CPANSA-DB-20250304.001/0000755000076500000240000000000014761613004012462 5ustar brianstaffCPANSA-DB-20250304.001/LICENSE0000644000076500000240000002156114761613003013473 0ustar brianstaffArtistic License 2.0 Copyright (c) 2000-2006, The Perl Foundation. Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble ******** This license establishes the terms under which a given free software Package may be copied, modified, distributed, and/or redistributed. The intent is that the Copyright Holder maintains some artistic control over the development of that Package while still keeping the Package available as open source and free software. You are always permitted to make arrangements wholly outside of this license directly with the Copyright Holder of a given Package. If the terms of this license do not permit the full use that you propose to make of the Package, you should contact the Copyright Holder and seek a different licensing arrangement. Definitions *********** "Copyright Holder" means the individual(s) or organization(s) named in the copyright notice for the entire Package. "Contributor" means any party that has contributed code or other material to the Package, in accordance with the Copyright Holder's procedures. "You" and "your" means any person who would like to copy, distribute, or modify the Package. "Package" means the collection of files distributed by the Copyright Holder, and derivatives of that collection and/or of those files. A given Package may consist of either the Standard Version, or a Modified Version. "Distribute" means providing a copy of the Package or making it accessible to anyone else, or in the case of a company or organization, to others outside of your company or organization. "Distributor Fee" means any fee that you charge for Distributing this Package or providing support for this Package to another party. It does not mean licensing fees. "Standard Version" refers to the Package if it has not been modified, or has been modified only in ways explicitly requested by the Copyright Holder. "Modified Version" means the Package, if it has been changed, and such changes were not explicitly requested by the Copyright Holder. "Original License" means this Artistic License as Distributed with the Standard Version of the Package, in its current version or as it may be modified by The Perl Foundation in the future. "Source" form means the source code, documentation source, and configuration files for the Package. "Compiled" form means the compiled bytecode, object code, binary, or any other form resulting from mechanical transformation or translation of the Source form. Permission for Use and Modification Without Distribution ******************************************************** (1) You are permitted to use the Standard Version and create and use Modified Versions for any purpose without restriction, provided that you do not Distribute the Modified Version. Permissions for Redistribution of the Standard Version ****************************************************** (2) You may Distribute verbatim copies of the Source form of the Standard Version of this Package in any medium without restriction, either gratis or for a Distributor Fee, provided that you duplicate all of the original copyright notices and associated disclaimers. At your discretion, such verbatim copies may or may not include a Compiled form of the Package. (3) You may apply any bug fixes, portability changes, and other modifications made available from the Copyright Holder. The resulting Package will still be considered the Standard Version, and as such will be subject to the Original License. Distribution of Modified Versions of the Package as Source ********************************************************** (4) You may Distribute your Modified Version as Source (either gratis or for a Distributor Fee, and with or without a Compiled form of the Modified Version) provided that you clearly document how it differs from the Standard Version, including, but not limited to, documenting any non-standard features, executables, or modules, and provided that you do at least ONE of the following: (a) make the Modified Version available to the Copyright Holder of the Standard Version, under the Original License, so that the Copyright Holder may include your modifications in the Standard Version. (b) ensure that installation of your Modified Version does not prevent the user installing or running the Standard Version. In addition, the Modified Version must bear a name that is different from the name of the Standard Version. (c) allow anyone who receives a copy of the Modified Version to make the Source form of the Modified Version available to others under (i) the Original License or (ii) a license that permits the licensee to freely copy, modify and redistribute the Modified Version using the same licensing terms that apply to the copy that the licensee received, and requires that the Source form of the Modified Version, and of any works derived from it, be made freely available in that license fees are prohibited but Distributor Fees are allowed. Distribution of Compiled Forms of the Standard Version or Modified ****************************************************************** Versions without the Source *************************** (5) You may Distribute Compiled forms of the Standard Version without the Source, provided that you include complete instructions on how to get the Source of the Standard Version. Such instructions must be valid at the time of your distribution. If these instructions, at any time while you are carrying out such distribution, become invalid, you must provide new instructions on demand or cease further distribution. If you provide valid instructions or cease distribution within thirty days after you become aware that the instructions are invalid, then you do not forfeit any of your rights under this license. (6) You may Distribute a Modified Version in Compiled form without the Source, provided that you comply with Section 4 with respect to the Source of the Modified Version. Aggregating or Linking the Package ********************************** (7) You may aggregate the Package (either the Standard Version or Modified Version) with other packages and Distribute the resulting aggregation provided that you do not charge a licensing fee for the Package. Distributor Fees are permitted, and licensing fees for other components in the aggregation are permitted. The terms of this license apply to the use and Distribution of the Standard or Modified Versions as included in the aggregation. (8) You are permitted to link Modified and Standard Versions with other works, to embed the Package in a larger work of your own, or to build stand-alone binary or bytecode versions of applications that include the Package, and Distribute the result without restriction, provided the result does not expose a direct interface to the Package. Items That are Not Considered Part of a Modified Version ******************************************************** (9) Works (including, but not limited to, modules and scripts) that merely extend or make use of the Package, do not, by themselves, cause the Package to be a Modified Version. In addition, such works are not considered parts of the Package itself, and are not subject to the terms of this license. General Provisions ****************** (10) Any use, modification, and distribution of the Standard or Modified Versions is governed by this Artistic License. By using, modifying or distributing the Package, you accept this license. Do not use, modify, or distribute the Package, if you do not accept this license. (11) If your Modified Version has been derived from a Modified Version made by someone other than you, you are nevertheless required to ensure that your Modified Version complies with the requirements of this license. (12) This license does not grant you the right to use any trademark, service mark, tradename, or logo of the Copyright Holder. (13) This license includes the non-exclusive, worldwide, free-of-charge patent license to make, have made, use, offer to sell, sell, import and otherwise transfer the Package with respect to any patent claims licensable by the Copyright Holder that are necessarily infringed by the Package. If you institute patent litigation (including a cross-claim or counterclaim) against any party alleging that the Package constitutes direct or contributory patent infringement, then this Artistic License to you shall terminate on the date that such litigation is filed. (14) Disclaimer of Warranty: THE PACKAGE IS PROVIDED BY THE COPYRIGHT HOLDER AND CONTRIBUTORS "AS IS' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES. THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT ARE DISCLAIMED TO THE EXTENT PERMITTED BY YOUR LOCAL LAW. UNLESS REQUIRED BY LAW, NO COPYRIGHT HOLDER OR CONTRIBUTOR WILL BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, OR CONSEQUENTIAL DAMAGES ARISING IN ANY WAY OUT OF THE USE OF THE PACKAGE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. CPANSA-DB-20250304.001/images/0000755000076500000240000000000014761613004013727 5ustar brianstaffCPANSA-DB-20250304.001/images/briandfoy-gpg-key-selfie.jpeg0000644000076500000240000121672214761613003021373 0ustar brianstaffJFIFHH @ExifMM* (12<BCiAppleiPhone 13 Pro MaxHH15.52022:06:27 17:01:58iPhone 13 Pro Max""'0232ȐАؑ     |5375370100523 4, ` 2022:06:27 17:01:582022:06:27 17:01:58-04:00-04:00-04:00.?"Han)dApple iOSMM& .h      r    B@     %! % & ' +%- . / 0  1X2 `803 04 5 6 7 : ; < @JjA*J bplist00O[jneOYQ 8o$^QSmF%l,/{/|#AHs;wsxIJ0{ /|~-)GG|V7F\]TS^laY_O=luY^jpd"~}E(  bplist00UflagsUvalueYtimescaleUepochL2\1;'-/8= ?sj1AZseAm1gYasGCxJt94v1xTM7uDKrq750n97566D85-200E-4D90-96D3-EC989DC93874X}2KFAD23100-2D6D-4703-846F-4CBFB66CC1BC"bplist00O,{?Ń;G~?z99ݼ?7bplist00Q3Q1Q2Q0" "bplist00  ? ?  AppleiPhone 13 Pro Max front camera 2.71mm f/2.2 http://ns.adobe.com/xap/1.0/ xPhotoshop 3.08BIM?Z%G?170158>20220627720220627<1701588BIM%b?rw1W(ICC_PROFILEapplmntrRGB XYZ acspAPPLAPPL-appl8GmOz/ desc0cprt,Pwtpt|rXYZgXYZbXYZrTRC chad,bTRC gTRC mluc enUSDisplay P3mluc enUS4Copyright Apple Inc., 2022XYZ ,XYZ =XYZ J7 XYZ (8 ȹparaff Y [sf32 B&n5" }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyzC  C ? ? #@;T*'\U31Xؐ9 {v Cn=?^kE^$QG'N8=sKC_M~Aw`G[:{ơ#Df zu:V_Ewt?? C.CQ6L R6YN;zF\9F26ST Xu^$=QaJ>rN2Ou}Q8$8߯k6w' 㿠"&uh;r1Ƌʁp<'>^[kIQ|YAV@s33P m n3SN|aOUR6s=;֠&쑜y4(]܁В_H f'x`FΣLb@yP:rO*m]Óԃo|g?ʑMpq 7cHQsMa8vi`ba`9cyڞx'%gGtCH;NzGJz$BF{9h %lwi˫[$2t/!vYN잀vYXdށGYmڹ\u=x&̷xHl +klc O֥Zdl1 OߵKBsxdaaL:^F}>RF&E,A3?H.Xͤiy$ s֢o7.L0P6H.сN&a1\7qְO)0yLJwyl\'?(u@l|<sVXF[pN}=9FuU݉[ڠ:npx^h#jp@ >?Cm5y<F `Ip0p(uF@WMē@ICOz: ,*~b#JknOLp2=M :;p[`HIۂ};u-.ʫW\n%OqGLgڞN7ciӞiR2bē9ǧ4~pb>Wr^Z3 3`wObOBh%X?/d-;sV#; 49iGc@+8zZ~i~q,`3ǧ֣`ʤ9Fڹl H|uhxv1Owv 78Sޓ ډڡzGZ~`6n \uT=##N T:}*l2)ݸ`c♻jBN8Ƥ8+'= 6E6Lh<.2=N;9A8"덪N@8 r:tJGvW=y (?xv#v@=9^@a<t 9烟^?Z`d dsl,zK$tGۀGauȩ2cSHN90H<3qڀHn̎Xu>Ԉ\J`t\c|}iA瑌kHL:8_Νl>=z`Yr1Si^T1ALՔ(zMc< 1 FW.r:u`UW F03yw=NYXG'wK&D{~=!?.X1݉i1@1I 1Ii']v稦?;o~I#f2NXI9gtn/''$;c r'MQ<@08S=NzTm)uߐ;g኱ RFTv1YpY@'sTv!}~8QH\r138 pXYH8^|?] J{y ۊ/,t]JI 8ԎvcO'?3Twp}Z| 4;F~tw `01b. MF'?œ@,yA t[*O$@S+ŰW$s:J$X`\JĐ x9e}ە,>#90}vqc9u '*˴?!$4N:O^`<ǧlA,1hsZʠ`T8uQOOof8 WO3<ˆRaϯ|@ d~3L'# רR ڞp2_B=A&;wv۞Uvp%Cs)9$ud<¤{zF~lyۈ$uLgkchj0cFxgJ;x}OZB@5Pm# snxI,Ʃoy` tTɕ9'⬁ r銤v9+Z'#{`6B;PO3AI7 G_qzcGv0'h-9O,1u(a۷S\fW?a沌=>T{V"g,$wZR9{4xF)[#5@ǐ1L lE?B qޟwE@gϧU~y @>JFg9#?ʞW0;1#qX#¶p>^16/g<;i:) yhUO>T-j+;ȰIP6#ۥ{!ʔ,]:?JnH|YesqktgZ?E'<28;^g{"֪eg229H(^4yl^6rTj  V~+5ۃkzě|>UI<iy jM2|bo0jT PG 9O$`XVΈ hn.cd=_%$ 9#͏,n H?I8o2Xd{tU<\TSV #z>Еwzc+ G6AvΘ_ؐHNI=9=-u;y3'5a.G>[ py\" \RG>RVTRRcB}9C(`U}ۈ>uwGk7eot˨\.qҥOܳ)n̄9*9{WڤlRlN$ţ/7;Fʯ={5`#Or>Gܪ2Ի / N8=zᏉT+!2@<Vc-^eu籩`tl?1/:~TNFQxD^ <J5F 1v A_҂7# r#+(cVI}qJw+]R1*3sx /R1cuqA*!'h`s 9@tZkA3QtrBUQ i(3~sRƎe՛<Ϛh!N0;0;,A;H|cҤDdӍ?CvF:c)~v ?wɨӒ: c緵G" 8 `UE9Aʎ֪HAm8Uf^NGyh$=ubXm> ;:'2Υ¶OzjiA$s?#)D? 45'I$GCEOT Tq99T)qH(,#9ڑI A8 x秧4.{O|7c'sPGSȥq,r6>?1CJYz=)U@݂8=q;=qϵKw 0?j2nNHCrw)6ߦ3֐ rI>*qG=~ TW%$oOZGV879+03O4 03t 4\V#, .A#wjkk #Փm$(0r{}M(P<{sEMJMoݐgJq /4q?Ҷs ϯӥ Ip;.#>2b U?^==hRN:AZ<&6SI<7㈲!drkYO 93A,I2NO87&9t䘁_''ۏPe@_{ w~UWܹ֞WP ʠ5eQ"l2604c`7cj ~.˨n䗂)d j. $z`گi5d%ln`N}{f2\?,W$H088=1"#q}3ߎ1N ,~SHR8V|V}We2u:9?Ҡ©8>7%vdрcOq`#9zҤcs)%'Un2\sL 0niܯb8#];O\gj'9|S;s/q@Fv&3y=1R O?PO#a>S'#I <=3HC<ӭ*A#+ӌ*5!Nz$d—!?g>-tj4Cd z.>ZVp w#6xi$J0x)V'=O=;x\ cU q Zo9941Q;TXa3 I=)Aq==hAuޖs4z:0PsמJ!el>`sK  V3]D#9q#iiōA$dg=wRĖ\>8FФtFjhՉb;OBFє1ހ1eS6$8[Wc9:Ys'[cM !<qr1-3v9P@Uk޽ Jo[1!$})C5 SϿZsƓH#?Qszz>iI9=1Y:@2`ܟdjFAS=OAU Мt98ǮSAoϥz+d`998z:םdp13}+N$`siXP*h`X)u<6+zt68X:;%[//`j7nG 0<~dUkq8'|SN-Fߏ UN={ڧUHQ[ YXn?Υ#_nSOT7;FX}AҠ)fGn`T1܌Kv88Th3+t5cL2}8 U}&ބ`vHF"31i8s񞾹ؚa;y;j<10Os޳8qxAM9=A=s'H'#׎?J,/eg9`'ۑ6'o[ ۸ tqcl41oI^1' ORx9bYQ gGR3N:tp6]?1888=1uK%=G^A?L ,J~?G0I g<)9#?5,M#+?ϯjYS^3y{NhбPϡJK0'=Obø1VL#jϟoc@G@3Jr$g#r>)pNшS"A㞽:St IaIuL~Uip I8?E!PGsVa=atOƞ.HJI'rxqҧ }03qz(<0qAd#g =@n9,F03Q$ZB\pR{{H3ab R %7* 2@PԐA\mKMbH!=*'o΀?ӼfƨEnp=Iz=F2]pF=I4i!'@;k@+5KL+h##0+)]D,zZnj-Xo{Iԟx=L,rU8tkZZ+֦Ȑ[lz✻ \炣"S'ڀ%[F:v⹌ .zty ;8 7^#ya<@t46w`ddϮj̬ #' A}Ӱ#j);pv1}@XݜnN?ϵFOˑFJLL9@{supbTs s:t5FޘtΗ'^Jc=ϯN1H2v|}84:@/p q{Qp'=iw8{aq|z{g׽9yv uyt09V88q_ң) q(Uؠ p23.I!xfltZy N@Ǩ8^h]($.x ~=s%b~9#@<'R8 w uG~ǮxFmÌtIw zz*+rCܕr Ue' ۾R?/#i7a  8_@:u(=s?_j\o)̪z[8_vcAb{ty`q5v1yi+2I8@ w_K~_JTc>Pr{Ӷn@8@gTWoA?Z($NX G^@T%wn^ cJځ~%Jp(׷p# ~\HkxoH26xR;#`geDY<`gp=a G4¨wd>'&Ac$g((pwL?uX*ko!ḡ>f<~9KM1u pC0?QS`:1Av ?#ۥ9Twscg<縩“c'NFqHzdcgJ00OOOŒN0{î;TX!{5>n?LT;N3rN6?ǭ=m·??L4FGLPAx _nFwO< 9x'dr1Du<|q})J8#EA€sAw}R0y-wi @sj<9b"2 \1O\qKtCaq=3Q'>ǰydvP3'#};|y#1}#IXnzs?qZ1`|}}HQ'ޤOlrP}G?G sSӻD;r-8<9{TQr1҃Њ3\AhhЌw?/NZ_!G@Fsc '׿Zbu@ <9N;瞝@=o\J F{ wt1ÌdQHm8^ǧ^;S ؜t1 \= RX|7LZ*ߑ=?2hɌO tPr91U8r1߿z!(8€4žYv@ g995Y'==)ݠヴ}GJ3`~av4JȒCIK0ִ&|=\P.pdt$d,q55Rms^w cs# ^Hing9U wwG^{zqAGXh N>泵=`T9ֶ v92VV$:wH%f?T~f,2Oj]9m䐰ÿ<_jB1C<:*uPFRqlu=G# dO<{Re <:bKnE;p9'S[nG^:Js9nNr; oN3@ ps=9?Z\kt2q{8q=Axyװ qǹsN BQzS–'ˍwӥ"ϯ#:@ f ۀ>"|'?T`߿Z.sW;+n'UIrw`$CSvdT*? RPzcӆ 8}zFR:|On3٠$uϧjapIl5++vrx$}*@hnu _F,,,-pA$~8WVᛖ oOj|8$[3N x@򦆑uU=zQ U#}3O Qªq?zB 1MF|F8$*xT$p2Ghع=xNA3''>@qޫLzh}x#_“`W`Y8=@>}? aIs@sRmsi6u݀sǧ ~rT}^$}=({dgJILr:}1N*@wF$4BA!ǜqA4) y:#|`㿷4s9^9Мfgv:Fp4 `; F$p9<Ҍ;s=2{Ґtz=qB)`h<`Ԁ/8= '#d8Oy8'@ H=Om㯮==j<@9p:ק mUe =d!# q^AQGsԄfsӟNܜgy}=gQt qF{~3 O\=8b=9ޢP3c+][(ssYS#BG̻r88;qfe1lޞ D"bdP˘ؒ>5Z?$,̷3-%{*2 qюs_l%a6Gt5Ոh46z0;14힣ϭ=@#?l=.v~LUM^Ml~|^q A=jd;1>opzښ꒏XH}_ܱ,ːz}kBw2{n<pS69y[TԘ9P F;S}21y'c-cRB=+4"ql^1ݴG گA$u#\+DÂ2}Ey!n=/Z{rπ{N*(ש5(\OcjX2A>ΛzzAp,Wn2̽}ʀvp2q>z@ ?ZgwϿo81<˜c0S68OZ̨#x<?M۴pOL?1ʘA.Tc J̢>rGqڌdӏo犐6n4F;HF<{b 1BF9^P` sOiF{zsH\A+קjQ܌gGS}j A=pcӵ < тJ3ʃ ֐ ہ0{s@H1|.>+|Cd;Ɏ#zI)9_Iw8眱58>#j.q۩<؛Xѡ\'q>%R zךp\CNzЛvNq/ܞxS$ 1Fs8M܌wM[FO8R' :~gسw`=}sUg3J?Xr)gtfBA@wu#r*YpqFc'%6CryzTBp?qҠ<ϹB1an~֗p?(u^zqӏҀ%Vm9!,HVR$`t?_}B܆>Hh"?R8׮@1N t0x[<1VʾGLu=Q+3N]z}P2GQ׃޼=u-HWßN,q}rWQӭ N= @*z Μ0'8o $c^RXNxzԄj[suۿ$788@X?L몒 urKcps5Np);5 r[)><^3$Gf 3u@@##_KsԞ32yژ-o_oƕbI>Dhۀ1c?JL2>(pzϿA>7$n@g8<FࠀO EЂA ~(Mŋs߾=kGNp~AV$u_AjCCr1=}}~PpR0P۞{*&PX whCd u(|l|aq@Îʨ2|_fi : c`9/D"TuPN2}k=3kg:qڽwAA ώ2NNs*H8=Q$=zyLa(88yUOPɶpy<Þ0;`+yW-'PCF=?Jnz=ErU}6lt7 I8l4\-1v`Rv?ZRc=O۸x{y\a1Glz*b>\p? HBaUa;J 3AרcsR0N0ǺlFWnFyϿY g֦+ʢH6a!?5,hc/E@j`2pI>cu?5ӎIxw{Rlwʔ'00{olR 08ӓzzt>);rN{O~21~;?Yxu ` 搨 ?A>>Fpy#5@8 01ߠښ8T9߹x=dN{ c;$)L_U98S l$a#$F 9Ҁ  jA;{SHW$mUUV ~Ᶎ7hz9펽CXL*$clVoIJ!qN끌ԻΡ'JߏZ_2//Q3ԍ] krw- <9[q~ctX7Mɮ@ r9 G5;k6⋸nu5"$sϭx?X>J^^+@O\tUw4?1Pr1>8U8icI)8P#-jڌwq( dQm>` s>RPJ'WaMwnژO'=sJ4BN\ZFq4 ;L)d,ǡAR' @ɧ znVcIGן׭}3ބzsLA>l77Zp`ϭR%dgrA  o9R#8>uhg֙#>c?/Hn p~O1SB!JHH Gb `n9җ 4'JpV6s{""(ps2Fp>%r`0rG'wN570U=SO#8{DZ<9s]) _iXk6y;9Ocԟ@p$ܑ $<O^рÐA#=NiF~f|>Ҁp o=N @׽3? pG\<'Qx$uPp;`T#p N:҃ʒ9^(>*1=x+mV@SuyiWprO;qTe1,~2@kȪpG0qEr7n ޿J2}1gQM'ʣjbqE(u8I!XpQsB`s})زx@gUs$\{Or܍>[ 0y_Cxc~8xT/:pxBGyiH$$dz8U#;<Mlm%<ڐǖxyқ"sON1JR?nLR%Du<~]S}c~Deӎ.]`/LPRA 7{RP(t0v9펜P 'ל@/~c^_AIbUxQלӉ'N?4~ϧ=M;f-O\d:tTdS8$r:&$( r2N}=,qA?J.,31x:R:JsSԁ[n@pGL4A{tǮi6>cO `n:!8s9*:{T0?6Cv}3}pPPwڙCgN0N:R1 77L~ 0x}ڙr0??&oRxzԶ!yRźFM+9,LzƕT21֗Xi ~n'Ѱq?)P`[$#zjU۸1MA8O=NH,#FN2G9_WnT|qȠH3{S kOˌQL3cJKZJr۳yүNn~9ިOq+R"\ 9#~9Q0O}sN`gv9iX3F9=>I9BVr=}jd ɬI71NBBgȞ5 :(}ot{8AGf,aR3˨8}k!&\"PFywߎz hqNZs 98$'=8暬*;}k5=GB{zk-}?ϧl0 G֪^/ <ӎg=p%0szWoo+d㞜umĀy0 9;`A[H; q}|00>'9Sr;x֠m:}:דp>@_޽d'<͏|&_a s\sN;:=ɉ;( 9Zn)H@h#8^u} nz Cn8qtɡgL#*v@u?3I?/8`$8>..:M#iF@ibᴏ@O\l0Ͽ;SOx9G:s_Jfy 3楱Ii0z9> n{cw8a*GH cs4G+Ӱ= Ji9N1=zsTt8x4z sJ@"8r=WF5P@b1yF {\:V'O9 6 @G@!S?GLV $v=W+bFFr1а5Yߛ#VA~p2 k8QlR_/!XI$I=~2C$u@={~?QJ1>)pvO_ÕS _O; vH8#)z eFUϽ=aGӑRn$9H=ycAT2Pvc'K[u7ln>)a\(gw88!Gl)20X8hpGq0K[??Ti8VN?[݊H~LG1Q88<~ I3uW<ҫ`rB|q8d#`vImz8 ӟӶ= 0;,Am@g<64>\c?Z 2:+m`:g TltSIrqˌ6:Cڡ{dO x yx^9@ETn~zę1B?VIA^S`6푈8?>c )Sap2kFo$pxsϨSf1J@(q댒 wFGj c~Ҁ.%S 1gnN `ÚT%zg tjU 98}hB cz 9H:$?>ʶH,#H} r0jBxۊBNHd`s=~X٘21#)p@F2pp:Ɨ$ irPN?ƕv<қ cHm}6߯֔pcxg8nvӞ2=s6dc`Ҙh1 Rg=;pA`i[9si RH p>;2Ic{Se>c8F\`OSnB\sTLv;I 4?皑ri wϹJLh~nCܚCG?^8qpUW |})\;ן֕Ԩ'7HT9'9i)JIiH\A1zƾ[Hr*9`cR @݃AqPJ۱:L Io,[z u"5Y'!;sa:n00 '#Hii˂-A}Rb09#׷)=Ft)89=h2'EpwtjTQv9ǰ򇅊?$ 0|qM ,IǠ&3H 1H~9s_S_ C׌P4rGLhJT}?wנ rg+4VU[ݯ80@=i8?.Jw&B_9=PL}[F3 nN:`<]l8ʩ󞾞ƺ*l9N6ۮi2 e^I_GQʐ9R?^Q |M"謜Yasc>b؜-q9nECtvzHQ k [s63k'ҧ{H26@ #~elbr~cy=lOyU J2ԧ*sZB B;G_œ n2 r|8'S8 Vq=9|=Iig##Nj=#56(L6?Ϸj88=?sӒ ۞rj5߀2qϿ&)9P܂r:`Әp}R:L388_j@F1'=>rs۞! zLh@}ןEc8ہN{{rsz>R@04?tNq};8 uE(>x8H 0 f~w8lPH8=_ m݂F}3\ ~F0ғ<1ccFOޜ{H?O;S=h)!WnOwƛ'x=p< {tu^N=>@89}{ý .0Ia;q㯯Oʜ7[Ali?\9ޣm78J8PR`m|cլvTظF;y&f^8O}6׌ { x*,Ѱ $rFA'c$$$OQZ 6p=}Jx\7Br{.냜?¨hqAoenO;2?Zh.0qHcLfrw`*XG9$qړ[mۀFnn8'ݺБ#H>OqU3rǷVHe~_G 1uLhڠ:p28ֱT :_^ ѽgT^݀Y!G s|z  q~>Pq׷2x82t q?i\O$C99܏qLS*jWpڤ I96<&#03,p3I0p0r1v!rǿC~iK9 99J HI?jwB c?*rwv9#R7y q)` sG\d t vI=OX~dn^9Ǩ"`4.eIx!$G=qR(-{>SRؤr~zCa?J\}c텁@ZUr3r?ȣpHC'`e ╔9Awϭ188'ndmRm z#C qZ+fW =q׌c8Zs`ulgjfz2pHӎ֓`Ɍ=nI=?Z|==9FNxQ3 N@Ы8=)Dh/#'pҜ+st$%U N7`g\3,rdbq>ss]cǟ@G+6w톝k2o͟ H3(*9p}:c5+BdI x@(n@vb zqq׊DH ؎FG@ USUqH?R]=}ʘ'!rOSa)a.a-0zpzTaG#rO\qӊpI:OƀB!s*sS>zBIV<|:@0t>n韧=)`8*I aP1R֛PGczZ$߅&V )0zuo,6s:JvT#H)nFpqsM3iwr8O9fʅ@{M$NFz*9`1N{R>c(-vAҚ :gԌ>Zf;O<῞=i}3ҕƄ%H#9409;['993A*[ m lNS9@*Oby?@)[8}!pzT6u9(~ >=Ji;w'=3TUg8 ¸ٝx%s]҃6d юGIy9*;qʴٱ9?{ßL>ބrH񠜷s>VRy=Gs˖g={zU'9Go]Dɸ=~㸙gTg\})zzضd~pzk/ G3 'efG9wv+5[siH>}I\)N$0y 2ݣb0p==欝ma2^*I\ uA}#] M/<;R~0q!r,FO9";l}O4/ szndr;578qK@ ONLT m_ H@ }?*v6|;T:A=+Jǿ}X x'EbAa>sp8&~\r;~}3I $ 39cIГԽ:8LB1g֐*2Fx? 9'ilvO^iG\W aO1㞦`0F@?S pNs`xdqIcq rT'h,8#?~c4xR8'=4 {aQ>\ly]jpOs>M~ѷp=kѶw0x{;CiAlq0hOVMj֙V\.O 2`&" Ǜz_Hߩm2ẅCkOĚtl%pK3m־!?ya!5\w*$a)I`KqU,ytP3cc:r{zR xnN 8+>\GC#$ӯy4$ <ޢ3ˀTb[mb@8C{ld8*CGS|G$s .@ϭtHP<Ұ FX)ך #o\}L'9=p81pzM0887RF1O˜c8~*@HUS:r ۏ@X2TuPXtp`Vd zqT̸^`gTJF qvElۿ8!8U: Oe$9#=9i`ܥzڔݐwcb<?O\>PIqK0RrG$zEnA9a3@PIx1pI`R;A8Ԙ=럧'׊Q9t\K ==1q3z|iϹ'}j^61'>S erI LOQh܂GN>u84v :v@OA(p8d=OLPJ^{,X0 U-!1߁HĐp}Gݷ?( HP7Q7{3@ŗsCPx<#93_\P};F shT0 ɦCq|0=G(eSۮ@r#ߦG4}>jBhԤml񜑎zI HxEr^ }>qf^0$c9y_ GSc [qLЌzE$׮0})0pA`qבJqRFq;Tx g^6#w(9sMalfI8,7RGlu6enr퓏Q̍3=!@gpHM# G @O1=PzPN~a|=){K>!\z':WqXgLl7wiI9Hǵ&\X>0r0p6}n'<°W~]@61䌑4[{H5"N1?Q`׿P8i7q ЏLX1=:#ҘN>R`0czo<<###}%͓Gl|v~G4p9<{# 9G quclplsp: (*s@9rrq3 HZb(Œz_JoJA=H۱{zF*l OL=A8=9421=zޛ#q=7sʋPw2;t.3O_SSz* Bp3߿&+MFu z#$$3y_UP+nG׷5m:\dSJn02av5$\ÀO >;~=hU݅8cj#?|uC1f;sT2^[\3]]<{nXeA䀨>>;BS~4a>3x㑖W8pa}Kb 'Eug ̀g4Ftg?q3ǟi\`Nsּ[$:ue9(n 0H ҢV6q}hM\e{h~zJIUNth~ƒp^]&{g=}9E1x=*" v<}|d7@t? ])>՘ v߮>qK(Wk 99<+ʸ܅=W% d>pm3qAS[ ~~}T~qzn@'{W O-#{Wt珧|5ёۛ\GLw dl#N$;~\tc,qrFp Tyc~E(byj3z:JpS =1vIRs{wL[ry8AWIʩ63{:.mL : On}>2: !sԬ ;u=|:9?ߞ?.*7B(To9zѷ*y8"rIݎ2xG< =1ޜ7௿1u>JSOPGL>ړ@Gn600S۹`&ӑ^d9#ϥ.+ǧ|S289oǽ {',ss=1t~T} S9?.''z9)_*1|Rwt?Ƞ s~"9sACHBg$gh-FGg) B}I vL8U.IO?ױ0zq {zޚ26=?za灵&Bd:a rH$C4ߘprqt 'ܞSRp8ۀ?JßqpNv`;] A$g\SʚHsrHͭKYѯ LetQ>? Z#6uGqk¾+mb@ԒWC=Aܯ*2r=/%A54!$cumh1A=x8NGB40|F*UO6 ~9s5c;Cum$摧Cc"ÞoPHcdi\ 3FrO+~_qIБi^s/ˑGNU0}s҇,3rB~4t @ǩ9ϥ8I~<ҁǭOǧOZBK^ޟO+(n8=:>8<2}zRlB.OrJr0FzgdczW ` ;P~}݂x]TmBJrx aל:U6g# #LI`pN:}ryDZ%F7d<zJ1 qZ*МsYc(8?ӽ_їe9!F{}xAe;0 :^zQ u鎜Ocקg$7L+w`Jrq]eNc>¬X99?7Q(Wd;UǸoc2 s* v]`s|㗍QXs9Џv [Bs=ZS35| Fs07m SA' _gonyj oKp[HBœ?Nn\d0=#Ć^2Y3hk/@BmW6M{7 "u^}O$LOn}z% B.Nyom-JA cQK %AyOO19N1PH;NGx3O>=ۓ]0bʹzt 9>SjMZ (Q2z#îpU4pEOpV C#*H>'C0 s ;q'azq= H}A=9_Ns۱1ǧ>R6{}EC@Fv5!zsG>aFnO}:~5m1ׁ!F[Gݸ8#;h;PNBz;`WcZw$?ZQǯx%OsJ0;s=zМm G\R{r@~U6q>ܑH9לc1 N@9Z 3OAԬI$n>H3~!~mQHFNy'`9AAԜ}):i䷳`{R)&)-ң9 lߒ 'ӊ\Ab9sޓ$n`;PU F#*FzqU^1yjPrF>;v"wHzc(†ߏJx'=1֕Ww=P +|1]k|9> S= ybp#>\'qlR+N2}=0zc֡ؿh3*ß,dsBy~JXӹ13O2zsڼ'I[z~~dc^27.cqԙkH@ZinzQ>pYpe :ߧ);px~2@ۚ z~=iXy`;A9bʑ۹za񃏗3ߵ6k 9dLsGe`nj9QH2' s~؃d:{T\ni3c#L#r;8ZWcn[~cO5G@F7'Z3隋nNw:d%7'QQցrp=\w?t0 H)㑊`39GSJ.` nC܅㿧LQrp8$OPq1;#2\>9I98¹~s(knzW29Q}~ԬNr:88'yY!1$N949Nbr}'р{ۥE-@aYRv m'#}kN<֢'8x>Ԛz϶=6%p7z6Iq4uӟҋ߼y=OLvGWqO^ԅS OX֡\8*d =1<=i<(qZLm{"m299o\{R@ dt=`S #&19=TۀIQᏭ)ٷtрq1Қq`῅G~S@Tl9r; sCETkwH>eI9t]܈$,J=?ZJ*ܩ9PY}1p9pxp< =pF:nNY2=;rxsy玵Z L b?2pf3*g" DxQ:{oDɹJvƄ}qs"4 _z vlq>(PK}JRp>npq>Zy\(bS18ǧDϘXFTю䞟Z౅?s?Dɉ `d`סY!4G9f q˶ FW s۞Zw6P?JB-܇}=9㜳V9p=iF=2G"cұ|[]R5'b}0kuI$:zvsVS` }}=j|I~upy#~rG^~`KIט|~h[{ew89TQ|3N#޳3GdsgލiV?ʤ緽5Xc@FMc$~ `9ߥ.0=󓟡|ϳQ)By9BUC FNZA==}UN0HRA?. 4||rGBJ OLgg4 G$4ltښ35, Ӏ~#( uԩ9}FS> >W#pO\G?=QqO6_p(ʒFpOBW $3H g?H2#N=NLszn^C{㑞q 89\)F=)1rr:^7`ujo# Iߞsޓp8@>Sۦ;S~BqԦr3v PO $zS#9LOyS^FLiVbw<޸G6UN02s8]\fZY,ct kT g[Ϸ՟͝>ݷ| ԛQ3Q`l۳T\3{QwM tV .x8oʾ18v޼qH-Ouıs} 18 *Uua83$x)r{lFo8?LSF>lG9$M.n8 6sO dkkBcUNqwԝ3q]A9E)fn6cDWk 1QƳ-pzgҵ.sc>fb*mqyLYھ'cTNXA8o"v9?FN%y>^Ԁ3 ҥn<9~P:S z`qIT=xR1qަB|܎xyu+(FoBH'c)6(f\=?0W;Y@#<ܮUZ_̖L$vny˓ӌINww8@U<NulHo\" zJ2ߗݸzSlKr=}ET84r~S`#=z@;F$sP6܀OO~?:̹c B7`>."##pq@H*Uwdg$+`1 U)"]mf;8 Si\}})A=:sRrb8j`FAl* +ێi:u42N)I'\`9S`>:dvV#=j\/sTSݸ~20n sS]~Cs8xNa=+OLu}2ԷA=G^hIc?ғpFpydzdwR6`uREʜNv{A;A隝ISfB|Wo'#T8xXȱNwF9澛gFPAx#Cɒu⾜ `;$zwS"3 >Ԍpt#q*F:g8'T=3gyA)'c̆El0u<$M^:uJvRdFF܌cҚGܒ4e ӿRN*;ۦAI( 9zםTnw@2tf9$D8U4Xʂ<*np=|qHN=GzP>n889v"GPg%({Vz0kssqJ1{i(Sw>o&ҲNр;~_#OI {!v#϶qKTiМ. ߓtK ި8k^@q s;\>>%)SӜu/G'Jh/z Lsт`/k3 j@;)V2T6\~md s)2 G?h1nN9#ks@#ȹؿ6ϧU07F~\Lz*48RzѝxfI?1ީyf$O>qsSOW` 18ǧ=] 8O皀FÀր돘$N})E 8$ԟK. 꾇GJV 0{;pFSjI$2–#hp )s:v]WX9܎F*,C( ޣQWV8 {&ߵ|I 4n9ISuCa7d%Mi˟ggnA9U~T 8$ךx }V&_2sOz+)me4r!ӧ?GtP #QZ=>s1܇"dn֟bVIedy#I4j?/QΚ'=rzY9[0}3PX;[vrq9n @NsO#8ܕ},G^p:z@u ;|s*qԚ~"Ҭ2'<'>xcT(@9?:؆2BƃW+0 ʜws֚Bq93Hv|i7N=}PHVOMe(9@IH w6FOGH"&ٜw_*9#:0h֘d`LG40$xGN}4sIp;F87ϯzSY[;CqՀKFNHunx.r@$xƣays^R)ai.pAy8˿OPP0 = :ji PCu##SA~<G';r>cׯE# >RA?VrAay>?c'Ӷ( <){~" mބqHBj =t@R0W@ԝy''=}OFxdq_?)X -zcҤ'#JhzdmsϷ1\oɎ1=ut8 gA Rg8#4o9'9\Uv;z?.rGLNn|p9>@)"7'6`ر}5Rwqd޾c+|l|1א3߄)\ e}q:F'Df88_A^*B0rIWL^qcz|;8b)Ar2rqQ|[1}*U&vg>"̮a cynʻ/LNvOS\g5H9onJ uJ[#ל(zwok!{N1瞕㟳7[hw,{}s+`N=g&ބmh$cɨ,0r;du_J OܓMx#ҤDy霌c*0 yoҤhs߿XfPK OJa=3N#JFXFKHh+sӵ(~Oq~tI Ho@ FXq׵0=G=y)]N?! Hޭ'Rƈv$~\/w(_H2{`<{S ]L#8SF8w'z9''JKv/C@Aצ>Iswޝx A@ XK{ڝQxMG'#g)I Hlg+xPOId:uXJ!ӿ &NqI?;iA8#֗ 4#=)T|{\Ԝ$:c㞕 10=`n$瞸?O~a`s8_QQ+gw <_N{F?\ƋJTuE;vTNF9 &p0F>Iװ]W'۷s2_zU FHH8yMX^;O$4lVZ?Ղ^gv$''p+_W2T`83^tw!' zhG`o)RE d ~:s_=/{,7$rW1ڜ1A { bX`d`ib1G<Ԥb4+\}j(ĉHӷ֧f\ex=2 Vp|q$>=$l\?<מZYp8{ҷIFy{.&t'vAkumң,ÆzFz8䞜{鎼Rq8Ԟ}rA?+8$d׀}G?ʢb|Nq@=Ol>l;99' ٶ ԬX8x'P N߈ }y:}i d1##xM+qހ#4Ϳxcӊnj:٦/<דք#n;d_.Fxp9)psqM`0sҫgҚ[vA1+pH;x=u#`1i˷[x4ЎNEO( y~Fn9i_u9'InF@~/ͅ`3Ӝ~}iz ;ZpgM>4А;Srrz~U&p1vAҀv1sԏ'@>`8x#'GNWc\ti~@R3_q!듞Enq?NzUk6W8$t<}1E Jet۟~ֻ۳#qYJ 'RyV!`~I8RhGl:3֓=Lh9n TP1w?J::gwZA0qsUn i3`|qsrq tR#w8WƽF2B?_M7w#<ºq?"/S;~=S.{Jq@Jo# q'ҼtN_#4ÐH9qJuQkqu*tC-̚ELd#=ϭpS4UW#s6e@x? [!Xp稤y(#z[sc8ۊ8ۓ9$~r ;LoǩǭH03pG_~ݪʠ:pshqd'3V˖#^2-y'kĿg3TST]$8?^y9iVFv( <v9ҩ9>8ۮ+ FrLg 6 qcqJyt"lpXL?J8#nrK OFðs߯N=r#gק֙'~/7|rrp1ߚaT`` qmH=:P' }zSR=x㷯&Mx8=F\vqL=jv0>E4czs֠W8ϯlRm$w>(tdsM#-}(Ʃ8_瞸(H$8#xo~J0 ?;1֤:ҐHR^{`@ `H=s2}=1`?>t0|G柒'#Fx~_83hN\ҩ㞝zS>R$"I'$"7{$pN9㌐8Þ^=𞧸I=[Ҥc0=QH0H@1{(jr@?:dc\?lCg8ϧLӗ*1XrQcLvW[k[q<:k2Idrg=Ǩϧjle <Ѱzˉy&92?ery'p3}kZՎHV$ @VE7#c/֥Ա!2NǏ¼Ğ;@Z7$ =Ogx/~KT/g\/zqCE_.IiF$$~8$d֭>$fT t#[1Y1SB=0#=x,Tqn1(e%C{t{{#{VrD)[ `2IA`2=p1Sǧx_c+cN~%yv9q1ϔ֝g)=A ن>`I8+tYONV͘` uןj5a{*Drw'PGaBfmI W=_GUQF;1T+> c߮}xKrt$"5 +'v+F͓۟p+:K7px'לq(3teV#^aڸ)7 pQWC4Y "?H۹霆J./dSrz9<'lJ9׿j})L#mK[?JI䜊,;zsUsP7wR9"h#&@ ר9LvAV 8QCen wTp9d$ ~;b&u8GSTe(Oo֭iڞ\}F9#$ }:sLd)d/LԶe8]YJ5D7J>}}+jX.IasҼA@m{Ů} pYHG<ǭ4.NB? ]̌Sh91ucpHyUGlç?gI7]x,y+t;ȉ*:yf*Mnw.V"C[9~]~giڛFdڲ!B}kG OO҃"<˜ oj{dqtøy>5py)9;:ǵ2S9+܎> !q}*1z=.I R!nJ&֑2o˃ʒǯSqH$N=z)0IXu`֓i.n4nr@<( cǃwoPG:i8Sp Þ9'vhPzw?:d#?208:psQ<1sH9$$}y魷Zx8$qG $O_QBq Z;U=On=}>q8ЏK$cin??SAV#Z^O,})<Ӿ(IUƕ8=iw|p)*Av*RS%G8@BN=OWp1ȫ9c~<3LRQ{`ف!ڒH$1V?!9zg֪6$gg֮(!sOLԢ4e?=RW85u>E zR嶪y=9uAӿ?Ψ_"@ &L/@#+ ]+d |yA^pZyP޾kgUy>N+":r A\qSޚ=)Ł;H^3q 9?Q\5LL`s\$̜A{57v#(y:}Ӄ9E-k_pȇM%2㞘2+vlAZKbM0F۶=';0>RGLW5@a8:N|'\\ޢe[GO0Lqlp;S[) l~mVFk_0ry / [Onq"5y;sN\ۆ ݞ3Qn^Hl3ڝ7t~48~k18?قq۟ZVOf \tl0V9F9~>޴@ߨw0rWSg)ZW8=GB8lҘgy 3qHN2[*Ha“n7 z}}ހ 8*sܓ''?ӽ&~U8#zT4;se~olEG8v}Nz3OG3 ?⤤8r~'p>܃Y'g?p8^Y'}84 L-OJAÐ#=~@c= a$@: \my9p1Ϯ}9#׀{z RIN:47er{uj0t率Z"9s~Jq.zIm y=xH8Q8r8~08=Aր`w:?OZCssG8=xӠmX)Ƕ,U}[(:C`٘qט^rؤ~< rO[-$[Ty:U=IzkxY,XI>nb(.6tˆ ϳv7 qʴa:A҉v>kfҿ =?63JsrzOZLLK%1;J$=Ǧ+~[`bުw'#6:>k0 83kvtBm 18?JH rxx ڍ^\1VĈI19IN P&1T8$vҮg|x)V erGin2${AԠg}`w 88H3M^!GaQFy=AJ&|VRFj! >֩s5s,|<PۀR8U ˍ\u,LNrֳo ɼvn3hsȬTOڷ0+~\O"\7uLi\SːiA#۹UGǧ]S϶;a=FqתG*Aڶ/-7dgfdrG# .a( xH,=3t?.}+CiI:S&k.3A*?\jF >Sw8\.̜ VkjFI)wH`6 9T8%Ly?OJjSBM,4uka -zAÞ1SײOFX$k^腮#_: 6sѽ\1#ݚKnF}4+=O nW2 IVC<{k\矖0tә^1nK1+=^Eep&݆2_#=J.&fI8$O񨥐SBLdYprܐ1+ Hn x}'8T srs~n?J{7 t=}f3HCoƂ[p1ҭ0T *9җ26+;ژA)2F@#۟SNt!p9Tg=Npy(<GU;w>'0ǧ?_I8p_06păש0a#M+1;}ibp= aG#=p)}=AH,zvcp/U6p+sfJ\އ?ZVpyVqa9:{gFۏ'<Җ$,R=qINN9>ñgod>w~ZvA=)G AA@& Ȧ67F};~@R{zQ s*MAz`zTW;ypY2ĎÞ0NO19$ 2ts>+1RIRN8iMM,r6n[Xmק JIH''pstQd u$<}b\'d>q `\c4c21=wrs=M#z Lt9Q:?#:r3|Slƣ2by_1t{Wkণ $<+J*5 +-89@JUQ{w_`{JiĜ?n+ ޼g֧p6`>~JC^\Jq<@ǷNb9o=>psJ=s}ccm(c U-.8yPO "|ryX@>1?vse!0#z}i+q?Su1I2xCFէijH-\~s*;K.K(Pq&eHFI>urƠbebOwp?] 6ķ<2=)HOXB6{WAqoYp9}OoZPF>ND`3p8 ޺1@SL,~'<cYtk;k8M1G_JTpߟz w'B|=1(;#L*E7`2;cޣL3NUUAAzvYL)1j"m/O|u:F3ۀ+H۸F -q=?Ze$^tmnϽRhդ@9VD*G嚩+ru2OSJ`pp8Gqm.TH8x<$<Q/ʊdRێB>)e(YG^YRD=TL8qs9`IFjh~~\BUf|`>Vn9U$%_a~b8~Q25+/>6<_2xrFp/Ya⾯M*:⹭gD%Tsz[x:±jEpѬ#b?1#¯@c_޼ 9n8bڸ+i<׭ʧīJ_5j~:L2 mti+eǨePѤgq}mu w098.'sFu= @^}ӈ;yRF1FZT ʃH~5I¤y޽9yFOI\;p@OqHK?\Âd;:?*F3Rp|q08)'$d'8F'\֤ r8,AH8hb7o^1P?to_OWU#|c9?8y5lALST\OΚOR<Lm`cqrzuۓb$`qHH8ޑX# ~8~=4r~'x"03:PH?)c \uL)UA'OsR<>/#zv$@kaяқ)Mh0uս$N6ڪV]][ A&c<}^M9xHOqx `yvxt ǷU.3Ӧ}2}jw(Ӫ94K>\P~7ShXm_@x%:oÜ^ HźmIҽ!Y}s]X e{?ʅPĎxcg<;d@0y8'|Hp9:sHX$qr0zzz_#NI>x(O8qOڽ}t@ 0`C#"U9=:ޛҥ\4[vz]1ڞ "r1ߵ13p?N]S;@0| zqPgޛ*ס#?j@lnڡ8U3=iNH #rq՜v>Qa|A\2=1OwzfoDpB`}oJ|Zҿ~R-L2 s/u-k~>qarrzu=OJcKwJƹhOֺYٸ qJ R*}Pz <8ǧO*bzm 1ߡ'@pFzgSH艾fXW뚍DDѡ䱓hʯ\Vgy9*XF=kyծ-'*F2OnOj洡vtrjK`yU^wH?^0 ڀ`1$+ӞA8;G#ډhz>$eE$s]kb+8 uW %B׷HG2B.GN%ps9S?OJ#0E8׌r{%[ '{bXT/̣ǭa&wӉf9Lm RH9qDxgX~"8TpFOeH؂Q&tEmR ?^mW_qkeb>Q+zc6x=JIsaS^ U_[ &ON+6Epnǽr[8]0x5Չ-v c֠TT#օXI8#ҟ,22F}:d_*Rqs>g02YD&E RE߻*&nr?*a P_'fx&&S#6ŝĠ__Zo-\S<S]Vp"? gATȠPs)\V]KSp:U9aV c9淤"S݌l,# &e(d3rH?T=p&fx#V,*Xi4s%V:Uwv:sձ2YNIģCAGgd)I"0ehGڥI;AsN,_4rWo$7O'԰%,wI曻?)8R@_j<#;dwm<4́wz{m N:BsLgN3׎siL3\}Oʀ #8R=;88lJn'Ͽ4ޕ\OJKYos@%9SƓ9_&:p@q02Z^0FA(=*)ձDZJ@8u&Tqp9?΁3pÑ?ƴ42݉m} w?SU!7eӌ(%#G #L2Oi$r“AcYN9?Jp[m=?QV G^9!'w>g_N ҽ1<18ԛoS s^QR1[t4;OOQ}F 89=yZ`۴0vJo [|7vWS6F~d\=딿#̹sֺo :,E!Ҷ{ &Kg'9O$';c8aqx#.O?tqJ3zqޢi[냌PJb"W*9u^W|4 9eA8%C^|a}𪯸*F?G8?Ӄ;THF鎼v{29=} CCdr3׎8M*t#:sT[J~Sԑ>~m9<1z:uJq8Ҍb>zh Б)`nQq}# xxt7 0a\flnqk~dB[Vj((S5m8>kU~IU]>̕D A翡5۰0 )h+cn89?C+n@gtl~HC3Zq*F.P0=S.@l)NnӞ*ᑤqާm CgDbYDCu-!2:vVΟidT)4!$~}>Tf;7@Q呀#'=}1HԖ$pg| }}Vιv:=+z8aM1(L 'צ\XNK$rf!bU#Jcn 8<4L$`?Z|. csO/;돦j1o"Y I32x Oݒ(3yqzɖ=,;LHnN;Ug.J^G#irƃm.+O?'TG=yu{X`g+Zs0 -sNkM| G?<#yYHP8|C7 #|ǧ"wV /#<,23' }zWBؚVfxoTV7 I'kܥAanIbsFrLcnq daQFNF3=8'z?}8KA6~8H ~ԜXgQ`F1w):`FF$Ғ'{rM40 O׹qz8Pp`NFOn(f9 1Ma+鞧#<ҩ 23U4;8{R8=:sz~?(9~ = $]ǩg9Jw$c[dsM͐qz/L{V?܆`dc9$K߀#"'9ST7]@0R 8A'Iv>DCH :Ӱz)-[#cfp?!aǏL=sQH:Hp=Oւ sSb|܆N})Of;z7x*s8b Oӊ>`ŽA9=9`A8s܏ʣ Fp8>:dt8oMc8\~nMaRÌI$<0==N;Ou)ь`{ߎ*78Қ$`i\sz{z\ sӧ׮)2Ki>=q@6I nH8=OGtדJH !I=z}hhH#9rNh 3A8>cpz a cc `w? @ R^SNFN~ц8tn}?!i۱R1ׯz =N'$@{t ~P0@H'A= qN#s=3 8=)KpǨހtL3< G>#N:PrzNlX>^v8<z:e2T@HsqU"Nq_M#u%q"}y?1Xzd]A=m?+Aܞ5^&ֶb 3V܌fʌG5!j^.<-#_xw dr^'$'9 {O$G8ǥ|cGw)J+I.  {zW ꚬuCA'8r+o+rà_ WJREĉe<;k|4n s>N _SԚ/L#C׭s>b3Ɯ_Os^in8v{jV5trdN3Nz Doׯ~Օe0D1.CxǷt !n`F?6{T#$~\[UT=3Cy7cMa9 =:ކd0ǟgTbe"PNNzqkfdmIzյ,LsO3܀2v?ZΈ@,Bqn c Iާ"1#۽O1ҠJ g҉4їqn{v,aq늼<ƙu950J(gByXxK~u(;TdvN<<|OvH6! -L(;gLcF֒<r2#Ϛ o.++0O }1*}@Q1v4rHǛL|7w SO r`?:HAГ 1M"dUfG:yf'R8?^:4(yPoc5#=dGdtMaګ\IWںaq 泡vɅ'H{`d֕ܮp'5̬bd}qڒki,*# J}nƠTZX7pO™%!co x=ZF@=S93@Ua3J  Ӟ+tGc4L.: H`vAA)\mfa',UZNsv3ffUsozh1Ё:cϿheHSGd'b+;p$~+Ǟ9fS9YNpsǵeKʕk:BI\eqNO}kdrT:0+ߟO]Er D3;㡯US<),"+(Rc us,IA>zw8cGjۀqs½6cPlu+ 7$r;ԯ"gx!xŽ|Ju 8ʮmpz1ҽEdܧ=+Ȝy[FC7r=ƚBH8cIcqzCקsPj9hn2ÜiNdc'L:f'i N3sMsޙ#Ip}ZIIAnN}{i<jn3I4SO#րHH21S~NG'\`\g:#7sLぞ 7cB öp}=jN'osz\a=;SCŀ{i9#wҚPYF>_slv4183}x$s*)[08?) zzy'?7DϰQ Fq==x~^ND;l] rn~ SZ gpFOiF <CQ6~ ϮILт6:V: t+D!{Xy%Ձ'VD6s3UqY@SkY M=kϴ)vVRlHss]zAǝUQJX{TY,ۧˏ!a߱\dtz~J`iO#*~|:u;ֲj/+zqk-BGˌ={6(F~Gҵ*]d+9WCIOSPr1J@͜9=( v=8<`?ʲh$}zUƸA{UTd1=r?q #OcZ9{ K}JP$Yt(:W@q׿ֲrʀ(AЏWГa98׭'N3? Vns v'O@e=L*Ued(>$:4l$ eyxׯFĒ7^iYc?ŌqGi qңr3?ϥ)azs'n[@Ls{=ʓ'HG ӷAz~>D;~&qǨǵ&=Ґ ~Fpܜʛch6_SrC q p`zg)7<)NF݅ARn?*`r{ҍzTr0Gz~9A;Z 2@j6Ӧ3S|$}*3Мށ@*zׯn)#@c΂ܖv.qIۧJ黁n1׏oi`cMp18ۑLm&I?J@Y[ y $#>=黾oAt;ӷqր'3ۜP9qN-8~4М``t4<g8df.9ZiJFOEV :wkHG91{nܣ8!x_ƺe$ Cؓ'}O]J-WJРbkꥐFy?kjR Gd־y( g8C'_Qz|]1y# 57í jZ]\gr8ҽ'$4 d+^XI\[yŽ=uN4mB7Giv0V=Ͻt#2g[yمK8g:lfq)u#2UqeV,-A9zWQYÒ1'3{,Z.\8HjTf'j8ҳ|R:}k^1͞:bY+!*Tүj\ iB=y+ɸ&_8)5ͦjvwb8oB}>o26Iun*:nS4'=r09җ 'Oqlrs֙>Q{v␸.7 08znFԷ^JrGaSOʹJ`) ׿\ ' r2N=$qg HpyQ£?IߑSp$8qjF#'?1Q;0ly{SlHO(r3c5N@2TϥMolc1ĎIMES2xk2J8;Gs&@L>)02d-Bx-#ZTMb+[7%s},vIW/q|ٹNW;H:qUˌǂs?NT3 `SM! sN)~\pǓ֑v9Oj"9|u=q)G$lS89 )}8d`t#2@<zk>j%_muʐ@=={=RO;9<1RcP|?ǭ|҂FJ~$u^If`v ~f/̌d#یS$þ#s;gǸ ~*e\d?BkN.#rhWG=p@=pyUµwO?O7{V"6h'g~#h[j~*&R0#sp<Ҿ}8ׇ\iI'&Y,H8_jM >U1]XXksr@>wzV彺 0q5r %Wn{z]O)yy2={OӾQv's֭Enƌv$z ̱MJOrzup1ҹ{b%;#Co8o!p8Qʮk >_Fj]B  {I?t{f(TdWaiy< 73dLd׶jcoλ'K[Iuyv1K2>FGJVEkSJH=zsTnw9mmI2k1@Z P8 qpdj[_{B4mM:'Lg>.嵣PvfJ.@`f4684j:g=? mB-V܌f 20sUߵm8]ISiWv3Y[˙ 3= Jw18]BÓ됞̋<`?;F//Nk Q#*zgB08.ǻ+?+|#q׸ *\#$~jG4#?Hg#i1NHztǵG3] |[v8ldki>|NL[VrWBR} pF:cT,'<׫G xR8E8[V?)h<%88M7J]LjO=)K.G^w_ٗ;D? %$0?='\-8Л>SHrI89NzsZ]?dL~y^ns! "N#-)?j;ϙB'>+8O +W"97s'?TV+.K*nH8Kpc@@$t_[kdE9)3έ\hIL$ϯRTV'nNQWw:cVhfPS,ھȓ$$7esTQZۈ#d\`Sӯv4]ϑZNv=? sx3h (Wn>`c6aaR?ﺟP|Uy x#_}x[0*\x͚1k}>jcĺ63VCk%Dn斔嶟&@^=]_->!'!?^_oK^EVSkR;Ga_vŰN-?'‹|Tz7`|g+52⋼჏қ u`_ aưΫGGbFH,p`zW>bOA<N?|Ux3N?JD~t[@X.j_$'fonϋorqqoi{8K/HcZ&{Chn9"> +QOFd7 vg#ھh3-xg`RYʐi}Fa]w>\Bz n>W3&x+i7{>SԗsNI'@b::ujad@RßZ'%B]XOpGZXZ얚|[8'n}>|ܟ21cCb) `}=8Z>r?sM99$gF}+K*LzUfqC=XGէ9$?*3}^'yѡd=sY}Q =*Ùn,F6xnqS p}»|Q_)<=;9#kvO v ϰ]~>'9ǥv|3<>$GIZP?drrF1Ӛ]/Lu8n?fڣWvտzz 6ރ<Ƒ|,ؾ^'IzzCX#eʜүE}Jx2{g~]@9GGSg`1ɫ2< VVF?:"7}h${11VlCme^VV 1EA6O#{l +AU.9V;uI-RutpGº 7 TnHzPfp:ylu <."$>cۯ ?zl&v`z^j{a })1'-Ec7 #AYq, ;GFZ6x9zUYKf0ƛ9sw 4,=07wW:c: nY0 {s~$YH3~i 5tg?s#+,*ƞH8YrA=3]9jpz!c#pT}׭aS{]m5?:QOڑ7ې t=9һ`y"y[7LuHՙrNkuY<;} ѳC"x?UKW^Zg2(9$r;gf ,v.'%CE7Gߟ֕T?Bt}a Fny\0V;q߷Ҽw.s7/dlI^ֽx3 l9FzW(g|]^hj `Vr rp3}u? lN5;BL FbgAg]I&a"1#zJr4Iy5/z`Y? }? xgL˵`·392Eaeqv-# к>?WKshElF0S#x}cRmP{Y R:¡wwlR`qh!|ja\iݝ ;{ڜ#' y ?4J=l`(u7w7vS =&֝s)za` AL֋3'E)y54J]iۉ9sNxpF{æri 4ހrNiJq9'[9?ړ7צqړ$C;CG4 qҐUqO_֥M`%֣Gbgq+zP*N }>#in=y߿zY:,;TJI֋;NH* U_nԹ}h-V}Hg­Xs 3 WRpGjimp|8YW6\͔]9Mf?UwDM +ӉF8 g@$Ho.x;irsj09d'"} yJ/4^}?4[Yk O-Ocҟ'U=z(Ӱ̩|;Yf,w?/1lO?J?ElRq]o_ e1gj_~bݩR~eU+ ׭=YOJV9==;;xu@'83WOve.tÚ]CKd-sivOS)~d3G򯸯j,jDAͥn_#?Z͟_Y#|"y. xeݟ4zRtavDk>W8 < :A+ͤ|`RaYv?c,vh0 Z!:aHzFfv䑜1z׶oVe mbs zW|WD0Cubrp>t_J;HmTWHx܎v90y Ð1@O^9U WgzRbfUih"}j+NHrsN26#PZ-!xOaI|TNp; LudCP)+t V(1Mg#R?͹wqxNa4޸㹥`q R2?/;>ivj|04sڔFIrG@49n9 `v=J@r: KOJzv:N</9ɣ}94 `8$qtԇiF})rr^2iH8GzR6'o>@8=:)O gZfi1Nn)q۶3AK9֗C`: ##=+:d889=i?h85hZLVRl?DsXԷI*2>72AP4O)}i8\,5{q_SH*R$~w 篭4g< T3PqsP @ ^>{:tkcGHyjXFN=9OO| BOGJGb?*Nm=ͻ_Zyn-vT\>' kFL贏_t>7 O@;Ko-T,GbM}|D 4rGpFA |!g!}N+CReH'm&VA mW_?NMU<i$Q$\M4sn Ìg*H浭Mt>lt ,zdW[qK?!\,r6c]|M{g=}:V}'eWcy8 ͵ ~T܋EWqn0=cU{L"jduś&M]pVd |ZU$':!wˑy;fRdrFN[q@A'N8\18ǽTms=3޺m2_qUeNx8b0 }MM9R[w8qTSzh@ɅExǷ֣arorir#5ڂ A$sN:}>p3];Xr@8Ǹ6 bu =G\tZ(Ҧqcu:Z8Fvdy%!oi}y=M )͐*@8eN\²0]Y/=~ICStQsq'/L7ShR5R_y?ʙn*3ڇ!(^;~4M!9'8ZQ'x9lU$',ʠN="]8'$m~y`:rWؔ48qN:M:-5eHWF<ɔ;rrg@e,[+ԫu?pWׯn>8#i2)ZZV`rWy}&Y2|<Q{*IV̭QB>_R~Ѐ,{uWK|m2C},Y<!c,ro4_x2c"T%kR|5~Qn"t!`/Ό& NMgQ;"!I-=kK4tTUE{4MzogLr9qR1O;nuDCJ2I8+?i'߂ v0t{}^q1yFsNUʢ;-/Ŕp]C,a^QOS<3:\ Vxx3ȱ;I~?t%VHEGjtvZ^70n^L w` D!PYr*ε*nSje9.[(`tԛRm[DGҟ5_>+Dm_naL-6InҽCxGZnuKHnLAlT6?;>QE}wmE?WkbUʤX!P0q9=_S_4|+|E=E ]:y*ש- 5)7۲5?^R[;pMeن"o*pN>MsD(   5K-q%Ӝ9) GcVtz\`s*u2F;}5}֕[kw.5Kcltǜ9أcYo/׎4K4GK$hM1Ӟ񟁴ן$X:Р"q8(7G[hQQ(TEBڧ ZUd~fU|=<⧉~_<>=ve \X\Qv;## ^y}̗VE4t@Ĝޯ 4gXuj)R*Lv$sAsS4A5>GqOʤ+`\wݷLc4șrrN1@oC&m!$Jh3Ҁ\zT3ڗϨHG˻݃8 E`\p;R(oO z)BrDpyMɩ#4=+4z/#u3Jh׊iQ`#<3~JLxZA5+Bɥ+=y4)nj>wgi!3_@N+A)Is<:5JJ7q_=1I:Qb_X(FqZ"vāHk[,rlT6E=2Dm=~E???Z45[ D*C`7 9h ǿKi&<9r,Z7̬٘0c$N8\e'$W3OeYIնN=ӢIU( R@#JV4ZN"F=BUI$s#6*q= Fk~..|XIѨw|)#zw jqhb V"힕(r3Cp<k[^GM*%z7ck+PҽB2޵xDbxGPڹ*@O#TSHOR`*Z3щȁ ʵr铊`6 |:WX۶[FIs]z~$0{6pe*p 9Ͽjt6++r H>涗,!Aޜ t`b8>yZ:z'ǂ˴}If&'pF=8hnKc*Wi?͙Iz"gI[1\Qf[)$HVя͎2N3\ w t)pXI'g d''z{ņqv:VBmNw?Zt99`}q4s&Q W -JS7F|/{;O*xO@>\goĚ>Eƥ pFO0J7~wwp1V4Fx'{Uݢ8> 1'q ScpK2H*C \N93-N oTFb Il>o0>xŗjz mb0N=DݎPXIpqvҫdfR(7 ;`:VdQ'£Zh&.NzUynRT/ںI( 'A[`HT$߯ 1=ҧ}3{Ը g"FO6v~g3+CStf&His8Ց5I,ɢR;kxqӒz6>Xɍ2H y#Dk)>>U۸dOK̠@jXV 8 ;H$O+lִ䴒xȥo?0K+ufd'cR.wBQ}:j.}HU.cxUG8矩\gуJ;HY#R@_̏.0O_4pKTp1Ӟ wzxTc#nW)7dti2)Gڦe^Tq?_z$i s)NLY]BH``W~F z'c<6dsOQsIQ32tv=2k `Ul`y뻱kԷM\ج@\r1} t5Q5pb.L> OSo²7ʳ w 5[카6o`q0d(I$̃wtv=k9$kv.eY"+ + dw|8DQBT Anmdy>W3nr+ ]A< c=EUGxe}Џ[:bq}4/˹{z<ݸzfqޞǥ)8̈- upgL7fo-&f#+7jgMౢ(մil.ewAEp4:-G}?}ׇ9 k ؗh5(ۙZ/1\"Olۣu t*#VG Dֱ;QI'̟ Wg_-~\[&;ky `+>th%,sBZko3ujh'wn¤`!ҭNN[oL6T ʹMOe&`ʎW"4?d-b>"%HǨY?gM{&NסKo$FX6dvb^Ʒ W[kF.nJo˳z'npib]W*u#088cV1J|zys^p*S^=J}{ILd2|5?_ ;5«+ρR|Ԥ$ƚ#.gۦkԩRևy^_b0iiſu$ӹ?E@-䁍ؐ͒u35߂O5 5H^lٜ/!taӌ^3q8.OE^=? v dqަʎܚaG^ @0vJNCޔD'v,\՜Q` );=Fsqx&y!<8#\g'R ?ɦw57rs c֗(9=:rc S`Fӂ~=G)0j`<=)ws􃞦ǚM8Gz@6Ɓ1?QY#ZxiSւpڎ̹ ՝\N en?[9ʹK]>(c=D `稪. >+tE-jPz5;467- {F'M~VeX 8?||U5#ڌnum^Dt ?6n` lLWR#o$0s]Ԇ85"oݜ}aʱ0\[0lO 65KmEcڳ}Q'!`9=G"c\yt!IxM>XN6:Fƞ 0vJBdGpX9O R߭u6wIo(ᑗ) J+{G_ſ$ԭwMikye 5;sΔfv> A1?< iRxu},r:[dRH yBx$ ɯ5/փ;~.4|[&,q2 2y2)ʼx l!q⍭ƏZI?h~RK}]$ܛB%HUc!Q4Ϳ/|Qk i^-`Y#Aݒ6Xt i5G1ӷ*g'Zg|<*=)by<:pi۲0|>1gm1lu؅7Ȳp펵ʅ hnoQY~;!$2 19[B2[#hZֲ籁Z|9^UʲFޣ8ȯ6Ɏ>+Hak w:uQ,ytV24 5XholvAW̋cmG~zclEjD9`E*#'qd2diW-0u4Nǐ|0AOdS_:Y+h-HU=G> RHn\SB۳eU$8TSc#'~rO<|DѢRA鞢ŵ qF +&n\9쿘H9 82fJ#܎Z ] ]DTfSh`3jMZ[O&FʷO´Ⱂ S1CW$tTKwc5cxBI*U0 CeYCt+ͮ|m,r}URBȯXuj;o2dׂVn2x;9qdAX7t `c>yl' >C $wfUv#Yǜjs+*###kҵDGf I ?#_4g NKќK:<ړ9O0q#SI_v$d00d}jQ9k2rӧy*4ǖ1?Npʓ~`O1VDK#!nw*z $;9^G+F;wXܬ@Xi2$"Ň܏\ USs}sKZ41TeNN+ S/C#F"Hy7/=?.kҼC֟o%D+I*xapok2Tt B5 U-$ V@KI+2y_6YmrïPq' dNHxvy=(_֌q]F"G9iN4ߧ?Z]N۞*''Q֘T+9b9K?`ϧpsLwzۊ\nހlc7smixus iwɦ32185^@ ,cG<)}i =2~OZa9Ƒ+4_> 89҅#*P9#RCQZ4m[i O:)8{Pv*><FR7NL<?ZPx:?Ο=JMoQ@Nh#i;FQv4]UYGVAN rqAho[qV5K&ZՎ\ W r0{s@DI"n-H"c/^V6qZ+Vx:7B r:ΙyixvhIp>WٖX(x$}yx _7:=ckWqu(d]Ѻ0x$1{!om<1u$LMw'ۛ؟4o/$U9pKLg Smg6lVQ28DSusھj^o&-OþVѮd1ukyJȨF :UoyƯkt]>Ѯq7QN1ruc_nprOʾ.ŝK/./x?ῂ$ψTǻ쭗g#*DE 78>/7|7@^OxD~N;G x>Md am9b@v- Ү >[ҹ-3SB[=ךl"DQ%ے{t\7+mavkK= ;9?xӕ%J*GyBA J ώ8Eun>xOoU-n-28 Y 2x{״EA'񸁾ˠڵ~wVJG9>Nn<$C!lt+Nd*] 7!!GszxMɆ%`{zojQD.q-BcSpZUf/ҵm%قOCֹIkFVWb''z OXS|O9JTκuJ4Yc4*e9>✴O˴O_Jὰkv_?ҧ*a..?vIϨ5j9$ v<~Una*,c$Tq#+(H8.KsaKQOs!_vӒ@ޥ)Ifo׊8#=.Rԍ+{F %@_Jl&#Qm3 VBP!l1?xGn+ჅU<T:o}'VUܲoM2QZgT_Jt:ʈřprx~:M 1§7zzZڒ@O GЃTm` b_:g90Bዜp)#Ԧ fnE6(&dUF;GKYf2<60q^EƑg>`vzcιB%IܓpZnZjEFtip4lAU'޵ F H9<%( rN8cIuˎM0#[c{j ymc>)svjs'1׎ɻihujY$7b0r# cM nuxRS;X@[ 0s\&/L\9rO@3<0 glc2 iRHw-خ<긶: OڍԭdMHwg~>luszuXud?$ƼZ6б4~#}N[I9<5=l\3^!RI n7xNS8 N$HP:'sU cw;6:wwoѦ'9@ Vv׼0F\gdklA7R$qX{tPj#(vEME bS.g|eq28QֲJ 7  @ß1uā K62FL3FZ*͝ŲGQʆk91,9#m;Qfqܑ̻GmR=6Km<@]#vdi֬ב[ʳE+LTS t>Ք|;>Fqڽӣy~DT uQN1$Nݏ>P^}QdP\~>F'%rX䌓<٣40OrhLӾ TaI}0Icum ѹ;8{Z [*}$*$6ޛ885## sx8o~٭Y.HuiIvA&@T. d_>cSe|"_-̘Mp (䎵x_VWQ\3$nQ3Њteo-QFHb{uRy׎nm ·D'4Y#C8JS*?\` 7z5Ȼ7VҸ$-ĻA=xpsiasֿ4rQJcXD5cƣ,MȤ ;f[ҫ=G %hQ)b (EQJAfɧ1J&:~(9sH 6S=<=鬼;Ըh ֋#''Rx0Ƞ9P@gӭ?p{Up`Rdcg#)Iq#2jp^9Qr~B Wg0 b5F=Mu@=:)?JF3WkIdDEfbxrhsH:c_ORo>uG->>lqo,1\JN$meYXpA 8+ cwJx8=F0sޚy=y`ǧzr R5B2r1KӟIgRh9dJ0qSz'(@pq`&Kg惎@?7z{GzUNZJn#H+xip}F7 83G~.2rOJB{Td`KdSp3( Rֲ|Aop@#; *}sYu$l薭\x&1C1yQ]"A8|D1؏^ c pHiz3_>5U#|Y)m _sRi^1d$Hgﳦ~^eNBs9ء̸l)I&\jzD%ʃ+zncCJGtD\d|LWE2aX`U^tvY. 8ڳf# ;$λ/& NC+H15vkt<"=UOG|`S*]J L@8֜,hDx9X.00Ǔ|cZxu>*DOO_i6Shj'f@?ҿ6mdd+meq$т'L~|שZbf"/(_ƳtK=Y%oFA@*o56d}He$瞼k-!R"ČPC\);-8ɕLyvW]iGHW ӯ#zq rXH;HKpJQP=8^S]BV3Ӄ5iRO. F2Sƅtd HgN+.`κ{ hNN\gxkdch3DSTh&{zScKRᛨ-R@Bw*8W+K<(r#wRR,@FA$%I(F2;gBiNrO~9 [ "*ckG5fڶucr̢DNT<^}x2N^?tII?*tu&]ZJcӀ+ *[TY0|۶y vjANL1$@p}N9ֽC춺N ۬C  wV%:-!lj~?ʻ]E4۞ 3&J^чSRtNdN+jt"%  ){+٬H.xx_˚\pfca+>{|Rs2sPKqpxg9LWK^YYQ'}=Ku}BH]氕sCqS2h8d_!5IZO})$We+s;&]3`E׈5Q?-ڂ0fEWF^1QktK{*ձnvFF;fs7|KrQN1^2=K<ϴpAFѲ0zar­ 4F`nB/|t޷4aGt?N֧Yus"*AE}OZMχn .%$?_$gpss8~E)I'_*e!ljӴ29m{;W_;(ܳj:pm(1P)I$~4c)SF|En=m_l_9@1=2V'x'zQ>g4w/0Rg ztuXoOgo[,umcڋaiHT.c[=}`_o(OaOT{_wC|nt_Яh|…P?:#gިkLJ<-`ڗ[]"FLS$)PzIƃЁ_?y'f~,u]N7hE'ڇ_ǫxSU֬dZLFHM[%9#5xu)4L/ax.nE2 V :Vsx_Vmcym%Y\ ,AZ=Jb<dY>(oūx],IH#ivجw\Þ 񾏮jkey4qc{*)$2GL^ͽPw=9)9 Z>#IaNM[g4ZJ#k&x)>|Jw>4oǬ薳m%j<؀.@SNvsLg'5Z~1d~IaA{V~_k:핗dby+o & m :2:.í)_Qo KWZ۾ǖL"k~~?_}I4?kc|ats#1|Qόx[hepФe.xI㹾qAN?oO7W3MVd4&6:2GPA~_o5t{/ &f\iNi&>ڤ* 1XȓʡH:22>9gk]c|eGl;xwv }+Zw!g=pN~wtsր3_'~~{sx+=~|Z}S᧊t[Gõ+!ur"h\x>Ko4{SHnh1nxYѼE_<֬ J֓2܀ {f;3uO#kJ9c"#4ݳҤeP2)3Ґ 9=x4tr=3LgZ`{R0:@7<6{w98[ g88u'NGƂddsJ hLsiO<AOަ`#y]Ƌx' á<0=,-KU9S@'<|]keKk:wuH{|oī+aS⋿j?l=O7͝bۖf-$+>Ȯ'ƾ*y6uk2]YÂ0 VXgR0zժܣ<7?K OD 6Ɓig$bǑQ̍ο4m ?o Bw^lMyfJU!>ijHiŻʒ+5n%G5 >5N>UusC֠NxAW3ko%ԸXv)OHkM=~`H/RxS*P-4m9O#q'VjnG1sЪN+I\fGv!RX<[fRMѭZ]VYʱ :|[ K)K#P@qJ?f]SP # $6#A=y>dJ8Crj}7Xh,߲_%Q#z㚃Zo"tREaE=>8UP))r*Ž`fXԠbvgOP>?5K[Pcr=~~afwyn$m?.׉X&!xPPaT}WHIWy/!mGzT5*d< Eji~%"_( P2 ϥVS}qi 'zlP~FV%nxi-͡J= 6wVeQ:݇=qֻ W hz6rN N?y[j26n4A~C6Z=>f^㞘Fǃhڕ7@F 0+㲒KxcBc9Ͷ[D*=wE)Ϯ=} k[ Vr!93һdӭyq{)xY2>/p}nQȮtvHjEPvf#SL VFF8K3Ykld9!?7:eE.ۑ3׊$_#5Yk-̂wA"0X7n+@3FN{zՉo,LH*W~{CIU$cWMkB20}t5IlO;÷yỞ?iL±^6H8]녵 Lyot1grqyނ_\Hk8rvozyUuN<7_?€q[>zo<ˠI$>i9~6 wүh4r @d׭r'a;M)%`$ec^../uh\ =ھqo\ ( h"%\D \+t?j›=Z_x}}ΑI/<H=Ǻ| N!ӡ : ^,-xKm,o =޾~( r+-NTv#<8AaF5/xB4[aI8q  W__ U|Ys6*blSL-}QgB|8ᶅ_M<] oO,> \O{Ɩ25hb+Qr|6H<שArcɫRľ"Y#tU m 9/"?|`7z4 {*c-bW#R\u$rcM NѤҘ𪄕}땼h]/<]bK˫voǚBQX=HRq5';cYs)wF{>-(mF!6GNx<⭳e8f.4w*| +Eyƙ:H 8n⻍PMFvdS,GQ]4-]MnM6,2䤨HV\wLyρ |>vZ\C#Kc#eterkKxG^:-ٟ'Lg|e+/9qkW`asN5qC58>D|޴wANÜoʜh⺎18b+' ~|>x]65p0|t8mT@o ao9:>mFk&bRzxjܪh:9͠ksw(sڕ?V#& ӟ!;ǀgKeBi|D}iaJHeܐ;n床M 1ZDkL]H}N鶛n|yZܓK6!'ˎO0-~T HF#Z>T|ܚo)q [%cB*<$. /A|wƟ |iqox/C},UTIᕏ\zď xޟ7X[5X,&8T̯ԅ>:l/nїHuOZ*.nXAr P?'/KP~!V.l51@bM|}|]|LQ-̗%?薩,zI?m!xWv&]wN&i |mm4Xri*/8um%u=;ើֲ v|OpJ<#ߍEfD%\"]W6LdFv1Ҽs?"f|w}W=OU9V\rZY=''b⦣C]6[Ś:#s$k=x$'ȍ J8P@W?oZ"u4۪xr{]hAK,*~#PXIOi!hsW(1Et>*\P\Sk [_A4u.FŸiTcF_l |3 o|8ѠӠTKpI4vc$תk;IfNxCMٍ]Svi b#h<_}x5O xI"0Xit[-m|s/1+ h*l>WsVVcq޿'nޣ+t59O2CGrNS84)2J,J]4j:Tun vm,z}{87~k+ǚ-։XlilSl 0`@a_*íl>%Mg:sԤK7RfPj.V0_>'j$^ًvg W$F,G'|Cm>?Wj'{ki$e㸴rW/u 1{&u]v(ocYCH yG}J VOqm}GVUD|,'lM|ǁ<5Nds|ԕE{oƪ4~uxb_~0|6?֩-Dp`vVHW+_AJYxQE#ZIq^sW_-ccţz"YA$ZU+;0|< ߃⏌|dĜ*n4'K◎|O3]yZ^X67,D8c@=9'?E3h_OO[w`3$]Fc$rl|ڟ֬Q3DWzqQ ּ2MWzJgD+#rɆnqq[I1V<77jq47($Dn=([gJڇ;O0ѭGm.ds E&ŹA 1;I^OR x*[đǶ]1fPm?G[_ㆯ wm #%H7|FǓNX_n[Pg +gBc۹Z2.XqUzF 0~;y4qzotxL t>ԀMv;1Rԛq)r=zc?JnirTeOqS0)0:z Nqޥ+zPRܮ{ҙ['4@!=EDdқ?CI\o@w]px<Ajd'}`=??JŴn9SzB%]k4ѓҤOԭ5X|sCSJ<Wu]ѹ_5~m[>S 1S?|--^[Ya͖={滫2#lf~5tRC^9-3Gل2TV0[bx7[MקQ=Ϧ|`2bɃЏDZ2O]Fmi >z(rl6WXFH 9-KաC%H8=r*K-H8l15Xݞ> .σ#7I$2dRP2pO}(V{Un #ڰ|7]EO Ccg^uW +dj= 4tsABOJRt]YvO>wj[bƿ30־?N]bFaX37Ǣz{QM#cѯ|cxOOiǰk&xov9rxy|ͩZxh2LGjman%A 1oa]+̙TdKכYϺ8-(n}OJ_VwMd#C;'f:O~=FËl"hbCo?n- Z+xfw;hGd*Uqv9]Nx{q^Nlߊ"->=J[ǎbŚF }ܱ^aOe>"{6 %asʡD |W[,ICo E!yIowVVż 1N7:}⟆u]z/ [d \B.$" >u%cd䠖B寉gwk ^!vFF+?xĚ$Vmy!R~mqƛ=k\C^w?6bNs߭}5hrx+OּAM1 k?ynH8'?uV B4$oĄA^#-kzk!p c8=kǴψh;k%\ZY z\5r몑N;K NQ FFGhݱz,n"xܩzSn-7#>+hnyk2b&#ڪ_joL#G#} W5.|$+∣ȭpW8n՝9^I;O98W[ z"+"GAYV3 q[AXͯ\}N6'AՈeK#k VOZGΣLg}F^2n$3 J,sczmWPös=(rʼ\&hr˧Se$2a@{I0!s_xrnLE*R޺Svlԧ\vPH=?ȫZ曪nقYQԓ?;" ơd^#n[b9bAǸa>Ľ9ey|-oZ7p p}OuGhcGlH uG#ڽ:KGEܮK30٘#-氞"'LhC'텬&| tmJCm=s>ֽ8xeV`~r}yψFo.\ORDZ׾/kzmSXڍs?WV"=חqly'#)Lcc[fY%F$eDKӎlm@Ht\HT\Ƥ9=OLG6.O]m3~\WQs{k fqӜj'ޤ-o8l2F6ztzsc3x uŒ t5[ MnHH?Ƈz&ywWq=\K3܈Fv%9=j yk ]A[9Tk. 5kO/íV;l2%PH2XwxGZ.vgqe:q9w" |XE/+PG(:t_Gƺÿ!Ui S)9#͌2pXؿXx+4X#wXƦyjIctoAR>Sh pOdwj 2vês_1/٣^#wLaMæTJH2H ?IE~H?l?ɢ .+N-#4y~!go7xq"<~5/xx.}~k`<"5" 3k _h#Ej%f>;}v? cO`WLHw41Mՙ $C#'  N_N7==+%2q ZA}a ?Yd<)2|MG/UOjX?lT7?[+nESǯ%^?X7l:?90-"~$L!g.ϛqW"Gw|?VMۏZ QeW|=-+{23~aд~"~м_W9y{YkA.WwCDŽWH{6㷓89[`Prm.GCjG?Gߠ`rqQҿ?Oÿ gi6Y?kѵ=7 r~An$i6wcXϐmQ- g_eX!:f=9a}$BK\}-vn+)|+ e :}!ݘWI#?IS:5M~ET2c21&}>pԇ?n3?oD#v};SWù1rce)jT2V~g73ڹ |Dg.={ž-KHw#/ux_?>_Akb66Vsw3p0#rw5. +VWk" M7+?Rƴ3ĸ#Ioƿ4>2|ZOƟKVD lZkxOQ''s36@?IFF} O֕-D9j~99#qTl>ޕ&qi98 ~TxqȠfysM#=:i`{bHI1Pqv-Ndu144c򧑚iqR +n)qOn$G45#sNzzP i99ң8Iy4Fc֘It<*N51I=Tr(Ji3HڠsP7lֹXJeF*H޹CO$1)4;.ktF˒#hRa*\VV ,cRQpe0oOz4#MePxes`@k\\+&2 q܎zנObUEg~oNRC&_\@+h zγ@<95Y8: βht(cZnMP?!pdvrڡcTPkzZ>b#9=EbzGkVouKO"@81V乙/.~QX\ԊVr8xvʑ|+K؜70;Ok:n'F'N@o\fDX!muI 3gC,Q\?v sV.q_kl'>kwf" $1KsPO70g闖Ko=KTy}[w*Ƴ ^CeY΢UXX4ʈOq]-D 2Xک>2;e|LMiLrNq߁\]内i"˩LoT ''564[ZG&, P9${@x<-'o +2מmsS7]Nfdx7$7|\XW*`#ǭ]tU#% qsS9gAXnuz t@ǛҮW׀ξP*h.wZg}P:W ׷}Vq>O1w?VM ;' +sT_W 78c8c'<%[]+⍵ն4iw%2ym!ۑ׹HX|Rī>!V dL4r#m~ַ@cZif-ҿg u)W El8bk/oL O^Bj*~~MF◈ʿ_1`~.~,SBfKk h1byn%V**_d~߱1-Ӝc'k +jPO / \1,72Z)S,hŕ_$N ?i''t>Ib{#chKqkhYScr ~}SW4}D̻Nm]kYJ:W ~+YCZg B;ܧo{ˡHl"=!ckSk2 񘔑?>6i٫^,=۸6lv@$gci5M9'E&bO Gßi:7ZXjROAOi>4yet0q/Q$1$0Hˍbgba6ˎR1Cc&)J?OcHA/ZwM:v)k[E>\S`^Wpk.wV uxĐLr w+7UM[O|Edtm^ԌyWq$L85)[aU/Ǐ6S_E%VLtYˮ{|ڽo> XO%_k%e{.G0$YHoMԴZ Iǧ'V Ⲃ;[c.8Q(^jgG᷀,M_Gl[\^c~/`p=[?u?xSy|Ku.ˈd^(ʝ*61ݫiZF䪓|Cv3Pc? ͠$'{_ :xf-mdAcpaG`73d_ 6O~՚&hn=Յմ["ڥ'iC pȪ s({b= #9G㹎OMT_&]GSғD/5bH< #W]MBx!ȯc3 ,o trdS{f&Kupݒ4݀dvU_=~˿Q |]f[x*|o$2?Y*~`>,Tӧ 6 W㘮|[ڬ7Y%md,y'澀1~IҝǙ{l#8",O#bA7%&UU\~iڦsY"(@to_߄~fYR]H\3@|zW|X/ͻ@~1?oSD0'n|%k.erJ,SF2Q>l1)R~R|9ӴO|XQk}ɱlFM= c~ACEՉ ,OcQ8N.49{S2OҀPy)z~t1Aӏ#^ƒ'FgڟԟCȠd@n9+j}ޜGs3Ji4Ga:ɑ8TiO419q<<NR?ʓ$84$4>:u=hz#asߥ4NhcP09|xϧR4srfQ{V'??wG Ooʕɸvu>ll.QzR"Xq[VڀkM,˜qt|4G=e.t@6O첟0sf~ a/:w ~_=Jk9Trf>>4z.&uʣ'C+c'Lt,0<('\ˢCsI?j_|Is%$/\Tc163/񹽳f]ě۟p}05h2ܫ]͌W#;#}RE6oDgs70^4;I0ɀc8.ENA0]qvjOqk Ãe1{"}dm,dw84-Ą< wkz_1 8A!p7ܟl0v6mF3 2퐾"(x%{TFL@=]oʡc^:":tOlCr>;[vT㿱[EuylYe\<>wRmEN21dY]un 1wZd' a}b馏qx]4w9V<fp|2=ȦsQɗW@O_z3+#[~I5;1=AL&l9(.sPArm2I]W!a@~Csc@g#^[4Vx}.9:FwN溸x*qu'5M4@|xzcSM&A%8aAVG MO}˸>Sl43 ## TqprBºo ֮m#QDw9z(Ȝ6ONɜ!r NJtK5X1F3?5py>*a_#Bnq XJ1{c[7c+𯎼 Cmg.)J H8=5IEG|!P|IP cnz.~8R)=1Xg?4? 8cc4ri;:N88H:<*zNA'5x7.![Go(} 4)^$w`4zSr)֙ۯOΟ(I~͞ ֤_4$FfqI o.<єUah>=J_2j΀zJc'%r1MZKUv1k},ů&?ZhCLchڳ80=3>!O+a~-iJ[b*8yɈ~?[ ug|]{(I';jޏq;;Met!5JM&l>-ZլixKIAy<8e]7ҽB? O<'xk4+)*ϩ=Mt/%P׵ a9 $Q\{ 1BDl皗n =AtMycM9HG^((&HS 9Gn˓<4''H$9qU}iʃ,z%C89ϯQ#|P3qz%?jnD=+#<(lsU\Ա[RmLJoR(}Lޝ L9Hl/`t9$(\zN#{搀>^^#R{V̚%m>ٮ[TN}#]AR\Žg\H7b^zW"GS,>>? =t }(+ ^0rSLeȬ+35/f {j¿UH\0{`Rl3R;gR61W/5xSBΗwO1O/8+30N'OҰo2cd JV<ZW u֞?.b7\[e0]y??h"Qg7qxǜ[9Icqz{SوRrA9ѫ>~2[B7(`Bs\ơj.`Y~sRYx2W1V/]ƍIњUk y<>+ҭ4QDlcW :#T~"0«DZGd h.C[v t\~0F[ y/;w{GmwCRleIla>NួRcqv#F3׸⴯.y ޣ>T5ȃ-A@(lgxz`wֹ eFF6zPt3E4kg.9qnJ\\#$nM>qڹEܬ$68d֥&UVV ;*${9~Ҋ<7*F\ǥtV3EU?.; җLPlS#VEb'%OqF3: e`[WHNA p̨beNQVc,φd^ƴ1Z/+к6< Qh MN=:4eEǮ:q\N@–(OCL<^d(a} =4&&:Ƞ{:ֵH ye!Qb[ߚ֌=0g_2 : q[<J!!NH9555OC=B'6t95?c8LXߨo9j=1*CfqU@L?Z}sFfw7-?88{q& T~5Wע[HMXV&.zs8OJCde1_gxAa.+eH庉$Seb1d;&^cOdzձ(O֋ a}?X<0{lW$Ko榸~߲ƛH/4HnoUx6`AF*"?6Rh k{exn qhFWOkki~=}X5 u. [+_;S\m`c?i(xZM[\IXXdER5;\, R+Ho%WpUh\,l$B0Uрt#֑!eDbr=׃~ʿn>>~Ͼ]l[ !_1A9<׻Z+2Ɯ1Hz p{u␣ T}}iv Rg;sڐE.2Ec0=3CsJC3IMgwzgySn84d';x;isr:cM8D8'_~ǿ4Y1_LRgYdr8m$+Y 'Cg?$uǮ3?{m $g``y$.;gutoB@x9$r uTq<Ҝ@ R[%zҳ4"e3Q2{<;y# 2\x` T'-Xҗ#+CaPIqǧSTe-PAiNo5r'~Ү'ǫRk$cOe:J~%=̌n[hFR=c柲b)^9>J$M+4RN ? ņO J0~k8Ds;xN6.6сR={zT8 HdpqS;A^QO H$8*nڤ\v4Ƕ?JE)nj|'sxK@G^oʍqZ@ӫ$mۃ9תnl>bW1X$ Gj`2yhVt榎_4:8T0G<ԎgFO\hѼ(O ge=ΝR瑻\pcV=CǑo*TppOתB{~o #:ww?yrm%bCִ6ӏr1~M<@ف0ļv>sإ'OJڢ<5 r@$pq=}0$#q\ װ!WtSںVwr9&&nݘ:/&&D"0X#qx ќb=]BV7;L=֨,P{pXwm}{O0im*$g?("p ;O3"9OS<ۚҋO*uF\H>lsJ֗MHq8?-K%y3h]r:n}YJ* ν7R3!Cv ~uPrz\Qq6*cҩmtb~^NWP-̾ZC˻Q ̻{q׷UbbEkp9U1PXbA, A8w*,<>^7p==h=ELܰ۳$(<zhṉ7=@ҽ9ll$e-q'ttf `:n28zҰf]8uhq^M ݘ`;k2~@#G҃NnWb`zV˟)N`WQQlH <hiJG?1*M]o#MKoETI8pn q\H2gd_SjmLrRONU5lx%{g;BZORy]Z@gv=oK&o,P"3|͖QUh.A5CJt*#H=+t/s ˨T8U\|!BC& _ֳ]5]ʥJp7nA =kfk;bQXGAA8n⧔$OJYz2 [>Zr͂$6>`[sF/܀F5cHf &=Ԏ ]eƁHp q\(S!\>~y'DRJxaYrLGmBw'&ۘ> e*Xg ף)Hfo qc\/ǜ1Viu;Afs~+&PHSO:WӨ:gku) Jz#OZ8RIusN1n7VJI6=N:]#5jSya3s۟oȩ2> .G 銆8$ɑIpD%70O/^= U3*6,-Zk9%y0<zchV$23Zz*$M$T`j{'0oSD%vm:WΑfQ,^rrGGI .y?,딟_]=UV6ѓ_6'a2S]n?ۿS&|;$`miC9&}+/ԣ?hAn57AFxo5 Uh};T&N{8F 9a?Kό?y[P[v2VhI+q #z"XX+Mǿl?w SGEĤ̹8QNp3+'\#ϧ5$< ~"h&ȭ=%sI'~Ts_I _Y⋥@$ǧʏz_d_|-61lfl}xI7,zRc7+a_3ÿ|Pa%o."KKv.d>_$);M.X,z^yePGMQǟeZrG|WrN1;ᯇ&Xd4Ƥ gu(Oq^GItRAN :;}9_ Fkm evZnW3osϿJ +j=j.59|?eFПq???n54+/mW[ -Xu\@zT*O> V<)C|{̮_JgSZx _VP꣒E~i:]ľVҵ8A,B*0 qXM-ҴWv4R)7H+훪ξ,O xi҆vVô]ZGcұ|W;oڴ>-#|13dW@9{{Y"Uqe# \ώ~-Q膬j;d/HvS63 y~?ioǖlwkL.C&d!9;Z{[˥F+, +>hufKmlG-v*j'mv?_i*>j_֛mڻ.|KX,v١L<9T$| j/bt:J{kcQIAIL׵|qq LmƈK3u Gxn~*xī {2ZDrd0ȨUFKmی8lm?'"5]l7KЙ\dFlWnK?|?yοeentrǑYKF%p~JV rA6PO$?$lKL06URqW1˜z֧@)98)ɪyg>lȄc[b ȲʂO~*y[+2Nڒ%Ls_f&%u{{R[kCX!ECmLheIMAx8@2[R "\y=SparIZ(2Ԋ: 7 wZi:Rͪ9p[ּ00Ƈ@TŝzK2l\TXtB읎a(Px5Ks),9#SH5^CnT=GB9&aԄPS4 2?JN3}(Bf\^r[4&ԃoe`;Ѹ9M$&/R 񻊋pǾ)L)$qހP qPQN Ҁ'ݜP T?1 O\v bO”w杼qj?M0R"F,rR5;Ax1k3+3eWcjEjUT7OqC=띚NivZpRc9\NƐJpI{B9'Fp:5xrxQҐn}] ֓kzԦ08==לw898?.#'qN۳o_ƾ,l=T~;G\ =8Nkt=|tbU(1z괹 %pv 4u Twu'mzmɾ5P9.Jœ$15:Cxo{9.{zV3;zY43żrO{KLs۞j<>VrcRe,+I U#Xb !xm)TUtOz뤎XW(d/ǵTrnBs8?h_e""v7GOD`~l^an6d v=?!!cAy鸞jEs ^ !v]k:y퍪9ҵMi*T =յf );X7n5h|ʠ8zf}C\Fx5=Nc<#yAX:~-ʍ ГIjL~+H`Q qrJ'XLv+땒d |t~+3gl =?m, Q.9?Cn_Dw,mc,6Uhwy \".6zmdM F0=?wQ–p[Ű<*dw,F(e8@Qj {% !69#P&%Nk*̬$Ӿ*N=4{m >OkYO#ҽV@,$M.Y ta89m-62䓎qփ3udV vz5d;ۂEtw6 PXzouu:g4UK14=o]oiO.r sh\H~_#9"<' C4-m#GP>Q'\_e$f瞧S^ǰZSFZay8? gpHr x c*q+gsrj;"q =t-Ne@%׎ZoV8=dR[>Kq1eV*[ KGs ?/I<VFgw*c2CNJ۳EI"%sА=*"2G1 Z\I:[Ol!Jڝ1W[Øqt ? d\wˆ~c0B+]#AU}>>>Gu?:R^3$feLk qÚ8K^vḳ=:T[j8 FA\M-ψ<i4𞥪%eiw3 Q^@;7UkJ{"4|#E׵(3 1Ӷ6Dui '~?N5^/6-F2MdӢ~M` '̔_P'?~h_^X|?eJ@4fi[BXzx&Dj;DF놾c퇮FjɥiZ!#6G_}s[ >׫3c-y3F|ԦZ+a|cv  |L~X'ja_G<i?Bcn_|NX:?&vV_5\\iV;@ʲI* # ef:Hp'O"=Z(pQ}C`Eā$qOP %Ov:WԼE l>)z>sCf!/.} yB5>:/_ǟm/ AD@OM~z< _ݴ*R$E!B~_֯m O ,w$Uކ_>e*(UHRc8Avg3~/4&2?FtKg`rk[CFd\~1jj? +%$W/ H(%%mgM{ѠB#E|٫;z v jo /t۹.) PA#ҾiMᾳe մpǴO2evE,G^+SQ-!P0hi>yYJ7Q'~GD]@5vv!aD1QOBĬaGk>8*R$Mݻ9is}_|[koZn{),e$d0[Ivrp DH9qڪpy5x;Q[_XZ5ן{-K,k92*vi䉝v?֥殮9&-, ]ƿzU9ژP;U ӷ nMiZ6R#j\t8(ƒ%89c>[J9@jzHI3[CK Ik$fYYYH=k'֥V~~oS6}2`.n ~Wdc.7#~(|9]`'cyD)(%py+H2ERLn,ݛ$ǥ!כ?4]7vW<:~i젎r'm9=+Le=Er}9 IMDm  g9 G'xGߌ^;׭|7>.֬kgBtp#\0Czt#1IRZ94d֓q9K6OaSj#(19qY>mF0͙2ܞc8]kI3I/xb9o{cNa? M?'׵ztAx8JzkN%篧ֺ-ݎW ?aǶ9p}ѭԑưC )O #Yٽ )9?\R…uLvNE-yTvcInK-[ sn$T-~vxG|VF<~5~)מEox69>t+W#zNYZc=3Z毵[ʐ99?w=MEf,2 sY #=52ITn{b3M5W<`+ U7Fqs\OO6`G\m»iRksUK>!^Ou}#\Dp,:c>e~=U.~Hc>Ht%;qh +[3ͫ߂Cw~͋9pq'rkS,nM.DgT`DG.fHv>ǒGQ&utɦM&3cIk<9^{F ~WwEu=L.F]n?f]A$\SmPbbÝZsk9F  M [đbW~*m?#t8*yWu y@=|Wp~`޼޺b6S4|g߂{⹻I ^AO|<Κ酫Ĭ%Lyz" {[嫫`r:g'ש^J:=H _5xr0T?;Ur"Lq =VZ}~Qwh<"?(WFk-j" >~[FxR&sHs-׏' | {y٤訹a mN:s?,bx.>]/FjL~>>𯃮. {Wt5V1p3`AeA d_#~HbW=Gbců_\c:{Vvkd^hB?1N0W ndI$j?J&읡!ʿ&h\ SLyO~EYRqU>Rjt3k4sL.\n*ʂy*`=+C BpP?+?RZdf (BO ~Zq k>fDR(_Hc F1d3nc xwIޝ.B K4p,8$tֱ֖i-1G@p4O:_ekzLJԼ9xa<6D*AI>/ǞhZ$vѳI;]NyȯC~ `PAE;'x+E|7U#ΥqqnGDl2a`!Y/itV|a$z Z܄\r-FY<@ .bGnMdH_VT#tz 9R.mFr9"'߁I˨9x΋gNxU^N.o'6c^o|oo~ "-inѧIQSgjmRK6=\q&{~ҚIJ_hCi8=xNc4ysO@қң s4;~̓)7sJ\2ƑsL,;z (WڔqcU$i|pG+3JO|c/b읧r,<?.EuyGX&hm'!uLvs 3 i#I938'FGYa,z1œ,A`V O:N y u@ҥLltF/oƦqْ=* 6zLߩ~T֠N= ;g$gۊ21?¾,hc/8\}Z7`R[' )*&=((Il u -&MJiyl|&W?c]n.U[\tJ7ג‘Xz8Ok&3Xi!%\OZdkU;g# x9$$yִR/Bܦ2"o3as,x2@n~j􅝙c<\zE=OtUƴ9{뙤rIWP`M8=Ol{C-j,,I힞J|3k6$㝀 gWG>Ư%keqDO_-W]I mzSrfIm htqJjMI (V;v'͵}jyn(]k%؊P. [Dh qn+Q{&qr ֳ/^hVzr䷍fe 7O%.Ku^2`Ӥ˲ga܅=2z{PlsNg0@>W ]<;b9G;dkY$Hv21U*q#c3FYN1qԚi)yj|$:c\[!$r+ߋz2oY=BJ >/E_L%M*dp<ԏoz%MH!lvzmw$o{cu7kqi [w q<g<`Sms7b-ҔY}Km (Hc^O64C(<~"wUb7f6]FrJ /9+UR$Hmf8!np&XPOG|ku-d<}JuM@1!f|<@" # z)ϰ+nn#`0zlCL >&G]ع(*˨aoE&NK '=ׇ\o,Y|@8ی:WI}m}q![I"8ٶuH(`iiwa \J XPϧ[z{khvDrbn?NW󭋿E-2'a7 4ʪf䰛G0 0 opYJ WG/7<#1LMc$o C{go]㼾{ &kƛR%,QN߻(O5<ʵ?¿Vr,9+5,oqZ.HRFyAA7.x\$Vz-jQӇt=RB9S9 eW1BE}fݡF9hܪOsT`IB$^&jI y\nJzT3kJ]ѣ}1Յ0:Z&HLt iS zWdyOQڎ:S9n搌{[N| q7%lt!ǵGg?g_پ?i-K)CmQDzt~PB~oHϕyeeR8(?Ew#g xωdwc^;By?:IB 4qxNN))ϿǮh¶ֿ8?6O_>i_V FAJ i쁤Y&M+X֭)1%θ>ZiWq3x[W' bX~2,sI}6pG@;Krtz}yt5''1 ݞ{Q ޣÓ{(!B,<Q{ g pq֚NO}EOPPZEiT}*3"2E@c= 2"B@W3}jޤvϯ9@dqqnl TDs|T  [ᦵ?m<[u%fڗpF.%Xe?:y+M-y.#vBod?2'#ֿ?l'g@Y~Кu{m:mЅmJez8 8죭k{S5XʨPˏ!6d)[l1W'$5.SW?4 \7hDS o4/V(* ̡-9Qߊ~tRiZckCmg% 9eqs+}/Ot(",KZi%v`OZm$vJV4X@>@OME|1??j WS񧇧3%B͜ XddEWڿM;םxgO#_|DӒ^{. Q B|p$$~XPt+Ҏ:w2:sSbn)t̂0z~Te9=:RHBNCC~Tʭ;#3׮*lq~t֓@9N-i&gv{S_49 hր;ӰCIIM8#4{{62PO=},2j4uUQQdA(B8cvH8:VG<6(8u:g1?ZiEim[^,ӆ^[_[[P\#vp[_:.YhEu-6U%c$_qPA*@q劝cx5%kτXI#M /=)/-- eɟ+TmGM't~iקPH]?w>@NiT \2*;Txs:V帥G_H~\T{qHcA9@gӂ* 0R2s_zn50~^ϩ11OQNFGc_ʾ,@1=ǥBsێ})$:olTÐ=54-z1GubW ٖ~09+GCɻ+rxMiƶo>@}<i5s%KX~p\t\kV兤 997WS*sݯӰwQ^na^mh}vz#$7(f1vrv)y.S zWF\88GOζw aaGq\osݣ5c\pzJA)ճ+.|s֑n ;J.tsXRP?15Q¨ps8i\G N{׏S ;E, ZҞJJMKk`B_*b3>9KF= 5#$$w;)ϩ'UZ6jY'gbz;}vBfK/ɑK3 F7*}?Z O_ eCi,+K'U#[UP|J[c;?Lא&mj{'4nm€L~@GgWoiK-WRRH$!#߂k:`>oɏSMZק.ʱ4ڒyBGR;*^\x^Ԥ6nX<-$zV_aDM:EkTwޚ?U:q;׌xcV: ;-)vg̚S9p]vKxXං%3Iʠb޼>[F—vyW)΍gL#9!{iҥfeWއYmA j13|''W}d:ߕ j33\*?ڮ1mC0r@Oq֩kg/D[4ňrzcڶvV̸#`>lZQRL pzPJK+U_(9Q"nn¾i6Ի-Z5TeWϯsΒwgM t}\it\8۽j@vd`,i:]ZwF IW <:X :sZ1fuaiII'3Y96=SuHs^gjMK6O,q5nfKp}=i\I,rګAҝs6RG+/?Guʬ'z+5'.g䍭ee2;A*૩O%ܟ'KAr܂ djo4OTWGsxnVE8pI+ǕRZeymjot`sm>D{hMs^8W9?$PϨ[sm%L*V CxgZ-hpY,S34yG'׍ i2dmGaS2FH=MF7IQC^m~ xuYŽͼ"cEPiX|S _O[H׭p$dr?H5:StmZ% $'X i {/玵7ئ8_5Vcչ+acc\1xM7kt;7_iTZu~DHiXI!s /4xu߉_syqi,ٰ}` #ڦmzpjok|%2!XG ta'*7fAQ3u{\)Ev[#kn>dɪ߈< T; \JbOGvڥzKᦿY?xBŤq*(k/eLv0 J޽;1|-zwWy2`+k可aԤ2Foj7CK忺jb 9Ҡ#Sz=F60c>S qA='p9ˊNT 89D͝]pX:дxb*H1D]OsEKgª9Zf?