
'version' => '1.99'
},
{
'date' => '2009-05-04T05:30:31',
'version' => '1.991'
},
{
'date' => '2009-05-05T23:40:00',
'version' => '1.992'
},
{
'date' => '2009-05-07T14:11:11',
'version' => '1.993'
},
{
'date' => '2009-05-30T22:07:17',
'version' => '1.994'
},
{
'date' => '2009-06-08T21:27:08',
'version' => '1.995'
},
{
'date' => '2009-07-06T14:12:57',
'version' => '1.996'
},
{
'date' => '2009-07-30T16:40:54',
'version' => '1.997'
},
{
'date' => '2009-08-19T19:19:44',
'version' => '1.9971'
},
{
'date' => '2009-12-09T21:39:37',
'version' => '1.998'
},
{
'date' => '2009-12-15T15:59:37',
'version' => '1.9982'
},
{
'date' => '2009-12-18T19:25:25',
'version' => '1.9983'
},
{
'date' => '2009-12-22T21:20:40',
'version' => '1.9984'
},
{
'date' => '2009-12-23T21:56:31',
'version' => '1.999'
},
{
'date' => '2010-01-28T02:58:41',
'version' => '2.00'
},
{
'date' => '2010-02-09T18:13:33',
'version' => '2.01'
},
{
'date' => '2010-03-10T05:56:50',
'version' => '2.02'
},
{
'date' => '2010-03-25T16:06:21',
'version' => '2.03'
},
{
'date' => '2010-04-18T21:44:27',
'version' => '2.04'
},
{
'date' => '2010-05-13T03:30:32',
'version' => '2.05'
},
{
'date' => '2010-05-13T21:17:05',
'version' => '2.06'
},
{
'date' => '2010-05-17T14:49:41',
'version' => '2.07'
},
{
'date' => '2010-05-21T02:52:47',
'version' => '2.08'
},
{
'date' => '2010-06-10T20:17:32',
'version' => '2.09'
},
{
'date' => '2010-06-15T14:20:30',
'version' => '2.10'
},
{
'date' => '2010-06-30T19:15:37',
'version' => '2.11'
},
{
'date' => '2010-06-30T19:30:03',
'version' => '2.12'
},
{
'date' => '2010-07-05T20:17:39',
'version' => '2.13'
},
{
'date' => '2010-08-27T15:06:04',
'version' => '2.14'
},
{
'date' => '2010-09-13T22:17:44',
'version' => '2.15'
},
{
'date' => '2010-11-01T16:24:01',
'version' => '2.16'
},
{
'date' => '2010-11-18T17:08:57',
'version' => '2.17'
},
{
'date' => '2011-01-18T22:35:59',
'version' => '2.20'
},
{
'date' => '2011-01-22T17:17:34',
'version' => '2.21'
},
{
'date' => '2011-01-26T14:31:35',
'version' => '2.22'
},
{
'date' => '2011-01-30T20:03:25',
'version' => '2.23'
},
{
'date' => '2011-01-31T17:19:08',
'version' => '2.24'
},
{
'date' => '2011-02-02T18:53:40',
'version' => '2.25'
},
{
'date' => '2011-02-04T18:51:54',
'version' => '2.26'
},
{
'date' => '2011-04-10T21:07:42',
'version' => '2.27'
},
{
'date' => '2011-04-10T21:32:05',
'version' => '2.28'
},
{
'date' => '2011-05-02T16:12:11',
'version' => '2.29'
},
{
'date' => '2011-05-03T12:17:18',
'version' => '2.30'
},
{
'date' => '2011-05-03T15:50:21',
'version' => '2.31'
},
{
'date' => '2011-05-04T18:47:51',
'version' => '2.32'
},
{
'date' => '2011-05-07T03:27:32',
'version' => '2.33'
},
{
'date' => '2011-06-01T15:19:47',
'version' => '2.34'
},
{
'date' => '2011-06-03T13:41:28',
'version' => '2.35'
},
{
'date' => '2011-06-04T14:58:14',
'version' => '2.36'
},
{
'date' => '2011-06-06T21:24:59',
'version' => '2.37'
},
{
'date' => '2011-06-09T16:00:48',
'version' => '2.38'
},
{
'date' => '2011-06-29T17:45:00',
'version' => '2.39'
},
{
'date' => '2011-09-30T16:56:29',
'version' => '2.40'
},
{
'date' => '2011-10-07T13:31:48',
'version' => '2.41'
},
{
'date' => '2011-10-12T19:33:22',
'version' => '2.42'
},
{
'date' => '2011-10-24T16:43:23',
'version' => '2.43'
},
{
'date' => '2011-12-08T23:09:26',
'version' => '2.44'
},
{
'date' => '2012-01-03T21:35:41',
'version' => '2.45'
},
{
'date' => '2012-02-10T17:28:20',
'version' => '2.46'
},
{
'date' => '2012-02-16T12:40:04',
'version' => '2.47'
},
{
'date' => '2012-02-24T21:06:10',
'version' => '2.48'
},
{
'date' => '2012-04-17T23:48:26',
'version' => '2.49'
},
{
'date' => '2012-09-04T16:22:21',
'version' => '2.50'
},
{
'date' => '2012-09-18T03:01:31',
'version' => '2.51'
},
{
'date' => '2012-09-26T02:54:36',
'version' => '2.52'
},
{
'date' => '2012-12-10T11:23:34',
'version' => '2.53'
},
{
'date' => '2012-12-11T15:49:03',
'version' => '2.54'
},
{
'date' => '2013-07-10T14:51:25',
'version' => '2.55'
},
{
'date' => '2017-01-15T21:29:11',
'version' => '2.56'
}
]
},
'GD' => {
'advisories' => [
{
'affected_versions' => [
'<2.72'
],
'cves' => [
'CVE-2019-6977'
],
'description' => 'gdImageColorMatch in gd_color_match.c in the GD Graphics Library (aka LibGD) 2.2.5, as used in the imagecolormatch function in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1, has a heap-based buffer overflow. This can be exploited by an attacker who is able to trigger imagecolormatch calls with crafted image data.
',
'distribution' => 'GD',
'fixed_versions' => [
'>=2.72'
],
'id' => 'CPANSA-GD-2019-6977',
'references' => [
'https://nvd.nist.gov/vuln/detail/CVE-2019-6977',
'https://bugs.php.net/bug.php?id=77270',
'http://php.net/ChangeLog-7.php',
'http://php.net/ChangeLog-5.php',
'http://www.securityfocus.com/bid/106731',
'https://lists.debian.org/debian-lts-announce/2019/01/msg00028.html',
'https://www.debian.org/security/2019/dsa-4384',
'https://usn.ubuntu.com/3900-1/',
'https://security.netapp.com/advisory/ntap-20190315-0003/',
'https://security.gentoo.org/glsa/201903-18',
'http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00025.html',
'http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00031.html',
'http://packetstormsecurity.com/files/152459/PHP-7.2-imagecolormatch-Out-Of-Band-Heap-Write.html',
'https://www.exploit-db.com/exploits/46677/',
'https://access.redhat.com/errata/RHSA-2019:2519',
'https://access.redhat.com/errata/RHSA-2019:3299',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEYUUOW75YD3DENIPYMO263E6NL2NFHI/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3WRUPZVT2MWFUEMVGTRAGDOBHLNMGK5R/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TTXSLRZI5BCQT3H5KALG3DHUWUMNPDX2/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/'
],
'reported' => '2019-01-27',
'severity' => 'high'
}
],
'main_module' => 'GD',
'versions' => [
{
'date' => '1996-05-17T08:12:00',
'version' => '1.00'
},
{
'date' => '1996-07-17T10:16:00',
'version' => '1.01'
},
{
'date' => '1996-09-07T16:53:00',
'version' => '1.10'
},
{
'date' => '1996-09-09T10:37:00',
'version' => '1.11'
},
{
'date' => '1996-09-10T12:04:00',
'version' => '1.12'
},
{
'date' => '1996-09-11T07:27:00',
'version' => '1.13'
},
{
'date' => '1996-09-12T16:11:00',
'version' => '1.14'
},
{
'date' => '1997-11-19T21:13:00',
'version' => '1.15'
},
{
'date' => '1997-12-19T14:26:00',
'version' => '1.16'
},
{
'date' => '1998-01-16T13:34:00',
'version' => '1.17'
},
{
'date' => '1998-01-26T08:44:00',
'version' => '1.18'
},
{
'date' => '1998-03-08T16:43:26',
'version' => '1.18'
},
{
'date' => '1999-01-31T17:52:34',
'version' => '1.18'
},
{
'date' => '1999-04-26T20:35:55',
'version' => '1.19'
},
{
'date' => '1999-06-02T13:44:43',
'version' => '1.19'
},
{
'date' => '1999-08-31T03:38:46',
'version' => '1.20'
},
{
'date' => '1999-08-31T14:55:24',
'version' => '1.21'
},
{
'date' => '1999-09-30T21:46:47',
'version' => '1.22'
},
{
'date' => '1999-11-11T14:26:14',
'version' => '1.23'
},
{
'date' => '2000-02-15T19:54:37',
'version' => '1.24'
},
{
'date' => '2000-02-22T15:20:41',
'version' => '1.25'
},
{
'date' => '2000-03-18T23:21:50',
'version' => '1.26'
},
{
'date' => '2000-03-22T19:41:56',
'version' => '1.27'
},
{
'date' => '2000-06-23T12:15:51',
'version' => '1.28'
},
{
'date' => '2000-06-23T18:26:31',
'version' => '1.29'
},
{
'date' => '2000-07-07T02:42:47',
'version' => '1.30'
},
{
'date' => '2000-11-10T16:00:09',
'version' => '1.32'
},
{
'date' => '2001-04-05T04:42:53',
'version' => '1.33'
},
{
'date' => '2001-09-26T05:19:41',
'version' => '1.31'
},
{
'date' => '2001-12-06T22:57:11',
'version' => '1.35'
},
{
'date' => '2001-12-17T19:13:23',
'version' => '1.36'
},
{
'date' => '2001-12-19T21:34:33',
'version' => '1.37'
},
{
'date' => '2002-01-04T15:33:18',
'version' => '1.38'
},
{
'date' => '2002-06-12T02:09:05',
'version' => '1.39'
},
{
'date' => '2002-06-19T12:11:07',
'version' => '1.40'
},
{
'date' => '2002-07-22T07:33:14',
'version' => '1.41'
},
{
'date' => '2002-08-09T16:31:00',
'version' => '2.00'
},
{
'date' => '2002-08-09T16:39:49',
'version' => '2.01'
},
{
'date' => '2002-10-14T13:07:59',
'version' => '2.02'
},
{
'date' => '2002-11-01T15:46:28',
'version' => '2.04'
},
{
'date' => '2002-11-05T00:55:52',
'version' => '2.041'
},
{
'date' => '2002-11-25T01:35:10',
'version' => '2.05'
},
{
'date' => '2003-01-08T16:49:15',
'version' => '2.06'
},
{
'date' => '2003-04-24T05:06:33',
'version' => '2.07'
},
{
'date' => '2003-10-06T23:04:15',
'version' => '2.10'
},
{
'date' => '2003-10-07T22:33:21',
'version' => '2.11'
},
{
'date' => '2004-02-06T14:33:56',
'version' => '2.12'
},
{
'date' => '2004-07-22T20:32:01',
'version' => '2.15'
},
{
'date' => '2004-07-27T00:47:05',
'version' => '2.16'
},
{
'date' => '2004-11-10T19:15:39',
'version' => '2.17'
},
{
'date' => '2004-11-12T15:19:40',
'version' => '2.18'
},
{
'date' => '2004-11-16T13:36:22',
'version' => '2.19'
},
{
'date' => '2005-02-09T18:50:44',
'version' => '2.21'
},
{
'date' => '2005-03-07T18:09:39',
'version' => '2.22'
},
{
'date' => '2005-03-09T21:04:40',
'version' => '2.23'
},
{
'date' => '2005-07-15T18:47:39',
'version' => '2.25'
},
{
'date' => '2005-08-04T13:34:01',
'version' => '2.26'
},
{
'date' => '2005-08-06T14:52:27',
'version' => '2.27'
},
{
'date' => '2005-08-08T17:28:37',
'version' => '2.28'
},
{
'date' => '2005-10-19T05:44:52',
'version' => '2.29'
},
{
'date' => '2005-10-19T07:51:48',
'version' => '2.30'
},
{
'date' => '2006-02-20T19:48:20',
'version' => '2.31'
},
{
'date' => '2006-03-08T20:19:06',
'version' => '2.32'
},
{
'date' => '2006-06-01T20:02:57',
'version' => '2.34'
},
{
'date' => '2006-08-23T15:31:17',
'version' => '2.35'
},
{
'date' => '2008-04-21T14:15:26',
'version' => '2.39'
},
{
'date' => '2008-08-07T18:48:46',
'version' => '2.40'
},
{
'date' => '2008-08-07T19:17:19',
'version' => '2.41'
},
{
'date' => '2009-06-10T14:44:33',
'version' => '2.43'
},
{
'date' => '2009-07-10T18:12:58',
'version' => '2.44'
},
{
'date' => '2010-04-30T18:52:21',
'version' => '2.45'
},
{
'date' => '2011-05-01T17:47:22',
'version' => '2.46'
},
{
'date' => '2013-02-26T10:54:32',
'version' => '2.48'
},
{
'date' => '2013-02-26T11:04:16',
'version' => '2.49'
},
{
'date' => '2013-07-02T20:48:59',
'version' => '2.50'
},
{
'date' => '2014-02-04T16:53:54',
'version' => '2.51'
},
{
'date' => '2014-02-19T04:29:23',
'version' => '2.52'
},
{
'date' => '2014-04-01T14:26:31',
'version' => '2.53'
},
{
'date' => '2014-10-27T02:29:14',
'version' => '2.55'
},
{
'date' => '2014-10-28T01:35:39',
'version' => '2.56'
},
{
'date' => '2017-04-19T14:45:56',
'version' => '2.56_01'
},
{
'date' => '2017-04-19T14:56:35',
'version' => '2.56_02'
},
{
'date' => '2017-04-19T15:19:33',
'version' => '2.56_03'
},
{
'date' => '2017-04-21T06:22:54',
'version' => '2.57'
},
{
'date' => '2017-04-21T08:38:24',
'version' => '2.58'
},
{
'date' => '2017-04-21T10:35:21',
'version' => '2.59'
},
{
'date' => '2017-04-21T22:11:18',
'version' => '2.60'
},
{
'date' => '2017-04-22T15:52:15',
'version' => '2.61'
},
{
'date' => '2017-04-22T22:27:02',
'version' => '2.62'
},
{
'date' => '2017-04-23T08:23:06',
'version' => '2.63'
},
{
'date' => '2017-04-23T09:03:18',
'version' => '2.64'
},
{
'date' => '2017-04-23T10:36:23',
'version' => '2.65'
},
{
'date' => '2017-04-23T13:08:08',
'version' => '2.66'
},
{
'date' => '2017-11-15T08:33:16',
'version' => '2.67'
},
{
'date' => '2018-02-18T19:56:41',
'version' => '2.68'
},
{
'date' => '2018-08-26T15:40:02',
'version' => '2.69'
},
{
'date' => '2019-01-10T12:57:08',
'version' => '2.70'
},
{
'date' => '2019-02-12T11:53:42',
'version' => '2.71'
},
{
'date' => '2020-07-18T06:02:50',
'version' => '2.72'
},
{
'date' => '2020-09-24T13:01:57',
'version' => '2.73'
},
{
'date' => '2022-01-23T15:34:48',
'version' => '2.74'
},
{
'date' => '2022-01-25T16:54:22',
'version' => '2.75'
},
{
'date' => '2022-02-01T14:50:45',
'version' => '2.76'
},
{
'date' => '2023-05-29T07:10:47',
'version' => '2.77'
},
{
'date' => '2023-07-04T09:13:52',
'version' => '2.78'
},
{
'date' => '2024-04-29T19:57:07',
'version' => '2.79'
},
{
'date' => '2024-05-03T11:16:48',
'version' => '2.80'
},
{
'date' => '2024-05-03T17:02:57',
'version' => '2.81'
},
{
'date' => '2024-05-27T10:31:38',
'version' => '2.82'
},
{
'date' => '2024-06-23T15:46:01',
'version' => '2.83'
}
]
},
'GPIB' => {
'advisories' => [
{
'affected_versions' => [
'>0'
],
'cves' => [
'CVE-2006-1565'
],
'description' => 'Untrusted search path vulnerability in libgpib-perl 3.2.06-2 in Debian GNU/Linux includes an RPATH value under the /tmp/buildd directory for the LinuxGpib.so module, which might allow local users to gain privileges by installing malicious libraries in that directory.
',
'distribution' => 'GPIB',
'fixed_versions' => [],
'id' => 'CPANSA-GPIB-2006-1565',
'references' => [
'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=359239',
'http://www.securityfocus.com/bid/17288',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/25681'
],
'reported' => '2006-03-31',
'severity' => undef
}
],
'main_module' => 'GPIB',
'versions' => [
{
'date' => '2002-01-02T03:13:38',
'version' => '0_30'
}
]
},
'Galileo' => {
'advisories' => [
{
'affected_versions' => [
'<0.043'
],
'cves' => [
'CVE-2019-7410'
],
'description' => 'There is stored cross site scripting (XSS) in Galileo CMS v0.042. Remote authenticated users could inject arbitrary web script or HTML via $page_title in /lib/Galileo/files/templates/page/show.html.ep (aka the PAGE TITLE Field).
',
'distribution' => 'Galileo',
'fixed_versions' => [
'>=0.043'
],
'id' => 'CPANSA-Galileo-2019-7410',
'references' => [
'https://metamorfosec.com/Files/Commits/METC-2020-002-Escape_banner_in_Galileo_CMS_v0.042.txt',
'https://metacpan.org/changes/distribution/Galileo',
'https://github.com/jberger/Galileo/pull/55/files',
'https://metamorfosec.com/Files/Advisories/METS-2020-002-A_Stored_XSS_Vulnerability_in_Galileo_CMS_v0.042.txt'
],
'reported' => '2020-08-14',
'severity' => 'medium'
}
],
'main_module' => 'Galileo',
'versions' => [
{
'date' => '2012-07-30T17:03:42',
'version' => '0.001'
},
{
'date' => '2012-07-30T17:38:19',
'version' => '0.002'
},
{
'date' => '2012-07-30T20:36:06',
'version' => '0.003'
},
{
'date' => '2012-07-31T15:41:59',
'version' => '0.004'
},
{
'date' => '2012-08-06T21:26:17',
'version' => '0.005'
},
{
'date' => '2012-08-09T20:39:14',
'version' => '0.006'
},
{
'date' => '2012-09-10T17:57:20',
'version' => '0.007'
},
{
'date' => '2012-10-27T17:40:15',
'version' => '0.008'
},
{
'date' => '2012-10-28T18:03:00',
'version' => '0.009'
},
{
'date' => '2012-10-28T18:10:15',
'version' => '0.01'
},
{
'date' => '2012-10-31T22:10:19',
'version' => '0.011'
},
{
'date' => '2013-01-15T15:10:42',
'version' => '0.012'
},
{
'date' => '2013-01-15T21:07:00',
'version' => '0.013'
},
{
'date' => '2013-01-16T21:37:32',
'version' => '0.014'
},
{
'date' => '2013-01-19T03:59:45',
'version' => '0.015'
},
{
'date' => '2013-01-26T21:28:59',
'version' => '0.016'
},
{
'date' => '2013-02-05T03:32:32',
'version' => '0.017'
},
{
'date' => '2013-02-06T02:47:47',
'version' => '0.018'
},
{
'date' => '2013-02-06T03:09:27',
'version' => '0.019'
},
{
'date' => '2013-02-11T23:33:00',
'version' => '0.020'
},
{
'date' => '2013-02-17T01:24:51',
'version' => '0.021'
},
{
'date' => '2013-02-17T02:44:14',
'version' => '0.022'
},
{
'date' => '2013-03-04T18:25:01',
'version' => '0.023'
},
{
'date' => '2013-03-12T15:24:22',
'version' => '0.024'
},
{
'date' => '2013-03-12T18:48:22',
'version' => '0.025'
},
{
'date' => '2013-03-15T15:18:18',
'version' => '0.026'
},
{
'date' => '2013-04-03T20:04:15',
'version' => '0.027'
},
{
'date' => '2013-05-14T15:59:46',
'version' => '0.028'
},
{
'date' => '2013-06-29T03:30:18',
'version' => '0.029'
},
{
'date' => '2013-08-27T03:43:39',
'version' => '0.030'
},
{
'date' => '2013-11-28T18:36:10',
'version' => '0.031'
},
{
'date' => '2014-04-06T16:17:22',
'version' => '0.032'
},
{
'date' => '2014-05-10T19:38:50',
'version' => '0.033'
},
{
'date' => '2014-05-31T13:06:42',
'version' => '0.034'
},
{
'date' => '2014-08-16T22:10:46',
'version' => '0.035'
},
{
'date' => '2014-08-31T15:31:15',
'version' => '0.036'
},
{
'date' => '2014-10-14T04:03:53',
'version' => '0.037'
},
{
'date' => '2015-01-25T18:08:54',
'version' => '0.038'
},
{
'date' => '2015-09-28T18:25:31',
'version' => '0.039'
},
{
'date' => '2016-01-07T16:33:46',
'version' => '0.040'
},
{
'date' => '2016-08-13T18:15:17',
'version' => '0.041'
},
{
'date' => '2017-03-16T03:14:04',
'version' => '0.042'
},
{
'date' => '2020-08-06T16:26:58',
'version' => '0.043'
}
]
},
'GitLab-API-v4' => {
'advisories' => [
{
'affected_versions' => [
'>=0.26'
],
'cves' => [
'CVE-2023-31485'
],
'description' => 'GitLab::API::v4 is missing the verify_SSL=>1 flag in HTTP::Tiny, allowing a network attacker to MITM connections to the GitLab server.
',
'distribution' => 'GitLab-API-v4',
'fixed_versions' => [],
'id' => 'CPANSA-GitLab-API-v4-2023-31485',
'references' => [
'https://github.com/bluefeet/GitLab-API-v4/pull/57',
'https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/',
'https://www.openwall.com/lists/oss-security/2023/04/18/14',
'https://github.com/chansen/p5-http-tiny/pull/151'
],
'reported' => '2023-02-28'
}
],
'main_module' => 'GitLab::API::v4',
'versions' => [
{
'date' => '2017-12-11T18:40:52',
'version' => '0.01'
},
{
'date' => '2017-12-16T00:11:18',
'version' => '0.02'
},
{
'date' => '2018-01-12T21:26:23',
'version' => '0.03'
},
{
'date' => '2018-02-03T23:15:40',
'version' => '0.04'
},
{
'date' => '2018-03-06T18:26:52',
'version' => '0.05'
},
{
'date' => '2018-04-09T20:06:01',
'version' => '0.06'
},
{
'date' => '2018-05-10T21:33:05',
'version' => '0.07'
},
{
'date' => '2018-05-14T17:33:39',
'version' => '0.08'
},
{
'date' => '2018-05-29T04:48:13',
'version' => '0.09'
},
{
'date' => '2018-06-06T06:47:41',
'version' => '0.10'
},
{
'date' => '2018-09-02T05:24:51',
'version' => '0.11'
},
{
'date' => '2018-09-12T01:04:05',
'version' => '0.12'
},
{
'date' => '2018-11-08T13:44:56',
'version' => '0.13'
},
{
'date' => '2018-12-04T20:39:42',
'version' => '0.14'
},
{
'date' => '2019-01-09T18:13:46',
'version' => '0.15'
},
{
'date' => '2019-02-18T06:21:38',
'version' => '0.16'
},
{
'date' => '2019-02-20T22:49:13',
'version' => '0.17'
},
{
'date' => '2019-04-01T04:36:27',
'version' => '0.18'
},
{
'date' => '2019-05-17T20:41:31',
'version' => '0.19'
},
{
'date' => '2019-07-23T21:42:57',
'version' => '0.20'
},
{
'date' => '2019-08-24T18:56:25',
'version' => '0.21'
},
{
'date' => '2019-09-13T15:03:00',
'version' => '0.22'
},
{
'date' => '2019-10-18T19:55:54',
'version' => '0.23'
},
{
'date' => '2020-02-12T22:10:58',
'version' => '0.24'
},
{
'date' => '2020-02-12T22:21:40',
'version' => '0.25'
},
{
'date' => '2021-01-30T07:11:26',
'version' => '0.26'
},
{
'date' => '2023-06-07T20:51:14',
'version' => '0.27'
}
]
},
'Graphics-ColorNames' => {
'advisories' => [
{
'affected_versions' => [
'>=2.0_01,<=3.1.2'
],
'cves' => [
'CVE-2024-55918'
],
'description' => 'A specially-named file may lead to HTML injection attacks.
',
'distribution' => 'Graphics-ColorNames',
'fixed_versions' => [
'>3.1.2'
],
'id' => 'CPANSA-Graphics-ColorNames-2010-02',
'references' => [
'https://metacpan.org/changes/distribution/Graphics-ColorNames',
'https://rt.cpan.org/Public/Bug/Display.html?id=54500'
],
'reported' => '2010-02-11'
}
],
'main_module' => 'Graphics::ColorNames',
'versions' => [
{
'date' => '2001-02-20T03:47:48',
'version' => '0.10'
},
{
'date' => '2001-04-12T02:32:22',
'version' => '0.20'
},
{
'date' => '2001-04-13T04:37:27',
'version' => '0.21'
},
{
'date' => '2001-04-15T14:26:41',
'version' => '0.22'
},
{
'date' => '2001-04-18T03:13:51',
'version' => '0.23'
},
{
'date' => '2001-04-28T16:09:48',
'version' => '0.24'
},
{
'date' => '2001-10-05T02:42:20',
'version' => '0.30'
},
{
'date' => '2002-10-24T01:17:51',
'version' => '0.31'
},
{
'date' => '2002-12-05T03:07:24',
'version' => '0.32'
},
{
'date' => '2004-07-22T00:41:35',
'version' => '0.3901'
},
{
'date' => '2004-07-22T20:01:47',
'version' => '0.39_02'
},
{
'date' => '2004-07-23T01:52:58',
'version' => '0.39_03'
},
{
'date' => '2004-07-26T06:36:47',
'version' => '0.39_04'
},
{
'date' => '2004-08-01T01:21:33',
'version' => '1.00'
},
{
'date' => '2004-08-18T20:32:07',
'version' => '1.01'
},
{
'date' => '2004-08-24T15:53:20',
'version' => '1.02'
},
{
'date' => '2004-08-26T21:51:46',
'version' => '1.03'
},
{
'date' => '2004-09-03T06:56:23',
'version' => '1.04'
},
{
'date' => '2004-09-03T07:00:16',
'version' => '1.05'
},
{
'date' => '2005-03-29T23:06:41',
'version' => '1.06'
},
{
'date' => '2005-04-04T15:17:24',
'version' => '2.0_01'
},
{
'date' => '2005-04-07T16:08:52',
'version' => '2.0_02'
},
{
'date' => '2005-04-08T16:48:24',
'version' => '2.0_03'
},
{
'date' => '2006-10-24T13:58:29',
'version' => '2.0_04'
},
{
'date' => '2007-12-16T15:33:27',
'version' => '2.01'
},
{
'date' => '2007-12-16T16:04:00',
'version' => '2.02'
},
{
'date' => '2007-12-17T12:49:37',
'version' => '2.03'
},
{
'date' => '2007-12-17T20:01:53',
'version' => '2.04'
},
{
'date' => '2007-12-20T16:01:35',
'version' => '2.10_01'
},
{
'date' => '2008-01-04T15:55:53',
'version' => '2.10_02'
},
{
'date' => '2008-01-05T13:14:32',
'version' => '2.10_03'
},
{
'date' => '2008-01-06T21:52:18',
'version' => '2.10_04'
},
{
'date' => '2008-01-08T16:20:38',
'version' => '2.10_05'
},
{
'date' => '2008-01-10T21:43:53',
'version' => '2.11'
},
{
'date' => '2018-09-27T23:02:17',
'version' => 'v3.0.0'
},
{
'date' => '2018-09-28T12:40:06',
'version' => 'v3.0.1'
},
{
'date' => '2018-09-28T16:56:39',
'version' => 'v3.0.2'
},
{
'date' => '2018-09-30T12:37:45',
'version' => 'v3.1.0'
},
{
'date' => '2018-10-01T16:51:16',
'version' => 'v3.1.1'
},
{
'date' => '2018-10-01T22:15:39',
'version' => 'v3.1.2'
},
{
'date' => '2018-10-03T23:36:26',
'version' => 'v3.2.0'
},
{
'date' => '2018-10-06T10:00:38',
'version' => 'v3.2.1'
},
{
'date' => '2018-10-23T20:30:22',
'version' => 'v3.3.0'
},
{
'date' => '2018-10-24T15:03:58',
'version' => 'v3.3.1'
},
{
'date' => '2018-10-27T16:33:30',
'version' => 'v3.3.2'
},
{
'date' => '2018-10-27T18:31:44',
'version' => 'v3.3.3'
},
{
'date' => '2018-11-11T15:13:51',
'version' => 'v3.3.4'
},
{
'date' => '2018-11-18T19:13:42',
'version' => 'v3.4.0'
},
{
'date' => '2019-06-06T20:30:43',
'version' => 'v3.5.0'
}
]
},
'HTML-EP' => {
'advisories' => [
{
'affected_versions' => [
'>=0.2011'
],
'cves' => [
'CVE-2012-6142'
],
'description' => 'HTML::EP::Session::Cookie in the HTML::EP module 0.2011 for Perl does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via a crafted request, which is not properly handled when it is deserialized.
',
'distribution' => 'HTML-EP',
'fixed_versions' => [],
'id' => 'CPANSA-HTML-EP-2012-6142',
'references' => [
'http://www.securityfocus.com/bid/59833',
'http://seclists.org/oss-sec/2013/q2/318',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/84199'
],
'reported' => '2014-06-04',
'severity' => undef
}
],
'main_module' => 'HTML::EP',
'versions' => [
{
'date' => '1998-06-24T20:39:44',
'version' => '0.1000'
},
{
'date' => '1998-06-26T12:21:47',
'version' => '0.1002'
},
{
'date' => '1998-07-17T21:28:11',
'version' => '0.1005'
},
{
'date' => '1998-07-18T16:05:32',
'version' => '0.1006'
},
{
'date' => '1998-07-24T20:40:11',
'version' => '0.1100'
},
{
'date' => '1998-09-12T20:26:57',
'version' => '0.1106'
},
{
'date' => '1998-09-14T00:09:23',
'version' => '0.1107'
},
{
'date' => '1998-09-18T01:41:54',
'version' => '0.1108'
},
{
'date' => '1998-10-06T09:42:57',
'version' => '0.1109'
},
{
'date' => '1998-10-13T16:57:33',
'version' => '0.1111'
},
{
'date' => '1998-10-15T19:02:15',
'version' => '0.1112'
},
{
'date' => '1998-10-21T21:58:15',
'version' => '0.1113'
},
{
'date' => '1998-11-06T20:01:59',
'version' => '0.1116'
},
{
'date' => '1998-11-29T18:25:07',
'version' => '0.1117'
},
{
'date' => '1998-12-03T17:11:04',
'version' => '0.1118'
},
{
'date' => '1999-01-26T02:07:08',
'version' => '0.1123'
},
{
'date' => '1999-02-01T00:08:19',
'version' => '0.1124'
},
{
'date' => '1999-02-07T20:07:50',
'version' => '0.1125'
},
{
'date' => '1999-02-13T12:36:36',
'version' => '0.1126'
},
{
'date' => '1999-02-23T18:47:31',
'version' => '0.1127'
},
{
'date' => '1999-02-26T18:27:47',
'version' => '0.1128'
},
{
'date' => '1999-05-04T22:59:11',
'version' => '0.1130'
},
{
'date' => '1999-08-26T15:05:04',
'version' => '0.11321'
},
{
'date' => '1999-08-27T11:29:51',
'version' => '0.1133'
},
{
'date' => '1999-08-31T11:04:44',
'version' => '0.1134'
},
{
'date' => '1999-09-21T10:22:21',
'version' => '0.1135'
},
{
'date' => '1999-09-26T13:27:28',
'version' => '0.20_00'
},
{
'date' => '1999-09-27T10:28:51',
'version' => '0.20_01'
},
{
'date' => '1999-11-05T11:38:40',
'version' => '0.2003'
},
{
'date' => '1999-11-08T15:38:12',
'version' => '0.2004'
},
{
'date' => '1999-11-08T18:18:11',
'version' => '0.2005'
},
{
'date' => '1999-11-17T12:28:55',
'version' => '0.2006'
},
{
'date' => '1999-11-17T17:23:52',
'version' => '0.2007'
},
{
'date' => '1999-11-25T10:15:38',
'version' => '0.2008'
},
{
'date' => '1999-12-07T20:43:46',
'version' => '0.2009'
},
{
'date' => '1999-12-15T22:41:39',
'version' => '0.2010'
},
{
'date' => '2001-01-05T13:26:37',
'version' => '0.2011'
},
{
'date' => '2001-01-05T13:27:07',
'version' => 0
}
]
},
'HTML-Parser' => {
'advisories' => [
{
'affected_versions' => [
'<3.63'
],
'cves' => [
'CVE-2009-3627'
],
'description' => 'The decode_entities function in util.c in HTML-Parser before 3.63 allows context-dependent attackers to cause a denial of service (infinite loop) via an incomplete SGML numeric character reference, which triggers generation of an invalid UTF-8 character.
',
'distribution' => 'HTML-Parser',
'fixed_versions' => [],
'id' => 'CPANSA-HTML-Parser-2009-3627',
'references' => [
'https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6225',
'http://www.openwall.com/lists/oss-security/2009/10/23/9',
'http://secunia.com/advisories/37155',
'http://www.securityfocus.com/bid/36807',
'https://bugzilla.redhat.com/show_bug.cgi?id=530604',
'http://www.vupen.com/english/advisories/2009/3022',
'http://github.com/gisle/html-parser/commit/b9aae1e43eb2c8e989510187cff0ba3e996f9a4c',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/53941'
],
'reported' => '2009-10-29',
'severity' => undef
}
],
'main_module' => 'HTML::Parser',
'versions' => [
{
'date' => '1998-03-31T22:25:05',
'version' => '2.14'
},
{
'date' => '1998-04-02T11:40:38',
'version' => '2.16'
},
{
'date' => '1998-04-28T08:35:12',
'version' => '2.17'
},
{
'date' => '1998-06-22T19:45:24',
'version' => '2.18'
},
{
'date' => '1998-07-06T23:12:33',
'version' => '2.19'
},
{
'date' => '1998-07-08T13:05:04',
'version' => '2.20'
},
{
'date' => '1998-11-13T21:48:08',
'version' => '2.21'
},
{
'date' => '1999-06-09T10:34:35',
'version' => '2.23'
},
{
'date' => '1999-11-03T07:10:32',
'version' => '2.24'
},
{
'date' => '1999-11-05T09:46:11',
'version' => '2.25'
},
{
'date' => '1999-12-14T23:01:49',
'version' => '3.00'
},
{
'date' => '1999-12-19T07:07:38',
'version' => '3.01'
},
{
'date' => '1999-12-21T09:55:56',
'version' => '3.02'
},
{
'date' => '2000-01-15T16:25:39',
'version' => '3.04'
},
{
'date' => '2000-01-22T16:14:25',
'version' => '3.05'
},
{
'date' => '2000-03-06T14:00:15',
'version' => '3.06'
},
{
'date' => '2000-03-20T12:47:48',
'version' => '3.07'
},
{
'date' => '2000-05-23T10:59:19',
'version' => '3.08'
},
{
'date' => '2000-06-28T08:49:09',
'version' => '3.09'
},
{
'date' => '2000-06-29T07:52:47',
'version' => '3.10'
},
{
'date' => '2000-08-22T10:04:28',
'version' => '3.11'
},
{
'date' => '2000-09-14T18:22:47',
'version' => '3.12'
},
{
'date' => '2000-09-17T01:55:45',
'version' => '3.13'
},
{
'date' => '2000-12-04T06:05:39',
'version' => '3.14'
},
{
'date' => '2000-12-26T09:04:53',
'version' => '3.15'
},
{
'date' => '2001-02-23T07:21:20',
'version' => '3.16'
},
{
'date' => '2001-02-24T06:32:38',
'version' => '3.17'
},
{
'date' => '2001-02-25T04:51:50',
'version' => '3.18'
},
{
'date' => '2001-03-10T04:32:27',
'version' => '3.19'
},
{
'date' => '2001-03-13T19:44:52',
'version' => '3.19_90'
},
{
'date' => '2001-03-16T02:29:32',
'version' => '3.19'
},
{
'date' => '2001-03-19T19:26:50',
'version' => '3.19_91'
},
{
'date' => '2001-03-26T15:37:39',
'version' => '3.19_92'
},
{
'date' => '2001-03-27T19:44:20',
'version' => '3.19_93'
},
{
'date' => '2001-03-30T08:24:11',
'version' => '3.19_94'
},
{
'date' => '2001-04-03T00:18:14',
'version' => '3.20'
},
{
'date' => '2001-04-10T22:34:03',
'version' => '3.21'
},
{
'date' => '2001-04-18T05:31:23',
'version' => '3.22'
},
{
'date' => '2001-05-02T04:18:51',
'version' => '3.23'
},
{
'date' => '2001-05-05T06:18:21',
'version' => '3.23'
},
{
'date' => '2001-05-09T07:23:34',
'version' => '3.24'
},
{
'date' => '2001-05-11T17:26:39',
'version' => '3.25'
},
{
'date' => '2001-06-12T08:35:06',
'version' => '3.25'
},
{
'date' => '2002-03-17T20:11:55',
'version' => '3.26'
},
{
'date' => '2003-01-18T13:08:01',
'version' => '3.27'
},
{
'date' => '2003-04-17T03:56:32',
'version' => '3.28'
},
{
'date' => '2003-08-15T06:11:17',
'version' => '3.29'
},
{
'date' => '2003-08-18T05:48:21',
'version' => '3.30'
},
{
'date' => '2003-08-19T14:56:07',
'version' => '3.31'
},
{
'date' => '2003-10-10T14:31:48',
'version' => '3.32'
},
{
'date' => '2003-10-14T10:53:29',
'version' => '3.33'
},
{
'date' => '2003-10-27T21:23:09',
'version' => '3.34'
},
{
'date' => '2003-12-12T14:27:23',
'version' => '3.35'
},
{
'date' => '2004-04-01T12:21:44',
'version' => '3.36'
},
{
'date' => '2004-11-10T18:56:54',
'version' => '3.37'
},
{
'date' => '2004-11-11T10:19:56',
'version' => '3.38'
},
{
'date' => '2004-11-17T14:33:49',
'version' => '3.39_90'
},
{
'date' => '2004-11-23T11:46:30',
'version' => '3.39_91'
},
{
'date' => '2004-11-23T22:25:21',
'version' => '3.39_92'
},
{
'date' => '2004-11-29T11:14:34',
'version' => '3.40'
},
{
'date' => '2004-11-30T09:30:56',
'version' => '3.41'
},
{
'date' => '2004-12-04T11:54:54',
'version' => '3.42'
},
{
'date' => '2004-12-06T09:19:28',
'version' => '3.43'
},
{
'date' => '2004-12-28T14:07:28',
'version' => '3.44'
},
{
'date' => '2005-01-06T09:09:45',
'version' => '3.45'
},
{
'date' => '2005-10-24T12:34:04',
'version' => '3.46'
},
{
'date' => '2005-11-22T21:50:09',
'version' => '3.47'
},
{
'date' => '2005-12-02T17:41:00',
'version' => '3.48'
},
{
'date' => '2006-02-08T10:58:39',
'version' => '3.49'
},
{
'date' => '2006-02-14T18:32:51',
'version' => '3.50'
},
{
'date' => '2006-03-22T09:26:15',
'version' => '3.51'
},
{
'date' => '2006-04-26T08:43:13',
'version' => '3.52'
},
{
'date' => '2006-04-27T11:55:34',
'version' => '3.53'
},
{
'date' => '2006-04-28T08:21:04',
'version' => '3.54'
},
{
'date' => '2006-07-10T09:16:22',
'version' => '3.55'
},
{
'date' => '2007-01-12T11:00:07',
'version' => '3.56'
},
{
'date' => '2008-11-16T21:45:07',
'version' => '3.57'
},
{
'date' => '2008-11-17T11:35:37',
'version' => '3.58'
},
{
'date' => '2008-11-24T09:15:09',
'version' => '3.59'
},
{
'date' => '2009-02-09T11:26:08',
'version' => '3.60'
},
{
'date' => '2009-06-20T09:34:17',
'version' => '3.61'
},
{
'date' => '2009-08-13T21:01:27',
'version' => '3.62'
},
{
'date' => '2009-10-22T20:11:52',
'version' => '3.63'
},
{
'date' => '2009-10-25T12:24:11',
'version' => '3.64'
},
{
'date' => '2010-04-04T20:44:00',
'version' => '3.65'
},
{
'date' => '2010-07-09T13:27:13',
'version' => '3.66'
},
{
'date' => '2010-08-17T17:15:19',
'version' => '3.67'
},
{
'date' => '2010-09-01T21:28:52',
'version' => '3.68'
},
{
'date' => '2011-10-15T15:35:01',
'version' => '3.69'
},
{
'date' => '2013-03-28T22:21:30',
'version' => '3.70'
},
{
'date' => '2013-05-08T22:23:29',
'version' => '3.71'
},
{
'date' => '2016-01-19T17:44:02',
'version' => '3.72'
},
{
'date' => '2020-08-25T17:40:17',
'version' => '3.73'
},
{
'date' => '2020-08-30T18:40:48',
'version' => '3.74'
},
{
'date' => '2020-08-30T19:58:22',
'version' => '3.75'
},
{
'date' => '2021-03-04T18:06:59',
'version' => '3.76'
},
{
'date' => '2022-03-14T22:12:49',
'version' => '3.77'
},
{
'date' => '2022-03-28T15:23:23',
'version' => '3.78'
},
{
'date' => '2022-10-12T15:41:58',
'version' => '3.79'
},
{
'date' => '2022-11-01T14:19:26',
'version' => '3.80'
},
{
'date' => '2023-01-31T03:13:18',
'version' => '3.81'
},
{
'date' => '2024-03-13T20:11:51',
'version' => '3.82'
},
{
'date' => '2024-07-30T16:42:50',
'version' => '3.83'
}
]
},
'HTML-Perlinfo' => {
'advisories' => [
{
'affected_versions' => [
'<1.52'
],
'cves' => [],
'description' => 'Possibility of denial-of-service attack.
',
'distribution' => 'HTML-Perlinfo',
'fixed_versions' => [
'>=1.52'
],
'id' => 'CPANSA-HTML-Perlinfo-2008-01',
'references' => [
'https://metacpan.org/changes/release/ACCARDO/HTML-Perlinfo-1.52'
],
'reported' => '2008-07-04'
}
],
'main_module' => 'HTML::Perlinfo',
'versions' => [
{
'date' => '2005-08-18T21:39:08',
'version' => '1.00'
},
{
'date' => '2005-09-19T20:41:07',
'version' => '1.05'
},
{
'date' => '2006-01-14T05:25:20',
'version' => '1.25'
},
{
'date' => '2006-08-13T03:42:36',
'version' => '1.40'
},
{
'date' => '2006-08-13T09:29:45',
'version' => '1.41'
},
{
'date' => '2006-08-15T01:04:34',
'version' => '1.42'
},
{
'date' => '2006-08-25T07:51:28',
'version' => '1.43'
},
{
'date' => '2006-09-10T23:20:13',
'version' => '1.44'
},
{
'date' => '2006-09-24T02:22:48',
'version' => '1.45'
},
{
'date' => '2006-09-27T20:08:12',
'version' => '1.46'
},
{
'date' => '2006-10-02T19:30:30',
'version' => '1.47'
},
{
'date' => '2008-03-16T03:15:04',
'version' => '1.48'
},
{
'date' => '2008-04-26T04:17:07',
'version' => '1.49'
},
{
'date' => '2008-04-30T20:44:40',
'version' => '1.50'
},
{
'date' => '2008-06-08T21:07:29',
'version' => '1.51'
},
{
'date' => '2008-07-03T23:57:26',
'version' => '1.52'
},
{
'date' => '2008-07-21T22:24:22',
'version' => '1.53'
},
{
'date' => '2008-07-27T23:52:36',
'version' => '1.54'
},
{
'date' => '2009-04-08T01:09:54',
'version' => '1.55'
},
{
'date' => '2009-04-08T19:06:59',
'version' => '1.56'
},
{
'date' => '2009-04-16T15:57:34',
'version' => '1.57'
},
{
'date' => '2009-04-17T02:41:48',
'version' => '1.58'
},
{
'date' => '2009-04-22T03:29:45',
'version' => '1.59'
},
{
'date' => '2009-05-02T20:48:38',
'version' => '1.60'
},
{
'date' => '2009-05-02T22:21:42',
'version' => '1.60'
},
{
'date' => '2009-05-03T23:02:35',
'version' => '1.61'
},
{
'date' => '2011-06-13T19:28:39',
'version' => '1.62'
},
{
'date' => '2014-08-19T21:37:30',
'version' => '1.63'
},
{
'date' => '2014-08-19T22:29:15',
'version' => '1.64'
},
{
'date' => '2015-06-06T23:25:41',
'version' => '1.65'
},
{
'date' => '2015-06-08T18:20:03',
'version' => '1.66'
},
{
'date' => '2015-06-08T20:22:33',
'version' => '1.67'
},
{
'date' => '2015-06-12T02:03:18',
'version' => '1.68'
},
{
'date' => '2016-11-29T19:21:00',
'version' => '1.69'
},
{
'date' => '2019-06-24T15:33:44',
'version' => '1.70'
},
{
'date' => '2019-06-25T02:15:30',
'version' => '1.71'
},
{
'date' => '2019-07-02T19:22:14',
'version' => '1.72'
},
{
'date' => '2019-07-02T20:41:23',
'version' => '1.73'
}
]
},
'HTML-Scrubber' => {
'advisories' => [
{
'affected_versions' => [
'<0.15'
],
'cves' => [
'CVE-2015-5667'
],
'description' => 'Cross-site scripting (XSS) vulnerability in the HTML-Scrubber module before 0.15 for Perl, when the comment feature is enabled, allows remote attackers to inject arbitrary web script or HTML via a crafted comment.
',
'distribution' => 'HTML-Scrubber',
'fixed_versions' => [
'>=0.15'
],
'id' => 'CPANSA-HTML-Scrubber-2015-5667',
'references' => [
'http://jvn.jp/en/jp/JVN53973084/index.html',
'http://jvndb.jvn.jp/jvndb/JVNDB-2015-000171',
'https://metacpan.org/release/HTML-Scrubber',
'http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172997.html',
'http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172983.html',
'http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172934.html'
],
'reported' => '2015-10-31',
'severity' => undef
}
],
'main_module' => 'HTML::Scrubber',
'versions' => [
{
'date' => '2003-04-18T14:10:19',
'version' => '0.02'
},
{
'date' => '2003-07-21T14:57:02',
'version' => '0.03'
},
{
'date' => '2003-10-30T02:31:36',
'version' => '0.04'
},
{
'date' => '2003-10-31T07:27:00',
'version' => '0.05'
},
{
'date' => '2003-11-02T11:10:49',
'version' => '0.06'
},
{
'date' => '2004-03-18T14:35:12',
'version' => '0.07'
},
{
'date' => '2004-04-01T22:12:20',
'version' => '0.08'
},
{
'date' => '2011-04-01T15:36:18',
'version' => '0.09'
},
{
'date' => '2013-09-27T14:06:41',
'version' => '0.10'
},
{
'date' => '2013-10-11T14:13:11',
'version' => '0.11'
},
{
'date' => '2015-03-14T18:25:35',
'version' => '0.12'
},
{
'date' => '2015-03-19T16:31:12',
'version' => '0.13'
},
{
'date' => '2015-04-02T16:20:48',
'version' => '0.14'
},
{
'date' => '2015-10-10T14:02:08',
'version' => '0.15'
},
{
'date' => '2017-06-25T19:31:24',
'version' => '0.16'
},
{
'date' => '2017-06-27T13:04:46',
'version' => '0.17'
},
{
'date' => '2019-09-22T11:11:50',
'version' => '0.18'
},
{
'date' => '2019-09-24T12:28:19',
'version' => '0.19'
}
]
},
'HTML-StripScripts' => {
'advisories' => [
{
'affected_versions' => [
'<=1.06'
],
'cves' => [
'CVE-2023-24038'
],
'description' => 'The HTML-StripScripts module through 1.06 for Perl allows _hss_attval_style ReDoS because of catastrophic backtracking for HTML content with certain style attributes.
',
'distribution' => 'HTML-StripScripts',
'fixed_versions' => [],
'id' => 'CPANSA-HTML-StripScripts-2023-24038',
'references' => [
'https://github.com/clintongormley/perl-html-stripscripts/issues/3',
'https://lists.debian.org/debian-lts-announce/2023/01/msg00036.html',
'https://www.debian.org/security/2023/dsa-5339'
],
'reported' => '2023-01-21',
'severity' => 'high'
}
],
'main_module' => 'HTML::StripScripts',
'versions' => [
{
'date' => '2003-03-30T10:08:51',
'version' => '0.01'
},
{
'date' => '2003-07-25T18:13:42',
'version' => '0.02'
},
{
'date' => '2004-04-27T16:45:34',
'version' => '0.03'
},
{
'date' => '2007-05-28T11:57:07',
'version' => '0.90'
},
{
'date' => '2007-05-28T12:31:03',
'version' => '0.99'
},
{
'date' => '2007-05-29T13:15:46',
'version' => '0.991'
},
{
'date' => '2007-06-05T12:44:56',
'version' => '1.00'
},
{
'date' => '2007-10-22T14:30:52',
'version' => '1.01'
},
{
'date' => '2007-10-22T15:47:44',
'version' => '1.02'
},
{
'date' => '2007-10-22T17:21:36',
'version' => '1.03'
},
{
'date' => '2007-11-16T17:53:46',
'version' => '1.04'
},
{
'date' => '2009-11-05T10:25:59',
'version' => '1.05'
},
{
'date' => '2016-05-12T09:44:35',
'version' => '1.06'
}
]
},
'HTML-Template-Pro' => {
'advisories' => [
{
'affected_versions' => [
'<0.9507'
],
'cves' => [
'CVE-2011-4616'
],
'description' => 'Cross-site scripting (XSS) vulnerability in the HTML-Template-Pro module before 0.9507 for Perl allows remote attackers to inject arbitrary web script or HTML via template parameters, related to improper handling of > (greater than) and < (less than) characters.
',
'distribution' => 'HTML-Template-Pro',
'fixed_versions' => [
'>=0.9507'
],
'id' => 'CPANSA-HTML-Template-Pro-2011-4616',
'references' => [
'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652587',
'http://openwall.com/lists/oss-security/2011/12/19/1',
'http://metacpan.org/diff/release/VIY/HTML-Template-Pro-0.9505/VIY/HTML-Template-Pro-0.9507',
'http://secunia.com/advisories/47184',
'http://cpansearch.perl.org/src/VIY/HTML-Template-Pro-0.9507/Changes',
'http://www.securityfocus.com/bid/51117',
'http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089603.html',
'http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089889.html',
'http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089888.html'
],
'reported' => '2012-01-06',
'severity' => undef
}
],
'main_module' => 'HTML::Template::Pro',
'versions' => [
{
'date' => '2005-06-09T11:07:59',
'version' => '0.38'
},
{
'date' => '2005-06-22T09:55:37',
'version' => '0.39'
},
{
'date' => '2005-07-07T09:11:59',
'version' => '0.40'
},
{
'date' => '2005-07-26T16:58:29',
'version' => '0.41'
},
{
'date' => '2005-08-04T15:58:27',
'version' => '0.42'
},
{
'date' => '2005-08-04T17:36:21',
'version' => '0.43'
},
{
'date' => '2005-08-12T16:32:44',
'version' => '0.44'
},
{
'date' => '2005-08-19T19:10:08',
'version' => '0.45'
},
{
'date' => '2005-08-26T18:24:23',
'version' => '0.46'
},
{
'date' => '2005-08-31T17:43:09',
'version' => '0.48'
},
{
'date' => '2005-09-08T17:43:14',
'version' => '0.50'
},
{
'date' => '2005-09-30T15:59:34',
'version' => '0.52'
},
{
'date' => '2005-10-06T17:14:51',
'version' => '0.53'
},
{
'date' => '2005-10-17T13:37:05',
'version' => '0.54'
},
{
'date' => '2005-10-26T12:18:18',
'version' => '0.55'
},
{
'date' => '2005-11-03T16:46:06',
'version' => '0.56'
},
{
'date' => '2005-11-13T16:12:39',
'version' => '0.57'
},
{
'date' => '2005-12-02T08:10:18',
'version' => '0.58'
},
{
'date' => '2006-01-22T20:07:54',
'version' => '0.59'
},
{
'date' => '2006-02-02T16:32:55',
'version' => '0.60'
},
{
'date' => '2006-02-06T20:45:02',
'version' => '0.61'
},
{
'date' => '2006-02-22T20:05:55',
'version' => '0.62'
},
{
'date' => '2006-04-18T20:24:51',
'version' => '0.64'
},
{
'date' => '2007-06-01T14:46:48',
'version' => '0.65'
},
{
'date' => '2007-10-04T11:08:55',
'version' => '0.66'
},
{
'date' => '2007-12-02T23:20:56',
'version' => '0.67'
},
{
'date' => '2008-01-08T18:01:32',
'version' => '0.68'
},
{
'date' => '2008-01-08T20:03:26',
'version' => '0.68'
},
{
'date' => '2008-03-01T19:46:47',
'version' => '0.69'
},
{
'date' => '2008-06-09T09:06:12',
'version' => '0.70'
},
{
'date' => '2008-09-05T19:36:06',
'version' => '0.71'
},
{
'date' => '2008-12-19T08:16:12',
'version' => '0.72'
},
{
'date' => '2009-04-02T20:36:25',
'version' => '0.73'
},
{
'date' => '2009-04-10T20:41:07',
'version' => '0.74'
},
{
'date' => '2009-07-05T16:40:09',
'version' => '0.75'
},
{
'date' => '2009-07-13T08:33:36',
'version' => '0.76'
},
{
'date' => '2009-07-23T17:37:10',
'version' => '0.80'
},
{
'date' => '2009-07-28T15:58:37',
'version' => '0.81'
},
{
'date' => '2009-08-04T15:46:34',
'version' => '0.82'
},
{
'date' => '2009-08-05T20:27:52',
'version' => '0.83'
},
{
'date' => '2009-08-08T18:13:20',
'version' => '0.84'
},
{
'date' => '2009-08-09T16:45:02',
'version' => '0.85'
},
{
'date' => '2009-08-24T08:00:34',
'version' => '0.86'
},
{
'date' => '2009-08-29T19:22:41',
'version' => '0.87'
},
{
'date' => '2009-09-11T16:53:57',
'version' => '0.90'
},
{
'date' => '2009-09-24T15:48:49',
'version' => '0.91'
},
{
'date' => '2009-09-29T20:14:35',
'version' => '0.92'
},
{
'date' => '2009-11-23T20:25:34',
'version' => '0.93'
},
{
'date' => '2010-03-26T19:12:55',
'version' => '0.94'
},
{
'date' => '2010-05-21T19:34:29',
'version' => '0.95'
},
{
'date' => '2010-06-16T19:00:45',
'version' => '0.9501'
},
{
'date' => '2010-06-24T18:50:34',
'version' => '0.9502'
},
{
'date' => '2010-08-29T12:45:12',
'version' => '0.9503'
},
{
'date' => '2010-09-29T07:16:03',
'version' => '0.9504'
},
{
'date' => '2011-07-01T10:40:21',
'version' => '0.9505'
},
{
'date' => '2011-10-04T20:31:16',
'version' => '0.9506'
},
{
'date' => '2011-12-09T07:59:17',
'version' => '0.9507'
},
{
'date' => '2011-12-26T21:57:41',
'version' => '0.9508'
},
{
'date' => '2012-02-28T19:59:05',
'version' => '0.9509'
},
{
'date' => '2013-05-13T08:40:09',
'version' => '0.9510'
},
{
'date' => '2021-11-30T23:21:23',
'version' => '0.9520'
},
{
'date' => '2021-12-02T07:27:12',
'version' => '0.9521'
},
{
'date' => '2021-12-06T17:53:48',
'version' => '0.9522'
},
{
'date' => '2021-12-15T09:50:03',
'version' => '0.9523'
},
{
'date' => '2022-01-16T20:42:34',
'version' => '0.9524'
}
]
},
'HTTP-Body' => {
'advisories' => [
{
'affected_versions' => [
'>=1.08,<1.23'
],
'cves' => [
'CVE-2013-4407'
],
'description' => 'HTTP::Body::Multipart in the HTTP-Body 1.08, 1.22, and earlier module for Perl uses the part of the uploaded file\'s name after the first "." character as the suffix of a temporary file, which makes it easier for remote attackers to conduct attacks by leveraging subsequent behavior that may assume the suffix is well-formed.
',
'distribution' => 'HTTP-Body',
'fixed_versions' => [
'>=1.23'
],
'id' => 'CPANSA-HTTP-Body-2013-4407',
'references' => [
'https://www.openwall.com/lists/oss-security/2024/04/07/1',
'https://security-tracker.debian.org/tracker/CVE-2013-4407',
'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721634'
],
'reported' => '2013-09-02',
'severity' => 'moderate'
}
],
'main_module' => 'HTTP::Body',
'versions' => [
{
'date' => '2005-10-06T23:31:10',
'version' => '0.01'
},
{
'date' => '2005-10-07T19:39:00',
'version' => '0.2'
},
{
'date' => '2005-10-28T00:04:21',
'version' => '0.03'
},
{
'date' => '2005-11-09T06:02:28',
'version' => '0.4'
},
{
'date' => '2005-11-17T04:03:44',
'version' => '0.5'
},
{
'date' => '2006-01-06T11:55:08',
'version' => '0.6'
},
{
'date' => '2007-03-23T17:02:39',
'version' => '0.7'
},
{
'date' => '2007-03-24T01:48:23',
'version' => '0.8'
},
{
'date' => '2007-03-27T17:55:21',
'version' => '0.9'
},
{
'date' => '2008-02-23T16:03:17',
'version' => '1.00'
},
{
'date' => '2008-02-23T16:16:09',
'version' => '1.01'
},
{
'date' => '2008-02-27T22:08:06',
'version' => '1.02'
},
{
'date' => '2008-04-07T14:20:46',
'version' => '1.03'
},
{
'date' => '2008-06-23T19:41:56',
'version' => '1.04'
},
{
'date' => '2008-12-01T22:14:51',
'version' => '1.05'
},
{
'date' => '2010-01-09T18:23:07',
'version' => '1.06'
},
{
'date' => '2010-01-24T19:42:49',
'version' => '1.07'
},
{
'date' => '2010-08-19T19:02:08',
'version' => '1.08'
},
{
'date' => '2010-08-19T23:11:46',
'version' => '1.09'
},
{
'date' => '2010-10-08T14:52:40',
'version' => '1.10'
},
{
'date' => '2010-10-26T14:38:59',
'version' => '1.11'
},
{
'date' => '2011-03-20T00:58:03',
'version' => '1.12'
},
{
'date' => '2011-11-04T18:44:06',
'version' => '1.14'
},
{
'date' => '2011-12-05T03:02:21',
'version' => '1.15'
},
{
'date' => '2012-10-03T15:19:24',
'version' => '1.16'
},
{
'date' => '2012-10-03T22:04:49',
'version' => '1.17'
},
{
'date' => '2013-12-06T15:06:26',
'version' => '1.18'
},
{
'date' => '2013-12-06T15:07:56',
'version' => '1.19'
},
{
'date' => '2015-01-28T15:21:00',
'version' => '1.20'
},
{
'date' => '2015-01-29T03:50:10',
'version' => '1.21'
},
{
'date' => '2015-01-29T03:53:01',
'version' => '1.22'
},
{
'date' => '2024-03-30T03:28:24',
'version' => '1.23'
}
]
},
'HTTP-Daemon' => {
'advisories' => [
{
'affected_versions' => [
'<6.15'
],
'cves' => [
'CVE-2022-31081'
],
'description' => 'HTTP::Daemon is a simple http server class written in perl. Versions prior to 6.15 are subject to a vulnerability which could potentially be exploited to gain privileged access to APIs or poison intermediate caches. It is uncertain how large the risks are, most Perl based applications are served on top of Nginx or Apache, not on the `HTTP::Daemon`. This library is commonly used for local development and tests. Users are advised to update to resolve this issue. Users unable to upgrade may add additional request handling logic as a mitigation. After calling `my $rqst = $conn->get_request()` one could inspect the returned `HTTP::Request` object. Querying the \'Content-Length\' (`my $cl = $rqst->header(\'Content-Length\')`) will show any abnormalities that should be dealt with by a `400` response. Expected strings of \'Content-Length\' SHOULD consist of either a single non-negative integer, or, a comma separated repetition of that number. (that is `42` or `42, 42, 42`). Anything else MUST be rejected.
',
'distribution' => 'HTTP-Daemon',
'fixed_versions' => [
'>=6.15'
],
'id' => 'CPANSA-HTTP-Daemon-2022-31081',
'references' => [
'https://github.com/libwww-perl/HTTP-Daemon/commit/e84475de51d6fd7b29354a997413472a99db70b2',
'https://github.com/libwww-perl/HTTP-Daemon/commit/8dc5269d59e2d5d9eb1647d82c449ccd880f7fd0',
'https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn',
'https://datatracker.ietf.org/doc/html/rfc7230#section-9.5',
'https://github.com/libwww-perl/HTTP-Daemon/security/advisories/GHSA-cg8c-pxmv-w7cf',
'http://metacpan.org/release/HTTP-Daemon/',
'https://cwe.mitre.org/data/definitions/444.html',
'https://github.com/libwww-perl/HTTP-Daemon/issues/56',
'https://github.com/NixOS/nixpkgs/pull/181632'
],
'reported' => '2022-06-27',
'severity' => 'medium'
}
],
'main_module' => 'HTTP::Daemon',
'versions' => [
{
'date' => '2011-02-27T22:49:28',
'version' => '6.00'
},
{
'date' => '2012-02-18T12:26:43',
'version' => '6.01'
},
{
'date' => '2019-04-01T16:05:05',
'version' => '6.02'
},
{
'date' => '2019-04-01T20:58:35',
'version' => '6.03'
},
{
'date' => '2019-04-02T13:12:12',
'version' => '6.04'
},
{
'date' => '2019-07-26T20:42:43',
'version' => '6.05'
},
{
'date' => '2019-08-29T14:24:33',
'version' => '6.06'
},
{
'date' => '2020-05-19T19:20:38',
'version' => '6.07'
},
{
'date' => '2020-05-22T15:27:22',
'version' => '6.08'
},
{
'date' => '2020-05-25T16:53:41',
'version' => '6.09'
},
{
'date' => '2020-05-26T16:22:18',
'version' => '6.10'
},
{
'date' => '2020-06-03T14:48:37',
'version' => '6.11'
},
{
'date' => '2020-06-04T16:03:28',
'version' => '6.12'
},
{
'date' => '2022-02-09T20:41:36',
'version' => '6.13'
},
{
'date' => '2022-03-03T20:49:07',
'version' => '6.14'
},
{
'date' => '2023-02-22T22:03:32',
'version' => '6.15'
},
{
'date' => '2023-02-24T03:09:01',
'version' => '6.16'
}
]
},
'HTTP-Session2' => {
'advisories' => [
{
'affected_versions' => [
'<1.10'
],
'cves' => [],
'description' => 'HTTP::Session2 1.10 does not validate session id, this causes RCE depending on the session store you use.
',
'distribution' => 'HTTP-Session2',
'fixed_versions' => [
'>=1.10'
],
'id' => 'CPANSA-HTTP-Session2-2018-01',
'references' => [
'https://metacpan.org/changes/distribution/HTTP-Session2',
'https://github.com/tokuhirom/HTTP-Session2/commit/813838f6d08034b6a265a70e53b59b941b5d3e6d'
],
'reported' => '2018-01-26',
'severity' => 'critical'
}
],
'main_module' => 'HTTP::Session2',
'versions' => [
{
'date' => '2013-10-28T03:20:09',
'version' => '0.01'
},
{
'date' => '2013-10-30T00:17:21',
'version' => '0.02'
},
{
'date' => '2013-10-31T01:21:27',
'version' => '0.03'
},
{
'date' => '2013-11-01T01:10:52',
'version' => '0.04'
},
{
'date' => '2014-03-18T18:53:09',
'version' => '0.05'
},
{
'date' => '2014-07-28T04:10:11',
'version' => '1.00'
},
{
'date' => '2014-07-28T11:44:05',
'version' => '1.01'
},
{
'date' => '2014-07-31T21:17:23',
'version' => '1.02'
},
{
'date' => '2014-08-01T11:04:00',
'version' => '1.03'
},
{
'date' => '2014-08-01T11:10:56',
'version' => '1.04'
},
{
'date' => '2014-08-01T11:20:46',
'version' => '1.05'
},
{
'date' => '2014-08-01T14:04:04',
'version' => '1.06'
},
{
'date' => '2014-08-01T14:08:11',
'version' => '1.07'
},
{
'date' => '2014-08-03T07:23:00',
'version' => '1.08'
},
{
'date' => '2014-09-01T02:26:38',
'version' => '1.09'
},
{
'date' => '2018-01-26T05:02:08',
'version' => '1.10'
}
]
},
'HTTP-Tiny' => {
'advisories' => [
{
'affected_versions' => [
'<0.083'
],
'cves' => [
'CVE-2023-31486'
],
'description' => 'HTTP::Tiny v0.082, a Perl core module since v5.13.9 and available standalone on CPAN, does not verify TLS certs by default. Users must opt-in with the verify_SSL=>1 flag to verify certs when using HTTPS.
Resulting in a CWE-1188: Insecure Default Initialization of Resource weakness.
',
'distribution' => 'HTTP-Tiny',
'fixed_versions' => [
'>=0.083'
],
'id' => 'CPANSA-HTTP-Tiny-2023-31486',
'references' => [
'https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/',
'https://github.com/chansen/p5-http-tiny/issues/152',
'https://github.com/chansen/p5-http-tiny/pull/151',
'https://hackeriet.github.io/cpan-http-tiny-overview/',
'https://www.reddit.com/r/perl/comments/111tadi/psa_httptiny_disabled_ssl_verification_by_default/',
'https://github.com/NixOS/nixpkgs/pull/187480',
'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962407',
'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=954089',
'https://salsa.debian.org/perl-team/interpreter/perl/-/commit/1490431e40e22052f75a0b3449f1f53cbd27ba92.patch',
'https://github.com/chansen/p5-http-tiny/issues/134',
'https://github.com/chansen/p5-http-tiny/issues/68'
],
'reported' => '2023-02-14'
},
{
'affected_versions' => [
'<0.059'
],
'cves' => [
'CVE-2016-1238'
],
'description' => 'Loading modules from . (current directory).
',
'distribution' => 'HTTP-Tiny',
'fixed_versions' => [
'>=0.059'
],
'id' => 'CPANSA-HTTP-Tiny-2016-1238',
'references' => [
'https://metacpan.org/changes/distribution/HTTP-Tiny',
'https://github.com/chansen/p5-http-tiny/commit/b239c95ea7a256cfee9b8848f1bd4d1df6e66444'
],
'reported' => '2016-07-29'
},
{
'affected_versions' => [
'<0.039'
],
'cves' => [],
'description' => 'Temporary file creating during mirror() not opened exclusively.
',
'distribution' => 'HTTP-Tiny',
'fixed_versions' => [
'>=0.039'
],
'id' => 'CPANSA-HTTP-Tiny-2013-01',
'references' => [
'https://metacpan.org/dist/HTTP-Tiny/changes'
],
'reported' => '2013-11-27'
}
],
'main_module' => 'HTTP::Tiny',
'versions' => [
{
'date' => '2010-12-11T12:59:31',
'version' => '0.001'
},
{
'date' => '2010-12-14T02:59:37',
'version' => '0.002'
},
{
'date' => '2010-12-15T17:30:49',
'version' => '0.003'
},
{
'date' => '2010-12-16T03:53:33',
'version' => '0.004'
},
{
'date' => '2011-01-08T11:32:21',
'version' => '0.005'
},
{
'date' => '2011-01-10T12:27:39',
'version' => '0.006'
},
{
'date' => '2011-01-12T09:56:28',
'version' => '0.007'
},
{
'date' => '2011-01-14T11:34:51',
'version' => '0.008'
},
{
'date' => '2011-01-17T21:29:27',
'version' => '0.009'
},
{
'date' => '2011-02-04T07:45:53',
'version' => '0.010'
},
{
'date' => '2011-03-20T00:49:53',
'version' => '0.011'
},
{
'date' => '2011-03-31T19:49:33',
'version' => '0.012'
},
{
'date' => '2011-07-18T03:15:12',
'version' => '0.013'
},
{
'date' => '2011-10-20T17:55:01',
'version' => '0.014'
},
{
'date' => '2011-10-26T20:42:15',
'version' => '0.015'
},
{
'date' => '2011-10-27T03:06:06',
'version' => '0.016'
},
{
'date' => '2012-02-23T02:58:42',
'version' => '0.017'
},
{
'date' => '2012-04-18T13:41:15',
'version' => '0.018'
},
{
'date' => '2012-05-14T11:15:52',
'version' => '0.019'
},
{
'date' => '2012-05-14T19:25:57',
'version' => '0.020'
},
{
'date' => '2012-05-16T02:39:55',
'version' => '0.021'
},
{
'date' => '2012-06-02T03:32:21',
'version' => '0.022'
},
{
'date' => '2012-09-19T16:06:37',
'version' => '0.023'
},
{
'date' => '2012-10-10T00:45:59',
'version' => '0.024'
},
{
'date' => '2012-12-26T17:11:23',
'version' => '0.025'
},
{
'date' => '2013-03-05T03:54:12',
'version' => '0.026'
},
{
'date' => '2013-03-05T17:04:07',
'version' => '0.027'
},
{
'date' => '2013-03-05T19:13:42',
'version' => '0.028'
},
{
'date' => '2013-04-17T17:51:23',
'version' => '0.029'
},
{
'date' => '2013-06-13T15:47:33',
'version' => '0.030'
},
{
'date' => '2013-06-17T03:18:45',
'version' => '0.031'
},
{
'date' => '2013-06-20T15:42:26',
'version' => '0.032'
},
{
'date' => '2013-06-21T10:27:45',
'version' => '0.033'
},
{
'date' => '2013-06-26T23:03:50',
'version' => '0.034'
},
{
'date' => '2013-09-10T16:30:04',
'version' => '0.035'
},
{
'date' => '2013-09-25T16:11:04',
'version' => '0.036'
},
{
'date' => '2013-10-28T17:50:02',
'version' => '0.037'
},
{
'date' => '2013-11-18T17:57:17',
'version' => '0.038'
},
{
'date' => '2013-11-28T00:49:36',
'version' => '0.039'
},
{
'date' => '2014-02-17T18:05:10',
'version' => '0.040'
},
{
'date' => '2014-02-17T18:09:12',
'version' => '0.041'
},
{
'date' => '2014-02-18T16:24:50',
'version' => '0.042'
},
{
'date' => '2014-02-21T01:42:05',
'version' => '0.043'
},
{
'date' => '2014-07-17T03:47:41',
'version' => '0.044'
},
{
'date' => '2014-07-20T23:24:33',
'version' => '0.045'
},
{
'date' => '2014-07-21T14:33:53',
'version' => '0.046'
},
{
'date' => '2014-07-29T18:13:01',
'version' => '0.047'
},
{
'date' => '2014-08-21T17:20:45',
'version' => '0.048'
},
{
'date' => '2014-09-02T15:21:17',
'version' => '0.049'
},
{
'date' => '2014-09-23T19:32:00',
'version' => '0.050'
},
{
'date' => '2014-11-18T03:59:56',
'version' => '0.051'
},
{
'date' => '2014-12-11T20:25:19',
'version' => '0.052'
},
{
'date' => '2014-12-12T04:43:37',
'version' => '0.053'
},
{
'date' => '2015-01-27T12:18:58',
'version' => '0.054'
},
{
'date' => '2015-05-07T22:15:24',
'version' => '0.055'
},
{
'date' => '2015-05-19T10:01:27',
'version' => '0.056'
},
{
'date' => '2016-04-18T14:19:09',
'version' => '0.057'
},
{
'date' => '2016-05-03T17:49:33',
'version' => '0.058'
},
{
'date' => '2016-07-29T20:12:12',
'version' => '0.059'
},
{
'date' => '2016-08-05T16:12:02',
'version' => '0.061'
},
{
'date' => '2016-08-08T16:20:33',
'version' => '0.063'
},
{
'date' => '2016-08-17T01:43:01',
'version' => '0.064'
},
{
'date' => '2016-09-10T02:43:48',
'version' => '0.065'
},
{
'date' => '2016-09-14T15:45:04',
'version' => '0.067'
},
{
'date' => '2016-09-23T20:15:05',
'version' => '0.068'
},
{
'date' => '2016-10-05T15:37:11',
'version' => '0.069'
},
{
'date' => '2016-10-10T03:25:33',
'version' => '0.070'
},
{
'date' => '2018-07-24T15:35:02',
'version' => '0.073'
},
{
'date' => '2018-07-30T19:37:29',
'version' => '0.074'
},
{
'date' => '2018-08-01T11:10:11',
'version' => '0.075'
},
{
'date' => '2018-08-06T01:09:54',
'version' => '0.076'
},
{
'date' => '2021-07-22T17:08:36',
'version' => '0.077'
},
{
'date' => '2021-08-02T13:26:31',
'version' => '0.078'
},
{
'date' => '2021-11-04T16:34:59',
'version' => '0.079'
},
{
'date' => '2021-11-05T12:17:42',
'version' => '0.080'
},
{
'date' => '2022-07-17T13:02:38',
'version' => '0.081'
},
{
'date' => '2022-07-25T13:47:22',
'version' => '0.082'
},
{
'date' => '2023-06-11T11:06:38',
'version' => '0.083'
},
{
'date' => '2023-06-14T10:35:44',
'version' => '0.084'
},
{
'date' => '2023-06-22T14:07:29',
'version' => '0.086'
},
{
'date' => '2023-07-11T12:54:02',
'version' => '0.088'
},
{
'date' => '2024-10-21T07:38:21',
'version' => '0.089'
},
{
'date' => '2024-11-12T10:52:55',
'version' => '0.090'
}
]
},
'IO-Compress' => {
'advisories' => [
{
'affected_versions' => [
'<2.070'
],
'cves' => [
'CVE-2016-1238'
],
'description' => '(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.
',
'distribution' => 'IO-Compress',
'fixed_versions' => [
'>=2.070'
],
'id' => 'CPANSA-IO-Compress-2016-1238',
'references' => [
'http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html',
'http://www.securitytracker.com/id/1036440',
'http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab',
'https://rt.perl.org/Public/Bug/Display.html?id=127834',
'http://www.securityfocus.com/bid/92136',
'http://www.debian.org/security/2016/dsa-3628',
'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/',
'https://security.gentoo.org/glsa/201701-75',
'https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E',
'https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html',
'https://security.gentoo.org/glsa/201812-07',
'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html'
],
'reported' => '2016-08-02',
'severity' => 'high'
}
],
'main_module' => 'IO::Compress',
'versions' => [
{
'date' => '2009-04-04T09:49:11',
'version' => '2.017'
},
{
'date' => '2009-05-03T16:27:20',
'version' => '2.018'
},
{
'date' => '2009-05-04T09:43:44',
'version' => '2.019'
},
{
'date' => '2009-06-03T17:48:41',
'version' => '2.020'
},
{
'date' => '2009-08-30T20:27:02',
'version' => '2.021'
},
{
'date' => '2009-10-09T21:56:08',
'version' => '2.022'
},
{
'date' => '2009-11-09T23:43:07',
'version' => '2.023'
},
{
'date' => '2010-01-09T17:56:46',
'version' => '2.024'
},
{
'date' => '2010-03-28T12:57:23',
'version' => '2.025'
},
{
'date' => '2010-04-07T19:51:37',
'version' => '2.026'
},
{
'date' => '2010-04-24T19:16:06',
'version' => '2.027'
},
{
'date' => '2010-07-24T14:46:19',
'version' => '2.030'
},
{
'date' => '2011-01-06T11:24:01',
'version' => '2.032'
},
{
'date' => '2011-01-11T14:03:58',
'version' => '2.033'
},
{
'date' => '2011-05-02T21:50:29',
'version' => '2.034'
},
{
'date' => '2011-05-07T08:32:12',
'version' => '2.035'
},
{
'date' => '2011-06-18T21:45:50',
'version' => '2.036'
},
{
'date' => '2011-06-22T07:19:49',
'version' => '2.037'
},
{
'date' => '2011-10-28T14:28:46',
'version' => '2.039'
},
{
'date' => '2011-10-28T22:20:49',
'version' => '2.040'
},
{
'date' => '2011-11-17T23:45:33',
'version' => '2.042'
},
{
'date' => '2011-11-20T21:34:13',
'version' => '2.043'
},
{
'date' => '2011-12-03T22:49:21',
'version' => '2.044'
},
{
'date' => '2011-12-04T19:21:48',
'version' => '2.045'
},
{
'date' => '2011-12-18T22:38:32',
'version' => '2.046'
},
{
'date' => '2012-01-28T23:28:39',
'version' => '2.047'
},
{
'date' => '2012-01-29T17:00:45',
'version' => '2.048'
},
{
'date' => '2012-02-18T15:58:24',
'version' => '2.049'
},
{
'date' => '2012-04-29T12:42:10',
'version' => '2.052'
},
{
'date' => '2012-08-05T20:37:36',
'version' => '2.055'
},
{
'date' => '2012-11-10T19:09:13',
'version' => '2.057'
},
{
'date' => '2012-11-12T22:15:00',
'version' => '2.058'
},
{
'date' => '2012-12-15T13:41:23',
'version' => '2.059'
},
{
'date' => '2013-01-07T20:02:34',
'version' => '2.060'
},
{
'date' => '2013-05-27T09:55:05',
'version' => '2.061'
},
{
'date' => '2013-08-12T19:08:16',
'version' => '2.062'
},
{
'date' => '2013-11-02T17:15:29',
'version' => '2.063'
},
{
'date' => '2014-02-01T23:21:32',
'version' => '2.064'
},
{
'date' => '2014-09-21T12:42:45',
'version' => '2.066'
},
{
'date' => '2014-12-08T15:14:06',
'version' => '2.067'
},
{
'date' => '2014-12-23T17:46:25',
'version' => '2.068'
},
{
'date' => '2015-09-26T18:42:09',
'version' => '2.069'
},
{
'date' => '2016-12-28T23:09:27',
'version' => '2.070'
},
{
'date' => '2017-02-12T20:41:37',
'version' => '2.072'
},
{
'date' => '2017-02-19T20:37:27',
'version' => '2.073'
},
{
'date' => '2017-02-19T22:11:53',
'version' => '2.074'
},
{
'date' => '2018-04-03T18:22:13',
'version' => '2.080'
},
{
'date' => '2018-04-08T15:03:07',
'version' => '2.081'
},
{
'date' => '2018-12-30T22:40:20',
'version' => '2.083'
},
{
'date' => '2019-01-06T08:57:26',
'version' => '2.084'
},
{
'date' => '2019-03-31T19:16:41',
'version' => '2.086'
},
{
'date' => '2019-08-10T18:12:14',
'version' => '2.087'
},
{
'date' => '2019-11-03T09:29:00',
'version' => '2.088'
},
{
'date' => '2019-11-03T19:54:15',
'version' => '2.089'
},
{
'date' => '2019-11-09T16:00:26',
'version' => '2.090'
},
{
'date' => '2019-11-23T19:44:59',
'version' => '2.091'
},
{
'date' => '2019-12-04T22:10:26',
'version' => '2.092'
},
{
'date' => '2019-12-07T16:05:46',
'version' => '2.093'
},
{
'date' => '2020-07-14T15:32:09',
'version' => '2.094'
},
{
'date' => '2020-07-20T19:25:09',
'version' => '2.095'
},
{
'date' => '2020-07-31T20:53:32',
'version' => '2.096'
},
{
'date' => '2021-01-07T13:57:52',
'version' => '2.100'
},
{
'date' => '2021-02-20T14:25:27',
'version' => '2.101'
},
{
'date' => '2021-02-28T08:57:41',
'version' => '2.102'
},
{
'date' => '2022-04-03T19:50:28',
'version' => '2.103'
},
{
'date' => '2022-04-09T15:43:24',
'version' => '2.104'
},
{
'date' => '2022-04-09T21:36:46',
'version' => '2.105'
},
{
'date' => '2022-04-12T16:10:04',
'version' => '2.106'
},
{
'date' => '2022-06-25T09:04:18',
'version' => '2.201'
},
{
'date' => '2023-02-08T21:49:30',
'version' => '2.204'
},
{
'date' => '2023-07-16T19:41:51',
'version' => '2.205'
},
{
'date' => '2023-07-25T15:56:21',
'version' => '2.206'
},
{
'date' => '2024-02-18T22:20:49',
'version' => '2.207'
},
{
'date' => '2024-03-31T15:17:06',
'version' => '2.208'
},
{
'date' => '2024-04-06T13:44:44',
'version' => '2.211'
},
{
'date' => '2024-04-27T12:55:39',
'version' => '2.212'
},
{
'date' => '2024-08-28T15:36:27',
'version' => '2.213'
}
]
},
'IO-Socket-SSL' => {
'advisories' => [
{
'affected_versions' => [
'<=1.35'
],
'cves' => [
'CVE-2010-4334'
],
'description' => 'The IO::Socket::SSL module 1.35 for Perl, when verify_mode is not VERIFY_NONE, fails open to VERIFY_NONE instead of throwing an error when a ca_file/ca_path cannot be verified, which allows remote attackers to bypass intended certificate restrictions.
',
'distribution' => 'IO-Socket-SSL',
'fixed_versions' => [
'>1.35'
],
'id' => 'CPANSA-IO-Socket-SSL-2010-4334',
'references' => [
'http://osvdb.org/69626',
'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606058',
'http://www.securityfocus.com/bid/45189',
'http://cpansearch.perl.org/src/SULLR/IO-Socket-SSL-1.35/Changes',
'http://secunia.com/advisories/42508',
'http://secunia.com/advisories/42757',
'http://www.openwall.com/lists/oss-security/2010/12/09/8',
'http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052594.html',
'http://www.openwall.com/lists/oss-security/2010/12/24/1',
'http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052601.html',
'http://www.mandriva.com/security/advisories?name=MDVSA-2011:092'
],
'reported' => '2011-01-14',
'severity' => undef
},
{
'affected_versions' => [
'>=1.14',
'<=1.25'
],
'cves' => [
'CVE-2009-3024'
],
'description' => 'The verify_hostname_of_cert function in the certificate checking feature in IO-Socket-SSL (IO::Socket::SSL) 1.14 through 1.25 only matches the prefix of a hostname when no wildcard is used, which allows remote attackers to bypass the hostname check for a certificate.
',
'distribution' => 'IO-Socket-SSL',
'fixed_versions' => [
'>=1.26'
],
'id' => 'CPANSA-IO-Socket-SSL-2009-3024',
'references' => [
'http://www.openwall.com/lists/oss-security/2009/08/31/4',
'http://www.openwall.com/lists/oss-security/2009/08/28/1',
'http://cpansearch.perl.org/src/SULLR/IO-Socket-SSL-1.30/Changes',
'http://www.openwall.com/lists/oss-security/2009/08/29/1',
'http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html',
'http://www.vupen.com/english/advisories/2011/0118',
'http://www.gentoo.org/security/en/glsa/glsa-201101-06.xml',
'http://secunia.com/advisories/42893'
],
'reported' => '2009-08-31',
'severity' => undef
}
],
'main_module' => 'IO::Socket::SSL',
'versions' => [
{
'date' => '1999-06-18T14:54:49',
'version' => '0.70'
},
{
'date' => '1999-07-21T19:45:05',
'version' => '0.72'
},
{
'date' => '1999-07-29T17:28:04',
'version' => '0.73'
},
{
'date' => '2000-07-04T11:46:51',
'version' => '0.74'
},
{
'date' => '2000-08-08T06:59:10',
'version' => '0.75'
},
{
'date' => '2000-11-17T14:26:45',
'version' => '0.76'
},
{
'date' => '2001-01-15T13:57:06',
'version' => '0.77'
},
{
'date' => '2001-04-24T07:00:38',
'version' => '0.78'
},
{
'date' => '2001-06-04T08:01:01',
'version' => '0.79'
},
{
'date' => '2001-08-19T08:28:53',
'version' => '0.80'
},
{
'date' => '2002-04-10T12:43:43',
'version' => '0.81'
},
{
'date' => '2002-08-13T21:42:55',
'version' => '0.90'
},
{
'date' => '2002-08-19T15:28:09',
'version' => '0.901'
},
{
'date' => '2002-09-01T01:13:14',
'version' => '0.91'
},
{
'date' => '2002-10-22T06:15:30',
'version' => '0.92'
},
{
'date' => '2003-06-24T19:24:37',
'version' => '0.93'
},
{
'date' => '2003-06-26T19:41:04',
'version' => '0.94'
},
{
'date' => '2003-08-25T22:47:30',
'version' => '0.95'
},
{
'date' => '2004-04-30T17:43:07',
'version' => '0.96'
},
{
'date' => '2005-07-17T09:20:02',
'version' => '0.97'
},
{
'date' => '2006-06-12T14:37:33',
'version' => '0.98'
},
{
'date' => '2006-06-12T14:48:30',
'version' => '0.98'
},
{
'date' => '2006-07-17T15:05:06',
'version' => '0.99'
},
{
'date' => '2006-07-18T13:33:27',
'version' => '0.99'
},
{
'date' => '2006-07-20T05:59:15',
'version' => '0.99'
},
{
'date' => '2006-07-20T08:35:45',
'version' => '0.99'
},
{
'date' => '2006-07-24T14:27:43',
'version' => '0.99'
},
{
'date' => '2006-08-02T07:30:04',
'version' => '0.99'
},
{
'date' => '2006-08-02T07:37:59',
'version' => '0.99'
},
{
'date' => '2006-08-02T20:43:25',
'version' => '0.99'
},
{
'date' => '2006-08-11T10:01:10',
'version' => '0.99'
},
{
'date' => '2006-08-15T20:22:28',
'version' => '0.99'
},
{
'date' => '2006-09-12T14:16:38',
'version' => '0.99'
},
{
'date' => '2006-09-13T11:10:06',
'version' => '0.99'
},
{
'date' => '2006-12-01T09:57:52',
'version' => '0.99'
},
{
'date' => '2007-03-06T18:12:09',
'version' => '0.99'
},
{
'date' => '2007-03-28T19:06:21',
'version' => '0.99'
},
{
'date' => '2007-04-16T19:35:58',
'version' => '0.99'
},
{
'date' => '2007-04-30T07:45:00',
'version' => '0.99'
},
{
'date' => '2007-06-03T19:46:51',
'version' => '0.99'
},
{
'date' => '2007-06-06T13:59:06',
'version' => '0.99'
},
{
'date' => '2007-08-10T09:07:39',
'version' => '0.99'
},
{
'date' => '2007-09-13T19:40:43',
'version' => '0.99'
},
{
'date' => '2007-10-09T21:18:11',
'version' => '0.99'
},
{
'date' => '2007-10-10T18:49:29',
'version' => '0.99'
},
{
'date' => '2007-10-26T06:29:26',
'version' => '0.99'
},
{
'date' => '2008-01-11T17:59:06',
'version' => '0.99'
},
{
'date' => '2008-01-28T06:44:08',
'version' => '0.99'
},
{
'date' => '2008-02-22T09:07:12',
'version' => '0.99'
},
{
'date' => '2008-02-24T09:42:37',
'version' => '0.99'
},
{
'date' => '2008-02-25T21:18:02',
'version' => '0.99'
},
{
'date' => '2008-03-10T08:46:06',
'version' => '0.99'
},
{
'date' => '2008-07-16T09:27:07',
'version' => '0.99'
},
{
'date' => '2008-08-28T20:03:28',
'version' => '0.99'
},
{
'date' => '2008-09-19T06:34:13',
'version' => '0.99'
},
{
'date' => '2008-09-19T16:54:30',
'version' => '0.99'
},
{
'date' => '2008-09-24T07:52:48',
'version' => '0.99'
},
{
'date' => '2008-09-25T09:24:39',
'version' => '0.99'
},
{
'date' => '2008-10-13T09:06:13',
'version' => '0.99'
},
{
'date' => '2008-11-17T17:21:39',
'version' => '0.99'
},
{
'date' => '2008-12-31T14:47:59',
'version' => '0.99'
},
{
'date' => '2009-01-15T20:52:54',
'version' => '0.99'
},
{
'date' => '2009-01-22T20:59:47',
'version' => '0.99'
},
{
'date' => '2009-01-24T06:34:00',
'version' => '0.99'
},
{
'date' => '2009-02-23T09:59:39',
'version' => '1.23'
},
{
'date' => '2009-04-01T08:02:14',
'version' => '1.24'
},
{
'date' => '2009-07-02T18:15:35',
'version' => '1.25'
},
{
'date' => '2009-07-03T07:36:23',
'version' => '1.26'
},
{
'date' => '2009-07-24T06:37:32',
'version' => '1.27'
},
{
'date' => '2009-08-19T10:46:35',
'version' => '1.28'
},
{
'date' => '2009-08-19T10:54:30',
'version' => '1.29'
},
{
'date' => '2009-08-19T14:41:37',
'version' => '1.30'
},
{
'date' => '2009-09-01T07:44:10',
'version' => '1.30_2'
},
{
'date' => '2009-09-02T05:57:30',
'version' => '1.30_3'
},
{
'date' => '2009-09-25T19:10:53',
'version' => '1.31'
},
{
'date' => '2010-02-22T09:39:43',
'version' => '1.32'
},
{
'date' => '2010-03-17T12:53:27',
'version' => '1.33'
},
{
'date' => '2010-11-01T08:55:36',
'version' => '1.34'
},
{
'date' => '2010-12-06T08:16:23',
'version' => '1.35'
},
{
'date' => '2010-12-08T19:28:31',
'version' => '1.36'
},
{
'date' => '2010-12-09T08:38:47',
'version' => '1.37'
},
{
'date' => '2011-01-18T08:45:03',
'version' => '1.38'
},
{
'date' => '2011-03-03T11:39:29',
'version' => '1.39'
},
{
'date' => '2011-05-02T10:32:52',
'version' => '1.40'
},
{
'date' => '2011-05-10T05:14:22',
'version' => '1.41'
},
{
'date' => '2011-05-10T14:15:57',
'version' => '1.42'
},
{
'date' => '2011-05-11T08:23:15',
'version' => '1.43'
},
{
'date' => '2011-05-12T19:35:25',
'version' => '1.43_1'
},
{
'date' => '2011-05-27T11:46:14',
'version' => '1.44'
},
{
'date' => '2011-10-13T08:42:32',
'version' => '1.45'
},
{
'date' => '2011-10-18T06:30:07',
'version' => '1.46'
},
{
'date' => '2011-10-21T07:09:03',
'version' => '1.47'
},
{
'date' => '2011-10-26T16:35:42',
'version' => '1.48'
},
{
'date' => '2011-10-28T08:26:49',
'version' => '1.49'
},
{
'date' => '2011-12-06T21:14:17',
'version' => '1.50'
},
{
'date' => '2011-12-06T21:25:05',
'version' => '1.51'
},
{
'date' => '2011-12-07T08:12:01',
'version' => '1.52'
},
{
'date' => '2011-12-11T21:45:13',
'version' => '1.53'
},
{
'date' => '2012-01-11T08:15:23',
'version' => '1.54'
},
{
'date' => '2012-02-20T06:49:04',
'version' => '1.55'
},
{
'date' => '2012-02-22T15:49:39',
'version' => '1.56'
},
{
'date' => '2012-02-26T21:57:54',
'version' => '1.57'
},
{
'date' => '2012-02-26T22:09:30',
'version' => '1.58'
},
{
'date' => '2012-03-08T10:44:05',
'version' => '1.59'
},
{
'date' => '2012-03-20T18:59:41',
'version' => '1.60'
},
{
'date' => '2012-03-27T14:34:36',
'version' => '1.61'
},
{
'date' => '2012-03-28T05:53:19',
'version' => '1.62'
},
{
'date' => '2012-04-06T20:33:58',
'version' => '1.63'
},
{
'date' => '2012-04-06T21:04:54',
'version' => '1.64'
},
{
'date' => '2012-04-16T16:51:54',
'version' => '1.65'
},
{
'date' => '2012-04-16T18:52:52',
'version' => '1.66'
},
{
'date' => '2012-05-07T09:39:11',
'version' => '1.67'
},
{
'date' => '2012-05-07T13:01:38',
'version' => '1.68'
},
{
'date' => '2012-05-08T08:24:35',
'version' => '1.69'
},
{
'date' => '2012-05-08T09:18:24',
'version' => '1.70'
},
{
'date' => '2012-05-09T08:41:48',
'version' => '1.71'
},
{
'date' => '2012-05-10T11:10:15',
'version' => '1.72'
},
{
'date' => '2012-05-11T19:29:42',
'version' => '1.73'
},
{
'date' => '2012-05-13T15:19:26',
'version' => '1.74'
},
{
'date' => '2012-06-07T17:42:47',
'version' => '1.74_1'
},
{
'date' => '2012-06-07T21:59:28',
'version' => '1.74_2'
},
{
'date' => '2012-06-15T12:42:21',
'version' => '1.75'
},
{
'date' => '2012-06-18T06:20:09',
'version' => '1.76'
},
{
'date' => '2012-10-05T05:36:56',
'version' => '1.77'
},
{
'date' => '2012-11-25T14:08:27',
'version' => '1.78'
},
{
'date' => '2012-11-25T15:50:09',
'version' => '1.79'
},
{
'date' => '2012-11-30T07:47:23',
'version' => '1.80'
},
{
'date' => '2012-12-06T09:14:04',
'version' => '1.81'
},
{
'date' => '2013-01-28T07:41:50',
'version' => '1.82'
},
{
'date' => '2013-02-03T19:04:27',
'version' => '1.83'
},
{
'date' => '2013-02-14T08:05:20',
'version' => '1.831'
},
{
'date' => '2013-02-15T20:48:12',
'version' => '1.84'
},
{
'date' => '2013-04-14T08:59:30',
'version' => '1.85'
},
{
'date' => '2013-04-17T11:31:18',
'version' => '1.86'
},
{
'date' => '2013-04-24T18:16:01',
'version' => '1.87'
},
{
'date' => '2013-05-02T05:59:47',
'version' => '1.88'
},
{
'date' => '2013-05-14T13:36:49',
'version' => '1.89'
},
{
'date' => '2013-05-29T18:58:35',
'version' => '1.90'
},
{
'date' => '2013-05-30T09:36:07',
'version' => '1.91'
},
{
'date' => '2013-05-30T19:20:11',
'version' => '1.92'
},
{
'date' => '2013-05-31T06:14:58',
'version' => '1.93'
},
{
'date' => '2013-06-01T12:46:14',
'version' => '1.94'
},
{
'date' => '2013-07-03T08:44:53',
'version' => '1.950'
},
{
'date' => '2013-07-03T10:02:42',
'version' => '1.951'
},
{
'date' => '2013-07-11T20:14:18',
'version' => '1.952'
},
{
'date' => '2013-07-22T06:34:31',
'version' => '1.953'
},
{
'date' => '2013-09-15T13:05:33',
'version' => '1.954'
},
{
'date' => '2013-10-11T16:54:45',
'version' => '1.955'
},
{
'date' => '2013-11-10T18:00:08',
'version' => '1.956'
},
{
'date' => '2013-11-11T08:42:30',
'version' => '1.957'
},
{
'date' => '2013-11-11T18:28:16',
'version' => '1.958'
},
{
'date' => '2013-11-12T15:39:42',
'version' => '1.959'
},
{
'date' => '2013-11-13T00:10:43',
'version' => '1.960'
},
{
'date' => '2013-11-26T14:47:11',
'version' => '1.961'
},
{
'date' => '2013-11-27T21:19:25',
'version' => '1.962'
},
{
'date' => '2014-01-13T13:05:48',
'version' => '1.963'
},
{
'date' => '2014-01-15T11:36:49',
'version' => '1.964'
},
{
'date' => '2014-01-16T19:11:32',
'version' => '1.965'
},
{
'date' => '2014-01-21T16:53:39',
'version' => '1.966'
},
{
'date' => '2014-02-06T22:06:14',
'version' => '1.967'
},
{
'date' => '2014-03-13T06:38:27',
'version' => '1.968'
},
{
'date' => '2014-03-16T16:41:39',
'version' => '1.969'
},
{
'date' => '2014-03-19T05:04:51',
'version' => '1.970'
},
{
'date' => '2014-03-22T19:54:06',
'version' => '1.971'
},
{
'date' => '2014-03-23T06:48:23',
'version' => '1.972'
},
{
'date' => '2014-03-26T07:10:22',
'version' => '1.973'
},
{
'date' => '2014-04-02T06:53:53',
'version' => '1.974'
},
{
'date' => '2014-04-02T10:14:38',
'version' => '1.975'
},
{
'date' => '2014-04-04T04:36:04',
'version' => '1.976'
},
{
'date' => '2014-04-04T13:25:28',
'version' => '1.977'
},
{
'date' => '2014-04-04T14:21:32',
'version' => '1.978'
},
{
'date' => '2014-04-06T06:24:29',
'version' => '1.979'
},
{
'date' => '2014-04-08T01:25:10',
'version' => '1.980'
},
{
'date' => '2014-04-08T11:09:59',
'version' => '1.981'
},
{
'date' => '2014-04-24T20:14:47',
'version' => '1.982'
},
{
'date' => '2014-04-27T12:02:16',
'version' => '1.982_1'
},
{
'date' => '2014-05-04T08:03:37',
'version' => '1.983'
},
{
'date' => '2014-05-10T13:11:17',
'version' => '1.984'
},
{
'date' => '2014-05-15T06:30:28',
'version' => '1.985'
},
{
'date' => '2014-05-16T17:41:46',
'version' => '1.986'
},
{
'date' => '2014-05-17T15:03:37',
'version' => '1.987'
},
{
'date' => '2014-05-17T22:15:10',
'version' => '1.988'
},
{
'date' => '2014-05-24T08:16:00',
'version' => '1.989'
},
{
'date' => '2014-05-26T05:46:04',
'version' => '1.989_1'
},
{
'date' => '2014-05-27T11:00:11',
'version' => '1.990'
},
{
'date' => '2014-05-27T19:43:31',
'version' => '1.991'
},
{
'date' => '2014-06-01T21:47:49',
'version' => '1.992'
},
{
'date' => '2014-06-13T20:45:52',
'version' => '1.993'
},
{
'date' => '2014-06-22T09:53:11',
'version' => '1.994'
},
{
'date' => '2014-07-11T21:50:48',
'version' => '1.995'
},
{
'date' => '2014-07-12T11:49:12',
'version' => '1.996'
},
{
'date' => '2014-07-12T17:24:04',
'version' => '1.997'
},
{
'date' => '2014-09-07T14:59:47',
'version' => '1.998'
},
{
'date' => '2014-10-09T19:56:19',
'version' => '1.999'
},
{
'date' => '2014-10-16T05:05:11',
'version' => '2.000'
},
{
'date' => '2014-10-21T09:46:39',
'version' => '2.001'
},
{
'date' => '2014-10-21T21:00:54',
'version' => '2.002'
},
{
'date' => '2014-11-14T20:12:08',
'version' => '2.003'
},
{
'date' => '2014-11-15T10:05:06',
'version' => '2.004'
},
{
'date' => '2014-11-15T10:14:17',
'version' => '2.004_1'
},
{
'date' => '2014-11-15T16:29:13',
'version' => '2.005'
},
{
'date' => '2014-11-15T16:34:37',
'version' => '2.005_1'
},
{
'date' => '2014-11-22T20:51:08',
'version' => '2.006'
},
{
'date' => '2014-11-26T22:00:05',
'version' => '2.007'
},
{
'date' => '2014-12-16T06:36:16',
'version' => '2.008'
},
{
'date' => '2015-01-12T10:48:21',
'version' => '2.009'
},
{
'date' => '2015-01-14T20:13:41',
'version' => '2.010'
},
{
'date' => '2015-02-01T16:00:22',
'version' => '2.011'
},
{
'date' => '2015-02-02T07:46:57',
'version' => '2.012'
},
{
'date' => '2015-05-01T15:39:14',
'version' => '2.013'
},
{
'date' => '2015-05-05T06:31:37',
'version' => '2.014'
},
{
'date' => '2015-05-13T20:43:55',
'version' => '2.015'
},
{
'date' => '2015-05-26T21:15:38',
'version' => '2.015_001'
},
{
'date' => '2015-05-27T05:39:14',
'version' => '2.015_002'
},
{
'date' => '2015-05-27T17:24:09',
'version' => '2.015_003'
},
{
'date' => '2015-05-28T07:07:25',
'version' => '2.015_004'
},
{
'date' => '2015-05-29T06:01:37',
'version' => '2.015_005'
},
{
'date' => '2015-06-02T19:35:20',
'version' => '2.015_006'
},
{
'date' => '2015-06-02T20:41:45',
'version' => '2.016'
},
{
'date' => '2015-06-04T14:38:29',
'version' => '2.016_001'
},
{
'date' => '2015-06-14T17:05:06',
'version' => '2.016_002'
},
{
'date' => '2015-08-24T15:45:30',
'version' => '2.017'
},
{
'date' => '2015-08-27T11:31:55',
'version' => '2.018'
},
{
'date' => '2015-09-01T05:32:47',
'version' => '2.019'
},
{
'date' => '2015-09-20T10:33:59',
'version' => '2.020'
},
{
'date' => '2015-12-02T19:55:29',
'version' => '2.021'
},
{
'date' => '2015-12-10T07:12:46',
'version' => '2.022'
},
{
'date' => '2016-01-30T11:12:14',
'version' => '2.023'
},
{
'date' => '2016-02-06T19:38:18',
'version' => '2.024'
},
{
'date' => '2016-04-04T07:23:02',
'version' => '2.025'
},
{
'date' => '2016-04-20T06:11:37',
'version' => '2.026'
},
{
'date' => '2016-04-20T14:22:50',
'version' => '2.027'
},
{
'date' => '2016-06-27T14:22:02',
'version' => '2.028'
},
{
'date' => '2016-06-27T15:53:16',
'version' => '2.029'
},
{
'date' => '2016-07-08T08:53:04',
'version' => '2.030'
},
{
'date' => '2016-07-08T11:40:31',
'version' => '2.031'
},
{
'date' => '2016-07-12T13:12:57',
'version' => '2.032'
},
{
'date' => '2016-07-15T09:00:38',
'version' => '2.033'
},
{
'date' => '2016-08-08T08:19:05',
'version' => '2.034'
},
{
'date' => '2016-08-11T14:25:18',
'version' => '2.035'
},
{
'date' => '2016-08-11T19:03:38',
'version' => '2.036'
},
{
'date' => '2016-08-22T17:39:32',
'version' => '2.037'
},
{
'date' => '2016-09-17T09:36:29',
'version' => '2.038'
},
{
'date' => '2016-11-20T21:01:59',
'version' => '2.039'
},
{
'date' => '2016-12-17T15:18:35',
'version' => '2.040'
},
{
'date' => '2017-01-04T05:17:55',
'version' => '2.041'
},
{
'date' => '2017-01-05T18:32:13',
'version' => '2.042'
},
{
'date' => '2017-01-06T13:27:56',
'version' => '2.043'
},
{
'date' => '2017-01-26T10:46:57',
'version' => '2.044'
},
{
'date' => '2017-02-13T15:26:59',
'version' => '2.045'
},
{
'date' => '2017-02-15T18:41:05',
'version' => '2.046'
},
{
'date' => '2017-02-16T19:01:01',
'version' => '2.047'
},
{
'date' => '2017-04-16T18:33:09',
'version' => '2.048'
},
{
'date' => '2017-06-12T05:15:34',
'version' => '2.049'
},
{
'date' => '2017-08-18T06:07:18',
'version' => '2.050'
},
{
'date' => '2017-09-05T09:28:25',
'version' => '2.051'
},
{
'date' => '2017-10-22T08:48:29',
'version' => '2.052'
},
{
'date' => '2018-01-21T19:41:38',
'version' => '2.053'
},
{
'date' => '2018-01-22T05:11:45',
'version' => '2.054'
},
{
'date' => '2018-02-15T13:45:54',
'version' => '2.055'
},
{
'date' => '2018-02-19T06:35:28',
'version' => '2.056'
},
{
'date' => '2018-07-18T19:16:28',
'version' => '2.057'
},
{
'date' => '2018-07-19T07:54:24',
'version' => '2.058'
},
{
'date' => '2018-08-15T16:13:05',
'version' => '2.059'
},
{
'date' => '2018-09-16T19:15:07',
'version' => '2.060'
},
{
'date' => '2019-02-23T02:08:16',
'version' => '2.061'
},
{
'date' => '2019-02-24T00:14:55',
'version' => '2.062'
},
{
'date' => '2019-03-01T14:48:40',
'version' => '2.063'
},
{
'date' => '2019-03-04T12:28:12',
'version' => '2.064'
},
{
'date' => '2019-03-05T18:50:40',
'version' => '2.065'
},
{
'date' => '2019-03-06T06:55:56',
'version' => '2.066'
},
{
'date' => '2020-02-14T17:49:51',
'version' => '2.067'
},
{
'date' => '2020-03-31T06:15:39',
'version' => '2.068'
},
{
'date' => '2021-01-22T16:55:49',
'version' => '2.069'
},
{
'date' => '2021-02-26T08:03:24',
'version' => '2.070'
},
{
'date' => '2021-05-23T08:12:02',
'version' => '2.071'
},
{
'date' => '2021-08-16T13:06:40',
'version' => '2.072'
},
{
'date' => '2021-12-22T19:30:42',
'version' => '2.073'
},
{
'date' => '2022-01-07T15:09:53',
'version' => '2.074'
},
{
'date' => '2022-09-02T18:18:33',
'version' => '2.075'
},
{
'date' => '2022-11-14T13:41:15',
'version' => '2.076'
},
{
'date' => '2022-11-21T11:44:16',
'version' => '2.077'
},
{
'date' => '2022-12-11T20:10:13',
'version' => '2.078'
},
{
'date' => '2023-01-16T06:28:01',
'version' => '2.079'
},
{
'date' => '2023-01-18T16:28:53',
'version' => '2.080'
},
{
'date' => '2023-01-25T10:49:10',
'version' => '2.081'
},
{
'date' => '2023-05-17T20:41:22',
'version' => '2.082'
},
{
'date' => '2023-05-18T09:15:20',
'version' => '2.083'
},
{
'date' => '2023-11-06T21:02:36',
'version' => '2.084'
},
{
'date' => '2024-01-22T19:07:08',
'version' => '2.085'
},
{
'date' => '2024-07-03T12:14:36',
'version' => '2.086'
},
{
'date' => '2024-07-08T05:33:53',
'version' => '2.087'
},
{
'date' => '2024-07-14T05:05:54',
'version' => '2.088'
},
{
'date' => '2024-08-29T14:46:00',
'version' => '2.089'
}
]
},
'IPC-Cmd' => {
'advisories' => [
{
'affected_versions' => [
'<0.96'
],
'cves' => [
'CVE-2016-1238'
],
'description' => '(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.
',
'distribution' => 'IPC-Cmd',
'fixed_versions' => [
'>=0.96'
],
'id' => 'CPANSA-IPC-Cmd-2016-1238',
'references' => [
'http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html',
'http://www.securitytracker.com/id/1036440',
'http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab',
'https://rt.perl.org/Public/Bug/Display.html?id=127834',
'http://www.securityfocus.com/bid/92136',
'http://www.debian.org/security/2016/dsa-3628',
'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/',
'https://security.gentoo.org/glsa/201701-75',
'https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E',
'https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html',
'https://security.gentoo.org/glsa/201812-07',
'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html'
],
'reported' => '2016-08-02',
'severity' => 'high'
}
],
'main_module' => 'IPC::Cmd',
'versions' => [
{
'date' => '2003-05-10T16:57:39',
'version' => '0.02'
},
{
'date' => '2003-05-11T08:50:33',
'version' => '0.03'
},
{
'date' => '2003-09-25T10:34:58',
'version' => '0.04'
},
{
'date' => '2004-06-18T11:43:01',
'version' => '0.20'
},
{
'date' => '2004-08-16T10:26:03',
'version' => '0.22'
},
{
'date' => '2004-12-03T15:53:45',
'version' => '0.23'
},
{
'date' => '2004-12-09T09:56:18',
'version' => '0.24'
},
{
'date' => '2006-09-06T15:57:50',
'version' => '0.25'
},
{
'date' => '2006-10-05T14:42:36',
'version' => '0.29_01'
},
{
'date' => '2006-10-11T11:11:24',
'version' => '0.30'
},
{
'date' => '2006-10-13T11:18:04',
'version' => '0.32'
},
{
'date' => '2006-10-20T13:16:49',
'version' => '0.34'
},
{
'date' => '2006-11-24T14:01:10',
'version' => '0.36'
},
{
'date' => '2007-10-11T15:17:44',
'version' => '0.38'
},
{
'date' => '2007-10-17T09:29:57',
'version' => '0.40'
},
{
'date' => '2008-05-18T15:50:12',
'version' => '0.41_01'
},
{
'date' => '2008-06-29T15:41:17',
'version' => '0.41_02'
},
{
'date' => '2008-07-13T13:08:43',
'version' => '0.41_03'
},
{
'date' => '2008-07-14T13:57:54',
'version' => '0.41_04'
},
{
'date' => '2008-09-22T13:12:26',
'version' => '0.41_05'
},
{
'date' => '2008-09-24T15:46:32',
'version' => '0.41_06'
},
{
'date' => '2008-10-05T16:24:49',
'version' => '0.41_07'
},
{
'date' => '2008-10-10T09:47:07',
'version' => '0.42'
},
{
'date' => '2009-05-04T08:15:08',
'version' => '0.44'
},
{
'date' => '2009-06-12T11:38:40',
'version' => '0.46'
},
{
'date' => '2009-09-07T14:15:59',
'version' => '0.48'
},
{
'date' => '2009-09-07T15:21:24',
'version' => '0.50'
},
{
'date' => '2009-11-08T23:24:39',
'version' => '0.51_01'
},
{
'date' => '2009-11-13T16:17:59',
'version' => '0.52'
},
{
'date' => '2009-11-15T22:04:56',
'version' => '0.54'
},
{
'date' => '2010-02-03T14:21:25',
'version' => '0.56'
},
{
'date' => '2010-04-29T20:06:40',
'version' => '0.58'
},
{
'date' => '2010-07-05T08:10:45',
'version' => '0.60'
},
{
'date' => '2010-10-19T14:53:57',
'version' => '0.62'
},
{
'date' => '2010-10-19T18:09:00',
'version' => '0.64'
},
{
'date' => '2010-11-23T12:11:55',
'version' => '0.66'
},
{
'date' => '2011-01-07T22:28:30',
'version' => '0.68'
},
{
'date' => '2011-01-31T20:40:13',
'version' => '0.70'
},
{
'date' => '2011-05-10T13:07:15',
'version' => '0.71_01'
},
{
'date' => '2011-05-26T12:01:30',
'version' => '0.71_02'
},
{
'date' => '2011-05-26T12:46:44',
'version' => '0.71_03'
},
{
'date' => '2011-06-22T11:34:08',
'version' => '0.72'
},
{
'date' => '2012-01-30T10:35:24',
'version' => '0.74'
},
{
'date' => '2012-01-30T11:34:12',
'version' => '0.76'
},
{
'date' => '2012-04-30T18:52:04',
'version' => '0.78'
},
{
'date' => '2013-03-02T22:15:43',
'version' => '0.80'
},
{
'date' => '2013-06-29T21:17:06',
'version' => '0.82'
},
{
'date' => '2013-08-06T09:28:59',
'version' => '0.84'
},
{
'date' => '2013-09-05T19:34:47',
'version' => '0.85_01'
},
{
'date' => '2013-10-10T13:09:11',
'version' => '0.85_02'
},
{
'date' => '2013-11-04T14:18:01',
'version' => '0.86'
},
{
'date' => '2013-11-15T14:47:57',
'version' => '0.88'
},
{
'date' => '2013-11-18T15:12:15',
'version' => '0.90'
},
{
'date' => '2014-01-22T20:01:22',
'version' => '0.92'
},
{
'date' => '2016-02-12T19:01:25',
'version' => '0.94'
},
{
'date' => '2016-07-28T10:19:44',
'version' => '0.96'
},
{
'date' => '2017-05-12T16:05:02',
'version' => '0.98'
},
{
'date' => '2018-02-14T16:21:01',
'version' => '1.00'
},
{
'date' => '2018-05-03T08:53:01',
'version' => '1.02'
},
{
'date' => '2019-07-13T09:17:39',
'version' => '1.04'
}
]
},
'IPC-Run' => {
'advisories' => [
{
'affected_versions' => [
'<0.90',
'=0.90_01',
'=0.90_02'
],
'cves' => [],
'description' => 'INADDR_ANY can be your external ip, IPC::Run should only listen on localhost.
',
'distribution' => 'IPC-Run',
'fixed_versions' => [
'>=0.90'
],
'id' => 'CPANSA-IPC-Run-2009-01',
'references' => [
'https://metacpan.org/dist/IPC-Run/changes',
'https://rt.cpan.org/Public/Bug/Display.html?id=49693'
],
'reported' => '2009-09-14'
}
],
'main_module' => 'IPC::Run',
'versions' => [
{
'date' => '2000-05-22T05:10:41',
'version' => '0.1'
},
{
'date' => '2000-06-01T06:12:25',
'version' => '0.2'
},
{
'date' => '2000-06-02T16:53:04',
'version' => '0.21'
},
{
'date' => '2000-06-03T12:34:23',
'version' => '0.3'
},
{
'date' => '2000-06-06T18:48:56',
'version' => '0.32'
},
{
'date' => '2000-06-08T10:24:28',
'version' => '0.33'
},
{
'date' => '2000-06-08T10:41:19',
'version' => '0.34'
},
{
'date' => '2000-06-15T19:06:43',
'version' => '0.4'
},
{
'date' => '2000-08-17T14:33:30',
'version' => '0.42'
},
{
'date' => '2000-10-02T21:20:49',
'version' => '0.44'
},
{
'date' => '2001-11-11T04:21:36',
'version' => '0.5'
},
{
'date' => '2001-11-12T07:19:27',
'version' => '0.51'
},
{
'date' => '2001-12-01T06:05:11',
'version' => '0.54'
},
{
'date' => '2001-12-01T21:54:11',
'version' => '0.55'
},
{
'date' => '2001-12-02T13:48:12',
'version' => '0.56'
},
{
'date' => '2001-12-06T20:33:30',
'version' => '0.6'
},
{
'date' => '2001-12-07T09:31:12',
'version' => '0.61'
},
{
'date' => '2002-01-01T20:42:40',
'version' => '0.62'
},
{
'date' => '2002-02-27T17:14:16',
'version' => '0.63'
},
{
'date' => '2002-03-14T17:14:53',
'version' => '0.64'
},
{
'date' => '2002-03-27T11:42:32',
'version' => '0.66'
},
{
'date' => '2002-04-26T15:04:45',
'version' => '0.7'
},
{
'date' => '2002-05-06T13:23:28',
'version' => '0.71'
},
{
'date' => '2002-05-09T15:58:13',
'version' => '0.72'
},
{
'date' => '2002-05-22T13:20:13',
'version' => '0.73'
},
{
'date' => '2002-05-23T13:48:23',
'version' => '0.74'
},
{
'date' => '2003-01-28T17:59:36',
'version' => '0.75'
},
{
'date' => '2003-09-26T19:35:48',
'version' => '0.77'
},
{
'date' => '2004-03-09T06:22:24',
'version' => '0.78'
},
{
'date' => '2005-01-19T23:50:56',
'version' => '0.79'
},
{
'date' => '2006-03-10T15:30:59',
'version' => '0.80_91'
},
{
'date' => '2006-05-10T20:00:28',
'version' => '0.80'
},
{
'date' => '2008-10-15T09:59:57',
'version' => '0.81_01'
},
{
'date' => '2008-12-18T12:01:25',
'version' => '0.82'
},
{
'date' => '2009-07-09T16:38:18',
'version' => '0.83'
},
{
'date' => '2009-07-13T00:59:41',
'version' => '0.84'
},
{
'date' => '2010-03-23T05:12:54',
'version' => '0.85'
},
{
'date' => '2010-03-24T20:11:05',
'version' => '0.86'
},
{
'date' => '2010-03-29T18:03:50',
'version' => '0.87'
},
{
'date' => '2010-03-30T18:14:22',
'version' => '0.88'
},
{
'date' => '2010-04-01T04:48:26',
'version' => '0.89'
},
{
'date' => '2011-06-03T04:41:40',
'version' => '0.90_01'
},
{
'date' => '2011-06-29T04:15:08',
'version' => '0.90_02'
},
{
'date' => '2011-07-01T04:18:30',
'version' => '0.90_03'
},
{
'date' => '2011-07-03T20:10:42',
'version' => '0.90'
},
{
'date' => '2012-01-25T05:16:00',
'version' => '0.91_01'
},
{
'date' => '2012-02-15T04:50:23',
'version' => '0.91'
},
{
'date' => '2012-08-22T15:00:56',
'version' => '0.92_01'
},
{
'date' => '2012-08-30T15:26:42',
'version' => '0.92'
},
{
'date' => '2014-12-11T05:59:50',
'version' => '0.93'
},
{
'date' => '2014-12-11T07:48:28',
'version' => '0.93_01'
},
{
'date' => '2014-12-14T07:23:31',
'version' => '0.94'
},
{
'date' => '2016-04-13T03:11:26',
'version' => '0.94_01'
},
{
'date' => '2016-04-14T05:15:22',
'version' => '0.94_02'
},
{
'date' => '2017-04-25T01:29:03',
'version' => '0.95'
},
{
'date' => '2017-05-12T13:48:34',
'version' => '0.96'
},
{
'date' => '2018-03-26T21:45:38',
'version' => '0.97'
},
{
'date' => '2018-03-29T18:52:43',
'version' => '0.98'
},
{
'date' => '2018-03-30T22:49:37',
'version' => '0.99'
},
{
'date' => '2018-05-23T17:24:25',
'version' => '20180523.0'
},
{
'date' => '2020-05-05T20:57:23',
'version' => '20200505.0'
},
{
'date' => '2022-08-07T12:50:57',
'version' => '20220807.0'
},
{
'date' => '2023-10-03T01:09:01',
'version' => '20231003.0'
}
]
},
'IPTables-Parse' => {
'advisories' => [
{
'affected_versions' => [
'<1.6'
],
'cves' => [
'CVE-2015-8326'
],
'description' => 'The IPTables-Parse module before 1.6 for Perl allows local users to write to arbitrary files owned by the current user.
',
'distribution' => 'IPTables-Parse',
'fixed_versions' => [],
'id' => 'CPANSA-IPTables-Parse-2015-8326',
'references' => [
'https://metacpan.org/source/MRASH/IPTables-Parse-1.6/Changes',
'https://github.com/mtrmac/IPTables-Parse/commit/b400b976d81140f6971132e94eb7657b5b0a2b87',
'https://bugzilla.redhat.com/show_bug.cgi?id=1267962',
'http://www.openwall.com/lists/oss-security/2015/11/24/10'
],
'reported' => '2017-06-07',
'severity' => 'medium'
}
],
'main_module' => 'IPTables::Parse',
'versions' => [
{
'date' => '2008-10-26T23:15:50',
'version' => '0.7'
},
{
'date' => '2012-02-27T02:20:58',
'version' => '0.8'
},
{
'date' => '2012-02-27T02:22:29',
'version' => '0.9'
},
{
'date' => '2012-02-29T02:51:44',
'version' => '1.0'
},
{
'date' => '2012-03-03T03:56:08',
'version' => '1.1'
},
{
'date' => '2015-02-25T02:08:58',
'version' => '1.1'
},
{
'date' => '2015-03-01T20:15:52',
'version' => '1.3.1'
},
{
'date' => '2015-03-01T20:50:07',
'version' => '1.4'
},
{
'date' => '2015-09-09T13:53:26',
'version' => '1.5'
},
{
'date' => '2015-11-07T21:08:49',
'version' => '1.6'
},
{
'date' => '2015-11-30T01:16:22',
'version' => '1.6.1'
}
]
},
'Image-ExifTool' => {
'advisories' => [
{
'affected_versions' => [
'<=12.37'
],
'cves' => [
'CVE-2022-23935'
],
'description' => 'lib/Image/ExifTool.pm in ExifTool before 12.38 mishandles a $file =~ /\\|$/ check, leading to command injection.
',
'distribution' => 'Image-ExifTool',
'fixed_versions' => [
'>12.38'
],
'id' => 'CPANSA-Image-ExifTool-2022-23935',
'references' => [
'https://github.com/exiftool/exiftool/commit/74dbab1d2766d6422bb05b033ac6634bf8d1f582',
'https://gist.github.com/ert-plus/1414276e4cb5d56dd431c2f0429e4429'
],
'reported' => '2022-01-25',
'severity' => 'critical'
},
{
'affected_versions' => [
'>=7.44,<=12.23'
],
'cves' => [
'CVE-2021-22204'
],
'description' => 'Improper neutralization of user data in the DjVu file format in ExifTool versions 7.44 and up allows arbitrary code execution when parsing the malicious image
',
'distribution' => 'Image-ExifTool',
'fixed_versions' => [
'>12.23'
],
'id' => 'CPANSA-Image-ExifTool-2021-22204',
'references' => [
'http://packetstormsecurity.com/files/162558/ExifTool-DjVu-ANT-Perl-Injection.html',
'http://packetstormsecurity.com/files/164768/GitLab-Unauthenticated-Remote-ExifTool-Command-Injection.html',
'http://packetstormsecurity.com/files/164994/GitLab-13.10.2-Remote-Code-Execution.html',
'http://packetstormsecurity.com/files/167038/ExifTool-12.23-Arbitrary-Code-Execution.html',
'http://www.openwall.com/lists/oss-security/2021/05/09/1',
'http://www.openwall.com/lists/oss-security/2021/05/10/5',
'https://github.com/exiftool/exiftool/commit/cf0f4e7dcd024ca99615bfd1102a841a25dde031#diff-fa0d652d10dbcd246e6b1df16c1e992931d3bb717a7e36157596b76bdadb3800',
'https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22204.json',
'https://hackerone.com/reports/1154542',
'https://lists.debian.org/debian-lts-announce/2021/05/msg00018.html',
'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DDKDLJLBTBBR66OOPXSXCG2PQRM5KCZL/',
'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F6UOBPU3LSHAPRRJNISNVXZ5DSUIALLV/',
'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U4RF6PJCJ6NQOVJJJF6HN6BORUQVIXY6/',
'https://www.debian.org/security/2021/dsa-4910'
],
'reported' => '2021-04-23',
'severity' => undef
},
{
'affected_versions' => [
'=8.32'
],
'cves' => [
'CVE-2018-20211'
],
'description' => 'ExifTool 8.32 allows local users to gain privileges by creating a %TEMP%\\\\par-%username%\\\\cache-exiftool-8.32 folder with a victim\'s username, and then copying a Trojan horse ws32_32.dll file into this new folder, aka DLL Hijacking. NOTE: 8.32 is an obsolete version from 2010 (9.x was released starting in 2012, and 10.x was released starting in 2015).
',
'distribution' => 'Image-ExifTool',
'fixed_versions' => [
'>8'
],
'id' => 'CPANSA-Image-ExifTool-2018-20211',
'references' => [
'http://packetstormsecurity.com/files/150892/Exiftool-8.3.2.0-DLL-Hijacking.html',
'http://seclists.org/fulldisclosure/2018/Dec/44'
],
'reported' => '2019-01-02',
'severity' => undef
}
],
'main_module' => 'Image::ExifTool',
'versions' => [
{
'date' => '2004-10-04T15:37:06',
'version' => '3.60'
},
{
'date' => '2004-11-02T12:46:54',
'version' => '3.72'
},
{
'date' => '2004-11-05T12:41:52',
'version' => '3.74'
},
{
'date' => '2004-11-11T18:24:18',
'version' => '3.82'
},
{
'date' => '2004-11-24T18:42:42',
'version' => '3.93'
},
{
'date' => '2004-11-25T16:34:47',
'version' => '3.94'
},
{
'date' => '2005-01-24T13:15:55',
'version' => '4.36'
},
{
'date' => '2005-02-07T15:56:43',
'version' => '4.53'
},
{
'date' => '2005-02-18T00:42:59',
'version' => '4.64'
},
{
'date' => '2005-03-01T19:23:29',
'version' => '4.73'
},
{
'date' => '2005-03-15T12:09:56',
'version' => '4.87'
},
{
'date' => '2005-04-02T19:46:41',
'version' => '4.93'
},
{
'date' => '2005-04-20T12:41:30',
'version' => '5.05'
},
{
'date' => '2005-05-16T15:54:07',
'version' => '5.18'
},
{
'date' => '2005-06-03T19:21:17',
'version' => '5.25'
},
{
'date' => '2005-06-15T17:21:33',
'version' => '5.32'
},
{
'date' => '2005-07-19T18:16:02',
'version' => '5.46'
},
{
'date' => '2005-08-24T14:58:18',
'version' => '5.55'
},
{
'date' => '2005-10-13T13:15:01',
'version' => '5.67'
},
{
'date' => '2005-11-18T13:04:29',
'version' => '5.77'
},
{
'date' => '2005-12-22T16:42:56',
'version' => '5.87'
},
{
'date' => '2006-02-19T20:26:14',
'version' => '6.00'
},
{
'date' => '2006-05-12T12:10:32',
'version' => '6.17'
},
{
'date' => '2006-07-24T13:18:05',
'version' => '6.29'
},
{
'date' => '2006-09-06T20:26:16',
'version' => '6.36'
},
{
'date' => '2006-09-21T15:39:52',
'version' => '6.42'
},
{
'date' => '2006-11-20T13:52:55',
'version' => '6.57'
},
{
'date' => '2006-12-20T13:07:23',
'version' => '6.66'
},
{
'date' => '2007-02-14T13:28:50',
'version' => '6.75'
},
{
'date' => '2007-02-16T13:21:27',
'version' => '6.76'
},
{
'date' => '2007-05-10T18:53:15',
'version' => '6.90'
},
{
'date' => '2007-10-24T11:39:52',
'version' => '7.00'
},
{
'date' => '2008-02-05T17:21:39',
'version' => '7.15'
},
{
'date' => '2008-03-12T12:24:57',
'version' => '7.21'
},
{
'date' => '2008-04-18T13:09:00',
'version' => '7.25'
},
{
'date' => '2008-05-31T11:39:35',
'version' => '7.30'
},
{
'date' => '2008-10-26T19:00:34',
'version' => '7.50'
},
{
'date' => '2008-10-27T13:48:39',
'version' => '7.51'
},
{
'date' => '2009-01-06T13:48:18',
'version' => '7.60'
},
{
'date' => '2009-02-09T14:25:12',
'version' => '7.67'
},
{
'date' => '2009-07-02T15:42:38',
'version' => '7.82'
},
{
'date' => '2009-08-18T01:30:53',
'version' => '7.88'
},
{
'date' => '2009-08-18T12:03:19',
'version' => '7.89'
},
{
'date' => '2009-11-20T19:06:24',
'version' => '8.00'
},
{
'date' => '2010-02-08T20:49:00',
'version' => '8.10'
},
{
'date' => '2010-03-18T14:09:58',
'version' => '8.15'
},
{
'date' => '2010-07-13T12:35:33',
'version' => '8.25'
},
{
'date' => '2010-11-21T21:29:00',
'version' => '8.40'
},
{
'date' => '2011-03-01T12:43:02',
'version' => '8.50'
},
{
'date' => '2011-06-27T11:52:50',
'version' => '8.60'
},
{
'date' => '2011-09-24T10:53:29',
'version' => '8.65'
},
{
'date' => '2012-01-08T13:48:19',
'version' => '8.75'
},
{
'date' => '2012-01-27T14:19:10',
'version' => '8.77'
},
{
'date' => '2012-03-25T12:07:06',
'version' => '8.85'
},
{
'date' => '2012-04-28T12:06:48',
'version' => '8.90'
},
{
'date' => '2012-08-25T12:28:04',
'version' => '9.01'
},
{
'date' => '2012-11-03T16:37:48',
'version' => '9.04'
},
{
'date' => '2013-01-02T21:07:34',
'version' => '9.11'
},
{
'date' => '2013-01-03T01:49:33',
'version' => '9.12'
},
{
'date' => '2013-01-10T15:05:11',
'version' => '9.13'
},
{
'date' => '2013-04-06T11:38:39',
'version' => '9.25'
},
{
'date' => '2013-04-15T11:20:13',
'version' => '9.27'
},
{
'date' => '2014-01-11T22:58:56',
'version' => '9.46'
},
{
'date' => '2014-02-22T14:40:30',
'version' => '9.53'
},
{
'date' => '2014-05-11T13:34:36',
'version' => '9.60'
},
{
'date' => '2014-09-03T12:19:55',
'version' => '9.70'
},
{
'date' => '2014-11-15T15:14:24',
'version' => '9.76'
},
{
'date' => '2015-03-14T11:33:58',
'version' => '9.90'
},
{
'date' => '2015-08-18T13:30:08',
'version' => '10.00'
},
{
'date' => '2016-01-22T15:51:06',
'version' => '10.10'
},
{
'date' => '2016-04-20T13:25:01',
'version' => '10.15'
},
{
'date' => '2016-06-13T14:05:58',
'version' => '10.20'
},
{
'date' => '2016-11-24T16:55:55',
'version' => '10.36'
},
{
'date' => '2017-01-13T16:02:53',
'version' => '10.39'
},
{
'date' => '2017-01-14T17:30:45',
'version' => '10.40'
},
{
'date' => '2017-04-20T12:54:29',
'version' => '10.50'
},
{
'date' => '2017-06-05T14:41:23',
'version' => '10.55'
},
{
'date' => '2018-02-22T13:27:40',
'version' => '10.80'
},
{
'date' => '2018-06-07T11:44:16',
'version' => '11.00'
},
{
'date' => '2018-06-11T12:18:41',
'version' => '11.01'
},
{
'date' => '2018-09-28T01:34:43',
'version' => '11.11'
},
{
'date' => '2019-03-06T15:14:28',
'version' => '11.30'
},
{
'date' => '2019-06-11T15:29:41',
'version' => '11.50'
},
{
'date' => '2019-10-10T13:04:36',
'version' => '11.70'
},
{
'date' => '2020-01-28T15:40:58',
'version' => '11.85'
},
{
'date' => '2020-06-11T20:36:48',
'version' => '12.00'
},
{
'date' => '2021-01-18T14:03:50',
'version' => '12.15'
},
{
'date' => '2021-01-21T17:51:28',
'version' => '12.16'
},
{
'date' => '2021-05-21T00:37:46',
'version' => '12.26'
},
{
'date' => '2021-08-12T13:13:43',
'version' => '12.30'
},
{
'date' => '2022-06-07T11:39:06',
'version' => '12.42'
},
{
'date' => '2022-06-07T20:05:13',
'version' => '12.42'
},
{
'date' => '2022-11-09T11:41:50',
'version' => '12.50'
},
{
'date' => '2023-04-05T15:01:59',
'version' => '12.60'
},
{
'date' => '2023-11-19T16:15:22',
'version' => '12.70'
},
{
'date' => '2024-01-31T01:08:08',
'version' => '12.75'
},
{
'date' => '2024-01-31T15:31:14',
'version' => '12.76'
},
{
'date' => '2024-10-29T17:10:24',
'version' => '13.00'
},
{
'date' => '2024-12-20T16:49:20',
'version' => '13.10'
}
]
},
'Image-Info' => {
'advisories' => [
{
'affected_versions' => [
'>=2.12'
],
'cves' => [
'CVE-2016-9181'
],
'description' => 'perl-Image-Info: When parsing an SVG file, external entity expansion (XXE) was not disabled. An attacker could craft an SVG file which, when processed by an application using perl-Image-Info, could cause denial of service or, potentially, information disclosure.
',
'distribution' => 'Image-Info',
'fixed_versions' => [],
'id' => 'CPANSA-Image-Info-2016-01',
'references' => [
'http://www.securityfocus.com/bid/94220',
'http://www.openwall.com/lists/oss-security/2016/11/04/2'
],
'reported' => '2016-11-04'
}
],
'main_module' => 'Image::Info',
'versions' => [
{
'date' => '1999-12-19T07:09:24',
'version' => '0.01'
},
{
'date' => '1999-12-22T00:03:22',
'version' => '0.02'
},
{
'date' => '1999-12-25T22:43:22',
'version' => '0.03'
},
{
'date' => '2000-01-07T18:20:42',
'version' => '0.04'
},
{
'date' => '2000-08-24T09:09:25',
'version' => '0.05'
},
{
'date' => '2000-10-18T19:55:02',
'version' => '1.00'
},
{
'date' => '2000-10-31T17:32:56',
'version' => '1.01'
},
{
'date' => '2000-11-10T18:21:41',
'version' => '1.02'
},
{
'date' => '2000-11-13T19:44:44',
'version' => '1.03'
},
{
'date' => '2000-11-30T20:25:46',
'version' => '1.04'
},
{
'date' => '2001-03-24T20:20:31',
'version' => '0.06'
},
{
'date' => '2001-03-24T20:40:20',
'version' => '1.05'
},
{
'date' => '2001-03-26T19:28:11',
'version' => '1.06'
},
{
'date' => '2001-04-11T00:53:39',
'version' => '1.07'
},
{
'date' => '2001-08-24T18:29:39',
'version' => '1.08'
},
{
'date' => '2001-12-14T23:07:08',
'version' => '1.09'
},
{
'date' => '2002-05-29T00:04:22',
'version' => '1.10'
},
{
'date' => '2002-07-04T17:37:20',
'version' => '1.11'
},
{
'date' => '2002-12-31T00:09:32',
'version' => '1.12'
},
{
'date' => '2003-10-06T17:27:43',
'version' => '1.13'
},
{
'date' => '2003-10-06T21:50:56',
'version' => '1.14'
},
{
'date' => '2003-10-06T22:10:09',
'version' => '1.15'
},
{
'date' => '2004-01-07T12:47:37',
'version' => '1.16'
},
{
'date' => '2006-01-28T12:41:59',
'version' => '1.17'
},
{
'date' => '2006-03-03T15:31:07',
'version' => '1.18'
},
{
'date' => '2006-03-05T09:19:05',
'version' => '1.18'
},
{
'date' => '2006-03-13T20:52:28',
'version' => '1.18'
},
{
'date' => '2006-05-01T14:33:54',
'version' => '1.18'
},
{
'date' => '2006-07-16T12:43:58',
'version' => '1.18'
},
{
'date' => '2006-09-30T12:35:03',
'version' => '1.23'
},
{
'date' => '2007-02-25T12:39:30',
'version' => '1.24'
},
{
'date' => '2007-05-14T19:11:49',
'version' => '1.25'
},
{
'date' => '2007-09-09T11:23:15',
'version' => '1.26'
},
{
'date' => '2007-12-15T13:50:50',
'version' => '1.27'
},
{
'date' => '2008-03-30T19:16:37',
'version' => '1.28'
},
{
'date' => '2009-07-08T20:39:39',
'version' => '1.28_50'
},
{
'date' => '2009-07-09T22:26:22',
'version' => '1.28_51'
},
{
'date' => '2009-07-17T18:24:54',
'version' => '1.28_52'
},
{
'date' => '2009-07-31T21:09:25',
'version' => '1.29'
},
{
'date' => '2009-08-14T20:25:31',
'version' => '1.29_50'
},
{
'date' => '2009-09-14T19:04:17',
'version' => '1.29_51'
},
{
'date' => '2009-09-16T19:23:40',
'version' => '1.29_51'
},
{
'date' => '2009-10-23T20:45:13',
'version' => '1.29_51'
},
{
'date' => '2009-10-31T09:21:38',
'version' => '1.29_51'
},
{
'date' => '2009-11-14T16:30:54',
'version' => '1.30_50'
},
{
'date' => '2009-11-22T22:10:25',
'version' => '1.30_51'
},
{
'date' => '2010-02-09T20:08:40',
'version' => '1.30_52'
},
{
'date' => '2010-02-09T20:43:56',
'version' => '1.30_53'
},
{
'date' => '2010-09-25T15:42:44',
'version' => '1.31'
},
{
'date' => '2011-12-28T21:32:21',
'version' => '1.31_50'
},
{
'date' => '2011-12-28T21:53:50',
'version' => '1.31_51'
},
{
'date' => '2012-02-21T21:03:11',
'version' => '1.32'
},
{
'date' => '2012-10-23T19:59:15',
'version' => '1.32_50'
},
{
'date' => '2012-10-24T20:24:17',
'version' => '1.32_51'
},
{
'date' => '2012-10-25T21:49:45',
'version' => '1.32_52'
},
{
'date' => '2012-11-03T19:12:43',
'version' => '1.33'
},
{
'date' => '2013-01-27T13:49:04',
'version' => '1.33_50'
},
{
'date' => '2013-01-28T11:15:59',
'version' => '1.33_51'
},
{
'date' => '2013-01-29T16:18:27',
'version' => '1.34'
},
{
'date' => '2013-04-03T20:29:08',
'version' => '1.34_50'
},
{
'date' => '2013-04-10T19:22:43',
'version' => '1.35'
},
{
'date' => '2013-05-06T10:32:44',
'version' => '1.35_50'
},
{
'date' => '2013-06-28T08:29:45',
'version' => '1.35_51'
},
{
'date' => '2013-07-05T08:23:26',
'version' => '1.36'
},
{
'date' => '2014-12-19T23:10:31',
'version' => '1.36_51'
},
{
'date' => '2014-12-29T22:23:42',
'version' => '1.36_52'
},
{
'date' => '2014-12-31T08:44:32',
'version' => '1.37'
},
{
'date' => '2015-04-20T05:00:55',
'version' => '1.38'
},
{
'date' => '2016-10-01T15:35:13',
'version' => '1.38_50'
},
{
'date' => '2016-10-01T17:43:27',
'version' => '1.38_51'
},
{
'date' => '2016-10-08T09:00:58',
'version' => '1.39'
},
{
'date' => '2017-03-19T20:16:19',
'version' => '1.39_50'
},
{
'date' => '2017-03-21T19:05:30',
'version' => '1.40'
},
{
'date' => '2017-06-30T17:22:28',
'version' => '1.40_50'
},
{
'date' => '2017-07-12T16:34:02',
'version' => '1.41'
},
{
'date' => '2019-10-16T19:12:33',
'version' => '1.41_50'
},
{
'date' => '2019-10-19T06:46:49',
'version' => '1.42'
},
{
'date' => '2022-07-17T15:58:54',
'version' => '1.42_50'
},
{
'date' => '2022-10-03T17:54:30',
'version' => '1.43'
},
{
'date' => '2023-07-25T18:26:43',
'version' => '1.43_50'
},
{
'date' => '2023-08-03T17:14:43',
'version' => '1.44'
},
{
'date' => '2024-11-20T08:40:18',
'version' => '1.44_50'
},
{
'date' => '2024-11-23T10:43:42',
'version' => '1.44_51'
},
{
'date' => '2024-11-24T09:58:13',
'version' => '1.45'
}
]
},
'Imager' => {
'advisories' => [
{
'affected_versions' => [
'<1.006'
],
'cves' => [
'CVE-2016-1238'
],
'description' => 'Imager would search the default current directory entry in @INC when searching for file format support modules.
',
'distribution' => 'Imager',
'fixed_versions' => [
'>=1.006'
],
'id' => 'CPANSA-Imager-2016-1238',
'references' => [
'https://metacpan.org/dist/Imager/changes',
'http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html',
'http://www.securitytracker.com/id/1036440',
'http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab',
'https://rt.perl.org/Public/Bug/Display.html?id=127834',
'http://www.securityfocus.com/bid/92136',
'http://www.debian.org/security/2016/dsa-3628',
'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/',
'https://security.gentoo.org/glsa/201701-75',
'https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E',
'https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html',
'https://security.gentoo.org/glsa/201812-07',
'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html'
],
'reported' => '2016-08-02',
'reviewed_by' => [
{
'date' => '2022-06-23',
'email' => 'rrwo@cpan.org',
'name' => 'Robert Rothenberg'
}
],
'severity' => 'high'
},
{
'affected_versions' => [
'>=0.42,<=0.63'
],
'cves' => [
'CVE-2008-1928'
],
'description' => 'Buffer overflow in Imager 0.42 through 0.63 allows attackers to cause a denial of service (crash) via an image based fill in which the number of input channels is different from the number of output channels.
',
'distribution' => 'Imager',
'fixed_versions' => [
'>=0.64'
],
'id' => 'CPANSA-Imager-2008-1928',
'references' => [
'https://metacpan.org/dist/Imager/changes',
'http://rt.cpan.org/Public/Bug/Display.html?id=35324',
'http://imager.perl.org/i/release064/Imager_0_64',
'https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00569.html',
'http://www.securityfocus.com/bid/28980',
'http://secunia.com/advisories/30030',
'http://secunia.com/advisories/30011',
'http://www.vupen.com/english/advisories/2008/1387/references',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/41986'
],
'reported' => '2008-04-24',
'reviewed_by' => [
{
'date' => '2022-06-23',
'email' => 'rrwo@cpan.org',
'name' => 'Robert Rothenberg'
}
],
'severity' => undef
},
{
'affected_versions' => [
'>=0.21,<=0.56'
],
'cves' => [
'CVE-2007-2459'
],
'description' => 'Heap-based buffer overflow in the BMP reader (bmp.c) in Imager perl module (libimager-perl) 0.45 through 0.56 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted 8-bit/pixel compressed BMP files.
',
'distribution' => 'Imager',
'fixed_versions' => [
'>=0.57'
],
'id' => 'CPANSA-Imager-2007-2459',
'references' => [
'http://imager.perl.org/a/65.html',
'http://rt.cpan.org/Public/Bug/Display.html?id=26811',
'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=421582',
'http://www.debian.org/security/2008/dsa-1498',
'http://www.securityfocus.com/bid/23711',
'http://secunia.com/advisories/25038',
'http://secunia.com/advisories/28868',
'http://osvdb.org/39846',
'http://www.vupen.com/english/advisories/2007/1587',
'http://osvdb.org/35470',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/34010'
],
'reported' => '2007-05-02',
'reviewed_by' => [
{
'date' => '2022-06-23',
'email' => 'rrwo@cpan.org',
'name' => 'Robert Rothenberg'
}
],
'severity' => undef
},
{
'affected_versions' => [
'<0.98'
],
'cves' => [],
'description' => 'When drawing on an image with an alpha channel where the source minimum is greater than zero, Imager would read from beyond the end of a malloc() allocated buffer. In rare circumstances this could lead to some of the source image not being written to the target image, or possibly to a segmentation fault.
',
'distribution' => 'Imager',
'fixed_versions' => [
'>=0.98'
],
'id' => 'CPANSA-Imager-2014-01',
'references' => [
'https://metacpan.org/dist/Imager/changes'
],
'reported' => '2014-01-03',
'severity' => undef
},
{
'affected_versions' => [
'<=1.024'
],
'cves' => [
'CVE-2024-53901'
],
'description' => '"invalid next size" backtrace on use of trim on certain images
',
'distribution' => 'Imager',
'fixed_versions' => [
'>1.024'
],
'id' => 'CPANSA-Imager-2024-001',
'references' => [
'https://metacpan.org/dist/Imager/changes',
'https://github.com/tonycoz/imager/issues/534'
],
'reported' => '2024-11-17',
'severity' => 'moderate'
},
{
'affected_versions' => [
'<0.50'
],
'cves' => [
'CVE-2006-0053'
],
'description' => 'Imager (libimager-perl) before 0.50 allows user-assisted attackers to cause a denial of service (segmentation fault) by writing a 2- or 4-channel JPEG image (or a 2-channel TGA image) to a scalar, which triggers a NULL pointer dereference.