=Ah#a##Q}M1ܜ/-V'|@u+1 Vٌ0#^mc7'"Gei 1 3cffc5; O#:umcf@bV Bַ#m? o}$qkKź[zNcn- 6VA~$'+;A HCZj9WiFT^8Z$ŷ)j6ih>f:wͦI=z(=v+N=-Jê9"7%ӧvYrY"zӵ.?d2~` z8*I-,KheuFf,Rt{c uPA׾# @% лsy\jSFڝNd5MI j/ gg2FzS𝥀: *9XMlRwHG;@[Hgi^ɬhvyg=䐞b[`;vCȃ;ZlF>\u3E,m$hhN 2W=xz=?TAc%l@"IfܢC8R'n5j/<ګ#.OO0ƴ|EVmF4vdjyy1}8tt^ח>` BLׯ{kLfk{t{xDw@mbl$ju>zƳYYPO' ^+ j[i]/g# lE-[׈t6A7fLxJ#m*;9>M$5̚K $xx\P 0Ӈ*#8h7BYRٳF{[wl0 swkq6=Jx&RH Y]W. \i:Lm!`̤2YU-5x"6ua@۰hRFht"p8Gc5=°HMk ,RmH13Wx+O=V-SRؑIf)*WX|FQ2E1ctSC?Fsqvy/ռϥˍ")#Kx7Rw*!9\[FPc[IנK0][ǜy"θzV%1f%`k4|%2abehcO^wy Ū}VXMshG`3qkxeč#*A ѓಂJ 0WZ%fڮQ;i%-0Ǫ-m;ʒF WtMþ=W6p y$.DC.wu-T)'^%c)ik=~p;eB$zl*Ӟ[}?R0YI+lI$${zY~%դ5kx /rrGFJ)}:cj9 E'H:a<0lȧUHnJ"Vb5qAa!n\BO($ x+!v2~v#'JQKeWSR|?h_kS&?,_VeaGt,Ÿt`STTLR4ϲݖjXC&lP{<0܂=#o^Ӽk᜵><ȤRVH ̲j[:Feӭw/Ii0r3Jg_UBwUM_R ]i?>-}n11+Ih|T͕ AbO7 ' KVΩYܽĒ)f<^l`ں;edv9T9=־/|#ivzr@nMU{*`'Z+v{h̗ڍtdx$VERJb+LXnk_|1[OY>!5gth CHR&UȏσY'a1BF:gfj6THkIz]R\ǙʲI ##v"8p͜t:Hth>^ɦ^K[hG,7ƿ ~6jO֮n[/4~myH9m/++=OB7t9Imc lyrr{UС& eʕϸ<#kL%N1 pL:QsuneԼȯ<' ;HГO"ժIe#Ks=p"QfE@|c ᆅ&R7Wԭ4 -fBVH3#95?lFm]$GE.+Ԏ0Q]ݯddOY&v.[iM kÿj| &ޥO²V«na` /ŗ_m)Ԍ{r V.spgㅇwҬ ."*ka+cSJII]_O_YGlguyp҉xpF  9^OM<{kZ}DVhW p9_Mgğ Aqՠsbk%Yw|8>$n,`Q.tM_Gm="=چdV $/)ao؛?>,X'~$hGشѴ,wRA3` ^xSM_-ckh czƿ;)?iFmKEu Ԯ<[El 2:+ZT7\)FGxK^ҡ6{uܼ1*봐>(xŋ9mc-4E[)p+#˓aj2߃o%Ӭm-ݻf g}7 b Y}?R?gY-vF?P1qDQQͨ| <nnVX8SʁGN`y5~7_/OM{x'YR*۴^g%W#r1W? b]kRVmC=3| ? / iZhiҥ;YtzBKla .yJW}?ςgÝ,is >vaFXGt߼S_ǩo@ 3 2"62ijJ>q?j3z׆4/^B |IdEWMAvDc+(;+ECҵiI+'x_ 0J/=1KխA*sʫ"e{@DqUUQubFf|^.Oj.d6km{`r.2wg?Y>~$ri:ޗ{g[Ko+wY"O&7Am i#ʓ_•vPǵ51s 7?9olc 9”@⸏uVֿG"--64-Aeϱ|L>xĿٛŝiIX gm e@r<vg f~jvY dÃ_QC#?n^lV]'h#l{x\ILtTZsn_:{SV}`U/[=??+#ךuJw<\A%eU`? UpJjo#MGLu +b|cZg_jx$a:ю=jB=N 4q?Hrx2F*fM#<M) M'w*c|?7ٲq?ץH֢' Fсx_cxr+2v1ާ$)[<ӱ9R6̀cgՠ&LplBUZAm'iHxa2`'?NAreFXX`x*M~CY[ # w3ߚL["8Vw=I,txѴgĒ8?6&"}+*5N|Mmis,ή1Q޼݄8^$[fA]ö;v-l/w,$zw:2v݉Q^Os$:e6Rnq)qjIXL~_'[B `='ҽ}ŵ=l՝"۴r9w53P=XJg)-p'i 9-] ퟒb9b\M3_^$>'/.QN,2\LRl~םxǟdTx+<9qᯇ!Gr%hYIaR2Փu,X}l<yϪDѐZ9έǾk<%ցmI>ף܈VA|p@^[j֎e/gj3^im@ȯ6ֽeWN4ȯgI,gMB'җ F9Ěҽ|*Ьd|Mp~q )8W|9K{t{ wE}Fscou\rHwy/ LdO]yO6mFӯńȇZƛ>xzoD8=_uM?KRmc,K^$sϖP>K{'?yRDۙeI/ORqP^X]߈u%9TUYᡍ3Z ̥GAZű ^ׅ'. xN@zF~Nw8 _Vwqs$dcdhErN:0CӮbo/.Einr#/}k׾)jw?t} Z;H5%x4BTK9Px:."kmȷ3Dy{aexcR8dִmŦp֯q ArA[&1s׌xcăGKNDVZxK73eVuw(c`9o*+ew}cr%`MqiL;fCV ](m~hZOt-C]J?1eB褱]Skg4Mj_ǥ[钴 "b"RHAbUN>\QͽNA<%Bԭc(b.%F *`(e p@ 04'i{&X.Cs^4%ՄBSaamjm+%ղvJɯ]X&{, ' 7t&vs^N6zG>t,k )Hztz [nE}Jvkq$otɣ}^0v+I<0qkҴ$SM!!M홖§O噝†=Bk/>ɨZ|}yR՟>A=qtVy<` Wܣ[luRN ud+$|>[wk{}:d̃c]ǭ/H}u+}V9yߏ,'nIbuRUL tku9G^#bI8abT@ % T#}2 gxnr?!ڼC| +ڭ]\,w'>3\iF}-фŭ.uc&uu *d%Y|eerK:$8τo4WT>}_Sc<ǹ漳_{Vէ|Ai!sid"ʠ6=As+U9mv#NX_q|F3kɼ?'4ͳ\uAI5R5DhB@3_.A})˘4v$#$dwaG? T5o~-|*'NrHe<{(5ӟ 4-XYUq ㉚0B$A\؎#ji:"`vRk I_QeXz\+.REJzŸjCi O`JS_1Ş%A}}mov^@]e *1[ )ש'yI@Ιa32\ƲZ~Jxŗ^/㨭Ko%{k)\G(WD`U%W?/Oxvmq;yp2q,$~]/CмD`}yl LsJ|!H ^YV?ew~>" ?RNo&\o5Y _iǂpF_pq 3=z񗈼!ͭxOpI"JQ7o BR||~խB[[ BE8RIg`q`g?ovc٭OICʠ8q`q#/?ž{k[ Fak B7;@s2V",99I<_詿4LQ sUG6k?`_7ަiWN[G. 4Y3`돪g?ISOYs1ɯ9ysm:OF|Kq(Ėr(Z* uAt|SOٯZKB[ɵ/PfL!m;XX۷d{UUKu0x\CiduX,($v W'-_|IF_h5$F_CSѿdH>?[H+$Jf9fv,85mBWZ_YAIB2C4LT*BHqj/oEֵ&HPUo:u * ?2Bei砬\w+WOߍl~>[SبRkľ9|컫xCz'}Eg,M}d+ZJ $,~l _-r{'߅.&^5$[Μ<,sD<ǡ4{I4x>8d1k6pĂ1Vdt;Fr{; 6 dDo8Da5bQEVqx5ytUǜ9R0zdԃ9ϧ)fQq=(sQO=Osw2[w*K`8Rnֹ3FxNlbg?E U<3k^;fQOI!QFIf$; GhAw,&fRsu6CI.|GiO\+/>8⑓yۼIJ03۟jQob.5_ ^Df'B 죭x#ⷌu5'\ylaI䁌qھj_S>DkH[{$ߐBX~Pp؃II_|?,57Rʿ06y>f\l GnXS6McE`繫[ =+ wO(n}WR_u.K, f8L˹lg⼿gAu~&u8㱼m>tmHنVM7?X]m&?!R~W%?Є9${W89nsG9os_]YU.jKBL%,;A;@xNxΟ?HeKyT;ѻ3hZZ5ŕĒeh * Ur6GrjYQ"V>.K2FFybO_ʮ[VGC#:^ "+xُO|+HD.@b1z<=\Y7/C`.=: B}:t)ciTfn>AyiϠ&f+[WaxB|'"2: חae{}#`^}|eby!peYdʲ@ ݏJ|KoewɫVVE@qu7-V91[!8 Կŭ[<;8%q&T.Y˓ϟԜִ`&Fkq.Lom&$+ oC9V=:WSOjandlҺu{w7PTS_(| ]\uB˟$C_ [յK8,<ӊKhgEQ7Sꌐ~(5 _?y ɕoڡ&Y.--Ť3“UM˩w3,Nk}a}=|U+'ԐGYܰ<2FBF<F8fG!cʐ ĒzWxk—W>0#K"X*Aå}Uῇv+Xz[_K<(sGrkg_]>5¤$1(lH`a[I&\>cD'n[!R~V(g3kVF{MR?#\1ҽ}:ӧT@ޘ?)GNr+OGGXňY H.@f#۟'j =]aw/"3*3NϨt_ʞ"r0*|7Qys:6Н'ඔbX1`WcJO)~xRyݰ˃-dc8LއU6/N=9&h̆bf ySU#­ Gdx }S?mB*&A@ C-1'b`5嗁uUk?\ICk),d:\Ҿ[º5ةI3,ϐ`Hg3HĽryz|UamBz+A ʹ FW6&+Z⍵ķ_&G '%Uz*خKǗW:=Οg$B$QAe#%[}^'!) ˶ܜrkOtVPDI?h+ VMG̹QGڟD5(WwWO ]%e~9 ?Ƥ"Qxڊ gv^&D@H_R{V$*%]sdt0NҦoa&4 2ģMf[52ؼ{սs5)7;e$Jtk׭g TF'J$#78t/ۼSOQ)um2,d [IoH!6WKRH k˧M@Hd턈h+ Օ%i 1ah=xX]Džm>Nַ1b7ZoY%\*fT3:ߎk-e`k[9' &8'Qֻv]3PWiZˉb.DwGz2)wB Z_YAHcdt\sKDX۶[05(AIzkpBvAF 烑ڹԭu2"ʎۧj$kP ǫd'd 1xwPQd ޣG4N2HAk#SykKs̹/O qڙXi7F͑PGm-o%eo;;$CW=y ۛ"2i顺$Ecg;}<Lg/d9c@=?*T+;-Z`Dh rT]_]i[(=r0{Ocvq50cv^o/`ol"t .3m[{$?y)k$ygI5,^uK;g\󆯸<ɦcqQg9㚱tYLcUw)44MJʪB;*r)"9 [|$~˫\+>rj9)T 8(~jJY0 Gu)޶~6A7_m|!ŠWv>Q1 ry>Vhʖk-' \.c6 -c^[$*@+ȼ.?IGmӗtpsꏎt_6SX),iwg8R.JIu{o<$\<ڞ1[۞ָ<Љ#G?# Z-v^o./.Y%V+'*A;|wBDߛi. dbdY<^&8uv&{w'iDN)FC{~s 3\J-ݹ _j;əfԮB =s]Nqi01]+5T̽o{ *2ޫ#)S=)xkﯛ%$z 5Db$a!DPtUr1S(GҮu%i;ij00/C7Ve-]<N{ӳj ڼ3m o!- {5k50U#H 's!]ϯZ ?ǿ.xG[\KQG FOOx t =wMbY-B8CԔ"b`"8D<ixcৃǂ'=ŗ%k<%qߚDJz`MNƻWM+fk^ @ltB6DKpUѲ5SBѴ i6iY k ;Vu$̌@PT[3ĖR;DH$frq~1~zBtDf!l <ڿ`|<$Z_͸O7>3_Ÿz&<,V=G9B~=F}Z˫ HD=syRxE]\-d+oF)Xrh׭|;xSokUօGfS"Aɇw*5HԆ2E/EM͆Aݔ:)f  +EipkWXI/cCݠMSP Y >I~,x?tk ?j*Wjw6exrx7wbAg cL A'!ӯIb@z1;P{[ǀ6xPx41d1]ZNz9nQ$qԂv =Zǽ.CkvpOnKcлi57KҬ[RX#N꤬a,x(&;?O6fu {X"\m+|?;d$Ey|Az{[O!P¥}A<0'SĿmi~(f7+UJqRK˯ٟtrOdIՀSFpAt6s̉&CĺOji-ߺ9ݒv_?f/SDK'o L{6!!Z7&,d߂KD6-d\@oS&ƍXگ|9W=$h T|NI7c-΋Ş8~{9J3O&Ӹt_vRcM}0gۯ֓TtRq03g&8N8NA?)'*2@_wpX_SUqG^jb@3`sMTqcVk g9ɨfl>SG=:8?HGqu g뚯?U{-=gwO"0bPz+v^k:v=ض6/ $+- $^[,i`ԝā9 砯`ZVy6nVG%ihuafz81C"&p,1.(=ڨijnr*l:cj̪eωJr_Ju+I-28ՄRF&ؐtyi(KCX.5ʨr#H>Ƀxf5%nY2~m͆c 譼bG{yN<ޞ=OAԭ-Pm נeKN\ta8|*9x#Ztb[Xi ,Mm@ zΓ|HY#  }Kw3NOَAaEeiE4yְ Σ໥m"v$YDh*4[?Y\,?İq:`PivwmQ=bv &16x"5Ne,ṉ$dv⺠ݏ:+3SR$ E9qt?2˷wnfWJ=zҼSzC6 ]TW4]L6*W:yaumߪh,OR> Ⱦaz܆=۸<{Vk$=t%%Df84kimcvqчq_<]cmWLC#-̃<Ҿ7մ{=n%ġWjkkg-]²ht^kSRZ;%= 8Px|WxU \ib[k#KN\[[\o8\=Anz&mY\үSPh0#8(?!ssڼ⧄΄fNnJAP2% 8"6lu`*G#xN{t  لW9iv^a #$k#n<z5śpy#XhfmcX,1=8\%A?prG>C&N])j2\grMCv/DE[d{tun'B9"^Enek%T1+'y}Yé $Y1^eVo4k{hg*}k-5S1%7d߽rWVM<#0**PCƧYs[Ⱦҧ̓;ZFGn 26AY?:Ʊx&&: -ަc713s;vƵd2[Nٹg?뫸"n0!l{5_Ŀ/x=;QGe_bDcW! uImG)VgU%Jr0[ܞ8ɪr9M̥mjs\N^:.f2eޛp+ۿXHt%;@>E qu<>pe,ypnǣ<Z&2l*AOGv5ͫcޣvߑӌW# ']akdZ- s%Y9W|.Vehr;ZK Uv`Fx<?|/|d`!KyԣDVB7qqW8KlsKoj72%՘xGˆ=V@ 4Яn/[M`ǡQڽ~!O:I<6#Y1A'pm6Qx;;ɡy`IysԦmAi͡ qk0džC0wFp+幆h#s({랷KYĖH煊Jޣ #{={Zlnϭ[ȋ) e?ⷃ?=2N8^3L`Y`duMl;`#ƺ=c|we#"0g3 F'opsR*&ȧy <҆+Y'rO]kcR4[~+|>Y/P#L:aN9^{/(nxMP;Ly%ydc"ȠH84\7T$-@k3y[yiZIxA2Eg }+ M]1ë^۬ vlj 3*RHum_^5|CqelCiaOy (?2Iq,kY<j^/nMwF÷s\i-aFHۭ7 Q@wlxOgA|iۭ*t=ÇyL$e\C/}9:i+cVV%J<}ܴ,x?+U:n)ǿm݀Eyh? |5WM֜DH)m7)6n=k| u?ϊ?{߱wĹ~#|@3^ i i$۾V'zne`<_sxfU^k9UD'k1pUARH#|1# w]qk*xYG$$t-)τ x6ψYO׮䵵Un+G8ʰ-c3mK?k+v.ejf; , h=|00[u8ks4)$+ 䑜H\kFO`${ @ʣ͂{ P. y^v{X3dO{ߋ? ~"xUկ7D.]Rq NW܁!A'?>~̱᷊>=%V'c  ?w3 p#0>lħHil_5]UbI5/Aڇ~pI|J|cP 3m`3`+X($į¯]YXXIeym[i{גAn#+lr%?ǎMΣ|<[\ݭh!~i#f8F(īK? eSw\tohۣyvP| ߲&7< :XGa2i[nN7pH)?ك<-jMZ[P؆јrT~+ ·5vV0}>bx\~u~+Z7<]GI${+vpxYu@0XxKfm$w4E4G]20T 8C9h?okXt:ai?cRӾxMŭK(xP%ڏGTL H(d$w}:π<-f{RQJ@@f=[CZ>7^i*u˱~)wԞ?~AI?oO=;L5vrd>]&$m(k x`u9,xfPVZMfwHMm'KNIlomo"IT# / ^xRZ,Cs4+c ;NHAOoI~W>jrMt.mtCh{]pVx[~b5{=377\ M6[h$$6vхؠgjP;kӾl@#Fr8'j~/}ĥ!z1Ep:W՟ .;iXanyr3)"n|`|L3OX_H*B9,PuB9ngFŏxDK=kq,у$I~$l~@pW ;62\>]gWhK e[*r Mïo<S6|˩OpY8 [ܦ⿲~ ieNR6䢞ʾ`ӛq=i1TJW!?RO:~oQŅΙ{N˿fX)9*@l{m/$5;J0u[`wۗF6Y}jN|T:0 ~i:]iUVvJ{Rr3W.c[DƴtxycvyՆ~SWiwPr"iR"d*r=Mk/Oğ #6\kڭzXKgrI6X,'׼Oi/⵴pH.}H;wrsֿX8P5EGV$[2Z̳`S?o|-uFiէUJdj3N{Z) GRL/^#W~x^~=L-ʩv䳹ڈ9gfUC V&՝MFw^$Ȫި@ 1vՐ8~ɝJxԥkz ~? ?6.4/˥^*@i IUIF2+еHM CÕpqh  ɸn}=Pp?#A: \dA<׊GҜzp"|v47'ҙMI>_Tb5l{ߞ)I=s@z}sPnܻHt_zUc8jt+L۩֢ `r1lѿϕ>޹溾r O@j =FpB{ :ac-Kkr)`*A 󞣵wC%f{x',}5Œ8_OһxQMF:Zd&$kNvgOjC@a@mFЄN2=+e#ke K-yMqd܌2=n~yW[%c :Exũ7o]n ֳijxI#n|nH {E˩M3-nd(';329{Ww|Aꕸo+I6D7G%2k,_CkXVeTThGf,%c+?6"5T[ ~W]^<3[$ #pXH"z:sW:GFM3""ْANi Y2NO}+kZ~ŘɎ\|n'W ]2dt?z&zh=Gz:3E<# >wS_Yi?hAw,c5hkSmo/@bI.GRg} uXͷ  _Z,:s1'X|JUۚe&H.NHOcּ?tI2nUA9w]; ~z%26 !X$^UeaG9˺.N=;ᯂ_tkS\VdcPWg;\_L9) +KgW!ҹը^XB( ==3Z=W)XRry5 \c j:˻u8Ep^1wy!o7$G9cr*Y."Zr:Xo5!Hnc5^4>RCymeБ,q_jF>2spvqxEg 51v+OKcSnE.{{- ƺ.hJ !fdWY,q '_~%duQ.̅QW04q/~;%0lEVZmIGsm11Om\vpCX/w&W tFG+)OӤ8ۼ$ H>SlU&M`^6yhw-p2 ʞ֪\j nxft\a7c:ĩY\G@4ԞXLqFYTĎz".U8b]9hشno-Uٟ4|=1<([准b .ɶO,*\n9?kEѼ9mk\NjFOLFz[{GwdC'}cФc۸ čwJ$bĆPd8ЕٱCkU}jZF=BK;q61(=bmX>`QN>.>fc+-*MpiKyĮ/ֺ)+~#CΫZmdqv*o63 øj5/[au#m"Vbxp]1ڵ5Zj]km^2 Kct+?b}A[Vm+ču; :]10*@KlV8)G~ݢV3Ke+Oj͈H|p[lI-Al,GQIŤ1R-~`H\)sSZ#jO!6aչ t;[$}@tȮnIq4PEp]z&u^B6窓Z~+5iCkVo y119Wm^^j\Z .ze 3չxeo/o,%rv>xgwsWKfP ,D:"cu 5[3YQ&6޽]o x>ָ=lyvd,. 2 ` X'# XoּkXbLW~V7|o ÿ}=ٻ߬,~GWFB)lE/LokBȊ1o7ViKm4 V(m%#8>xW|!+0g)pH+̅k_M[5e!Gqvh_Kᦣ+hnep')䫩*Hkƿ&Oce(&iq 7tLrF ~x7~mtxIAV叹 Dҵ ^Z3Z$V܂y7-ͅ;lCOBimT@/YF{ɯχ_->Nlʣ ?*kID.m<-of,tY-4E3,Y$|nvPxUTx#E; Ck_2!`"q 4 ~_~#ڭfI fg5/~//ğrx|wi4R<9Q&Tឃo-$e=sPK'z4lU`pW~|Lx+M Ob\Aw2+VE',4rCŏo컩ri +HIRU+^;[KNZ;8LJdpUCu$k~(~߳ݿï&mFK!#ڒ h݁đ`=H=w1 w=Bs` PT&l?.i׷Ql'kk+NY&36s6kPik4rCB tyj?t$:|\#rW]7-Zϋ4t[]6iʱѐ7I6USI;n}TW?Q^?-߅:oM3[Zt^}TG#{W3Y Jdmi-ψR{:Hcg71̛;?(Wskoڼ,S[RB@XaPmQKq%bZs=&}0\XLYM3s%19<<=&-t] w8sVrm7GnYaU@OR?~jֿ|Yf$=H\jAlBH #p$Wlޡ%Ғ2ď"ßcivo,vnc)-wÂUHIv[u_Z"[tvS@=9s_u'zcO>nʿb:PNUB gmz} LW|Mj6`8m=5 c h^I>ּ7?_j'F,[7fOvHBb=ǁ4 F=;NXOryxK U&d6F2 I+<ͦ=aquc} 6%_`$RL_s*I.6^I¯vuo>K 0[gHW\GşmK%tMϛ:E u#9 }QwziSOG=v:lF+nS#IѨ'`:9_At#mPDfJ×HS5g2doQT+"m,d8ydt ,Y8oƏm⏁ڷ.Β M6[[4[ "r0+Mxt~5%ԮlIŽ[U&BWy+jy?-xokR$^LZu$s#8Q@:xևxkVN5f6@VRJN ?| 5XKO-_}#%KˬC҅d>iu|.E؝]/Oˁ8W?3ᇁ]Xhvq4p(i /H].?Eм)g /89ަ,Znox'VHRzjXq?~#؟%ܛ}Fh;ڟhO~>%4˛_iVQ0\P8_Nq= V>.~7L|IM휌[J + G{?h'06|Lwk#ymYb{~_j^(XieMr$L4ď1ppUy$tԟ[<nBB^&m (v+6gJRixA>͹Ǒ_?>!~ x_Ş)Sn۳ϒ0\\F'5c wP6,1s;q\L.ў:p)sT`уҌw?F)q2Lʙw`b?_~d-9zVAdX8Qg O#+Qb}[E2 ܰ"axּq}%Vc73_Unw5>%͞\١E;{P~ >H䎸ZM\0:\XxwMyݭQ4r !c,@f9Ž95ڀқT5̲1V-;#Da{c$d梺;t^pho$ *7ɸ ~i]@'  -)P6<dcr8z>oHԧ^D,謑O\UtO. ^GC;tVn4j[e#XڱL yL{/-FdΝF0^Fu u`S>PN}k,^҉ .cgϾ rTLMt85QHWC 2$GS]Ω5V|ZSx`B:5$B_OGE:pd&r3v{CKfjVSZ#Hӵ;P&FlMnw:{G?Js3]N?JiZEFeOWt*ĻF0ֵkw$qNaU?BkJ;R.U#;<ϕY=8?ZcD< H km% >R)H;?jiU0Re1 ZcuҒN$F`Wop`Ĕ9v 1ר}Om xq^A:GUsҴ/4Ž ClZVCmfnvc<=ּQ2342{p[y$js.6جQ#F+JP6<=%iCnf6/e4tn[G.;zT"؍& V32G$xI#ka\ }G!_x=Kd]]%I;@QTZi`:\}+q(G3o#U :֥{m ggɮB+U%kK +fL],vXhF!Tjj,tۋ>2bEg=A$=Nx~C OZmw B`EzO;\E=+ FV~{k֋6 EnaBz1 #߭zo@It^g7y?180@yW]8+d_ so+ >^"WR1$Y"v:lI5v Gd==2jI y,YKh]pq[fIZ n=pi]"Lqjn `Zx@o w{Di,Y9uƲg'E;Fq?ޝ(g.x#Ӷ89?0FaU?n߂~?6Oocqin΍;,D=WEĎ |}?EimTMkA8VU8euOR49,"hʱ+r2hl?| _I`uV˛qvjoUԆFrB1ſwo Raqp(bSMd=N+k9FRE2 ES4}#MXçii{t*_ 韷p W̛N\c/ xG> խ6nZ$\uʷi0ap[v?*7vZHNVot ɵ v:1$QX_k7mkXWy}cK s>8ŸjO3ip-Ưq%R,'8٢mN~z:,_s3h}!yױ]DŽlƣmbKu$"Vgu'7| i1:ψ Gf_}a<45/ >#xo54tDloeqp^2U9Z@{y/<#; ^v#[\&{0'7VڟeK%fIY[`Q_|7Z>뚕Ο}{kإ[6R6'`IQm= W~JEDfj3kDd̫nQX? мG^7]]#A#@c `Hcn#l.YWo+0N9I/TҺ:WL|콺K![1#{:hUEGƌVFO.<3Y9$5!<,d.{5l$̊qVIT#WC6-XjB;k^~6x{rVif ˸\Y\ N2nJ~ [|=I掚ϋ!4_$Wv܍[?it8h߳;[ᾶڍ-.t;f)$tV2[h>8W^(嵭廘3ܫBHh$uG82)d`櫡inw:v)X&d`2y q⿢w -:ᥒƒkmyo$ELl iZ"?(}ㅄ.U×)"C#Ze|1?g]B=Yim`l>n˙c}:d.w. v=U>!j:'*V`CNyO5+mXWgxcoEE|<-4kgksilm/bwd88`@ 5UsZ4Rr'Y32Soᨼ} eY 0g%{rk~Ҿ+|;)4{ @E̋˳" gN2%mvlm~3{%Z;{kL'xĺx_4&?G<=kP`?i7h>1оϷ|ւD qA'(Cx:)\:ı ?&2QV>|ipx3Y]`+fYJRyq$I?7R~Zm82] @Ƕv? pzb$(Z|44Ufm8 q5j >1xkzTKqln#x7 kuJc___xwh*b1i6B2 |Q7M:orMЭ.i\窈.ppJJf.pzks+ 3pJm]Xڏᦫ>v}b'lۼ܁r~9C?tSñXM\ܭĢO1;Ghp5ԎUճy1c^hU,RෆuׂHjU$u{G/ l<0+f0|?|W7zx8׎3Oj\4Fy>`<*_3֑R[׭Gɬ }@|FO~OoʤOsU;RN9=Dz~3󦎛At.IbHq5Tϯ9 lojNB`8'8릹]SiFׂ2p0(G8YEu^r}*R{wR)܃ZbHBr\q ]֍若\^^x,^2x xCPKa_&#RaY@lwj'fzݧn-|?]c2s׸vg]/tV6(3+\OaAK:+tV}ŽKel~jq6בa3Զprdh1z OSL[PtxGl]i%ՓCD1Iu B$&p<%s[Igm ѡՙˆR0 vjCW9Ҵѝ#egP~hT(c cQXE{6<I3;@oSl<_hzwly~k--6W \v<םY7{CG9b2ڬc$Oa@kx^-[͞+yYpy< qk6MVS&2xSU,N[ZiJN?08^֞Xb&7 oi6ǡZ K'0Zܙdk ȌN;0`3F;VPXmV䨌]kqSm6$R=i)bBXNyD06~}Ȥ쥹*\.yOa⼊M,tcnū6mC1J,C&'`+[PƯ XĈLp9=k_fѼqgԖs۔}mtqtޱIᱞHb̹U^9Ϩ\O}mn۬2\JӖ*{gZj[V+{ore<1ӧ 3u]X5q=YCGń<Zi6R~XӮg{$Yb03خgP)}nB,H'v_OzۗCS7,5kM&ЮuOKd LG-٥m,!o,lg ͯ|7imӭzm4sG<[<"s9/~"x{P"#7I8nD,=}뗿J&yaa7J|ǒ9ctEb#x:kVR_jS]ElZx  g\K&YC3޴|]?Pn|)~l^ٖ4f@ŗnW\g2O|K 􉭵k;7SG{iTZNIxnC1$pkgocX,Hi˃W"v:6o>ժrC,*>ջt/UKzSpȽ*W9 W'̆];u} ( \ϊ(c_H~nm;[~Tp~ >$כ?*-.s\'s:BQuoHDz& ~<.]cLZ[jv0鍣di{*}ծ%rU8nGҐoCR 8bzOV"f>lM`m{j,&h"0$g#5cg<tex=2G<۽1&#s0yv2797׾6oLg4 wׯȶNG8T>/xKwwo!";Y?(&C'BkkGUҎ!Kw Z zX\J=<Kޙli7T\OoCP}95WTӧt5 4jXeӤ(%(20JùH_/麊}kg/ ^6|UKENNB+<3:i0^Y=#5; g«uFЫ9q_~+U߅Ded: R1d欀~uۀ<}=7x|ܠfm¹kh]lA۝U2;⾌M/ZCᯈJHTmMGA c=M| &Ӿ|5-BXd]mxYUUukٿao ]:OY׼eo$e2lНk d9n9l+i{OpៀY!Qdk}:. *;eIWxuF}I!KpNg<$gW?__)/ҩH x`M~]j\Y:ƙڋ-7kS0F&g@<栉-],uoxWdT3|eVу&Aq'J:V. |~{0}3P9K ~1,MٲIi4?#ۺ 4l6pG k;h|ՖfeF/@Ò;u&M;ZV[&mL]<+p+/ۗ?x=QƉhF5 YcOn~d~ ~-0Ӫx3vZDWw0" 3$Fv*{+/|<[g'/um3Nm6wtnZHıIbU'x)S{g4O A .S5f!/}t~qMҾ 0K}u*@D2/Τg#ҿ/eS_o$ bR?坬1=r{:g!iw_N]-Fu]2|ivW>Phg{ `45r, %Pwg '~'N ijYR ^X>x?_}_Q2w!#>w/Ip3_k[ 1F DAUN֋Wn]ůX PtV@cV2FR$_w7I/s7m}x (EW-)JI J-D=x#47$bpAJ>|\/I~%cOĺ5嵽ѷ\ؘ &(wLy^3_ާO t4*2>:jz.})5x~okŤleOOҾ~Z;;c9%{g"ܠ- erUҰ&e itDΏ[;כi^7ݏ,v hTȅ53#@t 1b-q^iᰁHɦ1?B`s֣c#hǓҚ ݂}y'pGj*iqG)HdcS1֜qא;Rm@~"rΙϦ8w(89f$81U?Ov=zT{qPz('9N0 GLұ` *2A#t V`#r 7Pp3{TGy=i=W|Xq8u1> 3T~Gqԓӎ`).9re# ^JqH]q ʓ߁zS1^=PgקSLwB,,^u'&_Dخmhb9<Ǎ5˗![Od Re"9b&#uee>`K 22^ǭxFl${ǿ~\o OY->oS1$HJPyFcJRY_u bO̦Q${_)dILH^V2m'c]xAd(ftuI#xH?+͕e۷*:"8avX\^D;\ -͗='sv51:GBi3SZM&+0춰D@C8\B +tF}vy>abaQ׎kٛJX%YM"e#p:VeQT[M>! $vY^mhj{j+?ci4W:ɋ}EoWj^g#$y[1רk5doJNz=}K[B ɑ̹X#ѾZIg{x(D$Sbsrr0jVxSNMloRTDBQ6m:zbN O-)?w1^̗zd\W&ՒJg `sx溩4yғL _fZXrYX.1<֤Z|;L`E\"`gdwm{~(-Cut. ֐+%789Zx/5gdԯ8dmFA*ѓ#"$Dܞ_)*i{ׇ,W"5 vWkTHTs#0é{~3OCFY3`svCں[-in|Efbwln$_uHQ,u;Gm,@  m'G&v#MU|m6?e$g1ē8 c'^ͩ^rpI#zbUs +_:8aDkJ2Ҭ,`mb+5hڵU̲U U|x_pbjou%r,#~eU\B)B폐>Z\ZG R /('pɭZ(ӢCwgM[_EQv咠^9~[oe,o,cxg3Ě\8t[اy?pnjudz^[@y۩T 6[z)Ҳ< N" ]hMJٲ kv;G5 Y Y//5G;.b)≤BуFVu:0maq.Wx`en^WUUFE4<^0 FvEx|̂Se:gZ֦Hf/}Otcc."G'bioĺX0F. S 8!%y-ׇgu'a牢̫iqst'xq"(%\p@a /^e4\~R xwbyx Ie哝ǐ+/B -'w獆p$2Hľ[b9n~w$lҭ$o9<82ⱨrR SËFؔo0,K#CuFk<h$Y)BQ*;rA^ \Y[2.űS2@P׶+-RژVa T6|67ACP@lqRYUY2IZk8 Ed<W_:^z{ ?좓_3܀p+_qgSӯq|cֺpK ?SFdy N)tH {Vu븜 wtu uKMmaqx#f{rG}5($-~Uw %ƙ;ߨAϵwڽ>MƠ^D<+ټ?UZ&ag#+upOq c#$PQWcu,6%ϚO _f xN|;{m>a<3D.2 \R?Acݣ=}8^}WB֚\ZI v{GG5wV{XnU쫟, #`^oq]B C۶/mo]wo]|>oX} MEnBW>ٯ= l|A]E6aW]X敪V7<+$R0ҽ81JY{|>1$Ei{{%*|'W P6X<{j0BZ;v[L1nRMx3ÿd KZ  fcc̯"7u$W_ş3/l%L^X`9a͌D$cOڟO?_v=Ow8ӵK(yZ&IeX m 8损=>=E}PIm~reWWP6m( 0mugG]M7KoRqޥ5-O~ mKZQܞ`Y+UA#Jό߱bxŷ?~|1LWs[av -qm4X RyPO;9MUy Lcq- bI皇>ZqI4i<WLdfQrq}*@lI@ #Q{oMdWLmwb瀸-5#'߄/co 0iWm-2M4HB %K(,8QCe(3зgkp/bӢ񝽴n=݁wP<׫xO߆6N 鲏vrǢB!>ߍRz\o g=ʌ_>#>"]׀o֔Mqx'\1c|7]Cgƍ-V #̣Tp9r*[3~Swwk]b 6Y we3]8+q`9^hMsJ'JH$*UXG9õ59qHv{zW|e|\*ՀCsT|{^y:LGM[Kiϔ\ˎ?#.w_|T>#Bk{DKぴ $ڨNr ۆT c23~/h 'BcQrO$M_4xZu? xgbd|qm% ezdr?JK!G_+Kj*l ?!UFNW]F~~' ׋<+d-uqk;oh@z~3|Hm;"]^ZpD%\+n\ @_??h/p :KcxR9_j7&`\UMMvF0Ce3}Aˣ -xS׼8K\ < M%k+Rc~,R蟴~z+yc qVyU#i{ڜm-լ59j Nj'~Pۇ4@zOj"pz}(})i<ރϥ.@9?ҞnGJh :nTy}h%OZbd\Խ[,aAS48=@:.3SA1R(ڀ9-I! ^99>"cYqb 򠜴%>S޺ __^a$ FE`\Uךe73[?4nId2n j>gQ qiibɕI%vo\e:\5h^%ҳ+6s$־XƗi5 C,ɱԪϭ}Ai="t/LӖI<:]dž:JW:54MI5 7K#G 㓚 <=uD+GC0\#{p"[|-^`iVԅp9⽮LԴ-Q-:H #JϜ=GTx3Mu2$pY!faީ隊^Ϡakā o9Xq*o[Oge>g'%1#c;g~Ğ-|=ʺ{j, hjUT kP=zUV$<Jfњu<=9'aSM|]&ӣ{i$HS%%s]w:|cCO2䩋ʙ\H PS* m3_%aKب9n=+}]ZLڥֽ. I%ل@KcuC *uG JUի-NIZDndk7$sԯW_o`us&F'? OSS~(/^O;Mԣ-m]NPqn6O=3ROgPSG펱`YbVAqڷZDjP:ȸ2 2>?i!ӯ&g"+l%tkD8]>=iMSFȸ0@ᕿNMIbe{1 ) 6۾U0#[HbŗkJ D4^Tqp15R6ϫ:ť?iܱH9A1'kX밦WghZeƣ8&impV,n8dXnn˪<7nB"Y øT׼3]m$/!#Aq֮_xZ^ۈ-dx m@8d0ɏvu&p1oxB$ G%W8tpGg{qxn3ż3'9_ F&ms\ %°e2(#Mow\,6 qInvI8wnFpCUkDyڎ{MbEY98ݸ0J]ƥm z̖3L-hgMH#!vo#ny5xc=:ffHw@@<j {w =/"H u18^V=oO%d[4Tf38+XfM.p-n0 $H?wa ?6ܖ[k)[0>ha^F3x'|@kWZڅ՝Fv+%rȣ|gxz += !q2o oW X> RTF6g]bV|6VLZ{MKV!#[MsVIuH}"l= dwPOycpVO$TleZ(6˜;z~ץq$5m/LxI c+Nߔq^k^jP\ڑh 3F$u1|$.$I[, e2B (Wo&5=2jjw/Ffӥ.Ǿ3q[<=x1ĚVШdQV67SsaOhK_۸nn?!ZL+d)^F>l?[k/{td񕐆%%[[VDǖ$Ǖ&zivbb[ZRQUݺF>_1#nzVKxB+ۉ[5H>v\!%s") N1ާ>l>6f;`118+3bOcYX]X1(P\C? m;duyU$ќ7|]ZV_<9pϋ[Ak+•7@FϨĊ=jلVbຆ51^,74X~kVzv/ɷ$\ۆ`,߸(ƾsš|sqHbIaFe%IH, )8$ ;wsWIvᏈyfd8(ֲ>$w,'rFFy1?Z[j\s[E, BV 7QNc꺭M5'M: k`a ! 0烚ە>wK;+4w)$q1A`⋜"UiFarY 2:#5kzא;"3´qm='~oW7qۍsn$&@WkO& ;=Vc.=T3"bPBC׭E}OX\KjF#8%NHWњV6z2]됲sчҾv5-u%խ QA& 3د]'?hDžuR"o3/{` JS^6}Ϸ`g4x) 2JX$^ K|Ё[ayRZ2|ɂscxIoCWĂ00 )T3E=d]Xد2*?u'^<*^@TnڴIyGPx.O}Q*V{~OY DBq;Umrwj!JqyS6xgjHld}!8=q-I#@GlUDy iC4T(nMnʄeb =k$Q}zZij>$Es4k1 01rH#2(4+I3Yk5}>G*?T߬s U*|\HB1]w4_^[E-%xix jZu夡q\c* }s^l޺CMTy=BӶ+HemČFP2p?5\FAݽ#qs]$ԭoI#wΧ][GYFPpҴr.q:_‘6mmHфa+G<aҺGN3X Ag?63z֝ zyA P6~UӹQgZHYdXaQu?k̝FަViֵgpwte=C },m¾]%w ,4ߴ%NK{q Jyp/h6DΧlfbOh ڣッ]8$=@01N#րȠ risAޓ.:zM?zw3ڢ hz{:CӚ-NhRGI1w4џxÚ߄la-eS S*1Pc88V߈psߋo ]Z[v#3;_ljgzoō'f_.{tQp] 4ܴ?;|e>~]5/_ȶ\L8AVruVS3_26<_)*oxGJk4:m7HA8ϧ\tz.mSX i;o읥DK--mgg+HTw?og֚N: xn?xAsM`@F+/O ~.NmGvJ]۴swj"tlm I;fP?gK3}sCH.X&=yhTphct(Q'c~>/쏠|eokiixg6́)NW?6:W_9|{oXNsPW{/wwiX:Ź ÐDDxO*(bPUP8Q̒v}?> kz^0wq GC=XD؛Ez2yHg+ៈ<1jhh*~SYYpUU +w Y'1K{ǽLϵJ0y*#׀OqjNzǭ86Ol$dS}N >RHsL*s"d@^ P-> xS!cV IT;Wqk;Lӹ߽7`=”0VCR`Qq@Ü}i1) 039FBGjwqdgԄO@(#1_vRWp`J鴃>INTw9=9WYL1`sަn'1h^4Qx<;6%Tt s^1HG{V;##9ҪrE9=iGRpsuӔ8n:uӌyA׭99ѡbU "$d>l+}b]K{}O@}dP{'ۧ -8=zcB F vk+qOn٣TÎ@l}M0Hn۪ʊ ijkOG]{:h¾㸞XңlFm@(=7~=/R֠L,r勲mAƝ$k oZqD"|n #80 A}oWo0A=+)ޕGs}FoHg&dDrZzc+KJ!4xܴ@ɖ :麗_P%-ET29HCqYI*+e6)XѮ]T7P0~V83ʎO< V5=I=9%r"/.,ep9týKPkm*gǙ5ԋmm@xk1e5 NiaE/Nʨ\JR>.)uhhcaAsọb qrFr^CA𼚲ķ2^5CXLH!%?3 gnԏ|'$DlF2mE$nѴM-P&t|Je 2@13bx]>SC<.BrrGW)*L݄1-Ya%r0Q&Q5RũQƑ4 d;B1s\wkf1G^Zέ0NzsB-oM4Hm D~V^>\W|!帺 =a`>UHyUXh~-Yx4bis 4-%~^A#= M;EKIPUvh #4dF8.xO[6G]<$i.> |ˆ]OjgVhScsR+[̃d^C U$W5GUEk%kK)2N~R8h} wh5UZ|[d$|ʆ񿄮y{Bm5pCmYm&HAsRjk}oM2x'veIyh 9 hi:6S:s喆Sl Üw5>GGB$T$>wc!AȮFּ;o\!mZG6Ѣ8SP 3Uʫ͕- Sfx=͵J2r#;;Nil.ܲFmYTldgqϱ4FCQ:q%huXoE Ejk x#PyΉ10(F̆VJcr85Fo?H|?- ] yL͍ґʧwdU%kOWu=Y濤E=%Z+cmWbH䝬2 `~OGYt)x&,7('GY2BA֗RI)lyjH?ݸdq i4 >hOrK!fOhӒgɹ;Bul($Wßs+_C\Uco<[I"aAwZݏrA ,BkFNU8@?րxpM`0?u㤱 Y&J^c=O^b:B[/_ko=FV17%zG??\qs/Xej۱ϓ'~{ߊ۽"m:6MaG=yK^"lXHLˠHi`eAD*Z1=g; ".Lp!ZR* }Ԏx0 :LPOU<Dl¨煛}?"'sT7qzǐ4>SҀsҔ.O';w Bץڞ@ \zӊ)$<g=Jǯ?))R0*20*Fm4^c_ ?otO ? lY--샍֬aw 7y_ >;ǖ"̶Ws7,L"1U%P)v4~5j+4h\︿0-^Y7?|%f {'&l~_ e߄ c4ֵx 1]]Ec5S\s%=,u?&~ XmY5OzhB6sYGfY+0A gmwSRܸowof۴6Ҡ,zTwIi3jZŧ#wZj$wqQVH J9zW¯~=isxq3+72[}Ȋw*+u*}#NFnŃxGԼIeK9]E-b|yI޿@eٖ?(sFV(r,c~ : +T=j9cV@n ,ÓK=>2qb"&$)wLw7yR('p%kۗZF# fnrzR0Aќr9zKO@ }CRQ‘P  ,i>\LF88NiHqfANA>6֘&8ڀ~Ձu.z4F)z_oM9ϠЃM\uN'v'=ji!ǧ4rsy7 j4&$º^\ Dz# ,I(zJ?_ֹH߭1O'8C_jnh^ KY󟔎{Ca9 T<_L;yW'B@> w;A 8'קXe4?1-;k+|##~٧Ziu'p3Օ]`ST^P=GXsǷj׽!qj%y@ n E1X#,qT+NAsMteń ֒cG$s+VI?rr2#VbîhBu =t^FNI=T\p18ºWê#6"?lF,V<xޤIW%B\kZ%, EgFX8- zHB[麦>4{{iI 3Q' {e| sza 8f encc'܁3RQgaZ0ELeO,Ȱ.@.e³5oRUЦUl HG@Oaj6a[XK0 eYn6p03ߥbj:eF:[zzƬN,p-a{y 2Ux@d12oاx7IH.LdDb9+a0zVZYZbK[+H VF:,ǥXh}Q|ٮV7F;z p;#]roAԺ|dp;-? @>FQj1L#2^N$ofֶQd:Ѡ3!2ノiAo-仞cY"B7n>(NvdykR6:TKs!Wݗ,|w% ;:SK},tHa2KvF3ft?gKxgDnl)#<+u}"\j:Vb,~d18=H]{4Z>"V+koVwf|qCo-wX|LPiW7 "BtH=@li^]L꺮y01  yc^- BD1I PN8C]W@W'}"EȕM 1;΢mP$OlK,uʏD F ci̴+ќf^/cCW-B ')߅b>Ʒq0|Qي0 FEEi}\[l\3ҭڨIYd9x[}wι?0i'eID*".AWLy-PCIӮYFo,k-)ᐣ*ݹDZkɃi"$(t H1#g`o+ppn9Ac:-?I>*Ck>է\-^&epX>]ßA_zr퐱$č#m#$88?>uozkg70 lH@oĺt2[xIm!KD>7kItQѵ; {gq,RU`y?sw"HngՒKojrI@z~V9 w #a]vM#]3$.#,uT-R)peVQ\; Β@7,bCդS׀A:|Q=<@_gYj$eGI!dNFX`l2M:}~z!k^H$ j&麞;~fQ-(&2L+)Q:\'3ɂ:f\&/|W5[tP,/ YjB0d =2@S45XmkktOn"@Ҥ}sYQɨ{%Ě%C#5nD+yB8bQ[~Ci(*w%²0>|uDCxǣ tQ]cB?mà ܡXpC5RvW;0g$y%m6N@]C#[y\qfK`}Զ6;w;aC":'\eDi:=qjsȸfQc+nF1{^|Vo;bcn/Χ<:i (f O/J4%_C0:.Fn2?1^mO>R|?q Ěї&JAyP>=ksCpsqpr^\?(ir<ۮG{̇qF]4j#%WܴpdhRd9DDʖh|`1Bs`w8'9spO8Q@FXIIj#s !z}k&5ğۚ\ 1~ H=M};~T5{iW:o`J2(MIXޅgs_W-Ixftt Wqu[_AץxKcuucamk`EohV^[ +쯖(t˭)yfvgQ2t7R?4ьzPd gvhZo~:TF94Oa@ &2Gl~ӝM8g=hGN=sLldJNH {ӱۃNigaɥܧ.GOvhMƔ#ޝ0si?fB@wJo#9`p{Cg1@)ZWz68rq5:s\΢LzceWcJfH9 szS7)4IZ4N~gǯQ9@`2CQiSp=:Rf ͕\ZaI8V1ӌ`z|¤0'9 W\bakm 14rv=tҏ*qTp]Mej$b;qy+:p~Y`[{ў9T6 ͝^{WBv<צyVvoWS[ʌpwZ!ȰGn;FLckYۛ諐%a䓏Jş1hCן[Q{"D= $v.B:ec6ߢ'~wܴhVw=1}}krQ5{umn鮮n_tI3Op+>Xdܟl{{ .S*gҟ<(bb@(?9u.;4y~y᰽_vo*@:R9 oYU2GҾo3vϬl裯Agx63iZoD,uk&$J%d!cVl =kmlAW<r~Ce2 X܉/" QCFN=Wik^x+=hX9Ad cH;{26A<-A66w ƓpA;%N+,t}7_V`1}$I˓ h‘/ ʾD7ڝ隳<֋{kF&a$RC{}{Dhn#yTc23ZNrۅI(SIXUK&3$yniQ OX{1޸/IՆ}OJ[̴ 8pNEze_N@5; ξYL0[wp`Wp:pu;fӼY1!'Zp)4qFV3IcLXr&qt^>!Mq_y .wN<>4ZR|wb7)sAܧ'+`I'n<*4h-doRAI$&%{- $}x]ʌ~iݔ:]n^ ZUh$ÞN'ߊ ]gHi^-CRӱ+SiU,]G εѾxpyQ>>q 1r?T0=[EjrZ2X鷖}XR8ko3|{H+7p =$ )W ۸ kBh[x mx=z5ns`oCQ#2vmU@{ViR& ^+Y"}?8gڪAǎq2!g(z/=*?դ}tudfe 8WhӺ>A/B78>~MJUec;nZ !۹c?_F{yzz ?adکٲx?n/(?\`sjtH:VCM=ÒvԜVꀧ;HyVX ;⬡"wp=)6郞ml\1SzU1<ژWH>csҡ0'5^7hǮ;TɌqSjA:S>ԁ{uҀ2t~ sϥzֳw9G*AGOH`{dޫ' 6v829?^}39V<6 =cJceN$g^7 ;T8ϥaT;8AcXBZ@0w7Cl%3g֑ͷZW?_F[Ь-}8 q&sc*R>ď |2Xs=`Cm#HG-bht5@PTF}dq=knIdd]3I!'Ĝ~4ǧ~rXI ׷Go8U>y_]Iwt$6{N=9ڶ!Y8xW?έ#@Ͽ"zquؙ F,91ziKr8!!8r0r}*UV,J(AUX֨t?隌#!g_.. W덃k rzz+wwi3sR׃5+|r5N3Gߠ^,ZMvr*8~kű .AQ׏ֺ)L8B%H?5қg-um:Ğ֧j. 7LYXsR\ ºWZ<-h,&)*iyeG9 0r+`ˣcr GB=; / ks80?o[q_VHGq^ՙb!iEҀozs#WRjziZ< V%)&߈b¶WjF.Yi@/o;^H9789|\y"m_ ipMw>ցb1v+N; Ux叉;>ҧ];BŴ3L7凔5Ω'5inV<W+18Y[+Cǖw!t$K!wjpB֪72>'nbZIfr?92PyovpFk1 )&UJ$uz6yk&kJ34h@wU#{wZgW˖[bdhOI\8w2%^&rkm.!`||$DsohVz QڭˆWQՁ]!q"oZkr.U}ޚZ246⡸Fp׆/JV<%!M!8ў#ix\+rX9V*e;:ѕeee-N.#8d Fiוt?2duLiמ5>mqܞ` fxŏxJX"݉[uV}A&򜎙*-`Լ>mugm )}4 !mB6sBױ)%͹۸"m*;xnF >1`b5Ci3Jւ"N9UĨ01H^ڕ B=9J83ǧu4{2~njHcǶpsm:ڟ#dl4W$ gn~7@XzdW')|)xŠq5ZH Euz8"́ϓ\ dd1DBj8R3t^:ե93F@ր#8=:GJx zR:n ԛ6`M;Sw*3J1*%1ص&|!c+WKv9$8(^F{J>M^|@x ^s6`us\7GE -y/֓gڃ^ޜ"dqN^:` a'gAN'=)nLc SzMjy8RhiڏsMv}r=:R_@iN7\8㧽4=N3w0Sۑƌ?7c?֤u1F3ڟ׵ LRc1 R@483'SBUhu G#IxW Oo_ m*}М5owki~ОguFf[)uHG9g M#EmOGpAּors-fE^-c﹃7hdћ 9863J1 R2dzG52L@2O 79zM ׼S_·, ӡ8P|:^5P4~ʏd= B>r |gq_jWr޹G<\ YW(ڨSq g^< Yje]5Kkĺο=wm8 EkcuI# T.IYL\:~褒2hӳh/%n[ s]^@~ ;)'͍n$R+dϯT,)VѻT318G|~G1ӎz{4r.*Im='d[/ R@[ \OF }3 @ns?ZoAN2Oeoz`/[88'?g?O-f9b2=M|L'}'̮GwZ.Q0p0wwB\Z <|DM|'iX$C<)<%OS= !EnOttqrtvf;^n{e*Mݪ0K'%Y7*@<`ӵkicVDtR^O8m UOᖵs7˻(Lyyu]۔NVURZEFX Adrz ֛!]a^183ۂ0UsϽZ׭1xđK$ΰ]ŖhTgoq4ZrYXtW& \28h%4oK8deY„vS6nzdm)l`u) _Cymꁠv'lAu_ij2Ii95ZnPXV[ 3W9Gr2:&:^e۫Α+!'?#u{fԡ^Mt6LJ$aؘ )fXwh~ak@sog+@BBRiE5wZuw%]29,)ج4Y-o.5C4%f#[o>MzHO*`_+3C|?||wwY HE%@'ֽHcmKoy R\֢j \UALā{Vn%yv[?j Ф}!Ky;[x|=Y5_5?nrfxX$SԘA.σ";oWY`0-ԌW$30xóMuT5 idYN$`9qEǚFc<3RHR&ԞV gݑ]@v>֏8 uStS VٟTMޖond)#8<huƦ ,KopDȃw,FNx9_^%еmcIk=GXKT3 9HwQkV(TW]yETF/K#k}5O.Y-#08ʒxcOZ%G^f,:p[ݘ| r7@3X =kKvK vFFvLITz֓}&Α$+a ʀzklo4=f;9Cs w8N Njc\u6rW|7R10683],Kis]᭛͌:"s};$mZ^Ԅ7)&窩S^?B[om<[MЉd+?"vΟ+.9ekK XTy>jnY|K1׍>#~55h|*W?UX1R~rO]9c^37LO֡l(cfq&Fyoǚ$2A=3j0CR0'sրpqMN}i6.L9*̽}~0;ݞ2P¥$m*d=yʌ;ie]Ȥ#{SJTYbï5aypg3ty+'ҥ,M A%tJg玴 1/h!%3 w#5c[YXH\t5_=7jIA |,/ьf\mM|6.3Sֆr[7Fw?/R9 w28>S_3Zl[.h*ry,Gz}Am+xf ox"'<0)j%oQ~:e :N0zgXfc';;T{ ǧ|SqGz ozwCNH8F1F /^ >qED ¸o|)G>2yEjGnBLzGj?o'׌t[x׶Gگ9lr?;)1}N/|dĞ+%ijN 4u|v AW`~l nGo4;4/M<*"&3+񟄬}_x#Qe\m L ~_Sg/ql]VxVRDnѸc!XpH>讝C+_?5$ovJٿܸM_w0en٦ՂJ̥v@C`LUgw!U@ORE} tk}吱W& qY3T].NIGx `ÿ>2ju]>OEE7Hv}OCc}>÷Vѯڭh F|˸(ejՏP~_| 𮱣jz{xƊk/ZDDQT l$b/_ umfLȌ%坒=^Gz|f~Ϫi 髾 kCwe1ݣ`s`8C]Yp<*X2ObLaYx+ī:5ݛ3-x ~U;\ "i/Z~ ii7Kq/i 1\7 _þmniu'b~|Ҍord~<~[G?0{e@Cj0cM 9 0I "7 }{SA!*@i\p:mi34o )33M=j0O>_֔ugNRF2@=*,jhO(9-4y~|9\=0 \gT?.S6ҵS?֦ǥT61Ps4s!y$;ݤ9$r;\Vm <nƳdBCǹ[r0N@'_KRkQGnޟs zf2"'?γCa# @lS1gLNxsr}zII0Ϯqȋ v8Fzvt.w0Sǜqӷ:JtN9kR5D Ϩ$g'zhɽL#$p2?5a4B8'w2xQ920#WfNdn==7%p{H?7v:sǥElvGς08{)%WhF8gbcOvuVB2:z=zXd_!F8'ǚL3x{_ mҵ6XnP¿=9cI8Vߎ+O 9N3E~~S]+gi!$9<`|o.})lJ?q.Þ+!Ƒ |?JKʢ܂?)q?C]|Yqӿ>")boa9j6ytY^?90i0s'oҷ$%?J2zD*YJJгDBN59J,/Wˑs Hs?S> Kgk-ķ*n܅_3=$EOxYҎe6c#G#9힕Y^[QSe%f$u^ {KSQv^/|;z|hn#NfG-bo[;Z5hs%" $+ZK/l"˷`\im HYpW$d.z iQ4QSkhggySktuz]J+V>]Fiu[Q-\RtFM2݇+C v%Y[۽6-OL$6h*U?%H52xB&3%Ҽu|Wj#x~r:NHdGCo}i/DZ C1p@?S֛O0YD_h8>gHrC8"-R]J?H/#r*ft;pG `it]"Ap)`&U8yKGCKoc_Jy:rIu/H8%>5KM.fka#opF1JeR1׽tkK єQm擌 #d$ kyl F/A8\Ut=| nHGnePBrp]w|V6tuɸ]W`LOZO#Tutu-䷗O{0I=qX‘ˏ;>ھ0QH>fGvo2z :V;Nli.y֮^28g}֤L(^֎`e(V8x槌F=IT23U,ap9QozGjx*& ;0᳚vxu-aSU9O]i΃h#I@OCihd.~ ~zoG`m[~36rcʿ!m}&o~mZhd7YZ(aEŔ7\[q)KP]uFTzD0/٤uܪOxt8GVY%bkw ׆FUS+_n*bΒ]: a\eT1^A}i#D~Zsr_t[m(.2WJk;5֓V2.u\ÓB  1؟~!|"G?ZƲb7R-8Figpuڑ˘͑cЈ5e|>9 5|A+ xe~s6_5:~m-Ӵ}qoK!/qn$QfQ{-ў{ǚv[TP϶& vn_fׇ}nHu K{NXxƻx1]k:$"Dz= O>/CIr@0~VբFz-k&=’ :q$fV#s2Qce #c@#SUZRS]VG".Y0zgx#Cmolmn@He?, cqNFHxR;:Lw(dP7_b~+|g7xbVX[>y0f& P=A/d]Y'o? goid.5d|H'do|c=7TB͒;!<~L6(0b?c7ڿmHls(vM'Lmh6eaf"iE"{_ <~?x?JFSnBdg8pw#IקZiō#i JojQpsƐ L>#}(}J0;~"pO&oƓ8qϭ/8TcvŒܞ1@\qFԊ=?u./&PVc( M.281{ҶJLgf6<il'k=_jf/Œ$8NqUˁԷ1AC 6qyW#0@U@I'Zn`c={uu!A>jhc9 :'lj:08PHΥ w=ϭic2p#<6950;" T~y)"+y?Ju䌐9=iNwrvy'@ 26Hs1VExKYִB\0dO7̌{~b\OrHTFI#MJ.,څg &/4r-JN>Y2?z*)y`` {jrY&ᗈ ,n4!o" #Sr}=wk6ڮ"C6 %8_`])y{cUX_V0`HN}kX"t^ \aZjo0Vוpa @ڤc=WE/q|N92ѮN=ZY\h Q#qH@##烒F@X 9C۪5Y\鞽8%:M#hcSM.]xA5*ETX&kk#qdzϽZ7qlVyd&Y.\湇Ư[Ey7*1!yH-4ˍ*ŭvXɂJ>Vsgú"" ,?#m qwY?=GOn A'^O(WJ_|,OU IpAy%A5G' _[Kgd$g87Pմ-JA]9U W F +|q^ $6a`@zҫ˦YpFcoRG9wX֌9loQ2Pfݒ )R}@u [{^8'lʮckF0m3D2nUp~~̹BْD.CAY2'ȣ8Ǡ:I $ ;3r#CLP=y^HGw^1BI:G-VD O^08V 0yp3\t [e1Fp]qQ@skxS9XH$1R*J]ą>G 9<֙"љ7YT)6gjȰr03_2|\VE,ptO_FjȖvSI(Ts_x\ľ [ {WJqm#/JIHOþ+_Di~2߉$Q a߼d~#ENJ(D?޹"d&鴠FKc?EXm#s]%Ċ<<湲>a:ؙᔃԛ"%l UOz 9"4r3 YVP2i-{Z0FB[?H7;TGJd 0OjVff$ Td0HQ(-RcvJ( eRJV>jsHTqzTP`g[?&ycS2:1h&k1J>X]j4thGRGOr%_, 2sjn> Rhw~c|DvRBU{GiYFϡ5ەI6>z(ic'SIodJ6~{OmX̿d{xģ Flw RG9rar3uOS^Mq̧ν0.z:*OG]Zl\ʞ:O^(#o=*̀c1r ݪ08r*xt<pr ?x v@#❷@A,> U4o2mƾF~xwdMrbrE6)T|XA ~7žMmE݌C%Fq0~^Ǟ7pmCr6b6ѾGQ HVH5$X}|*?d_2š](_aĠngD=:$g;W/EZ7\x匬̈4/8(8]MziHɫ6Gc^ۮvm.ԁBz1] ڹ]?=x߳Sڗw]M1 ēM#ej;H%Xީ.ݴU5OW#l Kd2[4jQegM!3='LJ WQOKx'I?}k%)6j f Wq8 z+Ng##^ӯ%Ŝr=~\'4>Uc {e ƒ h#+W(xRĽ:|F QPsO7]+2x஧iC}xLMg}H@(~i[7II$P8k=A2%k b _h@9y?@'\ߵ~Ξ0BK KxV 9`$W䇃"jWG 2{hg?Woz{M.c6s-) uDGZ\wie3ɐhsi`'u1֡da$sHK:ecO>3x*_x,smu&Aʒ tgJ զ}ct]>@.2xhx VSX ٴ#Nr})ߡWmX $Q;^s _:|@֣'V+ ̠PH\w5⼷-.tZ^E4HZ'Y+sk/^~ΞvPsOJNkDYu#zf'Q B3;bx_7ccW>(//|u^[[Y]#)Y_aꤏaA)E|.{-f14s( Rqޟ#4qh$%`z1|A<=Ú}Wte7i#ts XCr+:M+C\>!еŤs^ KNpd+$RGr9Ƒš !r@Qk+X|;fm9q*1_տxQEM4b={`sǯN ?>GxX4ia&s9k'𷎼;mjk:E*&8e=)swosEd/   S?DOj3:{SzzS:k4]-l Sx5z ל>c4l~46gTʹk-K[4?^IWPg{?#6E*?9|3SJsOV-Ae؂y"}-s_OJψB8aC7dڂt 3q=^)HڮRxrGBT=1Rvȧx:t6xvL |*[Ȥ938#=YcX8=[F#u>Xլg^֍TX%ܕ֫~Yld޼w&#lO)=? 顕U2N=;VH`=}g*ߛn;Z{0s=2n q O ,LrGAQ13:m^O׮hV rAǦ{/&r'͞9 s:a_.g CpA 9Ic+`#'vx\ج4jÖGn *3GE^Ռ:2O ʬNAȫsJ$ ڿ#g2^D]FUBzWghS#Y62CKyBXnѿ1Q9c@6Ty y0.$cEuZ5TXpF'ٜ&R'*{I'nrGCM95v13r0;c0ggp6G#'|ݴ ,D/ 돡&RkP G9#Yg*=;j&i6HXc<ֺCifz99HI*!ݻ)+S`/0;RNO}+͵{AlfO=ps鷳-$dƑ)'a:1L+pw3uxK1ϥyy$Tצk9~^W".չ+#m\+O:6";c[O.̒Fvl#$swǡVm'lFxR9$f遃۞R{Do [hs~UkfKj @=[%v|[ -$:WnI^k7|ˆ%A?r?@@rMsFpq}ޡO);6;6(p N_#!xj-h@`ecbp29V$ L)$'B\L = D?ZbpqR) j(ƤP:qҘjW<N{xF]oQ쒲I pʜ=Qu xz8u {PVjo|˄-S lGl朠c\ga3>)GVe@<{z+^Yf*d<@#S$o6:T9!=jd3p[JZ5AsoxNxd4`}45oOI n>*;mV-eYT0*N+^.YDfxⳙDpNG<w>q5x|ã~?>xOYtoi4iYv⾯ heKidX2:0eaA7 nfTz>,m< v ?3Og&^n;r7R#6q*0$ʴ e!!#p 볯nH>J]xo஬tI q4-!#%Kɵb!T}q^8nO|K <ouop2DbdUcv\N m~ڟvGůYRڵ@%,,Y@>=~ؾGW ;+eXWˆX>Xw\=,(pᲫZ /g/>,|;OfyRlb)E*89kO|RKxSGIvMBrvzfaO|T^ HJ;Mw|B9 ᧌lB}m]?.7g2kaːyq:kc;m/, ĸGd "+^ 9ھ=-V_3`2Fʣz\Cm#]C)}]~ߵ]fIE{=6g䢏]W?c#!zżKciu*R@l`z4m=OmO"kVz,\)xYw'l?jهzN8,Ua6Ib|A]|/ Eg얳HD,Sgi> I{BN&^1١4-?=hكTjIl ax' RA[oݧ/er"/<1\jbLW2FFł7P6:Z.eiz-9/앾 s9D;+\l|Pck2^3w2FCF<o|`|i]H(UopMm'`aWP5'M"3KR3*{r>숉t1$5߲+&'m7?^6bHL9<~ƒ>2-f-&[Ͽ r<89M b~<)ɣx[ON`G >pF;{;&~|o|M'?bQQ6MmՋ F8tm ԵŴXkw <ڻWmix6_;*4>Dduyx>.m{rOƶr/}n}lm8EH7q}kfX%qXK=G+ c\Y!L? 5bl'1*F^pO7c>DNy=Q_ʥcsޙk/2|[888[=GT$(>mۉקjQJQ0:#8xFb~N@>'{PffJOqL!-ۑQzXs@F<`=An@`zǎSB%h>Bz `@?4 *X $^1֠Fk9ާ Lw?_ִw`q;Okq_01duV>^;}GN|çƳ~кm7XK'pnx@+Te\sP0zw_ ;Rwߊ7a9-]ʮ"BLe\2k_{m7bXI%A \qӃֿI|acoͥʴdb2Gcsfϵ6 G^OZx$(UMW;Ю%^QYXo#'OJ#2bݻ6#|9_j^4@Ԑ%PF;$xEyO6G$ǥ]ZlrXz3h{rF`ǜXw mk G i[^VmS0O'V^\܎8 $XeI)$qV;l7 vNy;OZ4gUbY( 9~=:hg*IO$sTho2C[rAMcɪ@ѰsϸX%գYif Uzΰ^-GO[D/){縦I6|LdoPݎP;W^ʬQ;q^[C(<:tWN:g7RA$vrryy,nGRwȠH'zv(A?J6oSQza8TyĸuTFXcX=}4Js1?*c[$sKV @$O5WS~49M ͎Ao<;#fVY;{wٞӯ#d_׭[ޑcqWb.vNGJܧ8L{e991f$Ȯ/Mq9S+`ugi7M|ugS_LT+ht2k JRا7?MGKY)T_ƿ>Zxwƚ;lpl1,EJ2oBHpI,Fq}g:ضX~\M00[^>S5o93q>x\ٮn'R[',<>_@ 0VO|Fٍ7]}HT\dU<悪z ߙ0Ft?Lj> k| Ь`IQu}÷Syg.v_ Zc7j6qy*jʨ/@ g]{Ѽc.߷%HGs@p8#?>Prs@ м]7G׌  9K p$(B@==kҼ1Ǟ>u黸C1$~ 0'FgįIWS~i" 3,6vw;T1j޳vΉ*ؓD,\%/|A}RR=hʨV<9ї+LW"9~_CGsInܚH!q_51B~Σ#[cֱF@ǻʠkߍuy#X/Y91玕iT7v[ϛ?j/WNOiybBH䌰\_==uMH񯃵2K{X^#1u\eQ+I!O5/B ebq>壘OKxHֻxL,WHCu$0 zAJ&OZED [l'Nsm S_ٳNjn,ڎ;qIڒm g<ת/v'|ѪrDkF;}iNw~VLT*ïAWg94}pk%o)[{'12lI]XrFAsgd?|Y OƫIq"_@1N΃n[? !*xF_iEkFp=khNt~v~7~/iXcI /LheLdq m9>/-েǟյ`?ѭ =WV}] wΟɢ|1SR(Y%ccAgAsWܨG;S>&OxP6CHvC ؕ'J~W4E}f,& W%w~xsƗOM%}=wk$bBB;>ph^HNXsQm,xvwNFH$bcOs1\g~ǁ1>EUY9 a0 ZJټ7+{Mrw [_ry}sWχ?`2WWgL<ąV#q\/+ >A7f}uK;CA7PY{p2Ȥj2&6G 5SX~ -Юq<¶D;@8/ Js7I\(W|zZw2bszVf-݈̫911OP+&X$!H/$ʡv"@(]æz31d$rq#)fS;\Lc9HTtX`9 Vzv^Er+$5~jF3o9 vt>qE #'88's Fd#}Zn.z}9ֆ23:#ӯ00#mܣNAOκ+VQz\\LcnSZM"6<0:b0L 119jθɘYq<`z׵5y<߈TtrZyޘ?t<ۇ~:8;+쒠OQp䜪2O+F*TeI99<@f#ip:v#+|P2͜YaXՔ sѲ1sV4͎0Hsf)rp :)(€qzc1e"vy'#49q-מLP4eNAMYԼ=~p]8Dx;>i=1Olw8$m, P 1;T JetϹ>Gk>f"Wm0|ܞE~1nWi'g½[5+DIVo׋ʓ}95O$s5q(=G_xlfY\mV.:dv):0218x{;3=Ncvq0wE`$t5{w3E5꓁VQٱEk-;Xƃ|dG{ֹBƊgW*Upqk!s+ü=]?V[,NFbP]${~(X,.yl;{r=>fǖ$o5݊Uv=?¨#;,Q $qfԏ8F:*Z-3>kBJĆ掱4^p0XB^֠/٘B+#5 @gc0 #[Iy Kg8mxۘg#x 6Ymb]%ysk $NA]eH%X1viWc9+^Xi pǂ+-nHrԺ-=̪F. Hi q/2 lQ>,"'>6 үH2<_oj՘\ƁNGSY|[fqڼŷ 3$ qz,$GG1^YL: ]Tc]yԉuy@ IҬq hOAy$X!7l&xd]QC$rwmz}+(-McL> Ouk䏊[_C&+v1i~$RZI%Y8H}z^ȯ[ #oĸrNwgJ ąs/C<{օF g'zrAjP=}wӨl`nf΍FJW3]_Sޟ=$"XA'>K2\K:CK{^y'Pdq UUB;#ՠLm*=z~Gr%44,}ެ[=1Y.t95j0@7gP$qPIǰFvO#q)9 8vPqNU]p@ԟzxG$<)l@9>i*N}x` ֝@<R!ABQR$rjBOp}8( 8)`4 @J4 2?^)=zp}vpzwG^j05x'ͧ]w%Ű_>VlNvCS#X` (xf^K}|S67s_^xxr \c{N֞a$~PtWi>KW%$\m _dD.irVKdm"GnUL Cn_c~[GܑY̭B -`"8R _ݿ~jz ^8즖Ki4yM6Ym?tZ{oWSB< so:b-X)Gu?K=/]/ZFEow, In7_HGCkkx;^B6xjHWZji(!t̊GUJ#7M➟%ԡ<76,RH;x_ƛ0 gCo  !X0rc9ʊ?%xA4 m$ڽŬFt_4,yx9 oo{gqmz.6֖s,@8Ÿm-O/ٳN[|YYE@s L=<͡s^9ֹx#Bs'R~ r7Vv=$S]yPPa4cŞ;}VGҭJ#\8D#;:@A_E O ܤBFs3(=_ZjsiŜWsC:,8= )__  ǀ|5c> >;]K8Gg-֠ y2T_c_)P9MgYo|  E?1cx?~xS6^6zDCn'd;yR rk7Z^?KmsmnbJd͍zyO<Kc+'|ngw Mݴ(o.T 2H Ez$!B{5|SHtYˣxbPEr`ܘ۹OE/\ E>ЯO4+u=JJj|d>)YxT]%4(<5hxcpYۚ74υ .xKSx"vY55վ n`\4@z=MfmCN K!cl nāZ(>G3@|.FV5`6@6>E\/%y6~JblT> F_G |a<)6O Zƒ]˵]oL ORW0M2pmw.7.z?|#/jڇjvxuR:уo)x3SVrx#rVUu2մ>ltf'Azݓ~<_wmWGFRo#?<06@PG*+?#ž0=ż~5s&!g# ^Xg.K6+0hJ~!㎕KtDBҁket{oUoy<|R:u+}^Gcs|'㏁'}/Eg{ dxX)-k| it bVEI;EN}ط\G?i}zNF68cQWiu&GG{~/F[K̏9\j>1x{ϡ7TIZ\.@<":l;g? ::ִu8&FO_~Nm;V=o&VY@>dB~,@\@Moj][DI?}83__!?<NӭSr]I`2;d`_.hӾ#|XHt=7v+W sτO/²Hc󏕊:l9L_ΉWIejYR O+\⟍>ֺ >)&fZr9pkǿo68LJRھ$dW#+T֍5 +J%7r_n]V^ߊ Q39[8,#rE,x=GbEW\m'i ^#Jb%3c^>y˜Ng^ywY?Up4dI8, U4ib6Q3s4#?+s FsP 93ϰ榅}s5|В@mHh32$7'pMBSMs@zAh8Ip3 eض,^sZV:F2:+9Np9oZ6Nåj5$qf=?WVRGNzTs98҉dHR&RI?/WPw*:S2}JO\+m *#=?l4^+r:?kK"d6マhۏ5wq?J&DS85 ?ʧ ֶ3 I20~Onх?2N~S{^N9+ u9*b=ܟPw;xo\Sw*y %%ՙL|9 @B)8 r=}Oz7]ʱ G~@q'hH R&FrI?R$ŒKg=;zҫ _,r8# ΀,~ϸHlmn~<$I:T_'9N PBO|u9ֽuM6),f D$zӯҼ!(݌O\\ݐx+ hs Kz_yHZM2)Ytg<% یˌt*}=JU$<2g1^/@}<1DivZ&yٻ=ɫS'?Dtmn4WvkӼWhKIAT)w |J%Q ;zݦqDn'9۞3zjP{ĭ>ӼA,.`?tW˸&j7J֥vaF~tךcs6v%^FIp UUUuvrLq\v.1#dO 9 ۽gЂ;زĘ'i9޲n Ї~u&;+V8l#npGMKE2b)/\Ek6m yornFP;֯`U20qj( lLd_jX帱@uR@d\wyL%#SPD 1K#o' $rx.=4M"w:wzg8MEc(Q2u *%%$zzY|%O񎠎;ՈoEAN?&!qr#~G[gH2y㚕BS)\Oo^ k\f[1}+CeOjw #I(7?K/rrGb2Jw'q5hS5ә'pdX>U(Ʒ5{{g1n8ƽL s:U:8WK |#)}T8 _ sp3ǿ1wOp>Z8U7B2G?E=#ۀ$S;SHL\68 hb|~SO~?5̰ԜUs";qڥM{Z_cǰe,M> U& UfEClT1@=(}ր! 2v9)Iװ6=JtfHphF] ޵OJc+{|ǯJ (4P:;qOlF JQ[n8":3u4USOA\~p C3#.PGU yQɪ)ڹd;;T2Hۼp^ .PG]ɍs*i55 z5kzU&Kڼz`⢚6e?8 3{*;OެpU$ӴxE]z-CMmL76(hAVj7*ڻ?\6RQ5%feR=O}rn/Pnj^`%$sľ/~ viXCqzQx֐/8bbrBrcHeZ/xcM텖 B ɭE aCGVH 5E~>Zּ-7JЄ ]y'ha}F* ǒq|)Aݧp~SN ~ֿ|yPxcV#3f@{2F@\z[^??f>'5 /|Wt#2E ,Iv<+K]YO|!u6GOb/maPI SK1u`gsWԖDԵ@,JLdT82x_į'NtaWVy\=Uw-K Đz{?w? Y"u_EIV/#YE愘mx}I<]4cvϞno>x/E|v Be $zKtQ,/FR7I|POqW??^\3Nem43(b6V8'k<|0➟oyou%ɒ@$S19h5|_~?&`ckf<ʚ0q 8aUAYe8!Wzx7wZU;ⷹ_y-Ĺc$8  sF*=Ke1(}:vcohQ^ `ȇV^{Hlz?4}CK;+Eq*z֙nIVL,~p޿ MĻt DS,j7m*;gma,n<ݿ@޿^6|7hnjͦmQG ֏*𖑧閞M@u4Ab?R4r5OBdO 9??gO>.įXgZkxU$ Tgp9G ,P5*vq`L Siܔ̟ nh&*uh,i2\߅ 4Bu7qm.1);n0Â+sX-(ܤ|Ca|0j棩DdL@hqzy<fg.u5;sҢi1qMɱ psWw?gǺ+/ĭ"ݴ KPF|KnB>`<G8>B`w8ӄ]HvBzHݞHׅ\~d R}B@zPƽ!gScH-MtPbx=Ue?Ǩ֐z㚯%1۸lӔ S~?rrj֓߭@O!Q>h͜t9{smz ?UlTc xs^YI;eI _#cdjÊ Ԏ-†8Gz&b qI?18ɑYw(A뎼*uPTgc >sRO,O!0"<# 303*Je9U5Xœ92CuXPH;g3㚝O9Aۑ88=ht! Î:~'ҝ8djS/sd#(Py}j1,03Ӄ?.H^yj8#,2Wq9( t@B``Γ+nd~R u Ӂ~Um#|Xs;u([26g՞ʷ7J O,÷z>2mD%'qFiq=ة*71#}NVXLp>\;cyr=Iz!yTrOZmlz388^]\,c%tϥn{G|.'~?5o/#vX, yTx0u>Qm`zk%A,Ju\,ar`>SkQ2]W n/>>!>YdnL|y_*k?|YzGlY'2?'v& ٤Kp$bOt:g1P՝?$W Cl/\?קyf.Ө?^c Kdc#߯ kH<^ VSwv17soW/@1u$ Cp<;?ƚ 㑑93I {h0A9~XzqПǽ7hUny P;{0';='#'8T<.q*H)ؿ88h (t#hFbFg 2v;w$n;7WGim#%|~E'x쥆蝓\ڠYd8'8=+TlD8ٓ=ck__ھ6D7_{-jĚKw;7S,]Wў9ռos3LuWYQ%*y'MM{طN_WV,aңsq$d f25 kjIj{MH+'3殻Kk@07pN3k/'M ]G]x* Pn_,~Wwm#'_I2k 艎&c!NBNۡc^ G Βks1֗xGΏ s"&t`GQ[FME ό~*x^N܄$g*0L~sm9o쇬i[;EI7rL198xk=l3#w]TtGRǵ~*aK$:|YA[_bqSV6pv~?_ |A[xOܥYSk.uHN-SO52C vfIЫd}ZBL 4?zƍxo'u>ͦn^x幞m=8~^??Y-sG@K: '79* vu~~?ݶX#H-G\W--VQ(UF6Z-߂x R+h"ȑPРt\8IIFGyݠKJ%>8 rG\:.*yZH6뒠gw;)[qd|]5Ѿ |^x{k+y ;Aè$['Iz*Dd9Yr[kx K:l!M)Sο"?e_>Қnxr/,&ImJ4r #E~0d'#>})V"7IՐ.8RA=qPHI"T##i*O& &|Cxbwr?H_g!+$"MѵŌD/<3@I$W ~_U/?{KTlv^f,{VntO>?3=Yh Hr qm3g>Ac~%O;mZ[ȑos'PN$ͥCe[nTKՏ_*N=E<#`Jb<݅ova\Ζj@d{{_{OZEbʓlO2eH'cHnpjLX_?U?េZ[ޡ{kUCsPzfGnJm 7<͍?Jqަ6Wgfb#7uM9_rV4pH[u_ g.oď<'2;;&s`+߅?Oܞ":5[rF8FiG N~꼧5~T,ҪsʁXyUpy!O 7>\Duc]QxǷ[H,AbƗS' LW \֟FvC.04b@ 5?mЂ? DjiXR{VVE12y=;WyK9ګ;VE4{|eA2HwUQ.㒡l{AWi8'QV篽Cm+Ft/ +qs޲Ӓ8c}FtVӉBw8wи* IsÐ}A[̡C\_+rA«7 8<Ӱb!31U%é;u8/33 H8czD 899#Sq=vS[}υăzgڹ`{Pc# _`O_ǵiYMSrr=+TȓI0cѿw>Je_pXw\]<8?Q[l@vӜszz)%ftR%;s؎1@EuUԆA'ᚲ aǽbD-OɏAEN=t LdIF;'vn-rgcjbv +<qPgNs^1yPwryRe<rO_^˓#8¥ɗ>$72zgt 8\p9<K:qTn} 㠦V=(}ǃ=h۸C!8 #w?uNj+LpN?Zl$z#ڪ:!1c|Sn- €ʣ'uj@ f ʧ8ݶ!z}zSLB 8cRka!a}}p:$vI`213UK[FqOCblI($N03犎^};Exrx•#su4>xq) n#>\d@:lRH\f1U#‚FKcTKf^zLNn{8>%$frGsܚ,MȲ~Haӵ2g69WR;3&88MW9ˀ۸g xƏ'$r9_ !ly'F3;SB#ņ+_>PI$azUByQ΀ a=JaNli0Ṷά"&ؐzFZ2(,pvX-gyS jZsgwf20$y9};#ܒS;NH㷧Wv g 9=Ʃ_V3ul.$PGLgz@:^@Kr?w3~ס> trHlA%8?_ d(~c?.|77Bґ]~X:#5g̶r銳k`Sd=vɏbF(OIv=TCW j0/B= Hϧ֩۝~#5`jCp}OMmqҳf̑a\lcI.,U?JI% A^F 8oJκ%TP3qT0&X.!ڛF?ϭyֱF%gw3~U+F.3+!؅ZYan2E3 5 y$UsDFyLe=6?JΖ1ć^U|̩wLe3xLXy]r@>R;F1+}R6ZF٫˼]G< 7 jLօOڷ ?~-n!ͩi^RyeH{r$L/8a3W^ $6oC Qˍd{WlҴNN:ҳѣ0"wڡw1#l*%/ᯃ?PǬEۈ+yU">ZvxSoqXUx hu?zZi^!ӣ Ui=Y?1'vyx׾Ť.E3N^H,Is# k|fv~x N/ ,EHUy^q+𾃭|\W,;5/;hsq!%>ũ~n5|_<7qZ][^8/:› r=1_.7??ӛJO+f[Ro';x?2t?>,jO/όxL 'w~)9m,<8Pd9RȒ/F:cOݺޱMu,ё%4sP̌yWDžuĞԼ7KxQa{]̖0³u#Dŧ?^G޽+f{t>en)_?.؟O-?Ǿ$<[,Gʯ|ggn"{{Iͥı.[ #y{}J;[m`R B* ¯}/ƞ W[״8& l2HNU~bsc?7|B =f.!g+cڼGқSU oCoUUX䙹?ڵQI3]/~;.LL|ѣ<@*vZ_~O x<)l_˒@"7p{WOE|?~+em.m.Il*co7[a$L㡮}h OiұNETj$ו7݄%1|l 泧Ϩ[z4! 11\~g{C~C˭%z䰣׻8Rǭ|u_[DMBo'`bT3p[|jT8zܟ_신7KfCZYS,0ɏNY7 c/<G_ޗ~Ϛ4sK.fE,d85G }]ovN}/1XƬ='] ky7@nu >W0*I  n2@b*j-Dz[b䂅1p*V̮_ ?k;'{{[z{q^,o9$_\"gBss׏_;i[Fvpҹ.v9N 6@M(Tԛ՞0Ƞ,F)(ssӷWQH{~5GX97),>aeq9<ץt=!xoL>_;bdvz|zICնc=jr } IkrޘB|r=)R1uI% FHSǽyگ?ze#\s31"vفy:Ε9眃~5ψ`9͝v1aSa⁀Γuӎv CylU *듎} x98cwn88J TrxGӥK(ܫV#UPNw㜟TF< ; " '|LJ@=I89j9\z_U0(ǏAUSB uM/AМer܆e*xϡqHgR8XKd>q\ GˌuA ?Oα\aCqxzs<Ҁ22a1 9e:y*Cg'w\49(Ww^I#Hxq@SH) S# \'-?Z}͔"L[^LzUwaUe4 :T5"HœI9V#js<.3_Gs== 2c8{jS&ӷK`d=/,= VdgIy 9 -JGm,>TK؋,1q=OVi8ۊIσE''[b#sRL)8 6$HPn1\z4Kgɑ<F\TH q@n;c2\$`{jI:4svzqc@%6YGJA'¯m ! :T(96O9=ȫ@>ݧم30\p20yU0 ;HFA94ZLlĜ?ӵD2N7eV$* g8=6V,X)u>؃C|3ɉpto\*HsOJ9@ۊ`FL2{n`ӷQ @@W~8"8W&3;tcEP D3'4K,^W0ޕ ((Gګ !ʀ jc `sy6*9=h7xg #ΨݻW#zё"\w闄rd@<YCunxi.'=~ߗF҇}. ӽHxE\g3:"52h0O|1"䢒9kԱySM23Y# ǞHR鶳` c*|`Yrvl?I?|>am8pr9ӵkPI_0R{K×88Dd{ Ҿ 2qYpcӁ8李1Ҟ:S>S"ƁqR(S@JvO q0iN=tȠ/>o4yS8=K㏉ZMR}m2Y ɽc=3C|lt0&<ok[x1 4 RUʔtpzdiu4}+|]? RS䶤av'dM|5:~6OOI5 $lĪXӹ_ݞ 2B֢~ ӡJX~F%+N~0 SkU{h/7k=btĊU.FT'sho`|Yy IpZEy׍.$B9߳/=GW|C{8t,YO$]&;[#$WH~־%>2~+"c;hs00Hy#~_ 3é0tygov<ҨݵOCkҏiG{m@HYc xx,"մ^ O 0 _? u3Nlmf- KEubÐA G=Wu߆_ xV:Ɯ#6&9XU $cADgQ^0ǀ'@yp<HP uON74t=™ɕ}z^ |X\jCZ+ sow } ?05(- AI|qVօd},W L#BoZH8_ռq .c"lե\|d+_^56;KbWeAe r}1H3ޫKͥy|5I/ɕfR[Yv ?c_[g_A%#pq5:/hÙ|m |Jy>i>"$OHgeQLfV 6Ѓ^%yj/z/ 1q -8\`Hz W*oSЍ c*EmÿهG|3QVEcq^Wox)=x; }RjʈE*K9=k׵OlɁҼX񭵲yr3YN6EDzFűW kŖ/޼3_m1$˷;W,Tg ,"FNBo })!d/AgYHV~0ϋqyY\m$[@-WT6Yy8?\.23g= -*'cIq򫟻]:VXN*eәF ïPA~n猚W ?:z8c$F=(KhIPF0F{՗f8?]KXn H ~#+]uM$QnOLڽ2KQfM~Go>e9q3X ZN%"@IUGgқ buRr?l"W?08{An\9AL #bR?ju[d̀n+wqT+j\K|%$_'1 i9ycZ‰H\:q=ZA0'zL 7:RqjFd&N sU hr@բxPHfd] % $$w):M9>p@`rzIj9\ާB$GgH'u '-•ʕ8"\Oltp^G~P˞z]60סϗ trh(?҆y \rI<Ur}R)<\6 ^݇Nҕ[#yqhwhB&F<ɩj8 g Cm-  OVl8 fWs8hOL9ޔ#{L978>3>2sq# c‘Fq~'`XJg+v'{*?\3ބ׏_i 8qΉ=4:iDsgiv57.)eD9O*ڻ"ޓ❷'=MyB280 }ҝh⍤r)\n:tgOڐi=8拀EZSלcAҖ0Xis"𭚭'WI8< v-'<(b9i3cr%kykxzݨ ĬrwR3aa UU8On t# ~ʼy]3K1Ky9+(co0ʹ1pE.RO|R2fv/쥏%NWťB;w3h[d ۃZ)3148$S퓡=k֕V@!=SSgslG ,P/NAe7oCWij\O;FiUɻkcަMTmֵS;a㿵\[`SjO\U(m82ziFg <(\'E6ӑXqŭp 'BPˎF{853W8H8Ckk<F^#m+1t?|8t =Fkz5vTskAVr#NA;9?:ǐ%1nz[C1z8SbN@΁"|SAA2[0Rnb }}49Q,( *b983prTӏO]͎cDCp9%rWkBN2>r:zÌBݫf"1W'ʪ.3NHS@yb9ʨ7=3Z8rqynⲶ#T|2>JXg*͹A8GZf13۞~ QF&8⨑p>`{*\<cޮ6U0r2q8)9Rs񎘠 Y@Ix^8j{wU`d'+s= 6`x%$sҚϵX@';Gl/:HNӎNeXgnTV$W/9O8$´Fx HN}GҀ4Ԥ]?xۭP2:t>n$c})]rP1{M09s0b gq>ʬ %H'wkũQ; :ؑ\GMc*gm$*[yb>N 8"Gu CFzz7&O7 <*XfuT`x+鞸Tyt.ʶAU;VP1 Ԧ8\냌O q,(AIeynGT; ;Np7RO506# nUGOPGCOJ2`I=jM:@ tyCb3 V@lcWLM#'<>VCǗ9zczRB#m$?րNme8^)6pGzՇcpx8~#'<}(۬q~8X[{` 9%q@݃~_D2} \SL$d p9OҲC6œ5 =G_L})`:qВN֐6R'<;s`T8ހ <pdoڼ9_Z9rAcL5tn@,hbO`NIެf݌'zylnFq׀N=z"X*{\wÔ{՗⍤TTZsSמ~TȬ$A"B2q}GL7aFAn$z[sʓ9 fzKVѲ#e߂Ui%v'VNCѤAݴ*4Z)ݟ1v hK ރja昒K>K(UXzŻ,t/u$9rmX <yVz zdכUTBH$r'+%Vg@q`2FJsFU57bz{WIgݲ#=ko4ybxޮT=8msyZ1#ŗ1:@#ácںsK>-G.3CEtL{zփ‡UKUxx _ƴס"Io$sZ)o0* `?Jӑ={VG-M˅(P2Q4 qڏ3#R9jyX\":sSo ֡ݵvg"$`$}GҫD;!w$} HBy>T28)탟C<ȥ7V^p>el/TĥqGְfJW-ٸ']q?үOvO{cFJW)O,f5#p(Z6`#@^+-aINA=VbIS@np!I'~u2qyƱcu PK :.q`3N@[?*1E#3}ҳ.yA`Mk FNcP:.eq:44%I'#r 翠/6T\exǭd=AϾqI1P$l#N3MUr^v=G?+Zh၂pp=}+'8݉Py ?Q"RҩA ``ֲA9qjH㑑wr9{f5wsЁQ֧k$?/^1fR7c8rAq߯J% 1ߜ#é)xlu gzSe}N@߸n<;ddszddv%8i6/qr=wSL7Fă@^HAUVx6:[o=NIDdPI|2q|߆;]I#w pH<Uy#`?΀vv|9–tH#揕Fn~^L~=I ǽWxwHA?ȉWp8Nקv|ӿ^X@e14ɺ599bJx3ЭKڿ [le1d88kbkDS6Vߵ*ކΖU>PT:!4y+Ҩݲ^+9E#/\ 9PeX pW8T@fy{q$-$Oʜ qy yfjje֠lR =:j5ǭO0<0=q֠: 5]jiR{Ҏx=iN<:SxhHR)}}h`6E\qGN٠ƁQמ@GDލN?4pzSa퉿F{[}!:y\g=:{U!ߑKF?w8_?3 )# OJI9wsSp}tc>SFr ;1\R}x C֝Qim"4g 2ĥSLv9-߈~FinfXc܁XX ǚjƱfPqj0Nmea4^m.K1 H]|Czäm~QjZ9f%w(88P|UU֝c+Ud1y0Ic'VjXA<|/=}}Z?zrxH|  uwKKttqg=Кy cqC1AugmyT&}F &gkx)me1H?vky\2)UsǙ9 x?U]ky#"̎5fKY^x ub]68HMdw7֞4t#$pBf`b{i wOi[vF7{ʿ&y47/- &/S@05o ɧx &jBg|y^?k F$n..5rJ/ Q4N J1ry# VfVs+-鷽wU|Yzcɤ).BݮcɚHb{@e$hsج; , "چ'3z7=( =ALrsC0=ֻw:[eY[d']d4;Vq֜hDI1+lŅNԬtQHM2x#p;umuhsF d] (Wlʵ!bB\=Ey%}=5HXf \Y<g־9m#ɤ]]%HΪV,3ڶM4e_]>".0|86~]%xp4qw[k>hx5bvr hNUp9%6c\l+LeGL|cV7ͩ,ހV| 4rTq ^\7NU,q +6kgK`8!ũ\em&o~t3p7ҠOZSt!zu8w.RMfYQ#sub?\S2#^y'?hJy}S P' ,qw+.K>_A^M}& T?k_XbI'ߗQ\ӖϢuiLq\ڽˡs҄0 Z5f(#Dۿ\g۱W`5^l|&Ìr ^ɆFssU!"ϿX*zv8^yV@[J+w8iB`%zq1r 8GZkL9#׭R iR3ߎG` :L;Fz )*H\zBl8Q9OR:q{bGNJFx8=3?j`I#Ƙ9tr4NH>ǁPYP'; TF[ 8|q3_|@2,űqߞ*8Č 1Ӯ3kj1p8u*"Ts m uϽ&᳑\ Pv,s8A g==Ta‘},#zr?>;Z( ddu=8T`vpG'?z98S^x<A@-v1~5"Fy-<YB8L_(H ir1GPq@nv%ax8ԪZ07pXu>3_xЗXTv<\tqxsRHT;n_ttc; tGsGȋod) $A|Moca@ feɌ:39{q~]'NI9nNާ#(qdsPjAqϿ?\VU8v9={zcz:!;XNդ]8$zolP$j :ێ=1V*בTAyAPƯ~X@XTy|N:J1h$W`Tp>hsJRڝn魐_(SE}W{hVmcHd^MJA=~u a=SDiqڱcJ.?[E.zb8QbJFqf zy}iw `zucC';&[s~5;">1=)0ϭW'-zc5E@f[~J )x10О)ݸ֣$OJy@ ەǥ)7ғH?+u*KdR;4yt_ 䶃H6Hp*2##twOPZ5[}Y\âXjVSq X'UWA<׭Dӝԋ9p;kOjg?u駚=#|4"Ty5xKb. 貒JmaCrqdSOK+zԹ&sz<-\\Zd72Ac3H/lJ޻$ГԹt{ۙ,gdڱxI>%OQW0jL!m|:k3YŘ̅~Aǜw>?u iھ%ŢG)q..[[]]j Im1o? ^MOS\ Xִ QPofKYH?0a=?w῅^ύg6z60RN$8k\ֺV$sZAN+u*W|i7 `Ji4ܦu-:O=Gu>KY{QsxL<i|wn{pkD:"9\*RFU-CYf`pw44wR{ -ک;WPcӑOMkOf ecSֱDmȏzJR'TJw#O A늱o=r;u*fE^H*$Ur}*ծ|gUp8?Vs1jFnęc/801ycsmx=A8m;ecsZʻ*2@$4'x]6Q9 Xd@JF}yҀ%\8>* dcTqy3QǯrF$ Wꛔq׷S~ZÒ"k8m+ϡҺPz8=;cpCʑ};01fV! rO^Q9ZX1 py z) n#^2ԀH \w|gZ?{gRa$ 8a1$tsǧNh'8?N*HJ89 Cё<=ȩTdlR03:,Tc;297*x=UR2v':&לCQ+(\@#?Ҁ*{nA3ɥ2<#<1$A$uZU>b89Z_) /ZI i1z*0O$c#{Ur?x>nq@-dt }~yb+XAW,7  'ֿ!"+ 2| `׮ij@@8DÜzSQޚ+4K1Mp1?/Azxp#4AHiQpxHG#8iR35@ )p{1Ԝ@М(o֬>IFxVRN`ZLjaxu &utN H9~Kd.QҢ׊0N>ݐޜ̃vTw \Q. Ӄ(9s(,Oy#(:9V98X_lf<"s%lp|I=is_tX~T}O9fONiw)s`nQ܎e 9n 91`mcFv=TwlF*e&ZD `pBmzϜdS槝 $Oӂ `ێO?~zac~|&}'/m/AT)/Rž+gsFZڵF mm:h7$˓qko;2%seㅗ&.g{{;2ȝWi|'⼍>kyu@ׁ־jUx[JmE);ѧ7}qdX|Lʒ~zV$>ǀx0 w7ǿ\(}Or~l1 ר5:qޭC,h):$<8O.1Uɰy2=MV Pc/jُ$+mRq#WJ,IUpHOjB@FL $QbT` kC\"YF?]H"=CVMmzցuXΎI1ӷWt8Y,d?ǑWb;9@alpmh zmf 'h\g}vz9zFzÚe$oU~+2pVŤ AO|XVUĽWcğ*``f$ZwȦIDfl >9}rab ʃһE$h*r0>]de:}=sXr{F+Au6Z1" l*ĸ` +UC:gzA:F~<V5O*cLE&;@׶:`*ON=kbYt۩N7+('gcCf& TW#8vX=f{W9Y=]ɵr;I\ǵmdr toNc9>cap@yj@obp_Y i鎧$ֲe0g$s׸׭k0y#'ީB$_wH Q|Hp1ԁXBvms=zn#30Oo_Z &evn*ԍ06T/V 8<419q$Uڣ['ƞ+cs;yS*N:㿽/O-sqJܐK铐8g*cم8~ڀ۽`U g'?ҕFO!=x(6q {4TRszp:`'=t8Cs2@=k =O8cFFv\S<{Sž{9c# |ǎO>Ҁc֭*($GOօqjcCk:WB}yk)G1@_OC|e H4v%.nGيuⰛ3|t?+<. g>pjs>:V gq jsq{}*ۗHcX8?w/ 2(3 3H@# ֤ۖ)9?y?Q5&2@?=i84 "㠧JWG׵4ҥ~4 @R5h1RҘ )d7>FB*>I89=pGj\4ϧJ3׽?>ttsހ zSSH⎃րXFyt{)F2En9<y5=Sf Ğ9ISv9 /#/+)׌wgE,4G]k.K`Wx("@1'of:ayk._}3yYᩙEl{Y5v}/6d>'N בj:ҍ0 py.g7axYjtZ[4pW u4#l9t ZJ[8oqd: ;#7sNA=*ƫ`(uW>U2@ z}kiQX 7H/Ę] 2Ptqn֭6t9whhf`r9_D`[<]%}vkC֩Dc r*{v p#'Gjꭕv,=*X}4l9;sjlֺ)- p g5{d|U\6qSir( ީ-}& mR1֠6#ո3pY CrF60Ry#)17k{A$O3. 7%N>Cl dsۨhx_WqvRUpm9\$vs#gE'VF<Aqpl$,2둒kb]#գ*]N(nOJ `nT8w| aGA^-xY1c+-P84.49{K%Y1<]XvmC sZDs &u.a-;A*bjD@(Y, f򠺆Kg'%p@O`+͵5q!8 :v+&ffaFr}3ߍswI$}85R,6)Tۥ"5g_jQJpW*x#?HxF2#sҪit d(IF:֫+u9j o%J,v@7 iX8zʱ'GpT}r3y=Ca[:woXd1郅F9P ǿlzHZvpߏPjE#$:Ҷ#uv'p29?^+"HI'$/YBX3Zbd#!z{dl#0}Hۑ\JG8ک0/{T+ $OnsUL8/zUq ?O׽P8ϱ*c+#@#vq6ͪp#GLgǥM2w2ܞ3?$N=1%m9j,}@ϵh0h {~M$`g:U I*XVĬN tO ժB ciwϿ5-ȻB3tjxB+QBPy ӌd 眞UN3h4đu'Ϯ0 8n!r3g”"C׷\}x1TP8>t .x皅ԀR3׭5Stހt#֦r 'pנ?)d֔rpNG| rrrxӎ7 %qװhZP0q?=:МqGܟR~b${aT&w8#URf;B1ڦ* 41ӟGH *7x}hQ[*sLΣAۏ= i[x&Į0~A 1 SVV6*@#x'#2T N-qI#k_dp`|0QcBfi;92Cw#l"=TJ*"3$G:5J=|3W݁Nƪ۰7g+ \2ӨmT$ǵ#fxAf@=8Nh3M'ZQM#Ldu֛>^;@I<c('|iL烎hz3C#?Ln1R{Q{U\m/~{ӺBxpE/t ڌƞF<Gڐ*$ gH:sG0 x.ڔzs擦:O4="phy'9` ҥO4ҸCZEqҟzCBev'cƝRsP;9$c Nri$ny3\l&ʊ,]șe9p-t7cGr}kom-̍߯_8kڽHĜ(7Znzv՗X2/<}koElLH k#}Srwg*od~Q5+8EOqr7N:wU ZlgB:`9n ?ʼjգ1lQԜVpO5YYFb`ztq[6zSƁ8QX㴫7}kXmIeϯqݼ#{nyb=,wl'ywyjХag=^Ky8K`G9R;-Fu>EwQĎ8{cs6J+]>:XTGOS \dg)euP='~?Zz2rO?K@@O4m:Vq|{SB"¼gi5 F{if!qЎV5g`~PaǧZUP Y8?2M13o"#sqQHÆ\7ִ.2*}uk~E61uK]W&F*U\}Ӹ~+NXE/Zj,lѣDlVJk":YHed*nk$[eh|Y>sJGZբmX-A=۶l`y`6l1'3}k.B&~RA$r?ȭٜO, r2u^*% ߃늵zv9ݪX?6N8dֽ ķ|t91ӏXV̦6d )V*AV$jƹao5~fqqkZf8l;z3n|s G?SCo)Vِ#1z>4r b'-&\ ss Ԓ} _caQ&ǩӿ=l;积CM@Ҧ18 L桜I^px ↀǑ 8G<}*soNr=u2<sRБ1r8:FBs A#K$nrf=9P!7>q#9jO N1RH1zE zgߘi0ԑm]8yU!%sqLUUۃz?=G1'# g׊yl Ϧ40A? A>Sǟƞvn p3:np#vN qjй1j7t95Qo8.yH~`q=$EFN??JImYP1,0 sf5냃ATꥈ$NNz}?uar{1߿^ [qW5b籋!sUTtXczz^PDX\msX !ǨcГ>S׌u9Nzќ_@Ƃ ;TdtRs⤑ FRAJUGx`Hry=@ޟϵ!{A^Ss4 q?sJpRzf\g h6SjaER;PA=)'~8=3@—)sy@ }(@\{ҞO= zS3 ԃ$zP=:ӈ秽 li'Cƀ8gt43ր~`v斁'lS'z\t̜}) c9.9crNOp+ݱº;ܟAW1zd0y qvuG׆zֽs֭{-c m[]#:kF%SpQf+Rִ"kJ6{>(?aRR"bn޽M* nW3,+oZq76I!C/85ig>W=F9g͹=k` sVtX0MtVp0^Nr֢ cKV#2\Ȋ xYz藁\TB8Hj'DJo`K$@e}9 '\ZUn qg;5Tb*N氕x:P~G^{ns 8$10+U&(T5u{bۏZ ! ' =J(<޵Pވf˨&9<#HSeƓW_Z.u-ԗp5j^?>0k'3=08V;UHc)WO±;?'ǟ 3 mҡ3%)Z̋b*?d>=IBǯrq3EDO?ZoIAirs'yp6Yi2ɤQyǥT`X &/>1v%)/Ư<sOC9TSUMZ%G<j_[xW_|Xm{5ğ??I^pUï`~ǧکKy [;*Ȁ?VnPG܃'nURMRsq~^81 P}!r=={4Xv3V#5W#G<ɲji^Mq$=?tANH`zcX*#Clm_p9չ'p+`'9a-[$#ノմFq)(!Mǐzj?gx 1U*&}ypxy2׎- ۞^lÑ`;hNpAޫ39FMVB3sbMAKMNI^t4wO~+խ<\lx\YgcnR3<*`X+} qE:%)wWzpq8%F,FAH_˽O X-OZb*Ä92K6GNGO0ù$RN3A:~_ZcbEbqOHь 2089ʀŽxϯ'@'<sW1Iq9m n bG$^^$;}yY:\pwOFz+8[;y8=:αqwu= ?j xJ`/r(S*cql2s`H$w=HڬUn A3TLSqQW'#8>jBFO=׿jc2|@S@_V}#'U,27zc=~TIPr;U\qqù4cX+wt})Pwp힟Z]f=7UcSן]*hp1>v) ޳cOH>zՑ#\ 0y v'FA9yu5~b~c`zz`R )Grg4eo ۧ8ޤ r@xu4d1#^_֞'kyqJr_gA?4d 5;Nrx ߁J9%H#E3] V[@= M!Ϡ= @@ pAZ1k6:ߧL+ `~ W'jRH =ߟaK0r2Ajv8S)7 'd~Ub58B:G߱ ߵ?5 [[9GQ@ek=6IV*v[;]Xz|{%v[g?r2qT_S@$ǽWLU@S@< jD@IZbGO])#iN{Zv 1>98ܞsI ԭsRš#TǮ=;т jN}' |o_0 i(=hc랔v?JqZ1R{})psSRҀ8Ҁ y*CzpI?t?Ŏh)N0GN*]'U;zPp~mc~7Ps@ 8?^HuGZ@@J=){K^ !۽<~gc'iw`c@ՄAw_4 #=ƜH~4wdqA"0}S'>FEDgEpWa:{ePgaq&|a[gks֯f5f7K`^:ߐd*'K\$ڬ"=Efj $eP`W.v֬K~C[sX<7M-lu5 yosᷞ}à+|GjssӡޢGhTNpۑ~f9# 8u "6Xf.BB<9AmcQpVw|z*R!I$J=N|X) jWwjN$6^2iQ_9=j'qۭK:|@ 5b+#'ֹWba̬rԞ{#Y Tp50Yi PBDNk&5\dL*v+c}kxĿ`˱w.΅oܶϻ(zҕ-Mnqm*G~χi#~_>=8=x=8S6OJ|6X_rSΡl폓qN}-,J8Uʌ9xB*f;9CHmItǏӱ?tEW(\cq^3p0ꭝs*!ƨ7  }|#3<]E3rp\$@OkgLj l}I=Jε93]emMˣ,NmgV 1#-899 q:Q\y)qYt881ɭr&PS'r߇n*a Ax?_Y2w'?/LcU]IgwG?Ŏ:}>JÂGAkBDR2IӷzD裐Nq9ȧ@w b+W8 d{qS,`9w x+*>Q3?1жzh`X 2Nzc8"6 r?p8U!H8ǩҸIcG0{5pۏ?\K@sD2x9q>mҨaus:ӜcU+m%xsREULq֥b 0wc}}{UHf`Fr Px9*Tmx$v9\]YrKawXpT֪;s3+@P< q*5D@=ӧ*mdnTŜy9Y*9H'R2#9$閬8!I\FKȬ9Zma1=4گ_֓otK Ȉֻ=3I|k·8">}q`R;Z6\m z7YOzg֒^hҌjVlz4+vqZgac`hm>LepA&̠p'E9cWp@`@>ӮO,*l+ӽ5b}~x ޿JF^GsRqޚI';o) mScҌtH*L0ϥ)i8P!j\`?0  )>ӃӑK*8&AbrOҒu<1p{`;AG69ǭ7i?ƌ~0i9QN'+ZB2=}>aJ4qIҁY rqSZghpqߥJ?z@9XgQ=֯21?Jpb+ZD=#W<H>rŭfyQ~I ukV2:źZN0ZaX]K;SVB,ǧܿ'?ҩO\4ː{f mcIb<鍣<~~c~~1o.Jq˷9>4P[7l1=*?^};bQ˟һ ?0 /EUCgI}& TY ö fI4υ^ Jk^+A"T Z>w+$~ f.mE^Ts$YBrƾ_GkFB'\Ot.૛{4u˜s VȟPvq:`.*iCd=R{#f>MO^+$뺬?CiAI$0JiOֲyu4Zw>V!{s9ɮ UBm-MUK2V'8ȯl[M.gSֹkPcs RJ- }FcqOҴce;ֹH|YdwsW2  gRR] %:Jق9Qg+ ۲Kg;]&ѦE#Lq՝m$sr $PuȔ~6ֺx %Εk ˡzcq!/?Jފ;﮿lK[%p =:c1$ ̖c6N;sj$rlV9S4x# >ă r}j.R%H#p;6z!K NJKwHgWvt;ui|¶DDQpRyP3kVh"DF{@d\gpz8Z`XB cd]5M',8nyҷfg[E1(j2€Wy|Z]j>ѹwbI{p*]  H*Wr{ڕsU,]G oqHb%6[wSX`1Ӿq8hDN $ƣj'pGO]s>#0qqq]䐽<098KlRc9Xcq iKa V(EK`IC[D k2mz(8vTd/Lv9 ~9>x#-TUzzX6=O'?C[Rqa #Aӷ U8msr8?JFʨ9GXheldTpzq.@@9zV&KN70 zwb|ar2;zt XSl 99= {ycssܷQԴ8 8I FV?8;Ty w2 S'xs䞼zV bn#ZHt8_1]OБGLh35*̌:8UW `NFEP4=rzn;q4{ʌy8n1>S0 I9_q~T $|܀OP?43\uZ1*>b0?I ʲ#$y':T2#x#<8<ޭIg#9Z=0wcOx7u =zP!`OkySJ F"TV=S\ƛ'OC8Ieoz}Y ^X#M(^#ߵL28S@]Y]xWzye9b;3ǭD>f RGsTb͖`=OүE8Y;θ(G9=V2а x^:@8ndw<*frSzVae4+'=hD/tqq@Uc徧ߦqM,ɑU8'X.8 ;QӹRDU%zt?@a޸=wd۽{pFn pʃ9 qgP `=?4Q*HNO#?Z1݀~)yW; Ҳow=xhY1N3>3dG{֦,yqù:*)ٸUsמ@R\|~<09#q֮|>` :rfU)Qf-;ϧV_$^@3=֬.qzT'\劓BǏL@r?ϭO %z{ӎjt (pɌRާ[>nq1 ?|gՐT%8=OӟJL W̐e'' W#,i$ʗxѸ-ڠlIGĖ2:Ԏ嘥;UpST ֢xm^B*NyZ<0'00ys =zaGkFUVo)]sѐu0|~㦅{H*C_#[+ 8a>ڙ#oqӟO_Qԥ9-%kGYH>ZWtf;e j*_1ZE^:۶ioEs\is(cfx"}8H00d~8_ By`x,F@qpL1u}qF?AॿxO+isy?ટDp9!$zdJ@"b~ȪeO Ǖ>3!_AKd9=OS 2LtzUik<5'ו\~\V=%训k2}6OWHB6Wp:{sN~ #1K=ͳ?௿p_ZLl?ԷsZ`+N%s0wqRX U(GEhG\3\>ఞ $, 2G"s_b3 qSޖsdbHx1֓:gZHRk92=[+w(I?5ʓc0͂99>zzzӷ,dPuS }8kYzwٺ૟˕O` 9cc+Rkӛa/5I ҋtt?iI+IeuFWg~p1>k4.X sҿsuʖ/rF<\c~"ȓKIEZL=8Ҁ?X21_̛f=A sǹ*.Jʼ wcľt[앨NS%PS4ڗfIgH2V0{x(oݞ@:ϷkXJ$P_$r{RPMc#ZA?hOǟ/~[?>2Bq_Ń$^iX1לgLQIJ/ FGOL] R]O-sՓ,iA>0W}O/jЪ7]ıy uo6' NB=r%cNHՅg{85f;Hٸe9Q⭄58ɪݐ9e+?JXE׀珻u m?gl87l=+jkBrd8[òy3nZ>%lrֶV]_ʆ/4Ȓ9Yk{/8kv>Ĭ>VOگN>&GH{!$ u++xW}H,*Y"T wUfHI#'Zv4,o8fU|1]7mSs:_?ǽzN:mg$nֵԉϮVX#ۯ;5ũ;KFi.Wj Znӿ U57qowk.E5'jCeY@>h6j`.W5tk"{W#?~K~Kcx'J3u\A]q}◰>]~jt*c+_cva|Do7G{8n| z>Gܖ#?a>vtiFx[{*ZazW|Mnd2zpGRT0O8{՛go3X$K9ۥ+c] 3\&=jGh QּW\9w8AV\X*U nȯOGa f}Vyg{{H'޻eY/ZA?|'a%n<̌[csאkKMJqמ˽#A"gڸN4}2ݰe\c%t`\^q鬮eݐ@}5r6RfV@ƦMAEOC֬ \e0:ztCYf|~$I?JjE#\F\?(Fq8f;p:ZOtWϭ\3ߚϔ,IFR#l"av i! 8 fT}j&M''ҧҷ@1Ħcq'5j#k0 z}zW;};S ϥ#n H9 2O!^BeH8t#UQF$浈*8@ vǯSD00Fc JPvdn#ޜ $*38'P6__}zpF#?_NSaeLA g'191( cg\&5!6\^N*cqyRd~q)b 'T;hA$v`d߫,r#wݟQ] 79 p>+:~l+m92 .rsn\7۱ǡbѻ $0''N3SNդf NBhֳnvPyYqZ>fP Iŏ={U'O9lAsw9a'XV#qՀc`C`1=}h]F U~]'I˕%rp;1HUNѐ2py$v翭U31u {Zlc?{> 3?7\=}h1 뎼^*mnFH JFvAs0AҀ&]rQyU]?/ WԇPG@9?ΧF`#y=xxM#ӟzNUTuGLg)taq+,o yLg'#ϡhX7[C3d~ʳÄ s׾=*7ӜH}#8@<O?4³0:sߌPwW9`AA]8GOOGz5{x@2͖[}:@̀c`Ҥ;|#׃.iNi; )%py:U$oI>ҥxڥ'Ha*#1#'j#~%XW m0ۂA" f%7'el'hJff㧓^mzW3 Fvz|cfS`sJ=s' 1^i1宠HߚS'.&]CJ2^/$'\9WWB=x.]7UMYmA3ܦpk%sJ[~xyuKk5/̌AUa˛#2Z";æEx<QޯGWتGJӔne Y |k179Quqpk7S;pF1SLDp*[ɸ* ޳n%F>9q ܙ,i7Q Aa2zv+B)oZ$ Oz@AWk&[@kWyUrZIO8a sZɼ<: -:=O[+4DItZϽe<ހzJ(& ПluPYmbR`vȫHɌggScҖTT $ z%RQN=ZX1'qz^ 9ضwg;O=qZR*6 `sZ 40Qŕ:ּ0njdDŊJs^AD@ sTNYsһ/ BŎ-yȮEFLkKd'Fzc1LfUXgG<󊀐 #=@*6pl:~ͱ$\ Fyk[gp ~֥JJ 9?@sˉrsy|RczlAh : n #~w\h2 <צ_ZF\d3ޫ2򳝞sRd0PNI'FG<~t7D_LÎVE+8s15#GܢBHۻi܎>A'GbݺumHqطYP4r>d<9J3@T\dҶHpqBHeY X8$Z%pbGqi,vOoR9(T@1>ǧ=2E$^Ab;2w`oPA϶3n3~Pr*saq 1PCDǮˑ3nN(Gb 3p6<Ƕp?~ve7$` 0qԎ TyWfF+0}qzG/uŻzy>v5Uc⺹SrP\x|ێa\nSqELNԫHA꣡8`Aj\$NAG5E2FؘlwZcfgqbfc1ߨ𦌳f3Qa<pG=8\T@!z n{z9s(\: :Pp2s֦y\.cpGPS b#y5!qVC(U%wx8py皶r8$ag2x0=OqXTF - >8h6܇fϛ$ jVДB73N1EpqU{c#Wv10 q?JgHǿo@)#;vC a8<}?, Pzǵ#*ÒH$H- n`Gn?P ֵ;223F2;ȹ(ʀG~}|{Ri*:yvOo@:nyN=)eeB~c8o0Z-$:=֟99juv1N$N?"?t*hvX)=p *cI< %#?>eUABArq&f dМ}NNpiVPJCrq^t =ӊ:A=pIg9c'" Gps'ڣ)_D.A'fPF:FOjAwsm]TE|4]L-v7U?7Ua6nV>@Fc)ޑK 3AzqAxpzy<X %I98~U$/#95,3 |Ǹ&_GaC@O08?>c~`9n1Z" yԓ o뎽E p[8jó(#}mHh98<,I'\n9M DŽʐA~kW:URVTz+P$*Όۯ^޿}# ֩ۼl pAJzfA<09~J0P@;qҸًE<ۆ 8*=\/) 3F?5 G$~ֈf 8ӎU[F!Q@9R>W2OL؎ F*A=cc^Njv7`aǷ֘@-ڴ`vu?k$>ŲOBqמyVżhbS͑b0 `g<A]˓=sF H6liȠ^y"+psӥaͷrs< r gu=}\@#~r dt}{H7"wc#cGr6*Tcv" vNVA՗!yIQpySX'%^zzAgP śv2y(\'*1Edgߘq#ӭZ 6@Ͽ= R˴ | n^g> Pn3xZ`ZYA_(.2244p ?75HX zx F#' ̣$uoQsŀ@ T!J l>MMlF܁=HyZ Svܩ99U-eژU;=8Wݷ>P{r@ҰTN@ap=9@I `sڮJ8 9U؂y$ gMMFT=F~8ٗ$|x \$lw#lT.!OJ9FWZ33R,xSkp0;sڠ&ҭNr5 7xn}*&+`2zЏhu|RsS?0>T:׷0 zz{z8|ǩ1ץ$R#iLp*9 ?H͝`?D_q׽=18{Ept\eտnS'WVP c#+fWHjZY0bHŎ=?>5 ?҈B>N?Cl%nҰ5h *OA&`n޾_w1xOi[0p[fO[<+2# /m>^qZ<1T&GWxiæ8Cr=94ҟ&gcӜ@\&zof0I= N1֦ ;=NYf1`On߀ZQPwA<zHG#Ozc*!INN֪Kr!!DjFT) Fu{pHC22ILFy8 x=V6\,ӧ䁜{0 x?H[7*ib>q"! S'*'ia֣ 1oF=:c8D A3׃Ϩ>B~OPld y9W߱>/}~ڐ^-M|?&vR:?|Chxgh@?s^^qG/ y}fI!E*s]φخY ]2&a=qTiƒg\Q»`\F&ЕYu>jikRn.Vկ秭sGt!cx^fLqU>uJE zTa3RXG47@@29w#`y,ާv:)E,$`۞jLxW$zzpaM4Bh~0ZB ^D. MM7˰g"- o#h`XnFӑOilFU~b Xm`@wI:}zq,#gv9 qjZvʑdn =k5W4e8DJ&Gy77ÏʲqDʯ:>J c 9#3^tBp+k#u%E]6}? Җd1,rvTr,r<`׎i†pr1>*6b*C 0hG1BET'jgi`N mXڬC(;}s83y9yԩ U'?JsGd.8Xq}_eO.ހ'X 0*99g[ޭ7^zzER9^yXӁ Ex|88;+E&=r>޹}J6?)9$/|gI__'~e,mV˂FOUd,vcH'cêH $}z5-H贲m2 px#=[ 0\G?qYZ\#;O'{qVʐl c=T"LG=zޢAoA@+9'9)e*88#9wHJ!F;s1d#nv9'w=M" Uw&NvׯJd)F SYC=3s֤ GoSW(Wf,OF8OlTLb]Ys*Ԫ>eF28't8AqPэw #fI휏?ưXD#i.>~:]MœJSF3V*H#bH'ғEew'hnI#~%ۮ+"{Ҭ[cvs0:|@k 9V۴AO=iYt~4l!g:𧢃!߂rH3^x#&LtVcc+c׶kI.V;S3Bv:OX(r2U6 >5Q(zNpy5+Idu+8?GEշ$܍ 8.άA1«1w#=#c Ԝ4 0 bORKJ-L}kHY bA<}z5JB0H3fE@ی5pIf;Lsܚp#xh`N9fY n鷷j 'ϨxR+ nFs,JIzg?v9tSv  & RrܒOLo\s yOj ?l"/x'# IZ>{ch Dv'f03NysL]`|3x1㏽*<}ppA=}OrMI̲('u#$9<=P /یzY[ˉyCVX nu9Rl+t ǥKnV8(nsQF2O<$Wl}I