',
'distribution' => 'Imager',
'fixed_versions' => [
'>=0.50'
],
'id' => 'CPANSA-Imager-2006-0053',
'references' => [
'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=359661',
'http://rt.cpan.org/Public/Bug/Display.html?id=18397',
'http://secunia.com/advisories/19575',
'http://secunia.com/advisories/19577',
'http://www.debian.org/security/2006/dsa-1028',
'http://www.securityfocus.com/bid/17415',
'http://www.vupen.com/english/advisories/2006/1294',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/25717',
'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=359661',
'http://rt.cpan.org/Public/Bug/Display.html?id=18397',
'http://secunia.com/advisories/19575',
'http://secunia.com/advisories/19577',
'http://www.debian.org/security/2006/dsa-1028',
'http://www.securityfocus.com/bid/17415',
'http://www.vupen.com/english/advisories/2006/1294',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/25717'
],
'reported' => '2006-04-10',
'severity' => undef
}
],
'main_module' => 'Imager',
'versions' => [
{
'date' => '1999-07-19T14:26:37',
'version' => '0.21'
},
{
'date' => '2000-01-03T20:14:03',
'version' => '0.27'
},
{
'date' => '2000-01-04T11:16:56',
'version' => '0.28'
},
{
'date' => '2000-01-05T10:48:05',
'version' => '0.29'
},
{
'date' => '2000-01-16T12:52:22',
'version' => '0.31'
},
{
'date' => '2000-03-04T13:28:32',
'version' => '0.32'
},
{
'date' => '2001-01-29T00:50:14',
'version' => '0.35'
},
{
'date' => '2001-01-29T15:06:27',
'version' => '0.36'
},
{
'date' => '2001-01-31T05:02:15',
'version' => '0.37'
},
{
'date' => '2001-05-21T16:21:08',
'version' => '0.38'
},
{
'date' => '2001-11-02T21:39:20',
'version' => '0.39'
},
{
'date' => '2002-04-11T15:09:57',
'version' => '0.40'
},
{
'date' => '2002-04-12T12:07:29',
'version' => '0.41'
},
{
'date' => '2004-01-04T12:47:37',
'version' => '0.42'
},
{
'date' => '2004-02-17T07:53:52',
'version' => '0.43'
},
{
'date' => '2004-12-07T23:58:16',
'version' => '0.43_03'
},
{
'date' => '2004-12-15T13:02:40',
'version' => '0.44'
},
{
'date' => '2005-05-24T07:08:15',
'version' => '0.44_01'
},
{
'date' => '2005-05-30T04:41:43',
'version' => '0.45'
},
{
'date' => '2005-12-12T04:07:30',
'version' => '0.45_02'
},
{
'date' => '2005-12-20T00:13:31',
'version' => '0.46'
},
{
'date' => '2005-12-30T06:05:50',
'version' => '0.47'
},
{
'date' => '2006-02-21T06:09:30',
'version' => '0.47_01'
},
{
'date' => '2006-03-03T05:06:46',
'version' => '0.48'
},
{
'date' => '2006-03-07T01:04:03',
'version' => '0.49'
},
{
'date' => '2006-03-28T04:31:56',
'version' => '0.49_01'
},
{
'date' => '2006-03-29T00:31:03',
'version' => '0.50'
},
{
'date' => '2006-04-23T14:29:42',
'version' => '0.51'
},
{
'date' => '2006-06-28T13:38:48',
'version' => '0.51_01'
},
{
'date' => '2006-07-04T14:03:23',
'version' => '0.51_02'
},
{
'date' => '2006-07-19T00:58:22',
'version' => '0.51_03'
},
{
'date' => '2006-07-25T05:09:08',
'version' => '0.52'
},
{
'date' => '2006-07-27T01:01:57',
'version' => '0.53'
},
{
'date' => '2006-09-14T07:58:27',
'version' => '0.54'
},
{
'date' => '2006-12-16T22:31:19',
'version' => '0.55'
},
{
'date' => '2007-04-01T12:30:34',
'version' => '0.56'
},
{
'date' => '2007-04-30T08:49:39',
'version' => '0.57'
},
{
'date' => '2007-05-11T11:00:18',
'version' => '0.57_01'
},
{
'date' => '2007-05-16T12:49:23',
'version' => '0.58'
},
{
'date' => '2007-06-14T07:33:05',
'version' => '0.59'
},
{
'date' => '2007-08-30T07:51:36',
'version' => '0.60'
},
{
'date' => '2007-11-05T07:53:45',
'version' => '0.61'
},
{
'date' => '2007-11-28T10:06:27',
'version' => '0.61_02'
},
{
'date' => '2007-12-10T08:31:12',
'version' => '0.62'
},
{
'date' => '2008-04-07T08:49:14',
'version' => '0.63'
},
{
'date' => '2008-04-23T04:10:18',
'version' => '0.64'
},
{
'date' => '2008-05-20T06:34:48',
'version' => '0.65'
},
{
'date' => '2008-12-12T11:57:40',
'version' => '0.67'
},
{
'date' => '2009-09-02T07:05:11',
'version' => '0.67_01'
},
{
'date' => '2009-09-07T05:14:24',
'version' => '0.68'
},
{
'date' => '2009-09-08T09:23:38',
'version' => '0.69'
},
{
'date' => '2009-09-21T03:36:15',
'version' => '0.70'
},
{
'date' => '2009-11-16T04:15:54',
'version' => '0.71'
},
{
'date' => '2009-11-30T07:17:33',
'version' => '0.71_01'
},
{
'date' => '2009-12-01T09:06:53',
'version' => '0.71_02'
},
{
'date' => '2009-12-04T14:21:49',
'version' => '0.71_03'
},
{
'date' => '2009-12-10T00:44:51',
'version' => '0.72'
},
{
'date' => '2010-03-15T07:24:59',
'version' => '0.73'
},
{
'date' => '2010-05-06T14:29:21',
'version' => '0.74'
},
{
'date' => '2010-06-20T10:47:23',
'version' => '0.75'
},
{
'date' => '2010-08-06T10:49:44',
'version' => '0.75_01'
},
{
'date' => '2010-08-07T01:48:37',
'version' => '0.75_02'
},
{
'date' => '2010-08-09T12:49:36',
'version' => '0.75_03'
},
{
'date' => '2010-08-11T09:33:24',
'version' => '0.77'
},
{
'date' => '2010-09-13T10:48:57',
'version' => '0.77_01'
},
{
'date' => '2010-09-27T04:59:03',
'version' => '0.77_02'
},
{
'date' => '2010-10-04T09:00:26',
'version' => '0.78'
},
{
'date' => '2010-12-11T01:09:12',
'version' => '0.79'
},
{
'date' => '2011-01-17T07:43:35',
'version' => '0.80'
},
{
'date' => '2011-02-14T08:22:57',
'version' => '0.81'
},
{
'date' => '2011-03-14T12:18:07',
'version' => '0.82'
},
{
'date' => '2011-05-17T11:15:02',
'version' => '0.82_01'
},
{
'date' => '2011-05-20T14:07:44',
'version' => '0.83'
},
{
'date' => '2011-06-20T12:54:05',
'version' => '0.84'
},
{
'date' => '2011-08-08T12:39:58',
'version' => '0.84_01'
},
{
'date' => '2011-08-22T09:28:25',
'version' => '0.84_02'
},
{
'date' => '2011-08-29T09:19:04',
'version' => '0.85'
},
{
'date' => '2011-10-10T07:22:51',
'version' => '0.85_01'
},
{
'date' => '2011-10-24T10:14:57',
'version' => '0.85_02'
},
{
'date' => '2011-10-31T10:37:15',
'version' => '0.86'
},
{
'date' => '2012-01-03T05:27:14',
'version' => '0.87'
},
{
'date' => '2012-02-22T05:13:09',
'version' => '0.88'
},
{
'date' => '2012-03-18T01:45:35',
'version' => '0.89'
},
{
'date' => '2012-04-30T09:09:02',
'version' => '0.90'
},
{
'date' => '2012-06-04T12:27:17',
'version' => '0.91'
},
{
'date' => '2012-08-14T09:53:38',
'version' => '0.92'
},
{
'date' => '2012-08-18T01:41:22',
'version' => '0.92_01'
},
{
'date' => '2012-10-15T10:15:07',
'version' => '0.93'
},
{
'date' => '2012-11-12T10:44:54',
'version' => '0.93_01'
},
{
'date' => '2012-11-25T00:13:16',
'version' => '0.93_02'
},
{
'date' => '2012-12-14T22:59:55',
'version' => '0.94'
},
{
'date' => '2013-03-02T08:34:07',
'version' => '0.94_01'
},
{
'date' => '2013-04-05T06:19:32',
'version' => '0.94_02'
},
{
'date' => '2013-04-19T12:13:27',
'version' => '0.95'
},
{
'date' => '2013-05-19T04:27:19',
'version' => '0.96'
},
{
'date' => '2013-07-01T13:21:32',
'version' => '0.96_01'
},
{
'date' => '2013-07-09T13:46:48',
'version' => '0.96_02'
},
{
'date' => '2013-07-15T09:52:06',
'version' => '0.97'
},
{
'date' => '2014-01-02T22:22:03',
'version' => '0.98'
},
{
'date' => '2014-06-25T11:36:29',
'version' => '0.99'
},
{
'date' => '2014-06-29T05:06:45',
'version' => '0.99_01'
},
{
'date' => '2014-07-21T09:16:17',
'version' => '0.99_02'
},
{
'date' => '2014-07-29T09:13:55',
'version' => '1.000'
},
{
'date' => '2015-01-02T03:34:59',
'version' => '1.001'
},
{
'date' => '2015-04-03T01:31:26',
'version' => '1.002'
},
{
'date' => '2015-05-12T08:11:18',
'version' => '1.003'
},
{
'date' => '2015-11-08T09:45:59',
'version' => '1.004'
},
{
'date' => '2016-03-16T08:35:26',
'version' => '1.004_001'
},
{
'date' => '2016-03-20T01:27:53',
'version' => '1.004_002'
},
{
'date' => '2016-03-23T09:34:13',
'version' => '1.004_003'
},
{
'date' => '2016-04-15T05:58:07',
'version' => '1.004_004'
},
{
'date' => '2016-04-16T00:01:33',
'version' => '1.005'
},
{
'date' => '2017-08-26T04:27:06',
'version' => '1.006'
},
{
'date' => '2018-11-24T01:47:34',
'version' => '1.007'
},
{
'date' => '2018-12-31T10:04:02',
'version' => '1.008'
},
{
'date' => '2019-01-11T09:10:13',
'version' => '1.009'
},
{
'date' => '2019-02-13T08:14:07',
'version' => '1.010'
},
{
'date' => '2019-03-07T03:20:03',
'version' => '1.011'
},
{
'date' => '2020-06-14T03:26:02',
'version' => '1.012'
},
{
'date' => '2022-04-27T05:18:23',
'version' => '1.013'
},
{
'date' => '2022-04-28T07:22:51',
'version' => '1.014'
},
{
'date' => '2022-05-07T04:35:16',
'version' => '1.015'
},
{
'date' => '2022-06-12T05:27:23',
'version' => '1.016'
},
{
'date' => '2022-06-14T09:55:03',
'version' => '1.017'
},
{
'date' => '2022-06-19T12:04:12',
'version' => '1.018'
},
{
'date' => '2022-07-09T03:41:29',
'version' => '1.019'
},
{
'date' => '2023-11-12T06:55:05',
'version' => '1.020'
},
{
'date' => '2023-12-01T06:53:47',
'version' => '1.021'
},
{
'date' => '2023-12-02T23:32:54',
'version' => '1.022'
},
{
'date' => '2024-01-19T03:18:43',
'version' => '1.023'
},
{
'date' => '2024-04-06T02:24:09',
'version' => '1.024'
},
{
'date' => '2024-04-14T12:28:26',
'version' => '1.024_001'
},
{
'date' => '2024-04-20T07:15:38',
'version' => '1.024_002'
},
{
'date' => '2024-04-22T12:51:23',
'version' => '1.024_003'
},
{
'date' => '2024-04-24T08:35:58',
'version' => '1.024_004'
},
{
'date' => '2024-04-27T01:24:42',
'version' => '1.024_005'
},
{
'date' => '2024-06-11T11:35:22',
'version' => '1.024_006'
},
{
'date' => '2024-06-12T09:58:08',
'version' => '1.024_007'
},
{
'date' => '2024-06-13T10:45:14',
'version' => '1.024_008'
},
{
'date' => '2024-11-16T05:30:21',
'version' => '1.025'
}
]
},
'Jifty' => {
'advisories' => [
{
'affected_versions' => [
'<1.10518'
],
'cves' => [],
'description' => 'The path as passed in the fragment request data structure was used verbatim in the dispatcher and other locations. This possibly allowed requests to walk around ACLs by requesting \'/some/safe/place/../../../dangerous\' as a fragment.
',
'distribution' => 'Jifty',
'fixed_versions' => [
'>=1.10518'
],
'id' => 'CPANSA-Jifty-2011-01',
'references' => [
'https://metacpan.org/dist/Jifty/changes'
],
'reported' => '2011-03-17'
},
{
'affected_versions' => [
'<0.90409'
],
'cves' => [],
'description' => 'The REST plugin would let you call any method on the model.
',
'distribution' => 'Jifty',
'fixed_versions' => [
'>=0.90409'
],
'id' => 'CPANSA-Jifty-2009-01',
'references' => [
'https://metacpan.org/dist/Jifty/changes'
],
'reported' => '2009-04-09'
},
{
'affected_versions' => [
'<0.70408'
],
'cves' => [],
'description' => 'Allowed all actions on GET.
',
'distribution' => 'Jifty',
'fixed_versions' => [
'>=0.80408'
],
'id' => 'CPANSA-Jifty-2008-01',
'references' => [
'https://metacpan.org/dist/Jifty/changes'
],
'reported' => '2009-04-08'
},
{
'affected_versions' => [
'<0.60706'
],
'cves' => [],
'description' => 'Jifty did not protect users against a class of remote data access vulnerability. If an attacker knew the structure of your local filesystem and you were using the "standalone" webserver in production, the attacker could gain read only access to local files.
',
'distribution' => 'Jifty',
'fixed_versions' => [
'>=0.60706'
],
'id' => 'CPANSA-Jifty-2006-01',
'references' => [
'https://metacpan.org/dist/Jifty/changes'
],
'reported' => '2006-07-06'
}
],
'main_module' => 'Jifty',
'versions' => [
{
'date' => '2005-12-25T08:19:39',
'version' => '0.51225'
},
{
'date' => '2005-12-28T17:23:39',
'version' => '0.51228'
},
{
'date' => '2006-02-14T04:15:03',
'version' => '0.60213'
},
{
'date' => '2006-02-22T04:57:24',
'version' => '0.60213'
},
{
'date' => '2006-03-21T23:10:58',
'version' => '0.60213'
},
{
'date' => '2006-05-05T18:56:21',
'version' => '0.60321'
},
{
'date' => '2006-05-08T14:38:03',
'version' => '0.60507'
},
{
'date' => '2006-06-15T14:01:15',
'version' => '0.60714'
},
{
'date' => '2006-06-16T12:16:03',
'version' => '0.60616'
},
{
'date' => '2006-07-07T04:32:27',
'version' => '0.60706'
},
{
'date' => '2006-07-07T05:54:06',
'version' => '0.60707'
},
{
'date' => '2006-07-23T00:27:10',
'version' => '0.60722'
},
{
'date' => '2006-09-13T00:25:58',
'version' => '0.60912'
},
{
'date' => '2006-11-24T03:39:06',
'version' => '0.61123_01'
},
{
'date' => '2007-01-17T04:52:58',
'version' => '0.70116'
},
{
'date' => '2007-01-17T20:49:04',
'version' => '0.70117'
},
{
'date' => '2007-04-17T18:45:55',
'version' => '0.70415'
},
{
'date' => '2007-04-23T01:08:41',
'version' => '0.70422'
},
{
'date' => '2007-08-24T04:20:59',
'version' => '0.70824'
},
{
'date' => '2007-11-29T22:13:17',
'version' => '0.71129'
},
{
'date' => '2008-04-08T21:15:29',
'version' => '0.80408'
},
{
'date' => '2009-04-09T23:10:34',
'version' => '0.90409'
},
{
'date' => '2009-05-20T01:14:48',
'version' => '0.90519'
},
{
'date' => '2009-06-30T17:41:18',
'version' => '0.90519'
},
{
'date' => '2009-07-01T19:08:14',
'version' => '0.90519'
},
{
'date' => '2009-11-18T00:08:35',
'version' => '0.90701'
},
{
'date' => '2010-12-09T23:08:09',
'version' => '1.01209'
},
{
'date' => '2011-02-14T22:10:50',
'version' => '1.10214'
},
{
'date' => '2011-02-28T16:22:26',
'version' => '1.10228'
},
{
'date' => '2011-05-18T18:12:42',
'version' => '1.10518'
},
{
'date' => '2015-04-30T20:48:27',
'version' => '1.50430'
}
]
},
'Jifty-DBI' => {
'advisories' => [
{
'affected_versions' => [
'<0.68'
],
'cves' => [],
'description' => 'SQL injection in column names, operators, order and group by.
',
'distribution' => 'Jifty-DBI',
'fixed_versions' => [
'>=0.68'
],
'id' => 'CPANSA-Jifty-DBI-2011-01',
'references' => [
'https://metacpan.org/dist/Jifty-DBI/changes',
'https://metacpan.org/dist/Jifty/changes'
],
'reported' => '2011-04-04'
}
],
'main_module' => 'Jifty::DBI',
'versions' => [
{
'date' => '2005-11-08T21:32:52',
'version' => '0.02'
},
{
'date' => '2005-11-26T07:21:20',
'version' => '0.05_01'
},
{
'date' => '2005-12-23T20:48:59',
'version' => '0.06'
},
{
'date' => '2005-12-24T04:29:10',
'version' => '0.06'
},
{
'date' => '2005-12-25T19:37:31',
'version' => '0.08'
},
{
'date' => '2005-12-29T13:31:40',
'version' => '0.09'
},
{
'date' => '2006-01-08T10:05:05',
'version' => '0.10'
},
{
'date' => '2006-01-15T17:22:14',
'version' => '0.11'
},
{
'date' => '2006-03-05T01:55:32',
'version' => '0.15'
},
{
'date' => '2006-03-05T02:07:03',
'version' => '0.15'
},
{
'date' => '2006-03-31T13:22:16',
'version' => '0.18'
},
{
'date' => '2006-04-02T10:05:36',
'version' => '0.19'
},
{
'date' => '2006-04-21T16:27:47',
'version' => '0.20'
},
{
'date' => '2006-05-03T18:26:47',
'version' => '0.20'
},
{
'date' => '2006-06-15T12:17:00',
'version' => '0.21'
},
{
'date' => '2006-09-12T22:56:59',
'version' => '0.25'
},
{
'date' => '2006-11-13T16:15:30',
'version' => '0.25'
},
{
'date' => '2006-11-24T03:15:46',
'version' => '0.25'
},
{
'date' => '2007-01-17T20:34:50',
'version' => '0.25'
},
{
'date' => '2007-01-26T11:55:26',
'version' => '0.31'
},
{
'date' => '2007-01-26T12:22:07',
'version' => '0.39_99'
},
{
'date' => '2007-01-26T12:56:35',
'version' => '0.32'
},
{
'date' => '2007-01-26T13:34:03',
'version' => '0.39_999'
},
{
'date' => '2007-01-28T13:30:21',
'version' => '0.32'
},
{
'date' => '2007-04-15T15:26:52',
'version' => '0.39_9999'
},
{
'date' => '2007-04-16T20:21:33',
'version' => '0.41'
},
{
'date' => '2007-08-24T04:20:36',
'version' => '0.43'
},
{
'date' => '2007-10-26T16:48:22',
'version' => '0.43'
},
{
'date' => '2007-11-07T17:27:17',
'version' => '0.46'
},
{
'date' => '2007-11-16T21:28:33',
'version' => '0.46'
},
{
'date' => '2007-11-29T21:38:34',
'version' => '0.46'
},
{
'date' => '2008-04-08T03:05:48',
'version' => '0.49'
},
{
'date' => '2009-03-25T19:32:29',
'version' => '0.53'
},
{
'date' => '2009-05-19T12:33:45',
'version' => '0.53'
},
{
'date' => '2009-07-14T07:29:33',
'version' => '0.53'
},
{
'date' => '2009-11-19T01:16:21',
'version' => '0.59'
},
{
'date' => '2010-01-04T18:04:58',
'version' => '0.60'
},
{
'date' => '2010-12-08T20:15:10',
'version' => '0.63'
},
{
'date' => '2010-12-08T20:24:47',
'version' => '0.64'
},
{
'date' => '2011-02-14T21:27:51',
'version' => '0.66'
},
{
'date' => '2011-02-28T16:00:37',
'version' => '0.67'
},
{
'date' => '2011-04-14T16:20:25',
'version' => '0.68'
},
{
'date' => '2011-05-17T19:54:33',
'version' => '0.69'
},
{
'date' => '2011-06-15T20:46:39',
'version' => '0.70'
},
{
'date' => '2011-06-17T20:39:50',
'version' => '0.71'
},
{
'date' => '2011-10-17T16:45:06',
'version' => '0.72'
},
{
'date' => '2012-01-25T21:39:16',
'version' => '0.73'
},
{
'date' => '2012-01-25T21:45:14',
'version' => '0.74'
},
{
'date' => '2013-01-29T20:18:33',
'version' => '0.75'
},
{
'date' => '2013-06-17T22:14:37',
'version' => '0.76'
},
{
'date' => '2013-12-01T18:11:35',
'version' => '0.77'
},
{
'date' => '2015-04-30T19:16:36',
'version' => '0.78'
}
]
},
'Kelp' => {
'advisories' => [
{
'affected_versions' => [
'<0.9001'
],
'cves' => [],
'description' => 'X-Real-IP, X-Forwarded-Host and X-Remote-User headers were trusted and used in Kelp::Request
',
'distribution' => 'Kelp',
'fixed_versions' => [
'>=0.9001'
],
'id' => 'CPANSA-Kelp-2014-01',
'references' => [
'https://metacpan.org/dist/Kelp/changes',
'https://github.com/sgnix/kelp/commit/9f8f5a5215bdc1685a671c1157132a65727aadff'
],
'reported' => '2014-05-30',
'reviewed_by' => [
{
'date' => '2022-06-28',
'email' => 'rrwo@cpan.org',
'name' => 'Robert Rothenberg'
}
]
}
],
'main_module' => 'Kelp',
'versions' => [
{
'date' => '2013-04-12T17:16:52',
'version' => '0.1'
},
{
'date' => '2013-04-12T17:39:48',
'version' => '0.11'
},
{
'date' => '2013-04-14T01:05:22',
'version' => '0.2'
},
{
'date' => '2013-04-16T21:52:38',
'version' => '0.21'
},
{
'date' => '2013-04-17T04:59:31',
'version' => '0.215'
},
{
'date' => '2013-04-17T13:16:42',
'version' => '0.216'
},
{
'date' => '2013-04-17T19:13:12',
'version' => '0.217'
},
{
'date' => '2013-04-20T01:47:43',
'version' => '0.218'
},
{
'date' => '2013-04-20T20:27:42',
'version' => '0.2181'
},
{
'date' => '2013-05-02T16:45:58',
'version' => '0.2182'
},
{
'date' => '2013-05-06T03:44:19',
'version' => '0.219'
},
{
'date' => '2013-05-14T20:01:26',
'version' => '0.2191'
},
{
'date' => '2013-05-25T21:37:51',
'version' => '0.3001'
},
{
'date' => '2013-06-14T05:59:18',
'version' => '0.3101'
},
{
'date' => '2013-06-16T15:38:29',
'version' => '0.3102'
},
{
'date' => '2013-07-03T02:34:18',
'version' => '0.4001'
},
{
'date' => '2013-07-05T17:36:59',
'version' => '0.4011'
},
{
'date' => '2013-07-05T22:46:46',
'version' => '0.4012'
},
{
'date' => '2013-08-15T03:19:01',
'version' => '0.4501'
},
{
'date' => '2013-11-11T18:10:07',
'version' => '0.455'
},
{
'date' => '2013-11-20T05:15:34',
'version' => '0.456'
},
{
'date' => '2014-03-02T17:34:04',
'version' => '0.457'
},
{
'date' => '2014-03-27T16:29:16',
'version' => '0.4601'
},
{
'date' => '2014-03-31T22:46:22',
'version' => '0.4602'
},
{
'date' => '2014-05-31T00:52:57',
'version' => '0.9001'
},
{
'date' => '2014-07-13T00:41:29',
'version' => '0.9012'
},
{
'date' => '2014-08-08T17:57:48',
'version' => '0.9015'
},
{
'date' => '2014-12-15T07:02:58',
'version' => '0.9021'
},
{
'date' => '2015-04-03T00:32:47',
'version' => '0.9051'
},
{
'date' => '2015-08-11T06:50:14',
'version' => '0.9071'
},
{
'date' => '2016-11-09T00:00:02',
'version' => '0.9081'
},
{
'date' => '2017-12-28T21:08:47',
'version' => '1.01'
},
{
'date' => '2018-01-08T16:43:42',
'version' => '1.02'
},
{
'date' => '2021-01-12T14:26:40',
'version' => '1.03'
},
{
'date' => '2021-01-14T15:00:50',
'version' => '1.03_1'
},
{
'date' => '2021-01-16T16:53:41',
'version' => '1.03_2'
},
{
'date' => '2021-01-18T21:15:56',
'version' => '1.04'
},
{
'date' => '2021-01-21T12:12:36',
'version' => '1.04_01'
},
{
'date' => '2021-01-21T17:15:38',
'version' => '1.05'
},
{
'date' => '2022-05-09T21:07:41',
'version' => '1.06'
},
{
'date' => '2024-06-02T18:49:17',
'version' => '1.07'
},
{
'date' => '2024-06-05T19:57:13',
'version' => '1.10_01'
},
{
'date' => '2024-06-08T19:49:17',
'version' => '2.00_01'
},
{
'date' => '2024-06-09T13:06:47',
'version' => '2.00_02'
},
{
'date' => '2024-06-09T15:41:33',
'version' => '2.00_03'
},
{
'date' => '2024-06-09T20:00:29',
'version' => '2.00_04'
},
{
'date' => '2024-06-10T07:25:19',
'version' => '2.00_05'
},
{
'date' => '2024-06-10T15:39:47',
'version' => '2.00'
},
{
'date' => '2024-06-15T11:55:22',
'version' => '2.01_01'
},
{
'date' => '2024-06-18T16:33:19',
'version' => '2.01_02'
},
{
'date' => '2024-06-19T19:26:30',
'version' => '2.01_03'
},
{
'date' => '2024-06-20T06:26:12',
'version' => '2.01_04'
},
{
'date' => '2024-06-20T20:43:31',
'version' => '2.01_05'
},
{
'date' => '2024-06-23T19:25:33',
'version' => '2.10_01'
},
{
'date' => '2024-06-24T05:14:31',
'version' => '2.10'
},
{
'date' => '2024-06-25T04:15:52',
'version' => '2.11'
},
{
'date' => '2024-06-26T06:15:21',
'version' => '2.12'
},
{
'date' => '2024-07-01T06:06:23',
'version' => '2.13'
},
{
'date' => '2024-07-02T05:28:06',
'version' => '2.14'
},
{
'date' => '2024-07-03T19:52:27',
'version' => '2.15'
},
{
'date' => '2024-07-05T19:03:36',
'version' => '2.16'
},
{
'date' => '2024-07-06T04:18:40',
'version' => '2.17'
},
{
'date' => '2024-10-08T04:22:01',
'version' => '2.18'
},
{
'date' => '2024-10-10T20:15:05',
'version' => '2.19'
}
]
},
'Kossy' => {
'advisories' => [
{
'affected_versions' => [
'<0.60'
],
'cves' => [
'CVE-2021-47157'
],
'description' => 'Flaw in defense from JSON hijacking.
',
'distribution' => 'Kossy',
'fixed_versions' => [
'>=0.60'
],
'id' => 'CPANSA-Kossy-2021-01',
'references' => [
'https://github.com/kazeburo/Kossy/pull/16',
'https://metacpan.org/dist/Kossy/changes'
],
'reported' => '2021-08-29',
'severity' => undef
}
],
'main_module' => 'Kossy',
'versions' => [
{
'date' => '2011-11-29T08:45:37',
'version' => '0.05'
},
{
'date' => '2012-01-05T01:58:20',
'version' => '0.06'
},
{
'date' => '2012-02-17T03:11:05',
'version' => '0.07'
},
{
'date' => '2012-04-24T10:06:21',
'version' => '0.08'
},
{
'date' => '2012-05-17T08:52:24',
'version' => '0.09'
},
{
'date' => '2012-06-19T02:16:23',
'version' => '0.10'
},
{
'date' => '2012-07-24T12:51:12',
'version' => '0.11'
},
{
'date' => '2012-08-24T09:24:50',
'version' => '0.12'
},
{
'date' => '2012-12-05T02:26:49',
'version' => '0.13'
},
{
'date' => '2013-03-14T13:28:06',
'version' => '0.14'
},
{
'date' => '2013-04-04T15:38:05',
'version' => '0.14'
},
{
'date' => '2013-07-16T04:32:43',
'version' => '0.16'
},
{
'date' => '2013-07-16T04:40:39',
'version' => '0.17'
},
{
'date' => '2013-08-08T07:08:09',
'version' => '0.18'
},
{
'date' => '2013-08-30T07:04:23',
'version' => '0.19'
},
{
'date' => '2013-10-09T06:49:21',
'version' => '0.20'
},
{
'date' => '2013-10-10T06:42:16',
'version' => '0.21'
},
{
'date' => '2013-10-15T02:46:09',
'version' => '0.22'
},
{
'date' => '2013-10-21T05:21:48',
'version' => '0.23'
},
{
'date' => '2013-10-31T04:44:36',
'version' => '0.24'
},
{
'date' => '2013-11-06T02:29:36',
'version' => '0.25'
},
{
'date' => '2013-11-12T02:17:30',
'version' => '0.26'
},
{
'date' => '2013-11-12T05:48:05',
'version' => '0.27'
},
{
'date' => '2013-11-28T01:33:03',
'version' => '0.28'
},
{
'date' => '2014-02-12T04:48:29',
'version' => '0.30'
},
{
'date' => '2014-02-12T04:56:17',
'version' => '0.31'
},
{
'date' => '2014-02-19T06:55:53',
'version' => '0.32'
},
{
'date' => '2014-02-19T16:20:13',
'version' => '0.33'
},
{
'date' => '2014-02-19T17:19:43',
'version' => '0.34'
},
{
'date' => '2014-05-28T15:13:06',
'version' => '0.34'
},
{
'date' => '2014-05-28T15:51:34',
'version' => '0.34'
},
{
'date' => '2014-05-28T16:50:27',
'version' => '0.37'
},
{
'date' => '2014-05-29T06:37:53',
'version' => '0.38'
},
{
'date' => '2014-10-20T05:47:47',
'version' => '0.39'
},
{
'date' => '2016-07-19T15:04:31',
'version' => '0.40'
},
{
'date' => '2021-08-26T13:50:58',
'version' => '0.50'
},
{
'date' => '2021-09-16T12:04:39',
'version' => '0.60'
},
{
'date' => '2023-11-06T14:27:18',
'version' => '0.61'
},
{
'date' => '2023-11-09T08:57:59',
'version' => '0.62'
},
{
'date' => '2023-11-13T02:24:42',
'version' => '0.63'
}
]
},
'LWP-Protocol-Net-Curl' => {
'advisories' => [
{
'affected_versions' => [
'<0.009'
],
'cves' => [],
'description' => 'Misconfiguration with libcurl v7.28.1 causes a HTTPS validation issues.
',
'distribution' => 'LWP-Protocol-Net-Curl',
'fixed_versions' => [
'>=0.009'
],
'id' => 'CPANSA-LWP-Protocol-Net-Curl-2012-01',
'references' => [
'https://metacpan.org/changes/distribution/LWP-Protocol-Net-Curl',
'https://github.com/creaktive/LWP-Protocol-Net-Curl/commit/dc8b183c6520a2b6bcde685de635675ee4a7e019'
],
'reported' => '2012-11-28'
}
],
'main_module' => 'LWP::Protocol::Net::Curl',
'versions' => [
{
'date' => '2012-10-24T18:49:20',
'version' => '0.001'
},
{
'date' => '2012-10-26T20:05:13',
'version' => '0.002'
},
{
'date' => '2012-10-29T18:55:46',
'version' => '0.003'
},
{
'date' => '2012-10-31T13:01:46',
'version' => '0.004'
},
{
'date' => '2012-11-01T15:17:14',
'version' => '0.005'
},
{
'date' => '2012-11-12T12:23:09',
'version' => '0.006'
},
{
'date' => '2012-11-13T14:33:10',
'version' => '0.007'
},
{
'date' => '2012-11-25T22:38:58',
'version' => '0.008'
},
{
'date' => '2012-11-28T19:03:10',
'version' => '0.009'
},
{
'date' => '2012-12-07T00:13:55',
'version' => '0.010'
},
{
'date' => '2012-12-18T12:05:00',
'version' => '0.011'
},
{
'date' => '2013-02-08T11:00:04',
'version' => '0.012'
},
{
'date' => '2013-02-11T01:56:30',
'version' => '0.013'
},
{
'date' => '2013-02-16T12:51:03',
'version' => '0.014'
},
{
'date' => '2013-05-13T21:41:47',
'version' => '0.015'
},
{
'date' => '2013-05-18T22:12:03',
'version' => '0.016'
},
{
'date' => '2013-07-13T12:22:34',
'version' => '0.017'
},
{
'date' => '2013-08-17T11:34:49',
'version' => '0.018'
},
{
'date' => '2013-10-11T12:33:53',
'version' => '0.019'
},
{
'date' => '2013-10-13T09:02:17',
'version' => '0.020'
},
{
'date' => '2014-01-21T17:46:37',
'version' => '0.021'
},
{
'date' => '2014-07-09T15:04:06',
'version' => '0.022'
},
{
'date' => '2014-12-23T17:06:56',
'version' => '0.023'
},
{
'date' => '2019-07-12T12:27:08',
'version' => '0.024'
},
{
'date' => '2019-07-15T11:29:17',
'version' => '0.025'
},
{
'date' => '2019-10-08T12:01:54',
'version' => '0.026'
},
{
'date' => '2025-01-21T10:57:04',
'version' => '0.027'
}
]
},
'LWP-Protocol-https' => {
'advisories' => [
{
'affected_versions' => [
'>=6.04,<=6.06'
],
'cves' => [
'CVE-2014-3230'
],
'description' => 'The libwww-perl LWP::Protocol::https module 6.04 through 6.06 for Perl, when using IO::Socket::SSL as the SSL socket class, allows attackers to disable server certificate validation via the (1) HTTPS_CA_DIR or (2) HTTPS_CA_FILE environment variable.
',
'distribution' => 'LWP-Protocol-https',
'fixed_versions' => [],
'id' => 'CPANSA-LWP-Protocol-https-2014-3230',
'references' => [
'http://www.openwall.com/lists/oss-security/2014/05/04/1',
'http://www.openwall.com/lists/oss-security/2014/05/02/8',
'http://www.openwall.com/lists/oss-security/2014/05/06/8',
'https://github.com/libwww-perl/lwp-protocol-https/pull/14',
'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746579'
],
'reported' => '2020-01-28',
'severity' => 'medium'
}
],
'main_module' => 'LWP::Protocol::https',
'versions' => [
{
'date' => '2011-03-27T11:59:53',
'version' => '6.02'
},
{
'date' => '2012-02-18T23:01:32',
'version' => '6.03'
},
{
'date' => '2013-04-29T21:26:33',
'version' => '6.04'
},
{
'date' => '2014-04-18T17:03:15',
'version' => '6.06'
},
{
'date' => '2017-02-20T02:46:43',
'version' => '6.07'
},
{
'date' => '2020-03-23T20:20:33',
'version' => '6.08'
},
{
'date' => '2020-07-16T13:33:20',
'version' => '6.09'
},
{
'date' => '2020-12-17T15:44:24',
'version' => '6.10'
},
{
'date' => '2023-07-09T15:11:15',
'version' => '6.11'
},
{
'date' => '2024-01-22T17:51:48',
'version' => '6.12'
},
{
'date' => '2024-02-06T01:01:15',
'version' => '6.13'
},
{
'date' => '2024-03-11T01:09:49',
'version' => '6.14'
}
]
},
'Lemonldap-NG-Portal' => {
'advisories' => [
{
'affected_versions' => [
'<0.87'
],
'cves' => [],
'description' => 'When running on Apache with thread support setMacros and setGroups were not launched with the good datas.
',
'distribution' => 'Lemonldap-NG-Portal',
'fixed_versions' => [
'>=0.87'
],
'id' => 'CPANSA-Lemonldap-NG-Portal-2009-01',
'references' => [
'https://metacpan.org/changes/distribution/Lemonldap-NG-Portal'
],
'reported' => '2009-02-08'
}
],
'main_module' => 'Lemonldap::NG::Portal',
'versions' => [
{
'date' => '2005-06-29T18:44:50',
'version' => '0.01'
},
{
'date' => '2005-07-02T08:49:37',
'version' => '0.02'
},
{
'date' => '2006-10-07T13:24:36',
'version' => '0.1'
},
{
'date' => '2006-10-14T13:26:07',
'version' => '0.11'
},
{
'date' => '2006-10-14T14:11:06',
'version' => '0.111'
},
{
'date' => '2006-10-17T13:58:53',
'version' => '0.2'
},
{
'date' => '2006-11-02T15:23:31',
'version' => '0.4'
},
{
'date' => '2006-11-03T07:25:06',
'version' => '0.41'
},
{
'date' => '2006-12-07T21:02:36',
'version' => '0.42'
},
{
'date' => '2006-12-19T18:26:07',
'version' => '0.5'
},
{
'date' => '2006-12-31T13:03:32',
'version' => '0.51'
},
{
'date' => '2007-01-13T19:47:36',
'version' => '0.6'
},
{
'date' => '2007-02-28T22:29:18',
'version' => '0.62'
},
{
'date' => '2007-03-04T18:23:52',
'version' => '0.63'
},
{
'date' => '2007-03-09T20:18:23',
'version' => '0.64'
},
{
'date' => '2007-03-29T19:52:31',
'version' => '0.7'
},
{
'date' => '2007-04-01T20:26:10',
'version' => '0.71'
},
{
'date' => '2007-04-14T20:46:13',
'version' => '0.72'
},
{
'date' => '2007-04-20T06:51:13',
'version' => '0.73'
},
{
'date' => '2007-06-13T13:54:26',
'version' => '0.74'
},
{
'date' => '2007-07-22T20:35:13',
'version' => '0.76'
},
{
'date' => '2007-07-31T05:11:34',
'version' => '0.77'
},
{
'date' => '2007-10-15T06:03:56',
'version' => '0.8'
},
{
'date' => '2008-02-28T07:13:04',
'version' => '0.81'
},
{
'date' => '2008-04-11T14:53:38',
'version' => '0.82'
},
{
'date' => '2008-06-06T05:50:06',
'version' => '0.83'
},
{
'date' => '2008-06-06T12:46:10',
'version' => '0.84'
},
{
'date' => '2008-08-25T19:53:48',
'version' => '0.85'
},
{
'date' => '2008-12-25T08:26:49',
'version' => '0.86'
},
{
'date' => '2009-02-08T07:13:05',
'version' => '0.87'
},
{
'date' => '2009-06-29T10:14:46',
'version' => '0.88'
},
{
'date' => '2009-07-05T11:40:59',
'version' => '0.89'
},
{
'date' => '2009-10-11T08:26:21',
'version' => '0.90'
},
{
'date' => '2010-10-13T21:02:21',
'version' => '0.99'
},
{
'date' => '2010-10-22T05:36:29',
'version' => '0.99.1'
},
{
'date' => '2010-10-22T05:45:04',
'version' => '0.991'
},
{
'date' => '2010-10-24T06:33:29',
'version' => '0.992'
},
{
'date' => '2010-11-26T13:38:59',
'version' => '1.0.0'
},
{
'date' => '2011-02-28T13:42:23',
'version' => '1.0.2'
},
{
'date' => '2011-03-07T11:17:03',
'version' => 'v1.0.3'
},
{
'date' => '2011-03-23T14:54:26',
'version' => '1.0.4'
},
{
'date' => '2011-04-15T14:51:44',
'version' => '1.0.5'
},
{
'date' => '2011-05-30T08:40:46',
'version' => '1.0.6'
},
{
'date' => '2011-07-08T09:33:35',
'version' => '1.1.0'
},
{
'date' => '2011-07-29T13:43:35',
'version' => '1.1.1'
},
{
'date' => '2011-10-07T12:58:06',
'version' => '1.1.2'
},
{
'date' => '2012-06-18T10:13:31',
'version' => '1.2.0'
},
{
'date' => '2012-07-06T09:18:54',
'version' => '1.2.1'
},
{
'date' => '2012-09-17T14:04:26',
'version' => '1.2.2'
},
{
'date' => '2013-01-25T21:51:54',
'version' => '1.2.2_01'
},
{
'date' => '2013-02-08T17:11:38',
'version' => '1.2.3'
},
{
'date' => '2013-04-23T13:19:57',
'version' => '1.2.4'
},
{
'date' => '2013-08-26T10:39:11',
'version' => '1.2.5'
},
{
'date' => '2013-11-02T16:31:10',
'version' => 'v1.3.0'
},
{
'date' => '2013-11-10T18:00:31',
'version' => 'v1.3.0_01'
},
{
'date' => '2013-11-11T14:01:21',
'version' => 'v1.3.1'
},
{
'date' => '2014-02-05T09:31:50',
'version' => '1.3.2'
},
{
'date' => '2014-03-07T13:55:23',
'version' => '1.3.3'
},
{
'date' => '2014-06-30T12:54:16',
'version' => 'v1.4.0'
},
{
'date' => '2014-07-25T09:55:37',
'version' => 'v1.4.1'
},
{
'date' => '2014-11-05T15:15:30',
'version' => 'v1.4.2'
},
{
'date' => '2014-12-19T10:31:47',
'version' => 'v1.4.3'
},
{
'date' => '2015-04-15T10:05:31',
'version' => 'v1.4.4'
},
{
'date' => '2015-05-22T16:54:10',
'version' => 'v1.4.5'
},
{
'date' => '2015-10-09T09:21:04',
'version' => 'v1.4.6'
},
{
'date' => '2016-03-02T09:50:24',
'version' => 'v1.9.0'
},
{
'date' => '2016-03-22T14:25:24',
'version' => 'v1.4.7'
},
{
'date' => '2016-04-05T16:02:49',
'version' => 'v1.9.1'
},
{
'date' => '2016-04-27T15:23:10',
'version' => 'v1.4.8'
},
{
'date' => '2016-05-01T19:25:36',
'version' => 'v1.9.2'
},
{
'date' => '2016-06-03T14:14:52',
'version' => 'v1.4.9'
},
{
'date' => '2016-06-07T15:48:38',
'version' => 'v1.9.3'
},
{
'date' => '2016-06-14T18:36:34',
'version' => 'v1.9.4'
},
{
'date' => '2016-07-13T09:08:18',
'version' => 'v1.4.10'
},
{
'date' => '2016-07-13T12:58:54',
'version' => 'v1.9.5'
},
{
'date' => '2016-10-10T13:34:33',
'version' => 'v1.4.11'
},
{
'date' => '2016-10-16T12:23:25',
'version' => 'v1.9.6'
},
{
'date' => '2016-12-14T19:57:55',
'version' => 'v1.9.7'
},
{
'date' => '2017-02-28T21:11:18',
'version' => 'v1.9.99_2.0alpha1'
},
{
'date' => '2017-03-02T14:55:34',
'version' => 'v1.9.8'
},
{
'date' => '2017-03-07T05:48:09',
'version' => 'v1.9.99_02'
},
{
'date' => '2017-03-07T06:00:28',
'version' => 'v1.9.99_03'
},
{
'date' => '2017-03-15T05:34:48',
'version' => 'v1.9.991_01'
},
{
'date' => '2017-03-17T07:21:31',
'version' => 'v1.9.9'
},
{
'date' => '2017-05-19T18:48:42',
'version' => 'v1.9.10'
},
{
'date' => '2017-09-01T10:32:34',
'version' => 'v1.9.11'
},
{
'date' => '2017-09-12T08:40:27',
'version' => 'v1.9.12'
},
{
'date' => '2017-09-29T14:00:36',
'version' => 'v1.9.13'
},
{
'date' => '2017-11-24T19:59:18',
'version' => 'v1.9.14'
},
{
'date' => '2018-01-23T12:50:53',
'version' => 'v1.9.15'
},
{
'date' => '2018-03-16T10:34:13',
'version' => 'v1.9.16'
},
{
'date' => '2018-06-16T09:27:27',
'version' => 'v1.9.17'
},
{
'date' => '2018-10-05T09:40:26',
'version' => 'v1.9.18'
},
{
'date' => '2018-11-30T10:49:52',
'version' => 'v2.0.0'
},
{
'date' => '2019-02-12T17:13:39',
'version' => 'v2.0.2'
},
{
'date' => '2019-04-11T12:23:10',
'version' => 'v2.0.3'
},
{
'date' => '2019-05-13T13:07:36',
'version' => 'v2.0.4'
},
{
'date' => '2019-06-29T21:31:33',
'version' => 'v2.0.5'
},
{
'date' => '2019-09-24T13:01:00',
'version' => 'v2.0.6'
},
{
'date' => '2019-12-21T21:46:38',
'version' => 'v2.0.7'
},
{
'date' => '2020-05-05T16:14:25',
'version' => 'v2.0.8'
},
{
'date' => '2020-09-07T06:21:08',
'version' => 'v2.0.9'
},
{
'date' => '2021-01-17T17:24:36',
'version' => 'v2.0.10'
},
{
'date' => '2021-01-31T14:52:09',
'version' => 'v2.0.11'
},
{
'date' => '2021-07-22T17:38:26',
'version' => 'v2.0.12'
},
{
'date' => '2021-08-23T07:09:56',
'version' => 'v2.0.13'
},
{
'date' => '2022-02-22T18:13:11',
'version' => 'v2.0.14'
},
{
'date' => '2022-09-09T17:10:35',
'version' => 'v2.0.15'
},
{
'date' => '2022-09-16T08:36:23',
'version' => 'v2.0.15.1'
},
{
'date' => '2023-02-01T15:29:55',
'version' => 'v2.0.16'
},
{
'date' => '2023-05-12T17:38:52',
'version' => 'v2.16.2'
},
{
'date' => '2023-08-30T16:24:40',
'version' => 'v2.17.0'
},
{
'date' => '2023-12-20T21:12:20',
'version' => 'v2.18.0'
},
{
'date' => '2023-12-22T23:41:14',
'version' => 'v2.18.1'
},
{
'date' => '2024-02-06T17:49:13',
'version' => 'v2.18.2'
},
{
'date' => '2024-04-30T15:23:21',
'version' => 'v2.19.0'
},
{
'date' => '2024-07-15T14:48:13',
'version' => 'v2.19.1'
},
{
'date' => '2024-09-04T07:30:33',
'version' => 'v2.19.2'
},
{
'date' => '2024-10-08T15:53:50',
'version' => 'v2.20.0'
},
{
'date' => '2024-11-08T16:34:12',
'version' => 'v2.20.1'
},
{
'date' => '2025-01-21T17:01:40',
'version' => 'v2.20.2'
},
{
'date' => '2025-01-22T17:40:34',
'version' => 'v2.16.4'
}
]
},
'Locale-Maketext' => {
'advisories' => [
{
'affected_versions' => [
'<1.25'
],
'cves' => [
'CVE-2012-6329'
],
'description' => 'The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application before 5.1.3, and the Foswiki application 1.0.x through 1.0.10 and 1.1.x through 1.1.6.
',
'distribution' => 'Locale-Maketext',
'fixed_versions' => [],
'id' => 'CPANSA-Locale-Maketext-2012-6329',
'references' => [
'http://perl5.git.perl.org/perl.git/commit/1735f6f53ca19f99c6e9e39496c486af323ba6a8',
'http://sourceforge.net/mailarchive/message.php?msg_id=30219695',
'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695224',
'http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2012-6329',
'http://perl5.git.perl.org/perl.git/blob/HEAD:/pod/perl5177delta.pod',
'http://openwall.com/lists/oss-security/2012/12/11/4',
'http://code.activestate.com/lists/perl5-porters/187763/',
'http://code.activestate.com/lists/perl5-porters/187746/',
'https://bugzilla.redhat.com/show_bug.cgi?id=884354',
'http://rhn.redhat.com/errata/RHSA-2013-0685.html',
'http://www.mandriva.com/security/advisories?name=MDVSA-2013:113',
'https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0032',
'http://www.ubuntu.com/usn/USN-2099-1',
'http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html',
'http://www.securityfocus.com/bid/56950',
'http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735',
'http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705'
],
'reported' => '2013-01-04',
'severity' => undef
},
{
'affected_versions' => [
'<1.28'
],
'cves' => [
'CVE-2016-1238'
],
'description' => 'Does not remove . from @INC, which might allow local users to gain privileges via a Trojan horse module under the current working directory.
',
'distribution' => 'Locale-Maketext',
'fixed_versions' => [
'>=1.28'
],
'id' => 'CPANSA-Locale-Maketext-2016-1238',
'references' => [
'http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html',
'http://www.securitytracker.com/id/1036440',
'http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab',
'https://rt.perl.org/Public/Bug/Display.html?id=127834',
'http://www.securityfocus.com/bid/92136',
'http://www.debian.org/security/2016/dsa-3628',
'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/',
'https://security.gentoo.org/glsa/201701-75',
'https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E',
'https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html',
'https://security.gentoo.org/glsa/201812-07',
'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html'
],
'reported' => '2016-08-02',
'severity' => 'high'
}
],
'main_module' => 'Locale::Maketext',
'versions' => [
{
'date' => '1999-03-16T05:22:44',
'version' => '0.17'
},
{
'date' => '2000-05-14T08:26:33',
'version' => '0.18'
},
{
'date' => '2001-05-25T14:21:01',
'version' => '1.01'
},
{
'date' => '2001-06-20T08:28:48',
'version' => '1.02'
},
{
'date' => '2001-06-22T05:27:18',
'version' => '1.03'
},
{
'date' => '2003-04-02T20:20:43',
'version' => '1.04'
},
{
'date' => '2003-04-19T06:11:36',
'version' => '1.05'
},
{
'date' => '2003-06-22T07:51:14',
'version' => '1.06'
},
{
'date' => '2004-01-12T04:18:16',
'version' => '1.07'
},
{
'date' => '2004-01-20T00:14:54',
'version' => '1.08'
},
{
'date' => '2004-03-31T06:47:07',
'version' => '1.09'
},
{
'date' => '2005-11-11T03:42:57',
'version' => '1.10'
},
{
'date' => '2007-05-08T05:03:08',
'version' => '1.11_01'
},
{
'date' => '2007-11-18T05:22:03',
'version' => '1.12'
},
{
'date' => '2008-05-28T15:01:40',
'version' => '1.13'
},
{
'date' => '2009-06-23T18:13:14',
'version' => '1.13_80'
},
{
'date' => '2009-06-24T00:22:21',
'version' => '1.13_81'
},
{
'date' => '2009-06-24T02:33:08',
'version' => '1.13_82'
},
{
'date' => '2010-09-28T22:59:25',
'version' => '1.15_01'
},
{
'date' => '2010-10-07T14:12:19',
'version' => '1.15_02'
},
{
'date' => '2010-10-11T18:07:07',
'version' => '1.16'
},
{
'date' => '2010-10-20T15:54:47',
'version' => '1.16_01'
},
{
'date' => '2010-10-20T18:42:13',
'version' => '1.17'
},
{
'date' => '2011-05-25T15:44:55',
'version' => '1.18_01'
},
{
'date' => '2011-05-31T19:29:50',
'version' => '1.19'
},
{
'date' => '2011-12-15T04:02:22',
'version' => '1.19_01'
},
{
'date' => '2011-12-23T15:18:14',
'version' => '1.21'
},
{
'date' => '2012-01-15T05:02:24',
'version' => '1.22'
},
{
'date' => '2012-12-04T21:29:08',
'version' => '1.23'
},
{
'date' => '2014-04-14T03:15:07',
'version' => '1.25_01'
},
{
'date' => '2014-04-15T20:10:23',
'version' => '1.25'
},
{
'date' => '2014-12-04T20:57:02',
'version' => '1.26'
},
{
'date' => '2016-06-22T23:30:00',
'version' => '1.27'
},
{
'date' => '2016-07-25T17:57:25',
'version' => '1.28'
},
{
'date' => '2020-01-20T05:04:23',
'version' => '1.29'
},
{
'date' => '2022-04-01T19:18:30',
'version' => '1.30'
},
{
'date' => '2022-04-14T21:18:43',
'version' => '1.31'
},
{
'date' => '2022-08-22T19:20:51',
'version' => '1.32'
},
{
'date' => '2023-12-30T21:23:51',
'version' => '1.33'
}
]
},
'Log-Any' => {
'advisories' => [
{
'affected_versions' => [
'>=1.712,<=1.715'
],
'cves' => [],
'description' => 'The WithStackTrace proxy may expose sensitive information
',
'distribution' => 'Log-Any',
'fixed_versions' => [
'1.716'
],
'id' => 'CPANSA-Log-Any-2023-001',
'references' => [
'https://metacpan.org/dist/Log-Any/changes',
'https://github.com/preaction/Log-Any/pull/97'
],
'reported' => undef,
'severity' => undef
}
],
'main_module' => 'Log::Any',
'versions' => [
{
'date' => '2009-07-11T14:11:33',
'version' => '0.01'
},
{
'date' => '2009-07-14T23:34:51',
'version' => '0.02'
},
{
'date' => '2009-07-18T03:41:02',
'version' => '0.03'
},
{
'date' => '2009-09-04T00:32:59',
'version' => '0.03'
},
{
'date' => '2009-10-27T22:26:20',
'version' => '0.05'
},
{
'date' => '2009-10-31T23:24:23',
'version' => '0.06'
},
{
'date' => '2009-12-07T17:57:19',
'version' => '0.07'
},
{
'date' => '2009-12-16T01:31:06',
'version' => '0.08'
},
{
'date' => '2010-01-05T21:20:31',
'version' => '0.09'
},
{
'date' => '2010-01-05T21:27:46',
'version' => '0.10'
},
{
'date' => '2010-02-12T13:08:17',
'version' => '0.11'
},
{
'date' => '2011-03-23T21:55:43',
'version' => '0.12'
},
{
'date' => '2011-08-02T13:27:07',
'version' => '0.13'
},
{
'date' => '2011-08-31T22:51:22',
'version' => '0.14'
},
{
'date' => '2013-04-10T17:16:43',
'version' => '0.15'
},
{
'date' => '2014-12-12T22:09:51',
'version' => '0.90'
},
{
'date' => '2014-12-15T03:15:09',
'version' => '0.91'
},
{
'date' => '2014-12-15T12:13:47',
'version' => '0.92'
},
{
'date' => '2014-12-26T03:04:57',
'version' => '1.00'
},
{
'date' => '2014-12-27T03:26:31',
'version' => '1.01'
},
{
'date' => '2014-12-28T12:07:41',
'version' => '1.02'
},
{
'date' => '2015-01-02T03:43:07',
'version' => '1.03'
},
{
'date' => '2015-03-26T10:09:30',
'version' => '1.031'
},
{
'date' => '2015-03-26T21:24:48',
'version' => '1.032'
},
{
'date' => '2016-02-03T15:34:02',
'version' => '1.033'
},
{
'date' => '2016-02-04T19:48:49',
'version' => '1.035'
},
{
'date' => '2016-02-06T01:27:07',
'version' => '1.037'
},
{
'date' => '2016-02-10T21:18:02',
'version' => '1.038'
},
{
'date' => '2016-02-24T22:48:34',
'version' => '1.040'
},
{
'date' => '2016-08-18T05:02:37',
'version' => '1.041'
},
{
'date' => '2016-08-27T04:38:20',
'version' => '1.042'
},
{
'date' => '2016-11-04T02:48:06',
'version' => '1.043'
},
{
'date' => '2016-11-06T21:53:19',
'version' => '1.044'
},
{
'date' => '2016-11-12T03:54:03',
'version' => '1.045'
},
{
'date' => '2017-01-12T03:44:21',
'version' => '1.046'
},
{
'date' => '2017-03-23T01:25:09',
'version' => '1.047'
},
{
'date' => '2017-03-27T20:17:22',
'version' => '1.048'
},
{
'date' => '2017-03-28T21:03:30',
'version' => '1.049'
},
{
'date' => '2017-08-04T03:30:12',
'version' => '1.050'
},
{
'date' => '2017-08-07T01:43:24',
'version' => '1.051'
},
{
'date' => '2017-09-28T22:00:06',
'version' => '1.700'
},
{
'date' => '2017-10-02T19:38:09',
'version' => '1.701'
},
{
'date' => '2017-11-28T21:20:01',
'version' => '1.702'
},
{
'date' => '2017-11-29T16:57:31',
'version' => '1.703'
},
{
'date' => '2017-12-18T00:14:35',
'version' => '1.704'
},
{
'date' => '2018-01-17T19:50:35',
'version' => '1.705'
},
{
'date' => '2018-07-07T01:21:05',
'version' => '1.706'
},
{
'date' => '2018-08-02T03:56:11',
'version' => '1.707'
},
{
'date' => '2020-01-13T03:58:06',
'version' => '1.708'
},
{
'date' => '2021-02-17T21:17:28',
'version' => '1.709'
},
{
'date' => '2021-08-02T15:11:51',
'version' => '1.710'
},
{
'date' => '2022-11-22T17:29:07',
'version' => '1.711'
},
{
'date' => '2022-12-09T17:06:31',
'version' => '1.712'
},
{
'date' => '2022-12-12T18:45:32',
'version' => '1.713'
},
{
'date' => '2023-03-20T16:49:03',
'version' => '1.714'
},
{
'date' => '2023-05-04T18:09:55',
'version' => '1.715'
},
{
'date' => '2023-06-26T19:15:29',
'version' => '1.716'
},
{
'date' => '2023-08-17T15:53:05',
'version' => '1.717'
}
]
},
'MARC-File-XML' => {
'advisories' => [
{
'affected_versions' => [
'<1.0.2'
],
'cves' => [
'CVE-2014-1626'
],
'description' => 'XML External Entity (XXE) vulnerability in MARC::File::XML module before 1.0.2 for Perl, as used in Evergreen, Koha, perl4lib, and possibly other products, allows context-dependent attackers to read arbitrary files via a crafted XML file.
',
'distribution' => 'MARC-File-XML',
'fixed_versions' => [],
'id' => 'CPANSA-MARC-File-XML-2014-1626',
'references' => [
'http://www.securityfocus.com/bid/65057',
'http://www.nntp.perl.org/group/perl.perl4lib/2014/01/msg3073.html',
'http://secunia.com/advisories/55404',
'http://libmail.georgialibraries.org/pipermail/open-ils-general/2014-January/009442.html',
'https://metacpan.org/source/GMCHARLT/MARC-XML-1.0.2/Changes',
'http://lists.katipo.co.nz/pipermail/koha/2014-January/038430.html',
'http://osvdb.org/102367',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/90620'
],
'reported' => '2014-01-26',
'severity' => undef
}
],
'main_module' => 'MARC::File::XML',
'versions' => [
{
'date' => '2017-05-24T01:18:18',
'version' => 'v1.0.5'
}
]
},
'MDK-Common' => {
'advisories' => [
{
'affected_versions' => [
'=1.1.11',
'=1.1.24',
'>=1.2.9,<=1.2.14'
],
'cves' => [
'CVE-2009-0912'
],
'description' => 'perl-MDK-Common 1.1.11 and 1.1.24, 1.2.9 through 1.2.14, and possibly other versions, in Mandriva Linux does not properly handle strings when writing them to configuration files, which allows attackers to gain privileges via "special characters" in unspecified vectors.\'
',
'distribution' => 'MDK-Common',
'fixed_versions' => [],
'id' => 'CPANSA-MDK-Common-2009-0912',
'references' => [
'http://www.securityfocus.com/bid/34089',
'http://www.vupen.com/english/advisories/2009/0688',
'http://www.mandriva.com/security/advisories?name=MDVSA-2009:072',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/49220'
],
'reported' => '2009-03-16',
'severity' => undef
}
],
'main_module' => 'MDK::Common',
'versions' => [
{
'date' => '2012-09-14T16:23:25',
'version' => '1.2.29'
},
{
'date' => '2014-05-06T17:14:10',
'version' => 'v1.2.30'
},
{
'date' => '2017-10-27T22:31:26',
'version' => 'v1.2.32'
},
{
'date' => '2017-10-27T23:18:48',
'version' => 'v1.2.33'
},
{
'date' => '2017-10-28T01:09:39',
'version' => 'v1.2.34'
},
{
'date' => '2017-10-28T03:37:17',
'version' => 'v1.2.34.1'
},
{
'date' => '2017-10-28T04:28:13',
'version' => 'v1.2.34.2'
}
]
},
'MHonArc' => {
'advisories' => [
{
'affected_versions' => [
'<2.6.17'
],
'cves' => [
'CVE-2010-4524'
],
'description' => 'Improper escaping of certain HTML sequences (XSS).
',
'distribution' => 'MHonArc',
'fixed_versions' => [
'>=2.6.17'
],
'id' => 'CPANSA-MHonArc-2011-01',
'references' => [
'https://metacpan.org/changes/distribution/MHonArc'
],
'reported' => '2011-01-09'
},
{
'affected_versions' => [
'<2.6.17'
],
'cves' => [
'CVE-2010-1677'
],
'description' => 'DoS when processing html messages with deep tag nesting.
',
'distribution' => 'MHonArc',
'fixed_versions' => [
'>=2.6.17'
],
'id' => 'CPANSA-MHonArc-2011-02',
'references' => [
'https://metacpan.org/changes/distribution/MHonArc'
],
'reported' => '2011-01-09'
}
],
'main_module' => 'MHonArc::UTF8',
'versions' => [
{
'date' => '1997-12-11T20:44:41',
'version' => '2.1'
},
{
'date' => '1998-03-04T01:06:00',
'version' => 'v2.2.0'
},
{
'date' => '1998-10-11T02:56:10',
'version' => 'v2.3.0'
},
{
'date' => '1998-10-25T19:27:37',
'version' => 'v2.3.1'
},
{
'date' => '1998-11-01T20:02:48',
'version' => 'v2.3.2'
},
{
'date' => '1998-11-08T21:59:21',
'version' => 'v2.3.3'
},
{
'date' => '1999-06-26T07:57:53',
'version' => 'v2.4.0'
},
{
'date' => '1999-07-26T19:30:51',
'version' => 'v2.4.1'
},
{
'date' => '1999-08-12T07:16:14',
'version' => 'v2.4.2'
},
{
'date' => '1999-08-16T06:25:39',
'version' => 'v2.4.3'
},
{
'date' => '1999-10-01T19:43:07',
'version' => 'v2.4.4'
},
{
'date' => '2000-02-15T03:44:03',
'version' => 'v2.4.5'
},
{
'date' => '2000-04-24T08:35:56',
'version' => 'v2.4.6'
},
{
'date' => '2000-10-29T04:18:32',
'version' => 'v2.4.7'
},
{
'date' => '2000-10-30T06:29:47',
'version' => 'v2.4.7'
},
{
'date' => '2001-04-14T21:48:01',
'version' => 'v2.4.8'
},
{
'date' => '2001-06-11T03:09:13',
'version' => 'v2.4.9'
},
{
'date' => '2001-08-26T19:46:53',
'version' => 'v2.5.0'
},
{
'date' => '2001-09-07T15:24:19',
'version' => 'v2.5.0'
},
{
'date' => '2001-10-17T16:03:13',
'version' => 'v2.5.0'
},
{
'date' => '2001-11-14T05:09:59',
'version' => 'v2.5.1'
},
{
'date' => '2001-11-25T06:46:19',
'version' => 'v2.5.2'
},
{
'date' => '2002-04-18T07:23:29',
'version' => 'v2.5.3'
},
{
'date' => '2002-05-03T05:06:16',
'version' => 'v2.5.4'
},
{
'date' => '2002-05-28T05:43:00',
'version' => 'v2.5.5'
},
{
'date' => '2002-06-18T18:07:38',
'version' => 'v2.5.6'
},
{
'date' => '2002-06-21T22:59:36',
'version' => 'v2.5.7'
},
{
'date' => '2002-06-29T03:22:26',
'version' => 'v2.5.8'
},
{
'date' => '2002-07-20T02:39:53',
'version' => 'v2.5.9'
},
{
'date' => '2002-07-29T00:10:32',
'version' => 'v2.5.10'
},
{
'date' => '2002-08-04T04:25:22',
'version' => 'v2.5.11'
},
{
'date' => '2002-09-04T04:32:14',
'version' => 'v2.5.12'
},
{
'date' => '2002-10-21T17:13:35',
'version' => 'v2.5.13'
},
{
'date' => '2002-12-22T01:07:40',
'version' => 'v2.5.14'
},
{
'date' => '2003-02-10T05:23:02',
'version' => 'v2.6.0'
},
{
'date' => '2003-02-23T00:39:05',
'version' => 'v2.6.1'
},
{
'date' => '2003-03-12T01:55:48',
'version' => 'v2.6.2'
},
{
'date' => '2003-04-06T02:11:59',
'version' => 'v2.6.3'
},
{
'date' => '2003-06-22T21:54:52',
'version' => 'v2.6.4'
},
{
'date' => '2003-07-20T04:51:56',
'version' => 'v2.6.5'
},
{
'date' => '2003-07-21T17:20:07',
'version' => 'v2.6.6'
},
{
'date' => '2003-08-07T23:49:43',
'version' => 'v2.6.7'
},
{
'date' => '2003-08-13T04:47:02',
'version' => 'v2.6.8'
},
{
'date' => '2004-05-17T06:24:46',
'version' => 'v2.6.9'
},
{
'date' => '2004-05-17T06:25:16',
'version' => 'v2.6.10'
},
{
'date' => '2005-05-20T17:15:40',
'version' => 'v2.6.11'
},
{
'date' => '2005-06-09T02:30:11',
'version' => 'v2.6.12'
},
{
'date' => '2005-07-06T05:15:55',
'version' => 'v2.6.13'
},
{
'date' => '2005-07-23T07:15:49',
'version' => '2.6.14'
},
{
'date' => '2005-07-27T03:46:13',
'version' => '2.6.15'
},
{
'date' => '2006-06-10T03:21:01',
'version' => '2.6.16'
},
{
'date' => '2011-01-09T10:04:06',
'version' => '2.6.17'
},
{
'date' => '2011-01-09T16:35:39',
'version' => '2.6.18'
},
{
'date' => '2014-04-22T03:33:53',
'version' => '2.6.19'
},
{
'date' => '2020-09-14T09:22:58',
'version' => 'v2.6.20'
},
{
'date' => '2020-09-14T11:54:14',
'version' => 'v2.6.21'
},
{
'date' => '2020-09-21T07:06:18',
'version' => 'v2.6.22'
},
{
'date' => '2020-11-12T12:54:55',
'version' => 'v2.6.23'
},
{
'date' => '2020-11-16T14:24:54',
'version' => 'v2.6.24'
}
]
},
'MIME-tools' => {
'advisories' => [
{
'affected_versions' => [
'<4.109'
],
'cves' => [],
'description' => 'There was a potential security hole when outputting entities with recommended filenames.
',
'distribution' => 'MIME-tools',
'fixed_versions' => [
'>=4.109'
],
'id' => 'CPANSA-MIME-tools-1998-01',
'references' => [
'https://metacpan.org/dist/MIME-tools/changes'
],
'reported' => '1998-01-10',
'severity' => undef
}
],
'main_module' => 'MIME::Body',
'versions' => [
{
'date' => '1996-10-18T13:57:11',
'version' => '2.01'
},
{
'date' => '1996-10-23T19:20:59',
'version' => '2.02'
},
{
'date' => '1996-10-28T18:27:36',
'version' => '2.03'
},
{
'date' => '1996-11-03T00:35:36',
'version' => '2.04'
},
{
'date' => '1997-01-13T10:17:14',
'version' => '2.13'
},
{
'date' => '1997-01-14T07:05:37',
'version' => '2.14'
},
{
'date' => '1997-01-21T03:40:48',
'version' => '3.203'
},
{
'date' => '1997-01-22T11:24:13',
'version' => '3.204'
},
{
'date' => '1998-01-14T15:44:55',
'version' => '4.111'
},
{
'date' => '1998-01-18T04:23:37',
'version' => '4.112'
},
{
'date' => '1998-01-20T08:21:18',
'version' => '4.113'
},
{
'date' => '1998-02-14T21:45:26',
'version' => '4.116'
},
{
'date' => '1998-05-05T14:32:36',
'version' => '4.119'
},
{
'date' => '1998-06-04T13:30:01',
'version' => '4.121'
},
{
'date' => '1999-02-10T05:39:03',
'version' => '4.122'
},
{
'date' => '1999-05-14T13:29:15',
'version' => '4.124'
},
{
'date' => '2000-05-24T14:44:21',
'version' => '5.115'
},
{
'date' => '2000-05-26T04:46:25',
'version' => '5.116'
},
{
'date' => '2000-06-06T16:14:02',
'version' => '5.205'
},
{
'date' => '2000-06-08T07:36:13',
'version' => '5.206'
},
{
'date' => '2000-06-09T03:44:00',
'version' => '5.207'
},
{
'date' => '2000-06-10T08:12:36',
'version' => '5.209'
},
{
'date' => '2000-06-20T13:24:34',
'version' => '5.210'
},
{
'date' => '2000-06-24T06:57:34',
'version' => '5.211'
},
{
'date' => '2000-07-07T14:46:11',
'version' => '5.304'
},
{
'date' => '2000-07-20T06:47:41',
'version' => '5.306'
},
{
'date' => '2000-08-15T14:22:44',
'version' => '5.310'
},
{
'date' => '2000-08-16T05:28:11',
'version' => '5.311'
},
{
'date' => '2000-09-05T04:17:48',
'version' => '5.313'
},
{
'date' => '2000-09-06T04:59:03',
'version' => '5.314'
},
{
'date' => '2000-09-21T06:14:25',
'version' => '5.316'
},
{
'date' => '2000-11-05T15:24:04',
'version' => '5.404'
},
{
'date' => '2000-11-06T00:34:39',
'version' => '5.405'
},
{
'date' => '2000-11-10T05:27:35',
'version' => '5.408'
},
{
'date' => '2000-11-20T18:04:43',
'version' => '5.409'
},
{
'date' => '2000-11-23T05:31:08',
'version' => '5.410'
},
{
'date' => '2001-06-05T15:21:25',
'version' => '5.411'
},
{
'date' => '2001-11-16T17:32:32',
'version' => '5.411'
},
{
'date' => '2003-06-09T16:42:00',
'version' => '6.200_01'
},
{
'date' => '2003-07-22T20:49:42',
'version' => '6.200_02'
},
{
'date' => '2004-09-14T14:20:07',
'version' => '5.412'
},
{
'date' => '2004-09-15T14:11:08',
'version' => '5.413'
},
{
'date' => '2004-10-06T19:46:54',
'version' => '5.414'
},
{
'date' => '2004-10-27T12:51:54',
'version' => '5.415'
},
{
'date' => '2005-01-03T15:45:29',
'version' => '5.416'
},
{
'date' => '2005-01-20T21:24:25',
'version' => '5.417'
},
{
'date' => '2005-09-29T19:40:53',
'version' => '5.418'
},
{
'date' => '2005-12-22T21:52:16',
'version' => '5.419'
},
{
'date' => '2006-03-17T21:20:12',
'version' => '5.420'
},
{
'date' => '2007-06-18T20:04:22',
'version' => '5.420_01'
},
{
'date' => '2007-08-31T18:03:20',
'version' => '5.420_02'
},
{
'date' => '2007-09-20T21:33:01',
'version' => '5.421'
},
{
'date' => '2007-09-25T22:31:20',
'version' => '5.422'
},
{
'date' => '2007-09-27T15:50:17',
'version' => '5.423'
},
{
'date' => '2007-11-07T15:36:31',
'version' => '5.424'
},
{
'date' => '2007-11-17T16:20:42',
'version' => '5.425'
},
{
'date' => '2008-03-18T13:45:38',
'version' => '5.426'
},
{
'date' => '2008-06-30T18:41:00',
'version' => '5.426'
},
{
'date' => '2010-04-22T15:31:33',
'version' => '5.428'
},
{
'date' => '2010-04-30T13:47:59',
'version' => '5.500'
},
{
'date' => '2011-01-07T15:59:19',
'version' => '5.500'
},
{
'date' => '2011-02-17T18:37:12',
'version' => '5.501'
},
{
'date' => '2011-03-08T14:03:11',
'version' => '5.502'
},
{
'date' => '2012-06-08T13:44:12',
'version' => '5.503'
},
{
'date' => '2013-01-30T21:01:40',
'version' => '5.504'
},
{
'date' => '2013-11-14T15:27:15',
'version' => '5.505'
},
{
'date' => '2015-04-22T17:32:26',
'version' => '5.506'
},
{
'date' => '2015-09-30T13:21:56',
'version' => '5.507'
},
{
'date' => '2016-08-29T14:52:28',
'version' => '5.508'
},
{
'date' => '2017-04-05T18:13:30',
'version' => '5.508'
},
{
'date' => '2022-07-06T14:20:39',
'version' => '5.503'
},
{
'date' => '2024-01-02T15:38:07',
'version' => '5.503'
},
{
'date' => '2024-01-08T18:22:18',
'version' => '5.503'
},
{
'date' => '2024-01-25T16:28:54',
'version' => '5.503'
},
{
'date' => '2024-02-06T20:49:02',
'version' => '5.503'
},
{
'date' => '2024-04-24T15:36:43',
'version' => '5.515'
}
]
},
'MT' => {
'advisories' => [
{
'affected_versions' => [
'>=4.20,<=4.38'
],
'cves' => [
'CVE-2013-0209'
],
'darkpan' => 'true',
'description' => 'lib/MT/Upgrade.pm in mt-upgrade.cgi in Movable Type 4.2x and 4.3x through 4.38 does not require authentication for requests to database-migration functions, which allows remote attackers to conduct eval injection and SQL injection attacks via crafted parameters, as demonstrated by an eval injection attack against the core_drop_meta_for_table function, leading to execution of arbitrary Perl code.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2013-0209',
'references' => [
'http://www.sec-1.com/blog/wp-content/uploads/2013/01/movabletype_upgrade_exec.rb_.txt',
'http://www.movabletype.org/2013/01/movable_type_438_patch.html',
'http://openwall.com/lists/oss-security/2013/01/22/3',
'http://www.sec-1.com/blog/?p=402'
],
'reported' => '2013-01-23',
'severity' => undef
},
{
'affected_versions' => [
'>=7,<=7.9.4',
'>=6,<=6.8.6',
'>=4,<=5'
],
'cves' => [
'CVE-2022-38078'
],
'darkpan' => 'true',
'description' => 'Movable Type XMLRPC API provided by Six Apart Ltd. contains a command injection vulnerability. Sending a specially crafted message by POST method to Movable Type XMLRPC API may allow arbitrary Perl script execution, and an arbitrary OS command may be executed through it. Affected products and versions are as follows: Movable Type 7 r.5202 and earlier, Movable Type Advanced 7 r.5202 and earlier, Movable Type 6.8.6 and earlier, Movable Type Advanced 6.8.6 and earlier, Movable Type Premium 1.52 and earlier, and Movable Type Premium Advanced 1.52 and earlier. Note that all versions of Movable Type 4.0 or later including unsupported (End-of-Life, EOL) versions are also affected by this vulnerability.
',
'distribution' => 'MT',
'fixed_versions' => [
'>=7.9.5',
'>=6.8.7,<7'
],
'id' => 'CPANSA-MT-2022-38078',
'references' => [
'https://movabletype.org/news/2022/08/mt-795-687-released.html',
'https://jvn.jp/en/jp/JVN57728859/index.html'
],
'reported' => '2022-08-24',
'severity' => 'critical'
},
{
'affected_versions' => [
'>=7,<=7.8.1',
'>=6,<=6.8.2',
'<6'
],
'cves' => [
'CVE-2021-20837'
],
'darkpan' => 'true',
'description' => 'Movable Type 7 r.5002 and earlier (Movable Type 7 Series), Movable Type 6.8.2 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.5002 and earlier (Movable Type Advanced 7 Series), Movable Type Advanced 6.8.2 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.46 and earlier, and Movable Type Premium Advanced 1.46 and earlier allow remote attackers to execute arbitrary OS commands via unspecified vectors. Note that all versions of Movable Type 4.0 or later including unsupported (End-of-Life, EOL) versions are also affected by this vulnerability.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2021-20837',
'references' => [
'https://jvn.jp/en/jp/JVN41119755/index.html',
'https://movabletype.org/news/2021/10/mt-782-683-released.html',
'http://packetstormsecurity.com/files/164818/Movable-Type-7-r.5002-XMLRPC-API-Remote-Command-Injection.html',
'http://packetstormsecurity.com/files/164705/Movable-Type-7-r.5002-XMLRPC-API-Remote-Command-Injection.html'
],
'reported' => '2021-10-26',
'severity' => 'critical'
},
{
'affected_versions' => [
'>=7,<7.8.0'
],
'cves' => [
'CVE-2021-20814'
],
'darkpan' => 'true',
'description' => 'Cross-site scripting vulnerability in Setting screen of ContentType Information Widget Plugin of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), and Movable Type Premium 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2021-20814',
'references' => [
'https://movabletype.org/news/2021/08/mt-780-681-released.html',
'https://jvn.jp/en/jp/JVN97545738/index.html'
],
'reported' => '2021-08-26',
'severity' => 'medium'
},
{
'affected_versions' => [
'>=7,<7.8.0'
],
'cves' => [
'CVE-2021-20813'
],
'darkpan' => 'true',
'description' => 'Cross-site scripting vulnerability in Edit screen of Content Data of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series) and Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series)) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2021-20813',
'references' => [
'https://movabletype.org/news/2021/08/mt-780-681-released.html',
'https://jvn.jp/en/jp/JVN97545738/index.html'
],
'reported' => '2021-08-26',
'severity' => 'medium'
},
{
'affected_versions' => [
'>=7,<7.8.0',
'>=6,<=6.8.0'
],
'cves' => [
'CVE-2021-20815'
],
'darkpan' => 'true',
'description' => 'Cross-site scripting vulnerability in Edit Boilerplate screen of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type 6.8.0 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.44 and earlier, and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2021-20815',
'references' => [
'https://movabletype.org/news/2021/08/mt-780-681-released.html',
'https://jvn.jp/en/jp/JVN97545738/index.html'
],
'reported' => '2021-08-26',
'severity' => 'medium'
},
{
'affected_versions' => [
'>=7,<7.8.0',
'>=6,<=6.8.0'
],
'cves' => [
'CVE-2021-20811'
],
'darkpan' => 'true',
'description' => 'Cross-site scripting vulnerability in List of Assets screen of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type 6.8.0 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.44 and earlier, and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2021-20811',
'references' => [
'https://movabletype.org/news/2021/08/mt-780-681-released.html',
'https://jvn.jp/en/jp/JVN97545738/index.html'
],
'reported' => '2021-08-26',
'severity' => 'medium'
},
{
'affected_versions' => [
'>=7,<7.8.0',
'>=6,<=6.8.0'
],
'cves' => [
'CVE-2021-20810'
],
'darkpan' => 'true',
'description' => 'Cross-site scripting vulnerability in Website Management screen of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type 6.8.0 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.44 and earlier, and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2021-20810',
'references' => [
'https://movabletype.org/news/2021/08/mt-780-681-released.html',
'https://jvn.jp/en/jp/JVN97545738/index.html'
],
'reported' => '2021-08-26',
'severity' => 'medium'
},
{
'affected_versions' => [
'>=7,<7.8.0',
'>=6,<=6.8.0'
],
'cves' => [
'CVE-2021-20809'
],
'darkpan' => 'true',
'description' => 'Cross-site scripting vulnerability in Create screens of Entry, Page, and Content Type of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type 6.8.0 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.44 and earlier, and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2021-20809',
'references' => [
'https://movabletype.org/news/2021/08/mt-780-681-released.html',
'https://jvn.jp/en/jp/JVN97545738/index.html'
],
'reported' => '2021-08-26',
'severity' => 'medium'
},
{
'affected_versions' => [
'>=7,<7.8.0',
'>=6,<=6.8.0'
],
'cves' => [
'CVE-2021-20808'
],
'darkpan' => 'true',
'description' => 'Cross-site scripting vulnerability in Search screen of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type 6.8.0 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.44 and earlier, and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2021-20808',
'references' => [
'https://movabletype.org/news/2021/08/mt-780-681-released.html',
'https://jvn.jp/en/jp/JVN97545738/index.html'
],
'reported' => '2021-08-26',
'severity' => 'medium'
},
{
'affected_versions' => [
'<=1.37'
],
'cves' => [
'CVE-2020-5669'
],
'darkpan' => 'true',
'description' => 'Cross-site scripting vulnerability in Movable Type Movable Type Premium 1.37 and earlier and Movable Type Premium Advanced 1.37 and earlier allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2020-5669',
'references' => [
'https://www.sixapart.jp/movabletype/news/2020/11/18-1101.html',
'https://jvn.jp/en/jp/JVN94245475/index.html'
],
'reported' => '2021-10-26',
'severity' => 'medium'
},
{
'affected_versions' => [
'>=7,<7.2.1',
'>=6,<=6.5.3'
],
'cves' => [
'CVE-2020-5577'
],
'darkpan' => 'true',
'description' => 'Movable Type series (Movable Type 7 r.4606 (7.2.1) and earlier (Movable Type 7), Movable Type Advanced 7 r.4606 (7.2.1) and earlier (Movable Type Advanced 7), Movable Type for AWS 7 r.4606 (7.2.1) and earlier (Movable Type for AWS 7), Movable Type 6.5.3 and earlier (Movable Type 6.5), Movable Type Advanced 6.5.3 and earlier (Movable Type Advanced 6.5), Movable Type 6.3.11 and earlier (Movable Type 6.3), Movable Type Advanced 6.3.11 and earlier (Movable Type 6.3), Movable Type Premium 1.29 and earlier, and Movable Type Premium Advanced 1.29 and earlier) allow remote authenticated attackers to upload arbitrary files and execute a php script via unspecified vectors.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2020-5577',
'references' => [
'https://jvn.jp/en/jp/JVN28806943/index.html',
'https://movabletype.org/news/2020/05/mt-730-660-6312-released.html'
],
'reported' => '2020-05-14',
'severity' => 'high'
},
{
'affected_versions' => [
'>=7,<7.2.1',
'>=6,<=6.5.3'
],
'cves' => [
'CVE-2020-5576'
],
'darkpan' => 'true',
'description' => 'Cross-site request forgery (CSRF) vulnerability in Movable Type series (Movable Type 7 r.4606 (7.2.1) and earlier (Movable Type 7), Movable Type Advanced 7 r.4606 (7.2.1) and earlier (Movable Type Advanced 7), Movable Type for AWS 7 r.4606 (7.2.1) and earlier (Movable Type for AWS 7), Movable Type 6.5.3 and earlier (Movable Type 6.5), Movable Type Advanced 6.5.3 and earlier (Movable Type Advanced 6.5), Movable Type 6.3.11 and earlier (Movable Type 6.3), Movable Type Advanced 6.3.11 and earlier (Movable Type 6.3), Movable Type Premium 1.29 and earlier, and Movable Type Premium Advanced 1.29 and earlier) allows remote attackers to hijack the authentication of administrators via unspecified vectors.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2020-5576',
'references' => [
'https://jvn.jp/en/jp/JVN28806943/index.html',
'https://movabletype.org/news/2020/05/mt-730-660-6312-released.html'
],
'reported' => '2020-05-14',
'severity' => 'high'
},
{
'affected_versions' => [
'>=7,<7.2.1',
'>=6,<=6.5.3'
],
'cves' => [
'CVE-2020-5575'
],
'darkpan' => 'true',
'description' => 'Cross-site scripting vulnerability in Movable Type series (Movable Type 7 r.4606 (7.2.1) and earlier (Movable Type 7), Movable Type Advanced 7 r.4606 (7.2.1) and earlier (Movable Type Advanced 7), Movable Type for AWS 7 r.4606 (7.2.1) and earlier (Movable Type for AWS 7), Movable Type 6.5.3 and earlier (Movable Type 6.5), Movable Type Advanced 6.5.3 and earlier (Movable Type Advanced 6.5), Movable Type 6.3.11 and earlier (Movable Type 6.3), Movable Type Advanced 6.3.11 and earlier (Movable Type 6.3), Movable Type Premium 1.29 and earlier, and Movable Type Premium Advanced 1.29 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2020-5575',
'references' => [
'https://jvn.jp/en/jp/JVN28806943/index.html',
'https://movabletype.org/news/2020/05/mt-730-660-6312-released.html'
],
'reported' => '2020-05-14',
'severity' => 'medium'
},
{
'affected_versions' => [
'>=7,<7.2.1',
'>=6,<=6.5.3'
],
'cves' => [
'CVE-2020-5574'
],
'darkpan' => 'true',
'description' => 'HTML attribute value injection vulnerability in Movable Type series (Movable Type 7 r.4606 (7.2.1) and earlier (Movable Type 7), Movable Type Advanced 7 r.4606 (7.2.1) and earlier (Movable Type Advanced 7), Movable Type for AWS 7 r.4606 (7.2.1) and earlier (Movable Type for AWS 7), Movable Type 6.5.3 and earlier (Movable Type 6.5), Movable Type Advanced 6.5.3 and earlier (Movable Type Advanced 6.5), Movable Type 6.3.11 and earlier (Movable Type 6.3), Movable Type Advanced 6.3.11 and earlier (Movable Type 6.3), Movable Type Premium 1.29 and earlier, and Movable Type Premium Advanced 1.29 and earlier) allows remote attackers to inject arbitrary HTML attribute value via unspecified vectors.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2020-5574',
'references' => [
'https://jvn.jp/en/jp/JVN28806943/index.html',
'https://movabletype.org/news/2020/05/mt-730-660-6312-released.html'
],
'reported' => '2020-05-14',
'severity' => 'medium'
},
{
'affected_versions' => [
'>=7,<7.1.4',
'>=6,<=6.5.2'
],
'cves' => [
'CVE-2020-5528'
],
'darkpan' => 'true',
'description' => 'Cross-site scripting vulnerability in Movable Type series (Movable Type 7 r.4603 and earlier (Movable Type 7), Movable Type 6.5.2 and earlier (Movable Type 6.5), Movable Type Advanced 7 r.4603 and earlier (Movable Type Advanced 7), Movable Type Advanced 6.5.2 and earlier (Movable Type Advanced 6.5), Movable Type Premium 1.26 and earlier (Movable Type Premium), and Movable Type Premium Advanced 1.26 and earlier (Movable Type Premium Advanced)) allows remote attackers to inject arbitrary web script or HTML in the block editor and the rich text editor via a specially crafted URL.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2020-5528',
'references' => [
'https://movabletype.org/news/2020/02/movable_type_r4605_v720_v653_and_v6311_released.html',
'http://jvn.jp/en/jp/JVN94435544/index.html'
],
'reported' => '2020-02-06',
'severity' => 'medium'
},
{
'affected_versions' => [
'>=7,<7.1.3',
'>=6.5.0,<=6.5.1',
'>=6,<=6.3.9'
],
'cves' => [
'CVE-2019-6025'
],
'darkpan' => 'true',
'description' => 'Open redirect vulnerability in Movable Type series Movable Type 7 r.4602 (7.1.3) and earlier (Movable Type 7), Movable Type 6.5.0 and 6.5.1 (Movable Type 6.5), Movable Type 6.3.9 and earlier (Movable Type 6.3.x, 6.2.x, 6.1.x, 6.0.x), Movable Type Advanced 7 r.4602 (7.1.3) and earlier (Movable Type 7), Movable Type Advanced 6.5.0 and 6.5.1 (Movable Type 6.5), Movable Type Advanced 6.3.9 and earlier (Movable Type 6.3.x, 6.2.x, 6.1.x, 6.0.x), Movable Type Premium 1.24 and earlier (Movable Type Premium), and Movable Type Premium (Advanced Edition) 1.24 and earlier (Movable Type Premium) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a specially crafted URL.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2019-6025',
'references' => [
'https://movabletype.org/news/2019/11/movable_type_r4603_v714_v652_and_v6310_released.html',
'http://jvn.jp/en/jp/JVN65280626/index.html'
],
'reported' => '2019-12-26',
'severity' => 'medium'
},
{
'affected_versions' => [
'=6.3.1'
],
'cves' => [
'CVE-2018-0672'
],
'darkpan' => 'true',
'description' => 'Cross-site scripting vulnerability in Movable Type versions prior to Ver. 6.3.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2018-0672',
'references' => [
'http://jvn.jp/en/jp/JVN89550319/index.html'
],
'reported' => '2018-09-04',
'severity' => 'medium'
},
{
'affected_versions' => [
'>=6.0.0,<6.1.3',
'>=6.2.0,<6.2.6',
'<5.2.13'
],
'cves' => [
'CVE-2016-5742'
],
'darkpan' => 'true',
'description' => 'SQL injection vulnerability in the XML-RPC interface in Movable Type Pro and Advanced 6.x before 6.1.3 and 6.2.x before 6.2.6 and Movable Type Open Source 5.2.13 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2016-5742',
'references' => [
'https://movabletype.org/news/2016/06/movable_type_626_and_613_released.html',
'http://www.openwall.com/lists/oss-security/2016/06/22/6',
'http://www.openwall.com/lists/oss-security/2016/06/22/5',
'http://www.openwall.com/lists/oss-security/2016/06/22/3',
'http://www.securitytracker.com/id/1036160'
],
'reported' => '2017-01-23',
'severity' => 'critical'
},
{
'affected_versions' => [
'<5.2.12',
'>=6.0.0,<=6.0.7'
],
'cves' => [
'CVE-2015-1592'
],
'darkpan' => 'true',
'description' => 'Movable Type Pro, Open Source, and Advanced before 5.2.12 and Pro and Advanced 6.0.x before 6.0.7 does not properly use the Perl Storable::thaw function, which allows remote attackers to include and execute arbitrary local Perl files and possibly execute arbitrary code via unspecified vectors.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2015-1592',
'references' => [
'https://movabletype.org/news/2015/02/movable_type_607_and_5212_released_to_close_security_vulnera.html',
'http://www.securityfocus.com/bid/72606',
'http://www.openwall.com/lists/oss-security/2015/02/12/17',
'http://www.openwall.com/lists/oss-security/2015/02/12/2',
'https://www.debian.org/security/2015/dsa-3183',
'http://www.securitytracker.com/id/1031777',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/100912'
],
'reported' => '2015-02-19',
'severity' => undef
},
{
'affected_versions' => [
'<5.18',
'>=5.2.0,<5.2.11',
'>=6,<6.0.6'
],
'cves' => [
'CVE-2014-9057'
],
'darkpan' => 'true',
'description' => 'SQL injection vulnerability in the XML-RPC interface in Movable Type before 5.18, 5.2.x before 5.2.11, and 6.x before 6.0.6 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2014-9057',
'references' => [
'https://movabletype.org/news/2014/12/6.0.6.html',
'https://movabletype.org/documentation/appendices/release-notes/6.0.6.html',
'http://secunia.com/advisories/61227',
'https://www.debian.org/security/2015/dsa-3183'
],
'reported' => '2014-12-16',
'severity' => undef
},
{
'affected_versions' => [
'<5.2.6'
],
'cves' => [
'CVE-2013-2184'
],
'darkpan' => 'true',
'description' => 'Movable Type before 5.2.6 does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via the comment_state parameter.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2013-2184',
'references' => [
'https://movabletype.org/documentation/appendices/release-notes/movable-type-526-release-notes.html',
'http://www.debian.org/security/2015/dsa-3183',
'http://seclists.org/oss-sec/2013/q2/568',
'http://seclists.org/oss-sec/2013/q2/560'
],
'reported' => '2015-03-27',
'severity' => undef
},
{
'affected_versions' => [
'=5.13'
],
'cves' => [
'CVE-2012-1503'
],
'darkpan' => 'true',
'description' => 'Cross-site scripting (XSS) vulnerability in Six Apart (formerly Six Apart KK) Movable Type (MT) Pro 5.13 allows remote attackers to inject arbitrary web script or HTML via the comment section.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2012-1503',
'references' => [
'http://www.cloudscan.me/2012/10/cve-2012-1503-movable-type-pro-513en.html',
'http://packetstormsecurity.org/files/117564/Movable-Type-Pro-5.13en-Cross-Site-Scripting.html',
'http://www.exploit-db.com/exploits/22151',
'http://osvdb.org/show/osvdb/86729',
'http://www.securityfocus.com/bid/56160',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/79521'
],
'reported' => '2014-08-29',
'severity' => undef
},
{
'affected_versions' => [
'<4.38',
'>=5,<5.07',
'>=5.10,<5.13'
],
'cves' => [
'CVE-2012-0320'
],
'darkpan' => 'true',
'description' => 'Movable Type before 4.38, 5.0x before 5.07, and 5.1x before 5.13 allows remote attackers to take control of sessions via unspecified vectors related to the (1) commenting feature and (2) community script.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2012-0320',
'references' => [
'http://www.movabletype.org/2012/02/movable_type_513_507_and_438_security_updates.html',
'http://www.movabletype.org/documentation/appendices/release-notes/513.html',
'http://jvndb.jvn.jp/jvndb/JVNDB-2012-000018',
'http://jvn.jp/en/jp/JVN20083397/index.html',
'http://www.securitytracker.com/id?1026738',
'http://www.securityfocus.com/bid/52138',
'http://www.debian.org/security/2012/dsa-2423'
],
'reported' => '2012-03-03',
'severity' => undef
},
{
'affected_versions' => [
'<4.38',
'>=5,<5.07',
'>=5.10,<5.13'
],
'cves' => [
'CVE-2012-0317'
],
'darkpan' => 'true',
'description' => 'Multiple cross-site request forgery (CSRF) vulnerabilities in Movable Type before 4.38, 5.0x before 5.07, and 5.1x before 5.13 allow remote attackers to hijack the authentication of arbitrary users for requests that modify data via the (1) commenting feature or (2) community script.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2012-0317',
'references' => [
'http://jvn.jp/en/jp/JVN70683217/index.html',
'http://www.movabletype.org/documentation/appendices/release-notes/513.html',
'http://www.movabletype.org/2012/02/movable_type_513_507_and_438_security_updates.html',
'http://jvndb.jvn.jp/jvndb/JVNDB-2012-000015',
'http://www.securitytracker.com/id?1026738',
'http://www.securityfocus.com/bid/52138',
'http://www.debian.org/security/2012/dsa-2423'
],
'reported' => '2012-03-03',
'severity' => undef
},
{
'affected_versions' => [
'>=4,<4.36',
'>=5,<5.05'
],
'cves' => [
'CVE-2011-5085'
],
'darkpan' => 'true',
'description' => 'Unspecified vulnerability in Movable Type 4.x before 4.36 and 5.x before 5.05 allows remote attackers to read or modify data via unknown vectors.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2011-5085',
'references' => [
'http://www.movabletype.org/2011/05/movable_type_51_and_505_436_security_update.html',
'http://www.debian.org/security/2012/dsa-2423'
],
'reported' => '2012-04-02',
'severity' => undef
},
{
'affected_versions' => [
'>=4,<4.36',
'>=5,<5.05'
],
'cves' => [
'CVE-2011-5084'
],
'darkpan' => 'true',
'description' => 'Cross-site scripting (XSS) vulnerability in Movable Type 4.x before 4.36 and 5.x before 5.05 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2011-5084',
'references' => [
'http://www.movabletype.org/2011/05/movable_type_51_and_505_436_security_update.html',
'http://www.debian.org/security/2012/dsa-2423'
],
'reported' => '2012-04-02',
'severity' => undef
},
{
'affected_versions' => [
'>=5.0,<=5.01'
],
'cves' => [
'CVE-2010-1985'
],
'darkpan' => 'true',
'description' => 'Multiple cross-site scripting (XSS) vulnerabilities in the administrative user interface in Six Apart Movable Type 5.0 and 5.01 allow remote attackers to inject arbitrary web script or HTML via unknown vectors.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2010-1985',
'references' => [
'http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000017.html',
'http://www.movabletype.com/blog/2010/05/movable-type-502.html',
'http://www.vupen.com/english/advisories/2010/1136',
'http://secunia.com/advisories/39741',
'http://www.movabletype.org/documentation/appendices/release-notes/movable-type-502.html',
'http://jvn.jp/en/jp/JVN92854093/index.html'
],
'reported' => '2010-05-19',
'severity' => undef
},
{
'affected_versions' => [
'<4.261'
],
'cves' => [
'CVE-2009-2492'
],
'darkpan' => 'true',
'description' => 'Cross-site scripting (XSS) vulnerability in mt-wizard.cgi in Six Apart Movable Type before 4.261 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2009-2480.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2009-2492',
'references' => [
'http://jvn.jp/en/jp/JVN86472161/index.html',
'http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000042.html',
'http://www.vupen.com/english/advisories/2009/1668',
'http://secunia.com/advisories/35534',
'http://www.securityfocus.com/bid/35885'
],
'reported' => '2009-07-17',
'severity' => undef
},
{
'affected_versions' => [
'<4.261'
],
'cves' => [
'CVE-2009-2481'
],
'darkpan' => 'true',
'description' => 'mt-wizard.cgi in Six Apart Movable Type before 4.261, when global templates are not initialized, allows remote attackers to bypass access restrictions and (1) send e-mail to arbitrary addresses or (2) obtain sensitive information via unspecified vectors.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2009-2481',
'references' => [
'http://jvn.jp/en/jp/JVN08369659/index.html',
'http://www.vupen.com/english/advisories/2009/1668',
'http://www.securityfocus.com/bid/35471',
'http://secunia.com/advisories/35534',
'http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000043.html',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/51330'
],
'reported' => '2009-07-16',
'severity' => undef
},
{
'affected_versions' => [
'<4.24'
],
'cves' => [
'CVE-2009-0752'
],
'darkpan' => 'true',
'description' => 'Unspecified vulnerability in Movable Type Pro and Community Solution 4.x before 4.24 has unknown impact and attack vectors, possibly related to the password recovery mechanism.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2009-0752',
'references' => [
'http://www.movabletype.com/blog/2009/02/movable-type-424-get-updated-with-better-password-recovery.html'
],
'reported' => '2009-03-03',
'severity' => undef
},
{
'affected_versions' => [
'<4.23'
],
'cves' => [
'CVE-2008-5846'
],
'darkpan' => 'true',
'description' => 'Six Apart Movable Type (MT) before 4.23 allows remote authenticated users with create permission for posts to bypass intended access restrictions and publish posts via a "system-wide entry listing screen."
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2008-5846',
'references' => [
'http://www.movabletype.org/mt_423_change_log.html',
'http://www.securityfocus.com/bid/33133',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/47759'
],
'reported' => '2009-01-05',
'severity' => undef
},
{
'affected_versions' => [
'<4.23'
],
'cves' => [
'CVE-2008-5845'
],
'darkpan' => 'true',
'description' => 'Multiple cross-site scripting (XSS) vulnerabilities in Six Apart Movable Type (MT) before 4.23 allow remote attackers to inject arbitrary web script or HTML via a (1) MTEntryAuthorUsername, (2) MTAuthorDisplayName, (3) MTEntryAuthorDisplayName, or (4) MTCommenterName field in a Profile View template; a (5) listing screen or (6) edit screen in the CMS app; (7) a TrackBack title, related to the HTML sanitization library; or (8) a user archive name (aka archive title) on a published Community Blog template.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2008-5845',
'references' => [
'http://www.movabletype.org/mt_423_change_log.html',
'http://jvndb.jvn.jp/ja/contents/2011/JVNDB-2011-000031.html',
'http://jvn.jp/en/jp/JVN45658190/index.html'
],
'reported' => '2009-01-05',
'severity' => undef
},
{
'affected_versions' => [
'>=3,<=3.38',
'>=4,<4.23'
],
'cves' => [
'CVE-2008-5808'
],
'darkpan' => 'true',
'description' => 'Cross-site scripting (XSS) vulnerability in Six Apart Movable Type Enterprise (MTE) 1.x before 1.56; Movable Type (MT) 3.x before 3.38; and Movable Type, Movable Type Open Source (MTOS), and Movable Type Enterprise 4.x before 4.23 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, possibly related to "application management."
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2008-5808',
'references' => [
'http://secunia.com/advisories/32935',
'http://www.securityfocus.com/bid/32604',
'http://jvn.jp/en/jp/JVN02216739/index.html',
'http://www.movabletype.jp/blog/_movable_type_423.html',
'http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000067.html',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/47019'
],
'reported' => '2009-01-02',
'severity' => undef
},
{
'affected_versions' => [
'>=7,<=7.7.1'
],
'cves' => [
'CVE-2021-20812'
],
'darkpan' => 'true',
'description' => 'Cross-site scripting vulnerability in Setting screen of Server Sync of Movable Type (Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series) and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2021-20812',
'references' => [
'https://movabletype.org/news/2021/08/mt-780-681-released.html',
'https://jvn.jp/en/jp/JVN97545738/index.html'
],
'reported' => '2021-08-26',
'severity' => 'medium'
},
{
'affected_versions' => [
'<=7'
],
'cves' => [
'CVE-2022-43660'
],
'darkpan' => 'true',
'description' => 'Improper neutralization of Server-Side Includes (SSW) within a web page in Movable Type series allows a remote authenticated attacker with Privilege of \'Manage of Content Types\' may execute an arbitrary Perl script and/or an arbitrary OS command. Affected products/versions are as follows: Movable Type 7 r.5301 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.5301 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.53 and earlier, and Movable Type Premium Advanced 1.53 and earlier.
',
'distribution' => 'MT',
'fixed_versions' => [],
'id' => 'CPANSA-MT-2022-43660',
'references' => [
'https://movabletype.org/news/2022/11/mt-796-688-released.html',
'https://jvn.jp/en/jp/JVN37014768/index.html'
],
'reported' => '2022-12-07',
'severity' => undef
}
],
'main_module' => '',
'versions' => []
},
'Mail-Audit' => {
'advisories' => [
{
'affected_versions' => [
'>0'
],
'cves' => [
'CVE-2005-4536'
],
'description' => 'Mail::Audit module in libmail-audit-perl 2.1-5, when logging is enabled without a default log file specified, uses predictable log filenames, which allows local users to overwrite arbitrary files via a symlink attack on the [PID]-audit.log temporary file.
',
'distribution' => 'Mail-Audit',
'fixed_versions' => [],
'id' => 'CPANSA-Mail-Audit-2005-4536',
'references' => [
'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=344029',
'http://www.debian.org/security/2006/dsa-960',
'http://secunia.com/advisories/18652',
'http://secunia.com/advisories/18656',
'http://www.securityfocus.com/bid/16434',
'http://www.vupen.com/english/advisories/2006/0378',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/24380'
],
'reported' => '2005-12-31',
'severity' => undef
}
],
'main_module' => 'Mail::Audit',
'versions' => [
{
'date' => '2000-03-25T11:22:17',
'version' => '1.0'
},
{
'date' => '2000-06-17T08:03:59',
'version' => '1.1'
},
{
'date' => '2000-06-17T10:56:28',
'version' => '1.2'
},
{
'date' => '2000-06-17T11:13:20',
'version' => '1.3'
},
{
'date' => '2001-01-04T20:17:04',
'version' => '1.4'
},
{
'date' => '2001-01-07T14:23:39',
'version' => '1.5'
},
{
'date' => '2001-01-13T22:45:20',
'version' => '1.6'
},
{
'date' => '2001-01-27T11:31:56',
'version' => '1.7'
},
{
'date' => '2001-02-12T16:34:27',
'version' => '1.8'
},
{
'date' => '2001-03-21T21:35:00',
'version' => '1.9'
},
{
'date' => '2001-04-23T15:45:51',
'version' => '1.10'
},
{
'date' => '2001-05-16T23:20:35',
'version' => '1.11'
},
{
'date' => '2001-12-10T21:02:24',
'version' => '2.0'
},
{
'date' => '2002-03-04T19:59:38',
'version' => '2.1'
},
{
'date' => '2006-05-27T01:36:59',
'version' => '2.200_01'
},
{
'date' => '2006-05-31T01:58:52',
'version' => '2.200_02'
},
{
'date' => '2006-06-02T02:17:31',
'version' => '2.200_03'
},
{
'date' => '2006-06-04T20:18:18',
'version' => '2.200_04'
},
{
'date' => '2006-06-05T03:39:12',
'version' => '2.200_05'
},
{
'date' => '2006-07-16T21:50:04',
'version' => '2.201'
},
{
'date' => '2006-07-21T12:18:37',
'version' => '2.202'
},
{
'date' => '2006-07-22T00:53:55',
'version' => '2.203'
},
{
'date' => '2006-09-19T11:26:30',
'version' => '2.210'
},
{
'date' => '2006-09-19T11:38:19',
'version' => '2.211'
},
{
'date' => '2006-10-31T15:24:49',
'version' => '2.212'
},
{
'date' => '2007-02-15T17:05:02',
'version' => '2.213'
},
{
'date' => '2007-02-15T19:32:24',
'version' => '2.214'
},
{
'date' => '2007-02-19T21:14:15',
'version' => '2.215'
},
{
'date' => '2007-02-27T01:52:17',
'version' => '2.216'
},
{
'date' => '2007-03-05T17:16:08',
'version' => '2.217'
},
{
'date' => '2007-03-06T16:24:21',
'version' => '2.218'
},
{
'date' => '2007-06-14T22:28:51',
'version' => '2.219'
},
{
'date' => '2007-07-14T19:04:32',
'version' => '2.220'
},
{
'date' => '2007-09-17T13:26:24',
'version' => '2.221'
},
{
'date' => '2007-11-02T03:23:46',
'version' => '2.222'
},
{
'date' => '2008-04-17T20:32:32',
'version' => '2.223'
},
{
'date' => '2009-09-18T17:22:37',
'version' => '2.224'
},
{
'date' => '2009-11-23T19:27:24',
'version' => '2.225'
},
{
'date' => '2011-11-11T16:37:46',
'version' => '2.226'
},
{
'date' => '2011-11-14T19:21:44',
'version' => '2.227'
},
{
'date' => '2013-09-29T01:21:47',
'version' => '2.228'
}
]
},
'MailTools' => {
'advisories' => [
{
'affected_versions' => [
'<1.51'
],
'cves' => [
'CVE-2002-1271'
],
'description' => 'The Mail::Mailer Perl module in the perl-MailTools package 1.47 and earlier uses mailx as the default mailer, which allows remote attackers to execute arbitrary commands by inserting them into the mail body, which is then processed by mailx.
',
'distribution' => 'MailTools',
'fixed_versions' => [
'>=1.51'
],
'id' => 'CPANSA-Mail-Mailer-2002-1271',
'references' => [
'http://www.iss.net/security_center/static/10548.php',
'http://www.debian.org/security/2003/dsa-386',
'http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-076.php',
'http://www.novell.com/linux/security/advisories/2002_041_perl_mailtools.html',
'http://www.securityfocus.com/bid/6104',
'http://marc.info/?l=bugtraq&m=103659723101369&w=2',
'http://marc.info/?l=bugtraq&m=103679569705086&w=2'
],
'reported' => '2002-11-12',
'severity' => undef
}
],
'main_module' => 'MailTools',
'versions' => [
{
'date' => '1995-10-21T04:25:33',
'version' => '1.03'
},
{
'date' => '1995-11-21T11:54:38',
'version' => '1.04'
},
{
'date' => '1996-08-13T09:42:17',
'version' => '1.06'
},
{
'date' => '1997-01-02T10:39:44',
'version' => '1.07'
},
{
'date' => '1997-01-07T13:38:49',
'version' => '1.08'
},
{
'date' => '1997-02-24T09:04:31',
'version' => '1.09'
},
{
'date' => '1997-11-13T02:23:35',
'version' => '1.10'
},
{
'date' => '1997-11-16T16:16:12',
'version' => '1.1001'
},
{
'date' => '1997-11-18T01:49:48',
'version' => '1.1002'
},
{
'date' => '1997-11-26T02:32:07',
'version' => '1.1003'
},
{
'date' => '1998-01-03T03:56:45',
'version' => '1.11'
},
{
'date' => '1998-09-26T14:47:35',
'version' => '1.12'
},
{
'date' => '1999-03-31T17:45:02',
'version' => '1.13'
},
{
'date' => '2000-03-29T12:35:40',
'version' => '1.14'
},
{
'date' => '2000-04-14T10:53:46',
'version' => '1.1401'
},
{
'date' => '2000-09-04T14:01:06',
'version' => '1.15'
},
{
'date' => '2001-08-08T09:13:27',
'version' => '1.16'
},
{
'date' => '2001-08-24T18:19:52',
'version' => '1.40'
},
{
'date' => '2001-11-14T10:36:58',
'version' => '1.41'
},
{
'date' => '2001-12-10T18:28:08',
'version' => '1.42'
},
{
'date' => '2002-02-08T09:41:37',
'version' => '1.43'
},
{
'date' => '2002-03-23T09:36:15',
'version' => '1.44'
},
{
'date' => '2002-05-23T08:17:57',
'version' => '1.45'
},
{
'date' => '2002-05-29T13:09:54',
'version' => '1.46'
},
{
'date' => '2002-07-05T10:03:43',
'version' => '1.47'
},
{
'date' => '2002-08-07T21:07:03',
'version' => '1.48'
},
{
'date' => '2002-08-28T06:38:30',
'version' => '1.49'
},
{
'date' => '2002-09-03T22:35:45',
'version' => '1.50'
},
{
'date' => '2002-10-29T13:24:48',
'version' => '1.51'
},
{
'date' => '2002-11-29T12:50:47',
'version' => '1.52'
},
{
'date' => '2002-12-09T16:47:38',
'version' => '1.53'
},
{
'date' => '2003-01-06T07:02:35',
'version' => '1.54'
},
{
'date' => '2003-01-06T07:07:36',
'version' => '1.55'
},
{
'date' => '2003-01-06T16:16:54',
'version' => '1.56'
},
{
'date' => '2003-01-14T08:49:45',
'version' => '1.57'
},
{
'date' => '2003-01-14T13:45:20',
'version' => '1.58'
},
{
'date' => '2003-08-13T06:16:07',
'version' => '1.59'
},
{
'date' => '2003-09-24T07:21:11',
'version' => '1.60'
},
{
'date' => '2004-03-10T09:55:12',
'version' => '1.61'
},
{
'date' => '2004-03-24T12:32:28',
'version' => '1.62'
},
{
'date' => '2004-08-16T15:30:07',
'version' => '1.63'
},
{
'date' => '2004-08-17T20:26:08',
'version' => '1.64'
},
{
'date' => '2004-11-24T15:05:58',
'version' => '1.65'
},
{
'date' => '2005-01-20T09:18:51',
'version' => '1.66'
},
{
'date' => '2005-03-31T10:07:53',
'version' => '1.67'
},
{
'date' => '2006-01-05T09:33:09',
'version' => '1.68'
},
{
'date' => '2006-01-05T10:19:56',
'version' => '1.70'
},
{
'date' => '2006-01-05T10:22:10',
'version' => '1.71'
},
{
'date' => '2006-01-17T08:11:53',
'version' => '1.72'
},
{
'date' => '2006-01-21T08:58:00',
'version' => '1.73'
},
{
'date' => '2006-02-28T07:44:59',
'version' => '1.74'
},
{
'date' => '2007-04-10T07:27:15',
'version' => '1.76'
},
{
'date' => '2007-05-11T12:17:49',
'version' => '1.77'
},
{
'date' => '2007-06-20T12:42:21',
'version' => '2.00_01'
},
{
'date' => '2007-07-21T10:31:51',
'version' => '2.00_02'
},
{
'date' => '2007-09-25T10:30:00',
'version' => '2.00_03'
},
{
'date' => '2007-11-28T09:50:07',
'version' => '2.01'
},
{
'date' => '2007-11-30T09:00:20',
'version' => '2.02'
},
{
'date' => '2008-04-14T09:14:48',
'version' => '2.03'
},
{
'date' => '2008-07-29T09:46:50',
'version' => '2.04'
},
{
'date' => '2009-12-18T22:01:23',
'version' => '2.05'
},
{
'date' => '2010-01-26T09:04:49',
'version' => '2.06'
},
{
'date' => '2010-10-01T10:39:38',
'version' => '2.07'
},
{
'date' => '2011-06-01T11:56:43',
'version' => '2.08'
},
{
'date' => '2012-02-25T13:51:23',
'version' => '2.09'
},
{
'date' => '2012-08-28T08:28:08',
'version' => '2.10'
},
{
'date' => '2012-08-29T07:13:34',
'version' => '2.11'
},
{
'date' => '2012-12-21T11:27:10',
'version' => '2.12'
},
{
'date' => '2014-01-05T18:36:21',
'version' => '2.13'
},
{
'date' => '2014-11-21T16:15:46',
'version' => '2.14'
},
{
'date' => '2016-04-18T12:11:57',
'version' => '2.15'
},
{
'date' => '2016-04-18T16:00:17',
'version' => '2.16'
},
{
'date' => '2016-05-11T15:27:31',
'version' => '2.17'
},
{
'date' => '2016-05-18T21:54:30',
'version' => '2.18'
},
{
'date' => '2017-08-22T11:37:34',
'version' => '2.19'
},
{
'date' => '2018-01-23T12:52:56',
'version' => '2.20'
},
{
'date' => '2019-05-21T14:28:18',
'version' => '2.21'
},
{
'date' => '2024-11-18T10:23:29',
'version' => '2.22'
}
]
},
'Module-Load-Conditional' => {
'advisories' => [
{
'affected_versions' => [
'<0.66'
],
'cves' => [
'CVE-2016-1238'
],
'description' => '(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.
',
'distribution' => 'Module-Load-Conditional',
'fixed_versions' => [
'>=0.66'
],
'id' => 'CPANSA-Module-Load-Conditional-2016-1238',
'references' => [
'http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html',
'http://www.securitytracker.com/id/1036440',
'http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab',
'https://rt.perl.org/Public/Bug/Display.html?id=127834',
'http://www.securityfocus.com/bid/92136',
'http://www.debian.org/security/2016/dsa-3628',
'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/',
'https://security.gentoo.org/glsa/201701-75',
'https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E',
'https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html',
'https://security.gentoo.org/glsa/201812-07',
'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html'
],
'reported' => '2016-08-02',
'severity' => 'high'
}
],
'main_module' => 'Module::Load::Conditional',
'versions' => [
{
'date' => '2003-05-10T16:59:45',
'version' => '0.02'
},
{
'date' => '2003-05-31T12:30:25',
'version' => '0.03'
},
{
'date' => '2003-10-05T15:11:11',
'version' => '0.04'
},
{
'date' => '2004-05-22T14:34:33',
'version' => '0.05'
},
{
'date' => '2004-12-03T15:53:27',
'version' => '0.06'
},
{
'date' => '2005-01-13T18:59:45',
'version' => '0.07'
},
{
'date' => '2005-01-14T17:32:34',
'version' => '0.08'
},
{
'date' => '2006-08-01T20:05:30',
'version' => '0.10'
},
{
'date' => '2006-08-13T13:08:40',
'version' => '0.12'
},
{
'date' => '2007-01-03T17:38:46',
'version' => '0.14'
},
{
'date' => '2007-01-25T21:40:29',
'version' => '0.16'
},
{
'date' => '2007-09-15T14:20:27',
'version' => '0.18'
},
{
'date' => '2007-10-03T15:27:25',
'version' => '0.20'
},
{
'date' => '2007-10-15T08:19:21',
'version' => '0.22'
},
{
'date' => '2008-01-02T15:57:46',
'version' => '0.24'
},
{
'date' => '2008-02-29T16:01:59',
'version' => '0.26'
},
{
'date' => '2008-12-17T12:56:57',
'version' => '0.28'
},
{
'date' => '2009-01-19T15:56:22',
'version' => '0.30'
},
{
'date' => '2009-10-23T09:16:58',
'version' => '0.31_01'
},
{
'date' => '2009-10-23T20:58:24',
'version' => '0.32'
},
{
'date' => '2009-10-29T09:27:23',
'version' => '0.34'
},
{
'date' => '2010-02-09T14:20:49',
'version' => '0.36'
},
{
'date' => '2010-04-23T15:03:33',
'version' => '0.38'
},
{
'date' => '2011-01-07T22:28:54',
'version' => '0.40'
},
{
'date' => '2011-02-09T15:29:28',
'version' => '0.42'
},
{
'date' => '2011-02-09T21:54:40',
'version' => '0.44'
},
{
'date' => '2011-09-07T23:02:16',
'version' => '0.46'
},
{
'date' => '2012-03-15T13:58:36',
'version' => '0.48'
},
{
'date' => '2012-04-27T21:29:11',
'version' => '0.50'
},
{
'date' => '2012-07-29T09:13:49',
'version' => '0.52'
},
{
'date' => '2012-08-12T08:13:47',
'version' => '0.54'
},
{
'date' => '2013-08-29T20:32:38',
'version' => '0.56'
},
{
'date' => '2013-09-01T10:25:33',
'version' => '0.58'
},
{
'date' => '2014-01-16T12:31:47',
'version' => '0.60'
},
{
'date' => '2014-01-24T15:55:28',
'version' => '0.62'
},
{
'date' => '2015-01-17T13:36:11',
'version' => '0.64'
},
{
'date' => '2016-07-27T07:37:34',
'version' => '0.66'
},
{
'date' => '2016-07-29T07:05:40',
'version' => '0.68'
},
{
'date' => '2019-11-10T14:37:30',
'version' => '0.70'
},
{
'date' => '2020-06-25T07:23:00',
'version' => '0.72'
},
{
'date' => '2020-08-21T08:09:10',
'version' => '0.74'
}
]
},
'Module-Metadata' => {
'advisories' => [
{
'affected_versions' => [
'<1.000015'
],
'cves' => [
'CVE-2013-1437'
],
'description' => 'Eval injection vulnerability in the Module-Metadata module before 1.000015 for Perl allows remote attackers to execute arbitrary Perl code via the $Version value.
',
'distribution' => 'Module-Metadata',
'fixed_versions' => [
'>=1.000015'
],
'id' => 'CPANSA-Module-Metadata-2013-1437',
'references' => [
'http://lists.fedoraproject.org/pipermail/package-announce/2013-August/114912.html',
'https://metacpan.org/changes/distribution/Module-Metadata',
'http://lists.fedoraproject.org/pipermail/package-announce/2013-August/114904.html'
],
'reported' => '2020-01-28',
'reviewed_by' => [
{
'date' => '2022-07-11',
'email' => 'rrwo@cpan.org',
'name' => 'Robert Rothenberg'
}
],
'severity' => 'critical'
}
],
'main_module' => 'Module::Metadata',
'versions' => [
{
'date' => '2010-07-06T21:16:54',
'version' => '1.000000'
},
{
'date' => '2010-07-08T23:56:47',
'version' => '1.000001'
},
{
'date' => '2010-12-10T17:07:09',
'version' => '1.000002'
},
{
'date' => '2011-01-07T02:35:06',
'version' => '1.000003'
},
{
'date' => '2011-02-03T07:55:40',
'version' => '1.000004'
},
{
'date' => '2011-08-03T01:41:05',
'version' => '1.000005'
},
{
'date' => '2011-08-29T19:48:33',
'version' => '1.000006'
},
{
'date' => '2011-09-07T16:01:55',
'version' => '1.000007'
},
{
'date' => '2012-02-08T03:31:54',
'version' => '1.000008'
},
{
'date' => '2012-02-08T17:34:49',
'version' => '1.000009'
},
{
'date' => '2012-07-29T19:21:55',
'version' => '1.000010'
},
{
'date' => '2012-08-16T00:07:05',
'version' => '1.000010_001'
},
{
'date' => '2012-08-16T00:15:02',
'version' => '1.000010_002'
},
{
'date' => '2012-08-16T04:54:55',
'version' => '1.000010_003'
},
{
'date' => '2012-08-16T19:57:31',
'version' => '1.000011'
},
{
'date' => '2013-05-05T04:59:03',
'version' => '1.000012'
},
{
'date' => '2013-05-08T23:00:33',
'version' => '1.000013'
},
{
'date' => '2013-05-09T09:02:22',
'version' => '1.000014'
},
{
'date' => '2013-08-21T15:46:56',
'version' => '1.000015'
},
{
'date' => '2013-08-22T05:59:11',
'version' => '1.000016'
},
{
'date' => '2013-09-11T01:06:02',
'version' => '1.000017'
},
{
'date' => '2013-09-11T16:28:24',
'version' => '1.000018'
},
{
'date' => '2013-10-06T16:50:13',
'version' => '1.000019'
},
{
'date' => '2014-04-27T20:57:08',
'version' => '1.000020'
},
{
'date' => '2014-04-29T18:29:51',
'version' => '1.000021'
},
{
'date' => '2014-04-29T22:06:21',
'version' => '1.000022'
},
{
'date' => '2014-06-02T02:39:20',
'version' => '1.000023'
},
{
'date' => '2014-06-03T01:54:30',
'version' => '1.000024'
},
{
'date' => '2015-01-04T18:57:40',
'version' => '1.000025'
},
{
'date' => '2015-01-17T19:23:52',
'version' => '1.000026'
},
{
'date' => '2015-04-11T00:23:53',
'version' => '1.000027'
},
{
'date' => '2015-09-11T04:25:25',
'version' => '1.000028'
},
{
'date' => '2015-09-11T16:26:57',
'version' => '1.000029'
},
{
'date' => '2015-11-20T03:05:34',
'version' => '1.000030'
},
{
'date' => '2015-11-24T03:59:40',
'version' => '1.000031'
},
{
'date' => '2016-04-23T22:38:13',
'version' => '1.000032'
},
{
'date' => '2016-07-24T23:34:48',
'version' => '1.000033'
},
{
'date' => '2018-07-19T20:31:14',
'version' => '1.000034'
},
{
'date' => '2019-04-18T02:44:48',
'version' => '1.000035'
},
{
'date' => '2019-04-18T18:27:14',
'version' => '1.000036'
},
{
'date' => '2019-09-07T18:34:09',
'version' => '1.000037'
},
{
'date' => '2023-04-28T11:27:07',
'version' => '1.000038'
}
]
},
'Module-Provision' => {
'advisories' => [
{
'affected_versions' => [
'<0.42.1'
],
'cves' => [
'CVE-2016-1238'
],
'description' => '(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.
',
'distribution' => 'Module-Provision',
'fixed_versions' => [
'>=0.42.1'
],
'id' => 'CPANSA-Module-Provision-2016-1238',
'references' => [
'http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html',
'http://www.securitytracker.com/id/1036440',
'http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab',
'https://rt.perl.org/Public/Bug/Display.html?id=127834',
'http://www.securityfocus.com/bid/92136',
'http://www.debian.org/security/2016/dsa-3628',
'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/',
'https://security.gentoo.org/glsa/201701-75',
'https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E',
'https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html',
'https://security.gentoo.org/glsa/201812-07',
'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html'
],
'reported' => '2016-08-02',
'severity' => 'high'
}
],
'main_module' => 'Module::Provision',
'versions' => [
{
'date' => '2013-04-14T19:20:34',
'version' => 'v0.3.43'
},
{
'date' => '2013-04-15T12:46:30',
'version' => 'v0.3.44'
},
{
'date' => '2013-04-15T17:33:39',
'version' => 'v0.3.45'
},
{
'date' => '2013-04-21T16:14:43',
'version' => 'v0.4.47'
},
{
'date' => '2013-04-22T15:09:36',
'version' => 'v0.4.51'
},
{
'date' => '2013-04-24T04:13:42',
'version' => 'v0.6.59'
},
{
'date' => '2013-04-24T23:34:41',
'version' => 'v0.7.4'
},
{
'date' => '2013-04-27T01:18:07',
'version' => 'v0.7.6'
},
{
'date' => '2013-04-27T11:36:59',
'version' => 'v0.7.7'
},
{
'date' => '2013-04-30T22:32:47',
'version' => 'v0.8.3'
},
{
'date' => '2013-05-02T18:45:43',
'version' => 'v0.9.5'
},
{
'date' => '2013-05-04T00:14:46',
'version' => 'v0.10.1'
},
{
'date' => '2013-05-04T20:22:41',
'version' => 'v0.11.1'
},
{
'date' => '2013-05-06T15:08:18',
'version' => 'v0.12.1'
},
{
'date' => '2013-05-08T15:51:41',
'version' => 'v0.12.3'
},
{
'date' => '2013-05-09T23:42:20',
'version' => 'v0.12.5'
},
{
'date' => '2013-05-10T19:29:24',
'version' => 'v0.12.6'
},
{
'date' => '2013-05-11T02:15:00',
'version' => 'v0.13.1'
},
{
'date' => '2013-05-11T13:59:50',
'version' => 'v0.14.2'
},
{
'date' => '2013-05-12T18:03:55',
'version' => 'v0.15.3'
},
{
'date' => '2013-05-14T12:49:37',
'version' => 'v0.15.5'
},
{
'date' => '2013-05-15T17:55:40',
'version' => 'v0.15.6'
},
{
'date' => '2013-05-15T20:59:19',
'version' => 'v0.15.7'
},
{
'date' => '2013-05-16T23:02:48',
'version' => 'v0.15.8'
},
{
'date' => '2013-05-19T12:59:15',
'version' => 'v0.15.9'
},
{
'date' => '2013-06-08T17:12:50',
'version' => 'v0.16.1'
},
{
'date' => '2013-07-28T18:42:27',
'version' => 'v0.17.16'
},
{
'date' => '2013-07-29T16:10:28',
'version' => 'v0.17.17'
},
{
'date' => '2013-07-29T23:51:34',
'version' => 'v0.17.18'
},
{
'date' => '2013-07-30T13:06:37',
'version' => 'v0.17.19'
},
{
'date' => '2013-08-07T17:56:55',
'version' => 'v0.18.0'
},
{
'date' => '2013-08-07T17:58:22',
'version' => 'v0.18.1'
},
{
'date' => '2013-08-08T13:39:44',
'version' => 'v0.18.2'
},
{
'date' => '2013-08-10T08:51:08',
'version' => 'v0.18.3'
},
{
'date' => '2013-08-10T21:18:54',
'version' => 'v0.18.4'
},
{
'date' => '2013-08-17T15:47:30',
'version' => '0.20.1'
},
{
'date' => '2013-08-21T12:36:06',
'version' => '0.21.1'
},
{
'date' => '2013-08-21T12:56:35',
'version' => '0.22.1'
},
{
'date' => '2013-09-14T09:38:12',
'version' => '0.23.1'
},
{
'date' => '2013-09-16T20:23:50',
'version' => '0.24.1'
},
{
'date' => '2013-11-23T13:38:55',
'version' => '0.25.1'
},
{
'date' => '2013-11-25T21:30:21',
'version' => '0.26.1'
},
{
'date' => '2013-12-11T17:25:32',
'version' => '0.27.1'
},
{
'date' => '2013-12-12T14:23:50',
'version' => '0.28.1'
},
{
'date' => '2013-12-12T21:54:50',
'version' => '0.29.1'
},
{
'date' => '2014-01-24T21:05:50',
'version' => '0.31.2'
},
{
'date' => '2014-05-01T14:42:10',
'version' => '0.32.1'
},
{
'date' => '2014-05-15T20:55:59',
'version' => '0.33.1'
},
{
'date' => '2014-05-19T11:47:05',
'version' => '0.34.1'
},
{
'date' => '2014-10-28T13:51:21',
'version' => '0.36.1'
},
{
'date' => '2015-02-11T17:52:30',
'version' => '0.38.1'
},
{
'date' => '2015-02-11T19:03:04',
'version' => '0.39.1'
},
{
'date' => '2015-06-08T21:47:29',
'version' => '0.40.1'
},
{
'date' => '2016-04-04T12:15:12',
'version' => '0.41.1'
},
{
'date' => '2017-05-08T19:30:17',
'version' => '0.42.1'
}
]
},
'Module-ScanDeps' => {
'advisories' => [
{
'affected_versions' => [
'<1.36'
],
'cves' => [
'CVE-2024-10224'
],
'description' => 'Qualys discovered that if unsanitized input was used with the library Modules::ScanDeps, before version 1.36 a local attacker could possibly execute arbitrary shell commands by open()ing a "pesky pipe" (such as passing "commands|" as a filename) or by passing arbitrary strings to eval().
',
'distribution' => 'Module-ScanDeps',
'fixed_versions' => [
'>=1.36'
],
'id' => 'CPANSA-Module-ScanDeps-2024-10224',
'references' => [
'https://github.com/rschupp/Module-ScanDeps/security/advisories/GHSA-g597-359q-v529',
'https://www.cve.org/CVERecord?id=CVE-2024-10224',
'https://www.qualys.com/2024/11/19/needrestart/needrestart.txt',
'https://lists.debian.org/debian-lts-announce/2024/11/msg00015.html',
'https://ubuntu.com/security/CVE-2024-10224'
],
'reported' => '2024-11-19',
'severity' => undef
}
],
'main_module' => 'Module::ScanDeps',
'versions' => [
{
'date' => '2002-11-02T02:07:07',
'version' => '0.01'
},
{
'date' => '2002-11-02T15:56:27',
'version' => '0.02'
},
{
'date' => '2002-11-03T19:51:24',
'version' => '0.03'
},
{
'date' => '2002-11-04T12:01:46',
'version' => '0.10'
},
{
'date' => '2003-01-18T19:35:58',
'version' => '0.12'
},
{
'date' => '2003-01-18T21:08:58',
'version' => '0.13'
},
{
'date' => '2003-01-19T15:48:47',
'version' => '0.14'
},
{
'date' => '2003-02-25T03:23:37',
'version' => '0.17'
},
{
'date' => '2003-03-20T11:59:13',
'version' => '0.18'
},
{
'date' => '2003-03-22T13:20:27',
'version' => '0.19'
},
{
'date' => '2003-07-30T14:59:45',
'version' => '0.20'
},
{
'date' => '2003-07-30T15:18:11',
'version' => '0.21'
},
{
'date' => '2003-08-07T18:41:51',
'version' => '0.22'
},
{
'date' => '2003-08-08T10:19:27',
'version' => '0.23'
},
{
'date' => '2003-08-10T05:43:06',
'version' => '0.24'
},
{
'date' => '2003-08-10T15:46:55',
'version' => '0.25'
},
{
'date' => '2003-08-16T04:48:20',
'version' => '0.27'
},
{
'date' => '2003-08-17T19:03:59',
'version' => '0.28'
},
{
'date' => '2003-09-17T09:18:20',
'version' => '0.29'
},
{
'date' => '2003-09-20T20:36:32',
'version' => '0.30'
},
{
'date' => '2003-10-17T22:37:35',
'version' => '0.31'
},
{
'date' => '2003-10-26T10:53:58',
'version' => '0.32'
},
{
'date' => '2003-12-21T01:21:51',
'version' => '0.33'
},
{
'date' => '2003-12-30T02:36:30',
'version' => '0.34'
},
{
'date' => '2003-12-31T12:02:59',
'version' => '0.35'
},
{
'date' => '2003-12-31T15:33:07',
'version' => '0.37'
},
{
'date' => '2004-01-08T11:38:10',
'version' => '0.38'
},
{
'date' => '2004-01-25T16:28:12',
'version' => '0.39'
},
{
'date' => '2004-02-23T21:14:41',
'version' => '0.40'
},
{
'date' => '2004-04-18T16:05:29',
'version' => '0.41'
},
{
'date' => '2004-04-30T20:02:44',
'version' => '0.42'
},
{
'date' => '2004-06-02T18:05:32',
'version' => '0.43'
},
{
'date' => '2004-06-08T19:06:29',
'version' => '0.44'
},
{
'date' => '2004-06-30T08:03:18',
'version' => '0.45'
},
{
'date' => '2004-07-02T10:35:16',
'version' => '0.46'
},
{
'date' => '2004-08-30T22:13:57',
'version' => '0.47'
},
{
'date' => '2004-09-06T20:56:31',
'version' => '0.48'
},
{
'date' => '2004-09-26T17:45:11',
'version' => '0.49'
},
{
'date' => '2004-10-03T17:31:23',
'version' => '0.50'
},
{
'date' => '2005-01-07T20:57:46',
'version' => '0.51'
},
{
'date' => '2005-12-12T12:05:41',
'version' => '0.52'
},
{
'date' => '2006-01-09T18:07:40',
'version' => '0.53'
},
{
'date' => '2006-01-11T03:19:40',
'version' => '0.54'
},
{
'date' => '2006-02-17T16:39:23',
'version' => '0.55'
},
{
'date' => '2006-02-20T15:38:03',
'version' => '0.56'
},
{
'date' => '2006-03-03T19:30:56',
'version' => '0.57'
},
{
'date' => '2006-04-16T14:54:53',
'version' => '0.58'
},
{
'date' => '2006-05-03T09:13:49',
'version' => '0.59'
},
{
'date' => '2006-05-23T15:29:09',
'version' => '0.60'
},
{
'date' => '2006-06-30T19:12:26',
'version' => '0.61'
},
{
'date' => '2006-07-16T09:25:37',
'version' => '0.62'
},
{
'date' => '2006-08-27T17:26:32',
'version' => '0.63'
},
{
'date' => '2006-09-23T07:46:41',
'version' => '0.64'
},
{
'date' => '2006-09-24T07:59:07',
'version' => '0.64'
},
{
'date' => '2006-09-24T09:03:21',
'version' => '0.66'
},
{
'date' => '2006-10-24T16:12:59',
'version' => '0.67'
},
{
'date' => '2006-10-25T19:08:27',
'version' => '0.68'
},
{
'date' => '2006-11-07T18:16:07',
'version' => '0.69'
},
{
'date' => '2006-11-21T11:00:52',
'version' => '0.70'
},
{
'date' => '2007-01-04T19:28:34',
'version' => '0.71'
},
{
'date' => '2007-02-03T10:40:10',
'version' => '0.72'
},
{
'date' => '2007-03-25T18:35:04',
'version' => '0.73'
},
{
'date' => '2007-04-14T09:17:51',
'version' => '0.73_01'
},
{
'date' => '2007-04-30T18:45:05',
'version' => '0.74'
},
{
'date' => '2007-06-24T17:25:22',
'version' => '0.75'
},
{
'date' => '2007-07-21T15:40:54',
'version' => '0.76'
},
{
'date' => '2007-09-20T17:42:07',
'version' => '0.77'
},
{
'date' => '2007-11-17T04:18:23',
'version' => '0.78'
},
{
'date' => '2007-11-30T21:08:01',
'version' => '0.80'
},
{
'date' => '2007-12-07T13:24:35',
'version' => '0.81'
},
{
'date' => '2008-01-28T16:33:27',
'version' => '0.82'
},
{
'date' => '2008-03-22T23:35:16',
'version' => '0.83'
},
{
'date' => '2008-05-13T14:39:03',
'version' => '0.84'
},
{
'date' => '2008-10-23T13:17:33',
'version' => '0.86'
},
{
'date' => '2008-10-28T13:10:35',
'version' => '0.87'
},
{
'date' => '2008-11-02T16:06:00',
'version' => '0.83'
},
{
'date' => '2008-11-03T21:38:03',
'version' => '0.83'
},
{
'date' => '2009-05-09T09:09:37',
'version' => '0.90'
},
{
'date' => '2009-06-22T20:07:07',
'version' => '0.91'
},
{
'date' => '2009-07-19T08:55:54',
'version' => '0.92'
},
{
'date' => '2009-07-19T09:51:33',
'version' => '0.93'
},
{
'date' => '2009-08-10T18:32:02',
'version' => '0.94'
},
{
'date' => '2009-09-16T09:14:53',
'version' => '0.95'
},
{
'date' => '2009-11-13T10:36:02',
'version' => '0.96'
},
{
'date' => '2010-04-10T15:20:47',
'version' => '0.97'
},
{
'date' => '2010-07-26T19:24:02',
'version' => '0.98'
},
{
'date' => '2011-02-19T16:00:01',
'version' => '1.00'
},
{
'date' => '2011-03-26T12:51:17',
'version' => '1.01'
},
{
'date' => '2011-04-03T19:59:22',
'version' => '1.02'
},
{
'date' => '2011-07-18T21:29:19',
'version' => '1.03'
},
{
'date' => '2011-07-21T09:09:46',
'version' => '1.04'
},
{
'date' => '2011-11-02T18:31:39',
'version' => '1.05'
},
{
'date' => '2011-11-28T15:50:49',
'version' => '1.06'
},
{
'date' => '2011-11-29T18:02:00',
'version' => '1.07'
},
{
'date' => '2012-02-21T16:07:41',
'version' => '1.08'
},
{
'date' => '2012-09-09T11:14:11',
'version' => '1.09'
},
{
'date' => '2012-10-20T14:15:34',
'version' => '1.10'
},
{
'date' => '2013-09-28T10:27:58',
'version' => '1.11'
},
{
'date' => '2013-12-01T14:49:13',
'version' => '1.12'
},
{
'date' => '2013-12-21T12:07:54',
'version' => '1.13'
},
{
'date' => '2014-08-03T11:34:45',
'version' => '1.14'
},
{
'date' => '2014-08-23T15:39:26',
'version' => '1.15'
},
{
'date' => '2014-09-28T16:17:32',
'version' => '1.16'
},
{
'date' => '2014-10-31T11:13:34',
'version' => '1.17'
},
{
'date' => '2015-01-19T21:56:34',
'version' => '1.18'
},
{
'date' => '2015-05-27T08:53:42',
'version' => '1.19'
},
{
'date' => '2015-10-04T13:18:36',
'version' => '1.20'
},
{
'date' => '2016-04-05T10:11:15',
'version' => '1.21'
},
{
'date' => '2016-09-17T20:57:48',
'version' => '1.22'
},
{
'date' => '2016-11-16T19:46:41',
'version' => '1.23'
},
{
'date' => '2017-06-28T17:13:27',
'version' => '1.24'
},
{
'date' => '2018-08-17T22:21:56',
'version' => '1.25'
},
{
'date' => '2018-12-12T17:38:39',
'version' => '1.26'
},
{
'date' => '2018-12-13T17:16:52',
'version' => '1.26_001'
},
{
'date' => '2019-01-15T20:08:40',
'version' => '1.27'
},
{
'date' => '2020-08-06T08:02:24',
'version' => '1.28'
},
{
'date' => '2020-08-16T12:35:20',
'version' => '1.29'
},
{
'date' => '2021-01-13T15:02:27',
'version' => '1.30'
},
{
'date' => '2021-04-21T14:17:01',
'version' => '1.31'
},
{
'date' => '2023-06-14T09:30:00',
'version' => '1.31_001'
},
{
'date' => '2023-06-15T11:55:12',
'version' => '1.31_002'
},
{
'date' => '2023-06-16T09:04:27',
'version' => '1.31_003'
},
{
'date' => '2023-06-18T10:34:43',
'version' => '1.31_004'
},
{
'date' => '2023-07-05T15:58:09',
'version' => '1.32'
},
{
'date' => '2023-08-04T15:50:23',
'version' => '1.33'
},
{
'date' => '2023-09-24T15:21:05',
'version' => '1.34'
},
{
'date' => '2023-11-05T12:46:38',
'version' => '1.35'
},
{
'date' => '2024-11-19T16:12:58',
'version' => '1.37'
}
]
},
'Module-Signature' => {
'advisories' => [
{
'affected_versions' => [
'<0.72'
],
'cves' => [
'CVE-2013-2145'
],
'description' => 'The cpansign verify functionality in the Module::Signature module before 0.72 for Perl allows attackers to bypass the signature check and execute arbitrary code via a SIGNATURE file with a "special unknown cipher" that references an untrusted module in Digest/.
',
'distribution' => 'Module-Signature',
'fixed_versions' => [
'>=0.72'
],
'id' => 'CPANSA-Module-Signature-2013-01',
'references' => [
'https://metacpan.org/changes/distribution/Module-Signature'
],
'reported' => '2013-08-19'
}
],
'main_module' => 'Module::Signature',
'versions' => [
{
'date' => '2002-08-13T14:04:00',
'version' => '0.02'
},
{
'date' => '2002-08-13T15:48:18',
'version' => '0.03'
},
{
'date' => '2002-08-14T08:03:45',
'version' => '0.04'
},
{
'date' => '2002-08-14T09:28:41',
'version' => '0.05'
},
{
'date' => '2002-10-10T15:22:33',
'version' => '0.06'
},
{
'date' => '2002-10-11T04:16:01',
'version' => '0.07'
},
{
'date' => '2002-10-11T19:32:19',
'version' => '0.08'
},
{
'date' => '2002-10-12T10:33:29',
'version' => '0.09'
},
{
'date' => '2002-10-12T11:10:21',
'version' => '0.10'
},
{
'date' => '2002-10-12T19:23:48',
'version' => '0.11'
},
{
'date' => '2002-10-12T22:55:54',
'version' => '0.12'
},
{
'date' => '2002-10-13T05:22:45',
'version' => '0.13'
},
{
'date' => '2002-10-17T06:14:07',
'version' => '0.14'
},
{
'date' => '2002-10-17T22:01:57',
'version' => '0.15'
},
{
'date' => '2002-10-28T23:37:00',
'version' => '0.16'
},
{
'date' => '2002-10-30T07:05:06',
'version' => '0.17'
},
{
'date' => '2002-11-04T15:08:41',
'version' => '0.18'
},
{
'date' => '2002-11-04T15:13:45',
'version' => '0.19'
},
{
'date' => '2002-11-04T15:24:41',
'version' => '0.20'
},
{
'date' => '2002-11-22T10:28:48',
'version' => '0.21'
},
{
'date' => '2003-05-15T18:44:28',
'version' => '0.23'
},
{
'date' => '2003-07-08T02:49:57',
'version' => '0.24'
},
{
'date' => '2003-07-16T06:31:58',
'version' => '0.25'
},
{
'date' => '2003-07-17T14:03:19',
'version' => '0.26'
},
{
'date' => '2003-07-28T14:31:54',
'version' => '0.27'
},
{
'date' => '2003-07-29T15:30:55',
'version' => '0.28'
},
{
'date' => '2003-08-08T02:54:01',
'version' => '0.29'
},
{
'date' => '2003-08-10T13:35:38',
'version' => '0.30'
},
{
'date' => '2003-08-10T17:17:19',
'version' => '0.31'
},
{
'date' => '2003-08-11T09:15:13',
'version' => '0.32'
},
{
'date' => '2003-08-12T04:11:59',
'version' => '0.33'
},
{
'date' => '2003-08-18T15:32:45',
'version' => '0.34'
},
{
'date' => '2003-08-27T07:08:31',
'version' => '0.35'
},
{
'date' => '2003-10-28T04:22:56',
'version' => '0.36'
},
{
'date' => '2003-11-06T10:55:07',
'version' => '0.37'
},
{
'date' => '2004-01-01T10:14:15',
'version' => '0.38'
},
{
'date' => '2004-06-17T15:17:14',
'version' => '0.39'
},
{
'date' => '2004-07-01T12:18:17',
'version' => '0.40'
},
{
'date' => '2004-07-04T08:19:11',
'version' => '0.41'
},
{
'date' => '2004-11-20T06:19:22',
'version' => '0.42'
},
{
'date' => '2004-12-16T06:45:55',
'version' => '0.43'
},
{
'date' => '2004-12-16T07:17:30',
'version' => '0.44'
},
{
'date' => '2005-08-09T04:23:46',
'version' => '0.45'
},
{
'date' => '2005-08-21T08:16:22',
'version' => '0.50'
},
{
'date' => '2006-01-01T18:41:57',
'version' => '0.51'
},
{
'date' => '2006-01-18T16:32:37',
'version' => '0.52'
},
{
'date' => '2006-01-31T05:02:24',
'version' => '0.53'
},
{
'date' => '2006-05-11T17:12:46',
'version' => '0.54'
},
{
'date' => '2006-07-30T01:15:07',
'version' => '0.55'
},
{
'date' => '2009-11-16T14:59:35',
'version' => '0.60'
},
{
'date' => '2009-11-18T16:58:07',
'version' => '0.61'
},
{
'date' => '2010-03-23T21:21:37',
'version' => '0.62'
},
{
'date' => '2010-03-28T02:49:21',
'version' => '0.62'
},
{
'date' => '2010-05-08T22:55:43',
'version' => '0.62'
},
{
'date' => '2010-09-03T19:55:36',
'version' => '0.65'
},
{
'date' => '2010-09-06T20:58:24',
'version' => '0.66'
},
{
'date' => '2011-04-17T15:09:22',
'version' => '0.67'
},
{
'date' => '2011-05-13T09:55:20',
'version' => '0.68'
},
{
'date' => '2012-11-02T15:20:28',
'version' => '0.69'
},
{
'date' => '2012-11-28T17:49:21',
'version' => '0.70'
},
{
'date' => '2013-06-04T10:29:18',
'version' => '0.71'
},
{
'date' => '2013-06-05T15:21:34',
'version' => '0.72'
},
{
'date' => '2013-06-05T20:57:10',
'version' => '0.73'
},
{
'date' => '2015-04-06T18:39:32',
'version' => '0.74'
},
{
'date' => '2015-04-06T20:58:34',
'version' => '0.75'
},
{
'date' => '2015-04-08T10:13:11',
'version' => '0.76'
},
{
'date' => '2015-04-08T11:47:26',
'version' => '0.77'
},
{
'date' => '2015-04-09T09:00:30',
'version' => '0.78'
},
{
'date' => '2015-05-18T15:18:02',
'version' => '0.79'
},
{
'date' => '2016-06-07T06:36:30',
'version' => '0.80'
},
{
'date' => '2016-09-05T06:41:06',
'version' => '0.81'
},
{
'date' => '2018-08-26T15:19:13',
'version' => '0.81'
},
{
'date' => '2018-08-29T08:35:25',
'version' => '0.83'
},
{
'date' => '2020-06-25T13:01:10',
'version' => '0.84'
},
{
'date' => '2020-06-25T13:10:23',
'version' => '0.86'
},
{
'date' => '2020-07-04T07:16:32',
'version' => '0.87'
},
{
'date' => '2021-12-18T03:39:32',
'version' => '0.87'
},
{
'date' => '2024-09-14T13:57:16',
'version' => '0.89'
},
{
'date' => '2024-09-15T22:11:10',
'version' => '0.89'
}
]
},
'Mojo-DOM-Role-Analyzer' => {
'advisories' => [
{
'affected_versions' => [
'<=0.015'
],
'cves' => [
'CVE-2024-38526'
],
'description' => 'pdoc provides API Documentation for Python Projects. Documentation generated with `pdoc --math` linked to JavaScript files from polyfill.io. The polyfill.io CDN has been sold and now serves malicious code. This issue has been fixed in pdoc 14.5.1.
',
'distribution' => 'Mojo-DOM-Role-Analyzer',
'embedded_vulnerability' => {
'distributed_version' => undef,
'name' => 'polyfill.io'
},
'fixed_versions' => [],
'id' => 'CPANSA-Mojo-DOM-Role-Analyzer-2024-38526',
'references' => [
'https://github.com/mitmproxy/pdoc/pull/703',
'https://github.com/mitmproxy/pdoc/security/advisories/GHSA-5vgj-ggm4-fg62',
'https://sansec.io/research/polyfill-supply-chain-attack',
'https://github.com/briandfoy/cpan-security-advisory/issues/155',
'https://github.com/sdondley/Mojo-DOM-Role-Analyzer/issues/10',
'https://stackdiary.com/polyfill-compromise-hits-100000-sites-in-a-supply-chain-attack/'
],
'reported' => '2024-06-26',
'severity' => undef
}
],
'main_module' => 'Mojo::DOM::Role::Analyzer',
'versions' => [
{
'date' => '2020-08-04T22:48:59',
'version' => '0.007'
},
{
'date' => '2020-08-05T13:43:47',
'version' => '0.008'
},
{
'date' => '2020-08-06T02:47:29',
'version' => '0.009'
},
{
'date' => '2020-08-08T13:39:18',
'version' => '0.010'
},
{
'date' => '2020-08-09T13:43:20',
'version' => '0.011'
},
{
'date' => '2020-08-09T23:37:24',
'version' => '0.012'
},
{
'date' => '2020-08-12T03:21:57',
'version' => '0.013'
},
{
'date' => '2020-08-13T21:09:19',
'version' => '0.014'
},
{
'date' => '2020-08-16T15:39:17',
'version' => '0.015'
}
]
},
'MojoMojo' => {
'advisories' => [
{
'affected_versions' => [
'<0.999033'
],
'cves' => [],
'description' => 'Anonymous users can delete attachments.
',
'distribution' => 'MojoMojo',
'fixed_versions' => [
'>=0.999033'
],
'id' => 'CPANSA-MojoMojo-2009-01',
'references' => [
'https://metacpan.org/changes/distribution/MojoMojo',
'https://github.com/mojomojo/mojomojo/commit/a9b9fd4f4f037627d30f3cbaa10abe42a3439637'
],
'reported' => '2009-08-14'
}
],
'main_module' => 'MojoMojo',
'versions' => [
{
'date' => '2007-08-29T14:32:52',
'version' => '0.05'
},
{
'date' => '2007-09-12T21:46:24',
'version' => '0.05'
},
{
'date' => '2007-09-13T11:28:37',
'version' => '0.05'
},
{
'date' => '2007-09-18T07:33:43',
'version' => '0.999004'
},
{
'date' => '2007-09-18T08:02:02',
'version' => '0.999005'
},
{
'date' => '2007-09-19T20:59:39',
'version' => '0.999006'
},
{
'date' => '2007-09-23T23:30:59',
'version' => '0.999007'
},
{
'date' => '2007-11-12T22:25:35',
'version' => '0.999008'
},
{
'date' => '2008-01-20T23:15:07',
'version' => '0.999010'
},
{
'date' => '2008-01-23T23:00:05',
'version' => '0.999011'
},
{
'date' => '2008-02-05T23:20:47',
'version' => '0.999012'
},
{
'date' => '2008-03-05T00:34:49',
'version' => '0.999013'
},
{
'date' => '2008-05-02T18:11:49',
'version' => '0.999014'
},
{
'date' => '2008-05-03T16:10:08',
'version' => '0.999015'
},
{
'date' => '2008-06-29T13:03:39',
'version' => '0.999016'
},
{
'date' => '2008-07-09T14:26:56',
'version' => '0.999017'
},
{
'date' => '2008-07-16T19:26:46',
'version' => '0.999018'
},
{
'date' => '2008-07-19T21:33:36',
'version' => '0.999018'
},
{
'date' => '2008-07-29T16:25:08',
'version' => '0.999018'
},
{
'date' => '2008-11-01T01:04:37',
'version' => '0.999021'
},
{
'date' => '2008-11-15T09:09:37',
'version' => '0.999022'
},
{
'date' => '2008-11-23T16:45:05',
'version' => '0.999023'
},
{
'date' => '2008-12-31T17:53:50',
'version' => '0.999024'
},
{
'date' => '2009-01-04T22:51:40',
'version' => '0.999025'
},
{
'date' => '2009-01-07T23:28:15',
'version' => '0.999026'
},
{
'date' => '2009-01-30T23:29:25',
'version' => '0.999027'
},
{
'date' => '2009-04-23T10:06:20',
'version' => '0.999028'
},
{
'date' => '2009-05-09T23:21:10',
'version' => '0.999029'
},
{
'date' => '2009-07-18T19:39:14',
'version' => '0.999030'
},
{
'date' => '2009-07-26T19:39:37',
'version' => '0.999031'
},
{
'date' => '2009-08-02T21:28:51',
'version' => '0.999032'
},
{
'date' => '2009-08-14T12:50:18',
'version' => '0.999033'
},
{
'date' => '2009-09-04T18:27:34',
'version' => '0.999040'
},
{
'date' => '2009-10-26T16:07:25',
'version' => '0.999041'
},
{
'date' => '2009-12-02T08:22:24',
'version' => '0.999042'
},
{
'date' => '2010-05-11T22:58:19',
'version' => '1.00'
},
{
'date' => '2010-05-27T07:44:39',
'version' => '1.01'
},
{
'date' => '2010-08-30T21:24:41',
'version' => '1.02'
},
{
'date' => '2011-01-13T12:48:10',
'version' => '1.03'
},
{
'date' => '2011-03-12T23:37:45',
'version' => '1.04'
},
{
'date' => '2011-09-14T10:09:05',
'version' => '1.05'
},
{
'date' => '2012-08-07T10:39:42',
'version' => '1.06'
},
{
'date' => '2012-11-12T23:30:00',
'version' => '1.07'
},
{
'date' => '2013-01-06T07:46:41',
'version' => '1.08'
},
{
'date' => '2013-01-25T16:06:42',
'version' => '1.09'
},
{
'date' => '2013-05-12T22:59:03',
'version' => '1.10'
},
{
'date' => '2014-12-25T17:13:24',
'version' => '1.11'
},
{
'date' => '2017-05-13T13:47:52',
'version' => '1.12'
}
]
},
'Mojolicious' => {
'advisories' => [
{
'affected_versions' => [
'<9.31'
],
'cves' => [],
'description' => 'Mojo::DOM did not correctly parse <script> tags.
',
'distribution' => 'Mojolicious',
'fixed_versions' => [
'>=9.31'
],
'id' => 'CPANSA-Mojolicious-2022-03',
'references' => [
'https://github.com/mojolicious/mojo/commit/6f195d85db6756022d3599f7d2634975688c9550',
'https://github.com/mojolicious/mojo/issues/2014',
'https://github.com/mojolicious/mojo/issues/2015'
],
'reported' => '2022-12-10',
'severity' => undef
},
{
'affected_versions' => [
'<9.19'
],
'cves' => [],
'description' => 'Small sessions could be used as part of a brute-force attack to decode the session secret.
',
'distribution' => 'Mojolicious',
'fixed_versions' => [],
'id' => 'CPANSA-Mojolicious-2021-02',
'references' => [
'https://github.com/mojolicious/mojo/pull/1791'
],
'reported' => '2021-06-01',
'severity' => undef
},
{
'affected_versions' => [
'<9.11'
],
'cves' => [
'CVE-2021-47208'
],
'description' => 'A bug in format detection can potentially be exploited for a DoS attack.
',
'distribution' => 'Mojolicious',
'fixed_versions' => [],
'id' => 'CPANSA-Mojolicious-2021-01',
'references' => [
'https://github.com/mojolicious/mojo/issues/1736',
'https://github.com/mojolicious/mojo/commit/a0c4576ffb11c235088550de9ba7ac4196e1953c'
],
'reported' => '2021-03-16',
'severity' => undef
},
{
'affected_versions' => [
'>1.74,<8.65'
],
'cves' => [
'CVE-2020-36829'
],
'description' => 'Mojo::Util secure_compare can leak the string length. By immediately returning when the two strings are not the same length, the function allows an attacker to guess the length of the secret string using timing attacks.
',
'distribution' => 'Mojolicious',
'fixed_versions' => [],
'id' => 'CPANSA-Mojolicious-2020-01',
'references' => [
'https://github.com/mojolicious/mojo/pull/1601'
],
'reported' => '2020-11-10',
'reviewed_by' => [
{
'date' => '2022-06-22',
'email' => 'rrwo@cpan.org',
'name' => 'Robert Rothenberg'
}
],
'severity' => undef
},
{
'affected_versions' => [
'>7.83,<7.92'
],
'cves' => [],
'description' => 'This release reverts the addition of stream classes (added in 7.83), which have unfortunately resulted in many Mojolicious applications becoming unstable. While there are no known exploits yet, we\'ve chosen to err on the side of cautiousness and will classify this as a security issue.
',
'distribution' => 'Mojolicious',
'fixed_versions' => [],
'id' => 'CPANSA-Mojolicious-2018-04',
'references' => [
'https://github.com/mojolicious/mojo/commit/61f6cbf22c7bf8eb4787bd1014d91ee2416c73e7'
],
'reported' => '2018-08-09',
'severity' => 'critical'
},
{
'affected_versions' => [
'<7.80'
],
'cves' => [],
'description' => 'Mojo::UserAgent was not checking peer SSL certificates by default.
',
'distribution' => 'Mojolicious',
'fixed_versions' => [],
'id' => 'CPANSA-Mojolicious-2018-03',
'references' => [
'https://github.com/mojolicious/mojo/pull/1226',
'https://github.com/mojolicious/mojo/commit/d3cbbad890673612fdbdea63fdd522b516f6104c'
],
'reported' => '2018-05-19',
'severity' => 'high'
},
{
'affected_versions' => [
'<7.78'
],
'cves' => [],
'description' => 'GET requests with embedded backslashes can be used to access local files on Windows hosts
',
'distribution' => 'Mojolicious',
'fixed_versions' => [],
'id' => 'CPANSA-Mojolicious-2018-02',
'references' => [
'https://github.com/mojolicious/mojo/pull/1217',
'https://github.com/mojolicious/mojo/commit/23ebe051d9378f0f122e3c908845fc0c2cae0106'
],
'reported' => '2018-05-11',
'severity' => 'critical'
},
{
'affected_versions' => [
'<7.66'
],
'cves' => [
'CVE-2018-25100'
],
'description' => 'Mojo::UserAgent::CookieJar leaks old cookies because of the missing host_only flag on empty domain.
',
'distribution' => 'Mojolicious',
'fixed_versions' => [],
'id' => 'CPANSA-Mojolicious-2018-01',
'references' => [
'https://github.com/mojolicious/mojo/pull/1192',
'https://github.com/mojolicious/mojo/issues/1185',
'https://github.com/mojolicious/mojo/commit/c16a56a9d6575ddc53d15e76d58f0ebcb0eeb149'
],
'reported' => '2018-02-13',
'severity' => 'minor'
},
{
'affected_versions' => [
'<5.76'
],
'cves' => [],
'description' => 'Directory traversal on Windows
',
'distribution' => 'Mojolicious',
'fixed_versions' => [],
'id' => 'CPANSA-Mojolicious-2015-01',
'references' => [
'https://github.com/mojolicious/mojo/issues/738',
'https://github.com/mojolicious/mojo/commit/9ffa38fca73a9ddee91cbc70e0696268d500edde'
],
'reported' => '2015-02-02',
'severity' => 'critical'
},
{
'affected_versions' => [
'<5.48'
],
'cves' => [],
'description' => 'Context sensitivity of method param could lead to parameter injection attacks.
',
'distribution' => 'Mojolicious',
'fixed_versions' => [],
'id' => 'CPANSA-Mojolicious-2014-01',
'references' => [
'https://github.com/mojolicious/mojo/commit/a815d4797145f872ef6e9f1270841eda1d410afb'
],
'reported' => '2014-10-07',
'severity' => 'high'
},
{
'affected_versions' => [
'<1.16'
],
'cves' => [
'CVE-2011-1589'
],
'description' => 'Directory traversal vulnerability in Path.pm in Mojolicious before 1.16 allows remote attackers to read arbitrary files via a %2f..%2f (encoded slash dot dot slash) in a URI.
',
'distribution' => 'Mojolicious',
'fixed_versions' => [],
'id' => 'CPANSA-Mojolicious-2011-02',
'references' => [
'https://github.com/mojolicious/mojo/commit/b09854988c5b5b6a2ba53cc8661c4b2677da3818',
'https://www.cvedetails.com/cve/CVE-2011-1589/'
],
'reported' => '2011-04-05',
'severity' => 'critical'
},
{
'affected_versions' => [
'<1.12'
],
'cves' => [
'CVE-2011-1841'
],
'description' => 'Mojolicious is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by link_to helper. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim\'s Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim\'s cookie-based authentication credentials.
',
'distribution' => 'Mojolicious',
'fixed_versions' => [],
'id' => 'CPANSA-Mojolicious-2011-01',
'references' => [
'https://exchange.xforce.ibmcloud.com/vulnerabilities/67257',
'https://www.debian.org/security/2011/dsa-2239',
'https://github.com/mojolicious/mojo/commit/f6801ef7be8c78092e38f870b19fae3da0899d60'
],
'reported' => '2011-03-10',
'severity' => 'high'
},
{
'affected_versions' => [
'<0.999927'
],
'cves' => [
'CVE-2010-4803'
],
'description' => 'Mojolicious before 0.999927 does not properly implement HMAC-MD5 checksums, which has unspecified impact and remote attack vectors.
',
'distribution' => 'Mojolicious',
'fixed_versions' => [],
'id' => 'CPANSA-Mojolicious-2010-4803',
'references' => [
'http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes',
'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952',
'http://www.debian.org/security/2011/dsa-2239'
],
'reported' => '2011-05-03',
'severity' => undef
},
{
'affected_versions' => [
'<0.999928'
],
'cves' => [
'CVE-2010-4802'
],
'description' => 'Commands.pm in Mojolicious before 0.999928 does not properly perform CGI environment detection, which has unspecified impact and remote attack vectors.
',
'distribution' => 'Mojolicious',
'fixed_versions' => [],
'id' => 'CPANSA-Mojolicious-2010-4802',
'references' => [
'https://github.com/kraih/mojo/commit/b3a1fb453eda447c0bb082cd9eed81bb75a7564a',
'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622952',
'https://github.com/kraih/mojo/commit/aa7c8da54b1ebd4ccb64aa66dede7b7cdb381c44',
'http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes',
'http://www.debian.org/security/2011/dsa-2239'
],
'reported' => '2011-05-03',
'severity' => undef
},
{
'affected_versions' => [
'<1.12'
],
'cves' => [
'CVE-2011-1841'
],
'description' => 'Cross-site scripting (XSS) vulnerability in the link_to helper in Mojolicious before 1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
',
'distribution' => 'Mojolicious',
'fixed_versions' => [
'>=1.12'
],
'id' => 'CPANSA-Mojolicious-2011-1841',
'references' => [
'http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes',
'http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060122.html',
'http://www.debian.org/security/2011/dsa-2239',
'http://www.securityfocus.com/bid/47713',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/67257'
],
'reported' => '2011-05-03',
'severity' => undef
},
{
'affected_versions' => [
'<0.991250'
],
'cves' => [
'CVE-2009-5074'
],
'description' => 'Unspecified vulnerability in the MojoX::Dispatcher::Static implementation in Mojolicious before 0.991250 has unknown impact and attack vectors.
',
'distribution' => 'Mojolicious',
'fixed_versions' => [
'>0.991250'
],
'id' => 'CPANSA-Mojolicious-2009-5074',
'references' => [
'http://cpansearch.perl.org/src/KRAIH/Mojolicious-1.20/Changes'
],
'reported' => '2011-05-03',
'severity' => undef
}
],
'main_module' => 'Mojolicious',
'versions' => [
{
'date' => '2010-02-11T02:04:14',
'version' => '0.999920'
},
{
'date' => '2010-02-11T02:55:03',
'version' => '0.999921'
},
{
'date' => '2010-02-26T18:50:34',
'version' => '0.999922'
},
{
'date' => '2010-03-08T20:03:52',
'version' => '0.999923'
},
{
'date' => '2010-03-20T22:56:55',
'version' => '0.999924'
},
{
'date' => '2010-06-07T22:33:12',
'version' => '0.999925'
},
{
'date' => '2010-06-11T10:33:01',
'version' => '0.999926'
},
{
'date' => '2010-08-15T13:48:19',
'version' => '0.999927'
},
{
'date' => '2010-08-17T17:41:47',
'version' => '0.999928'
},
{
'date' => '2010-08-17T17:54:45',
'version' => '0.999929'
},
{
'date' => '2010-10-19T13:57:49',
'version' => '0.999930'
},
{
'date' => '2010-10-26T04:44:54',
'version' => '0.999931'
},
{
'date' => '2010-10-30T00:54:42',
'version' => '0.999932'
},
{
'date' => '2010-10-30T19:46:09',
'version' => '0.999933'
},
{
'date' => '2010-11-01T00:33:14',
'version' => '0.999934'
},
{
'date' => '2010-11-03T20:34:11',
'version' => '0.999935'
},
{
'date' => '2010-11-04T23:48:46',
'version' => '0.999936'
},
{
'date' => '2010-11-09T20:13:52',
'version' => '0.999937'
},
{
'date' => '2010-11-09T21:24:17',
'version' => '0.999938'
},
{
'date' => '2010-11-15T17:56:49',
'version' => '0.999939'
},
{
'date' => '2010-11-15T23:18:40',
'version' => '0.999940'
},
{
'date' => '2010-11-19T14:22:51',
'version' => '0.999941'
},
{
'date' => '2010-12-01T18:57:50',
'version' => '0.999950'
},
{
'date' => '2010-12-26T14:55:33',
'version' => '1.0'
},
{
'date' => '2011-01-06T12:00:46',
'version' => '1.01'
},
{
'date' => '2011-02-14T03:22:27',
'version' => '1.1'
},
{
'date' => '2011-02-18T17:07:03',
'version' => '1.11'
},
{
'date' => '2011-03-10T10:05:32',
'version' => '1.12'
},
{
'date' => '2011-03-14T11:58:23',
'version' => '1.13'
},
{
'date' => '2011-03-17T13:24:28',
'version' => '1.14'
},
{
'date' => '2011-03-18T18:31:34',
'version' => '1.15'
},
{
'date' => '2011-04-15T09:07:17',
'version' => '1.16'
},
{
'date' => '2011-04-18T21:49:07',
'version' => '1.17'
},
{
'date' => '2011-04-19T21:03:20',
'version' => '1.18'
},
{
'date' => '2011-04-19T22:17:44',
'version' => '1.19'
},
{
'date' => '2011-04-20T10:39:46',
'version' => '1.20'
},
{
'date' => '2011-04-20T15:29:17',
'version' => '1.21'
},
{
'date' => '2011-05-02T07:00:00',
'version' => '1.22'
},
{
'date' => '2011-05-08T17:00:10',
'version' => '1.31'
},
{
'date' => '2011-05-11T13:29:59',
'version' => '1.32'
},
{
'date' => '2011-05-20T12:32:57',
'version' => '1.33'
},
{
'date' => '2011-05-22T13:20:40',
'version' => '1.34'
},
{
'date' => '2011-06-02T09:03:36',
'version' => '1.4'
},
{
'date' => '2011-06-03T10:12:43',
'version' => '1.41'
},
{
'date' => '2011-06-09T14:12:56',
'version' => '1.42'
},
{
'date' => '2011-06-13T14:05:24',
'version' => '1.43'
},
{
'date' => '2011-06-18T18:14:22',
'version' => '1.44'
},
{
'date' => '2011-06-20T00:25:16',
'version' => '1.45'
},
{
'date' => '2011-06-21T04:56:47',
'version' => '1.46'
},
{
'date' => '2011-06-22T13:03:42',
'version' => '1.47'
},
{
'date' => '2011-06-24T12:01:47',
'version' => '1.48'
},
{
'date' => '2011-06-30T15:18:18',
'version' => '1.49'
},
{
'date' => '2011-07-01T10:26:00',
'version' => '1.50'
},
{
'date' => '2011-07-01T13:59:47',
'version' => '1.51'
},
{
'date' => '2011-07-01T17:48:50',
'version' => '1.52'
},
{
'date' => '2011-07-02T11:48:49',
'version' => '1.53'
},
{
'date' => '2011-07-03T18:04:37',
'version' => '1.54'
},
{
'date' => '2011-07-04T21:23:51',
'version' => '1.55'
},
{
'date' => '2011-07-05T20:49:36',
'version' => '1.56'
},
{
'date' => '2011-07-07T02:00:07',
'version' => '1.57'
},
{
'date' => '2011-07-07T19:52:59',
'version' => '1.58'
},
{
'date' => '2011-07-08T04:58:56',
'version' => '1.59'
},
{
'date' => '2011-07-08T20:44:55',
'version' => '1.60'
},
{
'date' => '2011-07-09T19:36:58',
'version' => '1.61'
},
{
'date' => '2011-07-10T00:40:32',
'version' => '1.62'
},
{
'date' => '2011-07-10T03:19:49',
'version' => '1.63'
},
{
'date' => '2011-07-10T05:51:47',
'version' => '1.64'
},
{
'date' => '2011-07-25T18:13:25',
'version' => '1.65'
},
{
'date' => '2011-07-26T23:14:38',
'version' => '1.66'
},
{
'date' => '2011-07-27T13:57:06',
'version' => '1.67'
},
{
'date' => '2011-07-29T18:39:20',
'version' => '1.68'
},
{
'date' => '2011-08-03T14:32:24',
'version' => '1.69'
},
{
'date' => '2011-08-04T15:34:41',
'version' => '1.70'
},
{
'date' => '2011-08-05T04:01:50',
'version' => '1.71'
},
{
'date' => '2011-08-05T20:07:50',
'version' => '1.72'
},
{
'date' => '2011-08-09T10:07:19',
'version' => '1.73'
},
{
'date' => '2011-08-09T12:09:49',
'version' => '1.74'
},
{
'date' => '2011-08-12T13:14:07',
'version' => '1.75'
},
{
'date' => '2011-08-12T14:54:00',
'version' => '1.76'
},
{
'date' => '2011-08-14T20:48:58',
'version' => '1.77'
},
{
'date' => '2011-08-16T13:22:48',
'version' => '1.78'
},
{
'date' => '2011-08-17T17:43:58',
'version' => '1.79'
},
{
'date' => '2011-08-17T19:08:11',
'version' => '1.80'
},
{
'date' => '2011-08-19T02:48:39',
'version' => '1.81'
},
{
'date' => '2011-08-19T04:55:49',
'version' => '1.82'
},
{
'date' => '2011-08-19T05:21:15',
'version' => '1.83'
},
{
'date' => '2011-08-19T18:08:30',
'version' => '1.84'
},
{
'date' => '2011-08-20T00:19:42',
'version' => '1.85'
},
{
'date' => '2011-08-21T18:59:13',
'version' => '1.86'
},
{
'date' => '2011-08-23T00:49:19',
'version' => '1.87'
},
{
'date' => '2011-08-23T19:20:37',
'version' => '1.88'
},
{
'date' => '2011-08-23T21:15:42',
'version' => '1.89'
},
{
'date' => '2011-08-24T19:01:47',
'version' => '1.90'
},
{
'date' => '2011-08-25T05:54:05',
'version' => '1.91'
},
{
'date' => '2011-08-26T00:47:54',
'version' => '1.92'
},
{
'date' => '2011-08-27T09:11:59',
'version' => '1.93'
},
{
'date' => '2011-08-27T10:52:14',
'version' => '1.94'
},
{
'date' => '2011-09-01T20:50:35',
'version' => '1.95'
},
{
'date' => '2011-09-01T22:42:14',
'version' => '1.96'
},
{
'date' => '2011-09-03T10:32:15',
'version' => '1.97'
},
{
'date' => '2011-09-14T18:21:20',
'version' => '1.98'
},
{
'date' => '2011-09-29T08:27:22',
'version' => '1.99'
},
{
'date' => '2011-10-17T16:25:55',
'version' => '2.0'
},
{
'date' => '2011-10-19T12:49:44',
'version' => '2.01'
},
{
'date' => '2011-10-19T23:41:41',
'version' => '2.02'
},
{
'date' => '2011-10-20T12:24:36',
'version' => '2.03'
},
{
'date' => '2011-10-21T15:37:59',
'version' => '2.04'
},
{
'date' => '2011-10-22T16:36:22',
'version' => '2.05'
},
{
'date' => '2011-10-22T21:44:31',
'version' => '2.06'
},
{
'date' => '2011-10-23T00:39:23',
'version' => '2.07'
},
{
'date' => '2011-10-23T01:30:44',
'version' => '2.08'
},
{
'date' => '2011-10-23T02:13:30',
'version' => '2.09'
},
{
'date' => '2011-10-25T02:22:41',
'version' => '2.10'
},
{
'date' => '2011-10-25T18:47:46',
'version' => '2.11'
},
{
'date' => '2011-10-27T01:54:39',
'version' => '2.12'
},
{
'date' => '2011-10-27T19:15:21',
'version' => '2.13'
},
{
'date' => '2011-10-28T20:28:23',
'version' => '2.14'
},
{
'date' => '2011-10-29T04:29:30',
'version' => '2.15'
},
{
'date' => '2011-10-29T20:52:07',
'version' => '2.16'
},
{
'date' => '2011-10-30T00:55:35',
'version' => '2.17'
},
{
'date' => '2011-10-30T18:03:30',
'version' => '2.18'
},
{
'date' => '2011-10-31T09:07:02',
'version' => '2.19'
},
{
'date' => '2011-11-01T00:40:20',
'version' => '2.20'
},
{
'date' => '2011-11-02T01:29:01',
'version' => '2.21'
},
{
'date' => '2011-11-03T15:21:43',
'version' => '2.22'
},
{
'date' => '2011-11-04T18:45:33',
'version' => '2.23'
},
{
'date' => '2011-11-05T16:16:00',
'version' => '2.24'
},
{
'date' => '2011-11-08T21:13:48',
'version' => '2.25'
},
{
'date' => '2011-11-10T16:53:32',
'version' => '2.26'
},
{
'date' => '2011-11-16T20:59:52',
'version' => '2.27'
},
{
'date' => '2011-11-17T23:44:36',
'version' => '2.28'
},
{
'date' => '2011-11-19T20:10:28',
'version' => '2.29'
},
{
'date' => '2011-11-20T00:19:04',
'version' => '2.30'
},
{
'date' => '2011-11-20T22:25:03',
'version' => '2.31'
},
{
'date' => '2011-11-24T10:31:31',
'version' => '2.32'
},
{
'date' => '2011-11-28T12:32:13',
'version' => '2.33'
},
{
'date' => '2011-11-28T14:02:31',
'version' => '2.34'
},
{
'date' => '2011-12-01T14:19:35',
'version' => '2.35'
},
{
'date' => '2011-12-05T10:52:35',
'version' => '2.36'
},
{
'date' => '2011-12-10T18:18:16',
'version' => '2.37'
},
{
'date' => '2011-12-17T12:03:38',
'version' => '2.38'
},
{
'date' => '2011-12-22T12:31:43',
'version' => '2.39'
},
{
'date' => '2011-12-24T13:04:21',
'version' => '2.40'
},
{
'date' => '2011-12-28T16:09:18',
'version' => '2.41'
},
{
'date' => '2012-01-02T17:15:52',
'version' => '2.42'
},
{
'date' => '2012-01-08T03:43:27',
'version' => '2.43'
},
{
'date' => '2012-01-17T23:21:12',
'version' => '2.44'
},
{
'date' => '2012-01-18T15:23:03',
'version' => '2.45'
},
{
'date' => '2012-01-25T18:20:48',
'version' => '2.46'
},
{
'date' => '2012-02-06T16:28:27',
'version' => '2.47'
},
{
'date' => '2012-02-09T07:04:28',
'version' => '2.48'
},
{
'date' => '2012-02-13T19:45:00',
'version' => '2.49'
},
{
'date' => '2012-02-18T01:18:38',
'version' => '2.50'
},
{
'date' => '2012-02-19T12:32:58',
'version' => '2.51'
},
{
'date' => '2012-02-24T15:01:33',
'version' => '2.52'
},
{
'date' => '2012-02-25T05:53:29',
'version' => '2.53'
},
{
'date' => '2012-02-27T15:31:19',
'version' => '2.54'
},
{
'date' => '2012-02-27T19:26:41',
'version' => '2.55'
},
{
'date' => '2012-03-01T21:07:06',
'version' => '2.56'
},
{
'date' => '2012-03-03T22:01:50',
'version' => '2.57'
},
{
'date' => '2012-03-09T18:38:46',
'version' => '2.58'
},
{
'date' => '2012-03-09T19:02:23',
'version' => '2.59'
},
{
'date' => '2012-03-13T16:50:25',
'version' => '2.60'
},
{
'date' => '2012-03-14T00:41:48',
'version' => '2.61'
},
{
'date' => '2012-03-17T09:05:12',
'version' => '2.62'
},
{
'date' => '2012-03-20T18:39:51',
'version' => '2.63'
},
{
'date' => '2012-03-21T01:23:59',
'version' => '2.64'
},
{
'date' => '2012-03-22T22:06:10',
'version' => '2.65'
},
{
'date' => '2012-03-23T16:16:55',
'version' => '2.66'
},
{
'date' => '2012-03-24T14:29:35',
'version' => '2.67'
},
{
'date' => '2012-03-24T14:59:52',
'version' => '2.68'
},
{
'date' => '2012-03-27T12:53:44',
'version' => '2.69'
},
{
'date' => '2012-03-30T21:24:44',
'version' => '2.70'
},
{
'date' => '2012-04-03T01:46:31',
'version' => '2.71'
},
{
'date' => '2012-04-03T13:16:07',
'version' => '2.72'
},
{
'date' => '2012-04-03T17:10:05',
'version' => '2.73'
},
{
'date' => '2012-04-03T22:33:05',
'version' => '2.74'
},
{
'date' => '2012-04-05T01:57:10',
'version' => '2.75'
},
{
'date' => '2012-04-05T03:52:05',
'version' => '2.76'
},
{
'date' => '2012-04-09T12:36:15',
'version' => '2.77'
},
{
'date' => '2012-04-09T18:54:51',
'version' => '2.78'
},
{
'date' => '2012-04-10T10:58:23',
'version' => '2.79'
},
{
'date' => '2012-04-10T14:25:57',
'version' => '2.80'
},
{
'date' => '2012-04-15T18:49:31',
'version' => '2.81'
},
{
'date' => '2012-04-16T21:09:32',
'version' => '2.82'
},
{
'date' => '2012-04-18T18:51:37',
'version' => '2.83'
},
{
'date' => '2012-04-18T21:29:14',
'version' => '2.84'
},
{
'date' => '2012-04-19T15:37:54',
'version' => '2.85'
},
{
'date' => '2012-04-23T12:21:14',
'version' => '2.86'
},
{
'date' => '2012-04-23T14:19:09',
'version' => '2.87'
},
{
'date' => '2012-04-24T02:15:58',
'version' => '2.88'
},
{
'date' => '2012-04-24T20:08:49',
'version' => '2.89'
},
{
'date' => '2012-04-25T11:35:38',
'version' => '2.90'
},
{
'date' => '2012-04-26T19:20:37',
'version' => '2.91'
},
{
'date' => '2012-04-30T16:50:01',
'version' => '2.92'
},
{
'date' => '2012-05-05T22:00:26',
'version' => '2.93'
},
{
'date' => '2012-05-10T03:49:57',
'version' => '2.94'
},
{
'date' => '2012-05-10T20:08:54',
'version' => '2.95'
},
{
'date' => '2012-05-21T08:26:37',
'version' => '2.96'
},
{
'date' => '2012-05-28T12:11:13',
'version' => '2.97'
},
{
'date' => '2012-05-30T18:21:26',
'version' => '2.98'
},
{
'date' => '2012-06-26T06:45:51',
'version' => '3.0'
},
{
'date' => '2012-07-01T10:00:07',
'version' => '3.01'
},
{
'date' => '2012-07-03T19:21:54',
'version' => '3.02'
},
{
'date' => '2012-07-06T21:17:36',
'version' => '3.03'
},
{
'date' => '2012-07-07T11:29:24',
'version' => '3.04'
},
{
'date' => '2012-07-07T21:49:48',
'version' => '3.05'
},
{
'date' => '2012-07-11T17:27:01',
'version' => '3.06'
},
{
'date' => '2012-07-13T00:25:44',
'version' => '3.07'
},
{
'date' => '2012-07-13T21:53:56',
'version' => '3.08'
},
{
'date' => '2012-07-16T19:46:15',
'version' => '3.09'
},
{
'date' => '2012-07-16T20:00:50',
'version' => '3.10'
},
{
'date' => '2012-07-19T01:44:35',
'version' => '3.11'
},
{
'date' => '2012-07-20T12:30:03',
'version' => '3.12'
},
{
'date' => '2012-07-24T17:03:04',
'version' => '3.13'
},
{
'date' => '2012-07-27T11:05:47',
'version' => '3.14'
},
{
'date' => '2012-07-28T11:32:31',
'version' => '3.15'
},
{
'date' => '2012-07-31T18:55:11',
'version' => '3.16'
},
{
'date' => '2012-08-01T00:38:50',
'version' => '3.17'
},
{
'date' => '2012-08-01T19:15:21',
'version' => '3.18'
},
{
'date' => '2012-08-02T15:40:34',
'version' => '3.19'
},
{
'date' => '2012-08-03T23:32:38',
'version' => '3.20'
},
{
'date' => '2012-08-05T22:32:21',
'version' => '3.21'
},
{
'date' => '2012-08-06T19:53:03',
'version' => '3.22'
},
{
'date' => '2012-08-07T03:37:26',
'version' => '3.23'
},
{
'date' => '2012-08-07T20:56:45',
'version' => '3.24'
},
{
'date' => '2012-08-08T00:31:31',
'version' => '3.25'
},
{
'date' => '2012-08-08T04:04:18',
'version' => '3.26'
},
{
'date' => '2012-08-08T21:18:27',
'version' => '3.27'
},
{
'date' => '2012-08-10T12:18:38',
'version' => '3.28'
},
{
'date' => '2012-08-13T13:42:56',
'version' => '3.29'
},
{
'date' => '2012-08-13T16:14:35',
'version' => '3.30'
},
{
'date' => '2012-08-15T09:37:25',
'version' => '3.31'
},
{
'date' => '2012-08-20T12:37:26',
'version' => '3.32'
},
{
'date' => '2012-08-23T18:34:00',
'version' => '3.33'
},
{
'date' => '2012-08-24T01:17:41',
'version' => '3.34'
},
{
'date' => '2012-08-27T22:52:31',
'version' => '3.35'
},
{
'date' => '2012-08-30T00:59:43',
'version' => '3.36'
},
{
'date' => '2012-09-04T20:50:40',
'version' => '3.37'
},
{
'date' => '2012-09-07T00:05:53',
'version' => '3.38'
},
{
'date' => '2012-09-10T11:58:00',
'version' => '3.39'
},
{
'date' => '2012-09-11T18:03:47',
'version' => '3.40'
},
{
'date' => '2012-09-13T18:22:49',
'version' => '3.41'
},
{
'date' => '2012-09-16T17:29:48',
'version' => '3.42'
},
{
'date' => '2012-09-22T19:40:59',
'version' => '3.43'
},
{
'date' => '2012-09-29T11:20:17',
'version' => '3.44'
},
{
'date' => '2012-10-09T20:39:26',
'version' => '3.45'
},
{
'date' => '2012-10-10T20:55:33',
'version' => '3.46'
},
{
'date' => '2012-10-12T23:10:49',
'version' => '3.47'
},
{
'date' => '2012-10-16T22:51:05',
'version' => '3.48'
},
{
'date' => '2012-10-19T16:34:25',
'version' => '3.49'
},
{
'date' => '2012-10-20T01:34:34',
'version' => '3.50'
},
{
'date' => '2012-10-23T20:23:54',
'version' => '3.51'
},
{
'date' => '2012-10-26T14:41:25',
'version' => '3.52'
},
{
'date' => '2012-10-31T02:41:01',
'version' => '3.53'
},
{
'date' => '2012-11-01T04:36:00',
'version' => '3.54'
},
{
'date' => '2012-11-08T11:20:15',
'version' => '3.55'
},
{
'date' => '2012-11-09T20:09:37',
'version' => '3.56'
},
{
'date' => '2012-11-12T19:47:57',
'version' => '3.57'
},
{
'date' => '2012-11-19T16:05:13',
'version' => '3.58'
},
{
'date' => '2012-11-20T19:53:03',
'version' => '3.59'
},
{
'date' => '2012-11-22T05:12:27',
'version' => '3.60'
},
{
'date' => '2012-11-25T04:19:47',
'version' => '3.61'
},
{
'date' => '2012-11-26T00:57:00',
'version' => '3.62'
},
{
'date' => '2012-11-28T10:17:51',
'version' => '3.63'
},
{
'date' => '2012-12-01T16:39:26',
'version' => '3.64'
},
{
'date' => '2012-12-08T22:47:54',
'version' => '3.65'
},
{
'date' => '2012-12-14T01:03:29',
'version' => '3.66'
},
{
'date' => '2012-12-14T23:48:00',
'version' => '3.67'
},
{
'date' => '2012-12-16T00:55:55',
'version' => '3.68'
},
{
'date' => '2012-12-20T22:47:53',
'version' => '3.69'
},
{
'date' => '2012-12-23T22:18:59',
'version' => '3.70'
},
{
'date' => '2013-01-02T11:57:12',
'version' => '3.71'
},
{
'date' => '2013-01-04T22:16:16',
'version' => '3.72'
},
{
'date' => '2013-01-06T22:46:48',
'version' => '3.73'
},
{
'date' => '2013-01-07T18:47:06',
'version' => '3.74'
},
{
'date' => '2013-01-08T16:15:03',
'version' => '3.75'
},
{
'date' => '2013-01-10T00:00:19',
'version' => '3.76'
},
{
'date' => '2013-01-12T00:36:11',
'version' => '3.77'
},
{
'date' => '2013-01-12T23:47:49',
'version' => '3.78'
},
{
'date' => '2013-01-13T00:50:13',
'version' => '3.79'
},
{
'date' => '2013-01-15T05:02:52',
'version' => '3.80'
},
{
'date' => '2013-01-17T21:32:48',
'version' => '3.81'
},
{
'date' => '2013-01-18T15:50:23',
'version' => '3.82'
},
{
'date' => '2013-01-27T15:28:40',
'version' => '3.83'
},
{
'date' => '2013-01-30T00:32:12',
'version' => '3.84'
},
{
'date' => '2013-02-13T00:56:23',
'version' => '3.85'
},
{
'date' => '2013-02-22T02:01:13',
'version' => '3.86'
},
{
'date' => '2013-02-23T19:36:00',
'version' => '3.87'
},
{
'date' => '2013-03-03T21:53:52',
'version' => '3.88'
},
{
'date' => '2013-03-04T16:12:24',
'version' => '3.89'
},
{
'date' => '2013-03-14T20:08:14',
'version' => '3.90'
},
{
'date' => '2013-03-17T22:59:42',
'version' => '3.91'
},
{
'date' => '2013-04-03T19:48:34',
'version' => '3.92'
},
{
'date' => '2013-04-05T21:46:38',
'version' => '3.93'
},
{
'date' => '2013-04-08T21:48:55',
'version' => '3.94'
},
{
'date' => '2013-04-12T03:49:59',
'version' => '3.95'
},
{
'date' => '2013-04-22T21:34:16',
'version' => '3.96'
},
{
'date' => '2013-04-25T21:49:41',
'version' => '3.97'
},
{
'date' => '2013-05-15T20:02:05',
'version' => '4.0'
},
{
'date' => '2013-05-19T17:24:38',
'version' => '4.01'
},
{
'date' => '2013-05-20T16:55:00',
'version' => '4.02'
},
{
'date' => '2013-05-21T05:24:56',
'version' => '4.03'
},
{
'date' => '2013-05-23T21:25:32',
'version' => '4.04'
},
{
'date' => '2013-05-24T02:59:59',
'version' => '4.05'
},
{
'date' => '2013-05-24T14:23:41',
'version' => '4.06'
},
{
'date' => '2013-05-25T18:07:30',
'version' => '4.07'
},
{
'date' => '2013-05-30T21:45:51',
'version' => '4.08'
},
{
'date' => '2013-05-31T02:24:29',
'version' => '4.09'
},
{
'date' => '2013-06-01T02:09:07',
'version' => '4.10'
},
{
'date' => '2013-06-03T04:34:37',
'version' => '4.11'
},
{
'date' => '2013-06-07T01:51:09',
'version' => '4.12'
},
{
'date' => '2013-06-09T00:25:21',
'version' => '4.13'
},
{
'date' => '2013-06-10T00:23:12',
'version' => '4.14'
},
{
'date' => '2013-06-18T08:02:11',
'version' => '4.15'
},
{
'date' => '2013-06-19T01:27:29',
'version' => '4.16'
},
{
'date' => '2013-07-04T16:14:27',
'version' => '4.17'
},
{
'date' => '2013-07-08T09:17:43',
'version' => '4.18'
},
{
'date' => '2013-07-21T21:47:46',
'version' => '4.19'
},
{
'date' => '2013-07-28T12:53:38',
'version' => '4.20'
},
{
'date' => '2013-07-28T20:17:31',
'version' => '4.21'
},
{
'date' => '2013-07-29T19:13:38',
'version' => '4.22'
},
{
'date' => '2013-07-31T20:35:17',
'version' => '4.23'
},
{
'date' => '2013-08-08T21:10:52',
'version' => '4.24'
},
{
'date' => '2013-08-17T20:16:56',
'version' => '4.25'
},
{
'date' => '2013-08-18T15:06:51',
'version' => '4.26'
},
{
'date' => '2013-08-26T15:29:36',
'version' => '4.27'
},
{
'date' => '2013-08-29T16:11:59',
'version' => '4.28'
},
{
'date' => '2013-08-31T02:01:44',
'version' => '4.29'
},
{
'date' => '2013-09-01T21:48:28',
'version' => '4.30'
},
{
'date' => '2013-09-04T20:09:26',
'version' => '4.31'
},
{
'date' => '2013-09-06T21:19:59',
'version' => '4.32'
},
{
'date' => '2013-09-07T20:38:03',
'version' => '4.33'
},
{
'date' => '2013-09-08T20:58:54',
'version' => '4.34'
},
{
'date' => '2013-09-10T21:40:13',
'version' => '4.35'
},
{
'date' => '2013-09-12T21:31:22',
'version' => '4.36'
},
{
'date' => '2013-09-13T01:32:54',
'version' => '4.37'
},
{
'date' => '2013-09-16T22:01:40',
'version' => '4.38'
},
{
'date' => '2013-09-17T04:53:49',
'version' => '4.39'
},
{
'date' => '2013-09-21T01:15:17',
'version' => '4.40'
},
{
'date' => '2013-09-21T17:25:38',
'version' => '4.41'
},
{
'date' => '2013-09-30T07:46:05',
'version' => '4.42'
},
{
'date' => '2013-10-02T19:16:26',
'version' => '4.43'
},
{
'date' => '2013-10-04T21:18:14',
'version' => '4.44'
},
{
'date' => '2013-10-06T15:46:08',
'version' => '4.45'
},
{
'date' => '2013-10-12T17:11:54',
'version' => '4.46'
},
{
'date' => '2013-10-14T23:51:30',
'version' => '4.47'
},
{
'date' => '2013-10-16T05:28:45',
'version' => '4.48'
},
{
'date' => '2013-10-17T16:53:59',
'version' => '4.49'
},
{
'date' => '2013-10-23T01:18:55',
'version' => '4.50'
},
{
'date' => '2013-10-28T17:20:46',
'version' => '4.51'
},
{
'date' => '2013-10-29T06:27:25',
'version' => '4.52'
},
{
'date' => '2013-10-30T00:21:27',
'version' => '4.53'
},
{
'date' => '2013-11-07T00:45:35',
'version' => '4.54'
},
{
'date' => '2013-11-07T02:38:24',
'version' => '4.55'
},
{
'date' => '2013-11-10T02:56:56',
'version' => '4.56'
},
{
'date' => '2013-11-11T20:30:04',
'version' => '4.57'
},
{
'date' => '2013-11-19T20:46:01',
'version' => '4.58'
},
{
'date' => '2013-12-04T21:35:49',
'version' => '4.59'
},
{
'date' => '2013-12-11T16:33:35',
'version' => '4.60'
},
{
'date' => '2013-12-16T16:59:25',
'version' => '4.61'
},
{
'date' => '2013-12-17T20:35:36',
'version' => '4.62'
},
{
'date' => '2013-12-19T22:59:01',
'version' => '4.63'
},
{
'date' => '2014-01-01T16:20:28',
'version' => '4.64'
},
{
'date' => '2014-01-02T22:36:45',
'version' => '4.65'
},
{
'date' => '2014-01-04T21:48:06',
'version' => '4.66'
},
{
'date' => '2014-01-11T17:20:18',
'version' => '4.67'
},
{
'date' => '2014-01-21T22:24:03',
'version' => '4.68'
},
{
'date' => '2014-01-24T04:06:26',
'version' => '4.69'
},
{
'date' => '2014-01-26T22:08:54',
'version' => '4.70'
},
{
'date' => '2014-01-28T03:10:15',
'version' => '4.71'
},
{
'date' => '2014-01-29T21:29:25',
'version' => '4.72'
},
{
'date' => '2014-02-01T05:20:38',
'version' => '4.73'
},
{
'date' => '2014-02-02T04:30:05',
'version' => '4.74'
},
{
'date' => '2014-02-02T06:54:56',
'version' => '4.75'
},
{
'date' => '2014-02-04T22:41:32',
'version' => '4.76'
},
{
'date' => '2014-02-06T23:19:13',
'version' => '4.77'
},
{
'date' => '2014-02-08T23:02:08',
'version' => '4.78'
},
{
'date' => '2014-02-11T02:49:44',
'version' => '4.79'
},
{
'date' => '2014-02-13T04:30:43',
'version' => '4.80'
},
{
'date' => '2014-02-15T03:27:30',
'version' => '4.81'
},
{
'date' => '2014-02-19T04:11:47',
'version' => '4.82'
},
{
'date' => '2014-02-19T06:20:46',
'version' => '4.83'
},
{
'date' => '2014-02-22T22:59:02',
'version' => '4.84'
},
{
'date' => '2014-02-26T22:48:41',
'version' => '4.85'
},
{
'date' => '2014-03-03T05:45:32',
'version' => '4.86'
},
{
'date' => '2014-03-04T07:14:15',
'version' => '4.87'
},
{
'date' => '2014-03-09T22:42:42',
'version' => '4.88'
},
{
'date' => '2014-03-13T21:30:57',
'version' => '4.89'
},
{
'date' => '2014-03-16T21:22:35',
'version' => '4.90'
},
{
'date' => '2014-03-29T00:05:17',
'version' => '4.91'
},
{
'date' => '2014-04-08T20:41:54',
'version' => '4.92'
},
{
'date' => '2014-04-13T02:17:03',
'version' => '4.93'
},
{
'date' => '2014-04-19T23:39:22',
'version' => '4.94'
},
{
'date' => '2014-04-27T03:27:43',
'version' => '4.95'
},
{
'date' => '2014-04-27T20:04:36',
'version' => '4.96'
},
{
'date' => '2014-04-29T22:12:52',
'version' => '4.97'
},
{
'date' => '2014-05-09T01:57:34',
'version' => '4.98'
},
{
'date' => '2014-05-12T00:46:43',
'version' => '4.99'
},
{
'date' => '2014-05-29T20:15:51',
'version' => '5.0'
},
{
'date' => '2014-05-30T14:51:14',
'version' => '5.01'
},
{
'date' => '2014-05-31T21:51:34',
'version' => '5.02'
},
{
'date' => '2014-06-02T22:07:46',
'version' => '5.03'
},
{
'date' => '2014-06-03T21:11:50',
'version' => '5.04'
},
{
'date' => '2014-06-08T21:50:53',
'version' => '5.05'
},
{
'date' => '2014-06-12T02:08:01',
'version' => '5.06'
},
{
'date' => '2014-06-13T19:28:04',
'version' => '5.07'
},
{
'date' => '2014-06-16T23:44:48',
'version' => '5.08'
},
{
'date' => '2014-06-24T15:02:21',
'version' => '5.09'
},
{
'date' => '2014-06-28T23:25:12',
'version' => '5.10'
},
{
'date' => '2014-07-03T04:01:24',
'version' => '5.11'
},
{
'date' => '2014-07-03T23:06:55',
'version' => '5.12'
},
{
'date' => '2014-07-13T00:44:29',
'version' => '5.13'
},
{
'date' => '2014-07-14T22:01:49',
'version' => '5.14'
},
{
'date' => '2014-07-17T17:58:05',
'version' => '5.15'
},
{
'date' => '2014-07-21T16:01:56',
'version' => '5.16'
},
{
'date' => '2014-07-24T12:40:41',
'version' => '5.17'
},
{
'date' => '2014-07-25T20:25:29',
'version' => '5.18'
},
{
'date' => '2014-07-26T21:03:13',
'version' => '5.19'
},
{
'date' => '2014-07-26T23:36:18',
'version' => '5.20'
},
{
'date' => '2014-07-27T18:48:25',
'version' => '5.21'
},
{
'date' => '2014-07-30T16:42:35',
'version' => '5.22'
},
{
'date' => '2014-07-31T21:32:03',
'version' => '5.23'
},
{
'date' => '2014-08-02T21:56:32',
'version' => '5.24'
},
{
'date' => '2014-08-07T01:29:20',
'version' => '5.25'
},
{
'date' => '2014-08-09T21:26:37',
'version' => '5.26'
},
{
'date' => '2014-08-11T14:26:47',
'version' => '5.27'
},
{
'date' => '2014-08-13T00:32:33',
'version' => '5.28'
},
{
'date' => '2014-08-16T12:40:15',
'version' => '5.29'
},
{
'date' => '2014-08-17T21:49:15',
'version' => '5.30'
},
{
'date' => '2014-08-19T17:40:27',
'version' => '5.31'
},
{
'date' => '2014-08-21T18:19:53',
'version' => '5.32'
},
{
'date' => '2014-08-23T22:25:32',
'version' => '5.33'
},
{
'date' => '2014-08-29T21:53:02',
'version' => '5.34'
},
{
'date' => '2014-08-30T21:57:50',
'version' => '5.35'
},
{
'date' => '2014-09-02T00:20:21',
'version' => '5.36'
},
{
'date' => '2014-09-03T20:55:45',
'version' => '5.37'
},
{
'date' => '2014-09-05T21:57:34',
'version' => '5.38'
},
{
'date' => '2014-09-07T03:18:45',
'version' => '5.39'
},
{
'date' => '2014-09-12T01:06:33',
'version' => '5.40'
},
{
'date' => '2014-09-13T21:24:03',
'version' => '5.41'
},
{
'date' => '2014-09-17T21:54:39',
'version' => '5.42'
},
{
'date' => '2014-09-22T00:14:24',
'version' => '5.43'
},
{
'date' => '2014-09-23T00:49:52',
'version' => '5.44'
},
{
'date' => '2014-09-27T03:21:55',
'version' => '5.46'
},
{
'date' => '2014-09-27T03:24:38',
'version' => '5.45'
},
{
'date' => '2014-09-28T03:31:15',
'version' => '5.47'
},
{
'date' => '2014-10-07T23:08:14',
'version' => '5.48'
},
{
'date' => '2014-10-10T21:12:14',
'version' => '5.49'
},
{
'date' => '2014-10-15T22:00:04',
'version' => '5.50'
},
{
'date' => '2014-10-17T21:48:17',
'version' => '5.51'
},
{
'date' => '2014-10-18T20:49:34',
'version' => '5.52'
},
{
'date' => '2014-10-20T23:34:37',
'version' => '5.53'
},
{
'date' => '2014-10-23T22:51:06',
'version' => '5.54'
},
{
'date' => '2014-10-29T00:58:34',
'version' => '5.55'
},
{
'date' => '2014-10-30T00:23:25',
'version' => '5.56'
},
{
'date' => '2014-11-02T22:52:07',
'version' => '5.57'
},
{
'date' => '2014-11-07T00:04:47',
'version' => '5.58'
},
{
'date' => '2014-11-08T00:26:41',
'version' => '5.59'
},
{
'date' => '2014-11-12T01:31:36',
'version' => '5.60'
},
{
'date' => '2014-11-15T00:46:43',
'version' => '5.61'
},
{
'date' => '2014-11-18T18:24:54',
'version' => '5.62'
},
{
'date' => '2014-11-22T03:52:56',
'version' => '5.63'
},
{
'date' => '2014-11-23T02:12:00',
'version' => '5.64'
},
{
'date' => '2014-11-25T03:23:01',
'version' => '5.65'
},
{
'date' => '2014-11-27T03:13:19',
'version' => '5.66'
},
{
'date' => '2014-11-27T06:19:49',
'version' => '5.67'
},
{
'date' => '2014-12-03T04:36:04',
'version' => '5.68'
},
{
'date' => '2014-12-13T02:19:36',
'version' => '5.69'
},
{
'date' => '2014-12-18T00:12:31',
'version' => '5.70'
},
{
'date' => '2015-01-01T22:44:58',
'version' => '5.71'
},
{
'date' => '2015-01-11T20:02:04',
'version' => '5.72'
},
{
'date' => '2015-01-23T16:29:22',
'version' => '5.73'
},
{
'date' => '2015-01-24T13:32:51',
'version' => '5.74'
},
{
'date' => '2015-01-27T04:08:19',
'version' => '5.75'
},
{
'date' => '2015-02-02T19:36:16',
'version' => '5.76'
},
{
'date' => '2015-02-03T02:37:04',
'version' => '5.77'
},
{
'date' => '2015-02-13T00:21:48',
'version' => '5.78'
},
{
'date' => '2015-02-13T05:32:50',
'version' => '5.79'
},
{
'date' => '2015-02-18T05:24:00',
'version' => '5.80'
},
{
'date' => '2015-02-21T03:30:18',
'version' => '5.81'
},
{
'date' => '2015-02-23T03:05:04',
'version' => '5.82'
},
{
'date' => '2015-02-26T22:17:01',
'version' => '6.0'
},
{
'date' => '2015-03-03T16:12:16',
'version' => '6.01'
},
{
'date' => '2015-03-10T02:53:22',
'version' => '6.02'
},
{
'date' => '2015-03-16T04:43:10',
'version' => '6.03'
},
{
'date' => '2015-03-23T04:42:27',
'version' => '6.04'
},
{
'date' => '2015-03-25T05:08:15',
'version' => '6.05'
},
{
'date' => '2015-04-07T00:55:21',
'version' => '6.06'
},
{
'date' => '2015-04-07T17:38:01',
'version' => '6.07'
},
{
'date' => '2015-04-09T22:03:46',
'version' => '6.08'
},
{
'date' => '2015-04-26T05:10:45',
'version' => '6.09'
},
{
'date' => '2015-04-27T02:01:03',
'version' => '6.10'
},
{
'date' => '2015-05-16T22:14:01',
'version' => '6.11'
},
{
'date' => '2015-06-18T21:48:20',
'version' => '6.12'
},
{
'date' => '2015-08-20T06:09:39',
'version' => '6.16'
},
{
'date' => '2015-08-22T19:38:51',
'version' => '6.17'
},
{
'date' => '2015-09-02T17:26:36',
'version' => '6.18'
},
{
'date' => '2015-09-12T23:37:29',
'version' => '6.19'
},
{
'date' => '2015-09-16T22:50:30',
'version' => '6.20'
},
{
'date' => '2015-09-23T01:05:04',
'version' => '6.21'
},
{
'date' => '2015-09-27T01:03:32',
'version' => '6.22'
},
{
'date' => '2015-10-07T18:17:26',
'version' => '6.23'
},
{
'date' => '2015-10-13T22:54:46',
'version' => '6.24'
},
{
'date' => '2015-10-22T02:49:47',
'version' => '6.25'
},
{
'date' => '2015-10-29T00:29:07',
'version' => '6.26'
},
{
'date' => '2015-10-30T00:07:08',
'version' => '6.27'
},
{
'date' => '2015-11-02T15:17:16',
'version' => '6.28'
},
{
'date' => '2015-11-12T02:59:43',
'version' => '6.30'
},
{
'date' => '2015-11-14T19:38:51',
'version' => '6.31'
},
{
'date' => '2015-11-18T18:16:15',
'version' => '6.32'
},
{
'date' => '2015-11-22T16:47:00',
'version' => '6.33'
},
{
'date' => '2016-01-13T20:08:22',
'version' => '6.40'
},
{
'date' => '2016-01-24T22:01:52',
'version' => '6.42'
},
{
'date' => '2016-02-01T16:15:40',
'version' => '6.43'
},
{
'date' => '2016-02-05T22:42:51',
'version' => '6.44'
},
{
'date' => '2016-02-09T23:29:35',
'version' => '6.45'
},
{
'date' => '2016-02-14T00:51:10',
'version' => '6.46'
},
{
'date' => '2016-02-19T23:09:15',
'version' => '6.47'
},
{
'date' => '2016-02-24T17:07:45',
'version' => '6.48'
},
{
'date' => '2016-02-26T22:47:33',
'version' => '6.49'
},
{
'date' => '2016-02-27T00:12:03',
'version' => '6.50'
},
{
'date' => '2016-02-29T23:03:44',
'version' => '6.51'
},
{
'date' => '2016-03-02T22:24:28',
'version' => '6.52'
},
{
'date' => '2016-03-04T00:58:55',
'version' => '6.53'
},
{
'date' => '2016-03-07T15:09:42',
'version' => '6.54'
},
{
'date' => '2016-03-08T20:42:43',
'version' => '6.55'
},
{
'date' => '2016-03-16T02:42:45',
'version' => '6.56'
},
{
'date' => '2016-03-23T04:23:41',
'version' => '6.57'
},
{
'date' => '2016-04-10T17:11:22',
'version' => '6.58'
},
{
'date' => '2016-04-22T18:45:19',
'version' => '6.59'
},
{
'date' => '2016-04-26T13:16:04',
'version' => '6.60'
},
{
'date' => '2016-05-02T17:31:34',
'version' => '6.61'
},
{
'date' => '2016-05-14T21:05:47',
'version' => '6.62'
},
{
'date' => '2016-06-03T21:10:48',
'version' => '6.63'
},
{
'date' => '2016-06-09T16:41:51',
'version' => '6.64'
},
{
'date' => '2016-06-14T16:15:21',
'version' => '6.65'
},
{
'date' => '2016-06-16T22:35:28',
'version' => '6.66'
},
{
'date' => '2016-07-19T06:21:07',
'version' => '7.0'
},
{
'date' => '2016-08-01T18:46:35',
'version' => '7.01'
},
{
'date' => '2016-08-17T16:34:19',
'version' => '7.02'
},
{
'date' => '2016-08-17T16:40:11',
'version' => '7.03'
},
{
'date' => '2016-08-29T13:59:45',
'version' => '7.04'
},
{
'date' => '2016-08-29T16:44:18',
'version' => '7.05'
},
{
'date' => '2016-09-17T21:05:37',
'version' => '7.06'
},
{
'date' => '2016-09-20T12:30:54',
'version' => '7.07'
},
{
'date' => '2016-09-23T17:19:00',
'version' => '7.08'
},
{
'date' => '2016-10-23T09:46:35',
'version' => '7.09'
},
{
'date' => '2016-11-01T19:02:03',
'version' => '7.10'
},
{
'date' => '2016-11-30T09:23:48',
'version' => '7.11'
},
{
'date' => '2016-12-20T08:41:05',
'version' => '7.12'
},
{
'date' => '2016-12-29T19:40:25',
'version' => '7.13'
},
{
'date' => '2017-01-04T22:58:20',
'version' => '7.14'
},
{
'date' => '2017-01-10T11:42:59',
'version' => '7.15'
},
{
'date' => '2017-01-10T23:52:50',
'version' => '7.16'
},
{
'date' => '2017-01-11T08:35:01',
'version' => '7.17'
},
{
'date' => '2017-01-11T22:05:10',
'version' => '7.18'
},
{
'date' => '2017-01-15T16:05:23',
'version' => '7.19'
},
{
'date' => '2017-01-18T09:38:55',
'version' => '7.20'
},
{
'date' => '2017-01-22T14:29:35',
'version' => '7.21'
},
{
'date' => '2017-01-25T23:09:32',
'version' => '7.22'
},
{
'date' => '2017-01-29T21:43:19',
'version' => '7.23'
},
{
'date' => '2017-02-05T21:09:47',
'version' => '7.24'
},
{
'date' => '2017-02-09T22:51:35',
'version' => '7.25'
},
{
'date' => '2017-02-15T23:08:52',
'version' => '7.26'
},
{
'date' => '2017-02-27T17:02:21',
'version' => '7.27'
},
{
'date' => '2017-03-07T21:36:36',
'version' => '7.28'
},
{
'date' => '2017-03-14T23:27:54',
'version' => '7.29'
},
{
'date' => '2017-04-06T12:04:02',
'version' => '7.30'
},
{
'date' => '2017-04-24T07:50:54',
'version' => '7.31'
},
{
'date' => '2017-05-30T17:08:40',
'version' => '7.32'
},
{
'date' => '2017-06-05T22:14:35',
'version' => '7.33'
},
{
'date' => '2017-07-02T22:04:01',
'version' => '7.34'
},
{
'date' => '2017-07-05T07:50:23',
'version' => '7.35'
},
{
'date' => '2017-07-10T07:48:45',
'version' => '7.36'
},
{
'date' => '2017-07-24T07:55:46',
'version' => '7.37'
},
{
'date' => '2017-08-01T21:56:47',
'version' => '7.38'
},
{
'date' => '2017-08-03T08:50:10',
'version' => '7.39'
},
{
'date' => '2017-08-14T08:32:54',
'version' => '7.40'
},
{
'date' => '2017-08-16T08:19:30',
'version' => '7.41'
},
{
'date' => '2017-08-17T11:15:42',
'version' => '7.42'
},
{
'date' => '2017-08-18T08:26:45',
'version' => '7.43'
},
{
'date' => '2017-09-03T16:04:13',
'version' => '7.44'
},
{
'date' => '2017-09-07T08:41:40',
'version' => '7.45'
},
{
'date' => '2017-09-12T12:27:00',
'version' => '7.46'
},
{
'date' => '2017-10-12T08:26:53',
'version' => '7.47'
},
{
'date' => '2017-10-21T13:33:01',
'version' => '7.48'
},
{
'date' => '2017-10-30T13:18:49',
'version' => '7.49'
},
{
'date' => '2017-10-30T18:18:13',
'version' => '7.50'
},
{
'date' => '2017-10-31T19:14:43',
'version' => '7.51'
},
{
'date' => '2017-11-02T22:29:23',
'version' => '7.52'
},
{
'date' => '2017-11-04T15:24:07',
'version' => '7.53'
},
{
'date' => '2017-11-04T22:50:30',
'version' => '7.54'
},
{
'date' => '2017-11-07T10:58:56',
'version' => '7.55'
},
{
'date' => '2017-11-16T13:33:27',
'version' => '7.56'
},
{
'date' => '2017-11-18T16:10:38',
'version' => '7.57'
},
{
'date' => '2017-12-03T22:14:41',
'version' => '7.58'
},
{
'date' => '2017-12-17T17:58:55',
'version' => '7.59'
},
{
'date' => '2018-01-03T14:00:44',
'version' => '7.60'
},
{
'date' => '2018-01-15T15:35:28',
'version' => '7.61'
},
{
'date' => '2018-02-03T19:53:39',
'version' => '7.62'
},
{
'date' => '2018-02-06T20:52:51',
'version' => '7.63'
},
{
'date' => '2018-02-07T10:17:57',
'version' => '7.64'
},
{
'date' => '2018-02-11T21:55:33',
'version' => '7.65'
},
{
'date' => '2018-02-14T08:55:35',
'version' => '7.66'
},
{
'date' => '2018-02-19T23:11:52',
'version' => '7.67'
},
{
'date' => '2018-02-23T18:44:15',
'version' => '7.68'
},
{
'date' => '2018-02-24T21:58:41',
'version' => '7.69'
},
{
'date' => '2018-02-28T23:47:08',
'version' => '7.70'
},
{
'date' => '2018-03-16T16:41:58',
'version' => '7.71'
},
{
'date' => '2018-04-02T21:01:43',
'version' => '7.72'
},
{
'date' => '2018-04-06T14:10:03',
'version' => '7.73'
},
{
'date' => '2018-04-07T22:15:16',
'version' => '7.74'
},
{
'date' => '2018-04-10T16:04:41',
'version' => '7.75'
},
{
'date' => '2018-04-24T16:55:32',
'version' => '7.76'
},
{
'date' => '2018-05-01T17:18:20',
'version' => '7.77'
},
{
'date' => '2018-05-11T16:36:16',
'version' => '7.78'
},
{
'date' => '2018-05-14T22:13:04',
'version' => '7.79'
},
{
'date' => '2018-05-20T22:46:20',
'version' => '7.80'
},
{
'date' => '2018-05-21T22:39:30',
'version' => '7.81'
},
{
'date' => '2018-05-27T21:59:59',
'version' => '7.82'
},
{
'date' => '2018-06-03T21:10:42',
'version' => '7.83'
},
{
'date' => '2018-06-06T14:04:49',
'version' => '7.84'
},
{
'date' => '2018-06-19T15:57:43',
'version' => '7.85'
},
{
'date' => '2018-07-03T11:30:46',
'version' => '7.86'
},
{
'date' => '2018-07-04T10:20:11',
'version' => '7.87'
},
{
'date' => '2018-07-13T11:00:52',
'version' => '7.88'
},
{
'date' => '2018-08-07T09:38:35',
'version' => '7.89'
},
{
'date' => '2018-08-08T22:19:36',
'version' => '7.90'
},
{
'date' => '2018-08-09T08:39:58',
'version' => '7.91'
},
{
'date' => '2018-08-09T16:52:45',
'version' => '7.92'
},
{
'date' => '2018-08-12T14:23:08',
'version' => '7.93'
},
{
'date' => '2018-08-31T12:53:17',
'version' => '7.94'
},
{
'date' => '2018-09-14T22:17:06',
'version' => '8.0'
},
{
'date' => '2018-09-25T16:14:07',
'version' => '8.01'
},
{
'date' => '2018-10-01T21:34:50',
'version' => '8.02'
},
{
'date' => '2018-10-16T22:41:46',
'version' => '8.03'
},
{
'date' => '2018-10-21T20:23:27',
'version' => '8.04'
},
{
'date' => '2018-11-01T17:15:20',
'version' => '8.05'
},
{
'date' => '2018-11-08T23:31:57',
'version' => '8.06'
},
{
'date' => '2018-11-18T22:09:07',
'version' => '8.07'
},
{
'date' => '2018-12-01T18:26:15',
'version' => '8.08'
},
{
'date' => '2018-12-04T20:59:01',
'version' => '8.09'
},
{
'date' => '2018-12-20T10:28:28',
'version' => '8.10'
},
{
'date' => '2019-01-02T18:04:35',
'version' => '8.11'
},
{
'date' => '2019-02-01T16:34:38',
'version' => '8.12'
},
{
'date' => '2019-03-21T22:06:21',
'version' => '8.13'
},
{
'date' => '2019-04-18T19:11:08',
'version' => '8.14'
},
{
'date' => '2019-04-26T17:54:06',
'version' => '8.15'
},
{
'date' => '2019-05-19T19:50:45',
'version' => '8.16'
},
{
'date' => '2019-05-23T20:50:59',
'version' => '8.17'
},
{
'date' => '2019-06-28T21:29:47',
'version' => '8.18'
},
{
'date' => '2019-07-08T10:26:46',
'version' => '8.19'
},
{
'date' => '2019-07-09T21:02:16',
'version' => '8.20'
},
{
'date' => '2019-07-14T17:08:55',
'version' => '8.21'
},
{
'date' => '2019-07-17T10:46:26',
'version' => '8.22'
},
{
'date' => '2019-08-12T22:52:14',
'version' => '8.23'
},
{
'date' => '2019-09-11T22:33:49',
'version' => '8.24'
},
{
'date' => '2019-09-29T13:16:15',
'version' => '8.25'
},
{
'date' => '2019-11-03T15:48:59',
'version' => '8.26'
},
{
'date' => '2019-12-04T19:48:08',
'version' => '8.27'
},
{
'date' => '2019-12-26T16:09:10',
'version' => '8.28'
},
{
'date' => '2019-12-28T16:58:30',
'version' => '8.29'
},
{
'date' => '2020-01-09T20:35:42',
'version' => '8.30'
},
{
'date' => '2020-01-14T20:19:13',
'version' => '8.31'
},
{
'date' => '2020-01-19T14:35:03',
'version' => '8.32'
},
{
'date' => '2020-02-11T20:25:08',
'version' => '8.33'
},
{
'date' => '2020-03-16T17:27:27',
'version' => '8.34'
},
{
'date' => '2020-03-21T15:12:26',
'version' => '8.35'
},
{
'date' => '2020-04-02T09:05:58',
'version' => '8.36'
},
{
'date' => '2020-04-19T19:47:37',
'version' => '8.37'
},
{
'date' => '2020-04-21T19:54:01',
'version' => '8.38'
},
{
'date' => '2020-04-22T12:49:38',
'version' => '8.39'
},
{
'date' => '2020-04-23T09:24:25',
'version' => '8.40'
},
{
'date' => '2020-05-01T13:34:44',
'version' => '8.41'
},
{
'date' => '2020-05-04T17:15:38',
'version' => '8.42'
},
{
'date' => '2020-05-21T12:51:12',
'version' => '8.43'
},
{
'date' => '2020-05-25T19:06:44',
'version' => '8.50'
},
{
'date' => '2020-05-31T12:29:16',
'version' => '8.51'
},
{
'date' => '2020-06-03T20:01:13',
'version' => '8.52'
},
{
'date' => '2020-06-10T18:02:24',
'version' => '8.53'
},
{
'date' => '2020-06-14T17:42:03',
'version' => '8.54'
},
{
'date' => '2020-06-18T09:42:34',
'version' => '8.55'
},
{
'date' => '2020-06-26T20:08:07',
'version' => '8.56'
},
{
'date' => '2020-07-17T09:08:51',
'version' => '8.57'
},
{
'date' => '2020-08-10T18:14:24',
'version' => '8.58'
},
{
'date' => '2020-09-13T16:04:24',
'version' => '8.59'
},
{
'date' => '2020-09-27T15:50:48',
'version' => '8.60'
},
{
'date' => '2020-10-02T11:01:53',
'version' => '8.61'
},
{
'date' => '2020-10-12T09:57:55',
'version' => '8.62'
},
{
'date' => '2020-10-13T08:18:36',
'version' => '8.63'
},
{
'date' => '2020-11-06T18:38:59',
'version' => '8.64'
},
{
'date' => '2020-11-11T19:55:44',
'version' => '8.65'
},
{
'date' => '2020-11-30T10:42:18',
'version' => '8.66'
},
{
'date' => '2020-12-05T16:45:53',
'version' => '8.67'
},
{
'date' => '2020-12-27T23:38:05',
'version' => '8.68'
},
{
'date' => '2020-12-28T14:38:20',
'version' => '8.69'
},
{
'date' => '2020-12-30T14:43:19',
'version' => '8.70'
},
{
'date' => '2021-01-17T17:06:28',
'version' => '8.71'
},
{
'date' => '2021-01-27T15:33:24',
'version' => '8.72'
},
{
'date' => '2021-02-06T16:08:52',
'version' => '8.73'
},
{
'date' => '2021-02-14T18:44:04',
'version' => '9.0'
},
{
'date' => '2021-02-16T21:32:29',
'version' => '9.01'
},
{
'date' => '2021-03-01T19:16:02',
'version' => '9.02'
},
{
'date' => '2021-03-07T18:49:12',
'version' => '9.03'
},
{
'date' => '2021-03-11T21:04:03',
'version' => '9.07'
},
{
'date' => '2021-03-12T16:47:37',
'version' => '9.08'
},
{
'date' => '2021-03-14T18:32:57',
'version' => '9.09'
},
{
'date' => '2021-03-15T13:26:22',
'version' => '9.10'
},
{
'date' => '2021-03-20T16:41:03',
'version' => '9.11'
},
{
'date' => '2021-03-20T21:25:26',
'version' => '9.12'
},
{
'date' => '2021-03-22T11:33:00',
'version' => '9.13'
},
{
'date' => '2021-03-23T22:54:21',
'version' => '9.14'
},
{
'date' => '2021-04-06T09:10:10',
'version' => '9.15'
},
{
'date' => '2021-04-09T11:31:09',
'version' => '9.16'
},
{
'date' => '2021-04-13T10:11:02',
'version' => '9.17'
},
{
'date' => '2021-05-23T14:06:27',
'version' => '9.18'
},
{
'date' => '2021-06-02T09:14:48',
'version' => '9.19'
},
{
'date' => '2021-08-09T17:26:54',
'version' => '9.20'
},
{
'date' => '2021-08-13T19:14:43',
'version' => '9.21'
},
{
'date' => '2021-10-21T11:53:53',
'version' => '9.22'
},
{
'date' => '2022-03-25T11:37:40',
'version' => '9.23'
},
{
'date' => '2022-04-18T18:28:00',
'version' => '9.24'
},
{
'date' => '2022-04-28T15:21:32',
'version' => '9.25'
},
{
'date' => '2022-05-23T15:17:22',
'version' => '9.26'
},
{
'date' => '2022-09-12T11:10:27',
'version' => '9.27'
},
{
'date' => '2022-10-14T18:55:13',
'version' => '9.28'
},
{
'date' => '2022-11-11T10:15:54',
'version' => '9.29'
},
{
'date' => '2022-11-23T11:52:17',
'version' => '9.30'
},
{
'date' => '2022-12-21T00:36:31',
'version' => '9.31'
},
{
'date' => '2023-05-08T22:09:51',
'version' => '9.32'
},
{
'date' => '2023-06-14T19:25:48',
'version' => '9.33'
},
{
'date' => '2023-09-11T18:34:53',
'version' => '9.34'
},
{
'date' => '2023-10-27T17:11:42',
'version' => '9.35'
},
{
'date' => '2024-03-08T22:16:38',
'version' => '9.36'
},
{
'date' => '2024-05-13T17:48:56',
'version' => '9.37'
},
{
'date' => '2024-08-17T14:52:48',
'version' => '9.38'
},
{
'date' => '2024-11-23T14:16:18',
'version' => '9.39'
}
]
},
'Mojolicious-Plugin-LazyImage' => {
'advisories' => [
{
'affected_versions' => [
'<=0.01'
],
'cves' => [
'CVE-2024-38526'
],
'description' => 'pdoc provides API Documentation for Python Projects. Documentation generated with `pdoc --math` linked to JavaScript files from polyfill.io. The polyfill.io CDN has been sold and now serves malicious code. This issue has been fixed in pdoc 14.5.1.
',
'distribution' => 'Mojolicious-Plugin-LazyImage',
'embedded_vulnerability' => {
'distributed_version' => undef,
'name' => 'polyfill.io'
},
'fixed_versions' => [],
'id' => 'CPANSA-Mojolicious-Plugin-LazyImage-2024-38526',
'references' => [
'https://github.com/mitmproxy/pdoc/pull/703',
'https://github.com/mitmproxy/pdoc/security/advisories/GHSA-5vgj-ggm4-fg62',
'https://sansec.io/research/polyfill-supply-chain-attack',
'https://github.com/briandfoy/cpan-security-advisory/issues/155',
'https://stackdiary.com/polyfill-compromise-hits-100000-sites-in-a-supply-chain-attack/'
],
'reported' => '2024-06-26',
'severity' => undef
}
],
'main_module' => 'Mojolicious::Plugin::LazyImage',
'versions' => [
{
'date' => '2017-12-28T10:40:31',
'version' => '0.01'
}
]
},
'Mojolicious-Plugin-OAuth2' => {
'advisories' => [
{
'affected_versions' => [
'<1.3'
],
'cves' => [],
'description' => 'Param injection in case of several parameters of the same name are present.
',
'distribution' => 'Mojolicious-Plugin-OAuth2',
'fixed_versions' => [
'>=1.3'
],
'id' => 'CPANSA-Mojolicious-Plugin-OAuth2-2014-01',
'references' => [
'https://metacpan.org/changes/distribution/Mojolicious-Plugin-OAuth2',
'https://github.com/marcusramberg/Mojolicious-Plugin-OAuth2/commit/68315d329059b427e13d486c0e10733f728709aa'
],
'reported' => '2014-10-07'
}
],
'main_module' => 'Mojolicious::Plugin::OAuth2',
'versions' => [
{
'date' => '2011-01-08T11:03:42',
'version' => '0.01'
},
{
'date' => '2011-01-09T18:00:14',
'version' => '0.02'
},
{
'date' => '2011-04-03T16:00:38',
'version' => '0.1'
},
{
'date' => '2011-08-01T16:56:18',
'version' => '0.2'
},
{
'date' => '2011-09-04T19:42:29',
'version' => '0.3'
},
{
'date' => '2011-09-07T16:59:50',
'version' => '0.4'
},
{
'date' => '2011-10-19T11:55:32',
'version' => '0.5'
},
{
'date' => '2012-03-09T21:15:39',
'version' => '0.6'
},
{
'date' => '2012-05-30T11:49:29',
'version' => '0.7'
},
{
'date' => '2012-08-23T20:18:41',
'version' => '0.8'
},
{
'date' => '2013-05-20T05:55:18',
'version' => '0.9'
},
{
'date' => '2013-11-06T13:24:52',
'version' => '1.0'
},
{
'date' => '2014-03-13T08:18:10',
'version' => '1.1'
},
{
'date' => '2014-09-06T13:49:59',
'version' => '1.2'
},
{
'date' => '2014-10-07T05:49:16',
'version' => '1.3'
},
{
'date' => '2015-03-01T20:09:19',
'version' => '1.4'
},
{
'date' => '2015-03-02T07:32:59',
'version' => '1.5'
},
{
'date' => '2015-03-18T16:40:18',
'version' => '1.51'
},
{
'date' => '2015-04-06T20:46:39',
'version' => '1.52'
},
{
'date' => '2015-09-08T07:27:41',
'version' => '1.53'
},
{
'date' => '2018-08-30T10:48:55',
'version' => '1.54'
},
{
'date' => '2018-09-08T18:30:54',
'version' => '1.55'
},
{
'date' => '2018-09-23T22:04:16',
'version' => '1.56'
},
{
'date' => '2018-09-24T08:55:14',
'version' => '1.57'
},
{
'date' => '2019-07-03T12:24:11',
'version' => '1.58'
},
{
'date' => '2021-02-16T23:34:41',
'version' => '1.59'
},
{
'date' => '2021-10-27T10:37:42',
'version' => '2.00'
},
{
'date' => '2021-10-28T09:30:06',
'version' => '2.01'
},
{
'date' => '2022-02-08T09:50:33',
'version' => '2.02'
}
]
},
'Moxy' => {
'advisories' => [
{
'affected_versions' => [
'<0.25'
],
'cves' => [],
'description' => 'Allowed file schema
',
'distribution' => 'Moxy',
'fixed_versions' => [
'>=0.25'
],
'id' => 'CPANSA-Moxy-2008-01',
'references' => [
'https://metacpan.org/dist/Moxy/changes'
],
'reported' => '2008-04-09',
'severity' => undef
}
],
'main_module' => 'Moxy',
'versions' => [
{
'date' => '2008-01-01T18:30:22',
'version' => '0.04'
},
{
'date' => '2008-01-02T13:16:19',
'version' => '0.05'
},
{
'date' => '2008-01-19T02:45:48',
'version' => '0.06'
},
{
'date' => '2008-01-19T04:46:15',
'version' => '0.07'
},
{
'date' => '2008-01-19T13:40:32',
'version' => '0.08'
},
{
'date' => '2008-01-20T07:59:32',
'version' => '0.20'
},
{
'date' => '2008-01-25T07:34:00',
'version' => '0.22'
},
{
'date' => '2008-01-26T10:16:38',
'version' => '0.23'
},
{
'date' => '2008-01-27T06:18:24',
'version' => '0.24'
},
{
'date' => '2008-04-09T15:15:08',
'version' => '0.25'
},
{
'date' => '2008-04-20T05:07:40',
'version' => '0.30'
},
{
'date' => '2008-04-20T11:43:55',
'version' => '0.31'
},
{
'date' => '2008-04-21T02:33:59',
'version' => '0.32'
},
{
'date' => '2008-05-13T04:32:15',
'version' => '0.32'
},
{
'date' => '2008-05-14T04:12:27',
'version' => '0.32'
},
{
'date' => '2008-06-14T07:29:30',
'version' => '0.32'
},
{
'date' => '2008-08-14T16:20:15',
'version' => '0.32'
},
{
'date' => '2008-08-22T09:54:45',
'version' => '0.32'
},
{
'date' => '2008-10-02T10:14:27',
'version' => '0.32'
},
{
'date' => '2008-11-07T01:24:33',
'version' => '0.32'
},
{
'date' => '2008-11-07T01:43:45',
'version' => '0.32'
},
{
'date' => '2008-11-08T01:14:56',
'version' => '0.32'
},
{
'date' => '2008-11-19T02:50:08',
'version' => '0.32'
},
{
'date' => '2009-02-10T11:05:56',
'version' => '0.32'
},
{
'date' => '2009-02-20T09:48:43',
'version' => '0.51'
},
{
'date' => '2009-03-24T11:22:16',
'version' => '0.52'
},
{
'date' => '2009-03-31T06:33:35',
'version' => '0.53'
},
{
'date' => '2009-04-07T10:51:35',
'version' => '0.54'
},
{
'date' => '2009-04-08T06:23:07',
'version' => '0.55'
},
{
'date' => '2009-04-08T08:36:37',
'version' => '0.56'
},
{
'date' => '2011-01-26T08:17:33',
'version' => '0.60'
},
{
'date' => '2011-05-18T04:36:44',
'version' => '0.57'
},
{
'date' => '2011-05-18T04:46:01',
'version' => '0.60'
},
{
'date' => '2011-05-24T01:35:05',
'version' => '0.60'
},
{
'date' => '2011-05-27T01:48:35',
'version' => '0.63'
},
{
'date' => '2012-11-06T05:23:15',
'version' => '0.70'
}
]
},
'Mozilla-CA' => {
'advisories' => [
{
'affected_versions' => [
'<20110914'
],
'cves' => [],
'description' => 'Google Chrome user alibo encountered an active "man in the middle" (MITM) attack on secure SSL connections to Google servers. The fraudulent certificate was mis-issued by DigiNotar, a Dutch Certificate Authority. DigiNotar has reported evidence that other fraudulent certificates were issued and in active use but the full extent of the compromise is not known.
',
'distribution' => 'Mozilla-CA',
'fixed_versions' => [
'>=20110914'
],
'id' => 'CPANSA-Mozilla-CA-2011-34',
'references' => [
'https://rt.cpan.org/Public/Bug/Display.html?id=70967',
'https://www.mozilla.org/en-US/security/advisories/mfsa2011-35/',
'https://www.mozilla.org/en-US/security/advisories/mfsa2011-34/'
],
'reported' => undef,
'severity' => undef
},
{
'affected_versions' => [
'<20240730'
],
'cves' => [
'CVE-2024-39689'
],
'description' => 'ECM GlobalTrust 2000 root certificates have been distrusted
',
'distribution' => 'Mozilla-CA',
'fixed_versions' => [
'>=20240730'
],
'id' => 'CPANSA-Mozilla-CA-2024-39689',
'references' => [
'https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/XpknYMPO8dI',
'https://groups.google.com/a/ccadb.org/g/public/c/wRs-zec8w7k/m/G_9QprJ2AQAJ',
'https://github.com/certifi/python-certifi/security/advisories/GHSA-248v-346w-9cwc',
'https://github.com/certifi/python-certifi/commit/bd8153872e9c6fc98f4023df9c2deaffea2fa463'
],
'reported' => '2024-06-11',
'severity' => 'low'
}
],
'main_module' => 'Mozilla::CA',
'versions' => [
{
'date' => '2011-01-22T12:13:20',
'version' => '20110122'
},
{
'date' => '2011-01-26T19:10:48',
'version' => '20110126'
},
{
'date' => '2011-02-11T22:42:06',
'version' => '20110209'
},
{
'date' => '2011-03-01T23:13:54',
'version' => '20110301'
},
{
'date' => '2011-04-09T21:15:42',
'version' => '20110409'
},
{
'date' => '2011-09-04T03:48:06',
'version' => '20110904'
},
{
'date' => '2011-09-15T08:01:35',
'version' => '20110914'
},
{
'date' => '2011-10-25T06:46:10',
'version' => '20111025'
},
{
'date' => '2012-01-18T06:52:33',
'version' => '20120118'
},
{
'date' => '2012-03-09T01:57:07',
'version' => '20120309'
},
{
'date' => '2012-08-22T00:27:51',
'version' => '20120822'
},
{
'date' => '2012-08-22T06:39:33',
'version' => '20120823'
},
{
'date' => '2013-01-14T18:34:17',
'version' => '20130114'
},
{
'date' => '2014-12-22T00:25:09',
'version' => '20141217'
},
{
'date' => '2015-08-26T05:56:57',
'version' => '20150826'
},
{
'date' => '2016-01-04T01:19:28',
'version' => '20160104'
},
{
'date' => '2018-03-01T11:34:46',
'version' => '20180117'
},
{
'date' => '2020-05-20T04:53:47',
'version' => '20200520'
},
{
'date' => '2021-10-01T21:38:43',
'version' => '20211001'
},
{
'date' => '2022-11-14T10:45:12',
'version' => '20221114'
},
{
'date' => '2023-08-01T15:43:22',
'version' => '20230801'
},
{
'date' => '2023-08-07T12:10:03',
'version' => '20230807'
},
{
'date' => '2023-08-21T18:15:27',
'version' => '20230821'
},
{
'date' => '2023-12-13T20:18:41',
'version' => '20231213'
},
{
'date' => '2024-03-13T15:19:08',
'version' => '20240313'
},
{
'date' => '2024-07-30T16:10:02',
'version' => '20240730'
},
{
'date' => '2024-09-24T02:19:55',
'version' => '20240924'
},
{
'date' => '2025-02-02T15:34:15',
'version' => '20250202'
}
]
},
'MySQL-Admin' => {
'advisories' => [
{
'affected_versions' => [
'<0.34'
],
'cves' => [],
'description' => 'Unspecified security issues.
',
'distribution' => 'MySQL-Admin',
'fixed_versions' => [
'>=0.34'
],
'id' => 'CPANSA-MySQL-Admin-1-1',
'references' => [
'https://metacpan.org/dist/MySQL-Admin/changes'
],
'reported' => undef,
'severity' => undef
}
],
'main_module' => 'MySQL::Admin',
'versions' => [
{
'date' => '2009-04-05T07:27:17',
'version' => '0.41'
},
{
'date' => '2009-04-25T12:13:07',
'version' => '0.42'
},
{
'date' => '2009-05-02T16:39:11',
'version' => '0.43'
},
{
'date' => '2009-05-06T16:32:16',
'version' => '0.44'
},
{
'date' => '2009-09-20T10:34:08',
'version' => '0.47'
},
{
'date' => '2009-09-20T17:52:11',
'version' => '0.48'
},
{
'date' => '2009-09-20T19:27:03',
'version' => '0.5'
},
{
'date' => '2009-09-23T13:03:36',
'version' => '0.51'
},
{
'date' => '2009-09-26T10:35:54',
'version' => '0.52'
},
{
'date' => '2009-09-28T06:12:57',
'version' => '0.54'
},
{
'date' => '2009-09-29T10:34:19',
'version' => '0.55'
},
{
'date' => '2009-09-30T16:13:36',
'version' => '0.56'
},
{
'date' => '2009-10-03T07:37:25',
'version' => '0.57'
},
{
'date' => '2009-10-04T06:02:37',
'version' => '0.58'
},
{
'date' => '2009-10-04T09:07:10',
'version' => '0.59'
},
{
'date' => '2009-10-05T15:31:56',
'version' => '0.6'
},
{
'date' => '2009-10-13T13:03:13',
'version' => '0.61'
},
{
'date' => '2009-10-13T13:28:16',
'version' => '0.62'
},
{
'date' => '2015-03-22T15:18:03',
'version' => '0.65'
},
{
'date' => '2015-03-24T07:27:33',
'version' => '0.66'
},
{
'date' => '2015-03-26T19:31:05',
'version' => '0.67'
},
{
'date' => '2015-03-30T18:13:38',
'version' => '0.68'
},
{
'date' => '2015-04-01T20:54:59',
'version' => '0.69'
},
{
'date' => '2015-04-02T18:13:25',
'version' => '0.7'
},
{
'date' => '2015-04-02T20:01:04',
'version' => '0.71'
},
{
'date' => '2015-04-06T19:38:13',
'version' => '0.72'
},
{
'date' => '2015-04-07T17:24:44',
'version' => '0.73'
},
{
'date' => '2015-04-09T20:30:39',
'version' => '0.74'
},
{
'date' => '2015-04-12T19:12:02',
'version' => '0.75'
},
{
'date' => '2015-04-18T10:10:22',
'version' => '0.76'
},
{
'date' => '2015-04-23T19:09:21',
'version' => '0.77'
},
{
'date' => '2015-06-19T21:18:27',
'version' => '0.79'
},
{
'date' => '2015-06-20T15:56:45',
'version' => '0.8'
},
{
'date' => '2015-06-21T11:51:26',
'version' => '0.81'
},
{
'date' => '2015-07-09T20:24:39',
'version' => '0.84'
},
{
'date' => '2015-07-10T12:25:42',
'version' => '0.85'
},
{
'date' => '2015-07-11T17:51:30',
'version' => '0.86'
},
{
'date' => '2015-07-26T19:47:51',
'version' => '0.87'
},
{
'date' => '2015-10-10T14:46:47',
'version' => '0.89'
},
{
'date' => '2015-10-31T17:56:24',
'version' => '0.9'
},
{
'date' => '2015-11-01T11:42:27',
'version' => '0.91'
},
{
'date' => '2015-11-01T13:05:50',
'version' => '0.92'
},
{
'date' => '2015-12-27T20:50:17',
'version' => '0.93'
},
{
'date' => '2016-01-25T20:30:24',
'version' => '0.94'
},
{
'date' => '2016-01-26T09:59:39',
'version' => '0.95'
},
{
'date' => '2016-01-26T13:59:30',
'version' => '0.96'
},
{
'date' => '2016-01-28T09:10:44',
'version' => '0.97'
},
{
'date' => '2016-02-03T21:51:55',
'version' => '0.98'
},
{
'date' => '2016-02-06T07:24:22',
'version' => '0.99'
},
{
'date' => '2016-02-06T10:01:55',
'version' => '1'
},
{
'date' => '2016-02-06T17:43:58',
'version' => '1.01'
},
{
'date' => '2016-02-14T18:20:01',
'version' => '1.02'
},
{
'date' => '2016-02-23T12:55:34',
'version' => '1.03'
},
{
'date' => '2016-02-24T14:56:54',
'version' => '1.04'
},
{
'date' => '2016-05-15T18:28:42',
'version' => '1.05'
},
{
'date' => '2016-06-25T20:34:51',
'version' => '1.06'
},
{
'date' => '2016-06-26T11:54:44',
'version' => '1.07'
},
{
'date' => '2016-10-26T20:01:37',
'version' => '1.08'
},
{
'date' => '2016-10-26T20:17:36',
'version' => '1.09'
},
{
'date' => '2017-01-25T20:32:12',
'version' => '1.1'
},
{
'date' => '2017-01-26T20:40:27',
'version' => '1.11'
},
{
'date' => '2017-01-29T19:25:00',
'version' => '1.12'
},
{
'date' => '2018-06-03T15:06:18',
'version' => '1.13'
},
{
'date' => '2018-06-10T16:38:09',
'version' => '1.14'
},
{
'date' => '2018-07-01T19:20:11',
'version' => '1.15'
},
{
'date' => '2018-07-24T05:59:11',
'version' => '1.16'
},
{
'date' => '2019-04-22T13:37:27',
'version' => '1.17'
},
{
'date' => '2019-05-26T14:49:11',
'version' => '1.18'
}
]
},
'Net-CIDR-Lite' => {
'advisories' => [
{
'affected_versions' => [
'<0.22'
],
'cves' => [
'CVE-2021-47154'
],
'description' => 'The Net::CIDR::Lite module before 0.22 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.
',
'distribution' => 'Net-CIDR-Lite',
'fixed_versions' => [
'>=0.22'
],
'id' => 'CPANSA-Net-CIDR-Lite-2021-47154',
'references' => [
'https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/',
'https://github.com/stigtsp/Net-CIDR-Lite/commit/23b6ff0590dc279521863a502e890ef19a5a76fc',
'https://metacpan.org/dist/Net-CIDR-Lite/changes',
'https://metacpan.org/pod/Net::CIDR::Lite'
],
'reported' => '2024-03-18',
'severity' => undef
}
],
'main_module' => 'Net::CIDR::Lite',
'versions' => [
{
'date' => '2001-10-23T22:54:21',
'version' => '0.02'
},
{
'date' => '2001-10-24T00:14:02',
'version' => '0.03'
},
{
'date' => '2001-10-24T00:55:11',
'version' => '0.04'
},
{
'date' => '2001-10-25T17:20:05',
'version' => '0.05'
},
{
'date' => '2001-10-31T01:40:19',
'version' => '0.06'
},
{
'date' => '2001-10-31T23:51:49',
'version' => '0.07'
},
{
'date' => '2001-11-26T23:12:47',
'version' => '0.08'
},
{
'date' => '2001-11-27T05:47:30',
'version' => '0.09'
},
{
'date' => '2001-11-27T18:25:47',
'version' => '0.10'
},
{
'date' => '2002-04-16T05:44:00',
'version' => '0.11'
},
{
'date' => '2002-07-15T07:07:02',
'version' => '0.12'
},
{
'date' => '2002-07-15T09:46:34',
'version' => '0.13'
},
{
'date' => '2002-07-15T16:31:01',
'version' => '0.14'
},
{
'date' => '2003-04-16T20:20:04',
'version' => '0.15'
},
{
'date' => '2005-05-18T19:01:44',
'version' => '0.16'
},
{
'date' => '2005-05-18T19:43:12',
'version' => '0.17'
},
{
'date' => '2005-05-21T08:14:32',
'version' => '0.18'
},
{
'date' => '2006-01-30T19:34:31',
'version' => '0.19'
},
{
'date' => '2006-02-14T00:58:01',
'version' => '0.20'
},
{
'date' => '2010-03-26T00:38:30',
'version' => '0.21'
},
{
'date' => '2021-04-04T21:03:12',
'version' => '0.22'
}
]
},
'Net-DNS' => {
'advisories' => [
{
'affected_versions' => [
'<0.63'
],
'cves' => [
'CVE-2007-6341'
],
'description' => 'Allows remote attackers to cause a denial of service (program "croak") via a crafted DNS response.
',
'distribution' => 'Net-DNS',
'fixed_versions' => [
'>=0.63'
],
'id' => 'CPANSA-Net-DNS-2008-01',
'references' => [
'https://metacpan.org/changes/distribution/Net-DNS'
],
'reported' => '2008-02-08'
},
{
'affected_versions' => [
'<0.60'
],
'cves' => [
'CVE-2007-3409'
],
'description' => 'Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop.
',
'distribution' => 'Net-DNS',
'fixed_versions' => [
'>=0.60'
],
'id' => 'CPANSA-Net-DNS-2007-3409',
'references' => [
'http://rt.cpan.org/Public/Bug/Display.html?id=27285',
'http://www.net-dns.org/docs/Changes.html',
'http://www.gentoo.org/security/en/glsa/glsa-200708-06.xml',
'http://www.mandriva.com/security/advisories?name=MDKSA-2007:146',
'http://www.redhat.com/support/errata/RHSA-2007-0674.html',
'ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc',
'http://www.novell.com/linux/security/advisories/2007_17_sr.html',
'http://www.trustix.org/errata/2007/0023/',
'http://www.ubuntu.com/usn/usn-483-1',
'http://www.securityfocus.com/bid/24669',
'http://www.securitytracker.com/id?1018376',
'http://secunia.com/advisories/25829',
'http://secunia.com/advisories/26014',
'http://secunia.com/advisories/26055',
'http://secunia.com/advisories/26012',
'http://secunia.com/advisories/26075',
'http://secunia.com/advisories/26211',
'http://secunia.com/advisories/26231',
'http://secunia.com/advisories/26417',
'http://secunia.com/advisories/26543',
'http://www.debian.org/security/2008/dsa-1515',
'http://secunia.com/advisories/29354',
'http://osvdb.org/37054',
'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10595',
'http://www.securityfocus.com/archive/1/473871/100/0/threaded'
],
'reported' => '2007-06-26',
'severity' => undef
},
{
'affected_versions' => [
'<0.60'
],
'cves' => [
'CVE-2007-3377'
],
'description' => 'Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.
',
'distribution' => 'Net-DNS',
'fixed_versions' => [
'>=0.60'
],
'id' => 'CPANSA-Net-DNS-2007-3377',
'references' => [
'http://www.nntp.perl.org/group/perl.qpsmtpd/2006/03/msg4810.html',
'http://rt.cpan.org/Public/Bug/Display.html?id=23961',
'https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245458',
'http://www.net-dns.org/docs/Changes.html',
'http://support.avaya.com/elmodocs2/security/ASA-2007-351.htm',
'http://www.gentoo.org/security/en/glsa/glsa-200708-06.xml',
'http://www.mandriva.com/security/advisories?name=MDKSA-2007:146',
'http://www.redhat.com/support/errata/RHSA-2007-0674.html',
'http://www.redhat.com/support/errata/RHSA-2007-0675.html',
'ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc',
'http://www.novell.com/linux/security/advisories/2007_17_sr.html',
'http://www.trustix.org/errata/2007/0023/',
'http://www.ubuntu.com/usn/usn-483-1',
'http://www.securityfocus.com/bid/24669',
'http://www.securitytracker.com/id?1018377',
'http://secunia.com/advisories/25829',
'http://secunia.com/advisories/26014',
'http://secunia.com/advisories/26055',
'http://secunia.com/advisories/26012',
'http://secunia.com/advisories/26075',
'http://secunia.com/advisories/26211',
'http://secunia.com/advisories/26231',
'http://secunia.com/advisories/26417',
'http://secunia.com/advisories/26508',
'http://secunia.com/advisories/26543',
'http://www.debian.org/security/2008/dsa-1515',
'http://secunia.com/advisories/29354',
'http://osvdb.org/37053',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/35112',
'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9904',
'http://www.securityfocus.com/archive/1/473871/100/0/threaded'
],
'reported' => '2007-06-25',
'severity' => undef
}
],
'main_module' => 'Net::DNS',
'versions' => [
{
'date' => '1997-02-04T10:03:21',
'version' => '0.02'
},
{
'date' => '1997-02-05T05:54:07',
'version' => '0.02'
},
{
'date' => '1997-02-10T16:24:12',
'version' => '0.03'
},
{
'date' => '1997-02-13T23:50:40',
'version' => '0.04'
},
{
'date' => '1997-03-28T06:22:18',
'version' => '0.05'
},
{
'date' => '1997-04-03T06:54:12',
'version' => '0.06'
},
{
'date' => '1997-04-19T18:07:46',
'version' => '0.07'
},
{
'date' => '1997-05-13T15:27:34',
'version' => '0.08'
},
{
'date' => '1997-05-29T22:16:14',
'version' => '0.09'
},
{
'date' => '1997-06-13T04:35:29',
'version' => '0.10'
},
{
'date' => '1997-07-06T18:10:05',
'version' => '0.11'
},
{
'date' => '1997-10-02T05:53:19',
'version' => '0.12'
},
{
'date' => '2002-02-01T21:32:42',
'version' => '0.14'
},
{
'date' => '2002-04-11T23:04:19',
'version' => '0.19'
},
{
'date' => '2002-05-15T00:39:48',
'version' => '0.20'
},
{
'date' => '2002-06-03T21:44:48',
'version' => '0.21'
},
{
'date' => '2002-06-06T21:48:08',
'version' => '0.22'
},
{
'date' => '2002-06-11T22:49:07',
'version' => '0.23'
},
{
'date' => '2002-07-06T20:17:50',
'version' => '0.24'
},
{
'date' => '2002-08-01T10:37:46',
'version' => '0.25'
},
{
'date' => '2002-08-05T20:11:20',
'version' => '0.26'
},
{
'date' => '2002-08-15T15:55:56',
'version' => '0.27'
},
{
'date' => '2002-08-21T00:18:55',
'version' => '0.28'
},
{
'date' => '2002-10-02T06:09:09',
'version' => '0.29'
},
{
'date' => '2002-11-07T13:19:03',
'version' => '0.30'
},
{
'date' => '2002-11-18T04:32:09',
'version' => '0.31'
},
{
'date' => '2003-01-05T21:37:55',
'version' => '0.32'
},
{
'date' => '2003-01-08T18:31:53',
'version' => '0.33'
},
{
'date' => '2003-03-06T19:19:53',
'version' => '0.34'
},
{
'date' => '2003-05-22T02:33:15',
'version' => '0.34_02'
},
{
'date' => '2003-05-23T01:24:00',
'version' => '0.34_03'
},
{
'date' => '2003-05-26T07:13:38',
'version' => '0.35'
},
{
'date' => '2003-05-28T22:24:43',
'version' => '0.36'
},
{
'date' => '2003-05-28T22:41:56',
'version' => '0.37'
},
{
'date' => '2003-06-05T23:55:14',
'version' => '0.38'
},
{
'date' => '2003-06-23T00:19:28',
'version' => '0.38_01'
},
{
'date' => '2003-07-29T09:34:12',
'version' => '0.38_02'
},
{
'date' => '2003-08-07T22:35:45',
'version' => '0.39'
},
{
'date' => '2003-08-12T04:10:01',
'version' => '0.39_01'
},
{
'date' => '2003-08-28T15:17:51',
'version' => '0.39_02'
},
{
'date' => '2003-09-01T22:18:39',
'version' => '0.40'
},
{
'date' => '2003-09-26T22:54:49',
'version' => '0.40_01'
},
{
'date' => '2003-10-03T15:57:27',
'version' => '0.41'
},
{
'date' => '2003-10-26T05:42:29',
'version' => '0.42'
},
{
'date' => '2003-12-01T04:39:24',
'version' => '0.42_01'
},
{
'date' => '2003-12-11T08:53:09',
'version' => '0.42_02'
},
{
'date' => '2003-12-12T00:28:17',
'version' => '0.43'
},
{
'date' => '2003-12-13T01:55:07',
'version' => '0.44'
},
{
'date' => '2004-01-03T06:49:06',
'version' => '0.44_01'
},
{
'date' => '2004-01-04T04:51:25',
'version' => '0.44_02'
},
{
'date' => '2004-01-08T05:56:11',
'version' => '0.45'
},
{
'date' => '2004-02-10T00:53:47',
'version' => '0.45_01'
},
{
'date' => '2004-02-21T12:53:34',
'version' => '0.46'
},
{
'date' => '2004-04-01T07:39:00',
'version' => '0.47'
},
{
'date' => '2004-05-06T19:18:31',
'version' => '0.47_01'
},
{
'date' => '2004-08-13T01:11:57',
'version' => '0.48'
},
{
'date' => '2005-03-07T14:31:55',
'version' => '0.48_01'
},
{
'date' => '2005-03-14T20:47:20',
'version' => '0.48_02'
},
{
'date' => '2005-03-22T15:54:51',
'version' => '0.48_03'
},
{
'date' => '2005-03-29T13:12:16',
'version' => '0.49'
},
{
'date' => '2005-05-24T08:07:55',
'version' => '0.49_01'
},
{
'date' => '2005-05-28T07:07:52',
'version' => '0.49_02'
},
{
'date' => '2005-06-01T20:51:43',
'version' => '0.49_03'
},
{
'date' => '2005-06-08T14:15:32',
'version' => '0.50'
},
{
'date' => '2005-06-10T11:00:29',
'version' => '0.51'
},
{
'date' => '2005-06-14T11:42:54',
'version' => '0.49_01'
},
{
'date' => '2005-06-22T14:32:45',
'version' => '0.49_01'
},
{
'date' => '2005-07-01T21:50:47',
'version' => '0.52'
},
{
'date' => '2005-07-22T12:23:21',
'version' => '0.53'
},
{
'date' => '2005-07-31T14:40:15',
'version' => '0.53_01'
},
{
'date' => '2005-10-18T14:39:03',
'version' => '0.53_02'
},
{
'date' => '2005-12-07T13:15:30',
'version' => '0.54'
},
{
'date' => '2005-12-14T10:29:42',
'version' => '0.55'
},
{
'date' => '2006-02-20T15:34:25',
'version' => '0.56'
},
{
'date' => '2006-02-24T16:21:14',
'version' => '0.57'
},
{
'date' => '2006-07-04T11:42:41',
'version' => '0.58'
},
{
'date' => '2006-09-18T19:31:10',
'version' => '0.59'
},
{
'date' => '2007-06-22T07:31:18',
'version' => '0.60'
},
{
'date' => '2007-08-01T12:26:55',
'version' => '0.61'
},
{
'date' => '2007-12-28T19:32:25',
'version' => '0.62'
},
{
'date' => '2008-02-08T15:49:50',
'version' => '0.63'
},
{
'date' => '2008-12-30T18:11:35',
'version' => '0.64'
},
{
'date' => '2009-01-26T18:19:23',
'version' => '0.65'
},
{
'date' => '2009-12-30T13:58:25',
'version' => '0.66'
},
{
'date' => '2011-10-25T12:14:24',
'version' => '0.66_01'
},
{
'date' => '2011-10-27T14:23:38',
'version' => '0.66_02'
},
{
'date' => '2011-10-28T14:31:06',
'version' => '0.66_03'
},
{
'date' => '2011-10-28T15:00:15',
'version' => '0.66_04'
},
{
'date' => '2011-10-31T14:36:02',
'version' => '0.66_06'
},
{
'date' => '2011-10-31T19:34:01',
'version' => '0.66_07'
},
{
'date' => '2011-11-02T21:52:59',
'version' => '0.66_08'
},
{
'date' => '2011-11-07T09:07:56',
'version' => '0.67'
},
{
'date' => '2012-01-23T13:41:03',
'version' => '0.67_01'
},
{
'date' => '2012-01-26T10:44:13',
'version' => '0.67_03'
},
{
'date' => '2012-01-27T08:47:28',
'version' => '0.67_04'
},
{
'date' => '2012-01-31T21:54:27',
'version' => '0.68'
},
{
'date' => '2012-01-31T22:11:31',
'version' => '0.68'
},
{
'date' => '2012-10-29T15:35:55',
'version' => '0.68_01'
},
{
'date' => '2012-10-31T10:25:57',
'version' => '0.68_02'
},
{
'date' => '2012-10-31T20:33:53',
'version' => '0.68_03'
},
{
'date' => '2012-11-12T07:15:13',
'version' => '0.68_04'
},
{
'date' => '2012-11-12T10:22:31',
'version' => '0.68_05'
},
{
'date' => '2012-11-19T12:57:25',
'version' => '0.68_06'
},
{
'date' => '2012-11-21T23:12:34',
'version' => '0.68_07'
},
{
'date' => '2012-11-23T22:12:01',
'version' => '0.68_08'
},
{
'date' => '2012-12-04T07:18:08',
'version' => '0.68_09'
},
{
'date' => '2012-12-05T12:07:43',
'version' => '0.69'
},
{
'date' => '2012-12-05T14:05:12',
'version' => '0.69_1'
},
{
'date' => '2012-12-06T11:10:17',
'version' => '0.70'
},
{
'date' => '2012-12-12T16:04:03',
'version' => '0.70_1'
},
{
'date' => '2012-12-15T11:18:56',
'version' => '0.71'
},
{
'date' => '2012-12-24T21:14:23',
'version' => '0.71_01'
},
{
'date' => '2012-12-28T15:03:57',
'version' => '0.72'
},
{
'date' => '2013-11-13T15:18:55',
'version' => '0.72_01'
},
{
'date' => '2013-11-14T16:13:33',
'version' => '0.72_02'
},
{
'date' => '2013-11-18T10:49:23',
'version' => '0.72_03'
},
{
'date' => '2013-11-19T21:52:50',
'version' => '0.72_04'
},
{
'date' => '2013-11-29T13:35:08',
'version' => '0.73'
},
{
'date' => '2013-12-24T15:21:50',
'version' => '0.73_1'
},
{
'date' => '2014-01-02T20:32:27',
'version' => '0.73_2'
},
{
'date' => '2014-01-05T20:31:16',
'version' => '0.73_3'
},
{
'date' => '2014-01-12T10:25:24',
'version' => '0.73_4'
},
{
'date' => '2014-01-13T15:59:49',
'version' => '0.73_5'
},
{
'date' => '2014-01-16T10:23:47',
'version' => '0.74'
},
{
'date' => '2014-03-03T21:33:39',
'version' => '0.74_1'
},
{
'date' => '2014-03-10T08:36:19',
'version' => '0.74_2'
},
{
'date' => '2014-04-03T21:00:45',
'version' => '0.74_3'
},
{
'date' => '2014-04-30T14:05:59',
'version' => '0.74_4'
},
{
'date' => '2014-05-05T06:05:46',
'version' => '0.74_5'
},
{
'date' => '2014-05-06T09:22:01',
'version' => '0.74_6'
},
{
'date' => '2014-05-08T09:54:21',
'version' => '0.75'
},
{
'date' => '2014-05-22T20:56:00',
'version' => '0.75_1'
},
{
'date' => '2014-05-23T22:26:56',
'version' => '0.76'
},
{
'date' => '2014-05-29T11:26:07',
'version' => '0.76_1'
},
{
'date' => '2014-06-05T16:04:39',
'version' => '0.76_2'
},
{
'date' => '2014-06-13T08:31:32',
'version' => '0.76_3'
},
{
'date' => '2014-06-13T21:57:13',
'version' => '0.77'
},
{
'date' => '2014-07-02T09:53:03',
'version' => '0.77_1'
},
{
'date' => '2014-07-09T07:09:44',
'version' => '0.77_2'
},
{
'date' => '2014-07-10T14:13:33',
'version' => '0.78'
},
{
'date' => '2014-07-30T21:41:25',
'version' => '0.78_1'
},
{
'date' => '2014-08-12T22:13:54',
'version' => '0.78_2'
},
{
'date' => '2014-08-15T14:40:22',
'version' => '0.78_3'
},
{
'date' => '2014-08-19T13:24:46',
'version' => '0.78_5'
},
{
'date' => '2014-08-22T22:29:13',
'version' => '0.79'
},
{
'date' => '2014-09-11T11:42:35',
'version' => '0.79_1'
},
{
'date' => '2014-09-15T14:51:32',
'version' => '0.79_2'
},
{
'date' => '2014-09-22T11:51:22',
'version' => '0.80'
},
{
'date' => '2014-10-20T08:19:15',
'version' => '0.80_1'
},
{
'date' => '2014-10-24T08:21:15',
'version' => '0.80_2'
},
{
'date' => '2014-10-29T13:44:16',
'version' => '0.81'
},
{
'date' => '2015-01-05T10:22:06',
'version' => '0.81_01'
},
{
'date' => '2015-01-20T14:12:38',
'version' => '0.82'
},
{
'date' => '2015-02-11T14:26:36',
'version' => '0.82_01'
},
{
'date' => '2015-02-18T11:05:47',
'version' => '0.82_02'
},
{
'date' => '2015-02-26T15:48:06',
'version' => '0.83'
},
{
'date' => '2015-05-27T10:04:50',
'version' => '1.00_01'
},
{
'date' => '2015-06-11T17:23:10',
'version' => '1.00_02'
},
{
'date' => '2015-06-15T10:02:08',
'version' => '1.00_03'
},
{
'date' => '2015-06-23T13:57:29',
'version' => '1.00_04'
},
{
'date' => '2015-06-26T09:37:11',
'version' => '1.00_05'
},
{
'date' => '2015-06-29T17:15:06',
'version' => '1.00_06'
},
{
'date' => '2015-07-01T13:51:22',
'version' => '1.00_07'
},
{
'date' => '2015-07-02T08:17:44',
'version' => '1.00_08'
},
{
'date' => '2015-07-06T17:28:32',
'version' => '1.01'
},
{
'date' => '2015-08-26T20:44:25',
'version' => '1.01_01'
},
{
'date' => '2015-09-03T06:21:58',
'version' => '1.01_02'
},
{
'date' => '2015-09-04T20:39:37',
'version' => '1.01_03'
},
{
'date' => '2015-09-08T08:26:06',
'version' => '1.01_04'
},
{
'date' => '2015-09-11T11:49:24',
'version' => '1.01_05'
},
{
'date' => '2015-09-15T18:51:53',
'version' => '1.01_06'
},
{
'date' => '2015-09-16T10:25:09',
'version' => '1.02'
},
{
'date' => '2015-09-22T13:39:43',
'version' => '1.02_01'
},
{
'date' => '2015-10-05T08:30:03',
'version' => '1.02_02'
},
{
'date' => '2015-10-06T20:39:36',
'version' => '1.02_03'
},
{
'date' => '2015-10-08T21:24:29',
'version' => '1.02_04'
},
{
'date' => '2015-10-13T07:30:39',
'version' => '1.02_05'
},
{
'date' => '2015-10-14T12:44:57',
'version' => '1.02_06'
},
{
'date' => '2015-10-20T09:59:26',
'version' => '1.02_07'
},
{
'date' => '2015-10-23T08:32:04',
'version' => '1.02_08'
},
{
'date' => '2015-10-27T16:07:21',
'version' => '1.02_09'
},
{
'date' => '2015-11-02T06:00:09',
'version' => '1.02_10'
},
{
'date' => '2015-11-08T13:49:33',
'version' => '1.03'
},
{
'date' => '2015-12-01T21:21:55',
'version' => '1.03_01'
},
{
'date' => '2015-12-02T14:27:42',
'version' => '1.03_02'
},
{
'date' => '2015-12-02T20:49:07',
'version' => '1.03_03'
},
{
'date' => '2015-12-08T20:41:10',
'version' => '1.04'
},
{
'date' => '2016-02-01T16:26:27',
'version' => '1.04_01'
},
{
'date' => '2016-02-02T08:03:42',
'version' => '1.04_02'
},
{
'date' => '2016-02-05T12:19:57',
'version' => '1.04_03'
},
{
'date' => '2016-02-29T12:32:53',
'version' => '1.04_04'
},
{
'date' => '2016-03-07T21:11:01',
'version' => '1.05'
},
{
'date' => '2016-03-21T13:15:38',
'version' => '1.05_01'
},
{
'date' => '2016-03-24T18:45:15',
'version' => '1.05_02'
},
{
'date' => '2016-04-04T21:53:54',
'version' => '1.05_03'
},
{
'date' => '2016-04-15T10:11:03',
'version' => '1.05_04'
},
{
'date' => '2016-04-17T12:05:46',
'version' => '1.05_05'
},
{
'date' => '2016-05-11T08:58:51',
'version' => '1.05_06'
},
{
'date' => '2016-05-22T07:54:41',
'version' => '1.05_07'
},
{
'date' => '2016-05-27T19:12:44',
'version' => '1.06'
},
{
'date' => '2016-06-22T08:54:06',
'version' => '1.06_01'
},
{
'date' => '2016-08-24T11:36:13',
'version' => '1.06_02'
},
{
'date' => '2016-08-25T15:01:31',
'version' => '1.06_03'
},
{
'date' => '2016-09-17T08:19:30',
'version' => '1.06_04'
},
{
'date' => '2016-11-12T03:24:33',
'version' => '1.06_05'
},
{
'date' => '2016-12-23T14:48:42',
'version' => '1.06_06'
},
{
'date' => '2016-12-29T17:16:20',
'version' => '1.07'
},
{
'date' => '2017-01-18T21:51:05',
'version' => '1.07_01'
},
{
'date' => '2017-01-27T10:44:03',
'version' => '1.07_02'
},
{
'date' => '2017-02-09T10:28:55',
'version' => '1.07_03'
},
{
'date' => '2017-02-13T10:08:41',
'version' => '1.07_04'
},
{
'date' => '2017-02-20T11:12:45',
'version' => '1.08'
},
{
'date' => '2017-03-06T09:33:06',
'version' => '1.08_02'
},
{
'date' => '2017-03-13T10:02:22',
'version' => '1.08_03'
},
{
'date' => '2017-03-22T09:48:52',
'version' => '1.08_04'
},
{
'date' => '2017-03-24T07:00:36',
'version' => '1.09'
},
{
'date' => '2017-04-19T13:10:57',
'version' => '1.09_01'
},
{
'date' => '2017-05-05T22:21:10',
'version' => '1.10'
},
{
'date' => '2017-05-31T09:07:40',
'version' => '1.10_01'
},
{
'date' => '2017-06-03T20:26:47',
'version' => '1.10_02'
},
{
'date' => '2017-06-12T12:03:07',
'version' => '1.10_03'
},
{
'date' => '2017-06-26T12:52:57',
'version' => '1.11'
},
{
'date' => '2017-07-07T21:50:10',
'version' => '1.11_01'
},
{
'date' => '2017-07-28T16:17:01',
'version' => '1.11_02'
},
{
'date' => '2017-08-15T10:33:15',
'version' => '1.11_03'
},
{
'date' => '2017-08-17T12:48:08',
'version' => '1.11_04'
},
{
'date' => '2017-08-18T13:15:31',
'version' => '1.12'
},
{
'date' => '2017-09-12T09:28:26',
'version' => '1.12_01'
},
{
'date' => '2017-10-06T09:07:45',
'version' => '1.12_02'
},
{
'date' => '2017-10-10T14:42:38',
'version' => '1.12_03'
},
{
'date' => '2017-10-18T09:49:20',
'version' => '1.13'
},
{
'date' => '2017-11-30T11:11:55',
'version' => '1.13_01'
},
{
'date' => '2017-12-07T10:17:12',
'version' => '1.13_02'
},
{
'date' => '2017-12-15T12:34:59',
'version' => '1.14'
},
{
'date' => '2018-01-31T10:11:39',
'version' => '1.14_01'
},
{
'date' => '2018-02-01T14:14:07',
'version' => '1.14_02'
},
{
'date' => '2018-02-09T11:42:14',
'version' => '1.15'
},
{
'date' => '2018-06-11T09:20:56',
'version' => '1.15_01'
},
{
'date' => '2018-06-14T10:46:39',
'version' => '1.15_02'
},
{
'date' => '2018-07-03T09:05:15',
'version' => '1.15_03'
},
{
'date' => '2018-07-06T10:03:02',
'version' => '1.15_04'
},
{
'date' => '2018-07-16T04:56:07',
'version' => '1.16'
},
{
'date' => '2018-07-20T16:22:38',
'version' => '1.16_01'
},
{
'date' => '2018-07-24T15:35:14',
'version' => '1.16_02'
},
{
'date' => '2018-07-25T07:10:24',
'version' => '1.17'
},
{
'date' => '2018-09-11T10:24:34',
'version' => '1.17_01'
},
{
'date' => '2018-09-11T15:32:52',
'version' => '1.17_02'
},
{
'date' => '2018-09-12T06:15:44',
'version' => '1.17_03'
},
{
'date' => '2018-09-21T14:49:48',
'version' => '1.18'
},
{
'date' => '2018-11-08T06:39:55',
'version' => '1.18_01'
},
{
'date' => '2018-11-15T06:02:14',
'version' => '1.19'
},
{
'date' => '2018-12-31T12:23:28',
'version' => '1.19_01'
},
{
'date' => '2019-01-28T09:48:25',
'version' => '1.19_02'
},
{
'date' => '2019-03-22T08:40:39',
'version' => '1.19_03'
},
{
'date' => '2019-03-22T14:13:56',
'version' => '1.20'
},
{
'date' => '2019-07-21T09:20:43',
'version' => '1.20_01'
},
{
'date' => '2019-07-23T14:51:08',
'version' => '1.20_02'
},
{
'date' => '2019-08-21T13:49:42',
'version' => '1.20_03'
},
{
'date' => '2019-08-30T08:37:40',
'version' => '1.21'
},
{
'date' => '2020-02-02T21:54:31',
'version' => '1.21_01'
},
{
'date' => '2020-02-13T13:56:48',
'version' => '1.22'
},
{
'date' => '2020-03-17T09:09:32',
'version' => '1.22_01'
},
{
'date' => '2020-03-18T14:55:27',
'version' => '1.23'
},
{
'date' => '2020-05-13T09:04:51',
'version' => '1.23_01'
},
{
'date' => '2020-05-27T12:47:25',
'version' => '1.24'
},
{
'date' => '2020-06-19T10:52:05',
'version' => '1.24_01'
},
{
'date' => '2020-06-23T13:07:04',
'version' => '1.24_02'
},
{
'date' => '2020-06-26T15:40:24',
'version' => '1.25'
},
{
'date' => '2020-07-28T12:55:42',
'version' => '1.25_01'
},
{
'date' => '2020-07-31T08:43:21',
'version' => '1.25_02'
},
{
'date' => '2020-08-06T15:55:03',
'version' => '1.26'
},
{
'date' => '2020-08-31T13:51:53',
'version' => '1.26_01'
},
{
'date' => '2020-09-07T08:02:00',
'version' => '1.26_02'
},
{
'date' => '2020-09-11T18:53:08',
'version' => '1.27'
},
{
'date' => '2020-10-08T22:00:15',
'version' => '1.27_01'
},
{
'date' => '2020-10-16T10:20:24',
'version' => '1.27_02'
},
{
'date' => '2020-10-19T08:09:59',
'version' => '1.27_03'
},
{
'date' => '2020-10-23T16:53:49',
'version' => '1.28'
},
{
'date' => '2020-11-16T16:33:26',
'version' => '1.28_01'
},
{
'date' => '2020-11-18T13:40:46',
'version' => '1.29'
},
{
'date' => '2020-12-24T15:37:27',
'version' => '1.29_01'
},
{
'date' => '2021-03-22T08:38:47',
'version' => '1.29_02'
},
{
'date' => '2021-03-28T09:38:33',
'version' => '1.29_03'
},
{
'date' => '2021-03-30T10:06:50',
'version' => '1.30'
},
{
'date' => '2021-05-02T12:43:26',
'version' => '1.31'
},
{
'date' => '2021-07-09T09:57:13',
'version' => '1.31_01'
},
{
'date' => '2021-07-16T14:24:25',
'version' => '1.32'
},
{
'date' => '2021-08-11T10:07:26',
'version' => '1.32_01'
},
{
'date' => '2021-12-08T10:42:13',
'version' => '1.32_02'
},
{
'date' => '2021-12-16T12:22:39',
'version' => '1.33'
},
{
'date' => '2022-05-21T10:05:03',
'version' => '1.33_01'
},
{
'date' => '2022-05-30T13:39:34',
'version' => '1.34'
},
{
'date' => '2022-09-23T13:43:05',
'version' => '1.34_01'
},
{
'date' => '2022-10-04T13:44:45',
'version' => '1.34_02'
},
{
'date' => '2022-10-04T20:02:07',
'version' => '1.35'
},
{
'date' => '2022-12-20T14:45:20',
'version' => '1.35_01'
},
{
'date' => '2022-12-21T11:28:18',
'version' => '1.35_02'
},
{
'date' => '2022-12-28T13:12:39',
'version' => '1.35_03'
},
{
'date' => '2022-12-30T15:53:37',
'version' => '1.36'
},
{
'date' => '2023-01-30T14:07:07',
'version' => '1.36_01'
},
{
'date' => '2023-02-20T15:36:17',
'version' => '1.36_02'
},
{
'date' => '2023-03-06T12:19:36',
'version' => '1.36_03'
},
{
'date' => '2023-03-13T18:06:16',
'version' => '1.37'
},
{
'date' => '2023-03-30T19:26:05',
'version' => '1.37_01'
},
{
'date' => '2023-04-17T12:34:49',
'version' => '1.37_02'
},
{
'date' => '2023-04-20T12:38:12',
'version' => '1.37_03'
},
{
'date' => '2023-04-25T20:37:19',
'version' => '1.37_04'
},
{
'date' => '2023-05-09T10:50:45',
'version' => '1.38'
},
{
'date' => '2023-05-31T14:12:28',
'version' => '1.38_01'
},
{
'date' => '2023-06-01T11:46:37',
'version' => '1.39'
},
{
'date' => '2023-08-23T14:53:17',
'version' => '1.39_01'
},
{
'date' => '2023-08-25T12:50:35',
'version' => '1.39_02'
},
{
'date' => '2023-08-30T18:16:07',
'version' => '1.40'
},
{
'date' => '2023-11-22T08:42:22',
'version' => '1.40_01'
},
{
'date' => '2023-11-27T13:28:04',
'version' => '1.41'
},
{
'date' => '2023-12-24T15:48:59',
'version' => '1.42'
},
{
'date' => '2024-01-04T11:21:08',
'version' => '1.42_01'
},
{
'date' => '2024-01-08T09:38:46',
'version' => '1.42_02'
},
{
'date' => '2024-01-10T15:04:01',
'version' => '1.42_03'
},
{
'date' => '2024-01-17T09:07:40',
'version' => '1.42_04'
},
{
'date' => '2024-01-25T11:08:34',
'version' => '1.42_05'
},
{
'date' => '2024-01-26T14:54:33',
'version' => '1.43'
},
{
'date' => '2024-02-14T09:22:32',
'version' => '1.43_01'
},
{
'date' => '2024-02-15T13:03:57',
'version' => '1.44'
},
{
'date' => '2024-04-21T08:24:10',
'version' => '1.44_01'
},
{
'date' => '2024-05-02T11:03:24',
'version' => '1.45'
},
{
'date' => '2024-07-26T03:56:44',
'version' => '1.45_01'
},
{
'date' => '2024-08-12T09:53:41',
'version' => '1.45_02'
},
{
'date' => '2024-08-19T15:12:15',
'version' => '1.46'
},
{
'date' => '2024-09-18T20:46:06',
'version' => '1.47'
},
{
'date' => '2024-11-07T14:13:26',
'version' => '1.47_01'
},
{
'date' => '2024-11-08T13:27:46',
'version' => '1.48'
},
{
'date' => '2024-12-16T13:43:49',
'version' => '1.48_01'
},
{
'date' => '2024-12-18T14:24:48',
'version' => '1.48_02'
},
{
'date' => '2024-12-27T13:12:51',
'version' => '1.49'
},
{
'date' => '2025-01-02T16:36:47',
'version' => '1.49_01'
},
{
'date' => '2025-01-29T09:05:23',
'version' => '1.49_02'
}
]
},
'Net-Dropbear' => {
'advisories' => [
{
'affected_versions' => [
'<0'
],
'comment' => 'From the author: "I have reviewed Dropbear\'s usage of libtomcrypt, and the function in question for CVE-2019-17362, der_decode_utf8_string, is not used in Dropbear. None of the DER parsing from libtomcrypt is used in Dropbear at all, I have confirmed that the flag to include it is not set, and confirmed that the resultant Dropbear.so that is built by Net::Dropbear does not include any of the der_* symbols."
',
'cves' => [
'CVE-2019-17362'
],
'description' => 'In LibTomCrypt through 1.18.2, the der_decode_utf8_string function (in der_decode_utf8_string.c) does not properly detect certain invalid UTF-8 sequences. This allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) or read information from other memory locations via carefully crafted DER-encoded data.
',
'distribution' => 'Net-Dropbear',
'embedded_vulnerability' => {
'affected_versions' => '<0',
'distributed_version' => '1.8.2',
'name' => 'libtomcrypt'
},
'fixed_versions' => [
'>0'
],
'id' => 'CPANSA-Net-Dropbear-2019-17362',
'references' => [
'https://github.com/atrodo/Net-Dropbear/issues/6',
'https://github.com/libtom/libtomcrypt/pull/508',
'https://github.com/libtom/libtomcrypt/issues/507',
'https://vuldb.com/?id.142995',
'https://lists.debian.org/debian-lts-announce/2019/10/msg00010.html',
'http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00020.html',
'http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00041.html'
],
'reported' => '2019-10-09',
'severity' => 'critical'
}
],
'main_module' => 'Net::Dropbear',
'versions' => [
{
'date' => '2015-11-03T18:31:23',
'version' => '0.01'
},
{
'date' => '2015-11-04T04:17:39',
'version' => '0.02'
},
{
'date' => '2015-11-05T06:49:56',
'version' => '0.03'
},
{
'date' => '2015-11-07T03:40:31',
'version' => '0.04'
},
{
'date' => '2015-11-29T00:37:40',
'version' => '0.06'
},
{
'date' => '2016-01-02T05:57:50',
'version' => '0.07'
},
{
'date' => '2016-08-04T05:36:45',
'version' => '0.08'
},
{
'date' => '2016-08-08T05:56:46',
'version' => '0.09'
},
{
'date' => '2016-08-10T05:05:32',
'version' => '0.10'
},
{
'date' => '2020-03-17T04:05:13',
'version' => '0.11'
},
{
'date' => '2020-03-20T02:33:34',
'version' => '0.12'
},
{
'date' => '2020-03-21T14:51:53',
'version' => '0.13'
},
{
'date' => '2021-05-28T04:07:12',
'version' => '0.14'
},
{
'date' => '2022-07-01T04:48:35',
'version' => '0.15'
},
{
'date' => '2022-07-08T03:18:20',
'version' => '0.16'
}
]
},
'Net-IPAddress-Util' => {
'advisories' => [
{
'affected_versions' => [
'<5.000'
],
'cves' => [
'CVE-2021-47156'
],
'description' => 'The Net::IPAddress::Util module before 5.000 for Perl does not properly consider extraneous zero characters in an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.
',
'distribution' => 'Net-IPAddress-Util',
'fixed_versions' => [
'>=5.000'
],
'id' => 'CPANSA-Net-IPAddress-Util-2021-47156',
'references' => [
'https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/',
'https://metacpan.org/release/Net-IPAddress-Util',
'https://metacpan.org/release/PWBENNETT/Net-IPAddress-Util-5.000/changes'
],
'reported' => '2024-03-18',
'severity' => undef
}
],
'main_module' => 'Net::IPAddress::Util',
'versions' => [
{
'date' => '2010-03-21T17:13:19',
'version' => '0.01'
},
{
'date' => '2010-03-21T21:58:11',
'version' => '0.02'
},
{
'date' => '2010-03-21T23:54:15',
'version' => '0.03'
},
{
'date' => '2010-03-22T00:50:40',
'version' => '0.04'
},
{
'date' => '2010-03-23T11:38:32',
'version' => '0.05'
},
{
'date' => '2010-03-24T10:42:02',
'version' => '0.06'
},
{
'date' => '2010-03-25T10:58:12',
'version' => '0.07'
},
{
'date' => '2010-03-26T11:06:58',
'version' => '0.08'
},
{
'date' => '2010-03-27T15:38:27',
'version' => '0.09'
},
{
'date' => '2010-04-29T01:26:36',
'version' => '0.10'
},
{
'date' => '2011-03-26T22:10:10',
'version' => '0.11'
},
{
'date' => '2011-03-27T00:22:54',
'version' => '0.12'
},
{
'date' => '2012-05-30T10:03:21',
'version' => '1.000'
},
{
'date' => '2012-05-31T10:48:35',
'version' => '1.001'
},
{
'date' => '2012-06-09T08:44:51',
'version' => '1.002'
},
{
'date' => '2013-10-29T14:27:36',
'version' => '2.000'
},
{
'date' => '2013-10-29T14:31:44',
'version' => '2.000_TRIAL'
},
{
'date' => '2013-10-30T03:01:39',
'version' => '2.001_TRIAL'
},
{
'date' => '2013-10-30T03:32:06',
'version' => '2.002_TRIAL'
},
{
'date' => '2013-10-30T11:47:01',
'version' => '2.003_TRIAL'
},
{
'date' => '2013-10-30T15:53:55',
'version' => '2.004_TRIAL'
},
{
'date' => '2013-11-01T02:53:47',
'version' => '1.500'
},
{
'date' => '2013-11-02T02:04:49',
'version' => '3.000'
},
{
'date' => '2014-04-29T10:09:11',
'version' => '3.001'
},
{
'date' => '2014-06-10T06:38:16',
'version' => '3.002'
},
{
'date' => '2014-06-14T21:40:33',
'version' => '3.003'
},
{
'date' => '2014-09-24T11:29:12',
'version' => '3.010'
},
{
'date' => '2014-09-24T13:12:04',
'version' => '3.011'
},
{
'date' => '2014-09-26T05:01:04',
'version' => '3.012'
},
{
'date' => '2014-09-27T15:52:03',
'version' => '3.013'
},
{
'date' => '2014-09-27T15:59:49',
'version' => '3.014'
},
{
'date' => '2014-09-30T03:35:57',
'version' => '3.015'
},
{
'date' => '2014-09-30T03:47:35',
'version' => '3.016'
},
{
'date' => '2014-09-30T05:30:38',
'version' => '3.017'
},
{
'date' => '2014-09-30T06:56:39',
'version' => '3.018'
},
{
'date' => '2015-01-11T03:59:42',
'version' => '3.019'
},
{
'date' => '2015-01-11T23:29:32',
'version' => '3.020'
},
{
'date' => '2015-02-18T06:04:51',
'version' => '3.021'
},
{
'date' => '2015-03-21T16:22:56',
'version' => '3.022'
},
{
'date' => '2016-03-30T16:54:57',
'version' => '3.024'
},
{
'date' => '2016-03-30T23:56:29',
'version' => '3.025'
},
{
'date' => '2016-04-07T19:36:23',
'version' => '3.026'
},
{
'date' => '2016-04-13T13:40:55',
'version' => '3.027'
},
{
'date' => '2017-08-17T16:40:13',
'version' => '3.028'
},
{
'date' => '2017-08-17T21:11:21',
'version' => '3.029'
},
{
'date' => '2017-08-18T18:07:20',
'version' => '3.030'
},
{
'date' => '2017-08-18T19:01:22',
'version' => '3.031'
},
{
'date' => '2017-08-31T16:41:45',
'version' => '3.032'
},
{
'date' => '2017-08-31T19:39:56',
'version' => '3.033'
},
{
'date' => '2017-09-20T19:26:27',
'version' => '3.034'
},
{
'date' => '2017-09-21T10:14:03',
'version' => '4.000'
},
{
'date' => '2017-09-22T13:04:11',
'version' => '4.001'
},
{
'date' => '2017-10-04T18:28:54',
'version' => '4.002'
},
{
'date' => '2017-10-05T18:08:46',
'version' => '4.003'
},
{
'date' => '2017-10-05T18:44:53',
'version' => '4.004'
},
{
'date' => '2021-04-05T18:40:34',
'version' => '5.000'
},
{
'date' => '2021-04-11T04:34:22',
'version' => '5.001'
}
]
},
'Net-IPv4Addr' => {
'advisories' => [
{
'affected_versions' => [
'>=0.10'
],
'cves' => [
'CVE-2021-47155'
],
'description' => 'The Net::IPAddress::Util module before 5.000 for Perl does not properly consider extraneous zero characters in an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.
',
'distribution' => 'Net-IPv4Addr',
'fixed_versions' => [],
'id' => 'CPANSA-Net-IPV4Addr-2021-47155',
'references' => [
'https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/',
'https://metacpan.org/release/Net-IPAddress-Util',
'https://metacpan.org/release/PWBENNETT/Net-IPAddress-Util-5.000/changes'
],
'reported' => '2024-03-18',
'severity' => undef
}
],
'main_module' => 'Net::IPv4Addr',
'versions' => [
{
'date' => '1999-10-20T01:18:13',
'version' => '0.07'
},
{
'date' => '1999-12-17T23:08:34',
'version' => '0.08'
},
{
'date' => '1999-12-17T23:10:21',
'version' => '0.8'
},
{
'date' => '2000-05-03T20:24:59',
'version' => '0.09'
},
{
'date' => '2000-08-07T19:39:33',
'version' => '0.10'
}
]
},
'Net-Netmask' => {
'advisories' => [
{
'affected_versions' => [
'<2.0000'
],
'cves' => [
'CVE-2021-29424'
],
'description' => 'The Net::Netmask module before 2.0000 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.
',
'distribution' => 'Net-Netmask',
'fixed_versions' => [
'>=2.0000'
],
'id' => 'CPANSA-Net-Netmask-2021-01',
'references' => [
'https://security.netapp.com/advisory/ntap-20210604-0007/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CBJVLXJSWN6DKSF5ADUEERI6M23R3GGP/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JF4CYIZELC3NISB3RMV4OCI4GYBC557B/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y7JIPQAY5OZ5D3DA7INQILU7SGHTHMWB/',
'https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/',
'https://metacpan.org/changes/distribution/Net-Netmask#L11-22'
],
'reported' => '2021-03-29'
}
],
'main_module' => 'Net::Netmask',
'versions' => [
{
'date' => '1998-06-08T05:38:00',
'version' => '1.0'
},
{
'date' => '1998-06-08T22:46:00',
'version' => '1.2'
},
{
'date' => '1998-06-25T17:03:00',
'version' => '1.3'
},
{
'date' => '1998-11-29T20:50:00',
'version' => '1.4'
},
{
'date' => '1999-03-28T03:32:00',
'version' => '1.6'
},
{
'date' => '1999-09-15T17:44:00',
'version' => '1.7'
},
{
'date' => '1999-09-21T00:53:00',
'version' => '1.8'
},
{
'date' => '2001-05-16T09:18:57',
'version' => '1.9'
},
{
'date' => '2001-09-30T06:14:00',
'version' => '1.9001'
},
{
'date' => '2001-11-12T18:20:00',
'version' => '1.9002'
},
{
'date' => '2003-05-27T15:36:25',
'version' => '1.9003'
},
{
'date' => '2003-05-29T03:36:30',
'version' => '1.9004'
},
{
'date' => '2003-11-29T22:49:00',
'version' => '1.9005'
},
{
'date' => '2003-12-05T22:02:00',
'version' => '1.9006'
},
{
'date' => '2004-01-02T23:56:00',
'version' => '1.9007'
},
{
'date' => '2004-04-06T20:15:00',
'version' => '1.9008'
},
{
'date' => '2004-04-12T21:05:00',
'version' => '1.9009'
},
{
'date' => '2004-05-31T19:48:00',
'version' => '1.9011'
},
{
'date' => '2005-05-19T15:45:00',
'version' => '1.9012'
},
{
'date' => '2006-09-06T19:27:00',
'version' => '1.9013'
},
{
'date' => '2006-10-14T01:20:00',
'version' => '1.9014'
},
{
'date' => '2006-11-30T21:06:00',
'version' => '1.9015'
},
{
'date' => '2011-03-23T04:41:06',
'version' => '1.9016'
},
{
'date' => '2013-09-21T01:56:56',
'version' => '1.9017'
},
{
'date' => '2013-09-27T01:25:15',
'version' => '1.9018'
},
{
'date' => '2013-10-02T00:42:56',
'version' => '1.9019'
},
{
'date' => '2014-07-18T00:15:30',
'version' => '1.9021'
},
{
'date' => '2015-05-05T03:36:33',
'version' => '1.9022'
},
{
'date' => '2018-06-04T04:39:04',
'version' => '1.9100'
},
{
'date' => '2018-06-05T01:21:39',
'version' => '1.9101'
},
{
'date' => '2018-06-18T16:35:20',
'version' => '1.9102'
},
{
'date' => '2018-06-18T21:31:04',
'version' => '1.9103'
},
{
'date' => '2018-07-27T04:52:04',
'version' => '1.9104'
},
{
'date' => '2018-07-27T23:03:36',
'version' => '1.9104'
},
{
'date' => '2021-03-29T17:24:43',
'version' => '2.0000'
},
{
'date' => '2021-03-29T19:31:52',
'version' => '2.0001'
},
{
'date' => '2022-08-31T18:09:46',
'version' => '2.0002'
}
]
},
'Net-OAuth' => {
'advisories' => [
{
'affected_versions' => [
'<0.29'
],
'cves' => [
'CVE-2025-22376'
],
'description' => 'In Net::OAuth::Client in the Net::OAuth package before 0.29 for Perl, the default nonce is a 32-bit integer generated from the built-in rand() function, which is not cryptographically strong.
',
'distribution' => 'Net-OAuth',
'fixed_versions' => [
'>=0.29'
],
'id' => 'CPANSA-Net-OAuth-2025-22376',
'references' => [
'https://metacpan.org/release/KGRENNAN/Net-OAuth-0.28/source/lib/Net/OAuth/Client.pm#L260',
'https://metacpan.org/release/RRWO/Net-OAuth-0.29/changes'
],
'reported' => '2025-01-03',
'severity' => 'high'
}
],
'main_module' => 'Net::OAuth',
'versions' => [
{
'date' => '2007-09-30T14:22:46',
'version' => '0.01'
},
{
'date' => '2007-10-02T07:37:48',
'version' => '0.02'
},
{
'date' => '2007-10-15T01:37:47',
'version' => '0.03'
},
{
'date' => '2007-10-19T16:49:05',
'version' => '0.04'
},
{
'date' => '2007-11-19T03:34:37',
'version' => '0.05'
},
{
'date' => '2008-03-08T00:52:34',
'version' => '0.06'
},
{
'date' => '2008-06-01T16:10:24',
'version' => '0.07'
},
{
'date' => '2008-06-02T17:46:32',
'version' => '0.08'
},
{
'date' => '2008-06-03T03:48:14',
'version' => '0.09'
},
{
'date' => '2008-06-04T16:32:57',
'version' => '0.1'
},
{
'date' => '2008-06-04T16:52:05',
'version' => '0.11'
},
{
'date' => '2008-07-04T23:04:35',
'version' => '0.12'
},
{
'date' => '2008-11-13T22:55:38',
'version' => '0.13'
},
{
'date' => '2008-12-13T17:32:02',
'version' => '0.14'
},
{
'date' => '2009-06-05T01:27:05',
'version' => '0.15'
},
{
'date' => '2009-06-15T18:40:40',
'version' => '0.16'
},
{
'date' => '2009-06-25T17:05:32',
'version' => '0.17'
},
{
'date' => '2009-06-25T17:21:13',
'version' => '0.18'
},
{
'date' => '2009-06-26T17:37:04',
'version' => '0.19'
},
{
'date' => '2009-11-13T19:04:23',
'version' => '0.20'
},
{
'date' => '2010-03-10T23:07:13',
'version' => '0.21'
},
{
'date' => '2010-03-11T00:25:24',
'version' => '0.22'
},
{
'date' => '2010-03-18T17:53:01',
'version' => '0.23'
},
{
'date' => '2010-03-21T03:44:38',
'version' => '0.24'
},
{
'date' => '2010-03-21T03:53:29',
'version' => '0.25'
},
{
'date' => '2010-06-16T20:08:26',
'version' => '0.26'
},
{
'date' => '2010-06-16T20:47:49',
'version' => '0.27'
},
{
'date' => '2012-01-06T06:08:03',
'version' => '0.28'
},
{
'date' => '2025-01-03T09:18:44',
'version' => '0.29'
},
{
'date' => '2025-01-03T09:48:29',
'version' => '0.30'
}
]
},
'Net-OpenID-Consumer' => {
'advisories' => [
{
'affected_versions' => [
'<1.12'
],
'cves' => [],
'description' => 'A potential timing attack when checking signatures.