)Tlds}Hۻuppx;F8?Q1ayP3]Pwǡ"b<ߑ1 4>qpQW+@,q7t1؎?c@y|==#8u#!v}pA('a=ii\Cd۷#8L;dn^,QYÀF: gҹ]F(ᙌ`z`q׏`Q7N{Q% beq+q냑Q++eqӦ~&@O<[T$ϯ^,ysy+ xkP'R9PhޤIO~G_Zp. NO8-=jQ +f/ 9;z/$ BKc5ǘR(.V2?(,洺S8|}JIh++X? 6Lck@0G``ʏs4t\LTk1B8ִP9y% z$_hq-qbդiKkuxzl_%?,iYz2PQ~RX)1S4X289 @䜏zvDy =8Zoz}cx-dg烞Zo" qw('<qyV톞yb㫌;XEZ s]+i+-KG)0.p}jXpFۀzұjd0CnR})&fUd8*@Čqӥ[hE a:PDF9;~7McN}?ҎQpA۷a`zgzɖ_$[Y;FpG^OK#GP{U+/ڻrF1C$ojц3(0P 8=2i~@Ucp֯*PeYI89#[6)rF8>?7; BG8<OqL.WovNqTc_$XvR+d'<ۜ3׵y7*%2[`uHʈ! #=1ךŅry1\6ƕ9>zULzyeX$swQkqgy3z֞L8عR_֠| 6 }VΑWBr`=֨ $(;ڻNy' 3N:gE Glr{8?HP<= cl C_PH9Ioe_W79Ğ}+˲\1ppGQ!ل˄npp1\mFc8#=I|]XF \}pGr`eޔ4 N8vmiܬ |]+p}ݸ8Ƕ{\Vfk"@w3XI ネc8]\1˨Np:S6H<`qv=kA>QЁ@$P $1sZQ[7RL19})^*U@^8ϡ#DLxSkDm鑒ՄpHR$};nYK&}ߔey8n:S~]l`%Fqqo jeP ۓm9ߧ=U%B*ns9#+2MV98 Z0 #'w}qZqFw LqF0(a$c38v ¯$u(܆;|Q@**0@$zdz4}1gy1Wx;OnLxIR+g+?#`]=h2n@3&p|A'~Nq>`zV%:c֝h00y9u͹N3mncOxG5o"2>#*2 `h yﲂ(xF@|m;֤yÒ3s~4a9/bMW<+<ǥR݋X zEr'oN(M- ^(erN11YbQ5P1{}\*. 篾?@QϽ j@~`{:4I$a#3YFs!P#je )Fy#Ӿyj$ u8W0 ,su'$|@6xBi nPC| Z|aP^1Pլ-ct"{r3ԁ|TlH<;Yrx$z:H~Q1Iq\d OZPs¶Ӏ1(,; s4NQc:А0ܛ8R9RENZX+O֫ڽ?T):<6}%f1Nz3($68LA=} tQvq `0z瞣=T۷cvJ̪H=O֘0aГ\PYHS%} HpL񓃞7H <"NO#tXU=zyLUIH3HFlqRap z U^7u<;*-rO7^FNq)&]t` 1cOžl8SP/q,x<_LdEI P 60ׂOz3Xڌ{4j:sϡąWz^hˁ|cN-ǫ]SN ۜpxEaOnR\/ngsڬ\2͝\uQn#3'Jd@nggTF 0 xێ0b18w׊#ansϯ(8O|Z_~=#B|qJ %Ò2A<ܜ9=G4PO'(p@!}1= nNLr䁐Aq&nL-_E(]CI WrH$)3i4q T! CR;d+/$?jr pO8@ Y gIOqQ,!$YNAxݪԫa zqUCN2p9#i5r~~̿Ɵ 4HɛQk:y;g}jKy ֿcoK]xMYO4<$`d}TWp[s_}fy}$Onʄm"׷i <~Fԓ{|\QGN s.|@V/o,mww^_IӦ_RzjD)Eκ|y/Ol?{ia)広6CRJ'E%\]G*~5:"zSSsVhRFa\r~\ ɜ%ޤ9 H`OZŒtfiZy 'z{YEffR8ޡ2 $, xW"c5kE9II;#zԊ[›bFr=4r; gǷB90@RHsOʙI #?w9 c<]eWRp$φzU#g^ 31cqӽV|O͌㜌1ڐg^06 8b1X9=:~=kvߵ{ sz 1s8z 3 2(rj7+`OYĘP H:d|8<ހ:8E:p1gnp'oN}9g!ǰp$MAKgsC֠C 1uӌVdpW=p7ghzGNJ単|^vO{;rc'5䳁ԅ޵?`c /}z`| # 9#8=X Λ6X㌌): Δcnx~_^{N9ݞۧj>RJBs}( k%mQ0FFrp9$ju  >%x#NAi@s~#Y $/Չ?w?Yd8=8?ʵ.K!Oq=+6e v$~nA =֫\y2;s ۊXq.=q?<#Ӂ(UAyϡ95 mѐBciO2~MHcW!*s;ғϦ}*cBv9'Ҙ鳃 gcU\9┸TGBO^Td (=sucW'i0Hgr8$v 'zJ>3CQJ'>`A+P~nGzk`|$~eIS܏zyc2 gOoSHX~lpq?՘#*AdR 80A?֘pGP1V6wd;;$l26<~5-yNYq?|xןZ.nvqҹig^sݾE'8lb~aOljlY w;u'=E(ĂF2Xt$zP62np1I8\p0 >Y9brsoʗ9mʤ~PsGms Ԏ,%⁤Fq\a3Y1$pprx$1젞ĞvNq:th/zR`MуuǸjOlGʿ >kCþ?u I&ӏS ~Z~lGr$;6}6CVG[Jvq)qOOzn{T ;䞽^%fmL׎xF- %H+u)6!;׉7״kmI.N2WOS-t: x@qQ_of[n1>{օ"Xqӽamjc N3o-g$d[Lַk3+fgz:ϴ: #? Nd72qޮrTpqve[<`zw_0b!v=u[9vaj[(_=Gz il*f 4FG;鞙xTdPhd޻sRDn݀LV~6:28=rQK9?EdBN{~Q6ZHcp$Ji PHO8dFMy׋E<6`l= #ϥz *BtT|6ksDy@9R%R^I+׼!gipcuL*_B=5 Ηm XYW^B )X"ڌWT4ʻqr8ԓ]&-#>%=cAުD >T҂cؾw}J97;ps3LqᜁW=ڥ!ng`qRx6.q:x׭lYէQ=Ҩ\2@$v c=]bÁ`u$瞂n|'<~l8d1Ÿ|=9^DtQ(8= $DL7@WшcӮx&4qH6^K{(V?tI#SZ:/Nr޸皧dURvsY(`1;*JCr ۚ܇ikN'TɂW$Ll(#ELl .on@= PEXzF?h&@P|)_'S/B8ާ$oB&l rG˟ށܲ H9'v>0PI/8͌}xw|xrF1; q`29n*0Y_#+`OJ ̭[ '[)077>m\F>QFsX*NFNZ`1;I2A<h(Y38gz7YF=O= im.3Ɗ{n1>(q]ĠaWǶ2?ɔ =^QL&Žc":*{VM"KTAjBF^ܧ{zfw/,IO H 1O_zo//\t OP7;="ReqwGl{gޮ!a `{ީ[wg޴d|FU!x zSSg:5w8`@<O9ڢg8?0'׸xǥ f xNO&ecAx`җq;mǐX`o4w_JLձjdlcY8 ^+T6vzL{zUY\Pdܒx@=:uV`9$4鴕*ArA'8sRn@ pxEErNz +.7=r??Δr~1ʬ 8nXcPȸ ^5C4l8>Nh%C=b;j{F3pJ~vnO s玴(>U*QNz~d6Iwz?Y@N#zwLAe'Nzvv\cҤ'9aS .֝B\vB* 6ݩ\Xw\`dFTc?_)-iTǷrzqȮ:}sq\G93Qi0I#88=km@$gVV30䑜q{VҤ!PH<=:ՈN*7O9V` 2zgNHc$sǠjP@=qtPd6H<\:ԡ9d6N9#QNx?is0\O=:<}j,&V{ =sJx$`\6A =s߁MX>SзRE ۆpI>L d;g\zvgui^HSLfwe{ a-吀9R@r=sx! NqOΫ)EJ2`znkX t̏Â[e$ H8%a mo1sgnz!n`у;WA!`;? u;K0zc<~UBq=MßO, r:0Q@{S۲`7cjlju0_,p q.\pOl?y3_񾙥;l`zU\4=VzG_%X_*cc֢t T #{|5ɦ"Efғ{3Ԑ*޴ܓuua#)V,P=k7hG(tƑIpvI >P}*ֹ=v5T[?cV iNsA&¾b Tc`ﻜp>r,; Asr# aO8G^wop^" =< V=xUAo81V傹 1'~Qښw' sG-*y1a;zLd0c+<_5ִбܰ (#TuՖӎ3ĩ$6'ftg|X0nSGyeKeߘ^ˣ#JJ5C0 7 $VT\q 9d%1c 0xǯjw 9{>׋le qY3[S!O=*)6);F3\t8sI רd|aqe &6ugF*/drP:R@8==A/ČReWb͟OoC׷^MČobW׿=J#Hoc IaF34B֩9v[3 AV+8קҺ)w$b%I!=Y@Ed=TFmn 23q8*FΧ8z˸x3z&p˓q] (HےOr=+R[r1j$]q2w tklgsb{7I`rGN}ues>V'Wk#jHCr g*`s w$0{,U`cy>>\RVB ހIB챧 y՝ͱF:=:~ @1ҁ܅F>c9MsН;'C78=jRNь~j^zig{mqeqӓOQȠ =j7~TsR\;M( %z=)4@0ay zFw0qҘcepvz?JUjrN=:t ˜tsPˆ϶>~u3 1a~'LGw*)lu2hIZ9>\p$7?ҚQtI'cMullu ُ'sP ש)93p۔qٿoK$zvȣ$ {> } =O*[}ўÁӶ{#A!|3ד=}2>zR6 ;uޕm$F;`׸<vgOhƒy?˿BJ 3ZMR9F9֐s$=< I'9>:zJ9m®s^^?:޽ N“{ t7nǺt5,α.8.VL9o="-W';xpj񁓟9 #d.#gԮW#US8)ev { fxd\*pJWO9<}+  $=953|q'֋'U9'F3cq :R#32TWZ"g$Ǯx?j "DB8GJ{R3,ĕP9=ǧRȬ݌ N:@*ps5!2͍8#|t*w)܀Ҭ?ez As֝RF8=3AB K ?N) ex)W'{֤g84\a 8}zҰTmFђy8}Joi8{ S!4a?0a?{ 00pϡʍ3r d䞜jq#xTXeF|8!H$:=Zw`8˟?ځ[ wyq1jҢyĜלw=15ry昦P :W|ozVa3P]%3u OZ>l." o^Q8C .ԧ&:nme9FG9#ھԚHU$9n0O9|2sY{кAFGs^RkX;d^ CǧNƾ3G>!ZzmN2׾3\mrwm^Ztˑʤc$uϿj{Ʋj0S' 9"WLQ6f N~fOJ+Ffc!z*,!8Sc#.I#?H@;TGz ƪIlz3:ߟ-y?w_[mXTNY/` g=A+/Yz1lZHo-V/_ճc^fu_εm}ƻYi+HHҺ>=+dggq> cl~R̫ncY#?7ׁ^$YO'uoU3BOECZgA r q+mDHryr3yVWC?df d:Pdz[3'`G89ϩoO4ǣO3$j|s:qyX*1qk/mBHYFSyV=!cA5r_M n:9zWc9\ˎ]}?O\~5f7|2Y 7N3ץt\HW2  ϭs~t#[?O`K =y<`~5$qC?ǚɃgkH C-ľsID-N=}&]Pp:__#jt# ѐ0[ay&L9#S|uʩ[bN𽳓j$0@NTm_ /300>^N*]d*}O Z X7}0jENqns=YMi"®Q@8~RW^ 1fۿ>0oV`=OO'`@eo,>mʡZ?3  ӷ<, 1 `/5/A4E cRٻ9?O7Y>dP;~IcfPNxIW?Fq,اy8Yryi! ?AC(;׹b Tp1˞U?\Z uf?.VNO=8OUVJ]3=j28̧  c}GYb]QN@>$y8@3L4T1?_f9C?wv?#J 2_SqQ\Eݦ'?_hU/ڝA;zcqvo+x{"EEnh9\q01uj?u_?:T*UAE/ۯ SgԭhۻߑlS!H#Jkt/bT: 5~mĞ9|zT5#VP-'֐lc=1ۂjI~_O܏4 ªR_瓏j2w''nOӃGGȿ{)i#5%yV+vZ/HZTr˹HTx qIi:_ Lm'8A8WJJG WA=+_YZmy NF7sډW8;G=q>XOG+2D_`d}y(ݻ:CM}?jU_jۺq#s?Z;I*mHV[Nsd.ZGUүoOQk*'׽x_^ACPANSA-DB-20250304.001/images/briandfoypoboxcom-gpg-key-selfie.jpeg.gpg0000644000076500000240000000150114761613003023700 0ustar brianstaff-----BEGIN PGP SIGNATURE----- iQIzBAABCAAdFiEEhn1TsI5DPfQBoG70mpwP5/ZIdr8FAmK6Jr4ACgkQmpwP5/ZI dr9Sgw//bv/PWvriREjEDs9ZXL6V7i8nWKkLRGFn430woPLqqrKvaWCWSsDX+zP0 R5FToIUyybZY3ro8Abw3FsjDyBV7Ifc8T00s7Ko4AYA1wH6HyIjkaiiwsWbpHhGf U+Usi9MEu5syk3cvodtbPWr+SuC2FvYoffxG1pPhVqgnL0yJabZXVixxBw86h/SR g4ztHwHSzgVH6xHNciN1eyAFtnzyf7SyVPIxIqkwIHqORNww9CZOT9WxGEsEBNAY q5CLqD8mp0hP5Sq0hvpy+ZMOCZ5zg3HbfTSEyWqT/UDVjuD2tYHKsLWZSXrYaKHY OCngj3KIM7VWbE3ox2+h54NLrzUOT+eTGJcUpb4A+w9h90VSk8KIsOgtqy7XQeAS JDLrG7w7sDsCELJzzZ5l+rfgOuuOq2PHT6nCZmPHu29Gdy8r5LMdb8/ATWn1AkWq T9nvUvTKhJ5+yZrCAvNuYUYJrEs+QivvVLNf+ZWiYw40v1ahOMdgNiF66vN6ioAY yQTsd2t7aiwfzgbAZv1LBLYtAUl0/p67C09hHITEs8oooqT5PKlnXq8IJZlNoPyf IAbEHxY3Hzbmist6wvbA9UVn4tqFfy4y6vTH/NONWSxUYdcUQtdVbjlo/TuHFu8q e/vZajPtDVNRLqh6phGC7V6f3qCwfkg9A/P//nPtmNNh/ZBAX6g= =XQ9B -----END PGP SIGNATURE----- CPANSA-DB-20250304.001/images/bdfoycpanorg-gpg-key-selfie.jpeg.gpg0000644000076500000240000000150114761613003022631 0ustar brianstaff-----BEGIN PGP SIGNATURE----- iQIzBAABCAAdFiEEdaq0LLoNfzfw1oht+D+NXoeLYEEFAmK6JtsACgkQ+D+NXoeL YEEl8w/9EPo1UEPYB7cHhxAnAx9tP8Efui+6ZavTyx74fKXc3cT9xBwD92K5zKaJ kenTzqvYFLSANN/unNZ7tzS0BxR3fTI5S85fP13qSuM6FwEpw/eeF4nfh0Fp1KvM sZ1ht4vVgwjPWuPz2r3MuxhLeA2btIKWe0VGjgRoFtmAvakJHL1hK3P+8OqIcLKM s6/Sq8mDM2vj817okNpm2lmUOgia8Q90KDTHwCeSdSbVQgnz5f7M9UiyXTSvd7EE LxRhnoPbixZL9PyvXKdBu2E/jdv0fV8CtsUXhOlyxgtHb8PnNhrrwW1zC78dbf7G +Oz2PMfJtTXgc6sv25PFHN/Smk2hxDYTFYQ5JsAg3rMYBVCV7pc7C3f/wBQVdxti c1I62Be+1ZuPMFtPe8VqDaFEwuVFVGiXzxJJAMPgOYIEcSiHtMdywpNzRpgOJ34a JG+tILREi9C8zV621LgyfsaywiPA97x17/deEQZbjWvjat4xfhB29XJRQIA6dREg BIUVwINV2TAPTFTp4WS05zsIRz+tl+ySKeq/vUdwpxAeKRp8SpNIT+bDleSfHb7n DEdXMtjhRiT8cLVTuMK2uJ4jOJER+7+JNt1WMqlXuJu/eBAnnNMtq9BGeYzNHCK9 9QGmmIqcV1mfhnpkF/V1WjITTp/eyZJfPWAk6D1zsYrfLsCuJg8= =0pLH -----END PGP SIGNATURE----- CPANSA-DB-20250304.001/Changes0000644000076500000240000000464514761613003013765 0ustar brianstaff# Changes for CPANSA::DB 20250304.001 2025-03-04T15:02:27Z * data update for 2025-03-04 * version data for modules now includes version that only show up in perl core (dual-lived versions not on CPAN) (GitHub #190) 20250206.001 2025-02-06T05:41:55Z * data update 20250125.001 2025-01-25T16:16:57Z * data update for 2025-01-05 * Crypt::Primes 0.52 fixes its report (#189) 20250109.001 2025-01-10T04:38:37Z * data update for 2025-01-09 20250104.001 2025-01-04T17:10:28Z * data update * CVE-2025-22376 for Net::OAuth 20250103.002 2025-01-03T12:56:48Z * data update for DBD::SQLite for CVE-2006-6153 20250103.001 2025-01-03T06:30:10Z * data update 20250102.001 2025-01-02T19:54:21Z * data update * CVEs assigned for Net::EasyTCP 20241231.001 2024-12-31T16:40:38Z * data update for 2024-12-31 * CVE-2006-0053 for Imager * CVE-2020-36827 for XAO::Web 20241229.001 2024-12-30T23:31:49Z * data update * Adds reports for Crypt::Prime, Crypt::Random, and EasyTCP 20241227.001 2024-12-28T03:47:58Z * data update * new report for Crypt::Random::Source (#179) 20241218.005 2024-12-19T01:22:10Z * Add report for App::Genpass (#178) * regenerate data 20241208.003 2024-12-08T21:47:48Z * data update for 2024-12-08 20241203.001 2024-12-04T02:20:11Z * data update for 2024-12-03 20241126.001 2024-11-26T23:05:31Z * data update * the stuff using Data::Rx moves to xt/, which is not distributed (#172) 20241125.001 2024-11-25T20:15:46Z * data update 20241122.009 2024-11-22T14:33:57Z * fix the GPG signatures 20241122.003 2024-11-22T12:34:01Z * fix meta data, that had done stupid date things 20241121.002 2024-11-21T21:18:26Z * data update for 2024-11-21 * includes CVE-2024-10224 for Module::ScanDeps (#170) * Pod broken out to separate files since MetaCPAN doesn't like large files 20241118.002 2024-11-18T16:01:32Z * Remove Mojo::Util as a pre-requisite (#168) 20241118.001 2024-11-18T15:48:04Z * Regenerate dist to fix some metadata issues (#169) 20241117.003 2024-11-17T21:06:07Z * test release 20241117.002 2024-11-17T21:01:42Z * test release 20241117.001 2024-11-17T20:14:34Z * initial release. This breaks out the data portion of CPAN::Audit into a separate dist that can be updated independently. This maintains the CPAN::Audit::DB module (for now), creates a new module CPANSA::DB to replace it evenutally, and also distributes a JSON version of the database for people who want to use it without CPAN::Audit. CPANSA-DB-20250304.001/cpan-security-advisory.json0000644000076500000240000504127014761613003020011 0ustar brianstaff{"module2dist":{"MySQL::Admin::Settings":"MySQL-Admin","Dancer::Cookies":"Dancer","Jifty::Plugin::Authentication::Password::View":"Jifty","Apache::Wyrd::Bot":"Apache-Wyrd","Mojolicious::Plugin::DefaultHelpers":"Mojolicious","B::Deparse":"perl","XAO::DO::Web::Cookie":"XAO-Web","Apache::Wyrd::LogDump":"Apache-Wyrd","Apache::MP3::L10N::nl_be":"Apache-MP3","Crypt::Perl::X509::Extension::tlsFeature":"Crypt-Perl","Plack::Server::ServerSimple":"Plack","Tk::X":"Tk","ExtUtils::MakeMaker::version::vpp":"ExtUtils-MakeMaker","Spreadsheet::ParseExcel::SaveParser::Workbook":"Spreadsheet-ParseExcel","Crypt::Digest::SHA3_256":"CryptX","Encode::Symbol":"Encode","Crypt::Mac::Pelican":"CryptX","Lemonldap::NG::Portal::Plugins::CertificateResetByMail":"Lemonldap-NG-Portal","Crypt::Perl::X509::Extension::acmeValidation_v1":"Crypt-Perl","Jifty::Collection":"Jifty","Mail::Audit::MAPS":"Mail-Audit","Tk::Mwm":"Tk","DBD::Mem::db":"DBI","Valiant::HTML::Util::Pager":"Valiant","XAO::DO::Web::Utility":"XAO-Web","Image::ExifTool::CanonVRD":"Image-ExifTool","Image::ExifTool::Sanyo":"Image-ExifTool","Lemonldap::NG::Portal::Plugins::TrustedBrowser":"Lemonldap-NG-Portal","Tk::Text":"Tk","Bio::Graphics::Browser2::RemoteSet":"GBrowse","Dancer::ModuleLoader":"Dancer","Elive::View::Session":"Elive","Jifty::DBI::Filter::utf8":"Jifty-DBI","Image::ExifTool::Microsoft":"Image-ExifTool","CPAN::Bundle":"CPAN","Crypt::Random::Provider::File":"Crypt-Random","Net::OAuth::SignatureMethod::HMAC_SHA256":"Net-OAuth","XAO::DO::Web::Clipboard":"XAO-Web","Pinto::Remote::Action::Add":"Pinto","Image::ExifTool::Scalado":"Image-ExifTool","Image::ExifTool::ICC_Profile":"Image-ExifTool","Catalyst::ActionChain":"Catalyst-Runtime","Image::ExifTool::GeoTiff":"Image-ExifTool","Lemonldap::NG::Portal::Password::Null":"Lemonldap-NG-Portal","Apache::Wyrd::Datum":"Apache-Wyrd","MIME::WordDecoder::UTF_8":"MIME-tools","Valiant::Errors":"Valiant","PApp::XML::Template":"PApp","App::CallDispatcher":"App-Context","Net::DNS::RR::SMIMEA":"Net-DNS","yaml_mapping":"YAML","MHonArc::CharEnt::EUC_JP":"MHonArc","Jifty::Plugin::PubSub::Connection":"Jifty","Spoon::Template::TT2":"Spoon","MojoMojo::Formatter::File::Image":"MojoMojo","Imager::Expr":"Imager","CGI::Session::Driver::sqlite":"CGI-Session","Apache::Session::Browseable::PgHstore":"Apache-Session-Browseable","Encode::Byte":"Encode","ModPerl::RegistryPrefork":"mod_perl","Jifty::Plugin::Compat::CGI":"Jifty","Lemonldap::NG::Portal::Captcha::ReCaptcha3":"Lemonldap-NG-Portal","Image::ExifTool::VCard":"Image-ExifTool","Image::ExifTool::Opus":"Image-ExifTool","Log::Any::Adapter::Stderr":"Log-Any","VMS::DCLsym":"perl","Plack::Middleware::BufferedStreaming":"Plack","Perlbal::Plugin::Include":"Perlbal","Lemonldap::NG::Portal::Main::Auth":"Lemonldap-NG-Portal","Jifty::DBI::Handle":"Jifty-DBI","Image::ExifTool::PhotoCD":"Image-ExifTool","Dancer::Continuation::Halted":"Dancer","Plack::Server::Standalone":"Plack","LWP::Protocol::ldapi":"perl-ldap","Catalyst::Middleware::Stash":"Catalyst-Runtime","Lemonldap::NG::Portal::Auth::CAS":"Lemonldap-NG-Portal","ModPerl::BuildOptions":"mod_perl","ExtUtils::MY":"ExtUtils-MakeMaker","Plack::Loader":"Plack","Mail::Mailer::sendmail":"MailTools","Jifty::DBI::Filter::Boolean":"Jifty-DBI","Net::Server::Proto":"Net-Server","Net::DNS::RR::OPENPGPKEY":"Net-DNS","Imager::Regops":"Imager","Hash::Util":"perl","Dancer::Serializer::XML":"Dancer","Valiant":"Valiant","Devel::PatchPerl::Plugin::Asan":"App-perlall","Apache::MP3":"Apache-MP3","App::Context::POE::ClusterController":"App-Context","Image::ExifTool::InfiRay":"Image-ExifTool","Apache2::XSLoader":"mod_perl","Mojo::Server::Morbo::Backend::Poll":"Mojolicious","Image::ExifTool::AAC":"Image-ExifTool","Mojo::Message":"Mojolicious","Elive::Entity::Preload":"Elive","Mojo::Cookie::Response":"Mojolicious","Mojolicious::Routes::Pattern":"Mojolicious","Dpkg::BuildTypes":"Dpkg","LWP::Protocol::ldap":"perl-ldap","Locale::Maketext::Guts":"Locale-Maketext","Kelp::Routes":"Kelp","CGI::Application":"CGI-Application","Plack::Middleware::Runtime":"Plack","Crypt::PK::DH":"CryptX","Catalyst::Action::Serialize::Callback":"Catalyst-Action-REST","ExtUtils::Liblist::Kid":"ExtUtils-MakeMaker","Bio::DB::GFF::Aggregator::reftranscript":"GBrowse","Mojolicious::Routes::Match":"Mojolicious","Net::DNS::RR::CDNSKEY":"Net-DNS","Net::Server::TiedHandle":"Net-Server","MojoMojo::Formatter::Dir":"MojoMojo","Config::Model::Dumper":"Config-Model","Mojolicious::Command::Author::generate::lite_app":"Mojolicious","Apache::Constants::Exports":"mod_perl","Pinto::Action::Stacks":"Pinto","DBD::DBM::st":"DBI","DBI::DBD::SqlEngine::dr":"DBI","Net::LDAP::Control::SyncRequest":"perl-ldap","Image::ExifTool::BigTIFF":"Image-ExifTool","XML::Atom::Feed":"XML-Atom","Clipboard::Win32":"Clipboard","Dpkg::Vendor::Debian":"Dpkg","XML::Twig::Notation":"XML-Twig","Tk::ColorEditor":"Tk","Plack::Test":"Plack","MHonArc::UTF8::CP1250":"MHonArc","Catalyst::View":"Catalyst-Runtime","Kelp::Module::Config::Null":"Kelp","Digest::base":"Digest","Lemonldap::NG::Portal::Plugins::RESTServer":"Lemonldap-NG-Portal","Lemonldap::NG::Portal::Main::Issuer":"Lemonldap-NG-Portal","Lemonldap::NG::Portal::Plugins::Register":"Lemonldap-NG-Portal","DBD::File::Statement":"DBI","MojoMojo::Schema::Result::RoleMember":"MojoMojo","XML::LibXML::Common":"XML-LibXML","File::Spec::OS2":"PathTools","Net::Server::PreForkSimple":"Net-Server","Dancer::Session::Simple":"Dancer","MHonArc::CharEnt::KOI_0":"MHonArc","yaml_scalar":"YAML","Graphics::ColorNames::X":"Graphics-ColorNames","Apache::MP3::L10N::fi":"Apache-MP3","Pinto::IndexReader":"Pinto","Valiant::Validator::Absence":"Valiant","Galileo::Command::dump":"Galileo","POE::Component::IRC::Plugin::Console":"POE-Component-IRC","Image::ExifTool::NikonCustom":"Image-ExifTool","Image::ExifTool::QuickTime":"Image-ExifTool","Jifty::Plugin::I18N":"Jifty","HTTP::Tiny::NoProxy":"Dancer","Encode::JP::JIS7":"Encode","PApp::Config":"PApp","DBIx::Class::Valiant::Validator::ResultSet":"Valiant","Plack::Server::CGI":"Plack","Tie::ExtraHash":"perl","Spoon::ContentObject":"Spoon","Plack::Recursive::ForwardRequest":"Plack","Clipboard::Xsel":"Clipboard","DBM_Filter::int32":"perl","Lemonldap::NG::Portal::Main":"Lemonldap-NG-Portal","MailTools":"MailTools","Crypt::Perl::PKCS10::Attribute":"Crypt-Perl","Tk::ColorSelect":"Tk","Fcntl":"perl","PApp::XML::Pod2xml":"PApp","Devel::PPPort":"Devel-PPPort","DBI::Gofer::Execute":"DBI","Net::LDAP::Entry":"perl-ldap","Plack::Session":"Plack-Middleware-Session","Dancer::Session::Abstract":"Dancer","MojoMojo::Formatter::Defang":"MojoMojo","File::Spec::AmigaOS":"PathTools","Net::Server::INET":"Net-Server","Plack::Request::Upload":"Plack","Mojolicious::Command::generate::plugin":"Mojolicious","Jifty::Server":"Jifty","ExtUtils::Mkbootstrap":"ExtUtils-MakeMaker","Spreadsheet::ParseExcel::FmtUnicode":"Spreadsheet-ParseExcel","Apache2::Filter":"mod_perl","Dancer::Request::Upload":"Dancer","Mojolicious::Command::daemon":"Mojolicious","File::Spec::Mac":"PathTools","FCGI::Stream":"FCGI","Image::ExifTool::LIF":"Image-ExifTool","CPAN::FTP":"CPAN","APR::Base64":"mod_perl","Net::LDAP::Intermediate::SyncInfo":"perl-ldap","OS2::DLL::dll":"perl","Mojolicious::Command::prefork":"Mojolicious","Dancer::Session::YAML":"Dancer","Image::ExifTool::Lang::es":"Image-ExifTool","Net::DNS::RR::SPF":"Net-DNS","Image::ExifTool::Geotag":"Image-ExifTool","MojoMojo::Formatter::RSS":"MojoMojo","Imager::Font::Image":"Imager","MHonArc::UTF8::CP1252":"MHonArc","Image::ExifTool::Lang::ja":"Image-ExifTool","CGI::Application::Dispatch::Regexp":"CGI-Application-Dispatch","Plack::Middleware::ContentMD5":"Plack","Plack::Middleware::RearrangeHeaders":"Plack","Crypt::Perl::ECDSA::ECParameters":"Crypt-Perl","Pod::Perldoc::ToXml":"Pod-Perldoc","Dancer::Logger::Capture::Trap":"Dancer","User::grent":"perl","Mojo::Exception::_Guard":"Mojolicious","Dancer::Continuation::Route::Passed":"Dancer","Crypt::Perl::PKCS10":"Crypt-Perl","Jifty::Param":"Jifty","Dancer::Engine":"Dancer","IO::Uncompress::RawInflate":"IO-Compress","I18N::LangTags::List":"perl","YAML::Type::glob":"YAML","Encode::EBCDIC":"Encode","JNI":"perl","Net::DNS::DomainName2535":"Net-DNS","MIME::WordDecoder":"MIME-tools","mro":"perl","Plack::Loader::Restarter":"Plack","App::Pinto":"Pinto","Jifty::Web::Session":"Jifty","File::Spec::Win32":"PathTools","DBI::Gofer::Transport::pipeone":"DBI","XML::Atom::Entry":"XML-Atom","Image::ExifTool::Ogg":"Image-ExifTool","Valiant::Validator::Numericality":"Valiant","Thread::Signal":"perl","Jifty::Web::Form::Field::Combobox":"Jifty","App::MessageDispatcher":"App-Context","Crypt::DSA::Key":"Crypt-DSA","CGI::Session::DB_File":"CGI-Session","Jifty::View::Declare::Helpers":"Jifty","UI::Dialog":"UI-Dialog","DBD::SQLite::VirtualTable::PerlData":"DBD-SQLite","Valiant::Filter::Title":"Valiant","Tk::Trace":"Tk","Galileo::Page":"Galileo","Archive::Zip::MockFileHandle":"Archive-Zip","Crypt::Digest::RIPEMD160":"CryptX","Lemonldap::NG::Portal::2F::Register::Generic":"Lemonldap-NG-Portal","ExtUtils::Typemaps::Type":"ExtUtils-ParseXS","Plack::Middleware::Log4perl":"Plack","POE::Component::IRC::Plugin::CycleEmpty":"POE-Component-IRC","Jifty::Action::Record::Create":"Jifty","Crypt::Digest::SHA256":"CryptX","Plack::MIME":"Plack","YAML::XS::LibYAML":"YAML-LibYAML","CPAN::Distroprefs::Result::Fatal":"CPAN","Mojo::HelloWorld":"Mojolicious","RPC::XML::request":"RPC-XML","Mojolicious::Command::get":"Mojolicious","MHonArc::CharEnt::CP866":"MHonArc","Crypt::Perl::X::UnknownHash":"Crypt-Perl","Lemonldap::NG::Portal::Plugins::MailPasswordReset":"Lemonldap-NG-Portal","Net::LDAP::Control::PostRead":"perl-ldap","Pinto::Schema::Result::Prerequisite":"Pinto","Convert::UUlib":"Convert-UUlib","Lemonldap::NG::Portal::Plugins::GlobalLogout":"Lemonldap-NG-Portal","DBD::DBM::dr":"DBI","CGI::Session::Driver::db_file":"CGI-Session","APR::XSLoader":"mod_perl","SDBM_File":"perl","Jifty::Plugin::REST":"Jifty","MHonArc::Char":"MHonArc","Lemonldap::NG::Portal::Plugins::AdaptativeAuthenticationLevel":"Lemonldap-NG-Portal","ExtUtils::ParseXS::CountLines":"ExtUtils-ParseXS","Plack::Server::Apache1":"Plack","IPTables::Parse":"IPTables-Parse","Plack::App::URLMap":"Plack","Lemonldap::NG::Portal::Issuer::OpenID":"Lemonldap-NG-Portal","Dpkg::Source::Package":"Dpkg","Mojolicious::Plugin":"Mojolicious","SOAP::Transport::IO":"SOAP-Lite","Crypt::Perl::X::ECDSA::NoCurveForOID":"Crypt-Perl","Tk::Frame":"Tk","Image::ExifTool::ISO":"Image-ExifTool","Image::ExifTool::GoPro":"Image-ExifTool","Plack::Middleware::Lint":"Plack","Lemonldap::NG::Portal::2F::WebAuthn":"Lemonldap-NG-Portal","XML::Twig::XPath":"XML-Twig","Crypt::Perl::X::ASN1::Decode":"Crypt-Perl","MHonArc::UTF8::CP1256":"MHonArc","Image::ExifTool::CaptureOne":"Image-ExifTool","Apache::ASP::STDERR":"Apache-ASP","Jifty::Plugin::CompressedCSSandJS::Dispatcher":"Jifty","Valiant::Filter":"Valiant","Image::ExifTool::FotoStation":"Image-ExifTool","Crypt::Perl::X::ECDSA::NoCurveForNISTName":"Crypt-Perl","Image::ExifTool::Apple":"Image-ExifTool","Net::DNS::RR::OPT::KEY_TAG":"Net-DNS","t::BHK":"perl","Apache::Wyrd::DBL":"Apache-Wyrd","Jifty::Web::Form::Field::Time":"Jifty","Image::ExifTool::Lang::it":"Image-ExifTool","DBIx::Otogiri::Iterator":"Otogiri","Net::LDAP::Extra::AD":"perl-ldap","Bio::DB::GFF::Aggregator::match_gap":"GBrowse","Dpkg::Archive::Ar":"Dpkg","Dpkg::Deps::KnownFacts":"Dpkg","MHonArc::UTF8::ISO8859_8":"MHonArc","attrs":"perl","Apache::MP3::L10N::ja":"Apache-MP3","Crypt::PRNG::Fortuna":"CryptX","Apache::Wyrd::Interfaces::GetUser":"Apache-Wyrd","Crypt::Perl::X509::Extensions":"Crypt-Perl","Perlbal::Plugin::Throttle":"Perlbal","DBI::DBD":"DBI","Apache::Symdump":"mod_perl","Crypt::Cipher":"CryptX","Pinto::Action::Unpin":"Pinto","Net::LDAP::Control::ProxyAuth":"perl-ldap","Crypt::PK::RSA":"CryptX","Apache::MP3::L10N::ca":"Apache-MP3","Crypt::Digest::SHA384":"CryptX","Jifty::Record":"Jifty","Apache::Wyrd::Interfaces::Setter":"Apache-Wyrd","XML::LibXML::NamedNodeMap":"XML-LibXML","XML::Atom::Link":"XML-Atom","Mojo::Loader":"Mojolicious","Spoon::Command":"Spoon","Jifty::Plugin::SQLQueries":"Jifty","Lemonldap::NG::Portal::Auth::_Ajax":"Lemonldap-NG-Portal","Lemonldap::NG::Portal::Auth::Null":"Lemonldap-NG-Portal","Pod::Perldoc":"Pod-Perldoc","Jifty::Test::Dist":"Jifty","Jifty::Web::Form::Field::ResetButton":"Jifty","XML::LibXML::XPathExpression":"XML-LibXML","MHonArc::CharEnt::AppleCroatian":"MHonArc","Spreadsheet::ParseExcel::Font":"Spreadsheet-ParseExcel","Dancer2::Serializer::Mutable":"Dancer2","Lemonldap::NG::Portal::Plugins::BasePasswordPolicy":"Lemonldap-NG-Portal","test_in_further_subdir":"PAR","Image::ExifTool::APP12":"Image-ExifTool","MojoMojo::Controller::Comment":"MojoMojo","MojoMojo::Schema::Result::Entry":"MojoMojo","VMS::Stdio":"perl","Spreadsheet::ParseExcel":"Spreadsheet-ParseExcel","Bio::Graphics::Browser2::UserConf":"GBrowse","Jifty::CAS::Store::LocalFile":"Jifty","XML::LibXML::Number":"XML-LibXML","App::UserAgent":"App-Context","MyFeatureFileLoader":"GBrowse","Apache::PerlRunXS":"mod_perl","Apache2::Module":"mod_perl","Pinto::Util":"Pinto","Image::ExifTool::PrintIM":"Image-ExifTool","Mojo::Collection::Role::Extra":"Mojo-DOM-Role-Analyzer","Crypt::Perl::X509::Extension::ct_precert_scts":"Crypt-Perl","Lemonldap::NG::Portal::2F::Register::U2F":"Lemonldap-NG-Portal","App::SharedDatastore":"App-Context","Dancer2::Template::Implementation::ForkedTiny":"Dancer2","Pinto::Action::Install":"Pinto","Tk::Listbox":"Tk","Plack::Server::Apache2":"Plack","Spreadsheet::ParseExcel::FmtDefault":"Spreadsheet-ParseExcel","Net::IPv4Addr":"Net-IPv4Addr","Crypt::Perl::ASN1":"Crypt-Perl","DBIx::Custom::Mapper":"DBIx-Custom","Jifty::Request::StateVariable":"Jifty","Moxy::Plugin::Pictogram":"Moxy","Image::Info::BMP":"Image-Info","Bio::Graphics::Browser2::PadAlignment":"GBrowse","Dpkg::Vendor::Default":"Dpkg","Bundle::Apache":"mod_perl","App::Pinto::Command::revert":"Pinto","Lemonldap::NG::Portal::Auth::Apache":"Lemonldap-NG-Portal","Sys::Hostname":"perl","Bio::Graphics::Browser2::UserTracks::Filesystem":"GBrowse","Parallel::ForkManager":"Parallel-ForkManager","MHonArc::CharEnt::ISO8859_1":"MHonArc","IO::Compress::Base":"IO-Compress","UI::Dialog::Screen::Druid":"UI-Dialog","GDBM_File":"perl","Net::OAuth::RequestTokenResponse":"Net-OAuth","Perlbal::TCPListener":"Perlbal","Apache::RedirectLogFix":"mod_perl","Search::OpenSearch::Result":"Search-OpenSearch-Server","Dancer::Route":"Dancer","Valiant::Filter::Flatten":"Valiant","MHonArc::UTF8::ISO8859_11":"MHonArc","Net::DNS::RR::DHCID":"Net-DNS","Apache::Session::Browseable::Store::MySQL":"Apache-Session-Browseable","APR::IpSubnet":"mod_perl","ModPerl::Registry":"mod_perl","Kelp::Context":"Kelp","Apache2::MPM":"mod_perl","Mojo::Content":"Mojolicious","PApp::I18n":"PApp","Crypt::Perl::ECDSA::Parse":"Crypt-Perl","CPAN::Tarzip":"CPAN","Apache::ASP::Session":"Apache-ASP","App::Pinto::Command::register":"Pinto","Net::OAuth::ProtectedResourceRequest":"Net-OAuth","Tie::Memoize":"perl","MIME::Tools":"MIME-tools","Jifty::Server::Prefork":"Jifty","RPC::PlClient":"PlRPC","ModPerl::TiPool":"mod_perl","Crypt::Mode::CBC":"CryptX","Tk::Stats":"Tk","APR::Brigade":"mod_perl","Catalyst::Script::FastCGI":"Catalyst-Runtime","Bio::Graphics::Browser2::CAlign":"GBrowse","Config::Model::Exception::AncestorClass":"Config-Model","Lemonldap::NG::Portal::Lib::Net::LDAP":"Lemonldap-NG-Portal","XML::LibXML::SAX::Generator":"XML-LibXML","Lemonldap::NG::Portal::2F::Ext2F":"Lemonldap-NG-Portal","Image::ExifTool::CanonCustom":"Image-ExifTool","MHonArc::CharEnt::ISO8859_8":"MHonArc","Galileo::DB::Deploy":"Galileo","Net::DNS::Text":"Net-DNS","Crypt::Digest::BLAKE2b_512":"CryptX","Image::ExifTool::Lang::en_gb":"Image-ExifTool","Encode::Encoder":"Encode","Mysql::dr":"DBD-mysql","Crypt::Cipher::RC6":"CryptX","YAML::Loader::Base":"YAML","Bio::DB::GFF::Aggregator::waba_alignment":"GBrowse","YAML::Marshall":"YAML","LWP::DebugFile":"libwww-perl","Net::DNS::RR::KX":"Net-DNS","Apache::Session::Browseable::PgJSON":"Apache-Session-Browseable","Valiant::HTML::Util::Form::FormObject":"Valiant","Crypt::Stream::Salsa20":"CryptX","Valiant::HTML::Util::TagBuilder":"Valiant","MIME::Decoder::NBit":"MIME-tools","Net::OpenID::ClaimedIdentity":"Net-OpenID-Consumer","App::Context::POE::ClusterNode":"App-Context","APR":"mod_perl","DBD::Gofer::Transport::pipeone":"DBI","Zonemaster::Backend::DB::SQLite":"Zonemaster-Backend","Lemonldap::NG::Portal::Lib::SOAPProxy":"Lemonldap-NG-Portal","Net::Dropbear::XS":"Net-Dropbear","Pinto::Database":"Pinto","XML::Atom::Server":"XML-Atom","RPC::PlClient::Comm":"PlRPC","Archive::Tar::File":"Archive-Tar","Image::ExifTool::Pentax":"Image-ExifTool","Image::ExifTool::FLIR":"Image-ExifTool","Lemonldap::NG::Portal::2F::TOTP":"Lemonldap-NG-Portal","Crypt::Stream::Sosemanuk":"CryptX","Jifty::Web::Session::ClientSide":"Jifty","DBI::Gofer::Response":"DBI","SVG::Sparkline::RangeBar":"SVG-Sparkline","Storable":"Storable","Apache::Wyrd::Input::URLInput":"Apache-Wyrd","XML::LibXML::Text":"XML-LibXML","Perlbal::Util":"Perlbal","Kossy::Response":"Kossy","Catalyst::Authentication::Store::LDAP::User":"Catalyst-Authentication-Store-LDAP","App::Authorization":"App-Context","App::Request":"App-Context","Net::SNMP::MessageProcessing":"Net-SNMP","Dpkg::Gettext":"Dpkg","Plack::Handler::CGI::Writer":"Plack","Valiant::JSON::Util":"Valiant","Dancer2::Core::Time":"Dancer2","Lemonldap::NG::Portal::Lib::2fDevices":"Lemonldap-NG-Portal","ModPerl::StructureMap":"mod_perl","Crypt::Random::Source":"Crypt-Random-Source","Imager::File::CUR":"Imager","Jifty::DBI::Column":"Jifty-DBI","Kelp::Module":"Kelp","SOAP::Transport":"SOAP-Lite","Net::OAuth::Request":"Net-OAuth","Net::LDAP::FilterMatch":"perl-ldap","ModPerl::TestReport":"mod_perl","Test::Dpkg":"Dpkg","DBM_Filter::null":"perl","Net::LDAP::Filter":"perl-ldap","XAO::DO::Web::Styler":"XAO-Web","Catalyst::Request":"Catalyst-Runtime","Apache::Wyrd::Interfaces::IndexUser":"Apache-Wyrd","Apache::ASP::CollectionItem":"Apache-ASP","Image::ExifTool::BuildTagLookup":"Image-ExifTool","Pinto::Editor::Clip":"Pinto","MHonArc::UTF8::ISO8859_15":"MHonArc","Pinto::Action::Merge":"Pinto","Config::IniFiles":"Config-IniFiles","App::Conf":"App-Context","Crypt::Perl":"Crypt-Perl","Catalyst::Plugin::Unicode::Encoding":"Catalyst-Runtime","Zonemaster::Backend::RPCAPI":"Zonemaster-Backend","CPAN::Nox":"CPAN","Digest::file":"Digest","Image::ExifTool::Canon":"Image-ExifTool","Apache2::Command":"mod_perl","Net::LDAP::Intermediate":"perl-ldap","Mojolicious::Plugin::TagHelpers":"Mojolicious","Moxy::Plugin::GPS::DoCoMo":"Moxy","Jifty::Server::Fork::NetServer":"Jifty","Encode":"Encode","Net::LDAP::Extension::SetPassword":"perl-ldap","APR::FunctionTable":"mod_perl","LWP::Protocol::http":"libwww-perl","Class::Struct::Tie_ISA":"perl","DBD::Gofer::Transport::Base":"DBI","Config::Model::Role::NodeLoader":"Config-Model","GPIB::rmt":"GPIB","Lemonldap::NG::Portal::Auth::SAML":"Lemonldap-NG-Portal","Bio::Graphics::Browser2::Render::TrackConfig":"GBrowse","DBD::NullP":"DBI","Plack::TempBuffer::Auto":"Plack","MojoMojo::Controller::JSON":"MojoMojo","LWP::Authen::Ntlm":"libwww-perl","Valiant::HTML::Util::Collection::HashItem":"Valiant","MojoMojo::Controller::Root":"MojoMojo","MHonArc::CharEnt::CP1255":"MHonArc","LWP::Authen::Digest":"libwww-perl","Valiant::HTML::FormBuilder::RadioButton":"Valiant","Net::Server::Proto::UNIX":"Net-Server","Jifty::TestServer":"Jifty","Perlbal::Plugin::Stats::Storage":"Perlbal","Tk::English":"Tk","PApp::DataRef::Scalar::Proxy":"PApp","Valiant::Validator::Each":"Valiant","Imager::Font::FreeType2":"Imager","XAO::DO::Web::Footer":"XAO-Web","MHonArc::UTF8::AppleRomanian":"MHonArc","Benchmark":"perl","IO::Socket::SSL::SSL_Context":"IO-Socket-SSL","Valiant::Filter::HtmlEscape":"Valiant","utf8":"perl","Pinto::Locator::Multiplex":"Pinto","MojoMojo::Schema::Result::Preference":"MojoMojo","Config::Model::SearchElement":"Config-Model","Crypt::KeyDerivation":"CryptX","Valiant::Util::Exception::InvalidValidatorArgs":"Valiant","Mojo::Server::Morbo":"Mojolicious","Catalyst::Action::Serialize::JSON::XS":"Catalyst-Action-REST","Imager::File::SGI":"Imager","Pod::Perldoc::ToChecker":"Pod-Perldoc","Jifty::Action::AboutMe":"Jifty","Catalyst::Model":"Catalyst-Runtime","Crypt::Perl::X509::Extension::authorityInfoAccess":"Crypt-Perl","Config::Model::Backend::PlainFile":"Config-Model","Image::ExifTool::PCX":"Image-ExifTool","Mail::Header":"MailTools","Net::OAuth::SignatureMethod::RSA_SHA1":"Net-OAuth","PApp::DataRef::Hash::Proxy":"PApp","Image::ExifTool::FujiFilm":"Image-ExifTool","SOAP::XMLSchemaSOAP1_1::Deserializer":"SOAP-Lite","Apache2::Connection":"mod_perl","Apache2::Access":"mod_perl","Net::Dropbear":"Net-Dropbear","Tk::MainWindow":"Tk","GPIB::hp59306a":"GPIB","App::Context::NetServer":"App-Context","DBIx::Class::Valiant::Result":"Valiant","Perlbal::Plugin::MaxContentLength":"Perlbal","Moxy::Plugin::GPS::AirHPhone":"Moxy","Crypt::Perl::RSA::Generate":"Crypt-Perl","WidgetDemo":"Tk","ModPerl::RegistryLoader":"mod_perl","Valiant::Validator::Boolean":"Valiant","Zlib::OldDeflate":"IO-Compress","MojoMojo::WordDiff":"MojoMojo","Archive::Zip::MemberRead":"Archive-Zip","Archive::Tar::_io":"Archive-Tar","Crypt::Perl::X509::GeneralNames":"Crypt-Perl","ModPerl::TiPoolConfig":"mod_perl","ExtUtils::MM_UWIN":"ExtUtils-MakeMaker","Tie::StdHandle":"perl","Apache::Wyrd::MySQLForm":"Apache-Wyrd","Crypt::Mac::PMAC":"CryptX","App::Pinto::Command::thanks":"Pinto","Config::Model::Role::WarpMaster":"Config-Model","blib":"perl","OS2::REXX::_SCALAR":"perl","YAML::Type::undef":"YAML","Moxy::Plugin::DisableTableTag":"Moxy","Lemonldap::NG::Portal::Plugins::PublicPages":"Lemonldap-NG-Portal","ExtUtils::MM_Unix":"ExtUtils-MakeMaker","Bio::Graphics::Browser2::DataLoader::gff":"GBrowse","Perlbal::Plugin::Vhosts":"Perlbal","Apache::Wyrd::Services::CodeRing":"Apache-Wyrd","Spoon::Installer":"Spoon","Apache::RegistryNG":"mod_perl","MHonArc::CharEnt::ISO8859_5":"MHonArc","XML::LibXML::SAX::Parser":"XML-LibXML","Catalyst::Component::ApplicationAttribute":"Catalyst-Runtime","CGI::Pretty":"CGI","Jifty::Web::Form::Field::Unrendered":"Jifty","Dpkg::Changelog::Entry::Debian":"Dpkg","UnicodeCD":"perl","File::Temp":"File-Temp","Dancer2::Test":"Dancer2","Lemonldap::NG::Portal::Main::Menu":"Lemonldap-NG-Portal","Pinto::Schema::Result::Stack":"Pinto","Bio::Graphics::Browser2::DataLoader::archive":"GBrowse","Tk::Dialog":"Tk","RPC::XML::boolean":"RPC-XML","Net::SNMP::Security":"Net-SNMP","Dpkg::Deps::AND":"Dpkg","XML::LibXML::Node":"XML-LibXML","MHonArc::UTF8::EUC_JP":"MHonArc","File::KeePass":"File-KeePass","Tk::HList":"Tk","Pinto::Server::Responder":"Pinto","APR::ThreadRWLock":"mod_perl","Tk::Animation":"Tk","Mojo::Cookie":"Mojolicious","GD::Group":"GD","ModPerl::PerlRun":"mod_perl","java::lang::String":"perl","Imager::Font::Truetype":"Imager","Image::ExifTool::Vorbis":"Image-ExifTool","Tk::Font":"Tk","CPAN::Mirrored::By":"CPAN","Jifty::Web::Form::Field::OrderedList":"Jifty","Bio::Graphics::Browser2::Render::HTML::TrackListing":"GBrowse","Image::ExifTool::SonyIDC":"Image-ExifTool","Image::ExifTool::MOI":"Image-ExifTool","Imager::CountColor":"Imager","Jifty::Plugin::OnlineDocs":"Jifty","Imager::Test::OverUtf8":"Imager","Plack::Handler::Apache2":"Plack","DBI::Gofer::Transport::stream":"DBI","Net::DNS::RR::URI":"Net-DNS","Config::Model::Backend::ShellVar":"Config-Model","Bio::DB::SeqFeature::Store::Alias":"GBrowse","Apache::Wyrd::Loop":"Apache-Wyrd","Pinto::Action::Look":"Pinto","Dancer::Exception::Base":"Dancer","Crypt::AuthEnc::GCM":"CryptX","Pinto::Constants":"Pinto","Jifty::CAS":"Jifty","Image::Info::ICO":"Image-Info","Jifty::Script::Script":"Jifty","Crypt::DSA::Key::SSH2":"Crypt-DSA","XML::LibXML::Element":"XML-LibXML","Apache::MP3::L10N::RightToLeft":"Apache-MP3","Catalyst::Engine::HTTP::Restarter":"Catalyst-Runtime","Lemonldap::NG::Portal::Lib::Captcha":"Lemonldap-NG-Portal","Apache2::porting":"mod_perl","Apache::Wyrd::Form::Preload":"Apache-Wyrd","Config::Model::ValueComputer":"Config-Model","XML::LibXML::SAX::Builder":"XML-LibXML","Apache::Session::Browseable::Sybase":"Apache-Session-Browseable","Kelp::Module::Template::Null":"Kelp","Apache2::ServerRec":"mod_perl","Lemonldap::NG::Portal::Lib::Code2F":"Lemonldap-NG-Portal","Image::ExifTool::CBOR":"Image-ExifTool","Net::DNS::Resolver::Recurse":"Net-DNS","XML::DT":"XML-DT","Lemonldap::NG::Portal::Plugins::Status":"Lemonldap-NG-Portal","Crypt::Digest::RIPEMD256":"CryptX","ExtUtils::MakeMaker":"ExtUtils-MakeMaker","Net::LDAP::DSML::pp":"perl-ldap","DBD::File::DataSource::File":"DBI","B":"perl","CGI::Simple":"CGI-Simple","Dezi::Server::About":"Dezi","Lemonldap::NG::Portal::Lib::SAML":"Lemonldap-NG-Portal","Tk::DragDrop::Common":"Tk","HTTP::Body::XForms":"HTTP-Body","Bio::Graphics::Browser2::Render::SnapshotManager":"GBrowse","Apache::ASP::Collection":"Apache-ASP","PAR":"PAR","Net::OpenID::Association":"Net-OpenID-Consumer","Pinto::Schema":"Pinto","Config::Model::Loader":"Config-Model","Apache::Wyrd::Site::GDButton":"Apache-Wyrd","MojoMojo::Controller::Jsrpc":"MojoMojo","Jifty::Server::Fork":"Jifty","Apache::ePerl":"eperl","HTML::Perlinfo::Base":"HTML-Perlinfo","Bio::Graphics::Browser2::Render::Slave::AWS_Balancer":"GBrowse","Perlbal::Plugin::Vpaths":"Perlbal","Crypt::Cipher::Noekeon":"CryptX","POSIX::SigSet":"perl","Crypt::Perl::ASN1::BitString":"Crypt-Perl","Tk::Stdio":"PAR","APR::Pool":"mod_perl","Moxy::Plugin::AuthorizationCutter":"Moxy","Spoon::Formatter":"Spoon","ExtUtils::MM_Any":"ExtUtils-MakeMaker","Valiant::HTML::SafeString":"Valiant","Jifty::Plugin::Config::Action::AddConfig":"Jifty","Catalyst::Action::Serialize::YAML":"Catalyst-Action-REST","Valiant::Util::Exception::MissingMethod":"Valiant","Lemonldap::NG::Portal::Issuer::OpenIDConnect":"Lemonldap-NG-Portal","App::Packer::Backend::PAR":"PAR","MIME::Words":"MIME-tools","Crypt::Perl::ECDSA::EC::Curve":"Crypt-Perl","DBD::mysql::dr":"DBD-mysql","Apache::SIG":"mod_perl","Apache::MP3::L10N::he":"Apache-MP3","Lemonldap::NG::Portal::Auth::PAM":"Lemonldap-NG-Portal","Crypt::Perl::X::ASN1::Find":"Crypt-Perl","Graphics::ColorNames":"Graphics-ColorNames","Crypt::Perl::X509::Extension::subjectInfoAccess":"Crypt-Perl","XAO::PreLoad":"XAO-Web","XAO::PluginUtils":"XAO-Web","Dancer2::Core::Role::ConfigReader":"Dancer2","Net::DNS::RR::KEY":"Net-DNS","Net::DNS::RR::IPSECKEY":"Net-DNS","Galileo::DB::Schema":"Galileo","SOAP::Transport::IO::Server":"SOAP-Lite","ModPerl::Interpreter":"mod_perl","Crypt::Perl::JWK":"Crypt-Perl","Crypt::Digest::SHA3_512":"CryptX","MHonArc::CharEnt::BIG5_HKSCS":"MHonArc","Image::ExifTool::PPM":"Image-ExifTool","Mojolicious::Command::Author::cpanify":"Mojolicious","Parse::ePerl":"eperl","UNIVERSAL":"perl","Net::DNS::RR::OPT::N3U":"Net-DNS","PApp::ECMAScript":"PApp","Apache::MP3::L10N::zh_tw":"Apache-MP3","POE::Component::IRC::Constants":"POE-Component-IRC","Jifty::View::Mason::Halo":"Jifty","Valiant::Validator::Unique":"Valiant","Image::ExifTool::Nintendo":"Image-ExifTool","Crypt::Mode::CFB":"CryptX","Dancer::Handler::PSGI":"Dancer","Module::Provision::Config":"Module-Provision","Spreadsheet::ParseExcel::FmtJapan":"Spreadsheet-ParseExcel","Crypt::Perl::PKCS10::Attribute::extensionRequest":"Crypt-Perl","MARC::File::XML":"MARC-File-XML","Jifty::Continuation":"Jifty","Plack::Handler::FCGI":"Plack","MHonArc::CharEnt::ISO8859_13":"MHonArc","Dpkg::Package":"Dpkg","Crypt::Perl::X509::Extension":"Crypt-Perl","MHonArc::CharEnt::AppleIceland":"MHonArc","JPL::Class":"perl","Dancer2::Core::Role::DSL":"Dancer2","CPAN::Distroprefs::Result::Error":"CPAN","YAML::Warning":"YAML","ExtUtils::ParseXS::Eval":"ExtUtils-ParseXS","Config::Model::Exception::UnknownElement":"Config-Model","MHonArc::Char::JP":"MHonArc","Crypt::Digest::BLAKE2b_384":"CryptX","Net::SNMP::PDU":"Net-SNMP","Bundle::Image::Info::PNG":"Image-Info","Net::DNS::RR::HINFO":"Net-DNS","Elive::Entity::ParticipantList":"Elive","Catalyst::Request::PartData":"Catalyst-Runtime","Spoon::MetadataObject":"Spoon","Apache::Wyrd::Datum::Null":"Apache-Wyrd","MHonArc::CharEnt::KOI8_B":"MHonArc","Crypt::DSA::Signature":"Crypt-DSA","Perlbal::Pool":"Perlbal","Config::Model::Role::HelpAsText":"Config-Model","MojoMojo::Controller::Gallery":"MojoMojo","Dancer2::CLI":"Dancer2","Module::ScanDeps":"Module-ScanDeps","Dancer2::Core::Role::StandardResponses":"Dancer2","Kelp::Test":"Kelp","Pinto::Action::Pin":"Pinto","Tk::Menu::Item":"Tk","GitLab::API::v4::Constants":"GitLab-API-v4","Kelp":"Kelp","Tk::Table":"Tk","FCGI":"FCGI","File::DataClass::Storage::Any":"File-DataClass","pipe_a_command":"PAR","PAR::Filter":"PAR-Packer","ModPerl::RegistryCooker":"mod_perl","Net::LDAP::Bind":"perl-ldap","Plack::App::File":"Plack","Spoon::Formatter::Container":"Spoon","DBI::DBD::SqlEngine::Table":"DBI","ModPerl::MapUtil":"mod_perl","Image::ExifTool::DjVu":"Image-ExifTool","DBIx::Custom::NotExists":"DBIx-Custom","Perlbal::BackendHTTP":"Perlbal","Dpkg::Build::Types":"Dpkg","Lemonldap::NG::Portal::Plugins::CheckHIBP":"Lemonldap-NG-Portal","DBD::Gofer::Policy::rush":"DBI","Jifty::Plugin::PubSub::Bus":"Jifty","App::Context::Cmd":"App-Context","Image::ExifTool::Audible":"Image-ExifTool","Zonemaster::Backend::Error::PermissionDenied":"Zonemaster-Backend","XML::LibXML::CDATASection":"XML-LibXML","Kelp::Module::Config":"Kelp","Tk::TextList":"Tk","Crypt::Perl::X509::Extension::inhibitAnyPolicy":"Crypt-Perl","Mojolicious::Command::psgi":"Mojolicious","Apache::Wyrd::CGICond":"Apache-Wyrd","Hash::Util::FieldHash":"perl","Apache::MP3::L10N::zh_cn":"Apache-MP3","Jifty::Plugin::SkeletonApp":"Jifty","Dpkg::BuildFlags":"Dpkg","MojoMojo::Formatter::Include":"MojoMojo","MojoMojo::Schema::Result::Tag":"MojoMojo","Net::Server::Thread":"Net-Server","HTTP::Body::UrlEncoded":"HTTP-Body","Config::Model::Exception::Formula":"Config-Model","Plack::Session::Store::Cache":"Plack-Middleware-Session","Net::DNS::Resolver::UNIX":"Net-DNS","Perl::Version":"Perl-Version","DBD::Gofer::db":"DBI","Apache::Wyrd::Interfaces::Indexable":"Apache-Wyrd","DBI::SQL::Nano::Statement_":"DBI","Apache::MP3::L10N::fa":"Apache-MP3","Image::ExifTool::MIE":"Image-ExifTool","XML::LibXML::Devel":"XML-LibXML","Moxy::Plugin::LocationBar":"Moxy","Jifty::Action":"Jifty","Crypt::PRNG":"CryptX","Lemonldap::NG::Portal::Main::Run":"Lemonldap-NG-Portal","Jifty::Web::Form::Field::Uploads":"Jifty","MHonArc::CharEnt::AppleHebrew":"MHonArc","Jifty::Plugin::Compat::Apache":"Jifty","File::Copy":"perl","ModPerl::FunctionTable":"mod_perl","Pinto::PrerequisiteWalker":"Pinto","XML::LibXML::PI":"XML-LibXML","Crypt::PK::DSA":"CryptX","B::Lint::Plugin::Test":"perl","Tk::IconList":"Tk","APR::ThreadMutex":"mod_perl","Pinto::RevisionWalker":"Pinto","ExtUtils::MM_NW5":"ExtUtils-MakeMaker","Crypt::Random::Source::Base::RandomDevice":"Crypt-Random-Source","MHonArc::UTF8::CP1257":"MHonArc","Jifty::Plugin::PubSub::Subscriptions":"Jifty","Mojo::Upload":"Mojolicious","Dancer::Session":"Dancer","Apache::Wyrd::Site::MySQLIndex":"Apache-Wyrd","Config::Model::Exception::WarpError":"Config-Model","Lemonldap::NG::Portal::UserDB::DBI":"Lemonldap-NG-Portal","Lemonldap::NG::Portal::Register::Demo":"Lemonldap-NG-Portal","File::Spec":"PathTools","OS2::PrfDB":"perl","Crypt::Cipher::Camellia":"CryptX","Jifty::Plugin::LetMe":"Jifty","MojoMojo::Formatter::IDLink":"MojoMojo","B::Showlex":"perl","DBI::SQL::Nano":"DBI","Mojo::Message::Request":"Mojolicious","B::Section":"perl","Apache::StatINC":"mod_perl","Pinto::Schema::Result::Revision":"Pinto","Jifty::Plugin::Authentication::Password::Notification::ConfirmLostPassword":"Jifty","Dancer::GetOpt":"Dancer","IO::Uncompress::Gunzip":"IO-Compress","Lemonldap::NG::Portal::Main::Display":"Lemonldap-NG-Portal","Apache2::FunctionTable":"mod_perl","Apache::ASP::CGI":"Apache-ASP","Apache::Session::Browseable::Store::DBI":"Apache-Session-Browseable","less":"perl","Valiant::Validator::Array":"Valiant","MIME::Body::File":"MIME-tools","Win32CORE":"perl","Image::ExifTool::Lang::zh_tw":"Image-ExifTool","CGI::Session::ID::static":"CGI-Session","HTML::EP::CGIEncryptForm":"HTML-EP","Spreadsheet::ParseExcel::SaveParser::Worksheet":"Spreadsheet-ParseExcel","Catalyst::Action::REST::ForBrowsers":"Catalyst-Action-REST","Jifty::DBI::Filter::Duration":"Jifty-DBI","Jifty::Web::Form::Field::Button":"Jifty","IPC::Run::Win32Pump":"IPC-Run","Jifty::View::Mason::Handler":"Jifty","MojoMojo::I18N":"MojoMojo","IPC::Run::IO":"IPC-Run","Elive::Entity::ServerParameters":"Elive","Jifty::Plugin::AdminUI::Dispatcher":"Jifty","GitLab::API::v4::Mock":"GitLab-API-v4","Tk::FloatEntry":"Tk","HTTP::Server::PSGI":"Plack","Image::ExifTool::Minolta":"Image-ExifTool","Dancer2::Core::Role::Handler":"Dancer2","Pinto::Editor::Edit":"Pinto","CPAN::Distroprefs::Pref":"CPAN","Catalyst::Request::Upload":"Catalyst-Runtime","XML::Twig::Notation_list":"XML-Twig","My::Examples":"SOAP-Lite","Clipboard":"Clipboard","App::Pinto::Command::update":"Pinto","Perlbal::Plugin::AutoRemoveLeadingDir":"Perlbal","Apache2::ConnectionUtil":"mod_perl","Tk::Clipboard":"Tk","DBI::ProfileDumper":"DBI","Pinto::Locker":"Pinto","MojoMojo::Schema::ResultSet::Attachment":"MojoMojo","MojoMojo::Formatter::CPANHyperlink":"MojoMojo","Net::SSLeay::Handle":"Net-SSLeay","UI::Dialog::Gauged":"UI-Dialog","HTTP::Daemon::ClientConn":"HTTP-Daemon","PApp::Lock":"PApp","Crypt::Cipher::Anubis":"CryptX","Plack::Request":"Plack","Jifty::Plugin::RequestInspector":"Jifty","Tk::FileSelect":"Tk","Net::OAuth::SignatureMethod::HMAC_SHA1":"Net-OAuth","Net::SNMP":"Net-SNMP","Pinto::Action::Diff":"Pinto","App::Session::Cookie":"App-Context","Pinto::Exception":"Pinto","Galileo::User":"Galileo","Apache::Wyrd::Site::NavPull":"Apache-Wyrd","MHonArc::UTF8::ISO8859_5":"MHonArc","RPC::XML::fault":"RPC-XML","XAO::DO::Context":"XAO-Web","Pinto::Action::Lock":"Pinto","Spreadsheet::ParseXLSX::Cell":"Spreadsheet-ParseXLSX","Config::Model::Exception::WrongValue":"Config-Model","Catalyst::Controller::REST":"Catalyst-Action-REST","Mojolicious::Command::test":"Mojolicious","Apache2::ConstantsTable":"mod_perl","Dpkg::BuildDriver":"Dpkg","Net::DNS::RR::NSEC3":"Net-DNS","IO::Socket::SSL::Intercept":"IO-Socket-SSL","Sys::Syslog::Win32":"Sys-Syslog","Log::Any::Adapter::Stdout":"Log-Any","Plack::Handler::Standalone":"Plack","FileHandle":"perl","Jifty::Plugin::Halo":"Jifty","XML::Twig::Entity":"XML-Twig","Net::DNS::RR::MX":"Net-DNS","Module::Provision::TraitFor::CreatingDistributions":"Module-Provision","Bundle::DBD::mysql":"DBD-mysql","Crypt::CBC":"Crypt-CBC","Imager::Font::Wrap":"Imager","Dpkg::Source::Package::V3::Native":"Dpkg","App::Pinto::Command::pin":"Pinto","Net::DNS::Resolver":"Net-DNS","Dancer2::Serializer::JSON":"Dancer2","Net::Server::Log::Sys::Syslog":"Net-Server","Jifty::Plugin::TestServerWarnings::View":"Jifty","Crypt::Perl::X::Generic":"Crypt-Perl","POE::Component::IRC::Plugin":"POE-Component-IRC","Net::DNS::RR::EUI64":"Net-DNS","Galileo::DB::Schema::Result::Menu":"Galileo","HTTP::Session2::ClientStore2":"HTTP-Session2","APR::Bucket":"mod_perl","Apache2::Resource":"mod_perl","Image::ExifTool::Flash":"Image-ExifTool","Pinto::Server::Router":"Pinto","Tk::Pane":"Tk","Apache::ExtUtils":"mod_perl","Jifty::Plugin::AdminUI::View":"Jifty","Bio::Graphics::Browser2::DataLoader::sam":"GBrowse","Apache::MP3::L10N::hr":"Apache-MP3","DBD::Mem::DataSource":"DBI","DBD::NullP::st":"DBI","Image::ExifTool::Lang::sv":"Image-ExifTool","MDK::Common::String":"MDK-Common","Dancer::FileUtils":"Dancer","Mail::Mailer::rfc822":"MailTools","Image::ExifTool::7Z":"Image-ExifTool","Crypt::Digest::MD5":"CryptX","Catalyst::Script::Server":"Catalyst-Runtime","Dancer2::FileUtils":"Dancer2","File::DataClass::Types":"File-DataClass","Pinto::Action::Statistics":"Pinto","Crypt::DSA::Key::PEM":"Crypt-DSA","MHonArc::CharEnt::KOI8_U":"MHonArc","Config::Model::ListId":"Config-Model","Apache2::RequestUtil":"mod_perl","attributes":"perl","CBC":"Crypt-CBC","Dancer::Renderer":"Dancer","CPAN::Distroprefs::Result":"CPAN","Net::OAuth::AccessTokenRequest":"Net-OAuth","Apache::Wyrd::Services::Tree":"Apache-Wyrd","Kossy::Exception":"Kossy","Moxy::Plugin::ControlPanel":"Moxy","Jifty::Handler":"Jifty","PGObject::Util::DBAdmin":"PGObject-Util-DBAdmin","I18N::Langinfo":"perl","Crypt::Cipher::IDEA":"CryptX","Apache::MP3::L10N::fr":"Apache-MP3","DBD::ExampleP":"DBI","SVG::Sparkline::Whisker":"SVG-Sparkline","MHonArc::CharEnt::CP1258":"MHonArc","App::SessionObject":"App-Context","Net::LDAP":"perl-ldap","Apache::MP3::L10N::sh":"Apache-MP3","Net::DNS::RR::MINFO":"Net-DNS","Tk":"Tk","Elive::Entity::Preloads":"Elive","RPC::PlServer::Test":"PlRPC","YAML::Type::blessed":"YAML","Mojolicious::Plugin::NotYAMLConfig":"Mojolicious","Compress::Raw::Bunzip2":"Compress-Raw-Bzip2","ExtUtils::Typemaps::InputMap":"ExtUtils-ParseXS","Image::ExifTool::Stim":"Image-ExifTool","XAO::DO::Web::Redirect":"XAO-Web","MHonArc::UTF8::KOI_7":"MHonArc","ExtUtils::XSSymSet":"perl","Bio::Graphics::Browser2::DataBase":"GBrowse","Image::ExifTool::AIFF":"Image-ExifTool","POE::Component::IRC::Common":"POE-Component-IRC","Jifty::Script::WriteCCJS":"Jifty","Config::Model::HashId":"Config-Model","Spoon::Base":"Spoon","Dancer::Exceptions":"Dancer","Kossy::BodyParser::OctetStream":"Kossy","GitLab::API::v4":"GitLab-API-v4","Mysql::db":"DBD-mysql","MHonArc::CharEnt::ISO8859_15":"MHonArc","Crypt::Digest::CHAES":"CryptX","Apache::Session::Browseable::MySQLJSON":"Apache-Session-Browseable","CGI::Session":"CGI-Session","Mojo::Content::MultiPart":"Mojolicious","Apache2::Cookie":"libapreq2","ExtUtils::MM_Cygwin":"ExtUtils-MakeMaker","Crypt::Random::Source::Strong":"Crypt-Random-Source","MHonArc::RFC822":"MHonArc","Perlbal::Plugin::EchoService":"Perlbal","Pinto::Action::Nop":"Pinto","POE::Component::IRC::Plugin::Logger":"POE-Component-IRC","MojoMojo::Formatter::GoogleCalendar":"MojoMojo","Crypt::Digest::Keccak384":"CryptX","Dancer2::Logger::Capture":"Dancer2","Compress::LZ4":"Compress-LZ4","MojoMojo::Formatter::Emote":"MojoMojo","Zonemaster::Backend::Metrics":"Zonemaster-Backend","LWP::UserAgent":"libwww-perl","WWW::Mechanize::Link":"WWW-Mechanize","Crypt::Perl::Ed25519::PublicKey":"Crypt-Perl","CPAN::Debug":"CPAN","Bio::DB::Tagger::Tag":"GBrowse","LWP::Protocol::nogo":"libwww-perl","Tk::DragDrop::Win32Site":"Tk","Mojo::Util":"Mojolicious","MHonArc::UTF8::CP950":"MHonArc","Image::ExifTool::Nikon":"Image-ExifTool","Clipboard::Xclip":"Clipboard","UI::Dialog::Backend::KDialog":"UI-Dialog","Image::ExifTool::JVC":"Image-ExifTool","Apache::Wyrd::ShowParams":"Apache-Wyrd","Dancer::Logger::Note":"Dancer","Apache::Util":"mod_perl","XAO::DO::Web::IdentifyAgent":"XAO-Web","DBD::SQLite":"DBD-SQLite","Image::ExifTool::MWG":"Image-ExifTool","Lemonldap::NG::Portal::Auth::DBI":"Lemonldap-NG-Portal","Crypt::Digest::SHA1":"CryptX","DBIx::Class::Valiant::Util::Exception":"Valiant","SOAP::XMLSchemaApacheSOAP::Deserializer":"SOAP-Lite","IO::Compress":"IO-Compress","XML::Atom":"XML-Atom","Agni":"PApp","RPC::XML::Client":"RPC-XML","POSIX":"perl","XS::Typemap":"perl","Lemonldap::NG::Portal::MenuTab":"Lemonldap-NG-Portal","Mail::Mailer::smtps::pipe":"MailTools","Valiant::Util::Exception::UnexpectedUseModuleError":"Valiant","Crypt::AuthEnc::ChaCha20Poly1305":"CryptX","DBI::DBD::SqlEngine::DataSource":"DBI","Dancer::Request":"Dancer","Plack::Middleware::Auth::Basic":"Plack","Lemonldap::NG::Portal::UserDB::OpenID":"Lemonldap-NG-Portal","Jifty::Web::Form::Field::Textarea":"Jifty","Dancer::Config":"Dancer","Jifty::Dispatcher":"Jifty","Apache::Registry":"mod_perl","Image::ExifTool::Lang::en_ca":"Image-ExifTool","Mojolicious::Plugin::OAuth2::Mock":"Mojolicious-Plugin-OAuth2","Capture::Tiny":"Capture-Tiny","Crypt::Perl::Ed25519::PrivateKey":"Crypt-Perl","Net::Server::Proto::TCP":"Net-Server","POE::Component::IRC::Plugin::AutoJoin":"POE-Component-IRC","POE::Component::IRC::Plugin::DCC":"POE-Component-IRC","Dancer2::CLI::Command::version":"Dancer2","Mojolicious::Plugin::JSONConfig":"Mojolicious","LWP::Protocol::gopher":"libwww-perl","Crypt::Perl::X509::Extension::freshestCRL":"Crypt-Perl","Valiant::Validator::Inclusion":"Valiant","Bundle::LWP":"libwww-perl","Kelp::Less":"Kelp","Dancer::Continuation::Route::FileSent":"Dancer","Net::Server::Multiplex::MUX":"Net-Server","PApp":"PApp","YAML::Loader":"YAML","Net::SNMP::Transport::TCP6":"Net-SNMP","Sys::Syslog":"Sys-Syslog","Net::DNS::RR::OPT::ZONEVERSION":"Net-DNS","Mojolicious::Types":"Mojolicious","Net::OAuth::V1_0A::AccessTokenRequest":"Net-OAuth","Pinto::Target":"Pinto","App::Serializer::Ini":"App-Context","Apache::Wyrd":"Apache-Wyrd","Valiant::I18N::Tag":"Valiant","Crypt::PK":"CryptX","CGI::Simple::Cookie":"CGI-Simple","Apache::MP3::L10N::sk":"Apache-MP3","charnames":"perl","HTML::EP::Examples::Glimpse":"HTML-EP","Apache::src":"mod_perl","Valiant::Validations":"Valiant","Net::OpenID::Consumer":"Net-OpenID-Consumer","SOAP::SOM":"SOAP-Lite","UI::Dialog::KDE":"UI-Dialog","Lemonldap::NG::Portal::Issuer::JitsiMeetTokens":"Lemonldap-NG-Portal","SOAP::Transport::LOOPBACK":"SOAP-Lite","HTTP::Body::OctetStream":"HTTP-Body","Dpkg::Vars":"Dpkg","Crypt::Perl::X::ECDSA::NoCurveForName":"Crypt-Perl","Crypt::Digest::SHA512_256":"CryptX","Tk::Text::Tag":"Tk","Jifty::DBI::Filter":"Jifty-DBI","Apache::Wyrd::Services::SearchParser":"Apache-Wyrd","Math::BigInt::LTM":"CryptX","warnings::register":"perl","Catalyst::Authentication::Store::LDAP::Backend":"Catalyst-Authentication-Store-LDAP","Dpkg::Deps::Simple":"Dpkg","DBIx::Class::Valiant::ResultSet":"Valiant","Crypt::Digest::BLAKE2s_256":"CryptX","Tk::CmdLine":"Tk","MHonArc::CharEnt::CP1256":"MHonArc","Lemonldap::NG::Portal::UserDB::LDAP":"Lemonldap-NG-Portal","Dancer":"Dancer","Bio::Graphics::Browser2::MetaDB":"GBrowse","CGI::Session::Serialize::freezethaw":"CGI-Session","Mojo::URL":"Mojolicious","PApp::Application":"PApp","Net::DNS::RR::SOA":"Net-DNS","Catalyst::Test":"Catalyst-Runtime","Image::ExifTool::Sigma":"Image-ExifTool","Imager::Filter::Flines":"Imager","Bundle::DBD::Pg":"DBD-Pg","LWP::ConnCache":"libwww-perl","IO::Compress::Zip::Constants":"IO-Compress","Dancer2::Logger::Null":"Dancer2","Apache::PerlRun":"mod_perl","Moxy::Plugin::Scrubber":"Moxy","RT::Authen::ExternalAuth::DBI":"RT-Authen-ExternalAuth","Bio::Graphics::Browser2::Render::Slave::Status":"GBrowse","Galileo::Menu":"Galileo","MHonArc::CharEnt::CP1253":"MHonArc","OS2::localMorphPM":"perl","Dancer::HTTP":"Dancer","Net::Ping::External":"Net-Ping-External","Crypt::Cipher::Blowfish":"CryptX","Legacy::DB::SyntenyIO":"GBrowse","RT::Authen::ExternalAuth::LDAP":"RT-Authen-ExternalAuth","Email::MIME::Header":"Email-MIME","MHonArc::UTF8::AppleCroatian":"MHonArc","Zonemaster::Backend::DB::MySQL":"Zonemaster-Backend","Net::IPAddress::Util::Range":"Net-IPAddress-Util","Lemonldap::NG::Portal::Auth::Combination":"Lemonldap-NG-Portal","Batch::Batchrun::Dbfunctions":"Batch-Batchrun","Image::ExifTool::Qualcomm":"Image-ExifTool","Dpkg::BuildDriver::DebianRules":"Dpkg","Net::DNS::RR::TXT":"Net-DNS","SOAP::Data":"SOAP-Lite","Mojolicious::Plugin::Config::Sandbox":"Mojolicious","PalImg":"Perlbal","IO::Compress::Deflate":"IO-Compress","Apache2::Response":"mod_perl","Log::Any::Adapter::Base":"Log-Any","Apache::Wyrd::Services::Index":"Apache-Wyrd","SOAP::Lite::Packager::MIME":"SOAP-Lite","Net::DNS::RR::NAPTR":"Net-DNS","Jifty::Plugin::Authentication::Password::Action::ResetLostPassword":"Jifty","Batch::Batchrun::Extract":"Batch-Batchrun","Net::LDAP::Extension::WhoAmI":"perl-ldap","Jifty::Request":"Jifty","Dancer::Logger::Capture":"Dancer","XML::LibXML::AttributeHash":"XML-LibXML","Apache::ASP::Date":"Apache-ASP","Net::DNS::RR::OPT::NSID":"Net-DNS","File::DataClass::ResultSet":"File-DataClass","SVG::Sparkline":"SVG-Sparkline","Pinto::Schema::Result::Distribution":"Pinto","DBD::File::st":"DBI","MHonArc::CharEnt::ISO8859_16":"MHonArc","Pinto::Action::Kill":"Pinto","Dancer2::CLI::Version":"Dancer2","Perlbal::Fields":"Perlbal","XML::LibXML::SAX::AttributeNode":"XML-LibXML","Net::DNS::RR::APL::Item":"Net-DNS","Apache::RegistryBB":"mod_perl","Elive::Util::Type":"Elive","App::Cpan":"CPAN","Apache::Server":"mod_perl","MyStripScripts":"HTML-StripScripts","Net::DNS::RR::MR":"Net-DNS","Bundle::PlRPC":"PlRPC","CPAN::Distroprefs":"CPAN","DBD::ExampleP::db":"DBI","Tk::Adjuster::Item":"Tk","Lemonldap::NG::Portal::2F::Yubikey":"Lemonldap-NG-Portal","Plack::Session::State":"Plack-Middleware-Session","Term::ReadLine::Gnu::Var":"Term-ReadLine-Gnu","Image::ExifTool::H264":"Image-ExifTool","HTTP::Tiny":"HTTP-Tiny","Apache::Wyrd::Chart":"Apache-Wyrd","Spoon::Formatter::Block":"Spoon","Lemonldap::NG::Portal::Lib::REST":"Lemonldap-NG-Portal","Moxy::Plugin::ShowHTTPHeaders":"Moxy","PAR::Filter::PatchContent":"PAR-Packer","Archive::Zip::Member":"Archive-Zip","Net::SNMP::Transport::UDP6":"Net-SNMP","Net::Server::Fork":"Net-Server","Net::DNS::Mailbox1035":"Net-DNS","Perlbal::UploadListener":"Perlbal","ModPerl::PerlRunPrefork":"mod_perl","Spreadsheet::ParseExcel::FmtJapan2":"Spreadsheet-ParseExcel","RPC::PlServer::Comm":"PlRPC","APR::PerlIO":"mod_perl","deprecate":"perl","Dpkg::Index":"Dpkg","Net::SNMP::Transport::IPv6::UDP":"Net-SNMP","Config::Model::AnyId":"Config-Model","GPIB::ni":"GPIB","Image::ExifTool::KyoceraRaw":"Image-ExifTool","Apache::Wyrd::Form::Template":"Apache-Wyrd","Clipboard::WaylandClipboard":"Clipboard","Bio::Graphics::Browser2::UserTracks::Database":"GBrowse","Apache::Session::Browseable::File":"Apache-Session-Browseable","Apache::Session::Browseable::Store::File":"Apache-Session-Browseable","Plack::Session::State::Cookie":"Plack-Middleware-Session","OverloadedObjectClass":"CGI-Session","Tk::DragDrop::Rect":"Tk","DBIx::Class::Valiant::Util::Exception::BadParameterFK":"Valiant","Catalyst::Engine::HTTP::Restarter::Watcher":"Catalyst-Runtime","MHonArc::UTF8::ISO8859_9":"MHonArc","Net::DNS::RR::APL":"Net-DNS","App::Pinto::Command::merge":"Pinto","Kossy::BodyParser":"Kossy","MY":"ExtUtils-MakeMaker","Tk::MMtry":"Tk","DBI::FAQ":"DBI","Net::LDAP::Control":"perl-ldap","DBD::Mem::dr":"DBI","Net::DNS::RR::OPT::DAU":"Net-DNS","Image::ExifTool::Matroska":"Image-ExifTool","CGI::Session::Driver::mysql":"CGI-Session","PApp::Callback::Function":"PApp","PerlTmp":"Batch-Batchrun","Net::Server::Proto::UNIXDGRAM":"Net-Server","Crypt::Perl::X::ECDSA::NoCurveForParameters":"Crypt-Perl","MojoMojo::Extensions::Counter":"MojoMojo","MIME::Body::InCore":"MIME-tools","Lemonldap::NG::Portal::Auth::GPG":"Lemonldap-NG-Portal","DBI::Gofer::Serializer::DataDumper":"DBI","Lemonldap::NG::Portal::Auth::Proxy":"Lemonldap-NG-Portal","Dancer::Continuation::Route::Templated":"Dancer","Jifty::Plugin::Authentication::Password::Mixin::Model::User":"Jifty","Moxy::Plugin::Bookmark":"Moxy","Apache::MP3::L10N::sr":"Apache-MP3","GitLab::API::v4::Paginator":"GitLab-API-v4","Data::Dumper":"Data-Dumper","DBD::Gofer::Policy::Base":"DBI","Plack::Handler::HTTP::Server::PSGI":"Plack","Valiant::Validator":"Valiant","Net::OAuth::AccessTokenResponse":"Net-OAuth","IO::Socket::SSL::Utils":"IO-Socket-SSL","Apache2::Upload":"libapreq2","SOAP::Cloneable":"SOAP-Lite","LWP::Protocol::nntp":"libwww-perl","Image::ExifTool::PLIST":"Image-ExifTool","DBD::DBM::db":"DBI","Apache::httpd_conf":"mod_perl","Mojo::BaseUtil":"Mojolicious","File::DataClass::Cache":"File-DataClass","PApp::CGI":"PApp","Pinto::DistributionSpec":"Pinto","XML::Twig::XPath::Elt":"XML-Twig","HTML::EP::Locale":"HTML-EP","Mail::Audit":"Mail-Audit","MIME::Parser::FileInto":"MIME-tools","IO::Socket::SSL::Trace":"IO-Socket-SSL","Crypt::Cipher::XTEA":"CryptX","App::Serializer::Perl":"App-Context","Bio::Graphics::Browser2::MetaSegment::Iterator":"GBrowse","Galileo::Plugin::Deploy":"Galileo","PerlIO::scalar":"perl","Lemonldap::NG::Portal::UserDB::Proxy":"Lemonldap-NG-Portal","Crypt::Digest::BLAKE2b_160":"CryptX","Pinto::Schema::Result::Ancestry":"Pinto","Mojolicious::Validator::Validation":"Mojolicious","Moxy":"Moxy","MIME::WordDecoder::ISO_8859":"MIME-tools","Image::ExifTool::Ricoh":"Image-ExifTool","CGI::Auth::Basic":"CGI-Auth-Basic","Lemonldap::NG::Portal::Plugins::AutoSignin":"Lemonldap-NG-Portal","Plack::Util::Prototype":"Plack","Catalyst::Exception::Detach":"Catalyst-Runtime","PAR::Filter::Bytecode":"PAR-Packer","Apache2::Request":"libapreq2","XAO::DO::Web::SetArg":"XAO-Web","MHonArc::CharEnt":"MHonArc","Lemonldap::NG::Portal::Password::REST":"Lemonldap-NG-Portal","PApp::XSLT::Sablotron":"PApp","open":"perl","Image::ExifTool::HP":"Image-ExifTool","XML::LibXML::Reader":"XML-LibXML","Bio::Graphics::Browser2::SendMail":"GBrowse","RPC::PlServer":"PlRPC","Net::LDAP::Extension":"perl-ldap","Plack::Middleware::Chunked":"Plack","ExtUtils::MM_Darwin":"ExtUtils-MakeMaker","Net::DNS::RR::PTR":"Net-DNS","Jifty::Model::SessionCollection":"Jifty","Encode::CN":"Encode","MojoMojo::Declaw":"MojoMojo","FindExt":"perl","Dpkg::Source::Quilt":"Dpkg","Bio::Graphics::Browser2::Region":"GBrowse","Image::ExifTool::PhotoMechanic":"Image-ExifTool","LWP::Authen::Basic":"libwww-perl","Apache::Options":"mod_perl","Tk::Menu":"Tk","IPC::Open2":"perl","Kelp::Routes::Controller":"Kelp","CPAN::Complete":"CPAN","DBD::mysql":"DBD-mysql","CGI::Session::Serialize::default":"CGI-Session","XS::APItest":"perl","Jifty::Test::WWW::WebDriver":"Jifty","MHonArc::CharEnt::ISO8859_6":"MHonArc","Dancer::Logger::File":"Dancer","Crypt::Perl::X509::Extension::noCheck":"Crypt-Perl","SVG::Sparkline::Area":"SVG-Sparkline","Apache::Wyrd::Services::FileCache":"Apache-Wyrd","Zonemaster::Backend::DB::PostgreSQL":"Zonemaster-Backend","Lemonldap::NG::Portal::Auth::LinkedIn":"Lemonldap-NG-Portal","MHonArc::UTF8::BIG5_ETEN":"MHonArc","Mojo::JSON::Pointer":"Mojolicious","Dpkg::Deps":"Dpkg","Image::Info::TIFF":"Image-Info","Config::Model::BackendMgr":"Config-Model","RTMP::Client":"RTMP-Client","Module::Provision::TraitFor::EnvControl":"Module-Provision","Lemonldap::NG::Portal::Auth::Radius":"Lemonldap-NG-Portal","Bio::Graphics::Browser2::Session":"GBrowse","Crypt::Mode::ECB":"CryptX","Net::LDAP::FilterList":"perl-ldap","Lemonldap::NG::Portal::Password::Demo":"Lemonldap-NG-Portal","Apache::FakeRequest":"mod_perl","PApp::Log":"PApp","Cpanel::JSON::XS":"Cpanel-JSON-XS","UI::Dialog::Backend::XOSD":"UI-Dialog","Net::DNS::RR::NSEC3PARAM":"Net-DNS","Dancer2::Core::Response::Delayed":"Dancer2","Lemonldap::NG::Portal::UserDB::Slave":"Lemonldap-NG-Portal","Dancer::MIME":"Dancer","Zonemaster::Backend::Config::DCPlugin":"Zonemaster-Backend","Config::Model::CheckList":"Config-Model","Moxy::Plugin::GPS":"Moxy","PApp::Exception":"PApp","Apache2::Log":"mod_perl","HTTP::Body::XFormsMultipart":"HTTP-Body","Crypt::CBC::PBKDF::randomiv":"Crypt-CBC","UI::Dialog::GNOME":"UI-Dialog","Encode::MIME::Header":"Encode","YAML::Error":"YAML","Crypt::Cipher::SAFER_K64":"CryptX","Apache2::RequestIO":"mod_perl","SimpleObjectClass":"CGI-Session","Zonemaster::Backend::DB":"Zonemaster-Backend","Plack::Middleware::XSendfile":"Plack","Bundle::Apache::ASP":"Apache-ASP","Crypt::Perl::ECDSA::Utils":"Crypt-Perl","Spreadsheet::ParseXLSX::Worksheet":"Spreadsheet-ParseXLSX","DBM_Filter::compress":"perl","Jifty::Plugin::SetupWizard":"Jifty","Image::ExifTool::NikonCapture":"Image-ExifTool","Crypt::Mode::CTR":"CryptX","Valiant::Util::Exception":"Valiant","Tk::JPEG":"Tk","MIME::Parser::Reader":"MIME-tools","PAR::SetupTemp":"PAR","Batch::Batchrun::Pwlookup":"Batch-Batchrun","DBI::Gofer::Serializer::Storable":"DBI","Plack::Handler":"Plack","Pinto::Action::Roots":"Pinto","Mojolicious::Command::generate::lite_app":"Mojolicious","OverloadedClass":"CGI-Session","Dancer2::Logger::Console":"Dancer2","DBD::Mem::st":"DBI","Kelp::Module::Template":"Kelp","YAML::Type::regexp":"YAML","Bundle::Image::Info::XPM":"Image-Info","App::Pinto::Command::reset":"Pinto","Apache::Include":"mod_perl","Mojo::Asset::File":"Mojolicious","Plack::Session::Store::DBI":"Plack-Middleware-Session","Dancer::Continuation::Route":"Dancer","MySQL::Admin::GUI":"MySQL-Admin","Apache::MP3::L10N::ga":"Apache-MP3","Pinto::Chrome::Net":"Pinto","Perlbal::Test::WebServer":"Perlbal","Image::ExifTool::MPF":"Image-ExifTool","Net::OAuth::Response":"Net-OAuth","Jifty::Web::Form::Field::Collection":"Jifty","Jifty::Plugin::CompressedCSSandJS":"Jifty","Crypt::Stream::RC4":"CryptX","Kelp::Generator":"Kelp","Apache::Wyrd::Version":"Apache-Wyrd","LRUCache":"GBrowse","MIME::Field::ConTraEnc":"MIME-tools","Apache::MP3::L10N::de":"Apache-MP3","MHonArc::UTF8::KOI8_F":"MHonArc","Net::Server::PreFork":"Net-Server","Jifty::Web::Form::Field::Select":"Jifty","Apache::Wyrd::Datum::Integer":"Apache-Wyrd","SOAP::Custom::XML::Data":"SOAP-Lite","Config::Model::Exception::ConfigFile":"Config-Model","Lemonldap::NG::Portal::Auth::Remote":"Lemonldap-NG-Portal","Valiant::Validator::Check":"Valiant","Net::DNS::RR::TKEY":"Net-DNS","DBI::Gofer::Request":"DBI","Imager::TrimColorList":"Imager","Tk::DirTreeDialog":"Tk","Net::DNS::RR::OPT::EXPIRE":"Net-DNS","Crypt::PRNG::ChaCha20":"CryptX","VMS::Filespec":"perl","Bio::Graphics::Browser2::DataLoader::bed":"GBrowse","Catalyst::Action::DeserializeMultiPart":"Catalyst-Action-REST","CPAN::Module":"CPAN","Crypt::Cipher::SAFERP":"CryptX","Apache::Wyrd::Number":"Apache-Wyrd","CGI::Session::Serialize::storable":"CGI-Session","PApp::Recode":"PApp","Log::Any::Adapter::Test":"Log-Any","Image::ExifTool::MNG":"Image-ExifTool","Tk::LabFrame":"Tk","Dpkg::Changelog::Parse":"Dpkg","Image::ExifTool::GE":"Image-ExifTool","Crypt::Perl::X509v3":"Crypt-Perl","Image::ExifTool::Lang::fr":"Image-ExifTool","Apache::MP3::Resample":"Apache-MP3","Valiant::NestedError":"Valiant","Perlbal::Plugin::NotModified":"Perlbal","Net::DNS::ZoneFile::Generator":"Net-DNS","Jifty::TestServer::Inline":"Jifty","Pinto::DifferenceEntry":"Pinto","Pinto::PackageSpec":"Pinto","LWP::MemberMixin":"libwww-perl","HTML::Perlinfo::Loaded":"HTML-Perlinfo","RPC::XML::string":"RPC-XML","Image::ExifTool::Import":"Image-ExifTool","Jifty::Client":"Jifty","RPC::XML::array":"RPC-XML","Moxy::Plugin::HTTPHeader":"Moxy","Config::Model::Utils::GenClassPod":"Config-Model","Image::ExifTool::MakerNotes":"Image-ExifTool","Win32::File::Summary":"Win32-File-Summary","Image::ExifTool::DJI":"Image-ExifTool","SOAP::XMLSchema::Serializer":"SOAP-Lite","MojoMojo::Controller::Attachment":"MojoMojo","Tk::ColorDialog":"Tk","Jifty::Plugin::Config::Action::Restart":"Jifty","Proc::Killall":"Proc-ProcessTable","MojoMojo::Schema::ResultSet::Role":"MojoMojo","CPAN::CacheMgr":"CPAN","Valiant::HTML::Components":"Valiant","XML::LibXML::XPathContext":"XML-LibXML","Tk::WinPhoto":"Tk","Data::FormValidator::Constraints::RegexpCommon":"Data-FormValidator","Valiant::JSON::JSONBuilder":"Valiant","HTML::EP::Tokens":"HTML-EP","Kossy::Assets":"Kossy","Image::ExifTool::Theora":"Image-ExifTool","Apache::ASP::Server":"Apache-ASP","Net::DNS::Resolver::os390":"Net-DNS","Crypt::Random::Source::Factory":"Crypt-Random-Source","Apache::ASP::Response":"Apache-ASP","File::Spec::VMS":"PathTools","MojoMojo::Formatter::Gist":"MojoMojo","Image::ExifTool::XISF":"Image-ExifTool","Jifty::Script::Adopt":"Jifty","Lemonldap::NG::Portal::Lib::Combination::UserLogger":"Lemonldap-NG-Portal","CGI::Session::ErrorHandler":"CGI-Session","OS2::REXX::_ARRAY":"perl","Crypt::Cipher::RC2":"CryptX","Dpkg::Control::FieldsCore":"Dpkg","Lemonldap::NG::Portal::Auth::OpenID":"Lemonldap-NG-Portal","Config::Model::Node":"Config-Model","Jifty::Result":"Jifty","Net::LDAPI":"perl-ldap","Jifty::Test::Email":"Jifty","Valiant::Filter::ToArray":"Valiant","RT::Extension::MobileUI":"RT-Extension-MobileUI","Apache::Wyrd::Site::WidgetControl":"Apache-Wyrd","Apache2::Directive":"mod_perl","Image::ExifTool::DNG":"Image-ExifTool","Lemonldap::NG::Portal::Lib::CustomModule":"Lemonldap-NG-Portal","Mojolicious::Command::inflate":"Mojolicious","Apache::MP3::Playlist":"Apache-MP3","XML::LibXML::Boolean":"XML-LibXML","Pinto::Types":"Pinto","Pinto::Action::Clean":"Pinto","Tk::Event::IO":"Tk","Encode::UTF_EBCDIC":"Encode","Moxy::Plugin::QRCode":"Moxy","SOAP::Transport::MAILTO":"SOAP-Lite","Mojo::Transaction::WebSocket":"Mojolicious","File::Compare":"perl","Tk::Dirlist":"Tk","DBI::Library::db":"MySQL-Admin","Bio::Graphics::Browser2::Markup":"GBrowse","Valiant::HTML::BaseComponent":"Valiant","ModPerl::RegistryBB":"mod_perl","Tk::TList":"Tk","DBD::File":"DBI","ExtUtils::MakeMaker::charstar":"ExtUtils-MakeMaker","Imager":"Imager","Crypt::Digest::SHA512_224":"CryptX","Bio::Graphics::Browser2::RegionSearch":"GBrowse","App::Request::CGI":"App-Context","PhonyClipboard":"Clipboard","XAO::DO::Web::URL":"XAO-Web","Crypt::CBC::PBKDF::opensslv1":"Crypt-CBC","MIME::Decoder::Binary":"MIME-tools","Imager::Color":"Imager","Kossy::BodyParser::JSON":"Kossy","Valiant::HTML::FormBuilder::Renderer::TextField":"Valiant","Jifty::Plugin::Deflater":"Jifty","Plack::Middleware::SimpleContentFilter":"Plack","Pinto::Role::Schema::Result":"Pinto","MM":"ExtUtils-MakeMaker","Elive::Entity::Recording":"Elive","Apache::Session::Browseable::DBI":"Apache-Session-Browseable","UDDI::Constants":"SOAP-Lite","Zonemaster::Backend::Log":"Zonemaster-Backend","Image::ExifTool::PGF":"Image-ExifTool","Bio::Graphics::Browser2::Plugin":"GBrowse","Mail::Field::Date":"MailTools","DBI::Profile":"DBI","DBI::Const::GetInfoType":"DBI","DBI::Library::Database::st":"MySQL-Admin","CGI::apacheSSI::Local":"CGI-apacheSSI","DBIx::Otogiri":"Otogiri","DBD::mysqlPP::db":"DBD-mysqlPP","Bio::Graphics::Browser2::PluginSet":"GBrowse","RPC::XML::simple_type":"RPC-XML","Elive::Entity::ServerDetails":"Elive","IO::Compress::Adapter::Deflate":"IO-Compress","URI::jabber":"SOAP-Lite","Archive::Tar":"Archive-Tar","Net::DNS::RR::OPT::DHU":"Net-DNS","Net::DNS::RR::CDS":"Net-DNS","Jifty::Plugin::Authentication::Password::Action::SendAccountConfirmation":"Jifty","DBD::ExampleP::st":"DBI","Lemonldap::NG::Portal::Auth::Demo":"Lemonldap-NG-Portal","Valiant::Validator::Object":"Valiant","Catalyst::Controller::Combine":"Catalyst-Controller-Combine","Imager::Expr::Infix":"Imager","Apache::SessionX":"Apache-SessionX","Valiant::Util::Exception::InvalidFilterArgs":"Valiant","MIME::Field::ContType":"MIME-tools","Lemonldap::NG::Portal::2F::Register::TOTP":"Lemonldap-NG-Portal","Lemonldap::NG::Portal::Auth::WebAuthn":"Lemonldap-NG-Portal","Valiant::Util::Exception::Strict":"Valiant","CGI::Session::CookBook":"CGI-Session","PApp::MimeType":"PApp","Perlbal::ManageCommand":"Perlbal","Valiant::Naming":"Valiant","Crypt::Perl::RSA::Parse":"Crypt-Perl","Apache::Wyrd::Interfaces::Mother":"Apache-Wyrd","POE::Component::IRC::Plugin::FollowTail":"POE-Component-IRC","Config::Model::Exception":"Config-Model","XML::LibXML::Schema":"XML-LibXML","Config::Model::Exception::ObsoleteElement":"Config-Model","Crypt::Digest::Tiger192":"CryptX","LWP::Protocol::Net::Curl":"LWP-Protocol-Net-Curl","Apache::MP3::L10N::uk":"Apache-MP3","Crypt::AuthEnc":"CryptX","Dpkg::Source::Archive":"Dpkg","Config::Model::SimpleUI":"Config-Model","Net::DNS::RR::TSIG":"Net-DNS","File::Slurp":"File-Slurp","CGI::Application::Plugin::CAPTCHA":"CGI-Application-Plugin-CAPTCHA","Jifty::Action::Redirect":"Jifty","Apache::Session::Browseable::Store::Postgres":"Apache-Session-Browseable","MHonArc::CharEnt::AppleCenteuro":"MHonArc","Net::LDAP::Control::SyncState":"perl-ldap","Catalyst::Dispatcher":"Catalyst-Runtime","Valiant::Validator::With":"Valiant","Jifty::DBI::Record::Plugin":"Jifty-DBI","Apache::Wyrd::Attribute":"Apache-Wyrd","Tk::widgets":"Tk","MojoMojo::Schema::ResultSet::Person":"MojoMojo","Plack::Middleware::ContentLength":"Plack","Bio::Graphics::Browser2::DataLoader::featurefile":"GBrowse","POE::Component::IRC::Plugin::ISupport":"POE-Component-IRC","Dpkg::OpenPGP::ErrorCodes":"Dpkg","SOAP::XMLSchema1999::Deserializer":"SOAP-Lite","Image::ExifTool::Exif":"Image-ExifTool","Pinto::Action::Revert":"Pinto","App::Genpass":"App-Genpass","Net::DNS::RR::OPT::TCP_KEEPALIVE":"Net-DNS","IPC::Run":"IPC-Run","CGI::Session::ID::md5":"CGI-Session","Image::Info::WEBP":"Image-Info","Batch::Batchrun":"Batch-Batchrun","IO::Compress::Base::Common":"IO-Compress","Crypt::Cipher::KASUMI":"CryptX","HTML::Perlinfo::Common":"HTML-Perlinfo","Mojo::Template":"Mojolicious","Net::DNS::DomainName":"Net-DNS","Mojo::Collection":"Mojolicious","App::Serializer::OneLine":"App-Context","back_tick_a_command":"PAR","Bio::Graphics::Browser2::CachedTrack":"GBrowse","Plack::App::Directory":"Plack","PApp::UserObs":"PApp","Kelp::Exception":"Kelp","SOAP::Transport::HTTP::Daemon":"SOAP-Lite","Mojolicious::Command::eval":"Mojolicious","MHonArc::CharEnt::ISO8859_11":"MHonArc","Plack::Middleware::HTTPExceptions":"Plack","Catalyst::DispatchType::Index":"Catalyst-Runtime","Apache2::Process":"mod_perl","Plack::Session::Cleanup":"Plack-Middleware-Session","SOAP::Custom::XML::Deserializer":"SOAP-Lite","Crypt::AuthEnc::EAX":"CryptX","Dancer2::Serializer::Dumper":"Dancer2","Apache::Wyrd::Debug":"Apache-Wyrd","ExtUtils::MakeMaker::_version":"ExtUtils-MakeMaker","PApp::DataRef::Scalar":"PApp","Dpkg::Shlibs::Objdump":"Dpkg","Jifty::CAS::Store":"Jifty","Plack::Middleware::Recursive":"Plack","builtin":"perl","NDBM_File":"perl","RPC::XML::datatype":"RPC-XML","Apache::Wyrd::Interfaces::Dater":"Apache-Wyrd","CBOR::XS":"CBOR-XS","Tk::ReindexedText":"Tk","SOAP::Schema::WSDL":"SOAP-Lite","PApp::DataRef":"PApp","Pinto::Schema::ResultSet::Package":"Pinto","App::Pinto::Command::list":"Pinto","Apache::MP3::L10N::nn_no":"Apache-MP3","Net::DNS::RR::TLSA":"Net-DNS","MojoMojo::Schema::Result::Person":"MojoMojo","Image::ExifTool::Lang::fi":"Image-ExifTool","Image::ExifTool::Lytro":"Image-ExifTool","MHonArc::CharEnt::KOI8_A":"MHonArc","Net::OAuth::RequestTokenRequest":"Net-OAuth","Crypt::DSA::Util":"Crypt-DSA","Plack::LWPish":"Plack","Tk::ItemStyle":"Tk","Jifty::View::Declare::Page":"Jifty","Tk::DialogBox":"Tk","MojoMojo::View::TT":"MojoMojo","sigtrap":"perl","Mojo::IOLoop::TLS":"Mojolicious","Lemonldap::NG::Portal::Auth::Choice":"Lemonldap-NG-Portal","Config::Model::Lister":"Config-Model","diagnostics":"perl","Dpkg::Control::Info":"Dpkg","MHonArc::CharEnt::VISCII":"MHonArc","RPC::XML::Server":"RPC-XML","Apache::MP3::L10N::no":"Apache-MP3","ExtUtils::Mksymlists":"ExtUtils-MakeMaker","Crypt::PRNG::Sober128":"CryptX","Crypt::AuthEnc::CCM":"CryptX","Crypt::Digest::MD4":"CryptX","Pinto::Statistics":"Pinto","Dancer::Factory::Hook":"Dancer","Encode::Config":"Encode","Valiant::Validator::Scalar":"Valiant","App::Session::HTMLHidden":"App-Context","Config::Model::Role::Constants":"Config-Model","Crypt::Perl::RSA::PublicKey":"Crypt-Perl","Apache2::HookRun":"mod_perl","Tk::ROText":"Tk","Mojolicious::Plugin::Mount":"Mojolicious","Valiant::HTML::PagerBuilder":"Valiant","Jifty::Web::Form::Field::Date":"Jifty","SSL_Context":"IO-Socket-SSL","LWP::Protocol::data":"libwww-perl","Tk::MakeDepend":"Tk","XML::Atom::Client":"XML-Atom","Crypt::Mac::BLAKE2b":"CryptX","Valiant::Util::Exception::General":"Valiant","Crypt::Perl::ToDER":"Crypt-Perl","Jifty::Web":"Jifty","Perlbal::Service":"Perlbal","DBI::ProxyServer::db":"DBI","Crypt::Perl::X509::Extension::authorityKeyIdentifier":"Crypt-Perl","Crypt::Perl::RSA::PrivateKey":"Crypt-Perl","Image::ExifTool":"Image-ExifTool","DBD::File::Table":"DBI","Pod::Perldoc::ToRtf":"Pod-Perldoc","My::PersistentIterator":"SOAP-Lite","Pinto::Action::Add":"Pinto","Plack::Middleware::Head":"Plack","PApp::Application::Agni":"PApp","Mojo::UserAgent::Transactor":"Mojolicious","Config::Model::Exception::Syntax":"Config-Model","Config::Model::Exception::Any":"Config-Model","Net::DNS::RR::SVCB":"Net-DNS","Encode::JP":"Encode","Lemonldap::NG::Portal::Plugins::StayConnected":"Lemonldap-NG-Portal","Lemonldap::NG::Portal::2F::Password":"Lemonldap-NG-Portal","Jifty::Plugin::Config::Dispatcher":"Jifty","Crypt::Perl::X::ASN1::Prepare":"Crypt-Perl","Pinto::Action::Props":"Pinto","Perlbal::CommandContext":"Perlbal","Image::ExifTool::DarwinCore":"Image-ExifTool","Jifty::DBI::Filter::SaltHash":"Jifty-DBI","Bio::Graphics::Browser2::DataLoader::useq":"GBrowse","ExtUtils::MM_BeOS":"ExtUtils-MakeMaker","Apache::ReadConfig":"mod_perl","Net::LDAP::Reference":"perl-ldap","SOAP::Lite::Deserializer::XMLSchemaSOAP1_1":"SOAP-Lite","Perlbal::Plugin::Queues":"Perlbal","MHonArc::UTF8::CP1254":"MHonArc","Dpkg::Changelog::Entry":"Dpkg","Image::ExifTool::Rawzor":"Image-ExifTool","Valiant::Filter::Upper":"Valiant","PApp::XML":"PApp","Tk::ErrorDialog":"Tk","Kelp::Base":"Kelp","App::Security":"App-Context","Tk::Entry":"Tk","Catalyst::Action::Deserialize::XML::Simple":"Catalyst-Action-REST","Imager::Font":"Imager","App::Pinto::Command::add":"Pinto","Dancer2::Core::Types":"Dancer2","DBI::common":"DBI","SOAP::Server::Parameters":"SOAP-Lite","Dpkg::OpenPGP":"Dpkg","Elive::Connection":"Elive","CPAN":"CPAN","Pinto::Action::Delete":"Pinto","Module::Provision::TraitFor::VCS":"Module-Provision","APR::Request::Cookie":"libapreq2","ExtUtils::MakeMaker::Locale":"ExtUtils-MakeMaker","Lemonldap::NG::Portal::Auth::OpenIDConnect":"Lemonldap-NG-Portal","CGI::Session::MySQL":"CGI-Session","Tie::Scalar":"perl","Plack::Util::IOWithPath":"Plack","Dancer2::Logger::Capture::Trap":"Dancer2","Apache::Wyrd::Form::View":"Apache-Wyrd","Net::DNS::RR::L32":"Net-DNS","Catalyst::Response":"Catalyst-Runtime","Pinto::Config":"Pinto","MHonArc::UTF8::KOI8_B":"MHonArc","Net::DNS::RR::RP":"Net-DNS","Image::ExifTool::BPG":"Image-ExifTool","Crypt::Digest::SHA3_384":"CryptX","App::Response":"App-Context","SOAP::Transport::TCP":"SOAP-Lite","Apache::MP3::L10N::nl_nl":"Apache-MP3","ModPerl::ParseSource":"mod_perl","Image::ExifTool::PNG":"Image-ExifTool","Crypt::KeyWrap":"Crypt-JWT","App::Serializer":"App-Context","Apache::Wyrd::Datum::Set":"Apache-Wyrd","App::Serializer::Xml":"App-Context","Pod::Perldoc::BaseTo":"Pod-Perldoc","Bio::Graphics::Browser2::SubtrackTable":"GBrowse","MojoMojo::Formatter::Text":"MojoMojo","Dancer::Timer":"Dancer","Apache::App":"App-Context","Crypt::Digest::SHAKE":"CryptX","Apache::Wyrd::Input::Opt":"Apache-Wyrd","PApp::Storable":"PApp","Moxy::Plugin::RefererCutter":"Moxy","IO::Compress::Bzip2":"IO-Compress","DBD::mysql::st":"DBD-mysql","Valiant::Validator::Presence":"Valiant","Config::Model::Exception::Internal":"Config-Model","SOAP::Transport::HTTP":"SOAP-Lite","Data::UUID":"Data-UUID","Dpkg::Control::Tests":"Dpkg","CPAN::HandleConfig":"CPAN","Image::ExifTool::RIFF":"Image-ExifTool","XAO::Templates":"XAO-Web","Archive::Zip::Archive":"Archive-Zip","CGI::Application::Plugin::AutoRunmode":"CGI-Application-Plugin-AutoRunmode","Spoon::Formatter::Phrase":"Spoon","DBI::ProxyServer::dr":"DBI","Tk::Pixmap":"Tk","Search::OpenSearch::Server::Plack":"Search-OpenSearch-Server","Mojolicious::Plugins":"Mojolicious","Valiant::Validates":"Valiant","Archive::Tar::Win32":"Archive-Tar","Proc::Daemon":"Proc-Daemon","Time::localtime":"perl","Net::OAuth::V1_0A::UserAuthResponse":"Net-OAuth","Image::Info::PNG":"Image-Info","Catalyst::Exception::Go":"Catalyst-Runtime","Perlbal::Plugin::Highpri":"Perlbal","Image::ExifTool::APE":"Image-ExifTool","Apache2::ParseSource":"mod_perl","Mojolicious::Command::Author::inflate":"Mojolicious","Elive::Entity::Role":"Elive","Image::ExifTool::Real":"Image-ExifTool","Valiant::Filter::UcFirst":"Valiant","Tk::DummyEncode":"Tk","Apache::testold":"mod_perl","Crypt::Perl::X::InvalidJWK":"Crypt-Perl","Tk::Configure":"Tk","Apache::MP3::L10N":"Apache-MP3","Image::ExifTool::FLAC":"Image-ExifTool","mod_perl2":"mod_perl","DBI::Const::GetInfo::ANSI":"DBI","MHonArc::UTF8::ISO8859_6":"MHonArc","MojoMojo::Schema::Result::Page":"MojoMojo","Dpkg::Control::HashCore::Tie":"Dpkg","Net::LDAP::DSML":"perl-ldap","SVG::Sparkline::Utils":"SVG-Sparkline","Net::Server::Daemonize":"Net-Server","Kelp::Middleware":"Kelp","Mojolicious::Renderer":"Mojolicious","Jifty::Model::Metadata":"Jifty","Jifty::Plugin::Authentication::Password::Action::ConfirmEmail":"Jifty","GitLab::API::v4::Mock::RESTClient":"GitLab-API-v4","vmsish":"perl","GD":"GD","Tk::Xrm":"Tk","CGI::Session::BluePrint":"CGI-Session","Bundle::DBI":"DBI","App::Packer::Temp":"PAR","Data::FormValidator":"Data-FormValidator","Dpkg::Version":"Dpkg","Catalyst::Script::Test":"Catalyst-Runtime","Catalyst::Plugin::Static":"Catalyst-Plugin-Static","Zonemaster::Backend":"Zonemaster-Backend","Dpkg::Shlibs::Objdump::Object":"Dpkg","Net::DNS::Resolver::os2":"Net-DNS","Tk::Optionmenu":"Tk","Spoon::Hub":"Spoon","MHonArc::UTF8::ISO8859_3":"MHonArc","Image::ExifTool::RTF":"Image-ExifTool","DBD::SQLite::GetInfo":"DBD-SQLite","Zonemaster::Backend::Error::Conflict":"Zonemaster-Backend","APR::BucketAlloc":"mod_perl","Image::ExifTool::Casio":"Image-ExifTool","Apache::Wyrd::Services::MySQLIndex":"Apache-Wyrd","Dpkg::Shlibs::Symbol":"Dpkg","Jifty::Plugin::REST::Dispatcher":"Jifty","Crypt::Perl::PKCS10::Attributes":"Crypt-Perl","Crypt::Digest::Whirlpool":"CryptX","Crypt::Digest::SHA3_224":"CryptX","Jifty::Action::Autocomplete":"Jifty","Apache::Wyrd::Template":"Apache-Wyrd","OS2::ExtAttr":"perl","Log::Any::Adapter::Util":"Log-Any","MIME::Decoder":"MIME-tools","XAO::DO::Web::Math":"XAO-Web","Jifty::Upgrade":"Jifty","SOAP::Constants":"SOAP-Lite","CGI":"CGI","Log::Any::Adapter::Null":"Log-Any","English":"perl","Imager::File::ICO":"Imager","Image::ExifTool::NikonSettings":"Image-ExifTool","Dancer::Error":"Dancer","Apache::MP3::L10N::pl":"Apache-MP3","Image::ExifTool::Parrot":"Image-ExifTool","App::Pinto::Command::new":"Pinto","Dancer2::Template::Simple":"Dancer2","Image::ExifTool::Geolocation":"Image-ExifTool","Mojolicious::Command::version":"Mojolicious","App::Pinto::Command::install":"Pinto","Apache::Session::Browseable::Redis":"Apache-Session-Browseable","Image::ExifTool::Olympus":"Image-ExifTool","Moxy::Plugin::Status::500":"Moxy","DBD::ExampleP::dr":"DBI","Image::TIFF":"Image-Info","App::Github::Email":"App-Github-Email","Log::Any::Proxy::Null":"Log-Any","Mojo::Asset":"Mojolicious","Moxy::Attribute::CarrierHook":"Moxy","Perlbal::Plugin::Throttle::Store::Memory":"Perlbal","Jifty::Plugin::PubSub":"Jifty","Mail::Field::Generic":"MailTools","Bio::DB::Tagger::Iterator":"GBrowse","YAML::Type::ref":"YAML","CGI::Simple::Util":"CGI-Simple","Net::LDAP::RootDSE":"perl-ldap","Crypt::Perl::RSA::Template":"Crypt-Perl","Crypt::Perl::ECDSA::EC::FieldElement":"Crypt-Perl","Tie::StdHash":"perl","Crypt::Perl::X::ASN1::Encode":"Crypt-Perl","Compress::Raw::Bzip2":"Compress-Raw-Bzip2","Tk::Toplevel":"Tk","App::Documentation":"App-Context","Image::ExifTool::JPEGDigest":"Image-ExifTool","Apache::Table":"mod_perl","Crypt::Perl::ECDSA::KeyBase":"Crypt-Perl","Apache::Leak":"mod_perl","MojoMojo::Extension":"MojoMojo","App::ResourceLocker::IPCLocker":"App-Context","Net::OAuth::YahooAccessTokenRefreshRequest":"Net-OAuth","Jifty::View::Static::Handler":"Jifty","Dancer2::Session::Simple":"Dancer2","locale":"perl","Plack::Middleware::XSRFBlock":"Plack-Middleware-XSRFBlock","LWP::Protocol::cpan":"libwww-perl","LWP::Protocol::ldaps":"perl-ldap","Pinto::SpecFactory":"Pinto","Lemonldap::NG::Portal::Auth::Custom":"Lemonldap-NG-Portal","Apache::Wyrd::Site::Widget":"Apache-Wyrd","Email::MIME::Encode":"Email-MIME","DBM_Filter::encode":"perl","Tk::Bitmap":"Tk","Crypt::Perl::X509::Extension::keyUsage":"Crypt-Perl","Net::DNS::RR::LP":"Net-DNS","LWP::Protocol::mailto":"libwww-perl","Legacy::Graphics::Browser::Synteny":"GBrowse","Apache::Wyrd::Input::Condenser":"Apache-Wyrd","Dpkg::Source::Package::V3::Custom":"Dpkg","CGI::apacheSSI::LMOD":"CGI-apacheSSI","Dancer::Logger::Console":"Dancer","HTML::HeadParser":"HTML-Parser","RT::Authen::ExternalAuth::DBI::Cookie":"RT-Authen-ExternalAuth","MHonArc::UTF8::ISO8859_10":"MHonArc","Apache::SOAP":"SOAP-Lite","Crypt::Mac::BLAKE2s":"CryptX","Catalyst::Action::Deserialize::View":"Catalyst-Action-REST","Net::LDAP::Control::SortResult":"perl-ldap","DBIx::Custom::Query":"DBIx-Custom","Pinto::Role::Installer":"Pinto","CPAN::Mirrors":"CPAN","Lemonldap::NG::Portal::UserDB::Demo":"Lemonldap-NG-Portal","Lemonldap::NG::Portal::Plugins::Upgrade":"Lemonldap-NG-Portal","Image::Info::SVG":"Image-Info","Dancer::Hook::Properties":"Dancer","ExtUtils::MM_AIX":"ExtUtils-MakeMaker","Net::OAuth::SignatureMethod::PLAINTEXT":"Net-OAuth","Apache::MP3::L10N::nb":"Apache-MP3","Lemonldap::NG::Portal::UserDB::Choice":"Lemonldap-NG-Portal","Apache::Wyrd::Request":"Apache-Wyrd","Imager::Probe":"Imager","Tk::Labelframe":"Tk","Bio::Graphics::Browser2::UserDB":"GBrowse","Crypt::Random::Source::Strong::devrandom":"Crypt-Random-Source","Net::DNS::Question":"Net-DNS","User::pwent":"perl","DBD::Proxy::db":"DBI","Crypt::Checksum::Adler32":"CryptX","Lemonldap::NG::Portal::Register::AD":"Lemonldap-NG-Portal","Apache::ASP::State":"Apache-ASP","Archive::Tar::Std::_io":"Archive-Tar","Pinto::Locator":"Pinto","Tk::NBFrame":"Tk","Jifty::DBI::SchemaGenerator":"Jifty-DBI","YAML::LibYAML":"YAML-LibYAML","Lemonldap::NG::Portal::Plugins::AuthOidcPkce":"Lemonldap-NG-Portal","Crypt::Perl::ECDSA::NIST":"Crypt-Perl","Email::MIME::Creator":"Email-MIME","Crypt::Random::Source::Base::File":"Crypt-Random-Source","HTML::Template::Pro::WrapAssociate":"HTML-Template-Pro","Jifty::Plugin::RequestInspector::Model::Request":"Jifty","MHonArc::CharEnt::KOI8_E":"MHonArc","Net::IPAddress::Util":"Net-IPAddress-Util","Tk::Photo":"Tk","File::DataClass::Functions":"File-DataClass","Dwarf":"Cmd-Dwarf","Perlbal::Test":"Perlbal","Catalyst::Component::ContextClosure":"Catalyst-Runtime","Jifty::Test":"Jifty","Image::ExifTool::TagLookup":"Image-ExifTool","Log::Any":"Log-Any","Bio::Graphics::Browser2::MetaSegment":"GBrowse","Kossy":"Kossy","re":"perl","Pinto::Initializer":"Pinto","Crypt::CBC::PBKDF":"Crypt-CBC","RPC::XML::response":"RPC-XML","Dancer2::Handler::File":"Dancer2","File::Path":"File-Path","Jifty::DBI::Record::Cachable":"Jifty-DBI","MHonArc::UTF8::AppleCyrillic":"MHonArc","Valiant::HTML::Util::FormTags":"Valiant","Mojo::Content::Single":"Mojolicious","Image::ExifTool::InDesign":"Image-ExifTool","Dancer2::Core::Hook":"Dancer2","Mojolicious::Plugin::HeaderCondition":"Mojolicious","Dpkg::Compression::Process":"Dpkg","Search::OpenSearch::Server":"Search-OpenSearch-Server","Mojo::Message::Response":"Mojolicious","Fake::Our":"Fake-Our","Crypt::Passwd::XS":"Crypt-Passwd-XS","Valiant::Proxy::Object":"Valiant","Lemonldap::NG::Portal::Plugins::RememberAuthChoice":"Lemonldap-NG-Portal","Crypt::Digest::BLAKE2b_256":"CryptX","Lemonldap::NG::Portal::Password::Base":"Lemonldap-NG-Portal","Bio::DB::SeqFeature::Store::BedLoader":"GBrowse","Tk::Scrollbar":"Tk","Bio::Graphics::Browser2::Realign":"GBrowse","Crypt::Perl::ECDSA::Math":"Crypt-Perl","XML::Atom::Content":"XML-Atom","Catalyst::ActionRole::ConsumesContent":"Catalyst-Runtime","HTTP::Session2::ServerStore":"HTTP-Session2","ModPerl::InterpPool":"mod_perl","Dancer::Logger::Null":"Dancer","IPC::Run::Win32Helper":"IPC-Run","DBIx::Class::Valiant::Validator::SetSize":"Valiant","XML::LibXML::_SAXParser":"XML-LibXML","MHonArc::UTF8::AppleTurkish":"MHonArc","XAO::DO::CGI":"XAO-Web","Net::SNMP::Security::USM":"Net-SNMP","Jifty::DBI::Filter::YAML":"Jifty-DBI","Dancer::Logger::Abstract":"Dancer","Dancer::Continuation":"Dancer","OS2::PrfDB::Sub":"perl","Pinto::Role::Transactional":"Pinto","MyTestModule":"perl","Tk::Widget":"Tk","Dancer2::Core::Role::Hookable":"Dancer2","Mojolicious::Command::cgi":"Mojolicious","Image::ExifTool::IPTC":"Image-ExifTool","Net::SNMP::Transport::IPv4":"Net-SNMP","Jifty::Plugin::SetupWizard::Action::TestDatabaseConnectivity":"Jifty","Pinto::Remote::Result":"Pinto","Crypt::OpenSSL::RSA":"Crypt-OpenSSL-RSA","PApp::XSLT::LibXSLT":"PApp","Tk::DragDrop::SunDrop":"Tk","Mojolicious::Command::Author::generate::dockerfile":"Mojolicious","Mojo::Cookie::Request":"Mojolicious","XML::LibXML::NodeList":"XML-LibXML","APR::Const":"mod_perl","Crypt::Digest::SHA224":"CryptX","XML::Atom::Thing":"XML-Atom","Dpkg::Source::Package::V1":"Dpkg","PerlIO":"perl","PAR::StrippedPARL::Base":"PAR-Packer","Crypt::Random::Provider::devrandom":"Crypt-Random","App::Pinto::Command::stacks":"Pinto","Plack::Middleware::SimpleLogger":"Plack","Kossy::BodyParser::UrlEncoded":"Kossy","LWP::Protocol::https":"LWP-Protocol-https","Dpkg::Control::Hash":"Dpkg","MHonArc::CharEnt::AppleTurkish":"MHonArc","Apache::SessionX::Generate::MD5":"Apache-SessionX","Crypt::Perl::X509::GeneralName":"Crypt-Perl","SOAP::XMLSchema2001::Deserializer":"SOAP-Lite","SVG::Sparkline::Bar":"SVG-Sparkline","MIME::Entity":"MIME-tools","I18N::LangTags":"perl","Galileo::DB::Schema::Result::Page":"Galileo","Dancer::Handler::Standalone":"Dancer","RPC::XML":"RPC-XML","Lemonldap::NG::Portal::2F::UTOTP":"Lemonldap-NG-Portal","Net::servent":"perl","SOAP::Packager::DIME":"SOAP-Lite","GitLab::API::v4::Config":"GitLab-API-v4","Crypt::Perl::X509::Extension::certificatePolicies":"Crypt-Perl","Config::Extensions":"perl","Lemonldap::NG::Portal::Auth::WebID":"Lemonldap-NG-Portal","Tk::Wm":"Tk","Mojolicious":"Mojolicious","App::Service":"App-Context","XAO::testcases::Web::base":"XAO-Web","Alien::PCRE2":"Alien-PCRE2","MojoMojo::Formatter::Pod":"MojoMojo","CPAN::DeferredCode":"CPAN","PApp::DataRef::Base":"PApp","CGI::Application::Dispatch::PSGI":"CGI-Application-Dispatch","Apache::Resource":"mod_perl","Moxy::Plugin::GPS::EZweb":"Moxy","DBD::SQLite::VirtualTable::Cursor":"DBD-SQLite","Config::Model::Exception::ConfigFile::Missing":"Config-Model","Valiant::Util::Exception::NameNotFilter":"Valiant","Apache::Wyrd::SQLForm":"Apache-Wyrd","Catalyst::Action::Deserialize::JSON::XS":"Catalyst-Action-REST","Net::DNS::Resolver::Base":"Net-DNS","DBIx::Custom::Util":"DBIx-Custom","Apache::Wyrd::View":"Apache-Wyrd","Net::DNS::RR::GPOS":"Net-DNS","Apache::Wyrd::FileSize":"Apache-Wyrd","Net::DNS::RR::AMTRELAY":"Net-DNS","X509_Certificate":"IO-Socket-SSL","Perlbal::ClientProxy":"Perlbal","ops":"perl","XML::LibXML::Comment":"XML-LibXML","App::Pinto::Command::roots":"Pinto","Lemonldap::NG::Portal::Plugins::CheckEntropy":"Lemonldap-NG-Portal","MojoMojo":"MojoMojo","Dpkg::Control::Changelog":"Dpkg","Pinto::Target::Package":"Pinto","Config::Model::Exception::WrongType":"Config-Model","Haiku":"perl","DBD::NullP::dr":"DBI","Dpkg::BuildOptions":"Dpkg","Image::ExifTool::GPS":"Image-ExifTool","Net::DNS::RR::CAA":"Net-DNS","YAML::Type::code":"YAML","RT::Authen::ExternalAuth":"RT-Authen-ExternalAuth","Kelp::Module::Config::Less":"Kelp","Data::FormValidator::Filters":"Data-FormValidator","Crypt::Perl::PK":"Crypt-Perl","Lemonldap::NG::Portal::Lib::OIDCTokenExchange":"Lemonldap-NG-Portal","Net::LDAP::Control::PreRead":"perl-ldap","Devel::StackTrace":"Devel-StackTrace","Module::Metadata":"Module-Metadata","DBIx::Class::Valiant::Util::Exception::TooManyRows":"Valiant","Spreadsheet::ParseXLSX::Decryptor":"Spreadsheet-ParseXLSX","Image::ExifTool::Torrent":"Image-ExifTool","Spreadsheet::ParseXLSX::Decryptor::Standard":"Spreadsheet-ParseXLSX","Module::Provision":"Module-Provision","Pinto::Server::Responder::File":"Pinto","Pod::Perldoc::ToTk":"Pod-Perldoc","Lemonldap::NG::Portal::CertificateResetByMail::Custom":"Lemonldap-NG-Portal","Dpkg::Shlibs":"Dpkg","Apache::ASP::Lang::PerlScript":"Apache-ASP","Image::ExifTool::WTV":"Image-ExifTool","Email::MIME":"Email-MIME","HTML::EP":"HTML-EP","SOAP::Transport::LOCAL":"SOAP-Lite","MojoMojo::Schema::ResultSet::Content":"MojoMojo","Moxy::Plugin::Status::404":"Moxy","Archive::Zip::StringMember":"Archive-Zip","Image::ExifTool::Radiance":"Image-ExifTool","LWP::Debug":"libwww-perl","Net::DNS::RR::HTTPS":"Net-DNS","Apache::MP3::L10N::ko":"Apache-MP3","Jifty::TestServer::Apache":"Jifty","Lemonldap::NG::Portal::Plugins::Refresh":"Lemonldap-NG-Portal","Image::ExifTool::Text":"Image-ExifTool","App::Serializer::XMLDumper":"App-Context","RPC::XML::ParserFactory":"RPC-XML","Dancer2::Handler::AutoPage":"Dancer2","XML::Atom::Util":"XML-Atom","Net::LDAP::Control::NoOp":"perl-ldap","Dpkg::Substvars":"Dpkg","Jifty::CAS::Store::Nested":"Jifty","APR::URI":"mod_perl","DBI::DBD::SqlEngine::TieMeta":"DBI","App::Conf::File":"App-Context","My::Parameters":"SOAP-Lite","Net::LDAP::Control::DontUseCopy":"perl-ldap","Crypt::Perl::Math":"Crypt-Perl","CGI::Session::File":"CGI-Session","POE::Component::IRC::Plugin::BotCommand":"POE-Component-IRC","Valiant::Validator::Hash":"Valiant","ExtUtils::MM_MacOS":"ExtUtils-MakeMaker","Module::Provision::MetaData":"Module-Provision","Jifty::Plugin::Authentication::Password::Notification::ConfirmEmail":"Jifty","Catalyst::Exception::Base":"Catalyst-Runtime","Image::Info::Result":"Image-Info","Dancer::Serializer::Dumper":"Dancer","DBD::SQLite::VirtualTable":"DBD-SQLite","LWP::Protocol::ftp":"libwww-perl","Plack::Middleware::Conditional":"Plack","Config::Model::Role::ComputeFunction":"Config-Model","Jifty::Plugin::I18N::Action::SetLang":"Jifty","Dpkg::Control":"Dpkg","CPAN::Queue::Item":"CPAN","Jifty::Plugin::Authentication::Password::Action::Signup":"Jifty","Catalyst::EngineLoader":"Catalyst-Runtime","Pinto":"Pinto","Apache::Session::Store::LDAP":"Apache-Session-LDAP","SOAP::Lite::Deserializer::XMLSchema1999":"SOAP-Lite","Net::DNS::RR::SRV":"Net-DNS","Moxy::Component::Context":"Moxy","Apache::Wyrd::Interfaces::Columnize":"Apache-Wyrd","Catalyst::Plugin::Static::Simple":"Catalyst-Plugin-Static-Simple","Plack::Middleware::ErrorDocument":"Plack","MojoMojo::Formatter::Pod::Simple::HTML":"MojoMojo","POSIX::SigRt":"perl","Plack::Server":"Plack","App::Exceptions":"App-Context","MHonArc::UTF8::ISO8859_13":"MHonArc","Dpkg::Build::Info":"Dpkg","RPC::XML::datetime_iso8601":"RPC-XML","Image::ExifTool::DICOM":"Image-ExifTool","IPC::Cmd::System":"IPC-Cmd","FakeHomol":"GBrowse","Log::Any::Proxy::WithStackTrace":"Log-Any","App::Pinto::Command::lock":"Pinto","I18N::LangTags::Detect":"perl","MHonArc::CharEnt::CP949":"MHonArc","Image::ExifTool::PICT":"Image-ExifTool","Net::Server::Log::Log::Log4perl":"Net-Server","Dpkg::Vendor":"Dpkg","Lemonldap::NG::Portal::Plugins::Notifications":"Lemonldap-NG-Portal","HTML::Perlinfo":"HTML-Perlinfo","Spreadsheet::ParseExcel::Format":"Spreadsheet-ParseExcel","Template::Quick":"MySQL-Admin","Tk::DirTree":"Tk","Jifty::I18N":"Jifty","Lemonldap::NG::Portal::Lib::Wrapper":"Lemonldap-NG-Portal","MHonArc::UTF8::CP932":"MHonArc","DBD::Gofer::Policy::classic":"DBI","ExtUtils::MakeMaker::Config":"ExtUtils-MakeMaker","Log::Any::Adapter::Multiplex":"Log-Any","Net::SNMP::Transport::IPv4::UDP":"Net-SNMP","Jifty::Web::Form::Field::Text":"Jifty","XAO::DO::Web::Condition":"XAO-Web","Net::LDAP::Util":"perl-ldap","Config::Model::AnyThing":"Config-Model","ExtUtils::Typemaps":"ExtUtils-ParseXS","Crypt::Perl::RNG":"Crypt-Perl","MojoMojo::Schema::ResultSet::Page":"MojoMojo","Jifty::Plugin::Authentication::Password::Action::GeneratePasswordToken":"Jifty","Jifty::Plugin::ClassLoader":"Jifty","POE::Component::IRC::Plugin::BotAddressed":"POE-Component-IRC","Mojolicious::Plugin::OAuth2":"Mojolicious-Plugin-OAuth2","Apache::EP":"HTML-EP","Dpkg::Checksums":"Dpkg","Bio::Graphics::GBrowseFeature":"GBrowse","Net::OAuth::UserAuthRequest":"Net-OAuth","GD::Simple":"GD","Config::Model::Annotation":"Config-Model","YAML::Types":"YAML","Proc::Killfam":"Proc-ProcessTable","Devel::Peek":"perl","Legacy::Graphics::Browser":"GBrowse","MHonArc::CharEnt::KOI8_R":"MHonArc","Apache::AuthCAS":"Apache-AuthCAS","Perlbal::ChunkedUploadState":"Perlbal","B::Xref":"perl","File::DataClass::Constants":"File-DataClass","Lemonldap::NG::Portal::Main::Init":"Lemonldap-NG-Portal","RPC::XML::Method":"RPC-XML","Config::Model::Exception::ModelDeclaration":"Config-Model","Apache::Session::Browseable::Oracle":"Apache-Session-Browseable","Valiant::HTML::FormBuilder::Checkbox":"Valiant","Cpanel::JSON::XS::Type":"Cpanel-JSON-XS","Net::Server::Proto::SSLEAY":"Net-Server","Config::Model::DumpAsData":"Config-Model","Net::Dropbear::XS::SessionAccept":"Net-Dropbear","Lemonldap::NG::Portal::Password::DBI":"Lemonldap-NG-Portal","PerlIO::via":"perl","Encode::Alias":"Encode","POE::Component::IRC::Plugin::Whois":"POE-Component-IRC","Lemonldap::NG::Portal::Plugins::SOAPServer":"Lemonldap-NG-Portal","XML::Atom::Category":"XML-Atom","Moxy::Plugin::Hosts":"Moxy","Valiant::Translation":"Valiant","Kelp::Module::Logger":"Kelp","Jifty::DBI::Handle::Informix":"Jifty-DBI","Apache::MP3::L10N::sl":"Apache-MP3","PApp::Env":"PApp","Catalyst::Exception::Basic":"Catalyst-Runtime","SSL_HANDLE":"IO-Socket-SSL","Net::LDAP::ASN":"perl-ldap","Plack::Middleware::Session":"Plack-Middleware-Session","Mail::Mailer::testfile":"MailTools","MIME::Parser":"MIME-tools","Crypt::Stream::Sober128":"CryptX","Log::Any::Adapter::Core":"Log-Any","MySQL::Admin":"MySQL-Admin","Crypt::Perl::X509::RelativeDistinguishedName":"Crypt-Perl","Tk::Submethods":"Tk","Jifty::Plugin::ViewDeclarePage::Page":"Jifty","Net::DNS::RR::NSEC":"Net-DNS","Plack::Middleware::AccessLog::Timed":"Plack","Valiant::HTML::Util::TagBuilder::_tags":"Valiant","Net::DNS::RR::SSHFP":"Net-DNS","Jifty::View::Declare::Handler":"Jifty","Bio::Graphics::Browser2::Util":"GBrowse","App::Context::Server":"App-Context","Cmd::Dwarf":"Cmd-Dwarf","App::LogChannel":"App-Context","Tk::PNG":"Tk","Apache::ASP":"Apache-ASP","Jifty::Web::Form::Field::DateTime":"Jifty","Pod::Html":"perl","HTML::EP::Parser":"HTML-EP","warnings":"perl","ModPerl::MM":"mod_perl","Plack::Middleware::StaticShared":"Plack-Middleware-StaticShared","Crypt::Perl::X::Base":"Crypt-Perl","Net::SNMP::Transport":"Net-SNMP","DBI::DBD::SqlEngine::TableSource":"DBI","File::RandomAccess":"Image-ExifTool","Lemonldap::NG::Portal::Register::LDAP":"Lemonldap-NG-Portal","APR::Request::Error":"libapreq2","MojoMojo::Schema::Result::Content":"MojoMojo","Net::DNS::RR::LOC":"Net-DNS","IO::Compress::RawDeflate":"IO-Compress","Net::DNS::RR::RESINFO":"Net-DNS","MHonArc::UTF8::CP1251":"MHonArc","ODBM_File":"perl","Catalyst::Controller":"Catalyst-Runtime","Pinto::IndexWriter":"Pinto","Imager::Expr::Postfix":"Imager","Bio::Graphics::Browser2::DataLoader::wig2bigwig":"GBrowse","DBD::SQLite::Constants":"DBD-SQLite","Pinto::ModlistWriter":"Pinto","Plack::Middleware::IIS6ScriptNameFix":"Plack","Perlbal::Plugin::Palimg":"Perlbal","Galileo::DB::Schema::Result::User":"Galileo","Tk::InputO":"Tk","Moxy::Plugin::DisplayWidth":"Moxy","DBD::Sponge::db":"DBI","Log::Any::Adapter":"Log-Any","Jifty::View::Mason::Request":"Jifty","CGI::HTML::Functions":"CGI","DBI::DBD::SqlEngine::Statement":"DBI","MHonArc::UTF8":"MHonArc","CGI::Session::Driver":"CGI-Session","Net::DNS::RR::DNSKEY":"Net-DNS","Mail::Util":"MailTools","CPAN::Plugin::Specfile":"CPAN","MojoMojo::Model::DBIC":"MojoMojo","Tk::install":"Tk","Jifty::Action::Record::Update":"Jifty","Zonemaster::Backend::Error::JsonError":"Zonemaster-Backend","Net::Server::Proto::UDP":"Net-Server","Jifty::Web::Menu":"Jifty","Plack::Test::Suite":"Plack","MojoMojo::Schema":"MojoMojo","Lemonldap::NG::Portal::Auth::_WebForm":"Lemonldap-NG-Portal","Crypt::Mode::OFB":"CryptX","Apache2::Build":"mod_perl","HTML::Scrubber":"HTML-Scrubber","Net::DNS::RR::OPT::PADDING":"Net-DNS","App::ResourceLocker::IPCSemaphore":"App-Context","Pinto::Role::Committable":"Pinto","MHonArc::CharMaps":"MHonArc","Jifty::Plugin::CSSQuery":"Jifty","Crypt::Perl::ECDSA::EC::Point":"Crypt-Perl","Bio::Graphics::Browser2":"GBrowse","XAO::DO::Web::Page":"XAO-Web","Valiant::HTML::TagBuilder":"Valiant","Zonemaster::Backend::Error":"Zonemaster-Backend","Bio::Graphics::Browser2::Render":"GBrowse","Net::LDAP::Control::MatchedValues":"perl-ldap","Pinto::Remote":"Pinto","Galileo":"Galileo","MojoMojo::Schema::Result::Role":"MojoMojo","CPAN::Prompt":"CPAN","Mojolicious::Command::Author::generate::makefile":"Mojolicious","App::cpanminus":"App-cpanminus","Image::Info::JPEG":"Image-Info","DBI::Util::CacheMemory":"DBI","Valiant::HTML::Util::Collection":"Valiant","App::Pinto::Command::verify":"Pinto","Moxy::Plugin::Status::401":"Moxy","Apache::Wyrd::Site::MySQLIndexBot":"Apache-Wyrd","Mail::Send":"MailTools","Tk::Checkbutton":"Tk","SOAP::Transport::LOOPBACK::Client":"SOAP-Lite","Dpkg::Vendor::Ubuntu":"Dpkg","