',
'distribution' => 'Net-OpenID-Consumer',
'fixed_versions' => [
'>=1.12'
],
'id' => 'CPANSA-Net-OpenID-Consumer-2010-01',
'references' => [
'https://metacpan.org/changes/distribution/Net-OpenID-Consumer',
'https://github.com/wrog/Net-OpenID-Consumer/commit/4e82c7e4b6ad4bc40571c5cfcaa58f9365b147a5',
'http://lists.openid.net/pipermail/openid-security/2010-July/001156.html'
],
'reported' => '2010-11-06'
},
{
'affected_versions' => [
'<0.06'
],
'cves' => [],
'description' => 'Incorrect comparison of system openssl status when doing DSA checks.
',
'distribution' => 'Net-OpenID-Consumer',
'fixed_versions' => [
'>=0.06'
],
'id' => 'CPANSA-Net-OpenID-Consumer-2015-05',
'references' => [
'https://metacpan.org/changes/distribution/Net-OpenID-Consumer'
],
'reported' => '2015-05-26'
}
],
'main_module' => 'Net::OpenID::Consumer',
'versions' => [
{
'date' => '2005-05-23T03:02:59',
'version' => '0.02'
},
{
'date' => '2005-05-23T08:05:35',
'version' => '0.03'
},
{
'date' => '2005-05-25T05:08:25',
'version' => '0.04'
},
{
'date' => '2005-05-25T06:14:44',
'version' => '0.05'
},
{
'date' => '2005-05-26T06:18:39',
'version' => '0.06'
},
{
'date' => '2005-05-26T06:56:30',
'version' => '0.07'
},
{
'date' => '2005-05-26T07:18:01',
'version' => '0.08'
},
{
'date' => '2005-06-23T23:50:47',
'version' => '0.09'
},
{
'date' => '2005-06-27T04:43:01',
'version' => '0.10'
},
{
'date' => '2005-06-27T21:59:47',
'version' => '0.11'
},
{
'date' => '2005-07-13T17:57:27',
'version' => '0.12'
},
{
'date' => '2007-04-16T17:58:45',
'version' => '0.13'
},
{
'date' => '2007-08-03T22:07:20',
'version' => '0.14'
},
{
'date' => '2008-10-13T02:30:05',
'version' => '1.01'
},
{
'date' => '2008-10-14T04:39:07',
'version' => '1.02'
},
{
'date' => '2008-11-30T02:02:17',
'version' => '1.03'
},
{
'date' => '2010-02-18T15:32:06',
'version' => '1.04'
},
{
'date' => '2010-02-18T16:01:19',
'version' => '1.05'
},
{
'date' => '2010-03-16T17:38:56',
'version' => '1.06'
},
{
'date' => '2010-11-06T02:24:29',
'version' => '1.030099_001'
},
{
'date' => '2010-11-07T11:21:33',
'version' => '1.030099_002'
},
{
'date' => '2010-11-08T22:35:52',
'version' => '1.030099_003'
},
{
'date' => '2010-12-17T21:57:03',
'version' => '1.030099_004'
},
{
'date' => '2011-01-01T01:55:09',
'version' => '1.030099_005'
},
{
'date' => '2011-10-23T01:35:49',
'version' => '1.030099_006'
},
{
'date' => '2011-10-25T23:10:00',
'version' => '1.100099_001'
},
{
'date' => '2011-11-02T10:38:05',
'version' => '1.100099_002'
},
{
'date' => '2011-11-04T23:01:32',
'version' => '1.11'
},
{
'date' => '2011-11-07T17:16:08',
'version' => '1.12'
},
{
'date' => '2011-11-15T03:28:36',
'version' => '1.13'
},
{
'date' => '2013-04-01T13:17:57',
'version' => '1.14'
},
{
'date' => '2013-09-06T23:47:04',
'version' => '1.15'
},
{
'date' => '2014-09-15T21:38:12',
'version' => '1.16'
},
{
'date' => '2016-01-15T11:45:55',
'version' => '1.17'
},
{
'date' => '2016-02-08T01:40:13',
'version' => '1.18'
}
]
},
'Net-Ping-External' => {
'advisories' => [
{
'affected_versions' => [
'<=0.15'
],
'cves' => [
'CVE-2008-7319'
],
'description' => 'The Net::Ping::External extension through 0.15 for Perl does not properly sanitize arguments (e.g., invalid hostnames) containing shell metacharacters before use of backticks in External.pm, allowing for shell command injection and arbitrary command execution if untrusted input is used.
',
'distribution' => 'Net-Ping-External',
'fixed_versions' => [],
'id' => 'CPANSA-Net-Ping-External-2008-7319',
'references' => [
'https://rt.cpan.org/Public/Bug/Display.html?id=33230',
'https://bugs.debian.org/881097',
'http://www.openwall.com/lists/oss-security/2017/11/07/4',
'http://matthias.sdfeu.org/devel/net-ping-external-cmd-injection.patch'
],
'reported' => '2017-11-07',
'severity' => 'critical'
}
],
'main_module' => 'Net::Ping::External',
'versions' => [
{
'date' => '2001-03-15T21:53:04',
'version' => '0.01'
},
{
'date' => '2001-03-22T00:15:08',
'version' => '0.02'
},
{
'date' => '2001-03-23T08:35:49',
'version' => '0.03'
},
{
'date' => '2001-04-20T17:33:31',
'version' => '0.04'
},
{
'date' => '2001-04-20T18:43:34',
'version' => '0.05'
},
{
'date' => '2001-04-26T02:59:41',
'version' => '0.06'
},
{
'date' => '2001-09-28T02:20:34',
'version' => '0.07'
},
{
'date' => '2001-09-30T21:39:47',
'version' => '0.08'
},
{
'date' => '2001-11-10T06:10:33',
'version' => '0.09'
},
{
'date' => '2001-11-10T16:19:21',
'version' => '0.10'
},
{
'date' => '2003-02-11T22:41:33',
'version' => '0.11'
},
{
'date' => '2006-09-07T10:52:21',
'version' => '0.12_01'
},
{
'date' => '2007-01-31T22:09:41',
'version' => '0.12_02'
},
{
'date' => '2007-02-08T16:06:46',
'version' => '0.12'
},
{
'date' => '2008-12-18T20:27:07',
'version' => '0.13'
},
{
'date' => '2013-10-29T17:05:01',
'version' => '0.14'
},
{
'date' => '2014-04-12T21:37:12',
'version' => '0.15'
}
]
},
'Net-SNMP' => {
'advisories' => [
{
'affected_versions' => [
'>=5.1.4,<6.0.0'
],
'cves' => [
'CVE-2008-2292'
],
'description' => 'Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large OCTETSTRING in an attribute value pair (AVP).
',
'distribution' => 'Net-SNMP',
'fixed_versions' => [
'>=6.0.0'
],
'id' => 'CPANSA-Net-SNMP-2008-2292',
'references' => [
'http://sourceforge.net/tracker/index.php?func=detail&aid=1826174&group_id=12694&atid=112694',
'http://www.securityfocus.com/bid/29212',
'http://secunia.com/advisories/30187',
'https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html',
'http://www.vmware.com/security/advisories/VMSA-2008-0013.html',
'http://secunia.com/advisories/31334',
'http://secunia.com/advisories/30647',
'http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html',
'https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html',
'http://secunia.com/advisories/31155',
'http://secunia.com/advisories/31351',
'http://security.gentoo.org/glsa/glsa-200808-02.xml',
'http://sunsolve.sun.com/search/document.do?assetkey=1-26-239785-1',
'http://www.mandriva.com/security/advisories?name=MDVSA-2008:118',
'http://secunia.com/advisories/31467',
'https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html',
'http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm',
'http://secunia.com/advisories/31568',
'http://www.debian.org/security/2008/dsa-1663',
'http://secunia.com/advisories/30615',
'http://www.redhat.com/support/errata/RHSA-2008-0529.html',
'http://secunia.com/advisories/32664',
'http://www.ubuntu.com/usn/usn-685-1',
'http://secunia.com/advisories/33003',
'http://www.vupen.com/english/advisories/2008/2361',
'http://www.vupen.com/english/advisories/2008/2141/references',
'http://www.vupen.com/english/advisories/2008/1528/references',
'http://www.securitytracker.com/id?1020527',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/42430',
'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11261'
],
'reported' => '2008-05-18',
'severity' => undef
},
{
'affected_versions' => [
'<=5.2.1.2'
],
'cves' => [
'CVE-2005-2811'
],
'description' => 'Untrusted search path vulnerability in Net-SNMP 5.2.1.2 and earlier, on Gentoo Linux, installs certain Perl modules with an insecure DT_RPATH, which could allow local users to gain privileges.
',
'distribution' => 'Net-SNMP',
'fixed_versions' => [],
'id' => 'CPANSA-Net-SNMP-2005-2811',
'references' => [
'http://www.gentoo.org/security/en/glsa/glsa-200509-05.xml'
],
'reported' => '2005-09-07',
'severity' => undef
},
{
'affected_versions' => [
'<=5.7.3'
],
'cves' => [
'CVE-2014-2285'
],
'description' => 'The perl_trapd_handler function in perl/TrapReceiver/TrapReceiver.xs in Net-SNMP 5.7.3.pre3 and earlier, when using certain Perl versions, allows remote attackers to cause a denial of service (snmptrapd crash) via an empty community string in an SNMP trap, which triggers a NULL pointer dereference within the newSVpv function in Perl.
',
'distribution' => 'Net-SNMP',
'fixed_versions' => [],
'id' => 'CPANSA-Net-SNMP-2014-2285',
'references' => [
'http://lists.opensuse.org/opensuse-updates/2014-03/msg00060.html',
'http://comments.gmane.org/gmane.comp.security.oss.general/12284',
'https://bugzilla.redhat.com/show_bug.cgi?id=1072778',
'http://sourceforge.net/p/net-snmp/patches/1275/',
'http://www.nntp.perl.org/group/perl.perl5.porters/2006/09/msg116250.html',
'https://bugzilla.redhat.com/show_bug.cgi?id=1072044',
'http://lists.opensuse.org/opensuse-updates/2014-03/msg00061.html',
'http://secunia.com/advisories/59974',
'http://www.gentoo.org/security/en/glsa/glsa-201409-02.xml',
'https://rhn.redhat.com/errata/RHSA-2014-0322.html',
'http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705'
],
'reported' => '2014-04-27',
'severity' => undef
}
],
'main_module' => 'Net::SNMP',
'versions' => [
{
'date' => '1998-10-14T13:13:11',
'version' => '1.10'
},
{
'date' => '1998-11-06T14:25:38',
'version' => '1.20'
},
{
'date' => '1999-03-17T13:51:17',
'version' => '1.30'
},
{
'date' => '1999-04-26T13:39:02',
'version' => '1.40'
},
{
'date' => '1999-05-06T16:25:03',
'version' => '2.00'
},
{
'date' => '1999-08-12T15:23:21',
'version' => '2.99'
},
{
'date' => '1999-09-09T13:30:41',
'version' => '3.00'
},
{
'date' => '2000-01-01T18:12:05',
'version' => '3.01'
},
{
'date' => '2000-05-06T04:35:25',
'version' => '3.50'
},
{
'date' => '2000-09-09T15:00:00',
'version' => '3.60'
},
{
'date' => '2001-09-09T13:33:46',
'version' => '3.65'
},
{
'date' => '2001-11-09T14:14:48',
'version' => 'v4.0.0'
},
{
'date' => '2002-01-01T14:16:29',
'version' => 'v4.0.1'
},
{
'date' => '2002-05-06T12:51:31',
'version' => 'v4.0.2'
},
{
'date' => '2002-09-09T12:55:22',
'version' => 'v4.0.3'
},
{
'date' => '2003-05-06T11:06:55',
'version' => 'v4.1.0'
},
{
'date' => '2003-09-09T12:50:16',
'version' => 'v4.1.1'
},
{
'date' => '2003-09-11T19:19:45',
'version' => 'v4.1.2'
},
{
'date' => '2004-07-20T13:49:08',
'version' => 'v5.0.0'
},
{
'date' => '2004-09-09T17:06:35',
'version' => 'v5.0.1'
},
{
'date' => '2005-07-20T13:58:05',
'version' => 'v5.1.0'
},
{
'date' => '2005-10-20T14:25:07',
'version' => 'v5.2.0'
},
{
'date' => '2009-09-09T15:17:46',
'version' => 'v6.0.0'
},
{
'date' => '2010-09-10T00:15:52',
'version' => 'v6.0.1'
}
]
},
'Net-SSLeay' => {
'advisories' => [
{
'affected_versions' => [
'<1.25'
],
'cves' => [
'CVE-2005-0106'
],
'description' => 'SSLeay.pm in libnet-ssleay-perl before 1.25 uses the /tmp/entropy file for entropy if a source is not set in the EGD_PATH variable, which allows local users to reduce the cryptographic strength of certain operations by modifying the file.
',
'distribution' => 'Net-SSLeay',
'fixed_versions' => [
'>=1.25'
],
'id' => 'CPANSA-Net-SSLeay-2005-0106',
'references' => [
'http://secunia.com/advisories/18639',
'http://www.securityfocus.com/bid/13471',
'http://www.mandriva.com/security/advisories?name=MDKSA-2006:023',
'https://usn.ubuntu.com/113-1/'
],
'reported' => '2005-05-03',
'severity' => undef
}
],
'main_module' => 'Net::SSLeay',
'versions' => [
{
'date' => '2007-07-03T14:02:04',
'version' => '1.31_01'
},
{
'date' => '2007-07-14T20:12:31',
'version' => '1.31_02'
},
{
'date' => '2007-09-03T21:16:05',
'version' => '1.32'
},
{
'date' => '2008-02-14T13:43:47',
'version' => '1.33_01'
},
{
'date' => '2008-07-24T01:16:26',
'version' => '1.34'
},
{
'date' => '2008-07-24T22:14:14',
'version' => '1.35'
},
{
'date' => '2010-01-30T21:16:14',
'version' => '1.36'
},
{
'date' => '2011-09-15T22:28:53',
'version' => '1.37'
},
{
'date' => '2011-09-16T11:48:42',
'version' => '1.38'
},
{
'date' => '2011-09-21T06:57:15',
'version' => '1.39'
},
{
'date' => '2011-09-23T02:41:56',
'version' => '1.40'
},
{
'date' => '2011-09-24T22:11:30',
'version' => '1.41'
},
{
'date' => '2011-10-03T06:27:18',
'version' => '1.42'
},
{
'date' => '2012-02-23T22:42:58',
'version' => '1.42'
},
{
'date' => '2012-02-24T21:44:59',
'version' => '1.42'
},
{
'date' => '2012-02-24T22:54:26',
'version' => '1.42'
},
{
'date' => '2012-04-02T21:16:31',
'version' => '1.46'
},
{
'date' => '2012-04-04T00:54:15',
'version' => '1.47'
},
{
'date' => '2012-04-25T07:03:14',
'version' => '1.48'
},
{
'date' => '2012-09-24T22:12:48',
'version' => '1.49'
},
{
'date' => '2012-12-12T21:00:17',
'version' => '1.49'
},
{
'date' => '2012-12-14T05:38:34',
'version' => '1.49'
},
{
'date' => '2013-01-08T23:13:16',
'version' => '1.51'
},
{
'date' => '2013-03-22T07:31:43',
'version' => '1.51'
},
{
'date' => '2013-03-22T22:14:08',
'version' => '1.53'
},
{
'date' => '2013-06-07T22:33:01',
'version' => '1.53'
},
{
'date' => '2014-01-07T22:12:16',
'version' => '1.56'
},
{
'date' => '2014-01-11T21:39:27',
'version' => '1.56'
},
{
'date' => '2014-01-14T23:29:28',
'version' => '1.58'
},
{
'date' => '2014-05-09T22:10:47',
'version' => '1.59'
},
{
'date' => '2014-05-10T21:41:25',
'version' => '1.60'
},
{
'date' => '2014-05-12T10:07:16',
'version' => '1.61'
},
{
'date' => '2014-05-18T21:22:05',
'version' => '1.61'
},
{
'date' => '2014-05-19T10:44:07',
'version' => '1.63'
},
{
'date' => '2014-06-11T02:56:20',
'version' => '1.64'
},
{
'date' => '2014-07-14T10:26:12',
'version' => '1.65'
},
{
'date' => '2014-08-21T01:09:39',
'version' => '1.66'
},
{
'date' => '2015-01-16T22:22:07',
'version' => '1.67'
},
{
'date' => '2015-01-24T00:27:20',
'version' => '1.68'
},
{
'date' => '2015-06-03T21:47:53',
'version' => '1.68'
},
{
'date' => '2015-06-25T23:10:05',
'version' => '1.70'
},
{
'date' => '2015-09-18T03:19:23',
'version' => '1.71'
},
{
'date' => '2015-09-21T21:54:16',
'version' => '1.72'
},
{
'date' => '2016-04-11T00:17:37',
'version' => '1.73'
},
{
'date' => '2016-04-11T21:48:54',
'version' => '1.74'
},
{
'date' => '2016-07-31T01:22:50',
'version' => '1.75'
},
{
'date' => '2016-07-31T02:53:16',
'version' => '1.76'
},
{
'date' => '2016-07-31T20:27:29',
'version' => '1.77'
},
{
'date' => '2016-08-13T08:42:51',
'version' => '1.78'
},
{
'date' => '2017-01-03T07:57:10',
'version' => '1.79'
},
{
'date' => '2017-01-04T21:41:24',
'version' => '1.80'
},
{
'date' => '2017-03-27T21:02:27',
'version' => '1.81'
},
{
'date' => '2017-10-31T04:50:54',
'version' => '1.82'
},
{
'date' => '2018-01-16T04:44:04',
'version' => '1.83'
},
{
'date' => '2018-01-17T03:12:01',
'version' => '1.84'
},
{
'date' => '2018-03-13T22:28:12',
'version' => '1.85'
},
{
'date' => '2018-07-04T20:41:16',
'version' => '1.86_01'
},
{
'date' => '2018-07-06T12:18:38',
'version' => '1.86_02'
},
{
'date' => '2018-07-19T19:42:35',
'version' => '1.86_03'
},
{
'date' => '2018-07-30T17:01:10',
'version' => '1.86_04'
},
{
'date' => '2018-08-23T08:31:09',
'version' => '1.86_05'
},
{
'date' => '2018-09-29T15:52:57',
'version' => '1.86_06'
},
{
'date' => '2018-12-13T09:56:46',
'version' => '1.86_07'
},
{
'date' => '2019-03-12T14:20:11',
'version' => '1.86_08'
},
{
'date' => '2019-03-12T21:00:55',
'version' => '1.86_09'
},
{
'date' => '2019-05-05T01:38:23',
'version' => '1.86_10'
},
{
'date' => '2019-05-08T16:24:16',
'version' => '1.86_11'
},
{
'date' => '2019-05-10T20:36:42',
'version' => '1.88'
},
{
'date' => '2020-03-22T13:48:11',
'version' => '1.89_01'
},
{
'date' => '2020-08-06T23:48:51',
'version' => '1.89_02'
},
{
'date' => '2020-12-12T16:47:00',
'version' => '1.89_03'
},
{
'date' => '2021-01-13T19:01:50',
'version' => '1.89_04'
},
{
'date' => '2021-01-21T00:51:03',
'version' => '1.89_05'
},
{
'date' => '2021-01-21T19:08:38',
'version' => '1.90'
},
{
'date' => '2021-10-24T18:14:27',
'version' => '1.91_01'
},
{
'date' => '2021-12-29T22:30:53',
'version' => '1.91_02'
},
{
'date' => '2022-01-10T19:21:16',
'version' => '1.91_03'
},
{
'date' => '2022-01-12T22:47:57',
'version' => '1.92'
},
{
'date' => '2022-03-20T18:24:35',
'version' => '1.93_01'
},
{
'date' => '2023-02-23T01:08:20',
'version' => '1.93_02'
},
{
'date' => '2024-01-02T14:34:40',
'version' => '1.93_03'
},
{
'date' => '2024-01-05T00:45:35',
'version' => '1.93_04'
},
{
'date' => '2024-01-06T18:39:23',
'version' => '1.93_05'
},
{
'date' => '2024-01-08T01:22:27',
'version' => '1.94'
}
]
},
'Net-Server' => {
'advisories' => [
{
'affected_versions' => [
'<=0.87'
],
'cves' => [
'CVE-2005-1127'
],
'description' => 'Format string vulnerability in the log function in Net::Server 0.87 and earlier, as used in Postfix Greylisting Policy Server (Postgrey) 1.18 and earlier, and possibly other products, allows remote attackers to cause a denial of service (crash) via format string specifiers that are not properly handled before being sent to syslog, as demonstrated using sender addresses to Postgrey.
',
'distribution' => 'Net-Server',
'fixed_versions' => [
'>0.87'
],
'id' => 'CPANSA-Net-Server-2005-1127',
'references' => [
'http://lists.ee.ethz.ch/postgrey/msg00627.html',
'http://lists.ee.ethz.ch/postgrey/msg00630.html',
'http://lists.ee.ethz.ch/postgrey/msg00647.html',
'http://www.osvdb.org/15517',
'http://secunia.com/advisories/14958',
'http://www.debian.org/security/2006/dsa-1121',
'http://www.debian.org/security/2006/dsa-1122',
'http://secunia.com/advisories/21164',
'http://secunia.com/advisories/21152',
'http://secunia.com/advisories/21149',
'http://www.gentoo.org/security/en/glsa/glsa-200608-18.xml',
'http://www.securityfocus.com/bid/13193',
'http://secunia.com/advisories/21452',
'http://www.mandriva.com/security/advisories?name=MDKSA-2006:131',
'http://marc.info/?l=full-disclosure&m=111354538331167&w=2',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/20108'
],
'reported' => '2005-05-02',
'severity' => undef
}
],
'main_module' => 'Net::Server',
'versions' => [
{
'date' => '2001-03-05T14:48:26',
'version' => '0.46'
},
{
'date' => '2001-03-08T14:37:30',
'version' => '0.47'
},
{
'date' => '2001-03-13T16:35:32',
'version' => '0.52'
},
{
'date' => '2001-03-20T06:55:22',
'version' => '0.55'
},
{
'date' => '2001-04-09T16:54:28',
'version' => '0.58'
},
{
'date' => '2001-05-10T15:05:54',
'version' => '0.63'
},
{
'date' => '2001-07-05T15:19:21',
'version' => '0.65'
},
{
'date' => '2001-08-23T17:45:28',
'version' => '0.75'
},
{
'date' => '2001-08-27T16:15:20',
'version' => '0.77'
},
{
'date' => '2001-10-24T16:30:10',
'version' => '0.79'
},
{
'date' => '2001-11-14T17:30:01',
'version' => '0.80'
},
{
'date' => '2001-11-19T20:57:43',
'version' => '0.81'
},
{
'date' => '2002-02-05T21:55:06',
'version' => '0.82'
},
{
'date' => '2002-06-20T20:21:27',
'version' => '0.84'
},
{
'date' => '2003-03-07T15:29:18',
'version' => '0.85'
},
{
'date' => '2003-11-06T20:11:03',
'version' => '0.86'
},
{
'date' => '2004-02-15T06:20:34',
'version' => '0.87'
},
{
'date' => '2005-05-05T01:51:14',
'version' => '0.88'
},
{
'date' => '2005-06-21T21:24:27',
'version' => '0.88'
},
{
'date' => '2005-11-23T08:40:11',
'version' => '0.89'
},
{
'date' => '2005-12-05T21:19:07',
'version' => '0.90'
},
{
'date' => '2006-03-08T22:27:33',
'version' => '0.91'
},
{
'date' => '2006-03-22T17:26:29',
'version' => '0.92'
},
{
'date' => '2006-03-24T20:03:25',
'version' => '0.93'
},
{
'date' => '2006-07-12T02:54:02',
'version' => '0.94'
},
{
'date' => '2007-02-03T08:23:04',
'version' => '0.95'
},
{
'date' => '2007-03-26T15:01:13',
'version' => '0.96'
},
{
'date' => '2007-07-25T16:29:47',
'version' => '0.97'
},
{
'date' => '2010-07-13T19:27:21',
'version' => '0.99'
},
{
'date' => '2011-07-22T12:36:35',
'version' => '0.99.6.1'
},
{
'date' => '2012-05-30T15:41:07',
'version' => '2.000'
},
{
'date' => '2012-05-30T21:48:13',
'version' => '2.001'
},
{
'date' => '2012-05-31T21:43:35',
'version' => '2.002'
},
{
'date' => '2012-06-06T19:31:21',
'version' => '2.003'
},
{
'date' => '2012-06-08T17:22:50',
'version' => '2.004'
},
{
'date' => '2012-06-12T19:40:55',
'version' => '2.005'
},
{
'date' => '2012-06-20T22:51:22',
'version' => '2.006'
},
{
'date' => '2013-01-10T07:47:04',
'version' => '2.007'
},
{
'date' => '2014-05-12T18:22:26',
'version' => '2.008'
},
{
'date' => '2017-08-10T21:13:01',
'version' => '2.009'
},
{
'date' => '2021-03-22T15:23:31',
'version' => '2.010'
},
{
'date' => '2022-12-02T00:35:10',
'version' => '2.011'
},
{
'date' => '2022-12-02T04:19:54',
'version' => '2.012'
},
{
'date' => '2022-12-03T01:57:05',
'version' => '2.013'
},
{
'date' => '2023-03-14T17:16:00',
'version' => '2.014'
}
]
},
'Net-Server-Coro' => {
'advisories' => [
{
'affected_versions' => [
'<1.0'
],
'cves' => [
'CVE-2011-0411'
],
'description' => 'Remaining contents of the read buffer could allow plaintext injection attacks wherein attackers could cause nominally SSL-only commands to be executed by appending them to the end of a STARTTLS.
',
'distribution' => 'Net-Server-Coro',
'fixed_versions' => [
'>=1.0'
],
'id' => 'CPANSA-Net-Server-Coro-2011-0411',
'references' => [
'https://www.itsecdb.com/oval/definition/oval/org.opensuse.security/def/20110411/CVE-2011-0411.html',
'https://metacpan.org/dist/Net-Server-Coro/changes'
],
'reported' => '2011-03-16',
'severity' => undef
}
],
'main_module' => 'Net::Server::Coro',
'versions' => [
{
'date' => '2008-03-10T20:46:24',
'version' => '0.2'
},
{
'date' => '2008-10-22T17:26:30',
'version' => '0.3'
},
{
'date' => '2008-10-22T17:41:55',
'version' => '0.4'
},
{
'date' => '2009-10-16T03:46:28',
'version' => '0.5'
},
{
'date' => '2009-10-16T14:56:53',
'version' => '0.6'
},
{
'date' => '2009-12-16T03:28:15',
'version' => '0.7'
},
{
'date' => '2010-01-30T16:11:57',
'version' => '0.8'
},
{
'date' => '2010-11-15T04:56:09',
'version' => '0.9'
},
{
'date' => '2011-09-05T05:33:01',
'version' => '1.0'
},
{
'date' => '2011-09-05T05:37:09',
'version' => '1.1'
},
{
'date' => '2011-10-29T06:29:11',
'version' => '1.2'
},
{
'date' => '2012-11-12T08:14:39',
'version' => '1.3'
}
]
},
'Otogiri' => {
'advisories' => [
{
'affected_versions' => [
'<0.13'
],
'cves' => [],
'description' => 'A dependant module SQL::Maker without strict mode is vulnerable to SQL injection.
',
'distribution' => 'Otogiri',
'fixed_versions' => [
'>=0.13'
],
'id' => 'CPANSA-Otogiri-2014-01',
'references' => [
'https://github.com/ytnobody/Otogiri/commit/fac1592b3d153a6871ff1aed8016a6888cff9095',
'https://metacpan.org/changes/distribution/Otogiri'
],
'reported' => '2014-07-03'
}
],
'main_module' => 'Otogiri',
'versions' => [
{
'date' => '2013-10-30T06:45:51',
'version' => '0.01'
},
{
'date' => '2013-11-08T08:36:50',
'version' => '0.02'
},
{
'date' => '2013-11-09T05:00:47',
'version' => '0.03'
},
{
'date' => '2013-12-27T00:15:23',
'version' => '0.04'
},
{
'date' => '2013-12-28T15:54:15',
'version' => '0.05'
},
{
'date' => '2014-01-14T09:13:18',
'version' => '0.06'
},
{
'date' => '2014-02-25T06:25:50',
'version' => '0.07'
},
{
'date' => '2014-03-18T04:14:12',
'version' => '0.08'
},
{
'date' => '2014-03-18T05:07:37',
'version' => '0.09'
},
{
'date' => '2014-05-13T12:58:21',
'version' => '0.10'
},
{
'date' => '2014-05-30T10:11:18',
'version' => '0.11'
},
{
'date' => '2014-06-05T08:30:13',
'version' => '0.12'
},
{
'date' => '2014-07-03T12:40:28',
'version' => '0.13'
},
{
'date' => '2014-12-18T08:37:33',
'version' => '0.14'
},
{
'date' => '2015-01-11T04:56:15',
'version' => '0.15'
},
{
'date' => '2015-11-13T07:18:18',
'version' => '0.16'
},
{
'date' => '2016-02-02T05:58:26',
'version' => '0.17'
},
{
'date' => '2017-05-19T01:37:05',
'version' => '0.18'
},
{
'date' => '2020-01-17T11:12:52',
'version' => '0.19'
},
{
'date' => '2023-10-15T02:01:31',
'version' => '0.20'
},
{
'date' => '2023-10-15T02:02:58',
'version' => '0.21'
},
{
'date' => '2023-12-10T00:23:20',
'version' => '0.22'
},
{
'date' => '2024-06-08T13:42:18',
'version' => '0.23'
}
]
},
'PAR' => {
'advisories' => [
{
'affected_versions' => [
'<1.003'
],
'cves' => [
'CVE-2011-4114'
],
'description' => 'PAR packed files are extracted to unsafe and predictable temporary directories (this bug was originally reported against PAR::Packer, but it applies to PAR as well).
',
'distribution' => 'PAR',
'fixed_versions' => [
'>=1.003'
],
'id' => 'CPANSA-PAR-2011-01',
'references' => [
'https://metacpan.org/changes/distribution/PAR',
'https://rt.cpan.org/Public/Bug/Display.html?id=69560'
],
'reported' => '2011-07-18'
},
{
'affected_versions' => [
'<1.003'
],
'cves' => [
'CVE-2011-5060'
],
'description' => 'The par_mktmpdir function in the PAR module before 1.003 for Perl creates temporary files in a directory with a predictable name without verifying ownership and permissions of this directory, which allows local users to overwrite files when another user extracts a PAR packed program, a different vulnerability in a different package than CVE-2011-4114.
',
'distribution' => 'PAR',
'fixed_versions' => [
'>=1.003'
],
'id' => 'CPANSA-PAR-2011-5060',
'references' => [
'http://cpansearch.perl.org/src/RSCHUPP/PAR-1.003/ChangeLog',
'https://bugzilla.redhat.com/show_bug.cgi?id=753955',
'https://rt.cpan.org/Public/Bug/Display.html?id=69560',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/72435'
],
'reported' => '2012-01-13',
'severity' => undef
}
],
'main_module' => 'PAR',
'versions' => [
{
'date' => '2002-10-18T20:38:24',
'version' => '0.01'
},
{
'date' => '2002-10-18T21:07:35',
'version' => '0.02'
},
{
'date' => '2002-10-18T22:18:06',
'version' => '0.03'
},
{
'date' => '2002-10-19T02:46:52',
'version' => '0.04'
},
{
'date' => '2002-10-19T14:33:26',
'version' => '0.05'
},
{
'date' => '2002-10-19T15:31:54',
'version' => '0.06'
},
{
'date' => '2002-10-19T17:38:40',
'version' => '0.10'
},
{
'date' => '2002-10-19T22:30:34',
'version' => '0.11'
},
{
'date' => '2002-10-20T13:00:43',
'version' => '0.12'
},
{
'date' => '2002-10-21T17:29:03',
'version' => '0.13'
},
{
'date' => '2002-10-27T10:38:32',
'version' => '0.14'
},
{
'date' => '2002-10-27T17:52:07',
'version' => '0.15'
},
{
'date' => '2002-11-02T02:20:38',
'version' => '0.20'
},
{
'date' => '2002-11-02T21:26:48',
'version' => '0.21'
},
{
'date' => '2002-11-03T13:05:06',
'version' => '0.22'
},
{
'date' => '2002-11-05T14:36:58',
'version' => '0.30'
},
{
'date' => '2002-11-05T22:23:36',
'version' => '0.40'
},
{
'date' => '2002-11-06T12:25:00',
'version' => '0.41'
},
{
'date' => '2002-11-07T00:48:34',
'version' => '0.42'
},
{
'date' => '2002-11-07T14:41:31',
'version' => '0.43'
},
{
'date' => '2002-11-08T15:01:18',
'version' => '0.44'
},
{
'date' => '2002-11-08T21:01:12',
'version' => '0.45'
},
{
'date' => '2002-11-09T23:02:45',
'version' => '0.46'
},
{
'date' => '2002-11-10T06:56:37',
'version' => '0.47'
},
{
'date' => '2002-11-13T11:32:10',
'version' => '0.48'
},
{
'date' => '2002-11-23T14:45:40',
'version' => '0.49'
},
{
'date' => '2002-12-03T01:00:23',
'version' => '0.50'
},
{
'date' => '2002-12-11T14:30:53',
'version' => '0.51'
},
{
'date' => '2002-12-17T04:06:52',
'version' => '0.60'
},
{
'date' => '2002-12-17T11:49:44',
'version' => '0.61'
},
{
'date' => '2003-01-09T11:16:42',
'version' => '0.62'
},
{
'date' => '2003-02-06T00:38:33',
'version' => '0.63'
},
{
'date' => '2003-03-01T15:54:25',
'version' => '0.64'
},
{
'date' => '2003-03-09T14:31:52',
'version' => '0.65'
},
{
'date' => '2003-03-19T15:54:32',
'version' => '0.66'
},
{
'date' => '2003-03-31T19:58:56',
'version' => '0.66'
},
{
'date' => '2003-05-16T17:35:22',
'version' => '0.67_89'
},
{
'date' => '2003-05-25T19:09:58',
'version' => '0.68'
},
{
'date' => '2003-05-31T13:12:53',
'version' => '0.69'
},
{
'date' => '2003-07-08T15:39:11',
'version' => '0.69'
},
{
'date' => '2003-07-16T08:20:09',
'version' => '0.69_91'
},
{
'date' => '2003-07-27T14:13:18',
'version' => '0.69_93'
},
{
'date' => '2003-07-29T08:21:31',
'version' => '0.70'
},
{
'date' => '2003-07-30T13:57:01',
'version' => '0.71'
},
{
'date' => '2003-08-02T13:11:15',
'version' => '0.72'
},
{
'date' => '2003-08-06T09:16:17',
'version' => '0.73'
},
{
'date' => '2003-08-25T13:39:35',
'version' => '0.74'
},
{
'date' => '2003-09-21T10:58:00',
'version' => '0.75'
},
{
'date' => '2003-10-23T04:45:55',
'version' => '0.75_99'
},
{
'date' => '2003-10-28T12:21:23',
'version' => '0.76'
},
{
'date' => '2003-12-11T23:00:26',
'version' => '0.76_98'
},
{
'date' => '2003-12-28T02:31:29',
'version' => '0.76_99'
},
{
'date' => '2003-12-31T15:33:24',
'version' => '0.77'
},
{
'date' => '2004-01-03T17:36:11',
'version' => '0.77_98'
},
{
'date' => '2004-01-04T20:30:15',
'version' => '0.77_99'
},
{
'date' => '2004-01-06T21:26:43',
'version' => '0.78'
},
{
'date' => '2004-01-08T11:35:51',
'version' => '0.79'
},
{
'date' => '2004-02-15T23:25:34',
'version' => '0.79_97'
},
{
'date' => '2004-02-27T15:58:33',
'version' => '0.79_98'
},
{
'date' => '2004-02-27T23:54:39',
'version' => '0.79_98'
},
{
'date' => '2004-03-03T14:49:47',
'version' => '0.79_99'
},
{
'date' => '2004-03-16T17:04:25',
'version' => '0.80'
},
{
'date' => '2004-03-28T14:43:14',
'version' => '0.80_99'
},
{
'date' => '2004-05-22T19:13:38',
'version' => '0.81'
},
{
'date' => '2004-05-24T14:59:45',
'version' => '0.82'
},
{
'date' => '2004-05-29T16:02:03',
'version' => '0.83'
},
{
'date' => '2004-07-02T10:59:55',
'version' => '0.85'
},
{
'date' => '2004-08-30T22:49:15',
'version' => '0.85_01'
},
{
'date' => '2004-12-11T03:49:09',
'version' => '0.86'
},
{
'date' => '2005-01-30T19:04:55',
'version' => '0.87'
},
{
'date' => '2005-06-07T09:13:43',
'version' => '0.88'
},
{
'date' => '2005-06-10T15:49:20',
'version' => '0.89'
},
{
'date' => '2005-11-25T23:01:00',
'version' => '0.90'
},
{
'date' => '2006-02-15T09:33:05',
'version' => '0.91'
},
{
'date' => '2006-03-04T20:16:36',
'version' => '0.91'
},
{
'date' => '2006-05-19T13:37:12',
'version' => '0.93'
},
{
'date' => '2006-06-02T10:25:51',
'version' => '0.93'
},
{
'date' => '2006-06-20T20:44:56',
'version' => '0.93'
},
{
'date' => '2006-07-22T19:59:13',
'version' => '0.942'
},
{
'date' => '2006-08-05T11:28:06',
'version' => '0.950'
},
{
'date' => '2006-08-11T15:51:56',
'version' => '0.950'
},
{
'date' => '2006-08-12T12:35:34',
'version' => '0.950'
},
{
'date' => '2006-08-22T14:14:35',
'version' => '0.952'
},
{
'date' => '2006-09-26T20:18:06',
'version' => '0.954'
},
{
'date' => '2006-10-03T12:35:05',
'version' => '0.955'
},
{
'date' => '2006-10-03T12:58:55',
'version' => '0.956'
},
{
'date' => '2006-10-24T16:42:26',
'version' => '0.957'
},
{
'date' => '2006-11-11T14:33:23',
'version' => '0.958'
},
{
'date' => '2006-11-12T11:48:37',
'version' => '0.959'
},
{
'date' => '2006-11-21T12:02:35',
'version' => '0.960'
},
{
'date' => '2006-12-01T14:19:55',
'version' => '0.969_01'
},
{
'date' => '2006-12-03T17:25:33',
'version' => '0.970'
},
{
'date' => '2007-01-10T17:58:01',
'version' => '0.970_01'
},
{
'date' => '2007-01-12T11:02:02',
'version' => '0.971'
},
{
'date' => '2007-01-16T15:23:38',
'version' => '0.972'
},
{
'date' => '2007-02-03T11:40:25',
'version' => '0.973'
},
{
'date' => '2007-07-29T11:17:27',
'version' => '0.976'
},
{
'date' => '2007-12-20T21:17:26',
'version' => '0.977'
},
{
'date' => '2008-05-13T12:44:22',
'version' => '0.979'
},
{
'date' => '2008-05-22T11:41:38',
'version' => '0.980'
},
{
'date' => '2008-08-09T22:17:14',
'version' => '0.980'
},
{
'date' => '2008-08-10T21:39:41',
'version' => '0.980'
},
{
'date' => '2008-09-12T15:02:23',
'version' => '0.983'
},
{
'date' => '2009-01-25T22:31:20',
'version' => '0.984'
},
{
'date' => '2009-02-02T01:40:36',
'version' => '0.985_01'
},
{
'date' => '2009-02-19T16:04:27',
'version' => '0.986'
},
{
'date' => '2009-02-20T14:30:08',
'version' => '0.987_01'
},
{
'date' => '2009-03-02T14:47:14',
'version' => '0.988'
},
{
'date' => '2009-03-02T14:56:44',
'version' => '0.989_01'
},
{
'date' => '2009-03-10T15:11:05',
'version' => '0.991'
},
{
'date' => '2009-04-05T11:32:48',
'version' => '0.992'
},
{
'date' => '2009-07-19T16:37:30',
'version' => '0.993'
},
{
'date' => '2009-07-23T13:08:07',
'version' => '0.994'
},
{
'date' => '2010-04-10T14:05:52',
'version' => '1.000'
},
{
'date' => '2010-07-25T09:32:33',
'version' => '1.001'
},
{
'date' => '2010-07-25T10:07:06',
'version' => '1.002'
},
{
'date' => '2011-11-28T16:53:29',
'version' => '1.003'
},
{
'date' => '2011-11-30T22:31:25',
'version' => '1.004'
},
{
'date' => '2011-12-02T13:53:02',
'version' => '1.005'
},
{
'date' => '2012-10-14T22:45:17',
'version' => '1.006'
},
{
'date' => '2012-10-22T21:50:20',
'version' => '1.007'
},
{
'date' => '2015-01-24T14:11:44',
'version' => '1.008'
},
{
'date' => '2015-04-22T15:26:50',
'version' => '1.009'
},
{
'date' => '2015-07-13T10:56:21',
'version' => '1.010'
},
{
'date' => '2016-09-18T11:33:22',
'version' => '1.011'
},
{
'date' => '2016-11-25T16:06:43',
'version' => '1.012'
},
{
'date' => '2016-11-27T16:51:00',
'version' => '1.013'
},
{
'date' => '2016-12-18T16:36:08',
'version' => '1.014'
},
{
'date' => '2017-04-13T15:29:12',
'version' => '1.015'
},
{
'date' => '2019-05-20T18:13:46',
'version' => '1.016'
},
{
'date' => '2021-01-13T14:51:49',
'version' => '1.017'
},
{
'date' => '2022-09-28T20:53:07',
'version' => '1.018'
},
{
'date' => '2023-11-01T13:25:01',
'version' => '1.019'
},
{
'date' => '2024-03-04T10:49:29',
'version' => '1.020'
}
]
},
'PAR-Packer' => {
'advisories' => [
{
'affected_versions' => [
'<1.011'
],
'cves' => [
'CVE-2011-4114'
],
'description' => 'PAR packed files are extracted to unsafe and predictable temporary directories.
',
'distribution' => 'PAR-Packer',
'fixed_versions' => [
'>=1.011'
],
'id' => 'CPANSA-PAR-Packer-2011-01',
'references' => [
'https://metacpan.org/changes/distribution/PAR-Packer',
'https://rt.cpan.org/Public/Bug/Display.html?id=69560'
],
'reported' => '2011-07-18'
}
],
'main_module' => 'PAR::Packer',
'versions' => [
{
'date' => '2006-12-01T14:20:06',
'version' => '0.969_01'
},
{
'date' => '2006-12-03T17:36:32',
'version' => '0.970'
},
{
'date' => '2007-02-03T12:27:07',
'version' => '0.973'
},
{
'date' => '2007-05-07T18:21:52',
'version' => '0.975'
},
{
'date' => '2007-07-29T11:50:15',
'version' => '0.976'
},
{
'date' => '2007-12-20T21:39:30',
'version' => '0.977'
},
{
'date' => '2008-02-29T18:37:56',
'version' => '0.978'
},
{
'date' => '2008-05-13T15:45:56',
'version' => '0.979'
},
{
'date' => '2008-05-14T10:27:09',
'version' => '0.980'
},
{
'date' => '2008-07-29T15:44:11',
'version' => '0.982'
},
{
'date' => '2009-03-10T15:55:06',
'version' => '0.980'
},
{
'date' => '2009-03-21T11:20:02',
'version' => '0.991'
},
{
'date' => '2009-07-19T16:47:51',
'version' => '0.992_01'
},
{
'date' => '2009-07-23T13:18:32',
'version' => '0.992_02'
},
{
'date' => '2009-07-24T18:30:24',
'version' => '0.992_03'
},
{
'date' => '2009-09-11T07:38:47',
'version' => '0.992_04'
},
{
'date' => '2009-11-13T09:01:15',
'version' => '0.992_05'
},
{
'date' => '2009-11-20T13:59:38',
'version' => '0.992_06'
},
{
'date' => '2009-11-22T13:08:12',
'version' => '1.000'
},
{
'date' => '2009-11-24T11:16:58',
'version' => '1.001'
},
{
'date' => '2009-12-17T20:55:25',
'version' => '1.002'
},
{
'date' => '2010-04-10T17:57:57',
'version' => '1.003'
},
{
'date' => '2010-04-20T12:10:24',
'version' => '1.004'
},
{
'date' => '2010-06-05T15:54:54',
'version' => '1.005'
},
{
'date' => '2010-06-26T11:23:34',
'version' => '1.006'
},
{
'date' => '2010-09-09T16:42:00',
'version' => '1.007'
},
{
'date' => '2010-11-21T17:11:43',
'version' => '1.008'
},
{
'date' => '2011-03-26T13:36:55',
'version' => '1.009'
},
{
'date' => '2011-07-13T14:10:05',
'version' => '1.010'
},
{
'date' => '2011-12-01T21:08:37',
'version' => '1.011'
},
{
'date' => '2011-12-02T17:53:42',
'version' => '1.012'
},
{
'date' => '2012-02-22T09:58:04',
'version' => '1.013'
},
{
'date' => '2012-12-21T15:55:13',
'version' => '1.014'
},
{
'date' => '2013-10-09T12:06:04',
'version' => '1.015'
},
{
'date' => '2013-11-30T19:03:48',
'version' => '1.016'
},
{
'date' => '2013-12-03T23:53:51',
'version' => '1.017'
},
{
'date' => '2014-05-18T16:52:34',
'version' => '1.018'
},
{
'date' => '2014-07-07T14:25:15',
'version' => '1.019'
},
{
'date' => '2014-08-24T13:27:57',
'version' => '1.020'
},
{
'date' => '2014-09-14T13:49:37',
'version' => '1.021'
},
{
'date' => '2014-09-19T10:07:30',
'version' => '1.022'
},
{
'date' => '2014-11-02T14:32:42',
'version' => '1.023'
},
{
'date' => '2014-11-07T09:04:07',
'version' => '1.024'
},
{
'date' => '2015-01-24T16:52:17',
'version' => '1.025'
},
{
'date' => '2015-07-19T13:14:40',
'version' => '1.026'
},
{
'date' => '2015-11-18T16:58:33',
'version' => '1.027'
},
{
'date' => '2015-11-19T09:05:09',
'version' => '1.027'
},
{
'date' => '2016-01-12T16:24:46',
'version' => '1.029'
},
{
'date' => '2016-02-02T14:54:21',
'version' => '1.029_01'
},
{
'date' => '2016-02-11T14:08:57',
'version' => '1.029_02'
},
{
'date' => '2016-02-25T08:41:55',
'version' => '1.029_03'
},
{
'date' => '2016-02-29T08:36:46',
'version' => '1.029_04'
},
{
'date' => '2016-03-29T08:29:59',
'version' => '1.030'
},
{
'date' => '2016-04-10T17:15:52',
'version' => '1.031'
},
{
'date' => '2016-04-29T17:01:57',
'version' => '1.031_01'
},
{
'date' => '2016-05-07T09:59:28',
'version' => '1.032'
},
{
'date' => '2016-05-19T09:50:49',
'version' => '1.033'
},
{
'date' => '2016-07-17T12:38:31',
'version' => '1.034'
},
{
'date' => '2016-07-23T12:04:14',
'version' => '1.035'
},
{
'date' => '2016-12-04T17:13:20',
'version' => '1.035_001'
},
{
'date' => '2016-12-19T19:35:16',
'version' => '1.035_002'
},
{
'date' => '2016-12-30T11:06:25',
'version' => '1.036'
},
{
'date' => '2017-03-22T19:29:19',
'version' => '1.036_001'
},
{
'date' => '2017-05-14T11:54:43',
'version' => '1.036_002'
},
{
'date' => '2017-05-28T11:33:53',
'version' => '1.037'
},
{
'date' => '2017-09-27T19:40:44',
'version' => '1.038'
},
{
'date' => '2017-09-28T05:13:05',
'version' => '1.039'
},
{
'date' => '2017-10-10T17:00:14',
'version' => '1.039_001'
},
{
'date' => '2017-10-13T12:05:52',
'version' => '1.039_002'
},
{
'date' => '2017-10-16T20:46:49',
'version' => '1.039_003'
},
{
'date' => '2017-10-17T17:07:49',
'version' => '1.039_004'
},
{
'date' => '2017-10-21T16:09:18',
'version' => '1.040'
},
{
'date' => '2017-11-08T17:07:11',
'version' => '1.041'
},
{
'date' => '2018-04-02T21:46:01',
'version' => '1.042'
},
{
'date' => '2018-04-03T11:26:08',
'version' => '1.043'
},
{
'date' => '2018-06-06T22:03:32',
'version' => '1.044'
},
{
'date' => '2018-06-12T19:04:22',
'version' => '1.045'
},
{
'date' => '2018-08-17T22:20:28',
'version' => '1.046'
},
{
'date' => '2018-08-19T09:17:57',
'version' => '1.047'
},
{
'date' => '2019-03-04T09:42:35',
'version' => '1.047_001'
},
{
'date' => '2019-03-04T15:33:14',
'version' => '1.047_002'
},
{
'date' => '2019-03-06T17:39:18',
'version' => '1.047_003'
},
{
'date' => '2019-04-29T11:53:04',
'version' => '1.048'
},
{
'date' => '2019-05-31T11:58:05',
'version' => '1.049'
},
{
'date' => '2020-03-08T15:56:09',
'version' => '1.049_001'
},
{
'date' => '2020-03-08T22:53:16',
'version' => '1.049_002'
},
{
'date' => '2020-03-08T22:58:32',
'version' => '1.049_003'
},
{
'date' => '2020-03-10T13:51:31',
'version' => '1.049_004'
},
{
'date' => '2020-03-18T08:14:29',
'version' => '1.050'
},
{
'date' => '2020-11-29T22:25:00',
'version' => '1.051'
},
{
'date' => '2021-01-13T15:44:24',
'version' => '1.052'
},
{
'date' => '2022-01-25T15:25:10',
'version' => '1.053'
},
{
'date' => '2022-01-27T11:05:32',
'version' => '1.054'
},
{
'date' => '2022-07-03T16:27:19',
'version' => '1.055'
},
{
'date' => '2022-08-31T07:56:09',
'version' => '1.055_01'
},
{
'date' => '2022-09-05T10:12:07',
'version' => '1.056'
},
{
'date' => '2022-11-25T09:12:00',
'version' => '1.056_01'
},
{
'date' => '2022-11-27T15:25:29',
'version' => '1.056_02'
},
{
'date' => '2022-11-29T11:33:29',
'version' => '1.057'
},
{
'date' => '2023-05-24T11:53:27',
'version' => '1.057_001'
},
{
'date' => '2023-06-07T14:56:47',
'version' => '1.057_002'
},
{
'date' => '2023-06-12T09:14:24',
'version' => '1.058'
},
{
'date' => '2023-07-20T14:13:30',
'version' => '1.059'
},
{
'date' => '2023-12-15T14:05:16',
'version' => '1.061'
},
{
'date' => '2024-03-05T14:01:26',
'version' => '1.062'
},
{
'date' => '2024-03-10T13:46:23',
'version' => '1.062_001'
},
{
'date' => '2024-03-11T13:08:45',
'version' => '1.062_002'
},
{
'date' => '2024-03-15T12:57:23',
'version' => '1.063'
},
{
'date' => '2024-06-24T09:05:18',
'version' => '1.063_001'
}
]
},
'PApp' => {
'advisories' => [
{
'affected_versions' => [
'<0.11'
],
'cves' => [],
'description' => 'Testing for nonexistant access rights always returned true.
',
'distribution' => 'PApp',
'fixed_versions' => [
'>=0.11'
],
'id' => 'CPANSA-PApp-2001-01',
'references' => [
'https://metacpan.org/dist/PApp/changes'
],
'reported' => '2001-10-27',
'severity' => undef
}
],
'main_module' => 'PApp',
'versions' => [
{
'date' => '2000-04-11T19:29:07',
'version' => '0.02'
},
{
'date' => '2000-04-14T01:33:03',
'version' => '0.03'
},
{
'date' => '2000-05-11T01:27:39',
'version' => '0.04'
},
{
'date' => '2000-05-27T20:43:50',
'version' => '0.05'
},
{
'date' => '2000-06-07T19:56:36',
'version' => '0.06'
},
{
'date' => '2000-06-09T20:15:48',
'version' => '0.07'
},
{
'date' => '2000-06-18T21:57:46',
'version' => '0.08'
},
{
'date' => '2001-02-25T17:23:00',
'version' => '0.12'
},
{
'date' => '2001-11-30T10:35:30',
'version' => '0.121'
},
{
'date' => '2001-12-03T18:35:13',
'version' => '0.122'
},
{
'date' => '2002-04-16T17:20:02',
'version' => '0.142'
},
{
'date' => '2002-09-27T09:55:48',
'version' => '0.143'
},
{
'date' => '2002-11-15T19:09:27',
'version' => '0.2'
},
{
'date' => '2003-11-01T21:22:27',
'version' => '0.22'
},
{
'date' => '2004-04-24T07:18:03',
'version' => '0.95'
},
{
'date' => '2004-11-23T17:16:58',
'version' => '1'
},
{
'date' => '2005-09-04T14:32:15',
'version' => '1.1'
},
{
'date' => '2007-01-06T19:32:19',
'version' => '1.2'
},
{
'date' => '2008-01-20T12:37:14',
'version' => '1.4'
},
{
'date' => '2008-01-28T20:07:08',
'version' => '1.41'
},
{
'date' => '2008-11-26T07:18:45',
'version' => '1.42'
},
{
'date' => '2008-12-09T17:23:32',
'version' => '1.43'
},
{
'date' => '2010-01-30T03:08:38',
'version' => '1.44'
},
{
'date' => '2010-11-21T07:30:21',
'version' => '1.45'
},
{
'date' => '2013-03-19T12:24:55',
'version' => '2.0'
},
{
'date' => '2016-02-11T07:21:31',
'version' => '2.1'
},
{
'date' => '2020-02-17T11:04:59',
'version' => '2.2'
},
{
'date' => '2023-08-02T22:30:09',
'version' => '2.3'
}
]
},
'PGObject-Util-DBAdmin' => {
'advisories' => [
{
'affected_versions' => [
'<1.6.0'
],
'cves' => [
'CVE-2018-9246'
],
'description' => 'The PGObject::Util::DBAdmin module before 0.120.0 for Perl, as used in LedgerSMB through 1.5.x, insufficiently sanitizes or escapes variable values used as part of shell command execution, resulting in shell code injection via the create(), run_file(), backup(), or restore() function. The vulnerability allows unauthorized users to execute code with the same privileges as the running application.
',
'distribution' => 'PGObject-Util-DBAdmin',
'fixed_versions' => [
'>=1.6.0'
],
'id' => 'CPANSA-PGObject-Util-DBAdmin-2018-01',
'references' => [
'https://archive.ledgersmb.org/ledger-smb-announce/msg00280.html'
],
'reported' => '2018-06-18'
}
],
'main_module' => 'PGObject::Util::DBAdmin',
'versions' => [
{
'date' => '2014-09-11T11:20:13',
'version' => '0.01'
},
{
'date' => '2014-09-12T02:45:35',
'version' => '0.02'
},
{
'date' => '2014-09-13T02:03:16',
'version' => '0.03'
},
{
'date' => '2014-09-13T14:37:42',
'version' => '0.04'
},
{
'date' => '2014-09-14T07:48:28',
'version' => '0.05'
},
{
'date' => '2014-09-17T08:27:06',
'version' => '0.06'
},
{
'date' => '2015-07-16T14:55:28',
'version' => '0.07'
},
{
'date' => '2016-02-11T18:01:16',
'version' => '0.08'
},
{
'date' => '2016-07-18T11:03:07',
'version' => '0.09'
},
{
'date' => '2016-12-16T21:20:09',
'version' => 'v0.09.0'
},
{
'date' => '2016-12-16T21:36:46',
'version' => 'v0.10.0'
},
{
'date' => '2016-12-16T21:43:21',
'version' => 'v0.100.0'
},
{
'date' => '2018-03-31T14:06:25',
'version' => 'v0.120.0'
},
{
'date' => '2018-05-06T09:28:39',
'version' => 'v0.130.0'
},
{
'date' => '2018-06-05T19:29:29',
'version' => 'v0.130.1'
},
{
'date' => '2019-07-07T08:06:48',
'version' => 'v0.131.0'
},
{
'date' => '2019-07-08T20:46:34',
'version' => 'v1.0.0'
},
{
'date' => '2019-07-09T18:04:14',
'version' => 'v1.0.1'
},
{
'date' => '2019-09-20T06:49:02',
'version' => 'v1.0.2'
},
{
'date' => '2019-09-29T18:24:55',
'version' => 'v1.0.3'
},
{
'date' => '2020-09-21T21:20:33',
'version' => 'v1.1.0'
},
{
'date' => '2020-10-21T20:17:28',
'version' => 'v1.2.0'
},
{
'date' => '2020-10-21T22:24:41',
'version' => 'v1.2.1'
},
{
'date' => '2020-10-23T18:46:24',
'version' => 'v1.2.2'
},
{
'date' => '2020-10-24T07:08:10',
'version' => 'v1.2.3'
},
{
'date' => '2020-10-24T19:58:09',
'version' => 'v1.3.0'
},
{
'date' => '2020-10-25T12:15:26',
'version' => 'v1.4.0'
},
{
'date' => '2021-09-24T12:47:40',
'version' => 'v1.5.0'
},
{
'date' => '2021-11-07T12:22:17',
'version' => 'v1.6.0'
},
{
'date' => '2021-11-07T14:17:22',
'version' => 'v1.6.1'
},
{
'date' => '2024-09-13T19:24:01',
'version' => 'v1.6.2'
}
]
},
'POE-Component-IRC' => {
'advisories' => [
{
'affected_versions' => [
'<6.32'
],
'cves' => [
'CVE-2010-3438'
],
'description' => 'libpoe-component-irc-perl before v6.32 does not remove carriage returns and line feeds. This can be used to execute arbitrary IRC commands by passing an argument such as \\"some text\\\\rQUIT\\" to the \'privmsg\' handler, which would cause the client to disconnect from the server.
',
'distribution' => 'POE-Component-IRC',
'fixed_versions' => [],
'id' => 'CPANSA-Poe-Component-IRC-2010-3438',
'references' => [
'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=581194',
'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-3438',
'https://security-tracker.debian.org/tracker/CVE-2010-3438'
],
'reported' => '2019-11-12',
'severity' => 'critical'
}
],
'main_module' => 'POE::Component::IRC',
'versions' => [
{
'date' => '2001-01-14T01:08:55',
'version' => '1.0'
},
{
'date' => '2001-02-21T23:20:30',
'version' => '1.0'
},
{
'date' => '2001-03-02T11:10:34',
'version' => '1.1'
},
{
'date' => '2001-05-24T09:39:58',
'version' => '1.2'
},
{
'date' => '2001-07-01T00:29:06',
'version' => '1.3'
},
{
'date' => '2001-07-03T00:23:58',
'version' => '1.4'
},
{
'date' => '2001-07-05T22:29:01',
'version' => '1.5'
},
{
'date' => '2001-07-07T02:07:09',
'version' => '1.6'
},
{
'date' => '2001-07-21T08:09:18',
'version' => '1.7'
},
{
'date' => '2001-12-11T00:06:53',
'version' => '1.8'
},
{
'date' => '2001-12-13T07:07:40',
'version' => '1.9'
},
{
'date' => '2002-02-22T23:26:52',
'version' => '2.0'
},
{
'date' => '2002-03-05T01:19:43',
'version' => '2.1'
},
{
'date' => '2002-05-24T20:54:40',
'version' => '2.2'
},
{
'date' => '2002-09-06T15:29:09',
'version' => '2.3'
},
{
'date' => '2002-10-10T21:24:56',
'version' => '2.4'
},
{
'date' => '2002-10-27T19:02:42',
'version' => '2.5'
},
{
'date' => '2002-12-12T04:30:15',
'version' => '2.6'
},
{
'date' => '2003-02-02T23:23:52',
'version' => '2.7'
},
{
'date' => '2003-06-07T23:25:07',
'version' => '2.8'
},
{
'date' => '2003-07-19T20:38:58',
'version' => '2.9'
},
{
'date' => '2004-12-31T13:57:37',
'version' => '3.0'
},
{
'date' => '2005-01-21T12:36:21',
'version' => '3.1'
},
{
'date' => '2005-02-02T11:58:41',
'version' => '3.2'
},
{
'date' => '2005-02-02T14:17:25',
'version' => '3.3'
},
{
'date' => '2005-02-18T15:40:19',
'version' => '3.4'
},
{
'date' => '2005-02-23T13:35:13',
'version' => '3.4'
},
{
'date' => '2005-03-01T18:10:05',
'version' => '3.4'
},
{
'date' => '2005-03-04T17:53:49',
'version' => '3.4'
},
{
'date' => '2005-03-14T10:31:33',
'version' => '3.4'
},
{
'date' => '2005-03-21T09:24:00',
'version' => '3.4'
},
{
'date' => '2005-04-05T09:50:19',
'version' => '4.0'
},
{
'date' => '2005-04-11T10:31:43',
'version' => '4.1'
},
{
'date' => '2005-04-14T19:46:49',
'version' => '4.2'
},
{
'date' => '2005-04-20T08:35:06',
'version' => '4.3'
},
{
'date' => '2005-04-28T14:23:29',
'version' => '4.4'
},
{
'date' => '2005-05-22T15:26:46',
'version' => '4.5'
},
{
'date' => '2005-06-01T14:33:57',
'version' => '4.6'
},
{
'date' => '2005-06-02T09:53:57',
'version' => '4.61'
},
{
'date' => '2005-06-02T15:47:47',
'version' => '4.62'
},
{
'date' => '2005-06-16T21:03:43',
'version' => '4.63'
},
{
'date' => '2005-07-05T15:28:06',
'version' => '4.64'
},
{
'date' => '2005-07-13T16:52:52',
'version' => '4.65'
},
{
'date' => '2005-07-28T17:16:01',
'version' => '4.66'
},
{
'date' => '2005-08-25T13:31:53',
'version' => '4.67'
},
{
'date' => '2005-09-02T12:35:28',
'version' => '4.68'
},
{
'date' => '2005-09-05T11:27:29',
'version' => '4.69'
},
{
'date' => '2005-09-16T15:59:06',
'version' => '4.70'
},
{
'date' => '2005-10-13T18:10:10',
'version' => '4.71'
},
{
'date' => '2005-10-25T18:07:42',
'version' => '4.72'
},
{
'date' => '2005-10-26T06:43:59',
'version' => '4.73'
},
{
'date' => '2005-10-26T08:21:25',
'version' => '4.74'
},
{
'date' => '2005-12-04T17:50:30',
'version' => '4.75'
},
{
'date' => '2005-12-23T15:22:40',
'version' => '4.76'
},
{
'date' => '2005-12-26T17:08:35',
'version' => '4.77'
},
{
'date' => '2006-01-10T22:07:46',
'version' => '4.78'
},
{
'date' => '2006-01-15T17:09:57',
'version' => '4.79'
},
{
'date' => '2006-03-16T16:53:54',
'version' => '4.80'
},
{
'date' => '2006-03-31T16:02:38',
'version' => '4.81'
},
{
'date' => '2006-04-11T18:38:36',
'version' => '4.82'
},
{
'date' => '2006-04-11T19:50:58',
'version' => '4.83'
},
{
'date' => '2006-04-12T13:40:40',
'version' => '4.84'
},
{
'date' => '2006-04-13T11:43:55',
'version' => '4.85'
},
{
'date' => '2006-04-27T20:45:17',
'version' => '4.86'
},
{
'date' => '2006-05-06T16:13:30',
'version' => '4.87'
},
{
'date' => '2006-05-21T17:09:49',
'version' => '4.88'
},
{
'date' => '2006-05-22T08:21:25',
'version' => '4.89'
},
{
'date' => '2006-05-22T12:56:03',
'version' => '4.90'
},
{
'date' => '2006-06-01T20:15:32',
'version' => '4.91'
},
{
'date' => '2006-06-11T17:15:17',
'version' => '4.92'
},
{
'date' => '2006-06-13T18:29:21',
'version' => '4.93'
},
{
'date' => '2006-07-02T09:10:52',
'version' => '4.94'
},
{
'date' => '2006-07-05T10:47:35',
'version' => '4.95'
},
{
'date' => '2006-07-16T13:37:50',
'version' => '4.96'
},
{
'date' => '2006-07-24T11:55:01',
'version' => '4.97'
},
{
'date' => '2006-08-18T11:39:13',
'version' => '4.98'
},
{
'date' => '2006-08-29T16:57:17',
'version' => '4.99'
},
{
'date' => '2006-09-01T01:32:30',
'version' => '5.00'
},
{
'date' => '2006-09-07T17:03:08',
'version' => '5.01'
},
{
'date' => '2006-09-08T15:45:55',
'version' => '5.02'
},
{
'date' => '2006-09-16T13:33:43',
'version' => '5.03'
},
{
'date' => '2006-09-25T12:40:35',
'version' => '5.04'
},
{
'date' => '2006-10-06T14:02:37',
'version' => '5.05'
},
{
'date' => '2006-10-12T12:29:17',
'version' => '5.06'
},
{
'date' => '2006-10-17T10:57:25',
'version' => '5.07'
},
{
'date' => '2006-10-23T12:43:37',
'version' => '5.08'
},
{
'date' => '2006-10-24T14:15:06',
'version' => '5.09'
},
{
'date' => '2006-10-24T17:18:06',
'version' => '5.10'
},
{
'date' => '2006-10-25T15:51:16',
'version' => '5.11'
},
{
'date' => '2006-11-16T14:01:15',
'version' => '5.12'
},
{
'date' => '2006-11-19T14:34:09',
'version' => '5.13'
},
{
'date' => '2006-11-29T11:10:54',
'version' => '5.14'
},
{
'date' => '2006-12-05T19:42:12',
'version' => '5.15'
},
{
'date' => '2006-12-06T12:27:38',
'version' => '5.16'
},
{
'date' => '2006-12-12T23:09:26',
'version' => '5.17'
},
{
'date' => '2006-12-29T11:08:52',
'version' => '5.18'
},
{
'date' => '2007-01-31T12:06:39',
'version' => '5.19'
},
{
'date' => '2007-01-31T17:37:46',
'version' => '5.20'
},
{
'date' => '2007-02-01T12:39:18',
'version' => '5.21'
},
{
'date' => '2007-02-02T12:55:07',
'version' => '5.22'
},
{
'date' => '2007-04-12T15:28:46',
'version' => '5.23'
},
{
'date' => '2007-04-16T12:51:48',
'version' => '5.24'
},
{
'date' => '2007-04-29T12:19:32',
'version' => '5.25'
},
{
'date' => '2007-04-29T14:33:13',
'version' => '5.26'
},
{
'date' => '2007-05-01T13:21:57',
'version' => '5.27'
},
{
'date' => '2007-05-01T14:14:27',
'version' => '5.28'
},
{
'date' => '2007-05-03T12:51:34',
'version' => '5.29'
},
{
'date' => '2007-05-08T18:38:59',
'version' => '5.30'
},
{
'date' => '2007-05-18T09:26:43',
'version' => '5.31_01'
},
{
'date' => '2007-05-31T15:25:34',
'version' => '5.31_02'
},
{
'date' => '2007-06-01T10:02:23',
'version' => '5.31_03'
},
{
'date' => '2007-06-05T08:46:20',
'version' => '5.31_04'
},
{
'date' => '2007-06-11T09:30:57',
'version' => '5.31_05'
},
{
'date' => '2007-06-12T11:28:18',
'version' => '5.32'
},
{
'date' => '2007-07-10T17:11:05',
'version' => '5.33_01'
},
{
'date' => '2007-07-25T10:01:32',
'version' => '5.34'
},
{
'date' => '2007-11-01T14:32:47',
'version' => '5.36'
},
{
'date' => '2007-12-05T21:26:00',
'version' => '5.37_01'
},
{
'date' => '2007-12-06T08:53:09',
'version' => '5.37_02'
},
{
'date' => '2007-12-06T17:35:01',
'version' => '5.38'
},
{
'date' => '2007-12-26T11:03:08',
'version' => '5.40'
},
{
'date' => '2007-12-31T12:44:42',
'version' => '5.42'
},
{
'date' => '2008-01-01T14:10:56',
'version' => '5.44'
},
{
'date' => '2008-01-03T15:21:36',
'version' => '5.46'
},
{
'date' => '2008-01-10T20:32:12',
'version' => '5.48'
},
{
'date' => '2008-01-13T10:30:41',
'version' => '5.50'
},
{
'date' => '2008-01-14T08:06:32',
'version' => '5.52'
},
{
'date' => '2008-01-27T09:43:44',
'version' => '5.54'
},
{
'date' => '2008-01-31T13:13:54',
'version' => '5.56'
},
{
'date' => '2008-02-04T08:13:31',
'version' => '5.58'
},
{
'date' => '2008-02-06T13:54:09',
'version' => '5.60'
},
{
'date' => '2008-02-07T16:42:54',
'version' => '5.62'
},
{
'date' => '2008-02-16T08:35:10',
'version' => '5.64'
},
{
'date' => '2008-02-18T22:11:13',
'version' => '5.66'
},
{
'date' => '2008-02-20T20:00:00',
'version' => '5.68'
},
{
'date' => '2008-03-03T10:51:33',
'version' => '5.70'
},
{
'date' => '2008-03-21T10:56:45',
'version' => '5.72'
},
{
'date' => '2008-04-02T15:23:28',
'version' => '5.74'
},
{
'date' => '2008-04-24T15:13:29',
'version' => '5.76'
},
{
'date' => '2008-05-30T07:16:00',
'version' => '5.78'
},
{
'date' => '2008-06-12T15:42:21',
'version' => '5.80'
},
{
'date' => '2008-06-14T08:49:07',
'version' => '5.82'
},
{
'date' => '2008-06-26T19:16:22',
'version' => '5.84'
},
{
'date' => '2008-07-22T09:11:40',
'version' => '5.86'
},
{
'date' => '2008-08-28T15:06:57',
'version' => '5.88'
},
{
'date' => '2009-01-22T11:04:20',
'version' => '5.90'
},
{
'date' => '2009-01-27T13:08:53',
'version' => '5.92'
},
{
'date' => '2009-01-27T21:56:50',
'version' => '5.94'
},
{
'date' => '2009-01-28T12:02:40',
'version' => '5.96'
},
{
'date' => '2009-03-02T23:16:08',
'version' => '5.98'
},
{
'date' => '2009-03-04T23:31:34',
'version' => '6.00'
},
{
'date' => '2009-03-06T11:07:07',
'version' => '6.02'
},
{
'date' => '2009-03-07T23:41:08',
'version' => '6.04'
},
{
'date' => '2009-04-11T09:24:16',
'version' => '6.05_01'
},
{
'date' => '2009-04-30T12:12:52',
'version' => '6.06'
},
{
'date' => '2009-05-29T11:58:02',
'version' => '6.08'
},
{
'date' => '2009-07-09T20:20:10',
'version' => '6.09_01'
},
{
'date' => '2009-07-10T09:17:48',
'version' => '6.09_02'
},
{
'date' => '2009-07-10T14:24:17',
'version' => '6.09_03'
},
{
'date' => '2009-07-12T20:52:44',
'version' => '6.09_04'
},
{
'date' => '2009-07-16T14:20:12',
'version' => '6.09_05'
},
{
'date' => '2009-07-17T10:23:41',
'version' => '6.09_06'
},
{
'date' => '2009-07-21T06:26:37',
'version' => '6.09_07'
},
{
'date' => '2009-07-27T12:19:55',
'version' => '6.09_08'
},
{
'date' => '2009-07-29T11:16:27',
'version' => '6.09_09'
},
{
'date' => '2009-07-30T13:40:56',
'version' => '6.09_10'
},
{
'date' => '2009-08-07T12:59:58',
'version' => '6.09_11'
},
{
'date' => '2009-08-14T20:49:04',
'version' => '6.10'
},
{
'date' => '2009-08-19T09:21:27',
'version' => '6.11_01'
},
{
'date' => '2009-09-10T09:00:17',
'version' => '6.12'
},
{
'date' => '2009-09-24T15:13:45',
'version' => '6.14'
},
{
'date' => '2009-10-11T09:02:32',
'version' => '6.16'
},
{
'date' => '2009-12-11T19:28:22',
'version' => '6.18'
},
{
'date' => '2010-01-15T18:42:20',
'version' => '6.20'
},
{
'date' => '2010-01-20T01:54:34',
'version' => '6.22'
},
{
'date' => '2010-02-12T02:47:46',
'version' => '6.24'
},
{
'date' => '2010-03-14T07:34:45',
'version' => '6.26'
},
{
'date' => '2010-03-14T10:57:17',
'version' => '6.28'
},
{
'date' => '2010-05-10T14:40:23',
'version' => '6.30'
},
{
'date' => '2010-05-11T13:45:23',
'version' => '6.32'
},
{
'date' => '2010-06-21T20:28:42',
'version' => '6.33'
},
{
'date' => '2010-06-25T18:17:14',
'version' => '6.34'
},
{
'date' => '2010-06-27T09:33:18',
'version' => '6.35'
},
{
'date' => '2010-07-26T03:54:08',
'version' => '6.36'
},
{
'date' => '2010-08-17T23:08:39',
'version' => '6.37'
},
{
'date' => '2010-09-03T18:33:58',
'version' => '6.38'
},
{
'date' => '2010-09-04T02:16:21',
'version' => '6.39'
},
{
'date' => '2010-09-09T06:56:17',
'version' => '6.40'
},
{
'date' => '2010-09-23T21:34:09',
'version' => '6.41'
},
{
'date' => '2010-09-25T09:40:47',
'version' => '6.42'
},
{
'date' => '2010-09-25T21:30:54',
'version' => '6.43'
},
{
'date' => '2010-09-25T23:35:19',
'version' => '6.44'
},
{
'date' => '2010-09-26T03:42:36',
'version' => '6.45'
},
{
'date' => '2010-09-29T04:59:09',
'version' => '6.46'
},
{
'date' => '2010-10-03T15:29:13',
'version' => '6.47'
},
{
'date' => '2010-10-03T19:50:31',
'version' => '6.48'
},
{
'date' => '2010-10-16T19:05:02',
'version' => '6.49'
},
{
'date' => '2010-11-03T02:06:04',
'version' => '6.50'
},
{
'date' => '2010-11-05T11:29:30',
'version' => '6.51'
},
{
'date' => '2010-11-05T17:26:55',
'version' => '6.52'
},
{
'date' => '2011-03-10T15:39:11',
'version' => '6.53'
},
{
'date' => '2011-03-10T18:21:18',
'version' => '6.54'
},
{
'date' => '2011-04-01T18:38:19',
'version' => '6.55'
},
{
'date' => '2011-04-01T20:05:44',
'version' => '6.56'
},
{
'date' => '2011-04-02T03:41:42',
'version' => '6.57'
},
{
'date' => '2011-04-04T17:52:07',
'version' => '6.58'
},
{
'date' => '2011-04-04T20:23:21',
'version' => '6.59'
},
{
'date' => '2011-04-15T06:13:37',
'version' => '6.60'
},
{
'date' => '2011-04-19T17:04:11',
'version' => '6.61'
},
{
'date' => '2011-05-03T11:00:14',
'version' => '6.62'
},
{
'date' => '2011-05-15T05:08:04',
'version' => '6.63'
},
{
'date' => '2011-05-15T10:00:34',
'version' => '6.64'
},
{
'date' => '2011-05-19T01:55:49',
'version' => '6.65'
},
{
'date' => '2011-05-19T22:33:07',
'version' => '6.66'
},
{
'date' => '2011-05-22T16:45:17',
'version' => '6.67'
},
{
'date' => '2011-05-22T17:02:27',
'version' => '6.68'
},
{
'date' => '2011-07-29T01:54:20',
'version' => '6.69'
},
{
'date' => '2011-08-02T03:40:17',
'version' => '6.70'
},
{
'date' => '2011-09-18T16:08:38',
'version' => '6.71'
},
{
'date' => '2011-10-07T15:42:11',
'version' => '6.72'
},
{
'date' => '2011-10-08T04:41:24',
'version' => '6.73'
},
{
'date' => '2011-10-09T20:16:25',
'version' => '6.74'
},
{
'date' => '2011-11-13T14:26:23',
'version' => '6.75'
},
{
'date' => '2011-11-29T03:25:52',
'version' => '6.76'
},
{
'date' => '2011-12-02T03:56:47',
'version' => '6.77'
},
{
'date' => '2011-12-07T20:30:42',
'version' => '6.78'
},
{
'date' => '2012-09-19T13:26:08',
'version' => '6.79'
},
{
'date' => '2012-09-20T08:55:35',
'version' => '6.80'
},
{
'date' => '2012-11-23T15:56:03',
'version' => '6.81'
},
{
'date' => '2013-03-09T22:17:24',
'version' => '6.82'
},
{
'date' => '2013-05-27T09:43:25',
'version' => '6.83'
},
{
'date' => '2014-06-17T09:47:20',
'version' => '6.84'
},
{
'date' => '2014-06-19T09:22:12',
'version' => '6.85'
},
{
'date' => '2014-06-20T10:14:59',
'version' => '6.86'
},
{
'date' => '2014-06-21T14:09:46',
'version' => '6.87'
},
{
'date' => '2014-06-28T12:16:18',
'version' => '6.88'
},
{
'date' => '2017-09-05T18:14:17',
'version' => '6.89'
},
{
'date' => '2017-09-05T18:19:13',
'version' => '6.90'
},
{
'date' => '2021-06-05T12:55:31',
'version' => '6.91'
},
{
'date' => '2021-06-08T13:32:11',
'version' => '6.92'
},
{
'date' => '2021-06-15T18:29:10',
'version' => '6.93'
}
]
},
'POSIX-2008' => {
'advisories' => [
{
'affected_versions' => [
'<0.04'
],
'cves' => [],
'description' => 'POSIX::2008\'s implementation of readlink() and readlinkat(). The underlying syscalls do not add any null terminator byte at the end of the output buffer, but _readlink50c() in 2008.XS also fails to add a null terminator before returning the result string to perl. This results in arbitrary memory contents being visible in the result returned to perl code by readlink() and readlinkat(). At the very least, this causes failures in any downstream code that attempts to access whatever filename (plus the erroneous garbage) was linked to.
',
'distribution' => 'POSIX-2008',
'fixed_versions' => [
'>=0.04'
],
'id' => 'CPANSA-POSIX-2008-001',
'references' => [
'https://rt.cpan.org/Public/Bug/Display.html?id=96644'
],
'reported' => undef,
'severity' => undef
},
{
'affected_versions' => [
'<0.24'
],
'cves' => [
'CVE-2024-55564'
],
'description' => 'Fixed potential env buffer overflow in _execve50c()
',
'distribution' => 'POSIX-2008',
'fixed_versions' => [
'>=0.24'
],
'id' => 'CPANSA-POSIX-2008-002',
'references' => [
'https://metacpan.org/release/CGPAN/POSIX-2008-0.24/source/Changes'
],
'reported' => undef,
'severity' => undef
}
],
'main_module' => 'POSIX::2008',
'versions' => [
{
'date' => '2013-09-13T17:14:53',
'version' => '0.01'
},
{
'date' => '2013-09-14T16:20:56',
'version' => '0.02'
},
{
'date' => '2013-09-16T09:32:15',
'version' => '0.03'
},
{
'date' => '2015-05-25T13:51:17',
'version' => '0.04'
},
{
'date' => '2017-08-25T20:52:28',
'version' => '0.05'
},
{
'date' => '2017-08-26T17:21:09',
'version' => '0.06'
},
{
'date' => '2017-08-27T14:55:54',
'version' => '0.07'
},
{
'date' => '2017-08-31T18:14:24',
'version' => '0.08'
},
{
'date' => '2017-09-01T10:14:04',
'version' => '0.09'
},
{
'date' => '2017-09-02T09:15:21',
'version' => '0.10'
},
{
'date' => '2017-09-02T13:11:19',
'version' => '0.11'
},
{
'date' => '2017-09-03T20:02:26',
'version' => '0.12'
},
{
'date' => '2017-09-08T11:50:51',
'version' => '0.13'
},
{
'date' => '2017-09-09T18:04:53',
'version' => '0.14'
},
{
'date' => '2017-09-10T12:50:52',
'version' => '0.15'
},
{
'date' => '2017-09-15T14:59:53',
'version' => '0.16'
},
{
'date' => '2023-06-01T13:51:43',
'version' => '0.18'
},
{
'date' => '2023-07-07T13:52:59',
'version' => '0.19'
},
{
'date' => '2023-07-08T12:09:34',
'version' => '0.20_01'
},
{
'date' => '2023-07-09T08:25:58',
'version' => '0.20_02'
},
{
'date' => '2023-07-11T15:26:35',
'version' => '0.20_03'
},
{
'date' => '2023-07-12T17:47:09',
'version' => '0.20_04'
},
{
'date' => '2023-07-13T17:26:29',
'version' => '0.20_05'
},
{
'date' => '2023-07-14T15:57:30',
'version' => '0.20'
},
{
'date' => '2023-11-16T19:54:40',
'version' => '0.21'
},
{
'date' => '2024-01-26T16:30:56',
'version' => '0.22'
},
{
'date' => '2024-01-27T15:34:00',
'version' => '0.23'
},
{
'date' => '2024-06-14T12:10:38',
'version' => '0.24'
}
]
},
'Parallel-ForkManager' => {
'advisories' => [
{
'affected_versions' => [
'<1.0.0'
],
'cves' => [
'CVE-2011-4115'
],
'description' => 'Parallel::ForkManager module before 1.0.0 for Perl does not properly handle temporary files.
',
'distribution' => 'Parallel-ForkManager',
'fixed_versions' => [],
'id' => 'CPANSA-Parallel-ForkManager-2011-4115',
'references' => [
'http://www.openwall.com/lists/oss-security/2011/11/04/2',
'http://www.openwall.com/lists/oss-security/2011/11/04/4',
'https://rt.cpan.org/Public/Bug/Display.html?id=68298'
],
'reported' => '2020-01-31',
'severity' => 'high'
}
],
'main_module' => 'Parallel::ForkManager',
'versions' => [
{
'date' => '2000-10-19T21:52:22',
'version' => '0.5'
},
{
'date' => '2000-11-30T11:03:55',
'version' => '0.6'
},
{
'date' => '2001-04-04T11:28:22',
'version' => '0.7'
},
{
'date' => '2001-05-14T14:34:23',
'version' => 'v0.7.2'
},
{
'date' => '2001-10-24T00:32:21',
'version' => 'v0.7.3'
},
{
'date' => '2002-07-04T21:16:46',
'version' => 'v0.7.4'
},
{
'date' => '2002-12-25T23:14:12',
'version' => 'v0.7.5'
},
{
'date' => '2010-08-15T10:53:20',
'version' => '0.7.6'
},
{
'date' => '2010-09-27T22:27:36',
'version' => '0.7.7'
},
{
'date' => '2010-10-25T16:44:43',
'version' => '0.7.8'
},
{
'date' => '2010-11-01T18:06:12',
'version' => '0.7.9'
},
{
'date' => '2012-12-23T10:29:10',
'version' => 'v1.0.0'
},
{
'date' => '2012-12-23T19:35:57',
'version' => '1.01'
},
{
'date' => '2012-12-24T11:30:23',
'version' => '1.02'
},
{
'date' => '2013-03-06T09:31:14',
'version' => '1.03'
},
{
'date' => '2013-09-03T06:57:39',
'version' => '1.04'
},
{
'date' => '2013-09-18T08:58:10',
'version' => '1.05'
},
{
'date' => '2013-12-24T20:42:36',
'version' => '1.06'
},
{
'date' => '2014-11-10T07:11:25',
'version' => '1.07'
},
{
'date' => '2015-01-07T15:27:26',
'version' => '1.08'
},
{
'date' => '2015-01-08T14:47:12',
'version' => '1.09'
},
{
'date' => '2015-01-15T15:22:56',
'version' => '1.10'
},
{
'date' => '2015-01-22T19:09:25',
'version' => '1.10_1'
},
{
'date' => '2015-01-26T19:32:34',
'version' => '1.10_2'
},
{
'date' => '2015-01-30T16:16:43',
'version' => '1.11'
},
{
'date' => '2015-02-23T23:22:38',
'version' => '1.12'
},
{
'date' => '2015-05-11T22:32:07',
'version' => '1.13'
},
{
'date' => '2015-05-17T21:19:58',
'version' => '1.14'
},
{
'date' => '2015-07-08T21:41:39',
'version' => '1.15'
},
{
'date' => '2015-10-08T22:51:51',
'version' => '1.16'
},
{
'date' => '2015-11-28T14:50:06',
'version' => '1.17'
},
{
'date' => '2016-03-29T23:27:09',
'version' => '1.18'
},
{
'date' => '2016-06-28T23:04:26',
'version' => '1.19'
},
{
'date' => '2018-07-19T00:48:24',
'version' => '1.20'
},
{
'date' => '2018-08-23T01:28:34',
'version' => '2.00'
},
{
'date' => '2018-08-23T23:59:37',
'version' => '2.01'
},
{
'date' => '2018-10-08T23:21:03',
'version' => '2.02'
},
{
'date' => '2024-08-24T18:13:26',
'version' => '2.03'
}
]
},
'PathTools' => {
'advisories' => [
{
'affected_versions' => [
'<3.65'
],
'cves' => [
'CVE-2016-1238'
],
'description' => 'Does not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.
',
'distribution' => 'PathTools',
'fixed_versions' => [
'>=3.65'
],
'id' => 'CPANSA-PathTools-2016-02',
'references' => [
'https://metacpan.org/changes/distribution/PathTools'
],
'reported' => '2016-02-08'
},
{
'affected_versions' => [
'<3.62'
],
'cves' => [
'CVE-2015-8607'
],
'description' => 'Does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.
',
'distribution' => 'PathTools',
'fixed_versions' => [
'>=3.62'
],
'id' => 'CPANSA-PathTools-2016-01',
'references' => [
'https://metacpan.org/changes/distribution/PathTools'
],
'reported' => '2016-01-11'
}
],
'main_module' => 'Cwd',
'versions' => [
{
'date' => '2004-09-03T03:40:00',
'version' => '3.00'
},
{
'date' => '2004-09-07T03:39:26',
'version' => '3.01'
},
{
'date' => '2004-11-19T04:26:35',
'version' => '3.01_01'
},
{
'date' => '2004-11-29T04:20:10',
'version' => '3.01_02'
},
{
'date' => '2004-11-30T02:34:46',
'version' => '3.01_03'
},
{
'date' => '2005-01-10T01:33:05',
'version' => '3.02'
},
{
'date' => '2005-01-22T03:59:59',
'version' => '3.03'
},
{
'date' => '2005-02-07T00:28:43',
'version' => '3.04'
},
{
'date' => '2005-02-28T13:27:37',
'version' => '3.05'
},
{
'date' => '2005-04-14T02:06:10',
'version' => '3.06'
},
{
'date' => '2005-05-06T12:50:38',
'version' => '3.07'
},
{
'date' => '2005-05-28T15:13:27',
'version' => '3.08'
},
{
'date' => '2005-06-15T23:45:19',
'version' => '3.09'
},
{
'date' => '2005-08-26T03:29:11',
'version' => '3.10'
},
{
'date' => '2005-08-28T01:16:38',
'version' => '3.11'
},
{
'date' => '2005-10-04T03:14:00',
'version' => '3.12'
},
{
'date' => '2005-11-16T05:58:53',
'version' => '3.13'
},
{
'date' => '2005-11-18T00:15:37',
'version' => '3.14'
},
{
'date' => '2005-12-10T04:51:57',
'version' => '3.14_01'
},
{
'date' => '2005-12-14T05:11:27',
'version' => '3.14_02'
},
{
'date' => '2005-12-27T20:32:26',
'version' => '3.15'
},
{
'date' => '2006-01-31T02:52:07',
'version' => '3.16'
},
{
'date' => '2006-03-03T22:55:18',
'version' => '3.17'
},
{
'date' => '2006-04-28T03:04:00',
'version' => '3.18'
},
{
'date' => '2006-07-12T03:43:15',
'version' => '3.19'
},
{
'date' => '2006-10-05T02:18:51',
'version' => '3.21'
},
{
'date' => '2006-10-10T02:53:23',
'version' => '3.22'
},
{
'date' => '2006-10-11T17:13:59',
'version' => '3.23'
},
{
'date' => '2006-11-20T04:53:56',
'version' => '3.24'
},
{
'date' => '2007-05-22T02:08:53',
'version' => '3.25'
},
{
'date' => '2007-10-14T02:15:40',
'version' => '3.25_01'
},
{
'date' => '2007-12-25T02:34:28',
'version' => '3.2501'
},
{
'date' => '2008-01-14T12:02:28',
'version' => '3.26'
},
{
'date' => '2008-01-15T23:27:33',
'version' => '3.26_01'
},
{
'date' => '2008-01-17T02:21:47',
'version' => '3.27'
},
{
'date' => '2008-02-12T03:46:01',
'version' => '3.2701'
},
{
'date' => '2008-07-26T02:19:45',
'version' => '3.28_01'
},
{
'date' => '2008-10-27T19:27:37',
'version' => '3.28_02'
},
{
'date' => '2008-10-27T21:16:35',
'version' => '3.28_03'
},
{
'date' => '2008-10-29T20:11:52',
'version' => '3.29'
},
{
'date' => '2009-05-07T18:27:46',
'version' => '3.29_01'
},
{
'date' => '2009-05-10T08:59:46',
'version' => '3.30'
},
{
'date' => '2009-09-21T12:46:15',
'version' => '3.30_01'
},
{
'date' => '2009-09-29T06:22:30',
'version' => '3.30_02'
},
{
'date' => '2009-11-01T14:22:36',
'version' => '3.31'
},
{
'date' => '2010-07-23T08:10:31',
'version' => '3.31_02'
},
{
'date' => '2010-09-17T13:24:05',
'version' => '3.31_03'
},
{
'date' => '2010-09-19T15:53:14',
'version' => '3.32'
},
{
'date' => '2010-09-20T07:54:00',
'version' => '3.33'
},
{
'date' => '2011-12-20T07:42:29',
'version' => '3.39_01'
},
{
'date' => '2013-01-16T06:35:08',
'version' => '3.40'
},
{
'date' => '2014-05-01T18:34:31',
'version' => '3.46_01'
},
{
'date' => '2014-05-23T17:00:38',
'version' => '3.47'
},
{
'date' => '2015-07-11T22:18:08',
'version' => '3.56_01'
},
{
'date' => '2015-07-16T15:33:27',
'version' => '3.56_02'
},
{
'date' => '2015-11-09T22:09:25',
'version' => '3.58_01'
},
{
'date' => '2015-11-13T23:46:00',
'version' => '3.59'
},
{
'date' => '2015-11-19T02:32:50',
'version' => '3.60'
},
{
'date' => '2016-01-11T13:49:31',
'version' => '3.62'
},
{
'date' => '2018-02-18T20:27:27',
'version' => '3.73'
},
{
'date' => '2018-02-19T08:41:14',
'version' => '3.74'
},
{
'date' => '2018-08-29T19:53:19',
'version' => '3.75'
}
]
},
'Perl-Version' => {
'advisories' => [
{
'affected_versions' => [
'<1.013'
],
'cves' => [],
'description' => 'Insecure dependency File::Slurp is used.
',
'distribution' => 'Perl-Version',
'fixed_versions' => [
'>=1.013'
],
'id' => 'CPANSA-Perl-Version-2014-01',
'references' => [
'https://metacpan.org/changes/distribution/Perl-Version',
'https://rt.cpan.org/Public/Bug/Display.html?id=92974'
],
'reported' => '2014-02-12'
}
],
'main_module' => 'Perl::Version',
'versions' => [
{
'date' => '2007-02-07T19:41:42',
'version' => 'v0.0.1'
},
{
'date' => '2007-02-23T18:03:11',
'version' => 'v0.0.3'
},
{
'date' => '2007-02-24T18:03:42',
'version' => 'v0.0.4'
},
{
'date' => '2007-02-25T12:41:13',
'version' => 'v0.0.5'
},
{
'date' => '2007-02-27T12:46:07',
'version' => 'v0.0.6'
},
{
'date' => '2007-02-28T01:27:59',
'version' => 'v0.0.7'
},
{
'date' => '2007-06-20T16:09:31',
'version' => '0.0.8'
},
{
'date' => '2007-09-03T14:28:35',
'version' => 'v1.000'
},
{
'date' => '2007-09-07T15:42:58',
'version' => 'v1.001'
},
{
'date' => '2007-09-07T15:58:18',
'version' => 'v1.002'
},
{
'date' => '2007-11-08T12:14:27',
'version' => '1.003'
},
{
'date' => '2007-11-08T12:24:59',
'version' => '1.004'
},
{
'date' => '2008-04-03T14:56:16',
'version' => '1.005'
},
{
'date' => '2008-04-07T19:14:56',
'version' => '1.006'
},
{
'date' => '2008-04-07T19:27:24',
'version' => '1.007'
},
{
'date' => '2009-03-07T16:40:03',
'version' => '1.008'
},
{
'date' => '2009-03-09T16:22:08',
'version' => '1.009'
},
{
'date' => '2010-09-19T15:37:48',
'version' => '1.010'
},
{
'date' => '2011-02-21T21:32:17',
'version' => '1.011'
},
{
'date' => '2014-02-12T20:58:43',
'version' => '1.013'
},
{
'date' => '2014-02-14T16:08:42',
'version' => '1.013_01'
},
{
'date' => '2014-02-18T16:42:57',
'version' => '1.013_02'
},
{
'date' => '2015-11-21T06:05:48',
'version' => '1.013_03'
},
{
'date' => '2024-01-04T15:11:21',
'version' => '1.015'
},
{
'date' => '2024-01-05T13:57:01',
'version' => '1.016'
},
{
'date' => '2024-03-09T01:38:25',
'version' => '1.017'
},
{
'date' => '2025-01-27T13:08:16',
'version' => '1.018'
}
]
},
'Perlbal' => {
'advisories' => [
{
'affected_versions' => [
'<1.70'
],
'cves' => [
'CVE-2008-1652'
],
'description' => 'Directory traversal vulnerability in the _serve_request_multiple function in lib/Perlbal/ClientHTTPBase.pm in Perlbal before 1.70, when concat get is enabled, allows remote attackers to read arbitrary files in a parent directory via a directory traversal sequence in an unspecified parameter. NOTE: some of these details are obtained from third party information.
',
'distribution' => 'Perlbal',
'fixed_versions' => [],
'id' => 'CPANSA-Perlbal-2008-1652',
'references' => [
'http://search.cpan.org/src/BRADFITZ/Perlbal-1.70/CHANGES',
'http://secunia.com/advisories/29565',
'http://www.vupen.com/english/advisories/2008/1045/references',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/41540'
],
'reported' => '2008-04-02',
'severity' => undef
}
],
'main_module' => 'Perlbal',
'versions' => [
{
'date' => '2005-07-26T20:21:09',
'version' => '1.3'
},
{
'date' => '2005-08-17T06:04:13',
'version' => '1.35'
},
{
'date' => '2005-08-19T17:27:29',
'version' => '1.36'
},
{
'date' => '2005-10-19T16:57:48',
'version' => '1.38'
},
{
'date' => '2006-02-06T19:25:44',
'version' => '1.41'
},
{
'date' => '2006-08-04T04:56:17',
'version' => '1.42'
},
{
'date' => '2006-08-09T18:09:23',
'version' => '1.43'
},
{
'date' => '2006-08-10T21:49:57',
'version' => '1.44'
},
{
'date' => '2006-08-10T23:04:14',
'version' => '1.45'
},
{
'date' => '2006-08-10T23:55:32',
'version' => '1.46'
},
{
'date' => '2006-08-15T23:17:40',
'version' => '1.47'
},
{
'date' => '2006-09-08T20:42:55',
'version' => '1.50'
},
{
'date' => '2006-10-04T18:55:28',
'version' => '1.51'
},
{
'date' => '2006-11-13T18:01:56',
'version' => '1.52'
},
{
'date' => '2006-12-05T09:32:56',
'version' => '1.53'
},
{
'date' => '2007-02-05T20:00:01',
'version' => '1.54'
},
{
'date' => '2007-03-21T07:32:33',
'version' => '1.55'
},
{
'date' => '2007-04-16T21:02:13',
'version' => '1.56'
},
{
'date' => '2007-04-26T20:37:24',
'version' => '1.57'
},
{
'date' => '2007-05-11T18:20:57',
'version' => '1.58'
},
{
'date' => '2007-05-22T17:31:31',
'version' => '1.59'
},
{
'date' => '2007-10-24T04:09:35',
'version' => '1.60'
},
{
'date' => '2008-03-09T04:28:27',
'version' => '1.70'
},
{
'date' => '2008-09-14T00:41:35',
'version' => '1.71'
},
{
'date' => '2008-09-22T01:40:20',
'version' => '1.72'
},
{
'date' => '2009-10-05T20:51:59',
'version' => '1.73'
},
{
'date' => '2010-03-20T07:59:03',
'version' => '1.74'
},
{
'date' => '2010-04-02T22:32:03',
'version' => '1.75'
},
{
'date' => '2010-06-18T01:52:54',
'version' => '1.76'
},
{
'date' => '2011-01-16T05:20:16',
'version' => '1.77'
},
{
'date' => '2011-01-23T05:33:07',
'version' => '1.78'
},
{
'date' => '2011-06-15T23:59:19',
'version' => '1.79'
},
{
'date' => '2012-02-27T07:02:28',
'version' => '1.80'
}
]
},
'Pinto' => {
'advisories' => [
{
'affected_versions' => [
'<0.09995'
],
'cves' => [],
'description' => 'Pinto server allowed directory traveral.
',
'distribution' => 'Pinto',
'fixed_versions' => [
'>=0.09995'
],
'id' => 'CPANSA-Pinto-2014-01',
'references' => [
'https://metacpan.org/dist/Pinto/changes',
'https://github.com/thaljef/Pinto/commit/195d46eb4488a7dec6c39d6eb1c48dc872ab2b3b'
],
'reported' => '2014-08-19',
'reviewed_by' => [
{
'date' => '2022-06-28',
'email' => 'rrwo@cpan.org',
'name' => 'Robert Rothenberg'
}
]
}
],
'main_module' => 'Pinto',
'versions' => [
{
'date' => '2011-07-26T21:17:47',
'version' => '0.001'
},
{
'date' => '2011-07-27T00:22:00',
'version' => '0.002'
},
{
'date' => '2011-08-04T06:00:27',
'version' => '0.003'
},
{
'date' => '2011-08-04T07:24:59',
'version' => '0.004'
},
{
'date' => '2011-08-04T07:46:03',
'version' => '0.005'
},
{
'date' => '2011-08-04T07:54:24',
'version' => '0.006'
},
{
'date' => '2011-08-04T15:07:03',
'version' => '0.007'
},
{
'date' => '2011-08-09T21:49:02',
'version' => '0.008'
},
{
'date' => '2011-08-13T00:51:56',
'version' => '0.009'
},
{
'date' => '2011-08-14T20:32:00',
'version' => '0.010'
},
{
'date' => '2011-08-15T04:14:45',
'version' => '0.011'
},
{
'date' => '2011-08-17T16:12:20',
'version' => '0.012'
},
{
'date' => '2011-08-17T23:14:14',
'version' => '0.014'
},
{
'date' => '2011-08-18T08:57:36',
'version' => '0.015'
},
{
'date' => '2011-08-18T09:03:09',
'version' => '0.016'
},
{
'date' => '2011-08-24T07:53:18',
'version' => '0.017'
},
{
'date' => '2011-08-24T08:48:57',
'version' => '0.018'
},
{
'date' => '2011-08-24T11:16:38',
'version' => '0.019'
},
{
'date' => '2011-08-29T03:46:11',
'version' => '0.020'
},
{
'date' => '2011-08-30T08:20:49',
'version' => '0.021'
},
{
'date' => '2011-08-31T08:35:52',
'version' => '0.022'
},
{
'date' => '2011-08-31T21:22:32',
'version' => '0.023'
},
{
'date' => '2011-09-01T22:29:05',
'version' => '0.024'
},
{
'date' => '2011-12-02T11:21:54',
'version' => '0.025_001'
},
{
'date' => '2011-12-02T12:42:45',
'version' => '0.025_002'
},
{
'date' => '2011-12-03T12:16:42',
'version' => '0.025_003'
},
{
'date' => '2011-12-07T15:26:36',
'version' => '0.025_004'
},
{
'date' => '2011-12-07T20:09:02',
'version' => '0.026'
},
{
'date' => '2011-12-08T23:27:07',
'version' => '0.027'
},
{
'date' => '2011-12-12T09:32:39',
'version' => '0.028'
},
{
'date' => '2011-12-15T08:31:43',
'version' => '0.029'
},
{
'date' => '2012-01-27T06:05:38',
'version' => '0.030'
},
{
'date' => '2012-02-28T13:23:36',
'version' => '0.031'
},
{
'date' => '2012-03-01T18:43:41',
'version' => '0.032'
},
{
'date' => '2012-03-15T14:00:07',
'version' => '0.033'
},
{
'date' => '2012-04-05T02:08:20',
'version' => '0.035'
},
{
'date' => '2012-04-09T07:18:50',
'version' => '0.036'
},
{
'date' => '2012-04-11T03:02:41',
'version' => '0.037'
},
{
'date' => '2012-04-17T01:21:11',
'version' => '0.038'
},
{
'date' => '2012-05-01T20:52:05',
'version' => '0.040_001'
},
{
'date' => '2012-05-04T23:28:00',
'version' => '0.040_002'
},
{
'date' => '2012-05-05T04:42:35',
'version' => '0.040_003'
},
{
'date' => '2012-05-15T18:18:01',
'version' => '0.041'
},
{
'date' => '2012-05-18T04:59:37',
'version' => '0.042'
},
{
'date' => '2012-06-19T17:58:05',
'version' => '0.043'
},
{
'date' => '2012-07-15T08:45:52',
'version' => '0.044'
},
{
'date' => '2012-07-24T06:18:49',
'version' => '0.045'
},
{
'date' => '2012-08-13T22:50:28',
'version' => '0.046'
},
{
'date' => '2012-08-14T00:27:03',
'version' => '0.047'
},
{
'date' => '2012-08-15T16:28:03',
'version' => '0.048'
},
{
'date' => '2012-08-15T21:30:01',
'version' => '0.050'
},
{
'date' => '2012-08-16T01:31:42',
'version' => '0.051'
},
{
'date' => '2012-09-18T23:20:20',
'version' => '0.052'
},
{
'date' => '2012-09-20T04:03:53',
'version' => '0.053'
},
{
'date' => '2012-09-20T05:07:44',
'version' => '0.054'
},
{
'date' => '2012-09-20T20:40:05',
'version' => '0.055'
},
{
'date' => '2012-09-27T20:45:51',
'version' => '0.056'
},
{
'date' => '2012-10-07T21:25:33',
'version' => '0.057'
},
{
'date' => '2012-10-12T06:19:44',
'version' => '0.058'
},
{
'date' => '2012-10-20T08:01:03',
'version' => '0.059'
},
{
'date' => '2012-10-23T21:41:47',
'version' => '0.060'
},
{
'date' => '2012-10-31T00:23:58',
'version' => '0.061'
},
{
'date' => '2012-11-08T18:57:09',
'version' => '0.062'
},
{
'date' => '2012-11-12T20:03:29',
'version' => '0.063'
},
{
'date' => '2012-11-12T21:58:57',
'version' => '0.064'
},
{
'date' => '2012-11-14T18:00:34',
'version' => '0.065'
},
{
'date' => '2013-03-15T23:28:13',
'version' => '0.065_01'
},
{
'date' => '2013-03-16T06:44:49',
'version' => '0.065_02'
},
{
'date' => '2013-03-19T22:58:08',
'version' => '0.065_03'
},
{
'date' => '2013-03-20T23:12:44',
'version' => '0.065_04'
},
{
'date' => '2013-03-20T23:28:07',
'version' => '0.065_05'
},
{
'date' => '2013-03-23T07:33:37',
'version' => '0.065_06'
},
{
'date' => '2013-03-26T23:29:22',
'version' => '0.066'
},
{
'date' => '2013-03-30T07:51:45',
'version' => '0.067'
},
{
'date' => '2013-04-05T05:47:08',
'version' => '0.068'
},
{
'date' => '2013-04-21T16:55:30',
'version' => '0.079_01'
},
{
'date' => '2013-04-23T07:53:34',
'version' => '0.079_04'
},
{
'date' => '2013-04-26T17:50:55',
'version' => '0.080'
},
{
'date' => '2013-04-26T21:00:35',
'version' => '0.081'
},
{
'date' => '2013-04-29T17:02:33',
'version' => '0.082'
},
{
'date' => '2013-05-13T21:45:43',
'version' => '0.083'
},
{
'date' => '2013-05-15T00:34:13',
'version' => '0.084'
},
{
'date' => '2013-06-16T08:05:08',
'version' => '0.084_01'
},
{
'date' => '2013-06-17T04:08:49',
'version' => '0.084_02'
},
{
'date' => '2013-06-17T20:09:55',
'version' => '0.085'
},
{
'date' => '2013-06-18T10:08:10',
'version' => '0.086'
},
{
'date' => '2013-06-20T01:50:39',
'version' => '0.087'
},
{
'date' => '2013-07-09T08:19:39',
'version' => '0.087_01'
},
{
'date' => '2013-07-21T08:38:23',
'version' => '0.087_03'
},
{
'date' => '2013-07-27T03:21:44',
'version' => '0.087_04'
},
{
'date' => '2013-07-30T07:00:31',
'version' => '0.087_05'
},
{
'date' => '2013-08-15T18:00:31',
'version' => '0.088'
},
{
'date' => '2013-08-19T20:34:32',
'version' => '0.089'
},
{
'date' => '2013-08-23T22:02:45',
'version' => '0.090'
},
{
'date' => '2013-10-25T19:22:19',
'version' => '0.091'
},
{
'date' => '2013-11-20T19:18:40',
'version' => '0.092'
},
{
'date' => '2013-12-22T00:41:08',
'version' => '0.093'
},
{
'date' => '2013-12-22T09:07:09',
'version' => '0.094'
},
{
'date' => '2013-12-23T07:49:14',
'version' => '0.095'
},
{
'date' => '2014-01-07T18:57:51',
'version' => '0.096'
},
{
'date' => '2014-01-08T07:10:26',
'version' => '0.097'
},
{
'date' => '2014-01-17T20:57:05',
'version' => '0.097_01'
},
{
'date' => '2014-01-23T08:46:47',
'version' => '0.097_02'
},
{
'date' => '2014-01-23T22:17:10',
'version' => '0.097_03'
},
{
'date' => '2014-01-25T23:24:17',
'version' => '0.097_04'
},
{
'date' => '2014-01-28T01:01:18',
'version' => '0.098'
},
{
'date' => '2014-01-28T10:07:29',
'version' => '0.098_01'
},
{
'date' => '2014-01-28T20:44:00',
'version' => '0.099'
},
{
'date' => '2014-02-01T01:30:41',
'version' => '0.0991'
},
{
'date' => '2014-02-10T10:11:30',
'version' => '0.0992'
},
{
'date' => '2014-02-23T22:14:22',
'version' => '0.0993'
},
{
'date' => '2014-03-02T00:14:38',
'version' => '0.0994'
},
{
'date' => '2014-03-05T09:16:04',
'version' => '0.0994_01'
},
{
'date' => '2014-03-16T06:18:21',
'version' => '0.0994_02'
},
{
'date' => '2014-03-16T07:56:27',
'version' => '0.0994_03'
},
{
'date' => '2014-03-18T04:44:49',
'version' => '0.0994_04'
},
{
'date' => '2014-03-19T04:24:14',
'version' => '0.0995'
},
{
'date' => '2014-03-23T04:23:21',
'version' => '0.0996'
},
{
'date' => '2014-03-24T04:02:32',
'version' => '0.0997'
},
{
'date' => '2014-03-31T22:44:44',
'version' => '0.0998'
},
{
'date' => '2014-04-04T06:05:12',
'version' => '0.0999'
},
{
'date' => '2014-04-05T12:41:39',
'version' => '0.09991'
},
{
'date' => '2014-04-23T22:27:50',
'version' => '0.09992'
},
{
'date' => '2014-04-28T17:43:44',
'version' => '0.09992_01'
},
{
'date' => '2014-04-29T21:34:32',
'version' => '0.09992_02'
},
{
'date' => '2014-05-03T01:04:46',
'version' => '0.09993'
},
{
'date' => '2014-08-20T01:44:36',
'version' => '0.09995'
},
{
'date' => '2014-11-04T19:15:26',
'version' => '0.09996'
},
{
'date' => '2015-03-24T08:26:01',
'version' => '0.09997'
},
{
'date' => '2015-06-10T15:22:03',
'version' => '0.09998'
},
{
'date' => '2015-06-14T05:30:55',
'version' => '0.09999'
},
{
'date' => '2015-08-12T08:48:47',
'version' => '0.11'
},
{
'date' => '2016-07-17T05:04:20',
'version' => '0.11_01'
},
{
'date' => '2016-07-26T04:18:25',
'version' => '0.12'
},
{
'date' => '2017-08-06T05:59:13',
'version' => '0.13'
},
{
'date' => '2017-08-06T07:31:17',
'version' => '0.14'
}
]
},
'PlRPC' => {
'advisories' => [
{
'affected_versions' => [
'<=0.2020'
],
'cves' => [
'CVE-2013-7284'
],
'description' => 'The PlRPC module, possibly 0.2020 and earlier, for Perl uses the Storable module, which allows remote attackers to execute arbitrary code via a crafted request, which is not properly handled when it is deserialized.
',
'distribution' => 'PlRPC',
'fixed_versions' => [],
'id' => 'CPANSA-PlRPC-2013-7284',
'references' => [
'https://bugzilla.redhat.com/show_bug.cgi?id=1051108',
'http://seclists.org/oss-sec/2014/q1/56',
'http://seclists.org/oss-sec/2014/q1/62',
'https://bugzilla.redhat.com/show_bug.cgi?id=1030572',
'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734789',
'https://rt.cpan.org/Public/Bug/Display.html?id=90474'
],
'reported' => '2014-04-29',
'severity' => undef
}
],
'main_module' => 'Bundle::PlRPC',
'versions' => [
{
'date' => '1998-10-28T23:03:06',
'version' => '0.2001'
},
{
'date' => '1999-01-15T09:26:43',
'version' => '0.2003'
},
{
'date' => '1999-04-09T21:18:22',
'version' => '0.2010'
},
{
'date' => '1999-06-21T09:10:10',
'version' => '0.2004'
},
{
'date' => '1999-06-21T09:26:45',
'version' => '0.2011'
},
{
'date' => '1999-06-26T16:21:38',
'version' => '0.2012'
},
{
'date' => '2001-01-23T08:17:41',
'version' => '0.2013'
},
{
'date' => '2001-01-23T15:57:05',
'version' => '0.2014'
},
{
'date' => '2001-03-26T13:10:50',
'version' => '0.2015'
},
{
'date' => '2001-10-01T02:45:21',
'version' => '0.2016'
},
{
'date' => '2003-06-09T08:55:18',
'version' => '0.2017'
},
{
'date' => '2004-07-27T07:47:32',
'version' => '0.2018'
},
{
'date' => '2007-05-22T20:56:36',
'version' => '0.2018'
},
{
'date' => '2007-06-17T20:00:21',
'version' => '0.2018'
},
{
'date' => '2012-01-27T16:55:27',
'version' => '0.2021_01'
}
]
},
'Plack' => {
'advisories' => [
{
'affected_versions' => [
'<1.0034'
],
'cves' => [],
'description' => 'Fixed a possible directory traversal with Plack::App::File on Win32.
',
'distribution' => 'Plack',
'fixed_versions' => [
'>=1.0034'
],
'id' => 'CPANSA-Plack-2015-0202',
'references' => [],
'reported' => '2015-02-02'
},
{
'affected_versions' => [
'<1.0031'
],
'cves' => [],
'description' => 'Plack::App::File would previously strip trailing slashes off provided paths. This in combination with the common pattern of serving files with Plack::Middleware::Static could allow an attacker to bypass a whitelist of generated files
',
'distribution' => 'Plack',
'fixed_versions' => [
'>=1.0031'
],
'id' => 'CPANSA-Plack-2014-0801',
'references' => [
'https://github.com/plack/Plack/pull/446'
],
'reported' => '2014-08-01'
},
{
'affected_versions' => [
'<1.0016'
],
'cves' => [],
'description' => 'Fixed directory traversal bug in Plack::App::File on win32 environments
',
'distribution' => 'Plack',
'fixed_versions' => [
'>=1.0016'
],
'id' => 'CPANSA-Plack-2013-0131',
'references' => [],
'reported' => '2013-01-31'
}
],
'main_module' => 'Plack',
'versions' => [
{
'date' => '2009-10-13T07:21:14',
'version' => '0.9000'
},
{
'date' => '2009-10-13T07:59:20',
'version' => '0.9001'
},
{
'date' => '2009-10-14T18:28:32',
'version' => '0.9002'
},
{
'date' => '2009-10-19T02:19:08',
'version' => '0.9003'
},
{
'date' => '2009-10-21T05:59:54',
'version' => '0.9004'
},
{
'date' => '2009-10-22T03:55:53',
'version' => '0.9005'
},
{
'date' => '2009-10-23T08:22:57',
'version' => '0.9006'
},
{
'date' => '2009-10-25T00:49:12',
'version' => '0.9007'
},
{
'date' => '2009-10-27T21:20:52',
'version' => '0.9008'
},
{
'date' => '2009-11-08T04:51:25',
'version' => '0.9009'
},
{
'date' => '2009-11-12T07:23:02',
'version' => '0.9010'
},
{
'date' => '2009-11-12T11:57:16',
'version' => '0.9011'
},
{
'date' => '2009-11-17T21:48:12',
'version' => '0.9012'
},
{
'date' => '2009-11-19T02:29:16',
'version' => '0.9013'
},
{
'date' => '2009-11-21T05:54:55',
'version' => '0.9014'
},
{
'date' => '2009-11-26T08:39:53',
'version' => '0.9015'
},
{
'date' => '2009-11-29T07:41:55',
'version' => '0.9016'
},
{
'date' => '2009-11-29T08:40:10',
'version' => '0.9017'
},
{
'date' => '2009-12-03T08:52:20',
'version' => '0.9018'
},
{
'date' => '2009-12-06T06:01:48',
'version' => '0.9019'
},
{
'date' => '2009-12-07T10:39:46',
'version' => '0.9020'
},
{
'date' => '2009-12-08T22:32:02',
'version' => '0.9021'
},
{
'date' => '2009-12-13T19:03:10',
'version' => '0.9022'
},
{
'date' => '2009-12-17T21:22:18',
'version' => '0.9023'
},
{
'date' => '2009-12-19T20:28:45',
'version' => '0.9024'
},
{
'date' => '2009-12-26T01:16:08',
'version' => '0.9025'
},
{
'date' => '2010-01-01T01:38:39',
'version' => '0.9026'
},
{
'date' => '2010-01-04T00:36:24',
'version' => '0.9027'
},
{
'date' => '2010-01-06T02:44:35',
'version' => '0.9028'
},
{
'date' => '2010-01-08T03:13:27',
'version' => '0.9029'
},
{
'date' => '2010-01-09T21:17:38',
'version' => '0.9030'
},
{
'date' => '2010-01-11T19:34:54',
'version' => '0.9031'
},
{
'date' => '2010-01-29T22:44:12',
'version' => '0.99_01'
},
{
'date' => '2010-01-31T06:15:25',
'version' => '0.99_02'
},
{
'date' => '2010-02-04T00:15:09',
'version' => '0.99_03'
},
{
'date' => '2010-02-06T07:17:08',
'version' => '0.99_04'
},
{
'date' => '2010-02-10T20:55:18',
'version' => '0.99_05'
},
{
'date' => '2010-02-23T03:10:40',
'version' => '0.9910'
},
{
'date' => '2010-02-23T09:58:27',
'version' => '0.9911'
},
{
'date' => '2010-02-25T09:32:19',
'version' => '0.9912'
},
{
'date' => '2010-02-26T03:16:42',
'version' => '0.9913'
},
{
'date' => '2010-03-04T00:07:15',
'version' => '0.9914'
},
{
'date' => '2010-03-08T09:35:55',
'version' => '0.9915'
},
{
'date' => '2010-03-12T03:56:59',
'version' => '0.9916'
},
{
'date' => '2010-03-17T22:41:16',
'version' => '0.9917'
},
{
'date' => '2010-03-18T05:42:29',
'version' => '0.9918'
},
{
'date' => '2010-03-18T05:56:03',
'version' => '0.9919'
},
{
'date' => '2010-03-19T07:05:16',
'version' => '0.9920'
},
{
'date' => '2010-03-25T22:10:09',
'version' => '0.99_21'
},
{
'date' => '2010-03-26T02:51:33',
'version' => '0.99_22'
},
{
'date' => '2010-03-27T08:06:00',
'version' => '0.99_23'
},
{
'date' => '2010-03-27T20:36:26',
'version' => '0.99_24'
},
{
'date' => '2010-03-28T02:06:23',
'version' => '0.9925'
},
{
'date' => '2010-03-28T21:49:52',
'version' => '0.9926'
},
{
'date' => '2010-03-29T19:51:35',
'version' => '0.9927'
},
{
'date' => '2010-03-30T00:07:33',
'version' => '0.9928'
},
{
'date' => '2010-03-31T07:37:38',
'version' => '0.9929'
},
{
'date' => '2010-04-14T03:22:29',
'version' => '0.9930'
},
{
'date' => '2010-04-17T06:54:58',
'version' => '0.9931'
},
{
'date' => '2010-04-19T06:29:10',
'version' => '0.9932'
},
{
'date' => '2010-04-27T21:35:45',
'version' => '0.9933'
},
{
'date' => '2010-05-04T22:51:24',
'version' => '0.9934'
},
{
'date' => '2010-05-05T22:21:08',
'version' => '0.9935'
},
{
'date' => '2010-05-14T23:01:23',
'version' => '0.9936'
},
{
'date' => '2010-05-15T06:14:20',
'version' => '0.9937'
},
{
'date' => '2010-05-24T00:16:59',
'version' => '0.9938'
},
{
'date' => '2010-07-03T01:04:03',
'version' => '0.9938'
},
{
'date' => '2010-07-03T06:43:20',
'version' => '0.9940'
},
{
'date' => '2010-07-09T01:22:49',
'version' => '0.9941'
},
{
'date' => '2010-07-24T06:46:17',
'version' => '0.9942'
},
{
'date' => '2010-07-30T20:26:59',
'version' => '0.9943'
},
{
'date' => '2010-08-09T06:40:55',
'version' => '0.9944'
},
{
'date' => '2010-08-19T23:32:19',
'version' => '0.9945'
},
{
'date' => '2010-08-29T05:49:19',
'version' => '0.9946'
},
{
'date' => '2010-09-09T09:27:05',
'version' => '0.9947'
},
{
'date' => '2010-09-09T23:04:59',
'version' => '0.9948'
},
{
'date' => '2010-09-14T19:01:11',
'version' => '0.9949'
},
{
'date' => '2010-09-30T21:14:53',
'version' => '0.9950'
},
{
'date' => '2010-10-25T21:19:36',
'version' => '0.9951'
},
{
'date' => '2010-12-02T22:06:47',
'version' => '0.9952'
},
{
'date' => '2010-12-03T22:52:23',
'version' => '0.9953'
},
{
'date' => '2010-12-10T01:48:11',
'version' => '0.9954'
},
{
'date' => '2010-12-10T02:03:59',
'version' => '0.9955'
},
{
'date' => '2010-12-10T03:39:26',
'version' => '0.9956'
},
{
'date' => '2010-12-16T19:33:28',
'version' => '0.9957'
},
{
'date' => '2010-12-20T23:23:17',
'version' => '0.9958'
},
{
'date' => '2010-12-21T19:58:23',
'version' => '0.9959'
},
{
'date' => '2010-12-25T19:18:11',
'version' => '0.9960'
},
{
'date' => '2011-01-08T05:54:56',
'version' => '0.9961'
},
{
'date' => '2011-01-09T05:21:23',
'version' => '0.9962'
},
{
'date' => '2011-01-11T00:51:33',
'version' => '0.9963'
},
{
'date' => '2011-01-25T00:50:49',
'version' => '0.9964'
},
{
'date' => '2011-01-25T07:13:52',
'version' => '0.9965'
},
{
'date' => '2011-01-25T20:03:38',
'version' => '0.9966'
},
{
'date' => '2011-01-25T22:27:44',
'version' => '0.9967'
},
{
'date' => '2011-02-10T03:09:10',
'version' => '0.9968'
},
{
'date' => '2011-02-19T05:56:47',
'version' => '0.9969'
},
{
'date' => '2011-02-22T16:44:11',
'version' => '0.9970'
},
{
'date' => '2011-02-23T22:07:39',
'version' => '0.9971'
},
{
'date' => '2011-02-24T19:57:46',
'version' => '0.9972'
},
{
'date' => '2011-02-26T17:48:50',
'version' => '0.9973'
},
{
'date' => '2011-03-04T04:56:59',
'version' => '0.9974'
},
{
'date' => '2011-03-24T18:38:08',
'version' => '0.99_75'
},
{
'date' => '2011-04-09T01:29:10',
'version' => '0.9976'
},
{
'date' => '2011-05-01T19:24:37',
'version' => '0.9977'
},
{
'date' => '2011-05-04T18:31:01',
'version' => '0.9978'
},
{
'date' => '2011-05-17T16:59:59',
'version' => '0.9979'
},
{
'date' => '2011-06-07T03:29:28',
'version' => '0.9980'
},
{
'date' => '2011-07-19T00:35:19',
'version' => '0.9981'
},
{
'date' => '2011-07-19T20:14:06',
'version' => '0.9982'
},
{
'date' => '2011-09-27T17:23:29',
'version' => '0.9983'
},
{
'date' => '2011-10-03T16:57:23',
'version' => '0.9984'
},
{
'date' => '2011-10-31T20:17:46',
'version' => '0.9985'
},
{
'date' => '2012-03-12T18:29:44',
'version' => '0.9986'
},
{
'date' => '2012-05-10T05:13:38',
'version' => '0.9987'
},
{
'date' => '2012-05-11T10:27:33',
'version' => '0.9988'
},
{
'date' => '2012-06-21T20:49:15',
'version' => '0.9989'
},
{
'date' => '2012-07-18T18:17:16',
'version' => '0.9990'
},
{
'date' => '2012-07-20T00:30:44',
'version' => '0.9991'
},
{
'date' => '2012-07-20T02:12:14',
'version' => '1.0000'
},
{
'date' => '2012-07-26T23:28:35',
'version' => '1.0001'
},
{
'date' => '2012-08-14T00:09:45',
'version' => '1.0002'
},
{
'date' => '2012-08-29T20:49:18',
'version' => '1.0003'
},
{
'date' => '2012-09-20T02:21:25',
'version' => '1.0004'
},
{
'date' => '2012-10-09T20:37:58',
'version' => '1.0005'
},
{
'date' => '2012-10-18T23:10:01',
'version' => '1.0006'
},
{
'date' => '2012-10-21T06:23:22',
'version' => '1.0007'
},
{
'date' => '2012-10-23T01:54:12',
'version' => '1.0008'
},
{
'date' => '2012-10-23T07:59:59',
'version' => '1.0009'
},
{
'date' => '2012-11-02T20:33:36',
'version' => '1.0010'
},
{
'date' => '2012-11-11T19:09:23',
'version' => '1.0011'
},
{
'date' => '2012-11-14T20:02:29',
'version' => '1.0012'
},
{
'date' => '2012-11-15T03:49:43',
'version' => '1.0013'
},
{
'date' => '2012-12-03T18:30:20',
'version' => '1.0014'
},
{
'date' => '2013-01-10T23:23:32',
'version' => '1.0015'
},
{
'date' => '2013-01-31T21:28:36',
'version' => '1.0016'
},
{
'date' => '2013-02-08T03:43:51',
'version' => '1.0017'
},
{
'date' => '2013-03-08T18:47:51',
'version' => '1.0018'
},
{
'date' => '2013-04-02T01:39:27',
'version' => '1.0019'
},
{
'date' => '2013-04-02T02:39:03',
'version' => '1.0020'
},
{
'date' => '2013-04-02T18:21:32',
'version' => '1.0021'
},
{
'date' => '2013-04-02T19:38:30',
'version' => '1.0022'
},
{
'date' => '2013-04-08T18:14:06',
'version' => '1.0023'
},
{
'date' => '2013-05-01T17:07:27',
'version' => '1.0024'
},
{
'date' => '2013-06-12T20:10:31',
'version' => '1.0025'
},
{
'date' => '2013-06-13T06:01:17',
'version' => '1.0026'
},
{
'date' => '2013-06-14T04:31:09',
'version' => '1.0027'
},
{
'date' => '2013-06-15T08:44:43',
'version' => '1.0028'
},
{
'date' => '2013-08-22T21:06:25',
'version' => '1.0029'
},
{
'date' => '2013-11-23T07:55:52',
'version' => '1.0030'
},
{
'date' => '2014-08-01T20:20:15',
'version' => '1.0031'
},
{
'date' => '2014-10-04T18:14:01',
'version' => '1.0032'
},
{
'date' => '2014-10-23T20:32:28',
'version' => '1.0033'
},
{
'date' => '2015-02-02T20:44:19',
'version' => '1.0034'
},
{
'date' => '2015-04-16T08:09:20',
'version' => '1.0035'
},
{
'date' => '2015-06-03T19:03:39',
'version' => '1.0036'
},
{
'date' => '2015-06-19T17:02:08',
'version' => '1.0037'
},
{
'date' => '2015-11-25T20:37:51',
'version' => '1.0038'
},
{
'date' => '2015-12-06T11:29:40',
'version' => '1.0039'
},
{
'date' => '2016-04-01T16:58:21',
'version' => '1.0040'
},
{
'date' => '2016-09-25T21:25:47',
'version' => '1.0041'
},
{
'date' => '2016-09-29T05:38:42',
'version' => '1.0042'
},
{
'date' => '2017-02-22T03:02:05',
'version' => '1.0043'
},
{
'date' => '2017-04-27T17:48:20',
'version' => '1.0044'
},
{
'date' => '2017-12-31T20:42:50',
'version' => '1.0045'
},
{
'date' => '2018-02-10T07:52:31',
'version' => '1.0046'
},
{
'date' => '2018-02-10T09:25:30',
'version' => '1.0047'
},
{
'date' => '2020-11-30T00:21:36',
'version' => '1.0048'
},
{
'date' => '2022-09-01T17:44:48',
'version' => '1.0049'
},
{
'date' => '2022-09-05T15:48:11',
'version' => '1.0050'
},
{
'date' => '2024-01-05T23:11:02',
'version' => '1.0051'
},
{
'date' => '2024-09-30T20:39:33',
'version' => '1.0052'
},
{
'date' => '2024-12-12T21:11:55',
'version' => '1.0053'
}
]
},
'Plack-Middleware-Session' => {
'advisories' => [
{
'affected_versions' => [
'<=0.21'
],
'cves' => [],
'description' => 'Plack::Middleware::Session::Cookie 0.21 has a security vulnerability where it allows an attacker to execute arbitrary code on the server, when the middleware is enabled without a secret.
',
'distribution' => 'Plack-Middleware-Session',
'fixed_versions' => [
'>0.21'
],
'id' => 'CPANSA-Plack-Middleware-Session-2014-01',
'references' => [
'https://gist.github.com/miyagawa/2b8764af908a0dacd43d',
'https://metacpan.org/changes/distribution/Plack-Middleware-Session'
],
'reported' => '2014-08-11',
'severity' => 'critical'
}
],
'main_module' => 'Plack::Middleware::Session',
'versions' => [
{
'date' => '2009-12-15T18:59:13',
'version' => '0.01'
},
{
'date' => '2009-12-19T19:27:38',
'version' => '0.02'
},
{
'date' => '2010-01-07T22:12:43',
'version' => '0.03'
},
{
'date' => '2010-01-30T21:46:53',
'version' => '0.09_01'
},
{
'date' => '2010-01-31T07:17:07',
'version' => '0.09_02'
},
{
'date' => '2010-02-03T04:46:20',
'version' => '0.09_03'
},
{
'date' => '2010-02-23T03:16:31',
'version' => '0.10'
},
{
'date' => '2010-02-27T10:47:17',
'version' => '0.11'
},
{
'date' => '2010-07-07T22:55:18',
'version' => '0.12'
},
{
'date' => '2010-12-22T17:00:14',
'version' => '0.13'
},
{
'date' => '2011-03-29T20:50:06',
'version' => '0.14'
},
{
'date' => '2012-09-04T21:16:35',
'version' => '0.15'
},
{
'date' => '2013-02-10T19:43:11',
'version' => '0.16'
},
{
'date' => '2013-02-11T23:45:49',
'version' => '0.17'
},
{
'date' => '2013-02-12T10:57:14',
'version' => '0.17'
},
{
'date' => '2013-06-24T23:09:39',
'version' => '0.20'
},
{
'date' => '2013-10-12T18:42:26',
'version' => '0.21'
},
{
'date' => '2014-08-11T17:18:03',
'version' => '0.22'
},
{
'date' => '2014-08-11T17:23:40',
'version' => '0.23'
},
{
'date' => '2014-09-05T11:48:57',
'version' => '0.24'
},
{
'date' => '2014-09-29T03:07:54',
'version' => '0.25'
},
{
'date' => '2015-02-03T08:17:55',
'version' => '0.26'
},
{
'date' => '2015-02-14T00:52:35',
'version' => '0.27'
},
{
'date' => '2015-02-16T16:30:31',
'version' => '0.28'
},
{
'date' => '2015-02-17T23:57:32',
'version' => '0.29'
},
{
'date' => '2015-03-02T18:25:56',
'version' => '0.30'
},
{
'date' => '2019-02-26T19:01:59',
'version' => '0.31'
},
{
'date' => '2019-02-26T21:36:43',
'version' => '0.32'
},
{
'date' => '2019-03-09T23:19:27',
'version' => '0.33'
},
{
'date' => '2024-09-23T16:54:44',
'version' => '0.34'
}
]
},
'Plack-Middleware-StaticShared' => {
'advisories' => [
{
'affected_versions' => [
'<0.04'
],
'cves' => [],
'description' => 'Vulnerability of directory traversal.
',
'distribution' => 'Plack-Middleware-StaticShared',
'fixed_versions' => [
'>=0.04'
],
'id' => 'CPANSA-Plack-Middleware-StaticShared-2012-01',
'references' => [
'https://metacpan.org/dist/Plack-Middleware-StaticShared/changes'
],
'reported' => '2012-04-26',
'severity' => undef
}
],
'main_module' => 'Plack::Middleware::StaticShared',
'versions' => [
{
'date' => '2010-12-03T11:42:11',
'version' => '0.01'
},
{
'date' => '2011-08-03T00:32:41',
'version' => '0.02'
},
{
'date' => '2011-08-10T14:36:03',
'version' => '0.03'
},
{
'date' => '2012-04-26T03:37:11',
'version' => '0.04'
},
{
'date' => '2013-01-24T10:40:54',
'version' => '0.05'
},
{
'date' => '2016-06-09T03:53:36',
'version' => '0.06'
}
]
},
'Plack-Middleware-XSRFBlock' => {
'advisories' => [
{
'affected_versions' => [
'<0.0.19'
],
'cves' => [
'CVE-2023-52431'
],
'description' => 'When not using signed cookies, it was possible to bypass XSRFBlock by POSTing an empty form value and an empty cookie
',
'distribution' => 'Plack-Middleware-XSRFBlock',
'fixed_versions' => [
'>=0.0.19'
],
'id' => 'CPANSA-Plack-Middleware-XSRFBlock-20230714-01',
'references' => [
'https://metacpan.org/dist/Plack-Middleware-XSRFBlock/changes',
'https://metacpan.org/release/DAKKAR/Plack-Middleware-XSRFBlock-0.0.19/source/Changes',
'https://nvd.nist.gov/vuln/detail/CVE-2023-52431'
],
'reported' => '2023-07-14',
'severity' => undef
}
],
'main_module' => 'Plack::Middleware::XSRFBlock',
'versions' => [
{
'date' => '2013-06-20T11:01:27',
'version' => '0.0.0_01'
},
{
'date' => '2013-06-21T14:07:31',
'version' => '0.0.0_02'
},
{
'date' => '2013-06-21T14:48:20',
'version' => '0.0.0_03'
},
{
'date' => '2013-06-21T15:04:00',
'version' => '0.0.0_04'
},
{
'date' => '2013-06-23T23:30:14',
'version' => '0.0.0_05'
},
{
'date' => '2013-10-21T15:36:45',
'version' => '0.0.1'
},
{
'date' => '2014-03-28T11:34:07',
'version' => '0.0.2'
},
{
'date' => '2014-06-24T15:02:09',
'version' => '0.0.3'
},
{
'date' => '2014-07-09T12:44:23',
'version' => '0.0.4'
},
{
'date' => '2014-07-22T15:29:19',
'version' => '0.0.5'
},
{
'date' => '2014-08-05T20:48:41',
'version' => '0.0.6'
},
{
'date' => '2014-08-28T16:51:49',
'version' => '0.0.7'
},
{
'date' => '2014-09-18T08:03:26',
'version' => '0.0.8'
},
{
'date' => '2014-10-13T10:16:45',
'version' => '0.0.9'
},
{
'date' => '2015-07-18T22:04:22',
'version' => '0.0.10'
},
{
'date' => '2015-09-07T16:45:50',
'version' => '0.0.11'
},
{
'date' => '2017-07-13T10:36:46',
'version' => '0.0.12'
},
{
'date' => '2018-07-23T11:02:29',
'version' => '0.0.13'
},
{
'date' => '2018-07-23T16:19:18',
'version' => '0.0.14'
},
{
'date' => '2018-07-24T12:45:15',
'version' => '0.0.15'
},
{
'date' => '2018-07-25T13:24:47',
'version' => '0.0.16'
},
{
'date' => '2022-10-17T09:58:14',
'version' => '0.0.17'
},
{
'date' => '2023-07-13T09:16:48',
'version' => '0.0.18'
},
{
'date' => '2023-07-14T09:17:25',
'version' => '0.0.19'
}
]
},
'Pod-Perldoc' => {
'advisories' => [
{
'affected_versions' => [
'<3.26'
],
'cves' => [
'CVE-2016-1238'
],
'description' => '(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.
',
'distribution' => 'Pod-Perldoc',
'fixed_versions' => [
'>=3.26'
],
'id' => 'CPANSA-Pod-Perldoc-2016-1238',
'references' => [
'http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html',
'http://www.securitytracker.com/id/1036440',
'http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab',
'https://rt.perl.org/Public/Bug/Display.html?id=127834',
'http://www.securityfocus.com/bid/92136',
'http://www.debian.org/security/2016/dsa-3628',
'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/',
'https://security.gentoo.org/glsa/201701-75',
'https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E',
'https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html',
'https://security.gentoo.org/glsa/201812-07',
'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html'
],
'reported' => '2016-08-02',
'severity' => 'high'
}
],
'main_module' => 'Pod::Perldoc',
'versions' => [
{
'date' => '2002-11-11T10:33:54',
'version' => '3.04'
},
{
'date' => '2002-11-12T05:04:50',
'version' => '3.05'
},
{
'date' => '2002-11-22T10:04:59',
'version' => '3.06'
},
{
'date' => '2002-12-02T05:24:12',
'version' => '3.07'
},
{
'date' => '2003-01-19T03:50:24',
'version' => '3.08'
},
{
'date' => '2003-07-24T14:38:18',
'version' => '3.09'
},
{
'date' => '2003-09-11T07:02:58',
'version' => '3.10'
},
{
'date' => '2003-10-12T23:01:05',
'version' => '3.11'
},
{
'date' => '2003-10-22T01:02:23',
'version' => '3.12'
},
{
'date' => '2004-04-10T02:26:31',
'version' => '3.13'
},
{
'date' => '2004-11-30T22:34:04',
'version' => '3.14'
},
{
'date' => '2007-08-23T12:55:53',
'version' => '3.14_01'
},
{
'date' => '2007-08-23T18:18:55',
'version' => '3.14_02'
},
{
'date' => '2007-09-04T13:39:37',
'version' => '3.14_03'
},
{
'date' => '2008-04-16T14:37:04',
'version' => '3.14_04'
},
{
'date' => '2008-04-22T18:26:25',
'version' => '3.14_05'
},
{
'date' => '2008-05-03T00:43:47',
'version' => '3.14_06'
},
{
'date' => '2008-05-08T14:33:08',
'version' => '3.14_07'
},
{
'date' => '2008-11-01T15:01:44',
'version' => '3.15'
},
{
'date' => '2009-09-30T17:29:52',
'version' => '3.15_01'
},
{
'date' => '2011-11-13T23:32:29',
'version' => '3.15_08'
},
{
'date' => '2011-11-14T19:38:57',
'version' => '3.15_09'
},
{
'date' => '2011-11-20T01:58:40',
'version' => '3.15_10'
},
{
'date' => '2011-11-29T19:10:49',
'version' => '3.15_11'
},
{
'date' => '2011-12-09T13:03:26',
'version' => '3.15_12'
},
{
'date' => '2011-12-14T10:17:10',
'version' => '3.15_13'
},
{
'date' => '2011-12-18T16:08:00',
'version' => '3.15_14'
},
{
'date' => '2012-01-06T16:47:58',
'version' => '3.15_15'
},
{
'date' => '2012-03-17T05:02:18',
'version' => '3.16'
},
{
'date' => '2012-03-18T03:01:03',
'version' => '3.17'
},
{
'date' => '2013-01-28T04:11:09',
'version' => '3.18'
},
{
'date' => '2013-01-28T04:33:05',
'version' => '3.19'
},
{
'date' => '2013-01-29T02:56:49',
'version' => '3.19_01'
},
{
'date' => '2013-04-27T05:51:04',
'version' => '3.20'
},
{
'date' => '2013-11-19T17:18:23',
'version' => '3.21_01'
},
{
'date' => '2014-01-06T02:28:01',
'version' => '3.21'
},
{
'date' => '2014-01-31T05:43:36',
'version' => '3.22_01'
},
{
'date' => '2014-02-05T05:17:44',
'version' => '3.22_02'
},
{
'date' => '2014-02-23T19:09:39',
'version' => '3.23'
},
{
'date' => '2014-08-16T16:52:05',
'version' => '3.23_01'
},
{
'date' => '2014-08-19T03:49:18',
'version' => '3.24'
},
{
'date' => '2014-09-10T03:32:34',
'version' => '3.24_01'
},
{
'date' => '2015-01-21T03:18:32',
'version' => '3.24_02'
},
{
'date' => '2015-02-12T03:13:45',
'version' => '3.25'
},
{
'date' => '2016-01-12T14:43:09',
'version' => '3.25_02'
},
{
'date' => '2016-07-28T04:44:07',
'version' => '3.26'
},
{
'date' => '2016-07-30T16:09:06',
'version' => '3.26_01'
},
{
'date' => '2016-08-02T16:35:03',
'version' => '3.26_02'
},
{
'date' => '2016-08-03T20:48:54',
'version' => '3.27'
},
{
'date' => '2016-10-16T02:46:57',
'version' => '3.27_01'
},
{
'date' => '2017-03-01T22:00:04',
'version' => '3.27_02'
},
{
'date' => '2017-03-16T01:14:07',
'version' => '3.28'
},
{
'date' => '2023-12-06T07:21:16',
'version' => '3.28_01'
}
]
},
'Proc-Daemon' => {
'advisories' => [
{
'affected_versions' => [
'<0.14'
],
'cves' => [
'CVE-2013-7135'
],
'description' => 'The Proc::Daemon module 0.14 for Perl uses world-writable permissions for a file that stores a process ID, which allows local users to have an unspecified impact by modifying this file.
',
'distribution' => 'Proc-Daemon',
'fixed_versions' => [],
'id' => 'CPANSA-Proc-Daemon-2013-7135',
'references' => [
'http://www.openwall.com/lists/oss-security/2014/01/07/7',
'http://www.openwall.com/lists/oss-security/2013/12/16/5',
'http://www.openwall.com/lists/oss-security/2013/12/18/2',
'https://rt.cpan.org/Public/Bug/Display.html?id=91450',
'http://www.mandriva.com/security/advisories?name=MDVSA-2014:021'
],
'reported' => '2014-01-28',
'severity' => undef
}
],
'main_module' => 'Proc::Daemon',
'versions' => [
{
'date' => '1998-01-27T18:42:37',
'version' => '0.01'
},
{
'date' => '1999-04-17T19:55:07',
'version' => '0.02'
},
{
'date' => '2003-06-19T22:58:30',
'version' => '0.03'
},
{
'date' => '2010-10-23T23:11:32',
'version' => '0.04'
},
{
'date' => '2010-10-28T20:25:50',
'version' => '0.05'
},
{
'date' => '2011-01-17T22:14:07',
'version' => '0.06'
},
{
'date' => '2011-02-17T19:34:32',
'version' => '0.07'
},
{
'date' => '2011-03-13T17:38:15',
'version' => '0.08'
},
{
'date' => '2011-03-15T07:05:00',
'version' => '0.09'
},
{
'date' => '2011-04-01T19:26:32',
'version' => '0.10'
},
{
'date' => '2011-05-23T14:48:37',
'version' => '0.11'
},
{
'date' => '2011-05-24T17:12:19',
'version' => '0.12'
},
{
'date' => '2011-06-01T11:39:51',
'version' => '0.13'
},
{
'date' => '2011-06-03T09:06:45',
'version' => '0.14'
},
{
'date' => '2015-01-22T00:22:38',
'version' => '0.15'
},
{
'date' => '2015-01-23T00:10:30',
'version' => '0.16'
},
{
'date' => '2015-01-23T23:23:49',
'version' => '0.17'
},
{
'date' => '2015-01-27T01:03:25',
'version' => '0.18'
},
{
'date' => '2015-03-22T09:37:55',
'version' => '0.19'
},
{
'date' => '2015-06-24T04:34:03',
'version' => '0.20'
},
{
'date' => '2015-08-07T01:52:52',
'version' => '0.21'
},
{
'date' => '2015-10-29T00:30:34',
'version' => '0.22'
},
{
'date' => '2016-01-01T18:51:05',
'version' => '0.23'
}
]
},
'Proc-ProcessTable' => {
'advisories' => [
{
'affected_versions' => [
'>=0.45,<0.47'
],
'cves' => [
'CVE-2011-4363'
],
'description' => 'ProcessTable.pm in the Proc::ProcessTable module 0.45 for Perl, when TTY information caching is enabled, allows local users to overwrite arbitrary files via a symlink attack on /tmp/TTYDEVS.
',
'distribution' => 'Proc-ProcessTable',
'fixed_versions' => [
'>=0.47'
],
'id' => 'CPANSA-Proc-ProcessTable-2011-4363',
'references' => [
'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650500',
'http://www.osvdb.org/77428',
'http://www.openwall.com/lists/oss-security/2011/11/30/2',
'http://www.securityfocus.com/bid/50868',
'https://rt.cpan.org/Public/Bug/Display.html?id=72862',
'http://www.openwall.com/lists/oss-security/2011/11/30/3',
'http://secunia.com/advisories/47015',
'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4363'
],
'reported' => '2012-10-07',
'severity' => undef
}
],
'main_module' => 'Proc::ProcessTable',
'versions' => [
{
'date' => '1998-07-23T12:59:39',
'version' => '0.01'
},
{
'date' => '1998-07-24T12:50:40',
'version' => '0.02'
},
{
'date' => '1998-07-26T13:18:26',
'version' => '0.03'
},
{
'date' => '1998-08-15T21:22:20',
'version' => '0.04'
},
{
'date' => '1998-12-09T23:53:30',
'version' => '0.05'
},
{
'date' => '1998-12-10T04:51:19',
'version' => '0.06'
},
{
'date' => '1999-02-05T03:21:51',
'version' => '0.08'
},
{
'date' => '1999-02-20T04:27:53',
'version' => '0.09'
},
{
'date' => '1999-02-20T16:36:14',
'version' => '0.10'
},
{
'date' => '1999-03-07T00:16:52',
'version' => '0.11'
},
{
'date' => '1999-03-21T16:07:46',
'version' => '0.12'
},
{
'date' => '1999-05-14T02:10:41',
'version' => '0.13'
},
{
'date' => '1999-05-16T01:22:45',
'version' => '0.14'
},
{
'date' => '1999-06-02T02:39:22',
'version' => '0.15'
},
{
'date' => '1999-08-10T03:45:58',
'version' => '0.16'
},
{
'date' => '1999-08-19T15:45:19',
'version' => '0.17'
},
{
'date' => '1999-08-19T17:44:22',
'version' => '0.18'
},
{
'date' => '1999-09-09T02:45:48',
'version' => '0.20'
},
{
'date' => '1999-09-10T16:51:02',
'version' => '0.21'
},
{
'date' => '1999-10-05T12:34:33',
'version' => '0.22'
},
{
'date' => '1999-11-01T13:55:15',
'version' => '0.23'
},
{
'date' => '2000-01-20T20:57:35',
'version' => '0.24'
},
{
'date' => '2000-02-03T16:28:46',
'version' => '0.25'
},
{
'date' => '2000-02-11T21:56:23',
'version' => '0.26'
},
{
'date' => '2000-06-29T12:38:46',
'version' => '0.27'
},
{
'date' => '2000-08-14T09:25:19',
'version' => '0.28'
},
{
'date' => '2001-01-09T12:47:49',
'version' => '0.29'
},
{
'date' => '2001-03-08T02:57:16',
'version' => '0.30'
},
{
'date' => '2001-06-01T12:39:15',
'version' => '0.31'
},
{
'date' => '2001-08-20T02:41:52',
'version' => '0.32'
},
{
'date' => '2001-10-16T13:32:04',
'version' => '0.33'
},
{
'date' => '2002-02-25T03:17:15',
'version' => '0.34'
},
{
'date' => '2002-07-03T04:31:57',
'version' => '0.35'
},
{
'date' => '2002-11-08T02:31:59',
'version' => '0.36'
},
{
'date' => '2002-11-08T14:59:11',
'version' => '0.37'
},
{
'date' => '2002-12-07T03:33:51',
'version' => '0.38'
},
{
'date' => '2003-10-03T17:45:51',
'version' => '0.39'
},
{
'date' => '2005-07-11T01:33:32',
'version' => '0.40'
},
{
'date' => '2006-07-01T04:27:59',
'version' => '0.41'
},
{
'date' => '2008-01-26T05:34:53',
'version' => '0.42'
},
{
'date' => '2008-07-18T04:05:51',
'version' => '0.43'
},
{
'date' => '2008-07-25T14:29:08',
'version' => '0.44'
},
{
'date' => '2008-09-08T15:39:40',
'version' => '0.45'
},
{
'date' => '2012-10-19T13:58:48',
'version' => '0.46'
},
{
'date' => '2013-02-16T16:06:35',
'version' => '0.47'
},
{
'date' => '2013-05-26T22:20:21',
'version' => '0.48'
},
{
'date' => '2013-12-05T23:31:39',
'version' => '0.49'
},
{
'date' => '2013-12-15T15:47:54',
'version' => '0.50'
},
{
'date' => '2014-05-17T21:03:43',
'version' => '0.50_01'
},
{
'date' => '2014-10-17T22:56:58',
'version' => '0.51'
},
{
'date' => '2015-08-23T10:12:37',
'version' => '0.52'
},
{
'date' => '2015-08-24T19:36:41',
'version' => '0.53'
},
{
'date' => '2018-02-01T21:02:36',
'version' => '0.54'
},
{
'date' => '2018-02-01T21:57:51',
'version' => '0.55'
},
{
'date' => '2019-02-07T22:38:02',
'version' => '0.56'
},
{
'date' => '2019-06-14T21:16:11',
'version' => '0.56_01'
},
{
'date' => '2019-06-15T11:28:52',
'version' => '0.56_02'
},
{
'date' => '2019-06-15T18:56:51',
'version' => '0.57'
},
{
'date' => '2019-06-15T19:20:02',
'version' => '0.58'
},
{
'date' => '2019-06-20T19:35:05',
'version' => '0.59'
},
{
'date' => '2021-08-14T16:19:38',
'version' => '0.60'
},
{
'date' => '2021-08-17T22:50:12',
'version' => '0.61'
},
{
'date' => '2021-08-18T06:57:20',
'version' => '0.611'
},
{
'date' => '2021-09-08T10:39:21',
'version' => '0.612'
},
{
'date' => '2021-09-13T14:03:14',
'version' => '0.62'
},
{
'date' => '2021-09-26T21:58:24',
'version' => '0.631'
},
{
'date' => '2021-09-26T22:35:32',
'version' => '0.632'
},
{
'date' => '2021-09-26T23:01:20',
'version' => '0.633'
},
{
'date' => '2021-09-26T23:04:23',
'version' => '0.634'
},
{
'date' => '2023-05-08T06:51:59',
'version' => '0.635'
},
{
'date' => '2023-06-21T06:25:43',
'version' => '0.636'
}
]
},
'RPC-XML' => {
'advisories' => [
{
'affected_versions' => [
'<0.45'
],
'cves' => [],
'description' => 'A a potential security hole in the parsing of external entities.
',
'distribution' => 'RPC-XML',
'fixed_versions' => [
'>=0.45'
],
'id' => 'CPANSA-RPC-XML-2002-01',
'references' => [
'https://metacpan.org/dist/RPC-XML/changes'
],
'reported' => '2002-10-29'
}
],
'main_module' => 'RPC::XML',
'versions' => [
{
'date' => '2001-06-13T06:30:46',
'version' => '0.25'
},
{
'date' => '2001-06-27T06:18:37',
'version' => '0.26'
},
{
'date' => '2001-07-08T23:38:52',
'version' => '0.27'
},
{
'date' => '2001-10-08T05:10:22',
'version' => '0.28'
},
{
'date' => '2001-12-03T07:08:58',
'version' => '0.29'
},
{
'date' => '2002-01-03T09:49:30',
'version' => '0.30'
},
{
'date' => '2002-01-28T00:48:45',
'version' => '0.35'
},
{
'date' => '2002-01-29T20:03:48',
'version' => '0.36'
},
{
'date' => '2002-03-23T06:39:00',
'version' => '0.37'
},
{
'date' => '2002-05-04T07:56:19',
'version' => '0.40'
},
{
'date' => '2002-05-22T10:04:14',
'version' => '0.41'
},
{
'date' => '2002-08-01T08:41:21',
'version' => '0.42'
},
{
'date' => '2002-08-19T05:56:10',
'version' => '0.43'
},
{
'date' => '2002-08-31T06:58:58',
'version' => '0.44'
},
{
'date' => '2002-10-30T05:15:04',
'version' => '0.45'
},
{
'date' => '2002-12-30T07:51:25',
'version' => '0.46'
},
{
'date' => '2003-01-27T11:37:20',
'version' => '0.50'
},
{
'date' => '2003-01-30T09:36:24',
'version' => '0.51'
},
{
'date' => '2003-02-10T09:48:58',
'version' => '0.52'
},
{
'date' => '2003-02-25T09:25:51',
'version' => '0.53'
},
{
'date' => '2004-04-14T12:55:46',
'version' => '0.54'
},
{
'date' => '2004-11-30T09:27:12',
'version' => '0.55'
},
{
'date' => '2004-12-09T09:29:34',
'version' => '0.56'
},
{
'date' => '2004-12-24T11:07:31',
'version' => '0.57'
},
{
'date' => '2005-05-12T10:47:19',
'version' => '0.58'
},
{
'date' => '2006-06-30T07:56:12',
'version' => '0.59'
},
{
'date' => '2008-04-09T17:59:42',
'version' => '0.60'
},
{
'date' => '2008-09-15T10:19:12',
'version' => '0.61'
},
{
'date' => '2008-09-19T09:16:21',
'version' => '0.62'
},
{
'date' => '2008-09-19T09:28:08',
'version' => '0.63'
},
{
'date' => '2008-09-29T11:24:26',
'version' => '0.64'
},
{
'date' => '2009-06-17T13:19:54',
'version' => '0.65'
},
{
'date' => '2009-07-09T14:42:56',
'version' => '0.66'
},
{
'date' => '2009-07-10T08:34:44',
'version' => '0.67'
},
{
'date' => '2009-09-03T17:37:20',
'version' => '0.69'
},
{
'date' => '2009-12-07T06:33:13',
'version' => '0.70'
},
{
'date' => '2009-12-08T04:11:10',
'version' => '0.71'
},
{
'date' => '2009-12-14T05:48:11',
'version' => '0.72'
},
{
'date' => '2010-03-17T05:55:29',
'version' => '0.73'
},
{
'date' => '2011-01-23T21:08:04',
'version' => '0.74'
},
{
'date' => '2011-08-14T00:40:40',
'version' => '0.75'
},
{
'date' => '2011-08-21T19:48:16',
'version' => '0.76'
},
{
'date' => '2012-09-03T18:58:22',
'version' => '0.77'
},
{
'date' => '2014-02-07T04:15:00',
'version' => '0.78'
},
{
'date' => '2015-05-01T16:02:19',
'version' => '0.79'
},
{
'date' => '2016-05-08T20:17:31',
'version' => '0.80'
},
{
'date' => '2021-01-06T02:49:51',
'version' => '0.81'
},
{
'date' => '2021-01-06T18:05:35',
'version' => '0.82'
}
]
},
'RT-Authen-ExternalAuth' => {
'advisories' => [
{
'affected_versions' => [
'<0.27'
],
'cves' => [
'CVE-2017-5361'
],
'description' => 'Timing sidechannel vulnerability in password checking.
',
'distribution' => 'RT-Authen-ExternalAuth',
'fixed_versions' => [
'>=0.27'
],
'id' => 'CPANSA-RT-Authen-ExternalAuth-2017-01',
'references' => [
'https://metacpan.org/changes/distribution/RT-Authen-ExternalAuth'
],
'reported' => '2017-06-15'
}
],
'main_module' => 'RT::Authen::ExternalAuth',
'versions' => [
{
'date' => '2008-03-13T16:16:36',
'version' => '0.01'
},
{
'date' => '2008-03-17T13:34:40',
'version' => '0.02'
},
{
'date' => '2008-03-31T14:55:18',
'version' => '0.03'
},
{
'date' => '2008-04-03T14:20:36',
'version' => '0.04'
},
{
'date' => '2008-04-09T08:57:51',
'version' => '0.05'
},
{
'date' => '2008-10-17T13:22:11',
'version' => '0.06_01'
},
{
'date' => '2008-10-17T16:41:34',
'version' => '0.06_02'
},
{
'date' => '2008-10-31T12:08:54',
'version' => '0.06_02'
},
{
'date' => '2008-11-01T18:23:27',
'version' => '0.06_02'
},
{
'date' => '2008-11-06T21:16:42',
'version' => '0.06_02'
},
{
'date' => '2008-12-22T22:08:06',
'version' => '0.07_02'
},
{
'date' => '2009-01-20T21:09:48',
'version' => '0.07_02'
},
{
'date' => '2009-01-24T13:52:42',
'version' => '0.07_02'
},
{
'date' => '2011-02-19T00:43:35',
'version' => '0.08_01'
},
{
'date' => '2011-04-15T19:46:43',
'version' => '0.08_02'
},
{
'date' => '2011-05-06T21:08:52',
'version' => '0.09'
},
{
'date' => '2012-01-23T17:51:41',
'version' => '0.09_01'
},
{
'date' => '2012-01-26T18:48:51',
'version' => '0.09_02'
},
{
'date' => '2012-01-27T23:07:12',
'version' => '0.09_03'
},
{
'date' => '2012-02-17T16:34:10',
'version' => '0.10'
},
{
'date' => '2012-02-23T16:31:54',
'version' => '0.10_01'
},
{
'date' => '2012-07-25T08:57:21',
'version' => '0.11'
},
{
'date' => '2012-07-25T18:36:36',
'version' => '0.11'
},
{
'date' => '2012-10-26T19:59:54',
'version' => '0.12'
},
{
'date' => '2013-01-31T19:22:43',
'version' => '0.13'
},
{
'date' => '2013-05-22T21:28:15',
'version' => '0.14'
},
{
'date' => '2013-05-23T00:20:43',
'version' => '0.15'
},
{
'date' => '2013-06-27T19:24:37',
'version' => '0.16'
},
{
'date' => '2013-07-10T19:43:08',
'version' => '0.17'
},
{
'date' => '2014-03-07T22:19:49',
'version' => '0.18'
},
{
'date' => '2014-04-04T17:21:04',
'version' => '0.19'
},
{
'date' => '2014-04-09T19:34:29',
'version' => '0.20'
},
{
'date' => '2014-07-02T02:20:30',
'version' => '0.21'
},
{
'date' => '2014-08-14T04:04:28',
'version' => '0.22_01'
},
{
'date' => '2014-08-14T17:28:53',
'version' => '0.23'
},
{
'date' => '2014-09-30T22:04:16',
'version' => '0.23_01'
},
{
'date' => '2014-10-09T16:24:49',
'version' => '0.24'
},
{
'date' => '2014-10-16T20:59:29',
'version' => '0.25'
},
{
'date' => '2016-08-02T16:14:34',
'version' => '0.26'
},
{
'date' => '2017-06-15T18:44:24',
'version' => '0.27'
}
]
},
'RT-Extension-MobileUI' => {
'advisories' => [
{
'affected_versions' => [
'<1.02'
],
'cves' => [
'CVE-2012-2769'
],
'description' => 'Multiple cross-site scripting (XSS) vulnerabilities in the topic administration page.
',
'distribution' => 'RT-Extension-MobileUI',
'fixed_versions' => [
'>=1.02'
],
'id' => 'CPANSA-RT-Extension-MobileUI-2012-01',
'references' => [
'https://metacpan.org/changes/distribution/RT-Extension-MobileUI'
],
'reported' => '2012-05-18'
}
],
'main_module' => 'RT::Extension::MobileUI',
'versions' => [
{
'date' => '2010-08-05T20:58:09',
'version' => '0.9'
},
{
'date' => '2010-08-06T15:38:53',
'version' => '0.91'
},
{
'date' => '2010-08-06T15:58:11',
'version' => '0.92'
},
{
'date' => '2010-08-06T17:55:08',
'version' => '0.93'
},
{
'date' => '2010-08-09T13:36:43',
'version' => '0.94'
},
{
'date' => '2010-08-09T13:44:33',
'version' => '0.95'
},
{
'date' => '2010-08-26T21:28:07',
'version' => '0.96'
},
{
'date' => '2010-09-06T18:11:56',
'version' => '0.96'
},
{
'date' => '2010-10-28T15:50:29',
'version' => '0.98'
},
{
'date' => '2010-10-29T14:08:08',
'version' => '0.99'
},
{
'date' => '2010-11-19T18:11:43',
'version' => '1.00'
},
{
'date' => '2010-12-08T16:36:01',
'version' => '1.01'
},
{
'date' => '2012-07-25T08:57:33',
'version' => '1.02'
},
{
'date' => '2012-07-25T18:36:52',
'version' => '1.02'
},
{
'date' => '2012-08-27T16:42:55',
'version' => '1.03'
},
{
'date' => '2013-06-12T19:09:14',
'version' => '1.04'
},
{
'date' => '2013-08-13T18:06:54',
'version' => '1.05'
},
{
'date' => '2014-04-23T20:25:25',
'version' => '1.06'
},
{
'date' => '2014-04-23T20:26:56',
'version' => '1.07'
}
]
},
'RTMP-Client' => {
'advisories' => [
{
'affected_versions' => [
'<0.04'
],
'cves' => [],
'description' => 'TBD
',
'distribution' => 'RTMP-Client',
'fixed_versions' => [
'>=0.04'
],
'id' => 'CPANSA-RTMP-Client-2011-01',
'references' => [
'https://metacpan.org/changes/distribution/RTMP-Client'
],
'reported' => '2011-12-01'
}
],
'main_module' => 'RTMP::Client',
'versions' => [
{
'date' => '2011-07-26T08:17:20',
'version' => '0.01'
},
{
'date' => '2011-07-27T02:09:05',
'version' => '0.02'
},
{
'date' => '2011-07-27T02:17:06',
'version' => '0.03'
},
{
'date' => '2011-12-01T08:59:19',
'version' => '0.04'
}
]
},
'SOAP-Lite' => {
'advisories' => [
{
'affected_versions' => [
'<1.15'
],
'cves' => [
'CVE-2015-8978'
],
'description' => 'An example attack consists of defining 10 or more XML entities, each defined as consisting of 10 of the previous entity, with the document consisting of a single instance of the largest entity, which expands to one billion copies of the first entity. The amount of computer memory used for handling an external SOAP call would likely exceed that available to the process parsing the XML.
',
'distribution' => 'SOAP-Lite',
'fixed_versions' => [
'>=1.15'
],
'id' => 'CPANSA-SOAP-Lite-2015-01',
'references' => [
'https://metacpan.org/changes/distribution/SOAP-Lite',
'https://www.securityfocus.com/bid/94487',
'https://github.com/redhotpenguin/perl-soaplite/commit/6942fe0d281be1c32c5117605f9c4e8d44f51124'
],
'reported' => '2015-07-21'
},
{
'affected_versions' => [
'<0.55'
],
'cves' => [
'CVE-2002-1742'
],
'description' => 'Allows remote attackers to load arbitrary Perl functions by suppling a non-existent function in a script using a SOAP::Lite module, which causes the AUTOLOAD subroutine to trigger.
',
'distribution' => 'SOAP-Lite',
'fixed_versions' => [
'>=0.55'
],
'id' => 'CPANSA-SOAP-Lite-2002-01',
'references' => [
'https://metacpan.org/changes/distribution/SOAP-Lite'
],
'reported' => '2002-04-08',
'severity' => 'high'
},
{
'affected_versions' => [
'<0.38'
],
'cves' => [],
'description' => 'Security problem on server side (no more details).
',
'distribution' => 'SOAP-Lite',
'fixed_versions' => [
'>=0.38'
],
'id' => 'CPANSA-SOAP-Lite-2000-01',
'references' => [
'https://metacpan.org/changes/distribution/SOAP-Lite'
],
'reported' => '2000-10-05'
}
],
'main_module' => 'SOAP::Lite',
'versions' => [
{
'date' => '2000-09-25T01:49:14',
'version' => '0.36'
},
{
'date' => '2000-10-06T01:58:32',
'version' => '0.38'
},
{
'date' => '2000-10-09T04:27:51',
'version' => '0.39'
},
{
'date' => '2000-10-16T05:12:09',
'version' => '0.40'
},
{
'date' => '2000-10-31T15:10:52',
'version' => '0.41'
},
{
'date' => '2000-11-15T15:00:57',
'version' => '0.42'
},
{
'date' => '2000-11-28T20:43:40',
'version' => '0.43'
},
{
'date' => '2000-12-13T07:37:47',
'version' => '0.44'
},
{
'date' => '2001-01-17T17:28:31',
'version' => '0.45'
},
{
'date' => '2001-02-01T02:23:51',
'version' => '0.46'
},
{
'date' => '2001-02-22T07:28:20',
'version' => '0.47'
},
{
'date' => '2001-04-18T19:09:15',
'version' => '0.50'
},
{
'date' => '2001-07-18T22:39:30',
'version' => '0.51'
},
{
'date' => '2001-11-21T19:35:24',
'version' => '0.52'
},
{
'date' => '2002-04-16T05:20:54',
'version' => '0.55'
},
{
'date' => '2003-10-28T19:27:00',
'version' => '0.60'
},
{
'date' => '2004-02-26T16:36:26',
'version' => '0.60'
},
{
'date' => '2005-02-22T01:57:43',
'version' => '0.65_3'
},
{
'date' => '2005-04-03T09:20:17',
'version' => '0.65_4'
},
{
'date' => '2005-05-06T17:24:23',
'version' => '0.65_5'
},
{
'date' => '2005-06-03T19:23:20',
'version' => '0.65_6'
},
{
'date' => '2005-12-25T08:42:50',
'version' => '0.66'
},
{
'date' => '2006-01-04T23:14:27',
'version' => '0.66.1'
},
{
'date' => '2006-01-27T21:43:49',
'version' => '0.67'
},
{
'date' => '2006-07-06T18:18:56',
'version' => '0.68'
},
{
'date' => '2006-08-16T14:53:50',
'version' => '0.69'
},
{
'date' => '2007-10-18T20:54:02',
'version' => '0.70_01'
},
{
'date' => '2007-11-08T21:30:41',
'version' => '0.70_02'
},
{
'date' => '2007-11-18T19:00:11',
'version' => '0.70_03'
},
{
'date' => '2008-01-02T17:06:17',
'version' => '0.70_04'
},
{
'date' => '2008-02-13T12:28:07',
'version' => '0.70_05'
},
{
'date' => '2008-02-16T10:37:04',
'version' => '0.70_06'
},
{
'date' => '2008-02-25T21:44:41',
'version' => '0.70_07'
},
{
'date' => '2008-02-25T21:50:22',
'version' => '0.70_08'
},
{
'date' => '2008-02-28T21:58:13',
'version' => '0.71'
},
{
'date' => '2008-03-29T14:13:41',
'version' => '0.71.01'
},
{
'date' => '2008-04-14T17:25:25',
'version' => '0.71.02'
},
{
'date' => '2008-04-17T20:40:23',
'version' => 'v0.71.03'
},
{
'date' => '2008-04-22T06:03:55',
'version' => '0.71.04'
},
{
'date' => '2008-05-05T21:50:36',
'version' => '0.710.05'
},
{
'date' => '2008-06-05T18:47:08',
'version' => '0.710.06'
},
{
'date' => '2008-06-13T20:27:05',
'version' => '0.710.07'
},
{
'date' => '2008-07-13T20:41:11',
'version' => '0.710.08'
},
{
'date' => '2009-09-29T21:20:02',
'version' => '0.710.09'
},
{
'date' => '2009-09-30T18:40:30',
'version' => '0.710.10'
},
{
'date' => '2010-03-18T20:24:42',
'version' => '0.711'
},
{
'date' => '2010-06-03T15:41:39',
'version' => '0.712'
},
{
'date' => '2011-08-16T17:53:28',
'version' => '0.713'
},
{
'date' => '2011-08-18T19:51:02',
'version' => '0.714'
},
{
'date' => '2012-07-15T09:37:20',
'version' => '0.715'
},
{
'date' => '2013-05-11T06:44:04',
'version' => '0.716'
},
{
'date' => '2013-07-17T06:17:00',
'version' => '1.0'
},
{
'date' => '2013-07-29T08:26:07',
'version' => '1.01'
},
{
'date' => '2013-07-30T02:20:34',
'version' => '1.02'
},
{
'date' => '2013-08-04T17:49:18',
'version' => '1.03'
},
{
'date' => '2013-08-10T03:46:49',
'version' => '1.04'
},
{
'date' => '2013-08-19T05:31:17',
'version' => '1.05'
},
{
'date' => '2013-08-22T04:20:29',
'version' => '1.06'
},
{
'date' => '2013-11-08T03:09:10',
'version' => '1.07'
},
{
'date' => '2013-11-08T17:41:10',
'version' => '1.08'
},
{
'date' => '2014-01-14T21:41:07',
'version' => '1.09'
},
{
'date' => '2014-01-23T18:53:42',
'version' => '1.10'
},
{
'date' => '2014-02-22T05:18:14',
'version' => '1.11'
},
{
'date' => '2014-11-27T07:08:11',
'version' => '1.12'
},
{
'date' => '2014-12-30T15:58:06',
'version' => '1.13'
},
{
'date' => '2015-03-25T05:04:34',
'version' => '1.14'
},
{
'date' => '2015-07-21T18:12:21',
'version' => '1.15'
},
{
'date' => '2015-07-23T07:34:59',
'version' => '1.16'
},
{
'date' => '2015-07-31T05:59:50',
'version' => '1.17'
},
{
'date' => '2015-08-26T04:31:24',
'version' => '1.18'
},
{
'date' => '2015-08-26T15:38:01',
'version' => '1.19'
},
{
'date' => '2016-06-09T21:34:36',
'version' => '1.20'
},
{
'date' => '2017-08-16T05:18:24',
'version' => '1.22'
},
{
'date' => '2017-12-19T02:30:48',
'version' => '1.23'
},
{
'date' => '2017-12-19T18:36:52',
'version' => '1.24'
},
{
'date' => '2017-12-29T18:39:43',
'version' => '1.25'
},
{
'date' => '2017-12-30T22:19:12',
'version' => '1.26'
},
{
'date' => '2018-05-14T20:36:08',
'version' => '1.27'
}
]
},
'SVG-Sparkline' => {
'advisories' => [
{
'affected_versions' => [
'<1.12'
],
'cves' => [],
'description' => 'Invalid data input validation makes it possible to pass arbitrary strings to module loading eval.
',
'distribution' => 'SVG-Sparkline',
'fixed_versions' => [
'>=1.12'
],
'id' => 'CPANSA-SVG-Sparkline-2017-01',
'references' => [
'https://metacpan.org/changes/distribution/SVG-Sparkline',
'https://github.com/gwadej/svg-sparkline/commit/ca83d6eb56aa86f3ca735866ffa9aa97acc2e708'
],
'reported' => '2017-05-15'
}
],
'main_module' => 'SVG::Sparkline',
'versions' => [
{
'date' => '2009-04-02T02:42:59',
'version' => '0.1.0'
},
{
'date' => '2009-04-03T01:30:19',
'version' => '0.1.1'
},
{
'date' => '2009-04-05T21:43:08',
'version' => '0.2.0'
},
{
'date' => '2009-04-18T04:46:33',
'version' => '0.2.5'
},
{
'date' => '2009-04-21T00:31:44',
'version' => '0.2.6'
},
{
'date' => '2009-04-27T03:42:24',
'version' => '0.2.7'
},
{
'date' => '2009-05-06T23:20:05',
'version' => '0.3'
},
{
'date' => '2009-05-07T22:11:10',
'version' => '0.31'
},
{
'date' => '2009-10-19T04:12:52',
'version' => '0.32'
},
{
'date' => '2009-10-21T00:27:30',
'version' => '0.33'
},
{
'date' => '2010-05-01T04:50:06',
'version' => '0.34'
},
{
'date' => '2010-10-30T22:01:18',
'version' => '0.35'
},
{
'date' => '2012-09-04T00:09:32',
'version' => '0.36'
},
{
'date' => '2013-10-24T14:01:00',
'version' => '1'
},
{
'date' => '2014-09-04T02:01:54',
'version' => '1.1'
},
{
'date' => '2015-03-03T19:38:44',
'version' => '1.11'
},
{
'date' => '2017-05-15T01:32:51',
'version' => '1.12'
}
]
},
'SVN-Look' => {
'advisories' => [
{
'affected_versions' => [
'<0.40'
],
'cves' => [],
'description' => 'Two-arg open with a possibility of running arbitrary commands.
',
'distribution' => 'SVN-Look',
'fixed_versions' => [
'>=0.40'
],
'id' => 'CPANSA-SVN-Look-2014-01',
'references' => [
'https://metacpan.org/changes/distribution/SVN-Look',
'https://github.com/gnustavo/SVN-Look/commit/b413ac1c397dfc6b2d164fede693f7ff9a94c83c',
'https://bugs.launchpad.net/ubuntu/+source/libsvn-look-perl/+bug/1323300'
],
'reported' => '2014-05-31'
}
],
'main_module' => 'SVN::Look',
'versions' => [
{
'date' => '2008-09-26T03:22:44',
'version' => '0.08.360'
},
{
'date' => '2008-09-27T22:10:54',
'version' => '0.09.366'
},
{
'date' => '2008-09-28T03:07:02',
'version' => '0.10.369'
},
{
'date' => '2008-10-05T03:16:35',
'version' => '0.11.388'
},
{
'date' => '2008-10-10T02:25:16',
'version' => '0.12.409'
},
{
'date' => '2008-10-24T00:51:56',
'version' => '0.12.442'
},
{
'date' => '2008-11-03T10:43:38',
'version' => '0.12.455'
},
{
'date' => '2008-11-06T03:11:52',
'version' => '0.13.463'
},
{
'date' => '2009-02-28T02:50:53',
'version' => '0.14.5'
},
{
'date' => '2009-03-01T12:17:06',
'version' => '0.14.7'
},
{
'date' => '2009-03-06T01:52:43',
'version' => '0.14.9'
},
{
'date' => '2009-03-08T02:25:41',
'version' => '0.14.10'
},
{
'date' => '2009-03-20T01:24:06',
'version' => '0.14.12'
},
{
'date' => '2009-10-25T01:23:51',
'version' => '0.15'
},
{
'date' => '2010-02-16T20:16:51',
'version' => '0.16'
},
{
'date' => '2010-02-24T23:20:51',
'version' => '0.17'
},
{
'date' => '2010-04-28T11:38:27',
'version' => '0.18'
},
{
'date' => '2010-12-12T10:35:04',
'version' => '0.19'
},
{
'date' => '2010-12-12T19:59:46',
'version' => '0.20'
},
{
'date' => '2011-07-20T20:11:31',
'version' => '0.21'
},
{
'date' => '2011-07-22T22:31:55',
'version' => '0.22'
},
{
'date' => '2011-07-27T20:22:58',
'version' => '0.23'
},
{
'date' => '2011-07-30T21:52:08',
'version' => '0.24'
},
{
'date' => '2011-08-21T23:31:44',
'version' => '0.25'
},
{
'date' => '2011-08-27T20:12:39',
'version' => '0.26'
},
{
'date' => '2011-09-18T02:42:31',
'version' => '0.27'
},
{
'date' => '2011-10-10T23:18:59',
'version' => '0.28'
},
{
'date' => '2011-10-13T01:06:12',
'version' => '0.29'
},
{
'date' => '2011-11-02T21:00:23',
'version' => '0.30'
},
{
'date' => '2012-02-26T00:04:15',
'version' => '0.31'
},
{
'date' => '2012-02-26T21:55:01',
'version' => '0.32'
},
{
'date' => '2012-02-27T23:49:07',
'version' => '0.33'
},
{
'date' => '2012-03-05T14:37:05',
'version' => '0.34'
},
{
'date' => '2012-04-22T00:14:50',
'version' => '0.35'
},
{
'date' => '2012-06-18T17:07:07',
'version' => '0.36'
},
{
'date' => '2012-06-18T17:34:58',
'version' => '0.37'
},
{
'date' => '2012-06-19T17:00:40',
'version' => '0.38'
},
{
'date' => '2013-10-20T23:32:26',
'version' => '0.39'
},
{
'date' => '2014-06-12T18:05:32',
'version' => '0.40'
},
{
'date' => '2014-06-14T02:51:53',
'version' => '0.41'
},
{
'date' => '2020-10-09T01:36:59',
'version' => '0.42'
},
{
'date' => '2022-05-21T14:32:05',
'version' => '0.43'
}
]
},
'Safe' => {
'advisories' => [
{
'affected_versions' => [
'<=2.26'
],
'cves' => [
'CVE-2010-1447'
],
'description' => 'The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution.
',
'distribution' => 'Safe',
'fixed_versions' => [
'>=2.27'
],
'id' => 'CPANSA-Safe-2010-1447',
'references' => [
'https://bugs.launchpad.net/bugs/cve/2010-1447',
'http://www.vupen.com/english/advisories/2010/1167',
'http://secunia.com/advisories/39845',
'http://www.postgresql.org/about/news.1203',
'http://security-tracker.debian.org/tracker/CVE-2010-1447',
'https://bugzilla.redhat.com/show_bug.cgi?id=588269',
'http://www.securitytracker.com/id?1023988',
'http://osvdb.org/64756',
'http://www.securityfocus.com/bid/40305',
'http://secunia.com/advisories/40052',
'http://www.redhat.com/support/errata/RHSA-2010-0458.html',
'http://www.openwall.com/lists/oss-security/2010/05/20/5',
'http://www.mandriva.com/security/advisories?name=MDVSA-2010:116',
'http://www.redhat.com/support/errata/RHSA-2010-0457.html',
'http://www.mandriva.com/security/advisories?name=MDVSA-2010:115',
'http://secunia.com/advisories/40049',
'http://www.debian.org/security/2011/dsa-2267',
'http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705',
'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7320',
'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11530'
],
'reported' => '2010-05-19',
'severity' => undef
},
{
'affected_versions' => [
'<2.25'
],
'cves' => [
'CVE-2010-1168'
],
'description' => 'The Safe (aka Safe.pm) module before 2.25 for Perl allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving implicitly called methods and implicitly blessed objects, as demonstrated by the (a) DESTROY and (b) AUTOLOAD methods, related to "automagic methods."
',
'distribution' => 'Safe',
'fixed_versions' => [],
'id' => 'CPANSA-Safe-2010-1168',
'references' => [
'http://www.openwall.com/lists/oss-security/2010/05/20/5',
'http://www.redhat.com/support/errata/RHSA-2010-0457.html',
'http://www.redhat.com/support/errata/RHSA-2010-0458.html',
'http://secunia.com/advisories/40049',
'http://cpansearch.perl.org/src/RGARCIA/Safe-2.27/Changes',
'http://www.mandriva.com/security/advisories?name=MDVSA-2010:115',
'http://blogs.perl.org/users/rafael_garcia-suarez/2010/03/new-safepm-fixes-security-hole.html',
'http://www.mandriva.com/security/advisories?name=MDVSA-2010:116',
'https://bugzilla.redhat.com/show_bug.cgi?id=576508',
'http://secunia.com/advisories/40052',
'http://securitytracker.com/id?1024062',
'http://secunia.com/advisories/42402',
'http://blogs.sun.com/security/entry/cve_2010_1168_vulnerability_in',
'http://www.vupen.com/english/advisories/2010/3075',
'http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735',
'http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705',
'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9807',
'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7424'
],
'reported' => '2010-06-21',
'severity' => undef
},
{
'affected_versions' => [
'<=2.07'
],
'cves' => [
'CVE-2002-1323'
],
'description' => 'Safe.pm 2.0.7 and earlier, when used in Perl 5.8.0 and earlier, may allow attackers to break out of safe compartments in (1) Safe::reval or (2) Safe::rdo using a redefined @_ variable, which is not reset between successive calls.
',
'distribution' => 'Safe',
'fixed_versions' => [
'>=2.08'
],
'id' => 'CPANSA-Safe-2002-1323',
'references' => [
'http://use.perl.org/articles/02/10/06/1118222.shtml?tid=5',
'http://www.securityfocus.com/bid/6111',
'http://www.debian.org/security/2002/dsa-208',
'http://www.iss.net/security_center/static/10574.php',
'http://bugs6.perl.org/rt2/Ticket/Display.html?id=17744',
'http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0061.html',
'http://www.redhat.com/support/errata/RHSA-2003-256.html',
'http://www.redhat.com/support/errata/RHSA-2003-257.html',
'ftp://patches.sgi.com/support/free/security/advisories/20030606-01-A',
'ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2004-007.0.txt',
'ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2004.1/SCOSA-2004.1.txt',
'http://www.osvdb.org/2183',
'http://www.osvdb.org/3814',
'http://marc.info/?l=bugtraq&m=104040175522502&w=2',
'http://marc.info/?l=bugtraq&m=104033126305252&w=2',
'http://marc.info/?l=bugtraq&m=104005919814869&w=2',
'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1160'
],
'reported' => '2002-12-11',
'severity' => undef
}
],
'main_module' => 'Safe',
'versions' => [
{
'date' => '1995-08-24T12:36:38',
'version' => 0
},
{
'date' => '1995-09-01T21:17:14',
'version' => 0
},
{
'date' => '1996-02-10T20:04:44',
'version' => '2.01'
},
{
'date' => '2002-10-05T18:38:39',
'version' => '2.08'
},
{
'date' => '2002-10-06T12:17:23',
'version' => '2.09'
},
{
'date' => '2004-07-02T13:08:36',
'version' => '2.11'
},
{
'date' => '2008-01-28T17:33:00',
'version' => '2.13'
},
{
'date' => '2008-01-30T16:30:34',
'version' => '2.14'
},
{
'date' => '2008-02-06T12:34:21',
'version' => '2.15'
},
{
'date' => '2008-03-13T10:54:21',
'version' => '2.16'
},
{
'date' => '2009-06-28T14:20:14',
'version' => '2.17'
},
{
'date' => '2009-08-25T07:44:28',
'version' => '2.19'
},
{
'date' => '2009-11-30T23:33:41',
'version' => '2.20'
},
{
'date' => '2010-01-14T21:51:28',
'version' => '2.21'
},
{
'date' => '2010-02-11T21:59:56',
'version' => '2.22'
},
{
'date' => '2010-02-22T22:45:10',
'version' => '2.23'
},
{
'date' => '2010-03-06T21:42:25',
'version' => '2.24'
},
{
'date' => '2010-03-07T21:51:36',
'version' => '2.25'
},
{
'date' => '2010-03-09T10:56:56',
'version' => '2.26'
},
{
'date' => '2010-04-29T20:37:15',
'version' => '2.27'
},
{
'date' => '2010-09-13T13:50:58',
'version' => '2.28'
},
{
'date' => '2010-10-31T13:20:32',
'version' => '2.29'
},
{
'date' => '2011-12-07T08:22:34',
'version' => '2.30'
},
{
'date' => '2012-03-31T15:27:57',
'version' => '2.32'
},
{
'date' => '2012-04-03T10:12:30',
'version' => '2.33'
},
{
'date' => '2013-02-21T07:31:30',
'version' => '2.35'
}
]
},
'Search-OpenSearch-Server' => {
'advisories' => [
{
'affected_versions' => [
'<0.17'
],
'cves' => [],
'description' => 'Arbitrary Perl methods could be called via HTTP like RPC.
',
'distribution' => 'Search-OpenSearch-Server',
'fixed_versions' => [
'>=0.17'
],
'id' => 'CPANSA-Search-OpenSearch-Server-2012-01',
'references' => [
'https://metacpan.org/changes/distribution/Search-OpenSearch-Server',
'https://github.com/karpet/search-opensearch-server/commit/69d53fde9d70fe12e1f592de482601c43c45a278'
],
'reported' => '2012-08-31'
}
],
'main_module' => 'Search::OpenSearch::Server',
'versions' => [
{
'date' => '2010-05-28T03:07:46',
'version' => '0.01'
},
{
'date' => '2010-05-29T01:11:09',
'version' => '0.02'
},
{
'date' => '2010-06-23T01:22:53',
'version' => '0.03'
},
{
'date' => '2010-06-26T21:08:31',
'version' => '0.04'
},
{
'date' => '2011-01-08T04:05:22',
'version' => '0.05'
},
{
'date' => '2011-09-26T18:12:08',
'version' => '0.06'
},
{
'date' => '2011-09-26T18:16:12',
'version' => '0.07'
},
{
'date' => '2011-09-30T03:15:51',
'version' => '0.08'
},
{
'date' => '2011-10-23T01:42:30',
'version' => '0.09'
},
{
'date' => '2012-05-01T02:22:52',
'version' => '0.10'
},
{
'date' => '2012-07-15T03:32:57',
'version' => '0.11'
},
{
'date' => '2012-07-27T02:42:45',
'version' => '0.12'
},
{
'date' => '2012-08-07T01:48:25',
'version' => '0.13'
},
{
'date' => '2012-08-10T03:10:13',
'version' => '0.14'
},
{
'date' => '2012-08-21T02:34:37',
'version' => '0.15'
},
{
'date' => '2012-08-21T17:47:00',
'version' => '0.16'
},
{
'date' => '2012-09-04T01:54:00',
'version' => '0.17'
},
{
'date' => '2012-09-12T03:42:03',
'version' => '0.18'
},
{
'date' => '2012-09-13T14:06:58',
'version' => '0.19'
},
{
'date' => '2012-09-20T02:21:37',
'version' => '0.20'
},
{
'date' => '2012-10-15T04:32:38',
'version' => '0.21'
},
{
'date' => '2012-11-08T03:20:16',
'version' => '0.22'
},
{
'date' => '2012-11-21T19:01:22',
'version' => '0.23'
},
{
'date' => '2012-11-26T19:37:12',
'version' => '0.24'
},
{
'date' => '2012-12-18T19:11:36',
'version' => '0.25'
},
{
'date' => '2013-01-04T19:08:19',
'version' => '0.26'
},
{
'date' => '2013-06-14T02:28:09',
'version' => '0.27'
},
{
'date' => '2014-03-02T22:22:17',
'version' => '0.28'
},
{
'date' => '2014-04-23T18:20:52',
'version' => '0.299_01'
},
{
'date' => '2014-04-24T02:56:24',
'version' => '0.299_02'
},
{
'date' => '2014-06-05T07:29:19',
'version' => '0.299_03'
},
{
'date' => '2014-06-08T04:57:40',
'version' => '0.300'
},
{
'date' => '2015-08-14T20:04:12',
'version' => '0.301'
}
]
},
'Socket' => {
'advisories' => [
{
'affected_versions' => [
'<2.026'
],
'cves' => [],
'description' => 'The function croak is variadic which expects as a first parameter printf-style format. Passing arbitrary and string from the caller as a printf format leads to the security problem CWE-134: Use of Externally-Controlled Format String.
',
'distribution' => 'Socket',
'fixed_versions' => [
'>=2.027'
],
'id' => 'CPANSA-Socket-2017-01',
'references' => [
'https://rt.cpan.org/Public/Bug/Display.html?id=122830'
],
'reported' => '2017-08-17',
'severity' => undef
}
],
'main_module' => 'Socket',
'versions' => [
{
'date' => '1995-11-09T22:44:00',
'version' => '1.3'
},
{
'date' => '1996-06-09T12:32:00',
'version' => '1.5'
},
{
'date' => '2011-10-25T22:29:20',
'version' => '1.94_03'
},
{
'date' => '2011-10-26T17:37:31',
'version' => '1.94_04'
},
{
'date' => '2011-10-27T17:28:25',
'version' => '1.94_05'
},
{
'date' => '2011-10-30T01:34:45',
'version' => '1.94_06'
},
{
'date' => '2011-11-22T15:09:56',
'version' => '1.94_07'
},
{
'date' => '2011-12-01T14:07:01',
'version' => '1.95'
},
{
'date' => '2011-12-02T23:40:37',
'version' => '1.95_001'
},
{
'date' => '2011-12-05T19:33:32',
'version' => '1.95_002'
},
{
'date' => '2011-12-06T23:28:06',
'version' => '1.95_003'
},
{
'date' => '2011-12-07T16:24:12',
'version' => '1.95_004'
},
{
'date' => '2011-12-11T00:25:11',
'version' => '1.96'
},
{
'date' => '2011-12-16T19:47:41',
'version' => '1.97'
},
{
'date' => '2012-02-07T15:33:00',
'version' => '1.97_001'
},
{
'date' => '2012-02-12T11:40:21',
'version' => '1.97_002'
},
{
'date' => '2012-02-16T00:52:35',
'version' => '1.98'
},
{
'date' => '2012-02-17T00:24:56',
'version' => '1.98_001'
},
{
'date' => '2012-02-21T23:39:36',
'version' => '1.99'
},
{
'date' => '2012-03-10T00:09:16',
'version' => '2.000'
},
{
'date' => '2012-03-27T13:59:43',
'version' => '2.001'
},
{
'date' => '2012-05-18T16:23:54',
'version' => '2.001_001'
},
{
'date' => '2012-05-22T15:38:46',
'version' => '2.001_002'
},
{
'date' => '2012-05-31T15:02:53',
'version' => '2.001_003'
},
{
'date' => '2012-06-06T10:22:21',
'version' => '2.002'
},
{
'date' => '2012-08-15T13:14:45',
'version' => '2.003'
},
{
'date' => '2012-08-15T21:22:04',
'version' => '2.004'
},
{
'date' => '2012-08-16T21:27:21',
'version' => '2.005'
},
{
'date' => '2012-08-19T21:49:58',
'version' => '2.006'
},
{
'date' => '2012-12-16T18:27:03',
'version' => '2.007'
},
{
'date' => '2012-12-27T15:41:41',
'version' => '2.008'
},
{
'date' => '2013-01-18T16:13:59',
'version' => '2.009'
},
{
'date' => '2013-06-24T19:25:09',
'version' => '2.010'
},
{
'date' => '2013-07-28T18:46:32',
'version' => '2.011'
},
{
'date' => '2013-09-03T12:23:51',
'version' => '2.012'
},
{
'date' => '2013-10-28T00:53:02',
'version' => '2.013'
},
{
'date' => '2014-05-31T23:16:34',
'version' => '2.014'
},
{
'date' => '2014-08-15T22:38:05',
'version' => '2.015'
},
{
'date' => '2014-10-08T20:58:19',
'version' => '2.016'
},
{
'date' => '2015-02-10T12:28:48',
'version' => '2.017'
},
{
'date' => '2015-02-12T13:45:11',
'version' => '2.018'
},
{
'date' => '2015-04-27T20:25:03',
'version' => '2.018_001'
},
{
'date' => '2015-04-29T16:08:52',
'version' => '2.019'
},
{
'date' => '2015-06-24T13:49:15',
'version' => '2.020'
},
{
'date' => '2015-11-18T17:15:18',
'version' => '2.021'
},
{
'date' => '2016-04-16T22:49:32',
'version' => '2.021_01'
},
{
'date' => '2016-06-06T10:07:12',
'version' => '2.021_02'
},
{
'date' => '2016-08-01T15:05:16',
'version' => '2.022'
},
{
'date' => '2016-08-02T13:53:11',
'version' => '2.023'
},
{
'date' => '2016-08-11T12:52:58',
'version' => '2.024'
},
{
'date' => '2016-08-26T17:50:04',
'version' => '2.024_01'
},
{
'date' => '2016-08-26T22:33:20',
'version' => '2.024_02'
},
{
'date' => '2016-10-04T14:06:42',
'version' => '2.024_03'
},
{
'date' => '2018-01-09T15:15:51',
'version' => '2.025'
},
{
'date' => '2018-01-11T23:18:50',
'version' => '2.026'
},
{
'date' => '2018-01-12T17:00:49',
'version' => '2.027'
},
{
'date' => '2018-09-05T10:32:16',
'version' => '2.027_04'
},
{
'date' => '2019-02-20T00:03:23',
'version' => '2.028'
},
{
'date' => '2019-02-20T19:58:07',
'version' => '2.029'
},
{
'date' => '2019-02-21T19:41:16',
'version' => '2.029'
},
{
'date' => '2019-04-14T09:28:49',
'version' => '2.027_05'
},
{
'date' => '2019-06-15T14:08:34',
'version' => '2.029_05'
},
{
'date' => '2020-07-06T13:57:06',
'version' => '2.030'
},
{
'date' => '2021-01-05T15:50:53',
'version' => '2.031'
},
{
'date' => '2021-06-02T23:32:40',
'version' => '2.032'
},
{
'date' => '2022-04-29T14:34:23',
'version' => '2.033'
},
{
'date' => '2022-06-27T09:29:08',
'version' => '2.034'
},
{
'date' => '2022-07-01T14:22:10',
'version' => '2.035'
},
{
'date' => '2022-08-19T16:40:53',
'version' => '2.036'
},
{
'date' => '2023-06-06T11:57:25',
'version' => '2.037'
},
{
'date' => '2024-04-15T20:15:41',
'version' => '2.038'
}
]
},
'Spoon' => {
'advisories' => [
{
'affected_versions' => [
'>0.24'
],
'cves' => [
'CVE-2012-6143'
],
'description' => 'Spoon::Cookie in the Spoon module 0.24 for Perl does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via a crafted request, which is not properly handled when it is deserialized.
',
'distribution' => 'Spoon',
'fixed_versions' => [],
'id' => 'CPANSA-Spoon-Cookie-2012-6143',
'references' => [
'https://rt.cpan.org/Public/Bug/Display.html?id=85217',
'http://www.securityfocus.com/bid/59834',
'http://seclists.org/oss-sec/2013/q2/318',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/84197'
],
'reported' => '2014-06-04',
'severity' => undef
}
],
'main_module' => 'Spoon',
'versions' => [
{
'date' => '2004-03-21T10:04:10',
'version' => '0.10'
},
{
'date' => '2004-03-23T07:50:48',
'version' => '0.11'
},
{
'date' => '2004-03-30T16:23:32',
'version' => '0.12'
},
{
'date' => '2004-05-07T16:21:27',
'version' => '0.13'
},
{
'date' => '2004-06-02T10:15:14',
'version' => '0.14'
},
{
'date' => '2004-06-21T17:39:05',
'version' => '0.15'
},
{
'date' => '2004-06-22T17:43:16',
'version' => '0.16'
},
{
'date' => '2004-07-20T20:01:22',
'version' => '0.17'
},
{
'date' => '2004-08-12T05:59:51',
'version' => '0.18'
},
{
'date' => '2004-12-16T00:12:10',
'version' => '0.19'
},
{
'date' => '2004-12-18T09:04:38',
'version' => '0.20'
},
{
'date' => '2005-01-11T16:27:02',
'version' => '0.21'
},
{
'date' => '2005-04-04T14:49:45',
'version' => '0.22'
},
{
'date' => '2005-04-07T03:44:14',
'version' => '0.23'
},
{
'date' => '2006-12-09T23:29:37',
'version' => '0.24'
}
]
},
'Spreadsheet-ParseExcel' => {
'advisories' => [
{
'affected_versions' => [
'<0.66'
],
'cves' => [
'CVE-2023-7101'
],
'description' => "Spreadsheet::ParseExcel version 0.65 is a Perl module used for parsing Excel files. Spreadsheet::ParseExcel is vulnerable to an arbitrary code execution (ACE) vulnerability due to passing unvalidated input from a file into a string-type \x{201c}eval\x{201d}. Specifically, the issue stems from the evaluation of Number format strings (not to be confused with printf-style format strings) within the Excel parsing logic.
",
'distribution' => 'Spreadsheet-ParseExcel',
'fixed_versions' => [
'>=0.66'
],
'id' => 'CPANSA-Spreadsheet-ParseExcel-2023-7101',
'references' => [
'http://www.openwall.com/lists/oss-security/2023/12/29/4',
'https://github.com/jmcnamara/spreadsheet-parseexcel/blob/c7298592e102a375d43150cd002feed806557c15/lib/Spreadsheet/ParseExcel/Utility.pm#L171',
'https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md',
'https://https://github.com/haile01/perl_spreadsheet_excel_rce_poc',
'https://https://metacpan.org/dist/Spreadsheet-ParseExcel',
'https://https://www.cve.org/CVERecord?id=CVE-2023-7101',
'https://lists.debian.org/debian-lts-announce/2023/12/msg00025.html'
],
'reported' => '2023-12-24',
'severity' => undef
}
],
'main_module' => 'Spreadsheet::ParseExcel',
'versions' => [
{
'date' => '2000-10-06T00:33:12',
'version' => '0.06'
},
{
'date' => '2000-11-18T03:01:33',
'version' => '0.07'
},
{
'date' => '2000-11-24T23:59:57',
'version' => '0.08'
},
{
'date' => '2000-12-15T02:58:39',
'version' => '0.09'
},
{
'date' => '2001-01-16T00:27:35',
'version' => '0.10'
},
{
'date' => '2001-01-31T15:09:13',
'version' => '0.11'
},
{
'date' => '2001-02-05T11:37:49',
'version' => '0.12'
},
{
'date' => '2001-02-22T22:35:17',
'version' => '0.13'
},
{
'date' => '2001-03-06T02:14:24',
'version' => '0.15'
},
{
'date' => '2001-03-07T21:50:33',
'version' => '0.16'
},
{
'date' => '2001-03-12T23:08:09',
'version' => '0.17'
},
{
'date' => '2001-03-17T07:39:42',
'version' => '0.18'
},
{
'date' => '2001-03-26T11:41:43',
'version' => '0.19'
},
{
'date' => '2001-03-30T11:22:58',
'version' => '0.20'
},
{
'date' => '2001-04-11T00:12:29',
'version' => '0.201'
},
{
'date' => '2001-04-11T00:17:15',
'version' => 'v0.20.1'
},
{
'date' => '2001-04-28T02:18:17',
'version' => '0.21'
},
{
'date' => '2001-04-29T05:37:04',
'version' => 'v0.21.1'
},
{
'date' => '2001-05-01T07:23:55',
'version' => 'v0.21.2'
},
{
'date' => '2001-05-05T09:46:39',
'version' => '0.22'
},
{
'date' => '2001-05-15T22:20:34',
'version' => 'v0.22.1'
},
{
'date' => '2001-05-24T22:12:58',
'version' => 'v0.22.2'
},
{
'date' => '2001-06-05T22:21:24',
'version' => 'v0.22.3'
},
{
'date' => '2001-06-21T21:38:06',
'version' => '0.23'
},
{
'date' => '2001-06-26T03:05:48',
'version' => '0.2301'
},
{
'date' => '2001-07-05T10:44:34',
'version' => '0.24'
},
{
'date' => '2001-07-13T10:51:35',
'version' => '0.2402'
},
{
'date' => '2001-07-24T21:45:07',
'version' => '0.2403'
},
{
'date' => '2001-12-06T22:01:45',
'version' => '0.2404'
},
{
'date' => '2002-01-28T22:38:34',
'version' => '0.2405'
},
{
'date' => '2002-04-07T22:20:17',
'version' => '0.2406'
},
{
'date' => '2002-04-24T13:05:42',
'version' => '0.2407'
},
{
'date' => '2002-05-09T15:05:41',
'version' => '0.25'
},
{
'date' => '2002-06-05T20:57:29',
'version' => '0.26'
},
{
'date' => '2002-07-13T22:41:34',
'version' => '0.2601'
},
{
'date' => '2002-07-16T02:07:27',
'version' => '0.2602'
},
{
'date' => '2004-05-30T01:51:09',
'version' => '0.2603'
},
{
'date' => '2006-09-11T09:15:23',
'version' => '0.27_01'
},
{
'date' => '2006-09-12T20:55:36',
'version' => '0.27_02'
},
{
'date' => '2006-11-02T16:44:10',
'version' => '0.27_03'
},
{
'date' => '2007-01-03T15:48:01',
'version' => '0.27'
},
{
'date' => '2007-01-07T17:20:30',
'version' => '0.28'
},
{
'date' => '2007-03-29T23:21:14',
'version' => '0.29'
},
{
'date' => '2007-03-31T15:33:28',
'version' => '0.30'
},
{
'date' => '2007-05-03T02:21:13',
'version' => '0.31'
},
{
'date' => '2007-05-05T03:56:46',
'version' => '0.32'
},
{
'date' => '2008-09-07T07:47:07',
'version' => '0.33'
},
{
'date' => '2008-10-24T00:05:35',
'version' => '0.40'
},
{
'date' => '2008-10-24T00:18:27',
'version' => '0.33'
},
{
'date' => '2009-01-01T20:42:10',
'version' => '0.42'
},
{
'date' => '2009-01-08T02:06:27',
'version' => '0.43'
},
{
'date' => '2009-01-09T03:37:10',
'version' => '0.44'
},
{
'date' => '2009-01-14T02:19:46',
'version' => '0.45'
},
{
'date' => '2009-01-20T00:34:23',
'version' => '0.46'
},
{
'date' => '2009-01-22T00:39:18',
'version' => '0.47'
},
{
'date' => '2009-01-23T07:07:04',
'version' => '0.48'
},
{
'date' => '2009-01-24T01:19:12',
'version' => '0.49'
},
{
'date' => '2009-08-18T23:30:07',
'version' => '0.50'
},
{
'date' => '2009-08-19T22:08:26',
'version' => '0.51'
},
{
'date' => '2009-08-21T18:09:01',
'version' => '0.52'
},
{
'date' => '2009-08-24T23:06:49',
'version' => '0.53'
},
{
'date' => '2009-08-25T20:24:31',
'version' => '0.54'
},
{
'date' => '2009-09-30T06:26:08',
'version' => '0.55'
},
{
'date' => '2009-12-10T00:23:50',
'version' => '0.56'
},
{
'date' => '2010-01-24T19:18:56',
'version' => '0.57'
},
{
'date' => '2010-09-17T18:09:07',
'version' => '0.58'
},
{
'date' => '2011-04-06T19:13:26',
'version' => '0.59'
},
{
'date' => '2014-02-26T19:58:52',
'version' => '0.60'
},
{
'date' => '2014-03-04T18:56:46',
'version' => '0.61'
},
{
'date' => '2014-03-05T17:16:00',
'version' => '0.62'
},
{
'date' => '2014-03-07T20:47:21',
'version' => '0.63'
},
{
'date' => '2014-03-11T17:22:13',
'version' => '0.64'
},
{
'date' => '2014-03-18T20:47:23',
'version' => '0.65'
},
{
'date' => '2023-12-29T01:14:58',
'version' => '0.66'
}
]
},
'Spreadsheet-ParseXLSX' => {
'advisories' => [
{
'affected_versions' => [
'<0.28'
],
'cves' => [
'CVE-2024-22368'
],
'description' => 'The Spreadsheet::ParseXLSX package before 0.28 for Perl can encounter an out-of-memory condition during parsing of a crafted XLSX document. This occurs because the memoize implementation does not have appropriate constraints on merged cells.
',
'distribution' => 'Spreadsheet-ParseXLSX',
'fixed_versions' => [
'>=0.28'
],
'id' => 'CPANSA-Spreadsheet-ParseXLSX-2024-22368',
'references' => [
'https://github.com/haile01/perl_spreadsheet_excel_rce_poc/blob/main/parse_xlsx_bomb.md',
'https://github.com/briandfoy/cpan-security-advisory/issues/131',
'https://nvd.nist.gov/vuln/detail/CVE-2024-22368',
'https://github.com/haile01/perl_spreadsheet_excel_rce_poc/blob/main/parse_xlsx_bomb.md',
'https://metacpan.org/dist/Spreadsheet-ParseXLSX/changes',
'https://github.com/advisories/GHSA-x2hg-844v-frvh'
],
'reported' => '2024-01-03'
},
{
'affected_versions' => [
'<0.30'
],
'cves' => [
'CVE-2024-23525'
],
'description' => 'In default configuration of Spreadsheet::ParseXLSX, whenever we call Spreadsheet::ParseXLSX->new()->parse(\'user_input_file.xlsx\'), we\'d be vulnerable for XXE vulnerability if the XLSX file that we are parsing is from user input.
',
'distribution' => 'Spreadsheet-ParseXLSX',
'fixed_versions' => [
'>=0.30'
],
'id' => 'CPANSA-Spreadsheet-ParseXLSX-2024-23525',
'references' => [
'https://metacpan.org/release/NUDDLEGG/Spreadsheet-ParseXLSX-0.30/changes',
'https://gist.github.com/phvietan/d1c95a88ab6e17047b0248d6bf9eac4a',
'https://github.com/briandfoy/cpan-security-advisory/issues/134',
'https://github.com/MichaelDaum/spreadsheet-parsexlsx/issues/10',
'https://github.com/advisories/GHSA-cxjh-j6f8-vrmf',
'https://nvd.nist.gov/vuln/detail/CVE-2024-23525'
],
'reported' => '2024-01-17'
}
],
'main_module' => 'Spreadsheet::ParseXLSX',
'versions' => [
{
'date' => '2013-07-17T02:45:07',
'version' => '0.01'
},
{
'date' => '2013-07-17T15:14:43',
'version' => '0.02'
},
{
'date' => '2013-07-26T07:34:38',
'version' => '0.03'
},
{
'date' => '2013-07-31T18:28:38',
'version' => '0.04'
},
{
'date' => '2013-07-31T22:15:56',
'version' => '0.05'
},
{
'date' => '2013-08-29T20:02:30',
'version' => '0.06'
},
{
'date' => '2013-09-05T18:34:35',
'version' => '0.07'
},
{
'date' => '2013-09-10T18:21:15',
'version' => '0.08'
},
{
'date' => '2013-10-09T14:52:49',
'version' => '0.09'
},
{
'date' => '2013-11-06T18:36:10',
'version' => '0.10'
},
{
'date' => '2013-11-14T00:30:46',
'version' => '0.11'
},
{
'date' => '2013-12-09T20:27:26',
'version' => '0.12'
},
{
'date' => '2014-01-29T21:32:54',
'version' => '0.13'
},
{
'date' => '2014-04-03T16:56:25',
'version' => '0.14'
},
{
'date' => '2014-07-05T01:39:06',
'version' => '0.15'
},
{
'date' => '2014-07-05T18:55:08',
'version' => '0.16'
},
{
'date' => '2015-03-26T03:38:16',
'version' => '0.17'
},
{
'date' => '2015-09-19T06:08:07',
'version' => '0.18'
},
{
'date' => '2015-12-04T07:38:39',
'version' => '0.19'
},
{
'date' => '2015-12-05T18:45:32',
'version' => '0.20'
},
{
'date' => '2016-05-23T07:09:47',
'version' => '0.21'
},
{
'date' => '2016-05-25T05:39:15',
'version' => '0.22'
},
{
'date' => '2016-05-29T03:01:59',
'version' => '0.23'
},
{
'date' => '2016-06-25T18:03:32',
'version' => '0.24'
},
{
'date' => '2016-07-15T02:36:28',
'version' => '0.25'
},
{
'date' => '2016-08-16T06:35:10',
'version' => '0.26'
},
{
'date' => '2016-08-16T07:12:41',
'version' => '0.27'
},
{
'date' => '2024-01-02T13:45:35',
'version' => '0.28'
},
{
'date' => '2024-01-02T17:49:11',
'version' => '0.29'
},
{
'date' => '2024-01-17T11:34:43',
'version' => '0.30'
},
{
'date' => '2024-01-18T11:30:17',
'version' => '0.31'
},
{
'date' => '2024-03-08T11:04:50',
'version' => '0.32'
},
{
'date' => '2024-03-08T12:50:37',
'version' => '0.33'
},
{
'date' => '2024-03-13T10:28:28',
'version' => '0.34'
},
{
'date' => '2024-03-19T16:22:17',
'version' => '0.35'
},
{
'date' => '2025-01-24T09:33:40',
'version' => '0.36'
}
]
},
'Storable' => {
'advisories' => [
{
'affected_versions' => [
'<3.05'
],
'cves' => [],
'description' => 'Malcrafted storable files or buffers.
',
'distribution' => 'Storable',
'fixed_versions' => [
'>=3.05'
],
'id' => 'CPANSA-Storable-2017-01',
'references' => [
'https://metacpan.org/changes/distribution/Storable',
'https://cxsecurity.com/issue/WLB-2007120031'
],
'reported' => '2017-01-29'
}
],
'main_module' => 'Storable',
'versions' => [
{
'date' => '1995-10-02T10:50:02',
'version' => '0.1'
},
{
'date' => '1997-01-13T11:42:25',
'version' => '0.2'
},
{
'date' => '1997-01-13T17:18:01',
'version' => '0.2'
},
{
'date' => '1997-01-14T15:12:36',
'version' => '0.3'
},
{
'date' => '1997-01-15T18:25:57',
'version' => '0.4'
},
{
'date' => '1997-01-22T14:47:23',
'version' => '0.4'
},
{
'date' => '1997-02-27T15:02:37',
'version' => '0.4'
},
{
'date' => '1997-02-27T15:38:18',
'version' => '0.4'
},
{
'date' => '1997-03-25T10:32:00',
'version' => '0.4'
},
{
'date' => '1997-05-16T09:24:59',
'version' => '0.4'
},
{
'date' => '1997-06-03T09:38:38',
'version' => '0.4'
},
{
'date' => '1997-06-10T16:47:47',
'version' => '0.5'
},
{
'date' => '1997-11-05T10:05:11',
'version' => '0.5'
},
{
'date' => '1998-01-13T16:59:38',
'version' => '0.5'
},
{
'date' => '1998-01-20T08:32:03',
'version' => '0.5'
},
{
'date' => '1998-03-06T20:52:28',
'version' => '0.5'
},
{
'date' => '1998-03-25T14:10:24',
'version' => '0.5'
},
{
'date' => '1998-04-08T11:20:48',
'version' => '0.5'
},
{
'date' => '1998-04-09T16:17:05',
'version' => '0.5'
},
{
'date' => '1998-04-24T15:29:23',
'version' => '0.5'
},
{
'date' => '1998-04-30T13:13:58',
'version' => '0.5'
},
{
'date' => '1998-05-12T07:15:48',
'version' => '0.5'
},
{
'date' => '1998-06-04T16:19:02',
'version' => '0.6'
},
{
'date' => '1998-06-12T09:54:35',
'version' => '0.6'
},
{
'date' => '1998-06-22T09:00:32',
'version' => '0.6'
},
{
'date' => '1998-07-03T13:53:55',
'version' => '0.6'
},
{
'date' => '1998-07-21T12:10:39',
'version' => '0.6'
},
{
'date' => '1999-01-31T18:01:47',
'version' => '0.6'
},
{
'date' => '1999-07-12T13:05:25',
'version' => '0.6'
},
{
'date' => '1999-09-02T12:47:03',
'version' => '0.6'
},
{
'date' => '1999-09-14T20:27:23',
'version' => 'v0.6.5'
},
{
'date' => '1999-10-19T19:33:43',
'version' => 'v0.6.6'
},
{
'date' => '1999-10-20T17:10:19',
'version' => 'v0.6.7'
},
{
'date' => '2000-03-02T22:29:53',
'version' => 'v0.6.9'
},
{
'date' => '2000-03-29T18:00:09',
'version' => 'v0.6.10'
},
{
'date' => '2000-04-02T22:12:47',
'version' => 'v0.6.11'
},
{
'date' => '2000-08-03T22:12:31',
'version' => 'v0.7.0'
},
{
'date' => '2000-08-13T20:17:55',
'version' => 'v0.7.1'
},
{
'date' => '2000-08-14T07:27:17',
'version' => 'v0.7.2'
},
{
'date' => '2000-08-23T23:12:01',
'version' => 'v0.7.4'
},
{
'date' => '2000-09-01T19:44:37',
'version' => 'v1.0.0'
},
{
'date' => '2000-09-17T16:56:12',
'version' => 'v1.0.1'
},
{
'date' => '2000-09-28T21:50:42',
'version' => 'v1.0.2'
},
{
'date' => '2000-09-29T19:55:57',
'version' => 'v1.0.3'
},
{
'date' => '2000-10-23T18:12:41',
'version' => 'v1.0.4'
},
{
'date' => '2000-10-26T17:18:33',
'version' => 'v1.0.5'
},
{
'date' => '2000-11-05T17:30:34',
'version' => 'v1.0.6'
},
{
'date' => '2001-01-03T09:48:40',
'version' => 'v1.0.7'
},
{
'date' => '2001-02-17T12:43:23',
'version' => 'v1.0.10'
},
{
'date' => '2001-03-15T00:30:04',
'version' => 'v1.0.11'
},
{
'date' => '2001-07-01T11:30:39',
'version' => 'v1.0.12'
},
{
'date' => '2001-08-28T21:59:16',
'version' => 'v1.0.13'
},
{
'date' => '2001-12-01T13:48:14',
'version' => 'v1.0.14'
},
{
'date' => '2002-05-18T16:48:08',
'version' => '2.00'
},
{
'date' => '2002-05-28T20:34:47',
'version' => '2.02'
},
{
'date' => '2002-06-01T04:35:47',
'version' => '2.03'
},
{
'date' => '2002-06-08T02:11:56',
'version' => '2.04'
},
{
'date' => '2002-10-03T03:37:51',
'version' => '2.05'
},
{
'date' => '2002-11-25T12:34:01',
'version' => '2.06'
},
{
'date' => '2003-05-05T05:21:16',
'version' => '2.07'
},
{
'date' => '2003-09-05T20:01:37',
'version' => '2.08'
},
{
'date' => '2004-01-06T01:47:55',
'version' => '2.09'
},
{
'date' => '2004-03-01T04:28:16',
'version' => '2.10'
},
{
'date' => '2004-03-17T15:11:57',
'version' => '2.11'
},
{
'date' => '2004-03-24T03:24:16',
'version' => '2.12'
},
{
'date' => '2004-06-28T16:41:47',
'version' => '2.13'
},
{
'date' => '2005-04-25T02:15:51',
'version' => '2.14'
},
{
'date' => '2005-05-23T17:21:53',
'version' => '2.15'
},
{
'date' => '2007-03-31T00:51:12',
'version' => '2.16'
},
{
'date' => '2007-11-16T20:48:24',
'version' => '2.17'
},
{
'date' => '2007-11-23T18:18:24',
'version' => '2.18'
},
{
'date' => '2009-05-18T04:18:09',
'version' => '2.20'
},
{
'date' => '2009-08-06T05:30:04',
'version' => '2.21'
},
{
'date' => '2010-11-12T17:12:42',
'version' => '2.23'
},
{
'date' => '2010-11-12T17:29:29',
'version' => '2.24'
},
{
'date' => '2010-12-11T06:08:33',
'version' => '2.25'
},
{
'date' => '2011-07-03T04:04:14',
'version' => '2.29'
},
{
'date' => '2011-07-12T03:59:06',
'version' => '2.30'
},
{
'date' => '2012-06-07T01:16:46',
'version' => '2.35'
},
{
'date' => '2012-09-11T01:30:44',
'version' => '2.38'
},
{
'date' => '2012-09-11T01:38:57',
'version' => '2.39'
},
{
'date' => '2013-07-13T16:49:48',
'version' => '2.45'
},
{
'date' => '2014-07-02T11:09:04',
'version' => '2.51'
},
{
'date' => '2017-01-29T11:41:00',
'version' => '3.05'
},
{
'date' => '2017-01-30T14:25:11',
'version' => '3.05_01'
},
{
'date' => '2017-01-30T18:55:50',
'version' => '3.05_02'
},
{
'date' => '2017-01-31T01:58:36',
'version' => '3.05_03'
},
{
'date' => '2017-02-02T11:22:12',
'version' => '3.05_04'
},
{
'date' => '2017-03-05T10:48:10',
'version' => '3.05_06'
},
{
'date' => '2017-03-05T12:52:10',
'version' => '3.05_07'
},
{
'date' => '2017-03-11T07:51:19',
'version' => '3.05_09'
},
{
'date' => '2017-03-14T09:03:54',
'version' => '3.05_10'
},
{
'date' => '2017-03-29T20:00:48',
'version' => '3.05_11'
},
{
'date' => '2017-04-19T07:20:42',
'version' => '3.05_12'
},
{
'date' => '2017-10-15T12:06:30',
'version' => '3.05_14'
},
{
'date' => '2017-10-21T09:30:17',
'version' => '3.05_15'
},
{
'date' => '2017-10-21T16:17:28',
'version' => '3.05_16'
},
{
'date' => '2018-04-19T08:29:33',
'version' => '3.06'
},
{
'date' => '2018-04-20T16:11:03',
'version' => '3.05_17'
},
{
'date' => '2018-04-21T10:08:56',
'version' => '3.08'
},
{
'date' => '2018-04-21T16:50:30',
'version' => '3.09'
},
{
'date' => '2018-04-27T17:46:19',
'version' => '3.11'
},
{
'date' => '2018-09-05T15:12:26',
'version' => '3.11_01'
},
{
'date' => '2019-03-06T12:42:01',
'version' => '3.12_03'
},
{
'date' => '2019-03-12T09:31:55',
'version' => '3.12_04'
},
{
'date' => '2019-04-16T07:32:16',
'version' => '3.14_04'
},
{
'date' => '2019-04-23T13:29:25',
'version' => '3.15'
},
{
'date' => '2019-05-05T12:46:33',
'version' => '3.15_04'
},
{
'date' => '2021-08-25T09:06:32',
'version' => '3.24_50'
},
{
'date' => '2021-08-30T08:39:08',
'version' => '3.25'
}
]
},
'Sys-Syslog' => {
'advisories' => [
{
'affected_versions' => [
'<0.35'
],
'cves' => [
'CVE-2016-1238'
],
'description' => 'Optional modules loaded from loading optional modules from "."
',
'distribution' => 'Sys-Syslog',
'fixed_versions' => [
'>=0.35'
],
'id' => 'CPANSA-Sys-Syslog-2016-1238',
'references' => [
'https://metacpan.org/dist/Sys-Syslog/changes',
'https://rt.cpan.org/Public/Bug/Display.html?id=116543'
],
'reported' => '2016-07-27',
'severity' => 'high'
}
],
'main_module' => 'Sys::Syslog',
'versions' => [
{
'date' => '2005-12-06T22:19:29',
'version' => '0.09'
},
{
'date' => '2005-12-08T01:10:57',
'version' => '0.10'
},
{
'date' => '2005-12-27T23:49:31',
'version' => '0.11'
},
{
'date' => '2006-01-07T04:07:20',
'version' => '0.12'
},
{
'date' => '2006-01-11T01:03:02',
'version' => '0.13'
},
{
'date' => '2006-05-25T22:42:27',
'version' => '0.14'
},
{
'date' => '2006-06-10T23:57:12',
'version' => '0.15'
},
{
'date' => '2006-06-20T21:26:29',
'version' => '0.16'
},
{
'date' => '2006-07-23T01:51:16',
'version' => '0.17'
},
{
'date' => '2006-08-28T22:18:29',
'version' => '0.18'
},
{
'date' => '2007-09-05T09:39:56',
'version' => '0.19'
},
{
'date' => '2007-09-05T10:23:25',
'version' => '0.20'
},
{
'date' => '2007-09-13T23:01:59',
'version' => '0.21'
},
{
'date' => '2007-11-08T00:58:57',
'version' => '0.22'
},
{
'date' => '2007-11-12T22:42:29',
'version' => '0.23'
},
{
'date' => '2007-12-31T17:18:56',
'version' => '0.24'
},
{
'date' => '2008-06-05T23:16:19',
'version' => '0.25'
},
{
'date' => '2008-06-15T23:49:12',
'version' => '0.25'
},
{
'date' => '2008-09-21T17:05:08',
'version' => '0.27'
},
{
'date' => '2009-03-14T03:24:36',
'version' => '1.00'
},
{
'date' => '2011-04-16T17:01:20',
'version' => '0.28'
},
{
'date' => '2011-04-18T14:10:00',
'version' => '0.29'
},
{
'date' => '2012-08-15T01:27:23',
'version' => '0.30'
},
{
'date' => '2012-08-18T18:07:17',
'version' => '0.31'
},
{
'date' => '2012-09-14T12:36:22',
'version' => '0.32'
},
{
'date' => '2013-05-24T00:13:07',
'version' => '0.33'
},
{
'date' => '2016-05-05T23:20:00',
'version' => '0.34'
},
{
'date' => '2016-09-01T16:56:39',
'version' => '0.35'
},
{
'date' => '2019-10-21T22:41:02',
'version' => '0.36'
}
]
},
'Term-ReadLine-Gnu' => {
'advisories' => [
{
'affected_versions' => [
'<1.27'
],
'comment' => 'The presense of affected versions of Term-ReadLine-Gnu suggests that a vulnerable version of the readline linrary is installed on the host system.
',
'cves' => [
'CVE-2014-2524'
],
'description' => 'The _rl_tropen function in util.c in GNU readline before 6.3 patch 3 allows local users to create or overwrite arbitrary files via a symlink attack on a /var/tmp/rltrace.[PID] file.
',
'distribution' => 'Term-ReadLine-Gnu',
'external_vulnerability' => {
'distributed_version' => '<=6.3',
'name' => 'readline'
},
'fixed_versions' => [
'>=1.27'
],
'id' => 'CPANSA-Term-ReadLine-Gnu-2014-2524',
'references' => [
'https://bugzilla.redhat.com/show_bug.cgi?id=1077023',
'http://lists.gnu.org/archive/html/bug-readline/2014-03/msg00057.html',
'http://seclists.org/oss-sec/2014/q1/579',
'http://seclists.org/oss-sec/2014/q1/587',
'https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135686.html',
'http://www.mandriva.com/security/advisories?name=MDVSA-2014:154',
'http://advisories.mageia.org/MGASA-2014-0319.html',
'http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html',
'http://www.mandriva.com/security/advisories?name=MDVSA-2015:132'
],
'reported' => '2014-08-20',
'severity' => undef
}
],
'main_module' => 'Term::ReadLine::Gnu',
'versions' => [
{
'date' => '1997-02-07T02:03:51',
'version' => '0.06'
},
{
'date' => '1997-03-26T07:17:23',
'version' => '0.07'
},
{
'date' => '1997-08-25T15:02:01',
'version' => '0.09'
},
{
'date' => '1998-03-31T15:49:08',
'version' => '0.10'
},
{
'date' => '1998-04-17T05:23:29',
'version' => '1.00'
},
{
'date' => '1998-05-13T15:45:47',
'version' => '1.01'
},
{
'date' => '1998-09-30T16:10:02',
'version' => '1.03'
},
{
'date' => '1999-02-22T17:28:32',
'version' => '1.04'
},
{
'date' => '1999-04-10T16:08:54',
'version' => '1.05'
},
{
'date' => '1999-05-05T14:55:21',
'version' => '1.06'
},
{
'date' => '1999-07-19T15:13:19',
'version' => '1.07'
},
{
'date' => '1999-12-30T13:37:18',
'version' => '1.08'
},
{
'date' => '2000-04-03T18:05:33',
'version' => '1.09'
},
{
'date' => '2001-04-22T14:23:37',
'version' => '1.10'
},
{
'date' => '2001-10-28T04:38:19',
'version' => '1.11'
},
{
'date' => '2002-03-31T05:54:31',
'version' => '1.12'
},
{
'date' => '2002-07-28T05:07:18',
'version' => '1.13'
},
{
'date' => '2003-03-17T03:59:29',
'version' => '1.14'
},
{
'date' => '2004-10-17T20:00:06',
'version' => '1.15'
},
{
'date' => '2006-04-02T01:36:28',
'version' => '1.16'
},
{
'date' => '2008-02-07T15:00:09',
'version' => '1.17'
},
{
'date' => '2008-02-07T15:52:11',
'version' => '1.17'
},
{
'date' => '2009-02-27T14:14:29',
'version' => '1.18'
},
{
'date' => '2009-03-20T17:00:37',
'version' => '1.19'
},
{
'date' => '2010-05-02T14:26:20',
'version' => '1.20'
},
{
'date' => '2014-03-01T17:19:57',
'version' => '1.21'
},
{
'date' => '2014-03-05T14:48:24',
'version' => '1.22'
},
{
'date' => '2014-03-19T15:53:44',
'version' => '1.23'
},
{
'date' => '2014-03-23T11:58:51',
'version' => '1.24'
},
{
'date' => '2014-12-20T13:25:24',
'version' => '1.25'
},
{
'date' => '2015-01-31T12:30:45',
'version' => '1.26'
},
{
'date' => '2015-09-06T06:03:05',
'version' => '1.27'
},
{
'date' => '2015-09-21T13:14:52',
'version' => '1.28'
},
{
'date' => '2016-02-29T14:06:51',
'version' => '1.29'
},
{
'date' => '2016-03-01T15:55:22',
'version' => '1.30'
},
{
'date' => '2016-03-06T00:45:52',
'version' => '1.31'
},
{
'date' => '2016-06-07T15:25:50',
'version' => '1.32'
},
{
'date' => '2016-06-09T17:11:29',
'version' => '1.33'
},
{
'date' => '2016-06-12T14:53:40',
'version' => '1.34'
},
{
'date' => '2016-11-03T14:36:40',
'version' => '1.35'
},
{
'date' => '2019-01-14T05:39:06',
'version' => '1.36'
},
{
'date' => '2020-12-27T03:26:23',
'version' => '1.37'
},
{
'date' => '2021-02-22T09:48:52',
'version' => '1.38'
},
{
'date' => '2021-02-22T14:36:24',
'version' => '1.39'
},
{
'date' => '2021-02-23T07:24:27',
'version' => '1.40'
},
{
'date' => '2021-05-01T14:45:09',
'version' => '1.41'
},
{
'date' => '2021-05-07T03:30:02',
'version' => '1.42'
},
{
'date' => '2022-10-01T08:45:18',
'version' => '1.43'
},
{
'date' => '2022-11-06T14:03:08',
'version' => '1.44'
},
{
'date' => '2022-11-27T13:23:27',
'version' => '1.45'
},
{
'date' => '2023-07-01T09:18:33',
'version' => '1.46'
}
]
},
'Tk' => {
'advisories' => [
{
'affected_versions' => [
'<804.029'
],
'cves' => [
'CVE-2006-4484'
],
'description' => 'Buffer overflow in the LWZReadByte_ function in the GD extension in allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.
',
'distribution' => 'Tk',
'fixed_versions' => [
'>=804.029'
],
'id' => 'CPANSA-Tk-2008-01',
'references' => [
'https://metacpan.org/changes/distribution/Tk'
],
'reported' => '2008-10-01'
}
],
'main_module' => 'Tk',
'versions' => [
{
'date' => '1995-08-22T23:03:30',
'version' => 0
},
{
'date' => '1995-12-19T01:56:04',
'version' => 0
},
{
'date' => '1996-08-29T00:19:01',
'version' => 0
},
{
'date' => '1996-09-07T01:08:44',
'version' => '400.200'
},
{
'date' => '1997-01-08T23:27:30',
'version' => '400.201'
},
{
'date' => '1997-01-25T12:33:02',
'version' => '400.202'
},
{
'date' => '1997-05-04T20:05:58',
'version' => '402.000'
},
{
'date' => '1997-06-14T19:17:26',
'version' => '402.001'
},
{
'date' => '1997-07-18T17:01:40',
'version' => '402.002'
},
{
'date' => '1997-10-04T15:32:53',
'version' => '402.003'
},
{
'date' => '1998-01-25T17:07:27',
'version' => '402.004'
},
{
'date' => '1998-02-07T21:22:00',
'version' => '402.003'
},
{
'date' => '1998-02-22T19:34:11',
'version' => '800.000'
},
{
'date' => '1998-03-02T00:12:00',
'version' => '800.0_01'
},
{
'date' => '1998-03-09T22:37:37',
'version' => '800.0_02'
},
{
'date' => '1998-03-17T13:43:00',
'version' => '402.003'
},
{
'date' => '1998-04-01T04:36:00',
'version' => '402.003'
},
{
'date' => '1998-04-02T18:32:00',
'version' => '402.003'
},
{
'date' => '1998-04-05T08:37:23',
'version' => '800.003'
},
{
'date' => '1998-04-19T17:23:45',
'version' => '800.004'
},
{
'date' => '1998-05-17T18:07:11',
'version' => '800.005'
},
{
'date' => '1998-06-14T20:30:35',
'version' => '800.006'
},
{
'date' => '1998-06-26T16:30:23',
'version' => '800.007'
},
{
'date' => '1998-07-17T16:47:42',
'version' => '800.008'
},
{
'date' => '1998-08-08T19:31:23',
'version' => '800.010'
},
{
'date' => '1998-09-01T17:20:02',
'version' => '800.011'
},
{
'date' => '1998-11-15T14:28:04',
'version' => '800.012'
},
{
'date' => '1999-03-16T22:13:10',
'version' => '800.013'
},
{
'date' => '1999-04-05T20:15:39',
'version' => '800.014'
},
{
'date' => '1999-07-28T22:10:03',
'version' => '800.015'
},
{
'date' => '2000-01-08T12:48:56',
'version' => '800.017'
},
{
'date' => '2000-01-08T12:58:16',
'version' => '800.0_16'
},
{
'date' => '2000-01-22T19:44:55',
'version' => '800.018'
},
{
'date' => '2000-03-13T16:39:08',
'version' => '800.019'
},
{
'date' => '2000-03-27T17:01:22',
'version' => '800.020'
},
{
'date' => '2000-04-21T13:38:21',
'version' => '800.021'
},
{
'date' => '2000-05-13T09:48:51',
'version' => '800.022'
},
{
'date' => '2001-05-15T15:07:21',
'version' => '800.023'
},
{
'date' => '2001-07-14T21:06:00',
'version' => '800.012'
},
{
'date' => '2002-03-05T16:38:25',
'version' => '800.024'
},
{
'date' => '2002-03-17T20:30:42',
'version' => '800.024'
},
{
'date' => '2002-10-13T17:20:55',
'version' => '804.0_24'
},
{
'date' => '2003-05-02T01:10:54',
'version' => 'v804.024.'
},
{
'date' => '2003-09-08T08:13:16',
'version' => '800.025'
},
{
'date' => '2003-09-28T18:01:55',
'version' => '804.025'
},
{
'date' => '2003-10-10T18:24:24',
'version' => '804.025'
},
{
'date' => '2003-10-20T20:44:44',
'version' => '804.025'
},
{
'date' => '2003-10-27T08:23:07',
'version' => '804.025'
},
{
'date' => '2003-11-02T22:28:10',
'version' => '804.025'
},
{
'date' => '2003-11-16T22:15:42',
'version' => '804.025'
},
{
'date' => '2003-12-02T21:26:56',
'version' => '804.025'
},
{
'date' => '2003-12-08T08:01:15',
'version' => '804.025_'
},
{
'date' => '2003-12-11T08:03:20',
'version' => '804.025'
},
{
'date' => '2003-12-14T20:22:05',
'version' => '804.025'
},
{
'date' => '2003-12-19T17:42:32',
'version' => '804.025'
},
{
'date' => '2003-12-21T21:09:10',
'version' => '804.025_'
},
{
'date' => '2003-12-23T23:19:20',
'version' => '804.025'
},
{
'date' => '2004-01-12T21:59:01',
'version' => '804.025'
},
{
'date' => '2004-02-28T17:33:01',
'version' => '804.025_'
},
{
'date' => '2004-03-07T20:33:56',
'version' => '804.025_'
},
{
'date' => '2004-03-19T08:10:49',
'version' => '804.026'
},
{
'date' => '2004-04-11T19:04:25',
'version' => '804.026'
},
{
'date' => '2007-02-11T08:49:16',
'version' => '804.027_500'
},
{
'date' => '2007-09-21T22:57:57',
'version' => '804.027_501'
},
{
'date' => '2007-12-04T21:03:29',
'version' => '804.027_502'
},
{
'date' => '2007-12-18T22:01:39',
'version' => '804.028'
},
{
'date' => '2008-10-01T21:48:52',
'version' => '804.0285'
},
{
'date' => '2008-11-04T22:27:51',
'version' => '804.028501'
},
{
'date' => '2010-01-30T17:54:07',
'version' => '804.028502'
},
{
'date' => '2010-05-13T00:00:04',
'version' => '804.028503'
},
{
'date' => '2010-05-27T19:25:41',
'version' => '804.029'
},
{
'date' => '2011-06-13T17:53:20',
'version' => '804.0295'
},
{
'date' => '2011-10-14T19:22:48',
'version' => '804.029501'
},
{
'date' => '2011-10-17T21:12:41',
'version' => '804.029502'
},
{
'date' => '2011-10-20T21:08:12',
'version' => '804.03'
},
{
'date' => '2013-05-17T22:16:24',
'version' => '804.030500'
},
{
'date' => '2013-05-18T05:01:41',
'version' => '804.030501'
},
{
'date' => '2013-05-21T07:30:50',
'version' => '804.030502'
},
{
'date' => '2013-05-25T12:57:05',
'version' => '804.031'
},
{
'date' => '2013-11-17T11:24:41',
'version' => '804.031500'
},
{
'date' => '2013-11-18T20:19:08',
'version' => '804.031501'
},
{
'date' => '2013-12-01T15:07:28',
'version' => '804.031502'
},
{
'date' => '2013-12-07T13:00:14',
'version' => '804.031503'
},
{
'date' => '2014-01-26T17:01:07',
'version' => '804.032'
},
{
'date' => '2014-11-06T21:01:44',
'version' => '804.032500'
},
{
'date' => '2015-01-31T10:28:08',
'version' => '804.032501'
},
{
'date' => '2015-02-21T15:54:08',
'version' => '804.033'
},
{
'date' => '2017-08-20T09:29:42',
'version' => '804.033500'
},
{
'date' => '2017-08-26T15:26:56',
'version' => '804.034'
},
{
'date' => '2020-02-23T16:12:23',
'version' => '804.034500'
},
{
'date' => '2020-03-19T21:02:47',
'version' => '804.034501'
},
{
'date' => '2020-03-28T19:28:42',
'version' => '804.035'
},
{
'date' => '2021-02-07T19:55:40',
'version' => '804.035501'
},
{
'date' => '2021-02-14T12:53:44',
'version' => '804.036'
}
]
},
'UI-Dialog' => {
'advisories' => [
{
'affected_versions' => [
'<1.11'
],
'cves' => [],
'description' => 'Allows remote attackers to execute arbitrary commands.
',
'distribution' => 'UI-Dialog',
'fixed_versions' => [
'>=1.11'
],
'id' => 'CPANSA-UI-Dialog-2015-01',
'references' => [
'https://metacpan.org/changes/distribution/UI-Dialog'
],
'reported' => '2015-10-10'
},
{
'affected_versions' => [
'<1.03'
],
'cves' => [],
'description' => 'CDialog and Whiptail backends usage of the temp files.
',
'distribution' => 'UI-Dialog',
'fixed_versions' => [
'>=1.03'
],
'id' => 'CPANSA-UI-Dialog-2004-01',
'references' => [
'https://metacpan.org/changes/distribution/UI-Dialog'
],
'reported' => '2004-02-18'
},
{
'affected_versions' => [
'<=1.09'
],
'cves' => [
'CVE-2008-7315'
],
'description' => 'UI-Dialog 1.09 and earlier allows remote attackers to execute arbitrary commands.
',
'distribution' => 'UI-Dialog',
'fixed_versions' => [
'>1.09'
],
'id' => 'CPANSA-UI-Dialog-2008-7315',
'references' => [
'https://security-tracker.debian.org/tracker/CVE-2008-7315/',
'https://rt.cpan.org/Public/Bug/Display.html?id=107364',
'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496448',
'http://www.securityfocus.com/bid/77031/info',
'http://www.openwall.com/lists/oss-security/2015/10/08/6'
],
'reported' => '2017-10-10',
'severity' => 'critical'
}
],
'main_module' => 'UI::Dialog',
'versions' => [
{
'date' => '2004-01-04T10:51:34',
'version' => '1.00'
},
{
'date' => '2004-01-13T00:08:39',
'version' => '1.01'
},
{
'date' => '2004-02-15T11:03:37',
'version' => '1.02'
},
{
'date' => '2004-02-18T16:52:59',
'version' => '1.03'
},
{
'date' => '2004-02-22T18:34:25',
'version' => '1.04'
},
{
'date' => '2004-03-18T02:12:03',
'version' => '1.05'
},
{
'date' => '2004-03-18T16:01:50',
'version' => '1.06'
},
{
'date' => '2004-07-21T19:59:51',
'version' => '1.07'
},
{
'date' => '2004-10-05T00:46:22',
'version' => '1.08'
},
{
'date' => '2013-08-10T09:39:07',
'version' => '1.09'
},
{
'date' => '2013-08-10T17:09:57',
'version' => '1.09'
},
{
'date' => '2013-08-19T17:22:00',
'version' => '1.09'
},
{
'date' => '2016-01-19T19:05:07',
'version' => '1.11'
},
{
'date' => '2016-01-22T06:42:45',
'version' => '1.12'
},
{
'date' => '2016-01-30T21:24:56',
'version' => '1.13'
},
{
'date' => '2016-02-03T02:10:12',
'version' => '1.14'
},
{
'date' => '2016-02-09T00:11:17',
'version' => '1.15'
},
{
'date' => '2016-02-10T02:57:43',
'version' => '1.16'
},
{
'date' => '2016-02-12T05:25:14',
'version' => '1.17'
},
{
'date' => '2016-02-13T02:56:26',
'version' => '1.18'
},
{
'date' => '2016-02-21T23:33:48',
'version' => '1.19'
},
{
'date' => '2016-03-07T02:15:26',
'version' => '1.20'
},
{
'date' => '2016-04-02T22:17:32',
'version' => '1.21'
}
]
},
'Valiant' => {
'advisories' => [
{
'affected_versions' => [
'<0.002011'
],
'cves' => [],
'description' => 'closed potential security issue with deeply nested paramters in the DBIC glue code. This was a hack that could let someone create a child record if you were allowing find_by_unique rather than find by primary key.
',
'distribution' => 'Valiant',
'fixed_versions' => [
'>=0.002011'
],
'id' => 'CPANSA-Valiant-2024-001',
'references' => [
'https://github.com/briandfoy/cpan-security-advisory/issues/175',
'https://github.com/jjn1056/Valiant/commit/242348776cc01e736397767f11f86cc4055817c4'
],
'reported' => undef,
'severity' => undef
}
],
'main_module' => 'Valiant',
'versions' => [
{
'date' => '2021-02-25T17:30:04',
'version' => '0.001001'
},
{
'date' => '2021-02-25T17:57:04',
'version' => '0.001002'
},
{
'date' => '2021-03-04T15:56:07',
'version' => '0.001003'
},
{
'date' => '2021-04-07T14:42:08',
'version' => '0.001004'
},
{
'date' => '2021-04-18T12:44:18',
'version' => '0.001005'
},
{
'date' => '2021-04-20T01:13:20',
'version' => '0.001006'
},
{
'date' => '2021-09-07T01:06:25',
'version' => '0.001007'
},
{
'date' => '2021-09-14T14:58:28',
'version' => '0.001008'
},
{
'date' => '2021-10-01T17:54:48',
'version' => '0.001009'
},
{
'date' => '2021-10-26T17:09:00',
'version' => '0.001010'
},
{
'date' => '2021-11-03T21:55:14',
'version' => '0.001011'
},
{
'date' => '2022-02-27T23:39:59',
'version' => '0.001012'
},
{
'date' => '2022-03-03T14:37:57',
'version' => '0.001013'
},
{
'date' => '2022-03-04T15:43:13',
'version' => '0.001014'
},
{
'date' => '2022-08-03T23:46:42',
'version' => '0.001015'
},
{
'date' => '2022-09-11T19:09:30',
'version' => '0.001016'
},
{
'date' => '2022-12-06T23:57:19',
'version' => '0.001017'
},
{
'date' => '2023-04-06T18:14:16',
'version' => '0.001018'
},
{
'date' => '2023-04-08T22:55:02',
'version' => '0.001019'
},
{
'date' => '2023-04-09T19:34:57',
'version' => '0.001020'
},
{
'date' => '2023-04-10T21:53:58',
'version' => '0.001021'
},
{
'date' => '2023-04-18T13:17:26',
'version' => '0.001022'
},
{
'date' => '2023-07-13T01:06:07',
'version' => '0.001023'
},
{
'date' => '2023-07-14T12:59:23',
'version' => '0.001024'
},
{
'date' => '2023-08-02T23:49:48',
'version' => '0.001025'
},
{
'date' => '2023-08-03T22:50:38',
'version' => '0.001026'
},
{
'date' => '2023-08-11T22:44:06',
'version' => '0.002001'
},
{
'date' => '2023-08-27T14:18:29',
'version' => '0.002002'
},
{
'date' => '2023-10-04T17:28:16',
'version' => '0.002003'
},
{
'date' => '2024-07-29T19:33:48',
'version' => '0.002004'
},
{
'date' => '2024-10-02T00:46:07',
'version' => '0.002005'
},
{
'date' => '2024-11-11T21:41:15',
'version' => '0.002006'
},
{
'date' => '2024-11-26T18:52:22',
'version' => '0.002007'
},
{
'date' => '2024-11-29T16:12:40',
'version' => '0.002008'
},
{
'date' => '2024-12-05T17:37:52',
'version' => '0.002009'
},
{
'date' => '2024-12-07T15:43:12',
'version' => '0.002010'
},
{
'date' => '2024-12-07T19:59:50',
'version' => '0.002011'
},
{
'date' => '2024-12-12T22:53:06',
'version' => '0.002012'
},
{
'date' => '2025-01-02T02:25:00',
'version' => '0.002013'
},
{
'date' => '2025-01-02T15:12:36',
'version' => '0.002014'
},
{
'date' => '2025-01-02T16:14:29',
'version' => '0.002015'
}
]
},
'WWW-Mechanize' => {
'advisories' => [
{
'affected_versions' => [
'<1.05_03'
],
'cves' => [],
'description' => 'find_link() uses eval().
',
'distribution' => 'WWW-Mechanize',
'fixed_versions' => [
'>=1.05_03'
],
'id' => 'CPANSA-WWW-Mechanize-2004-01',
'references' => [
'https://metacpan.org/dist/WWW-Mechanize/changes'
],
'reported' => '2004-10-31',
'severity' => undef
}
],
'main_module' => 'WWW::Mechanize',
'versions' => [
{
'date' => '2002-09-10T21:50:10',
'version' => '0.30'
},
{
'date' => '2002-09-13T20:19:21',
'version' => '0.31'
},
{
'date' => '2002-10-24T04:25:30',
'version' => '0.32'
},
{
'date' => '2003-01-16T16:05:31',
'version' => '0.33'
},
{
'date' => '2003-01-22T23:57:57',
'version' => '0.35'
},
{
'date' => '2003-02-04T17:40:03',
'version' => '0.36'
},
{
'date' => '2003-03-04T21:13:29',
'version' => '0.37'
},
{
'date' => '2003-03-25T05:52:17',
'version' => '0.38'
},
{
'date' => '2003-04-02T05:31:16',
'version' => '0.39'
},
{
'date' => '2003-04-20T02:56:53',
'version' => '0.40'
},
{
'date' => '2003-05-23T04:29:22',
'version' => '0.41'
},
{
'date' => '2003-05-27T03:44:25',
'version' => '0.42'
},
{
'date' => '2003-05-29T14:30:01',
'version' => '0.43'
},
{
'date' => '2003-06-05T17:16:31',
'version' => '0.44'
},
{
'date' => '2003-06-17T04:25:04',
'version' => '0.45'
},
{
'date' => '2003-06-20T16:17:58',
'version' => '0.46'
},
{
'date' => '2003-06-22T03:54:22',
'version' => '0.47'
},
{
'date' => '2003-06-22T18:56:42',
'version' => '0.48'
},
{
'date' => '2003-06-23T19:49:13',
'version' => '0.49'
},
{
'date' => '2003-06-24T14:54:50',
'version' => '0.50'
},
{
'date' => '2003-06-30T02:43:06',
'version' => '0.51'
},
{
'date' => '2003-07-08T23:52:55',
'version' => '0.52'
},
{
'date' => '2003-07-17T17:26:47',
'version' => '0.53'
},
{
'date' => '2003-07-20T05:50:27',
'version' => '0.54'
},
{
'date' => '2003-07-22T17:15:43',
'version' => '0.55'
},
{
'date' => '2003-07-24T17:25:57',
'version' => '0.56'
},
{
'date' => '2003-08-01T04:36:32',
'version' => '0.57'
},
{
'date' => '2003-08-15T04:41:26',
'version' => '0.58'
},
{
'date' => '2003-09-04T05:33:00',
'version' => '0.59'
},
{
'date' => '2003-09-23T04:32:57',
'version' => '0.60'
},
{
'date' => '2003-10-06T23:41:02',
'version' => '0.61'
},
{
'date' => '2003-10-08T01:55:58',
'version' => '0.62'
},
{
'date' => '2003-10-13T20:24:52',
'version' => '0.63'
},
{
'date' => '2003-10-24T04:57:15',
'version' => '0.64'
},
{
'date' => '2003-11-10T06:19:18',
'version' => '0.65'
},
{
'date' => '2003-11-13T21:09:41',
'version' => '0.66'
},
{
'date' => '2003-11-26T05:21:34',
'version' => '0.69_01'
},
{
'date' => '2003-12-01T05:52:38',
'version' => '0.70'
},
{
'date' => '2003-12-22T05:53:11',
'version' => '0.71_01'
},
{
'date' => '2003-12-22T21:01:12',
'version' => '0.71_02'
},
{
'date' => '2004-01-13T04:45:37',
'version' => '0.72'
},
{
'date' => '2004-02-29T05:58:51',
'version' => '0.73_01'
},
{
'date' => '2004-03-03T05:57:51',
'version' => '0.73_02'
},
{
'date' => '2004-03-21T06:08:45',
'version' => '0.73_03'
},
{
'date' => '2004-03-23T05:41:11',
'version' => '0.74'
},
{
'date' => '2004-03-28T04:54:18',
'version' => '0.75_01'
},
{
'date' => '2004-04-05T05:01:50',
'version' => '0.75_02'
},
{
'date' => '2004-04-08T03:05:29',
'version' => '0.76'
},
{
'date' => '2004-04-10T05:55:21',
'version' => '1.00'
},
{
'date' => '2004-04-14T04:14:17',
'version' => '1.02'
},
{
'date' => '2004-05-27T20:23:15',
'version' => '1.03_01'
},
{
'date' => '2004-08-17T04:10:41',
'version' => '1.03_02'
},
{
'date' => '2004-09-16T04:32:03',
'version' => '1.04'
},
{
'date' => '2004-10-01T02:18:55',
'version' => '1.05_01'
},
{
'date' => '2004-10-02T22:08:55',
'version' => '1.05_02'
},
{
'date' => '2004-11-01T03:25:19',
'version' => '1.05_03'
},
{
'date' => '2004-11-06T05:39:06',
'version' => '1.05_04'
},
{
'date' => '2004-12-08T21:25:06',
'version' => '1.06'
},
{
'date' => '2004-12-24T07:08:27',
'version' => '1.08'
},
{
'date' => '2005-02-02T05:58:14',
'version' => '1.10'
},
{
'date' => '2005-02-14T06:21:29',
'version' => '1.11_01'
},
{
'date' => '2005-02-22T04:05:23',
'version' => '1.11_02'
},
{
'date' => '2005-02-25T05:50:52',
'version' => '1.12'
},
{
'date' => '2005-04-12T19:32:06',
'version' => '1.13_01'
},
{
'date' => '2005-08-30T22:32:23',
'version' => '1.14'
},
{
'date' => '2005-10-28T22:38:43',
'version' => '1.16'
},
{
'date' => '2006-01-12T22:26:07',
'version' => '1.17_01'
},
{
'date' => '2006-02-02T06:32:25',
'version' => '1.18'
},
{
'date' => '2006-08-08T05:13:01',
'version' => '1.19_02'
},
{
'date' => '2006-08-19T06:44:58',
'version' => '1.20'
},
{
'date' => '2006-09-18T22:22:26',
'version' => '1.21_01'
},
{
'date' => '2006-10-04T18:17:54',
'version' => '1.21_02'
},
{
'date' => '2006-10-07T06:26:26',
'version' => '1.21_03'
},
{
'date' => '2006-10-08T02:39:57',
'version' => '1.21_04'
},
{
'date' => '2007-03-02T06:09:51',
'version' => '1.22'
},
{
'date' => '2007-05-11T21:01:11',
'version' => '1.24'
},
{
'date' => '2007-05-16T05:27:55',
'version' => '1.26'
},
{
'date' => '2007-05-22T19:16:39',
'version' => '1.29_01'
},
{
'date' => '2007-05-25T02:37:45',
'version' => '1.30'
},
{
'date' => '2007-09-18T04:39:11',
'version' => '1.31_01'
},
{
'date' => '2007-10-25T16:59:57',
'version' => '1.31_02'
},
{
'date' => '2007-10-30T17:09:44',
'version' => '1.32'
},
{
'date' => '2007-12-10T06:39:14',
'version' => '1.34'
},
{
'date' => '2008-09-28T04:52:28',
'version' => '1.49_01'
},
{
'date' => '2008-10-27T04:12:02',
'version' => '1.50'
},
{
'date' => '2008-11-06T21:12:28',
'version' => '1.51_01'
},
{
'date' => '2008-11-18T07:34:58',
'version' => '1.51_02'
},
{
'date' => '2008-11-20T17:07:18',
'version' => '1.51_03'
},
{
'date' => '2008-11-25T15:56:37',
'version' => '1.52'
},
{
'date' => '2009-01-12T06:51:13',
'version' => '1.54'
},
{
'date' => '2009-07-06T17:20:24',
'version' => '1.55_01'
},
{
'date' => '2009-07-10T22:13:25',
'version' => '1.56'
},
{
'date' => '2009-07-14T03:40:28',
'version' => '1.58'
},
{
'date' => '2009-08-17T06:04:34',
'version' => '1.60'
},
{
'date' => '2010-04-11T04:14:18',
'version' => '1.62'
},
{
'date' => '2010-07-01T15:49:38',
'version' => '1.64'
},
{
'date' => '2010-09-10T22:10:32',
'version' => '1.66'
},
{
'date' => '2011-04-07T05:12:31',
'version' => '1.67_01'
},
{
'date' => '2011-04-21T15:11:30',
'version' => '1.68'
},
{
'date' => '2011-08-01T21:49:08',
'version' => '1.69_01'
},
{
'date' => '2011-08-26T17:52:15',
'version' => '1.70'
},
{
'date' => '2011-11-25T18:39:23',
'version' => '1.71'
},
{
'date' => '2012-02-02T23:40:39',
'version' => '1.72'
},
{
'date' => '2012-03-24T16:20:29',
'version' => '1.72_01'
},
{
'date' => '2012-04-27T00:35:00',
'version' => '1.72_02'
},
{
'date' => '2013-08-24T04:33:44',
'version' => '1.73'
},
{
'date' => '2015-01-24T05:52:57',
'version' => '1.74'
},
{
'date' => '2015-06-03T03:27:34',
'version' => '1.75'
},
{
'date' => '2016-07-29T16:21:58',
'version' => '1.76'
},
{
'date' => '2016-08-05T16:58:03',
'version' => '1.77'
},
{
'date' => '2016-08-08T13:30:07',
'version' => '1.78'
},
{
'date' => '2016-09-17T04:05:20',
'version' => '1.79'
},
{
'date' => '2016-09-25T02:46:39',
'version' => '1.80'
},
{
'date' => '2016-10-06T12:55:47',
'version' => '1.81'
},
{
'date' => '2016-10-07T13:50:48',
'version' => '1.82'
},
{
'date' => '2016-10-14T20:59:34',
'version' => '1.83'
},
{
'date' => '2017-03-07T18:46:19',
'version' => '1.84'
},
{
'date' => '2017-06-28T22:11:34',
'version' => '1.85'
},
{
'date' => '2017-07-04T15:51:05',
'version' => '1.86'
},
{
'date' => '2018-02-07T22:07:28',
'version' => '1.87'
},
{
'date' => '2018-03-23T15:41:01',
'version' => '1.88'
},
{
'date' => '2018-10-18T19:56:43',
'version' => '1.89'
},
{
'date' => '2018-11-12T18:53:49',
'version' => '1.90'
},
{
'date' => '2019-01-10T19:04:12',
'version' => '1.91'
},
{
'date' => '2019-08-24T01:02:55',
'version' => '1.92'
},
{
'date' => '2019-10-04T21:10:14',
'version' => '1.93'
},
{
'date' => '2019-10-10T13:15:13',
'version' => '1.94'
},
{
'date' => '2019-10-28T13:17:10',
'version' => '1.95'
},
{
'date' => '2020-02-21T02:27:01',
'version' => '1.96'
},
{
'date' => '2020-05-14T00:48:07',
'version' => '1.97'
},
{
'date' => '2020-05-25T17:08:10',
'version' => '1.98'
},
{
'date' => '2020-06-08T15:44:13',
'version' => '1.99'
},
{
'date' => '2020-06-09T19:17:21',
'version' => '2.00'
},
{
'date' => '2020-09-18T17:52:29',
'version' => '2.01'
},
{
'date' => '2020-10-13T13:53:04',
'version' => '2.02'
},
{
'date' => '2020-11-10T14:49:20',
'version' => '2.03'
},
{
'date' => '2021-08-06T12:35:04',
'version' => '2.04'
},
{
'date' => '2021-09-21T14:23:14',
'version' => '2.05'
},
{
'date' => '2021-10-25T21:00:18',
'version' => '2.06'
},
{
'date' => '2022-04-29T15:40:57',
'version' => '2.07'
},
{
'date' => '2022-05-30T17:33:59',
'version' => '2.08'
},
{
'date' => '2022-06-14T14:22:59',
'version' => '2.09'
},
{
'date' => '2022-07-04T21:09:58',
'version' => '2.10'
},
{
'date' => '2022-07-17T17:27:26',
'version' => '2.11'
},
{
'date' => '2022-07-20T06:47:33',
'version' => '2.12'
},
{
'date' => '2022-07-29T09:50:42',
'version' => '2.13'
},
{
'date' => '2022-08-15T19:26:39',
'version' => '2.14'
},
{
'date' => '2022-08-21T08:24:07',
'version' => '2.15'
},
{
'date' => '2023-02-11T12:11:44',
'version' => '2.16'
},
{
'date' => '2023-04-27T15:49:35',
'version' => '2.17'
},
{
'date' => '2024-01-30T14:34:27',
'version' => '2.18'
},
{
'date' => '2024-09-16T15:28:35',
'version' => '2.19'
}
]
},
'Win32-File-Summary' => {
'advisories' => [
{
'affected_versions' => [
'>0'
],
'cves' => [
'CVE-2018-12015'
],
'description' => 'In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypass a directory-traversal protection mechanism, and overwrite arbitrary files, via an archive file containing a symlink and a regular file with the same name.
',
'distribution' => 'Win32-File-Summary',
'embedded_vulnerability' => {
'distributed_version' => '0.072',
'name' => 'Archive::Tar'
},
'fixed_versions' => [],
'id' => 'CPANSA-Win32-File-Summary-2018-01',
'references' => [
'https://security-tracker.debian.org/tracker/CVE-2018-12015',
'https://github.com/jib/archive-tar-new/commit/ae65651eab053fc6dc4590dbb863a268215c1fc5'
],
'reported' => '2018-06-12',
'severity' => 'medium'
},
{
'affected_versions' => [
'>0'
],
'cves' => [
'CVE-2007-4829'
],
'description' => 'Directory traversal vulnerability in the Archive::Tar Perl module 1.36 and earlier allows user-assisted remote attackers to overwrite arbitrary files via a TAR archive that contains a file whose name is an absolute path or has ".." sequences.
',
'distribution' => 'Win32-File-Summary',
'embedded_vulnerability' => {
'distributed_version' => '0.072',
'name' => 'Archive::Tar'
},
'fixed_versions' => [],
'id' => 'CPANSA-Win32-File-Summary-2007-4829',
'references' => [
'http://rt.cpan.org/Public/Bug/Display.html?id=29517',
'https://bugzilla.redhat.com/show_bug.cgi?id=295021',
'http://rt.cpan.org/Public/Bug/Display.html?id=30380',
'https://issues.rpath.com/browse/RPL-1716',
'http://www.securityfocus.com/bid/26355',
'http://secunia.com/advisories/27539',
'http://osvdb.org/40410',
'http://www.ubuntu.com/usn/usn-700-1',
'http://secunia.com/advisories/33314',
'http://www.ubuntu.com/usn/usn-700-2',
'http://www.gentoo.org/security/en/glsa/glsa-200812-10.xml',
'http://secunia.com/advisories/33116',
'http://www.vupen.com/english/advisories/2007/3755',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/38285',
'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11658'
],
'reported' => '2007-11-02',
'severity' => undef
},
{
'affected_versions' => [
'>0'
],
'cves' => [
'CVE-2016-1238'
],
'description' => '\'(1) cpan/Win32-File-Summary/bin/ptar, (2) cpan/Win32-File-Summary/bin/ptardiff, (3) cpan/Win32-File-Summary/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.\'
',
'distribution' => 'Win32-File-Summary',
'embedded_vulnerability' => {
'distributed_version' => '0.072',
'name' => 'Archive::Tar'
},
'fixed_versions' => [],
'id' => 'CPANSA-Win32-File-Summary-2016-1238',
'references' => [
'http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html',
'http://www.securitytracker.com/id/1036440',
'http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab',
'https://rt.perl.org/Public/Bug/Display.html?id=127834',
'http://www.securityfocus.com/bid/92136',
'http://www.debian.org/security/2016/dsa-3628',
'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/',
'https://security.gentoo.org/glsa/201701-75',
'https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E',
'https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html',
'https://security.gentoo.org/glsa/201812-07',
'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html'
],
'reported' => '2016-08-02',
'severity' => 'high'
}
],
'main_module' => 'Win32::File::Summary',
'versions' => [
{
'date' => '2005-04-24T18:36:18',
'version' => '0.01'
},
{
'date' => '2005-04-25T15:18:03',
'version' => '0.01'
},
{
'date' => '2005-04-30T12:09:11',
'version' => '0.01'
},
{
'date' => '2005-05-17T09:52:46',
'version' => '0.01'
},
{
'date' => '2005-08-06T18:10:08',
'version' => '0.01'
},
{
'date' => '2005-08-24T04:39:30',
'version' => '0.01'
},
{
'date' => '2006-06-11T14:15:36',
'version' => '0.01'
}
]
},
'XAO-Web' => {
'advisories' => [
{
'affected_versions' => [
'<1.84'
],
'cves' => [
'CVE-2020-36827'
],
'description' => 'Embedded HTML in JSON data was not escaped.
',
'distribution' => 'XAO-Web',
'fixed_versions' => [
'>=1.84'
],
'id' => 'CPANSA-XAO-Web-2020-01',
'references' => [
'https://github.com/amaltsev/XAO-Web/commit/20dd1d3bc5b811503f5722a16037b60197fe7ef4',
'https://metacpan.org/release/AMALTSEV/XAO-Web-1.84/changes'
],
'reported' => '2020-09-18',
'severity' => undef
}
],
'main_module' => 'XAO::Web',
'versions' => [
{
'date' => '2002-01-03T03:05:25',
'version' => '1.0'
},
{
'date' => '2002-01-04T02:47:11',
'version' => '1.01'
},
{
'date' => '2002-01-04T03:44:00',
'version' => '1.02'
},
{
'date' => '2002-03-19T04:56:54',
'version' => '1.03'
},
{
'date' => '2002-11-09T02:33:07',
'version' => '1.04'
},
{
'date' => '2003-11-13T02:15:48',
'version' => '1.05'
},
{
'date' => '2003-11-13T07:09:31',
'version' => '1.05'
},
{
'date' => '2005-01-14T01:48:49',
'version' => '1.06'
},
{
'date' => '2005-02-01T03:24:39',
'version' => '1.07'
},
{
'date' => '2017-04-19T20:26:55',
'version' => '1.45'
},
{
'date' => '2017-04-20T00:32:26',
'version' => '1.46'
},
{
'date' => '2017-05-01T19:57:48',
'version' => '1.47'
},
{
'date' => '2018-07-07T00:42:57',
'version' => '1.68'
},
{
'date' => '2018-07-07T03:29:38',
'version' => '1.69'
},
{
'date' => '2018-07-07T16:38:26',
'version' => '1.70'
},
{
'date' => '2018-07-30T13:35:32',
'version' => '1.71'
},
{
'date' => '2018-10-20T00:50:11',
'version' => '1.72'
},
{
'date' => '2018-10-25T19:16:09',
'version' => '1.73'
},
{
'date' => '2018-10-30T01:27:58',
'version' => '1.74'
},
{
'date' => '2019-01-10T02:17:29',
'version' => '1.75'
},
{
'date' => '2019-03-02T17:38:20',
'version' => '1.76'
},
{
'date' => '2019-04-26T23:13:56',
'version' => '1.77'
},
{
'date' => '2019-11-20T20:52:59',
'version' => '1.78'
},
{
'date' => '2019-12-24T02:26:57',
'version' => '1.79'
},
{
'date' => '2020-01-10T01:19:32',
'version' => '1.80'
},
{
'date' => '2020-07-21T02:08:41',
'version' => '1.81'
},
{
'date' => '2020-08-26T22:28:48',
'version' => '1.82'
},
{
'date' => '2020-08-26T23:19:26',
'version' => '1.83'
},
{
'date' => '2020-09-18T03:22:46',
'version' => '1.84'
},
{
'date' => '2020-09-22T23:47:44',
'version' => '1.85'
},
{
'date' => '2020-09-23T00:51:16',
'version' => '1.86'
},
{
'date' => '2021-06-08T22:38:04',
'version' => '1.87'
},
{
'date' => '2022-04-09T02:06:50',
'version' => '1.88'
},
{
'date' => '2022-07-02T00:05:43',
'version' => '1.89'
},
{
'date' => '2022-12-08T04:50:55',
'version' => '1.90'
},
{
'date' => '2023-05-22T21:52:57',
'version' => '1.91'
}
]
},
'XML-Atom' => {
'advisories' => [
{
'affected_versions' => [
'<0.39'
],
'cves' => [
'CVE-2012-1102'
],
'description' => 'It was discovered that the XML::Atom Perl module before version 0.39 did not disable external entities when parsing XML from potentially untrusted sources. This may allow attackers to gain read access to otherwise protected resources, depending on how the library is used.
',
'distribution' => 'XML-Atom',
'fixed_versions' => [],
'id' => 'CPANSA-XML-Atom-2012-1102',
'references' => [
'https://seclists.org/oss-sec/2012/q1/549',
'https://metacpan.org/release/MIYAGAWA/XML-Atom-0.39/source/Changes'
],
'reported' => '2021-07-09',
'severity' => 'high'
}
],
'main_module' => 'XML::Atom',
'versions' => [
{
'date' => '2003-09-08T04:47:09',
'version' => '0.01'
},
{
'date' => '2003-09-28T23:11:32',
'version' => '0.02'
},
{
'date' => '2003-12-05T09:20:27',
'version' => '0.03'
},
{
'date' => '2003-12-15T08:03:04',
'version' => '0.04'
},
{
'date' => '2003-12-15T17:10:29',
'version' => '0.041'
},
{
'date' => '2004-01-06T05:04:22',
'version' => '0.05'
},
{
'date' => '2004-04-24T23:47:03',
'version' => '0.06'
},
{
'date' => '2004-05-16T01:13:46',
'version' => '0.07'
},
{
'date' => '2004-06-02T06:05:57',
'version' => '0.08'
},
{
'date' => '2004-07-30T05:49:54',
'version' => '0.09'
},
{
'date' => '2005-01-01T00:20:55',
'version' => '0.10'
},
{
'date' => '2005-02-24T03:19:08',
'version' => '0.11'
},
{
'date' => '2005-06-07T05:13:21',
'version' => '0.12'
},
{
'date' => '2005-07-19T21:00:39',
'version' => '0.12_01'
},
{
'date' => '2005-08-16T21:46:06',
'version' => '0.12_02'
},
{
'date' => '2005-08-18T07:18:26',
'version' => '0.13'
},
{
'date' => '2005-09-14T05:38:53',
'version' => '0.13_01'
},
{
'date' => '2005-10-21T04:55:40',
'version' => '0.14'
},
{
'date' => '2005-11-01T05:55:40',
'version' => '0.15'
},
{
'date' => '2005-11-22T21:17:26',
'version' => '0.16'
},
{
'date' => '2006-02-22T23:24:00',
'version' => '0.17'
},
{
'date' => '2006-03-16T06:14:49',
'version' => '0.18'
},
{
'date' => '2006-03-19T05:03:12',
'version' => '0.19'
},
{
'date' => '2006-04-30T16:49:38',
'version' => '0.19_01'
},
{
'date' => '2006-07-07T06:39:52',
'version' => '0.19_03'
},
{
'date' => '2006-07-12T03:44:58',
'version' => '0.20'
},
{
'date' => '2006-07-12T17:44:49',
'version' => '0.21'
},
{
'date' => '2006-07-19T10:42:43',
'version' => '0.21_01'
},
{
'date' => '2006-07-20T08:07:49',
'version' => '0.21_02'
},
{
'date' => '2006-07-21T10:15:06',
'version' => '0.21_03'
},
{
'date' => '2006-07-24T20:00:37',
'version' => '0.22'
},
{
'date' => '2006-08-27T05:53:47',
'version' => '0.22_01'
},
{
'date' => '2006-08-27T06:42:17',
'version' => '0.23'
},
{
'date' => '2006-11-25T23:03:57',
'version' => '0.24'
},
{
'date' => '2006-11-30T23:14:23',
'version' => '0.25'
},
{
'date' => '2007-04-27T20:57:39',
'version' => '0.25_01'
},
{
'date' => '2007-06-20T19:23:36',
'version' => '0.25_02'
},
{
'date' => '2007-09-16T04:24:44',
'version' => '0.26'
},
{
'date' => '2007-09-16T04:41:58',
'version' => '0.27'
},
{
'date' => '2007-10-04T20:30:48',
'version' => '0.27_01'
},
{
'date' => '2007-11-06T21:08:06',
'version' => '0.28'
},
{
'date' => '2008-10-26T00:27:44',
'version' => '0.29'
},
{
'date' => '2008-11-12T22:45:37',
'version' => '0.30'
},
{
'date' => '2008-11-13T21:19:34',
'version' => '0.31'
},
{
'date' => '2008-11-23T22:07:41',
'version' => '0.32'
},
{
'date' => '2009-01-07T02:00:59',
'version' => '0.33'
},
{
'date' => '2009-04-29T17:46:03',
'version' => '0.34'
},
{
'date' => '2009-05-01T23:42:30',
'version' => '0.35'
},
{
'date' => '2009-12-21T22:02:23',
'version' => '0.36'
},
{
'date' => '2009-12-29T02:32:53',
'version' => '0.37'
},
{
'date' => '2011-05-23T02:57:51',
'version' => '0.38'
},
{
'date' => '2011-06-21T04:07:51',
'version' => '0.39'
},
{
'date' => '2011-09-18T19:43:27',
'version' => '0.40'
},
{
'date' => '2011-09-27T01:44:56',
'version' => '0.41'
},
{
'date' => '2017-05-12T05:34:02',
'version' => '0.42'
},
{
'date' => '2021-04-28T20:40:29',
'version' => '0.43'
}
]
},
'XML-DT' => {
'advisories' => [
{
'affected_versions' => [
'<0.64'
],
'cves' => [
'CVE-2014-5260'
],
'description' => 'The (1) mkxmltype and (2) mkdtskel scripts in XML-DT before 0.64 allow local users to overwrite arbitrary files via a symlink attack on a /tmp/_xml_##### temporary file.
',
'distribution' => 'XML-DT',
'fixed_versions' => [],
'id' => 'CPANSA-XML-DT-2014-5260',
'references' => [
'http://openwall.com/lists/oss-security/2014/08/15/8',
'https://metacpan.org/diff/file?target=AMBS/XML-DT-0.64/&source=AMBS/XML-DT-0.63/',
'https://metacpan.org/source/AMBS/XML-DT-0.66/Changes',
'https://bugs.debian.org/756566'
],
'reported' => '2014-08-16',
'severity' => undef
}
],
'main_module' => 'XML::DT',
'versions' => [
{
'date' => '1999-07-30T13:04:11',
'version' => '0.11'
},
{
'date' => '2000-04-07T09:24:55',
'version' => '0.14'
},
{
'date' => '2000-09-19T17:03:40',
'version' => '0.15'
},
{
'date' => '2000-10-16T16:21:54',
'version' => '0.16'
},
{
'date' => '2000-11-30T12:37:27',
'version' => '0.19'
},
{
'date' => '2002-03-07T17:54:06',
'version' => '0.20'
},
{
'date' => '2002-05-28T12:35:07',
'version' => '0.21'
},
{
'date' => '2002-12-20T17:31:58',
'version' => '0.22'
},
{
'date' => '2002-12-27T09:10:47',
'version' => '0.23'
},
{
'date' => '2003-02-20T16:16:43',
'version' => '0.24'
},
{
'date' => '2003-06-17T10:15:16',
'version' => 'v0.24.1'
},
{
'date' => '2003-10-09T08:12:32',
'version' => '0.25'
},
{
'date' => '2003-10-13T07:47:22',
'version' => '0.25'
},
{
'date' => '2003-11-14T10:55:50',
'version' => '0.27'
},
{
'date' => '2003-12-16T14:25:13',
'version' => '0.28'
},
{
'date' => '2004-01-07T11:38:24',
'version' => '0.29'
},
{
'date' => '2004-01-22T11:25:21',
'version' => '0.30'
},
{
'date' => '2004-08-09T17:43:41',
'version' => '0.31'
},
{
'date' => '2004-09-20T19:15:56',
'version' => '0.32'
},
{
'date' => '2004-10-03T19:21:18',
'version' => '0.33'
},
{
'date' => '2004-10-30T14:43:29',
'version' => '0.34'
},
{
'date' => '2004-11-15T16:39:19',
'version' => '0.35'
},
{
'date' => '2004-11-19T17:29:05',
'version' => '0.36'
},
{
'date' => '2004-11-21T16:27:45',
'version' => '0.37'
},
{
'date' => '2004-12-24T16:34:24',
'version' => '0.38'
},
{
'date' => '2005-03-22T12:05:18',
'version' => '0.39'
},
{
'date' => '2005-04-06T08:14:46',
'version' => '0.40'
},
{
'date' => '2005-07-20T20:28:06',
'version' => '0.41'
},
{
'date' => '2005-09-18T16:06:11',
'version' => '0.42'
},
{
'date' => '2006-05-15T09:08:21',
'version' => '0.43'
},
{
'date' => '2006-05-15T09:33:07',
'version' => '0.44'
},
{
'date' => '2006-05-16T14:14:36',
'version' => '0.45'
},
{
'date' => '2006-11-03T09:39:12',
'version' => '0.46'
},
{
'date' => '2006-11-23T18:14:09',
'version' => '0.47'
},
{
'date' => '2008-02-20T22:00:02',
'version' => '0.48'
},
{
'date' => '2008-02-20T22:16:45',
'version' => '0.49'
},
{
'date' => '2008-02-21T22:02:53',
'version' => '0.50'
},
{
'date' => '2008-02-22T17:19:12',
'version' => '0.51'
},
{
'date' => '2008-10-22T09:12:08',
'version' => '0.52'
},
{
'date' => '2009-01-18T20:10:36',
'version' => '0.53'
},
{
'date' => '2010-11-19T16:27:23',
'version' => '0.54'
},
{
'date' => '2011-02-12T22:08:27',
'version' => '0.55'
},
{
'date' => '2011-02-12T22:09:55',
'version' => '0.56'
},
{
'date' => '2012-04-07T20:30:58',
'version' => '0.57'
},
{
'date' => '2012-04-09T10:19:15',
'version' => '0.58'
},
{
'date' => '2012-06-05T13:37:08',
'version' => '0.59'
},
{
'date' => '2012-06-25T16:57:54',
'version' => '0.60'
},
{
'date' => '2012-06-25T17:04:58',
'version' => '0.61'
},
{
'date' => '2012-06-25T19:02:40',
'version' => '0.62'
},
{
'date' => '2013-03-25T22:27:48',
'version' => '0.63'
},
{
'date' => '2014-07-31T19:46:44',
'version' => '0.64'
},
{
'date' => '2014-08-01T13:00:43',
'version' => '0.65'
},
{
'date' => '2014-08-15T20:17:39',
'version' => '0.66'
},
{
'date' => '2015-03-15T18:28:49',
'version' => '0.67'
},
{
'date' => '2015-09-29T08:06:14',
'version' => '0.68'
},
{
'date' => '2019-04-22T17:01:30',
'version' => '0.69'
}
]
},
'XML-LibXML' => {
'advisories' => [
{
'affected_versions' => [
'<2.0120'
],
'cves' => [
'CVE-2015-3451'
],
'description' => 'The _clone function does not properly set the expand_entities option, which allows remote attackers to conduct XML external entity (XXE) attacks via crafted XML data to the (1) new or (2) load_xml function.
',
'distribution' => 'XML-LibXML',
'fixed_versions' => [
'>=2.0120'
],
'id' => 'CPANSA-XML-LibXML-2015-01',
'references' => [
'https://metacpan.org/changes/distribution/XML-LibXML'
],
'reported' => '2015-04-23'
},
{
'affected_versions' => [
'<2.0129'
],
'cves' => [
'CVE-2017-10672'
],
'description' => 'Use-after-free in the XML-LibXML module through 2.0129 for Perl allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call.
',
'distribution' => 'XML-LibXML',
'fixed_versions' => [
'>=2.0129'
],
'id' => 'CPANSA-XML-LibXML-2017-01',
'references' => [
'https://www.debian.org/security/2017/dsa-4042',
'https://rt.cpan.org/Public/Bug/Display.html?id=122246',
'https://lists.debian.org/debian-lts-announce/2017/11/msg00017.html'
],
'reported' => '2015-04-23'
}
],
'main_module' => 'XML::LibXML',
'versions' => [
{
'date' => '2001-05-18T11:31:21',
'version' => '0.91'
},
{
'date' => '2001-06-03T07:47:14',
'version' => '0.92'
},
{
'date' => '2001-06-09T16:52:26',
'version' => '0.93'
},
{
'date' => '2001-06-10T08:54:23',
'version' => '0.94'
},
{
'date' => '2001-06-21T10:07:56',
'version' => '0.96'
},
{
'date' => '2001-06-29T20:39:47',
'version' => '0.97'
},
{
'date' => '2001-07-20T16:08:25',
'version' => '0.99'
},
{
'date' => '2001-08-07T10:13:29',
'version' => '1.00'
},
{
'date' => '2001-11-14T11:39:59',
'version' => '1.30'
},
{
'date' => '2001-11-25T17:25:52',
'version' => '1.31'
},
{
'date' => '2002-03-13T14:24:12',
'version' => '1.40'
},
{
'date' => '2002-05-11T21:07:22',
'version' => '1.49'
},
{
'date' => '2002-05-20T11:33:20',
'version' => '1.50'
},
{
'date' => '2002-05-31T16:53:50',
'version' => '1.51'
},
{
'date' => '2002-06-12T10:16:35',
'version' => '1.52'
},
{
'date' => '2002-09-14T21:02:38',
'version' => '1.53'
},
{
'date' => '2002-10-26T15:21:51',
'version' => '1.54_0'
},
{
'date' => '2002-11-08T10:03:05',
'version' => '1.54_1'
},
{
'date' => '2002-11-08T18:15:20',
'version' => '1.54_2'
},
{
'date' => '2002-11-15T20:14:58',
'version' => '1.54_3'
},
{
'date' => '2003-05-22T23:44:39',
'version' => '1.54_4'
},
{
'date' => '2003-05-30T18:46:39',
'version' => '1.54'
},
{
'date' => '2003-08-19T21:15:43',
'version' => '1.55'
},
{
'date' => '2003-08-25T13:39:01',
'version' => '1.56'
},
{
'date' => '2004-02-29T16:56:42',
'version' => '1.57'
},
{
'date' => '2004-03-31T19:49:55',
'version' => '1.58'
},
{
'date' => '2004-04-04T11:42:03',
'version' => '1.58_1'
},
{
'date' => '2006-08-02T10:59:49',
'version' => '1.59'
},
{
'date' => '2006-08-26T18:11:05',
'version' => '1.60'
},
{
'date' => '2006-09-24T15:43:20',
'version' => '1.61'
},
{
'date' => '2006-09-25T07:21:39',
'version' => '1.61'
},
{
'date' => '2006-09-25T07:42:26',
'version' => '1.61'
},
{
'date' => '2006-09-25T11:38:04',
'version' => '1.61'
},
{
'date' => '2006-11-18T09:57:51',
'version' => '1.62'
},
{
'date' => '2006-11-25T09:10:37',
'version' => '1.62'
},
{
'date' => '2007-04-16T11:46:21',
'version' => '1.63'
},
{
'date' => '2007-09-09T21:51:03',
'version' => '1.64'
},
{
'date' => '2007-09-25T16:37:46',
'version' => '1.65'
},
{
'date' => '2008-01-29T21:10:45',
'version' => '1.66'
},
{
'date' => '2008-11-04T14:26:16',
'version' => '1.67'
},
{
'date' => '2008-11-05T13:32:59',
'version' => '1.68'
},
{
'date' => '2008-11-11T21:00:56',
'version' => '1.69'
},
{
'date' => '2009-01-23T22:30:52',
'version' => '1.69_1'
},
{
'date' => '2009-02-06T19:12:24',
'version' => '1.69_2'
},
{
'date' => '2009-10-07T12:31:25',
'version' => '1.70'
},
{
'date' => '2011-06-14T17:01:30',
'version' => '1.71'
},
{
'date' => '2011-06-16T16:40:11',
'version' => '1.72'
},
{
'date' => '2011-06-18T08:35:40',
'version' => '1.73'
},
{
'date' => '2011-06-23T12:27:53',
'version' => '1.74'
},
{
'date' => '2011-06-24T16:02:54',
'version' => '1.75'
},
{
'date' => '2011-06-30T18:20:41',
'version' => '1.76'
},
{
'date' => '2011-07-01T19:31:51',
'version' => '1.77'
},
{
'date' => '2011-07-06T17:27:49',
'version' => '1.78'
},
{
'date' => '2011-07-08T17:06:33',
'version' => '1.79'
},
{
'date' => '2011-07-12T20:39:51',
'version' => '1.80'
},
{
'date' => '2011-07-16T15:36:21',
'version' => '1.81'
},
{
'date' => '2011-07-20T20:49:05',
'version' => '1.82'
},
{
'date' => '2011-07-23T11:34:22',
'version' => '1.83'
},
{
'date' => '2011-07-23T20:17:26',
'version' => '1.84'
},
{
'date' => '2011-08-24T14:08:28',
'version' => '1.85'
},
{
'date' => '2011-08-25T08:46:56',
'version' => '1.86'
},
{
'date' => '2011-08-27T11:07:44',
'version' => '1.87'
},
{
'date' => '2011-09-21T10:01:23',
'version' => '1.88'
},
{
'date' => '2011-12-24T07:47:30',
'version' => '1.89'
},
{
'date' => '2012-01-08T19:01:33',
'version' => '1.90'
},
{
'date' => '2012-02-21T12:02:10',
'version' => '1.91'
},
{
'date' => '2012-02-21T17:03:56',
'version' => '1.92'
},
{
'date' => '2012-02-27T09:18:12',
'version' => '1.93'
},
{
'date' => '2012-03-03T20:10:26',
'version' => '1.94'
},
{
'date' => '2012-03-06T08:42:27',
'version' => '1.95'
},
{
'date' => '2012-03-16T19:05:40',
'version' => '1.96'
},
{
'date' => '2012-04-30T17:35:11',
'version' => '1.97'
},
{
'date' => '2012-05-13T18:06:03',
'version' => '1.98'
},
{
'date' => '2012-05-31T07:25:35',
'version' => '1.99'
},
{
'date' => '2012-06-19T20:07:27',
'version' => '2.0000'
},
{
'date' => '2012-06-20T16:53:03',
'version' => '2.0001'
},
{
'date' => '2012-07-08T15:12:36',
'version' => '2.0002'
},
{
'date' => '2012-07-27T15:22:53',
'version' => '2.0003'
},
{
'date' => '2012-08-07T20:06:48',
'version' => '2.0004'
},
{
'date' => '2012-10-13T11:23:03',
'version' => '2.0005'
},
{
'date' => '2012-10-13T20:34:57',
'version' => '2.0006'
},
{
'date' => '2012-10-17T17:05:13',
'version' => '2.0007'
},
{
'date' => '2012-10-22T10:13:20',
'version' => '2.0008'
},
{
'date' => '2012-11-01T14:29:13',
'version' => '2.0009'
},
{
'date' => '2012-11-01T18:16:34',
'version' => '2.0010'
},
{
'date' => '2012-11-07T22:29:47',
'version' => '2.0011'
},
{
'date' => '2012-11-09T04:42:04',
'version' => '2.0012'
},
{
'date' => '2012-12-04T15:46:46',
'version' => '2.0013'
},
{
'date' => '2012-12-05T09:13:26',
'version' => '2.0014'
},
{
'date' => '2013-04-12T23:35:55',
'version' => '2.0015'
},
{
'date' => '2013-04-13T19:39:51',
'version' => '2.0016'
},
{
'date' => '2013-05-09T08:07:47',
'version' => '2.0017'
},
{
'date' => '2013-05-13T10:44:19',
'version' => '2.0018'
},
{
'date' => '2013-07-01T08:08:50',
'version' => '2.0019'
},
{
'date' => '2013-08-14T05:27:26',
'version' => '2.0100'
},
{
'date' => '2013-08-15T05:34:30',
'version' => '2.0101'
},
{
'date' => '2013-08-19T12:18:31',
'version' => '2.0102'
},
{
'date' => '2013-08-22T05:35:19',
'version' => '2.0103'
},
{
'date' => '2013-08-30T09:38:04',
'version' => '2.0104'
},
{
'date' => '2013-09-07T17:24:00',
'version' => '2.0105'
},
{
'date' => '2013-09-17T16:14:51',
'version' => '2.0106'
},
{
'date' => '2013-10-31T07:16:02',
'version' => '2.0107'
},
{
'date' => '2013-12-17T09:10:53',
'version' => '2.0108'
},
{
'date' => '2014-01-31T08:01:23',
'version' => '2.0109'
},
{
'date' => '2014-02-01T14:14:02',
'version' => '2.0110'
},
{
'date' => '2014-03-05T15:31:25',
'version' => '2.0111'
},
{
'date' => '2014-03-13T18:19:10',
'version' => '2.0112'
},
{
'date' => '2014-03-14T12:15:54',
'version' => '2.0113'
},
{
'date' => '2014-04-03T13:01:06',
'version' => '2.0114'
},
{
'date' => '2014-04-03T13:15:41',
'version' => '2.0115'
},
{
'date' => '2014-04-12T08:10:37',
'version' => '2.0116'
},
{
'date' => '2014-10-26T16:31:29',
'version' => '2.0117'
},
{
'date' => '2015-02-05T10:57:03',
'version' => '2.0118'
},
{
'date' => '2015-04-23T07:14:45',
'version' => '2.0119'
},
{
'date' => '2015-05-01T09:50:18',
'version' => '2.0120'
},
{
'date' => '2015-05-03T12:08:06',
'version' => '2.0121'
},
{
'date' => '2015-09-01T09:02:29',
'version' => '2.0122'
},
{
'date' => '2015-12-06T13:19:22',
'version' => '2.0123'
},
{
'date' => '2016-02-27T11:21:08',
'version' => '2.0124'
},
{
'date' => '2016-05-30T09:24:51',
'version' => '2.0125'
},
{
'date' => '2016-06-24T16:21:00',
'version' => '2.0126'
},
{
'date' => '2016-07-22T17:40:51',
'version' => '2.0127'
},
{
'date' => '2016-07-24T09:15:48',
'version' => '2.0128'
},
{
'date' => '2017-03-14T13:37:23',
'version' => '2.0129'
},
{
'date' => '2017-10-18T08:45:49',
'version' => '2.0130'
},
{
'date' => '2017-10-24T08:57:20',
'version' => '2.0131'
},
{
'date' => '2017-10-28T17:58:34',
'version' => '2.0132'
},
{
'date' => '2019-02-02T11:11:30',
'version' => '2.0133'
},
{
'date' => '2019-02-10T15:02:55',
'version' => '2.0134'
},
{
'date' => '2019-03-23T08:54:34',
'version' => '2.0200'
},
{
'date' => '2019-05-25T17:46:46',
'version' => '2.0201'
},
{
'date' => '2020-01-13T09:16:50',
'version' => '2.0202'
},
{
'date' => '2020-03-11T06:48:19',
'version' => '2.0203'
},
{
'date' => '2020-03-17T16:33:17',
'version' => '2.0204'
},
{
'date' => '2020-05-08T11:36:06',
'version' => '2.0205'
},
{
'date' => '2020-09-15T08:06:58',
'version' => '2.0206'
},
{
'date' => '2021-04-17T08:16:22',
'version' => '2.0207'
},
{
'date' => '2022-09-30T03:29:15',
'version' => '2.0208'
},
{
'date' => '2023-07-15T06:04:39',
'version' => '2.0209'
},
{
'date' => '2024-01-24T15:19:39',
'version' => '2.0210'
}
]
},
'XML-Simple' => {
'advisories' => [
{
'affected_versions' => [
'<2.25'
],
'cves' => [],
'description' => 'The No. 4 item on the OWASP top 10 is external XML entities. When using XML::Parser, XML::Simple is currently vulnerable by default.
',
'distribution' => 'XML-Simple',
'fixed_versions' => [
'>=2.25'
],
'id' => 'CPANSA-XML-Simple-2018-01',
'references' => [
'https://metacpan.org/dist/XML-Simple/changes',
'https://github.com/grantm/xml-simple/pull/8'
],
'reported' => '2018-02-18',
'severity' => undef
}
],
'main_module' => 'XML::Simple',
'versions' => [
{
'date' => '1999-11-29T02:30:19',
'version' => '1.00'
},
{
'date' => '1999-12-01T11:02:42',
'version' => '1.01'
},
{
'date' => '2000-03-05T20:58:37',
'version' => '1.03'
},
{
'date' => '2000-04-03T04:12:07',
'version' => '1.04'
},
{
'date' => '2000-08-30T23:40:57',
'version' => '1.05'
},
{
'date' => '2001-11-19T22:04:26',
'version' => '1.06'
},
{
'date' => '2002-02-05T22:46:39',
'version' => '1.07'
},
{
'date' => '2002-02-09T22:43:03',
'version' => '1.08'
},
{
'date' => '2002-02-14T22:13:24',
'version' => '1.08_01'
},
{
'date' => '2002-12-08T08:23:26',
'version' => '2.00'
},
{
'date' => '2002-12-11T09:56:59',
'version' => '2.01'
},
{
'date' => '2002-12-15T08:21:09',
'version' => '2.02'
},
{
'date' => '2003-01-20T07:54:05',
'version' => '2.03'
},
{
'date' => '2003-04-10T10:25:56',
'version' => '2.04'
},
{
'date' => '2003-04-16T10:22:00',
'version' => '2.05'
},
{
'date' => '2003-05-18T08:50:04',
'version' => '2.06'
},
{
'date' => '2003-05-20T08:53:19',
'version' => '2.07'
},
{
'date' => '2003-06-13T10:31:53',
'version' => '2.08'
},
{
'date' => '2003-09-09T09:43:24',
'version' => '2.09'
},
{
'date' => '2004-02-29T10:18:06',
'version' => '2.10'
},
{
'date' => '2004-03-02T08:29:33',
'version' => '2.11'
},
{
'date' => '2004-04-05T09:29:23',
'version' => '2.12'
},
{
'date' => '2004-11-17T09:06:18',
'version' => '2.13'
},
{
'date' => '2005-01-29T05:16:40',
'version' => '2.14'
},
{
'date' => '2006-10-03T01:33:47',
'version' => '2.15'
},
{
'date' => '2006-10-30T08:33:07',
'version' => '2.16'
},
{
'date' => '2007-08-02T10:47:38',
'version' => '2.17'
},
{
'date' => '2007-08-15T10:39:25',
'version' => '2.18'
},
{
'date' => '2012-06-17T11:28:59',
'version' => '2.19_01'
},
{
'date' => '2012-06-19T08:34:33',
'version' => '2.19_02'
},
{
'date' => '2012-06-20T10:01:37',
'version' => '2.20'
},
{
'date' => '2015-12-04T03:35:12',
'version' => '2.21'
},
{
'date' => '2015-12-04T22:08:47',
'version' => '2.22'
},
{
'date' => '2017-04-17T03:49:52',
'version' => '2.23'
},
{
'date' => '2017-04-17T04:12:48',
'version' => '2.24'
},
{
'date' => '2018-03-18T03:19:24',
'version' => '2.25'
}
]
},
'XML-Twig' => {
'advisories' => [
{
'affected_versions' => [
'<1.39'
],
'cves' => [
'CVE-2016-9180'
],
'description' => 'perl-XML-Twig: The option to `expand_external_ents`, documented as controlling external entity expansion in XML::Twig does not work. External entities are always expanded, regardless of the option\'s setting.