ModPerl::FunctionMap":"mod_perl","Net::DNS::RR::CSYNC":"Net-DNS","Dancer::Template::Abstract":"Dancer","XML::LibXML::Namespace":"XML-LibXML","Apache::Wyrd::Cookie":"Apache-Wyrd","Spoon::Formatter::Wafl":"Spoon","PApp::XPCSE":"PApp","SOAP::Server::Object":"SOAP-Lite","DBD::MariaDB":"DBD-MariaDB","Jifty::Plugin::Config":"Jifty","Pinto::Action::Unregister":"Pinto","Image::Info::PPM":"Image-Info","Lemonldap::NG::Portal::Auth::Kerberos":"Lemonldap-NG-Portal","Spoon::Config":"Spoon","Config::Model::Backend::Fstab":"Config-Model","App::Pinto::Command::unregister":"Pinto","Net::IPAddress::Util::Collection":"Net-IPAddress-Util","HTML::LinkExtor":"HTML-Parser","Catalyst::ScriptRunner":"Catalyst-Runtime","Jifty::RightsFrom":"Jifty","Config::Model::Warper":"Config-Model","DBD::Proxy":"DBI","HTML::Perlinfo::General":"HTML-Perlinfo","Lemonldap::NG::Portal::Plugins::Impersonation":"Lemonldap-NG-Portal","Apache::Wyrd::Datum::Enum":"Apache-Wyrd","Apache2::Status":"mod_perl","remove_file_and_try_executable_again":"PAR","Config::Model::IdElementReference":"Config-Model","Crypt::Mac::XCBC":"CryptX","Catalyst::Base":"Catalyst-Runtime","Crypt::Perl::Ed25519::Math":"Crypt-Perl","Image::Info::AVIF":"Image-Info","MojoMojo::Schema::Base::Result":"MojoMojo","HTML::TokeParser":"HTML-Parser","File::Basename":"perl","Crypt::Perl::ECDSA::EncodedPoint":"Crypt-Perl","Jifty::View::Declare::BaseClass":"Jifty","Net::DNS::Resolver::android":"Net-DNS","Net::LDAP::Control::VLV":"perl-ldap","Lemonldap::NG::Portal::Register::Custom":"Lemonldap-NG-Portal","CPAN::Shell":"CPAN","App::ValueDomain":"App-Context","App::Context::ModPerl":"App-Context","MHonArc::UTF8::ISO8859_4":"MHonArc","Mojo::Promise":"Mojolicious","MIME::WordDecoder::US_ASCII":"MIME-tools","IPC::Cmd":"IPC-Cmd","Lemonldap::NG::Portal::Plugins::ContextSwitching":"Lemonldap-NG-Portal","Net::LDAP::Control::Relax":"perl-ldap","Dpkg::Compression::FileHandle":"Dpkg","App::CallDispatcher::HTTPSimple":"App-Context","GPIB::hpe3631a":"GPIB","Net::DNS::RR::NULL":"Net-DNS","Dpkg::Deps::Union":"Dpkg","Mojo::IOLoop::Subprocess":"Mojolicious","Zonemaster::Backend::TestAgent":"Zonemaster-Backend","Jifty::DBI::Handle::mysql":"Jifty-DBI","CGI::Session::Query":"CGI-Session","Dancer::Serializer::JSON":"Dancer","Config::Model::TypeConstraints":"Config-Model","MHonArc::UTF8::HP_ROMAN8":"MHonArc","XML::LibXML::Error":"XML-LibXML","ModPerl::Code":"mod_perl","Bio::Graphics::Wiggle::Loader::Nosample":"GBrowse","MHonArc::CharEnt::ISO8859_3":"MHonArc","Jifty::Handle":"Jifty","Valiant::HTML::Form":"Valiant","Tk::LabeledEntryLabeledRadiobutton":"Tk","Tk::ProgressBar":"Tk","POE::Component::IRC::Plugin::BotTraffic":"POE-Component-IRC","Image::Info::SVG::XMLLibXMLReader":"Image-Info","Jifty":"Jifty","APR::Request::Param":"libapreq2","MDK::Common::Math":"MDK-Common","File::DataClass":"File-DataClass","Pinto::Target::Distribution":"Pinto","Jifty::Script::Env":"Jifty","Legacy::Graphics::Browser::PageSettings":"GBrowse","bytes":"perl","SOAP::Transport::POP3::Server":"SOAP-Lite","Perlbal::SocketSSL2":"Perlbal","Devel::PatchPerl::Plugin::Compiler":"App-perlall","Apache::ASP::CGI::Table":"Apache-ASP","Thread":"perl","Imager::Matrix2d":"Imager","Pinto::Locator::Stratopan":"Pinto","MojoMojo::Schema::Result::Link":"MojoMojo","Imager::Font::Test":"Imager","FileCache":"perl","Net::DNS::RR::OPT::CHAIN":"Net-DNS","POE::Filter::IRC":"POE-Component-IRC","Apache::Session::Browseable::Store::Informix":"Apache-Session-Browseable","IPC::Run::Debug":"IPC-Run","PApp::User":"PApp","Jifty::DBI::HasFilters":"Jifty-DBI","MHonArc::UTF8::CP1258":"MHonArc","App::Serializer::TextArray":"App-Context","MHonArc::UTF8::CP949":"MHonArc","Image::ExifTool::RSRC":"Image-ExifTool","Dpkg::Control::Fields":"Dpkg","Image::ExifTool::MRC":"Image-ExifTool","Crypt::Digest::RIPEMD320":"CryptX","MySQL::Admin::Translate":"MySQL-Admin","Dancer::Test":"Dancer","Plack::App::CGIBin":"Plack","Mojolicious::Commands":"Mojolicious","Catalyst::Response::Writer":"Catalyst-Runtime","HTML::Perlinfo::Modules":"HTML-Perlinfo","IO::Compress::Zlib::Constants":"IO-Compress","MojoMojo::Schema::Result::PageVersion":"MojoMojo","LWP::Protocol::https::Socket":"LWP-Protocol-https","Perlbal::ClientManage":"Perlbal","CGI::Simple::Standard":"CGI-Simple","Apache::MP3::L10N::it":"Apache-MP3","XAO::DO::Web::Config":"XAO-Web","Pinto::CommitMessage":"Pinto","Moxy::Request":"Moxy","App::Session":"App-Context","JPL::Compile":"perl","IO::Uncompress::Adapter::Identity":"IO-Compress","Net::DNS::RR::OPT::CLIENT_SUBNET":"Net-DNS","App::Pinto::Command::copy":"Pinto","Tk::Menu::Radiobutton":"Tk","PApp::FormBuffer":"PApp","XML::Atom::Person":"XML-Atom","Unicode::UCD":"perl","RPC::XML::Parser":"RPC-XML","Lemonldap::NG::Portal::Plugins::BruteForceProtection":"Lemonldap-NG-Portal","HTTP::Session2::Random":"HTTP-Session2","MHonArc::CharEnt::AppleRoman":"MHonArc","Image::ExifTool::PSP":"Image-ExifTool","Moxy::Plugin::UserAgentSwitcher":"Moxy","CPAN::Index":"CPAN","CPAN::Exception::yaml_process_error":"CPAN","ExtUtils::MM_VMS":"ExtUtils-MakeMaker","GD::Polyline":"GD","IO::Uncompress::Inflate":"IO-Compress","Dpkg::Source::Package::V3::Bzr":"Dpkg","Catalyst::Action::Serialize::JSONP":"Catalyst-Action-REST","File::Spec::Cygwin":"PathTools","Jifty::Plugin::LetMe::Dispatcher":"Jifty","Dancer::Object":"Dancer","Dancer::Template":"Dancer","yaml_sequence":"YAML","Lemonldap::NG::Portal::Lib::Remote":"Lemonldap-NG-Portal","Dpkg::OpenPGP::KeyHandle":"Dpkg","Elive::DAO::Array":"Elive","YAML::Any":"YAML","Mojolicious::Routes::Route":"Mojolicious","Lemonldap::NG::Portal::Plugins::NewLocationWarning":"Lemonldap-NG-Portal","DBI::ProxyServer":"DBI","Apache::Wyrd::Query":"Apache-Wyrd","DBI::DBD::SqlEngine::TieTables":"DBI","ExtUtils::MM_QNX":"ExtUtils-MakeMaker","MojoMojo::Schema::Result::Comment":"MojoMojo","Net::DNS::RR::DNAME":"Net-DNS","SOAP::Server":"SOAP-Lite","MojoMojo::Formatter::YouTube":"MojoMojo","Plack::Middleware::XFramework":"Plack","Mojo::UserAgent::Server":"Mojolicious","Pinto::Role::FileFetcher":"Pinto","App::Packer::PAR":"PAR-Packer","GitUtils":"perl","Term::ReadLine::Gnu::AU":"Term-ReadLine-Gnu","Dancer2::Logger::Diag":"Dancer2","Bio::DB::GFF::Aggregator::wormbase_gene":"GBrowse","IPC::Open3":"perl","Spoon":"Spoon","Apache::Session::Browseable::Store::Sybase":"Apache-Session-Browseable","Image::ExifTool::LNK":"Image-ExifTool","Opcode":"perl","Net::LDAP::LDIF":"perl-ldap","Term::ReadLine::Gnu":"Term-ReadLine-Gnu","Catalyst::Action::REST":"Catalyst-Action-REST","Dpkg::Path":"Dpkg","Legacy::Graphics::Browser::I18n":"GBrowse","Pinto::Locator::Mirror":"Pinto","App::Pinto::Command::default":"Pinto","Archive::Zip::Tree":"Archive-Zip","for":"perl","Lemonldap::NG::Portal::Lib::OtherSessions":"Lemonldap-NG-Portal","Apache::Wyrd::Datum::Char":"Apache-Wyrd","HeaderParser":"perl","Devel::StackTrace::Frame":"Devel-StackTrace","GitLab::API::v4::RESTClient":"GitLab-API-v4","Pinto::Action::Rename":"Pinto","MojoMojo::Formatter::File":"MojoMojo","Lemonldap::NG::Portal::Password::Custom":"Lemonldap-NG-Portal","Crypt::Cipher::SEED":"CryptX","Net::DNS":"Net-DNS","Jifty::Config":"Jifty","Crypt::Digest::BLAKE2s_160":"CryptX","Tk::DropSite":"Tk","Plack::Middleware::IIS7KeepAliveFix":"Plack","RPC::XML::Procedure":"RPC-XML","Dancer2::Core::Session":"Dancer2","Image::ExifTool::Red":"Image-ExifTool","Jifty::ClassLoader":"Jifty","Lemonldap::NG::Portal::CertificateResetByMail::Demo":"Lemonldap-NG-Portal","Lemonldap::NG::Portal::Password::AD":"Lemonldap-NG-Portal","Bio::DB::SeqFeature::Store::Alias::Iterator":"GBrowse","Dezi":"Dezi","Plack::Util":"Plack","XML::LibXML::Dtd":"XML-LibXML","SOAP::Packager::MIME":"SOAP-Lite","Image::ExifTool::M2TS":"Image-ExifTool","Bio::Graphics::Browser2::Shellwords":"GBrowse","Apache::Wyrd::CGISetter":"Apache-Wyrd","MHonArc::CharEnt::ISO8859_9":"MHonArc","Email::MIME::Modifier":"Email-MIME","APR::Request::CGI":"libapreq2","APR::Finfo":"mod_perl","Image::Info::XPM":"Image-Info","Image::ExifTool::PanasonicRaw":"Image-ExifTool","Net::OAuth::ConsumerRequest":"Net-OAuth","Lemonldap::NG::Portal::Lib::SMTP":"Lemonldap-NG-Portal","Image::ExifTool::MinoltaRaw":"Image-ExifTool","Plack::Server::Standalone::Prefork":"Plack","Module::Provision::TraitFor::AddingFiles":"Module-Provision","Module::Load::Conditional":"Module-Load-Conditional","Plack::Response":"Plack","UI::Dialog::Backend::ASCII":"UI-Dialog","Net::DNS::ZoneFile::Text":"Net-DNS","Config::Model::Value::LayeredInclude":"Config-Model","Mail::Audit::KillDups":"Mail-Audit","Jifty::Plugin::Halo::Mason":"Jifty","Lemonldap::NG::Portal::Main::UserDB":"Lemonldap-NG-Portal","Apache::ASP::GlobalASA":"Apache-ASP","Jifty::Script::FastCGI":"Jifty","Dancer2::Core::Factory":"Dancer2","CGI::Session::ID::SHA1":"CGI-Session","Crypt::Perl::X509::Extension::issuerAltName":"Crypt-Perl","DBI::Const::GetInfo::ODBC":"DBI","Lemonldap::NG::Portal::Lib::U2F":"Lemonldap-NG-Portal","XML::LibXML::InputCallback":"XML-LibXML","Template::Declare::Exception":"Jifty","SOAP::Lite::Packager::DIME":"SOAP-Lite","Jifty::Plugin::Authentication::Password::Action::Logout":"Jifty","Apache::Session::Serialize::JSON":"Apache-Session-Browseable","Porting::updateAUTHORS":"perl","Bundle::Apache::ASP::Extra":"Apache-ASP","Crypt::Cipher::Twofish":"CryptX","CGI::Application::Plugin::AutoRunmode::FileDelegate":"CGI-Application-Plugin-AutoRunmode","XAO::DO::Web::Benchmark":"XAO-Web","Net::SNMP::Transport::TCP":"Net-SNMP","Imager::Fountain":"Imager","Text::Wikispaces2Markdown":"MojoMojo","DBIx::Class::Valiant::Util::Exception::BadParameters":"Valiant","MDK::Common::System":"MDK-Common","Lemonldap::NG::Portal::Main::Plugin":"Lemonldap-NG-Portal","MHonArc::UTF8::KOI8_R":"MHonArc","Jifty::View::Declare::CRUD":"Jifty","Apache::Opcode":"mod_perl","Mail::Mailer::smtp::pipe":"MailTools","GPIB::hp33120a":"GPIB","UI::Dialog::Backend::Whiptail":"UI-Dialog","DBD::Sponge::dr":"DBI","AnyDBM_File":"perl","Dancer::Hook":"Dancer","DBI::DBD::SqlEngine::db":"DBI","Jifty::Request::Fragment":"Jifty","Plack::TempBuffer":"Plack","Net::Server::Proto::Coro::FH":"Net-Server-Coro","Image::ExifTool::JPEG":"Image-ExifTool","Pinto::Action::Log":"Pinto","Net::SSLeay":"Net-SSLeay","Dpkg::ErrorHandling":"Dpkg","Image::ExifTool::Other":"Image-ExifTool","Catalyst::Exception":"Catalyst-Runtime","Net::DNS::Update":"Net-DNS","Crypt::Random::Provider::egd":"Crypt-Random","MHonArc::CharEnt::KOI8_F":"MHonArc","Jifty::DBI::Filter::URI":"Jifty-DBI","Crypt::DSA::KeyChain":"Crypt-DSA","Archive::Zip::FileMember":"Archive-Zip","Moxy::Session::State::BasicAuth":"Moxy","Pinto::Chrome":"Pinto","DBD::SQLite::VirtualTable::FileContent":"DBD-SQLite","Valiant::HTML::ContentComponent":"Valiant","App::Pinto::Command::diff":"Pinto","GPIB::hpserial":"GPIB","Image::ExifTool::WPG":"Image-ExifTool","Lemonldap::NG::Portal::2F::U2F":"Lemonldap-NG-Portal","Encode::TW":"Encode","Net::OAuth::UserAuthResponse":"Net-OAuth","Image::Info::WBMP":"Image-Info","DBI":"DBI","Tk::Menubutton":"Tk","Net::DNS::RR::PX":"Net-DNS","Valiant::Name":"Valiant","App::Pinto::Command::delete":"Pinto","Crypt::Random::Generator":"Crypt-Random","Crypt::Digest::Keccak256":"CryptX","OptreeCheck":"perl","Dancer2::Core::Request":"Dancer2","SSL_SSL":"IO-Socket-SSL","Image::ExifTool::XMP":"Image-ExifTool","Mojo::Log":"Mojolicious","Mail::Field":"MailTools","Valiant::HTML::Util::Form":"Valiant","Image::Info::SVG::XMLSimple":"Image-Info","Image::ExifTool::Font":"Image-ExifTool","Elive::Entity::Participant":"Elive","Image::ExifTool::Lang::pl":"Image-ExifTool","Crypt::PRNG::RC4":"CryptX","SOAP::Header":"SOAP-Lite","Image::ExifTool::BZZ":"Image-ExifTool","Imager::Expr::Assem":"Imager","Dancer::Serializer::Mutable":"Dancer","Lemonldap::NG::Portal::2F::REST":"Lemonldap-NG-Portal","Plack::App::WrapCGI":"Plack","DBD::File::TableSource::FileSystem":"DBI","Imager::Test":"Imager","Mojo::Exception":"Mojolicious","MHonArc::CharEnt::KOI_7":"MHonArc","Jifty::Logger":"Jifty","Kelp::Module::Routes":"Kelp","MojoMojo::Schema::ResultSet::Tag":"MojoMojo","MHonArc::UTF8::ISO8859_2":"MHonArc","Tie::Handle":"perl","Image::ExifTool::Lang::ru":"Image-ExifTool","DBD::Pg":"DBD-Pg","Crypt::Mac::HMAC":"CryptX","Dancer2::Core::HTTP":"Dancer2","Pod::Perldoc::GetOptsOO":"Pod-Perldoc","Imager::IO":"Imager","ModPerl::WrapXS":"mod_perl","Lemonldap::NG::Portal::Lib::Notifications::XML":"Lemonldap-NG-Portal","Pinto::Manual::Installing":"Pinto","IO::Uncompress::Adapter::Inflate":"IO-Compress","Dancer2::CLI::Command::gen":"Dancer2","MojoMojo::View::JSON":"MojoMojo","SOAP::Lite":"SOAP-Lite","Net::DNS::Parameters":"Net-DNS","Apache::Wyrd::Input::Set":"Apache-Wyrd","Bio::Graphics::Browser2::DataLoader::generic":"GBrowse","Apache::Session::Browseable::MySQL":"Apache-Session-Browseable","Dancer::Plugin":"Dancer","Pinto::Shell":"Pinto","Kelp::Template":"Kelp","DBIx::Custom::Where":"DBIx-Custom","CPAN::Distroprefs::Iterator":"CPAN","Net::SNMP::Dispatcher":"Net-SNMP","Catalyst::Action":"Catalyst-Runtime","Moxy::Util":"Moxy","Mojo::Home":"Mojolicious","Lemonldap::NG::Portal::Issuer::Get":"Lemonldap-NG-Portal","Bio::Graphics::Browser2::Action":"GBrowse","App::Pinto::Command::init":"Pinto","Mojolicious::Command::Author::generate":"Mojolicious","XML::LibXML::RelaxNG":"XML-LibXML","Net::Server::HTTP":"Net-Server","Plack::Test::MockHTTP":"Plack","Crypt::Perl::RSA":"Crypt-Perl","Perlbal::Plugin::FlvStreaming":"Perlbal","Dancer2::Core::Role::SessionFactory":"Dancer2","IO::Socket::SSL":"IO-Socket-SSL","PApp::Event":"PApp","HTTP::Body":"HTTP-Body","Dancer2::CLI::Gen":"Dancer2","CPAN::Distrostatus":"CPAN","MIME::Field::ContDisp":"MIME-tools","File::DataClass::Schema":"File-DataClass","Config::Model::Exception::Fatal":"Config-Model","Jifty::Plugin::SetupWizard::View":"Jifty","MojoMojo::Formatter::Wiki":"MojoMojo","Apache::Constants":"mod_perl","Dpkg::OpenPGP::Backend::SOP":"Dpkg","ExtUtils::MakeMaker::version::regex":"ExtUtils-MakeMaker","HTML::EP::Session::Dumper":"HTML-EP","Maintainers":"perl","Data::Validate::IP":"Data-Validate-IP","Plack::Middleware::NullLogger":"Plack","Net::DNS::RR::NS":"Net-DNS","Apache::RPC::Status":"RPC-XML","WWW::Mechanize":"WWW-Mechanize","Lemonldap::NG::Portal::Plugins::FindUser":"Lemonldap-NG-Portal","Tk::Region":"Tk","Catalyst::Action::Serialize::JSON":"Catalyst-Action-REST","Bio::Graphics::Browser2::Render::HTML::TrackListing::Categories":"GBrowse","Catalyst::ScriptRole":"Catalyst-Runtime","Crypt::Perl::KeyBase":"Crypt-Perl","PAR::Filter::PodStrip":"PAR-Packer","Net::OAuth::V1_0A::RequestTokenRequest":"Net-OAuth","XML::Twig":"XML-Twig","File::DataClass::IO":"File-DataClass","Lemonldap::NG::Portal::Main::SecondFactor":"Lemonldap-NG-Portal","Catalyst::DispatchType::Default":"Catalyst-Runtime","MojoMojo::Controller::PageAdmin":"MojoMojo","Catalyst::ActionRole::HTTPMethods":"Catalyst-Runtime","Lemonldap::NG::Portal::Auth::REST":"Lemonldap-NG-Portal","Valiant::Filters":"Valiant","Tk::NoteBook":"Tk","Moxy::Plugin":"Moxy","CGI::Application::Mailform":"CGI-Application","Pinto::Chrome::Term":"Pinto","Legacy::Graphics::BrowserConfig":"GBrowse","Net::LDAP::Extension::Cancel":"perl-ldap","Net::Server::Multiplex":"Net-Server","Jifty::Web::Form::Element":"Jifty","Jifty::Web::Form::Clickable":"Jifty","Pinto::Action::Pull":"Pinto","Image::ExifTool::DV":"Image-ExifTool","Tk::Compound":"Tk","Net::OAuth":"Net-OAuth","Elive::Entity::Session":"Elive","Dancer2::Core::Request::Upload":"Dancer2","Jifty::Script::Help":"Jifty","Fh":"CGI","ExtUtils::ParseXS::Constants":"ExtUtils-ParseXS","MojoMojo::Formatter::File::DocBook":"MojoMojo","MHonArc::CharEnt::ISO8859_10":"MHonArc","APR::OS":"mod_perl","Pod::Perldoc::ToText":"Pod-Perldoc","Jifty::Bootstrap":"Jifty","Jifty::View::Declare::CoreTemplates":"Jifty","Jifty::CAS::Blob":"Jifty","Net::Server::INET::Handle":"Net-Server","Valiant::I18N":"Valiant","Catalyst::Log":"Catalyst-Runtime","Imager::ExtUtils":"Imager","Catalyst::Script::CGI":"Catalyst-Runtime","Dancer::Logger::Diag":"Dancer","Dancer2::Core::MIME":"Dancer2","CGI::Session::Driver::DBI":"CGI-Session","ExtUtils::MM_Win32":"ExtUtils-MakeMaker","Compress::Raw::Zlib":"Compress-Raw-Zlib","Apache::MP3::L10N::ms":"Apache-MP3","HTTP::Session2":"HTTP-Session2","Bio::Graphics::Browser2::RenderPanels":"GBrowse","Config::Model::Value":"Config-Model","mod_perl":"mod_perl","DBIx::Class::Valiant::Result::HTML::FormFields":"Valiant","RPC::XML::Parser::XMLParser":"RPC-XML","CGI::Cookie":"CGI","APR::SockAddr":"mod_perl","Dpkg::Changelog::Debian":"Dpkg","YAML::XS":"YAML-LibYAML","Tie::Hash":"perl","DBD::Gofer::Transport::stream":"DBI","Mojo::File":"Mojolicious","Encode::utf8":"Encode","Net::DNS::RR::AAAA":"Net-DNS","Bio::Graphics::Browser2::Render::Login":"GBrowse","Tk::Adjuster":"Tk","Plack::Handler::Apache1":"Plack","Zlib::OldInflate":"IO-Compress","Crypt::Cipher::DES_EDE":"CryptX","File::Glob":"perl","Pinto::Result":"Pinto","Batch::Batchrun::TableFunctions":"Batch-Batchrun","Config::Model::ObjTreeScanner":"Config-Model","Crypt::Stream::Rabbit":"CryptX","Lemonldap::NG::Portal::2F::Mail2F":"Lemonldap-NG-Portal","Mojo::IOLoop::Server":"Mojolicious","MHonArc::CharEnt::CP1254":"MHonArc","DBD::Proxy::RPC::PlClient":"DBI","SOAP::Lite::Packager":"SOAP-Lite","MDK::Common::Various":"MDK-Common","SOAP::Transport::HTTP::FCGI":"SOAP-Lite","Mojolicious::Plugin::EPLRenderer":"Mojolicious","Dancer2":"Dancer2","Apache::Session::Browseable::LDAP":"Apache-Session-Browseable","Config::Model::Backend::Any":"Config-Model","overload":"perl","Batch::Batchrun::Load":"Batch-Batchrun","Valiant::Util::Exception::MissingCountKey":"Valiant","DBD::Proxy::st":"DBI","Elive::Entity":"Elive","MHonArc::CharEnt::CP1250":"MHonArc","DBI::Util::_accessor":"DBI","filetest":"perl","Crypt::Perl::ECDSA::Deterministic":"Crypt-Perl","Pinto::Action::Verify":"Pinto","PApp::SCGI":"PApp","Spoon::Lookup":"Spoon","Dpkg::BuildInfo":"Dpkg","LWP::Protocol::loopback":"libwww-perl","Apache::Wyrd::ErrTag":"Apache-Wyrd","Mojo::Server::Morbo::Backend":"Mojolicious","MHonArc::UTF8::AppleRoman":"MHonArc","ExtUtils::Embed":"perl","PApp::EditForm":"PApp","CPAN::Version":"CPAN","DBD::Mem":"DBI","Mojolicious::Static":"Mojolicious","Elive::Entity::Group::Members":"Elive","Moxy::Plugin::OpenSocial":"Moxy","Apache::Wyrd::Site::IndexBot":"Apache-Wyrd","Moxy::Plugin::XMLisHTML":"Moxy","DBI::DBD::Metadata":"DBI","Mojolicious::Sessions":"Mojolicious","Mysql::st":"DBD-mysql","Dancer::Route::Cache":"Dancer","Config::Model::WarpedNode":"Config-Model","B::Terse":"perl","Dpkg::Source::Package::V2":"Dpkg","Config::Model::Report":"Config-Model","CGI::Push":"CGI","Mojo::Base":"Mojolicious","Spreadsheet::ParseExcel::Cell":"Spreadsheet-ParseExcel","CGI::apacheSSI":"CGI-apacheSSI","Jifty::Script::Schema":"Jifty","Plack::App::PSGIBin":"Plack","CGI::Session::Tutorial":"CGI-Session","Apache::Session::Browseable::Store::Cassandra":"Apache-Session-Browseable","Dancer::SharedData":"Dancer","Apache::MP3::L10N::tr":"Apache-MP3","Lemonldap::NG::Portal::Plugins::SingleSession":"Lemonldap-NG-Portal","Dpkg::Lock":"Dpkg","POE::Component::IRC":"POE-Component-IRC","Plack::Middleware::LogDispatch":"Plack","Jifty::CAS::Store::Memory":"Jifty","Tie::StdArray":"perl","ExtUtils::MM_DOS":"ExtUtils-MakeMaker","Crypt::Random::Provider::Win32API":"Crypt-Random","MojoMojo::Schema::Result::WantedPage":"MojoMojo","Config::Model::Backend::Json":"Config-Model","Lemonldap::NG::Portal::Main::Constants":"Lemonldap-NG-Portal","Lemonldap::NG::Portal::Password::Combination":"Lemonldap-NG-Portal","Lemonldap::NG::Portal":"Lemonldap-NG-Portal","Encode::CJKConstants":"Encode","Net::DNS::RR::DLV":"Net-DNS","App::Pinto::Command::statistics":"Pinto","Crypt::Perl::ECDSA::EC::CurvesDB":"Crypt-Perl","Bio::Graphics::Browser2::DataLoader::bigbed":"GBrowse","WWW::Mechanize::Image":"WWW-Mechanize","Proc::ProcessTable":"Proc-ProcessTable","Tk::MsgBox":"Tk","Catalyst::Engine::HTTP":"Catalyst-Runtime","MHonArc::CharEnt::AppleGreek":"MHonArc","B::Op_private":"perl","Tie::Array":"perl","Apache2::compat":"mod_perl","MojoMojo::Schema::Result::PathPermissions":"MojoMojo","Dezi::Config":"Dezi","Net::DNS::RR::ISDN":"Net-DNS","MojoMojo::Formatter::TOC":"MojoMojo","sort":"perl","Lemonldap::NG::Portal::UserDB::REST":"Lemonldap-NG-Portal","Crypt::Stream::ChaCha":"CryptX","Jifty::View":"Jifty","Moped::Msg":"perl","Mysql::Statement":"DBD-mysql","Lemonldap::NG::Portal::Auth::Slave":"Lemonldap-NG-Portal","Lemonldap::NG::Portal::Register::Base":"Lemonldap-NG-Portal","XAO::DO::Web::FilloutForm":"XAO-Web","Lemonldap::NG::Portal::UserDB::Custom":"Lemonldap-NG-Portal","Bio::Graphics::Browser2::AdminTracks":"GBrowse","Valiant::Filter::With":"Valiant","IPC::Run::Win32Process":"IPC-Run","PApp::DataRef::DB_row":"PApp","App::Pinto::Command::unlock":"Pinto","Config::Model::BackendTrackOrder":"Config-Model","MojoMojo::Controller::Journal":"MojoMojo","Net::LDAPS":"perl-ldap","Lemonldap::NG::Portal::UserDB::Combination":"Lemonldap-NG-Portal","Bio::Graphics::Browser2::TrackDumper::RichSeqMaker":"GBrowse","Dpkg::OpenPGP::Backend":"Dpkg","SOAP::XMLSchema2001::Serializer":"SOAP-Lite","Image::ExifTool::Lang::tr":"Image-ExifTool","Lemonldap::NG::Portal::Auth::GitHub":"Lemonldap-NG-Portal","Mail::Field::AddrList":"MailTools","Crypt::Perl::X509::Name":"Crypt-Perl","HTTP::Body::MultiPart":"HTTP-Body","MojoMojo::Schema::Result::Photo":"MojoMojo","Tk::IO":"Tk","HTML::Template::Pro":"HTML-Template-Pro","Batch::Batchrun::ProcessSteps":"Batch-Batchrun","RPC::XML::i4":"RPC-XML","Mojo::Server":"Mojolicious","Bio::Graphics::Browser2::GFFhelper":"GBrowse","Image::ExifTool::MXF":"Image-ExifTool","feature":"perl","Net::OAuth::Message":"Net-OAuth","Bio::Graphics::Browser2::DataLoader::wiggle":"GBrowse","Apache::Wyrd::Form":"Apache-Wyrd","Kelp::Module::Logger::Simple":"Kelp","App::ResourceLocker":"App-Context","Mojo::Server::Prefork":"Mojolicious","Jifty::Plugin::Config::Action::Config":"Jifty","Jifty::Plugin::SinglePage":"Jifty","Dancer2::Core::Runner":"Dancer2","Mojo::Transaction":"Mojolicious","Tk::DummyEncode::iso8859_1":"Tk","Zonemaster::Backend::Error::Internal":"Zonemaster-Backend","POE::Component::IRC::Qnet::State":"POE-Component-IRC","DBD::SQLite::VirtualTable::PerlData::Cursor":"DBD-SQLite","Jifty::Plugin::SQLQueries::View":"Jifty","overloading":"perl","Net::DNS::RR::DS":"Net-DNS","Bio::DB::Tagger::mysql":"GBrowse","Bio::Graphics::Browser2::Render::HTML":"GBrowse","Catalyst::TraitFor::Request::REST::ForBrowsers":"Catalyst-Action-REST","Image::ExifTool::Sony":"Image-ExifTool","Valiant::Filterable":"Valiant","Valiant::Filter::Trim":"Valiant","Apache::Connection":"mod_perl","CGI::apacheSSI::Gmt":"CGI-apacheSSI","Net::SNMP::Transport::IPv4::TCP":"Net-SNMP","MIME::Decoder::Base64":"MIME-tools","encoding":"Encode","CPAN::LWP::UserAgent":"CPAN","MojoMojo::Model::Themes":"MojoMojo","Galileo::Plugin::Modal":"Galileo","XAO::DO::Web::Action":"XAO-Web","Image::ExifTool::CanonRaw":"Image-ExifTool","Tk::Xlib":"Tk","Dpkg::Source::BinaryFiles":"Dpkg","Valiant::Validator::Exclusion":"Valiant","Dancer2::Logger::Note":"Dancer2","Dpkg::Vendor::Devuan":"Dpkg","Module::Provision::TraitFor::Rendering":"Module-Provision","PApp::SCGI::PApp":"PApp","Mojo::Reactor":"Mojolicious","Apache::Wyrd::Lattice":"Apache-Wyrd","DBD::mysql::db":"DBD-mysql","Perlbal::Plugin::Cgilike::Request":"Perlbal","File::DosGlob":"perl","RPC::XML::Parser::XMLLibXML":"RPC-XML","Plack::Session::Store":"Plack-Middleware-Session","Dpkg::Exit":"Dpkg","PerlIO::mmap":"perl","JPL::AutoLoader":"perl","Lemonldap::NG::Portal::UserDB::WebID":"Lemonldap-NG-Portal","Image::ExifTool::Photoshop":"Image-ExifTool","Pinto::Action::Unlock":"Pinto","HTML::EP::Session":"HTML-EP","ExtUtils::Command":"ExtUtils-MakeMaker","Jifty::I18N::en":"Jifty","Pinto::Server::Responder::Action":"Pinto","OS2::REXX::_HASH":"perl","Config::Model::Exception::LoadData":"Config-Model","CGI::Session::Test::Default":"CGI-Session","Zonemaster::Backend::Translator":"Zonemaster-Backend","Jifty::Param::Schema":"Jifty","Moxy::Plugin::ResponseTime":"Moxy","PApp::Preprocessor":"PApp","Encode::MIME::Header::ISO_2022_JP":"Encode","Jifty::Web::Form::Field":"Jifty","Crypt::Digest::BLAKE2s_224":"CryptX","Lemonldap::NG::Portal::Lib::LazyLoadedConfiguration":"Lemonldap-NG-Portal","Catalyst::ClassData":"Catalyst-Runtime","CGI::Session::Driver::file":"CGI-Session","Clipboard::MacPasteboard":"Clipboard","APR::Util":"mod_perl","Image::ExifTool::GM":"Image-ExifTool","Mojo::UserAgent":"Mojolicious","Net::hostent":"perl","Net::OAuth::AccessToken":"Net-OAuth","Mail::Audit::MailInternet":"Mail-Audit","integer":"perl","Jifty::Upgrade::Internal":"Jifty","Spreadsheet::ParseExcel::Worksheet":"Spreadsheet-ParseExcel","PAR::Filter::Bleach":"PAR-Packer","Mail::Mailer::smtp":"MailTools","Tk::Pretty":"Tk","Apache::Session::Browseable":"Apache-Session-Browseable","Valiant::HTML::Util::Collection::Item":"Valiant","Image::ExifTool::Samsung":"Image-ExifTool","Mojo::JSON":"Mojolicious","Plack::Middleware":"Plack","GD::Polygon":"GD","PaletteModify":"Perlbal","Apache::Wyrd::BrowserSwitch":"Apache-Wyrd","PerlIO::encoding":"perl","SOAP::XMLSchemaSOAP1_2::Deserializer":"SOAP-Lite","Mojo::Date":"Mojolicious","Lemonldap::NG::Portal::Plugins::DecryptValue":"Lemonldap-NG-Portal","Jifty::DBI::Collection::Unique":"Jifty-DBI","Encode::Unicode":"Encode","Dpkg":"Dpkg","Apache2::RequestRec":"mod_perl","Valiant::HTML::Tag":"Valiant","Net::IPAddress::Util::Collection::Tie":"Net-IPAddress-Util","Crypt::Perl::PKCS8":"Crypt-Perl","MojoMojo::Formatter::Amazon":"MojoMojo","Net::LDAP::Control::EntryChange":"perl-ldap","Apache::Session::Browseable::Informix":"Apache-Session-Browseable","Perlbal::Plugin::XFFExtras":"Perlbal","Pinto::Role::Puller":"Pinto","SVN::Look":"SVN-Look","Spoon::Hooked":"Spoon","App::Serializer::XMLSimple":"App-Context","SVG::Sparkline::RangeArea":"SVG-Sparkline","Locale::Maketext::GutsLoader":"Locale-Maketext","Lemonldap::NG::Portal::Plugins::SamlFederation":"Lemonldap-NG-Portal","Jifty::DBI::Filter::Time":"Jifty-DBI","Lemonldap::NG::Portal::Lib::Radius":"Lemonldap-NG-Portal","Archive::Zip::ZipFileMember":"Archive-Zip","SOAP::Trace":"SOAP-Lite","Pinto::Action::New":"Pinto","Imager::Color::Float":"Imager","Kossy::Connection":"Kossy","Imager::Filter::Mandelbrot":"Imager","Pod::Simple::XHTML::LocalPodLinks":"perl","Jifty::YAML":"Jifty","Net::OAuth::Client":"Net-OAuth","MHonArc::CharEnt::AppleRomanian":"MHonArc","MojoMojo::Formatter::DocBook::Colorize":"MojoMojo","Dancer2::Core":"Dancer2","SOAP::Lite::Deserializer::XMLSchemaSOAP1_2":"SOAP-Lite","Jifty::Plugin::User":"Jifty","ExtUtils::MM_OS390":"ExtUtils-MakeMaker","Dancer2::Core::Role::SessionFactory::File":"Dancer2","Tk::Button":"Tk","Encode::KR":"Encode","Crypt::Cipher::SAFER_SK64":"CryptX","Crypt::Digest":"CryptX","File::DataClass::Storage":"File-DataClass","Valiant::Validator::Date":"Valiant","CGI::Session::Test::SimpleObjectClass":"CGI-Session","Galileo::Command::setup":"Galileo","Apache2::SubRequest":"mod_perl","Moxy::Plugin::CookieCutter":"Moxy","Encode::MIME::Name":"Encode","Elive::Entity::InvitedGuest":"Elive","Plack::Middleware::JSONP":"Plack","Valiant::Proxy::Array":"Valiant","Kelp::Response":"Kelp","Net::Dropbear::SSHd":"Net-Dropbear","Valiant::HTML::FormBuilder::Model":"Valiant","CPAN::FTP::netrc":"CPAN","Module::Signature":"Module-Signature","Lemonldap::NG::Portal::Lib::Notifications::JSON":"Lemonldap-NG-Portal","Lemonldap::NG::Portal::Plugins::GrantSession":"Lemonldap-NG-Portal","App::Pinto::Command":"Pinto","Dpkg::BuildTree":"Dpkg","Filesys::SmbClientParser":"Filesys-SmbClientParser","ExtUtils::MM_OS2":"ExtUtils-MakeMaker","Dpkg::Conf":"Dpkg","CPAN::Plugin":"CPAN","Tk::Label":"Tk","Imager::Font::Type1":"Imager","DBD::Gofer::dr":"DBI","Plack::App::XAO":"XAO-Web","Plack::Session::Store::Null":"Plack-Middleware-Session","MojoMojo::Formatter::IRCLog":"MojoMojo","Catalyst::Action::Deserialize::YAML":"Catalyst-Action-REST","DBI::ProfileSubs":"DBI","Elive::Entity::Participants":"Elive","Spoon::IndexList":"Spoon","Net::DNS::RR::A":"Net-DNS","HTML::PullParser":"HTML-Parser","Mojo::ByteStream":"Mojolicious","ModPerl::CScan":"mod_perl","MHonArc::CharEnt::CP1252":"MHonArc","Moxy::Plugin::RelativeLocation":"Moxy","Tk::DragDrop::XDNDSite":"Tk","Dancer2::Plugin":"Dancer2","Crypt::Mode":"CryptX","Crypt::PK::X25519":"CryptX","XAO::DO::Web::CgiParam":"XAO-Web","Elive::DAO":"Elive","Galileo::Admin":"Galileo","IO::Uncompress::Bunzip2":"IO-Compress","App::Context::POE":"App-Context","Tk::Derived":"Tk","Valiant::Util::Ancestors":"Valiant","PApp::CGI::Connection":"PApp","Crypt::DSA":"Crypt-DSA","DBI::Library::Database":"MySQL-Admin","Net::DNS::Mailbox":"Net-DNS","Tk::MMutil":"Tk","Lemonldap::NG::Portal::2F::Register::Yubikey":"Lemonldap-NG-Portal","Config::Model::Iterator":"Config-Model","Kelp::Routes::Location":"Kelp","Config::Model::FuseUI":"Config-Model","Net::LDAP::Control::TreeDelete":"perl-ldap","Image::ExifTool::TagInfoXML":"Image-ExifTool","Net::Server::Single":"Net-Server","Crypt::Mac::Poly1305":"CryptX","Apache::RPC::Server":"RPC-XML","Dpkg::Control::HashCore":"Dpkg","Valiant::Filter::Lower":"Valiant","Archive::Tar::Constant":"Archive-Tar","Batch::Batchrun::Initialize":"Batch-Batchrun","Config::Model::Exception::User":"Config-Model","SOAP::Transport::HTTP::Daemon::ForkOnAccept":"SOAP-Lite","Apache::Wyrd::Datum::Blob":"Apache-Wyrd","RPC::XML::double":"RPC-XML","DBD::DBM::Table":"DBI","Net::LDAP::Search":"perl-ldap","MySQL::Admin::Config":"MySQL-Admin","Jifty::DBI::Handle::ODBC":"Jifty-DBI","CPAN::Checksums":"CPAN-Checksums","HTML::EP::Install":"HTML-EP","CPAN::HTTP::Client":"CPAN","MojoMojo::View::Email":"MojoMojo","Image::ExifTool::HTML":"Image-ExifTool","XAO::DO::Web::Mailer":"XAO-Web","DBD::File::dr":"DBI","DemoASP":"Apache-ASP","B::Concise":"perl","Lemonldap::NG::Portal::Auth::AD":"Lemonldap-NG-Portal","HTML::Filter":"HTML-Parser","App::Pinto::Command::nop":"Pinto","Digest":"Digest","XML::LibXML::RegExp":"XML-LibXML","Net::DNS::RR::OPT::REPORT_CHANNEL":"Net-DNS","Mail::Audit::Util::Tempdir":"Mail-Audit","Jifty::Plugin::TestServerWarnings::Appender":"Jifty","Apache::ASP::Application":"Apache-ASP","Image::ExifTool::ASF":"Image-ExifTool","Config::Model::Backend::PerlFile":"Config-Model","Image::ExifTool::ZIP":"Image-ExifTool","DBIx::Class::Valiant::Validates":"Valiant","DBD::mysql::GetInfo":"DBD-mysql","Apache::ASP::Load":"Apache-ASP","Apache::RegistryLoader":"mod_perl","Crypt::Perl::X509::Extension::cRLDistributionPoints":"Crypt-Perl","Jifty::Plugin::Authentication::Password::Dispatcher":"Jifty","Catalyst::Action::SerializeBase":"Catalyst-Action-REST","Net::CIDR::Lite::Span":"Net-CIDR-Lite","Lemonldap::NG::Portal::Plugins::History":"Lemonldap-NG-Portal","Plack::Session::Store::File":"Plack-Middleware-Session","MHonArc::CharEnt::GOST19768_87":"MHonArc","Jifty::API":"Jifty","POE::Component::IRC::Plugin::PlugMan":"POE-Component-IRC","Apache::Log":"mod_perl","testcases::base":"XAO-Web","DBD::Gofer::Policy::pedantic":"DBI","CryptX":"CryptX","Lemonldap::NG::Portal::Auth::Twitter":"Lemonldap-NG-Portal","SOAP::Deserializer":"SOAP-Lite","Dancer::Serializer::YAML":"Dancer","Apache::Session::Browseable::Store::Oracle":"Apache-Session-Browseable","App::Serializer::Yaml":"App-Context","Bio::Graphics::Karyotype":"GBrowse","Plack::TempBuffer::PerlIO":"Plack","Crypt::Perl::ECDSA::Generate":"Crypt-Perl","Bio::Graphics::Browser2::DataLoader::bigwig":"GBrowse","DBD::mysqlPP::dr":"DBD-mysqlPP","Catalyst::Exception::Interface":"Catalyst-Runtime","Catalyst::Action::Deserialize::JSON":"Catalyst-Action-REST","XML::LibXML":"XML-LibXML","Data::FormValidator::Constraints::Dates":"Data-FormValidator","Net::CIDR::Lite":"Net-CIDR-Lite","DBD::DBM::Statement":"DBI","Dpkg::Control::Types":"Dpkg","ModPerl::BuildMM":"mod_perl","Moxy::Plugin::FlashUseImgTag":"Moxy","Jifty::Script::Plugin":"Jifty","App::Serializer::Scalar":"App-Context","DBD::File::db":"DBI","APR::Table":"mod_perl","Dancer2::Core::Cookie":"Dancer2","Jifty::Test::WWW::Mechanize":"Jifty","POSIX::SigAction":"perl","Mojolicious::Command::Author::generate::plugin":"Mojolicious","Dpkg::Compression":"Dpkg","Tk::Tree":"Tk","Lemonldap::NG::Portal::Lib::CAS":"Lemonldap-NG-Portal","OS2::REXX":"perl","Jifty::Web::Session::ApacheSession":"Jifty","Bio::Graphics::Browser2::Render::Slave::StagingServer":"GBrowse","Tk::Radiobutton":"Tk","MHonArc::CharEnt::AppleArabic":"MHonArc","LWP::Simple":"libwww-perl","Apache::Wyrd::Handler":"Apache-Wyrd","Catalyst::Engine::FastCGI":"Catalyst-Runtime","Pinto::Manual::Thanks":"Pinto","Jifty::JSON":"Jifty","OS2::PrfDB::Hini":"perl","App::Serializer::Json":"App-Context","App::Pinto::Command::props":"Pinto","Net::DNS::RR::OPT::COOKIE":"Net-DNS","Crypt::Checksum":"CryptX","CPAN::Exception::yaml_not_installed":"CPAN","Crypt::Perl::X::UnknownJWKkty":"Crypt-Perl","Valiant::HTML::Component":"Valiant","SOAP::XMLSchema1999::Serializer":"SOAP-Lite","MojoMojo::Schema::Result::Journal":"MojoMojo","Dancer2::Core::Role::Engine":"Dancer2","CPAN::Distroprefs::Result::Warning":"CPAN","PApp::Callback":"PApp","Pod::Perldoc::ToANSI":"Pod-Perldoc","Crypt::Perl::X509::InfoAccessBase":"Crypt-Perl","Lemonldap::NG::Portal::CDC":"Lemonldap-NG-Portal","Dancer2::Core::Role::HasLocation":"Dancer2","SOAP::Apache":"SOAP-Lite","Spoon::Template":"Spoon","MHonArc::CharEnt::CP936":"MHonArc","Image::Info::XBM":"Image-Info","Image::ExifTool::EXE":"Image-ExifTool","MIME::Decoder::UU":"MIME-tools","PApp::Admin":"PApp","Crypt::Cipher::RC5":"CryptX","Kossy::Request":"Kossy","Clipboard::Pb":"Clipboard","MHonArc::CharEnt::HP_ROMAN8":"MHonArc","Net::DNS::RR::RRSIG":"Net-DNS","Jifty::CurrentUser":"Jifty","IO::Uncompress::Adapter::Bunzip2":"IO-Compress","Crypt::Perl::X509::Extension::policyMappings":"Crypt-Perl","XAO::PageSupport":"XAO-Web","CGI::Carp":"CGI","CatalystX::Controller::OpenSearch":"Search-OpenSearch-Server","Jifty::Script":"Jifty","App::Context::POE::Server":"App-Context","Jifty::Web::FileUpload":"Jifty","MHonArc::UTF8::GB2312":"MHonArc","FileSlurp_12":"File-Slurp","MHonArc::UTF8::CP1255":"MHonArc","Imager::Font::BBox":"Imager","Crypt::PRNG::Yarrow":"CryptX","Valiant::Validator::Confirmation":"Valiant","Compress::Zlib":"IO-Compress","Agni::Callback":"PApp","Lemonldap::NG::Portal::Plugins::InitializePasswordReset":"Lemonldap-NG-Portal","Lemonldap::NG::Portal::UserDB::Remote":"Lemonldap-NG-Portal","MIME::Decoder::QuotedPrint":"MIME-tools","Jifty::Script::ModPerl2":"Jifty","Kossy::BodyParser::MultiPart":"Kossy","APR::UUID":"mod_perl","Lemonldap::NG::Portal::Plugins::CrowdSec":"Lemonldap-NG-Portal","Elive":"Elive","Lemonldap::NG::Portal::Issuer::CAS":"Lemonldap-NG-Portal","Jifty::LetMe":"Jifty","App::Pinto::Command::migrate":"Pinto","Tk::X11Font":"Tk","HTML::EP::EditTable":"HTML-EP","Apache2::SourceTables":"mod_perl","HTML::EP::Session::Cookie":"HTML-EP","Imager::FORMATS":"Imager","Plack::Util::Accessor":"Plack","Fake::Encode":"Fake-Encode","DBD::SQLite::VirtualTable::FileContent::Cursor":"DBD-SQLite","IPC::Run::Win32IO":"IPC-Run","Catalyst::Request::REST::ForBrowsers":"Catalyst-Action-REST","DBI::ProxyServer::st":"DBI","PApp::HTML":"PApp","Pinto::Schema::Result::RegistrationChange":"Pinto","IO::Socket::SSL::SSL_HANDLE":"IO-Socket-SSL","IO::Uncompress::Unzip":"IO-Compress","Net::LDAP::Constant":"perl-ldap","Valiant::Validator::Length":"Valiant","Jifty::Plugin::ActorMetadata::Mixin::Model::ActorMetadata":"Jifty","Apache::Wyrd::Site::Pull":"Apache-Wyrd","XAO::DO::Web::TextTable":"XAO-Web","Crypt::OpenSSL::DSA":"Crypt-OpenSSL-DSA","Tk::ReindexedROText":"Tk","Crypt::Digest::Keccak512":"CryptX","Image::ExifTool::Lang::de":"Image-ExifTool","Dancer::Config::Object":"Dancer","PApp::I18n::PO_Reader":"PApp","App::Pinto::Command::look":"Pinto","DBI::DBD::SqlEngine::st":"DBI","UI::Dialog::Backend::Nautilus":"UI-Dialog","Apache::Status":"mod_perl","Image::ExifTool::Unknown":"Image-ExifTool","Config::Model::Exception::Model":"Config-Model","App::perlall":"App-perlall","Valiant::HTML::Util::View":"Valiant","UI::Dialog::Screen::Menu":"UI-Dialog","Encode::KR::2022_KR":"Encode","Lemonldap::NG::Portal::Plugins::OIDCInternalTokenExchange":"Lemonldap-NG-Portal","Imager::Color::Table":"Imager","GD::Image":"GD","Crypt::Perl::ECDSA::PublicKey":"Crypt-Perl","MHonArc::UTF8::VISCII":"MHonArc","Apache::Wyrd::Redirect":"Apache-Wyrd","Image::ExifTool::AFCP":"Image-ExifTool","Spoon::Cookie":"Spoon","Tk::Menu::Cascade":"Tk","Tk::LabRadiobutton":"Tk","Catalyst::Stats":"Catalyst-Runtime","MHonArc::UTF8::KOI8_E":"MHonArc","Perlbal::AIO":"Perlbal","Apache::Debug":"mod_perl","Spoon::CGI":"Spoon","RPC::XML::i8":"RPC-XML","Perlbal::Cache":"Perlbal","Moxy::Plugin::ShowHTMLSource":"Moxy","Module::Provision::Base":"Module-Provision","Zonemaster::Backend::Config":"Zonemaster-Backend","Apache::MP3::Sorted":"Apache-MP3","Dancer::Object::Singleton":"Dancer","Image::TIFF::Rational":"Image-Info","MHonArc::Encode":"MHonArc","PAR::Filter::Obfuscate":"PAR-Packer","Spoon::Headers":"Spoon","Plack::Runner":"Plack","Mojo::DOM::CSS":"Mojolicious","UI::Dialog::Backend":"UI-Dialog","Dancer2::Core::Dispatcher":"Dancer2","MDK::Common::Func":"MDK-Common","Mojo::Reactor::Poll":"Mojolicious","My::SessionIterator":"SOAP-Lite","Module::Provision::TraitFor::Badges":"Module-Provision","of":"perl","Config::Model::TreeSearcher":"Config-Model","Catalyst::Utils":"Catalyst-Runtime","MySQL::Admin::Documentation":"MySQL-Admin","Image::ExifTool::GIMP":"Image-ExifTool","DBI::Gofer::Serializer::Base":"DBI","Net::LDAP::Control::VLVResponse":"perl-ldap","MDK::Common::DataStructure":"MDK-Common","Spoon::Trace":"Spoon","Net::LDAP::Control::Sort":"perl-ldap","Lemonldap::NG::Portal::Auth::LDAP":"Lemonldap-NG-Portal","Image::ExifTool::Lang::nl":"Image-ExifTool","Pinto::Action::Update":"Pinto","Image::ExifTool::ICO":"Image-ExifTool","Jifty::Web::Form::Field::Checkboxes":"Jifty","Net::LDAP::Control::Subentries":"perl-ldap","Jifty::Plugin::SkeletonApp::Dispatcher":"Jifty","Config::Model::Backend::IniFile":"Config-Model","Apache::Wyrd::Lookup":"Apache-Wyrd","Apache::Wyrd::Services::Auth":"Apache-Wyrd","DBIx::Custom::Model":"DBIx-Custom","Safe":"Safe","Apache::XMLRPC::Lite":"SOAP-Lite","ExtUtils::MM_VOS":"ExtUtils-MakeMaker","Dancer::Deprecation":"Dancer","File::Find":"perl","Lemonldap::NG::Portal::CertificateResetByMail::LDAP":"Lemonldap-NG-Portal","Mail::Internet":"MailTools","ExtUtils::MM":"ExtUtils-MakeMaker","Jifty::DBI::Handle::Pg":"Jifty-DBI","Dancer2::Logger::File":"Dancer2","DBI::SQL::Nano::Table_":"DBI","CGI::Toggle":"GBrowse","testcases::requires":"XAO-Web","O":"perl","Mail::Audit::MimeEntity":"Mail-Audit","Amiga::Exec":"perl","Crypt::Perl::RSA::PKCS1_v1_5":"Crypt-Perl","ExtUtils::ParseXS":"ExtUtils-ParseXS","Pinto::Action::Copy":"Pinto","MIME::Field::ParamVal":"MIME-tools","SelectSaver":"perl","Apache::Framework::App":"App-Context","MojoMojo::Formatter::File::Test":"MojoMojo","Bio::Graphics::Browser2::Plugin::AuthPlugin":"GBrowse","App::Pinto::Command::help":"Pinto","Mojo::Cache":"Mojolicious","DBIx::Class::Valiant::Validator::Result":"Valiant","Lemonldap::NG::Portal::Plugins::CDA":"Lemonldap-NG-Portal","LWP::Protocol::file":"libwww-perl","Net::DNS::Packet":"Net-DNS","Net::LDAP::Control::PersistentSearch":"perl-ldap","Jifty::Object":"Jifty","MojoMojo::Formatter::File::Text":"MojoMojo","DBD::Sponge":"DBI","Dpkg::BuildEnv":"Dpkg","Dancer::Route::Registry":"Dancer","Dpkg::Source::Package::V3::Quilt":"Dpkg","HTML::Menu::Pages":"MySQL-Admin","B::OBJECT":"perl","Apache::MP3::L10N::en":"Apache-MP3","Jifty::Plugin::Prototypism":"Jifty","OS2::DLL":"perl","Crypt::Digest::RIPEMD128":"CryptX","Image::ExifTool::Lang::cs":"Image-ExifTool","MHonArc::CharEnt::ISO8859_7":"MHonArc","Tk::Menu::Button":"Tk","Crypt::Digest::SHA512":"CryptX","Tk::Spinbox":"Tk","MojoMojo::Schema::Result::Attachment":"MojoMojo","Image::ExifTool::Charset":"Image-ExifTool","MHonArc::UTF8::CP1253":"MHonArc","Bio::Graphics::Browser2::DataSource":"GBrowse","Net::SNMP::Message":"Net-SNMP","Catalyst::Script::Create":"Catalyst-Runtime","APR::Socket":"mod_perl","Pod::Html::Util":"perl","Mojo::IOLoop":"Mojolicious","pp":"PAR-Packer","Bio::DB::SeqFeature::Store::Alias::Segment":"GBrowse","LWP::UserAgent::AtomClient":"XML-Atom","Lemonldap::NG::Portal::Lib::DBI":"Lemonldap-NG-Portal","Image::ExifTool::ITC":"Image-ExifTool","HTTP::Daemon":"HTTP-Daemon","Crypt::Cipher::SAFER_K128":"CryptX","Mail::Cap":"MailTools","Jifty::Everything":"Jifty","Net::LDAP::Schema":"perl-ldap","Net::DNS::RR::DSYNC":"Net-DNS","Apache::Wyrd::Site::Index":"Apache-Wyrd","Tie::StdScalar":"perl","Plack::Handler::CGI":"Plack","Lemonldap::NG::Portal::Lib::OpenIDConnect":"Lemonldap-NG-Portal","Jifty::DBI::Filter::Storable":"Jifty-DBI","Crypt::Cipher::Skipjack":"CryptX","Net::DNS::RR::DELEG":"Net-DNS","Crypt::CBC::PBKDF::pbkdf2":"Crypt-CBC","Crypt::CBC::PBKDF::opensslv2":"Crypt-CBC","ExtUtils::Liblist":"ExtUtils-MakeMaker","YAML":"YAML","Apache::ASP::CGI::Test":"Apache-ASP","Dpkg::Control::Tests::Entry":"Dpkg","Kelp::Module::Config::Sandbox":"Kelp","Jifty::Request::Mapper":"Jifty","Plack::Middleware::Static":"Plack","GPIB::llp":"GPIB","RPC::XML::int":"RPC-XML","Apache::Session::Browseable::SQLite":"Apache-Session-Browseable","Jifty::Plugin::Authentication::Password::Action::Login":"Jifty","Mojo::UserAgent::CookieJar":"Mojolicious","App::Authentication::Htpasswd":"App-Context","Dpkg::Deps::Multiple":"Dpkg","Kelp::Module::JSON":"Kelp","MojoMojo::Formatter::Comment":"MojoMojo","Jifty::DBI::Filter::Date":"Jifty-DBI","Tk::DragDrop::SunConst":"Tk","Crypt::Perl::ECDSA::PrivateKey":"Crypt-Perl","Jifty::DBI":"Jifty-DBI","IO::Compress::Zip":"IO-Compress","Pinto::Action":"Pinto","MojoMojo::Formatter::Redirect":"MojoMojo","Catalyst::DispatchType::Chained":"Catalyst-Runtime","Apache2::URI":"mod_perl","Cwd":"PathTools","Tk::DragDrop::XDNDDrop":"Tk","Tk::DragDrop::SunSite":"Tk","Mojo::Server::PSGI::_IO":"Mojolicious","Plack::Middleware::LighttpdScriptNameFix":"Plack","MHonArc::CharEnt::AppleCyrillic":"MHonArc","Mojolicious::Validator":"Mojolicious","Net::LDAP::Message":"perl-ldap","APR::String":"mod_perl","overload::numbers":"perl","Crypt::Perl::X509::Extension::basicConstraints":"Crypt-Perl","Apache2::SubProcess":"mod_perl","Apache::Wyrd::Var":"Apache-Wyrd","Tk::After":"Tk","Jifty::Test::WWW::Declare":"Jifty","Pinto::Migrator":"Pinto","Apache::Wyrd::Services::LoginServer":"Apache-Wyrd","Mail::Address":"MailTools","Net::Server::Coro":"Net-Server-Coro","Dancer::Handler::Debug":"Dancer","Lemonldap::NG::Portal::Lib::RESTProxy":"Lemonldap-NG-Portal","XAO::DO::Web::MenuBuilder":"XAO-Web","Dpkg::Source::Package::V3::Git":"Dpkg","Image::ExifTool::MPEG":"Image-ExifTool","Pinto::Difference":"Pinto","Net::Dropbear::XS::AuthState":"Net-Dropbear","IO::Uncompress::AnyUncompress":"IO-Compress","File::DataClass::Storage::JSON":"File-DataClass","Net::DNS::ZoneFile":"Net-DNS","Apache::Wyrd::Site::WidgetIndex":"Apache-Wyrd","Getopt::Std":"perl","APR::Status":"mod_perl","Crypt::Random::Provider::rand":"Crypt-Random","Jifty::Web::Form::Field::Password":"Jifty","DBDI":"DBI","POE::Component::IRC::Plugin::Proxy":"POE-Component-IRC","Valiant::Filter::Each":"Valiant","Plack::TempBuffer::File":"Plack","MojoMojo::Controller::Admin":"MojoMojo","Image::Info::GIF":"Image-Info","Crypt::Random::Source::Base::Proc":"Crypt-Random-Source","Catalyst::Action::Serialize::XML::Simple":"Catalyst-Action-REST","Dancer2::Serializer::YAML":"Dancer2","Crypt::Perl::X509::Extension::subjectAltName":"Crypt-Perl","XML::LibXML::Literal":"XML-LibXML","YAML::Dumper":"YAML","Crypt::Perl::Ed25519::KeyBase":"Crypt-Perl","Bio::DB::Tagger":"GBrowse","MojoMojo::Controller::Export":"MojoMojo","Pinto::Role::UserAgent":"Pinto","MHonArc::UTF8::CP936":"MHonArc","Digest::MD5":"Digest-MD5","MHonArc::UTF8::ISO8859_16":"MHonArc","arybase":"perl","Net::OAuth::XauthAccessTokenRequest":"Net-OAuth","Crypt::Perl::X::TooLongToSign":"Crypt-Perl","Proc::ProcessTable::Process":"Proc-ProcessTable","Lemonldap::NG::Portal::Issuer::SAML":"Lemonldap-NG-Portal","POSIX::2008":"POSIX-2008","Image::ExifTool::Shortcuts":"Image-ExifTool","Image::ExifTool::Kodak":"Image-ExifTool","File::Spec::Functions":"PathTools","ModPerl::MapBase":"mod_perl","Image::Info":"Image-Info","Mojo::Transaction::HTTP":"Mojolicious","Tk::DragDrop":"Tk","Mojolicious::Command":"Mojolicious","Image::ExifTool::Reconyx":"Image-ExifTool","POE::Filter::IRC::Compat":"POE-Component-IRC","Dancer2::Core::Error":"Dancer2","MojoMojo::Controller::Page":"MojoMojo","Perlbal::Plugin::Stats":"Perlbal","Pinto::Schema::Result::Package":"Pinto","App::Context::ClusterController":"App-Context","Net::LDAP::Control::Paged":"perl-ldap","Encode::Encoding":"Encode","Crypt::Cipher::AES":"CryptX","Mojolicious::Controller":"Mojolicious","ExtUtils::Miniperl":"perl","Jifty::DBI::Collection::Union":"Jifty-DBI","YAML::Mo":"YAML","Pinto::Manual::Tutorial":"Pinto","Perlbal::Plugin::Redirect":"Perlbal","Pinto::Action::List":"Pinto","XML::LibXML::ErrNo":"XML-LibXML","Crypt::Cipher::SAFER_SK128":"CryptX","Apache::Session::Browseable::Store::LDAP":"Apache-Session-Browseable","DBI::ProfileDumper::Apache":"DBI","Valiant::HTML::FormBuilder::Model::TextField":"Valiant","Jifty::Action::Record::Search":"Jifty","Jifty::DBI::Schema":"Jifty-DBI","Lemonldap::NG::Portal::Lib::OpenID::SREG":"Lemonldap-NG-Portal","CPAN::Distribution":"CPAN","MIME::Body":"MIME-tools","Locale::Maketext":"Locale-Maketext","HTTP::Message::PSGI":"Plack","Tk::Menu::Checkbutton":"Tk","UI::Dialog::Backend::Zenity":"UI-Dialog","File::stat":"perl","CPAN::URL":"CPAN","Spoon::Plugin":"Spoon","Valiant::HTML::FormBuilder":"Valiant","Plack::Middleware::Session::Cookie":"Plack-Middleware-Session","Mojolicious::Command::generate":"Mojolicious","XAO::DO::Web::IdentifyUser":"XAO-Web","t::Markers":"perl","EnableModule":"perl","Pinto::IndexCache":"Pinto","PAR::Packer":"PAR-Packer","Jifty::Schema":"Jifty","ExtUtils::Typemaps::Cmd":"ExtUtils-ParseXS","Log::Any::Proxy":"Log-Any","Lemonldap::NG::Portal::Plugins::CheckState":"Lemonldap-NG-Portal","Encode::Unicode::UTF7":"Encode","Galileo::File":"Galileo","Net::DNS::RR::OPT":"Net-DNS","Moxy::Plugin::StripScripts":"Moxy","Crypt::Random::Source::Weak":"Crypt-Random-Source","Plack::Test::Server":"Plack","Log::Any::Manager":"Log-Any","Mojolicious::Command::routes":"Mojolicious","App::Pinto::Command::unpin":"Pinto","MHonArc::CharEnt::CP950":"MHonArc","Crypt::Perl::X509::Extension::nameConstraints":"Crypt-Perl","Apache::MP3::L10N::nb_no":"Apache-MP3","Mojolicious::Plugin::PODRenderer":"Mojolicious","Lemonldap::NG::Portal::2F::Radius":"Lemonldap-NG-Portal","Image::ExifTool::Protobuf":"Image-ExifTool","Dancer2::Template::TemplateToolkit":"Dancer2","Encode::CN::HZ":"Encode","Valiant::Filter::Collapse":"Valiant","MojoMojo::Controller::Image":"MojoMojo","MIME::Parser::FileUnder":"MIME-tools","Encode::XS":"Encode","Text::SmartyPants":"MojoMojo","Net::DNS::RR::CERT":"Net-DNS","Dezi::Server":"Dezi","Valiant::Error":"Valiant","Image::ExifTool::Lang::sk":"Image-ExifTool","SOAP::Test":"SOAP-Lite","POE::Component::IRC::State":"POE-Component-IRC","Image::ExifTool::FITS":"Image-ExifTool","Net::DNS::RR::OPT::EXTENDED_ERROR":"Net-DNS","Net::DNS::RR::CNAME":"Net-DNS","Tk::Canvas":"Tk","MHonArc::UTF8::ISO8859_14":"MHonArc","XAO::DO::Web::Default":"XAO-Web","Perlbal::HTTPHeaders":"Perlbal","CPAN::InfoObj":"CPAN","MySQL::Admin::Actions":"MySQL-Admin","Pinto::Role::PauseConfig":"Pinto","Image::ExifTool::Lang::zh_cn":"Image-ExifTool","Mojolicious::Command::generate::makefile":"Mojolicious","Mojo::IOLoop::Stream":"Mojolicious","MojoMojo::Formatter::File::Pod":"MojoMojo","Image::ExifTool::ID3":"Image-ExifTool","Apache2::ParseSource::Scan":"mod_perl","Image::ExifTool::HtmlDump":"Image-ExifTool","MHonArc::Char::KR":"MHonArc","IO::Socket::SSL::PublicSuffix":"IO-Socket-SSL","HTTP::Session2::Expired":"HTTP-Session2","Dancer2::Core::Role::Template":"Dancer2","Image::ExifTool::MPC":"Image-ExifTool","Elive::Entity::MeetingParameters":"Elive","Plack::Middleware::Refresh":"Plack","Bundle::Net::LDAP":"perl-ldap","Net::netent":"perl","PApp::ECMAScript::Layer":"PApp","Perlbal::Plugin::Throttle::Store":"Perlbal","Tie::Watch":"Tk","DBM_Filter::utf8":"perl","HTML::Entities":"HTML-Parser","ExtUtils::Typemaps::OutputMap":"ExtUtils-ParseXS","Elive::Connection::SDK":"Elive","Dancer::Cookie":"Dancer","Config::Model::Describe":"Config-Model","HTML::StripScripts":"HTML-StripScripts","Elive::Util":"Elive","Crypt::Perl::Ed25519::Parse":"Crypt-Perl","Net::DNS::RR":"Net-DNS","vars":"perl","IO::Compress::Adapter::Bzip2":"IO-Compress","Bundle::Image::Info::Everything":"Image-Info","CPAN::FirstTime":"CPAN","DBI::ProfileData":"DBI","Mojolicious::Plugin::Config":"Mojolicious","Mail::Mailer":"MailTools","Mozilla::CA":"Mozilla-CA","Valiant::HTML::FormBuilder::DefaultModel":"Valiant","Testing":"perl","Crypt::Perl::Ed25519":"Crypt-Perl","HTML::Editor":"MySQL-Admin","Jifty::Module::Pluggable":"Jifty","Jifty::Plugin::AdminUI":"Jifty","Crypt::CBC::PBKDF::none":"Crypt-CBC","Search::OpenSearch::Server::Catalyst":"Search-OpenSearch-Server","Mojo::DynamicMethods":"Mojolicious","Catalyst::Runtime":"Catalyst-Runtime","Term::ReadLine::Gnu::XS":"Term-ReadLine-Gnu","Pinto::Globals":"Pinto","XML::Atom::ErrorHandler":"XML-Atom","Jifty::DBI::Handle::Oracle":"Jifty-DBI","Pinto::Schema::Result::Registration":"Pinto","Imager::Transform":"Imager","Dpkg::BuildAPI":"Dpkg","SOAP::Transport::HTTP::Daemon::ForkAfterProcessing":"SOAP-Lite","XML::LibXML::DocumentFragment":"XML-LibXML","Parallel::ForkManager::Child":"Parallel-ForkManager","Jifty::Web::Form::Field::Upload":"Jifty","Pinto::Role::Plated":"Pinto","Jifty::Plugin":"Jifty","Net::DNS::Domain":"Net-DNS","Apache::MP3::L10N::cs":"Apache-MP3","Net::DNS::RR::MG":"Net-DNS","MHonArc::UTF8::KOI_0":"MHonArc","Mojo::Path":"Mojolicious","SOAP::Transport::TCP::Client":"SOAP-Lite","Dancer::Template::Simple":"Dancer","SOAP::Test::Server":"SOAP-Lite","Image::ExifTool::BMP":"Image-ExifTool","MHonArc::UTF8::BIG5_HKSCS":"MHonArc","Plack::Component":"Plack","Crypt::Cipher::DES":"CryptX","Jifty::Plugin::TestServerWarnings":"Jifty","Catalyst::TraitFor::Request::REST":"Catalyst-Action-REST","Tk::Scale":"Tk","XAO::DO::Web::MultiPageNav":"XAO-Web","Dpkg::Shlibs::SymbolFile":"Dpkg","Jifty::Web::Form::Field::InlineButton":"Jifty","Crypt::PK::ECC":"CryptX","POE::Component::IRC::Qnet":"POE-Component-IRC","Dpkg::Getopt":"Dpkg","Data::FormValidator::ConstraintsFactory":"Data-FormValidator","XML::LibXML::SAX":"XML-LibXML","MHonArc::UTF8::GOST19768_87":"MHonArc","SOAP::Utils":"SOAP-Lite","Jifty::Plugin::ErrorTemplates::View":"Jifty","Apache::MP3::L10N::nl":"Apache-MP3","DBD::Gofer":"DBI","MDK::Common::File":"MDK-Common","Dancer2::Core::Role::Logger":"Dancer2","Image::ExifTool::PostScript":"Image-ExifTool","ModPerl::Manifest":"mod_perl","Net::LDAP::Extra":"perl-ldap","Apache::Wyrd::Interfaces::SmartInput":"Apache-Wyrd","CGI::mod_perl":"mod_perl","Moxy::Plugin::UserID":"Moxy","Pinto::Manual::QuickStart":"Pinto","Crypt::Random::Source::Base::Handle":"Crypt-Random-Source","Symbol":"perl","Zonemaster::Backend::Error::ResourceNotFound":"Zonemaster-Backend","Net::DNS::RR::SIG":"Net-DNS","Jifty::DBI::Record":"Jifty-DBI","XML::LibXML::Document":"XML-LibXML","PApp::Session":"PApp","ExtUtils::ParseXS::Utilities":"ExtUtils-ParseXS","MIME::Decoder::BinHex":"MIME-tools","Spoon::DataObject":"Spoon","Encode::Internal":"Encode","Bundle::Apache2":"mod_perl","UI::Dialog::Console":"UI-Dialog","LWP::Protocol":"libwww-perl","MHonArc::UTF8::AppleIceland":"MHonArc","CGI::Application::Dispatch":"CGI-Application-Dispatch","Crypt::Mac::F9":"CryptX","Mojo::Asset::Memory":"Mojolicious","Crypt::Perl::X509::Extension::ct_precert_poison":"Crypt-Perl","Archive::Tar::Std":"Archive-Tar","MHonArc::CharEnt::AppleThai":"MHonArc","Lemonldap::NG::Portal::Main::Request":"Lemonldap-NG-Portal","Elive::Entity::User":"Elive","Tk::Message":"Tk","GitLab::API::v4::WWWClient":"GitLab-API-v4","IO::Uncompress::Base":"IO-Compress","Mojo::Parameters":"Mojolicious","Crypt::Perl::X509::Extension::extKeyUsage":"Crypt-Perl","XML::Simple":"XML-Simple","Apache::Wyrd::Datum::Varchar":"Apache-Wyrd","Spreadsheet::ParseExcel::Workbook":"Spreadsheet-ParseExcel","Apache2::PerlSections::Dump":"mod_perl","Catalyst::DispatchType::Path":"Catalyst-Runtime","Config::Model::Exception::Load":"Config-Model","Dancer::App":"Dancer","Net::DNS::RR::HIP":"Net-DNS","Bio::Graphics::Browser2::I18n":"GBrowse","Dpkg::Changelog":"Dpkg","DBI::Const::GetInfoReturn":"DBI","Mojo::DOM::HTML":"Mojolicious","Apache::ASP::Request":"Apache-ASP","HTML::EP::Examples::Admin":"HTML-EP","Apache2::ServerUtil":"mod_perl","Perlbal::Plugin::LazyCDN":"Perlbal","Dpkg::IPC":"Dpkg","XAO::DO::Web::Debug":"XAO-Web","APR::BucketType":"mod_perl","Apache2::PerlSections":"mod_perl","Crypt::Perl::X":"Crypt-Perl","POE::Component::IRC::Plugin::Connector":"POE-Component-IRC","Apache::File":"mod_perl","Crypt::Mac":"CryptX","ExtUtils::MakeMaker::version":"ExtUtils-MakeMaker","Module::Provision::TraitFor::UpdatingContent":"Module-Provision","Log::Any::Adapter::File":"Log-Any","Jifty::Plugin::ViewDeclarePage":"Jifty","SOAP::Schema::Deserializer":"SOAP-Lite","Jifty::Action::Record":"Jifty","XML::Twig::Elt":"XML-Twig","Lemonldap::NG::Portal::UserDB::Null":"Lemonldap-NG-Portal","Crypt::Cipher::CAST5":"CryptX","Tk::TixGrid":"Tk","Catalyst::Action::Deserialize::Callback":"Catalyst-Action-REST","Perlbal::Test::WebClient":"Perlbal","Dancer2::Core::Response":"Dancer2","Crypt::Digest::MD2":"CryptX","Lemonldap::NG::Portal::Password::LDAP":"Lemonldap-NG-Portal","Test::Simply":"Fake-Our","DBI::Library::Database::db":"MySQL-Admin","Lemonldap::NG::Portal::Main::Process":"Lemonldap-NG-Portal","Log::Any::Test":"Log-Any","CPAN::Exception::RecursiveDependency::na":"CPAN","SOAP::Transport::TCP::Server":"SOAP-Lite","Valiant::Util::Exception::NameNotValidator":"Valiant","Valiant::Filter::Template":"Valiant","Mail::Mailer::testfile::pipe":"MailTools","ModPerl::TestConfig":"mod_perl","Crypt::Primes":"Crypt-Primes","Kelp::Routes::Pattern":"Kelp","Image::ExifTool::GIF":"Image-ExifTool","MHonArc::UTF8::ISO8859_1":"MHonArc","App::Reference":"App-Context","Crypt::Perl::X::ECDSA::CharacteristicTwoUnsupported":"Crypt-Perl","Apache::Wyrd::Site::Login":"Apache-Wyrd","Crypt::Perl::ECDSA":"Crypt-Perl","Apache::Wyrd::Services::TicketPad":"Apache-Wyrd","Valiant::Validator::Format":"Valiant","Net::DNS::Mailbox2535":"Net-DNS","App":"App-Context","CPAN::Kwalify":"CPAN","Log::Any::Adapter::Syslog":"Log-Any","Plack::Middleware::ConditionalGET":"Plack","Apache2::StructureTable":"mod_perl","Plack::HTTPParser":"Plack","Apache2::Provider":"mod_perl","CPAN::Queue":"CPAN","Apache::Session::Generate::SHA256":"Apache-Session-Browseable","Jifty::DBI::Collection":"Jifty-DBI","Net::Server::MultiType":"Net-Server","Plack::App::Cascade":"Plack","Valiant::Validator::Collection":"Valiant","MojoMojo::Formatter::DocBook":"MojoMojo","Thread::Specific":"perl","Net::DNS::DomainName1035":"Net-DNS","CPAN::HTTP::Credentials":"CPAN","File::Spec::Epoc":"PathTools","Pinto::Schema::ResultSet::Distribution":"Pinto","App::Context::ClusterNode":"App-Context","APR::Request":"libapreq2","SVG::Sparkline::Line":"SVG-Sparkline","Lemonldap::NG::Portal::Lib::WebAuthn":"Lemonldap-NG-Portal","DBIx::Custom":"DBIx-Custom","Tk::Event":"Tk","Apache::PerlSections":"mod_perl","CGI::Util":"CGI","Dpkg::Deps::OR":"Dpkg","Dancer::Plugin::Ajax":"Dancer","HTML::EP::Shop":"HTML-EP","Lemonldap::NG::Portal::Plugins::CheckDevOps":"Lemonldap-NG-Portal","MHonArc::UTF8::ISO8859_7":"MHonArc","Apache::Wyrd::Services::MetaTable":"Apache-Wyrd","Jifty::Plugin::Authentication::Password::Action::ResendConfirmation":"Jifty","Jifty::Notification":"Jifty","Apache::Wyrd::User":"Apache-Wyrd","Pinto::Remote::Action":"Pinto","RPC::XML::nil":"RPC-XML","UI::Dialog::Backend::CDialog":"UI-Dialog","Plack::Server::FCGI":"Plack","Dancer::Logger":"Dancer","Image::ExifTool::AES":"Image-ExifTool","Jifty::DBI::Filter::base64":"Jifty-DBI","Apache::Wyrd::Datum::Text":"Apache-Wyrd","Image::ExifTool::FLIF":"Image-ExifTool","RPC::XML::Function":"RPC-XML","Apache::ASP::ApacheCommon":"Apache-ASP","Apache::MP3::L10N::no_no":"Apache-MP3","Image::ExifTool::DPX":"Image-ExifTool","DirHandle":"perl","MIME::Body::Scalar":"MIME-tools","Net::Server::Proto::Coro":"Net-Server-Coro","SOAP::Lite::Deserializer::XMLSchema2001":"SOAP-Lite","IO::Uncompress::AnyInflate":"IO-Compress","Pinto::Editor":"Pinto","DBI::Gofer::Transport::Base":"DBI","DBM_Filter":"perl","Catalyst::Action::Serialize::View":"Catalyst-Action-REST","Jifty::Plugin::Config::View":"Jifty","SOAP::Transport::MAILTO::Client":"SOAP-Lite","Lemonldap::NG::Portal::Plugins::ForceAuthn":"Lemonldap-NG-Portal","PApp::SCGI::Worker":"PApp","Jifty::Web::Form::Field::Checkbox":"Jifty","MHonArc::CharEnt::ISO8859_2":"MHonArc","Jifty::Request::Action":"Jifty","Image::ExifTool::MIFF":"Image-ExifTool","Jifty::Web::Form::Field::Hidden":"Jifty","Time::gmtime":"perl","Jifty::DateTime":"Jifty","PApp::I18n::PO_Writer":"PApp","Devel::PatchPerl::Plugin::General":"App-perlall","Apache::MP3::L10N::nn":"Apache-MP3","Module::Provision::TraitFor::PrereqDifferences":"Module-Provision","Crypt::Mac::OMAC":"CryptX","Otogiri":"Otogiri","UI::Dialog::Backend::NotifySend":"UI-Dialog","Plack::HTTPParser::PP":"Plack","Catalyst::Action::Deserialize":"Catalyst-Action-REST","ExtUtils::Command::MM":"ExtUtils-MakeMaker","GPIB::hp3585a":"GPIB","in":"perl","LWP::Debug::TraceHTTP":"libwww-perl","Dancer::Continuation::Route::ErrorSent":"Dancer","POE::Component::IRC::Plugin::CTCP":"POE-Component-IRC","Crypt::Checksum::CRC32":"CryptX","Tk::Tiler":"Tk","Perlbal::ClientHTTPBase":"Perlbal","Image::ExifTool::PDF":"Image-ExifTool","Crypt::Random::Source::Base":"Crypt-Random-Source","Bio::Graphics::Browser2::ExternalData":"GBrowse","U64":"IO-Compress","MojoMojo::Schema::Base::ResultSet":"MojoMojo","ojo":"Mojolicious","Jifty::Script::Model":"Jifty","Tk::DragDrop::Win32Drop":"Tk","Tie::SubstrHash":"perl","Mojo::Reactor::EV":"Mojolicious","Catalyst::Request::REST":"Catalyst-Action-REST","Bundle::HTML::EP":"HTML-EP","Jifty::Script::Action":"Jifty","Lemonldap::NG::Portal::2F::Register::Password":"Lemonldap-NG-Portal","XAO::DO::Web::FS":"XAO-Web","Plack::Middleware::StackTrace":"Plack","Jifty::DBI::Handle::Sybase":"Jifty-DBI","Spoon::Registry":"Spoon","Imager::Filter::DynTest":"Imager","Pod::Perldoc::ToMan":"Pod-Perldoc","Apache::Wyrd::Site::SearchResults":"Apache-Wyrd","Perlbal::ClientHTTP":"Perlbal","Email::Address":"Email-Address","CPAN::Admin":"CPAN","Config::Model::Role::Grab":"Config-Model","Spreadsheet::ParseXLSX":"Spreadsheet-ParseXLSX","Mail::Filter":"MailTools","Apache::Symbol":"mod_perl","App::Serializer::Storable":"App-Context","Net::OpenID::VerifiedIdentity":"Net-OpenID-Consumer","Jifty::Filter::DateTime":"Jifty","Dancer::Exception":"Dancer","File::DataClass::ResultSource":"File-DataClass","Digest::SHA":"Digest-SHA","Lemonldap::NG::Portal::Lib::OverConf":"Lemonldap-NG-Portal","Zonemaster::Backend::Validator":"Zonemaster-Backend","Jifty::Script::Server":"Jifty","Valiant::Validator::OnlyOf":"Valiant","MIME::Parser::InnerFile":"MIME-tools","Crypt::Perl::PKCS10::ASN1":"Crypt-Perl","ModPerl::TestRun":"mod_perl","Crypt::Cipher::MULTI2":"CryptX","Amiga::ARexx::Msg":"perl","YAML::Dumper::Base":"YAML","Apache::SessionX::Manager":"Apache-SessionX","Spreadsheet::ParseExcel::Utility":"Spreadsheet-ParseExcel","Jifty::Response":"Jifty","SOAP::Schema":"SOAP-Lite","Net::EasyTCP":"EasyTCP","RPC::XML::struct":"RPC-XML","Image::ExifTool::SigmaRaw":"Image-ExifTool","Lemonldap::NG::Portal::Auth::Facebook":"Lemonldap-NG-Portal","Dpkg::File":"Dpkg","Kelp::Module::Encoder":"Kelp","Pod::Perldoc::ToNroff":"Pod-Perldoc","Apache::Wyrd::Lib":"Apache-Wyrd","Config::Model::Exception::UnavailableElement":"Config-Model","Plack::Handler::Apache2::Registry":"Plack","GPIB":"GPIB","Crypt::Perl::ASN1::Signatures":"Crypt-Perl","Net::LDAP::Message::Dummy":"perl-ldap","SOAP::Packager":"SOAP-Lite","MojoMojo::Formatter::Main":"MojoMojo","Crypt::Perl::X509::Extension::subjectKeyIdentifier":"Crypt-Perl","Dancer::Serializer::JSONP":"Dancer","MHonArc::UTF8::Encode":"MHonArc","Lemonldap::NG::Portal::Lib::Okta":"Lemonldap-NG-Portal","Jifty::Util":"Jifty","SOAP::Transport::POP3":"SOAP-Lite","Image::ExifTool::Jpeg2000":"Image-ExifTool","CPAN::Eval":"CPAN","Bio::Graphics::Browser2::Render::Slave":"GBrowse","Perlbal::Plugin::EchoService::Client":"Perlbal","MIME::Decoder::Gzip64":"MIME-tools","Bio::Graphics::Browser2::OptionPick":"GBrowse","DBD::mysqlPP":"DBD-mysqlPP","Bio::Graphics::Browser2::UserTracks":"GBrowse","Time::tm":"perl","Mojolicious::Command::generate::app":"Mojolicious","Image::ExifTool::Lang::ko":"Image-ExifTool","Tk::Menubar":"Tk","MojoMojo::Formatter::WikipediaLink":"MojoMojo","Mail::Audit::Vacation":"Mail-Audit","Apache::MP3::L10N::x_marklar":"Apache-MP3","HTML::EP::Session::DBIq":"HTML-EP","Mojolicious::Lite":"Mojolicious","MIME::Parser::Results":"MIME-tools","OS2::Process":"perl","Mojo::Server::Daemon":"Mojolicious","Mojo::Server::CGI":"Mojolicious","XML::Twig::XPath::Namespace":"XML-Twig","MojoMojo::Formatter::Markdown":"MojoMojo","MHonArc::CharEnt::ISO8859_14":"MHonArc","Apache::Wyrd::Site::TagPull":"Apache-Wyrd","Jifty::Action::Record::Delete":"Jifty","Lemonldap::NG::Portal::Lib::Choice":"Lemonldap-NG-Portal","Net::LDAP::Extension::Refresh":"perl-ldap","App::Authentication":"App-Context","PApp::XSLT":"PApp","Image::ExifTool::Leaf":"Image-ExifTool","XAO::DO::Web::Header":"XAO-Web","GitLab::API::v4::Mock::Engine":"GitLab-API-v4","Apache2::FilterRec":"mod_perl","MojoMojo::Formatter::Textile":"MojoMojo","Tk::DragDrop::Local":"Tk","App::Context":"App-Context","Lemonldap::NG::Portal::Auth::SSL":"Lemonldap-NG-Portal","CPAN::Exception::RecursiveDependency":"CPAN","PApp::XBox":"PApp","Lemonldap::NG::Portal::UserDB::AD":"Lemonldap-NG-Portal","Email::MIME::Header::AddressList":"Email-MIME","Crypt::Digest::BLAKE2s_128":"CryptX","RPC::XML::base64":"RPC-XML","Net::LDAP::Extra::eDirectory":"perl-ldap","Tk::TextUndo":"Tk","Net::LDAP::DSML::output":"perl-ldap","Image::ExifTool::Fixup":"Image-ExifTool","Net::LDAP::Control::PasswordPolicy":"perl-ldap","Lemonldap::NG::Portal::Main::Plugins":"Lemonldap-NG-Portal","IO::Socket::SSL::Session_Cache":"IO-Socket-SSL","Net::DNS::RR::NID":"Net-DNS","Batch::Batchrun::BuildFile":"Batch-Batchrun","CGI::Session::Serialize::json":"CGI-Session","Net::LDAP::Control::SyncDone":"perl-ldap","Valiant::Filter::Numberize":"Valiant","XML::LibXML::Pattern":"XML-LibXML","Jifty::Plugin::OnlineDocs::Dispatcher":"Jifty","site":"Apache-ASP","Mail::Mailer::qmail":"MailTools","XML::Atom::Base":"XML-Atom","Net::DNS::RR::MB":"Net-DNS","Batch::Batchrun::Retain":"Batch-Batchrun","CPAN::Exception::blocked_urllist":"CPAN","Apache::Session::Browseable::Cassandra":"Apache-Session-Browseable","Jifty::Plugin::Compat":"Jifty","PApp::CGI::Request":"PApp","PApp::Prefs":"PApp","Lemonldap::NG::Portal::Plugins::LocationDetect":"Lemonldap-NG-Portal","Lemonldap::NG::Portal::UserDB::SAML":"Lemonldap-NG-Portal","Dancer2::Session::YAML":"Dancer2","Lemonldap::NG::Portal::UserDB::CAS":"Lemonldap-NG-Portal","App::Context::HTTP":"App-Context","App::Serializer::Html":"App-Context","Plack::Middleware::AccessLog":"Plack","Kelp::Request":"Kelp","Crypt::Random::Source::Weak::devurandom":"Crypt-Random-Source","Crypt::Cipher::Khazad":"CryptX","Archive::Zip::NewFileMember":"Archive-Zip","MHonArc::UTF8::AppleCenteuro":"MHonArc","Data::FormValidator::Results":"Data-FormValidator","Apache::Session::Serialize::Hstore":"Apache-Session-Browseable","Image::ExifTool::ZISRAW":"Image-ExifTool","Jifty::DBI::Record::Memcached":"Jifty-DBI","Apache::MP3::L10N::is":"Apache-MP3","Mojo":"Mojolicious","Apache2::CmdParms":"mod_perl","Net::DNS::RR::EUI48":"Net-DNS","Crypt::Cipher::Serpent":"CryptX","SOAP::Fault":"SOAP-Lite","DBD::DBM":"DBI","CPAN::Author":"CPAN","IO::Compress::Zlib::Extra":"IO-Compress","Jifty::Filter::JSON":"Jifty","Dancer2::Core::Route":"Dancer2","Tk::Panedwindow":"Tk","Crypt::PK::Ed25519":"CryptX","Catalyst":"Catalyst-Runtime","Bio::Graphics::Browser2::DataLoader":"GBrowse","MDK::Common":"MDK-Common","Imager::Preprocess":"Imager","Spreadsheet::ParseXLSX::Decryptor::Agile":"Spreadsheet-ParseXLSX","Bio::Graphics::Browser2::DataLoader::gff3":"GBrowse","Net::Netmask":"Net-Netmask","MojoMojo::Controller::Tag":"MojoMojo","DBI::Library":"MySQL-Admin","Jifty::Script::App":"Jifty","MHonArc::CharEnt::CP932":"MHonArc","MIME::Parser::Filer":"MIME-tools","Elive::DAO::_Base":"Elive","Mojo::EventEmitter":"Mojolicious","XAO::Web":"XAO-Web","MHonArc::UTF8::AppleArabic":"MHonArc","Plack::Middleware::Writer":"Plack","Jifty::Action::Record::Bulk":"Jifty","SOAP::Lite::Utils":"SOAP-Lite","Log::Any::Proxy::Test":"Log-Any","Image::ExifTool::PhaseOne":"Image-ExifTool","SOAP::Lite::COM":"SOAP-Lite","Dpkg::Source::Patch":"Dpkg","Image::ExifTool::OOXML":"Image-ExifTool","Jifty::Plugin::ErrorTemplates":"Jifty","HTML::EP::Examples::POP3Client":"HTML-EP","Tk::Stdio::Handle":"PAR","Net::Server":"Net-Server","Elive::DAO::Singleton":"Elive","Catalyst::ActionRole::QueryMatching":"Catalyst-Runtime","MHonArc::UTF8::CP866":"MHonArc","Tie::Hash::NamedCapture":"perl","Tk::TextEdit":"Tk","CGI::Session::Example":"CGI-Session","Encode::Guess":"Encode","strict":"perl","Tk::Image":"Tk","subs":"perl","CPAN::Distroprefs::Result::Success":"CPAN","DBD::Proxy::dr":"DBI","DBD::Gofer::Transport::corostream":"DBI","Lemonldap::NG::Portal::Captcha::SecurityImage":"Lemonldap-NG-Portal","Dpkg::Arch":"Dpkg","Convert::ASN1":"Convert-ASN1","XAO::DO::Web::Date":"XAO-Web","Image::ExifTool::Validate":"Image-ExifTool","Dpkg::Shlibs::Cppfilt":"Dpkg","Crypt::JWT":"Crypt-JWT","MojoMojo::Controller::User":"MojoMojo","Image::ExifTool::OpenEXR":"Image-ExifTool","Valiant::Util":"Valiant","Spreadsheet::ParseExcel::Dump":"Spreadsheet-ParseExcel","Dancer2::Core::Role::Serializer":"Dancer2","Bundle::Image::Info::SVG":"Image-Info","Bio::Graphics::Browser2::AuthorizedFeatureFile":"GBrowse","Apache::Wyrd::Services::PreAuth":"Apache-Wyrd","SOAP::Transport::LOCAL::Client":"SOAP-Lite","Plack::Loader::Delayed":"Plack","Perlbal::Plugin::Cgilike":"Perlbal","Catalyst::Action::Serialize::YAML::HTML":"Catalyst-Action-REST","Plack::Loader::Shotgun":"Plack","Mojo::WebSocket":"Mojolicious","Config::Model::Instance":"Config-Model","Dancer::Handler":"Dancer","PApp::Util":"PApp","Catalyst::Helper::Controller::Combine":"Catalyst-Controller-Combine","Lemonldap::NG::Portal::2F::Register::Base":"Lemonldap-NG-Portal","DBD::Gofer::Transport::null":"DBI","MHonArc::UTF8::KOI8_U":"MHonArc","Pinto::Manual":"Pinto","Dpkg::Source::Functions":"Dpkg","Net::DNS::Header":"Net-DNS","Crypt::Random::Provider::devurandom":"Crypt-Random","Apache::MP3::L10N::ru":"Apache-MP3","Apache::Session::Browseable::Store::SQLite":"Apache-Session-Browseable","Tk::FBox":"Tk","Lemonldap::NG::Portal::Captcha::ReCaptcha":"Lemonldap-NG-Portal","Dancer::Response":"Dancer","PApp::PCode":"PApp","MHonArc::UTF8::MhaEncode":"MHonArc","Archive::Zip":"Archive-Zip","Jifty::DBI::Filter::Truncate":"Jifty-DBI","Config::Model::Role::Utils":"Config-Model","Pod::Perldoc::ToPod":"Pod-Perldoc","IO::Compress::Gzip::Constants":"IO-Compress","Net::LDAP::Control::Assertion":"perl-ldap","Jifty::Web::Session::None":"Jifty","Net::LDAP::Control::ManageDsaIT":"perl-ldap","HTML::Perlinfo::_version":"HTML-Perlinfo","Tk::BrowseEntry":"Tk","Crypt::Perl::ASN1::Encodee":"Crypt-Perl","MHonArc::UTF8::AppleGreek":"MHonArc","Net::OAuth::V1_0A::RequestTokenResponse":"Net-OAuth","Apache::Wyrd::Site::Page":"Apache-Wyrd","DBD::Sponge::st":"DBI","Apache::MP3::L10N::es":"Apache-MP3","Pinto::Repository":"Pinto","My::PingPong":"SOAP-Lite","Data::FormValidator::Constraints::Upload":"Data-FormValidator","Crypt::Perl::PKCS10::Attribute::challengePassword":"Crypt-Perl","Image::ExifTool::FlashPix":"Image-ExifTool","Apache::Session::Browseable::Store::Redis":"Apache-Session-Browseable","Tk::LabEntry":"Tk","Apache::MP3::L10N::ar":"Apache-MP3","Pinto::Action::Register":"Pinto","File::DataClass::Result":"File-DataClass","Pinto::Schema::ResultSet::Registration":"Pinto","Apache::Session::Browseable::Postgres":"Apache-Session-Browseable","Apache::fork":"mod_perl","Apache::Wyrd::Services::SAK":"Apache-Wyrd","XAO::DO::Web::Search":"XAO-Web","Dpkg::BuildProfiles":"Dpkg","Valiant::Filter::Collection":"Valiant","MHonArc::CharEnt::BIG5_ETEN":"MHonArc","Kelp::Module::Null":"Kelp","Jifty::Plugin::SinglePage::Dispatcher":"Jifty","Crypt::Perl::BigInt":"Crypt-Perl","YAML::Node":"YAML","Crypt::Perl::X509::SCT":"Crypt-Perl","Lemonldap::NG::Portal::UserDB::OpenIDConnect":"Lemonldap-NG-Portal","Jifty::Web::PageRegion":"Jifty","XML::Atom::Namespace":"XML-Atom","Dancer::Serializer::Abstract":"Dancer","CGI::Session::Driver::postgresql":"CGI-Session","Pinto::Manual::Introduction":"Pinto","Mail::Mailer::smtps":"MailTools","Config::Model::TermUI":"Config-Model","Mojo::Server::PSGI":"Mojolicious","Image::ExifTool::Palm":"Image-ExifTool","Jifty::DBI::Handle::SQLite":"Jifty-DBI","Mojolicious::Command::Author::generate::app":"Mojolicious","Lemonldap::NG::Portal::Lib::_tokenRule":"Lemonldap-NG-Portal","APR::Request::Apache2":"libapreq2","XML::LibXML::Attr":"XML-LibXML","MHonArc::UTF8::AppleThai":"MHonArc","Imager::Fill":"Imager","APR::Date":"mod_perl","Net::Dropbear::SSH":"Net-Dropbear","Valiant::Proxy":"Valiant","DBIx::Custom::Order":"DBIx-Custom","DBI::Library::st":"MySQL-Admin","Spreadsheet::ParseExcel::SaveParser":"Spreadsheet-ParseExcel","Perlbal":"Perlbal","ModPerl::Global":"mod_perl","My::Chat":"SOAP-Lite","Catalyst::Action::Serialize":"Catalyst-Action-REST","Perlbal::SocketSSL":"Perlbal","Jifty::Plugin::RequestInspector::View":"Jifty","CGI::Session::PostgreSQL":"CGI-Session","Pod::Perldoc::ToTerm":"Pod-Perldoc","Net::SNMP::Transport::IPv6":"Net-SNMP","Apache2::Util":"mod_perl","Catalyst::DispatchType":"Catalyst-Runtime","ExtUtils::testlib":"ExtUtils-MakeMaker","Jifty::DBI::Filter::DateTime":"Jifty-DBI","SOAP::MIMEParser":"SOAP-Lite","MHonArc::CharEnt::CP1251":"MHonArc","Test::Mojo":"Mojolicious","Pinto::PackageExtractor":"Pinto","Axis":"perl","APR::Error":"mod_perl","Config::Model::Exception::UnknownId":"Config-Model","Jifty::Action::Record::Execute":"Jifty","Crypt::Misc":"CryptX","File::DataClass::Exception":"File-DataClass","Catalyst::Authentication::Store::LDAP":"Catalyst-Authentication-Store-LDAP","Lemonldap::NG::Portal::Lib::OneTimeToken":"Lemonldap-NG-Portal","Data::FormValidator::Constraints":"Data-FormValidator","Dpkg::Source::Format":"Dpkg","Net::Server::SIG":"Net-Server","Catalyst::Engine":"Catalyst-Runtime","Jifty::Script::Po":"Jifty","Mojolicious::Command::cpanify":"Mojolicious","Jifty::Web::Session::JDBI":"Jifty","Mojo::Headers":"Mojolicious","IO::Compress::Adapter::Identity":"IO-Compress","Net::SNMP::Transport::UDP":"Net-SNMP","MHonArc::UTF8::AppleHebrew":"MHonArc","PAR::SetupProgname":"PAR","Image::ExifTool::Motorola":"Image-ExifTool","Mojolicious::Routes":"Mojolicious","Pinto::Remote::Action::Install":"Pinto","Net::DNS::RR::ZONEMD":"Net-DNS","Tk::Reindex":"Tk","Valiant::HTML::FormTags":"Valiant","Mojo::IOLoop::Client":"Mojolicious","App::Pinto::Command::manual":"Pinto","Valiant::Proxy::Hash":"Valiant","Jifty::Plugin::Authentication::Password::Action::SendPasswordReminder":"Jifty","ModPerl::TypeMap":"mod_perl","Apache2::Status::_version":"mod_perl","Module::Provision::TraitFor::CPANDistributions":"Module-Provision","LWP":"libwww-perl","Apache::Wyrd::Input::Complex":"Apache-Wyrd","Encode::GSM0338":"Encode","ModPerl::Util":"mod_perl","IO::Socket::SSL::OCSP_Resolver":"IO-Socket-SSL","MHonArc::CharEnt::CP1257":"MHonArc","Catalyst::Engine::CGI":"Catalyst-Runtime","UI::Dialog::Backend::GDialog":"UI-Dialog","ModPerl::Config":"mod_perl","Dpkg::OpenPGP::Backend::GnuPG":"Dpkg","MojoMojo::Formatter::SyntaxHighlight":"MojoMojo","Pinto::Store":"Pinto","Jifty::CAS::Store::Memcached":"Jifty","CGI::Application::Plugin::RunmodeDeclare":"CGI-Application-Plugin-RunmodeDeclare","IO::Socket::SSL::OCSP_Cache":"IO-Socket-SSL","Config::Model::DeprecatedHandle":"Config-Model","Jifty::Plugin::User::Mixin::Model::User":"Jifty","POE::Component::IRC::Plugin::NickReclaim":"POE-Component-IRC","Tk::Menu::Separator":"Tk","Jifty::Web::Form::Link":"Jifty","Perlbal::ReproxyManager":"Perlbal","Spoon::Hook":"Spoon","Pinto::ArchiveUnpacker":"Pinto","Apache::XAO":"XAO-Web","Kelp::Test::CookieJar":"Kelp","Jifty::Test::WWW::Selenium":"Jifty","Elive::Entity::Group":"Elive","Spoon::Hooks":"Spoon","Net::DNS::RR::RT":"Net-DNS","Lemonldap::NG::Portal::Password::Choice":"Lemonldap-NG-Portal","CGI::Session::ID::incr":"CGI-Session","Moxy::Plugin::GPS::ThirdForce":"Moxy","LWP::RobotUA":"libwww-perl","Apache::Wyrd::Interfaces::Stealth":"Apache-Wyrd","Jifty::Plugin::ActorMetadata":"Jifty","App::Pinto::Command::rename":"Pinto","App::japerl":"App-japerl","MojoMojo::Formatter::GoogleSearch":"MojoMojo","Archive::Zip::BufferedFileHandle":"Archive-Zip","DBIx::Custom::Result":"DBIx-Custom","File::Spec::Unix":"PathTools","Jifty::Model::Session":"Jifty","App::Serializer::Properties":"App-Context","Net::SNMP::Transport::IPv6::TCP":"Net-SNMP","HTTP::Session2::Base":"HTTP-Session2","Crypt::Digest::Keccak224":"CryptX","Dpkg::Interface::Storable":"Dpkg","Jifty::Web::Form":"Jifty","UI::Dialog::Backend::XDialog":"UI-Dialog","Catalyst::ActionContainer":"Catalyst-Runtime","Socket":"Socket","Lemonldap::NG::Portal::Lib::OpenID::Server":"Lemonldap-NG-Portal","XML::Twig::Entity_list":"XML-Twig","HTML::Perlinfo::Apache":"HTML-Perlinfo","YAML::Tag":"YAML","IO::Compress::Gzip":"IO-Compress","Crypt::Perl::X509::Extension::subjectDirectoryAttributes":"Crypt-Perl","Perlbal::Socket":"Perlbal","Image::ExifTool::JSON":"Image-ExifTool","DBD::NullP::db":"DBI","DBIx::Class::Valiant":"Valiant","MIME::ToolUtils":"MIME-tools","Pinto::Action::Reset":"Pinto","prior_to_test":"PAR","File::DataClass::List":"File-DataClass","CGI::File::Temp":"CGI","Dpkg::Dist::Files":"Dpkg","Jifty::Plugin::Authentication::Password":"Jifty","Elive::Entity::Report":"Elive","Crypt::AuthEnc::OCB":"CryptX","Perlbal::Plugin::Throttle::Store::Memcached":"Perlbal","Lemonldap::NG::Portal::UserDB::Facebook":"Lemonldap-NG-Portal","Bundle::Image::Info::XBM":"Image-Info","Lemonldap::NG::Portal::2F::Engines::Default":"Lemonldap-NG-Portal","DBI::DBD::SqlEngine":"DBI","Net::DNS::RR::AFSDB":"Net-DNS","IPC::Run::Timer":"IPC-Run","MojoMojo::Formatter":"MojoMojo","MySQL::Admin::Session":"MySQL-Admin","Net::DNS::RR::X25":"Net-DNS","Catalyst::ActionRole::Scheme":"Catalyst-Runtime","Net::DNS::RR::L64":"Net-DNS","Apache::URI":"mod_perl","File::GlobMapper":"IO-Compress","Lemonldap::NG::Portal::Plugins::CheckUser":"Lemonldap-NG-Portal","Net::DNS::Resolver::cygwin":"Net-DNS","Apache::Wyrd::Defaults":"Apache-Wyrd","HTML::Parser":"HTML-Parser","Net::Server::PSGI":"Net-Server","Mysql":"DBD-mysql","Config::Model":"Config-Model","Dancer::Serializer":"Dancer","Dancer2::Core::DSL":"Dancer2","Apache::ModuleConfig":"mod_perl","Bio::Graphics::Browser2::DataLoader::bam":"GBrowse","DBD::File::DataSource::Stream":"DBI","Legacy::Graphics::Browser::Util":"GBrowse","HTML::EP::Session::DBI":"HTML-EP","MHonArc::UTF8::KOI8_A":"MHonArc","Config::Model::Backend::CdsFile":"Config-Model","Net::protoent":"perl","Lemonldap::NG::Portal::Lib::LDAP":"Lemonldap-NG-Portal","Bio::Graphics::Browser2::TrackDumper":"GBrowse","Crypt::Random":"Crypt-Random","Net::DNS::Nameserver":"Net-DNS","Plack":"Plack","Kelp::Util":"Kelp","MojoMojo::Model::Search":"MojoMojo","CGI::MultipartBuffer":"CGI","Crypt::Perl::RSA::KeyBase":"Crypt-Perl","Log::Any::Adapter::Capture":"Log-Any","Apache::Wyrd::Input":"Apache-Wyrd","Crypt::Perl::ECDSA::EC::DB":"Crypt-Perl","Image::ExifTool::iWork":"Image-ExifTool","Dancer::Continuation::Route::Forwarded":"Dancer","Mojo::DOM::Role::Analyzer":"Mojo-DOM-Role-Analyzer","Apache::Session::LDAP":"Apache-Session-LDAP","Archive::Zip::DirectoryMember":"Archive-Zip","MHonArc::UTF8::MapUTF8":"MHonArc","Pinto::Action::Default":"Pinto","RPC::PlClient::Object":"PlRPC","XML::Twig::XPath::Attribute":"XML-Twig","App::Pinto::Command::kill":"Pinto","Config::Model::Role::FileHandler":"Config-Model","DBD::mysqlPP::st":"DBD-mysqlPP","Mojolicious::Plugin::EPRenderer":"Mojolicious","Elive::Entity::Meeting":"Elive","Image::ExifTool::Panasonic":"Image-ExifTool","Jifty::Server::Prefork::NetServer":"Jifty","Encode::JP::H2Z":"Encode","Apache::Wyrd::Services::Key":"Apache-Wyrd","Net::SNMP::Security::Community":"Net-SNMP","Apache::Wyrd::ErrField":"Apache-Wyrd","Jifty::Plugin::RPC":"Jifty","Batch::Batchrun::Mail":"Batch-Batchrun","Lemonldap::NG::Portal::2F::Register::WebAuthn":"Lemonldap-NG-Portal","MIME::Head":"MIME-tools","Amiga::ARexx":"perl","DBD::Mem::Table":"DBI","DBD::Gofer::st":"DBI","Plack::Builder":"Plack","Lemonldap::NG::Portal::Lib::Slave":"Lemonldap-NG-Portal","Dancer2::Template::Tiny":"Dancer2","Tk::Balloon":"Tk","Jifty::View::Declare":"Jifty","MojoMojo::Schema::Result::RolePrivilege":"MojoMojo","Mojo::DOM":"Mojolicious","ExtUtils::MM_Win95":"ExtUtils-MakeMaker","MHonArc::CharEnt::ISO8859_4":"MHonArc","Mojo::Server::Hypnotoad":"Mojolicious","Image::ExifTool::MacOS":"Image-ExifTool","Jifty::Web::Form::Field::Radio":"Jifty","HTTP::Session2::ClientStore":"HTTP-Session2","Net::Server::Proto::SSL":"Net-Server","Dancer2::Core::App":"Dancer2","Image::ExifTool::MISB":"Image-ExifTool","App::Pinto::Command::clean":"Pinto","Net::DNS::Resolver::MSWin32":"Net-DNS","ModPerl::MethodLookup":"mod_perl","Legacy::DB::SyntenyBlock":"GBrowse","App::Pinto::Command::pull":"Pinto","Catalyst::Component":"Catalyst-Runtime","Spoon::Utils":"Spoon","Crypt::Perl::X509::Extension::policyConstraints":"Crypt-Perl","DBD::Mem::Statement":"DBI","Perlbal::Plugin::AccessControl":"Perlbal","Image::ExifTool::PLUS":"Image-ExifTool","Mojo::UserAgent::Proxy":"Mojolicious","Jifty::Plugin::IEFixes":"Jifty","Pinto::Server":"Pinto","Apache::SessionX::Store::File":"Apache-SessionX","Dpkg::Build::Env":"Dpkg","Lemonldap::NG::Portal::2F::Okta":"Lemonldap-NG-Portal","POE::Component::IRC::Plugin::NickServID":"POE-Component-IRC","Class::Struct":"perl","Jifty::DBI::Handle::mysqlPP":"Jifty-DBI","Dancer::Template::TemplateToolkit":"Dancer","PAR::Heavy":"PAR","App::Pinto::Command::log":"Pinto","Jifty::Plugin::SkeletonApp::View":"Jifty","MHonArc::CharEnt::GB2312":"MHonArc","Dpkg::OpenPGP::Backend::Sequoia":"Dpkg","Apache":"mod_perl","Apache::MP3::L10N::Aliases":"Apache-MP3","HTML::Editor::Markdown":"MySQL-Admin"},"meta":{"date":"Tue Mar 4 14:46:42 2025","epoch":1741099602,"commit":"145c6a1a7cd36c617770a5e6a1eac8c6603900f0","repo":"https://github.com/briandfoy/cpan-security-advisory.git","generator":"util/generate"},"dists":{"urxvt-bgdsl":{"main_module":"","advisories":[{"description":"The rxvt-unicode package is vulnerable to a remote code execution, in the Perl background extension, when an attacker can control the data written to the user's terminal and certain options are set.\n","fixed_versions":[">=9.29"],"affected_versions":[">=9.25,<=9.26"],"darkpan":"true","distribution":"urxvt-bgdsl","reported":"2022-12-09","references":["https://bugzilla.redhat.com/show_bug.cgi?id=2151597","https://www.openwall.com/lists/oss-security/2022/12/05/1"],"cves":["CVE-2022-4170"],"severity":null,"id":"CPANSA-urxvt-bgdsl-2022-4170"}],"versions":[]},"Crypt-Perl":{"main_module":"Crypt::Perl","advisories":[{"id":"CPANSA-Crypt-Perl-2020-01","reported":"2020-08-10","references":["https://github.com/FGasper/p5-Crypt-Perl/compare/0.32...0.33"],"distribution":"Crypt-Perl","severity":"high","cves":["CVE-2020-17478"],"affected_versions":["<0.33"],"fixed_versions":[">=0.33"],"description":"ECDSA/EC/Point.pm in Crypt::Perl before 0.33 does not properly consider timing attacks against the EC point multiplication algorithm.\n"},{"severity":"high","cves":["CVE-2020-13895"],"reported":"2020-06-07","references":["https://github.com/FGasper/p5-Crypt-Perl/commit/f960ce75502acf7404187231a706672f8369acb2","https://github.com/FGasper/p5-Crypt-Perl/issues/14"],"distribution":"Crypt-Perl","id":"CPANSA-Crypt-Perl-2020-02","fixed_versions":[">=0.32"],"description":"Crypt::Perl::ECDSA in the Crypt::Perl (aka p5-Crypt-Perl) module before 0.32 for Perl fails to verify correct ECDSA signatures when r and s are small and when s = 1. This happens when using the curve secp256r1 (prime256v1). This could conceivably have a security-relevant impact if an attacker wishes to use public r and s values when guessing whether signature verification will fail.\n","affected_versions":["<0.32"]}],"versions":[{"version":0.01,"date":"2016-12-14T06:20:54"},{"date":"2016-12-17T05:33:45","version":0.02},{"version":0.021,"date":"2016-12-19T14:55:23"},{"date":"2016-12-19T22:19:39","version":0.022},{"date":"2016-12-20T08:45:47","version":0.03},{"date":"2016-12-20T18:44:49","version":0.031},{"date":"2016-12-21T05:18:09","version":0.032},{"date":"2016-12-23T05:59:32","version":0.033},{"version":0.1,"date":"2016-12-29T16:03:59"},{"date":"2016-12-31T06:23:01","version":0.11},{"version":0.12,"date":"2017-01-02T21:24:31"},{"version":0.13,"date":"2017-01-03T14:55:13"},{"version":0.14,"date":"2017-01-03T16:30:45"},{"date":"2017-01-04T00:12:29","version":0.15},{"date":"2017-02-02T09:09:40","version":"0.15_1"},{"version":"0.16_rc1","date":"2017-02-03T03:31:34"},{"date":"2017-02-03T03:38:07","version":"0.15_2"},{"version":"0.15_3","date":"2017-02-03T07:21:32"},{"version":"0.16","date":"2017-02-07T04:16:06"},{"date":"2017-02-08T07:56:45","version":"0.16_1"},{"version":"0.17","date":"2017-02-08T09:25:41"},{"date":"2017-02-09T04:07:34","version":"0.17_1"},{"date":"2018-06-18T01:48:20","version":"0.18-TRIAL1"},{"version":"0.18-TRIAL2","date":"2018-06-18T02:52:52"},{"date":"2018-06-18T12:03:17","version":"0.18-TRIAL3"},{"version":"0.18-TRIAL4","date":"2018-06-18T15:07:20"},{"date":"2018-06-18T20:34:04","version":"0.18-TRIAL5"},{"version":"0.18-TRIAL6","date":"2018-06-18T21:06:07"},{"version":"0.18-TRIAL7","date":"2018-06-18T21:47:43"},{"date":"2018-06-18T22:42:19","version":"0.18"},{"version":"0.19","date":"2018-06-19T04:25:06"},{"date":"2018-06-19T06:14:32","version":"0.20-TRIAL1"},{"date":"2018-06-19T14:23:57","version":"0.20-TRIAL2"},{"version":"0.20","date":"2018-06-19T15:50:08"},{"date":"2018-06-19T15:56:15","version":"0.21"},{"date":"2018-06-21T03:33:59","version":"0.22-TRIAL1"},{"date":"2018-06-21T13:31:18","version":"0.22-TRIAL2"},{"date":"2018-06-22T14:43:21","version":"0.22"},{"version":"0.23-TRIAL1","date":"2018-06-23T00:40:40"},{"version":"0.23","date":"2018-06-25T14:35:15"},{"version":"0.24_TRIAL1","date":"2018-07-23T03:11:37"},{"version":"0.24_TRIAL2","date":"2018-07-23T03:13:05"},{"version":"0.24-TRIAL3","date":"2018-07-23T03:16:58"},{"date":"2018-07-23T12:12:48","version":"0.24-TRIAL4"},{"version":"0.24","date":"2018-07-24T22:03:18"},{"version":"0.25","date":"2018-07-25T01:54:45"},{"date":"2018-07-28T19:52:07","version":"0.26-TRIAL1"},{"date":"2018-07-28T22:07:05","version":"0.26"},{"version":"0.27-TRIAL1","date":"2018-07-28T22:26:02"},{"date":"2018-07-29T02:05:05","version":"0.27"},{"version":"0.28","date":"2018-08-25T00:24:23"},{"version":"0.29","date":"2018-08-25T02:38:45"},{"date":"2018-12-22T02:29:37","version":"0.30-TRIAL1"},{"version":"0.30-TRIAL2","date":"2018-12-22T15:18:25"},{"date":"2018-12-24T03:14:46","version":"0.30-TRIAL3"},{"version":"0.30","date":"2019-09-12T03:13:59"},{"version":"0.31_01","date":"2020-02-11T00:54:58"},{"date":"2020-02-11T02:50:09","version":"0.31_02"},{"date":"2020-02-12T01:19:36","version":"0.31"},{"version":"0.32_01","date":"2020-06-04T12:31:25"},{"version":"0.32_02","date":"2020-06-04T12:56:11"},{"version":"0.32","date":"2020-06-05T02:53:59"},{"version":"0.33","date":"2020-08-10T15:39:12"},{"date":"2020-09-24T07:31:56","version":"0.34_02"},{"date":"2020-09-24T07:37:16","version":"0.34_03"},{"version":"0.34_04","date":"2020-09-25T01:38:34"},{"version":"0.34_05","date":"2020-09-26T03:44:57"},{"date":"2020-09-26T12:38:56","version":"0.34_06"},{"date":"2020-09-26T18:03:25","version":"0.34_07"},{"version":"0.34_08","date":"2020-09-27T13:00:26"},{"date":"2020-09-27T23:51:08","version":"0.34_09"},{"version":"0.34","date":"2020-09-28T07:22:06"},{"date":"2021-11-17T15:13:58","version":"0.35_02"},{"date":"2021-11-18T03:39:19","version":"0.35"},{"version":"0.36","date":"2021-11-18T03:44:32"},{"version":"0.37_01","date":"2021-11-20T13:20:35"},{"date":"2021-11-21T03:44:48","version":"0.37_02"},{"version":"0.37_03","date":"2021-11-22T04:28:59"},{"version":"0.37_04","date":"2021-11-29T02:09:35"},{"date":"2021-11-30T02:16:10","version":"0.37_05"},{"date":"2021-11-30T16:09:14","version":"0.37_06"},{"version":"0.37_07","date":"2021-12-01T01:39:08"},{"version":"0.37_08","date":"2021-12-02T21:42:02"},{"date":"2021-12-06T15:38:41","version":"0.37_09"},{"version":"0.37_10","date":"2021-12-08T01:12:53"},{"date":"2021-12-09T13:42:15","version":"0.37_11"},{"date":"2021-12-14T02:08:33","version":"0.37_12"},{"version":"0.37_13","date":"2021-12-15T05:19:53"},{"version":"0.37","date":"2021-12-17T19:36:38"},{"date":"2022-10-17T15:04:13","version":"0.38"}]},"eperl":{"main_module":"Parse::ePerl","versions":[{"date":"1996-09-08T09:22:26","version":"1.4"},{"version":"v2.0.3","date":"1997-01-20T06:55:18"},{"version":"2.1","date":"1997-03-25T09:19:29"},{"version":"2.1","date":"1997-04-03T12:24:29"},{"version":"2.1","date":"1997-04-05T08:04:08"},{"date":"1997-04-18T16:36:34","version":"2.1"},{"date":"1997-04-27T15:20:23","version":"v2.1.0"},{"version":"v2.1.1","date":"1997-05-04T20:06:49"},{"date":"1997-05-29T10:26:35","version":"2.2"},{"version":"v2.1.2","date":"1997-05-30T06:24:00"},{"version":"2.2","date":"1997-05-30T16:53:19"},{"date":"1997-06-06T07:37:49","version":"2.2"},{"version":"2.2","date":"1997-06-28T15:59:18"},{"date":"1997-07-19T08:23:43","version":"v2.2.0"},{"version":"v2.2.2","date":"1997-08-14T15:16:02"},{"date":"1997-08-21T15:44:18","version":"v2.2.3"},{"version":"v2.2.4","date":"1997-09-01T14:16:42"},{"date":"1997-09-03T10:33:40","version":"v2.2.5"},{"date":"1997-10-28T13:28:21","version":"v2.2.6"},{"version":"v2.2.8","date":"1997-11-17T16:37:11"},{"version":"v2.2.12","date":"1998-01-02T11:42:11"},{"version":"v2.2.13","date":"1998-07-10T09:22:54"}],"advisories":[{"cves":["CVE-2001-0733"],"severity":null,"distribution":"eperl","reported":"2001-10-18","references":["http://www.securityfocus.com/archive/1/192711","http://www.securityfocus.com/bid/2912","https://exchange.xforce.ibmcloud.com/vulnerabilities/6743"],"id":"CPANSA-ePerl-2001-0733","description":"The #sinclude directive in Embedded Perl (ePerl) 2.2.14 and earlier allows a remote attacker to execute arbitrary code by modifying the 'sinclude' file to point to another file that contains a #include directive that references a file that contains the code.\n","fixed_versions":[],"affected_versions":["<=2.2.14"]}]},"perl-ldap":{"main_module":"Net::LDAP","versions":[{"version":"1.08","date":"1998-10-31T01:14:57"},{"version":"0.08","date":"1998-10-31T01:19:38"},{"date":"1998-12-23T01:16:35","version":"0.09"},{"version":"0.10","date":"1999-03-18T02:58:45"},{"date":"1999-04-18T22:10:20","version":"0.11"},{"date":"1999-06-28T02:40:38","version":"0.12"},{"version":"0.13","date":"1999-08-15T23:27:41"},{"date":"2000-02-14T10:34:19","version":"0.14"},{"version":"0.15","date":"2000-03-22T10:46:21"},{"date":"2000-04-27T17:02:43","version":"0.16"},{"version":"0.17","date":"2000-05-12T10:16:37"},{"date":"2000-05-22T14:53:07","version":"0.18"},{"version":"0.19","date":"2000-06-08T08:30:48"},{"date":"2000-08-03T17:07:52","version":"0.20"},{"date":"2000-09-12T09:32:12","version":"0.21"},{"version":"0.22","date":"2000-09-14T19:08:19"},{"date":"2001-04-19T23:25:47","version":"0.23"},{"date":"2001-07-17T13:01:04","version":"0.24"},{"date":"2001-08-25T08:15:47","version":"0.2401"},{"date":"2001-10-29T17:35:12","version":"0.25"},{"date":"2002-05-28T07:49:00","version":"0.251"},{"version":"0.26","date":"2002-07-18T13:13:03"},{"date":"2003-01-27T14:48:49","version":"0.27"},{"date":"2003-01-27T18:26:51","version":"0.2701"},{"date":"2003-05-19T22:40:30","version":"0.28"},{"version":"0.29","date":"2003-06-24T10:21:09"},{"version":"0.30","date":"2003-10-17T21:42:36"},{"version":"0.31","date":"2004-01-01T10:47:23"},{"date":"2004-07-01T15:59:03","version":"0.32"},{"date":"2004-07-14T21:00:39","version":"0.3201"},{"date":"2004-07-19T18:24:58","version":"0.3202"},{"version":"0.33","date":"2005-04-25T23:02:59"},{"version":"0.34","date":"2007-02-10T23:53:48"},{"date":"2008-03-30T18:58:37","version":"0.35"},{"version":"0.36","date":"2008-04-21T15:21:03"},{"date":"2008-08-28T13:02:29","version":"0.37"},{"date":"2008-09-21T14:28:08","version":"0.38"},{"date":"2008-10-27T20:10:12","version":"0.39"},{"date":"2010-03-12T03:03:48","version":"0.40"},{"version":"0.4001","date":"2010-03-24T20:01:45"},{"date":"2011-09-03T12:44:01","version":"0.41"},{"date":"2011-09-03T12:48:31","version":"0.42"},{"date":"2011-09-03T17:55:11","version":"0.43"},{"date":"2012-01-29T09:55:22","version":"0.44"},{"version":"0.45","date":"2012-09-05T09:46:44"},{"version":"0.46","date":"2012-09-05T16:17:53"},{"version":"0.47","date":"2012-09-16T10:06:08"},{"date":"2012-09-20T08:58:48","version":"0.48"},{"date":"2012-10-06T08:15:30","version":"0.49"},{"date":"2012-11-17T17:10:16","version":"0.50_01"},{"version":"0.50","date":"2012-11-24T12:11:37"},{"version":"0.51","date":"2012-12-01T13:39:38"},{"version":"0.52","date":"2013-01-01T13:03:26"},{"date":"2013-01-26T17:43:28","version":"0.53"},{"date":"2013-03-29T11:25:51","version":"0.54"},{"version":"0.55","date":"2013-04-23T09:38:16"},{"version":"0.56","date":"2013-06-08T11:31:48"},{"version":"0.57","date":"2013-07-21T17:04:36"},{"version":"0.58","date":"2013-12-23T16:50:28"},{"version":"0.59","date":"2014-03-04T17:17:26"},{"version":"0.60","date":"2014-03-08T13:14:49"},{"date":"2014-03-29T16:44:29","version":"0.61"},{"version":"0.62","date":"2014-04-06T09:39:40"},{"date":"2014-06-01T10:58:37","version":"0.63"},{"date":"2014-06-19T15:59:40","version":"0.64"},{"version":"0.65","date":"2015-04-06T18:02:34"},{"date":"2019-04-16T09:42:54","version":"0.66"},{"version":"0.67","date":"2020-12-26T14:37:52"},{"version":"0.68","date":"2021-01-03T17:37:50"}],"advisories":[{"cves":["CVE-2020-16093"],"severity":null,"distribution":"perl-ldap","references":["https://lemonldap-ng.org/download","https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/2250","https://rt.cpan.org/Ticket/Display.html?id=131045"],"reported":"2022-07-18","id":"CPANSA-Net-LDAPS-2020-16093","description":"In LemonLDAP::NG (aka lemonldap-ng) through 2.0.8, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used.\n","fixed_versions":[],"affected_versions":[">0"]}]},"HTML-Scrubber":{"versions":[{"version":"0.02","date":"2003-04-18T14:10:19"},{"version":"0.03","date":"2003-07-21T14:57:02"},{"version":"0.04","date":"2003-10-30T02:31:36"},{"version":"0.05","date":"2003-10-31T07:27:00"},{"date":"2003-11-02T11:10:49","version":"0.06"},{"version":"0.07","date":"2004-03-18T14:35:12"},{"version":"0.08","date":"2004-04-01T22:12:20"},{"date":"2011-04-01T15:36:18","version":"0.09"},{"version":"0.10","date":"2013-09-27T14:06:41"},{"date":"2013-10-11T14:13:11","version":"0.11"},{"date":"2015-03-14T18:25:35","version":"0.12"},{"date":"2015-03-19T16:31:12","version":"0.13"},{"version":"0.14","date":"2015-04-02T16:20:48"},{"date":"2015-10-10T14:02:08","version":"0.15"},{"date":"2017-06-25T19:31:24","version":"0.16"},{"date":"2017-06-27T13:04:46","version":"0.17"},{"version":"0.18","date":"2019-09-22T11:11:50"},{"version":"0.19","date":"2019-09-24T12:28:19"}],"advisories":[{"affected_versions":["<0.15"],"description":"Cross-site scripting (XSS) vulnerability in the HTML-Scrubber module before 0.15 for Perl, when the comment feature is enabled, allows remote attackers to inject arbitrary web script or HTML via a crafted comment.\n","fixed_versions":[">=0.15"],"id":"CPANSA-HTML-Scrubber-2015-5667","severity":null,"cves":["CVE-2015-5667"],"reported":"2015-10-31","references":["http://jvn.jp/en/jp/JVN53973084/index.html","http://jvndb.jvn.jp/jvndb/JVNDB-2015-000171","https://metacpan.org/release/HTML-Scrubber","http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172997.html","http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172983.html","http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172934.html"],"distribution":"HTML-Scrubber"}],"main_module":"HTML::Scrubber"},"CGI-Application-Plugin-RunmodeDeclare":{"versions":[{"date":"2008-09-26T19:59:14","version":"0.01"},{"version":"0.02","date":"2008-09-26T21:37:11"},{"version":"0.03","date":"2008-10-19T23:22:06"},{"version":"0.03_01","date":"2008-10-23T14:18:23"},{"version":"0.03_02","date":"2008-10-24T13:32:43"},{"version":"0.03_03","date":"2008-10-24T16:20:27"},{"date":"2008-10-25T10:54:25","version":"0.04"},{"version":"0.05","date":"2008-10-25T11:46:28"},{"version":"0.06","date":"2008-10-25T16:39:34"},{"date":"2009-01-10T02:32:39","version":"0.07"},{"version":"0.08","date":"2009-05-17T22:29:18"},{"version":"0.09","date":"2010-01-07T13:24:09"},{"date":"2012-02-10T00:53:54","version":"0.10"}],"advisories":[{"affected_versions":["<0.03"],"description":"Wrong order of arguments.