',
'distribution' => 'XML-Twig',
'fixed_versions' => [
'>=1.39'
],
'id' => 'CPANSA-XML-Twig-2016-9180',
'references' => [
'http://www.securityfocus.com/bid/94219',
'http://www.openwall.com/lists/oss-security/2016/11/04/2',
'http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00020.html',
'http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00033.html',
'https://rt.cpan.org/Public/Bug/Display.html?id=118097'
],
'reported' => '2016-12-22',
'severity' => 'critical'
}
],
'main_module' => 'XML::Twig',
'versions' => [
{
'date' => '1999-10-05T22:25:47',
'version' => '1.6'
},
{
'date' => '1999-12-07T16:53:28',
'version' => '1.7'
},
{
'date' => '1999-12-17T17:03:18',
'version' => '1.8'
},
{
'date' => '2000-02-18T00:39:24',
'version' => '1.9'
},
{
'date' => '2000-03-24T23:22:37',
'version' => '1.10'
},
{
'date' => '2000-06-05T19:27:48',
'version' => '2.00'
},
{
'date' => '2000-08-18T12:10:46',
'version' => '2.01'
},
{
'date' => '2001-01-16T09:14:14',
'version' => '2.02'
},
{
'date' => '2002-01-09T16:33:44',
'version' => '3.00'
},
{
'date' => '2002-01-09T17:01:53',
'version' => '3.01'
},
{
'date' => '2002-01-16T14:11:04',
'version' => '3.02'
},
{
'date' => '2002-03-26T14:40:14',
'version' => '3.03'
},
{
'date' => '2002-04-02T04:57:42',
'version' => '3.04'
},
{
'date' => '2002-07-09T16:02:36',
'version' => '3.05'
},
{
'date' => '2002-09-17T17:07:34',
'version' => '3.06'
},
{
'date' => '2002-09-17T20:03:49',
'version' => '3.07'
},
{
'date' => '2002-09-17T21:57:09',
'version' => '3.08'
},
{
'date' => '2002-11-11T07:42:10',
'version' => '3.09'
},
{
'date' => '2003-06-09T19:35:52',
'version' => '3.10'
},
{
'date' => '2003-09-24T13:23:47',
'version' => '3.11'
},
{
'date' => '2004-01-29T15:20:30',
'version' => '3.12'
},
{
'date' => '2004-02-02T07:13:15',
'version' => '3.13'
},
{
'date' => '2004-03-17T15:39:18',
'version' => '3.14'
},
{
'date' => '2004-04-05T08:30:51',
'version' => '3.15'
},
{
'date' => '2005-02-11T17:51:59',
'version' => '3.16'
},
{
'date' => '2005-03-16T14:06:47',
'version' => '3.17'
},
{
'date' => '2005-08-08T12:22:25',
'version' => '3.18'
},
{
'date' => '2005-08-10T16:22:28',
'version' => '3.19'
},
{
'date' => '2005-08-11T13:51:56',
'version' => '3.20'
},
{
'date' => '2005-08-12T12:59:54',
'version' => '3.21'
},
{
'date' => '2005-10-14T16:27:05',
'version' => '3.22'
},
{
'date' => '2006-01-23T14:26:19',
'version' => '3.23'
},
{
'date' => '2006-05-09T08:56:08',
'version' => '3.24'
},
{
'date' => '2006-05-10T11:07:37',
'version' => '3.25'
},
{
'date' => '2006-07-01T11:18:04',
'version' => '3.26'
},
{
'date' => '2007-01-05T17:23:58',
'version' => '3.28'
},
{
'date' => '2007-01-22T09:42:28',
'version' => '3.29'
},
{
'date' => '2007-11-06T14:49:35',
'version' => '3.30'
},
{
'date' => '2007-11-07T19:29:27',
'version' => '3.31'
},
{
'date' => '2007-11-13T20:40:13',
'version' => '3.32'
},
{
'date' => '2010-01-15T17:14:59',
'version' => '3.33'
},
{
'date' => '2010-01-18T19:31:16',
'version' => '3.34'
},
{
'date' => '2010-05-16T05:25:45',
'version' => '3.35'
},
{
'date' => '2010-10-07T09:55:43',
'version' => '3.36'
},
{
'date' => '2010-10-10T05:53:41',
'version' => '3.37'
},
{
'date' => '2011-02-27T06:57:30',
'version' => '3.38'
},
{
'date' => '2011-09-22T01:30:24',
'version' => '3.39'
},
{
'date' => '2012-05-10T10:44:35',
'version' => '3.40'
},
{
'date' => '2012-08-08T20:31:00',
'version' => '3.41'
},
{
'date' => '2012-11-08T12:28:17',
'version' => '3.42'
},
{
'date' => '2013-05-13T08:47:04',
'version' => '3.44'
},
{
'date' => '2014-03-01T08:34:52',
'version' => '3.45'
},
{
'date' => '2014-03-05T11:25:33',
'version' => '3.46'
},
{
'date' => '2014-03-29T10:30:09',
'version' => '3.47'
},
{
'date' => '2014-03-30T09:01:59',
'version' => '3.48'
},
{
'date' => '2015-04-12T09:17:47',
'version' => '3.49'
},
{
'date' => '2016-11-22T15:01:43',
'version' => '3.50'
},
{
'date' => '2016-11-23T12:34:37',
'version' => '3.51'
},
{
'date' => '2016-11-23T17:21:16',
'version' => '3.52'
},
{
'date' => '2024-12-13T15:34:19',
'version' => '3.53'
}
]
},
'YAML' => {
'advisories' => [
{
'affected_versions' => [
'<1.28'
],
'cves' => [],
'description' => 'Loading globs is easily exploitable.
',
'distribution' => 'YAML',
'fixed_versions' => [
'>=1.28'
],
'id' => 'CPANSA-YAML-2019-01',
'references' => [
'https://github.com/ingydotnet/yaml-pm/issues/212'
],
'reported' => '2019-04-27',
'severity' => undef
},
{
'affected_versions' => [
'<1.25'
],
'cves' => [],
'description' => 'YAML loader can run DESTROY method of object created with perl/* tag.
',
'distribution' => 'YAML',
'fixed_versions' => [
'>=1.25'
],
'id' => 'CPANSA-YAML-2017-01',
'references' => [
'https://github.com/ingydotnet/yaml-pm/issues/176'
],
'reported' => '2017-05-10',
'severity' => undef
}
],
'main_module' => 'YAML',
'versions' => [
{
'date' => '2001-12-19T10:33:57',
'version' => '0.25'
},
{
'date' => '2002-01-10T06:33:41',
'version' => '0.26'
},
{
'date' => '2002-01-15T22:34:34',
'version' => '0.30'
},
{
'date' => '2002-06-25T06:25:48',
'version' => '0.35'
},
{
'date' => '2004-01-20T09:22:57',
'version' => '0.49_01'
},
{
'date' => '2005-01-31T06:49:59',
'version' => '0.36'
},
{
'date' => '2005-03-31T02:57:10',
'version' => '0.37'
},
{
'date' => '2005-03-31T10:16:09',
'version' => '0.38'
},
{
'date' => '2005-04-12T22:41:53',
'version' => '0.39'
},
{
'date' => '2005-04-25T19:42:26',
'version' => '0.39'
},
{
'date' => '2005-12-25T19:27:42',
'version' => '0.49_70'
},
{
'date' => '2006-01-10T05:55:16',
'version' => '0.50'
},
{
'date' => '2006-01-14T19:47:39',
'version' => '0.50'
},
{
'date' => '2006-01-18T23:03:28',
'version' => '0.52'
},
{
'date' => '2006-01-19T19:13:35',
'version' => '0.53'
},
{
'date' => '2006-01-30T02:22:33',
'version' => '0.54'
},
{
'date' => '2006-01-30T03:11:55',
'version' => '0.55'
},
{
'date' => '2006-01-30T18:41:21',
'version' => '0.56'
},
{
'date' => '2006-02-02T07:36:12',
'version' => '0.56'
},
{
'date' => '2006-02-14T21:21:22',
'version' => '0.58'
},
{
'date' => '2006-07-01T05:16:14',
'version' => '0.60'
},
{
'date' => '2006-07-02T20:36:06',
'version' => '0.61'
},
{
'date' => '2006-07-03T22:52:48',
'version' => '0.62'
},
{
'date' => '2007-06-20T23:18:21',
'version' => '0.63'
},
{
'date' => '2007-06-21T23:29:30',
'version' => '0.64'
},
{
'date' => '2007-06-22T00:58:23',
'version' => '0.65'
},
{
'date' => '2007-09-27T09:16:07',
'version' => '0.66'
},
{
'date' => '2008-12-01T10:57:39',
'version' => '0.67'
},
{
'date' => '2008-12-04T09:07:34',
'version' => '0.68'
},
{
'date' => '2009-08-10T05:19:57',
'version' => '0.69_01'
},
{
'date' => '2009-08-10T12:44:33',
'version' => '0.69_02'
},
{
'date' => '2009-08-10T17:23:08',
'version' => '0.70'
},
{
'date' => '2010-01-03T01:52:05',
'version' => '0.71'
},
{
'date' => '2010-09-01T02:04:50',
'version' => '0.72'
},
{
'date' => '2011-04-19T10:57:00',
'version' => '0.73'
},
{
'date' => '2011-09-25T20:06:34',
'version' => '0.74'
},
{
'date' => '2011-09-26T22:47:06',
'version' => '0.75'
},
{
'date' => '2011-09-28T10:06:35',
'version' => '0.76'
},
{
'date' => '2011-09-29T16:29:20',
'version' => '0.77'
},
{
'date' => '2012-01-02T07:55:05',
'version' => '0.78'
},
{
'date' => '2012-02-09T01:26:43',
'version' => '0.79'
},
{
'date' => '2012-02-10T20:57:18',
'version' => '0.80'
},
{
'date' => '2012-04-19T18:04:48',
'version' => '0.81'
},
{
'date' => '2012-07-12T18:51:27',
'version' => '0.82'
},
{
'date' => '2012-07-13T15:45:29',
'version' => '0.83'
},
{
'date' => '2012-07-13T18:19:24',
'version' => '0.84'
},
{
'date' => '2013-11-24T15:44:47',
'version' => '0.85'
},
{
'date' => '2013-11-26T16:43:45',
'version' => '0.86'
},
{
'date' => '2013-12-01T05:53:16',
'version' => '0.87'
},
{
'date' => '2013-12-03T05:30:33',
'version' => '0.88'
},
{
'date' => '2014-02-08T22:12:24',
'version' => '0.89'
},
{
'date' => '2014-02-10T16:45:22',
'version' => '0.90'
},
{
'date' => '2014-05-27T21:16:01',
'version' => '0.91'
},
{
'date' => '2014-05-29T03:07:13',
'version' => '0.92'
},
{
'date' => '2014-06-14T05:33:25',
'version' => '0.93'
},
{
'date' => '2014-06-14T17:34:58',
'version' => '0.94'
},
{
'date' => '2014-06-20T19:10:04',
'version' => '0.95'
},
{
'date' => '2014-07-14T05:59:12',
'version' => '0.96'
},
{
'date' => '2014-07-17T06:38:34',
'version' => '0.97'
},
{
'date' => '2014-07-30T19:33:24',
'version' => '0.98'
},
{
'date' => '2014-08-07T00:57:08',
'version' => '0.99'
},
{
'date' => '2014-08-07T07:36:47',
'version' => '1.00'
},
{
'date' => '2014-08-07T21:49:48',
'version' => '1.01'
},
{
'date' => '2014-08-16T04:11:27',
'version' => '1.02'
},
{
'date' => '2014-08-16T10:33:26',
'version' => '1.03'
},
{
'date' => '2014-08-16T15:30:43',
'version' => '1.04'
},
{
'date' => '2014-08-16T20:04:31',
'version' => '1.05'
},
{
'date' => '2014-08-16T23:51:52',
'version' => '1.06'
},
{
'date' => '2014-08-18T15:40:59',
'version' => '1.07'
},
{
'date' => '2014-08-18T17:23:04',
'version' => '1.08'
},
{
'date' => '2014-08-19T23:42:23',
'version' => '1.09'
},
{
'date' => '2014-08-29T05:54:45',
'version' => '1.10'
},
{
'date' => '2014-08-30T03:10:03',
'version' => '1.11'
},
{
'date' => '2014-09-22T15:25:30',
'version' => '1.12'
},
{
'date' => '2014-10-11T16:07:22',
'version' => '1.13'
},
{
'date' => '2015-01-17T23:33:39',
'version' => '1.14'
},
{
'date' => '2015-04-18T15:04:42',
'version' => '1.15'
},
{
'date' => '2016-07-03T17:53:34',
'version' => '1.16'
},
{
'date' => '2016-07-05T20:04:45',
'version' => '1.16_001'
},
{
'date' => '2016-07-05T20:10:01',
'version' => '1.16_002'
},
{
'date' => '2016-07-05T20:21:25',
'version' => '1.17'
},
{
'date' => '2016-07-08T14:53:24',
'version' => '1.18'
},
{
'date' => '2016-11-11T22:44:07',
'version' => '1.18_001'
},
{
'date' => '2016-11-18T18:46:59',
'version' => '1.19'
},
{
'date' => '2016-11-27T20:27:37',
'version' => '1.19_001'
},
{
'date' => '2016-12-02T21:21:40',
'version' => '1.20'
},
{
'date' => '2016-12-02T22:00:08',
'version' => '1.20_001'
},
{
'date' => '2016-12-07T21:17:58',
'version' => '1.20_002'
},
{
'date' => '2016-12-23T20:20:06',
'version' => '1.21'
},
{
'date' => '2017-02-14T22:24:38',
'version' => '1.22'
},
{
'date' => '2017-02-19T21:08:48',
'version' => '1.23'
},
{
'date' => '2017-05-12T15:06:03',
'version' => '1.23_001'
},
{
'date' => '2017-05-14T13:15:34',
'version' => '1.23_002'
},
{
'date' => '2017-10-29T22:09:18',
'version' => '1.23_003'
},
{
'date' => '2017-10-30T19:33:07',
'version' => '1.24'
},
{
'date' => '2018-05-06T19:10:48',
'version' => '1.24_001'
},
{
'date' => '2018-05-10T16:22:16',
'version' => '1.24_002'
},
{
'date' => '2018-05-11T17:59:33',
'version' => '1.25'
},
{
'date' => '2018-05-12T11:43:38',
'version' => '1.25_001'
},
{
'date' => '2018-05-17T13:00:07',
'version' => '1.25_002'
},
{
'date' => '2018-05-18T19:58:16',
'version' => '1.26'
},
{
'date' => '2018-10-18T19:46:23',
'version' => '1.26_001'
},
{
'date' => '2018-11-03T13:02:53',
'version' => '1.27'
},
{
'date' => '2019-04-27T13:41:56',
'version' => '1.27_001'
},
{
'date' => '2019-04-28T09:46:43',
'version' => '1.28'
},
{
'date' => '2019-05-05T11:31:39',
'version' => '1.28_001'
},
{
'date' => '2019-05-11T08:28:01',
'version' => '1.29'
},
{
'date' => '2020-01-27T22:10:33',
'version' => '1.30'
},
{
'date' => '2023-12-27T15:11:23',
'version' => '1.31'
}
]
},
'YAML-LibYAML' => {
'advisories' => [
{
'affected_versions' => [
'<0.69'
],
'cves' => [],
'description' => 'Need SafeLoad and SafeDump analog to python
',
'distribution' => 'YAML-LibYAML',
'fixed_versions' => [
'>=0.69'
],
'id' => 'CPANSA-YAML-LibYAML-2016-01',
'references' => [
'https://github.com/ingydotnet/yaml-libyaml-pm/issues/45'
],
'reported' => '2016-03-10',
'severity' => undef
},
{
'affected_versions' => [
'<0.53'
],
'cves' => [
'CVE-2014-9130'
],
'description' => 'scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.
',
'distribution' => 'YAML-LibYAML',
'fixed_versions' => [
'>=0.54'
],
'id' => 'CPANSA-YAML-LibYAML-2014-9130',
'references' => [
'http://www.openwall.com/lists/oss-security/2014/11/29/3',
'http://www.openwall.com/lists/oss-security/2014/11/28/8',
'https://bitbucket.org/xi/libyaml/commits/2b9156756423e967cfd09a61d125d883fca6f4f2',
'http://www.securityfocus.com/bid/71349',
'http://secunia.com/advisories/59947',
'https://bitbucket.org/xi/libyaml/issue/10/wrapped-strings-cause-assert-failure',
'http://secunia.com/advisories/60944',
'http://www.openwall.com/lists/oss-security/2014/11/28/1',
'http://linux.oracle.com/errata/ELSA-2015-0100.html',
'http://secunia.com/advisories/62723',
'http://secunia.com/advisories/62705',
'http://secunia.com/advisories/62774',
'http://www.ubuntu.com/usn/USN-2461-2',
'http://www.ubuntu.com/usn/USN-2461-3',
'http://www.ubuntu.com/usn/USN-2461-1',
'http://rhn.redhat.com/errata/RHSA-2015-0100.html',
'http://www.debian.org/security/2014/dsa-3103',
'http://rhn.redhat.com/errata/RHSA-2015-0112.html',
'http://www.debian.org/security/2014/dsa-3102',
'http://www.debian.org/security/2014/dsa-3115',
'http://rhn.redhat.com/errata/RHSA-2015-0260.html',
'http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html',
'http://www.mandriva.com/security/advisories?name=MDVSA-2015:060',
'http://www.mandriva.com/security/advisories?name=MDVSA-2014:242',
'http://advisories.mageia.org/MGASA-2014-0508.html',
'http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html',
'http://secunia.com/advisories/62176',
'http://secunia.com/advisories/62174',
'http://secunia.com/advisories/62164',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/99047',
'https://puppet.com/security/cve/cve-2014-9130'
],
'reported' => '2014-12-08',
'severity' => undef
},
{
'affected_versions' => [
'>0.38,<0.57'
],
'cves' => [
'CVE-2012-1152'
],
'description' => 'Multiple format string vulnerabilities in the error reporting functionality in the YAML::LibYAML (aka YAML-LibYAML and perl-YAML-LibYAML) module 0.38 for Perl allow remote attackers to cause a denial of service (process crash) via format string specifiers in a (1) YAML stream to the Load function, (2) YAML node to the load_node function, (3) YAML mapping to the load_mapping function, or (4) YAML sequence to the load_sequence function.
',
'distribution' => 'YAML-LibYAML',
'fixed_versions' => [
'>=0.57'
],
'id' => 'CPANSA-YAML-LibYAML-2012-1152',
'references' => [
'https://bugzilla.redhat.com/show_bug.cgi?id=801738',
'https://rt.cpan.org/Public/Bug/Display.html?id=46507',
'http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077023.html',
'http://www.openwall.com/lists/oss-security/2012/03/10/4',
'http://www.openwall.com/lists/oss-security/2012/03/09/6',
'http://www.debian.org/security/2012/dsa-2432',
'http://www.securityfocus.com/bid/52381',
'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661548',
'http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077782.html',
'https://rt.cpan.org/Public/Bug/Display.html?id=75365',
'http://secunia.com/advisories/48317',
'http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077004.html',
'http://lists.opensuse.org/opensuse-updates/2012-08/msg00029.html',
'http://secunia.com/advisories/50277',
'http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/73856'
],
'reported' => '2012-09-09',
'severity' => undef
}
],
'main_module' => 'YAML::LibYAML',
'versions' => [
{
'date' => '2007-05-11T21:37:19',
'version' => '0.01'
},
{
'date' => '2007-05-15T06:37:59',
'version' => '0.02'
},
{
'date' => '2007-05-19T22:23:53',
'version' => '0.03'
},
{
'date' => '2007-05-21T05:19:05',
'version' => '0.04'
},
{
'date' => '2007-05-21T07:45:35',
'version' => '0.05'
},
{
'date' => '2007-05-23T06:56:11',
'version' => '0.06'
},
{
'date' => '2007-05-23T07:10:14',
'version' => '0.07'
},
{
'date' => '2007-05-26T04:58:43',
'version' => '0.08'
},
{
'date' => '2007-05-28T07:47:31',
'version' => '0.09'
},
{
'date' => '2007-05-28T10:30:28',
'version' => '0.10'
},
{
'date' => '2007-05-30T00:30:09',
'version' => '0.11'
},
{
'date' => '2007-05-30T08:13:24',
'version' => '0.12'
},
{
'date' => '2007-05-30T09:38:37',
'version' => '0.14'
},
{
'date' => '2007-05-31T07:48:16',
'version' => '0.15'
},
{
'date' => '2007-05-31T21:05:50',
'version' => '0.16'
},
{
'date' => '2007-06-07T02:55:10',
'version' => '0.17'
},
{
'date' => '2007-06-18T01:35:48',
'version' => '0.18'
},
{
'date' => '2007-06-18T08:06:43',
'version' => '0.19'
},
{
'date' => '2007-06-18T23:34:20',
'version' => '0.20'
},
{
'date' => '2007-06-21T23:27:47',
'version' => '0.21'
},
{
'date' => '2007-06-22T07:42:47',
'version' => '0.22'
},
{
'date' => '2007-06-23T01:17:58',
'version' => '0.23'
},
{
'date' => '2007-06-24T18:37:51',
'version' => '0.24'
},
{
'date' => '2007-06-25T01:40:09',
'version' => '0.25'
},
{
'date' => '2007-06-26T21:00:04',
'version' => '0.26'
},
{
'date' => '2008-06-07T05:37:26',
'version' => '0.27'
},
{
'date' => '2008-11-12T07:09:30',
'version' => '0.29'
},
{
'date' => '2009-01-11T11:00:54',
'version' => '0.30'
},
{
'date' => '2009-01-12T09:26:53',
'version' => '0.31'
},
{
'date' => '2009-01-12T09:34:50',
'version' => '0.32'
},
{
'date' => '2010-04-15T01:01:10',
'version' => '0.33'
},
{
'date' => '2010-09-23T22:43:36',
'version' => '0.34'
},
{
'date' => '2011-04-03T16:41:03',
'version' => '0.35'
},
{
'date' => '2011-09-29T18:10:52',
'version' => '0.37'
},
{
'date' => '2012-01-04T06:58:09',
'version' => '0.38'
},
{
'date' => '2013-02-12T02:09:38',
'version' => '0.39'
},
{
'date' => '2013-03-12T18:07:29',
'version' => '0.40'
},
{
'date' => '2013-03-13T17:36:09',
'version' => '0.41'
},
{
'date' => '2014-07-11T22:30:03',
'version' => '0.42'
},
{
'date' => '2014-07-12T17:05:47',
'version' => '0.43'
},
{
'date' => '2014-07-13T22:24:47',
'version' => '0.44'
},
{
'date' => '2014-08-04T08:23:39',
'version' => '0.45'
},
{
'date' => '2014-08-05T17:33:54',
'version' => '0.46'
},
{
'date' => '2014-08-09T07:30:51',
'version' => '0.47'
},
{
'date' => '2014-08-16T04:07:46',
'version' => '0.48'
},
{
'date' => '2014-08-16T14:31:04',
'version' => '0.49'
},
{
'date' => '2014-08-16T19:58:18',
'version' => '0.50'
},
{
'date' => '2014-08-16T21:29:48',
'version' => '0.51'
},
{
'date' => '2014-08-23T04:04:49',
'version' => '0.52'
},
{
'date' => '2014-11-28T17:22:06',
'version' => '0.53'
},
{
'date' => '2014-11-29T19:48:26',
'version' => '0.54'
},
{
'date' => '2014-12-23T01:27:43',
'version' => '0.55'
},
{
'date' => '2015-01-16T03:23:05',
'version' => '0.56'
},
{
'date' => '2015-01-16T04:06:00',
'version' => '0.57'
},
{
'date' => '2015-01-21T05:02:46',
'version' => '0.58'
},
{
'date' => '2015-01-26T23:05:30',
'version' => '0.59'
},
{
'date' => '2016-02-09T19:36:50',
'version' => '0.60'
},
{
'date' => '2016-02-20T18:05:06',
'version' => '0.61'
},
{
'date' => '2016-02-22T15:47:18',
'version' => '0.62'
},
{
'date' => '2016-07-03T17:33:17',
'version' => '0.62_001'
},
{
'date' => '2016-07-03T17:40:25',
'version' => '0.62_002'
},
{
'date' => '2016-07-08T14:41:45',
'version' => '0.63'
},
{
'date' => '2016-09-08T09:56:51',
'version' => '0.71'
},
{
'date' => '2016-09-13T14:44:45',
'version' => '0.73'
},
{
'date' => '2017-01-03T04:10:44',
'version' => '0.63_001'
},
{
'date' => '2017-04-03T18:56:26',
'version' => '0.63_002'
},
{
'date' => '2017-04-07T18:32:36',
'version' => '0.64'
},
{
'date' => '2017-05-18T21:10:50',
'version' => '0.65'
},
{
'date' => '2017-08-13T11:49:59',
'version' => '0.65_001'
},
{
'date' => '2017-08-17T18:07:26',
'version' => '0.66'
},
{
'date' => '2017-11-10T21:07:40',
'version' => '0.66_001'
},
{
'date' => '2017-11-14T20:03:09',
'version' => '0.66_002'
},
{
'date' => '2017-11-15T18:00:42',
'version' => '0.67'
},
{
'date' => '2017-12-16T21:50:01',
'version' => '0.67_001'
},
{
'date' => '2017-12-18T19:01:27',
'version' => '0.68'
},
{
'date' => '2017-12-20T18:38:40',
'version' => '0.68_001'
},
{
'date' => '2017-12-22T11:40:39',
'version' => '0.68_002'
},
{
'date' => '2017-12-26T17:37:54',
'version' => '0.69'
},
{
'date' => '2018-06-07T20:16:52',
'version' => '0.69_001'
},
{
'date' => '2018-06-09T19:53:37',
'version' => '0.70'
},
{
'date' => '2018-06-27T17:14:44',
'version' => '0.70_001'
},
{
'date' => '2018-07-08T15:04:37',
'version' => '0.72'
},
{
'date' => '2018-08-31T15:38:28',
'version' => '0.72_01'
},
{
'date' => '2018-09-01T01:07:45',
'version' => '0.74'
},
{
'date' => '2018-10-14T14:09:48',
'version' => '0.74_001'
},
{
'date' => '2018-11-03T13:17:49',
'version' => '0.75'
},
{
'date' => '2018-12-16T17:28:49',
'version' => '0.75_001'
},
{
'date' => '2018-12-30T19:11:20',
'version' => '0.76'
},
{
'date' => '2019-03-13T18:47:41',
'version' => '0.76_001'
},
{
'date' => '2019-04-15T20:56:14',
'version' => '0.77'
},
{
'date' => '2019-05-15T18:20:47',
'version' => '0.77_001'
},
{
'date' => '2019-05-18T16:36:19',
'version' => '0.78'
},
{
'date' => '2019-05-30T16:01:02',
'version' => '0.78_001'
},
{
'date' => '2019-06-10T11:10:47',
'version' => '0.78_002'
},
{
'date' => '2019-06-11T19:36:40',
'version' => '0.79'
},
{
'date' => '2019-08-21T16:49:31',
'version' => '0.79_001'
},
{
'date' => '2019-08-22T11:18:19',
'version' => '0.80'
},
{
'date' => '2020-01-27T22:06:22',
'version' => '0.81'
},
{
'date' => '2020-05-02T18:40:13',
'version' => '0.82'
},
{
'date' => '2021-05-02T00:16:51',
'version' => '0.82_001'
},
{
'date' => '2021-05-08T21:52:55',
'version' => '0.83'
},
{
'date' => '2022-09-03T19:20:07',
'version' => '0.84'
},
{
'date' => '2022-09-09T15:31:45',
'version' => '0.84_001'
},
{
'date' => '2022-09-09T18:12:56',
'version' => '0.84_002'
},
{
'date' => '2022-09-09T19:01:06',
'version' => '0.84_003'
},
{
'date' => '2022-09-12T12:21:48',
'version' => '0.85'
},
{
'date' => '2023-01-26T02:35:03',
'version' => '0.86'
},
{
'date' => '2023-05-04T10:47:26',
'version' => '0.86_001'
},
{
'date' => '2023-05-04T19:38:30',
'version' => '0.87'
},
{
'date' => '2023-05-12T12:28:46',
'version' => '0.88'
},
{
'date' => '2024-01-24T21:55:26',
'version' => '0.88_001'
},
{
'date' => '2024-01-27T00:45:43',
'version' => '0.89'
},
{
'date' => '2024-05-26T13:07:57',
'version' => '0.89_001'
},
{
'date' => '2024-09-06T21:47:43',
'version' => '0.90'
},
{
'date' => '2024-09-06T22:09:50',
'version' => 'v0.901.0'
},
{
'date' => '2024-09-09T20:42:09',
'version' => 'v0.901.1'
},
{
'date' => '2024-09-20T19:48:00',
'version' => 'v0.902.0'
},
{
'date' => '2025-01-12T21:19:33',
'version' => 'v0.902.1'
},
{
'date' => '2025-01-26T01:28:39',
'version' => 'v0.902.2'
},
{
'date' => '2025-01-26T15:02:24',
'version' => 'v0.902.3'
},
{
'date' => '2025-02-02T22:21:19',
'version' => 'v0.902.4'
},
{
'date' => '2025-02-02T23:15:49',
'version' => 'v0.903.0'
}
]
},
'Zonemaster-Backend' => {
'advisories' => [
{
'affected_versions' => [
'<7.0.0'
],
'cves' => [],
'description' => 'When running the API behind a reverse proxy on the same machine (like it is using the configuration example provided by the GUI) the remote ip might always be localhost even if the query was done from elsewher
',
'distribution' => 'Zonemaster-Backend',
'fixed_versions' => [
'>=7.0.0'
],
'id' => 'CPANSA-Zonemaster-Backend-2021-001',
'references' => [
'https://github.com/zonemaster/zonemaster-backend/issues/838',
'https://metacpan.org/dist/Zonemaster-Backend/changes'
],
'reported' => '2021-08-05',
'severity' => undef
},
{
'affected_versions' => [
'<1.0.1'
],
'cves' => [],
'description' => 'Potential SQL injection.
',
'distribution' => 'Zonemaster-Backend',
'fixed_versions' => [
'>=1.0.1'
],
'id' => 'CPANSA-Zonemaster-Backend-2015-001',
'references' => [
'https://github.com/zonemaster/zonemaster-backend/issues/25',
'https://metacpan.org/dist/Zonemaster-Backend/changes'
],
'reported' => '2015-01-28',
'severity' => undef
}
],
'main_module' => 'Zonemaster::Backend',
'versions' => [
{
'date' => '2017-11-02T13:57:24',
'version' => '2.0.0'
},
{
'date' => '2018-01-12T17:25:15',
'version' => '2.0.1'
},
{
'date' => '2018-02-23T13:09:41',
'version' => '2.0.2'
},
{
'date' => '2018-06-25T08:43:15',
'version' => '2.1.0'
},
{
'date' => '2019-05-24T07:07:47',
'version' => '4.0.0'
},
{
'date' => '2019-05-31T16:42:26',
'version' => '4.0.1'
},
{
'date' => '2020-05-01T14:49:55',
'version' => '5.0.0'
},
{
'date' => '2020-05-15T12:59:00',
'version' => '5.0.1'
},
{
'date' => '2020-05-22T07:31:56',
'version' => '5.0.2'
},
{
'date' => '2020-11-09T09:49:51',
'version' => '6.0.0'
},
{
'date' => '2020-11-10T10:02:13',
'version' => '6.0.1'
},
{
'date' => '2020-11-18T09:08:50',
'version' => '6.0.2'
},
{
'date' => '2021-02-09T11:02:57',
'version' => '6.1.0'
},
{
'date' => '2021-05-31T20:39:03',
'version' => '6.2.0'
},
{
'date' => '2021-09-18T14:05:03',
'version' => '7.0.0'
},
{
'date' => '2021-12-06T00:20:51',
'version' => '8.0.0'
},
{
'date' => '2021-12-20T10:08:13',
'version' => '8.1.0'
},
{
'date' => '2022-06-10T11:39:25',
'version' => '9.0.0'
},
{
'date' => '2022-07-08T08:40:31',
'version' => '9.0.1'
},
{
'date' => '2022-12-19T09:29:40',
'version' => '10.0.0'
},
{
'date' => '2023-01-31T16:06:19',
'version' => '10.0.1'
},
{
'date' => '2023-03-01T17:37:05',
'version' => '10.0.2'
},
{
'date' => '2023-06-21T16:14:40',
'version' => '11.0.0'
},
{
'date' => '2023-08-08T02:40:32',
'version' => '11.0.1'
},
{
'date' => '2023-09-08T09:18:30',
'version' => '11.0.2'
},
{
'date' => '2024-03-18T15:59:50',
'version' => '11.1.0'
},
{
'date' => '2024-03-28T10:49:24',
'version' => '11.1.1'
},
{
'date' => '2024-07-01T15:45:21',
'version' => '11.2.0'
},
{
'date' => '2024-12-09T13:52:41',
'version' => '11.3.0'
}
]
},
'eperl' => {
'advisories' => [
{
'affected_versions' => [
'<=2.2.14'
],
'cves' => [
'CVE-2001-0733'
],
'description' => 'The #sinclude directive in Embedded Perl (ePerl) 2.2.14 and earlier allows a remote attacker to execute arbitrary code by modifying the \'sinclude\' file to point to another file that contains a #include directive that references a file that contains the code.
',
'distribution' => 'eperl',
'fixed_versions' => [],
'id' => 'CPANSA-ePerl-2001-0733',
'references' => [
'http://www.securityfocus.com/archive/1/192711',
'http://www.securityfocus.com/bid/2912',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/6743'
],
'reported' => '2001-10-18',
'severity' => undef
}
],
'main_module' => 'Parse::ePerl',
'versions' => [
{
'date' => '1996-09-08T09:22:26',
'version' => '1.4'
},
{
'date' => '1997-01-20T06:55:18',
'version' => 'v2.0.3'
},
{
'date' => '1997-03-25T09:19:29',
'version' => '2.1'
},
{
'date' => '1997-04-03T12:24:29',
'version' => '2.1'
},
{
'date' => '1997-04-05T08:04:08',
'version' => '2.1'
},
{
'date' => '1997-04-18T16:36:34',
'version' => '2.1'
},
{
'date' => '1997-04-27T15:20:23',
'version' => 'v2.1.0'
},
{
'date' => '1997-05-04T20:06:49',
'version' => 'v2.1.1'
},
{
'date' => '1997-05-29T10:26:35',
'version' => '2.2'
},
{
'date' => '1997-05-30T06:24:00',
'version' => 'v2.1.2'
},
{
'date' => '1997-05-30T16:53:19',
'version' => '2.2'
},
{
'date' => '1997-06-06T07:37:49',
'version' => '2.2'
},
{
'date' => '1997-06-28T15:59:18',
'version' => '2.2'
},
{
'date' => '1997-07-19T08:23:43',
'version' => 'v2.2.0'
},
{
'date' => '1997-08-14T15:16:02',
'version' => 'v2.2.2'
},
{
'date' => '1997-08-21T15:44:18',
'version' => 'v2.2.3'
},
{
'date' => '1997-09-01T14:16:42',
'version' => 'v2.2.4'
},
{
'date' => '1997-09-03T10:33:40',
'version' => 'v2.2.5'
},
{
'date' => '1997-10-28T13:28:21',
'version' => 'v2.2.6'
},
{
'date' => '1997-11-17T16:37:11',
'version' => 'v2.2.8'
},
{
'date' => '1998-01-02T11:42:11',
'version' => 'v2.2.12'
},
{
'date' => '1998-07-10T09:22:54',
'version' => 'v2.2.13'
}
]
},
'libapreq2' => {
'advisories' => [
{
'affected_versions' => [
'<2.07'
],
'cves' => [
'CVE-2006-0042'
],
'description' => 'Unspecified vulnerability in apreq_parse_headers and apreq_parse_urlencoded functions in Apache2::Request (Libapreq2) allows remote attackers to cause a denial of service (CPU consumption) via unknown attack vectors that result in quadratic computational complexity.
',
'distribution' => 'libapreq2',
'fixed_versions' => [
'>=2.07'
],
'id' => 'CPANSA-libapreq2-2006-01',
'references' => [
'https://metacpan.org/changes/distribution/libapreq2'
],
'reported' => '2007-04-17'
}
],
'main_module' => 'Apache2::Cookie',
'versions' => [
{
'date' => '2003-11-11T01:28:48',
'version' => '2.01_03'
},
{
'date' => '2003-11-16T04:16:12',
'version' => '2.02_02'
},
{
'date' => '2004-06-12T14:52:49',
'version' => '2.03_04'
},
{
'date' => '2004-08-30T16:13:45',
'version' => '2.04_03'
},
{
'date' => '2005-05-04T23:38:05',
'version' => '2.05'
},
{
'date' => '2005-07-20T17:10:48',
'version' => '2.06'
},
{
'date' => '2006-02-12T18:10:47',
'version' => '2.07'
},
{
'date' => '2006-08-09T04:54:07',
'version' => '2.08'
},
{
'date' => '2009-03-13T22:47:11',
'version' => '2.12'
},
{
'date' => '2010-12-02T18:41:57',
'version' => '2.13'
},
{
'date' => '2021-02-23T13:26:47',
'version' => '2.15'
},
{
'date' => '2021-03-22T17:59:11',
'version' => '2.16'
}
]
},
'libwww-perl' => {
'advisories' => [
{
'affected_versions' => [
'<6.28'
],
'cves' => [],
'description' => 'LWP::Protocol::file can open existent file from file:// scheme. However, current version of LWP uses open FILEHANDLE,EXPR and it has ability to execute arbitrary command
',
'distribution' => 'libwww-perl',
'fixed_versions' => [
'>=6.27'
],
'id' => 'CPANSA-libwww-perl-2017-01',
'references' => [
'https://github.com/libwww-perl/libwww-perl/pull/270'
],
'reported' => '2017-11-06',
'reviewed_by' => [
{
'date' => '2022-06-23',
'email' => 'rrwo@cpan.org',
'name' => 'Robert Rothenberg'
}
]
},
{
'affected_versions' => [
'<6.00'
],
'cves' => [
'CVE-2011-0633'
],
'description' => 'The Net::HTTPS module in libwww-perl (LWP) before 6.00, as used in WWW::Mechanize, LWP::UserAgent, and other products, when running in environments that do not set the If-SSL-Cert-Subject header, does not enable full validation of SSL certificates by default, which allows remote attackers to spoof servers via man-in-the-middle (MITM) attacks involving hostnames that are not properly validated.
',
'distribution' => 'libwww-perl',
'fixed_versions' => [
'>=6.00'
],
'id' => 'CPANSA-libwww-perl-2011-01',
'references' => [
'http://vttynotes.blogspot.com/2010/12/man-in-middle-fun-with-perl-lwp.html',
'http://vttynotes.blogspot.com/2011/03/quick-note-on-lwp-and-perl-security-cve.html'
],
'reported' => '2011-01-20'
},
{
'affected_versions' => [
'<5.835'
],
'cves' => [
'CVE-2010-2253'
],
'description' => 'lwp-download in libwww-perl before 5.835 does not reject downloads to filenames that begin with a . (dot) character, which allows remote servers to create or overwrite files via (1) a 3xx redirect to a URL with a crafted filename or (2) a Content-Disposition header that suggests a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory.
',
'distribution' => 'libwww-perl',
'fixed_versions' => [
'>=5.835'
],
'id' => 'CPANSA-libwww-perl-2010-01',
'references' => [
'http://vttynotes.blogspot.com/2010/12/man-in-middle-fun-with-perl-lwp.html',
'http://vttynotes.blogspot.com/2011/03/quick-note-on-lwp-and-perl-security-cve.html'
],
'reported' => '2010-07-06'
},
{
'affected_versions' => [
'<5.51'
],
'cves' => [],
'description' => 'If LWP::UserAgent::env_proxy is called in a CGI environment, the case-insensitivity when looking for "http_proxy" permits "HTTP_PROXY" to be found, but this can be trivially set by the web client using the "Proxy:" header.
',
'distribution' => 'libwww-perl',
'fixed_versions' => [
'>=5.51'
],
'id' => 'CPANSA-libwww-perl-2001-01',
'reported' => '2001-03-14'
},
{
'affected_versions' => [
'<0.04'
],
'cves' => [],
'description' => 'There is a security hole with the implementation of getBasicCredentials().
',
'distribution' => 'libwww-perl',
'fixed_versions' => [
'>=0.04'
],
'id' => 'CPANSA-libwww-perl-1995-01',
'references' => [
'https://metacpan.org/dist/libwww-perl/changes'
],
'reported' => '1995-09-06'
}
],
'main_module' => 'LWP',
'versions' => [
{
'date' => '1995-09-16T13:51:35',
'version' => '5'
},
{
'date' => '1995-11-06T14:29:13',
'version' => '5'
},
{
'date' => '1996-05-09T22:43:16',
'version' => '5'
},
{
'date' => '1996-05-26T14:01:51',
'version' => '5.00'
},
{
'date' => '1996-08-02T16:38:58',
'version' => '5.01'
},
{
'date' => '1996-09-11T16:19:57',
'version' => '5.02'
},
{
'date' => '1996-09-30T22:58:37',
'version' => '5.03'
},
{
'date' => '1996-10-22T10:39:33',
'version' => '5.04'
},
{
'date' => '1996-12-04T23:36:17',
'version' => '5.05'
},
{
'date' => '1997-01-27T23:53:38',
'version' => '5.06'
},
{
'date' => '1997-02-11T14:20:18',
'version' => '5.07'
},
{
'date' => '1997-04-05T13:10:16',
'version' => '5.08'
},
{
'date' => '1997-06-10T11:07:01',
'version' => '5.09'
},
{
'date' => '1997-06-20T10:51:10',
'version' => '5.10'
},
{
'date' => '1997-08-06T08:41:11',
'version' => '5.11'
},
{
'date' => '1997-09-05T09:38:58',
'version' => '5.12'
},
{
'date' => '1997-09-20T12:50:59',
'version' => '5.13'
},
{
'date' => '1997-10-12T20:55:32',
'version' => '5.14'
},
{
'date' => '1997-11-06T20:23:06',
'version' => '5.15'
},
{
'date' => '1997-12-12T17:44:29',
'version' => '5.18'
},
{
'date' => '1997-12-16T22:25:00',
'version' => '5.18_03'
},
{
'date' => '1997-12-17T10:08:54',
'version' => '5.18_04'
},
{
'date' => '1998-01-20T18:16:51',
'version' => '5.18_05'
},
{
'date' => '1998-01-26T23:55:39',
'version' => '5.19'
},
{
'date' => '1998-02-12T23:43:23',
'version' => '5.20'
},
{
'date' => '1998-03-12T18:39:08',
'version' => '5.21'
},
{
'date' => '1998-03-24T19:42:54',
'version' => '5.22'
},
{
'date' => '1998-03-31T22:25:14',
'version' => '5.30'
},
{
'date' => '1998-04-10T15:07:10',
'version' => '5.31'
},
{
'date' => '1998-04-17T05:23:45',
'version' => '5.32'
},
{
'date' => '1998-05-07T15:10:00',
'version' => '5.33'
},
{
'date' => '1998-07-07T16:06:51',
'version' => '5.34'
},
{
'date' => '1998-07-09T23:05:12',
'version' => '5.35'
},
{
'date' => '1998-08-04T15:15:44',
'version' => '5.36'
},
{
'date' => '1998-10-12T17:42:28',
'version' => '5.40_01'
},
{
'date' => '1998-11-19T22:17:29',
'version' => '5.41'
},
{
'date' => '1999-03-20T07:52:48',
'version' => '5.42'
},
{
'date' => '1999-05-09T19:26:17',
'version' => '5.43'
},
{
'date' => '1999-06-25T20:34:40',
'version' => '5.44'
},
{
'date' => '1999-09-20T13:36:22',
'version' => '5.45'
},
{
'date' => '1999-10-28T12:30:45',
'version' => '5.46'
},
{
'date' => '1999-11-16T14:59:58',
'version' => '5.47'
},
{
'date' => '2000-04-09T19:45:32',
'version' => '5.48'
},
{
'date' => '2001-01-01T06:35:20',
'version' => '5.49'
},
{
'date' => '2001-01-12T20:58:43',
'version' => '5.50'
},
{
'date' => '2001-03-14T21:33:03',
'version' => '5.51'
},
{
'date' => '2001-03-29T21:39:12',
'version' => '5.52'
},
{
'date' => '2001-04-10T23:15:00',
'version' => '5.53'
},
{
'date' => '2001-04-19T06:13:35',
'version' => '5.53_90'
},
{
'date' => '2001-04-21T05:02:13',
'version' => '5.53_91'
},
{
'date' => '2001-04-25T17:37:11',
'version' => '5.53_92'
},
{
'date' => '2001-04-29T06:28:31',
'version' => '5.53_93'
},
{
'date' => '2001-05-05T13:57:20',
'version' => '5.53_94'
},
{
'date' => '2001-08-07T00:46:18',
'version' => '5.53_95'
},
{
'date' => '2001-08-28T05:59:46',
'version' => '5.53_96'
},
{
'date' => '2001-09-20T00:33:20',
'version' => '5.53_97'
},
{
'date' => '2001-10-26T23:30:57',
'version' => '5.60'
},
{
'date' => '2001-11-17T02:56:46',
'version' => '5.61'
},
{
'date' => '2001-11-21T19:00:47',
'version' => '5.62'
},
{
'date' => '2001-12-14T21:01:09',
'version' => '5.63'
},
{
'date' => '2002-02-09T18:54:35',
'version' => '5.64'
},
{
'date' => '2002-05-31T20:59:15',
'version' => '5.65'
},
{
'date' => '2002-12-20T19:28:34',
'version' => '5.66'
},
{
'date' => '2003-01-01T16:53:11',
'version' => '5.67'
},
{
'date' => '2003-01-03T05:04:44',
'version' => '5.68'
},
{
'date' => '2003-01-24T16:55:35',
'version' => '5.69'
},
{
'date' => '2003-10-13T20:56:35',
'version' => '5.70'
},
{
'date' => '2003-10-14T19:12:56',
'version' => '5.71'
},
{
'date' => '2003-10-15T19:53:47',
'version' => '5.72'
},
{
'date' => '2003-10-19T20:04:40',
'version' => '5.73'
},
{
'date' => '2003-10-23T19:26:57',
'version' => '5.74'
},
{
'date' => '2003-10-26T22:10:48',
'version' => '5.75'
},
{
'date' => '2003-11-21T19:33:09',
'version' => '5.76'
},
{
'date' => '2004-04-06T13:41:45',
'version' => '5.77'
},
{
'date' => '2004-04-07T11:13:36',
'version' => '5.78'
},
{
'date' => '2004-04-13T08:09:08',
'version' => '5.79'
},
{
'date' => '2004-06-16T10:43:42',
'version' => '5.800'
},
{
'date' => '2004-11-12T18:32:17',
'version' => '5.801'
},
{
'date' => '2004-11-30T13:06:01',
'version' => '5.802'
},
{
'date' => '2004-12-11T15:48:30',
'version' => '5.803'
},
{
'date' => '2005-12-06T09:36:12',
'version' => '5.804'
},
{
'date' => '2005-12-08T12:29:02',
'version' => '5.805'
},
{
'date' => '2007-07-19T21:31:44',
'version' => '5.806'
},
{
'date' => '2007-07-31T13:14:54',
'version' => '5.807'
},
{
'date' => '2007-08-05T13:29:17',
'version' => '5.808'
},
{
'date' => '2008-04-08T11:47:19',
'version' => '5.810'
},
{
'date' => '2008-04-14T08:28:19',
'version' => '5.811'
},
{
'date' => '2008-04-16T10:32:51',
'version' => '5.812'
},
{
'date' => '2008-06-17T20:37:17',
'version' => '5.813'
},
{
'date' => '2008-07-25T09:09:53',
'version' => '5.814'
},
{
'date' => '2008-09-24T18:10:11',
'version' => '5.815'
},
{
'date' => '2008-09-29T09:27:09',
'version' => '5.816'
},
{
'date' => '2008-10-10T21:31:27',
'version' => '5.817'
},
{
'date' => '2008-10-16T10:32:24',
'version' => '5.818'
},
{
'date' => '2008-10-20T11:43:37',
'version' => '5.819'
},
{
'date' => '2008-11-05T18:07:29',
'version' => '5.820'
},
{
'date' => '2008-11-25T00:16:49',
'version' => '5.821'
},
{
'date' => '2008-12-05T19:18:40',
'version' => '5.822'
},
{
'date' => '2009-01-12T16:50:02',
'version' => '5.823'
},
{
'date' => '2009-02-13T14:12:29',
'version' => '5.824'
},
{
'date' => '2009-02-16T10:00:35',
'version' => '5.825'
},
{
'date' => '2009-04-24T20:42:45',
'version' => '5.826'
},
{
'date' => '2009-06-15T19:36:37',
'version' => '5.827'
},
{
'date' => '2009-06-25T19:44:55',
'version' => '5.828'
},
{
'date' => '2009-07-08T20:03:11',
'version' => '5.829'
},
{
'date' => '2009-07-26T19:39:49',
'version' => '5.830'
},
{
'date' => '2009-08-13T20:53:34',
'version' => '5.831'
},
{
'date' => '2009-09-21T18:24:41',
'version' => '5.832'
},
{
'date' => '2009-10-06T21:23:39',
'version' => '5.833'
},
{
'date' => '2009-11-21T13:09:14',
'version' => '5.834'
},
{
'date' => '2010-05-05T21:13:47',
'version' => '5.835'
},
{
'date' => '2010-05-13T07:34:58',
'version' => '5.836'
},
{
'date' => '2010-09-20T21:24:38',
'version' => '5.837'
},
{
'date' => '2010-11-04T15:16:35',
'version' => '5.837'
},
{
'date' => '2011-03-08T19:25:05',
'version' => '6.00'
},
{
'date' => '2011-03-09T23:30:57',
'version' => '6.01'
},
{
'date' => '2011-03-27T11:35:01',
'version' => '6.02'
},
{
'date' => '2011-10-15T13:38:28',
'version' => '6.03'
},
{
'date' => '2012-02-18T22:13:13',
'version' => '6.04'
},
{
'date' => '2013-03-11T21:47:56',
'version' => '6.05'
},
{
'date' => '2014-04-16T18:38:49',
'version' => '6.06'
},
{
'date' => '2014-07-02T05:10:47',
'version' => '6.07'
},
{
'date' => '2014-07-25T03:19:43',
'version' => '6.08'
},
{
'date' => '2015-02-10T02:58:40',
'version' => '6.09'
},
{
'date' => '2015-02-12T17:40:48',
'version' => '6.10'
},
{
'date' => '2015-02-13T21:38:49',
'version' => '6.11'
},
{
'date' => '2015-02-14T00:16:15',
'version' => '6.12'
},
{
'date' => '2015-02-14T18:45:12',
'version' => '6.13'
},
{
'date' => '2015-11-25T20:23:47',
'version' => '6.14_001'
},
{
'date' => '2015-12-05T06:01:09',
'version' => '6.15'
},
{
'date' => '2016-01-05T00:29:20',
'version' => '6.15_001'
},
{
'date' => '2016-01-14T01:52:18',
'version' => '6.15_002'
},
{
'date' => '2016-01-14T02:01:20',
'version' => '6.15_003'
},
{
'date' => '2016-02-13T06:18:45',
'version' => '6.15_004'
},
{
'date' => '2017-01-18T14:22:22',
'version' => '6.16'
},
{
'date' => '2017-01-31T19:39:10',
'version' => '6.17'
},
{
'date' => '2017-02-03T20:31:54',
'version' => '6.18'
},
{
'date' => '2017-02-14T19:56:20',
'version' => '6.19'
},
{
'date' => '2017-02-21T15:19:06',
'version' => '6.20'
},
{
'date' => '2017-02-21T20:38:03',
'version' => '6.21'
},
{
'date' => '2017-03-01T15:27:43',
'version' => '6.22'
},
{
'date' => '2017-03-07T03:49:52',
'version' => '6.23'
},
{
'date' => '2017-03-14T16:36:38',
'version' => '6.24'
},
{
'date' => '2017-04-03T17:20:06',
'version' => '6.25'
},
{
'date' => '2017-04-12T15:36:20',
'version' => '6.26'
},
{
'date' => '2017-09-21T22:32:37',
'version' => '6.27'
},
{
'date' => '2017-11-06T15:43:47',
'version' => '6.28'
},
{
'date' => '2017-11-06T20:34:56',
'version' => '6.29'
},
{
'date' => '2017-12-08T01:57:23',
'version' => '6.30'
},
{
'date' => '2017-12-11T01:57:47',
'version' => '6.31'
},
{
'date' => '2018-02-20T19:41:40',
'version' => '6.32'
},
{
'date' => '2018-02-27T04:04:55',
'version' => '6.33'
},
{
'date' => '2018-06-05T18:50:45',
'version' => '6.34'
},
{
'date' => '2018-07-16T04:51:16',
'version' => '6.35'
},
{
'date' => '2018-10-10T02:21:49',
'version' => '6.36'
},
{
'date' => '2019-03-06T20:51:05',
'version' => '6.37'
},
{
'date' => '2019-03-25T19:00:53',
'version' => '6.38'
},
{
'date' => '2019-05-06T14:19:25',
'version' => '6.39'
},
{
'date' => '2019-10-24T13:08:25',
'version' => '6.40'
},
{
'date' => '2019-10-28T14:45:05',
'version' => '6.41'
},
{
'date' => '2019-11-20T17:41:59',
'version' => '6.42'
},
{
'date' => '2019-11-26T13:56:02',
'version' => '6.43'
},
{
'date' => '2020-04-14T19:39:37',
'version' => '6.44'
},
{
'date' => '2020-06-08T14:52:52',
'version' => '6.45'
},
{
'date' => '2020-06-23T21:20:14',
'version' => '6.46'
},
{
'date' => '2020-08-18T15:28:34',
'version' => '6.47'
},
{
'date' => '2020-09-20T15:26:52',
'version' => '6.48'
},
{
'date' => '2020-09-24T00:29:49',
'version' => '6.49'
},
{
'date' => '2020-12-16T18:36:35',
'version' => '6.50'
},
{
'date' => '2020-12-29T22:09:46',
'version' => '6.51'
},
{
'date' => '2021-01-07T21:58:27',
'version' => '6.52'
},
{
'date' => '2021-03-07T16:55:35',
'version' => '6.53'
},
{
'date' => '2021-05-06T17:55:38',
'version' => '6.54'
},
{
'date' => '2021-06-17T13:58:40',
'version' => '6.55'
},
{
'date' => '2021-08-17T13:58:19',
'version' => '6.56'
},
{
'date' => '2021-09-20T20:29:02',
'version' => '6.57'
},
{
'date' => '2021-10-25T20:44:12',
'version' => '6.58'
},
{
'date' => '2021-12-02T21:20:00',
'version' => '6.59'
},
{
'date' => '2021-12-17T22:33:53',
'version' => '6.60'
},
{
'date' => '2022-01-21T21:44:31',
'version' => '6.61'
},
{
'date' => '2022-04-05T01:05:20',
'version' => '6.62'
},
{
'date' => '2022-04-25T15:25:43',
'version' => '6.63'
},
{
'date' => '2022-04-26T13:17:45',
'version' => '6.64'
},
{
'date' => '2022-05-09T18:42:27',
'version' => '6.65'
},
{
'date' => '2022-05-18T16:57:21',
'version' => '6.66'
},
{
'date' => '2022-06-14T20:24:12',
'version' => '6.67'
},
{
'date' => '2023-02-27T19:20:03',
'version' => '6.68'
},
{
'date' => '2023-04-29T13:15:34',
'version' => '6.69'
},
{
'date' => '2023-04-30T13:26:14',
'version' => '6.70'
},
{
'date' => '2023-06-20T19:46:00',
'version' => '6.71'
},
{
'date' => '2023-07-17T22:02:15',
'version' => '6.72'
},
{
'date' => '2024-01-13T20:26:02',
'version' => '6.73'
},
{
'date' => '2024-01-22T17:49:13',
'version' => '6.74'
},
{
'date' => '2024-01-24T14:30:24',
'version' => '6.75'
},
{
'date' => '2024-01-25T18:33:12',
'version' => '6.76'
},
{
'date' => '2024-03-11T00:58:25',
'version' => '6.77'
}
]
},
'mod_perl' => {
'advisories' => [
{
'affected_versions' => [
'<1.31'
],
'cves' => [
'CVE-2009-0796'
],
'description' => 'XSS in Apache::Status.
',
'distribution' => 'mod_perl',
'fixed_versions' => [
'>=1.31'
],
'id' => 'CPANSA-mod_perl-2009-01',
'references' => [
'https://metacpan.org/changes/distribution/mod_perl'
],
'reported' => '2009-05-11'
},
{
'affected_versions' => [
'<1.30'
],
'cves' => [
'CVE-2007-1349'
],
'description' => 'Unescaped variable interpolation in Apache::PerlRun regular expression could cause regex engine tampering.
',
'distribution' => 'mod_perl',
'fixed_versions' => [
'>=1.30'
],
'id' => 'CPANSA-mod_perl-2007-01',
'references' => [
'https://metacpan.org/changes/distribution/mod_perl'
],
'reported' => '2007-03-29'
},
{
'affected_versions' => [
'>=2.0,<=2.0.10'
],
'cves' => [
'CVE-2011-2767'
],
'description' => 'mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator\'s control of HTTP request processing without also permitting unprivileged users to run Perl code in the context of the user account that runs Apache HTTP Server processes.
',
'distribution' => 'mod_perl',
'fixed_versions' => [],
'id' => 'CPANSA-mod_perl-2011-2767',
'references' => [
'https://mail-archives.apache.org/mod_mbox/perl-modperl/201110.mbox/raw/%3C20111004084343.GA21290%40ktnx.net%3E',
'https://bugs.debian.org/644169',
'https://lists.debian.org/debian-lts-announce/2018/09/msg00018.html',
'https://access.redhat.com/errata/RHSA-2018:2737',
'https://access.redhat.com/errata/RHSA-2018:2826',
'https://access.redhat.com/errata/RHSA-2018:2825',
'http://www.securityfocus.com/bid/105195',
'https://usn.ubuntu.com/3825-1/',
'https://usn.ubuntu.com/3825-2/',
'https://lists.apache.org/thread.html/c8ebe8aad147a3ad2e7b0e8b2da45263171ab5d0fc7f8c100feaa94d@%3Cmodperl-cvs.perl.apache.org%3E',
'http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00063.html',
'http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00065.html'
],
'reported' => '2018-08-26',
'severity' => 'critical'
}
],
'main_module' => 'mod_perl2',
'versions' => [
{
'date' => '1996-05-21T02:07:05',
'version' => '0.60'
},
{
'date' => '1996-05-21T20:51:37',
'version' => '0.60'
},
{
'date' => '1996-06-18T19:41:55',
'version' => '0.60'
},
{
'date' => '1996-06-25T15:49:56',
'version' => '0.60'
},
{
'date' => '1996-07-14T23:39:07',
'version' => '0.70'
},
{
'date' => '1996-07-26T20:39:23',
'version' => '0.76'
},
{
'date' => '1996-09-08T22:13:32',
'version' => '0.81'
},
{
'date' => '1996-10-04T15:50:31',
'version' => '0.83_02'
},
{
'date' => '1996-10-09T07:10:24',
'version' => '0.83_03'
},
{
'date' => '1996-10-14T03:46:54',
'version' => '0.83_04'
},
{
'date' => '1996-10-15T13:34:22',
'version' => '0.83_05'
},
{
'date' => '1996-10-17T03:48:27',
'version' => '0.83_06'
},
{
'date' => '1996-10-18T22:18:01',
'version' => '0.83_07'
},
{
'date' => '1996-10-21T01:37:29',
'version' => '0.83_09'
},
{
'date' => '1996-10-25T14:09:06',
'version' => '0.83_10'
},
{
'date' => '1996-10-28T00:01:00',
'version' => '0.84'
},
{
'date' => '1996-11-13T05:39:14',
'version' => '0.85'
},
{
'date' => '1996-11-14T07:21:01',
'version' => '0.85_01'
},
{
'date' => '1996-11-27T17:19:02',
'version' => '0.85_02'
},
{
'date' => '1996-12-05T03:37:12',
'version' => '0.85_03'
},
{
'date' => '1996-12-10T23:17:33',
'version' => '0.85_04'
},
{
'date' => '1996-12-17T13:31:40',
'version' => '0.85_06'
},
{
'date' => '1996-12-19T14:32:44',
'version' => '0.86'
},
{
'date' => '1996-12-24T04:19:35',
'version' => '0.87'
},
{
'date' => '1996-12-24T20:41:28',
'version' => '0.88'
},
{
'date' => '1996-12-31T04:43:25',
'version' => '0.89'
},
{
'date' => '1996-12-31T07:52:56',
'version' => '0.90'
},
{
'date' => '1997-01-20T10:04:20',
'version' => '0.90_01'
},
{
'date' => '1997-01-23T00:58:22',
'version' => '0.91'
},
{
'date' => '1997-01-23T15:56:19',
'version' => '0.92'
},
{
'date' => '1997-01-28T02:37:30',
'version' => '0.93'
},
{
'date' => '1997-03-05T03:19:32',
'version' => '0.93_01'
},
{
'date' => '1997-03-10T12:07:39',
'version' => '0.94'
},
{
'date' => '1997-03-23T18:53:46',
'version' => '0.95'
},
{
'date' => '1997-03-23T18:54:02',
'version' => '0.95_02'
},
{
'date' => '1997-04-01T04:44:44',
'version' => '0.95_03'
},
{
'date' => '1997-04-02T01:35:22',
'version' => '0.95_04'
},
{
'date' => '1997-04-02T03:20:37',
'version' => '0.95_05'
},
{
'date' => '1997-04-02T04:42:28',
'version' => '0.95_06'
},
{
'date' => '1997-04-04T05:33:39',
'version' => '0.96'
},
{
'date' => '1997-04-16T03:54:02',
'version' => '0.97'
},
{
'date' => '1997-04-23T03:29:01',
'version' => '0.97_01'
},
{
'date' => '1997-04-30T03:56:50',
'version' => '0.97_02'
},
{
'date' => '1997-05-02T19:58:12',
'version' => '0.98'
},
{
'date' => '1997-05-19T22:59:20',
'version' => '0.98_03'
},
{
'date' => '1997-05-23T00:24:28',
'version' => '0.98_05'
},
{
'date' => '1997-05-30T02:07:03',
'version' => '0.98_08'
},
{
'date' => '1997-06-02T00:05:45',
'version' => '0.98_09'
},
{
'date' => '1997-06-03T03:15:48',
'version' => '0.98_10'
},
{
'date' => '1997-06-04T01:54:46',
'version' => '0.98_11'
},
{
'date' => '1997-06-06T01:14:09',
'version' => '0.98_12'
},
{
'date' => '1997-06-12T00:36:43',
'version' => '0.99'
},
{
'date' => '1997-06-30T03:04:22',
'version' => '1.00'
},
{
'date' => '1997-07-08T06:20:15',
'version' => '1.00'
},
{
'date' => '1997-07-30T20:57:59',
'version' => '1.00'
},
{
'date' => '1997-08-25T22:00:29',
'version' => '0.85_05'
},
{
'date' => '1997-09-16T01:09:06',
'version' => '1.00_02'
},
{
'date' => '1997-09-21T21:40:32',
'version' => '1.00_03'
},
{
'date' => '1997-10-17T00:04:35',
'version' => '1.01'
},
{
'date' => '1997-10-17T15:40:45',
'version' => '1.02'
},
{
'date' => '1997-10-24T04:02:30',
'version' => '1.03'
},
{
'date' => '1997-10-31T03:59:22',
'version' => '1.04'
},
{
'date' => '1997-11-07T04:32:07',
'version' => '1.05'
},
{
'date' => '1997-11-26T02:09:01',
'version' => '1.07'
},
{
'date' => '1997-12-02T21:34:03',
'version' => '1.07_01'
},
{
'date' => '1997-12-22T09:29:56',
'version' => '1.07_02'
},
{
'date' => '1998-01-08T10:21:31',
'version' => '1.07_03'
},
{
'date' => '1998-01-28T02:10:28',
'version' => '1.07_03'
},
{
'date' => '1998-01-29T00:47:52',
'version' => '1.07_03'
},
{
'date' => '1998-02-10T11:04:03',
'version' => '1.07_04'
},
{
'date' => '1998-02-12T15:08:20',
'version' => '1.07_04'
},
{
'date' => '1998-02-20T03:43:49',
'version' => '1.08'
},
{
'date' => '1998-03-07T01:06:09',
'version' => '1.08'
},
{
'date' => '1998-03-19T07:39:18',
'version' => '1.09'
},
{
'date' => '1998-03-21T04:14:02',
'version' => '1.10'
},
{
'date' => '1998-03-27T16:52:20',
'version' => '1.10'
},
{
'date' => '1998-04-21T14:43:05',
'version' => '1.11'
},
{
'date' => '1998-04-24T18:58:30',
'version' => '1.11'
},
{
'date' => '1998-06-09T16:51:19',
'version' => '1.11'
},
{
'date' => '1998-06-14T19:21:25',
'version' => '1.12'
},
{
'date' => '1998-07-14T01:13:07',
'version' => '1.13'
},
{
'date' => '1998-07-19T00:19:20',
'version' => '1.14'
},
{
'date' => '1998-07-24T13:52:53',
'version' => '1.15'
},
{
'date' => '1998-07-24T15:59:13',
'version' => '1.15'
},
{
'date' => '1998-09-20T00:02:57',
'version' => '1.15_01'
},
{
'date' => '1998-10-02T23:10:02',
'version' => '1.16'
},
{
'date' => '1998-10-28T18:16:45',
'version' => '1.16'
},
{
'date' => '1998-11-24T23:54:59',
'version' => '1.16_01'
},
{
'date' => '1998-12-01T00:01:25',
'version' => '1.16_02'
},
{
'date' => '1999-01-28T06:27:45',
'version' => '1.18'
},
{
'date' => '1999-06-11T17:22:35',
'version' => '1.20'
},
{
'date' => '1999-07-02T23:43:56',
'version' => '1.21'
},
{
'date' => '2000-03-06T01:32:31',
'version' => '1.21_01'
},
{
'date' => '2000-03-07T07:56:53',
'version' => '1.21_02'
},
{
'date' => '2000-03-15T10:25:52',
'version' => '1.21_03'
},
{
'date' => '2000-03-23T06:51:53',
'version' => '1.22'
},
{
'date' => '2000-04-21T06:51:47',
'version' => '1.23'
},
{
'date' => '2000-05-17T05:44:34',
'version' => '1.24'
},
{
'date' => '2000-10-10T16:44:39',
'version' => '1.24_01'
},
{
'date' => '2001-01-30T04:33:45',
'version' => '1.25'
},
{
'date' => '2001-07-06T21:27:16',
'version' => '1.25_01'
},
{
'date' => '2001-07-12T02:23:32',
'version' => '1.26'
},
{
'date' => '2002-04-07T04:58:26',
'version' => '1.99_01'
},
{
'date' => '2002-06-02T03:05:50',
'version' => '1.27'
},
{
'date' => '2002-06-02T03:27:13',
'version' => '1.99_02'
},
{
'date' => '2002-06-15T23:59:37',
'version' => '1.99_03'
},
{
'date' => '2002-06-21T22:45:41',
'version' => '1.99_04'
},
{
'date' => '2002-08-20T16:54:13',
'version' => '1.99_05'
},
{
'date' => '2002-09-27T15:19:03',
'version' => '1.99_06'
},
{
'date' => '2002-09-27T19:41:50',
'version' => '1.99_07'
},
{
'date' => '2003-01-11T04:22:19',
'version' => '1.99_08'
},
{
'date' => '2003-04-28T02:36:59',
'version' => '1.99_09'
},
{
'date' => '2003-07-03T03:32:20',
'version' => '1.28'
},
{
'date' => '2003-09-29T17:11:24',
'version' => '1.99_10'
},
{
'date' => '2003-10-08T04:54:22',
'version' => '1.29'
},
{
'date' => '2003-11-10T21:04:15',
'version' => '1.99_11'
},
{
'date' => '2003-12-22T19:56:22',
'version' => '1.99_12'
},
{
'date' => '2004-03-09T00:29:43',
'version' => '1.99_13'
},
{
'date' => '2004-05-21T18:02:49',
'version' => '1.99_14'
},
{
'date' => '2004-08-20T18:35:12',
'version' => '1.99_15'
},
{
'date' => '2004-08-23T05:59:47',
'version' => '1.99_16'
},
{
'date' => '2004-10-22T21:38:19',
'version' => '1.99_17'
},
{
'date' => '2004-12-12T23:22:37',
'version' => 'v2.0.0'
},
{
'date' => '2004-12-23T23:38:49',
'version' => 'v2.0.0'
},
{
'date' => '2005-01-06T01:27:43',
'version' => 'v2.0.0'
},
{
'date' => '2005-01-22T08:55:19',
'version' => 'v2.0.0'
},
{
'date' => '2005-04-14T13:19:23',
'version' => 'v2.0.0'
},
{
'date' => '2005-05-04T02:48:58',
'version' => 'v2.0.0'
},
{
'date' => '2005-05-20T05:12:45',
'version' => 'v2.0.0'
},
{
'date' => '2005-06-17T21:05:23',
'version' => 'v2.0.1'
},
{
'date' => '2005-10-21T01:27:23',
'version' => 'v2.0.2'
},
{
'date' => '2006-11-29T08:29:30',
'version' => 'v2.0.3'
},
{
'date' => '2007-03-30T06:19:02',
'version' => '1.30'
},
{
'date' => '2008-04-17T06:32:36',
'version' => 'v2.0.4'
},
{
'date' => '2009-05-13T02:29:50',
'version' => '1.31'
},
{
'date' => '2011-02-07T23:31:36',
'version' => 'v2.0.5'
},
{
'date' => '2012-04-25T15:31:27',
'version' => 'v2.0.6'
},
{
'date' => '2012-06-06T02:40:24',
'version' => 'v2.0.7'
},
{
'date' => '2013-04-18T02:15:56',
'version' => '2.0.8'
},
{
'date' => '2015-06-18T21:16:34',
'version' => '2.0.9'
},
{
'date' => '2016-10-27T21:16:36',
'version' => '2.0.10'
},
{
'date' => '2019-10-05T11:36:44',
'version' => '2.0.11'
},
{
'date' => '2022-01-30T13:36:21',
'version' => '2.0.12'
},
{
'date' => '2023-10-21T10:32:29',
'version' => '2.0.13'
}
]
},
'perl' => {
'advisories' => [
{
'affected_versions' => [
'<1.13'
],
'cves' => [
'CVE-2011-2728'
],
'description' => 'The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference.
',
'distribution' => 'perl',
'fixed_versions' => [],
'id' => 'CPANSA-File-Glob-2011-2728',
'references' => [
'http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069752.html',
'http://www.securityfocus.com/bid/49858',
'http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod',
'http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77',
'http://secunia.com/advisories/46172',
'https://blogs.oracle.com/sunsecurity/entry/cve_2011_2728_denial_of1',
'https://bugzilla.redhat.com/show_bug.cgi?id=742987'
],
'reported' => '2012-12-21',
'severity' => undef
},
{
'affected_versions' => [
'<5.24.1'
],
'cves' => [
'CVE-2016-1238'
],
'description' => '(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.
',
'distribution' => 'perl',
'fixed_versions' => [
'>=5.24.1'
],
'id' => 'CPANSA-ExtUtils-ParseXS-2016-1238',
'references' => [
'https://perldoc.perl.org/5.24.1/perldelta',
'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html',
'http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab',
'http://www.debian.org/security/2016/dsa-3628',
'http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html',
'http://www.securityfocus.com/bid/92136',
'http://www.securitytracker.com/id/1036440',
'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731',
'https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c%40%3Cannounce.apache.org%3E',
'https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html',
'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/',
'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/',
'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/',
'https://rt.perl.org/Public/Bug/Display.html?id=127834',
'https://security.gentoo.org/glsa/201701-75',
'https://security.gentoo.org/glsa/201812-07',
'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html',
'http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab',
'http://www.debian.org/security/2016/dsa-3628',
'http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html',
'http://www.securityfocus.com/bid/92136',
'http://www.securitytracker.com/id/1036440',
'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731',
'https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c%40%3Cannounce.apache.org%3E',
'https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html',
'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/',
'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/',
'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/',
'https://rt.perl.org/Public/Bug/Display.html?id=127834',
'https://security.gentoo.org/glsa/201701-75',
'https://security.gentoo.org/glsa/201812-07'
],
'reported' => '2016-08-02',
'severity' => 'high'
},
{
'affected_versions' => [
'>=5.22.0,<5.24.0'
],
'cves' => [
'CVE-2016-6185'
],
'description' => 'The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.
',
'distribution' => 'perl',
'fixed_versions' => [
'>=5.24.0'
],
'id' => 'CPANSA-perl-2016-6185',
'references' => [
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/',
'https://github.com/Perl/perl5/commit/08e3451d7b3b714ad63a27f1b9c2a23ee75d15ee',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/',
'http://www.openwall.com/lists/oss-security/2016/07/07/1',
'http://www.openwall.com/lists/oss-security/2016/07/08/5',
'https://rt.cpan.org/Public/Bug/Display.html?id=115808',
'http://www.debian.org/security/2016/dsa-3628',
'http://www.securitytracker.com/id/1036260',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/',
'http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html',
'http://www.securityfocus.com/bid/91685',
'https://security.gentoo.org/glsa/201701-75',
'https://usn.ubuntu.com/3625-2/',
'https://usn.ubuntu.com/3625-1/',
'https://github.com/Perl/perl5/blob/blead/pod/perl5260delta.pod'
],
'reported' => '2016-08-02',
'severity' => 'high'
},
{
'affected_versions' => [
'>=5.005,<5.24.0'
],
'cves' => [
'CVE-2015-8608'
],
'description' => 'The VDir::MapPathA and VDir::MapPathW functions in Perl 5.22 allow remote attackers to cause a denial of service (out-of-bounds read) and possibly execute arbitrary code via a crafted (1) drive letter or (2) pInName argument.
',
'distribution' => 'perl',
'fixed_versions' => [
'>=5.24.0'
],
'id' => 'CPANSA-perl-2015-8608',
'references' => [
'https://rt.perl.org/Public/Bug/Display.html?id=126755',
'https://github.com/Perl/perl5/issues/15067',
'https://packetstormsecurity.com/files/136649/Perl-5.22-VDir-MapPathA-W-Out-Of-Bounds-Reads-Buffer-Over-Reads.html',
'http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html',
'https://www.oracle.com/security-alerts/cpujul2020.html'
],
'reported' => '2017-02-07',
'severity' => 'critical'
},
{
'affected_versions' => [
'<5.14.2'
],
'cves' => [
'CVE-2011-2728'
],
'description' => 'The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference.
',
'distribution' => 'perl',
'fixed_versions' => [],
'id' => 'CPANSA-perl-2011-2728',
'references' => [
'http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069752.html',
'http://www.securityfocus.com/bid/49858',
'http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod',
'http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77',
'http://secunia.com/advisories/46172',
'https://blogs.oracle.com/sunsecurity/entry/cve_2011_2728_denial_of1',
'https://bugzilla.redhat.com/show_bug.cgi?id=742987'
],
'reported' => '2012-12-21',
'severity' => undef
},
{
'affected_versions' => [
'<5.28.3',
'>=5.30.0,<5.30.3'
],
'cves' => [
'CVE-2020-12723'
],
'description' => 'regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
',
'distribution' => 'perl',
'fixed_versions' => [
'>=5.30.3'
],
'id' => 'CPANSA-perl-2020-12723',
'references' => [
'https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3',
'https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod',
'https://github.com/Perl/perl5/issues/16947',
'https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a',
'https://github.com/Perl/perl5/issues/17743',
'https://security.netapp.com/advisory/ntap-20200611-0001/',
'https://security.gentoo.org/glsa/202006-03',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/',
'http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html',
'https://www.oracle.com/security-alerts/cpuoct2020.html',
'https://www.oracle.com/security-alerts/cpujan2021.html',
'https://www.oracle.com/security-alerts/cpuApr2021.html',
'https://www.oracle.com//security-alerts/cpujul2021.html',
'https://www.oracle.com/security-alerts/cpuoct2021.html',
'https://www.oracle.com/security-alerts/cpujan2022.html',
'https://www.oracle.com/security-alerts/cpuapr2022.html',
'https://perldoc.perl.org/perl5283delta',
'https://perldoc.perl.org/perl5303delta',
'https://perldoc.perl.org/perl5320delta'
],
'reported' => '2020-06-05',
'severity' => 'high'
},
{
'affected_versions' => [
'<5.28.3',
'>=5.30.0,<5.30.3'
],
'cves' => [
'CVE-2020-10878'
],
'description' => 'Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
',
'distribution' => 'perl',
'fixed_versions' => [
'>=5.30.3'
],
'id' => 'CPANSA-perl-2020-10878',
'references' => [
'https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3',
'https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c',
'https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8',
'https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod',
'https://security.netapp.com/advisory/ntap-20200611-0001/',
'https://security.gentoo.org/glsa/202006-03',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/',
'http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html',
'https://www.oracle.com/security-alerts/cpuoct2020.html',
'https://www.oracle.com/security-alerts/cpujan2021.html',
'https://www.oracle.com/security-alerts/cpuApr2021.html',
'https://www.oracle.com//security-alerts/cpujul2021.html',
'https://www.oracle.com/security-alerts/cpuoct2021.html',
'https://www.oracle.com/security-alerts/cpujan2022.html',
'https://www.oracle.com/security-alerts/cpuapr2022.html',
'https://perldoc.perl.org/perl5283delta',
'https://perldoc.perl.org/perl5303delta',
'https://perldoc.perl.org/perl5320delta'
],
'reported' => '2020-06-05',
'severity' => 'high'
},
{
'affected_versions' => [
'<5.28.3',
'>=5.30.0,<5.30.3'
],
'cves' => [
'CVE-2020-10543'
],
'description' => 'Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.
',
'distribution' => 'perl',
'fixed_versions' => [
'>=5.30.3'
],
'id' => 'CPANSA-perl-2020-10543',
'references' => [
'https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3',
'https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed',
'https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod',
'https://security.netapp.com/advisory/ntap-20200611-0001/',
'https://security.gentoo.org/glsa/202006-03',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/',
'http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html',
'https://www.oracle.com/security-alerts/cpuoct2020.html',
'https://www.oracle.com/security-alerts/cpujan2021.html',
'https://www.oracle.com/security-alerts/cpuApr2021.html',
'https://www.oracle.com//security-alerts/cpujul2021.html',
'https://www.oracle.com/security-alerts/cpuoct2021.html',
'https://www.oracle.com/security-alerts/cpujan2022.html',
'https://www.oracle.com/security-alerts/cpuapr2022.html',
'https://perldoc.perl.org/perl5283delta',
'https://perldoc.perl.org/perl5303delta',
'https://perldoc.perl.org/perl5320delta'
],
'reported' => '2020-06-05',
'severity' => 'high'
},
{
'affected_versions' => [
'>=5.22.0,<5.24.4',
'>=5.26.0,<5.28.2'
],
'cves' => [
'CVE-2018-6798'
],
'description' => 'An issue was discovered in Perl 5.22 through 5.26. Matching a crafted locale dependent regular expression can cause a heap-based buffer over-read and potentially information disclosure.
',
'distribution' => 'perl',
'fixed_versions' => [
'>=5.28.0'
],
'id' => 'CPANSA-perl-2018-6798',
'references' => [
'https://www.debian.org/security/2018/dsa-4172',
'https://rt.perl.org/Public/Bug/Display.html?id=132063',
'http://www.securitytracker.com/id/1040681',
'https://access.redhat.com/errata/RHSA-2018:1192',
'https://usn.ubuntu.com/3625-1/',
'https://security.gentoo.org/glsa/201909-01',
'https://www.oracle.com/security-alerts/cpujul2020.html',
'https://perldoc.perl.org/perl5244delta',
'https://perldoc.perl.org/perl5262delta',
'https://github.com/Perl/perl5/issues/16143'
],
'reported' => '2018-04-17',
'severity' => 'high'
},
{
'affected_versions' => [
'>=5.18.0,<5.24.4',
'>=5.26.0,<5.26.2'
],
'cves' => [
'CVE-2018-6797'
],
'description' => 'An issue was discovered in Perl 5.18 through 5.26. A crafted regular expression can cause a heap-based buffer overflow, with control over the bytes written.
',
'distribution' => 'perl',
'fixed_versions' => [
'>=5.28.0'
],
'id' => 'CPANSA-perl-2018-6797',
'references' => [
'https://www.debian.org/security/2018/dsa-4172',
'https://rt.perl.org/Public/Bug/Display.html?id=132227',
'http://www.securitytracker.com/id/1040681',
'https://access.redhat.com/errata/RHSA-2018:1192',
'https://usn.ubuntu.com/3625-1/',
'http://www.securitytracker.com/id/1042004',
'https://security.gentoo.org/glsa/201909-01',
'https://www.oracle.com/security-alerts/cpujul2020.html',
'https://perldoc.perl.org/perl5244delta',
'https://perldoc.perl.org/perl5262delta'
],
'reported' => '2018-04-17',
'severity' => 'critical'
},
{
'affected_versions' => [
'<5.24.4',
'>=5.26.0,<5.26.2'
],
'cves' => [
'CVE-2018-6913'
],
'description' => 'Heap-based buffer overflow in the pack function in Perl before 5.26.2 allows context-dependent attackers to execute arbitrary code via a large item count.
',
'distribution' => 'perl',
'fixed_versions' => [
'>=5.26.2'
],
'id' => 'CPANSA-perl-2018-6913',
'references' => [
'https://www.debian.org/security/2018/dsa-4172',
'https://rt.perl.org/Public/Bug/Display.html?id=131844',
'https://lists.debian.org/debian-lts-announce/2018/04/msg00009.html',
'http://www.securitytracker.com/id/1040681',
'https://usn.ubuntu.com/3625-2/',
'https://usn.ubuntu.com/3625-1/',
'http://www.securityfocus.com/bid/103953',
'https://security.gentoo.org/glsa/201909-01',
'https://www.oracle.com/security-alerts/cpujul2020.html',
'https://perldoc.perl.org/perl5244delta',
'https://perldoc.perl.org/perl5262delta',
'https://github.com/Perl/perl5/issues/16098'
],
'reported' => '2018-04-17',
'severity' => 'critical'
},
{
'affected_versions' => [
'<5.26.3'
],
'cves' => [
'CVE-2018-18314'
],
'description' => 'Perl before 5.26.3 has a buffer overflow via a crafted regular expression that triggers invalid write operations.
',
'distribution' => 'perl',
'fixed_versions' => [
'>=5.26.3'
],
'id' => 'CPANSA-perl-2018-18314',
'references' => [
'https://www.debian.org/security/2018/dsa-4347',
'https://rt.perl.org/Ticket/Display.html?id=131649',
'https://metacpan.org/changes/release/SHAY/perl-5.26.3',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/',
'https://github.com/Perl/perl5/commit/19a498a461d7c81ae3507c450953d1148efecf4f',
'https://bugzilla.redhat.com/show_bug.cgi?id=1646751',
'http://www.securitytracker.com/id/1042181',
'https://usn.ubuntu.com/3834-1/',
'http://www.securityfocus.com/bid/106145',
'https://access.redhat.com/errata/RHSA-2019:0010',
'https://access.redhat.com/errata/RHSA-2019:0001',
'https://security.netapp.com/advisory/ntap-20190221-0003/',
'https://security.gentoo.org/glsa/201909-01',
'https://www.oracle.com/security-alerts/cpujul2020.html'
],
'reported' => '2018-12-07',
'severity' => 'critical'
},
{
'affected_versions' => [
'<5.26.3'
],
'cves' => [
'CVE-2018-18313'
],
'description' => 'Perl before 5.26.3 has a buffer over-read via a crafted regular expression that triggers disclosure of sensitive information from process memory.
',
'distribution' => 'perl',
'fixed_versions' => [
'>=5.26.3'
],
'id' => 'CPANSA-perl-2018-18313',
'references' => [
'https://www.debian.org/security/2018/dsa-4347',
'https://usn.ubuntu.com/3834-2/',
'https://rt.perl.org/Ticket/Display.html?id=133192',
'https://metacpan.org/changes/release/SHAY/perl-5.26.3',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/',
'https://github.com/Perl/perl5/commit/43b2f4ef399e2fd7240b4eeb0658686ad95f8e62',
'https://bugzilla.redhat.com/show_bug.cgi?id=1646738',
'http://www.securitytracker.com/id/1042181',
'https://usn.ubuntu.com/3834-1/',
'https://access.redhat.com/errata/RHSA-2019:0010',
'https://access.redhat.com/errata/RHSA-2019:0001',
'https://security.netapp.com/advisory/ntap-20190221-0003/',
'https://support.apple.com/kb/HT209600',
'https://seclists.org/bugtraq/2019/Mar/42',
'http://seclists.org/fulldisclosure/2019/Mar/49',
'https://security.gentoo.org/glsa/201909-01',
'https://www.oracle.com/security-alerts/cpujul2020.html'
],
'reported' => '2018-12-07',
'severity' => 'critical'
},
{
'affected_versions' => [
'==5.28.0',
'<5.26.3'
],
'cves' => [
'CVE-2018-18312'
],
'description' => 'Perl before 5.26.3 and 5.28.0 before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.
',
'distribution' => 'perl',
'fixed_versions' => [
'>=5.28.1'
],
'id' => 'CPANSA-perl-2018-18312',
'references' => [
'https://www.debian.org/security/2018/dsa-4347',
'https://rt.perl.org/Public/Bug/Display.html?id=133423',
'https://metacpan.org/changes/release/SHAY/perl-5.28.1',
'https://metacpan.org/changes/release/SHAY/perl-5.26.3',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/',
'https://bugzilla.redhat.com/show_bug.cgi?id=1646734',
'http://www.securitytracker.com/id/1042181',
'https://usn.ubuntu.com/3834-1/',
'http://www.securityfocus.com/bid/106179',
'https://access.redhat.com/errata/RHSA-2019:0010',
'https://access.redhat.com/errata/RHSA-2019:0001',
'https://security.netapp.com/advisory/ntap-20190221-0003/',
'https://security.gentoo.org/glsa/201909-01',
'https://www.oracle.com/security-alerts/cpujul2020.html',
'https://perldoc.perl.org/perl5281delta',
'https://perldoc.perl.org/perl5263delta'
],
'reported' => '2018-12-05',
'severity' => 'critical'
},
{
'affected_versions' => [
'<5.26.3',
'==5.28.0'
],
'cves' => [
'CVE-2018-18311'
],
'description' => 'Perl before 5.26.3 and 5.28.x before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.
',
'distribution' => 'perl',
'fixed_versions' => [
'>=5.28.1'
],
'id' => 'CPANSA-perl-2018-18311',
'references' => [
'https://www.debian.org/security/2018/dsa-4347',
'https://usn.ubuntu.com/3834-2/',
'https://rt.perl.org/Ticket/Display.html?id=133204',
'https://metacpan.org/changes/release/SHAY/perl-5.28.1',
'https://metacpan.org/changes/release/SHAY/perl-5.26.3',
'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/',
'https://lists.debian.org/debian-lts-announce/2018/11/msg00039.html',
'https://github.com/Perl/perl5/commit/34716e2a6ee2af96078d62b065b7785c001194be',
'https://bugzilla.redhat.com/show_bug.cgi?id=1646730',
'http://www.securitytracker.com/id/1042181',
'https://usn.ubuntu.com/3834-1/',
'http://www.securityfocus.com/bid/106145',
'https://access.redhat.com/errata/RHSA-2019:0010',
'https://access.redhat.com/errata/RHSA-2019:0001',
'https://access.redhat.com/errata/RHSA-2019:0109',
'https://security.netapp.com/advisory/ntap-20190221-0003/',
'https://support.apple.com/kb/HT209600',
'https://seclists.org/bugtraq/2019/Mar/42',
'http://seclists.org/fulldisclosure/2019/Mar/49',
'https://kc.mcafee.com/corporate/index?page=content&id=SB10278',
'https://access.redhat.com/errata/RHBA-2019:0327',
'https://access.redhat.com/errata/RHSA-2019:1790',
'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html',
'https://access.redhat.com/errata/RHSA-2019:1942',
'https://access.redhat.com/errata/RHSA-2019:2400',
'https://security.gentoo.org/glsa/201909-01',
'https://www.oracle.com/security-alerts/cpuapr2020.html',
'https://www.oracle.com/security-alerts/cpujul2020.html',
'https://perldoc.perl.org/perl5281delta',
'https://perldoc.perl.org/perl5263delta'
],
'reported' => '2018-12-07',
'severity' => 'critical'
},
{
'affected_versions' => [
'==5.26.0',
'>=5.20.0,<5.24.3'
],
'cves' => [
'CVE-2017-12883'
],
'description' => 'Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to disclose sensitive information or cause a denial of service (application crash) via a crafted regular expression with an invalid \'\\\\N{U+...}\' escape.
',
'distribution' => 'perl',
'fixed_versions' => [
'>=5.26.1'
],
'id' => 'CPANSA-perl-2017-12883',
'references' => [
'https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1',
'https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1',
'https://perl5.git.perl.org/perl.git/commitdiff/2be4edede4ae226e2eebd4eff28cedd2041f300f#patch1',
'https://bugzilla.redhat.com/show_bug.cgi?id=1492093',
'http://www.securityfocus.com/bid/100852',
'http://mirror.cucumberlinux.com/cucumber/cucumber-1.0/source/lang-base/perl/patches/CVE-2017-12883.patch',
'https://rt.perl.org/Public/Bug/Display.html?id=131598',
'http://www.debian.org/security/2017/dsa-3982',
'https://security.netapp.com/advisory/ntap-20180426-0001/',
'https://www.oracle.com/security-alerts/cpujul2020.html',
'https://github.com/Perl/perl5/issues/16025',
'https://perldoc.perl.org/perl5243delta',
'https://perldoc.perl.org/perl5280delta',
'https://perldoc.perl.org/perl5261delta'
],
'reported' => '2017-09-19',
'severity' => 'critical'
},
{
'affected_versions' => [
'>=5.18.0,<5.24.3',
'==5.26.0'
],
'cves' => [
'CVE-2017-12837'
],
'description' => 'Heap-based buffer overflow in the S_regatom function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to cause a denial of service (out-of-bounds write) via a regular expression with a \'\\\\N{}\' escape and the case-insensitive modifier.
',
'distribution' => 'perl',
'fixed_versions' => [
'>=5.26.1'
],
'id' => 'CPANSA-perl-2017-12837',
'references' => [
'https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1',
'https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1',
'https://perl5.git.perl.org/perl.git/commitdiff/96c83ed78aeea1a0496dd2b2d935869a822dc8a5',
'https://bugzilla.redhat.com/show_bug.cgi?id=1492091',
'http://www.securityfocus.com/bid/100860',
'https://rt.perl.org/Public/Bug/Display.html?id=131582',
'http://www.debian.org/security/2017/dsa-3982',
'https://security.netapp.com/advisory/ntap-20180426-0001/',
'https://www.oracle.com/security-alerts/cpujul2020.html',
'https://github.com/Perl/perl5/issues/16021',
'https://perldoc.perl.org/perl5243delta',
'https://perldoc.perl.org/perl5261delta',
'https://perldoc.perl.org/perl5280delta'
],
'reported' => '2017-09-19',
'severity' => 'high'
},
{
'affected_versions' => [
'<5.24.0'
],
'cves' => [
'CVE-2015-8853'
],
'description' => 'The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause a denial of service (infinite loop) via crafted utf-8 data, as demonstrated by "a\\x80."
',
'distribution' => 'perl',
'fixed_versions' => [
'>=5.24.0'
],
'id' => 'CPANSA-perl-2015-8853',
'references' => [
'http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html',
'http://www.openwall.com/lists/oss-security/2016/04/20/7',
'https://bugzilla.redhat.com/show_bug.cgi?id=1329106',
'https://rt.perl.org/Public/Bug/Display.html?id=123562',
'http://www.openwall.com/lists/oss-security/2016/04/20/5',
'http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5',
'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731',
'http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html',
'http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html',
'http://www.securityfocus.com/bid/86707',
'https://security.gentoo.org/glsa/201701-75',
'https://usn.ubuntu.com/3625-2/',
'https://usn.ubuntu.com/3625-1/'
],
'reported' => '2016-05-25',
'severity' => 'high'
},
{
'affected_versions' => [
'<5.18.0'
],
'cves' => [
'CVE-2013-1667'
],
'description' => 'The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key.
',
'distribution' => 'perl',
'fixed_versions' => [
'>=5.26.1'
],
'id' => 'CPANSA-perl-2013-1667',
'references' => [
'http://www.securityfocus.com/bid/58311',
'http://perl5.git.perl.org/perl.git/commitdiff/d59e31f',
'http://perl5.git.perl.org/perl.git/commitdiff/9d83adc',
'http://www.nntp.perl.org/group/perl.perl5.porters/2013/03/msg199755.html',
'http://www.debian.org/security/2013/dsa-2641',
'http://secunia.com/advisories/52499',
'http://secunia.com/advisories/52472',
'https://bugzilla.redhat.com/show_bug.cgi?id=912276',
'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702296',
'http://perl5.git.perl.org/perl.git/commitdiff/6e79fe5',
'http://osvdb.org/90892',
'http://www.ubuntu.com/usn/USN-1770-1',
'http://rhn.redhat.com/errata/RHSA-2013-0685.html',
'http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html',
'http://marc.info/?l=bugtraq&m=137891988921058&w=2',
'http://www.mandriva.com/security/advisories?name=MDVSA-2013:113',
'https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0094',
'http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html',
'http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735',
'http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/82598',
'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18771'
],
'reported' => '2013-03-14',
'severity' => undef
},
{
'affected_versions' => [
'>=5.10.0,<5.12.0'
],
'cves' => [
'CVE-2011-0761'
],
'description' => 'Perl 5.10.x allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an ability to inject arguments into a (1) getpeername, (2) readdir, (3) closedir, (4) getsockname, (5) rewinddir, (6) tell, or (7) telldir function call.
',
'distribution' => 'perl',
'fixed_versions' => [
'>=5.12.0'
],
'id' => 'CPANSA-perl-2011-0761',
'references' => [
'http://www.securityfocus.com/bid/47766',
'http://securitytracker.com/id?1025507',
'http://www.toucan-system.com/advisories/tssa-2011-03.txt',
'http://securityreason.com/securityalert/8248',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/67355',
'http://www.securityfocus.com/archive/1/517916/100/0/threaded'
],
'reported' => '2011-05-13',
'severity' => undef
},
{
'affected_versions' => [
'<=5.14.0'
],
'cves' => [
'CVE-2010-4777'
],
'description' => 'The Perl_reg_numbered_buff_fetch function in Perl 5.10.0, 5.12.0, 5.14.0, and other versions, when running with debugging enabled, allows context-dependent attackers to cause a denial of service (assertion failure and application exit) via crafted input that is not properly handled when using certain regular expressions, as demonstrated by causing SpamAssassin and OCSInventory to crash.
',
'distribution' => 'perl',
'fixed_versions' => [
'>5.14.0'
],
'id' => 'CPANSA-perl-2010-4777',
'references' => [
'http://lists.opensuse.org/opensuse-updates/2011-05/msg00025.html',
'https://bugzilla.redhat.com/show_bug.cgi?id=694166',
'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=628836',
'https://rt.perl.org/Public/Bug/Display.html?id=76538',
'https://listi.jpberlin.de/pipermail/postfixbuch-users/2011-February/055885.html',
'http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html',
'http://forums.ocsinventory-ng.org/viewtopic.php?id=7215'
],
'reported' => '2014-02-10',
'severity' => undef
},
{
'affected_versions' => [
'<5.10.0'
],
'cves' => [
'CVE-2010-1158'
],
'description' => 'Integer overflow in the regular expression engine in Perl 5.8.x allows context-dependent attackers to cause a denial of service (stack consumption and application crash) by matching a crafted regular expression against a long string.
',
'distribution' => 'perl',
'fixed_versions' => [
'>=5.10.0'
],
'id' => 'CPANSA-perl-2010-1158',
'references' => [
'http://bugs.gentoo.org/show_bug.cgi?id=313565',
'http://www.openwall.com/lists/oss-security/2010/04/14/3',
'http://perldoc.perl.org/perl5100delta.html',
'http://www.openwall.com/lists/oss-security/2010/04/08/9',
'https://bugzilla.redhat.com/show_bug.cgi?id=580605',
'http://secunia.com/advisories/55314'
],
'reported' => '2010-04-20',
'severity' => undef
},
{
'affected_versions' => [
'<=5.10.1'
],
'cves' => [
'CVE-2009-3626'
],
'description' => 'Perl 5.10.1 allows context-dependent attackers to cause a denial of service (application crash) via a UTF-8 character with a large, invalid codepoint, which is not properly handled during a regular-expression match.
',
'distribution' => 'perl',
'fixed_versions' => [],
'id' => 'CPANSA-perl-2009-3626',
'references' => [
'http://securitytracker.com/id?1023077',
'http://www.vupen.com/english/advisories/2009/3023',
'http://perl5.git.perl.org/perl.git/commit/0abd0d78a73da1c4d13b1c700526b7e5d03b32d4',
'http://www.securityfocus.com/bid/36812',
'https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6225',
'http://rt.perl.org/rt3/Ticket/Attachment/617489/295383/',
'http://www.osvdb.org/59283',
'http://www.openwall.com/lists/oss-security/2009/10/23/8',
'http://secunia.com/advisories/37144',
'http://rt.perl.org/rt3/Public/Bug/Display.html?id=69973',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/53939'
],
'reported' => '2009-10-29',
'severity' => undef
},
{
'affected_versions' => [
'<=5.8.8'
],
'cves' => [
'CVE-2008-1927'
],
'description' => 'Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters. NOTE: this issue might only be present on certain operating systems.
',
'distribution' => 'perl',
'fixed_versions' => [],
'id' => 'CPANSA-perl-2008-1927',
'references' => [
'http://rt.perl.org/rt3/Public/Bug/Display.html?id=48156',
'http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454792',
'http://www.debian.org/security/2008/dsa-1556',
'https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00601.html',
'https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00607.html',
'http://www.gentoo.org/security/en/glsa/glsa-200805-17.xml',
'http://www.securityfocus.com/bid/28928',
'http://secunia.com/advisories/29948',
'http://secunia.com/advisories/30025',
'http://secunia.com/advisories/30326',
'http://www.securitytracker.com/id?1020253',
'http://www.redhat.com/support/errata/RHSA-2008-0522.html',
'http://secunia.com/advisories/30624',
'http://support.avaya.com/elmodocs2/security/ASA-2008-317.htm',
'http://support.avaya.com/elmodocs2/security/ASA-2008-361.htm',
'http://www.ipcop.org/index.php?name=News&file=article&sid=41',
'http://secunia.com/advisories/31467',
'http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html',
'http://secunia.com/advisories/31604',
'http://secunia.com/advisories/31208',
'http://secunia.com/advisories/31328',
'http://www.vmware.com/security/advisories/VMSA-2008-0013.html',
'http://www.redhat.com/support/errata/RHSA-2008-0532.html',
'http://secunia.com/advisories/31687',
'http://osvdb.org/44588',
'http://www.mandriva.com/security/advisories?name=MDVSA-2008:100',
'http://www.ubuntu.com/usn/usn-700-1',
'http://secunia.com/advisories/33314',
'http://wiki.rpath.com/Advisories:rPSA-2009-0011',
'http://www.ubuntu.com/usn/usn-700-2',
'http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html',
'http://secunia.com/advisories/33937',
'http://support.apple.com/kb/HT3438',
'http://www.vupen.com/english/advisories/2009/0422',
'http://www.vupen.com/english/advisories/2008/2361',
'http://www.vupen.com/english/advisories/2008/2424',
'http://www.vupen.com/english/advisories/2008/2265/references',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/41996',
'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10579',
'http://www.securityfocus.com/archive/1/500210/100/0/threaded'
],
'reported' => '2008-04-24',
'severity' => undef
},
{
'affected_versions' => [
'<5.10.0'
],
'cves' => [
'CVE-2005-3962'
],
'description' => 'Integer overflow in the format string functionality (Perl_sv_vcatpvfn) in Perl 5.9.2 and 5.8.6 Perl allows attackers to overwrite arbitrary memory and possibly execute arbitrary code via format string specifiers with large values, which causes an integer wrap and leads to a buffer overflow, as demonstrated using format string vulnerabilities in Perl applications.
',
'distribution' => 'perl',
'fixed_versions' => [],
'id' => 'CPANSA-perl-2005-3962',
'references' => [
'http://www.dyadsecurity.com/perl-0002.html',
'http://www.kb.cert.org/vuls/id/948385',
'http://www.securityfocus.com/bid/15629',
'http://secunia.com/advisories/17802',
'http://secunia.com/advisories/17844',
'http://secunia.com/advisories/17762',
'http://www.openpkg.org/security/OpenPKG-SA-2005.025-perl.html',
'http://www.gentoo.org/security/en/glsa/glsa-200512-01.xml',
'http://www.trustix.org/errata/2005/0070',
'http://secunia.com/advisories/17941',
'http://secunia.com/advisories/17952',
'http://www.redhat.com/support/errata/RHSA-2005-880.html',
'http://www.novell.com/linux/security/advisories/2005_71_perl.html',
'http://secunia.com/advisories/18183',
'http://secunia.com/advisories/18187',
'http://www.redhat.com/support/errata/RHSA-2005-881.html',
'http://secunia.com/advisories/18075',
'http://www.openbsd.org/errata37.html#perl',
'http://secunia.com/advisories/18295',
'ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/001_perl.patch',
'http://www.osvdb.org/21345',
'http://www.osvdb.org/22255',
'ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U',
'http://secunia.com/advisories/18517',
'http://secunia.com/advisories/17993',
'https://www.redhat.com/archives/fedora-legacy-announce/2006-February/msg00008.html',
'http://sunsolve.sun.com/search/document.do?assetkey=1-26-102192-1',
'http://secunia.com/advisories/19041',
'http://www.debian.org/security/2006/dsa-943',
'http://secunia.com/advisories/18413',
'http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056',
'http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm',
'http://www.novell.com/linux/security/advisories/2005_29_sr.html',
'http://secunia.com/advisories/20894',
'http://docs.info.apple.com/article.html?artnum=304829',
'http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html',
'http://www.us-cert.gov/cas/techalerts/TA06-333A.html',
'http://secunia.com/advisories/23155',
'http://www.mandriva.com/security/advisories?name=MDKSA-2005:225',
'http://www.ipcop.org/index.php?name=News&file=article&sid=41',
'http://secunia.com/advisories/31208',
'http://www.vupen.com/english/advisories/2006/2613',
'http://www.vupen.com/english/advisories/2006/0771',
'http://www.vupen.com/english/advisories/2006/4750',
'ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.7/common/007_perl.patch',
'http://www.vupen.com/english/advisories/2005/2688',
'http://marc.info/?l=full-disclosure&m=113342788118630&w=2',
'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1074',
'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10598',
'https://usn.ubuntu.com/222-1/',
'http://www.securityfocus.com/archive/1/438726/100/0/threaded',
'http://www.securityfocus.com/archive/1/418333/100/0/threaded'
],
'reported' => '2005-12-01',
'severity' => undef
},
{
'affected_versions' => [
'=5.8.0'
],
'cves' => [
'CVE-2005-0156'
],
'description' => 'Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.
',
'distribution' => 'perl',
'fixed_versions' => [],
'id' => 'CPANSA-perl-2005-0156',
'references' => [
'http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml',
'http://www.redhat.com/support/errata/RHSA-2005-103.html',
'http://www.redhat.com/support/errata/RHSA-2005-105.html',
'http://www.trustix.org/errata/2005/0003/',
'http://www.securityfocus.com/bid/12426',
'http://secunia.com/advisories/14120',
'http://fedoranews.org/updates/FEDORA--.shtml',
'http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056',
'http://www.mandriva.com/security/advisories?name=MDKSA-2005:031',
'http://secunia.com/advisories/55314',
'http://marc.info/?l=bugtraq&m=110737149402683&w=2',
'http://marc.info/?l=full-disclosure&m=110779721503111&w=2',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/19208',
'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10803',
'http://www.digitalmunition.com/DMA[2005-0131b].txt'
],
'reported' => '2005-02-07',
'severity' => undef
},
{
'affected_versions' => [
'=5.8.0'
],
'cves' => [
'CVE-2005-0155'
],
'description' => 'The PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to create arbitrary files via the PERLIO_DEBUG variable.
',
'distribution' => 'perl',
'fixed_versions' => [],
'id' => 'CPANSA-perl-2005-0155',
'references' => [
'http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml',
'http://www.redhat.com/support/errata/RHSA-2005-103.html',
'http://www.redhat.com/support/errata/RHSA-2005-105.html',
'http://www.trustix.org/errata/2005/0003/',
'http://www.securityfocus.com/bid/12426',
'http://secunia.com/advisories/14120',
'http://fedoranews.org/updates/FEDORA--.shtml',
'http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056',
'http://support.avaya.com/elmodocs2/security/ASA-2006-163.htm',
'http://secunia.com/advisories/21646',
'http://www.mandriva.com/security/advisories?name=MDKSA-2005:031',
'http://marc.info/?l=bugtraq&m=110737149402683&w=2',
'http://marc.info/?l=full-disclosure&m=110779723332339&w=2',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/19207',
'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10404',
'http://www.digitalmunition.com/DMA[2005-0131a].txt'
],
'reported' => '2005-05-02',
'severity' => undef
},
{
'affected_versions' => [
'<=5.8.8'
],
'cves' => [
'CVE-2007-5116'
],
'description' => 'Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
',
'distribution' => 'perl',
'fixed_versions' => [],
'id' => 'CPANSA-perl-2007-5116',
'references' => [
'https://bugzilla.redhat.com/show_bug.cgi?id=323571',
'http://www.mandriva.com/security/advisories?name=MDKSA-2007:207',
'http://www.redhat.com/support/errata/RHSA-2007-0966.html',
'http://www.redhat.com/support/errata/RHSA-2007-1011.html',
'http://www.securityfocus.com/bid/26350',
'http://secunia.com/advisories/27531',
'http://secunia.com/advisories/27546',
'https://bugzilla.redhat.com/show_bug.cgi?id=378131',
'https://issues.rpath.com/browse/RPL-1813',
'http://www.debian.org/security/2007/dsa-1400',
'http://www.gentoo.org/security/en/glsa/glsa-200711-28.xml',
'http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.023.html',
'http://www.novell.com/linux/security/advisories/2007_24_sr.html',
'http://www.ubuntu.com/usn/usn-552-1',
'http://securitytracker.com/id?1018899',
'http://secunia.com/advisories/27479',
'http://secunia.com/advisories/27515',
'http://secunia.com/advisories/27548',
'http://secunia.com/advisories/27613',
'http://secunia.com/advisories/27570',
'http://secunia.com/advisories/27936',
'http://docs.info.apple.com/article.html?artnum=307179',
'ftp://aix.software.ibm.com/aix/efixes/security/README',
'http://www-1.ibm.com/support/docview.wss?uid=isg1IZ10220',
'http://www-1.ibm.com/support/docview.wss?uid=isg1IZ10244',
'http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html',
'http://www.us-cert.gov/cas/techalerts/TA07-352A.html',
'http://secunia.com/advisories/28167',
'http://lists.vmware.com/pipermail/security-announce/2008/000002.html',
'http://support.avaya.com/elmodocs2/security/ASA-2008-014.htm',
'http://secunia.com/advisories/28368',
'http://secunia.com/advisories/28387',
'http://secunia.com/advisories/27756',
'http://www.vmware.com/security/advisories/VMSA-2008-0001.html',
'http://sunsolve.sun.com/search/document.do?assetkey=1-26-31524-1',
'http://secunia.com/advisories/28993',
'http://secunia.com/advisories/29074',
'http://sunsolve.sun.com/search/document.do?assetkey=1-66-231524-1',
'http://secunia.com/advisories/31208',
'http://www.ipcop.org/index.php?name=News&file=article&sid=41',
'http://sunsolve.sun.com/search/document.do?assetkey=1-77-1018985.1-1',
'http://www.vupen.com/english/advisories/2007/4238',
'http://www.vupen.com/english/advisories/2008/0064',
'http://www.vupen.com/english/advisories/2008/0641',
'http://www.vupen.com/english/advisories/2007/3724',
'http://www.vupen.com/english/advisories/2007/4255',
'http://marc.info/?l=bugtraq&m=120352263023774&w=2',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/38270',
'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10669',
'http://www.securityfocus.com/archive/1/486859/100/0/threaded',
'http://www.securityfocus.com/archive/1/485936/100/0/threaded',
'http://www.securityfocus.com/archive/1/483584/100/0/threaded',
'http://www.securityfocus.com/archive/1/483563/100/0/threaded'
],
'reported' => '2007-11-07',
'severity' => undef
},
{
'affected_versions' => [
'<5.16.0'
],
'cves' => [
'CVE-2012-5195'
],
'description' => 'Heap-based buffer overflow in the Perl_repeatcpy function in util.c in Perl 5.12.x before 5.12.5, 5.14.x before 5.14.3, and 5.15.x before 15.15.5 allows context-dependent attackers to cause a denial of service (memory consumption and crash) or possibly execute arbitrary code via the \'x\' string repeat operator.
',
'distribution' => 'perl',
'fixed_versions' => [
'>=5.16.0'
],
'id' => 'CPANSA-perl-2012-5195',
'references' => [
'http://perl5.git.perl.org/perl.git/commit/2709980d5a193ce6f3a16f0d19879a6560dcde44',
'http://www.nntp.perl.org/group/perl.perl5.porters/2012/10/msg193886.html',
'http://www.securityfocus.com/bid/56287',
'http://www.openwall.com/lists/oss-security/2012/10/27/1',
'http://secunia.com/advisories/51457',
'http://www.openwall.com/lists/oss-security/2012/10/26/2',
'http://www.ubuntu.com/usn/USN-1643-1',
'http://www.debian.org/security/2012/dsa-2586',
'http://rhn.redhat.com/errata/RHSA-2013-0685.html',
'http://secunia.com/advisories/55314',
'http://www.mandriva.com/security/advisories?name=MDVSA-2013:113',
'https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0352',
'http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html',
'http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735',
'http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705',
'http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673'
],
'reported' => '2012-12-18',
'severity' => undef
},
{
'affected_versions' => [
'<5.22.1'
],
'cves' => [
'CVE-2016-2381'
],
'description' => 'Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.
',
'distribution' => 'perl',
'fixed_versions' => [
'>=5.22.1'
],
'id' => 'CPANSA-perl-2016-2381',
'references' => [
'http://www.gossamer-threads.com/lists/perl/porters/326387',
'http://www.debian.org/security/2016/dsa-3501',
'http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076',
'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731',
'http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html',
'http://www.securityfocus.com/bid/83802',
'http://www.ubuntu.com/usn/USN-2916-1',
'http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html',
'https://security.gentoo.org/glsa/201701-75',
'http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html',
'http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html',
'https://www.oracle.com/security-alerts/cpuapr2020.html',
'https://www.oracle.com/security-alerts/cpujul2020.html'
],
'reported' => '2016-04-08',
'severity' => 'high'
},
{
'affected_versions' => [
'=5.8.1'
],
'cves' => [
'CVE-2003-0900'
],
'description' => 'Perl 5.8.1 on Fedora Core does not properly initialize the random number generator when forking, which makes it easier for attackers to predict random numbers.
',
'distribution' => 'perl',
'fixed_versions' => [],
'id' => 'CPANSA-perl-2003-0900',
'references' => [
'https://bugzilla.redhat.com/bugzilla/long_list.cgi?buglist=108711'
],
'reported' => '2003-12-31',
'severity' => undef
},
{
'affected_versions' => [
'<5.20.0'
],
'cves' => [
'CVE-2013-7422'
],
'description' => 'Integer underflow in regcomp.c in Perl before 5.20, as used in Apple OS X before 10.10.5 and other products, allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a long digit string associated with an invalid backreference within a regular expression.
',
'distribution' => 'perl',
'fixed_versions' => [],
'id' => 'CPANSA-perl-2013-7422',
'references' => [
'http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html',
'https://support.apple.com/kb/HT205031',
'http://perl5.git.perl.org/perl.git/commit/0c2990d652e985784f095bba4bc356481a66aa06',
'http://www.securityfocus.com/bid/75704',
'http://www.ubuntu.com/usn/USN-2916-1',
'https://security.gentoo.org/glsa/201507-11'
],
'reported' => '2015-08-16',
'severity' => undef
},
{
'affected_versions' => [
'<5.22.2'
],
'cves' => [
'CVE-2015-8608'
],
'description' => 'The VDir::MapPathA and VDir::MapPathW functions in Perl 5.22 allow remote attackers to cause a denial of service (out-of-bounds read) and possibly execute arbitrary code via a crafted (1) drive letter or (2) pInName argument.
',
'distribution' => 'perl',
'fixed_versions' => [
'>=5.22.2'
],
'id' => 'CPANSA-perl-2015-8608',
'references' => [
'https://rt.perl.org/Public/Bug/Display.html?id=126755',
'https://packetstormsecurity.com/files/136649/Perl-5.22-VDir-MapPathA-W-Out-Of-Bounds-Reads-Buffer-Over-Reads.html',
'http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html',
'https://www.oracle.com/security-alerts/cpujul2020.html'
],
'reported' => '2017-02-07',
'severity' => 'critical'
},
{
'affected_versions' => [
'<5.14.0'
],
'cves' => [
'CVE-2011-1487'
],
'description' => 'The (1) lc, (2) lcfirst, (3) uc, and (4) ucfirst functions in Perl 5.10.x, 5.11.x, and 5.12.x through 5.12.3, and 5.13.x through 5.13.11, do not apply the taint attribute to the return value upon processing tainted input, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.
',
'distribution' => 'perl',
'fixed_versions' => [
'>=5.14.0'
],
'id' => 'CPANSA-perl-2011-1487',
'references' => [
'https://bugzilla.redhat.com/show_bug.cgi?id=692844',
'http://openwall.com/lists/oss-security/2011/04/01/3',
'http://openwall.com/lists/oss-security/2011/04/04/35',
'https://bugzilla.redhat.com/show_bug.cgi?id=692898',
'http://rt.perl.org/rt3/Public/Bug/Display.html?id=87336',
'http://secunia.com/advisories/43921',
'http://www.securityfocus.com/bid/47124',
'http://perl5.git.perl.org/perl.git/commit/539689e74a3bcb04d29e4cd9396de91a81045b99',
'http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057971.html',
'http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057891.html',
'http://secunia.com/advisories/44168',
'http://www.debian.org/security/2011/dsa-2265',
'http://www.mandriva.com/security/advisories?name=MDVSA-2011:091',
'http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html',
'https://exchange.xforce.ibmcloud.com/vulnerabilities/66528'
],
'reported' => '2011-04-11',
'severity' => undef
},
{
'affected_versions' => [
'<5.4.4'
],
'cves' => [
'CVE-1999-1386'
],
'description' => 'Perl 5.004_04 and earlier follows symbolic links when running with the -e option, which allows local users to overwrite arbitrary files via a symlink attack on the /tmp/perl-eaXXXXX file.
',
'distribution' => 'perl',
'fixed_versions' => [],
'id' => 'CPANSA-perl-1999-1386',
'references' => [
'http://www.redhat.com/support/errata/rh50-errata-general.html#perl',
'http://www.iss.net/security_center/static/7243.php',
'http://marc.info/?l=bugtraq&m=88932165406213&w=2'
],
'reported' => '1999-12-31',
'severity' => undef
},
{
'affected_versions' => [
'>=5.24.0,<5.24.3',
'==5.26.0'
],
'cves' => [
'CVE-2017-12814'
],
'description' => 'Stack-based buffer overflow in the CPerlHost::Add method in win32/perlhost.h in Perl before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 on Windows allows attackers to execute arbitrary code via a long environment variable.
',
'distribution' => 'perl',
'fixed_versions' => [],
'id' => 'CPANSA-perl-2017-12814',
'references' => [
'https://rt.perl.org/Public/Bug/Display.html?id=131665',
'https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1',
'https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1',
'http://www.securityfocus.com/bid/101051',
'https://security.netapp.com/advisory/ntap-20180426-0001/',
'https://www.oracle.com/security-alerts/cpujul2020.html',
'https://perldoc.perl.org/perl5243delta',
'https://github.com/Perl/perl5/issues/16051',
'https://perldoc.perl.org/perl5261delta',
'https://perldoc.perl.org/perl5280delta'
],
'reported' => '2017-09-28',
'severity' => 'critical'
},
{
'affected_versions' => [
'=5.34.0'
],
'cves' => [
'CVE-2022-48522'
],
'description' => 'In Perl 5.34.0, function S_find_uninit_var in sv.c has a stack-based crash that can lead to remote code execution or local privilege escalation.
',
'distribution' => 'perl',
'fixed_versions' => [
'>=5.34.1'
],
'id' => 'CPANSA-perl-2022-48522',
'references' => [
'https://github.com/Perl/perl5/blob/79a7b254d85a10b65126ad99bf10e70480569d68/sv.c#L16336-L16345',
'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48522',
'https://security.netapp.com/advisory/ntap-20230915-0008/',
'https://ubuntu.com/security/CVE-2022-48522'
],
'reported' => '2023-08-22',
'severity' => undef
},
{
'affected_versions' => [
'>=5.30.0,<5.34.3',
'>=5.36.0,<5.36.3',
'==5.38.0'
],
'cves' => [
'CVE-2023-47038'
],
'description' => 'A crafted regular expression when compiled by perl 5.30.0 through 5.38.0 can cause a one attacker controlled byte buffer overflow in a heap allocated buffer
',
'distribution' => 'perl',
'fixed_versions' => [
'5.34.3',
'5.36.3',
'5.38.1'
],
'id' => 'CPANSA-perl-2023-47038',
'references' => [
'https://perldoc.perl.org/perl5342delta',
'https://perldoc.perl.org/perl5363delta',
'https://perldoc.perl.org/perl5381delta',
'https://perldoc.perl.org/perl5382delta',
'https://perldoc.perl.org/perl5400delta'
],
'reported' => '2023-10-30',
'severity' => undef
},
{
'affected_versions' => [
'<5.34.2',
'>=5.36.0,<5.36.3',
'==5.38.0'
],
'cves' => [
'CVE-2023-47039'
],
'description' => 'Perl for Windows relies on the system path environment variable to find the shell (cmd.exe). When running an executable which uses Windows Perl interpreter, Perl attempts to find and execute cmd.exe within the operating system. However, due to path search order issues, Perl initially looks for cmd.exe in the current working directory.
An attacker with limited privileges can exploit this behavior by placing cmd.exe in locations with weak permissions, such as C:\\ProgramData. By doing so, when an administrator attempts to use this executable from these compromised locations, arbitrary code can be executed.
',
'distribution' => 'perl',
'fixed_versions' => [],
'id' => 'CPANSA-perl-2023-47039',
'references' => [
'https://github.com/ycdxsb/WindowsPrivilegeEscalation',
'https://perldoc.perl.org/perl5342delta',
'https://perldoc.perl.org/perl5363delta',
'https://perldoc.perl.org/perl5381delta',
'https://perldoc.perl.org/perl5382delta',
'https://perldoc.perl.org/perl5400delta'
],
'reported' => '2023-10-30',
'severity' => undef
},
{
'affected_versions' => [
'<5.34.3',
'>=5.36.0,<5.36.3',
'>=5.38.0,<5.38.2'
],
'cves' => [
'CVE-2023-47100'
],
'description' => 'In Perl before 5.38.2, S_parse_uniprop_string in regcomp.c can write to unallocated space because a property name associated with a \\p{...} regular expression construct is mishandled. The earliest affected version is 5.30.0.
',
'distribution' => 'perl',
'fixed_versions' => [
'>=5.38.2'
],
'id' => 'CPANSA-perl-2023-47100',
'references' => [
'https://github.com/Perl/perl5/commit/ff1f9f59360afeebd6f75ca1502f5c3ebf077da3',
'https://github.com/Perl/perl5/commit/12c313ce49b36160a7ca2e9b07ad5bd92ee4a010',
'https://github.com/Perl/perl5/commit/7047915eef37fccd93e7cd985c29fe6be54650b6'
],
'reported' => undef,
'severity' => undef
},
{
'affected_versions' => [
'>=4.0,<5.4.0'
],
'cves' => [
'CVE-1999-0034'
],
'description' => 'Buffer overflow in suidperl (sperl), Perl 4.x and 5.x.
',
'distribution' => 'perl',
'fixed_versions' => [],
'id' => 'CPANSA-sperl-1999-0034',
'references' => [
'https://exchange.xforce.ibmcloud.com/vulnerabilities/448',
'https://www.cpan.org/src/5.0/CA-97.17.sperl'
],
'reported' => '1997-05-29',
'severity' => undef
},
{
'affected_versions' => [
'>=4.0,<5.6.0'
],
'cves' => [
'CVE-1999-0462'
],
'description' => 'suidperl in Linux Perl does not check the nosuid mount option on file systems, allowing local users to gain root access by placing a setuid script in a mountable file system, e.g. a CD-ROM or floppy disk.
',
'distribution' => 'perl',
'fixed_versions' => [],
'id' => 'CPANSA-sperl-1999-0462',
'references' => [
'http://www.securityfocus.com/bid/339'
],
'reported' => '1999-03-17',
'severity' => undef
},
{
'affected_versions' => [
'<5.6.1'
],
'cves' => [
'CVE-2000-0703'
],
'description' => 'suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the "interactive" environmental variable and calling suidperl with a filename that contains the escape sequence.
',
'distribution' => 'perl',
'fixed_versions' => [],
'id' => 'CPANSA-sperl-2000-0703',
'references' => [
'http://archives.neohapsis.com/archives/bugtraq/2000-08/0022.html',
'http://www.calderasystems.com/support/security/advisories/CSSA-2000-026.0.txt',
'http://www.securityfocus.com/bid/1547',
'http://www.novell.com/linux/security/advisories/suse_security_announce_59.html',
'http://www.redhat.com/support/errata/RHSA-2000-048.html',
'http://www.turbolinux.com/pipermail/tl-security-announce/2000-August/000017.html',
'http://archives.neohapsis.com/archives/bugtraq/2000-08/0153.html',
'http://archives.neohapsis.com/archives/bugtraq/2000-08/0086.html',
'http://archives.neohapsis.com/archives/bugtraq/2000-08/0113.html',
'https://www.cpan.org/src/5.0/sperl-2000-08-05/sperl-2000-08-05.txt'
],
'reported' => '2000-10-20',
'severity' => undef
}
],
'main_module' => 'perl',
'versions' => [
{
'date' => '1996-02-03T07:48:14',
'version' => '5.002'
},
{
'date' => '1996-08-08T23:13:50',
'version' => '5.003_02'
},
{
'date' => '1996-08-10T19:07:27',
'version' => '5.003_02'
},
{
'date' => '1996-08-28T16:43:47',
'version' => '5.003_03'
},
{
'date' => '1996-09-02T23:25:30',
'version' => '5.003_04'
},
{
'date' => '1996-09-12T20:10:42',
'version' => '5.003_05'
},
{
'date' => '1996-10-08T21:59:27',
'version' => '5.003_06'
},
{
'date' => '1996-10-11T03:39:44',
'version' => '5.003_07'
},
{
'date' => '1996-11-19T07:27:23',
'version' => '5.003_08'
},
{
'date' => '1996-11-26T09:46:17',
'version' => '5.003_09'
},
{
'date' => '1996-11-30T01:22:23',
'version' => '5.003_10'
},
{
'date' => '1996-12-06T09:08:18',
'version' => '5.003_11'
},
{
'date' => '1996-12-19T04:59:47',
'version' => '5.003_12'
},
{
'date' => '1996-12-20T02:59:16',
'version' => '5.003_13'
},
{
'date' => '1996-12-23T22:09:26',
'version' => '5.003_15'
},
{
'date' => '1996-12-24T23:22:02',
'version' => '5.003_16'
},
{
'date' => '1996-12-27T20:20:05',
'version' => '5.003_17'
},
{
'date' => '1996-12-31T21:35:40',
'version' => '5.003_18'
},
{
'date' => '1997-01-04T06:02:28',
'version' => '5.003_19'
},
{
'date' => '1997-01-08T02:15:49',
'version' => '5.003_20'
},
{
'date' => '1997-01-15T23:12:15',
'version' => '5.003_21'
},
{
'date' => '1997-01-16T20:04:16',
'version' => '5.003_22'
},
{
'date' => '1997-01-25T10:04:29',
'version' => '5.003_23'
},
{
'date' => '1997-01-29T06:05:11',
'version' => '5.003_24'
},
{
'date' => '1997-02-04T05:41:02',
'version' => '5.003_25'
},
{
'date' => '1997-02-10T19:37:44',
'version' => '5.003_26'
},
{
'date' => '1997-02-18T01:13:23',
'version' => '5.003_27'
},
{
'date' => '1997-02-21T17:17:57',
'version' => '5.003_28'
},
{
'date' => '1997-02-25T03:29:59',
'version' => '5.003_90'
},
{
'date' => '1997-03-01T08:08:54',
'version' => '5.003_91'
},
{
'date' => '1997-03-06T18:24:17',
'version' => '5.003_92'
},
{
'date' => '1997-03-10T12:06:55',
'version' => '5.003_93'
},
{
'date' => '1997-03-22T05:43:00',
'version' => '5.003_94'
},
{
'date' => '1997-03-25T19:52:24',
'version' => '5.003_95'
},
{
'date' => '1997-04-01T00:50:13',
'version' => '5.003_96'
},
{
'date' => '1997-04-03T00:50:37',
'version' => '5.003_97'
},
{
'date' => '1997-04-24T00:56:53',
'version' => '5.003_97'
},
{
'date' => '1997-04-25T03:44:34',
'version' => '5.003_97'
},
{
'date' => '1997-04-28T20:33:01',
'version' => '5.003_97'
},
{
'date' => '1997-04-30T15:40:09',
'version' => '5.003_98'
},
{
'date' => '1997-05-01T18:40:08',
'version' => '5.003_99'
},
{
'date' => '1997-05-09T05:37:58',
'version' => '5.003_99'
},
{
'date' => '1997-05-15T22:54:01',
'version' => '5.004'
},
{
'date' => '1997-06-13T15:08:00',
'version' => '5.004_01'
},
{
'date' => '1997-08-07T20:07:25',
'version' => '5.004_02'
},
{
'date' => '1997-09-05T17:46:00',
'version' => '5.004_03'
},
{
'date' => '1997-09-05T18:13:00',
'version' => '5.004'
},
{
'date' => '1997-09-19T18:22:20',
'version' => '5.004'
},
{
'date' => '1997-09-23T06:21:18',
'version' => '5.004'
},
{
'date' => '1997-10-02T16:49:00',
'version' => '5.004_51'
},
{
'date' => '1997-10-09T23:16:38',
'version' => '5.004'
},
{
'date' => '1997-10-14T19:19:40',
'version' => '5.004'
},
{
'date' => '1997-10-15T16:17:00',
'version' => '5.004_52'
},
{
'date' => '1997-10-15T16:28:24',
'version' => '5.004_04'
},
{
'date' => '1997-10-16T16:24:00',
'version' => '5.004_53'
},
{
'date' => '1997-11-14T17:04:00',
'version' => '5.004_54'
},
{
'date' => '1997-11-25T17:17:00',
'version' => '5.004_55'
},
{
'date' => '1997-12-18T16:20:00',
'version' => '5.004_56'
},
{
'date' => '1998-02-03T15:06:00',
'version' => '5.004_57'
},
{
'date' => '1998-02-06T17:25:00',
'version' => '5.004_58'
},
{
'date' => '1998-02-13T16:42:00',
'version' => '5.004_59'
},
{
'date' => '1998-02-20T17:42:00',
'version' => '5.004_60'
},
{
'date' => '1998-02-27T17:55:00',
'version' => '5.004_61'
},
{
'date' => '1998-03-04T19:46:42',
'version' => '5.004'
},
{
'date' => '1998-03-06T15:27:00',
'version' => '5.004_62'
},
{
'date' => '1998-03-17T15:29:00',
'version' => '5.004_63'
},
{
'date' => '1998-04-03T15:44:00',
'version' => '5.004_64'
},
{
'date' => '1998-05-01T23:37:24',
'version' => '5.004_04'
},
{
'date' => '1998-05-15T15:57:00',
'version' => '5.004_65'
},
{
'date' => '1998-05-15T23:46:53',
'version' => '5.004_04'
},
{
'date' => '1998-05-19T23:51:10',
'version' => '5.004_04'
},
{
'date' => '1998-05-29T15:23:00',
'version' => '5.004_66'
},
{
'date' => '1998-06-15T11:47:27',
'version' => '5.004_67'
},
{
'date' => '1998-06-23T11:50:59',
'version' => '5.004_68'
},
{
'date' => '1998-06-29T09:42:04',
'version' => '5.004_69'
},
{
'date' => '1998-07-06T08:22:24',
'version' => '5.004_70'
},
{
'date' => '1998-07-09T13:47:36',
'version' => '5.004_71'
},
{
'date' => '1998-07-12T13:32:41',
'version' => '5.004_72'
},
{
'date' => '1998-07-13T09:17:14',
'version' => '5.004_73'
},
{
'date' => '1998-07-14T10:31:15',
'version' => '5.004_74'
},
{
'date' => '1998-07-15T11:29:51',
'version' => '5.005'
},
{
'date' => '1998-07-21T05:16:24',
'version' => '5.004_05'
},
{
'date' => '1998-07-21T11:36:27',
'version' => '5.005'
},
{
'date' => '1998-07-23T00:55:19',
'version' => '5.005'
},
{
'date' => '1998-07-26T06:20:30',
'version' => '5.005_50'
},
{
'date' => '1998-07-27T00:16:22',
'version' => '5.005_01'
},
{
'date' => '1998-08-02T10:32:29',
'version' => '5.005_02'
},
{
'date' => '1998-08-05T10:49:59',
'version' => '5.005_02'
},
{
'date' => '1998-08-08T05:46:05',
'version' => '5.005_02'
},
{
'date' => '1998-08-10T08:33:23',
'version' => '5.005_51'
},
{
'date' => '1998-09-25T11:59:38',
'version' => '5.005_52'
},
{
'date' => '1998-10-09T17:05:49',
'version' => '5.004_05'
},
{
'date' => '1998-10-31T12:32:20',
'version' => '5.005_53'
},
{
'date' => '1998-11-22T23:06:16',
'version' => '5.004_05'
},
{
'date' => '1998-11-30T03:26:39',
'version' => '5.005_03'
},
{
'date' => '1998-11-30T04:29:11',
'version' => '5.005_54'
},
{
'date' => '1998-12-03T17:22:19',
'version' => '5.004_05'
},
{
'date' => '1999-01-03T20:44:49',
'version' => '5.005_03'
},
{
'date' => '1999-01-17T18:28:14',
'version' => '5.005_03'
},
{
'date' => '1999-01-26T04:39:36',
'version' => '5.005_03'
},
{
'date' => '1999-01-29T05:03:44',
'version' => '5.005_03'
},
{
'date' => '1999-02-16T07:11:42',
'version' => '5.005_55'
},
{
'date' => '1999-03-01T05:38:00',
'version' => '5.005_56'
},
{
'date' => '1999-03-05T02:22:53',
'version' => '5.005_03'
},
{
'date' => '1999-03-29T00:50:43',
'version' => '5.005_03'
},
{
'date' => '1999-04-27T00:23:40',
'version' => '5.004_05'
},
{
'date' => '1999-04-29T20:04:24',
'version' => '5.004_05'
},
{
'date' => '1999-05-25T10:36:40',
'version' => '5.005_57'
},
{
'date' => '1999-07-27T11:00:38',
'version' => '5.005_58'
},
{
'date' => '1999-08-02T08:52:25',
'version' => '5.005_59'
},
{
'date' => '1999-08-02T21:13:44',
'version' => '5.005_60'
},
{
'date' => '1999-08-22T20:40:16',
'version' => '5.005_61'
},
{
'date' => '1999-10-15T10:36:17',
'version' => '5.005_62'
},
{
'date' => '1999-12-09T11:38:49',
'version' => '5.005_63'
},
{
'date' => '2000-02-02T13:06:00',
'version' => 'v5.5.640'
},
{
'date' => '2000-02-08T08:37:47',
'version' => 'v5.5.650'
},
{
'date' => '2000-02-22T11:41:34',
'version' => 'v5.5.660'
},
{
'date' => '2000-03-01T07:34:59',
'version' => 'v5.5.670'
},
{
'date' => '2000-03-23T06:06:13',
'version' => 'v5.6.0'
},
{
'date' => '2000-09-02T18:07:32',
'version' => 'v5.7.0'
},
{
'date' => '2000-12-18T10:12:29',
'version' => 'v5.6.1'
},
{
'date' => '2001-01-31T16:18:51',
'version' => 'v5.6.1'
},
{
'date' => '2001-03-19T09:36:57',
'version' => 'v5.6.1'
},
{
'date' => '2001-04-09T04:47:17',
'version' => 'v5.6.1'
},
{
'date' => '2001-04-10T02:54:00',
'version' => 'v5.7.1'
},
{
'date' => '2001-07-13T14:50:55',
'version' => 'v5.7.2'
},
{
'date' => '2002-03-05T05:00:31',
'version' => 'v5.7.3'
},
{
'date' => '2002-06-01T19:09:00',
'version' => 'v5.8.0'
},
{
'date' => '2002-06-21T14:56:35',
'version' => 'v5.8.0'
},
{
'date' => '2002-07-14T00:26:18',
'version' => 'v5.8.0'
},
{
'date' => '2002-07-18T23:32:56',
'version' => 'v5.8.0'
},
{
'date' => '2003-07-10T06:52:39',
'version' => 'v5.8.1'
},
{
'date' => '2003-07-11T12:23:20',
'version' => 'v5.8.1'
},
{
'date' => '2003-07-30T20:28:59',
'version' => 'v5.8.1'
},
{
'date' => '2003-08-01T15:49:36',
'version' => 'v5.8.1'
},
{
'date' => '2003-09-22T09:14:19',
'version' => 'v5.8.1'
},
{
'date' => '2003-09-25T11:49:06',
'version' => 'v5.8.1'
},
{
'date' => '2003-10-27T02:59:51',
'version' => '5.009'
},
{
'date' => '2003-10-27T23:40:16',
'version' => '5.008001'
},
{
'date' => '2003-11-03T09:03:41',
'version' => '5.008001'
},
{
'date' => '2003-11-05T23:34:05',
'version' => '5.008001'
},
{
'date' => '2003-11-08T15:53:25',
'version' => 'v5.6.2'
},
{
'date' => '2003-11-15T12:53:43',
'version' => 'v5.6.2'
},
{
'date' => '2003-12-05T16:42:45',
'version' => '5.005_03'
},
{
'date' => '2004-01-07T14:40:01',
'version' => '5.008001'
},
{
'date' => '2004-01-14T19:03:21',
'version' => '5.008003'
},
{
'date' => '2004-01-20T21:48:04',
'version' => '5.005_03'
},
{
'date' => '2004-01-27T21:18:43',
'version' => '5.005_03'
},
{
'date' => '2004-02-04T22:55:06',
'version' => '5.005_04'
},
{
'date' => '2004-02-18T14:20:15',
'version' => '5.005'
},
{
'date' => '2004-02-23T14:02:10',
'version' => '5.005'
},
{
'date' => '2004-03-16T19:35:25',
'version' => '5.009001'
},
{
'date' => '2004-04-05T21:27:48',
'version' => '5.008003'
},
{
'date' => '2004-04-15T22:59:51',
'version' => '5.008003'
},
{
'date' => '2004-04-21T23:03:10',
'version' => '5.008003'
},
{
'date' => '2004-07-06T21:41:21',
'version' => '5.008005'
},
{
'date' => '2004-07-08T21:55:05',
'version' => '5.008005'
},
{
'date' => '2004-07-19T21:56:20',
'version' => '5.008005'
},
{
'date' => '2004-11-11T19:56:33',
'version' => '5.008006'
},
{
'date' => '2004-11-27T23:56:17',
'version' => '5.008006'
},
{
'date' => '2005-04-01T09:53:24',
'version' => '5.009002'
},
{
'date' => '2005-05-18T16:35:37',
'version' => '5.008007'
},
{
'date' => '2005-05-30T22:19:23',
'version' => '5.008007'
},
{
'date' => '2006-01-20T10:09:18',
'version' => '5.008008'
},
{
'date' => '2006-01-28T11:11:38',
'version' => '5.009003'
},
{
'date' => '2006-02-01T00:00:59',
'version' => '5.008008'
},
{
'date' => '2006-08-15T13:48:30',
'version' => '5.009004'
},
{
'date' => '2007-07-07T16:13:57',
'version' => '5.009005'
},
{
'date' => '2007-11-17T15:31:20',
'version' => '5.009005'
},
{
'date' => '2007-11-25T18:22:18',
'version' => '5.010000'
},
{
'date' => '2007-12-18T17:41:41',
'version' => '5.010000'
},
{
'date' => '2008-11-10T23:14:59',
'version' => '5.008009'
},
{
'date' => '2008-12-06T22:50:35',
'version' => '5.008009'
},
{
'date' => '2008-12-14T23:08:28',
'version' => '5.008009'
},
{
'date' => '2009-08-06T16:11:03',
'version' => '5.010001'
},
{
'date' => '2009-08-18T23:45:03',
'version' => '5.010001'
},
{
'date' => '2009-08-23T14:21:38',
'version' => '5.010001'
},
{
'date' => '2009-10-02T20:51:46',
'version' => '5.011000'
},
{
'date' => '2009-10-20T17:51:38',
'version' => '5.011001'
},
{
'date' => '2009-11-20T07:20:52',
'version' => '5.011002'
},
{
'date' => '2009-12-21T04:49:14',
'version' => '5.011003'
},
{
'date' => '2010-01-20T16:48:28',
'version' => '5.011004'
},
{
'date' => '2010-02-21T00:45:26',
'version' => '5.011005'
},
{
'date' => '2010-03-21T20:41:11',
'version' => '5.012000'
},
{
'date' => '2010-03-29T18:29:49',
'version' => '5.012000'
},
{
'date' => '2010-04-01T02:38:12',
'version' => '5.012000'
},
{
'date' => '2010-04-03T02:40:48',
'version' => '5.012000'
},
{
'date' => '2010-04-07T05:39:46',
'version' => '5.012000'
},
{
'date' => '2010-04-10T03:46:04',
'version' => '5.012000'
},
{
'date' => '2010-04-12T22:38:37',
'version' => '5.012000'
},
{
'date' => '2010-04-20T20:06:02',
'version' => '5.013000'
},
{
'date' => '2010-05-10T02:43:48',
'version' => '5.012001'
},
{
'date' => '2010-05-13T22:31:41',
'version' => '5.012001'
},
{
'date' => '2010-05-16T22:40:16',
'version' => '5.012001'
},
{
'date' => '2010-05-20T14:03:45',
'version' => '5.013001'
},
{
'date' => '2010-06-22T21:39:26',
'version' => '5.013002'
},
{
'date' => '2010-07-20T10:23:23',
'version' => '5.013003'
},
{
'date' => '2010-08-20T15:39:07',
'version' => '5.013004'
},
{
'date' => '2010-08-31T16:48:01',
'version' => '5.012002'
},
{
'date' => '2010-09-07T01:41:31',
'version' => '5.012002'
},
{
'date' => '2010-09-19T21:22:47',
'version' => '5.013005'
},
{
'date' => '2010-10-21T01:41:01',
'version' => '5.013006'
},
{
'date' => '2010-11-21T01:14:06',
'version' => '5.013007'
},
{
'date' => '2010-12-19T23:06:25',
'version' => '5.013008'
},
{
'date' => '2011-01-10T02:12:53',
'version' => '5.012003'
},
{
'date' => '2011-01-15T04:05:30',
'version' => '5.012003'
},
{
'date' => '2011-01-18T02:13:17',
'version' => '5.012003'
},
{
'date' => '2011-01-21T01:42:07',
'version' => '5.013009'
},
{
'date' => '2011-01-22T03:35:35',
'version' => '5.012003'
},
{
'date' => '2011-02-20T19:18:02',
'version' => '5.013010'
},
{
'date' => '2011-03-20T19:49:16',
'version' => '5.013011'
},
{
'date' => '2011-04-20T11:53:32',
'version' => '5.014000'
},
{
'date' => '2011-05-04T16:42:27',
'version' => '5.014000'
},
{
'date' => '2011-05-11T15:49:42',
'version' => '5.014000'
},
{
'date' => '2011-05-14T20:34:05',
'version' => '5.014000'
},
{
'date' => '2011-06-08T13:19:36',
'version' => '5.012004'
},
{
'date' => '2011-06-09T23:48:04',
'version' => '5.014001'
},
{
'date' => '2011-06-15T17:00:36',
'version' => '5.012004'
},
{
'date' => '2011-06-17T02:42:01',
'version' => '5.014001'
},
{
'date' => '2011-06-20T10:41:26',
'version' => '5.012004'
},
{
'date' => '2011-06-20T23:19:05',
'version' => '5.015000'
},
{
'date' => '2011-07-20T21:15:08',
'version' => '5.015001'
},
{
'date' => '2011-08-21T00:05:23',
'version' => '5.015002'
},
{
'date' => '2011-09-19T11:25:31',
'version' => '5.014002'
},
{
'date' => '2011-09-21T03:05:05',
'version' => '5.015003'
},
{
'date' => '2011-09-26T14:56:49',
'version' => '5.014002'
},
{
'date' => '2011-10-20T21:17:45',
'version' => '5.015004'
},
{
'date' => '2011-11-20T20:40:34',
'version' => '5.015005'
},
{
'date' => '2011-12-20T17:55:58',
'version' => '5.015006'
},
{
'date' => '2012-01-20T20:08:28',
'version' => '5.015007'
},
{
'date' => '2012-02-20T22:38:13',
'version' => '5.015008'
},
{
'date' => '2012-03-20T19:01:29',
'version' => '5.015009'
},
{
'date' => '2012-05-11T03:41:02',
'version' => '5.016000'
},
{
'date' => '2012-05-15T02:51:48',
'version' => '5.016000'
},
{
'date' => '2012-05-16T03:22:59',
'version' => '5.016000'
},
{
'date' => '2012-05-20T22:51:12',
'version' => '5.016000'
},
{
'date' => '2012-05-26T16:24:02',
'version' => '5.017000'
},
{
'date' => '2012-06-20T17:38:46',
'version' => '5.017001'
},
{
'date' => '2012-07-20T14:27:59',
'version' => '5.017002'
},
{
'date' => '2012-08-03T18:59:23',
'version' => '5.016001'
},
{
'date' => '2012-08-08T22:30:11',
'version' => '5.016001'
},
{
'date' => '2012-08-20T14:12:28',
'version' => '5.017003'
},
{
'date' => '2012-09-20T00:40:48',
'version' => '5.017004'
},
{
'date' => '2012-09-26T22:15:57',
'version' => '5.014003'
},
{
'date' => '2012-10-10T19:46:29',
'version' => '5.014003'
},
{
'date' => '2012-10-12T20:24:43',
'version' => '5.014003'
},
{
'date' => '2012-10-20T16:31:11',
'version' => '5.017005'
},
{
'date' => '2012-10-27T01:23:09',
'version' => '5.016002'
},
{
'date' => '2012-11-01T13:44:07',
'version' => '5.016002'
},
{
'date' => '2012-11-03T17:27:59',
'version' => '5.012005'
},
{
'date' => '2012-11-08T21:12:17',
'version' => '5.012005'
},
{
'date' => '2012-11-10T14:02:17',
'version' => '5.012005'
},
{
'date' => '2012-11-21T00:08:12',
'version' => '5.017006'
},
{
'date' => '2012-12-18T21:50:28',
'version' => '5.017007'
},
{
'date' => '2013-01-20T18:48:45',
'version' => '5.017008'
},
{
'date' => '2013-02-20T22:21:02',
'version' => '5.017009'
},
{
'date' => '2013-03-05T17:03:49',
'version' => '5.014004'
},
{
'date' => '2013-03-07T16:03:14',
'version' => '5.016003'
},
{
'date' => '2013-03-07T19:52:52',
'version' => '5.014004'
},
{
'date' => '2013-03-10T23:47:40',
'version' => '5.014004'
},
{
'date' => '2013-03-11T21:08:33',
'version' => '5.016003'
},
{
'date' => '2013-03-21T23:11:03',
'version' => '5.017010'
},
{
'date' => '2013-04-21T00:52:16',
'version' => '5.017011'
},
{
'date' => '2013-05-11T12:29:53',
'version' => '5.018000'
},
{
'date' => '2013-05-12T23:14:51',
'version' => '5.018000'
},
{
'date' => '2013-05-14T01:32:05',
'version' => '5.018000'
},
{
'date' => '2013-05-16T02:53:44',
'version' => '5.018000'
},
{
'date' => '2013-05-18T13:33:49',
'version' => '5.018000'
},
{
'date' => '2013-05-20T13:12:38',
'version' => '5.019000'
},
{
'date' => '2013-06-21T01:24:18',
'version' => '5.019001'
},
{
'date' => '2013-07-22T05:59:35',
'version' => '5.019002'
},
{
'date' => '2013-08-02T03:09:02',
'version' => '5.018001'
},
{
'date' => '2013-08-04T12:34:33',
'version' => '5.018001'
},
{
'date' => '2013-08-09T02:28:00',
'version' => '5.018001'
},
{
'date' => '2013-08-12T14:31:08',
'version' => '5.018001'
},
{
'date' => '2013-08-20T16:09:42',
'version' => '5.019003'
},
{
'date' => '2013-09-20T15:58:20',
'version' => '5.019004'
},
{
'date' => '2013-10-20T13:25:55',
'version' => '5.019005'
},
{
'date' => '2013-11-20T20:37:20',
'version' => '5.019006'
},
{
'date' => '2013-12-02T22:36:49',
'version' => '5.018002'
},
{
'date' => '2013-12-07T13:55:43',
'version' => '5.018002'
},
{
'date' => '2013-12-19T21:27:42',
'version' => '5.018002'
},
{
'date' => '2013-12-20T20:55:37',
'version' => '5.019007'
},
{
'date' => '2013-12-22T03:30:43',
'version' => '5.018002'
},
{
'date' => '2014-01-07T01:52:57',
'version' => '5.018002'
},
{
'date' => '2014-01-20T21:59:04',
'version' => '5.019008'
},
{
'date' => '2014-02-20T04:24:45',
'version' => '5.019009'
},
{
'date' => '2014-03-20T20:40:26',
'version' => '5.019010'
},
{
'date' => '2014-04-20T15:47:12',
'version' => '5.019011'
},
{
'date' => '2014-05-17T00:16:49',
'version' => '5.020000'
},
{
'date' => '2014-05-27T01:35:13',
'version' => '5.020000'
},
{
'date' => '2014-05-27T14:32:18',
'version' => '5.021000'
},
{
'date' => '2014-06-20T15:31:10',
'version' => '5.021001'
},
{
'date' => '2014-07-20T13:48:02',
'version' => '5.021002'
},
{
'date' => '2014-08-21T02:26:13',
'version' => '5.021003'
},
{
'date' => '2014-08-25T18:10:32',
'version' => '5.020001'
},
{
'date' => '2014-09-07T17:01:11',
'version' => '5.020001'
},
{
'date' => '2014-09-14T13:11:14',
'version' => '5.020001'
},
{
'date' => '2014-09-17T20:29:53',
'version' => '5.018003'
},
{
'date' => '2014-09-20T13:33:14',
'version' => '5.021004'
},
{
'date' => '2014-09-27T12:54:08',
'version' => '5.018003'
},
{
'date' => '2014-10-01T13:22:50',
'version' => '5.018003'
},
{
'date' => '2014-10-02T00:48:31',
'version' => '5.018004'
},
{
'date' => '2014-10-20T16:54:20',
'version' => '5.021005'
},
{
'date' => '2014-11-20T23:39:06',
'version' => '5.021006'
},
{
'date' => '2014-12-20T17:34:57',
'version' => '5.021007'
},
{
'date' => '2015-01-20T20:20:05',
'version' => '5.021008'
},
{
'date' => '2015-02-01T03:07:56',
'version' => '5.020002'
},
{
'date' => '2015-02-14T18:26:43',
'version' => '5.020002'
},
{
'date' => '2015-02-21T05:27:09',
'version' => '5.021009'
},
{
'date' => '2015-03-20T18:30:20',
'version' => '5.021010'
},
{
'date' => '2015-04-20T21:28:37',
'version' => '5.021011'
},
{
'date' => '2015-05-19T14:12:19',
'version' => '5.022000'
},
{
'date' => '2015-05-21T23:03:22',
'version' => '5.022000'
},
{
'date' => '2015-06-01T17:51:59',
'version' => '5.022000'
},
{
'date' => '2015-06-20T20:22:32',
'version' => '5.023000'
},
{
'date' => '2015-07-20T19:26:31',
'version' => '5.023001'
},
{
'date' => '2015-08-20T15:36:45',
'version' => '5.023002'
},
{
'date' => '2015-08-22T22:12:34',
'version' => '5.020003'
},
{
'date' => '2015-08-29T22:02:43',
'version' => '5.020003'
},
{
'date' => '2015-09-12T19:09:14',
'version' => '5.020003'
},
{
'date' => '2015-09-21T02:47:16',
'version' => '5.023003'
},
{
'date' => '2015-10-20T22:17:48',
'version' => '5.023004'
},
{
'date' => '2015-10-31T18:42:58',
'version' => '5.022001'
},
{
'date' => '2015-11-15T15:15:03',
'version' => '5.022001'
},
{
'date' => '2015-11-20T17:09:38',
'version' => '5.023005'
},
{
'date' => '2015-12-02T22:07:35',
'version' => '5.022001'
},
{
'date' => '2015-12-08T21:34:05',
'version' => '5.022001'
},
{
'date' => '2015-12-13T19:48:31',
'version' => '5.022001'
},
{
'date' => '2015-12-21T22:40:27',
'version' => '5.023006'
},
{
'date' => '2016-01-20T21:52:22',
'version' => '5.023007'
},
{
'date' => '2016-02-20T21:56:31',
'version' => '5.023008'
},
{
'date' => '2016-03-20T16:45:40',
'version' => '5.023009'
},
{
'date' => '2016-04-10T17:29:04',
'version' => '5.022002'
},
{
'date' => '2016-04-14T03:27:48',
'version' => '5.024000'
},
{
'date' => '2016-04-23T20:56:14',
'version' => '5.024000'
},
{
'date' => '2016-04-27T01:02:55',
'version' => '5.024000'
},
{
'date' => '2016-04-29T21:39:25',
'version' => '5.022002'
},
{
'date' => '2016-05-02T14:41:03',
'version' => '5.024000'
},
{
'date' => '2016-05-04T22:27:57',
'version' => '5.024000'
},
{
'date' => '2016-05-09T11:35:29',
'version' => '5.024000'
},
{
'date' => '2016-05-09T12:02:53',
'version' => '5.025000'
},
{
'date' => '2016-05-20T21:33:43',
'version' => '5.025001'
},
{
'date' => '2016-06-20T21:02:44',
'version' => '5.025002'
},
{
'date' => '2016-07-17T22:27:32',
'version' => '5.022003'
},
{
'date' => '2016-07-17T22:29:08',
'version' => '5.024001'
},
{
'date' => '2016-07-20T16:22:41',
'version' => '5.025003'
},
{
'date' => '2016-07-25T12:58:33',
'version' => '5.022003'
},
{
'date' => '2016-07-25T13:01:21',
'version' => '5.024001'
},
{
'date' => '2016-08-11T23:47:40',
'version' => '5.022003'
},
{
'date' => '2016-08-11T23:50:29',
'version' => '5.024001'
},
{
'date' => '2016-08-20T20:25:19',
'version' => '5.025004'
},
{
'date' => '2016-09-20T17:45:06',
'version' => '5.025005'
},
{
'date' => '2016-10-12T21:39:57',
'version' => '5.022003'
},
{
'date' => '2016-10-12T21:40:57',
'version' => '5.024001'
},
{
'date' => '2016-10-20T15:44:55',
'version' => '5.025006'
},
{
'date' => '2016-11-20T21:20:07',
'version' => '5.025007'
},
{
'date' => '2016-12-20T19:14:33',
'version' => '5.025008'
},
{
'date' => '2017-01-02T18:54:51',
'version' => '5.022003'
},
{
'date' => '2017-01-02T18:57:38',
'version' => '5.024001'
},
{
'date' => '2017-01-14T20:04:05',
'version' => '5.022003'
},
{
'date' => '2017-01-14T20:04:30',
'version' => '5.024001'
},
{
'date' => '2017-01-20T15:25:43',
'version' => '5.025009'
},
{
'date' => '2017-02-20T21:21:01',
'version' => '5.025010'
},
{
'date' => '2017-03-20T20:56:49',
'version' => '5.025011'
},
{
'date' => '2017-04-20T19:32:05',
'version' => '5.025012'
},
{
'date' => '2017-05-11T17:07:17',
'version' => '5.026000'
},
{
'date' => '2017-05-23T23:19:34',
'version' => '5.026000'
},
{
'date' => '2017-05-30T19:42:51',
'version' => '5.026000'
},
{
'date' => '2017-05-31T21:11:57',
'version' => '5.027000'
},
{
'date' => '2017-06-20T06:39:54',
'version' => '5.027001'
},
{
'date' => '2017-07-01T21:50:24',
'version' => '5.022004'
},
{
'date' => '2017-07-01T21:50:55',
'version' => '5.024002'
},
{
'date' => '2017-07-15T17:26:52',
'version' => '5.022004'
},
{
'date' => '2017-07-15T17:29:00',
'version' => '5.024002'
},
{
'date' => '2017-07-20T19:28:36',
'version' => '5.027002'
},
{
'date' => '2017-08-21T20:43:51',
'version' => '5.027003'
},
{
'date' => '2017-09-10T15:37:08',
'version' => '5.024003'
},
{
'date' => '2017-09-10T15:38:22',
'version' => '5.026001'
},
{
'date' => '2017-09-20T21:44:22',
'version' => '5.027004'
},
{
'date' => '2017-09-22T21:29:50',
'version' => '5.024003'
},
{
'date' => '2017-09-22T21:30:56',
'version' => '5.026001'
},
{
'date' => '2017-10-20T22:08:15',
'version' => '5.027005'
},
{
'date' => '2017-11-20T22:39:31',
'version' => '5.027006'
},
{
'date' => '2017-12-20T22:58:25',
'version' => '5.027007'
},
{
'date' => '2018-01-20T03:17:50',
'version' => '5.027008'
},
{
'date' => '2018-02-20T20:46:45',
'version' => '5.027009'
},
{
'date' => '2018-03-20T21:08:53',
'version' => '5.027010'
},
{
'date' => '2018-03-24T19:33:50',
'version' => '5.024004'
},
{
'date' => '2018-03-24T19:37:40',
'version' => '5.026002'
},
{
'date' => '2018-04-14T11:25:22',
'version' => '5.024004'
},
{
'date' => '2018-04-14T11:27:18',
'version' => '5.026002'
},
{
'date' => '2018-04-20T15:10:52',
'version' => '5.027011'
},
{
'date' => '2018-05-21T13:12:00',
'version' => '5.028000'
},
{
'date' => '2018-06-06T12:34:00',
'version' => '5.028000'
},
{
'date' => '2018-06-18T22:47:34',
'version' => '5.028000'
},
{
'date' => '2018-06-19T20:45:05',
'version' => '5.028000'
},
{
'date' => '2018-06-23T02:05:28',
'version' => '5.028000'
},
{
'date' => '2018-06-26T21:25:53',
'version' => '5.029000'
},
{
'date' => '2018-07-20T15:13:07',
'version' => '5.029001'
},
{
'date' => '2018-08-20T21:04:27',
'version' => '5.029002'
},
{
'date' => '2018-09-21T02:58:51',
'version' => '5.029003'
},
{
'date' => '2018-10-20T14:20:56',
'version' => '5.029004'
},
{
'date' => '2018-11-20T22:03:07',
'version' => '5.029005'
},
{
'date' => '2018-11-29T19:03:17',
'version' => '5.026003'
},
{
'date' => '2018-11-29T19:03:28',
'version' => '5.028001'
},
{
'date' => '2018-11-30T22:02:29',
'version' => '5.026003'
},
{
'date' => '2018-11-30T22:03:06',
'version' => '5.028001'
},
{
'date' => '2018-12-18T12:26:18',
'version' => '5.029006'
},
{
'date' => '2019-01-20T02:16:52',
'version' => '5.029007'
},
{
'date' => '2019-02-21T05:30:00',
'version' => '5.029008'
},
{
'date' => '2019-03-21T11:49:45',
'version' => '5.029009'
},
{
'date' => '2019-04-05T19:46:23',
'version' => '5.028002'
},
{
'date' => '2019-04-19T15:07:44',
'version' => '5.028002'
},
{
'date' => '2019-04-20T18:11:45',
'version' => '5.029010'
},
{
'date' => '2019-05-11T22:58:31',
'version' => '5.030000'
},
{
'date' => '2019-05-17T20:44:42',
'version' => '5.030000'
},
{
'date' => '2019-05-22T09:35:50',
'version' => '5.030000'
},
{
'date' => '2019-05-24T19:28:47',
'version' => '5.031000'
},
{
'date' => '2019-06-20T20:19:01',
'version' => '5.031001'
},
{
'date' => '2019-07-20T17:01:20',
'version' => '5.031002'
},
{
'date' => '2019-08-20T14:02:01',
'version' => '5.031003'
},
{
'date' => '2019-09-20T21:27:31',
'version' => '5.031004'
},
{
'date' => '2019-10-20T14:29:11',
'version' => '5.031005'
},
{
'date' => '2019-10-27T16:29:27',
'version' => '5.030001'
},
{
'date' => '2019-11-10T14:14:00',
'version' => '5.030001'
},
{
'date' => '2019-11-20T22:14:49',
'version' => '5.031006'
},
{
'date' => '2019-12-21T03:38:57',
'version' => '5.031007'
},
{
'date' => '2020-01-20T17:17:53',
'version' => '5.031008'
},
{
'date' => '2020-02-20T23:03:22',
'version' => '5.031009'
},
{
'date' => '2020-02-29T19:25:07',
'version' => '5.030002'
},
{
'date' => '2020-03-14T17:04:56',
'version' => '5.030002'
},
{
'date' => '2020-03-20T20:08:58',
'version' => '5.031010'
},
{
'date' => '2020-04-28T19:49:59',
'version' => '5.031011'
},
{
'date' => '2020-05-30T18:47:47',
'version' => '5.032000'
},
{
'date' => '2020-06-01T19:17:48',
'version' => '5.028003'
},
{
'date' => '2020-06-01T19:19:30',
'version' => '5.028003'
},
{
'date' => '2020-06-01T19:19:54',
'version' => '5.030003'
},
{
'date' => '2020-06-01T19:21:31',
'version' => '5.030003'
},
{
'date' => '2020-06-07T21:13:05',
'version' => '5.032000'
},
{
'date' => '2020-06-20T20:38:54',
'version' => '5.032000'
},
{
'date' => '2020-07-17T19:38:54',
'version' => '5.033000'
},
{
'date' => '2020-08-20T20:36:01',
'version' => '5.033001'
},
{
'date' => '2020-09-20T16:29:59',
'version' => '5.033002'
},
{
'date' => '2020-10-20T21:30:28',
'version' => '5.033003'
},
{
'date' => '2020-11-20T13:32:10',
'version' => '5.033004'
},
{
'date' => '2020-12-20T14:00:43',
'version' => '5.033005'
},
{
'date' => '2021-01-09T16:48:26',
'version' => '5.032001'
},
{
'date' => '2021-01-21T01:34:41',
'version' => '5.033006'
},
{
'date' => '2021-01-23T14:56:24',
'version' => '5.032001'
},
{
'date' => '2021-02-20T09:58:24',
'version' => '5.033007'
},
{
'date' => '2021-03-21T00:55:24',
'version' => '5.033008'
},
{
'date' => '2021-04-20T23:37:29',
'version' => '5.033009'
},
{
'date' => '2021-05-04T23:24:07',
'version' => '5.034000'
},
{
'date' => '2021-05-15T14:56:00',
'version' => '5.034000'
},
{
'date' => '2021-05-20T20:07:59',
'version' => '5.034000'
},
{
'date' => '2021-05-21T02:06:41',
'version' => '5.035000'
},
{
'date' => '2021-06-20T12:39:44',
'version' => '5.035001'
},
{
'date' => '2021-07-23T12:53:17',
'version' => '5.035002'
},
{
'date' => '2021-08-21T03:17:40',
'version' => '5.035003'
},
{
'date' => '2021-09-20T19:46:41',
'version' => '5.035004'
},
{
'date' => '2021-10-21T19:32:21',
'version' => '5.035005'
},
{
'date' => '2021-11-21T00:22:09',
'version' => '5.035006'
},
{
'date' => '2021-12-20T23:35:42',
'version' => '5.035007'
},
{
'date' => '2022-01-20T22:39:08',
'version' => '5.035008'
},
{
'date' => '2022-02-20T12:32:59',
'version' => '5.035009'
},
{
'date' => '2022-02-27T14:18:13',
'version' => '5.034001'
},
{
'date' => '2022-03-06T17:23:15',
'version' => '5.034001'
},
{
'date' => '2022-03-13T08:40:18',
'version' => '5.034001'
},
{
'date' => '2022-03-20T18:33:42',
'version' => '5.035010'
},
{
'date' => '2022-04-20T20:33:20',
'version' => '5.035011'
},
{
'date' => '2022-05-21T00:12:21',
'version' => '5.036000'
},
{
'date' => '2022-05-22T19:36:07',
'version' => '5.036000'
},
{
'date' => '2022-05-28T00:26:10',
'version' => '5.036000'
},
{
'date' => '2022-05-28T02:33:40',
'version' => '5.037000'
},
{
'date' => '2022-06-20T18:57:04',
'version' => '5.037001'
},
{
'date' => '2022-07-21T01:37:24',
'version' => '5.037002'
},
{
'date' => '2022-08-20T18:57:47',
'version' => '5.037003'
},
{
'date' => '2022-09-21T00:25:19',
'version' => '5.037004'
},
{
'date' => '2022-10-20T17:33:58',
'version' => '5.037005'
},
{
'date' => '2022-11-20T11:56:16',
'version' => '5.037006'
},
{
'date' => '2022-12-20T17:14:30',
'version' => '5.037007'
},
{
'date' => '2023-01-20T15:20:59',
'version' => '5.037008'
},
{
'date' => '2023-02-20T20:45:20',
'version' => '5.037009'
},
{
'date' => '2023-03-21T08:16:37',
'version' => '5.037010'
},
{
'date' => '2023-04-10T20:07:53',
'version' => '5.036001'
},
{
'date' => '2023-04-11T19:50:09',
'version' => '5.036001'
},
{
'date' => '2023-04-16T15:35:15',
'version' => '5.036001'
},
{
'date' => '2023-04-20T19:05:36',
'version' => '5.037011'
},
{
'date' => '2023-04-23T15:22:26',
'version' => '5.036001'
},
{
'date' => '2023-06-16T02:09:05',
'version' => '5.038000'
},
{
'date' => '2023-06-23T21:17:27',
'version' => '5.038000'
},
{
'date' => '2023-07-02T23:00:28',
'version' => '5.038000'
},
{
'date' => '2023-07-20T19:09:13',
'version' => '5.039001'
},
{
'date' => '2023-08-20T22:46:17',
'version' => '5.039002'
},
{
'date' => '2023-09-20T16:12:58',
'version' => '5.039003'
},
{
'date' => '2023-10-25T19:15:57',
'version' => '5.039004'
},
{
'date' => '2023-11-20T02:49:43',
'version' => '5.039005'
},
{
'date' => '2023-11-25T15:19:49',
'version' => '5.034002'
},
{
'date' => '2023-11-25T15:20:11',
'version' => '5.036002'
},
{
'date' => '2023-11-25T15:21:49',
'version' => '5.038001'
},
{
'date' => '2023-11-25T15:58:49',
'version' => '5.034002'
},
{
'date' => '2023-11-25T15:59:01',
'version' => '5.036002'
},
{
'date' => '2023-11-25T15:59:13',
'version' => '5.038001'
},
{
'date' => '2023-11-29T13:10:30',
'version' => '5.034003'
},
{
'date' => '2023-11-29T16:08:59',
'version' => '5.036003'
},
{
'date' => '2023-11-29T16:10:36',
'version' => '5.038002'
},
{
'date' => '2023-12-30T21:59:20',
'version' => '5.039006'
},
{
'date' => '2024-01-20T12:44:12',
'version' => '5.039007'
},
{
'date' => '2024-02-23T14:25:56',
'version' => '5.039008'
},
{
'date' => '2024-03-20T16:26:28',
'version' => '5.039009'
},
{
'date' => '2024-04-27T19:22:49',
'version' => '5.039010'
},
{
'date' => '2024-05-24T20:45:21',
'version' => '5.040000'
},
{
'date' => '2024-06-04T21:47:57',
'version' => '5.040000'
},
{
'date' => '2024-06-09T20:45:37',
'version' => '5.040000'
},
{
'date' => '2024-07-02T14:28:09',
'version' => '5.041001'
},
{
'date' => '2024-07-20T20:54:48',
'version' => '5.041002'
},
{
'date' => '2024-08-29T13:23:40',
'version' => '5.041003'
},
{
'date' => '2024-09-20T11:18:14',
'version' => '5.041004'
},
{
'date' => '2024-10-20T20:49:26',
'version' => '5.041005'
},
{
'date' => '2024-11-20T08:29:25',
'version' => '5.041006'
},
{
'date' => '2024-12-20T14:31:24',
'version' => '5.041007'
},
{
'date' => '2025-01-05T20:28:54',
'version' => '5.038003'
},
{
'date' => '2025-01-05T20:32:07',
'version' => '5.040001'
},
{
'date' => '2025-01-18T19:43:21',
'version' => '5.038003'
},
{
'date' => '2025-01-18T19:48:20',
'version' => '5.040001'
},
{
'date' => '2025-01-20T21:30:07',
'version' => '5.041008'
}
]
},
'perl-ldap' => {
'advisories' => [
{
'affected_versions' => [
'>0'
],
'cves' => [
'CVE-2020-16093'
],
'description' => 'In LemonLDAP::NG (aka lemonldap-ng) through 2.0.8, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used.
',
'distribution' => 'perl-ldap',
'fixed_versions' => [],
'id' => 'CPANSA-Net-LDAPS-2020-16093',
'references' => [
'https://lemonldap-ng.org/download',
'https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2250',
'https://rt.cpan.org/Ticket/Display.html?id=131045'
],
'reported' => '2022-07-18',
'severity' => undef
}
],
'main_module' => 'Net::LDAP',
'versions' => [
{
'date' => '1998-10-31T01:14:57',
'version' => '1.08'
},
{
'date' => '1998-10-31T01:19:38',
'version' => '0.08'
},
{
'date' => '1998-12-23T01:16:35',
'version' => '0.09'
},
{
'date' => '1999-03-18T02:58:45',
'version' => '0.10'
},
{
'date' => '1999-04-18T22:10:20',
'version' => '0.11'
},
{
'date' => '1999-06-28T02:40:38',
'version' => '0.12'
},
{
'date' => '1999-08-15T23:27:41',
'version' => '0.13'
},
{
'date' => '2000-02-14T10:34:19',
'version' => '0.14'
},
{
'date' => '2000-03-22T10:46:21',
'version' => '0.15'
},
{
'date' => '2000-04-27T17:02:43',
'version' => '0.16'
},
{
'date' => '2000-05-12T10:16:37',
'version' => '0.17'
},
{
'date' => '2000-05-22T14:53:07',
'version' => '0.18'
},
{
'date' => '2000-06-08T08:30:48',
'version' => '0.19'
},
{
'date' => '2000-08-03T17:07:52',
'version' => '0.20'
},
{
'date' => '2000-09-12T09:32:12',
'version' => '0.21'
},
{
'date' => '2000-09-14T19:08:19',
'version' => '0.22'
},
{
'date' => '2001-04-19T23:25:47',
'version' => '0.23'
},
{
'date' => '2001-07-17T13:01:04',
'version' => '0.24'
},
{
'date' => '2001-08-25T08:15:47',
'version' => '0.2401'
},
{
'date' => '2001-10-29T17:35:12',
'version' => '0.25'
},
{
'date' => '2002-05-28T07:49:00',
'version' => '0.251'
},
{
'date' => '2002-07-18T13:13:03',
'version' => '0.26'
},
{
'date' => '2003-01-27T14:48:49',
'version' => '0.27'
},
{
'date' => '2003-01-27T18:26:51',
'version' => '0.2701'
},
{
'date' => '2003-05-19T22:40:30',
'version' => '0.28'
},
{
'date' => '2003-06-24T10:21:09',
'version' => '0.29'
},
{
'date' => '2003-10-17T21:42:36',
'version' => '0.30'
},
{
'date' => '2004-01-01T10:47:23',
'version' => '0.31'
},
{
'date' => '2004-07-01T15:59:03',
'version' => '0.32'
},
{
'date' => '2004-07-14T21:00:39',
'version' => '0.3201'
},
{
'date' => '2004-07-19T18:24:58',
'version' => '0.3202'
},
{
'date' => '2005-04-25T23:02:59',
'version' => '0.33'
},
{
'date' => '2007-02-10T23:53:48',
'version' => '0.34'
},
{
'date' => '2008-03-30T18:58:37',
'version' => '0.35'
},
{
'date' => '2008-04-21T15:21:03',
'version' => '0.36'
},
{
'date' => '2008-08-28T13:02:29',
'version' => '0.37'
},
{
'date' => '2008-09-21T14:28:08',
'version' => '0.38'
},
{
'date' => '2008-10-27T20:10:12',
'version' => '0.39'
},
{
'date' => '2010-03-12T03:03:48',
'version' => '0.40'
},
{
'date' => '2010-03-24T20:01:45',
'version' => '0.4001'
},
{
'date' => '2011-09-03T12:44:01',
'version' => '0.41'
},
{
'date' => '2011-09-03T12:48:31',
'version' => '0.42'
},
{
'date' => '2011-09-03T17:55:11',
'version' => '0.43'
},
{
'date' => '2012-01-29T09:55:22',
'version' => '0.44'
},
{
'date' => '2012-09-05T09:46:44',
'version' => '0.45'
},
{
'date' => '2012-09-05T16:17:53',
'version' => '0.46'
},
{
'date' => '2012-09-16T10:06:08',
'version' => '0.47'
},
{
'date' => '2012-09-20T08:58:48',
'version' => '0.48'
},
{
'date' => '2012-10-06T08:15:30',
'version' => '0.49'
},
{
'date' => '2012-11-17T17:10:16',
'version' => '0.50_01'
},
{
'date' => '2012-11-24T12:11:37',
'version' => '0.50'
},
{
'date' => '2012-12-01T13:39:38',
'version' => '0.51'
},
{
'date' => '2013-01-01T13:03:26',
'version' => '0.52'
},
{
'date' => '2013-01-26T17:43:28',
'version' => '0.53'
},
{
'date' => '2013-03-29T11:25:51',
'version' => '0.54'
},
{
'date' => '2013-04-23T09:38:16',
'version' => '0.55'
},
{
'date' => '2013-06-08T11:31:48',
'version' => '0.56'
},
{
'date' => '2013-07-21T17:04:36',
'version' => '0.57'
},
{
'date' => '2013-12-23T16:50:28',
'version' => '0.58'
},
{
'date' => '2014-03-04T17:17:26',
'version' => '0.59'
},
{
'date' => '2014-03-08T13:14:49',
'version' => '0.60'
},
{
'date' => '2014-03-29T16:44:29',
'version' => '0.61'
},
{
'date' => '2014-04-06T09:39:40',
'version' => '0.62'
},
{
'date' => '2014-06-01T10:58:37',
'version' => '0.63'
},
{
'date' => '2014-06-19T15:59:40',
'version' => '0.64'
},
{
'date' => '2015-04-06T18:02:34',
'version' => '0.65'
},
{
'date' => '2019-04-16T09:42:54',
'version' => '0.66'
},
{
'date' => '2020-12-26T14:37:52',
'version' => '0.67'
},
{
'date' => '2021-01-03T17:37:50',
'version' => '0.68'
}
]
},
'urxvt-bgdsl' => {
'advisories' => [
{
'affected_versions' => [
'>=9.25,<=9.26'
],
'cves' => [
'CVE-2022-4170'
],
'darkpan' => 'true',
'description' => 'The rxvt-unicode package is vulnerable to a remote code execution, in the Perl background extension, when an attacker can control the data written to the user\'s terminal and certain options are set.
',
'distribution' => 'urxvt-bgdsl',
'fixed_versions' => [
'>=9.29'
],
'id' => 'CPANSA-urxvt-bgdsl-2022-4170',
'references' => [
'https://bugzilla.redhat.com/show_bug.cgi?id=2151597',
'https://www.openwall.com/lists/oss-security/2022/12/05/1'
],
'reported' => '2022-12-09',
'severity' => undef
}
],
'main_module' => '',
'versions' => []
}
},
'meta' => {
'commit' => '361ca2c3c003696aacf88f6918ce41eaa92400af',
'date' => 'Thu Feb 6 05:30:54 2025',
'epoch' => 1738819854,
'generator' => 'util/generate',
'repo' => 'https://github.com/briandfoy/cpan-security-advisory.git'
},
'module2dist' => {
'APR' => 'mod_perl',
'APR::Base64' => 'mod_perl',
'APR::Brigade' => 'mod_perl',
'APR::Bucket' => 'mod_perl',
'APR::BucketAlloc' => 'mod_perl',
'APR::BucketType' => 'mod_perl',
'APR::Const' => 'mod_perl',
'APR::Date' => 'mod_perl',
'APR::Error' => 'mod_perl',
'APR::Finfo' => 'mod_perl',
'APR::FunctionTable' => 'mod_perl',
'APR::IpSubnet' => 'mod_perl',
'APR::OS' => 'mod_perl',
'APR::PerlIO' => 'mod_perl',
'APR::Pool' => 'mod_perl',
'APR::Request' => 'libapreq2',
'APR::Request::Apache2' => 'libapreq2',
'APR::Request::CGI' => 'libapreq2',
'APR::Request::Cookie' => 'libapreq2',
'APR::Request::Error' => 'libapreq2',
'APR::Request::Param' => 'libapreq2',
'APR::SockAddr' => 'mod_perl',
'APR::Socket' => 'mod_perl',
'APR::Status' => 'mod_perl',
'APR::String' => 'mod_perl',
'APR::Table' => 'mod_perl',
'APR::ThreadMutex' => 'mod_perl',
'APR::ThreadRWLock' => 'mod_perl',
'APR::URI' => 'mod_perl',
'APR::UUID' => 'mod_perl',
'APR::Util' => 'mod_perl',
'APR::XSLoader' => 'mod_perl',
'Agni' => 'PApp',
'Agni::Callback' => 'PApp',
'Alien::PCRE2' => 'Alien-PCRE2',
'Amiga::ARexx' => 'perl',
'Amiga::ARexx::Msg' => 'perl',
'Amiga::Exec' => 'perl',
'AnyDBM_File' => 'perl',
'Apache' => 'mod_perl',
'Apache2::Access' => 'mod_perl',
'Apache2::Build' => 'mod_perl',
'Apache2::CmdParms' => 'mod_perl',
'Apache2::Command' => 'mod_perl',
'Apache2::Connection' => 'mod_perl',
'Apache2::ConnectionUtil' => 'mod_perl',
'Apache2::ConstantsTable' => 'mod_perl',
'Apache2::Cookie' => 'libapreq2',
'Apache2::Directive' => 'mod_perl',
'Apache2::Filter' => 'mod_perl',
'Apache2::FilterRec' => 'mod_perl',
'Apache2::FunctionTable' => 'mod_perl',
'Apache2::HookRun' => 'mod_perl',
'Apache2::Log' => 'mod_perl',
'Apache2::MPM' => 'mod_perl',
'Apache2::Module' => 'mod_perl',
'Apache2::ParseSource' => 'mod_perl',
'Apache2::ParseSource::Scan' => 'mod_perl',
'Apache2::PerlSections' => 'mod_perl',
'Apache2::PerlSections::Dump' => 'mod_perl',
'Apache2::Process' => 'mod_perl',
'Apache2::Provider' => 'mod_perl',
'Apache2::Request' => 'libapreq2',
'Apache2::RequestIO' => 'mod_perl',
'Apache2::RequestRec' => 'mod_perl',
'Apache2::RequestUtil' => 'mod_perl',
'Apache2::Resource' => 'mod_perl',
'Apache2::Response' => 'mod_perl',
'Apache2::ServerRec' => 'mod_perl',
'Apache2::ServerUtil' => 'mod_perl',
'Apache2::SourceTables' => 'mod_perl',
'Apache2::Status' => 'mod_perl',
'Apache2::Status::_version' => 'mod_perl',
'Apache2::StructureTable' => 'mod_perl',
'Apache2::SubProcess' => 'mod_perl',
'Apache2::SubRequest' => 'mod_perl',
'Apache2::URI' => 'mod_perl',
'Apache2::Upload' => 'libapreq2',
'Apache2::Util' => 'mod_perl',
'Apache2::XSLoader' => 'mod_perl',
'Apache2::compat' => 'mod_perl',
'Apache2::porting' => 'mod_perl',
'Apache::ASP' => 'Apache-ASP',
'Apache::ASP::ApacheCommon' => 'Apache-ASP',
'Apache::ASP::Application' => 'Apache-ASP',
'Apache::ASP::CGI' => 'Apache-ASP',
'Apache::ASP::CGI::Table' => 'Apache-ASP',
'Apache::ASP::CGI::Test' => 'Apache-ASP',
'Apache::ASP::Collection' => 'Apache-ASP',
'Apache::ASP::CollectionItem' => 'Apache-ASP',
'Apache::ASP::Date' => 'Apache-ASP',
'Apache::ASP::GlobalASA' => 'Apache-ASP',
'Apache::ASP::Lang::PerlScript' => 'Apache-ASP',
'Apache::ASP::Load' => 'Apache-ASP',
'Apache::ASP::Request' => 'Apache-ASP',
'Apache::ASP::Response' => 'Apache-ASP',
'Apache::ASP::STDERR' => 'Apache-ASP',
'Apache::ASP::Server' => 'Apache-ASP',
'Apache::ASP::Session' => 'Apache-ASP',
'Apache::ASP::State' => 'Apache-ASP',
'Apache::App' => 'App-Context',
'Apache::AuthCAS' => 'Apache-AuthCAS',
'Apache::Connection' => 'mod_perl',
'Apache::Constants' => 'mod_perl',
'Apache::Constants::Exports' => 'mod_perl',
'Apache::Debug' => 'mod_perl',
'Apache::EP' => 'HTML-EP',
'Apache::ExtUtils' => 'mod_perl',
'Apache::FakeRequest' => 'mod_perl',
'Apache::File' => 'mod_perl',
'Apache::Framework::App' => 'App-Context',
'Apache::Include' => 'mod_perl',
'Apache::Leak' => 'mod_perl',
'Apache::Log' => 'mod_perl',
'Apache::MP3' => 'Apache-MP3',
'Apache::MP3::L10N' => 'Apache-MP3',
'Apache::MP3::L10N::Aliases' => 'Apache-MP3',
'Apache::MP3::L10N::RightToLeft' => 'Apache-MP3',
'Apache::MP3::L10N::ar' => 'Apache-MP3',
'Apache::MP3::L10N::ca' => 'Apache-MP3',
'Apache::MP3::L10N::cs' => 'Apache-MP3',
'Apache::MP3::L10N::de' => 'Apache-MP3',
'Apache::MP3::L10N::en' => 'Apache-MP3',
'Apache::MP3::L10N::es' => 'Apache-MP3',
'Apache::MP3::L10N::fa' => 'Apache-MP3',
'Apache::MP3::L10N::fi' => 'Apache-MP3',
'Apache::MP3::L10N::fr' => 'Apache-MP3',
'Apache::MP3::L10N::ga' => 'Apache-MP3',
'Apache::MP3::L10N::he' => 'Apache-MP3',
'Apache::MP3::L10N::hr' => 'Apache-MP3',
'Apache::MP3::L10N::is' => 'Apache-MP3',
'Apache::MP3::L10N::it' => 'Apache-MP3',
'Apache::MP3::L10N::ja' => 'Apache-MP3',
'Apache::MP3::L10N::ko' => 'Apache-MP3',
'Apache::MP3::L10N::ms' => 'Apache-MP3',
'Apache::MP3::L10N::nb' => 'Apache-MP3',
'Apache::MP3::L10N::nb_no' => 'Apache-MP3',
'Apache::MP3::L10N::nl' => 'Apache-MP3',
'Apache::MP3::L10N::nl_be' => 'Apache-MP3',
'Apache::MP3::L10N::nl_nl' => 'Apache-MP3',
'Apache::MP3::L10N::nn' => 'Apache-MP3',
'Apache::MP3::L10N::nn_no' => 'Apache-MP3',
'Apache::MP3::L10N::no' => 'Apache-MP3',
'Apache::MP3::L10N::no_no' => 'Apache-MP3',
'Apache::MP3::L10N::pl' => 'Apache-MP3',
'Apache::MP3::L10N::ru' => 'Apache-MP3',
'Apache::MP3::L10N::sh' => 'Apache-MP3',
'Apache::MP3::L10N::sk' => 'Apache-MP3',
'Apache::MP3::L10N::sl' => 'Apache-MP3',
'Apache::MP3::L10N::sr' => 'Apache-MP3',
'Apache::MP3::L10N::tr' => 'Apache-MP3',
'Apache::MP3::L10N::uk' => 'Apache-MP3',
'Apache::MP3::L10N::x_marklar' => 'Apache-MP3',
'Apache::MP3::L10N::zh_cn' => 'Apache-MP3',
'Apache::MP3::L10N::zh_tw' => 'Apache-MP3',
'Apache::MP3::Playlist' => 'Apache-MP3',
'Apache::MP3::Resample' => 'Apache-MP3',
'Apache::MP3::Sorted' => 'Apache-MP3',
'Apache::ModuleConfig' => 'mod_perl',
'Apache::Opcode' => 'mod_perl',
'Apache::Options' => 'mod_perl',
'Apache::PerlRun' => 'mod_perl',
'Apache::PerlRunXS' => 'mod_perl',
'Apache::PerlSections' => 'mod_perl',
'Apache::RPC::Server' => 'RPC-XML',
'Apache::RPC::Status' => 'RPC-XML',
'Apache::ReadConfig' => 'mod_perl',
'Apache::RedirectLogFix' => 'mod_perl',
'Apache::Registry' => 'mod_perl',
'Apache::RegistryBB' => 'mod_perl',
'Apache::RegistryLoader' => 'mod_perl',
'Apache::RegistryNG' => 'mod_perl',
'Apache::Resource' => 'mod_perl',
'Apache::SIG' => 'mod_perl',
'Apache::SOAP' => 'SOAP-Lite',
'Apache::Server' => 'mod_perl',
'Apache::Session::Browseable' => 'Apache-Session-Browseable',
'Apache::Session::Browseable::Cassandra' => 'Apache-Session-Browseable',
'Apache::Session::Browseable::DBI' => 'Apache-Session-Browseable',
'Apache::Session::Browseable::File' => 'Apache-Session-Browseable',
'Apache::Session::Browseable::Informix' => 'Apache-Session-Browseable',
'Apache::Session::Browseable::LDAP' => 'Apache-Session-Browseable',
'Apache::Session::Browseable::MySQL' => 'Apache-Session-Browseable',
'Apache::Session::Browseable::MySQLJSON' => 'Apache-Session-Browseable',
'Apache::Session::Browseable::Oracle' => 'Apache-Session-Browseable',
'Apache::Session::Browseable::PgHstore' => 'Apache-Session-Browseable',
'Apache::Session::Browseable::PgJSON' => 'Apache-Session-Browseable',
'Apache::Session::Browseable::Postgres' => 'Apache-Session-Browseable',
'Apache::Session::Browseable::Redis' => 'Apache-Session-Browseable',
'Apache::Session::Browseable::SQLite' => 'Apache-Session-Browseable',
'Apache::Session::Browseable::Store::Cassandra' => 'Apache-Session-Browseable',
'Apache::Session::Browseable::Store::DBI' => 'Apache-Session-Browseable',
'Apache::Session::Browseable::Store::File' => 'Apache-Session-Browseable',
'Apache::Session::Browseable::Store::Informix' => 'Apache-Session-Browseable',
'Apache::Session::Browseable::Store::LDAP' => 'Apache-Session-Browseable',
'Apache::Session::Browseable::Store::MySQL' => 'Apache-Session-Browseable',
'Apache::Session::Browseable::Store::Oracle' => 'Apache-Session-Browseable',
'Apache::Session::Browseable::Store::Postgres' => 'Apache-Session-Browseable',
'Apache::Session::Browseable::Store::Redis' => 'Apache-Session-Browseable',
'Apache::Session::Browseable::Store::SQLite' => 'Apache-Session-Browseable',
'Apache::Session::Browseable::Store::Sybase' => 'Apache-Session-Browseable',
'Apache::Session::Browseable::Sybase' => 'Apache-Session-Browseable',
'Apache::Session::Generate::SHA256' => 'Apache-Session-Browseable',
'Apache::Session::LDAP' => 'Apache-Session-LDAP',
'Apache::Session::Serialize::Hstore' => 'Apache-Session-Browseable',
'Apache::Session::Serialize::JSON' => 'Apache-Session-Browseable',
'Apache::Session::Store::LDAP' => 'Apache-Session-LDAP',
'Apache::SessionX' => 'Apache-SessionX',
'Apache::SessionX::Generate::MD5' => 'Apache-SessionX',
'Apache::SessionX::Manager' => 'Apache-SessionX',
'Apache::SessionX::Store::File' => 'Apache-SessionX',
'Apache::StatINC' => 'mod_perl',
'Apache::Status' => 'mod_perl',
'Apache::Symbol' => 'mod_perl',
'Apache::Symdump' => 'mod_perl',
'Apache::Table' => 'mod_perl',
'Apache::URI' => 'mod_perl',
'Apache::Util' => 'mod_perl',
'Apache::Wyrd' => 'Apache-Wyrd',
'Apache::Wyrd::Attribute' => 'Apache-Wyrd',
'Apache::Wyrd::Bot' => 'Apache-Wyrd',
'Apache::Wyrd::BrowserSwitch' => 'Apache-Wyrd',
'Apache::Wyrd::CGICond' => 'Apache-Wyrd',
'Apache::Wyrd::CGISetter' => 'Apache-Wyrd',
'Apache::Wyrd::Chart' => 'Apache-Wyrd',
'Apache::Wyrd::Cookie' => 'Apache-Wyrd',
'Apache::Wyrd::DBL' => 'Apache-Wyrd',
'Apache::Wyrd::Datum' => 'Apache-Wyrd',
'Apache::Wyrd::Datum::Blob' => 'Apache-Wyrd',
'Apache::Wyrd::Datum::Char' => 'Apache-Wyrd',
'Apache::Wyrd::Datum::Enum' => 'Apache-Wyrd',
'Apache::Wyrd::Datum::Integer' => 'Apache-Wyrd',
'Apache::Wyrd::Datum::Null' => 'Apache-Wyrd',
'Apache::Wyrd::Datum::Set' => 'Apache-Wyrd',
'Apache::Wyrd::Datum::Text' => 'Apache-Wyrd',
'Apache::Wyrd::Datum::Varchar' => 'Apache-Wyrd',
'Apache::Wyrd::Debug' => 'Apache-Wyrd',
'Apache::Wyrd::Defaults' => 'Apache-Wyrd',
'Apache::Wyrd::ErrField' => 'Apache-Wyrd',
'Apache::Wyrd::ErrTag' => 'Apache-Wyrd',
'Apache::Wyrd::FileSize' => 'Apache-Wyrd',
'Apache::Wyrd::Form' => 'Apache-Wyrd',
'Apache::Wyrd::Form::Preload' => 'Apache-Wyrd',
'Apache::Wyrd::Form::Template' => 'Apache-Wyrd',
'Apache::Wyrd::Form::View' => 'Apache-Wyrd',
'Apache::Wyrd::Handler' => 'Apache-Wyrd',
'Apache::Wyrd::Input' => 'Apache-Wyrd',
'Apache::Wyrd::Input::Complex' => 'Apache-Wyrd',
'Apache::Wyrd::Input::Condenser' => 'Apache-Wyrd',
'Apache::Wyrd::Input::Opt' => 'Apache-Wyrd',
'Apache::Wyrd::Input::Set' => 'Apache-Wyrd',
'Apache::Wyrd::Input::URLInput' => 'Apache-Wyrd',
'Apache::Wyrd::Interfaces::Columnize' => 'Apache-Wyrd',
'Apache::Wyrd::Interfaces::Dater' => 'Apache-Wyrd',
'Apache::Wyrd::Interfaces::GetUser' => 'Apache-Wyrd',
'Apache::Wyrd::Interfaces::IndexUser' => 'Apache-Wyrd',
'Apache::Wyrd::Interfaces::Indexable' => 'Apache-Wyrd',
'Apache::Wyrd::Interfaces::Mother' => 'Apache-Wyrd',
'Apache::Wyrd::Interfaces::Setter' => 'Apache-Wyrd',
'Apache::Wyrd::Interfaces::SmartInput' => 'Apache-Wyrd',
'Apache::Wyrd::Interfaces::Stealth' => 'Apache-Wyrd',
'Apache::Wyrd::Lattice' => 'Apache-Wyrd',
'Apache::Wyrd::Lib' => 'Apache-Wyrd',
'Apache::Wyrd::LogDump' => 'Apache-Wyrd',
'Apache::Wyrd::Lookup' => 'Apache-Wyrd',
'Apache::Wyrd::Loop' => 'Apache-Wyrd',
'Apache::Wyrd::MySQLForm' => 'Apache-Wyrd',
'Apache::Wyrd::Number' => 'Apache-Wyrd',
'Apache::Wyrd::Query' => 'Apache-Wyrd',
'Apache::Wyrd::Redirect' => 'Apache-Wyrd',
'Apache::Wyrd::Request' => 'Apache-Wyrd',
'Apache::Wyrd::SQLForm' => 'Apache-Wyrd',
'Apache::Wyrd::Services::Auth' => 'Apache-Wyrd',
'Apache::Wyrd::Services::CodeRing' => 'Apache-Wyrd',
'Apache::Wyrd::Services::FileCache' => 'Apache-Wyrd',
'Apache::Wyrd::Services::Index' => 'Apache-Wyrd',
'Apache::Wyrd::Services::Key' => 'Apache-Wyrd',
'Apache::Wyrd::Services::LoginServer' => 'Apache-Wyrd',
'Apache::Wyrd::Services::MetaTable' => 'Apache-Wyrd',
'Apache::Wyrd::Services::MySQLIndex' => 'Apache-Wyrd',
'Apache::Wyrd::Services::PreAuth' => 'Apache-Wyrd',
'Apache::Wyrd::Services::SAK' => 'Apache-Wyrd',
'Apache::Wyrd::Services::SearchParser' => 'Apache-Wyrd',
'Apache::Wyrd::Services::TicketPad' => 'Apache-Wyrd',
'Apache::Wyrd::Services::Tree' => 'Apache-Wyrd',
'Apache::Wyrd::ShowParams' => 'Apache-Wyrd',
'Apache::Wyrd::Site::GDButton' => 'Apache-Wyrd',
'Apache::Wyrd::Site::Index' => 'Apache-Wyrd',
'Apache::Wyrd::Site::IndexBot' => 'Apache-Wyrd',
'Apache::Wyrd::Site::Login' => 'Apache-Wyrd',
'Apache::Wyrd::Site::MySQLIndex' => 'Apache-Wyrd',
'Apache::Wyrd::Site::MySQLIndexBot' => 'Apache-Wyrd',
'Apache::Wyrd::Site::NavPull' => 'Apache-Wyrd',
'Apache::Wyrd::Site::Page' => 'Apache-Wyrd',
'Apache::Wyrd::Site::Pull' => 'Apache-Wyrd',
'Apache::Wyrd::Site::SearchResults' => 'Apache-Wyrd',
'Apache::Wyrd::Site::TagPull' => 'Apache-Wyrd',
'Apache::Wyrd::Site::Widget' => 'Apache-Wyrd',
'Apache::Wyrd::Site::WidgetControl' => 'Apache-Wyrd',
'Apache::Wyrd::Site::WidgetIndex' => 'Apache-Wyrd',
'Apache::Wyrd::Template' => 'Apache-Wyrd',
'Apache::Wyrd::User' => 'Apache-Wyrd',
'Apache::Wyrd::Var' => 'Apache-Wyrd',
'Apache::Wyrd::Version' => 'Apache-Wyrd',
'Apache::Wyrd::View' => 'Apache-Wyrd',
'Apache::XAO' => 'XAO-Web',
'Apache::XMLRPC::Lite' => 'SOAP-Lite',
'Apache::ePerl' => 'eperl',
'Apache::fork' => 'mod_perl',
'Apache::httpd_conf' => 'mod_perl',
'Apache::src' => 'mod_perl',
'Apache::testold' => 'mod_perl',
'App' => 'App-Context',
'App::Authentication' => 'App-Context',
'App::Authentication::Htpasswd' => 'App-Context',
'App::Authorization' => 'App-Context',
'App::CallDispatcher' => 'App-Context',
'App::CallDispatcher::HTTPSimple' => 'App-Context',
'App::Conf' => 'App-Context',
'App::Conf::File' => 'App-Context',
'App::Context' => 'App-Context',
'App::Context::ClusterController' => 'App-Context',
'App::Context::ClusterNode' => 'App-Context',
'App::Context::Cmd' => 'App-Context',
'App::Context::HTTP' => 'App-Context',
'App::Context::ModPerl' => 'App-Context',
'App::Context::NetServer' => 'App-Context',
'App::Context::POE' => 'App-Context',
'App::Context::POE::ClusterController' => 'App-Context',
'App::Context::POE::ClusterNode' => 'App-Context',
'App::Context::POE::Server' => 'App-Context',
'App::Context::Server' => 'App-Context',
'App::Cpan' => 'CPAN',
'App::Documentation' => 'App-Context',
'App::Exceptions' => 'App-Context',
'App::Genpass' => 'App-Genpass',
'App::Github::Email' => 'App-Github-Email',
'App::LogChannel' => 'App-Context',
'App::MessageDispatcher' => 'App-Context',
'App::Packer::Backend::PAR' => 'PAR',
'App::Packer::PAR' => 'PAR-Packer',
'App::Packer::Temp' => 'PAR',
'App::Pinto' => 'Pinto',
'App::Pinto::Command' => 'Pinto',
'App::Pinto::Command::add' => 'Pinto',
'App::Pinto::Command::clean' => 'Pinto',
'App::Pinto::Command::copy' => 'Pinto',
'App::Pinto::Command::default' => 'Pinto',
'App::Pinto::Command::delete' => 'Pinto',
'App::Pinto::Command::diff' => 'Pinto',
'App::Pinto::Command::help' => 'Pinto',
'App::Pinto::Command::init' => 'Pinto',
'App::Pinto::Command::install' => 'Pinto',
'App::Pinto::Command::kill' => 'Pinto',
'App::Pinto::Command::list' => 'Pinto',
'App::Pinto::Command::lock' => 'Pinto',
'App::Pinto::Command::log' => 'Pinto',
'App::Pinto::Command::look' => 'Pinto',
'App::Pinto::Command::manual' => 'Pinto',
'App::Pinto::Command::merge' => 'Pinto',
'App::Pinto::Command::migrate' => 'Pinto',
'App::Pinto::Command::new' => 'Pinto',
'App::Pinto::Command::nop' => 'Pinto',
'App::Pinto::Command::pin' => 'Pinto',
'App::Pinto::Command::props' => 'Pinto',
'App::Pinto::Command::pull' => 'Pinto',
'App::Pinto::Command::register' => 'Pinto',
'App::Pinto::Command::rename' => 'Pinto',
'App::Pinto::Command::reset' => 'Pinto',
'App::Pinto::Command::revert' => 'Pinto',
'App::Pinto::Command::roots' => 'Pinto',
'App::Pinto::Command::stacks' => 'Pinto',
'App::Pinto::Command::statistics' => 'Pinto',
'App::Pinto::Command::thanks' => 'Pinto',
'App::Pinto::Command::unlock' => 'Pinto',
'App::Pinto::Command::unpin' => 'Pinto',
'App::Pinto::Command::unregister' => 'Pinto',
'App::Pinto::Command::update' => 'Pinto',
'App::Pinto::Command::verify' => 'Pinto',
'App::Reference' => 'App-Context',
'App::Request' => 'App-Context',
'App::Request::CGI' => 'App-Context',
'App::ResourceLocker' => 'App-Context',
'App::ResourceLocker::IPCLocker' => 'App-Context',
'App::ResourceLocker::IPCSemaphore' => 'App-Context',
'App::Response' => 'App-Context',
'App::Security' => 'App-Context',
'App::Serializer' => 'App-Context',
'App::Serializer::Html' => 'App-Context',
'App::Serializer::Ini' => 'App-Context',
'App::Serializer::Json' => 'App-Context',
'App::Serializer::OneLine' => 'App-Context',
'App::Serializer::Perl' => 'App-Context',
'App::Serializer::Properties' => 'App-Context',
'App::Serializer::Scalar' => 'App-Context',
'App::Serializer::Storable' => 'App-Context',
'App::Serializer::TextArray' => 'App-Context',
'App::Serializer::XMLDumper' => 'App-Context',
'App::Serializer::XMLSimple' => 'App-Context',
'App::Serializer::Xml' => 'App-Context',
'App::Serializer::Yaml' => 'App-Context',
'App::Service' => 'App-Context',
'App::Session' => 'App-Context',
'App::Session::Cookie' => 'App-Context',
'App::Session::HTMLHidden' => 'App-Context',
'App::SessionObject' => 'App-Context',
'App::SharedDatastore' => 'App-Context',
'App::UserAgent' => 'App-Context',
'App::ValueDomain' => 'App-Context',
'App::cpanminus' => 'App-cpanminus',
'App::japerl' => 'App-japerl',
'App::perlall' => 'App-perlall',
'Archive::Tar' => 'Archive-Tar',
'Archive::Tar::Constant' => 'Archive-Tar',
'Archive::Tar::File' => 'Archive-Tar',
'Archive::Tar::Std' => 'Archive-Tar',
'Archive::Tar::Std::_io' => 'Archive-Tar',
'Archive::Tar::Win32' => 'Archive-Tar',
'Archive::Tar::_io' => 'Archive-Tar',
'Archive::Zip' => 'Archive-Zip',
'Archive::Zip::Archive' => 'Archive-Zip',
'Archive::Zip::BufferedFileHandle' => 'Archive-Zip',
'Archive::Zip::DirectoryMember' => 'Archive-Zip',
'Archive::Zip::FileMember' => 'Archive-Zip',
'Archive::Zip::Member' => 'Archive-Zip',
'Archive::Zip::MemberRead' => 'Archive-Zip',
'Archive::Zip::MockFileHandle' => 'Archive-Zip',
'Archive::Zip::NewFileMember' => 'Archive-Zip',
'Archive::Zip::StringMember' => 'Archive-Zip',
'Archive::Zip::Tree' => 'Archive-Zip',
'Archive::Zip::ZipFileMember' => 'Archive-Zip',
'Axis' => 'perl',
'B' => 'perl',
'B::Concise' => 'perl',
'B::Deparse' => 'perl',
'B::Lint::Plugin::Test' => 'perl',
'B::OBJECT' => 'perl',
'B::Op_private' => 'perl',
'B::Section' => 'perl',
'B::Showlex' => 'perl',
'B::Terse' => 'perl',
'B::Xref' => 'perl',
'Batch::Batchrun' => 'Batch-Batchrun',
'Batch::Batchrun::BuildFile' => 'Batch-Batchrun',
'Batch::Batchrun::Dbfunctions' => 'Batch-Batchrun',
'Batch::Batchrun::Extract' => 'Batch-Batchrun',
'Batch::Batchrun::Initialize' => 'Batch-Batchrun',
'Batch::Batchrun::Load' => 'Batch-Batchrun',
'Batch::Batchrun::Mail' => 'Batch-Batchrun',
'Batch::Batchrun::ProcessSteps' => 'Batch-Batchrun',
'Batch::Batchrun::Pwlookup' => 'Batch-Batchrun',
'Batch::Batchrun::Retain' => 'Batch-Batchrun',
'Batch::Batchrun::TableFunctions' => 'Batch-Batchrun',
'Benchmark' => 'perl',
'Bio::DB::GFF::Aggregator::match_gap' => 'GBrowse',
'Bio::DB::GFF::Aggregator::reftranscript' => 'GBrowse',
'Bio::DB::GFF::Aggregator::waba_alignment' => 'GBrowse',
'Bio::DB::GFF::Aggregator::wormbase_gene' => 'GBrowse',
'Bio::DB::SeqFeature::Store::Alias' => 'GBrowse',
'Bio::DB::SeqFeature::Store::Alias::Iterator' => 'GBrowse',
'Bio::DB::SeqFeature::Store::Alias::Segment' => 'GBrowse',
'Bio::DB::SeqFeature::Store::BedLoader' => 'GBrowse',
'Bio::DB::Tagger' => 'GBrowse',
'Bio::DB::Tagger::Iterator' => 'GBrowse',
'Bio::DB::Tagger::Tag' => 'GBrowse',
'Bio::DB::Tagger::mysql' => 'GBrowse',
'Bio::Graphics::Browser2' => 'GBrowse',
'Bio::Graphics::Browser2::Action' => 'GBrowse',
'Bio::Graphics::Browser2::AdminTracks' => 'GBrowse',
'Bio::Graphics::Browser2::AuthorizedFeatureFile' => 'GBrowse',
'Bio::Graphics::Browser2::CAlign' => 'GBrowse',
'Bio::Graphics::Browser2::CachedTrack' => 'GBrowse',
'Bio::Graphics::Browser2::DataBase' => 'GBrowse',
'Bio::Graphics::Browser2::DataLoader' => 'GBrowse',
'Bio::Graphics::Browser2::DataLoader::archive' => 'GBrowse',
'Bio::Graphics::Browser2::DataLoader::bam' => 'GBrowse',
'Bio::Graphics::Browser2::DataLoader::bed' => 'GBrowse',
'Bio::Graphics::Browser2::DataLoader::bigbed' => 'GBrowse',
'Bio::Graphics::Browser2::DataLoader::bigwig' => 'GBrowse',
'Bio::Graphics::Browser2::DataLoader::featurefile' => 'GBrowse',
'Bio::Graphics::Browser2::DataLoader::generic' => 'GBrowse',
'Bio::Graphics::Browser2::DataLoader::gff' => 'GBrowse',
'Bio::Graphics::Browser2::DataLoader::gff3' => 'GBrowse',
'Bio::Graphics::Browser2::DataLoader::sam' => 'GBrowse',
'Bio::Graphics::Browser2::DataLoader::useq' => 'GBrowse',
'Bio::Graphics::Browser2::DataLoader::wig2bigwig' => 'GBrowse',
'Bio::Graphics::Browser2::DataLoader::wiggle' => 'GBrowse',
'Bio::Graphics::Browser2::DataSource' => 'GBrowse',
'Bio::Graphics::Browser2::ExternalData' => 'GBrowse',
'Bio::Graphics::Browser2::GFFhelper' => 'GBrowse',
'Bio::Graphics::Browser2::I18n' => 'GBrowse',
'Bio::Graphics::Browser2::Markup' => 'GBrowse',
'Bio::Graphics::Browser2::MetaDB' => 'GBrowse',
'Bio::Graphics::Browser2::MetaSegment' => 'GBrowse',
'Bio::Graphics::Browser2::MetaSegment::Iterator' => 'GBrowse',
'Bio::Graphics::Browser2::OptionPick' => 'GBrowse',
'Bio::Graphics::Browser2::PadAlignment' => 'GBrowse',
'Bio::Graphics::Browser2::Plugin' => 'GBrowse',
'Bio::Graphics::Browser2::Plugin::AuthPlugin' => 'GBrowse',
'Bio::Graphics::Browser2::PluginSet' => 'GBrowse',
'Bio::Graphics::Browser2::Realign' => 'GBrowse',
'Bio::Graphics::Browser2::Region' => 'GBrowse',
'Bio::Graphics::Browser2::RegionSearch' => 'GBrowse',
'Bio::Graphics::Browser2::RemoteSet' => 'GBrowse',
'Bio::Graphics::Browser2::Render' => 'GBrowse',
'Bio::Graphics::Browser2::Render::HTML' => 'GBrowse',
'Bio::Graphics::Browser2::Render::HTML::TrackListing' => 'GBrowse',
'Bio::Graphics::Browser2::Render::HTML::TrackListing::Categories' => 'GBrowse',
'Bio::Graphics::Browser2::Render::Login' => 'GBrowse',
'Bio::Graphics::Browser2::Render::Slave' => 'GBrowse',
'Bio::Graphics::Browser2::Render::Slave::AWS_Balancer' => 'GBrowse',
'Bio::Graphics::Browser2::Render::Slave::StagingServer' => 'GBrowse',
'Bio::Graphics::Browser2::Render::Slave::Status' => 'GBrowse',
'Bio::Graphics::Browser2::Render::SnapshotManager' => 'GBrowse',
'Bio::Graphics::Browser2::Render::TrackConfig' => 'GBrowse',
'Bio::Graphics::Browser2::RenderPanels' => 'GBrowse',
'Bio::Graphics::Browser2::SendMail' => 'GBrowse',
'Bio::Graphics::Browser2::Session' => 'GBrowse',
'Bio::Graphics::Browser2::Shellwords' => 'GBrowse',
'Bio::Graphics::Browser2::SubtrackTable' => 'GBrowse',
'Bio::Graphics::Browser2::TrackDumper' => 'GBrowse',
'Bio::Graphics::Browser2::TrackDumper::RichSeqMaker' => 'GBrowse',
'Bio::Graphics::Browser2::UserConf' => 'GBrowse',
'Bio::Graphics::Browser2::UserDB' => 'GBrowse',
'Bio::Graphics::Browser2::UserTracks' => 'GBrowse',
'Bio::Graphics::Browser2::UserTracks::Database' => 'GBrowse',
'Bio::Graphics::Browser2::UserTracks::Filesystem' => 'GBrowse',
'Bio::Graphics::Browser2::Util' => 'GBrowse',
'Bio::Graphics::GBrowseFeature' => 'GBrowse',
'Bio::Graphics::Karyotype' => 'GBrowse',
'Bio::Graphics::Wiggle::Loader::Nosample' => 'GBrowse',
'Bundle::Apache' => 'mod_perl',
'Bundle::Apache2' => 'mod_perl',
'Bundle::Apache::ASP' => 'Apache-ASP',
'Bundle::Apache::ASP::Extra' => 'Apache-ASP',
'Bundle::DBD::Pg' => 'DBD-Pg',
'Bundle::DBD::mysql' => 'DBD-mysql',
'Bundle::DBI' => 'DBI',
'Bundle::HTML::EP' => 'HTML-EP',
'Bundle::Image::Info::Everything' => 'Image-Info',
'Bundle::Image::Info::PNG' => 'Image-Info',
'Bundle::Image::Info::SVG' => 'Image-Info',
'Bundle::Image::Info::XBM' => 'Image-Info',
'Bundle::Image::Info::XPM' => 'Image-Info',
'Bundle::LWP' => 'libwww-perl',
'Bundle::Net::LDAP' => 'perl-ldap',
'Bundle::PlRPC' => 'PlRPC',
'CBC' => 'Crypt-CBC',
'CBOR::XS' => 'CBOR-XS',
'CGI' => 'CGI',
'CGI::Application' => 'CGI-Application',
'CGI::Application::Dispatch' => 'CGI-Application-Dispatch',
'CGI::Application::Dispatch::PSGI' => 'CGI-Application-Dispatch',
'CGI::Application::Dispatch::Regexp' => 'CGI-Application-Dispatch',
'CGI::Application::Mailform' => 'CGI-Application',
'CGI::Application::Plugin::AutoRunmode' => 'CGI-Application-Plugin-AutoRunmode',
'CGI::Application::Plugin::AutoRunmode::FileDelegate' => 'CGI-Application-Plugin-AutoRunmode',
'CGI::Application::Plugin::CAPTCHA' => 'CGI-Application-Plugin-CAPTCHA',
'CGI::Application::Plugin::RunmodeDeclare' => 'CGI-Application-Plugin-RunmodeDeclare',
'CGI::Auth::Basic' => 'CGI-Auth-Basic',
'CGI::Carp' => 'CGI',
'CGI::Cookie' => 'CGI',
'CGI::File::Temp' => 'CGI',
'CGI::HTML::Functions' => 'CGI',
'CGI::MultipartBuffer' => 'CGI',
'CGI::Pretty' => 'CGI',
'CGI::Push' => 'CGI',
'CGI::Session' => 'CGI-Session',
'CGI::Session::BluePrint' => 'CGI-Session',
'CGI::Session::CookBook' => 'CGI-Session',
'CGI::Session::DB_File' => 'CGI-Session',
'CGI::Session::Driver' => 'CGI-Session',
'CGI::Session::Driver::DBI' => 'CGI-Session',
'CGI::Session::Driver::db_file' => 'CGI-Session',
'CGI::Session::Driver::file' => 'CGI-Session',
'CGI::Session::Driver::mysql' => 'CGI-Session',
'CGI::Session::Driver::postgresql' => 'CGI-Session',
'CGI::Session::Driver::sqlite' => 'CGI-Session',
'CGI::Session::ErrorHandler' => 'CGI-Session',
'CGI::Session::Example' => 'CGI-Session',
'CGI::Session::File' => 'CGI-Session',
'CGI::Session::ID::SHA1' => 'CGI-Session',
'CGI::Session::ID::incr' => 'CGI-Session',
'CGI::Session::ID::md5' => 'CGI-Session',
'CGI::Session::ID::static' => 'CGI-Session',
'CGI::Session::MySQL' => 'CGI-Session',
'CGI::Session::PostgreSQL' => 'CGI-Session',
'CGI::Session::Query' => 'CGI-Session',
'CGI::Session::Serialize::default' => 'CGI-Session',
'CGI::Session::Serialize::freezethaw' => 'CGI-Session',
'CGI::Session::Serialize::json' => 'CGI-Session',
'CGI::Session::Serialize::storable' => 'CGI-Session',
'CGI::Session::Test::Default' => 'CGI-Session',
'CGI::Session::Test::SimpleObjectClass' => 'CGI-Session',
'CGI::Session::Tutorial' => 'CGI-Session',
'CGI::Simple' => 'CGI-Simple',
'CGI::Simple::Cookie' => 'CGI-Simple',
'CGI::Simple::Standard' => 'CGI-Simple',
'CGI::Simple::Util' => 'CGI-Simple',
'CGI::Toggle' => 'GBrowse',
'CGI::Util' => 'CGI',
'CGI::apacheSSI' => 'CGI-apacheSSI',
'CGI::apacheSSI::Gmt' => 'CGI-apacheSSI',
'CGI::apacheSSI::LMOD' => 'CGI-apacheSSI',
'CGI::apacheSSI::Local' => 'CGI-apacheSSI',
'CGI::mod_perl' => 'mod_perl',
'CPAN' => 'CPAN',
'CPAN::Admin' => 'CPAN',
'CPAN::Author' => 'CPAN',
'CPAN::Bundle' => 'CPAN',
'CPAN::CacheMgr' => 'CPAN',
'CPAN::Checksums' => 'CPAN-Checksums',
'CPAN::Complete' => 'CPAN',
'CPAN::Debug' => 'CPAN',
'CPAN::DeferredCode' => 'CPAN',
'CPAN::Distribution' => 'CPAN',
'CPAN::Distroprefs' => 'CPAN',
'CPAN::Distroprefs::Iterator' => 'CPAN',
'CPAN::Distroprefs::Pref' => 'CPAN',
'CPAN::Distroprefs::Result' => 'CPAN',
'CPAN::Distroprefs::Result::Error' => 'CPAN',
'CPAN::Distroprefs::Result::Fatal' => 'CPAN',
'CPAN::Distroprefs::Result::Success' => 'CPAN',
'CPAN::Distroprefs::Result::Warning' => 'CPAN',
'CPAN::Distrostatus' => 'CPAN',
'CPAN::Eval' => 'CPAN',
'CPAN::Exception::RecursiveDependency' => 'CPAN',
'CPAN::Exception::RecursiveDependency::na' => 'CPAN',
'CPAN::Exception::blocked_urllist' => 'CPAN',
'CPAN::Exception::yaml_not_installed' => 'CPAN',
'CPAN::Exception::yaml_process_error' => 'CPAN',
'CPAN::FTP' => 'CPAN',
'CPAN::FTP::netrc' => 'CPAN',
'CPAN::FirstTime' => 'CPAN',
'CPAN::HTTP::Client' => 'CPAN',
'CPAN::HTTP::Credentials' => 'CPAN',
'CPAN::HandleConfig' => 'CPAN',
'CPAN::Index' => 'CPAN',
'CPAN::InfoObj' => 'CPAN',
'CPAN::Kwalify' => 'CPAN',
'CPAN::LWP::UserAgent' => 'CPAN',
'CPAN::Mirrored::By' => 'CPAN',
'CPAN::Mirrors' => 'CPAN',
'CPAN::Module' => 'CPAN',
'CPAN::Nox' => 'CPAN',
'CPAN::Plugin' => 'CPAN',
'CPAN::Plugin::Specfile' => 'CPAN',
'CPAN::Prompt' => 'CPAN',
'CPAN::Queue' => 'CPAN',
'CPAN::Queue::Item' => 'CPAN',
'CPAN::Shell' => 'CPAN',
'CPAN::Tarzip' => 'CPAN',
'CPAN::URL' => 'CPAN',
'CPAN::Version' => 'CPAN',
'Capture::Tiny' => 'Capture-Tiny',
'Catalyst' => 'Catalyst-Runtime',
'Catalyst::Action' => 'Catalyst-Runtime',
'Catalyst::Action::Deserialize' => 'Catalyst-Action-REST',
'Catalyst::Action::Deserialize::Callback' => 'Catalyst-Action-REST',
'Catalyst::Action::Deserialize::JSON' => 'Catalyst-Action-REST',
'Catalyst::Action::Deserialize::JSON::XS' => 'Catalyst-Action-REST',
'Catalyst::Action::Deserialize::View' => 'Catalyst-Action-REST',
'Catalyst::Action::Deserialize::XML::Simple' => 'Catalyst-Action-REST',
'Catalyst::Action::Deserialize::YAML' => 'Catalyst-Action-REST',
'Catalyst::Action::DeserializeMultiPart' => 'Catalyst-Action-REST',
'Catalyst::Action::REST' => 'Catalyst-Action-REST',
'Catalyst::Action::REST::ForBrowsers' => 'Catalyst-Action-REST',
'Catalyst::Action::Serialize' => 'Catalyst-Action-REST',
'Catalyst::Action::Serialize::Callback' => 'Catalyst-Action-REST',
'Catalyst::Action::Serialize::JSON' => 'Catalyst-Action-REST',
'Catalyst::Action::Serialize::JSON::XS' => 'Catalyst-Action-REST',
'Catalyst::Action::Serialize::JSONP' => 'Catalyst-Action-REST',
'Catalyst::Action::Serialize::View' => 'Catalyst-Action-REST',
'Catalyst::Action::Serialize::XML::Simple' => 'Catalyst-Action-REST',
'Catalyst::Action::Serialize::YAML' => 'Catalyst-Action-REST',
'Catalyst::Action::Serialize::YAML::HTML' => 'Catalyst-Action-REST',
'Catalyst::Action::SerializeBase' => 'Catalyst-Action-REST',
'Catalyst::ActionChain' => 'Catalyst-Runtime',
'Catalyst::ActionContainer' => 'Catalyst-Runtime',
'Catalyst::ActionRole::ConsumesContent' => 'Catalyst-Runtime',
'Catalyst::ActionRole::HTTPMethods' => 'Catalyst-Runtime',
'Catalyst::ActionRole::QueryMatching' => 'Catalyst-Runtime',
'Catalyst::ActionRole::Scheme' => 'Catalyst-Runtime',
'Catalyst::Authentication::Store::LDAP' => 'Catalyst-Authentication-Store-LDAP',
'Catalyst::Authentication::Store::LDAP::Backend' => 'Catalyst-Authentication-Store-LDAP',
'Catalyst::Authentication::Store::LDAP::User' => 'Catalyst-Authentication-Store-LDAP',
'Catalyst::Base' => 'Catalyst-Runtime',
'Catalyst::ClassData' => 'Catalyst-Runtime',
'Catalyst::Component' => 'Catalyst-Runtime',
'Catalyst::Component::ApplicationAttribute' => 'Catalyst-Runtime',
'Catalyst::Component::ContextClosure' => 'Catalyst-Runtime',
'Catalyst::Controller' => 'Catalyst-Runtime',
'Catalyst::Controller::Combine' => 'Catalyst-Controller-Combine',
'Catalyst::Controller::REST' => 'Catalyst-Action-REST',
'Catalyst::DispatchType' => 'Catalyst-Runtime',
'Catalyst::DispatchType::Chained' => 'Catalyst-Runtime',
'Catalyst::DispatchType::Default' => 'Catalyst-Runtime',
'Catalyst::DispatchType::Index' => 'Catalyst-Runtime',
'Catalyst::DispatchType::Path' => 'Catalyst-Runtime',
'Catalyst::Dispatcher' => 'Catalyst-Runtime',
'Catalyst::Engine' => 'Catalyst-Runtime',
'Catalyst::Engine::CGI' => 'Catalyst-Runtime',
'Catalyst::Engine::FastCGI' => 'Catalyst-Runtime',
'Catalyst::Engine::HTTP' => 'Catalyst-Runtime',
'Catalyst::Engine::HTTP::Restarter' => 'Catalyst-Runtime',
'Catalyst::Engine::HTTP::Restarter::Watcher' => 'Catalyst-Runtime',
'Catalyst::EngineLoader' => 'Catalyst-Runtime',
'Catalyst::Exception' => 'Catalyst-Runtime',
'Catalyst::Exception::Base' => 'Catalyst-Runtime',
'Catalyst::Exception::Basic' => 'Catalyst-Runtime',
'Catalyst::Exception::Detach' => 'Catalyst-Runtime',
'Catalyst::Exception::Go' => 'Catalyst-Runtime',
'Catalyst::Exception::Interface' => 'Catalyst-Runtime',
'Catalyst::Helper::Controller::Combine' => 'Catalyst-Controller-Combine',
'Catalyst::Log' => 'Catalyst-Runtime',
'Catalyst::Middleware::Stash' => 'Catalyst-Runtime',
'Catalyst::Model' => 'Catalyst-Runtime',
'Catalyst::Plugin::Static' => 'Catalyst-Plugin-Static',
'Catalyst::Plugin::Static::Simple' => 'Catalyst-Plugin-Static-Simple',
'Catalyst::Plugin::Unicode::Encoding' => 'Catalyst-Runtime',
'Catalyst::Request' => 'Catalyst-Runtime',
'Catalyst::Request::PartData' => 'Catalyst-Runtime',
'Catalyst::Request::REST' => 'Catalyst-Action-REST',
'Catalyst::Request::REST::ForBrowsers' => 'Catalyst-Action-REST',
'Catalyst::Request::Upload' => 'Catalyst-Runtime',
'Catalyst::Response' => 'Catalyst-Runtime',
'Catalyst::Response::Writer' => 'Catalyst-Runtime',
'Catalyst::Runtime' => 'Catalyst-Runtime',
'Catalyst::Script::CGI' => 'Catalyst-Runtime',
'Catalyst::Script::Create' => 'Catalyst-Runtime',
'Catalyst::Script::FastCGI' => 'Catalyst-Runtime',
'Catalyst::Script::Server' => 'Catalyst-Runtime',
'Catalyst::Script::Test' => 'Catalyst-Runtime',
'Catalyst::ScriptRole' => 'Catalyst-Runtime',
'Catalyst::ScriptRunner' => 'Catalyst-Runtime',
'Catalyst::Stats' => 'Catalyst-Runtime',
'Catalyst::Test' => 'Catalyst-Runtime',
'Catalyst::TraitFor::Request::REST' => 'Catalyst-Action-REST',
'Catalyst::TraitFor::Request::REST::ForBrowsers' => 'Catalyst-Action-REST',
'Catalyst::Utils' => 'Catalyst-Runtime',
'Catalyst::View' => 'Catalyst-Runtime',
'CatalystX::Controller::OpenSearch' => 'Search-OpenSearch-Server',
'Class::Struct' => 'perl',
'Class::Struct::Tie_ISA' => 'perl',
'Clipboard' => 'Clipboard',
'Clipboard::MacPasteboard' => 'Clipboard',
'Clipboard::Pb' => 'Clipboard',
'Clipboard::WaylandClipboard' => 'Clipboard',
'Clipboard::Win32' => 'Clipboard',
'Clipboard::Xclip' => 'Clipboard',
'Clipboard::Xsel' => 'Clipboard',
'Cmd::Dwarf' => 'Cmd-Dwarf',
'Compress::LZ4' => 'Compress-LZ4',
'Compress::Raw::Bunzip2' => 'Compress-Raw-Bzip2',
'Compress::Raw::Bzip2' => 'Compress-Raw-Bzip2',
'Compress::Raw::Zlib' => 'Compress-Raw-Zlib',
'Compress::Zlib' => 'IO-Compress',
'Config::Extensions' => 'perl',
'Config::IniFiles' => 'Config-IniFiles',
'Config::Model' => 'Config-Model',
'Config::Model::Annotation' => 'Config-Model',
'Config::Model::AnyId' => 'Config-Model',
'Config::Model::AnyThing' => 'Config-Model',
'Config::Model::Backend::Any' => 'Config-Model',
'Config::Model::Backend::CdsFile' => 'Config-Model',
'Config::Model::Backend::Fstab' => 'Config-Model',
'Config::Model::Backend::IniFile' => 'Config-Model',
'Config::Model::Backend::Json' => 'Config-Model',
'Config::Model::Backend::PerlFile' => 'Config-Model',
'Config::Model::Backend::PlainFile' => 'Config-Model',
'Config::Model::Backend::ShellVar' => 'Config-Model',
'Config::Model::BackendMgr' => 'Config-Model',
'Config::Model::BackendTrackOrder' => 'Config-Model',
'Config::Model::CheckList' => 'Config-Model',
'Config::Model::DeprecatedHandle' => 'Config-Model',
'Config::Model::Describe' => 'Config-Model',
'Config::Model::DumpAsData' => 'Config-Model',
'Config::Model::Dumper' => 'Config-Model',
'Config::Model::Exception' => 'Config-Model',
'Config::Model::Exception::AncestorClass' => 'Config-Model',
'Config::Model::Exception::Any' => 'Config-Model',
'Config::Model::Exception::ConfigFile' => 'Config-Model',
'Config::Model::Exception::ConfigFile::Missing' => 'Config-Model',
'Config::Model::Exception::Fatal' => 'Config-Model',
'Config::Model::Exception::Formula' => 'Config-Model',
'Config::Model::Exception::Internal' => 'Config-Model',
'Config::Model::Exception::Load' => 'Config-Model',
'Config::Model::Exception::LoadData' => 'Config-Model',
'Config::Model::Exception::Model' => 'Config-Model',
'Config::Model::Exception::ModelDeclaration' => 'Config-Model',
'Config::Model::Exception::ObsoleteElement' => 'Config-Model',
'Config::Model::Exception::Syntax' => 'Config-Model',
'Config::Model::Exception::UnavailableElement' => 'Config-Model',
'Config::Model::Exception::UnknownElement' => 'Config-Model',
'Config::Model::Exception::UnknownId' => 'Config-Model',
'Config::Model::Exception::User' => 'Config-Model',
'Config::Model::Exception::WarpError' => 'Config-Model',
'Config::Model::Exception::WrongType' => 'Config-Model',
'Config::Model::Exception::WrongValue' => 'Config-Model',
'Config::Model::FuseUI' => 'Config-Model',
'Config::Model::HashId' => 'Config-Model',
'Config::Model::IdElementReference' => 'Config-Model',
'Config::Model::Instance' => 'Config-Model',
'Config::Model::Iterator' => 'Config-Model',
'Config::Model::ListId' => 'Config-Model',
'Config::Model::Lister' => 'Config-Model',
'Config::Model::Loader' => 'Config-Model',
'Config::Model::Node' => 'Config-Model',
'Config::Model::ObjTreeScanner' => 'Config-Model',
'Config::Model::Report' => 'Config-Model',
'Config::Model::Role::ComputeFunction' => 'Config-Model',
'Config::Model::Role::Constants' => 'Config-Model',
'Config::Model::Role::FileHandler' => 'Config-Model',
'Config::Model::Role::Grab' => 'Config-Model',
'Config::Model::Role::HelpAsText' => 'Config-Model',
'Config::Model::Role::NodeLoader' => 'Config-Model',
'Config::Model::Role::Utils' => 'Config-Model',
'Config::Model::Role::WarpMaster' => 'Config-Model',
'Config::Model::SearchElement' => 'Config-Model',
'Config::Model::SimpleUI' => 'Config-Model',
'Config::Model::TermUI' => 'Config-Model',
'Config::Model::TreeSearcher' => 'Config-Model',
'Config::Model::TypeConstraints' => 'Config-Model',
'Config::Model::Utils::GenClassPod' => 'Config-Model',
'Config::Model::Value' => 'Config-Model',
'Config::Model::Value::LayeredInclude' => 'Config-Model',
'Config::Model::ValueComputer' => 'Config-Model',
'Config::Model::WarpedNode' => 'Config-Model',
'Config::Model::Warper' => 'Config-Model',
'Convert::ASN1' => 'Convert-ASN1',
'Convert::UUlib' => 'Convert-UUlib',
'Cpanel::JSON::XS' => 'Cpanel-JSON-XS',
'Cpanel::JSON::XS::Type' => 'Cpanel-JSON-XS',
'Crypt::AuthEnc' => 'CryptX',
'Crypt::AuthEnc::CCM' => 'CryptX',
'Crypt::AuthEnc::ChaCha20Poly1305' => 'CryptX',
'Crypt::AuthEnc::EAX' => 'CryptX',
'Crypt::AuthEnc::GCM' => 'CryptX',
'Crypt::AuthEnc::OCB' => 'CryptX',
'Crypt::CBC' => 'Crypt-CBC',
'Crypt::CBC::PBKDF' => 'Crypt-CBC',
'Crypt::CBC::PBKDF::none' => 'Crypt-CBC',
'Crypt::CBC::PBKDF::opensslv1' => 'Crypt-CBC',
'Crypt::CBC::PBKDF::opensslv2' => 'Crypt-CBC',
'Crypt::CBC::PBKDF::pbkdf2' => 'Crypt-CBC',
'Crypt::CBC::PBKDF::randomiv' => 'Crypt-CBC',
'Crypt::Checksum' => 'CryptX',
'Crypt::Checksum::Adler32' => 'CryptX',
'Crypt::Checksum::CRC32' => 'CryptX',
'Crypt::Cipher' => 'CryptX',
'Crypt::Cipher::AES' => 'CryptX',
'Crypt::Cipher::Anubis' => 'CryptX',
'Crypt::Cipher::Blowfish' => 'CryptX',
'Crypt::Cipher::CAST5' => 'CryptX',
'Crypt::Cipher::Camellia' => 'CryptX',
'Crypt::Cipher::DES' => 'CryptX',
'Crypt::Cipher::DES_EDE' => 'CryptX',
'Crypt::Cipher::IDEA' => 'CryptX',
'Crypt::Cipher::KASUMI' => 'CryptX',
'Crypt::Cipher::Khazad' => 'CryptX',
'Crypt::Cipher::MULTI2' => 'CryptX',
'Crypt::Cipher::Noekeon' => 'CryptX',
'Crypt::Cipher::RC2' => 'CryptX',
'Crypt::Cipher::RC5' => 'CryptX',
'Crypt::Cipher::RC6' => 'CryptX',
'Crypt::Cipher::SAFERP' => 'CryptX',
'Crypt::Cipher::SAFER_K128' => 'CryptX',
'Crypt::Cipher::SAFER_K64' => 'CryptX',
'Crypt::Cipher::SAFER_SK128' => 'CryptX',
'Crypt::Cipher::SAFER_SK64' => 'CryptX',
'Crypt::Cipher::SEED' => 'CryptX',
'Crypt::Cipher::Serpent' => 'CryptX',
'Crypt::Cipher::Skipjack' => 'CryptX',
'Crypt::Cipher::Twofish' => 'CryptX',
'Crypt::Cipher::XTEA' => 'CryptX',
'Crypt::DSA' => 'Crypt-DSA',
'Crypt::DSA::Key' => 'Crypt-DSA',
'Crypt::DSA::Key::PEM' => 'Crypt-DSA',
'Crypt::DSA::Key::SSH2' => 'Crypt-DSA',
'Crypt::DSA::KeyChain' => 'Crypt-DSA',
'Crypt::DSA::Signature' => 'Crypt-DSA',
'Crypt::DSA::Util' => 'Crypt-DSA',
'Crypt::Digest' => 'CryptX',
'Crypt::Digest::BLAKE2b_160' => 'CryptX',
'Crypt::Digest::BLAKE2b_256' => 'CryptX',
'Crypt::Digest::BLAKE2b_384' => 'CryptX',
'Crypt::Digest::BLAKE2b_512' => 'CryptX',
'Crypt::Digest::BLAKE2s_128' => 'CryptX',
'Crypt::Digest::BLAKE2s_160' => 'CryptX',
'Crypt::Digest::BLAKE2s_224' => 'CryptX',
'Crypt::Digest::BLAKE2s_256' => 'CryptX',
'Crypt::Digest::CHAES' => 'CryptX',
'Crypt::Digest::Keccak224' => 'CryptX',
'Crypt::Digest::Keccak256' => 'CryptX',
'Crypt::Digest::Keccak384' => 'CryptX',
'Crypt::Digest::Keccak512' => 'CryptX',
'Crypt::Digest::MD2' => 'CryptX',
'Crypt::Digest::MD4' => 'CryptX',
'Crypt::Digest::MD5' => 'CryptX',
'Crypt::Digest::RIPEMD128' => 'CryptX',
'Crypt::Digest::RIPEMD160' => 'CryptX',
'Crypt::Digest::RIPEMD256' => 'CryptX',
'Crypt::Digest::RIPEMD320' => 'CryptX',
'Crypt::Digest::SHA1' => 'CryptX',
'Crypt::Digest::SHA224' => 'CryptX',
'Crypt::Digest::SHA256' => 'CryptX',
'Crypt::Digest::SHA384' => 'CryptX',
'Crypt::Digest::SHA3_224' => 'CryptX',
'Crypt::Digest::SHA3_256' => 'CryptX',
'Crypt::Digest::SHA3_384' => 'CryptX',
'Crypt::Digest::SHA3_512' => 'CryptX',
'Crypt::Digest::SHA512' => 'CryptX',
'Crypt::Digest::SHA512_224' => 'CryptX',
'Crypt::Digest::SHA512_256' => 'CryptX',
'Crypt::Digest::SHAKE' => 'CryptX',
'Crypt::Digest::Tiger192' => 'CryptX',
'Crypt::Digest::Whirlpool' => 'CryptX',
'Crypt::JWT' => 'Crypt-JWT',
'Crypt::KeyDerivation' => 'CryptX',
'Crypt::KeyWrap' => 'Crypt-JWT',
'Crypt::Mac' => 'CryptX',
'Crypt::Mac::BLAKE2b' => 'CryptX',
'Crypt::Mac::BLAKE2s' => 'CryptX',
'Crypt::Mac::F9' => 'CryptX',
'Crypt::Mac::HMAC' => 'CryptX',
'Crypt::Mac::OMAC' => 'CryptX',
'Crypt::Mac::PMAC' => 'CryptX',
'Crypt::Mac::Pelican' => 'CryptX',
'Crypt::Mac::Poly1305' => 'CryptX',
'Crypt::Mac::XCBC' => 'CryptX',
'Crypt::Misc' => 'CryptX',
'Crypt::Mode' => 'CryptX',
'Crypt::Mode::CBC' => 'CryptX',
'Crypt::Mode::CFB' => 'CryptX',
'Crypt::Mode::CTR' => 'CryptX',
'Crypt::Mode::ECB' => 'CryptX',
'Crypt::Mode::OFB' => 'CryptX',
'Crypt::OpenSSL::DSA' => 'Crypt-OpenSSL-DSA',
'Crypt::OpenSSL::RSA' => 'Crypt-OpenSSL-RSA',
'Crypt::PK' => 'CryptX',
'Crypt::PK::DH' => 'CryptX',
'Crypt::PK::DSA' => 'CryptX',
'Crypt::PK::ECC' => 'CryptX',
'Crypt::PK::Ed25519' => 'CryptX',
'Crypt::PK::RSA' => 'CryptX',
'Crypt::PK::X25519' => 'CryptX',
'Crypt::PRNG' => 'CryptX',
'Crypt::PRNG::ChaCha20' => 'CryptX',
'Crypt::PRNG::Fortuna' => 'CryptX',
'Crypt::PRNG::RC4' => 'CryptX',
'Crypt::PRNG::Sober128' => 'CryptX',
'Crypt::PRNG::Yarrow' => 'CryptX',
'Crypt::Passwd::XS' => 'Crypt-Passwd-XS',
'Crypt::Perl' => 'Crypt-Perl',
'Crypt::Perl::ASN1' => 'Crypt-Perl',
'Crypt::Perl::ASN1::BitString' => 'Crypt-Perl',
'Crypt::Perl::ASN1::Encodee' => 'Crypt-Perl',
'Crypt::Perl::ASN1::Signatures' => 'Crypt-Perl',
'Crypt::Perl::BigInt' => 'Crypt-Perl',
'Crypt::Perl::ECDSA' => 'Crypt-Perl',
'Crypt::Perl::ECDSA::Deterministic' => 'Crypt-Perl',
'Crypt::Perl::ECDSA::EC::Curve' => 'Crypt-Perl',
'Crypt::Perl::ECDSA::EC::CurvesDB' => 'Crypt-Perl',
'Crypt::Perl::ECDSA::EC::DB' => 'Crypt-Perl',
'Crypt::Perl::ECDSA::EC::FieldElement' => 'Crypt-Perl',
'Crypt::Perl::ECDSA::EC::Point' => 'Crypt-Perl',
'Crypt::Perl::ECDSA::ECParameters' => 'Crypt-Perl',
'Crypt::Perl::ECDSA::EncodedPoint' => 'Crypt-Perl',
'Crypt::Perl::ECDSA::Generate' => 'Crypt-Perl',
'Crypt::Perl::ECDSA::KeyBase' => 'Crypt-Perl',
'Crypt::Perl::ECDSA::Math' => 'Crypt-Perl',
'Crypt::Perl::ECDSA::NIST' => 'Crypt-Perl',
'Crypt::Perl::ECDSA::Parse' => 'Crypt-Perl',
'Crypt::Perl::ECDSA::PrivateKey' => 'Crypt-Perl',
'Crypt::Perl::ECDSA::PublicKey' => 'Crypt-Perl',
'Crypt::Perl::ECDSA::Utils' => 'Crypt-Perl',
'Crypt::Perl::Ed25519' => 'Crypt-Perl',
'Crypt::Perl::Ed25519::KeyBase' => 'Crypt-Perl',
'Crypt::Perl::Ed25519::Math' => 'Crypt-Perl',
'Crypt::Perl::Ed25519::Parse' => 'Crypt-Perl',
'Crypt::Perl::Ed25519::PrivateKey' => 'Crypt-Perl',
'Crypt::Perl::Ed25519::PublicKey' => 'Crypt-Perl',
'Crypt::Perl::JWK' => 'Crypt-Perl',
'Crypt::Perl::KeyBase' => 'Crypt-Perl',
'Crypt::Perl::Math' => 'Crypt-Perl',
'Crypt::Perl::PK' => 'Crypt-Perl',
'Crypt::Perl::PKCS10' => 'Crypt-Perl',
'Crypt::Perl::PKCS10::ASN1' => 'Crypt-Perl',
'Crypt::Perl::PKCS10::Attribute' => 'Crypt-Perl',
'Crypt::Perl::PKCS10::Attribute::challengePassword' => 'Crypt-Perl',
'Crypt::Perl::PKCS10::Attribute::extensionRequest' => 'Crypt-Perl',
'Crypt::Perl::PKCS10::Attributes' => 'Crypt-Perl',
'Crypt::Perl::PKCS8' => 'Crypt-Perl',
'Crypt::Perl::RNG' => 'Crypt-Perl',
'Crypt::Perl::RSA' => 'Crypt-Perl',
'Crypt::Perl::RSA::Generate' => 'Crypt-Perl',
'Crypt::Perl::RSA::KeyBase' => 'Crypt-Perl',
'Crypt::Perl::RSA::PKCS1_v1_5' => 'Crypt-Perl',
'Crypt::Perl::RSA::Parse' => 'Crypt-Perl',
'Crypt::Perl::RSA::PrivateKey' => 'Crypt-Perl',
'Crypt::Perl::RSA::PublicKey' => 'Crypt-Perl',
'Crypt::Perl::RSA::Template' => 'Crypt-Perl',
'Crypt::Perl::ToDER' => 'Crypt-Perl',
'Crypt::Perl::X' => 'Crypt-Perl',
'Crypt::Perl::X509::Extension' => 'Crypt-Perl',
'Crypt::Perl::X509::Extension::acmeValidation_v1' => 'Crypt-Perl',
'Crypt::Perl::X509::Extension::authorityInfoAccess' => 'Crypt-Perl',
'Crypt::Perl::X509::Extension::authorityKeyIdentifier' => 'Crypt-Perl',
'Crypt::Perl::X509::Extension::basicConstraints' => 'Crypt-Perl',
'Crypt::Perl::X509::Extension::cRLDistributionPoints' => 'Crypt-Perl',
'Crypt::Perl::X509::Extension::certificatePolicies' => 'Crypt-Perl',
'Crypt::Perl::X509::Extension::ct_precert_poison' => 'Crypt-Perl',
'Crypt::Perl::X509::Extension::ct_precert_scts' => 'Crypt-Perl',
'Crypt::Perl::X509::Extension::extKeyUsage' => 'Crypt-Perl',
'Crypt::Perl::X509::Extension::freshestCRL' => 'Crypt-Perl',
'Crypt::Perl::X509::Extension::inhibitAnyPolicy' => 'Crypt-Perl',
'Crypt::Perl::X509::Extension::issuerAltName' => 'Crypt-Perl',
'Crypt::Perl::X509::Extension::keyUsage' => 'Crypt-Perl',
'Crypt::Perl::X509::Extension::nameConstraints' => 'Crypt-Perl',
'Crypt::Perl::X509::Extension::noCheck' => 'Crypt-Perl',
'Crypt::Perl::X509::Extension::policyConstraints' => 'Crypt-Perl',
'Crypt::Perl::X509::Extension::policyMappings' => 'Crypt-Perl',
'Crypt::Perl::X509::Extension::subjectAltName' => 'Crypt-Perl',
'Crypt::Perl::X509::Extension::subjectDirectoryAttributes' => 'Crypt-Perl',
'Crypt::Perl::X509::Extension::subjectInfoAccess' => 'Crypt-Perl',
'Crypt::Perl::X509::Extension::subjectKeyIdentifier' => 'Crypt-Perl',
'Crypt::Perl::X509::Extension::tlsFeature' => 'Crypt-Perl',
'Crypt::Perl::X509::Extensions' => 'Crypt-Perl',
'Crypt::Perl::X509::GeneralName' => 'Crypt-Perl',
'Crypt::Perl::X509::GeneralNames' => 'Crypt-Perl',
'Crypt::Perl::X509::InfoAccessBase' => 'Crypt-Perl',
'Crypt::Perl::X509::Name' => 'Crypt-Perl',
'Crypt::Perl::X509::RelativeDistinguishedName' => 'Crypt-Perl',
'Crypt::Perl::X509::SCT' => 'Crypt-Perl',
'Crypt::Perl::X509v3' => 'Crypt-Perl',
'Crypt::Perl::X::ASN1::Decode' => 'Crypt-Perl',
'Crypt::Perl::X::ASN1::Encode' => 'Crypt-Perl',
'Crypt::Perl::X::ASN1::Find' => 'Crypt-Perl',
'Crypt::Perl::X::ASN1::Prepare' => 'Crypt-Perl',
'Crypt::Perl::X::Base' => 'Crypt-Perl',
'Crypt::Perl::X::ECDSA::CharacteristicTwoUnsupported' => 'Crypt-Perl',
'Crypt::Perl::X::ECDSA::NoCurveForNISTName' => 'Crypt-Perl',
'Crypt::Perl::X::ECDSA::NoCurveForName' => 'Crypt-Perl',
'Crypt::Perl::X::ECDSA::NoCurveForOID' => 'Crypt-Perl',
'Crypt::Perl::X::ECDSA::NoCurveForParameters' => 'Crypt-Perl',
'Crypt::Perl::X::Generic' => 'Crypt-Perl',
'Crypt::Perl::X::InvalidJWK' => 'Crypt-Perl',
'Crypt::Perl::X::TooLongToSign' => 'Crypt-Perl',
'Crypt::Perl::X::UnknownHash' => 'Crypt-Perl',
'Crypt::Perl::X::UnknownJWKkty' => 'Crypt-Perl',
'Crypt::Primes' => 'Crypt-Primes',
'Crypt::Random' => 'Crypt-Random',
'Crypt::Random::Generator' => 'Crypt-Random',
'Crypt::Random::Provider::File' => 'Crypt-Random',
'Crypt::Random::Provider::Win32API' => 'Crypt-Random',
'Crypt::Random::Provider::devrandom' => 'Crypt-Random',
'Crypt::Random::Provider::devurandom' => 'Crypt-Random',
'Crypt::Random::Provider::egd' => 'Crypt-Random',
'Crypt::Random::Provider::rand' => 'Crypt-Random',
'Crypt::Random::Source' => 'Crypt-Random-Source',
'Crypt::Random::Source::Base' => 'Crypt-Random-Source',
'Crypt::Random::Source::Base::File' => 'Crypt-Random-Source',
'Crypt::Random::Source::Base::Handle' => 'Crypt-Random-Source',
'Crypt::Random::Source::Base::Proc' => 'Crypt-Random-Source',
'Crypt::Random::Source::Base::RandomDevice' => 'Crypt-Random-Source',
'Crypt::Random::Source::Factory' => 'Crypt-Random-Source',
'Crypt::Random::Source::Strong' => 'Crypt-Random-Source',
'Crypt::Random::Source::Strong::devrandom' => 'Crypt-Random-Source',
'Crypt::Random::Source::Weak' => 'Crypt-Random-Source',
'Crypt::Random::Source::Weak::devurandom' => 'Crypt-Random-Source',
'Crypt::Stream::ChaCha' => 'CryptX',
'Crypt::Stream::RC4' => 'CryptX',
'Crypt::Stream::Rabbit' => 'CryptX',
'Crypt::Stream::Salsa20' => 'CryptX',
'Crypt::Stream::Sober128' => 'CryptX',
'Crypt::Stream::Sosemanuk' => 'CryptX',
'CryptX' => 'CryptX',
'Cwd' => 'PathTools',
'DBD::DBM' => 'DBI',
'DBD::DBM::Statement' => 'DBI',
'DBD::DBM::Table' => 'DBI',
'DBD::DBM::db' => 'DBI',
'DBD::DBM::dr' => 'DBI',
'DBD::DBM::st' => 'DBI',
'DBD::ExampleP' => 'DBI',
'DBD::ExampleP::db' => 'DBI',
'DBD::ExampleP::dr' => 'DBI',
'DBD::ExampleP::st' => 'DBI',
'DBD::File' => 'DBI',
'DBD::File::DataSource::File' => 'DBI',
'DBD::File::DataSource::Stream' => 'DBI',
'DBD::File::Statement' => 'DBI',
'DBD::File::Table' => 'DBI',
'DBD::File::TableSource::FileSystem' => 'DBI',
'DBD::File::db' => 'DBI',
'DBD::File::dr' => 'DBI',
'DBD::File::st' => 'DBI',
'DBD::Gofer' => 'DBI',
'DBD::Gofer::Policy::Base' => 'DBI',
'DBD::Gofer::Policy::classic' => 'DBI',
'DBD::Gofer::Policy::pedantic' => 'DBI',
'DBD::Gofer::Policy::rush' => 'DBI',
'DBD::Gofer::Transport::Base' => 'DBI',
'DBD::Gofer::Transport::corostream' => 'DBI',
'DBD::Gofer::Transport::null' => 'DBI',
'DBD::Gofer::Transport::pipeone' => 'DBI',
'DBD::Gofer::Transport::stream' => 'DBI',
'DBD::Gofer::db' => 'DBI',
'DBD::Gofer::dr' => 'DBI',
'DBD::Gofer::st' => 'DBI',
'DBD::MariaDB' => 'DBD-MariaDB',
'DBD::Mem' => 'DBI',
'DBD::Mem::DataSource' => 'DBI',
'DBD::Mem::Statement' => 'DBI',
'DBD::Mem::Table' => 'DBI',
'DBD::Mem::db' => 'DBI',
'DBD::Mem::dr' => 'DBI',
'DBD::Mem::st' => 'DBI',
'DBD::NullP' => 'DBI',
'DBD::NullP::db' => 'DBI',
'DBD::NullP::dr' => 'DBI',
'DBD::NullP::st' => 'DBI',
'DBD::Pg' => 'DBD-Pg',
'DBD::Proxy' => 'DBI',
'DBD::Proxy::RPC::PlClient' => 'DBI',
'DBD::Proxy::db' => 'DBI',
'DBD::Proxy::dr' => 'DBI',
'DBD::Proxy::st' => 'DBI',
'DBD::SQLite' => 'DBD-SQLite',
'DBD::SQLite::Constants' => 'DBD-SQLite',
'DBD::SQLite::GetInfo' => 'DBD-SQLite',
'DBD::SQLite::VirtualTable' => 'DBD-SQLite',
'DBD::SQLite::VirtualTable::Cursor' => 'DBD-SQLite',
'DBD::SQLite::VirtualTable::FileContent' => 'DBD-SQLite',
'DBD::SQLite::VirtualTable::FileContent::Cursor' => 'DBD-SQLite',
'DBD::SQLite::VirtualTable::PerlData' => 'DBD-SQLite',
'DBD::SQLite::VirtualTable::PerlData::Cursor' => 'DBD-SQLite',
'DBD::Sponge' => 'DBI',
'DBD::Sponge::db' => 'DBI',
'DBD::Sponge::dr' => 'DBI',
'DBD::Sponge::st' => 'DBI',
'DBD::mysql' => 'DBD-mysql',
'DBD::mysql::GetInfo' => 'DBD-mysql',
'DBD::mysql::db' => 'DBD-mysql',
'DBD::mysql::dr' => 'DBD-mysql',
'DBD::mysql::st' => 'DBD-mysql',
'DBD::mysqlPP' => 'DBD-mysqlPP',
'DBD::mysqlPP::db' => 'DBD-mysqlPP',
'DBD::mysqlPP::dr' => 'DBD-mysqlPP',
'DBD::mysqlPP::st' => 'DBD-mysqlPP',
'DBDI' => 'DBI',
'DBI' => 'DBI',
'DBI::Const::GetInfo::ANSI' => 'DBI',
'DBI::Const::GetInfo::ODBC' => 'DBI',
'DBI::Const::GetInfoReturn' => 'DBI',
'DBI::Const::GetInfoType' => 'DBI',
'DBI::DBD' => 'DBI',
'DBI::DBD::Metadata' => 'DBI',
'DBI::DBD::SqlEngine' => 'DBI',
'DBI::DBD::SqlEngine::DataSource' => 'DBI',
'DBI::DBD::SqlEngine::Statement' => 'DBI',
'DBI::DBD::SqlEngine::Table' => 'DBI',
'DBI::DBD::SqlEngine::TableSource' => 'DBI',
'DBI::DBD::SqlEngine::TieMeta' => 'DBI',
'DBI::DBD::SqlEngine::TieTables' => 'DBI',
'DBI::DBD::SqlEngine::db' => 'DBI',
'DBI::DBD::SqlEngine::dr' => 'DBI',
'DBI::DBD::SqlEngine::st' => 'DBI',
'DBI::FAQ' => 'DBI',
'DBI::Gofer::Execute' => 'DBI',
'DBI::Gofer::Request' => 'DBI',
'DBI::Gofer::Response' => 'DBI',
'DBI::Gofer::Serializer::Base' => 'DBI',
'DBI::Gofer::Serializer::DataDumper' => 'DBI',
'DBI::Gofer::Serializer::Storable' => 'DBI',
'DBI::Gofer::Transport::Base' => 'DBI',
'DBI::Gofer::Transport::pipeone' => 'DBI',
'DBI::Gofer::Transport::stream' => 'DBI',
'DBI::Library' => 'MySQL-Admin',
'DBI::Library::Database' => 'MySQL-Admin',
'DBI::Library::Database::db' => 'MySQL-Admin',
'DBI::Library::Database::st' => 'MySQL-Admin',
'DBI::Library::db' => 'MySQL-Admin',
'DBI::Library::st' => 'MySQL-Admin',
'DBI::Profile' => 'DBI',
'DBI::ProfileData' => 'DBI',
'DBI::ProfileDumper' => 'DBI',
'DBI::ProfileDumper::Apache' => 'DBI',
'DBI::ProfileSubs' => 'DBI',
'DBI::ProxyServer' => 'DBI',
'DBI::ProxyServer::db' => 'DBI',
'DBI::ProxyServer::dr' => 'DBI',
'DBI::ProxyServer::st' => 'DBI',
'DBI::SQL::Nano' => 'DBI',
'DBI::SQL::Nano::Statement_' => 'DBI',
'DBI::SQL::Nano::Table_' => 'DBI',
'DBI::Util::CacheMemory' => 'DBI',
'DBI::Util::_accessor' => 'DBI',
'DBI::common' => 'DBI',
'DBIx::Class::Valiant' => 'Valiant',
'DBIx::Class::Valiant::Result' => 'Valiant',
'DBIx::Class::Valiant::Result::HTML::FormFields' => 'Valiant',
'DBIx::Class::Valiant::ResultSet' => 'Valiant',
'DBIx::Class::Valiant::Util::Exception' => 'Valiant',
'DBIx::Class::Valiant::Util::Exception::BadParameterFK' => 'Valiant',
'DBIx::Class::Valiant::Util::Exception::BadParameters' => 'Valiant',
'DBIx::Class::Valiant::Util::Exception::TooManyRows' => 'Valiant',
'DBIx::Class::Valiant::Validates' => 'Valiant',
'DBIx::Class::Valiant::Validator::Result' => 'Valiant',
'DBIx::Class::Valiant::Validator::ResultSet' => 'Valiant',
'DBIx::Class::Valiant::Validator::SetSize' => 'Valiant',
'DBIx::Custom' => 'DBIx-Custom',
'DBIx::Custom::Mapper' => 'DBIx-Custom',
'DBIx::Custom::Model' => 'DBIx-Custom',
'DBIx::Custom::NotExists' => 'DBIx-Custom',
'DBIx::Custom::Order' => 'DBIx-Custom',
'DBIx::Custom::Query' => 'DBIx-Custom',
'DBIx::Custom::Result' => 'DBIx-Custom',
'DBIx::Custom::Util' => 'DBIx-Custom',
'DBIx::Custom::Where' => 'DBIx-Custom',
'DBIx::Otogiri' => 'Otogiri',
'DBIx::Otogiri::Iterator' => 'Otogiri',
'DBM_Filter' => 'perl',
'DBM_Filter::compress' => 'perl',
'DBM_Filter::encode' => 'perl',
'DBM_Filter::int32' => 'perl',
'DBM_Filter::null' => 'perl',
'DBM_Filter::utf8' => 'perl',
'Dancer' => 'Dancer',
'Dancer2' => 'Dancer2',
'Dancer2::CLI' => 'Dancer2',
'Dancer2::CLI::Command::gen' => 'Dancer2',
'Dancer2::CLI::Command::version' => 'Dancer2',
'Dancer2::CLI::Gen' => 'Dancer2',
'Dancer2::CLI::Version' => 'Dancer2',
'Dancer2::Core' => 'Dancer2',
'Dancer2::Core::App' => 'Dancer2',
'Dancer2::Core::Cookie' => 'Dancer2',
'Dancer2::Core::DSL' => 'Dancer2',
'Dancer2::Core::Dispatcher' => 'Dancer2',
'Dancer2::Core::Error' => 'Dancer2',
'Dancer2::Core::Factory' => 'Dancer2',
'Dancer2::Core::HTTP' => 'Dancer2',
'Dancer2::Core::Hook' => 'Dancer2',
'Dancer2::Core::MIME' => 'Dancer2',
'Dancer2::Core::Request' => 'Dancer2',
'Dancer2::Core::Request::Upload' => 'Dancer2',
'Dancer2::Core::Response' => 'Dancer2',
'Dancer2::Core::Response::Delayed' => 'Dancer2',
'Dancer2::Core::Role::ConfigReader' => 'Dancer2',
'Dancer2::Core::Role::DSL' => 'Dancer2',
'Dancer2::Core::Role::Engine' => 'Dancer2',
'Dancer2::Core::Role::Handler' => 'Dancer2',
'Dancer2::Core::Role::HasLocation' => 'Dancer2',
'Dancer2::Core::Role::Hookable' => 'Dancer2',
'Dancer2::Core::Role::Logger' => 'Dancer2',
'Dancer2::Core::Role::Serializer' => 'Dancer2',
'Dancer2::Core::Role::SessionFactory' => 'Dancer2',
'Dancer2::Core::Role::SessionFactory::File' => 'Dancer2',
'Dancer2::Core::Role::StandardResponses' => 'Dancer2',
'Dancer2::Core::Role::Template' => 'Dancer2',
'Dancer2::Core::Route' => 'Dancer2',
'Dancer2::Core::Runner' => 'Dancer2',
'Dancer2::Core::Session' => 'Dancer2',
'Dancer2::Core::Time' => 'Dancer2',
'Dancer2::Core::Types' => 'Dancer2',
'Dancer2::FileUtils' => 'Dancer2',
'Dancer2::Handler::AutoPage' => 'Dancer2',
'Dancer2::Handler::File' => 'Dancer2',
'Dancer2::Logger::Capture' => 'Dancer2',
'Dancer2::Logger::Capture::Trap' => 'Dancer2',
'Dancer2::Logger::Console' => 'Dancer2',
'Dancer2::Logger::Diag' => 'Dancer2',
'Dancer2::Logger::File' => 'Dancer2',
'Dancer2::Logger::Note' => 'Dancer2',
'Dancer2::Logger::Null' => 'Dancer2',
'Dancer2::Plugin' => 'Dancer2',
'Dancer2::Serializer::Dumper' => 'Dancer2',
'Dancer2::Serializer::JSON' => 'Dancer2',
'Dancer2::Serializer::Mutable' => 'Dancer2',
'Dancer2::Serializer::YAML' => 'Dancer2',
'Dancer2::Session::Simple' => 'Dancer2',
'Dancer2::Session::YAML' => 'Dancer2',
'Dancer2::Template::Implementation::ForkedTiny' => 'Dancer2',
'Dancer2::Template::Simple' => 'Dancer2',
'Dancer2::Template::TemplateToolkit' => 'Dancer2',
'Dancer2::Template::Tiny' => 'Dancer2',
'Dancer2::Test' => 'Dancer2',
'Dancer::App' => 'Dancer',
'Dancer::Config' => 'Dancer',
'Dancer::Config::Object' => 'Dancer',
'Dancer::Continuation' => 'Dancer',
'Dancer::Continuation::Halted' => 'Dancer',
'Dancer::Continuation::Route' => 'Dancer',
'Dancer::Continuation::Route::ErrorSent' => 'Dancer',
'Dancer::Continuation::Route::FileSent' => 'Dancer',
'Dancer::Continuation::Route::Forwarded' => 'Dancer',
'Dancer::Continuation::Route::Passed' => 'Dancer',
'Dancer::Continuation::Route::Templated' => 'Dancer',
'Dancer::Cookie' => 'Dancer',
'Dancer::Cookies' => 'Dancer',
'Dancer::Deprecation' => 'Dancer',
'Dancer::Engine' => 'Dancer',
'Dancer::Error' => 'Dancer',
'Dancer::Exception' => 'Dancer',
'Dancer::Exception::Base' => 'Dancer',
'Dancer::Exceptions' => 'Dancer',
'Dancer::Factory::Hook' => 'Dancer',
'Dancer::FileUtils' => 'Dancer',
'Dancer::GetOpt' => 'Dancer',
'Dancer::HTTP' => 'Dancer',
'Dancer::Handler' => 'Dancer',
'Dancer::Handler::Debug' => 'Dancer',
'Dancer::Handler::PSGI' => 'Dancer',
'Dancer::Handler::Standalone' => 'Dancer',
'Dancer::Hook' => 'Dancer',
'Dancer::Hook::Properties' => 'Dancer',
'Dancer::Logger' => 'Dancer',
'Dancer::Logger::Abstract' => 'Dancer',
'Dancer::Logger::Capture' => 'Dancer',
'Dancer::Logger::Capture::Trap' => 'Dancer',
'Dancer::Logger::Console' => 'Dancer',
'Dancer::Logger::Diag' => 'Dancer',
'Dancer::Logger::File' => 'Dancer',
'Dancer::Logger::Note' => 'Dancer',
'Dancer::Logger::Null' => 'Dancer',
'Dancer::MIME' => 'Dancer',
'Dancer::ModuleLoader' => 'Dancer',
'Dancer::Object' => 'Dancer',
'Dancer::Object::Singleton' => 'Dancer',
'Dancer::Plugin' => 'Dancer',
'Dancer::Plugin::Ajax' => 'Dancer',
'Dancer::Renderer' => 'Dancer',
'Dancer::Request' => 'Dancer',
'Dancer::Request::Upload' => 'Dancer',
'Dancer::Response' => 'Dancer',
'Dancer::Route' => 'Dancer',
'Dancer::Route::Cache' => 'Dancer',
'Dancer::Route::Registry' => 'Dancer',
'Dancer::Serializer' => 'Dancer',
'Dancer::Serializer::Abstract' => 'Dancer',
'Dancer::Serializer::Dumper' => 'Dancer',
'Dancer::Serializer::JSON' => 'Dancer',
'Dancer::Serializer::JSONP' => 'Dancer',
'Dancer::Serializer::Mutable' => 'Dancer',
'Dancer::Serializer::XML' => 'Dancer',
'Dancer::Serializer::YAML' => 'Dancer',
'Dancer::Session' => 'Dancer',
'Dancer::Session::Abstract' => 'Dancer',
'Dancer::Session::Simple' => 'Dancer',
'Dancer::Session::YAML' => 'Dancer',
'Dancer::SharedData' => 'Dancer',
'Dancer::Template' => 'Dancer',
'Dancer::Template::Abstract' => 'Dancer',
'Dancer::Template::Simple' => 'Dancer',
'Dancer::Template::TemplateToolkit' => 'Dancer',
'Dancer::Test' => 'Dancer',
'Dancer::Timer' => 'Dancer',
'Data::Dumper' => 'Data-Dumper',
'Data::FormValidator' => 'Data-FormValidator',
'Data::FormValidator::Constraints' => 'Data-FormValidator',
'Data::FormValidator::Constraints::Dates' => 'Data-FormValidator',
'Data::FormValidator::Constraints::RegexpCommon' => 'Data-FormValidator',
'Data::FormValidator::Constraints::Upload' => 'Data-FormValidator',
'Data::FormValidator::ConstraintsFactory' => 'Data-FormValidator',
'Data::FormValidator::Filters' => 'Data-FormValidator',
'Data::FormValidator::Results' => 'Data-FormValidator',
'Data::UUID' => 'Data-UUID',
'Data::Validate::IP' => 'Data-Validate-IP',
'DemoASP' => 'Apache-ASP',
'Devel::PPPort' => 'Devel-PPPort',
'Devel::PatchPerl::Plugin::Asan' => 'App-perlall',
'Devel::PatchPerl::Plugin::Compiler' => 'App-perlall',
'Devel::PatchPerl::Plugin::General' => 'App-perlall',
'Devel::Peek' => 'perl',
'Devel::StackTrace' => 'Devel-StackTrace',
'Devel::StackTrace::Frame' => 'Devel-StackTrace',
'Dezi' => 'Dezi',
'Dezi::Config' => 'Dezi',
'Dezi::Server' => 'Dezi',
'Dezi::Server::About' => 'Dezi',
'Digest' => 'Digest',
'Digest::MD5' => 'Digest-MD5',
'Digest::SHA' => 'Digest-SHA',
'Digest::base' => 'Digest',
'Digest::file' => 'Digest',
'DirHandle' => 'perl',
'Dpkg' => 'Dpkg',
'Dpkg::Arch' => 'Dpkg',
'Dpkg::Archive::Ar' => 'Dpkg',
'Dpkg::Build::Env' => 'Dpkg',
'Dpkg::Build::Info' => 'Dpkg',
'Dpkg::Build::Types' => 'Dpkg',
'Dpkg::BuildAPI' => 'Dpkg',
'Dpkg::BuildDriver' => 'Dpkg',
'Dpkg::BuildDriver::DebianRules' => 'Dpkg',
'Dpkg::BuildEnv' => 'Dpkg',
'Dpkg::BuildFlags' => 'Dpkg',
'Dpkg::BuildInfo' => 'Dpkg',
'Dpkg::BuildOptions' => 'Dpkg',
'Dpkg::BuildProfiles' => 'Dpkg',
'Dpkg::BuildTree' => 'Dpkg',
'Dpkg::BuildTypes' => 'Dpkg',
'Dpkg::Changelog' => 'Dpkg',
'Dpkg::Changelog::Debian' => 'Dpkg',
'Dpkg::Changelog::Entry' => 'Dpkg',
'Dpkg::Changelog::Entry::Debian' => 'Dpkg',
'Dpkg::Changelog::Parse' => 'Dpkg',
'Dpkg::Checksums' => 'Dpkg',
'Dpkg::Compression' => 'Dpkg',
'Dpkg::Compression::FileHandle' => 'Dpkg',
'Dpkg::Compression::Process' => 'Dpkg',
'Dpkg::Conf' => 'Dpkg',
'Dpkg::Control' => 'Dpkg',
'Dpkg::Control::Changelog' => 'Dpkg',
'Dpkg::Control::Fields' => 'Dpkg',
'Dpkg::Control::FieldsCore' => 'Dpkg',
'Dpkg::Control::Hash' => 'Dpkg',
'Dpkg::Control::HashCore' => 'Dpkg',
'Dpkg::Control::HashCore::Tie' => 'Dpkg',
'Dpkg::Control::Info' => 'Dpkg',
'Dpkg::Control::Tests' => 'Dpkg',
'Dpkg::Control::Tests::Entry' => 'Dpkg',
'Dpkg::Control::Types' => 'Dpkg',
'Dpkg::Deps' => 'Dpkg',
'Dpkg::Deps::AND' => 'Dpkg',
'Dpkg::Deps::KnownFacts' => 'Dpkg',
'Dpkg::Deps::Multiple' => 'Dpkg',
'Dpkg::Deps::OR' => 'Dpkg',
'Dpkg::Deps::Simple' => 'Dpkg',
'Dpkg::Deps::Union' => 'Dpkg',
'Dpkg::Dist::Files' => 'Dpkg',
'Dpkg::ErrorHandling' => 'Dpkg',
'Dpkg::Exit' => 'Dpkg',
'Dpkg::File' => 'Dpkg',
'Dpkg::Getopt' => 'Dpkg',
'Dpkg::Gettext' => 'Dpkg',
'Dpkg::IPC' => 'Dpkg',
'Dpkg::Index' => 'Dpkg',
'Dpkg::Interface::Storable' => 'Dpkg',
'Dpkg::Lock' => 'Dpkg',
'Dpkg::OpenPGP' => 'Dpkg',
'Dpkg::OpenPGP::Backend' => 'Dpkg',
'Dpkg::OpenPGP::Backend::GnuPG' => 'Dpkg',
'Dpkg::OpenPGP::Backend::SOP' => 'Dpkg',
'Dpkg::OpenPGP::Backend::Sequoia' => 'Dpkg',
'Dpkg::OpenPGP::ErrorCodes' => 'Dpkg',
'Dpkg::OpenPGP::KeyHandle' => 'Dpkg',
'Dpkg::Package' => 'Dpkg',
'Dpkg::Path' => 'Dpkg',
'Dpkg::Shlibs' => 'Dpkg',
'Dpkg::Shlibs::Cppfilt' => 'Dpkg',
'Dpkg::Shlibs::Objdump' => 'Dpkg',
'Dpkg::Shlibs::Objdump::Object' => 'Dpkg',
'Dpkg::Shlibs::Symbol' => 'Dpkg',
'Dpkg::Shlibs::SymbolFile' => 'Dpkg',
'Dpkg::Source::Archive' => 'Dpkg',
'Dpkg::Source::BinaryFiles' => 'Dpkg',
'Dpkg::Source::Format' => 'Dpkg',
'Dpkg::Source::Functions' => 'Dpkg',
'Dpkg::Source::Package' => 'Dpkg',
'Dpkg::Source::Package::V1' => 'Dpkg',
'Dpkg::Source::Package::V2' => 'Dpkg',
'Dpkg::Source::Package::V3::Bzr' => 'Dpkg',
'Dpkg::Source::Package::V3::Custom' => 'Dpkg',
'Dpkg::Source::Package::V3::Git' => 'Dpkg',
'Dpkg::Source::Package::V3::Native' => 'Dpkg',
'Dpkg::Source::Package::V3::Quilt' => 'Dpkg',
'Dpkg::Source::Patch' => 'Dpkg',
'Dpkg::Source::Quilt' => 'Dpkg',
'Dpkg::Substvars' => 'Dpkg',
'Dpkg::Vars' => 'Dpkg',
'Dpkg::Vendor' => 'Dpkg',
'Dpkg::Vendor::Debian' => 'Dpkg',
'Dpkg::Vendor::Default' => 'Dpkg',
'Dpkg::Vendor::Devuan' => 'Dpkg',
'Dpkg::Vendor::Ubuntu' => 'Dpkg',
'Dpkg::Version' => 'Dpkg',
'Dwarf' => 'Cmd-Dwarf',
'Elive' => 'Elive',
'Elive::Connection' => 'Elive',
'Elive::Connection::SDK' => 'Elive',
'Elive::DAO' => 'Elive',
'Elive::DAO::Array' => 'Elive',
'Elive::DAO::Singleton' => 'Elive',
'Elive::DAO::_Base' => 'Elive',
'Elive::Entity' => 'Elive',
'Elive::Entity::Group' => 'Elive',
'Elive::Entity::Group::Members' => 'Elive',
'Elive::Entity::InvitedGuest' => 'Elive',
'Elive::Entity::Meeting' => 'Elive',
'Elive::Entity::MeetingParameters' => 'Elive',
'Elive::Entity::Participant' => 'Elive',
'Elive::Entity::ParticipantList' => 'Elive',
'Elive::Entity::Participants' => 'Elive',
'Elive::Entity::Preload' => 'Elive',
'Elive::Entity::Preloads' => 'Elive',
'Elive::Entity::Recording' => 'Elive',
'Elive::Entity::Report' => 'Elive',
'Elive::Entity::Role' => 'Elive',
'Elive::Entity::ServerDetails' => 'Elive',
'Elive::Entity::ServerParameters' => 'Elive',
'Elive::Entity::Session' => 'Elive',
'Elive::Entity::User' => 'Elive',
'Elive::Util' => 'Elive',
'Elive::Util::Type' => 'Elive',
'Elive::View::Session' => 'Elive',
'Email::Address' => 'Email-Address',
'Email::MIME' => 'Email-MIME',
'Email::MIME::Creator' => 'Email-MIME',
'Email::MIME::Encode' => 'Email-MIME',
'Email::MIME::Header' => 'Email-MIME',
'Email::MIME::Header::AddressList' => 'Email-MIME',
'Email::MIME::Modifier' => 'Email-MIME',
'EnableModule' => 'perl',
'Encode' => 'Encode',
'Encode::Alias' => 'Encode',
'Encode::Byte' => 'Encode',
'Encode::CJKConstants' => 'Encode',
'Encode::CN' => 'Encode',
'Encode::CN::HZ' => 'Encode',
'Encode::Config' => 'Encode',
'Encode::EBCDIC' => 'Encode',
'Encode::Encoder' => 'Encode',
'Encode::Encoding' => 'Encode',
'Encode::GSM0338' => 'Encode',
'Encode::Guess' => 'Encode',
'Encode::Internal' => 'Encode',
'Encode::JP' => 'Encode',
'Encode::JP::H2Z' => 'Encode',
'Encode::JP::JIS7' => 'Encode',
'Encode::KR' => 'Encode',
'Encode::KR::2022_KR' => 'Encode',
'Encode::MIME::Header' => 'Encode',
'Encode::MIME::Header::ISO_2022_JP' => 'Encode',
'Encode::MIME::Name' => 'Encode',
'Encode::Symbol' => 'Encode',
'Encode::TW' => 'Encode',
'Encode::UTF_EBCDIC' => 'Encode',
'Encode::Unicode' => 'Encode',
'Encode::Unicode::UTF7' => 'Encode',
'Encode::XS' => 'Encode',
'Encode::utf8' => 'Encode',
'English' => 'perl',
'ExtUtils::Command' => 'ExtUtils-MakeMaker',
'ExtUtils::Command::MM' => 'ExtUtils-MakeMaker',
'ExtUtils::Embed' => 'perl',
'ExtUtils::Liblist' => 'ExtUtils-MakeMaker',
'ExtUtils::Liblist::Kid' => 'ExtUtils-MakeMaker',
'ExtUtils::MM' => 'ExtUtils-MakeMaker',
'ExtUtils::MM_AIX' => 'ExtUtils-MakeMaker',
'ExtUtils::MM_Any' => 'ExtUtils-MakeMaker',
'ExtUtils::MM_BeOS' => 'ExtUtils-MakeMaker',
'ExtUtils::MM_Cygwin' => 'ExtUtils-MakeMaker',
'ExtUtils::MM_DOS' => 'ExtUtils-MakeMaker',
'ExtUtils::MM_Darwin' => 'ExtUtils-MakeMaker',
'ExtUtils::MM_MacOS' => 'ExtUtils-MakeMaker',
'ExtUtils::MM_NW5' => 'ExtUtils-MakeMaker',
'ExtUtils::MM_OS2' => 'ExtUtils-MakeMaker',
'ExtUtils::MM_OS390' => 'ExtUtils-MakeMaker',
'ExtUtils::MM_QNX' => 'ExtUtils-MakeMaker',
'ExtUtils::MM_UWIN' => 'ExtUtils-MakeMaker',
'ExtUtils::MM_Unix' => 'ExtUtils-MakeMaker',
'ExtUtils::MM_VMS' => 'ExtUtils-MakeMaker',
'ExtUtils::MM_VOS' => 'ExtUtils-MakeMaker',
'ExtUtils::MM_Win32' => 'ExtUtils-MakeMaker',
'ExtUtils::MM_Win95' => 'ExtUtils-MakeMaker',
'ExtUtils::MY' => 'ExtUtils-MakeMaker',
'ExtUtils::MakeMaker' => 'ExtUtils-MakeMaker',
'ExtUtils::MakeMaker::Config' => 'ExtUtils-MakeMaker',
'ExtUtils::MakeMaker::Locale' => 'ExtUtils-MakeMaker',
'ExtUtils::MakeMaker::_version' => 'ExtUtils-MakeMaker',
'ExtUtils::MakeMaker::charstar' => 'ExtUtils-MakeMaker',
'ExtUtils::MakeMaker::version' => 'ExtUtils-MakeMaker',
'ExtUtils::MakeMaker::version::regex' => 'ExtUtils-MakeMaker',
'ExtUtils::MakeMaker::version::vpp' => 'ExtUtils-MakeMaker',
'ExtUtils::Miniperl' => 'perl',
'ExtUtils::Mkbootstrap' => 'ExtUtils-MakeMaker',
'ExtUtils::Mksymlists' => 'ExtUtils-MakeMaker',
'ExtUtils::ParseXS' => 'ExtUtils-ParseXS',
'ExtUtils::ParseXS::Constants' => 'ExtUtils-ParseXS',
'ExtUtils::ParseXS::CountLines' => 'ExtUtils-ParseXS',
'ExtUtils::ParseXS::Eval' => 'ExtUtils-ParseXS',
'ExtUtils::ParseXS::Utilities' => 'ExtUtils-ParseXS',
'ExtUtils::Typemaps' => 'ExtUtils-ParseXS',
'ExtUtils::Typemaps::Cmd' => 'ExtUtils-ParseXS',
'ExtUtils::Typemaps::InputMap' => 'ExtUtils-ParseXS',
'ExtUtils::Typemaps::OutputMap' => 'ExtUtils-ParseXS',
'ExtUtils::Typemaps::Type' => 'ExtUtils-ParseXS',
'ExtUtils::XSSymSet' => 'perl',
'ExtUtils::testlib' => 'ExtUtils-MakeMaker',
'FCGI' => 'FCGI',
'FCGI::Stream' => 'FCGI',
'Fake::Encode' => 'Fake-Encode',
'Fake::Our' => 'Fake-Our',
'FakeHomol' => 'GBrowse',
'Fcntl' => 'perl',
'Fh' => 'CGI',
'File::Basename' => 'perl',
'File::Compare' => 'perl',
'File::Copy' => 'perl',
'File::DataClass' => 'File-DataClass',
'File::DataClass::Cache' => 'File-DataClass',
'File::DataClass::Constants' => 'File-DataClass',
'File::DataClass::Exception' => 'File-DataClass',
'File::DataClass::Functions' => 'File-DataClass',
'File::DataClass::IO' => 'File-DataClass',
'File::DataClass::List' => 'File-DataClass',
'File::DataClass::Result' => 'File-DataClass',
'File::DataClass::ResultSet' => 'File-DataClass',
'File::DataClass::ResultSource' => 'File-DataClass',
'File::DataClass::Schema' => 'File-DataClass',
'File::DataClass::Storage' => 'File-DataClass',
'File::DataClass::Storage::Any' => 'File-DataClass',
'File::DataClass::Storage::JSON' => 'File-DataClass',
'File::DataClass::Types' => 'File-DataClass',
'File::DosGlob' => 'perl',
'File::Find' => 'perl',
'File::Glob' => 'perl',
'File::GlobMapper' => 'IO-Compress',
'File::KeePass' => 'File-KeePass',
'File::Path' => 'File-Path',
'File::RandomAccess' => 'Image-ExifTool',
'File::Slurp' => 'File-Slurp',
'File::Spec' => 'PathTools',
'File::Spec::AmigaOS' => 'PathTools',
'File::Spec::Cygwin' => 'PathTools',
'File::Spec::Epoc' => 'PathTools',
'File::Spec::Functions' => 'PathTools',
'File::Spec::Mac' => 'PathTools',
'File::Spec::OS2' => 'PathTools',
'File::Spec::Unix' => 'PathTools',
'File::Spec::VMS' => 'PathTools',
'File::Spec::Win32' => 'PathTools',
'File::Temp' => 'File-Temp',
'File::stat' => 'perl',
'FileCache' => 'perl',
'FileHandle' => 'perl',
'FileSlurp_12' => 'File-Slurp',
'Filesys::SmbClientParser' => 'Filesys-SmbClientParser',
'FindExt' => 'perl',
'GD' => 'GD',
'GD::Group' => 'GD',
'GD::Image' => 'GD',
'GD::Polygon' => 'GD',
'GD::Polyline' => 'GD',
'GD::Simple' => 'GD',
'GDBM_File' => 'perl',
'GPIB' => 'GPIB',
'GPIB::hp33120a' => 'GPIB',
'GPIB::hp3585a' => 'GPIB',
'GPIB::hp59306a' => 'GPIB',
'GPIB::hpe3631a' => 'GPIB',
'GPIB::hpserial' => 'GPIB',
'GPIB::llp' => 'GPIB',
'GPIB::ni' => 'GPIB',
'GPIB::rmt' => 'GPIB',
'Galileo' => 'Galileo',
'Galileo::Admin' => 'Galileo',
'Galileo::Command::dump' => 'Galileo',
'Galileo::Command::setup' => 'Galileo',
'Galileo::DB::Deploy' => 'Galileo',
'Galileo::DB::Schema' => 'Galileo',
'Galileo::DB::Schema::Result::Menu' => 'Galileo',
'Galileo::DB::Schema::Result::Page' => 'Galileo',
'Galileo::DB::Schema::Result::User' => 'Galileo',
'Galileo::File' => 'Galileo',
'Galileo::Menu' => 'Galileo',
'Galileo::Page' => 'Galileo',
'Galileo::Plugin::Deploy' => 'Galileo',
'Galileo::Plugin::Modal' => 'Galileo',
'Galileo::User' => 'Galileo',
'Getopt::Std' => 'perl',
'GitLab::API::v4' => 'GitLab-API-v4',
'GitLab::API::v4::Config' => 'GitLab-API-v4',
'GitLab::API::v4::Constants' => 'GitLab-API-v4',
'GitLab::API::v4::Mock' => 'GitLab-API-v4',
'GitLab::API::v4::Mock::Engine' => 'GitLab-API-v4',
'GitLab::API::v4::Mock::RESTClient' => 'GitLab-API-v4',
'GitLab::API::v4::Paginator' => 'GitLab-API-v4',
'GitLab::API::v4::RESTClient' => 'GitLab-API-v4',
'GitLab::API::v4::WWWClient' => 'GitLab-API-v4',
'GitUtils' => 'perl',
'Graphics::ColorNames' => 'Graphics-ColorNames',
'Graphics::ColorNames::X' => 'Graphics-ColorNames',
'HTML::EP' => 'HTML-EP',
'HTML::EP::CGIEncryptForm' => 'HTML-EP',
'HTML::EP::EditTable' => 'HTML-EP',
'HTML::EP::Examples::Admin' => 'HTML-EP',
'HTML::EP::Examples::Glimpse' => 'HTML-EP',
'HTML::EP::Examples::POP3Client' => 'HTML-EP',
'HTML::EP::Install' => 'HTML-EP',
'HTML::EP::Locale' => 'HTML-EP',
'HTML::EP::Parser' => 'HTML-EP',
'HTML::EP::Session' => 'HTML-EP',
'HTML::EP::Session::Cookie' => 'HTML-EP',
'HTML::EP::Session::DBI' => 'HTML-EP',
'HTML::EP::Session::DBIq' => 'HTML-EP',
'HTML::EP::Session::Dumper' => 'HTML-EP',
'HTML::EP::Shop' => 'HTML-EP',
'HTML::EP::Tokens' => 'HTML-EP',
'HTML::Editor' => 'MySQL-Admin',
'HTML::Editor::Markdown' => 'MySQL-Admin',
'HTML::Entities' => 'HTML-Parser',
'HTML::Filter' => 'HTML-Parser',
'HTML::HeadParser' => 'HTML-Parser',
'HTML::LinkExtor' => 'HTML-Parser',
'HTML::Menu::Pages' => 'MySQL-Admin',
'HTML::Parser' => 'HTML-Parser',
'HTML::Perlinfo' => 'HTML-Perlinfo',
'HTML::Perlinfo::Apache' => 'HTML-Perlinfo',
'HTML::Perlinfo::Base' => 'HTML-Perlinfo',
'HTML::Perlinfo::Common' => 'HTML-Perlinfo',
'HTML::Perlinfo::General' => 'HTML-Perlinfo',
'HTML::Perlinfo::Loaded' => 'HTML-Perlinfo',
'HTML::Perlinfo::Modules' => 'HTML-Perlinfo',
'HTML::Perlinfo::_version' => 'HTML-Perlinfo',
'HTML::PullParser' => 'HTML-Parser',
'HTML::Scrubber' => 'HTML-Scrubber',
'HTML::StripScripts' => 'HTML-StripScripts',
'HTML::Template::Pro' => 'HTML-Template-Pro',
'HTML::Template::Pro::WrapAssociate' => 'HTML-Template-Pro',
'HTML::TokeParser' => 'HTML-Parser',
'HTTP::Body' => 'HTTP-Body',
'HTTP::Body::MultiPart' => 'HTTP-Body',
'HTTP::Body::OctetStream' => 'HTTP-Body',
'HTTP::Body::UrlEncoded' => 'HTTP-Body',
'HTTP::Body::XForms' => 'HTTP-Body',
'HTTP::Body::XFormsMultipart' => 'HTTP-Body',
'HTTP::Daemon' => 'HTTP-Daemon',
'HTTP::Daemon::ClientConn' => 'HTTP-Daemon',
'HTTP::Message::PSGI' => 'Plack',
'HTTP::Server::PSGI' => 'Plack',
'HTTP::Session2' => 'HTTP-Session2',
'HTTP::Session2::Base' => 'HTTP-Session2',
'HTTP::Session2::ClientStore' => 'HTTP-Session2',
'HTTP::Session2::ClientStore2' => 'HTTP-Session2',
'HTTP::Session2::Expired' => 'HTTP-Session2',
'HTTP::Session2::Random' => 'HTTP-Session2',
'HTTP::Session2::ServerStore' => 'HTTP-Session2',
'HTTP::Tiny' => 'HTTP-Tiny',
'HTTP::Tiny::NoProxy' => 'Dancer',
'Haiku' => 'perl',
'Hash::Util' => 'perl',
'Hash::Util::FieldHash' => 'perl',
'HeaderParser' => 'perl',
'I18N::LangTags' => 'perl',
'I18N::LangTags::Detect' => 'perl',
'I18N::LangTags::List' => 'perl',
'I18N::Langinfo' => 'perl',
'IO::Compress' => 'IO-Compress',
'IO::Compress::Adapter::Bzip2' => 'IO-Compress',
'IO::Compress::Adapter::Deflate' => 'IO-Compress',
'IO::Compress::Adapter::Identity' => 'IO-Compress',
'IO::Compress::Base' => 'IO-Compress',
'IO::Compress::Base::Common' => 'IO-Compress',
'IO::Compress::Bzip2' => 'IO-Compress',
'IO::Compress::Deflate' => 'IO-Compress',
'IO::Compress::Gzip' => 'IO-Compress',
'IO::Compress::Gzip::Constants' => 'IO-Compress',
'IO::Compress::RawDeflate' => 'IO-Compress',
'IO::Compress::Zip' => 'IO-Compress',
'IO::Compress::Zip::Constants' => 'IO-Compress',
'IO::Compress::Zlib::Constants' => 'IO-Compress',
'IO::Compress::Zlib::Extra' => 'IO-Compress',
'IO::Socket::SSL' => 'IO-Socket-SSL',
'IO::Socket::SSL::Intercept' => 'IO-Socket-SSL',
'IO::Socket::SSL::OCSP_Cache' => 'IO-Socket-SSL',
'IO::Socket::SSL::OCSP_Resolver' => 'IO-Socket-SSL',
'IO::Socket::SSL::PublicSuffix' => 'IO-Socket-SSL',
'IO::Socket::SSL::SSL_Context' => 'IO-Socket-SSL',
'IO::Socket::SSL::SSL_HANDLE' => 'IO-Socket-SSL',
'IO::Socket::SSL::Session_Cache' => 'IO-Socket-SSL',
'IO::Socket::SSL::Trace' => 'IO-Socket-SSL',
'IO::Socket::SSL::Utils' => 'IO-Socket-SSL',
'IO::Uncompress::Adapter::Bunzip2' => 'IO-Compress',
'IO::Uncompress::Adapter::Identity' => 'IO-Compress',
'IO::Uncompress::Adapter::Inflate' => 'IO-Compress',
'IO::Uncompress::AnyInflate' => 'IO-Compress',
'IO::Uncompress::AnyUncompress' => 'IO-Compress',
'IO::Uncompress::Base' => 'IO-Compress',
'IO::Uncompress::Bunzip2' => 'IO-Compress',
'IO::Uncompress::Gunzip' => 'IO-Compress',
'IO::Uncompress::Inflate' => 'IO-Compress',
'IO::Uncompress::RawInflate' => 'IO-Compress',
'IO::Uncompress::Unzip' => 'IO-Compress',
'IPC::Cmd' => 'IPC-Cmd',
'IPC::Cmd::System' => 'IPC-Cmd',
'IPC::Open2' => 'perl',
'IPC::Open3' => 'perl',
'IPC::Run' => 'IPC-Run',
'IPC::Run::Debug' => 'IPC-Run',
'IPC::Run::IO' => 'IPC-Run',
'IPC::Run::Timer' => 'IPC-Run',
'IPC::Run::Win32Helper' => 'IPC-Run',
'IPC::Run::Win32IO' => 'IPC-Run',
'IPC::Run::Win32Process' => 'IPC-Run',
'IPC::Run::Win32Pump' => 'IPC-Run',
'IPTables::Parse' => 'IPTables-Parse',
'Image::ExifTool' => 'Image-ExifTool',
'Image::ExifTool::7Z' => 'Image-ExifTool',
'Image::ExifTool::AAC' => 'Image-ExifTool',
'Image::ExifTool::AES' => 'Image-ExifTool',
'Image::ExifTool::AFCP' => 'Image-ExifTool',
'Image::ExifTool::AIFF' => 'Image-ExifTool',
'Image::ExifTool::APE' => 'Image-ExifTool',
'Image::ExifTool::APP12' => 'Image-ExifTool',
'Image::ExifTool::ASF' => 'Image-ExifTool',
'Image::ExifTool::Apple' => 'Image-ExifTool',
'Image::ExifTool::Audible' => 'Image-ExifTool',
'Image::ExifTool::BMP' => 'Image-ExifTool',
'Image::ExifTool::BPG' => 'Image-ExifTool',
'Image::ExifTool::BZZ' => 'Image-ExifTool',
'Image::ExifTool::BigTIFF' => 'Image-ExifTool',
'Image::ExifTool::BuildTagLookup' => 'Image-ExifTool',
'Image::ExifTool::CBOR' => 'Image-ExifTool',
'Image::ExifTool::Canon' => 'Image-ExifTool',
'Image::ExifTool::CanonCustom' => 'Image-ExifTool',
'Image::ExifTool::CanonRaw' => 'Image-ExifTool',
'Image::ExifTool::CanonVRD' => 'Image-ExifTool',
'Image::ExifTool::CaptureOne' => 'Image-ExifTool',
'Image::ExifTool::Casio' => 'Image-ExifTool',
'Image::ExifTool::Charset' => 'Image-ExifTool',
'Image::ExifTool::DICOM' => 'Image-ExifTool',
'Image::ExifTool::DJI' => 'Image-ExifTool',
'Image::ExifTool::DNG' => 'Image-ExifTool',
'Image::ExifTool::DPX' => 'Image-ExifTool',
'Image::ExifTool::DV' => 'Image-ExifTool',
'Image::ExifTool::DarwinCore' => 'Image-ExifTool',
'Image::ExifTool::DjVu' => 'Image-ExifTool',
'Image::ExifTool::EXE' => 'Image-ExifTool',
'Image::ExifTool::Exif' => 'Image-ExifTool',
'Image::ExifTool::FITS' => 'Image-ExifTool',
'Image::ExifTool::FLAC' => 'Image-ExifTool',
'Image::ExifTool::FLIF' => 'Image-ExifTool',
'Image::ExifTool::FLIR' => 'Image-ExifTool',
'Image::ExifTool::Fixup' => 'Image-ExifTool',
'Image::ExifTool::Flash' => 'Image-ExifTool',
'Image::ExifTool::FlashPix' => 'Image-ExifTool',
'Image::ExifTool::Font' => 'Image-ExifTool',
'Image::ExifTool::FotoStation' => 'Image-ExifTool',
'Image::ExifTool::FujiFilm' => 'Image-ExifTool',
'Image::ExifTool::GE' => 'Image-ExifTool',
'Image::ExifTool::GIF' => 'Image-ExifTool',
'Image::ExifTool::GIMP' => 'Image-ExifTool',
'Image::ExifTool::GM' => 'Image-ExifTool',
'Image::ExifTool::GPS' => 'Image-ExifTool',
'Image::ExifTool::GeoTiff' => 'Image-ExifTool',
'Image::ExifTool::Geolocation' => 'Image-ExifTool',
'Image::ExifTool::Geotag' => 'Image-ExifTool',
'Image::ExifTool::GoPro' => 'Image-ExifTool',
'Image::ExifTool::H264' => 'Image-ExifTool',
'Image::ExifTool::HP' => 'Image-ExifTool',
'Image::ExifTool::HTML' => 'Image-ExifTool',
'Image::ExifTool::HtmlDump' => 'Image-ExifTool',
'Image::ExifTool::ICC_Profile' => 'Image-ExifTool',
'Image::ExifTool::ICO' => 'Image-ExifTool',
'Image::ExifTool::ID3' => 'Image-ExifTool',
'Image::ExifTool::IPTC' => 'Image-ExifTool',
'Image::ExifTool::ISO' => 'Image-ExifTool',
'Image::ExifTool::ITC' => 'Image-ExifTool',
'Image::ExifTool::Import' => 'Image-ExifTool',
'Image::ExifTool::InDesign' => 'Image-ExifTool',
'Image::ExifTool::InfiRay' => 'Image-ExifTool',
'Image::ExifTool::JPEG' => 'Image-ExifTool',
'Image::ExifTool::JPEGDigest' => 'Image-ExifTool',
'Image::ExifTool::JSON' => 'Image-ExifTool',
'Image::ExifTool::JVC' => 'Image-ExifTool',
'Image::ExifTool::Jpeg2000' => 'Image-ExifTool',
'Image::ExifTool::Kodak' => 'Image-ExifTool',
'Image::ExifTool::KyoceraRaw' => 'Image-ExifTool',
'Image::ExifTool::LIF' => 'Image-ExifTool',
'Image::ExifTool::LNK' => 'Image-ExifTool',
'Image::ExifTool::Lang::cs' => 'Image-ExifTool',
'Image::ExifTool::Lang::de' => 'Image-ExifTool',
'Image::ExifTool::Lang::en_ca' => 'Image-ExifTool',
'Image::ExifTool::Lang::en_gb' => 'Image-ExifTool',
'Image::ExifTool::Lang::es' => 'Image-ExifTool',
'Image::ExifTool::Lang::fi' => 'Image-ExifTool',
'Image::ExifTool::Lang::fr' => 'Image-ExifTool',
'Image::ExifTool::Lang::it' => 'Image-ExifTool',
'Image::ExifTool::Lang::ja' => 'Image-ExifTool',
'Image::ExifTool::Lang::ko' => 'Image-ExifTool',
'Image::ExifTool::Lang::nl' => 'Image-ExifTool',
'Image::ExifTool::Lang::pl' => 'Image-ExifTool',
'Image::ExifTool::Lang::ru' => 'Image-ExifTool',
'Image::ExifTool::Lang::sk' => 'Image-ExifTool',
'Image::ExifTool::Lang::sv' => 'Image-ExifTool',
'Image::ExifTool::Lang::tr' => 'Image-ExifTool',
'Image::ExifTool::Lang::zh_cn' => 'Image-ExifTool',
'Image::ExifTool::Lang::zh_tw' => 'Image-ExifTool',
'Image::ExifTool::Leaf' => 'Image-ExifTool',
'Image::ExifTool::Lytro' => 'Image-ExifTool',
'Image::ExifTool::M2TS' => 'Image-ExifTool',
'Image::ExifTool::MIE' => 'Image-ExifTool',
'Image::ExifTool::MIFF' => 'Image-ExifTool',
'Image::ExifTool::MISB' => 'Image-ExifTool',
'Image::ExifTool::MNG' => 'Image-ExifTool',
'Image::ExifTool::MOI' => 'Image-ExifTool',
'Image::ExifTool::MPC' => 'Image-ExifTool',
'Image::ExifTool::MPEG' => 'Image-ExifTool',
'Image::ExifTool::MPF' => 'Image-ExifTool',
'Image::ExifTool::MRC' => 'Image-ExifTool',
'Image::ExifTool::MWG' => 'Image-ExifTool',
'Image::ExifTool::MXF' => 'Image-ExifTool',
'Image::ExifTool::MacOS' => 'Image-ExifTool',
'Image::ExifTool::MakerNotes' => 'Image-ExifTool',
'Image::ExifTool::Matroska' => 'Image-ExifTool',
'Image::ExifTool::Microsoft' => 'Image-ExifTool',
'Image::ExifTool::Minolta' => 'Image-ExifTool',
'Image::ExifTool::MinoltaRaw' => 'Image-ExifTool',
'Image::ExifTool::Motorola' => 'Image-ExifTool',
'Image::ExifTool::Nikon' => 'Image-ExifTool',
'Image::ExifTool::NikonCapture' => 'Image-ExifTool',
'Image::ExifTool::NikonCustom' => 'Image-ExifTool',
'Image::ExifTool::NikonSettings' => 'Image-ExifTool',
'Image::ExifTool::Nintendo' => 'Image-ExifTool',
'Image::ExifTool::OOXML' => 'Image-ExifTool',
'Image::ExifTool::Ogg' => 'Image-ExifTool',
'Image::ExifTool::Olympus' => 'Image-ExifTool',
'Image::ExifTool::OpenEXR' => 'Image-ExifTool',
'Image::ExifTool::Opus' => 'Image-ExifTool',
'Image::ExifTool::Other' => 'Image-ExifTool',
'Image::ExifTool::PCX' => 'Image-ExifTool',
'Image::ExifTool::PDF' => 'Image-ExifTool',
'Image::ExifTool::PGF' => 'Image-ExifTool',
'Image::ExifTool::PICT' => 'Image-ExifTool',
'Image::ExifTool::PLIST' => 'Image-ExifTool',
'Image::ExifTool::PLUS' => 'Image-ExifTool',
'Image::ExifTool::PNG' => 'Image-ExifTool',
'Image::ExifTool::PPM' => 'Image-ExifTool',
'Image::ExifTool::PSP' => 'Image-ExifTool',
'Image::ExifTool::Palm' => 'Image-ExifTool',
'Image::ExifTool::Panasonic' => 'Image-ExifTool',
'Image::ExifTool::PanasonicRaw' => 'Image-ExifTool',
'Image::ExifTool::Parrot' => 'Image-ExifTool',
'Image::ExifTool::Pentax' => 'Image-ExifTool',
'Image::ExifTool::PhaseOne' => 'Image-ExifTool',
'Image::ExifTool::PhotoCD' => 'Image-ExifTool',
'Image::ExifTool::PhotoMechanic' => 'Image-ExifTool',
'Image::ExifTool::Photoshop' => 'Image-ExifTool',
'Image::ExifTool::PostScript' => 'Image-ExifTool',
'Image::ExifTool::PrintIM' => 'Image-ExifTool',
'Image::ExifTool::Protobuf' => 'Image-ExifTool',
'Image::ExifTool::Qualcomm' => 'Image-ExifTool',
'Image::ExifTool::QuickTime' => 'Image-ExifTool',
'Image::ExifTool::RIFF' => 'Image-ExifTool',
'Image::ExifTool::RSRC' => 'Image-ExifTool',
'Image::ExifTool::RTF' => 'Image-ExifTool',
'Image::ExifTool::Radiance' => 'Image-ExifTool',
'Image::ExifTool::Rawzor' => 'Image-ExifTool',
'Image::ExifTool::Real' => 'Image-ExifTool',
'Image::ExifTool::Reconyx' => 'Image-ExifTool',
'Image::ExifTool::Red' => 'Image-ExifTool',
'Image::ExifTool::Ricoh' => 'Image-ExifTool',
'Image::ExifTool::Samsung' => 'Image-ExifTool',
'Image::ExifTool::Sanyo' => 'Image-ExifTool',
'Image::ExifTool::Scalado' => 'Image-ExifTool',
'Image::ExifTool::Shortcuts' => 'Image-ExifTool',
'Image::ExifTool::Sigma' => 'Image-ExifTool',
'Image::ExifTool::SigmaRaw' => 'Image-ExifTool',
'Image::ExifTool::Sony' => 'Image-ExifTool',
'Image::ExifTool::SonyIDC' => 'Image-ExifTool',
'Image::ExifTool::Stim' => 'Image-ExifTool',
'Image::ExifTool::TagInfoXML' => 'Image-ExifTool',
'Image::ExifTool::TagLookup' => 'Image-ExifTool',
'Image::ExifTool::Text' => 'Image-ExifTool',
'Image::ExifTool::Theora' => 'Image-ExifTool',
'Image::ExifTool::Torrent' => 'Image-ExifTool',
'Image::ExifTool::Unknown' => 'Image-ExifTool',
'Image::ExifTool::VCard' => 'Image-ExifTool',
'Image::ExifTool::Validate' => 'Image-ExifTool',
'Image::ExifTool::Vorbis' => 'Image-ExifTool',
'Image::ExifTool::WPG' => 'Image-ExifTool',
'Image::ExifTool::WTV' => 'Image-ExifTool',
'Image::ExifTool::XISF' => 'Image-ExifTool',
'Image::ExifTool::XMP' => 'Image-ExifTool',
'Image::ExifTool::ZIP' => 'Image-ExifTool',
'Image::ExifTool::ZISRAW' => 'Image-ExifTool',
'Image::ExifTool::iWork' => 'Image-ExifTool',
'Image::Info' => 'Image-Info',
'Image::Info::AVIF' => 'Image-Info',
'Image::Info::BMP' => 'Image-Info',
'Image::Info::GIF' => 'Image-Info',
'Image::Info::ICO' => 'Image-Info',
'Image::Info::JPEG' => 'Image-Info',
'Image::Info::PNG' => 'Image-Info',
'Image::Info::PPM' => 'Image-Info',
'Image::Info::Result' => 'Image-Info',
'Image::Info::SVG' => 'Image-Info',
'Image::Info::SVG::XMLLibXMLReader' => 'Image-Info',
'Image::Info::SVG::XMLSimple' => 'Image-Info',
'Image::Info::TIFF' => 'Image-Info',
'Image::Info::WBMP' => 'Image-Info',
'Image::Info::WEBP' => 'Image-Info',
'Image::Info::XBM' => 'Image-Info',
'Image::Info::XPM' => 'Image-Info',
'Image::TIFF' => 'Image-Info',
'Image::TIFF::Rational' => 'Image-Info',
'Imager' => 'Imager',
'Imager::Color' => 'Imager',
'Imager::Color::Float' => 'Imager',
'Imager::Color::Table' => 'Imager',
'Imager::CountColor' => 'Imager',
'Imager::Expr' => 'Imager',
'Imager::Expr::Assem' => 'Imager',
'Imager::Expr::Infix' => 'Imager',
'Imager::Expr::Postfix' => 'Imager',
'Imager::ExtUtils' => 'Imager',
'Imager::FORMATS' => 'Imager',
'Imager::File::CUR' => 'Imager',
'Imager::File::ICO' => 'Imager',
'Imager::File::SGI' => 'Imager',
'Imager::Fill' => 'Imager',
'Imager::Filter::DynTest' => 'Imager',
'Imager::Filter::Flines' => 'Imager',
'Imager::Filter::Mandelbrot' => 'Imager',
'Imager::Font' => 'Imager',
'Imager::Font::BBox' => 'Imager',
'Imager::Font::FreeType2' => 'Imager',
'Imager::Font::Image' => 'Imager',
'Imager::Font::Test' => 'Imager',
'Imager::Font::Truetype' => 'Imager',
'Imager::Font::Type1' => 'Imager',
'Imager::Font::Wrap' => 'Imager',
'Imager::Fountain' => 'Imager',
'Imager::IO' => 'Imager',
'Imager::Matrix2d' => 'Imager',
'Imager::Preprocess' => 'Imager',
'Imager::Probe' => 'Imager',
'Imager::Regops' => 'Imager',
'Imager::Test' => 'Imager',
'Imager::Test::OverUtf8' => 'Imager',
'Imager::Transform' => 'Imager',
'Imager::TrimColorList' => 'Imager',
'JNI' => 'perl',
'JPL::AutoLoader' => 'perl',
'JPL::Class' => 'perl',
'JPL::Compile' => 'perl',
'Jifty' => 'Jifty',
'Jifty::API' => 'Jifty',
'Jifty::Action' => 'Jifty',
'Jifty::Action::AboutMe' => 'Jifty',
'Jifty::Action::Autocomplete' => 'Jifty',
'Jifty::Action::Record' => 'Jifty',
'Jifty::Action::Record::Bulk' => 'Jifty',
'Jifty::Action::Record::Create' => 'Jifty',
'Jifty::Action::Record::Delete' => 'Jifty',
'Jifty::Action::Record::Execute' => 'Jifty',
'Jifty::Action::Record::Search' => 'Jifty',
'Jifty::Action::Record::Update' => 'Jifty',
'Jifty::Action::Redirect' => 'Jifty',
'Jifty::Bootstrap' => 'Jifty',
'Jifty::CAS' => 'Jifty',
'Jifty::CAS::Blob' => 'Jifty',
'Jifty::CAS::Store' => 'Jifty',
'Jifty::CAS::Store::LocalFile' => 'Jifty',
'Jifty::CAS::Store::Memcached' => 'Jifty',
'Jifty::CAS::Store::Memory' => 'Jifty',
'Jifty::CAS::Store::Nested' => 'Jifty',
'Jifty::ClassLoader' => 'Jifty',
'Jifty::Client' => 'Jifty',
'Jifty::Collection' => 'Jifty',
'Jifty::Config' => 'Jifty',
'Jifty::Continuation' => 'Jifty',
'Jifty::CurrentUser' => 'Jifty',
'Jifty::DBI' => 'Jifty-DBI',
'Jifty::DBI::Collection' => 'Jifty-DBI',
'Jifty::DBI::Collection::Union' => 'Jifty-DBI',
'Jifty::DBI::Collection::Unique' => 'Jifty-DBI',
'Jifty::DBI::Column' => 'Jifty-DBI',
'Jifty::DBI::Filter' => 'Jifty-DBI',
'Jifty::DBI::Filter::Boolean' => 'Jifty-DBI',
'Jifty::DBI::Filter::Date' => 'Jifty-DBI',
'Jifty::DBI::Filter::DateTime' => 'Jifty-DBI',
'Jifty::DBI::Filter::Duration' => 'Jifty-DBI',
'Jifty::DBI::Filter::SaltHash' => 'Jifty-DBI',
'Jifty::DBI::Filter::Storable' => 'Jifty-DBI',
'Jifty::DBI::Filter::Time' => 'Jifty-DBI',
'Jifty::DBI::Filter::Truncate' => 'Jifty-DBI',
'Jifty::DBI::Filter::URI' => 'Jifty-DBI',
'Jifty::DBI::Filter::YAML' => 'Jifty-DBI',
'Jifty::DBI::Filter::base64' => 'Jifty-DBI',
'Jifty::DBI::Filter::utf8' => 'Jifty-DBI',
'Jifty::DBI::Handle' => 'Jifty-DBI',
'Jifty::DBI::Handle::Informix' => 'Jifty-DBI',
'Jifty::DBI::Handle::ODBC' => 'Jifty-DBI',
'Jifty::DBI::Handle::Oracle' => 'Jifty-DBI',
'Jifty::DBI::Handle::Pg' => 'Jifty-DBI',
'Jifty::DBI::Handle::SQLite' => 'Jifty-DBI',
'Jifty::DBI::Handle::Sybase' => 'Jifty-DBI',
'Jifty::DBI::Handle::mysql' => 'Jifty-DBI',
'Jifty::DBI::Handle::mysqlPP' => 'Jifty-DBI',
'Jifty::DBI::HasFilters' => 'Jifty-DBI',
'Jifty::DBI::Record' => 'Jifty-DBI',
'Jifty::DBI::Record::Cachable' => 'Jifty-DBI',
'Jifty::DBI::Record::Memcached' => 'Jifty-DBI',
'Jifty::DBI::Record::Plugin' => 'Jifty-DBI',
'Jifty::DBI::Schema' => 'Jifty-DBI',
'Jifty::DBI::SchemaGenerator' => 'Jifty-DBI',
'Jifty::DateTime' => 'Jifty',
'Jifty::Dispatcher' => 'Jifty',
'Jifty::Everything' => 'Jifty',
'Jifty::Filter::DateTime' => 'Jifty',
'Jifty::Filter::JSON' => 'Jifty',
'Jifty::Handle' => 'Jifty',
'Jifty::Handler' => 'Jifty',
'Jifty::I18N' => 'Jifty',
'Jifty::I18N::en' => 'Jifty',
'Jifty::JSON' => 'Jifty',
'Jifty::LetMe' => 'Jifty',
'Jifty::Logger' => 'Jifty',
'Jifty::Model::Metadata' => 'Jifty',
'Jifty::Model::Session' => 'Jifty',
'Jifty::Model::SessionCollection' => 'Jifty',
'Jifty::Module::Pluggable' => 'Jifty',
'Jifty::Notification' => 'Jifty',
'Jifty::Object' => 'Jifty',
'Jifty::Param' => 'Jifty',
'Jifty::Param::Schema' => 'Jifty',
'Jifty::Plugin' => 'Jifty',
'Jifty::Plugin::ActorMetadata' => 'Jifty',
'Jifty::Plugin::ActorMetadata::Mixin::Model::ActorMetadata' => 'Jifty',
'Jifty::Plugin::AdminUI' => 'Jifty',
'Jifty::Plugin::AdminUI::Dispatcher' => 'Jifty',
'Jifty::Plugin::AdminUI::View' => 'Jifty',
'Jifty::Plugin::Authentication::Password' => 'Jifty',
'Jifty::Plugin::Authentication::Password::Action::ConfirmEmail' => 'Jifty',
'Jifty::Plugin::Authentication::Password::Action::GeneratePasswordToken' => 'Jifty',
'Jifty::Plugin::Authentication::Password::Action::Login' => 'Jifty',
'Jifty::Plugin::Authentication::Password::Action::Logout' => 'Jifty',
'Jifty::Plugin::Authentication::Password::Action::ResendConfirmation' => 'Jifty',
'Jifty::Plugin::Authentication::Password::Action::ResetLostPassword' => 'Jifty',
'Jifty::Plugin::Authentication::Password::Action::SendAccountConfirmation' => 'Jifty',
'Jifty::Plugin::Authentication::Password::Action::SendPasswordReminder' => 'Jifty',
'Jifty::Plugin::Authentication::Password::Action::Signup' => 'Jifty',
'Jifty::Plugin::Authentication::Password::Dispatcher' => 'Jifty',
'Jifty::Plugin::Authentication::Password::Mixin::Model::User' => 'Jifty',
'Jifty::Plugin::Authentication::Password::Notification::ConfirmEmail' => 'Jifty',
'Jifty::Plugin::Authentication::Password::Notification::ConfirmLostPassword' => 'Jifty',
'Jifty::Plugin::Authentication::Password::View' => 'Jifty',
'Jifty::Plugin::CSSQuery' => 'Jifty',
'Jifty::Plugin::ClassLoader' => 'Jifty',
'Jifty::Plugin::Compat' => 'Jifty',
'Jifty::Plugin::Compat::Apache' => 'Jifty',
'Jifty::Plugin::Compat::CGI' => 'Jifty',
'Jifty::Plugin::CompressedCSSandJS' => 'Jifty',
'Jifty::Plugin::CompressedCSSandJS::Dispatcher' => 'Jifty',
'Jifty::Plugin::Config' => 'Jifty',
'Jifty::Plugin::Config::Action::AddConfig' => 'Jifty',
'Jifty::Plugin::Config::Action::Config' => 'Jifty',
'Jifty::Plugin::Config::Action::Restart' => 'Jifty',
'Jifty::Plugin::Config::Dispatcher' => 'Jifty',
'Jifty::Plugin::Config::View' => 'Jifty',
'Jifty::Plugin::Deflater' => 'Jifty',
'Jifty::Plugin::ErrorTemplates' => 'Jifty',
'Jifty::Plugin::ErrorTemplates::View' => 'Jifty',
'Jifty::Plugin::Halo' => 'Jifty',
'Jifty::Plugin::Halo::Mason' => 'Jifty',
'Jifty::Plugin::I18N' => 'Jifty',
'Jifty::Plugin::I18N::Action::SetLang' => 'Jifty',
'Jifty::Plugin::IEFixes' => 'Jifty',
'Jifty::Plugin::LetMe' => 'Jifty',
'Jifty::Plugin::LetMe::Dispatcher' => 'Jifty',
'Jifty::Plugin::OnlineDocs' => 'Jifty',
'Jifty::Plugin::OnlineDocs::Dispatcher' => 'Jifty',
'Jifty::Plugin::Prototypism' => 'Jifty',
'Jifty::Plugin::PubSub' => 'Jifty',
'Jifty::Plugin::PubSub::Bus' => 'Jifty',
'Jifty::Plugin::PubSub::Connection' => 'Jifty',
'Jifty::Plugin::PubSub::Subscriptions' => 'Jifty',
'Jifty::Plugin::REST' => 'Jifty',
'Jifty::Plugin::REST::Dispatcher' => 'Jifty',
'Jifty::Plugin::RPC' => 'Jifty',
'Jifty::Plugin::RequestInspector' => 'Jifty',
'Jifty::Plugin::RequestInspector::Model::Request' => 'Jifty',
'Jifty::Plugin::RequestInspector::View' => 'Jifty',
'Jifty::Plugin::SQLQueries' => 'Jifty',
'Jifty::Plugin::SQLQueries::View' => 'Jifty',
'Jifty::Plugin::SetupWizard' => 'Jifty',
'Jifty::Plugin::SetupWizard::Action::TestDatabaseConnectivity' => 'Jifty',
'Jifty::Plugin::SetupWizard::View' => 'Jifty',
'Jifty::Plugin::SinglePage' => 'Jifty',
'Jifty::Plugin::SinglePage::Dispatcher' => 'Jifty',
'Jifty::Plugin::SkeletonApp' => 'Jifty',
'Jifty::Plugin::SkeletonApp::Dispatcher' => 'Jifty',
'Jifty::Plugin::SkeletonApp::View' => 'Jifty',
'Jifty::Plugin::TestServerWarnings' => 'Jifty',
'Jifty::Plugin::TestServerWarnings::Appender' => 'Jifty',
'Jifty::Plugin::TestServerWarnings::View' => 'Jifty',
'Jifty::Plugin::User' => 'Jifty',
'Jifty::Plugin::User::Mixin::Model::User' => 'Jifty',
'Jifty::Plugin::ViewDeclarePage' => 'Jifty',
'Jifty::Plugin::ViewDeclarePage::Page' => 'Jifty',
'Jifty::Record' => 'Jifty',
'Jifty::Request' => 'Jifty',
'Jifty::Request::Action' => 'Jifty',
'Jifty::Request::Fragment' => 'Jifty',
'Jifty::Request::Mapper' => 'Jifty',
'Jifty::Request::StateVariable' => 'Jifty',
'Jifty::Response' => 'Jifty',
'Jifty::Result' => 'Jifty',
'Jifty::RightsFrom' => 'Jifty',
'Jifty::Schema' => 'Jifty',
'Jifty::Script' => 'Jifty',
'Jifty::Script::Action' => 'Jifty',
'Jifty::Script::Adopt' => 'Jifty',
'Jifty::Script::App' => 'Jifty',
'Jifty::Script::Env' => 'Jifty',
'Jifty::Script::FastCGI' => 'Jifty',
'Jifty::Script::Help' => 'Jifty',
'Jifty::Script::ModPerl2' => 'Jifty',
'Jifty::Script::Model' => 'Jifty',
'Jifty::Script::Plugin' => 'Jifty',
'Jifty::Script::Po' => 'Jifty',
'Jifty::Script::Schema' => 'Jifty',
'Jifty::Script::Script' => 'Jifty',
'Jifty::Script::Server' => 'Jifty',
'Jifty::Script::WriteCCJS' => 'Jifty',
'Jifty::Server' => 'Jifty',
'Jifty::Server::Fork' => 'Jifty',
'Jifty::Server::Fork::NetServer' => 'Jifty',
'Jifty::Server::Prefork' => 'Jifty',
'Jifty::Server::Prefork::NetServer' => 'Jifty',
'Jifty::Test' => 'Jifty',
'Jifty::Test::Dist' => 'Jifty',
'Jifty::Test::Email' => 'Jifty',
'Jifty::Test::WWW::Declare' => 'Jifty',
'Jifty::Test::WWW::Mechanize' => 'Jifty',
'Jifty::Test::WWW::Selenium' => 'Jifty',
'Jifty::Test::WWW::WebDriver' => 'Jifty',
'Jifty::TestServer' => 'Jifty',
'Jifty::TestServer::Apache' => 'Jifty',
'Jifty::TestServer::Inline' => 'Jifty',
'Jifty::Upgrade' => 'Jifty',
'Jifty::Upgrade::Internal' => 'Jifty',
'Jifty::Util' => 'Jifty',
'Jifty::View' => 'Jifty',
'Jifty::View::Declare' => 'Jifty',
'Jifty::View::Declare::BaseClass' => 'Jifty',
'Jifty::View::Declare::CRUD' => 'Jifty',
'Jifty::View::Declare::CoreTemplates' => 'Jifty',
'Jifty::View::Declare::Handler' => 'Jifty',
'Jifty::View::Declare::Helpers' => 'Jifty',
'Jifty::View::Declare::Page' => 'Jifty',
'Jifty::View::Mason::Halo' => 'Jifty',
'Jifty::View::Mason::Handler' => 'Jifty',
'Jifty::View::Mason::Request' => 'Jifty',
'Jifty::View::Static::Handler' => 'Jifty',
'Jifty::Web' => 'Jifty',
'Jifty::Web::FileUpload' => 'Jifty',
'Jifty::Web::Form' => 'Jifty',
'Jifty::Web::Form::Clickable' => 'Jifty',
'Jifty::Web::Form::Element' => 'Jifty',
'Jifty::Web::Form::Field' => 'Jifty',
'Jifty::Web::Form::Field::Button' => 'Jifty',
'Jifty::Web::Form::Field::Checkbox' => 'Jifty',
'Jifty::Web::Form::Field::Checkboxes' => 'Jifty',
'Jifty::Web::Form::Field::Collection' => 'Jifty',
'Jifty::Web::Form::Field::Combobox' => 'Jifty',
'Jifty::Web::Form::Field::Date' => 'Jifty',
'Jifty::Web::Form::Field::DateTime' => 'Jifty',
'Jifty::Web::Form::Field::Hidden' => 'Jifty',
'Jifty::Web::Form::Field::InlineButton' => 'Jifty',
'Jifty::Web::Form::Field::OrderedList' => 'Jifty',
'Jifty::Web::Form::Field::Password' => 'Jifty',
'Jifty::Web::Form::Field::Radio' => 'Jifty',
'Jifty::Web::Form::Field::ResetButton' => 'Jifty',
'Jifty::Web::Form::Field::Select' => 'Jifty',
'Jifty::Web::Form::Field::Text' => 'Jifty',
'Jifty::Web::Form::Field::Textarea' => 'Jifty',
'Jifty::Web::Form::Field::Time' => 'Jifty',
'Jifty::Web::Form::Field::Unrendered' => 'Jifty',
'Jifty::Web::Form::Field::Upload' => 'Jifty',
'Jifty::Web::Form::Field::Uploads' => 'Jifty',
'Jifty::Web::Form::Link' => 'Jifty',
'Jifty::Web::Menu' => 'Jifty',
'Jifty::Web::PageRegion' => 'Jifty',
'Jifty::Web::Session' => 'Jifty',
'Jifty::Web::Session::ApacheSession' => 'Jifty',
'Jifty::Web::Session::ClientSide' => 'Jifty',
'Jifty::Web::Session::JDBI' => 'Jifty',
'Jifty::Web::Session::None' => 'Jifty',
'Jifty::YAML' => 'Jifty',
'Kelp' => 'Kelp',
'Kelp::Base' => 'Kelp',
'Kelp::Context' => 'Kelp',
'Kelp::Exception' => 'Kelp',
'Kelp::Generator' => 'Kelp',
'Kelp::Less' => 'Kelp',
'Kelp::Middleware' => 'Kelp',
'Kelp::Module' => 'Kelp',
'Kelp::Module::Config' => 'Kelp',
'Kelp::Module::Config::Less' => 'Kelp',
'Kelp::Module::Config::Null' => 'Kelp',
'Kelp::Module::Config::Sandbox' => 'Kelp',
'Kelp::Module::Encoder' => 'Kelp',
'Kelp::Module::JSON' => 'Kelp',
'Kelp::Module::Logger' => 'Kelp',
'Kelp::Module::Logger::Simple' => 'Kelp',
'Kelp::Module::Null' => 'Kelp',
'Kelp::Module::Routes' => 'Kelp',
'Kelp::Module::Template' => 'Kelp',
'Kelp::Module::Template::Null' => 'Kelp',
'Kelp::Request' => 'Kelp',
'Kelp::Response' => 'Kelp',
'Kelp::Routes' => 'Kelp',
'Kelp::Routes::Controller' => 'Kelp',
'Kelp::Routes::Location' => 'Kelp',
'Kelp::Routes::Pattern' => 'Kelp',
'Kelp::Template' => 'Kelp',
'Kelp::Test' => 'Kelp',
'Kelp::Test::CookieJar' => 'Kelp',
'Kelp::Util' => 'Kelp',
'Kossy' => 'Kossy',
'Kossy::Assets' => 'Kossy',
'Kossy::BodyParser' => 'Kossy',
'Kossy::BodyParser::JSON' => 'Kossy',
'Kossy::BodyParser::MultiPart' => 'Kossy',
'Kossy::BodyParser::OctetStream' => 'Kossy',
'Kossy::BodyParser::UrlEncoded' => 'Kossy',
'Kossy::Connection' => 'Kossy',
'Kossy::Exception' => 'Kossy',
'Kossy::Request' => 'Kossy',
'Kossy::Response' => 'Kossy',
'LRUCache' => 'GBrowse',
'LWP' => 'libwww-perl',
'LWP::Authen::Basic' => 'libwww-perl',
'LWP::Authen::Digest' => 'libwww-perl',
'LWP::Authen::Ntlm' => 'libwww-perl',
'LWP::ConnCache' => 'libwww-perl',
'LWP::Debug' => 'libwww-perl',
'LWP::Debug::TraceHTTP' => 'libwww-perl',
'LWP::DebugFile' => 'libwww-perl',
'LWP::MemberMixin' => 'libwww-perl',
'LWP::Protocol' => 'libwww-perl',
'LWP::Protocol::Net::Curl' => 'LWP-Protocol-Net-Curl',
'LWP::Protocol::cpan' => 'libwww-perl',
'LWP::Protocol::data' => 'libwww-perl',
'LWP::Protocol::file' => 'libwww-perl',
'LWP::Protocol::ftp' => 'libwww-perl',
'LWP::Protocol::gopher' => 'libwww-perl',
'LWP::Protocol::http' => 'libwww-perl',
'LWP::Protocol::https' => 'LWP-Protocol-https',
'LWP::Protocol::https::Socket' => 'LWP-Protocol-https',
'LWP::Protocol::ldap' => 'perl-ldap',
'LWP::Protocol::ldapi' => 'perl-ldap',
'LWP::Protocol::ldaps' => 'perl-ldap',
'LWP::Protocol::loopback' => 'libwww-perl',
'LWP::Protocol::mailto' => 'libwww-perl',
'LWP::Protocol::nntp' => 'libwww-perl',
'LWP::Protocol::nogo' => 'libwww-perl',
'LWP::RobotUA' => 'libwww-perl',
'LWP::Simple' => 'libwww-perl',
'LWP::UserAgent' => 'libwww-perl',
'LWP::UserAgent::AtomClient' => 'XML-Atom',
'Legacy::DB::SyntenyBlock' => 'GBrowse',
'Legacy::DB::SyntenyIO' => 'GBrowse',
'Legacy::Graphics::Browser' => 'GBrowse',
'Legacy::Graphics::Browser::I18n' => 'GBrowse',
'Legacy::Graphics::Browser::PageSettings' => 'GBrowse',
'Legacy::Graphics::Browser::Synteny' => 'GBrowse',
'Legacy::Graphics::Browser::Util' => 'GBrowse',
'Legacy::Graphics::BrowserConfig' => 'GBrowse',
'Lemonldap::NG::Portal' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::2F::Engines::Default' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::2F::Ext2F' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::2F::Mail2F' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::2F::Okta' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::2F::Password' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::2F::REST' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::2F::Radius' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::2F::Register::Base' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::2F::Register::Generic' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::2F::Register::Password' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::2F::Register::TOTP' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::2F::Register::U2F' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::2F::Register::WebAuthn' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::2F::Register::Yubikey' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::2F::TOTP' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::2F::U2F' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::2F::UTOTP' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::2F::WebAuthn' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::2F::Yubikey' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::AD' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::Apache' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::CAS' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::Choice' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::Combination' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::Custom' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::DBI' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::Demo' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::Facebook' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::GPG' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::GitHub' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::Kerberos' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::LDAP' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::LinkedIn' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::Null' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::OpenID' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::OpenIDConnect' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::PAM' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::Proxy' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::REST' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::Radius' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::Remote' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::SAML' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::SSL' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::Slave' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::Twitter' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::WebAuthn' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::WebID' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::_Ajax' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Auth::_WebForm' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::CDC' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Captcha::ReCaptcha' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Captcha::ReCaptcha3' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Captcha::SecurityImage' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::CertificateResetByMail::Custom' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::CertificateResetByMail::Demo' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::CertificateResetByMail::LDAP' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Issuer::CAS' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Issuer::Get' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Issuer::JitsiMeetTokens' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Issuer::OpenID' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Issuer::OpenIDConnect' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Issuer::SAML' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::2fDevices' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::CAS' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::Captcha' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::Choice' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::Code2F' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::Combination::UserLogger' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::CustomModule' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::DBI' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::LDAP' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::LazyLoadedConfiguration' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::Net::LDAP' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::Notifications::JSON' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::Notifications::XML' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::OIDCTokenExchange' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::Okta' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::OneTimeToken' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::OpenID::SREG' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::OpenID::Server' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::OpenIDConnect' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::OtherSessions' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::OverConf' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::REST' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::RESTProxy' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::Radius' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::Remote' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::SAML' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::SMTP' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::SOAPProxy' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::Slave' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::U2F' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::WebAuthn' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::Wrapper' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Lib::_tokenRule' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Main' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Main::Auth' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Main::Constants' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Main::Display' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Main::Init' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Main::Issuer' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Main::Menu' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Main::Plugin' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Main::Plugins' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Main::Process' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Main::Request' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Main::Run' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Main::SecondFactor' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Main::UserDB' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::MenuTab' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Password::AD' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Password::Base' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Password::Choice' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Password::Combination' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Password::Custom' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Password::DBI' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Password::Demo' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Password::LDAP' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Password::Null' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Password::REST' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::AdaptativeAuthenticationLevel' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::AuthOidcPkce' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::AutoSignin' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::BasePasswordPolicy' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::BruteForceProtection' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::CDA' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::CertificateResetByMail' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::CheckDevOps' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::CheckEntropy' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::CheckHIBP' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::CheckState' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::CheckUser' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::ContextSwitching' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::CrowdSec' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::DecryptValue' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::FindUser' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::ForceAuthn' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::GlobalLogout' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::GrantSession' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::History' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::Impersonation' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::InitializePasswordReset' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::LocationDetect' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::MailPasswordReset' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::NewLocationWarning' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::Notifications' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::OIDCInternalTokenExchange' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::PublicPages' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::RESTServer' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::Refresh' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::Register' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::RememberAuthChoice' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::SOAPServer' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::SamlFederation' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::SingleSession' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::Status' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::StayConnected' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::TrustedBrowser' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Plugins::Upgrade' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Register::AD' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Register::Base' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Register::Custom' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Register::Demo' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::Register::LDAP' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::UserDB::AD' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::UserDB::CAS' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::UserDB::Choice' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::UserDB::Combination' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::UserDB::Custom' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::UserDB::DBI' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::UserDB::Demo' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::UserDB::Facebook' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::UserDB::LDAP' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::UserDB::Null' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::UserDB::OpenID' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::UserDB::OpenIDConnect' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::UserDB::Proxy' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::UserDB::REST' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::UserDB::Remote' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::UserDB::SAML' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::UserDB::Slave' => 'Lemonldap-NG-Portal',
'Lemonldap::NG::Portal::UserDB::WebID' => 'Lemonldap-NG-Portal',
'Locale::Maketext' => 'Locale-Maketext',
'Locale::Maketext::Guts' => 'Locale-Maketext',
'Locale::Maketext::GutsLoader' => 'Locale-Maketext',
'Log::Any' => 'Log-Any',
'Log::Any::Adapter' => 'Log-Any',
'Log::Any::Adapter::Base' => 'Log-Any',
'Log::Any::Adapter::Capture' => 'Log-Any',
'Log::Any::Adapter::Core' => 'Log-Any',
'Log::Any::Adapter::File' => 'Log-Any',
'Log::Any::Adapter::Multiplex' => 'Log-Any',
'Log::Any::Adapter::Null' => 'Log-Any',
'Log::Any::Adapter::Stderr' => 'Log-Any',
'Log::Any::Adapter::Stdout' => 'Log-Any',
'Log::Any::Adapter::Syslog' => 'Log-Any',
'Log::Any::Adapter::Test' => 'Log-Any',
'Log::Any::Adapter::Util' => 'Log-Any',
'Log::Any::Manager' => 'Log-Any',
'Log::Any::Proxy' => 'Log-Any',
'Log::Any::Proxy::Null' => 'Log-Any',
'Log::Any::Proxy::Test' => 'Log-Any',
'Log::Any::Proxy::WithStackTrace' => 'Log-Any',
'Log::Any::Test' => 'Log-Any',
'MARC::File::XML' => 'MARC-File-XML',
'MDK::Common' => 'MDK-Common',
'MDK::Common::DataStructure' => 'MDK-Common',
'MDK::Common::File' => 'MDK-Common',
'MDK::Common::Func' => 'MDK-Common',
'MDK::Common::Math' => 'MDK-Common',
'MDK::Common::String' => 'MDK-Common',
'MDK::Common::System' => 'MDK-Common',
'MDK::Common::Various' => 'MDK-Common',
'MHonArc::Char' => 'MHonArc',
'MHonArc::Char::JP' => 'MHonArc',
'MHonArc::Char::KR' => 'MHonArc',
'MHonArc::CharEnt' => 'MHonArc',
'MHonArc::CharEnt::AppleArabic' => 'MHonArc',
'MHonArc::CharEnt::AppleCenteuro' => 'MHonArc',
'MHonArc::CharEnt::AppleCroatian' => 'MHonArc',
'MHonArc::CharEnt::AppleCyrillic' => 'MHonArc',
'MHonArc::CharEnt::AppleGreek' => 'MHonArc',
'MHonArc::CharEnt::AppleHebrew' => 'MHonArc',
'MHonArc::CharEnt::AppleIceland' => 'MHonArc',
'MHonArc::CharEnt::AppleRoman' => 'MHonArc',
'MHonArc::CharEnt::AppleRomanian' => 'MHonArc',
'MHonArc::CharEnt::AppleThai' => 'MHonArc',
'MHonArc::CharEnt::AppleTurkish' => 'MHonArc',
'MHonArc::CharEnt::BIG5_ETEN' => 'MHonArc',
'MHonArc::CharEnt::BIG5_HKSCS' => 'MHonArc',
'MHonArc::CharEnt::CP1250' => 'MHonArc',
'MHonArc::CharEnt::CP1251' => 'MHonArc',
'MHonArc::CharEnt::CP1252' => 'MHonArc',
'MHonArc::CharEnt::CP1253' => 'MHonArc',
'MHonArc::CharEnt::CP1254' => 'MHonArc',
'MHonArc::CharEnt::CP1255' => 'MHonArc',
'MHonArc::CharEnt::CP1256' => 'MHonArc',
'MHonArc::CharEnt::CP1257' => 'MHonArc',
'MHonArc::CharEnt::CP1258' => 'MHonArc',
'MHonArc::CharEnt::CP866' => 'MHonArc',
'MHonArc::CharEnt::CP932' => 'MHonArc',
'MHonArc::CharEnt::CP936' => 'MHonArc',
'MHonArc::CharEnt::CP949' => 'MHonArc',
'MHonArc::CharEnt::CP950' => 'MHonArc',
'MHonArc::CharEnt::EUC_JP' => 'MHonArc',
'MHonArc::CharEnt::GB2312' => 'MHonArc',
'MHonArc::CharEnt::GOST19768_87' => 'MHonArc',
'MHonArc::CharEnt::HP_ROMAN8' => 'MHonArc',
'MHonArc::CharEnt::ISO8859_1' => 'MHonArc',
'MHonArc::CharEnt::ISO8859_10' => 'MHonArc',
'MHonArc::CharEnt::ISO8859_11' => 'MHonArc',
'MHonArc::CharEnt::ISO8859_13' => 'MHonArc',
'MHonArc::CharEnt::ISO8859_14' => 'MHonArc',
'MHonArc::CharEnt::ISO8859_15' => 'MHonArc',
'MHonArc::CharEnt::ISO8859_16' => 'MHonArc',
'MHonArc::CharEnt::ISO8859_2' => 'MHonArc',
'MHonArc::CharEnt::ISO8859_3' => 'MHonArc',
'MHonArc::CharEnt::ISO8859_4' => 'MHonArc',
'MHonArc::CharEnt::ISO8859_5' => 'MHonArc',
'MHonArc::CharEnt::ISO8859_6' => 'MHonArc',
'MHonArc::CharEnt::ISO8859_7' => 'MHonArc',
'MHonArc::CharEnt::ISO8859_8' => 'MHonArc',
'MHonArc::CharEnt::ISO8859_9' => 'MHonArc',
'MHonArc::CharEnt::KOI8_A' => 'MHonArc',
'MHonArc::CharEnt::KOI8_B' => 'MHonArc',
'MHonArc::CharEnt::KOI8_E' => 'MHonArc',
'MHonArc::CharEnt::KOI8_F' => 'MHonArc',
'MHonArc::CharEnt::KOI8_R' => 'MHonArc',
'MHonArc::CharEnt::KOI8_U' => 'MHonArc',
'MHonArc::CharEnt::KOI_0' => 'MHonArc',
'MHonArc::CharEnt::KOI_7' => 'MHonArc',
'MHonArc::CharEnt::VISCII' => 'MHonArc',
'MHonArc::CharMaps' => 'MHonArc',
'MHonArc::Encode' => 'MHonArc',
'MHonArc::RFC822' => 'MHonArc',
'MHonArc::UTF8' => 'MHonArc',
'MHonArc::UTF8::AppleArabic' => 'MHonArc',
'MHonArc::UTF8::AppleCenteuro' => 'MHonArc',
'MHonArc::UTF8::AppleCroatian' => 'MHonArc',
'MHonArc::UTF8::AppleCyrillic' => 'MHonArc',
'MHonArc::UTF8::AppleGreek' => 'MHonArc',
'MHonArc::UTF8::AppleHebrew' => 'MHonArc',
'MHonArc::UTF8::AppleIceland' => 'MHonArc',
'MHonArc::UTF8::AppleRoman' => 'MHonArc',
'MHonArc::UTF8::AppleRomanian' => 'MHonArc',
'MHonArc::UTF8::AppleThai' => 'MHonArc',
'MHonArc::UTF8::AppleTurkish' => 'MHonArc',
'MHonArc::UTF8::BIG5_ETEN' => 'MHonArc',
'MHonArc::UTF8::BIG5_HKSCS' => 'MHonArc',
'MHonArc::UTF8::CP1250' => 'MHonArc',
'MHonArc::UTF8::CP1251' => 'MHonArc',
'MHonArc::UTF8::CP1252' => 'MHonArc',
'MHonArc::UTF8::CP1253' => 'MHonArc',
'MHonArc::UTF8::CP1254' => 'MHonArc',
'MHonArc::UTF8::CP1255' => 'MHonArc',
'MHonArc::UTF8::CP1256' => 'MHonArc',
'MHonArc::UTF8::CP1257' => 'MHonArc',
'MHonArc::UTF8::CP1258' => 'MHonArc',
'MHonArc::UTF8::CP866' => 'MHonArc',
'MHonArc::UTF8::CP932' => 'MHonArc',
'MHonArc::UTF8::CP936' => 'MHonArc',
'MHonArc::UTF8::CP949' => 'MHonArc',
'MHonArc::UTF8::CP950' => 'MHonArc',
'MHonArc::UTF8::EUC_JP' => 'MHonArc',
'MHonArc::UTF8::Encode' => 'MHonArc',
'MHonArc::UTF8::GB2312' => 'MHonArc',
'MHonArc::UTF8::GOST19768_87' => 'MHonArc',
'MHonArc::UTF8::HP_ROMAN8' => 'MHonArc',
'MHonArc::UTF8::ISO8859_1' => 'MHonArc',
'MHonArc::UTF8::ISO8859_10' => 'MHonArc',
'MHonArc::UTF8::ISO8859_11' => 'MHonArc',
'MHonArc::UTF8::ISO8859_13' => 'MHonArc',
'MHonArc::UTF8::ISO8859_14' => 'MHonArc',
'MHonArc::UTF8::ISO8859_15' => 'MHonArc',
'MHonArc::UTF8::ISO8859_16' => 'MHonArc',
'MHonArc::UTF8::ISO8859_2' => 'MHonArc',
'MHonArc::UTF8::ISO8859_3' => 'MHonArc',
'MHonArc::UTF8::ISO8859_4' => 'MHonArc',
'MHonArc::UTF8::ISO8859_5' => 'MHonArc',
'MHonArc::UTF8::ISO8859_6' => 'MHonArc',
'MHonArc::UTF8::ISO8859_7' => 'MHonArc',
'MHonArc::UTF8::ISO8859_8' => 'MHonArc',
'MHonArc::UTF8::ISO8859_9' => 'MHonArc',
'MHonArc::UTF8::KOI8_A' => 'MHonArc',
'MHonArc::UTF8::KOI8_B' => 'MHonArc',
'MHonArc::UTF8::KOI8_E' => 'MHonArc',
'MHonArc::UTF8::KOI8_F' => 'MHonArc',
'MHonArc::UTF8::KOI8_R' => 'MHonArc',
'MHonArc::UTF8::KOI8_U' => 'MHonArc',
'MHonArc::UTF8::KOI_0' => 'MHonArc',
'MHonArc::UTF8::KOI_7' => 'MHonArc',
'MHonArc::UTF8::MapUTF8' => 'MHonArc',
'MHonArc::UTF8::MhaEncode' => 'MHonArc',
'MHonArc::UTF8::VISCII' => 'MHonArc',
'MIME::Body' => 'MIME-tools',
'MIME::Body::File' => 'MIME-tools',
'MIME::Body::InCore' => 'MIME-tools',
'MIME::Body::Scalar' => 'MIME-tools',
'MIME::Decoder' => 'MIME-tools',
'MIME::Decoder::Base64' => 'MIME-tools',
'MIME::Decoder::BinHex' => 'MIME-tools',
'MIME::Decoder::Binary' => 'MIME-tools',
'MIME::Decoder::Gzip64' => 'MIME-tools',
'MIME::Decoder::NBit' => 'MIME-tools',
'MIME::Decoder::QuotedPrint' => 'MIME-tools',
'MIME::Decoder::UU' => 'MIME-tools',
'MIME::Entity' => 'MIME-tools',
'MIME::Field::ConTraEnc' => 'MIME-tools',
'MIME::Field::ContDisp' => 'MIME-tools',
'MIME::Field::ContType' => 'MIME-tools',
'MIME::Field::ParamVal' => 'MIME-tools',
'MIME::Head' => 'MIME-tools',
'MIME::Parser' => 'MIME-tools',
'MIME::Parser::FileInto' => 'MIME-tools',
'MIME::Parser::FileUnder' => 'MIME-tools',
'MIME::Parser::Filer' => 'MIME-tools',
'MIME::Parser::InnerFile' => 'MIME-tools',
'MIME::Parser::Reader' => 'MIME-tools',
'MIME::Parser::Results' => 'MIME-tools',
'MIME::ToolUtils' => 'MIME-tools',
'MIME::Tools' => 'MIME-tools',
'MIME::WordDecoder' => 'MIME-tools',
'MIME::WordDecoder::ISO_8859' => 'MIME-tools',
'MIME::WordDecoder::US_ASCII' => 'MIME-tools',
'MIME::WordDecoder::UTF_8' => 'MIME-tools',
'MIME::Words' => 'MIME-tools',
'MM' => 'ExtUtils-MakeMaker',
'MY' => 'ExtUtils-MakeMaker',
'Mail::Address' => 'MailTools',
'Mail::Audit' => 'Mail-Audit',
'Mail::Audit::KillDups' => 'Mail-Audit',
'Mail::Audit::MAPS' => 'Mail-Audit',
'Mail::Audit::MailInternet' => 'Mail-Audit',
'Mail::Audit::MimeEntity' => 'Mail-Audit',
'Mail::Audit::Util::Tempdir' => 'Mail-Audit',
'Mail::Audit::Vacation' => 'Mail-Audit',
'Mail::Cap' => 'MailTools',
'Mail::Field' => 'MailTools',
'Mail::Field::AddrList' => 'MailTools',
'Mail::Field::Date' => 'MailTools',
'Mail::Field::Generic' => 'MailTools',
'Mail::Filter' => 'MailTools',
'Mail::Header' => 'MailTools',
'Mail::Internet' => 'MailTools',
'Mail::Mailer' => 'MailTools',
'Mail::Mailer::qmail' => 'MailTools',
'Mail::Mailer::rfc822' => 'MailTools',
'Mail::Mailer::sendmail' => 'MailTools',
'Mail::Mailer::smtp' => 'MailTools',
'Mail::Mailer::smtp::pipe' => 'MailTools',
'Mail::Mailer::smtps' => 'MailTools',
'Mail::Mailer::smtps::pipe' => 'MailTools',
'Mail::Mailer::testfile' => 'MailTools',
'Mail::Mailer::testfile::pipe' => 'MailTools',
'Mail::Send' => 'MailTools',
'Mail::Util' => 'MailTools',
'MailTools' => 'MailTools',
'Maintainers' => 'perl',
'Math::BigInt::LTM' => 'CryptX',
'ModPerl::BuildMM' => 'mod_perl',
'ModPerl::BuildOptions' => 'mod_perl',
'ModPerl::CScan' => 'mod_perl',
'ModPerl::Code' => 'mod_perl',
'ModPerl::Config' => 'mod_perl',
'ModPerl::FunctionMap' => 'mod_perl',
'ModPerl::FunctionTable' => 'mod_perl',
'ModPerl::Global' => 'mod_perl',
'ModPerl::InterpPool' => 'mod_perl',
'ModPerl::Interpreter' => 'mod_perl',
'ModPerl::MM' => 'mod_perl',
'ModPerl::Manifest' => 'mod_perl',
'ModPerl::MapBase' => 'mod_perl',
'ModPerl::MapUtil' => 'mod_perl',
'ModPerl::MethodLookup' => 'mod_perl',
'ModPerl::ParseSource' => 'mod_perl',
'ModPerl::PerlRun' => 'mod_perl',
'ModPerl::PerlRunPrefork' => 'mod_perl',
'ModPerl::Registry' => 'mod_perl',
'ModPerl::RegistryBB' => 'mod_perl',
'ModPerl::RegistryCooker' => 'mod_perl',
'ModPerl::RegistryLoader' => 'mod_perl',
'ModPerl::RegistryPrefork' => 'mod_perl',
'ModPerl::StructureMap' => 'mod_perl',
'ModPerl::TestConfig' => 'mod_perl',
'ModPerl::TestReport' => 'mod_perl',
'ModPerl::TestRun' => 'mod_perl',
'ModPerl::TiPool' => 'mod_perl',
'ModPerl::TiPoolConfig' => 'mod_perl',
'ModPerl::TypeMap' => 'mod_perl',
'ModPerl::Util' => 'mod_perl',
'ModPerl::WrapXS' => 'mod_perl',
'Module::Load::Conditional' => 'Module-Load-Conditional',
'Module::Metadata' => 'Module-Metadata',
'Module::Provision' => 'Module-Provision',
'Module::Provision::Base' => 'Module-Provision',
'Module::Provision::Config' => 'Module-Provision',
'Module::Provision::MetaData' => 'Module-Provision',
'Module::Provision::TraitFor::AddingFiles' => 'Module-Provision',
'Module::Provision::TraitFor::Badges' => 'Module-Provision',
'Module::Provision::TraitFor::CPANDistributions' => 'Module-Provision',
'Module::Provision::TraitFor::CreatingDistributions' => 'Module-Provision',
'Module::Provision::TraitFor::EnvControl' => 'Module-Provision',
'Module::Provision::TraitFor::PrereqDifferences' => 'Module-Provision',
'Module::Provision::TraitFor::Rendering' => 'Module-Provision',
'Module::Provision::TraitFor::UpdatingContent' => 'Module-Provision',
'Module::Provision::TraitFor::VCS' => 'Module-Provision',
'Module::ScanDeps' => 'Module-ScanDeps',
'Module::Signature' => 'Module-Signature',
'Mojo' => 'Mojolicious',
'Mojo::Asset' => 'Mojolicious',
'Mojo::Asset::File' => 'Mojolicious',
'Mojo::Asset::Memory' => 'Mojolicious',
'Mojo::Base' => 'Mojolicious',
'Mojo::BaseUtil' => 'Mojolicious',
'Mojo::ByteStream' => 'Mojolicious',
'Mojo::Cache' => 'Mojolicious',
'Mojo::Collection' => 'Mojolicious',
'Mojo::Collection::Role::Extra' => 'Mojo-DOM-Role-Analyzer',
'Mojo::Content' => 'Mojolicious',
'Mojo::Content::MultiPart' => 'Mojolicious',
'Mojo::Content::Single' => 'Mojolicious',
'Mojo::Cookie' => 'Mojolicious',
'Mojo::Cookie::Request' => 'Mojolicious',
'Mojo::Cookie::Response' => 'Mojolicious',
'Mojo::DOM' => 'Mojolicious',
'Mojo::DOM::CSS' => 'Mojolicious',
'Mojo::DOM::HTML' => 'Mojolicious',
'Mojo::DOM::Role::Analyzer' => 'Mojo-DOM-Role-Analyzer',
'Mojo::Date' => 'Mojolicious',
'Mojo::DynamicMethods' => 'Mojolicious',
'Mojo::EventEmitter' => 'Mojolicious',
'Mojo::Exception' => 'Mojolicious',
'Mojo::Exception::_Guard' => 'Mojolicious',
'Mojo::File' => 'Mojolicious',
'Mojo::Headers' => 'Mojolicious',
'Mojo::HelloWorld' => 'Mojolicious',
'Mojo::Home' => 'Mojolicious',
'Mojo::IOLoop' => 'Mojolicious',
'Mojo::IOLoop::Client' => 'Mojolicious',
'Mojo::IOLoop::Server' => 'Mojolicious',
'Mojo::IOLoop::Stream' => 'Mojolicious',
'Mojo::IOLoop::Subprocess' => 'Mojolicious',
'Mojo::IOLoop::TLS' => 'Mojolicious',
'Mojo::JSON' => 'Mojolicious',
'Mojo::JSON::Pointer' => 'Mojolicious',
'Mojo::Loader' => 'Mojolicious',
'Mojo::Log' => 'Mojolicious',
'Mojo::Message' => 'Mojolicious',
'Mojo::Message::Request' => 'Mojolicious',
'Mojo::Message::Response' => 'Mojolicious',
'Mojo::Parameters' => 'Mojolicious',
'Mojo::Path' => 'Mojolicious',
'Mojo::Promise' => 'Mojolicious',
'Mojo::Reactor' => 'Mojolicious',
'Mojo::Reactor::EV' => 'Mojolicious',
'Mojo::Reactor::Poll' => 'Mojolicious',
'Mojo::Server' => 'Mojolicious',
'Mojo::Server::CGI' => 'Mojolicious',
'Mojo::Server::Daemon' => 'Mojolicious',
'Mojo::Server::Hypnotoad' => 'Mojolicious',
'Mojo::Server::Morbo' => 'Mojolicious',
'Mojo::Server::Morbo::Backend' => 'Mojolicious',
'Mojo::Server::Morbo::Backend::Poll' => 'Mojolicious',
'Mojo::Server::PSGI' => 'Mojolicious',
'Mojo::Server::PSGI::_IO' => 'Mojolicious',
'Mojo::Server::Prefork' => 'Mojolicious',
'Mojo::Template' => 'Mojolicious',
'Mojo::Transaction' => 'Mojolicious',
'Mojo::Transaction::HTTP' => 'Mojolicious',
'Mojo::Transaction::WebSocket' => 'Mojolicious',
'Mojo::URL' => 'Mojolicious',
'Mojo::Upload' => 'Mojolicious',
'Mojo::UserAgent' => 'Mojolicious',
'Mojo::UserAgent::CookieJar' => 'Mojolicious',
'Mojo::UserAgent::Proxy' => 'Mojolicious',
'Mojo::UserAgent::Server' => 'Mojolicious',
'Mojo::UserAgent::Transactor' => 'Mojolicious',
'Mojo::Util' => 'Mojolicious',
'Mojo::WebSocket' => 'Mojolicious',
'MojoMojo' => 'MojoMojo',
'MojoMojo::Controller::Admin' => 'MojoMojo',
'MojoMojo::Controller::Attachment' => 'MojoMojo',
'MojoMojo::Controller::Comment' => 'MojoMojo',
'MojoMojo::Controller::Export' => 'MojoMojo',
'MojoMojo::Controller::Gallery' => 'MojoMojo',
'MojoMojo::Controller::Image' => 'MojoMojo',
'MojoMojo::Controller::JSON' => 'MojoMojo',
'MojoMojo::Controller::Journal' => 'MojoMojo',
'MojoMojo::Controller::Jsrpc' => 'MojoMojo',
'MojoMojo::Controller::Page' => 'MojoMojo',
'MojoMojo::Controller::PageAdmin' => 'MojoMojo',
'MojoMojo::Controller::Root' => 'MojoMojo',
'MojoMojo::Controller::Tag' => 'MojoMojo',
'MojoMojo::Controller::User' => 'MojoMojo',
'MojoMojo::Declaw' => 'MojoMojo',
'MojoMojo::Extension' => 'MojoMojo',
'MojoMojo::Extensions::Counter' => 'MojoMojo',
'MojoMojo::Formatter' => 'MojoMojo',
'MojoMojo::Formatter::Amazon' => 'MojoMojo',
'MojoMojo::Formatter::CPANHyperlink' => 'MojoMojo',
'MojoMojo::Formatter::Comment' => 'MojoMojo',
'MojoMojo::Formatter::Defang' => 'MojoMojo',
'MojoMojo::Formatter::Dir' => 'MojoMojo',
'MojoMojo::Formatter::DocBook' => 'MojoMojo',
'MojoMojo::Formatter::DocBook::Colorize' => 'MojoMojo',
'MojoMojo::Formatter::Emote' => 'MojoMojo',
'MojoMojo::Formatter::File' => 'MojoMojo',
'MojoMojo::Formatter::File::DocBook' => 'MojoMojo',
'MojoMojo::Formatter::File::Image' => 'MojoMojo',
'MojoMojo::Formatter::File::Pod' => 'MojoMojo',
'MojoMojo::Formatter::File::Test' => 'MojoMojo',
'MojoMojo::Formatter::File::Text' => 'MojoMojo',
'MojoMojo::Formatter::Gist' => 'MojoMojo',
'MojoMojo::Formatter::GoogleCalendar' => 'MojoMojo',
'MojoMojo::Formatter::GoogleSearch' => 'MojoMojo',
'MojoMojo::Formatter::IDLink' => 'MojoMojo',
'MojoMojo::Formatter::IRCLog' => 'MojoMojo',
'MojoMojo::Formatter::Include' => 'MojoMojo',
'MojoMojo::Formatter::Main' => 'MojoMojo',
'MojoMojo::Formatter::Markdown' => 'MojoMojo',
'MojoMojo::Formatter::Pod' => 'MojoMojo',
'MojoMojo::Formatter::Pod::Simple::HTML' => 'MojoMojo',
'MojoMojo::Formatter::RSS' => 'MojoMojo',
'MojoMojo::Formatter::Redirect' => 'MojoMojo',
'MojoMojo::Formatter::SyntaxHighlight' => 'MojoMojo',
'MojoMojo::Formatter::TOC' => 'MojoMojo',
'MojoMojo::Formatter::Text' => 'MojoMojo',
'MojoMojo::Formatter::Textile' => 'MojoMojo',
'MojoMojo::Formatter::Wiki' => 'MojoMojo',
'MojoMojo::Formatter::WikipediaLink' => 'MojoMojo',
'MojoMojo::Formatter::YouTube' => 'MojoMojo',
'MojoMojo::I18N' => 'MojoMojo',
'MojoMojo::Model::DBIC' => 'MojoMojo',
'MojoMojo::Model::Search' => 'MojoMojo',
'MojoMojo::Model::Themes' => 'MojoMojo',
'MojoMojo::Schema' => 'MojoMojo',
'MojoMojo::Schema::Base::Result' => 'MojoMojo',
'MojoMojo::Schema::Base::ResultSet' => 'MojoMojo',
'MojoMojo::Schema::Result::Attachment' => 'MojoMojo',
'MojoMojo::Schema::Result::Comment' => 'MojoMojo',
'MojoMojo::Schema::Result::Content' => 'MojoMojo',
'MojoMojo::Schema::Result::Entry' => 'MojoMojo',
'MojoMojo::Schema::Result::Journal' => 'MojoMojo',
'MojoMojo::Schema::Result::Link' => 'MojoMojo',
'MojoMojo::Schema::Result::Page' => 'MojoMojo',
'MojoMojo::Schema::Result::PageVersion' => 'MojoMojo',
'MojoMojo::Schema::Result::PathPermissions' => 'MojoMojo',
'MojoMojo::Schema::Result::Person' => 'MojoMojo',
'MojoMojo::Schema::Result::Photo' => 'MojoMojo',
'MojoMojo::Schema::Result::Preference' => 'MojoMojo',
'MojoMojo::Schema::Result::Role' => 'MojoMojo',
'MojoMojo::Schema::Result::RoleMember' => 'MojoMojo',
'MojoMojo::Schema::Result::RolePrivilege' => 'MojoMojo',
'MojoMojo::Schema::Result::Tag' => 'MojoMojo',
'MojoMojo::Schema::Result::WantedPage' => 'MojoMojo',
'MojoMojo::Schema::ResultSet::Attachment' => 'MojoMojo',
'MojoMojo::Schema::ResultSet::Content' => 'MojoMojo',
'MojoMojo::Schema::ResultSet::Page' => 'MojoMojo',
'MojoMojo::Schema::ResultSet::Person' => 'MojoMojo',
'MojoMojo::Schema::ResultSet::Role' => 'MojoMojo',
'MojoMojo::Schema::ResultSet::Tag' => 'MojoMojo',
'MojoMojo::View::Email' => 'MojoMojo',
'MojoMojo::View::JSON' => 'MojoMojo',
'MojoMojo::View::TT' => 'MojoMojo',
'MojoMojo::WordDiff' => 'MojoMojo',
'Mojolicious' => 'Mojolicious',
'Mojolicious::Command' => 'Mojolicious',
'Mojolicious::Command::Author::cpanify' => 'Mojolicious',
'Mojolicious::Command::Author::generate' => 'Mojolicious',
'Mojolicious::Command::Author::generate::app' => 'Mojolicious',
'Mojolicious::Command::Author::generate::dockerfile' => 'Mojolicious',
'Mojolicious::Command::Author::generate::lite_app' => 'Mojolicious',
'Mojolicious::Command::Author::generate::makefile' => 'Mojolicious',
'Mojolicious::Command::Author::generate::plugin' => 'Mojolicious',
'Mojolicious::Command::Author::inflate' => 'Mojolicious',
'Mojolicious::Command::cgi' => 'Mojolicious',
'Mojolicious::Command::cpanify' => 'Mojolicious',
'Mojolicious::Command::daemon' => 'Mojolicious',
'Mojolicious::Command::eval' => 'Mojolicious',
'Mojolicious::Command::generate' => 'Mojolicious',
'Mojolicious::Command::generate::app' => 'Mojolicious',
'Mojolicious::Command::generate::lite_app' => 'Mojolicious',
'Mojolicious::Command::generate::makefile' => 'Mojolicious',
'Mojolicious::Command::generate::plugin' => 'Mojolicious',
'Mojolicious::Command::get' => 'Mojolicious',
'Mojolicious::Command::inflate' => 'Mojolicious',
'Mojolicious::Command::prefork' => 'Mojolicious',
'Mojolicious::Command::psgi' => 'Mojolicious',
'Mojolicious::Command::routes' => 'Mojolicious',
'Mojolicious::Command::test' => 'Mojolicious',
'Mojolicious::Command::version' => 'Mojolicious',
'Mojolicious::Commands' => 'Mojolicious',
'Mojolicious::Controller' => 'Mojolicious',
'Mojolicious::Lite' => 'Mojolicious',
'Mojolicious::Plugin' => 'Mojolicious',
'Mojolicious::Plugin::Config' => 'Mojolicious',
'Mojolicious::Plugin::Config::Sandbox' => 'Mojolicious',
'Mojolicious::Plugin::DefaultHelpers' => 'Mojolicious',
'Mojolicious::Plugin::EPLRenderer' => 'Mojolicious',
'Mojolicious::Plugin::EPRenderer' => 'Mojolicious',
'Mojolicious::Plugin::HeaderCondition' => 'Mojolicious',
'Mojolicious::Plugin::JSONConfig' => 'Mojolicious',
'Mojolicious::Plugin::Mount' => 'Mojolicious',
'Mojolicious::Plugin::NotYAMLConfig' => 'Mojolicious',
'Mojolicious::Plugin::OAuth2' => 'Mojolicious-Plugin-OAuth2',
'Mojolicious::Plugin::OAuth2::Mock' => 'Mojolicious-Plugin-OAuth2',
'Mojolicious::Plugin::PODRenderer' => 'Mojolicious',
'Mojolicious::Plugin::TagHelpers' => 'Mojolicious',
'Mojolicious::Plugins' => 'Mojolicious',
'Mojolicious::Renderer' => 'Mojolicious',
'Mojolicious::Routes' => 'Mojolicious',
'Mojolicious::Routes::Match' => 'Mojolicious',
'Mojolicious::Routes::Pattern' => 'Mojolicious',
'Mojolicious::Routes::Route' => 'Mojolicious',
'Mojolicious::Sessions' => 'Mojolicious',
'Mojolicious::Static' => 'Mojolicious',
'Mojolicious::Types' => 'Mojolicious',
'Mojolicious::Validator' => 'Mojolicious',
'Mojolicious::Validator::Validation' => 'Mojolicious',
'Moped::Msg' => 'perl',
'Moxy' => 'Moxy',
'Moxy::Attribute::CarrierHook' => 'Moxy',
'Moxy::Component::Context' => 'Moxy',
'Moxy::Plugin' => 'Moxy',
'Moxy::Plugin::AuthorizationCutter' => 'Moxy',
'Moxy::Plugin::Bookmark' => 'Moxy',
'Moxy::Plugin::ControlPanel' => 'Moxy',
'Moxy::Plugin::CookieCutter' => 'Moxy',
'Moxy::Plugin::DisableTableTag' => 'Moxy',
'Moxy::Plugin::DisplayWidth' => 'Moxy',
'Moxy::Plugin::FlashUseImgTag' => 'Moxy',
'Moxy::Plugin::GPS' => 'Moxy',
'Moxy::Plugin::GPS::AirHPhone' => 'Moxy',
'Moxy::Plugin::GPS::DoCoMo' => 'Moxy',
'Moxy::Plugin::GPS::EZweb' => 'Moxy',
'Moxy::Plugin::GPS::ThirdForce' => 'Moxy',
'Moxy::Plugin::HTTPHeader' => 'Moxy',
'Moxy::Plugin::Hosts' => 'Moxy',
'Moxy::Plugin::LocationBar' => 'Moxy',
'Moxy::Plugin::OpenSocial' => 'Moxy',
'Moxy::Plugin::Pictogram' => 'Moxy',
'Moxy::Plugin::QRCode' => 'Moxy',
'Moxy::Plugin::RefererCutter' => 'Moxy',
'Moxy::Plugin::RelativeLocation' => 'Moxy',
'Moxy::Plugin::ResponseTime' => 'Moxy',
'Moxy::Plugin::Scrubber' => 'Moxy',
'Moxy::Plugin::ShowHTMLSource' => 'Moxy',
'Moxy::Plugin::ShowHTTPHeaders' => 'Moxy',
'Moxy::Plugin::Status::401' => 'Moxy',
'Moxy::Plugin::Status::404' => 'Moxy',
'Moxy::Plugin::Status::500' => 'Moxy',
'Moxy::Plugin::StripScripts' => 'Moxy',
'Moxy::Plugin::UserAgentSwitcher' => 'Moxy',
'Moxy::Plugin::UserID' => 'Moxy',
'Moxy::Plugin::XMLisHTML' => 'Moxy',
'Moxy::Request' => 'Moxy',
'Moxy::Session::State::BasicAuth' => 'Moxy',
'Moxy::Util' => 'Moxy',
'Mozilla::CA' => 'Mozilla-CA',
'My::Chat' => 'SOAP-Lite',
'My::Examples' => 'SOAP-Lite',
'My::Parameters' => 'SOAP-Lite',
'My::PersistentIterator' => 'SOAP-Lite',
'My::PingPong' => 'SOAP-Lite',
'My::SessionIterator' => 'SOAP-Lite',
'MyFeatureFileLoader' => 'GBrowse',
'MySQL::Admin' => 'MySQL-Admin',
'MySQL::Admin::Actions' => 'MySQL-Admin',
'MySQL::Admin::Config' => 'MySQL-Admin',
'MySQL::Admin::Documentation' => 'MySQL-Admin',
'MySQL::Admin::GUI' => 'MySQL-Admin',
'MySQL::Admin::Session' => 'MySQL-Admin',
'MySQL::Admin::Settings' => 'MySQL-Admin',
'MySQL::Admin::Translate' => 'MySQL-Admin',
'MyStripScripts' => 'HTML-StripScripts',
'MyTestModule' => 'perl',
'Mysql' => 'DBD-mysql',
'Mysql::Statement' => 'DBD-mysql',
'Mysql::db' => 'DBD-mysql',
'Mysql::dr' => 'DBD-mysql',
'Mysql::st' => 'DBD-mysql',
'NDBM_File' => 'perl',
'Net::CIDR::Lite' => 'Net-CIDR-Lite',
'Net::CIDR::Lite::Span' => 'Net-CIDR-Lite',
'Net::DNS' => 'Net-DNS',
'Net::DNS::Domain' => 'Net-DNS',
'Net::DNS::DomainName' => 'Net-DNS',
'Net::DNS::DomainName1035' => 'Net-DNS',
'Net::DNS::DomainName2535' => 'Net-DNS',
'Net::DNS::Header' => 'Net-DNS',
'Net::DNS::Mailbox' => 'Net-DNS',
'Net::DNS::Mailbox1035' => 'Net-DNS',
'Net::DNS::Mailbox2535' => 'Net-DNS',
'Net::DNS::Nameserver' => 'Net-DNS',
'Net::DNS::Packet' => 'Net-DNS',
'Net::DNS::Parameters' => 'Net-DNS',
'Net::DNS::Question' => 'Net-DNS',
'Net::DNS::RR' => 'Net-DNS',
'Net::DNS::RR::A' => 'Net-DNS',
'Net::DNS::RR::AAAA' => 'Net-DNS',
'Net::DNS::RR::AFSDB' => 'Net-DNS',
'Net::DNS::RR::AMTRELAY' => 'Net-DNS',
'Net::DNS::RR::APL' => 'Net-DNS',
'Net::DNS::RR::APL::Item' => 'Net-DNS',
'Net::DNS::RR::CAA' => 'Net-DNS',
'Net::DNS::RR::CDNSKEY' => 'Net-DNS',
'Net::DNS::RR::CDS' => 'Net-DNS',
'Net::DNS::RR::CERT' => 'Net-DNS',
'Net::DNS::RR::CNAME' => 'Net-DNS',
'Net::DNS::RR::CSYNC' => 'Net-DNS',
'Net::DNS::RR::DELEG' => 'Net-DNS',
'Net::DNS::RR::DHCID' => 'Net-DNS',
'Net::DNS::RR::DLV' => 'Net-DNS',
'Net::DNS::RR::DNAME' => 'Net-DNS',
'Net::DNS::RR::DNSKEY' => 'Net-DNS',
'Net::DNS::RR::DS' => 'Net-DNS',
'Net::DNS::RR::DSYNC' => 'Net-DNS',
'Net::DNS::RR::EUI48' => 'Net-DNS',
'Net::DNS::RR::EUI64' => 'Net-DNS',
'Net::DNS::RR::GPOS' => 'Net-DNS',
'Net::DNS::RR::HINFO' => 'Net-DNS',
'Net::DNS::RR::HIP' => 'Net-DNS',
'Net::DNS::RR::HTTPS' => 'Net-DNS',
'Net::DNS::RR::IPSECKEY' => 'Net-DNS',
'Net::DNS::RR::ISDN' => 'Net-DNS',
'Net::DNS::RR::KEY' => 'Net-DNS',
'Net::DNS::RR::KX' => 'Net-DNS',
'Net::DNS::RR::L32' => 'Net-DNS',
'Net::DNS::RR::L64' => 'Net-DNS',
'Net::DNS::RR::LOC' => 'Net-DNS',
'Net::DNS::RR::LP' => 'Net-DNS',
'Net::DNS::RR::MB' => 'Net-DNS',
'Net::DNS::RR::MG' => 'Net-DNS',
'Net::DNS::RR::MINFO' => 'Net-DNS',
'Net::DNS::RR::MR' => 'Net-DNS',
'Net::DNS::RR::MX' => 'Net-DNS',
'Net::DNS::RR::NAPTR' => 'Net-DNS',
'Net::DNS::RR::NID' => 'Net-DNS',
'Net::DNS::RR::NS' => 'Net-DNS',
'Net::DNS::RR::NSEC' => 'Net-DNS',
'Net::DNS::RR::NSEC3' => 'Net-DNS',
'Net::DNS::RR::NSEC3PARAM' => 'Net-DNS',
'Net::DNS::RR::NULL' => 'Net-DNS',
'Net::DNS::RR::OPENPGPKEY' => 'Net-DNS',
'Net::DNS::RR::OPT' => 'Net-DNS',
'Net::DNS::RR::OPT::CHAIN' => 'Net-DNS',
'Net::DNS::RR::OPT::CLIENT_SUBNET' => 'Net-DNS',
'Net::DNS::RR::OPT::COOKIE' => 'Net-DNS',
'Net::DNS::RR::OPT::DAU' => 'Net-DNS',
'Net::DNS::RR::OPT::DHU' => 'Net-DNS',
'Net::DNS::RR::OPT::EXPIRE' => 'Net-DNS',
'Net::DNS::RR::OPT::EXTENDED_ERROR' => 'Net-DNS',
'Net::DNS::RR::OPT::KEY_TAG' => 'Net-DNS',
'Net::DNS::RR::OPT::N3U' => 'Net-DNS',
'Net::DNS::RR::OPT::NSID' => 'Net-DNS',
'Net::DNS::RR::OPT::PADDING' => 'Net-DNS',
'Net::DNS::RR::OPT::REPORT_CHANNEL' => 'Net-DNS',
'Net::DNS::RR::OPT::TCP_KEEPALIVE' => 'Net-DNS',
'Net::DNS::RR::OPT::ZONEVERSION' => 'Net-DNS',
'Net::DNS::RR::PTR' => 'Net-DNS',
'Net::DNS::RR::PX' => 'Net-DNS',
'Net::DNS::RR::RP' => 'Net-DNS',
'Net::DNS::RR::RRSIG' => 'Net-DNS',
'Net::DNS::RR::RT' => 'Net-DNS',
'Net::DNS::RR::SIG' => 'Net-DNS',
'Net::DNS::RR::SMIMEA' => 'Net-DNS',
'Net::DNS::RR::SOA' => 'Net-DNS',
'Net::DNS::RR::SPF' => 'Net-DNS',
'Net::DNS::RR::SRV' => 'Net-DNS',
'Net::DNS::RR::SSHFP' => 'Net-DNS',
'Net::DNS::RR::SVCB' => 'Net-DNS',
'Net::DNS::RR::TKEY' => 'Net-DNS',
'Net::DNS::RR::TLSA' => 'Net-DNS',
'Net::DNS::RR::TSIG' => 'Net-DNS',
'Net::DNS::RR::TXT' => 'Net-DNS',
'Net::DNS::RR::URI' => 'Net-DNS',
'Net::DNS::RR::X25' => 'Net-DNS',
'Net::DNS::RR::ZONEMD' => 'Net-DNS',
'Net::DNS::Resolver' => 'Net-DNS',
'Net::DNS::Resolver::Base' => 'Net-DNS',
'Net::DNS::Resolver::MSWin32' => 'Net-DNS',
'Net::DNS::Resolver::Recurse' => 'Net-DNS',
'Net::DNS::Resolver::UNIX' => 'Net-DNS',
'Net::DNS::Resolver::android' => 'Net-DNS',
'Net::DNS::Resolver::cygwin' => 'Net-DNS',
'Net::DNS::Resolver::os2' => 'Net-DNS',
'Net::DNS::Resolver::os390' => 'Net-DNS',
'Net::DNS::Text' => 'Net-DNS',
'Net::DNS::Update' => 'Net-DNS',
'Net::DNS::ZoneFile' => 'Net-DNS',
'Net::DNS::ZoneFile::Generator' => 'Net-DNS',
'Net::DNS::ZoneFile::Text' => 'Net-DNS',
'Net::Dropbear' => 'Net-Dropbear',
'Net::Dropbear::SSH' => 'Net-Dropbear',
'Net::Dropbear::SSHd' => 'Net-Dropbear',
'Net::Dropbear::XS' => 'Net-Dropbear',
'Net::Dropbear::XS::AuthState' => 'Net-Dropbear',
'Net::Dropbear::XS::SessionAccept' => 'Net-Dropbear',
'Net::EasyTCP' => 'EasyTCP',
'Net::IPAddress::Util' => 'Net-IPAddress-Util',
'Net::IPAddress::Util::Collection' => 'Net-IPAddress-Util',
'Net::IPAddress::Util::Collection::Tie' => 'Net-IPAddress-Util',
'Net::IPAddress::Util::Range' => 'Net-IPAddress-Util',
'Net::IPv4Addr' => 'Net-IPv4Addr',
'Net::LDAP' => 'perl-ldap',
'Net::LDAP::ASN' => 'perl-ldap',
'Net::LDAP::Bind' => 'perl-ldap',
'Net::LDAP::Constant' => 'perl-ldap',
'Net::LDAP::Control' => 'perl-ldap',
'Net::LDAP::Control::Assertion' => 'perl-ldap',
'Net::LDAP::Control::DontUseCopy' => 'perl-ldap',
'Net::LDAP::Control::EntryChange' => 'perl-ldap',
'Net::LDAP::Control::ManageDsaIT' => 'perl-ldap',
'Net::LDAP::Control::MatchedValues' => 'perl-ldap',
'Net::LDAP::Control::NoOp' => 'perl-ldap',
'Net::LDAP::Control::Paged' => 'perl-ldap',
'Net::LDAP::Control::PasswordPolicy' => 'perl-ldap',
'Net::LDAP::Control::PersistentSearch' => 'perl-ldap',
'Net::LDAP::Control::PostRead' => 'perl-ldap',
'Net::LDAP::Control::PreRead' => 'perl-ldap',
'Net::LDAP::Control::ProxyAuth' => 'perl-ldap',
'Net::LDAP::Control::Relax' => 'perl-ldap',
'Net::LDAP::Control::Sort' => 'perl-ldap',
'Net::LDAP::Control::SortResult' => 'perl-ldap',
'Net::LDAP::Control::Subentries' => 'perl-ldap',
'Net::LDAP::Control::SyncDone' => 'perl-ldap',
'Net::LDAP::Control::SyncRequest' => 'perl-ldap',
'Net::LDAP::Control::SyncState' => 'perl-ldap',
'Net::LDAP::Control::TreeDelete' => 'perl-ldap',
'Net::LDAP::Control::VLV' => 'perl-ldap',
'Net::LDAP::Control::VLVResponse' => 'perl-ldap',
'Net::LDAP::DSML' => 'perl-ldap',
'Net::LDAP::DSML::output' => 'perl-ldap',
'Net::LDAP::DSML::pp' => 'perl-ldap',
'Net::LDAP::Entry' => 'perl-ldap',
'Net::LDAP::Extension' => 'perl-ldap',
'Net::LDAP::Extension::Cancel' => 'perl-ldap',
'Net::LDAP::Extension::Refresh' => 'perl-ldap',
'Net::LDAP::Extension::SetPassword' => 'perl-ldap',
'Net::LDAP::Extension::WhoAmI' => 'perl-ldap',
'Net::LDAP::Extra' => 'perl-ldap',
'Net::LDAP::Extra::AD' => 'perl-ldap',
'Net::LDAP::Extra::eDirectory' => 'perl-ldap',
'Net::LDAP::Filter' => 'perl-ldap',
'Net::LDAP::FilterList' => 'perl-ldap',
'Net::LDAP::FilterMatch' => 'perl-ldap',
'Net::LDAP::Intermediate' => 'perl-ldap',
'Net::LDAP::Intermediate::SyncInfo' => 'perl-ldap',
'Net::LDAP::LDIF' => 'perl-ldap',
'Net::LDAP::Message' => 'perl-ldap',
'Net::LDAP::Message::Dummy' => 'perl-ldap',
'Net::LDAP::Reference' => 'perl-ldap',
'Net::LDAP::RootDSE' => 'perl-ldap',
'Net::LDAP::Schema' => 'perl-ldap',
'Net::LDAP::Search' => 'perl-ldap',
'Net::LDAP::Util' => 'perl-ldap',
'Net::LDAPI' => 'perl-ldap',
'Net::LDAPS' => 'perl-ldap',
'Net::Netmask' => 'Net-Netmask',
'Net::OAuth' => 'Net-OAuth',
'Net::OAuth::AccessToken' => 'Net-OAuth',
'Net::OAuth::AccessTokenRequest' => 'Net-OAuth',
'Net::OAuth::AccessTokenResponse' => 'Net-OAuth',
'Net::OAuth::Client' => 'Net-OAuth',
'Net::OAuth::ConsumerRequest' => 'Net-OAuth',
'Net::OAuth::Message' => 'Net-OAuth',
'Net::OAuth::ProtectedResourceRequest' => 'Net-OAuth',
'Net::OAuth::Request' => 'Net-OAuth',
'Net::OAuth::RequestTokenRequest' => 'Net-OAuth',
'Net::OAuth::RequestTokenResponse' => 'Net-OAuth',
'Net::OAuth::Response' => 'Net-OAuth',
'Net::OAuth::SignatureMethod::HMAC_SHA1' => 'Net-OAuth',
'Net::OAuth::SignatureMethod::HMAC_SHA256' => 'Net-OAuth',
'Net::OAuth::SignatureMethod::PLAINTEXT' => 'Net-OAuth',
'Net::OAuth::SignatureMethod::RSA_SHA1' => 'Net-OAuth',
'Net::OAuth::UserAuthRequest' => 'Net-OAuth',
'Net::OAuth::UserAuthResponse' => 'Net-OAuth',
'Net::OAuth::V1_0A::AccessTokenRequest' => 'Net-OAuth',
'Net::OAuth::V1_0A::RequestTokenRequest' => 'Net-OAuth',
'Net::OAuth::V1_0A::RequestTokenResponse' => 'Net-OAuth',
'Net::OAuth::V1_0A::UserAuthResponse' => 'Net-OAuth',
'Net::OAuth::XauthAccessTokenRequest' => 'Net-OAuth',
'Net::OAuth::YahooAccessTokenRefreshRequest' => 'Net-OAuth',
'Net::OpenID::Association' => 'Net-OpenID-Consumer',
'Net::OpenID::ClaimedIdentity' => 'Net-OpenID-Consumer',
'Net::OpenID::Consumer' => 'Net-OpenID-Consumer',
'Net::OpenID::VerifiedIdentity' => 'Net-OpenID-Consumer',
'Net::Ping::External' => 'Net-Ping-External',
'Net::SNMP' => 'Net-SNMP',
'Net::SNMP::Dispatcher' => 'Net-SNMP',
'Net::SNMP::Message' => 'Net-SNMP',
'Net::SNMP::MessageProcessing' => 'Net-SNMP',
'Net::SNMP::PDU' => 'Net-SNMP',
'Net::SNMP::Security' => 'Net-SNMP',
'Net::SNMP::Security::Community' => 'Net-SNMP',
'Net::SNMP::Security::USM' => 'Net-SNMP',
'Net::SNMP::Transport' => 'Net-SNMP',
'Net::SNMP::Transport::IPv4' => 'Net-SNMP',
'Net::SNMP::Transport::IPv4::TCP' => 'Net-SNMP',
'Net::SNMP::Transport::IPv4::UDP' => 'Net-SNMP',
'Net::SNMP::Transport::IPv6' => 'Net-SNMP',
'Net::SNMP::Transport::IPv6::TCP' => 'Net-SNMP',
'Net::SNMP::Transport::IPv6::UDP' => 'Net-SNMP',
'Net::SNMP::Transport::TCP' => 'Net-SNMP',
'Net::SNMP::Transport::TCP6' => 'Net-SNMP',
'Net::SNMP::Transport::UDP' => 'Net-SNMP',
'Net::SNMP::Transport::UDP6' => 'Net-SNMP',
'Net::SSLeay' => 'Net-SSLeay',
'Net::SSLeay::Handle' => 'Net-SSLeay',
'Net::Server' => 'Net-Server',
'Net::Server::Coro' => 'Net-Server-Coro',
'Net::Server::Daemonize' => 'Net-Server',
'Net::Server::Fork' => 'Net-Server',
'Net::Server::HTTP' => 'Net-Server',
'Net::Server::INET' => 'Net-Server',
'Net::Server::INET::Handle' => 'Net-Server',
'Net::Server::Log::Log::Log4perl' => 'Net-Server',
'Net::Server::Log::Sys::Syslog' => 'Net-Server',
'Net::Server::MultiType' => 'Net-Server',
'Net::Server::Multiplex' => 'Net-Server',
'Net::Server::Multiplex::MUX' => 'Net-Server',
'Net::Server::PSGI' => 'Net-Server',
'Net::Server::PreFork' => 'Net-Server',
'Net::Server::PreForkSimple' => 'Net-Server',
'Net::Server::Proto' => 'Net-Server',
'Net::Server::Proto::Coro' => 'Net-Server-Coro',
'Net::Server::Proto::Coro::FH' => 'Net-Server-Coro',
'Net::Server::Proto::SSL' => 'Net-Server',
'Net::Server::Proto::SSLEAY' => 'Net-Server',
'Net::Server::Proto::TCP' => 'Net-Server',
'Net::Server::Proto::UDP' => 'Net-Server',
'Net::Server::Proto::UNIX' => 'Net-Server',
'Net::Server::Proto::UNIXDGRAM' => 'Net-Server',
'Net::Server::SIG' => 'Net-Server',
'Net::Server::Single' => 'Net-Server',
'Net::Server::Thread' => 'Net-Server',
'Net::Server::TiedHandle' => 'Net-Server',
'Net::hostent' => 'perl',
'Net::netent' => 'perl',
'Net::protoent' => 'perl',
'Net::servent' => 'perl',
'O' => 'perl',
'ODBM_File' => 'perl',
'OS2::DLL' => 'perl',
'OS2::DLL::dll' => 'perl',
'OS2::ExtAttr' => 'perl',
'OS2::PrfDB' => 'perl',
'OS2::PrfDB::Hini' => 'perl',
'OS2::PrfDB::Sub' => 'perl',
'OS2::Process' => 'perl',
'OS2::REXX' => 'perl',
'OS2::REXX::_ARRAY' => 'perl',
'OS2::REXX::_HASH' => 'perl',
'OS2::REXX::_SCALAR' => 'perl',
'OS2::localMorphPM' => 'perl',
'Opcode' => 'perl',
'OptreeCheck' => 'perl',
'Otogiri' => 'Otogiri',
'OverloadedClass' => 'CGI-Session',
'OverloadedObjectClass' => 'CGI-Session',
'PAR' => 'PAR',
'PAR::Filter' => 'PAR-Packer',
'PAR::Filter::Bleach' => 'PAR-Packer',
'PAR::Filter::Bytecode' => 'PAR-Packer',
'PAR::Filter::Obfuscate' => 'PAR-Packer',
'PAR::Filter::PatchContent' => 'PAR-Packer',
'PAR::Filter::PodStrip' => 'PAR-Packer',
'PAR::Heavy' => 'PAR',
'PAR::Packer' => 'PAR-Packer',
'PAR::SetupProgname' => 'PAR',
'PAR::SetupTemp' => 'PAR',
'PAR::StrippedPARL::Base' => 'PAR-Packer',
'PApp' => 'PApp',
'PApp::Admin' => 'PApp',
'PApp::Application' => 'PApp',
'PApp::Application::Agni' => 'PApp',
'PApp::CGI' => 'PApp',
'PApp::CGI::Connection' => 'PApp',
'PApp::CGI::Request' => 'PApp',
'PApp::Callback' => 'PApp',
'PApp::Callback::Function' => 'PApp',
'PApp::Config' => 'PApp',
'PApp::DataRef' => 'PApp',
'PApp::DataRef::Base' => 'PApp',
'PApp::DataRef::DB_row' => 'PApp',
'PApp::DataRef::Hash::Proxy' => 'PApp',
'PApp::DataRef::Scalar' => 'PApp',
'PApp::DataRef::Scalar::Proxy' => 'PApp',
'PApp::ECMAScript' => 'PApp',
'PApp::ECMAScript::Layer' => 'PApp',
'PApp::EditForm' => 'PApp',
'PApp::Env' => 'PApp',
'PApp::Event' => 'PApp',
'PApp::Exception' => 'PApp',
'PApp::FormBuffer' => 'PApp',
'PApp::HTML' => 'PApp',
'PApp::I18n' => 'PApp',
'PApp::I18n::PO_Reader' => 'PApp',
'PApp::I18n::PO_Writer' => 'PApp',
'PApp::Lock' => 'PApp',
'PApp::Log' => 'PApp',
'PApp::MimeType' => 'PApp',
'PApp::PCode' => 'PApp',
'PApp::Prefs' => 'PApp',
'PApp::Preprocessor' => 'PApp',
'PApp::Recode' => 'PApp',
'PApp::SCGI' => 'PApp',
'PApp::SCGI::PApp' => 'PApp',
'PApp::SCGI::Worker' => 'PApp',
'PApp::Session' => 'PApp',
'PApp::Storable' => 'PApp',
'PApp::User' => 'PApp',
'PApp::UserObs' => 'PApp',
'PApp::Util' => 'PApp',
'PApp::XBox' => 'PApp',
'PApp::XML' => 'PApp',
'PApp::XML::Pod2xml' => 'PApp',
'PApp::XML::Template' => 'PApp',
'PApp::XPCSE' => 'PApp',
'PApp::XSLT' => 'PApp',
'PApp::XSLT::LibXSLT' => 'PApp',
'PApp::XSLT::Sablotron' => 'PApp',
'PGObject::Util::DBAdmin' => 'PGObject-Util-DBAdmin',
'POE::Component::IRC' => 'POE-Component-IRC',
'POE::Component::IRC::Common' => 'POE-Component-IRC',
'POE::Component::IRC::Constants' => 'POE-Component-IRC',
'POE::Component::IRC::Plugin' => 'POE-Component-IRC',
'POE::Component::IRC::Plugin::AutoJoin' => 'POE-Component-IRC',
'POE::Component::IRC::Plugin::BotAddressed' => 'POE-Component-IRC',
'POE::Component::IRC::Plugin::BotCommand' => 'POE-Component-IRC',
'POE::Component::IRC::Plugin::BotTraffic' => 'POE-Component-IRC',
'POE::Component::IRC::Plugin::CTCP' => 'POE-Component-IRC',
'POE::Component::IRC::Plugin::Connector' => 'POE-Component-IRC',
'POE::Component::IRC::Plugin::Console' => 'POE-Component-IRC',
'POE::Component::IRC::Plugin::CycleEmpty' => 'POE-Component-IRC',
'POE::Component::IRC::Plugin::DCC' => 'POE-Component-IRC',
'POE::Component::IRC::Plugin::FollowTail' => 'POE-Component-IRC',
'POE::Component::IRC::Plugin::ISupport' => 'POE-Component-IRC',
'POE::Component::IRC::Plugin::Logger' => 'POE-Component-IRC',
'POE::Component::IRC::Plugin::NickReclaim' => 'POE-Component-IRC',
'POE::Component::IRC::Plugin::NickServID' => 'POE-Component-IRC',
'POE::Component::IRC::Plugin::PlugMan' => 'POE-Component-IRC',
'POE::Component::IRC::Plugin::Proxy' => 'POE-Component-IRC',
'POE::Component::IRC::Plugin::Whois' => 'POE-Component-IRC',
'POE::Component::IRC::Qnet' => 'POE-Component-IRC',
'POE::Component::IRC::Qnet::State' => 'POE-Component-IRC',
'POE::Component::IRC::State' => 'POE-Component-IRC',
'POE::Filter::IRC' => 'POE-Component-IRC',
'POE::Filter::IRC::Compat' => 'POE-Component-IRC',
'POSIX' => 'perl',
'POSIX::2008' => 'POSIX-2008',
'POSIX::SigAction' => 'perl',
'POSIX::SigRt' => 'perl',
'POSIX::SigSet' => 'perl',
'PalImg' => 'Perlbal',
'PaletteModify' => 'Perlbal',
'Parallel::ForkManager' => 'Parallel-ForkManager',
'Parallel::ForkManager::Child' => 'Parallel-ForkManager',
'Parse::ePerl' => 'eperl',
'Perl::Version' => 'Perl-Version',
'PerlIO' => 'perl',
'PerlIO::encoding' => 'perl',
'PerlIO::mmap' => 'perl',
'PerlIO::scalar' => 'perl',
'PerlIO::via' => 'perl',
'PerlTmp' => 'Batch-Batchrun',
'Perlbal' => 'Perlbal',
'Perlbal::AIO' => 'Perlbal',
'Perlbal::BackendHTTP' => 'Perlbal',
'Perlbal::Cache' => 'Perlbal',
'Perlbal::ChunkedUploadState' => 'Perlbal',
'Perlbal::ClientHTTP' => 'Perlbal',
'Perlbal::ClientHTTPBase' => 'Perlbal',
'Perlbal::ClientManage' => 'Perlbal',
'Perlbal::ClientProxy' => 'Perlbal',
'Perlbal::CommandContext' => 'Perlbal',
'Perlbal::Fields' => 'Perlbal',
'Perlbal::HTTPHeaders' => 'Perlbal',
'Perlbal::ManageCommand' => 'Perlbal',
'Perlbal::Plugin::AccessControl' => 'Perlbal',
'Perlbal::Plugin::AutoRemoveLeadingDir' => 'Perlbal',
'Perlbal::Plugin::Cgilike' => 'Perlbal',
'Perlbal::Plugin::Cgilike::Request' => 'Perlbal',
'Perlbal::Plugin::EchoService' => 'Perlbal',
'Perlbal::Plugin::EchoService::Client' => 'Perlbal',
'Perlbal::Plugin::FlvStreaming' => 'Perlbal',
'Perlbal::Plugin::Highpri' => 'Perlbal',
'Perlbal::Plugin::Include' => 'Perlbal',
'Perlbal::Plugin::LazyCDN' => 'Perlbal',
'Perlbal::Plugin::MaxContentLength' => 'Perlbal',
'Perlbal::Plugin::NotModified' => 'Perlbal',
'Perlbal::Plugin::Palimg' => 'Perlbal',
'Perlbal::Plugin::Queues' => 'Perlbal',
'Perlbal::Plugin::Redirect' => 'Perlbal',
'Perlbal::Plugin::Stats' => 'Perlbal',
'Perlbal::Plugin::Stats::Storage' => 'Perlbal',
'Perlbal::Plugin::Throttle' => 'Perlbal',
'Perlbal::Plugin::Throttle::Store' => 'Perlbal',
'Perlbal::Plugin::Throttle::Store::Memcached' => 'Perlbal',
'Perlbal::Plugin::Throttle::Store::Memory' => 'Perlbal',
'Perlbal::Plugin::Vhosts' => 'Perlbal',
'Perlbal::Plugin::Vpaths' => 'Perlbal',
'Perlbal::Plugin::XFFExtras' => 'Perlbal',
'Perlbal::Pool' => 'Perlbal',
'Perlbal::ReproxyManager' => 'Perlbal',
'Perlbal::Service' => 'Perlbal',
'Perlbal::Socket' => 'Perlbal',
'Perlbal::SocketSSL' => 'Perlbal',
'Perlbal::SocketSSL2' => 'Perlbal',
'Perlbal::TCPListener' => 'Perlbal',
'Perlbal::Test' => 'Perlbal',
'Perlbal::Test::WebClient' => 'Perlbal',
'Perlbal::Test::WebServer' => 'Perlbal',
'Perlbal::UploadListener' => 'Perlbal',
'Perlbal::Util' => 'Perlbal',
'PhonyClipboard' => 'Clipboard',
'Pinto' => 'Pinto',
'Pinto::Action' => 'Pinto',
'Pinto::Action::Add' => 'Pinto',
'Pinto::Action::Clean' => 'Pinto',
'Pinto::Action::Copy' => 'Pinto',
'Pinto::Action::Default' => 'Pinto',
'Pinto::Action::Delete' => 'Pinto',
'Pinto::Action::Diff' => 'Pinto',
'Pinto::Action::Install' => 'Pinto',
'Pinto::Action::Kill' => 'Pinto',
'Pinto::Action::List' => 'Pinto',
'Pinto::Action::Lock' => 'Pinto',
'Pinto::Action::Log' => 'Pinto',
'Pinto::Action::Look' => 'Pinto',
'Pinto::Action::Merge' => 'Pinto',
'Pinto::Action::New' => 'Pinto',
'Pinto::Action::Nop' => 'Pinto',
'Pinto::Action::Pin' => 'Pinto',
'Pinto::Action::Props' => 'Pinto',
'Pinto::Action::Pull' => 'Pinto',
'Pinto::Action::Register' => 'Pinto',
'Pinto::Action::Rename' => 'Pinto',
'Pinto::Action::Reset' => 'Pinto',
'Pinto::Action::Revert' => 'Pinto',
'Pinto::Action::Roots' => 'Pinto',
'Pinto::Action::Stacks' => 'Pinto',
'Pinto::Action::Statistics' => 'Pinto',
'Pinto::Action::Unlock' => 'Pinto',
'Pinto::Action::Unpin' => 'Pinto',
'Pinto::Action::Unregister' => 'Pinto',
'Pinto::Action::Update' => 'Pinto',
'Pinto::Action::Verify' => 'Pinto',
'Pinto::ArchiveUnpacker' => 'Pinto',
'Pinto::Chrome' => 'Pinto',
'Pinto::Chrome::Net' => 'Pinto',
'Pinto::Chrome::Term' => 'Pinto',
'Pinto::CommitMessage' => 'Pinto',
'Pinto::Config' => 'Pinto',
'Pinto::Constants' => 'Pinto',
'Pinto::Database' => 'Pinto',
'Pinto::Difference' => 'Pinto',
'Pinto::DifferenceEntry' => 'Pinto',
'Pinto::DistributionSpec' => 'Pinto',
'Pinto::Editor' => 'Pinto',
'Pinto::Editor::Clip' => 'Pinto',
'Pinto::Editor::Edit' => 'Pinto',
'Pinto::Exception' => 'Pinto',
'Pinto::Globals' => 'Pinto',
'Pinto::IndexCache' => 'Pinto',
'Pinto::IndexReader' => 'Pinto',
'Pinto::IndexWriter' => 'Pinto',
'Pinto::Initializer' => 'Pinto',
'Pinto::Locator' => 'Pinto',
'Pinto::Locator::Mirror' => 'Pinto',
'Pinto::Locator::Multiplex' => 'Pinto',
'Pinto::Locator::Stratopan' => 'Pinto',
'Pinto::Locker' => 'Pinto',
'Pinto::Manual' => 'Pinto',
'Pinto::Manual::Installing' => 'Pinto',
'Pinto::Manual::Introduction' => 'Pinto',
'Pinto::Manual::QuickStart' => 'Pinto',
'Pinto::Manual::Thanks' => 'Pinto',
'Pinto::Manual::Tutorial' => 'Pinto',
'Pinto::Migrator' => 'Pinto',
'Pinto::ModlistWriter' => 'Pinto',
'Pinto::PackageExtractor' => 'Pinto',
'Pinto::PackageSpec' => 'Pinto',
'Pinto::PrerequisiteWalker' => 'Pinto',
'Pinto::Remote' => 'Pinto',
'Pinto::Remote::Action' => 'Pinto',
'Pinto::Remote::Action::Add' => 'Pinto',
'Pinto::Remote::Action::Install' => 'Pinto',
'Pinto::Remote::Result' => 'Pinto',
'Pinto::Repository' => 'Pinto',
'Pinto::Result' => 'Pinto',
'Pinto::RevisionWalker' => 'Pinto',
'Pinto::Role::Committable' => 'Pinto',
'Pinto::Role::FileFetcher' => 'Pinto',
'Pinto::Role::Installer' => 'Pinto',
'Pinto::Role::PauseConfig' => 'Pinto',
'Pinto::Role::Plated' => 'Pinto',
'Pinto::Role::Puller' => 'Pinto',
'Pinto::Role::Schema::Result' => 'Pinto',
'Pinto::Role::Transactional' => 'Pinto',
'Pinto::Role::UserAgent' => 'Pinto',
'Pinto::Schema' => 'Pinto',
'Pinto::Schema::Result::Ancestry' => 'Pinto',
'Pinto::Schema::Result::Distribution' => 'Pinto',
'Pinto::Schema::Result::Package' => 'Pinto',
'Pinto::Schema::Result::Prerequisite' => 'Pinto',
'Pinto::Schema::Result::Registration' => 'Pinto',
'Pinto::Schema::Result::RegistrationChange' => 'Pinto',
'Pinto::Schema::Result::Revision' => 'Pinto',
'Pinto::Schema::Result::Stack' => 'Pinto',
'Pinto::Schema::ResultSet::Distribution' => 'Pinto',
'Pinto::Schema::ResultSet::Package' => 'Pinto',
'Pinto::Schema::ResultSet::Registration' => 'Pinto',
'Pinto::Server' => 'Pinto',
'Pinto::Server::Responder' => 'Pinto',
'Pinto::Server::Responder::Action' => 'Pinto',
'Pinto::Server::Responder::File' => 'Pinto',
'Pinto::Server::Router' => 'Pinto',
'Pinto::Shell' => 'Pinto',
'Pinto::SpecFactory' => 'Pinto',
'Pinto::Statistics' => 'Pinto',
'Pinto::Store' => 'Pinto',
'Pinto::Target' => 'Pinto',
'Pinto::Target::Distribution' => 'Pinto',
'Pinto::Target::Package' => 'Pinto',
'Pinto::Types' => 'Pinto',
'Pinto::Util' => 'Pinto',
'Plack' => 'Plack',
'Plack::App::CGIBin' => 'Plack',
'Plack::App::Cascade' => 'Plack',
'Plack::App::Directory' => 'Plack',
'Plack::App::File' => 'Plack',
'Plack::App::PSGIBin' => 'Plack',
'Plack::App::URLMap' => 'Plack',
'Plack::App::WrapCGI' => 'Plack',
'Plack::App::XAO' => 'XAO-Web',
'Plack::Builder' => 'Plack',
'Plack::Component' => 'Plack',
'Plack::HTTPParser' => 'Plack',
'Plack::HTTPParser::PP' => 'Plack',
'Plack::Handler' => 'Plack',
'Plack::Handler::Apache1' => 'Plack',
'Plack::Handler::Apache2' => 'Plack',
'Plack::Handler::Apache2::Registry' => 'Plack',
'Plack::Handler::CGI' => 'Plack',
'Plack::Handler::CGI::Writer' => 'Plack',
'Plack::Handler::FCGI' => 'Plack',
'Plack::Handler::HTTP::Server::PSGI' => 'Plack',
'Plack::Handler::Standalone' => 'Plack',
'Plack::LWPish' => 'Plack',
'Plack::Loader' => 'Plack',
'Plack::Loader::Delayed' => 'Plack',
'Plack::Loader::Restarter' => 'Plack',
'Plack::Loader::Shotgun' => 'Plack',
'Plack::MIME' => 'Plack',
'Plack::Middleware' => 'Plack',
'Plack::Middleware::AccessLog' => 'Plack',
'Plack::Middleware::AccessLog::Timed' => 'Plack',
'Plack::Middleware::Auth::Basic' => 'Plack',
'Plack::Middleware::BufferedStreaming' => 'Plack',
'Plack::Middleware::Chunked' => 'Plack',
'Plack::Middleware::Conditional' => 'Plack',
'Plack::Middleware::ConditionalGET' => 'Plack',
'Plack::Middleware::ContentLength' => 'Plack',
'Plack::Middleware::ContentMD5' => 'Plack',
'Plack::Middleware::ErrorDocument' => 'Plack',
'Plack::Middleware::HTTPExceptions' => 'Plack',
'Plack::Middleware::Head' => 'Plack',
'Plack::Middleware::IIS6ScriptNameFix' => 'Plack',
'Plack::Middleware::IIS7KeepAliveFix' => 'Plack',
'Plack::Middleware::JSONP' => 'Plack',
'Plack::Middleware::LighttpdScriptNameFix' => 'Plack',
'Plack::Middleware::Lint' => 'Plack',
'Plack::Middleware::Log4perl' => 'Plack',
'Plack::Middleware::LogDispatch' => 'Plack',
'Plack::Middleware::NullLogger' => 'Plack',
'Plack::Middleware::RearrangeHeaders' => 'Plack',
'Plack::Middleware::Recursive' => 'Plack',
'Plack::Middleware::Refresh' => 'Plack',
'Plack::Middleware::Runtime' => 'Plack',
'Plack::Middleware::Session' => 'Plack-Middleware-Session',
'Plack::Middleware::Session::Cookie' => 'Plack-Middleware-Session',
'Plack::Middleware::SimpleContentFilter' => 'Plack',
'Plack::Middleware::SimpleLogger' => 'Plack',
'Plack::Middleware::StackTrace' => 'Plack',
'Plack::Middleware::Static' => 'Plack',
'Plack::Middleware::StaticShared' => 'Plack-Middleware-StaticShared',
'Plack::Middleware::Writer' => 'Plack',
'Plack::Middleware::XFramework' => 'Plack',
'Plack::Middleware::XSRFBlock' => 'Plack-Middleware-XSRFBlock',
'Plack::Middleware::XSendfile' => 'Plack',
'Plack::Recursive::ForwardRequest' => 'Plack',
'Plack::Request' => 'Plack',
'Plack::Request::Upload' => 'Plack',
'Plack::Response' => 'Plack',
'Plack::Runner' => 'Plack',
'Plack::Server' => 'Plack',
'Plack::Server::Apache1' => 'Plack',
'Plack::Server::Apache2' => 'Plack',
'Plack::Server::CGI' => 'Plack',
'Plack::Server::FCGI' => 'Plack',
'Plack::Server::ServerSimple' => 'Plack',
'Plack::Server::Standalone' => 'Plack',
'Plack::Server::Standalone::Prefork' => 'Plack',
'Plack::Session' => 'Plack-Middleware-Session',
'Plack::Session::Cleanup' => 'Plack-Middleware-Session',
'Plack::Session::State' => 'Plack-Middleware-Session',
'Plack::Session::State::Cookie' => 'Plack-Middleware-Session',
'Plack::Session::Store' => 'Plack-Middleware-Session',
'Plack::Session::Store::Cache' => 'Plack-Middleware-Session',
'Plack::Session::Store::DBI' => 'Plack-Middleware-Session',
'Plack::Session::Store::File' => 'Plack-Middleware-Session',
'Plack::Session::Store::Null' => 'Plack-Middleware-Session',
'Plack::TempBuffer' => 'Plack',
'Plack::TempBuffer::Auto' => 'Plack',
'Plack::TempBuffer::File' => 'Plack',
'Plack::TempBuffer::PerlIO' => 'Plack',
'Plack::Test' => 'Plack',
'Plack::Test::MockHTTP' => 'Plack',
'Plack::Test::Server' => 'Plack',
'Plack::Test::Suite' => 'Plack',
'Plack::Util' => 'Plack',
'Plack::Util::Accessor' => 'Plack',
'Plack::Util::IOWithPath' => 'Plack',
'Plack::Util::Prototype' => 'Plack',
'Pod::Html' => 'perl',
'Pod::Html::Util' => 'perl',
'Pod::Perldoc' => 'Pod-Perldoc',
'Pod::Perldoc::BaseTo' => 'Pod-Perldoc',
'Pod::Perldoc::GetOptsOO' => 'Pod-Perldoc',
'Pod::Perldoc::ToANSI' => 'Pod-Perldoc',
'Pod::Perldoc::ToChecker' => 'Pod-Perldoc',
'Pod::Perldoc::ToMan' => 'Pod-Perldoc',
'Pod::Perldoc::ToNroff' => 'Pod-Perldoc',
'Pod::Perldoc::ToPod' => 'Pod-Perldoc',
'Pod::Perldoc::ToRtf' => 'Pod-Perldoc',
'Pod::Perldoc::ToTerm' => 'Pod-Perldoc',
'Pod::Perldoc::ToText' => 'Pod-Perldoc',
'Pod::Perldoc::ToTk' => 'Pod-Perldoc',
'Pod::Perldoc::ToXml' => 'Pod-Perldoc',
'Pod::Simple::XHTML::LocalPodLinks' => 'perl',
'Porting::updateAUTHORS' => 'perl',
'Proc::Daemon' => 'Proc-Daemon',
'Proc::Killall' => 'Proc-ProcessTable',
'Proc::Killfam' => 'Proc-ProcessTable',
'Proc::ProcessTable' => 'Proc-ProcessTable',
'Proc::ProcessTable::Process' => 'Proc-ProcessTable',
'RPC::PlClient' => 'PlRPC',
'RPC::PlClient::Comm' => 'PlRPC',
'RPC::PlClient::Object' => 'PlRPC',
'RPC::PlServer' => 'PlRPC',
'RPC::PlServer::Comm' => 'PlRPC',
'RPC::PlServer::Test' => 'PlRPC',
'RPC::XML' => 'RPC-XML',
'RPC::XML::Client' => 'RPC-XML',
'RPC::XML::Function' => 'RPC-XML',
'RPC::XML::Method' => 'RPC-XML',
'RPC::XML::Parser' => 'RPC-XML',
'RPC::XML::Parser::XMLLibXML' => 'RPC-XML',
'RPC::XML::Parser::XMLParser' => 'RPC-XML',
'RPC::XML::ParserFactory' => 'RPC-XML',
'RPC::XML::Procedure' => 'RPC-XML',
'RPC::XML::Server' => 'RPC-XML',
'RPC::XML::array' => 'RPC-XML',
'RPC::XML::base64' => 'RPC-XML',
'RPC::XML::boolean' => 'RPC-XML',
'RPC::XML::datatype' => 'RPC-XML',
'RPC::XML::datetime_iso8601' => 'RPC-XML',
'RPC::XML::double' => 'RPC-XML',
'RPC::XML::fault' => 'RPC-XML',
'RPC::XML::i4' => 'RPC-XML',
'RPC::XML::i8' => 'RPC-XML',
'RPC::XML::int' => 'RPC-XML',
'RPC::XML::nil' => 'RPC-XML',
'RPC::XML::request' => 'RPC-XML',
'RPC::XML::response' => 'RPC-XML',
'RPC::XML::simple_type' => 'RPC-XML',
'RPC::XML::string' => 'RPC-XML',
'RPC::XML::struct' => 'RPC-XML',
'RT::Authen::ExternalAuth' => 'RT-Authen-ExternalAuth',
'RT::Authen::ExternalAuth::DBI' => 'RT-Authen-ExternalAuth',
'RT::Authen::ExternalAuth::DBI::Cookie' => 'RT-Authen-ExternalAuth',
'RT::Authen::ExternalAuth::LDAP' => 'RT-Authen-ExternalAuth',
'RT::Extension::MobileUI' => 'RT-Extension-MobileUI',
'RTMP::Client' => 'RTMP-Client',
'SDBM_File' => 'perl',
'SOAP::Apache' => 'SOAP-Lite',
'SOAP::Cloneable' => 'SOAP-Lite',
'SOAP::Constants' => 'SOAP-Lite',
'SOAP::Custom::XML::Data' => 'SOAP-Lite',
'SOAP::Custom::XML::Deserializer' => 'SOAP-Lite',
'SOAP::Data' => 'SOAP-Lite',
'SOAP::Deserializer' => 'SOAP-Lite',
'SOAP::Fault' => 'SOAP-Lite',
'SOAP::Header' => 'SOAP-Lite',
'SOAP::Lite' => 'SOAP-Lite',
'SOAP::Lite::COM' => 'SOAP-Lite',
'SOAP::Lite::Deserializer::XMLSchema1999' => 'SOAP-Lite',
'SOAP::Lite::Deserializer::XMLSchema2001' => 'SOAP-Lite',
'SOAP::Lite::Deserializer::XMLSchemaSOAP1_1' => 'SOAP-Lite',
'SOAP::Lite::Deserializer::XMLSchemaSOAP1_2' => 'SOAP-Lite',
'SOAP::Lite::Packager' => 'SOAP-Lite',
'SOAP::Lite::Packager::DIME' => 'SOAP-Lite',
'SOAP::Lite::Packager::MIME' => 'SOAP-Lite',
'SOAP::Lite::Utils' => 'SOAP-Lite',
'SOAP::MIMEParser' => 'SOAP-Lite',
'SOAP::Packager' => 'SOAP-Lite',
'SOAP::Packager::DIME' => 'SOAP-Lite',
'SOAP::Packager::MIME' => 'SOAP-Lite',
'SOAP::SOM' => 'SOAP-Lite',
'SOAP::Schema' => 'SOAP-Lite',
'SOAP::Schema::Deserializer' => 'SOAP-Lite',
'SOAP::Schema::WSDL' => 'SOAP-Lite',
'SOAP::Server' => 'SOAP-Lite',
'SOAP::Server::Object' => 'SOAP-Lite',
'SOAP::Server::Parameters' => 'SOAP-Lite',
'SOAP::Test' => 'SOAP-Lite',
'SOAP::Test::Server' => 'SOAP-Lite',
'SOAP::Trace' => 'SOAP-Lite',
'SOAP::Transport' => 'SOAP-Lite',
'SOAP::Transport::HTTP' => 'SOAP-Lite',
'SOAP::Transport::HTTP::Daemon' => 'SOAP-Lite',
'SOAP::Transport::HTTP::Daemon::ForkAfterProcessing' => 'SOAP-Lite',
'SOAP::Transport::HTTP::Daemon::ForkOnAccept' => 'SOAP-Lite',
'SOAP::Transport::HTTP::FCGI' => 'SOAP-Lite',
'SOAP::Transport::IO' => 'SOAP-Lite',
'SOAP::Transport::IO::Server' => 'SOAP-Lite',
'SOAP::Transport::LOCAL' => 'SOAP-Lite',
'SOAP::Transport::LOCAL::Client' => 'SOAP-Lite',
'SOAP::Transport::LOOPBACK' => 'SOAP-Lite',
'SOAP::Transport::LOOPBACK::Client' => 'SOAP-Lite',
'SOAP::Transport::MAILTO' => 'SOAP-Lite',
'SOAP::Transport::MAILTO::Client' => 'SOAP-Lite',
'SOAP::Transport::POP3' => 'SOAP-Lite',
'SOAP::Transport::POP3::Server' => 'SOAP-Lite',
'SOAP::Transport::TCP' => 'SOAP-Lite',
'SOAP::Transport::TCP::Client' => 'SOAP-Lite',
'SOAP::Transport::TCP::Server' => 'SOAP-Lite',
'SOAP::Utils' => 'SOAP-Lite',
'SOAP::XMLSchema1999::Deserializer' => 'SOAP-Lite',
'SOAP::XMLSchema1999::Serializer' => 'SOAP-Lite',
'SOAP::XMLSchema2001::Deserializer' => 'SOAP-Lite',
'SOAP::XMLSchema2001::Serializer' => 'SOAP-Lite',
'SOAP::XMLSchema::Serializer' => 'SOAP-Lite',
'SOAP::XMLSchemaApacheSOAP::Deserializer' => 'SOAP-Lite',
'SOAP::XMLSchemaSOAP1_1::Deserializer' => 'SOAP-Lite',
'SOAP::XMLSchemaSOAP1_2::Deserializer' => 'SOAP-Lite',
'SSL_Context' => 'IO-Socket-SSL',
'SSL_HANDLE' => 'IO-Socket-SSL',
'SSL_SSL' => 'IO-Socket-SSL',
'SVG::Sparkline' => 'SVG-Sparkline',
'SVG::Sparkline::Area' => 'SVG-Sparkline',
'SVG::Sparkline::Bar' => 'SVG-Sparkline',
'SVG::Sparkline::Line' => 'SVG-Sparkline',
'SVG::Sparkline::RangeArea' => 'SVG-Sparkline',
'SVG::Sparkline::RangeBar' => 'SVG-Sparkline',
'SVG::Sparkline::Utils' => 'SVG-Sparkline',
'SVG::Sparkline::Whisker' => 'SVG-Sparkline',
'SVN::Look' => 'SVN-Look',
'Safe' => 'Safe',
'Search::OpenSearch::Result' => 'Search-OpenSearch-Server',
'Search::OpenSearch::Server' => 'Search-OpenSearch-Server',
'Search::OpenSearch::Server::Catalyst' => 'Search-OpenSearch-Server',
'Search::OpenSearch::Server::Plack' => 'Search-OpenSearch-Server',
'SelectSaver' => 'perl',
'SimpleObjectClass' => 'CGI-Session',
'Socket' => 'Socket',
'Spoon' => 'Spoon',
'Spoon::Base' => 'Spoon',
'Spoon::CGI' => 'Spoon',
'Spoon::Command' => 'Spoon',
'Spoon::Config' => 'Spoon',
'Spoon::ContentObject' => 'Spoon',
'Spoon::Cookie' => 'Spoon',
'Spoon::DataObject' => 'Spoon',
'Spoon::Formatter' => 'Spoon',
'Spoon::Formatter::Block' => 'Spoon',
'Spoon::Formatter::Container' => 'Spoon',
'Spoon::Formatter::Phrase' => 'Spoon',
'Spoon::Formatter::Wafl' => 'Spoon',
'Spoon::Headers' => 'Spoon',
'Spoon::Hook' => 'Spoon',
'Spoon::Hooked' => 'Spoon',
'Spoon::Hooks' => 'Spoon',
'Spoon::Hub' => 'Spoon',
'Spoon::IndexList' => 'Spoon',
'Spoon::Installer' => 'Spoon',
'Spoon::Lookup' => 'Spoon',
'Spoon::MetadataObject' => 'Spoon',
'Spoon::Plugin' => 'Spoon',
'Spoon::Registry' => 'Spoon',
'Spoon::Template' => 'Spoon',
'Spoon::Template::TT2' => 'Spoon',
'Spoon::Trace' => 'Spoon',
'Spoon::Utils' => 'Spoon',
'Spreadsheet::ParseExcel' => 'Spreadsheet-ParseExcel',
'Spreadsheet::ParseExcel::Cell' => 'Spreadsheet-ParseExcel',
'Spreadsheet::ParseExcel::Dump' => 'Spreadsheet-ParseExcel',
'Spreadsheet::ParseExcel::FmtDefault' => 'Spreadsheet-ParseExcel',
'Spreadsheet::ParseExcel::FmtJapan' => 'Spreadsheet-ParseExcel',
'Spreadsheet::ParseExcel::FmtJapan2' => 'Spreadsheet-ParseExcel',
'Spreadsheet::ParseExcel::FmtUnicode' => 'Spreadsheet-ParseExcel',
'Spreadsheet::ParseExcel::Font' => 'Spreadsheet-ParseExcel',
'Spreadsheet::ParseExcel::Format' => 'Spreadsheet-ParseExcel',
'Spreadsheet::ParseExcel::SaveParser' => 'Spreadsheet-ParseExcel',
'Spreadsheet::ParseExcel::SaveParser::Workbook' => 'Spreadsheet-ParseExcel',
'Spreadsheet::ParseExcel::SaveParser::Worksheet' => 'Spreadsheet-ParseExcel',
'Spreadsheet::ParseExcel::Utility' => 'Spreadsheet-ParseExcel',
'Spreadsheet::ParseExcel::Workbook' => 'Spreadsheet-ParseExcel',
'Spreadsheet::ParseExcel::Worksheet' => 'Spreadsheet-ParseExcel',
'Spreadsheet::ParseXLSX' => 'Spreadsheet-ParseXLSX',
'Spreadsheet::ParseXLSX::Cell' => 'Spreadsheet-ParseXLSX',
'Spreadsheet::ParseXLSX::Decryptor' => 'Spreadsheet-ParseXLSX',
'Spreadsheet::ParseXLSX::Decryptor::Agile' => 'Spreadsheet-ParseXLSX',
'Spreadsheet::ParseXLSX::Decryptor::Standard' => 'Spreadsheet-ParseXLSX',
'Spreadsheet::ParseXLSX::Worksheet' => 'Spreadsheet-ParseXLSX',
'Storable' => 'Storable',
'Symbol' => 'perl',
'Sys::Hostname' => 'perl',
'Sys::Syslog' => 'Sys-Syslog',
'Sys::Syslog::Win32' => 'Sys-Syslog',
'Template::Declare::Exception' => 'Jifty',
'Template::Quick' => 'MySQL-Admin',
'Term::ReadLine::Gnu' => 'Term-ReadLine-Gnu',
'Term::ReadLine::Gnu::AU' => 'Term-ReadLine-Gnu',
'Term::ReadLine::Gnu::Var' => 'Term-ReadLine-Gnu',
'Term::ReadLine::Gnu::XS' => 'Term-ReadLine-Gnu',
'Test::Dpkg' => 'Dpkg',
'Test::Mojo' => 'Mojolicious',
'Test::Simply' => 'Fake-Our',
'Testing' => 'perl',
'Text::SmartyPants' => 'MojoMojo',
'Text::Wikispaces2Markdown' => 'MojoMojo',
'Thread' => 'perl',
'Thread::Signal' => 'perl',
'Thread::Specific' => 'perl',
'Tie::Array' => 'perl',
'Tie::ExtraHash' => 'perl',
'Tie::Handle' => 'perl',
'Tie::Hash' => 'perl',
'Tie::Hash::NamedCapture' => 'perl',
'Tie::Memoize' => 'perl',
'Tie::Scalar' => 'perl',
'Tie::StdArray' => 'perl',
'Tie::StdHandle' => 'perl',
'Tie::StdHash' => 'perl',
'Tie::StdScalar' => 'perl',
'Tie::SubstrHash' => 'perl',
'Tie::Watch' => 'Tk',
'Time::gmtime' => 'perl',
'Time::localtime' => 'perl',
'Time::tm' => 'perl',
'Tk' => 'Tk',
'Tk::Adjuster' => 'Tk',
'Tk::Adjuster::Item' => 'Tk',
'Tk::After' => 'Tk',
'Tk::Animation' => 'Tk',
'Tk::Balloon' => 'Tk',
'Tk::Bitmap' => 'Tk',
'Tk::BrowseEntry' => 'Tk',
'Tk::Button' => 'Tk',
'Tk::Canvas' => 'Tk',
'Tk::Checkbutton' => 'Tk',
'Tk::Clipboard' => 'Tk',
'Tk::CmdLine' => 'Tk',
'Tk::ColorDialog' => 'Tk',
'Tk::ColorEditor' => 'Tk',
'Tk::ColorSelect' => 'Tk',
'Tk::Compound' => 'Tk',
'Tk::Configure' => 'Tk',
'Tk::Derived' => 'Tk',
'Tk::Dialog' => 'Tk',
'Tk::DialogBox' => 'Tk',
'Tk::DirTree' => 'Tk',
'Tk::DirTreeDialog' => 'Tk',
'Tk::Dirlist' => 'Tk',
'Tk::DragDrop' => 'Tk',
'Tk::DragDrop::Common' => 'Tk',
'Tk::DragDrop::Local' => 'Tk',
'Tk::DragDrop::Rect' => 'Tk',
'Tk::DragDrop::SunConst' => 'Tk',
'Tk::DragDrop::SunDrop' => 'Tk',
'Tk::DragDrop::SunSite' => 'Tk',
'Tk::DragDrop::Win32Drop' => 'Tk',
'Tk::DragDrop::Win32Site' => 'Tk',
'Tk::DragDrop::XDNDDrop' => 'Tk',
'Tk::DragDrop::XDNDSite' => 'Tk',
'Tk::DropSite' => 'Tk',
'Tk::DummyEncode' => 'Tk',
'Tk::DummyEncode::iso8859_1' => 'Tk',
'Tk::English' => 'Tk',
'Tk::Entry' => 'Tk',
'Tk::ErrorDialog' => 'Tk',
'Tk::Event' => 'Tk',
'Tk::Event::IO' => 'Tk',
'Tk::FBox' => 'Tk',
'Tk::FileSelect' => 'Tk',
'Tk::FloatEntry' => 'Tk',
'Tk::Font' => 'Tk',
'Tk::Frame' => 'Tk',
'Tk::HList' => 'Tk',
'Tk::IO' => 'Tk',
'Tk::IconList' => 'Tk',
'Tk::Image' => 'Tk',
'Tk::InputO' => 'Tk',
'Tk::ItemStyle' => 'Tk',
'Tk::JPEG' => 'Tk',
'Tk::LabEntry' => 'Tk',
'Tk::LabFrame' => 'Tk',
'Tk::LabRadiobutton' => 'Tk',
'Tk::Label' => 'Tk',
'Tk::LabeledEntryLabeledRadiobutton' => 'Tk',
'Tk::Labelframe' => 'Tk',
'Tk::Listbox' => 'Tk',
'Tk::MMtry' => 'Tk',
'Tk::MMutil' => 'Tk',
'Tk::MainWindow' => 'Tk',
'Tk::MakeDepend' => 'Tk',
'Tk::Menu' => 'Tk',
'Tk::Menu::Button' => 'Tk',
'Tk::Menu::Cascade' => 'Tk',
'Tk::Menu::Checkbutton' => 'Tk',
'Tk::Menu::Item' => 'Tk',
'Tk::Menu::Radiobutton' => 'Tk',
'Tk::Menu::Separator' => 'Tk',
'Tk::Menubar' => 'Tk',
'Tk::Menubutton' => 'Tk',
'Tk::Message' => 'Tk',
'Tk::MsgBox' => 'Tk',
'Tk::Mwm' => 'Tk',
'Tk::NBFrame' => 'Tk',
'Tk::NoteBook' => 'Tk',
'Tk::Optionmenu' => 'Tk',
'Tk::PNG' => 'Tk',
'Tk::Pane' => 'Tk',
'Tk::Panedwindow' => 'Tk',
'Tk::Photo' => 'Tk',
'Tk::Pixmap' => 'Tk',
'Tk::Pretty' => 'Tk',
'Tk::ProgressBar' => 'Tk',
'Tk::ROText' => 'Tk',
'Tk::Radiobutton' => 'Tk',
'Tk::Region' => 'Tk',
'Tk::Reindex' => 'Tk',
'Tk::ReindexedROText' => 'Tk',
'Tk::ReindexedText' => 'Tk',
'Tk::Scale' => 'Tk',
'Tk::Scrollbar' => 'Tk',
'Tk::Spinbox' => 'Tk',
'Tk::Stats' => 'Tk',
'Tk::Stdio' => 'PAR',
'Tk::Stdio::Handle' => 'PAR',
'Tk::Submethods' => 'Tk',
'Tk::TList' => 'Tk',
'Tk::Table' => 'Tk',
'Tk::Text' => 'Tk',
'Tk::Text::Tag' => 'Tk',
'Tk::TextEdit' => 'Tk',
'Tk::TextList' => 'Tk',
'Tk::TextUndo' => 'Tk',
'Tk::Tiler' => 'Tk',
'Tk::TixGrid' => 'Tk',
'Tk::Toplevel' => 'Tk',
'Tk::Trace' => 'Tk',
'Tk::Tree' => 'Tk',
'Tk::Widget' => 'Tk',
'Tk::WinPhoto' => 'Tk',
'Tk::Wm' => 'Tk',
'Tk::X' => 'Tk',
'Tk::X11Font' => 'Tk',
'Tk::Xlib' => 'Tk',
'Tk::Xrm' => 'Tk',
'Tk::install' => 'Tk',
'Tk::widgets' => 'Tk',
'U64' => 'IO-Compress',
'UDDI::Constants' => 'SOAP-Lite',
'UI::Dialog' => 'UI-Dialog',
'UI::Dialog::Backend' => 'UI-Dialog',
'UI::Dialog::Backend::ASCII' => 'UI-Dialog',
'UI::Dialog::Backend::CDialog' => 'UI-Dialog',
'UI::Dialog::Backend::GDialog' => 'UI-Dialog',
'UI::Dialog::Backend::KDialog' => 'UI-Dialog',
'UI::Dialog::Backend::Nautilus' => 'UI-Dialog',
'UI::Dialog::Backend::NotifySend' => 'UI-Dialog',
'UI::Dialog::Backend::Whiptail' => 'UI-Dialog',
'UI::Dialog::Backend::XDialog' => 'UI-Dialog',
'UI::Dialog::Backend::XOSD' => 'UI-Dialog',
'UI::Dialog::Backend::Zenity' => 'UI-Dialog',
'UI::Dialog::Console' => 'UI-Dialog',
'UI::Dialog::GNOME' => 'UI-Dialog',
'UI::Dialog::Gauged' => 'UI-Dialog',
'UI::Dialog::KDE' => 'UI-Dialog',
'UI::Dialog::Screen::Druid' => 'UI-Dialog',
'UI::Dialog::Screen::Menu' => 'UI-Dialog',
'UNIVERSAL' => 'perl',
'URI::jabber' => 'SOAP-Lite',
'Unicode::UCD' => 'perl',
'UnicodeCD' => 'perl',
'User::grent' => 'perl',
'User::pwent' => 'perl',
'VMS::DCLsym' => 'perl',
'VMS::Filespec' => 'perl',
'VMS::Stdio' => 'perl',
'Valiant' => 'Valiant',
'Valiant::Error' => 'Valiant',
'Valiant::Errors' => 'Valiant',
'Valiant::Filter' => 'Valiant',
'Valiant::Filter::Collapse' => 'Valiant',
'Valiant::Filter::Collection' => 'Valiant',
'Valiant::Filter::Each' => 'Valiant',
'Valiant::Filter::Flatten' => 'Valiant',
'Valiant::Filter::HtmlEscape' => 'Valiant',
'Valiant::Filter::Lower' => 'Valiant',
'Valiant::Filter::Numberize' => 'Valiant',
'Valiant::Filter::Template' => 'Valiant',
'Valiant::Filter::Title' => 'Valiant',
'Valiant::Filter::ToArray' => 'Valiant',
'Valiant::Filter::Trim' => 'Valiant',
'Valiant::Filter::UcFirst' => 'Valiant',
'Valiant::Filter::Upper' => 'Valiant',
'Valiant::Filter::With' => 'Valiant',
'Valiant::Filterable' => 'Valiant',
'Valiant::Filters' => 'Valiant',
'Valiant::HTML::BaseComponent' => 'Valiant',
'Valiant::HTML::Component' => 'Valiant',
'Valiant::HTML::Components' => 'Valiant',
'Valiant::HTML::ContentComponent' => 'Valiant',
'Valiant::HTML::Form' => 'Valiant',
'Valiant::HTML::FormBuilder' => 'Valiant',
'Valiant::HTML::FormBuilder::Checkbox' => 'Valiant',
'Valiant::HTML::FormBuilder::DefaultModel' => 'Valiant',
'Valiant::HTML::FormBuilder::Model' => 'Valiant',
'Valiant::HTML::FormBuilder::Model::TextField' => 'Valiant',
'Valiant::HTML::FormBuilder::RadioButton' => 'Valiant',
'Valiant::HTML::FormBuilder::Renderer::TextField' => 'Valiant',
'Valiant::HTML::FormTags' => 'Valiant',
'Valiant::HTML::PagerBuilder' => 'Valiant',
'Valiant::HTML::SafeString' => 'Valiant',
'Valiant::HTML::Tag' => 'Valiant',
'Valiant::HTML::TagBuilder' => 'Valiant',
'Valiant::HTML::Util::Collection' => 'Valiant',
'Valiant::HTML::Util::Collection::HashItem' => 'Valiant',
'Valiant::HTML::Util::Collection::Item' => 'Valiant',
'Valiant::HTML::Util::Form' => 'Valiant',
'Valiant::HTML::Util::Form::FormObject' => 'Valiant',
'Valiant::HTML::Util::FormTags' => 'Valiant',
'Valiant::HTML::Util::Pager' => 'Valiant',
'Valiant::HTML::Util::TagBuilder' => 'Valiant',
'Valiant::HTML::Util::TagBuilder::_tags' => 'Valiant',
'Valiant::HTML::Util::View' => 'Valiant',
'Valiant::I18N' => 'Valiant',
'Valiant::I18N::Tag' => 'Valiant',
'Valiant::JSON::JSONBuilder' => 'Valiant',
'Valiant::JSON::Util' => 'Valiant',
'Valiant::Name' => 'Valiant',
'Valiant::Naming' => 'Valiant',
'Valiant::NestedError' => 'Valiant',
'Valiant::Proxy' => 'Valiant',
'Valiant::Proxy::Array' => 'Valiant',
'Valiant::Proxy::Hash' => 'Valiant',
'Valiant::Proxy::Object' => 'Valiant',
'Valiant::Translation' => 'Valiant',
'Valiant::Util' => 'Valiant',
'Valiant::Util::Ancestors' => 'Valiant',
'Valiant::Util::Exception' => 'Valiant',
'Valiant::Util::Exception::General' => 'Valiant',
'Valiant::Util::Exception::InvalidFilterArgs' => 'Valiant',
'Valiant::Util::Exception::InvalidValidatorArgs' => 'Valiant',
'Valiant::Util::Exception::MissingCountKey' => 'Valiant',
'Valiant::Util::Exception::MissingMethod' => 'Valiant',
'Valiant::Util::Exception::NameNotFilter' => 'Valiant',
'Valiant::Util::Exception::NameNotValidator' => 'Valiant',
'Valiant::Util::Exception::Strict' => 'Valiant',
'Valiant::Util::Exception::UnexpectedUseModuleError' => 'Valiant',
'Valiant::Validates' => 'Valiant',
'Valiant::Validations' => 'Valiant',
'Valiant::Validator' => 'Valiant',
'Valiant::Validator::Absence' => 'Valiant',
'Valiant::Validator::Array' => 'Valiant',
'Valiant::Validator::Boolean' => 'Valiant',
'Valiant::Validator::Check' => 'Valiant',
'Valiant::Validator::Collection' => 'Valiant',
'Valiant::Validator::Confirmation' => 'Valiant',
'Valiant::Validator::Date' => 'Valiant',
'Valiant::Validator::Each' => 'Valiant',
'Valiant::Validator::Exclusion' => 'Valiant',
'Valiant::Validator::Format' => 'Valiant',
'Valiant::Validator::Hash' => 'Valiant',
'Valiant::Validator::Inclusion' => 'Valiant',
'Valiant::Validator::Length' => 'Valiant',
'Valiant::Validator::Numericality' => 'Valiant',
'Valiant::Validator::Object' => 'Valiant',
'Valiant::Validator::OnlyOf' => 'Valiant',
'Valiant::Validator::Presence' => 'Valiant',
'Valiant::Validator::Scalar' => 'Valiant',
'Valiant::Validator::Unique' => 'Valiant',
'Valiant::Validator::With' => 'Valiant',
'WWW::Mechanize' => 'WWW-Mechanize',
'WWW::Mechanize::Image' => 'WWW-Mechanize',
'WWW::Mechanize::Link' => 'WWW-Mechanize',
'WidgetDemo' => 'Tk',
'Win32::File::Summary' => 'Win32-File-Summary',
'Win32CORE' => 'perl',
'X509_Certificate' => 'IO-Socket-SSL',
'XAO::DO::CGI' => 'XAO-Web',
'XAO::DO::Context' => 'XAO-Web',
'XAO::DO::Web::Action' => 'XAO-Web',
'XAO::DO::Web::Benchmark' => 'XAO-Web',
'XAO::DO::Web::CgiParam' => 'XAO-Web',
'XAO::DO::Web::Clipboard' => 'XAO-Web',
'XAO::DO::Web::Condition' => 'XAO-Web',
'XAO::DO::Web::Config' => 'XAO-Web',
'XAO::DO::Web::Cookie' => 'XAO-Web',
'XAO::DO::Web::Date' => 'XAO-Web',
'XAO::DO::Web::Debug' => 'XAO-Web',
'XAO::DO::Web::Default' => 'XAO-Web',
'XAO::DO::Web::FS' => 'XAO-Web',
'XAO::DO::Web::FilloutForm' => 'XAO-Web',
'XAO::DO::Web::Footer' => 'XAO-Web',
'XAO::DO::Web::Header' => 'XAO-Web',
'XAO::DO::Web::IdentifyAgent' => 'XAO-Web',
'XAO::DO::Web::IdentifyUser' => 'XAO-Web',
'XAO::DO::Web::Mailer' => 'XAO-Web',
'XAO::DO::Web::Math' => 'XAO-Web',
'XAO::DO::Web::MenuBuilder' => 'XAO-Web',
'XAO::DO::Web::MultiPageNav' => 'XAO-Web',
'XAO::DO::Web::Page' => 'XAO-Web',
'XAO::DO::Web::Redirect' => 'XAO-Web',
'XAO::DO::Web::Search' => 'XAO-Web',
'XAO::DO::Web::SetArg' => 'XAO-Web',
'XAO::DO::Web::Styler' => 'XAO-Web',
'XAO::DO::Web::TextTable' => 'XAO-Web',
'XAO::DO::Web::URL' => 'XAO-Web',
'XAO::DO::Web::Utility' => 'XAO-Web',
'XAO::PageSupport' => 'XAO-Web',
'XAO::PluginUtils' => 'XAO-Web',
'XAO::PreLoad' => 'XAO-Web',
'XAO::Templates' => 'XAO-Web',
'XAO::Web' => 'XAO-Web',
'XAO::testcases::Web::base' => 'XAO-Web',
'XML::Atom' => 'XML-Atom',
'XML::Atom::Base' => 'XML-Atom',
'XML::Atom::Category' => 'XML-Atom',
'XML::Atom::Client' => 'XML-Atom',
'XML::Atom::Content' => 'XML-Atom',
'XML::Atom::Entry' => 'XML-Atom',
'XML::Atom::ErrorHandler' => 'XML-Atom',
'XML::Atom::Feed' => 'XML-Atom',
'XML::Atom::Link' => 'XML-Atom',
'XML::Atom::Namespace' => 'XML-Atom',
'XML::Atom::Person' => 'XML-Atom',
'XML::Atom::Server' => 'XML-Atom',
'XML::Atom::Thing' => 'XML-Atom',
'XML::Atom::Util' => 'XML-Atom',
'XML::DT' => 'XML-DT',
'XML::LibXML' => 'XML-LibXML',
'XML::LibXML::Attr' => 'XML-LibXML',
'XML::LibXML::AttributeHash' => 'XML-LibXML',
'XML::LibXML::Boolean' => 'XML-LibXML',
'XML::LibXML::CDATASection' => 'XML-LibXML',
'XML::LibXML::Comment' => 'XML-LibXML',
'XML::LibXML::Common' => 'XML-LibXML',
'XML::LibXML::Devel' => 'XML-LibXML',
'XML::LibXML::Document' => 'XML-LibXML',
'XML::LibXML::DocumentFragment' => 'XML-LibXML',
'XML::LibXML::Dtd' => 'XML-LibXML',
'XML::LibXML::Element' => 'XML-LibXML',
'XML::LibXML::ErrNo' => 'XML-LibXML',
'XML::LibXML::Error' => 'XML-LibXML',
'XML::LibXML::InputCallback' => 'XML-LibXML',
'XML::LibXML::Literal' => 'XML-LibXML',
'XML::LibXML::NamedNodeMap' => 'XML-LibXML',
'XML::LibXML::Namespace' => 'XML-LibXML',
'XML::LibXML::Node' => 'XML-LibXML',
'XML::LibXML::NodeList' => 'XML-LibXML',
'XML::LibXML::Number' => 'XML-LibXML',
'XML::LibXML::PI' => 'XML-LibXML',
'XML::LibXML::Pattern' => 'XML-LibXML',
'XML::LibXML::Reader' => 'XML-LibXML',
'XML::LibXML::RegExp' => 'XML-LibXML',
'XML::LibXML::RelaxNG' => 'XML-LibXML',
'XML::LibXML::SAX' => 'XML-LibXML',
'XML::LibXML::SAX::AttributeNode' => 'XML-LibXML',
'XML::LibXML::SAX::Builder' => 'XML-LibXML',
'XML::LibXML::SAX::Generator' => 'XML-LibXML',
'XML::LibXML::SAX::Parser' => 'XML-LibXML',
'XML::LibXML::Schema' => 'XML-LibXML',
'XML::LibXML::Text' => 'XML-LibXML',
'XML::LibXML::XPathContext' => 'XML-LibXML',
'XML::LibXML::XPathExpression' => 'XML-LibXML',
'XML::LibXML::_SAXParser' => 'XML-LibXML',
'XML::Simple' => 'XML-Simple',
'XML::Twig' => 'XML-Twig',
'XML::Twig::Elt' => 'XML-Twig',
'XML::Twig::Entity' => 'XML-Twig',
'XML::Twig::Entity_list' => 'XML-Twig',
'XML::Twig::Notation' => 'XML-Twig',
'XML::Twig::Notation_list' => 'XML-Twig',
'XML::Twig::XPath' => 'XML-Twig',
'XML::Twig::XPath::Attribute' => 'XML-Twig',
'XML::Twig::XPath::Elt' => 'XML-Twig',
'XML::Twig::XPath::Namespace' => 'XML-Twig',
'XS::APItest' => 'perl',
'XS::Typemap' => 'perl',
'YAML' => 'YAML',
'YAML::Any' => 'YAML',
'YAML::Dumper' => 'YAML',
'YAML::Dumper::Base' => 'YAML',
'YAML::Error' => 'YAML',
'YAML::LibYAML' => 'YAML-LibYAML',
'YAML::Loader' => 'YAML',
'YAML::Loader::Base' => 'YAML',
'YAML::Marshall' => 'YAML',
'YAML::Mo' => 'YAML',
'YAML::Node' => 'YAML',
'YAML::Tag' => 'YAML',
'YAML::Type::blessed' => 'YAML',
'YAML::Type::code' => 'YAML',
'YAML::Type::glob' => 'YAML',
'YAML::Type::ref' => 'YAML',
'YAML::Type::regexp' => 'YAML',
'YAML::Type::undef' => 'YAML',
'YAML::Types' => 'YAML',
'YAML::Warning' => 'YAML',
'YAML::XS' => 'YAML-LibYAML',
'YAML::XS::LibYAML' => 'YAML-LibYAML',
'Zlib::OldDeflate' => 'IO-Compress',
'Zlib::OldInflate' => 'IO-Compress',
'Zonemaster::Backend' => 'Zonemaster-Backend',
'Zonemaster::Backend::Config' => 'Zonemaster-Backend',
'Zonemaster::Backend::Config::DCPlugin' => 'Zonemaster-Backend',
'Zonemaster::Backend::DB' => 'Zonemaster-Backend',
'Zonemaster::Backend::DB::MySQL' => 'Zonemaster-Backend',
'Zonemaster::Backend::DB::PostgreSQL' => 'Zonemaster-Backend',
'Zonemaster::Backend::DB::SQLite' => 'Zonemaster-Backend',
'Zonemaster::Backend::Error' => 'Zonemaster-Backend',
'Zonemaster::Backend::Error::Conflict' => 'Zonemaster-Backend',
'Zonemaster::Backend::Error::Internal' => 'Zonemaster-Backend',
'Zonemaster::Backend::Error::JsonError' => 'Zonemaster-Backend',
'Zonemaster::Backend::Error::PermissionDenied' => 'Zonemaster-Backend',
'Zonemaster::Backend::Error::ResourceNotFound' => 'Zonemaster-Backend',
'Zonemaster::Backend::Log' => 'Zonemaster-Backend',
'Zonemaster::Backend::Metrics' => 'Zonemaster-Backend',
'Zonemaster::Backend::RPCAPI' => 'Zonemaster-Backend',
'Zonemaster::Backend::TestAgent' => 'Zonemaster-Backend',
'Zonemaster::Backend::Translator' => 'Zonemaster-Backend',
'Zonemaster::Backend::Validator' => 'Zonemaster-Backend',
'arybase' => 'perl',
'attributes' => 'perl',
'attrs' => 'perl',
'back_tick_a_command' => 'PAR',
'blib' => 'perl',
'builtin' => 'perl',
'bytes' => 'perl',
'charnames' => 'perl',
'deprecate' => 'perl',
'diagnostics' => 'perl',
'encoding' => 'Encode',
'feature' => 'perl',
'filetest' => 'perl',
'for' => 'perl',
'in' => 'perl',
'integer' => 'perl',
'java::lang::String' => 'perl',
'less' => 'perl',
'locale' => 'perl',
'mod_perl' => 'mod_perl',
'mod_perl2' => 'mod_perl',
'mro' => 'perl',
'of' => 'perl',
'ojo' => 'Mojolicious',
'open' => 'perl',
'ops' => 'perl',
'overload' => 'perl',
'overload::numbers' => 'perl',
'overloading' => 'perl',
'pipe_a_command' => 'PAR',
'pp' => 'PAR-Packer',
'prior_to_test' => 'PAR',
're' => 'perl',
'remove_file_and_try_executable_again' => 'PAR',
'sigtrap' => 'perl',
'site' => 'Apache-ASP',
'sort' => 'perl',
'strict' => 'perl',
'subs' => 'perl',
't::BHK' => 'perl',
't::Markers' => 'perl',
'test_in_further_subdir' => 'PAR',
'testcases::base' => 'XAO-Web',
'testcases::requires' => 'XAO-Web',
'utf8' => 'perl',
'vars' => 'perl',
'vmsish' => 'perl',
'warnings' => 'perl',
'warnings::register' => 'perl',
'yaml_mapping' => 'YAML',
'yaml_scalar' => 'YAML',
'yaml_sequence' => 'YAML'
}
};
}
__PACKAGE__;