\n","fixed_versions":[">=0.03"],"id":"CPANSA-CGI-Application-Plugin-RunmodeDeclare-2008-01","cves":[],"references":["https://metacpan.org/changes/distribution/CGI-Application-Plugin-RunmodeDeclare"],"reported":"2008-10-20","distribution":"CGI-Application-Plugin-RunmodeDeclare"}],"main_module":"CGI::Application::Plugin::RunmodeDeclare"},"Socket":{"main_module":"Socket","versions":[{"date":"1995-11-09T22:44:00","version":"1.3"},{"date":"1996-06-09T12:32:00","version":"1.5"},{"date":"2011-10-25T22:29:20","version":"1.94_03"},{"version":"1.94_04","date":"2011-10-26T17:37:31"},{"date":"2011-10-27T17:28:25","version":"1.94_05"},{"date":"2011-10-30T01:34:45","version":"1.94_06"},{"version":"1.94_07","date":"2011-11-22T15:09:56"},{"date":"2011-12-01T14:07:01","version":"1.95"},{"date":"2011-12-02T23:40:37","version":"1.95_001"},{"version":"1.95_002","date":"2011-12-05T19:33:32"},{"date":"2011-12-06T23:28:06","version":"1.95_003"},{"date":"2011-12-07T16:24:12","version":"1.95_004"},{"version":"1.96","date":"2011-12-11T00:25:11"},{"version":"1.97","date":"2011-12-16T19:47:41"},{"version":"1.97_001","date":"2012-02-07T15:33:00"},{"version":"1.97_002","date":"2012-02-12T11:40:21"},{"date":"2012-02-16T00:52:35","version":"1.98"},{"date":"2012-02-17T00:24:56","version":"1.98_001"},{"version":"1.99","date":"2012-02-21T23:39:36"},{"version":"2.000","date":"2012-03-10T00:09:16"},{"version":"2.001","date":"2012-03-27T13:59:43"},{"version":"2.001_001","date":"2012-05-18T16:23:54"},{"version":"2.001_002","date":"2012-05-22T15:38:46"},{"date":"2012-05-31T15:02:53","version":"2.001_003"},{"version":"2.002","date":"2012-06-06T10:22:21"},{"date":"2012-08-15T13:14:45","version":"2.003"},{"date":"2012-08-15T21:22:04","version":"2.004"},{"version":"2.005","date":"2012-08-16T21:27:21"},{"version":"2.006","date":"2012-08-19T21:49:58"},{"version":"2.007","date":"2012-12-16T18:27:03"},{"version":"2.008","date":"2012-12-27T15:41:41"},{"date":"2013-01-18T16:13:59","version":"2.009"},{"date":"2013-06-24T19:25:09","version":"2.010"},{"version":"2.011","date":"2013-07-28T18:46:32"},{"version":"2.012","date":"2013-09-03T12:23:51"},{"version":"2.013","date":"2013-10-28T00:53:02"},{"version":"2.014","date":"2014-05-31T23:16:34"},{"version":"2.015","date":"2014-08-15T22:38:05"},{"date":"2014-10-08T20:58:19","version":"2.016"},{"version":"2.017","date":"2015-02-10T12:28:48"},{"version":"2.018","date":"2015-02-12T13:45:11"},{"date":"2015-04-27T20:25:03","version":"2.018_001"},{"date":"2015-04-29T16:08:52","version":"2.019"},{"date":"2015-06-24T13:49:15","version":"2.020"},{"version":"2.021","date":"2015-11-18T17:15:18"},{"version":"2.021_01","date":"2016-04-16T22:49:32"},{"date":"2016-06-06T10:07:12","version":"2.021_02"},{"version":"2.022","date":"2016-08-01T15:05:16"},{"version":"2.023","date":"2016-08-02T13:53:11"},{"date":"2016-08-11T12:52:58","version":"2.024"},{"date":"2016-08-26T17:50:04","version":"2.024_01"},{"date":"2016-08-26T22:33:20","version":"2.024_02"},{"date":"2016-10-04T14:06:42","version":"2.024_03"},{"date":"2018-01-09T15:15:51","version":"2.025"},{"version":"2.026","date":"2018-01-11T23:18:50"},{"date":"2018-01-12T17:00:49","version":"2.027"},{"date":"2018-09-05T10:32:16","version":"2.027_04"},{"version":"2.028","date":"2019-02-20T00:03:23"},{"date":"2019-02-20T19:58:07","version":"2.029"},{"date":"2019-02-21T19:41:16","version":"2.029"},{"date":"2019-04-14T09:28:49","version":"2.027_05"},{"date":"2019-06-15T14:08:34","version":"2.029_05"},{"version":"2.030","date":"2020-07-06T13:57:06"},{"date":"2021-01-05T15:50:53","version":"2.031"},{"version":"2.032","date":"2021-06-02T23:32:40"},{"version":"2.033","date":"2022-04-29T14:34:23"},{"version":"2.034","date":"2022-06-27T09:29:08"},{"date":"2022-07-01T14:22:10","version":"2.035"},{"version":"2.036","date":"2022-08-19T16:40:53"},{"date":"2023-06-06T11:57:25","version":"2.037"},{"version":"2.038","date":"2024-04-15T20:15:41"},{"perl_release":"5","version":null,"dual_lived":1,"date":"1994-10-17T00:00:00"},{"dual_lived":1,"date":"1997-05-15T00:00:00","perl_release":"5.004","version":"1.6"},{"dual_lived":1,"date":"1999-04-29T00:00:00","perl_release":"5.00405","version":"1.7"},{"version":"1.72","perl_release":"5.006","dual_lived":1,"date":"2000-03-22T00:00:00"},{"date":"2002-03-05T00:00:00","dual_lived":1,"version":"1.75","perl_release":"5.007003"},{"dual_lived":1,"date":"2003-09-25T00:00:00","version":"1.76","perl_release":"5.008001"},{"date":"2004-04-21T00:00:00","dual_lived":1,"perl_release":"5.008004","version":"1.77"},{"dual_lived":1,"date":"2006-01-31T00:00:00","version":"1.78","perl_release":"5.008008"},{"version":"1.81","perl_release":"5.008009","date":"2008-12-14T00:00:00","dual_lived":1},{"version":"1.79","perl_release":"5.009005","dual_lived":1,"date":"2007-07-07T00:00:00"},{"dual_lived":1,"date":"2007-12-18T00:00:00","version":"1.80","perl_release":"5.010000"},{"perl_release":"5.010001","version":"1.82","date":"2009-08-22T00:00:00","dual_lived":1},{"dual_lived":1,"date":"2009-10-02T00:00:00","version":"1.84","perl_release":"5.011000"},{"dual_lived":1,"date":"2009-10-20T00:00:00","version":"1.85","perl_release":"5.011001"},{"perl_release":"5.011005","version":"1.86","date":"2010-02-20T00:00:00","dual_lived":1},{"perl_release":"5.012","version":"1.87","dual_lived":1,"date":"2010-04-12T00:00:00"},{"version":"1.87_01","perl_release":"5.012003","date":"2011-01-21T00:00:00","dual_lived":1},{"version":"1.88","perl_release":"5.013001","date":"2010-05-20T00:00:00","dual_lived":1},{"dual_lived":1,"date":"2010-06-22T00:00:00","perl_release":"5.013002","version":"1.89"},{"date":"2010-10-20T00:00:00","dual_lived":1,"perl_release":"5.013006","version":"1.90"},{"dual_lived":1,"date":"2010-11-20T00:00:00","perl_release":"5.013007","version":"1.91"},{"dual_lived":1,"date":"2010-12-20T00:00:00","perl_release":"5.013008","version":"1.92"},{"perl_release":"5.013009","version":"1.93","dual_lived":1,"date":"2011-01-20T00:00:00"},{"perl_release":"5.013010","version":"1.94","dual_lived":1,"date":"2011-02-20T00:00:00"},{"perl_release":"5.015003","version":"1.94_01","date":"2011-09-20T00:00:00","dual_lived":1},{"version":"1.94_02","perl_release":"5.015005","dual_lived":1,"date":"2011-11-20T00:00:00"},{"perl_release":"5.017007","version":"2.006_001","dual_lived":1,"date":"2012-12-18T00:00:00"},{"version":"2.020_01","perl_release":"5.023003","dual_lived":1,"date":"2015-09-20T00:00:00"},{"perl_release":"5.023004","version":"2.020_02","date":"2015-10-20T00:00:00","dual_lived":1},{"perl_release":"5.023009","version":"2.020_03","date":"2016-03-20T00:00:00","dual_lived":1},{"dual_lived":1,"date":"2017-11-20T00:00:00","version":"2.020_04","perl_release":"5.027006"}],"advisories":[{"fixed_versions":[">=2.027"],"description":"The function croak is variadic which expects as a first parameter printf-style format. Passing arbitrary and string from the caller as a printf format leads to the security problem CWE-134: Use of Externally-Controlled Format String.\n","affected_versions":["<2.026"],"references":["https://rt.cpan.org/Public/Bug/Display.html?id=122830"],"reported":"2017-08-17","distribution":"Socket","severity":null,"cves":[],"id":"CPANSA-Socket-2017-01"}]},"Fake-Our":{"main_module":"Fake::Our","versions":[{"version":"0.01","date":"2014-02-09T05:36:09"},{"date":"2014-08-06T17:33:15","version":"0.02"},{"date":"2014-08-09T02:35:25","version":"0.03"},{"version":"0.04","date":"2014-08-10T15:33:58"},{"date":"2015-06-21T04:09:47","version":"0.05"},{"version":"0.06","date":"2017-01-23T12:34:34"},{"date":"2017-01-26T15:21:45","version":"0.07"},{"version":"0.08","date":"2017-01-27T15:18:56"},{"version":"0.09","date":"2017-01-28T15:07:50"},{"version":"0.10","date":"2017-03-06T16:01:51"},{"date":"2018-02-03T11:05:49","version":"0.11"},{"date":"2018-02-16T17:54:00","version":"0.12"},{"version":"0.13","date":"2018-02-17T01:35:58"},{"version":"0.14","date":"2018-02-18T15:32:17"},{"version":"0.15","date":"2019-07-11T16:27:42"},{"version":"0.16","date":"2019-07-14T00:51:24"},{"version":"0.17","date":"2023-03-25T02:32:44"}],"advisories":[{"description":"Loading modules from . (current directory).\n","fixed_versions":[">=0.06"],"affected_versions":["<0.06"],"references":["https://metacpan.org/changes/distribution/Fake-Our"],"reported":"2017-01-23","distribution":"Fake-Our","cves":["CVE-2016-1238"],"id":"CPANSA-Fake-Our-2017-01"}]},"Tk":{"advisories":[{"id":"CPANSA-Tk-2008-01","references":["https://metacpan.org/changes/distribution/Tk"],"reported":"2008-10-01","distribution":"Tk","cves":["CVE-2006-4484"],"affected_versions":["<804.029"],"fixed_versions":[">=804.029"],"description":"Buffer overflow in the LWZReadByte_ function in the GD extension in allows remote attackers to have an unknown impact via a GIF file with input_code_size greater than MAX_LWZ_BITS, which triggers an overflow when initializing the table array.\n"}],"versions":[{"date":"1995-08-22T23:03:30","version":0},{"date":"1995-12-19T01:56:04","version":0},{"version":0,"date":"1996-08-29T00:19:01"},{"date":"1996-09-07T01:08:44","version":"400.200"},{"version":"400.201","date":"1997-01-08T23:27:30"},{"version":"400.202","date":"1997-01-25T12:33:02"},{"date":"1997-05-04T20:05:58","version":"402.000"},{"version":"402.001","date":"1997-06-14T19:17:26"},{"date":"1997-07-18T17:01:40","version":"402.002"},{"version":"402.003","date":"1997-10-04T15:32:53"},{"date":"1998-01-25T17:07:27","version":"402.004"},{"date":"1998-02-07T21:22:00","version":"402.003"},{"version":"800.000","date":"1998-02-22T19:34:11"},{"date":"1998-03-02T00:12:00","version":"800.0_01"},{"version":"800.0_02","date":"1998-03-09T22:37:37"},{"date":"1998-03-17T13:43:00","version":"402.003"},{"date":"1998-04-01T04:36:00","version":"402.003"},{"version":"402.003","date":"1998-04-02T18:32:00"},{"version":"800.003","date":"1998-04-05T08:37:23"},{"date":"1998-04-19T17:23:45","version":"800.004"},{"date":"1998-05-17T18:07:11","version":"800.005"},{"version":"800.006","date":"1998-06-14T20:30:35"},{"version":"800.007","date":"1998-06-26T16:30:23"},{"version":"800.008","date":"1998-07-17T16:47:42"},{"date":"1998-08-08T19:31:23","version":"800.010"},{"date":"1998-09-01T17:20:02","version":"800.011"},{"date":"1998-11-15T14:28:04","version":"800.012"},{"date":"1999-03-16T22:13:10","version":"800.013"},{"date":"1999-04-05T20:15:39","version":"800.014"},{"date":"1999-07-28T22:10:03","version":"800.015"},{"date":"2000-01-08T12:48:56","version":"800.017"},{"date":"2000-01-08T12:58:16","version":"800.0_16"},{"date":"2000-01-22T19:44:55","version":"800.018"},{"version":"800.019","date":"2000-03-13T16:39:08"},{"version":"800.020","date":"2000-03-27T17:01:22"},{"date":"2000-04-21T13:38:21","version":"800.021"},{"date":"2000-05-13T09:48:51","version":"800.022"},{"date":"2001-05-15T15:07:21","version":"800.023"},{"version":"800.012","date":"2001-07-14T21:06:00"},{"version":"800.024","date":"2002-03-05T16:38:25"},{"version":"800.024","date":"2002-03-17T20:30:42"},{"date":"2002-10-13T17:20:55","version":"804.0_24"},{"version":"v804.024.","date":"2003-05-02T01:10:54"},{"version":"800.025","date":"2003-09-08T08:13:16"},{"date":"2003-09-28T18:01:55","version":"804.025"},{"date":"2003-10-10T18:24:24","version":"804.025"},{"version":"804.025","date":"2003-10-20T20:44:44"},{"version":"804.025","date":"2003-10-27T08:23:07"},{"version":"804.025","date":"2003-11-02T22:28:10"},{"version":"804.025","date":"2003-11-16T22:15:42"},{"version":"804.025","date":"2003-12-02T21:26:56"},{"version":"804.025_","date":"2003-12-08T08:01:15"},{"date":"2003-12-11T08:03:20","version":"804.025"},{"date":"2003-12-14T20:22:05","version":"804.025"},{"version":"804.025","date":"2003-12-19T17:42:32"},{"version":"804.025_","date":"2003-12-21T21:09:10"},{"version":"804.025","date":"2003-12-23T23:19:20"},{"date":"2004-01-12T21:59:01","version":"804.025"},{"date":"2004-02-28T17:33:01","version":"804.025_"},{"version":"804.025_","date":"2004-03-07T20:33:56"},{"date":"2004-03-19T08:10:49","version":"804.026"},{"version":"804.026","date":"2004-04-11T19:04:25"},{"version":"804.027_500","date":"2007-02-11T08:49:16"},{"date":"2007-09-21T22:57:57","version":"804.027_501"},{"version":"804.027_502","date":"2007-12-04T21:03:29"},{"date":"2007-12-18T22:01:39","version":"804.028"},{"version":"804.0285","date":"2008-10-01T21:48:52"},{"version":"804.028501","date":"2008-11-04T22:27:51"},{"version":"804.028502","date":"2010-01-30T17:54:07"},{"version":"804.028503","date":"2010-05-13T00:00:04"},{"date":"2010-05-27T19:25:41","version":"804.029"},{"date":"2011-06-13T17:53:20","version":"804.0295"},{"date":"2011-10-14T19:22:48","version":"804.029501"},{"version":"804.029502","date":"2011-10-17T21:12:41"},{"version":"804.03","date":"2011-10-20T21:08:12"},{"date":"2013-05-17T22:16:24","version":"804.030500"},{"date":"2013-05-18T05:01:41","version":"804.030501"},{"date":"2013-05-21T07:30:50","version":"804.030502"},{"version":"804.031","date":"2013-05-25T12:57:05"},{"date":"2013-11-17T11:24:41","version":"804.031500"},{"version":"804.031501","date":"2013-11-18T20:19:08"},{"version":"804.031502","date":"2013-12-01T15:07:28"},{"version":"804.031503","date":"2013-12-07T13:00:14"},{"version":"804.032","date":"2014-01-26T17:01:07"},{"version":"804.032500","date":"2014-11-06T21:01:44"},{"version":"804.032501","date":"2015-01-31T10:28:08"},{"date":"2015-02-21T15:54:08","version":"804.033"},{"version":"804.033500","date":"2017-08-20T09:29:42"},{"version":"804.034","date":"2017-08-26T15:26:56"},{"version":"804.034500","date":"2020-02-23T16:12:23"},{"date":"2020-03-19T21:02:47","version":"804.034501"},{"date":"2020-03-28T19:28:42","version":"804.035"},{"date":"2021-02-07T19:55:40","version":"804.035501"},{"version":"804.036","date":"2021-02-14T12:53:44"}],"main_module":"Tk"},"Batch-Batchrun":{"advisories":[{"affected_versions":[">=1.03"],"description":"The Batch::Batchrun module 1.03 for Perl does not properly handle temporary files.\n","fixed_versions":[],"id":"CPANSA-Batch-Batchrun-2011-4117","severity":"high","cves":["CVE-2011-4117"],"references":["http://www.openwall.com/lists/oss-security/2011/11/04/2","http://www.openwall.com/lists/oss-security/2011/11/04/4","https://rt.cpan.org/Public/Bug/Display.html?id=69594"],"reported":"2020-01-31","distribution":"Batch-Batchrun"}],"versions":[{"date":"1999-08-21T20:25:47","version":"1.03"}],"main_module":"Batch::Batchrun"},"Storable":{"main_module":"Storable","versions":[{"version":"0.1","date":"1995-10-02T10:50:02"},{"version":"0.2","date":"1997-01-13T11:42:25"},{"version":"0.2","date":"1997-01-13T17:18:01"},{"date":"1997-01-14T15:12:36","version":"0.3"},{"version":"0.4","date":"1997-01-15T18:25:57"},{"date":"1997-01-22T14:47:23","version":"0.4"},{"version":"0.4","date":"1997-02-27T15:02:37"},{"date":"1997-02-27T15:38:18","version":"0.4"},{"version":"0.4","date":"1997-03-25T10:32:00"},{"version":"0.4","date":"1997-05-16T09:24:59"},{"date":"1997-06-03T09:38:38","version":"0.4"},{"date":"1997-06-10T16:47:47","version":"0.5"},{"version":"0.5","date":"1997-11-05T10:05:11"},{"version":"0.5","date":"1998-01-13T16:59:38"},{"version":"0.5","date":"1998-01-20T08:32:03"},{"version":"0.5","date":"1998-03-06T20:52:28"},{"date":"1998-03-25T14:10:24","version":"0.5"},{"version":"0.5","date":"1998-04-08T11:20:48"},{"date":"1998-04-09T16:17:05","version":"0.5"},{"version":"0.5","date":"1998-04-24T15:29:23"},{"version":"0.5","date":"1998-04-30T13:13:58"},{"date":"1998-05-12T07:15:48","version":"0.5"},{"date":"1998-06-04T16:19:02","version":"0.6"},{"date":"1998-06-12T09:54:35","version":"0.6"},{"version":"0.6","date":"1998-06-22T09:00:32"},{"version":"0.6","date":"1998-07-03T13:53:55"},{"date":"1998-07-21T12:10:39","version":"0.6"},{"version":"0.6","date":"1999-01-31T18:01:47"},{"version":"0.6","date":"1999-07-12T13:05:25"},{"version":"0.6","date":"1999-09-02T12:47:03"},{"version":"v0.6.5","date":"1999-09-14T20:27:23"},{"version":"v0.6.6","date":"1999-10-19T19:33:43"},{"date":"1999-10-20T17:10:19","version":"v0.6.7"},{"version":"v0.6.9","date":"2000-03-02T22:29:53"},{"date":"2000-03-29T18:00:09","version":"v0.6.10"},{"date":"2000-04-02T22:12:47","version":"v0.6.11"},{"date":"2000-08-03T22:12:31","version":"v0.7.0"},{"date":"2000-08-13T20:17:55","version":"v0.7.1"},{"date":"2000-08-14T07:27:17","version":"v0.7.2"},{"version":"v0.7.4","date":"2000-08-23T23:12:01"},{"version":"v1.0.0","date":"2000-09-01T19:44:37"},{"version":"v1.0.1","date":"2000-09-17T16:56:12"},{"date":"2000-09-28T21:50:42","version":"v1.0.2"},{"date":"2000-09-29T19:55:57","version":"v1.0.3"},{"version":"v1.0.4","date":"2000-10-23T18:12:41"},{"version":"v1.0.5","date":"2000-10-26T17:18:33"},{"date":"2000-11-05T17:30:34","version":"v1.0.6"},{"date":"2001-01-03T09:48:40","version":"v1.0.7"},{"date":"2001-02-17T12:43:23","version":"v1.0.10"},{"date":"2001-03-15T00:30:04","version":"v1.0.11"},{"version":"v1.0.12","date":"2001-07-01T11:30:39"},{"date":"2001-08-28T21:59:16","version":"v1.0.13"},{"version":"v1.0.14","date":"2001-12-01T13:48:14"},{"date":"2002-05-18T16:48:08","version":"2.00"},{"version":"2.02","date":"2002-05-28T20:34:47"},{"version":"2.03","date":"2002-06-01T04:35:47"},{"date":"2002-06-08T02:11:56","version":"2.04"},{"version":"2.05","date":"2002-10-03T03:37:51"},{"version":"2.06","date":"2002-11-25T12:34:01"},{"date":"2003-05-05T05:21:16","version":"2.07"},{"version":"2.08","date":"2003-09-05T20:01:37"},{"version":"2.09","date":"2004-01-06T01:47:55"},{"version":"2.10","date":"2004-03-01T04:28:16"},{"version":"2.11","date":"2004-03-17T15:11:57"},{"version":"2.12","date":"2004-03-24T03:24:16"},{"date":"2004-06-28T16:41:47","version":"2.13"},{"version":"2.14","date":"2005-04-25T02:15:51"},{"version":"2.15","date":"2005-05-23T17:21:53"},{"version":"2.16","date":"2007-03-31T00:51:12"},{"date":"2007-11-16T20:48:24","version":"2.17"},{"version":"2.18","date":"2007-11-23T18:18:24"},{"version":"2.20","date":"2009-05-18T04:18:09"},{"version":"2.21","date":"2009-08-06T05:30:04"},{"date":"2010-11-12T17:12:42","version":"2.23"},{"date":"2010-11-12T17:29:29","version":"2.24"},{"date":"2010-12-11T06:08:33","version":"2.25"},{"version":"2.29","date":"2011-07-03T04:04:14"},{"version":"2.30","date":"2011-07-12T03:59:06"},{"version":"2.35","date":"2012-06-07T01:16:46"},{"version":"2.38","date":"2012-09-11T01:30:44"},{"version":"2.39","date":"2012-09-11T01:38:57"},{"date":"2013-07-13T16:49:48","version":"2.45"},{"date":"2014-07-02T11:09:04","version":"2.51"},{"version":"3.05","date":"2017-01-29T11:41:00"},{"version":"3.05_01","date":"2017-01-30T14:25:11"},{"date":"2017-01-30T18:55:50","version":"3.05_02"},{"version":"3.05_03","date":"2017-01-31T01:58:36"},{"date":"2017-02-02T11:22:12","version":"3.05_04"},{"date":"2017-03-05T10:48:10","version":"3.05_06"},{"version":"3.05_07","date":"2017-03-05T12:52:10"},{"date":"2017-03-11T07:51:19","version":"3.05_09"},{"date":"2017-03-14T09:03:54","version":"3.05_10"},{"version":"3.05_11","date":"2017-03-29T20:00:48"},{"version":"3.05_12","date":"2017-04-19T07:20:42"},{"date":"2017-10-15T12:06:30","version":"3.05_14"},{"version":"3.05_15","date":"2017-10-21T09:30:17"},{"date":"2017-10-21T16:17:28","version":"3.05_16"},{"date":"2018-04-19T08:29:33","version":"3.06"},{"version":"3.05_17","date":"2018-04-20T16:11:03"},{"version":"3.08","date":"2018-04-21T10:08:56"},{"date":"2018-04-21T16:50:30","version":"3.09"},{"date":"2018-04-27T17:46:19","version":"3.11"},{"date":"2018-09-05T15:12:26","version":"3.11_01"},{"version":"3.12_03","date":"2019-03-06T12:42:01"},{"version":"3.12_04","date":"2019-03-12T09:31:55"},{"version":"3.14_04","date":"2019-04-16T07:32:16"},{"version":"3.15","date":"2019-04-23T13:29:25"},{"version":"3.15_04","date":"2019-05-05T12:46:33"},{"version":"3.24_50","date":"2021-08-25T09:06:32"},{"version":"3.25","date":"2021-08-30T08:39:08"},{"dual_lived":1,"date":"2002-03-05T00:00:00","version":"1.015","perl_release":"5.007003"},{"version":"2.19","perl_release":"5.008009","dual_lived":1,"date":"2008-12-14T00:00:00"},{"version":"2.15_02","perl_release":"5.009003","date":"2006-01-28T00:00:00","dual_lived":1},{"dual_lived":1,"date":"2009-10-20T00:00:00","version":"2.22","perl_release":"5.011001"},{"version":"2.26","perl_release":"5.013009","dual_lived":1,"date":"2011-01-20T00:00:00"},{"perl_release":"5.013011","version":"2.27","date":"2011-03-20T00:00:00","dual_lived":1},{"dual_lived":1,"date":"2011-06-20T00:00:00","version":"2.28","perl_release":"5.015000"},{"perl_release":"5.015001","version":"2.31","date":"2011-07-20T00:00:00","dual_lived":1},{"version":"2.32","perl_release":"5.015003","dual_lived":1,"date":"2011-09-20T00:00:00"},{"version":"2.33","perl_release":"5.015005","date":"2011-11-20T00:00:00","dual_lived":1},{"date":"2011-12-20T00:00:00","dual_lived":1,"perl_release":"5.015006","version":"2.34"},{"dual_lived":1,"date":"2012-06-20T00:00:00","version":"2.36","perl_release":"5.017001"},{"dual_lived":1,"date":"2012-07-20T00:00:00","version":"2.37","perl_release":"5.017002"},{"version":"2.40","perl_release":"5.017007","date":"2012-12-18T00:00:00","dual_lived":1},{"date":"2013-04-20T00:00:00","dual_lived":1,"version":"2.41","perl_release":"5.017011"},{"perl_release":"5.019","version":"2.42","dual_lived":1,"date":"2013-05-20T00:00:00"},{"version":"2.43","perl_release":"5.019001","date":"2013-06-21T00:00:00","dual_lived":1},{"dual_lived":1,"date":"2013-08-20T00:00:00","perl_release":"5.019003","version":"2.46"},{"version":"2.47","perl_release":"5.019004","date":"2013-09-20T00:00:00","dual_lived":1},{"perl_release":"5.019007","version":"2.48","dual_lived":1,"date":"2013-12-20T00:00:00"},{"version":"2.49","perl_release":"5.019011","dual_lived":1,"date":"2014-04-20T00:00:00"},{"date":"2015-02-14T00:00:00","dual_lived":1,"perl_release":"5.020002","version":"2.49_01"},{"date":"2014-12-20T00:00:00","dual_lived":1,"perl_release":"5.021007","version":"2.52"},{"perl_release":"5.021009","version":"2.53","dual_lived":1,"date":"2015-02-21T00:00:00"},{"dual_lived":1,"date":"2015-12-13T00:00:00","version":"2.53_01","perl_release":"5.022001"},{"date":"2017-01-14T00:00:00","dual_lived":1,"version":"2.53_02","perl_release":"5.022003"},{"dual_lived":1,"date":"2015-07-20T00:00:00","perl_release":"5.023001","version":"2.54"},{"perl_release":"5.023008","version":"2.55","dual_lived":1,"date":"2016-02-20T00:00:00"},{"dual_lived":1,"date":"2016-03-20T00:00:00","version":"2.56","perl_release":"5.023009"},{"perl_release":"5.024001","version":"2.56_01","date":"2017-01-14T00:00:00","dual_lived":1},{"date":"2016-08-20T00:00:00","dual_lived":1,"perl_release":"5.025004","version":"2.57"},{"dual_lived":1,"date":"2016-10-20T00:00:00","perl_release":"5.025006","version":"2.58"},{"version":"2.59","perl_release":"5.025007","dual_lived":1,"date":"2016-11-20T00:00:00"},{"dual_lived":1,"date":"2017-01-20T00:00:00","perl_release":"5.025009","version":"2.61"},{"dual_lived":1,"date":"2017-02-20T00:00:00","perl_release":"5.025010","version":"2.62"},{"version":"2.63","perl_release":"5.027001","dual_lived":1,"date":"2017-06-20T00:00:00"},{"date":"2017-08-21T00:00:00","dual_lived":1,"perl_release":"5.027003","version":"2.64"},{"dual_lived":1,"date":"2017-11-20T00:00:00","perl_release":"5.027006","version":"2.65"},{"perl_release":"5.028002","version":"3.08_01","dual_lived":1,"date":"2019-04-19T00:00:00"},{"dual_lived":1,"date":"2018-08-20T00:00:00","version":"3.12","perl_release":"5.029002"},{"dual_lived":1,"date":"2018-09-20T00:00:00","perl_release":"5.029003","version":"3.13"},{"version":"3.14","perl_release":"5.029006","dual_lived":1,"date":"2018-12-18T00:00:00"},{"perl_release":"5.031001","version":"3.16","dual_lived":1,"date":"2019-06-20T00:00:00"},{"perl_release":"5.031003","version":"3.17","date":"2019-08-20T00:00:00","dual_lived":1},{"perl_release":"5.031007","version":"3.18","dual_lived":1,"date":"2019-12-20T00:00:00"},{"version":"3.19","perl_release":"5.031009","date":"2020-02-20T00:00:00","dual_lived":1},{"perl_release":"5.031011","version":"3.20","date":"2020-04-28T00:00:00","dual_lived":1},{"date":"2020-06-20T00:00:00","dual_lived":1,"version":"3.21","perl_release":"5.032"},{"date":"2020-08-20T00:00:00","dual_lived":1,"version":"3.22","perl_release":"5.033001"},{"perl_release":"5.033003","version":"3.23","dual_lived":1,"date":"2020-10-20T00:00:00"},{"version":"3.24","perl_release":"5.035003","date":"2021-08-20T00:00:00","dual_lived":1},{"dual_lived":1,"date":"2022-04-20T00:00:00","perl_release":"5.035011","version":"3.26"},{"version":"3.27","perl_release":"5.037002","date":"2022-07-20T00:00:00","dual_lived":1},{"date":"2022-11-20T00:00:00","dual_lived":1,"perl_release":"5.037006","version":"3.28"},{"dual_lived":1,"date":"2023-01-20T00:00:00","perl_release":"5.037008","version":"3.29"},{"dual_lived":1,"date":"2023-03-20T00:00:00","perl_release":"5.037010","version":"3.31"},{"perl_release":"5.038","version":"3.32","dual_lived":1,"date":"2023-07-02T00:00:00"}],"advisories":[{"cves":[],"reported":"2017-01-29","references":["https://metacpan.org/changes/distribution/Storable","https://cxsecurity.com/issue/WLB-2007120031"],"distribution":"Storable","id":"CPANSA-Storable-2017-01","description":"Malcrafted storable files or buffers.\n","fixed_versions":[">=3.05"],"affected_versions":["<3.05"]}]},"Net-OAuth":{"main_module":"Net::OAuth","advisories":[{"fixed_versions":[">=0.29"],"description":"In Net::OAuth::Client in the Net::OAuth package before 0.29 for Perl, the default nonce is a 32-bit integer generated from the built-in rand() function, which is not cryptographically strong.\n","affected_versions":["<0.29"],"severity":"high","cves":["CVE-2025-22376"],"reported":"2025-01-03","references":["https://metacpan.org/release/KGRENNAN/Net-OAuth-0.28/source/lib/Net/OAuth/Client.pm#L260","https://metacpan.org/release/RRWO/Net-OAuth-0.29/changes"],"distribution":"Net-OAuth","id":"CPANSA-Net-OAuth-2025-22376"}],"versions":[{"version":"0.01","date":"2007-09-30T14:22:46"},{"date":"2007-10-02T07:37:48","version":"0.02"},{"version":"0.03","date":"2007-10-15T01:37:47"},{"version":"0.04","date":"2007-10-19T16:49:05"},{"date":"2007-11-19T03:34:37","version":"0.05"},{"date":"2008-03-08T00:52:34","version":"0.06"},{"version":"0.07","date":"2008-06-01T16:10:24"},{"date":"2008-06-02T17:46:32","version":"0.08"},{"date":"2008-06-03T03:48:14","version":"0.09"},{"date":"2008-06-04T16:32:57","version":"0.1"},{"version":"0.11","date":"2008-06-04T16:52:05"},{"date":"2008-07-04T23:04:35","version":"0.12"},{"version":"0.13","date":"2008-11-13T22:55:38"},{"date":"2008-12-13T17:32:02","version":"0.14"},{"version":"0.15","date":"2009-06-05T01:27:05"},{"version":"0.16","date":"2009-06-15T18:40:40"},{"date":"2009-06-25T17:05:32","version":"0.17"},{"date":"2009-06-25T17:21:13","version":"0.18"},{"version":"0.19","date":"2009-06-26T17:37:04"},{"date":"2009-11-13T19:04:23","version":"0.20"},{"version":"0.21","date":"2010-03-10T23:07:13"},{"version":"0.22","date":"2010-03-11T00:25:24"},{"version":"0.23","date":"2010-03-18T17:53:01"},{"date":"2010-03-21T03:44:38","version":"0.24"},{"version":"0.25","date":"2010-03-21T03:53:29"},{"date":"2010-06-16T20:08:26","version":"0.26"},{"date":"2010-06-16T20:47:49","version":"0.27"},{"date":"2012-01-06T06:08:03","version":"0.28"},{"version":"0.29","date":"2025-01-03T09:18:44"},{"version":"0.30","date":"2025-01-03T09:48:29"}]},"Cpanel-JSON-XS":{"main_module":"Cpanel::JSON::XS","versions":[{"version":"2.33_03","date":"2013-03-01T00:52:41"},{"version":"2.33_04","date":"2013-03-01T22:07:06"},{"date":"2013-03-27T16:53:34","version":"2.3305"},{"version":"2.3306","date":"2013-03-27T17:17:51"},{"version":"2.3307","date":"2013-03-27T22:58:47"},{"date":"2013-03-28T14:28:56","version":"2.3308"},{"version":"2.3309","date":"2013-03-28T15:12:42"},{"date":"2013-03-28T17:33:21","version":"2.3310"},{"date":"2013-06-26T16:24:40","version":"2.3313"},{"version":"2.3314","date":"2013-09-09T05:54:40"},{"version":"2.3401","date":"2013-10-02T20:06:47"},{"version":"2.3402","date":"2013-11-02T14:42:20"},{"date":"2013-11-02T15:17:41","version":"2.3403"},{"date":"2014-01-30T15:58:58","version":"2.3404"},{"version":"3.0101","date":"2014-04-15T21:17:11"},{"date":"2014-04-17T18:37:34","version":"3.0102"},{"date":"2014-04-21T17:49:09","version":"3.0103"},{"date":"2014-04-26T16:04:39","version":"3.0104"},{"date":"2014-11-06T10:38:31","version":"3.0105"},{"date":"2014-11-11T21:57:49","version":"3.0106"},{"version":"3.0107","date":"2014-11-28T12:16:29"},{"date":"2014-12-11T17:02:07","version":"3.0108"},{"version":"3.0109","date":"2014-12-12T10:24:33"},{"version":"3.0110","date":"2014-12-12T22:35:37"},{"date":"2014-12-13T18:40:06","version":"3.0111"},{"date":"2014-12-14T16:34:01","version":"3.0112"},{"version":"3.0113","date":"2014-12-15T12:23:32"},{"date":"2015-01-04T14:06:03","version":"3.0114"},{"version":"3.0115","date":"2015-01-31T21:42:51"},{"version":"3.0201","date":"2015-11-26T08:58:33"},{"date":"2015-11-26T13:16:40","version":"3.0202"},{"version":"3.0203","date":"2015-11-26T13:42:02"},{"date":"2015-11-26T22:30:26","version":"3.0204"},{"version":"3.0205","date":"2015-11-29T14:09:00"},{"date":"2015-11-30T16:16:48","version":"3.0206"},{"date":"2015-12-02T16:34:35","version":"3.0207"},{"date":"2015-12-02T22:46:58","version":"3.0208"},{"version":"3.0209","date":"2015-12-03T09:45:04"},{"date":"2015-12-03T11:59:24","version":"3.0210"},{"version":"3.0211","date":"2016-01-10T17:38:25"},{"date":"2016-02-27T13:30:04","version":"3.0212"},{"version":"3.0213","date":"2016-03-02T10:28:37"},{"version":"3.0213_01","date":"2016-04-12T08:40:05"},{"version":"3.0213_02","date":"2016-04-13T10:40:03"},{"date":"2016-06-02T16:18:51","version":"3.0214"},{"date":"2016-06-06T13:28:49","version":"3.0215"},{"date":"2016-06-12T12:14:20","version":"3.0216"},{"date":"2016-06-18T09:59:27","version":"3.0217"},{"date":"2016-10-04T10:11:33","version":"3.0217_01"},{"version":"3.0217_02","date":"2016-10-04T14:47:29"},{"date":"2016-10-06T08:46:17","version":"3.0217_03"},{"version":"3.0217_04","date":"2016-10-07T12:11:03"},{"version":"3.0217_05","date":"2016-10-07T17:22:48"},{"version":"3.0217_06","date":"2016-10-08T08:01:50"},{"version":"3.0218","date":"2016-10-13T12:47:31"},{"date":"2016-10-26T11:45:35","version":"3.0219"},{"version":"3.0220","date":"2016-10-28T08:34:28"},{"date":"2016-10-30T12:27:36","version":"3.0221"},{"date":"2016-10-30T15:04:32","version":"3.0222"},{"date":"2016-11-16T11:47:38","version":"3.0223"},{"date":"2016-11-20T11:31:34","version":"3.0224"},{"version":"3.0225","date":"2016-11-23T18:43:00"},{"version":"3.0226","date":"2017-02-11T13:24:48"},{"date":"2017-02-13T10:57:06","version":"3.0227"},{"version":"3.0228","date":"2017-03-07T23:57:39"},{"version":"3.0229","date":"2017-03-10T14:08:07"},{"date":"2017-03-12T09:52:13","version":"3.0230"},{"version":"3.0231","date":"2017-03-29T09:51:51"},{"date":"2017-05-01T05:35:12","version":"3.0232"},{"version":"3.0233","date":"2017-05-01T14:54:56"},{"version":"3.0234","date":"2017-07-27T15:43:41"},{"date":"2017-07-27T16:21:47","version":"3.0235"},{"version":"3.0236","date":"2017-07-27T20:15:25"},{"version":"3.0237","date":"2017-07-28T11:15:05"},{"date":"2017-08-25T20:53:56","version":"3.0238"},{"version":"3.0239","date":"2017-08-28T20:48:37"},{"date":"2018-01-30T11:52:27","version":"3.99_01"},{"version":"3.99_02","date":"2018-01-31T12:58:24"},{"date":"2018-01-31T17:18:58","version":"3.99_03"},{"version":"4.00","date":"2018-02-02T01:57:54"},{"version":"4.01","date":"2018-02-03T11:50:36"},{"version":"4.02","date":"2018-02-27T16:08:55"},{"version":"4.03","date":"2018-06-21T11:16:14"},{"version":"4.04","date":"2018-06-22T17:37:07"},{"version":"4.05","date":"2018-08-19T16:55:22"},{"version":"4.06","date":"2018-08-23T07:50:22"},{"version":"4.07","date":"2018-11-02T09:51:34"},{"version":"4.08","date":"2018-11-28T14:26:40"},{"date":"2019-02-15T10:09:53","version":"4.09"},{"version":"4.10","date":"2019-03-18T07:50:15"},{"date":"2019-03-26T16:46:53","version":"4.11"},{"version":"4.12","date":"2019-06-11T08:04:04"},{"version":"4.13","date":"2019-10-14T14:14:37"},{"version":"4.14","date":"2019-10-15T15:16:21"},{"version":"4.15","date":"2019-10-22T07:01:03"},{"date":"2019-11-04T15:51:01","version":"4.16"},{"version":"4.17","date":"2019-11-05T13:48:29"},{"date":"2019-12-13T15:54:58","version":"4.18"},{"date":"2020-02-06T15:07:47","version":"4.19"},{"date":"2020-08-12T12:18:46","version":"4.20"},{"date":"2020-08-13T06:56:18","version":"4.21"},{"version":"4.22","date":"2020-09-04T19:26:28"},{"version":"4.23","date":"2020-09-05T10:21:25"},{"date":"2020-10-02T09:05:37","version":"4.24"},{"version":"4.25","date":"2020-10-28T07:04:49"},{"date":"2021-04-12T06:34:32","version":"4.26"},{"version":"4.27","date":"2021-10-14T19:19:01"},{"version":"4.28","date":"2022-05-05T14:46:07"},{"date":"2022-05-27T15:32:51","version":"4.29"},{"date":"2022-06-16T19:19:38","version":"4.30"},{"version":"4.31","date":"2022-08-10T14:25:08"},{"date":"2022-08-13T07:13:40","version":"4.32"},{"version":"4.33","date":"2023-02-21T16:34:10"},{"version":"4.34","date":"2023-02-21T18:39:09"},{"version":"4.35","date":"2023-02-22T15:40:53"},{"date":"2023-03-02T15:11:52","version":"4.36"},{"version":"4.37","date":"2023-07-04T10:35:53"},{"version":"4.38","date":"2024-05-28T07:42:37"},{"date":"2024-12-12T21:17:16","version":"4.39"}],"advisories":[{"affected_versions":["<3.0225"],"fixed_versions":[">=3.0225"],"description":"Overflow during processing of ill-formed UTF-8 strings.\n","id":"CPANSA-Cpanel-JSON-XS-2016-02","distribution":"Cpanel-JSON-XS","reported":"2016-11-23","references":["https://metacpan.org/changes/distribution/Cpanel-JSON-XS","https://github.com/rurban/Cpanel-JSON-XS/commit/f71768984ba7f50b0476c17a4f3b3f2ca88a6951","https://github.com/dankogai/p5-encode/issues/64"],"cves":[]},{"cves":[],"reported":null,"references":["https://metacpan.org/changes/distribution/Cpanel-JSON-XS","https://github.com/rurban/Cpanel-JSON-XS/commit/6554531b39fac236321d8601d35eaaa75ae45e20"],"distribution":"Cpanel-JSON-XS","id":"CPANSA-Cpanel-JSON-XS-2016-01","fixed_versions":[">=3.0218"],"description":"Possible overflows in av and hv length types.\n","affected_versions":["<3.0218"]},{"cves":["CVE-2022-48623"],"distribution":"Cpanel-JSON-XS","reported":"2023-02-21","references":["https://metacpan.org/changes/distribution/Cpanel-JSON-XS","https://github.com/rurban/Cpanel-JSON-XS/issues/208","https://metacpan.org/release/RURBAN/Cpanel-JSON-XS-4.33/changes","https://nvd.nist.gov/vuln/detail/CVE-2022-48623","https://github.com/rurban/Cpanel-JSON-XS/commit/41f32396eee9395a40f9ed80145c37622560de9b","https://github.com/advisories/GHSA-44qr-8pf6-6q33"],"id":"CPANSA-Cpanel-JSON-XS-2023-01","fixed_versions":[">=4.033"],"description":"Wrong error messages/sometimes crashes or endless loops with invalid JSON in relaxed mode\n","affected_versions":["<4.033"]}]},"GD":{"main_module":"GD","advisories":[{"severity":"high","cves":["CVE-2019-6977"],"reported":"2019-01-27","references":["https://nvd.nist.gov/vuln/detail/CVE-2019-6977","https://bugs.php.net/bug.php?id=77270","http://php.net/ChangeLog-7.php","http://php.net/ChangeLog-5.php","http://www.securityfocus.com/bid/106731","https://lists.debian.org/debian-lts-announce/2019/01/msg00028.html","https://www.debian.org/security/2019/dsa-4384","https://usn.ubuntu.com/3900-1/","https://security.netapp.com/advisory/ntap-20190315-0003/","https://security.gentoo.org/glsa/201903-18","http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00025.html","http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00031.html","http://packetstormsecurity.com/files/152459/PHP-7.2-imagecolormatch-Out-Of-Band-Heap-Write.html","https://www.exploit-db.com/exploits/46677/","https://access.redhat.com/errata/RHSA-2019:2519","https://access.redhat.com/errata/RHSA-2019:3299","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEYUUOW75YD3DENIPYMO263E6NL2NFHI/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3WRUPZVT2MWFUEMVGTRAGDOBHLNMGK5R/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TTXSLRZI5BCQT3H5KALG3DHUWUMNPDX2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3CZ2QADQTKRHTGB2AHD7J4QQNDLBEMM6/"],"distribution":"GD","id":"CPANSA-GD-2019-6977","description":"gdImageColorMatch in gd_color_match.c in the GD Graphics Library (aka LibGD) 2.2.5, as used in the imagecolormatch function in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1, has a heap-based buffer overflow. This can be exploited by an attacker who is able to trigger imagecolormatch calls with crafted image data.\n","fixed_versions":[">=2.72"],"affected_versions":["<2.72"]}],"versions":[{"date":"1996-05-17T08:12:00","version":"1.00"},{"version":"1.01","date":"1996-07-17T10:16:00"},{"date":"1996-09-07T16:53:00","version":"1.10"},{"date":"1996-09-09T10:37:00","version":"1.11"},{"version":"1.12","date":"1996-09-10T12:04:00"},{"date":"1996-09-11T07:27:00","version":"1.13"},{"date":"1996-09-12T16:11:00","version":"1.14"},{"version":"1.15","date":"1997-11-19T21:13:00"},{"date":"1997-12-19T14:26:00","version":"1.16"},{"date":"1998-01-16T13:34:00","version":"1.17"},{"date":"1998-01-26T08:44:00","version":"1.18"},{"version":"1.18","date":"1998-03-08T16:43:26"},{"version":"1.18","date":"1999-01-31T17:52:34"},{"version":"1.19","date":"1999-04-26T20:35:55"},{"version":"1.19","date":"1999-06-02T13:44:43"},{"version":"1.20","date":"1999-08-31T03:38:46"},{"version":"1.21","date":"1999-08-31T14:55:24"},{"date":"1999-09-30T21:46:47","version":"1.22"},{"version":"1.23","date":"1999-11-11T14:26:14"},{"version":"1.24","date":"2000-02-15T19:54:37"},{"date":"2000-02-22T15:20:41","version":"1.25"},{"version":"1.26","date":"2000-03-18T23:21:50"},{"date":"2000-03-22T19:41:56","version":"1.27"},{"date":"2000-06-23T12:15:51","version":"1.28"},{"date":"2000-06-23T18:26:31","version":"1.29"},{"version":"1.30","date":"2000-07-07T02:42:47"},{"version":"1.32","date":"2000-11-10T16:00:09"},{"date":"2001-04-05T04:42:53","version":"1.33"},{"version":"1.31","date":"2001-09-26T05:19:41"},{"date":"2001-12-06T22:57:11","version":"1.35"},{"date":"2001-12-17T19:13:23","version":"1.36"},{"date":"2001-12-19T21:34:33","version":"1.37"},{"version":"1.38","date":"2002-01-04T15:33:18"},{"date":"2002-06-12T02:09:05","version":"1.39"},{"date":"2002-06-19T12:11:07","version":"1.40"},{"version":"1.41","date":"2002-07-22T07:33:14"},{"version":"2.00","date":"2002-08-09T16:31:00"},{"date":"2002-08-09T16:39:49","version":"2.01"},{"version":"2.02","date":"2002-10-14T13:07:59"},{"date":"2002-11-01T15:46:28","version":"2.04"},{"version":"2.041","date":"2002-11-05T00:55:52"},{"date":"2002-11-25T01:35:10","version":"2.05"},{"version":"2.06","date":"2003-01-08T16:49:15"},{"date":"2003-04-24T05:06:33","version":"2.07"},{"date":"2003-10-06T23:04:15","version":"2.10"},{"version":"2.11","date":"2003-10-07T22:33:21"},{"date":"2004-02-06T14:33:56","version":"2.12"},{"date":"2004-07-22T20:32:01","version":"2.15"},{"date":"2004-07-27T00:47:05","version":"2.16"},{"version":"2.17","date":"2004-11-10T19:15:39"},{"version":"2.18","date":"2004-11-12T15:19:40"},{"date":"2004-11-16T13:36:22","version":"2.19"},{"date":"2005-02-09T18:50:44","version":"2.21"},{"date":"2005-03-07T18:09:39","version":"2.22"},{"version":"2.23","date":"2005-03-09T21:04:40"},{"version":"2.25","date":"2005-07-15T18:47:39"},{"version":"2.26","date":"2005-08-04T13:34:01"},{"date":"2005-08-06T14:52:27","version":"2.27"},{"version":"2.28","date":"2005-08-08T17:28:37"},{"date":"2005-10-19T05:44:52","version":"2.29"},{"date":"2005-10-19T07:51:48","version":"2.30"},{"version":"2.31","date":"2006-02-20T19:48:20"},{"date":"2006-03-08T20:19:06","version":"2.32"},{"date":"2006-06-01T20:02:57","version":"2.34"},{"version":"2.35","date":"2006-08-23T15:31:17"},{"version":"2.39","date":"2008-04-21T14:15:26"},{"version":"2.40","date":"2008-08-07T18:48:46"},{"version":"2.41","date":"2008-08-07T19:17:19"},{"date":"2009-06-10T14:44:33","version":"2.43"},{"date":"2009-07-10T18:12:58","version":"2.44"},{"version":"2.45","date":"2010-04-30T18:52:21"},{"version":"2.46","date":"2011-05-01T17:47:22"},{"date":"2013-02-26T10:54:32","version":"2.48"},{"date":"2013-02-26T11:04:16","version":"2.49"},{"date":"2013-07-02T20:48:59","version":"2.50"},{"version":"2.51","date":"2014-02-04T16:53:54"},{"version":"2.52","date":"2014-02-19T04:29:23"},{"version":"2.53","date":"2014-04-01T14:26:31"},{"date":"2014-10-27T02:29:14","version":"2.55"},{"version":"2.56","date":"2014-10-28T01:35:39"},{"version":"2.56_01","date":"2017-04-19T14:45:56"},{"version":"2.56_02","date":"2017-04-19T14:56:35"},{"version":"2.56_03","date":"2017-04-19T15:19:33"},{"version":"2.57","date":"2017-04-21T06:22:54"},{"version":"2.58","date":"2017-04-21T08:38:24"},{"date":"2017-04-21T10:35:21","version":"2.59"},{"version":"2.60","date":"2017-04-21T22:11:18"},{"version":"2.61","date":"2017-04-22T15:52:15"},{"date":"2017-04-22T22:27:02","version":"2.62"},{"version":"2.63","date":"2017-04-23T08:23:06"},{"version":"2.64","date":"2017-04-23T09:03:18"},{"version":"2.65","date":"2017-04-23T10:36:23"},{"version":"2.66","date":"2017-04-23T13:08:08"},{"version":"2.67","date":"2017-11-15T08:33:16"},{"date":"2018-02-18T19:56:41","version":"2.68"},{"date":"2018-08-26T15:40:02","version":"2.69"},{"date":"2019-01-10T12:57:08","version":"2.70"},{"date":"2019-02-12T11:53:42","version":"2.71"},{"date":"2020-07-18T06:02:50","version":"2.72"},{"version":"2.73","date":"2020-09-24T13:01:57"},{"date":"2022-01-23T15:34:48","version":"2.74"},{"version":"2.75","date":"2022-01-25T16:54:22"},{"date":"2022-02-01T14:50:45","version":"2.76"},{"date":"2023-05-29T07:10:47","version":"2.77"},{"version":"2.78","date":"2023-07-04T09:13:52"},{"date":"2024-04-29T19:57:07","version":"2.79"},{"date":"2024-05-03T11:16:48","version":"2.80"},{"date":"2024-05-03T17:02:57","version":"2.81"},{"date":"2024-05-27T10:31:38","version":"2.82"},{"date":"2024-06-23T15:46:01","version":"2.83"}]},"Net-OpenID-Consumer":{"main_module":"Net::OpenID::Consumer","versions":[{"version":"0.02","date":"2005-05-23T03:02:59"},{"date":"2005-05-23T08:05:35","version":"0.03"},{"version":"0.04","date":"2005-05-25T05:08:25"},{"date":"2005-05-25T06:14:44","version":"0.05"},{"version":"0.06","date":"2005-05-26T06:18:39"},{"version":"0.07","date":"2005-05-26T06:56:30"},{"date":"2005-05-26T07:18:01","version":"0.08"},{"version":"0.09","date":"2005-06-23T23:50:47"},{"date":"2005-06-27T04:43:01","version":"0.10"},{"version":"0.11","date":"2005-06-27T21:59:47"},{"date":"2005-07-13T17:57:27","version":"0.12"},{"date":"2007-04-16T17:58:45","version":"0.13"},{"version":"0.14","date":"2007-08-03T22:07:20"},{"version":"1.01","date":"2008-10-13T02:30:05"},{"date":"2008-10-14T04:39:07","version":"1.02"},{"version":"1.03","date":"2008-11-30T02:02:17"},{"date":"2010-02-18T15:32:06","version":"1.04"},{"date":"2010-02-18T16:01:19","version":"1.05"},{"version":"1.06","date":"2010-03-16T17:38:56"},{"date":"2010-11-06T02:24:29","version":"1.030099_001"},{"version":"1.030099_002","date":"2010-11-07T11:21:33"},{"date":"2010-11-08T22:35:52","version":"1.030099_003"},{"date":"2010-12-17T21:57:03","version":"1.030099_004"},{"date":"2011-01-01T01:55:09","version":"1.030099_005"},{"date":"2011-10-23T01:35:49","version":"1.030099_006"},{"version":"1.100099_001","date":"2011-10-25T23:10:00"},{"version":"1.100099_002","date":"2011-11-02T10:38:05"},{"version":"1.11","date":"2011-11-04T23:01:32"},{"date":"2011-11-07T17:16:08","version":"1.12"},{"date":"2011-11-15T03:28:36","version":"1.13"},{"date":"2013-04-01T13:17:57","version":"1.14"},{"date":"2013-09-06T23:47:04","version":"1.15"},{"version":"1.16","date":"2014-09-15T21:38:12"},{"version":"1.17","date":"2016-01-15T11:45:55"},{"version":"1.18","date":"2016-02-08T01:40:13"}],"advisories":[{"id":"CPANSA-Net-OpenID-Consumer-2010-01","distribution":"Net-OpenID-Consumer","reported":"2010-11-06","references":["https://metacpan.org/changes/distribution/Net-OpenID-Consumer","https://github.com/wrog/Net-OpenID-Consumer/commit/4e82c7e4b6ad4bc40571c5cfcaa58f9365b147a5","http://lists.openid.net/pipermail/openid-security/2010-July/001156.html"],"cves":[],"affected_versions":["<1.12"],"fixed_versions":[">=1.12"],"description":"A potential timing attack when checking signatures.\n"},{"id":"CPANSA-Net-OpenID-Consumer-2015-05","cves":[],"reported":"2015-05-26","references":["https://metacpan.org/changes/distribution/Net-OpenID-Consumer"],"distribution":"Net-OpenID-Consumer","affected_versions":["<0.06"],"fixed_versions":[">=0.06"],"description":"Incorrect comparison of system openssl status when doing DSA checks.\n"}]},"MailTools":{"main_module":"MailTools","versions":[{"date":"1995-10-21T04:25:33","version":"1.03"},{"date":"1995-11-21T11:54:38","version":"1.04"},{"date":"1996-08-13T09:42:17","version":"1.06"},{"version":"1.07","date":"1997-01-02T10:39:44"},{"date":"1997-01-07T13:38:49","version":"1.08"},{"date":"1997-02-24T09:04:31","version":"1.09"},{"version":"1.10","date":"1997-11-13T02:23:35"},{"date":"1997-11-16T16:16:12","version":"1.1001"},{"version":"1.1002","date":"1997-11-18T01:49:48"},{"date":"1997-11-26T02:32:07","version":"1.1003"},{"version":"1.11","date":"1998-01-03T03:56:45"},{"date":"1998-09-26T14:47:35","version":"1.12"},{"version":"1.13","date":"1999-03-31T17:45:02"},{"version":"1.14","date":"2000-03-29T12:35:40"},{"date":"2000-04-14T10:53:46","version":"1.1401"},{"date":"2000-09-04T14:01:06","version":"1.15"},{"version":"1.16","date":"2001-08-08T09:13:27"},{"version":"1.40","date":"2001-08-24T18:19:52"},{"date":"2001-11-14T10:36:58","version":"1.41"},{"date":"2001-12-10T18:28:08","version":"1.42"},{"version":"1.43","date":"2002-02-08T09:41:37"},{"version":"1.44","date":"2002-03-23T09:36:15"},{"date":"2002-05-23T08:17:57","version":"1.45"},{"date":"2002-05-29T13:09:54","version":"1.46"},{"version":"1.47","date":"2002-07-05T10:03:43"},{"version":"1.48","date":"2002-08-07T21:07:03"},{"date":"2002-08-28T06:38:30","version":"1.49"},{"version":"1.50","date":"2002-09-03T22:35:45"},{"date":"2002-10-29T13:24:48","version":"1.51"},{"date":"2002-11-29T12:50:47","version":"1.52"},{"version":"1.53","date":"2002-12-09T16:47:38"},{"version":"1.54","date":"2003-01-06T07:02:35"},{"version":"1.55","date":"2003-01-06T07:07:36"},{"date":"2003-01-06T16:16:54","version":"1.56"},{"version":"1.57","date":"2003-01-14T08:49:45"},{"date":"2003-01-14T13:45:20","version":"1.58"},{"date":"2003-08-13T06:16:07","version":"1.59"},{"version":"1.60","date":"2003-09-24T07:21:11"},{"date":"2004-03-10T09:55:12","version":"1.61"},{"version":"1.62","date":"2004-03-24T12:32:28"},{"version":"1.63","date":"2004-08-16T15:30:07"},{"version":"1.64","date":"2004-08-17T20:26:08"},{"date":"2004-11-24T15:05:58","version":"1.65"},{"version":"1.66","date":"2005-01-20T09:18:51"},{"version":"1.67","date":"2005-03-31T10:07:53"},{"date":"2006-01-05T09:33:09","version":"1.68"},{"version":"1.70","date":"2006-01-05T10:19:56"},{"date":"2006-01-05T10:22:10","version":"1.71"},{"version":"1.72","date":"2006-01-17T08:11:53"},{"version":"1.73","date":"2006-01-21T08:58:00"},{"date":"2006-02-28T07:44:59","version":"1.74"},{"date":"2007-04-10T07:27:15","version":"1.76"},{"date":"2007-05-11T12:17:49","version":"1.77"},{"version":"2.00_01","date":"2007-06-20T12:42:21"},{"date":"2007-07-21T10:31:51","version":"2.00_02"},{"version":"2.00_03","date":"2007-09-25T10:30:00"},{"version":"2.01","date":"2007-11-28T09:50:07"},{"version":"2.02","date":"2007-11-30T09:00:20"},{"date":"2008-04-14T09:14:48","version":"2.03"},{"date":"2008-07-29T09:46:50","version":"2.04"},{"date":"2009-12-18T22:01:23","version":"2.05"},{"version":"2.06","date":"2010-01-26T09:04:49"},{"date":"2010-10-01T10:39:38","version":"2.07"},{"date":"2011-06-01T11:56:43","version":"2.08"},{"date":"2012-02-25T13:51:23","version":"2.09"},{"date":"2012-08-28T08:28:08","version":"2.10"},{"date":"2012-08-29T07:13:34","version":"2.11"},{"version":"2.12","date":"2012-12-21T11:27:10"},{"date":"2014-01-05T18:36:21","version":"2.13"},{"version":"2.14","date":"2014-11-21T16:15:46"},{"date":"2016-04-18T12:11:57","version":"2.15"},{"date":"2016-04-18T16:00:17","version":"2.16"},{"date":"2016-05-11T15:27:31","version":"2.17"},{"version":"2.18","date":"2016-05-18T21:54:30"},{"version":"2.19","date":"2017-08-22T11:37:34"},{"version":"2.20","date":"2018-01-23T12:52:56"},{"date":"2019-05-21T14:28:18","version":"2.21"},{"date":"2024-11-18T10:23:29","version":"2.22"}],"advisories":[{"affected_versions":["<1.51"],"description":"The Mail::Mailer Perl module in the perl-MailTools package 1.47 and earlier uses mailx as the default mailer, which allows remote attackers to execute arbitrary commands by inserting them into the mail body, which is then processed by mailx.\n","fixed_versions":[">=1.51"],"id":"CPANSA-Mail-Mailer-2002-1271","severity":null,"cves":["CVE-2002-1271"],"reported":"2002-11-12","references":["http://www.iss.net/security_center/static/10548.php","http://www.debian.org/security/2003/dsa-386","http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-076.php","http://www.novell.com/linux/security/advisories/2002_041_perl_mailtools.html","http://www.securityfocus.com/bid/6104","http://marc.info/?l=bugtraq&m=103659723101369&w=2","http://marc.info/?l=bugtraq&m=103679569705086&w=2"],"distribution":"MailTools"}]},"RTMP-Client":{"main_module":"RTMP::Client","versions":[{"version":"0.01","date":"2011-07-26T08:17:20"},{"date":"2011-07-27T02:09:05","version":"0.02"},{"date":"2011-07-27T02:17:06","version":"0.03"},{"version":"0.04","date":"2011-12-01T08:59:19"}],"advisories":[{"cves":[],"distribution":"RTMP-Client","references":["https://metacpan.org/changes/distribution/RTMP-Client"],"reported":"2011-12-01","id":"CPANSA-RTMP-Client-2011-01","fixed_versions":[">=0.04"],"description":"TBD\n","affected_versions":["<0.04"]}]},"MDK-Common":{"main_module":"MDK::Common","advisories":[{"affected_versions":["=1.1.11","=1.1.24",">=1.2.9,<=1.2.14"],"description":"perl-MDK-Common 1.1.11 and 1.1.24, 1.2.9 through 1.2.14, and possibly other versions, in Mandriva Linux does not properly handle strings when writing them to configuration files, which allows attackers to gain privileges via \"special characters\" in unspecified vectors.'\n","fixed_versions":[],"id":"CPANSA-MDK-Common-2009-0912","references":["http://www.securityfocus.com/bid/34089","http://www.vupen.com/english/advisories/2009/0688","http://www.mandriva.com/security/advisories?name=MDVSA-2009:072","https://exchange.xforce.ibmcloud.com/vulnerabilities/49220"],"reported":"2009-03-16","distribution":"MDK-Common","severity":null,"cves":["CVE-2009-0912"]}],"versions":[{"date":"2012-09-14T16:23:25","version":"1.2.29"},{"date":"2014-05-06T17:14:10","version":"v1.2.30"},{"version":"v1.2.32","date":"2017-10-27T22:31:26"},{"version":"v1.2.33","date":"2017-10-27T23:18:48"},{"date":"2017-10-28T01:09:39","version":"v1.2.34"},{"version":"v1.2.34.1","date":"2017-10-28T03:37:17"},{"version":"v1.2.34.2","date":"2017-10-28T04:28:13"}]},"Alien-PCRE2":{"main_module":"Alien::PCRE2","versions":[{"version":"0.001000","date":"2017-06-30T23:18:21"},{"date":"2017-07-01T02:48:02","version":"0.002000"},{"date":"2017-07-02T04:51:35","version":"0.003000"},{"version":"0.004000","date":"2017-07-02T06:53:29"},{"date":"2017-07-02T09:21:41","version":"0.005000"},{"date":"2017-07-03T01:03:23","version":"0.006000"},{"date":"2017-07-12T17:40:07","version":"0.007000"},{"date":"2017-07-13T07:43:28","version":"0.008000"},{"date":"2017-07-15T10:31:20","version":"0.009000"},{"version":"0.010000","date":"2017-07-17T04:44:54"},{"date":"2017-07-18T18:30:06","version":"0.011000"},{"date":"2017-07-19T05:07:21","version":"0.012000"},{"version":"0.013000","date":"2017-07-23T04:43:01"},{"version":"0.014000","date":"2017-11-01T02:50:14"},{"version":"0.015000","date":"2017-11-08T00:42:33"},{"version":"0.016000","date":"2022-05-08T20:22:53"},{"date":"2023-02-04T00:21:59","version":"0.017000"}],"advisories":[{"distribution":"Alien-PCRE2","reported":"2020-02-14","references":["https://bugs.php.net/bug.php?id=78338","https://bugs.exim.org/show_bug.cgi?id=2421","https://bugzilla.redhat.com/show_bug.cgi?id=1735494","https://vcs.pcre.org/pcre2?view=revision&revision=1092","https://security.gentoo.org/glsa/202006-16","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQRAHYHLRNMBTPR3KXVM27NSZP3KTOPI/"],"cves":["CVE-2019-20454"],"severity":"high","comment":"This Alien module fetches libpcre2 sources from the network. It tries to get the latest unless you set environment variables to get a different version.\n","id":"CPANSA-Alien-PCRE2-2019-20454","description":"An out-of-bounds read was discovered in PCRE before 10.34 when the pattern \\X is JIT compiled and used to match specially crafted subjects in non-UTF mode. Applications that use PCRE to parse untrusted input may be vulnerable to this flaw, which would allow an attacker to crash the application. The flaw occurs in do_extuni_no_utf in pcre2_jit_compile.c.\n","fixed_versions":[">=0.016000"],"affected_versions":["<0.016000"]}]},"Win32-File-Summary":{"main_module":"Win32::File::Summary","advisories":[{"embedded_vulnerability":{"distributed_version":"0.072","name":"Archive::Tar"},"id":"CPANSA-Win32-File-Summary-2018-01","severity":"medium","cves":["CVE-2018-12015"],"references":["https://security-tracker.debian.org/tracker/CVE-2018-12015","https://github.com/jib/archive-tar-new/commit/ae65651eab053fc6dc4590dbb863a268215c1fc5"],"reported":"2018-06-12","distribution":"Win32-File-Summary","affected_versions":[">0"],"fixed_versions":[],"description":"In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypass a directory-traversal protection mechanism, and overwrite arbitrary files, via an archive file containing a symlink and a regular file with the same name.\n"},{"distribution":"Win32-File-Summary","reported":"2007-11-02","references":["http://rt.cpan.org/Public/Bug/Display.html?id=29517","https://bugzilla.redhat.com/show_bug.cgi?id=295021","http://rt.cpan.org/Public/Bug/Display.html?id=30380","https://issues.rpath.com/browse/RPL-1716","http://www.securityfocus.com/bid/26355","http://secunia.com/advisories/27539","http://osvdb.org/40410","http://www.ubuntu.com/usn/usn-700-1","http://secunia.com/advisories/33314","http://www.ubuntu.com/usn/usn-700-2","http://www.gentoo.org/security/en/glsa/glsa-200812-10.xml","http://secunia.com/advisories/33116","http://www.vupen.com/english/advisories/2007/3755","https://exchange.xforce.ibmcloud.com/vulnerabilities/38285","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11658"],"cves":["CVE-2007-4829"],"severity":null,"id":"CPANSA-Win32-File-Summary-2007-4829","embedded_vulnerability":{"distributed_version":"0.072","name":"Archive::Tar"},"description":"Directory traversal vulnerability in the Archive::Tar Perl module 1.36 and earlier allows user-assisted remote attackers to overwrite arbitrary files via a TAR archive that contains a file whose name is an absolute path or has \"..\" sequences.\n","fixed_versions":[],"affected_versions":[">0"]},{"distribution":"Win32-File-Summary","references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"reported":"2016-08-02","cves":["CVE-2016-1238"],"severity":"high","id":"CPANSA-Win32-File-Summary-2016-1238","embedded_vulnerability":{"name":"Archive::Tar","distributed_version":"0.072"},"fixed_versions":[],"description":"'(1) cpan/Win32-File-Summary/bin/ptar, (2) cpan/Win32-File-Summary/bin/ptardiff, (3) cpan/Win32-File-Summary/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.'\n","affected_versions":[">0"]}],"versions":[{"version":"0.01","date":"2005-04-24T18:36:18"},{"version":"0.01","date":"2005-04-25T15:18:03"},{"date":"2005-04-30T12:09:11","version":"0.01"},{"date":"2005-05-17T09:52:46","version":"0.01"},{"version":"0.01","date":"2005-08-06T18:10:08"},{"version":"0.01","date":"2005-08-24T04:39:30"},{"version":"0.01","date":"2006-06-11T14:15:36"}]},"Capture-Tiny":{"versions":[{"date":"2009-02-14T04:25:26","version":"0.01"},{"version":"0.02","date":"2009-02-17T22:26:18"},{"version":"0.03","date":"2009-02-20T18:09:46"},{"version":"0.04","date":"2009-02-25T14:29:32"},{"date":"2009-03-03T11:58:12","version":"0.05"},{"date":"2009-04-21T11:07:47","version":"0.05_51"},{"version":"0.06","date":"2009-05-07T10:57:33"},{"version":"0.07","date":"2010-01-24T05:21:56"},{"date":"2010-06-20T23:17:16","version":"0.08"},{"date":"2011-01-28T04:53:00","version":"0.09"},{"date":"2011-02-07T12:02:15","version":"0.10"},{"date":"2011-05-20T03:35:28","version":"0.11"},{"date":"2011-12-01T22:00:04","version":"0.12"},{"date":"2011-12-02T18:40:05","version":"0.13"},{"date":"2011-12-22T15:16:31","version":"0.14"},{"version":"0.15","date":"2011-12-23T16:12:30"},{"date":"2012-02-13T02:06:15","version":"0.16"},{"date":"2012-02-22T13:09:42","version":"0.17"},{"version":"0.17_51","date":"2012-03-07T23:25:31"},{"version":"0.17_52","date":"2012-03-09T16:46:53"},{"version":"0.18","date":"2012-05-04T20:33:43"},{"version":"0.19","date":"2012-08-07T00:28:08"},{"date":"2012-09-19T17:22:24","version":"0.20"},{"version":"0.21","date":"2012-11-15T00:13:08"},{"date":"2013-03-27T19:52:10","version":"0.22"},{"version":"0.23","date":"2013-10-20T15:28:15"},{"version":"0.24","date":"2014-02-06T22:18:06"},{"version":"0.25","date":"2014-08-16T14:09:48"},{"version":"0.26","date":"2014-11-04T11:57:19"},{"version":"0.27","date":"2014-11-05T04:12:33"},{"version":"0.28","date":"2015-02-11T11:41:44"},{"date":"2015-04-19T16:44:50","version":"0.29"},{"date":"2015-05-16T00:45:01","version":"0.30"},{"version":"0.31","date":"2016-02-14T14:39:55"},{"date":"2016-02-18T15:14:06","version":"0.32"},{"version":"0.34","date":"2016-02-19T04:29:41"},{"date":"2016-02-29T02:38:12","version":"0.36"},{"date":"2016-05-02T11:09:27","version":"0.37"},{"version":"0.39","date":"2016-05-02T14:24:23"},{"date":"2016-05-23T15:45:16","version":"0.40"},{"version":"0.41","date":"2016-05-23T16:01:05"},{"date":"2016-05-31T16:41:30","version":"0.42"},{"date":"2016-08-05T18:02:43","version":"0.44"},{"date":"2017-02-23T18:32:44","version":"0.45"},{"version":"0.46","date":"2017-02-25T19:26:54"},{"date":"2017-07-26T14:36:03","version":"0.47"},{"version":"0.48","date":"2018-04-22T07:09:08"},{"date":"2024-12-16T13:11:27","version":"0.49"},{"version":"0.50","date":"2024-12-19T13:16:05"}],"advisories":[{"severity":null,"cves":["CVE-2014-1875"],"references":["http://osvdb.org/102963","https://bugzilla.redhat.com/show_bug.cgi?id=1062424","http://www.securityfocus.com/bid/65475","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737835","https://github.com/dagolden/Capture-Tiny/issues/16","http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128882.html","https://github.com/dagolden/Capture-Tiny/commit/635c9eabd52ab8042b0c841823bd6e692de87924","http://cpansearch.perl.org/src/DAGOLDEN/Capture-Tiny-0.24/Changes","http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128823.html","http://seclists.org/oss-sec/2014/q1/272","http://seclists.org/oss-sec/2014/q1/267","http://secunia.com/advisories/56823","https://exchange.xforce.ibmcloud.com/vulnerabilities/91464"],"reported":"2014-10-06","distribution":"Capture-Tiny","id":"CPANSA-Capture-Tiny-2014-1875","description":"The Capture::Tiny module before 0.24 for Perl allows local users to write to arbitrary files via a symlink attack on a temporary file.\n","fixed_versions":[],"affected_versions":["<0.24"]}],"main_module":"Capture::Tiny"},"Module-Load-Conditional":{"main_module":"Module::Load::Conditional","versions":[{"date":"2003-05-10T16:59:45","version":"0.02"},{"version":"0.03","date":"2003-05-31T12:30:25"},{"version":"0.04","date":"2003-10-05T15:11:11"},{"date":"2004-05-22T14:34:33","version":"0.05"},{"date":"2004-12-03T15:53:27","version":"0.06"},{"version":"0.07","date":"2005-01-13T18:59:45"},{"version":"0.08","date":"2005-01-14T17:32:34"},{"date":"2006-08-01T20:05:30","version":"0.10"},{"version":"0.12","date":"2006-08-13T13:08:40"},{"date":"2007-01-03T17:38:46","version":"0.14"},{"date":"2007-01-25T21:40:29","version":"0.16"},{"date":"2007-09-15T14:20:27","version":"0.18"},{"version":"0.20","date":"2007-10-03T15:27:25"},{"date":"2007-10-15T08:19:21","version":"0.22"},{"version":"0.24","date":"2008-01-02T15:57:46"},{"version":"0.26","date":"2008-02-29T16:01:59"},{"date":"2008-12-17T12:56:57","version":"0.28"},{"date":"2009-01-19T15:56:22","version":"0.30"},{"version":"0.31_01","date":"2009-10-23T09:16:58"},{"date":"2009-10-23T20:58:24","version":"0.32"},{"version":"0.34","date":"2009-10-29T09:27:23"},{"version":"0.36","date":"2010-02-09T14:20:49"},{"date":"2010-04-23T15:03:33","version":"0.38"},{"version":"0.40","date":"2011-01-07T22:28:54"},{"version":"0.42","date":"2011-02-09T15:29:28"},{"date":"2011-02-09T21:54:40","version":"0.44"},{"date":"2011-09-07T23:02:16","version":"0.46"},{"version":"0.48","date":"2012-03-15T13:58:36"},{"version":"0.50","date":"2012-04-27T21:29:11"},{"version":"0.52","date":"2012-07-29T09:13:49"},{"version":"0.54","date":"2012-08-12T08:13:47"},{"version":"0.56","date":"2013-08-29T20:32:38"},{"version":"0.58","date":"2013-09-01T10:25:33"},{"version":"0.60","date":"2014-01-16T12:31:47"},{"version":"0.62","date":"2014-01-24T15:55:28"},{"version":"0.64","date":"2015-01-17T13:36:11"},{"date":"2016-07-27T07:37:34","version":"0.66"},{"date":"2016-07-29T07:05:40","version":"0.68"},{"version":"0.70","date":"2019-11-10T14:37:30"},{"date":"2020-06-25T07:23:00","version":"0.72"},{"version":"0.74","date":"2020-08-21T08:09:10"}],"advisories":[{"id":"CPANSA-Module-Load-Conditional-2016-1238","severity":"high","cves":["CVE-2016-1238"],"references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"reported":"2016-08-02","distribution":"Module-Load-Conditional","affected_versions":["<0.66"],"fixed_versions":[">=0.66"],"description":"(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.\n"}]},"DBI":{"main_module":"DBI","versions":[{"date":"1995-10-27T08:14:00","version":"0.64"},{"date":"1996-02-15T22:07:00","version":"0.67"},{"version":"0.68","date":"1996-04-22T10:22:00"},{"version":"0.69","date":"1996-05-07T19:46:00"},{"date":"1996-06-16T21:08:00","version":"0.70"},{"date":"1996-07-10T00:49:00","version":"0.71"},{"version":"0.72","date":"1996-09-23T16:33:00"},{"version":"0.73","date":"1996-10-15T00:58:00"},{"date":"1997-01-14T16:59:00","version":"0.74"},{"date":"1997-01-27T21:59:00","version":"0.75"},{"date":"1997-02-03T18:54:00","version":"0.76"},{"version":"0.77","date":"1997-02-21T14:27:00"},{"version":"0.78","date":"1997-03-28T14:36:00"},{"date":"1997-04-07T18:28:00","version":"0.79"},{"version":"0.80","date":"1997-05-07T11:45:00"},{"date":"1997-05-07T14:05:00","version":"0.81"},{"version":"0.82","date":"1997-05-23T15:56:00"},{"version":"0.83","date":"1997-06-11T21:40:00"},{"version":"0.84","date":"1997-06-20T15:36:00"},{"date":"1997-06-25T10:25:00","version":"0.85"},{"version":"0.001","date":"1997-07-16T16:38:00"},{"date":"1997-07-18T11:27:00","version":"0.87"},{"version":"0.88","date":"1997-07-22T21:27:00"},{"date":"1997-07-25T13:46:55","version":"0.89"},{"version":"0.90","date":"1997-09-05T19:38:52"},{"date":"1997-12-10T17:15:14","version":"0.91"},{"date":"1998-02-05T20:45:45","version":"0.92"},{"version":"0.93","date":"1998-02-13T15:21:52"},{"date":"1998-08-10T03:23:46","version":"0.94"},{"version":"0.95","date":"1998-08-11T13:21:19"},{"version":"1.00","date":"1998-08-14T20:38:42"},{"version":"1.01","date":"1998-09-02T14:59:47"},{"version":"1.02","date":"1998-09-04T12:29:52"},{"version":"1.06","date":"1999-01-18T21:52:15"},{"version":"1.08","date":"1999-05-13T01:49:11"},{"date":"1999-06-02T13:44:40","version":"1.08"},{"version":"1.09","date":"1999-06-09T20:57:59"},{"date":"1999-06-13T23:52:03","version":"1.10"},{"date":"1999-06-17T13:22:36","version":"1.11"},{"date":"1999-06-29T23:07:41","version":"1.12"},{"version":"1.13","date":"1999-07-12T03:28:41"},{"version":"1.03_80","date":"2000-06-11T02:39:59"},{"date":"2000-06-14T20:30:57","version":"1.14"},{"date":"2001-03-30T15:03:31","version":"1.15"},{"date":"2001-05-29T23:25:57","version":"1.16"},{"version":"1.17","date":"2001-06-04T17:12:30"},{"date":"2001-06-04T19:00:37","version":"1.18"},{"version":"1.19","date":"2001-07-20T22:29:24"},{"date":"2001-08-24T23:32:10","version":"1.20"},{"date":"2002-01-10T15:25:45","version":"1.201"},{"version":"1.21","date":"2002-02-07T03:30:16"},{"version":"1.21","date":"2002-03-13T14:18:00"},{"date":"2002-05-22T13:42:15","version":"1.22"},{"version":"1.23","date":"2002-05-25T17:38:03"},{"date":"2002-06-05T03:32:38","version":"1.24"},{"date":"2002-06-05T22:42:04","version":"1.25"},{"date":"2002-06-13T12:30:47","version":"1.26"},{"version":"1.27","date":"2002-06-13T15:19:06"},{"date":"2002-06-14T13:13:53","version":"1.28"},{"date":"2002-06-26T09:34:24","version":"1.28"},{"date":"2002-07-15T11:24:40","version":"1.29"},{"date":"2002-07-18T14:27:25","version":"1.30"},{"date":"2002-11-30T00:49:54","version":"1.31"},{"version":"1.32","date":"2002-12-01T23:01:26"},{"version":"1.32","date":"2002-12-20T16:23:29"},{"date":"2003-02-26T18:01:24","version":"1.32_90"},{"version":"1.33","date":"2003-02-27T00:25:32"},{"version":"1.34","date":"2003-02-28T17:53:35"},{"version":"1.35","date":"2003-03-07T22:02:20"},{"version":"1.36","date":"2003-05-14T11:13:39"},{"date":"2003-05-15T18:02:26","version":"1.37"},{"version":"1.38","date":"2003-08-25T20:36:26"},{"version":"1.39","date":"2003-11-27T23:46:40"},{"version":"1.39","date":"2004-01-08T14:04:59"},{"version":"1.41","date":"2004-02-23T14:54:21"},{"version":"1.41","date":"2004-03-12T16:40:08"},{"date":"2004-07-05T10:02:05","version":"1.43"},{"date":"2004-10-05T21:27:23","version":"1.44"},{"version":"1.45","date":"2004-10-06T13:49:20"},{"version":"1.46","date":"2004-11-16T12:38:32"},{"date":"2005-02-02T11:28:46","version":"1.47"},{"version":"1.48","date":"2005-03-14T17:03:33"},{"version":"1.49","date":"2005-11-29T19:59:40"},{"version":"1.50","date":"2005-12-14T16:55:16"},{"date":"2006-04-19T15:56:38","version":"1.45"},{"version":"1.51","date":"2006-06-06T12:08:36"},{"date":"2006-08-08T21:13:32","version":"1.52"},{"version":"1.53","date":"2006-11-02T00:38:01"},{"version":"1.54","date":"2007-02-23T17:15:23"},{"date":"2007-05-04T14:56:38","version":"1.55"},{"version":"1.56","date":"2007-05-10T14:04:04"},{"date":"2007-05-13T22:00:58","version":"1.56"},{"version":"1.57","date":"2007-06-13T16:45:34"},{"date":"2007-06-15T17:06:42","version":"1.57"},{"date":"2007-06-18T15:15:31","version":"1.57"},{"date":"2007-06-25T22:11:47","version":"1.58"},{"date":"2007-08-22T17:02:10","version":"1.59"},{"version":"1.59","date":"2007-08-23T12:22:26"},{"date":"2007-08-23T13:59:53","version":"1.59"},{"date":"2007-08-24T09:19:29","version":"1.59"},{"date":"2007-10-16T13:12:55","version":"1.601"},{"version":"1.601","date":"2007-10-21T22:12:52"},{"date":"2008-02-09T22:06:13","version":"1.602"},{"date":"2008-03-22T00:11:03","version":"1.603"},{"version":"1.604","date":"2008-03-24T14:11:41"},{"version":"1.605","date":"2008-06-16T19:19:43"},{"version":"1.606","date":"2008-07-22T21:01:09"},{"date":"2008-07-22T21:50:54","version":"1.607"},{"date":"2009-05-02T22:58:48","version":"1.608"},{"date":"2009-05-05T12:05:19","version":"1.608"},{"date":"2009-06-05T22:57:34","version":"1.609"},{"version":"1.609","date":"2009-06-08T10:29:18"},{"date":"2010-03-02T21:26:39","version":"1.611"},{"version":"1.611","date":"2010-04-22T11:06:31"},{"date":"2010-04-27T15:13:32","version":"1.611"},{"version":"1.611","date":"2010-04-29T19:54:44"},{"date":"2010-05-28T10:29:17","version":"1.612"},{"date":"2010-06-15T22:47:23","version":"1.612"},{"date":"2010-06-16T19:18:05","version":"1.612"},{"version":"1.612","date":"2010-07-02T14:26:03"},{"date":"2010-07-15T15:00:53","version":"1.612"},{"date":"2010-07-16T19:36:42","version":"1.612"},{"date":"2010-07-22T17:34:16","version":"1.613"},{"date":"2010-07-25T15:50:15","version":"1.613"},{"date":"2010-07-30T14:17:33","version":"1.614"},{"date":"2010-08-16T16:34:58","version":"1.614"},{"version":"1.614","date":"2010-08-30T20:11:00"},{"date":"2010-08-30T20:26:37","version":"1.614"},{"version":"1.614","date":"2010-08-30T20:56:09"},{"date":"2010-09-02T15:44:21","version":"1.614"},{"version":"1.614","date":"2010-09-09T10:24:11"},{"date":"2010-09-16T16:23:50","version":"1.614"},{"version":"1.614","date":"2010-09-17T09:48:02"},{"version":"1.615","date":"2010-09-21T10:14:29"},{"date":"2010-09-22T12:28:20","version":"1.615"},{"date":"2010-12-18T21:51:52","version":"1.616"},{"date":"2010-12-21T23:26:46","version":"1.616"},{"version":"1.616","date":"2010-12-29T14:39:48"},{"version":"1.616","date":"2010-12-30T10:26:51"},{"date":"2012-01-02T17:12:53","version":"1.617"},{"version":"1.617","date":"2012-01-28T09:34:18"},{"date":"2012-01-30T10:06:49","version":"1.617"},{"date":"2012-02-07T22:54:02","version":"1.618"},{"date":"2012-02-13T18:24:33","version":"1.618"},{"date":"2012-02-23T11:05:45","version":"1.618"},{"date":"2012-02-25T14:24:39","version":"1.618"},{"date":"2012-04-18T11:57:55","version":"1.619"},{"date":"2012-04-20T20:21:54","version":"1.619"},{"version":"1.619","date":"2012-04-23T22:09:14"},{"version":"1.620","date":"2012-04-25T12:46:54"},{"version":"1.621","date":"2012-05-21T13:06:09"},{"date":"2012-05-22T22:17:06","version":"1.621"},{"date":"2012-06-06T16:51:00","version":"1.622"},{"date":"2012-07-13T15:24:35","version":"1.623"},{"version":"1.623","date":"2012-10-30T13:01:14"},{"date":"2012-11-19T23:27:04","version":"1.623"},{"date":"2012-12-13T16:26:23","version":"1.623"},{"date":"2012-12-21T17:22:01","version":"1.623"},{"date":"2013-01-02T10:09:42","version":"1.623"},{"date":"2013-03-22T20:41:50","version":"1.624"},{"version":"1.625","date":"2013-03-28T21:59:38"},{"date":"2013-05-15T11:28:03","version":"1.626"},{"version":"1.627","date":"2013-05-16T20:30:50"},{"date":"2013-06-24T21:56:27","version":"1.628"},{"date":"2013-06-24T22:12:23","version":"1.628"},{"version":"1.628","date":"2013-06-30T19:08:08"},{"date":"2013-07-02T11:27:23","version":"1.628"},{"date":"2013-07-22T13:22:40","version":"1.628"},{"date":"2013-10-11T12:28:12","version":"1.629"},{"date":"2013-10-13T16:02:52","version":"1.629"},{"date":"2013-10-15T12:24:53","version":"1.629"},{"date":"2013-10-22T11:58:53","version":"1.629_50"},{"date":"2013-10-28T12:51:39","version":"1.630"},{"version":"1.631","date":"2014-01-13T13:51:01"},{"version":"1.631","date":"2014-01-16T11:34:34"},{"version":"1.631","date":"2014-01-20T11:12:44"},{"version":"1.631","date":"2014-10-23T14:08:22"},{"version":"1.632","date":"2014-11-05T11:15:07"},{"version":"1.632","date":"2015-01-08T14:31:52"},{"version":"1.633","date":"2015-01-11T13:26:05"},{"version":"1.633","date":"2015-07-18T13:16:07"},{"version":"1.633_91","date":"2015-07-19T14:34:22"},{"date":"2015-07-22T15:27:59","version":"1.633_92"},{"date":"2015-08-02T16:52:48","version":"1.633_93"},{"version":"1.634","date":"2015-08-03T14:52:56"},{"date":"2016-04-23T15:28:02","version":"1.634"},{"version":"1.635","date":"2016-04-24T11:57:03"},{"date":"2016-04-24T22:20:56","version":"1.636"},{"version":"1.637","date":"2017-08-14T10:10:55"},{"version":"1.637","date":"2017-08-16T09:02:40"},{"version":"1.639","date":"2017-12-28T14:40:44"},{"version":"1.640","date":"2018-01-28T20:50:53"},{"version":"1.641","date":"2018-03-19T18:06:08"},{"version":"1.641_90","date":"2018-10-28T15:08:54"},{"date":"2018-10-29T10:43:41","version":"1.642"},{"version":"1.642_90","date":"2020-01-26T20:48:52"},{"date":"2020-01-31T19:02:41","version":"1.643"},{"date":"2024-08-20T11:29:56","version":"1.643_01"},{"date":"2024-08-22T07:09:52","version":"1.643_02"},{"version":"1.644","date":"2024-08-23T17:54:09"},{"date":"2024-09-03T09:25:33","version":"1.645"},{"version":"1.646","date":"2025-01-11T12:59:58"},{"version":"1.647","date":"2025-01-20T08:14:47"}],"advisories":[{"cves":["CVE-2020-14393"],"severity":"high","distribution":"DBI","references":["https://metacpan.org/changes/distribution/DBI","https://bugzilla.redhat.com/show_bug.cgi?id=1877409"],"reported":"2020-09-16","id":"CPANSA-DBI-2020-01","fixed_versions":[">=1.643"],"description":"A buffer overflow was found in perl-DBI < 1.643 in DBI.xs. A local attacker who is able to supply a string longer than 300 characters could cause an out-of-bounds write, affecting the availability of the service or integrity of data.\n","affected_versions":["<1.643"]},{"fixed_versions":[">=1.643"],"description":"An untrusted pointer dereference flaw was found in Perl-DBI < 1.643. A local attacker who is able to manipulate calls to dbd_db_login6_sv() could cause memory corruption, affecting the service's availability.\n","affected_versions":["<1.643"],"cves":["CVE-2020-14392"],"severity":"high","distribution":"DBI","references":["https://metacpan.org/changes/distribution/DBI","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXLKODJ7B57GITDEZZXNSHPK4VBYXYHR/","https://bugzilla.redhat.com/show_bug.cgi?id=1877402","https://bugzilla.redhat.com/show_bug.cgi?id=1877402","https://lists.debian.org/debian-lts-announce/2020/09/msg00026.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00067.html","http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00074.html","https://usn.ubuntu.com/4503-1/"],"reported":"2020-06-17","id":"CPANSA-DBI-2020-03"},{"description":"An issue was discovered in the DBI module before 1.643 for Perl. The hv_fetch() documentation requires checking for NULL and the code does that. But, shortly thereafter, it calls SvOK(profile), causing a NULL pointer dereference.\n","fixed_versions":[">=1.643"],"affected_versions":["<1.643"],"cves":["CVE-2019-20919"],"severity":"high","distribution":"DBI","reported":"2020-09-17","references":["https://metacpan.org/changes/distribution/DBI","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JXLKODJ7B57GITDEZZXNSHPK4VBYXYHR/","https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20919","https://github.com/perl5-dbi/dbi/commit/eca7d7c8f43d96f6277e86d1000e842eb4cc67ff","https://bugzilla.redhat.com/show_bug.cgi?id=1877405","https://lists.debian.org/debian-lts-announce/2020/09/msg00026.html","https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/US6VXPKVAYHOKNFSAFLM3FWNYZSJKQHS/","https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KJN7E27GD6QQ2CRGEJ3TNW2DJFXA2AKN/","https://ubuntu.com/security/notices/USN-4534-1"],"id":"CPANSA-DBI-2020-02"},{"id":"CPANSA-DBI-2014-01","distribution":"DBI","references":["https://metacpan.org/changes/distribution/DBI","https://rt.cpan.org/Public/Bug/Display.html?id=99508"],"reported":"2014-10-15","cves":[],"severity":"high","affected_versions":["<1.632"],"fixed_versions":[">=1.632"],"description":"DBD::File drivers open files from folders other than specifically passed using the f_dir attribute.\n"},{"distribution":"DBI","references":["https://metacpan.org/changes/distribution/DBI"],"reported":"2005-05-02","cves":["CVE-2005-0077"],"id":"CPANSA-DBI-2005-01","description":"Allows local users to overwrite arbitrary files via a symlink attack on a temporary PID file.\n","fixed_versions":[">=1.47"],"affected_versions":["<1.47"]},{"affected_versions":["<1.643"],"fixed_versions":[">=1.644"],"description":"An issue was discovered in the DBI module through 1.643 for Perl. DBD::File drivers can open files from folders other than those specifically passed via the f_dir attribute in the data source name (DSN). NOTE: this issue exists because of an incomplete fix for CVE-2014-10401.\n","id":"CPANSA-DBI-2014-10402","reported":"2020-09-16","references":["https://rt.cpan.org/Public/Bug/Display.html?id=99508#txn-1911590","https://metacpan.org/release/HMBRAND/DBI-1.643_01/view/Changes"],"distribution":"DBI","severity":"medium","cves":["CVE-2014-10402"]},{"description":"An issue was discovered in the DBI module before 1.632 for Perl. DBD::File drivers can open files from folders other than those specifically passed via the f_dir attribute.\n","fixed_versions":[">=1.644"],"affected_versions":["<1.632"],"distribution":"DBI","references":["https://rt.cpan.org/Public/Bug/Display.html?id=99508","https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.632-9th-Nov-2014","https://github.com/perl5-dbi/dbi/commit/caedc0d7d602f5b2ae5efc1b00f39efeafb7b05a","https://usn.ubuntu.com/4509-1/","https://metacpan.org/release/HMBRAND/DBI-1.643_01/view/Changes"],"reported":"2020-09-11","cves":["CVE-2014-10401"],"severity":"medium","id":"CPANSA-DBI-2014-10401"},{"id":"CPANSA-DBI-2013-7491","cves":["CVE-2013-7491"],"severity":"medium","distribution":"DBI","reported":"2020-09-11","references":["https://github.com/perl5-dbi/dbi/commit/401f1221311c71f760e21c98772f0f7e3cbead1d","https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.628-22nd-July-2013","https://rt.cpan.org/Public/Bug/Display.html?id=85562"],"affected_versions":["<1.628"],"fixed_versions":[],"description":"An issue was discovered in the DBI module before 1.628 for Perl. Stack corruption occurs when a user-defined function requires a non-trivial amount of memory and the Perl stack gets reallocated.\n"},{"affected_versions":["<1.632"],"fixed_versions":[],"description":"An issue was discovered in the DBI module before 1.632 for Perl. Using many arguments to methods for Callbacks may lead to memory corruption.\n","id":"CPANSA-DBI-2013-7490","cves":["CVE-2013-7490"],"severity":"medium","distribution":"DBI","reported":"2020-09-11","references":["https://github.com/perl5-dbi/dbi/commit/a8b98e988d6ea2946f5f56691d6d5ead53f65766","https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.632-9th-Nov-2014","https://rt.cpan.org/Public/Bug/Display.html?id=86744#txn-1880941","https://usn.ubuntu.com/4509-1/"]}]},"Net-SSLeay":{"main_module":"Net::SSLeay","versions":[{"date":"2007-07-03T14:02:04","version":"1.31_01"},{"version":"1.31_02","date":"2007-07-14T20:12:31"},{"date":"2007-09-03T21:16:05","version":"1.32"},{"version":"1.33_01","date":"2008-02-14T13:43:47"},{"version":"1.34","date":"2008-07-24T01:16:26"},{"date":"2008-07-24T22:14:14","version":"1.35"},{"version":"1.36","date":"2010-01-30T21:16:14"},{"date":"2011-09-15T22:28:53","version":"1.37"},{"version":"1.38","date":"2011-09-16T11:48:42"},{"version":"1.39","date":"2011-09-21T06:57:15"},{"date":"2011-09-23T02:41:56","version":"1.40"},{"version":"1.41","date":"2011-09-24T22:11:30"},{"date":"2011-10-03T06:27:18","version":"1.42"},{"date":"2012-02-23T22:42:58","version":"1.42"},{"version":"1.42","date":"2012-02-24T21:44:59"},{"date":"2012-02-24T22:54:26","version":"1.42"},{"date":"2012-04-02T21:16:31","version":"1.46"},{"date":"2012-04-04T00:54:15","version":"1.47"},{"date":"2012-04-25T07:03:14","version":"1.48"},{"version":"1.49","date":"2012-09-24T22:12:48"},{"version":"1.49","date":"2012-12-12T21:00:17"},{"version":"1.49","date":"2012-12-14T05:38:34"},{"version":"1.51","date":"2013-01-08T23:13:16"},{"date":"2013-03-22T07:31:43","version":"1.51"},{"date":"2013-03-22T22:14:08","version":"1.53"},{"version":"1.53","date":"2013-06-07T22:33:01"},{"version":"1.56","date":"2014-01-07T22:12:16"},{"version":"1.56","date":"2014-01-11T21:39:27"},{"date":"2014-01-14T23:29:28","version":"1.58"},{"version":"1.59","date":"2014-05-09T22:10:47"},{"date":"2014-05-10T21:41:25","version":"1.60"},{"version":"1.61","date":"2014-05-12T10:07:16"},{"version":"1.61","date":"2014-05-18T21:22:05"},{"date":"2014-05-19T10:44:07","version":"1.63"},{"date":"2014-06-11T02:56:20","version":"1.64"},{"date":"2014-07-14T10:26:12","version":"1.65"},{"date":"2014-08-21T01:09:39","version":"1.66"},{"date":"2015-01-16T22:22:07","version":"1.67"},{"version":"1.68","date":"2015-01-24T00:27:20"},{"version":"1.68","date":"2015-06-03T21:47:53"},{"date":"2015-06-25T23:10:05","version":"1.70"},{"version":"1.71","date":"2015-09-18T03:19:23"},{"version":"1.72","date":"2015-09-21T21:54:16"},{"date":"2016-04-11T00:17:37","version":"1.73"},{"date":"2016-04-11T21:48:54","version":"1.74"},{"date":"2016-07-31T01:22:50","version":"1.75"},{"date":"2016-07-31T02:53:16","version":"1.76"},{"version":"1.77","date":"2016-07-31T20:27:29"},{"version":"1.78","date":"2016-08-13T08:42:51"},{"date":"2017-01-03T07:57:10","version":"1.79"},{"version":"1.80","date":"2017-01-04T21:41:24"},{"date":"2017-03-27T21:02:27","version":"1.81"},{"date":"2017-10-31T04:50:54","version":"1.82"},{"date":"2018-01-16T04:44:04","version":"1.83"},{"version":"1.84","date":"2018-01-17T03:12:01"},{"version":"1.85","date":"2018-03-13T22:28:12"},{"date":"2018-07-04T20:41:16","version":"1.86_01"},{"version":"1.86_02","date":"2018-07-06T12:18:38"},{"date":"2018-07-19T19:42:35","version":"1.86_03"},{"date":"2018-07-30T17:01:10","version":"1.86_04"},{"version":"1.86_05","date":"2018-08-23T08:31:09"},{"version":"1.86_06","date":"2018-09-29T15:52:57"},{"version":"1.86_07","date":"2018-12-13T09:56:46"},{"date":"2019-03-12T14:20:11","version":"1.86_08"},{"version":"1.86_09","date":"2019-03-12T21:00:55"},{"version":"1.86_10","date":"2019-05-05T01:38:23"},{"version":"1.86_11","date":"2019-05-08T16:24:16"},{"date":"2019-05-10T20:36:42","version":"1.88"},{"version":"1.89_01","date":"2020-03-22T13:48:11"},{"date":"2020-08-06T23:48:51","version":"1.89_02"},{"version":"1.89_03","date":"2020-12-12T16:47:00"},{"version":"1.89_04","date":"2021-01-13T19:01:50"},{"version":"1.89_05","date":"2021-01-21T00:51:03"},{"version":"1.90","date":"2021-01-21T19:08:38"},{"date":"2021-10-24T18:14:27","version":"1.91_01"},{"date":"2021-12-29T22:30:53","version":"1.91_02"},{"version":"1.91_03","date":"2022-01-10T19:21:16"},{"date":"2022-01-12T22:47:57","version":"1.92"},{"version":"1.93_01","date":"2022-03-20T18:24:35"},{"version":"1.93_02","date":"2023-02-23T01:08:20"},{"version":"1.93_03","date":"2024-01-02T14:34:40"},{"date":"2024-01-05T00:45:35","version":"1.93_04"},{"version":"1.93_05","date":"2024-01-06T18:39:23"},{"date":"2024-01-08T01:22:27","version":"1.94"}],"advisories":[{"id":"CPANSA-Net-SSLeay-2005-0106","references":["http://secunia.com/advisories/18639","http://www.securityfocus.com/bid/13471","http://www.mandriva.com/security/advisories?name=MDKSA-2006:023","https://usn.ubuntu.com/113-1/"],"reported":"2005-05-03","distribution":"Net-SSLeay","severity":null,"cves":["CVE-2005-0106"],"affected_versions":["<1.25"],"fixed_versions":[">=1.25"],"description":"SSLeay.pm in libnet-ssleay-perl before 1.25 uses the /tmp/entropy file for entropy if a source is not set in the EGD_PATH variable, which allows local users to reduce the cryptographic strength of certain operations by modifying the file.\n"}]},"Proc-Daemon":{"main_module":"Proc::Daemon","versions":[{"date":"1998-01-27T18:42:37","version":"0.01"},{"version":"0.02","date":"1999-04-17T19:55:07"},{"date":"2003-06-19T22:58:30","version":"0.03"},{"date":"2010-10-23T23:11:32","version":"0.04"},{"date":"2010-10-28T20:25:50","version":"0.05"},{"date":"2011-01-17T22:14:07","version":"0.06"},{"version":"0.07","date":"2011-02-17T19:34:32"},{"version":"0.08","date":"2011-03-13T17:38:15"},{"date":"2011-03-15T07:05:00","version":"0.09"},{"version":"0.10","date":"2011-04-01T19:26:32"},{"version":"0.11","date":"2011-05-23T14:48:37"},{"date":"2011-05-24T17:12:19","version":"0.12"},{"date":"2011-06-01T11:39:51","version":"0.13"},{"version":"0.14","date":"2011-06-03T09:06:45"},{"version":"0.15","date":"2015-01-22T00:22:38"},{"version":"0.16","date":"2015-01-23T00:10:30"},{"version":"0.17","date":"2015-01-23T23:23:49"},{"version":"0.18","date":"2015-01-27T01:03:25"},{"version":"0.19","date":"2015-03-22T09:37:55"},{"date":"2015-06-24T04:34:03","version":"0.20"},{"version":"0.21","date":"2015-08-07T01:52:52"},{"version":"0.22","date":"2015-10-29T00:30:34"},{"version":"0.23","date":"2016-01-01T18:51:05"}],"advisories":[{"cves":["CVE-2013-7135"],"severity":null,"distribution":"Proc-Daemon","reported":"2014-01-28","references":["http://www.openwall.com/lists/oss-security/2014/01/07/7","http://www.openwall.com/lists/oss-security/2013/12/16/5","http://www.openwall.com/lists/oss-security/2013/12/18/2","https://rt.cpan.org/Public/Bug/Display.html?id=91450","http://www.mandriva.com/security/advisories?name=MDVSA-2014:021"],"id":"CPANSA-Proc-Daemon-2013-7135","fixed_versions":[],"description":"The Proc::Daemon module 0.14 for Perl uses world-writable permissions for a file that stores a process ID, which allows local users to have an unspecified impact by modifying this file.\n","affected_versions":["<0.14"]}]},"IPC-Run":{"main_module":"IPC::Run","advisories":[{"description":"INADDR_ANY can be your external ip, IPC::Run should only listen on localhost.\n","fixed_versions":[">=0.90"],"affected_versions":["<0.90","=0.90_01","=0.90_02"],"cves":[],"reported":"2009-09-14","references":["https://metacpan.org/dist/IPC-Run/changes","https://rt.cpan.org/Public/Bug/Display.html?id=49693"],"distribution":"IPC-Run","id":"CPANSA-IPC-Run-2009-01"}],"versions":[{"date":"2000-05-22T05:10:41","version":"0.1"},{"version":"0.2","date":"2000-06-01T06:12:25"},{"version":"0.21","date":"2000-06-02T16:53:04"},{"date":"2000-06-03T12:34:23","version":"0.3"},{"date":"2000-06-06T18:48:56","version":"0.32"},{"date":"2000-06-08T10:24:28","version":"0.33"},{"version":"0.34","date":"2000-06-08T10:41:19"},{"version":"0.4","date":"2000-06-15T19:06:43"},{"date":"2000-08-17T14:33:30","version":"0.42"},{"date":"2000-10-02T21:20:49","version":"0.44"},{"version":"0.5","date":"2001-11-11T04:21:36"},{"date":"2001-11-12T07:19:27","version":"0.51"},{"date":"2001-12-01T06:05:11","version":"0.54"},{"version":"0.55","date":"2001-12-01T21:54:11"},{"version":"0.56","date":"2001-12-02T13:48:12"},{"version":"0.6","date":"2001-12-06T20:33:30"},{"date":"2001-12-07T09:31:12","version":"0.61"},{"date":"2002-01-01T20:42:40","version":"0.62"},{"version":"0.63","date":"2002-02-27T17:14:16"},{"version":"0.64","date":"2002-03-14T17:14:53"},{"date":"2002-03-27T11:42:32","version":"0.66"},{"version":"0.7","date":"2002-04-26T15:04:45"},{"date":"2002-05-06T13:23:28","version":"0.71"},{"version":"0.72","date":"2002-05-09T15:58:13"},{"date":"2002-05-22T13:20:13","version":"0.73"},{"version":"0.74","date":"2002-05-23T13:48:23"},{"version":"0.75","date":"2003-01-28T17:59:36"},{"version":"0.77","date":"2003-09-26T19:35:48"},{"date":"2004-03-09T06:22:24","version":"0.78"},{"version":"0.79","date":"2005-01-19T23:50:56"},{"version":"0.80_91","date":"2006-03-10T15:30:59"},{"version":"0.80","date":"2006-05-10T20:00:28"},{"version":"0.81_01","date":"2008-10-15T09:59:57"},{"version":"0.82","date":"2008-12-18T12:01:25"},{"version":"0.83","date":"2009-07-09T16:38:18"},{"date":"2009-07-13T00:59:41","version":"0.84"},{"version":"0.85","date":"2010-03-23T05:12:54"},{"date":"2010-03-24T20:11:05","version":"0.86"},{"version":"0.87","date":"2010-03-29T18:03:50"},{"date":"2010-03-30T18:14:22","version":"0.88"},{"date":"2010-04-01T04:48:26","version":"0.89"},{"version":"0.90_01","date":"2011-06-03T04:41:40"},{"date":"2011-06-29T04:15:08","version":"0.90_02"},{"date":"2011-07-01T04:18:30","version":"0.90_03"},{"version":"0.90","date":"2011-07-03T20:10:42"},{"date":"2012-01-25T05:16:00","version":"0.91_01"},{"version":"0.91","date":"2012-02-15T04:50:23"},{"version":"0.92_01","date":"2012-08-22T15:00:56"},{"version":"0.92","date":"2012-08-30T15:26:42"},{"version":"0.93","date":"2014-12-11T05:59:50"},{"version":"0.93_01","date":"2014-12-11T07:48:28"},{"version":"0.94","date":"2014-12-14T07:23:31"},{"date":"2016-04-13T03:11:26","version":"0.94_01"},{"version":"0.94_02","date":"2016-04-14T05:15:22"},{"version":"0.95","date":"2017-04-25T01:29:03"},{"date":"2017-05-12T13:48:34","version":"0.96"},{"version":"0.97","date":"2018-03-26T21:45:38"},{"date":"2018-03-29T18:52:43","version":"0.98"},{"date":"2018-03-30T22:49:37","version":"0.99"},{"version":"20180523.0","date":"2018-05-23T17:24:25"},{"date":"2020-05-05T20:57:23","version":"20200505.0"},{"date":"2022-08-07T12:50:57","version":"20220807.0"},{"date":"2023-10-03T01:09:01","version":"20231003.0"}]},"Jifty":{"main_module":"Jifty","advisories":[{"distribution":"Jifty","reported":"2011-03-17","references":["https://metacpan.org/dist/Jifty/changes"],"cves":[],"id":"CPANSA-Jifty-2011-01","fixed_versions":[">=1.10518"],"description":"The path as passed in the fragment request data structure was used verbatim in the dispatcher and other locations. This possibly allowed requests to walk around ACLs by requesting '/some/safe/place/../../../dangerous' as a fragment.\n","affected_versions":["<1.10518"]},{"fixed_versions":[">=0.90409"],"description":"The REST plugin would let you call any method on the model.\n","affected_versions":["<0.90409"],"reported":"2009-04-09","references":["https://metacpan.org/dist/Jifty/changes"],"distribution":"Jifty","cves":[],"id":"CPANSA-Jifty-2009-01"},{"id":"CPANSA-Jifty-2008-01","distribution":"Jifty","reported":"2009-04-08","references":["https://metacpan.org/dist/Jifty/changes"],"cves":[],"affected_versions":["<0.70408"],"fixed_versions":[">=0.80408"],"description":"Allowed all actions on GET.\n"},{"id":"CPANSA-Jifty-2006-01","distribution":"Jifty","reported":"2006-07-06","references":["https://metacpan.org/dist/Jifty/changes"],"cves":[],"affected_versions":["<0.60706"],"description":"Jifty did not protect users against a class of remote data access vulnerability. If an attacker knew the structure of your local filesystem and you were using the \"standalone\" webserver in production, the attacker could gain read only access to local files.\n","fixed_versions":[">=0.60706"]}],"versions":[{"version":"0.51225","date":"2005-12-25T08:19:39"},{"version":"0.51228","date":"2005-12-28T17:23:39"},{"version":"0.60213","date":"2006-02-14T04:15:03"},{"date":"2006-02-22T04:57:24","version":"0.60213"},{"version":"0.60213","date":"2006-03-21T23:10:58"},{"date":"2006-05-05T18:56:21","version":"0.60321"},{"date":"2006-05-08T14:38:03","version":"0.60507"},{"date":"2006-06-15T14:01:15","version":"0.60714"},{"date":"2006-06-16T12:16:03","version":"0.60616"},{"version":"0.60706","date":"2006-07-07T04:32:27"},{"version":"0.60707","date":"2006-07-07T05:54:06"},{"date":"2006-07-23T00:27:10","version":"0.60722"},{"version":"0.60912","date":"2006-09-13T00:25:58"},{"date":"2006-11-24T03:39:06","version":"0.61123_01"},{"version":"0.70116","date":"2007-01-17T04:52:58"},{"version":"0.70117","date":"2007-01-17T20:49:04"},{"version":"0.70415","date":"2007-04-17T18:45:55"},{"date":"2007-04-23T01:08:41","version":"0.70422"},{"version":"0.70824","date":"2007-08-24T04:20:59"},{"version":"0.71129","date":"2007-11-29T22:13:17"},{"date":"2008-04-08T21:15:29","version":"0.80408"},{"version":"0.90409","date":"2009-04-09T23:10:34"},{"version":"0.90519","date":"2009-05-20T01:14:48"},{"date":"2009-06-30T17:41:18","version":"0.90519"},{"version":"0.90519","date":"2009-07-01T19:08:14"},{"date":"2009-11-18T00:08:35","version":"0.90701"},{"version":"1.01209","date":"2010-12-09T23:08:09"},{"date":"2011-02-14T22:10:50","version":"1.10214"},{"date":"2011-02-28T16:22:26","version":"1.10228"},{"version":"1.10518","date":"2011-05-18T18:12:42"},{"date":"2015-04-30T20:48:27","version":"1.50430"}]},"Archive-Zip":{"versions":[{"version":"0.06","date":"2000-03-22T00:10:21"},{"version":"0.07","date":"2000-03-29T17:03:46"},{"date":"2000-06-16T16:48:41","version":"0.09"},{"version":"0.10","date":"2000-08-08T20:56:31"},{"date":"2001-01-17T08:06:58","version":"0.11"},{"date":"2002-04-22T15:32:49","version":"1.00"},{"version":"1.01","date":"2002-05-11T02:45:20"},{"date":"2002-08-24T00:19:19","version":"1.02"},{"version":"1.03","date":"2002-09-03T04:40:33"},{"date":"2002-09-11T15:17:37","version":"1.04"},{"version":"1.05","date":"2002-09-11T19:35:26"},{"date":"2003-07-17T18:18:14","version":"1.06"},{"date":"2003-10-20T13:59:00","version":"1.07"},{"date":"2003-10-21T17:04:03","version":"1.08"},{"date":"2003-11-27T18:02:03","version":"1.09"},{"date":"2004-03-25T14:39:05","version":"1.10"},{"date":"2004-07-05T23:25:19","version":"1_11"},{"date":"2004-07-08T17:31:27","version":"1.11"},{"version":"1.12","date":"2004-07-08T19:14:46"},{"date":"2004-07-27T22:50:39","version":"1.12_02"},{"date":"2004-07-29T15:15:49","version":"1.12_03"},{"version":"1.13","date":"2004-08-23T15:39:23"},{"version":"1.14","date":"2004-10-21T15:28:12"},{"version":"1.15_01","date":"2005-03-10T04:34:04"},{"date":"2005-03-12T15:29:48","version":"1.15_02"},{"version":"1.15","date":"2005-06-22T18:29:34"},{"date":"2005-07-04T17:55:17","version":"1.16"},{"version":"1.17_01","date":"2006-04-30T03:53:15"},{"date":"2006-05-07T02:49:30","version":"1.17_02"},{"date":"2006-09-15T15:56:10","version":"1.17_03"},{"version":"1.17_05","date":"2006-10-24T15:06:32"},{"version":"1.18","date":"2006-10-25T12:24:52"},{"version":"1.20","date":"2007-06-05T01:50:42"},{"version":"1.21","date":"2007-11-01T02:59:20"},{"date":"2007-11-02T01:52:47","version":"1.22"},{"version":"1.23","date":"2007-11-07T13:04:41"},{"date":"2008-08-23T23:35:50","version":"1.24"},{"version":"1.25","date":"2008-10-10T05:28:17"},{"version":"1.26","date":"2008-10-12T14:13:05"},{"date":"2008-12-16T13:23:21","version":"1.27_01"},{"version":"1.28","date":"2009-06-16T10:09:03"},{"date":"2009-06-29T13:27:17","version":"1.29"},{"version":"1.30","date":"2009-06-30T14:13:29"},{"version":"1.31_01","date":"2010-03-05T05:11:20"},{"version":"1.31_02","date":"2011-03-08T15:52:02"},{"version":"1.31_03","date":"2011-08-23T03:42:14"},{"date":"2012-01-23T06:28:16","version":"1.31_04"},{"version":"1.32","date":"2013-11-09T00:05:06"},{"date":"2013-11-10T03:50:45","version":"1.33"},{"version":"1.34","date":"2013-12-02T22:16:54"},{"date":"2013-12-30T19:16:52","version":"1.35"},{"version":"1.36","date":"2013-12-30T22:12:14"},{"version":"1.37","date":"2014-01-13T18:32:19"},{"date":"2014-09-02T23:23:11","version":"1.38"},{"date":"2014-10-22T04:17:15","version":"1.39"},{"date":"2015-01-05T05:58:46","version":"1.40"},{"version":"1.41","date":"2015-01-10T02:47:42"},{"version":"1.42","date":"2015-01-12T00:46:36"},{"version":"1.43","date":"2015-01-15T06:37:32"},{"version":"1.44","date":"2015-01-24T06:12:21"},{"version":"1.45","date":"2015-01-27T07:51:17"},{"version":"1.46","date":"2015-03-25T05:19:23"},{"date":"2015-06-17T18:26:02","version":"1.47"},{"date":"2015-06-18T21:13:37","version":"1.48"},{"version":"1.49","date":"2015-07-31T19:01:40"},{"version":"1.50","date":"2015-08-26T00:11:35"},{"date":"2015-09-22T06:03:54","version":"1.51"},{"version":"1.53","date":"2015-09-23T17:43:44"},{"version":"1.55","date":"2015-12-04T19:36:41"},{"date":"2015-12-17T18:29:06","version":"1.56"},{"date":"2016-04-01T18:06:36","version":"1.57"},{"version":"1.58","date":"2016-08-02T17:50:20"},{"date":"2016-08-11T20:09:16","version":"1.59"},{"version":"1.60","date":"2017-12-19T18:44:16"},{"date":"2018-08-19T03:35:10","version":"1.61"},{"date":"2018-08-20T03:29:01","version":"1.62"},{"version":"1.63","date":"2018-08-22T15:42:15"},{"date":"2018-09-12T15:50:29","version":"1.64"},{"version":"1.65","date":"2019-09-08T05:20:03"},{"version":"1.66","date":"2019-09-17T04:37:32"},{"version":"1.67","date":"2019-10-07T04:30:05"},{"date":"2020-03-12T17:59:46","version":"1.68"}],"advisories":[{"description":"perl-archive-zip is vulnerable to a directory traversal in Archive::Zip. It was found that the Archive::Zip module did not properly sanitize paths while extracting zip files. An attacker able to provide a specially crafted archive for processing could use this flaw to write or overwrite arbitrary files in the context of the perl interpreter.\n","fixed_versions":[],"affected_versions":["<1.61"],"severity":"medium","cves":["CVE-2018-10860"],"reported":"2018-06-28","references":["https://security-tracker.debian.org/tracker/CVE-2018-10860","https://github.com/redhotpenguin/perl-Archive-Zip/pull/33"],"distribution":"Archive-Zip","id":"CPANSA-Archive-Zip-2018-01"},{"severity":null,"cves":["CVE-2004-1096"],"references":["http://www.securityfocus.com/bid/11448","http://www.gentoo.org/security/en/glsa/glsa-200410-31.xml","http://www.idefense.com/application/poi/display?id=153&type=vulnerabilities&flashstatus=true","http://www.kb.cert.org/vuls/id/492545","http://secunia.com/advisories/13038/","http://www.mandriva.com/security/advisories?name=MDKSA-2004:118","https://exchange.xforce.ibmcloud.com/vulnerabilities/17761"],"reported":"2005-01-10","distribution":"Archive-Zip","id":"CPANSA-Archive-Zip-2004-1096","fixed_versions":[],"description":"Archive::Zip Perl module before 1.14, when used by antivirus programs such as amavisd-new, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.\n","affected_versions":["<1.14"]}],"main_module":"Archive::Zip"},"Apache-Session-LDAP":{"advisories":[{"affected_versions":["<0.5"],"fixed_versions":[">=0.5"],"description":"In Apache::Session::LDAP before 0.5, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can, for example, be fixed in conjunction with the CVE-2020-16093 fix.\n","id":"CPANSA-Apache-Session-LDAP-2020-36658","cves":["CVE-2020-36658"],"severity":null,"distribution":"Apache-Session-LDAP","references":["https://github.com/LemonLDAPNG/Apache-Session-LDAP/commit/490722b71eed1ed1ab33d58c78578f23e043561f","https://lists.debian.org/debian-lts-announce/2023/01/msg00024.html"],"reported":"2023-01-27"}],"versions":[{"version":"0.01","date":"2009-04-18T17:09:10"},{"version":"0.02","date":"2009-04-18T19:43:50"},{"date":"2010-12-08T15:30:51","version":"0.1"},{"version":"0.2","date":"2012-06-26T04:22:47"},{"date":"2014-10-24T12:21:07","version":"0.2"},{"date":"2015-06-12T15:47:40","version":"0.4"},{"version":"0.2","date":"2020-09-06T13:13:20"}],"main_module":"Apache::Session::LDAP"},"Apache-Wyrd":{"versions":[{"date":"2004-03-17T21:36:52","version":"0.8"},{"date":"2004-03-18T22:52:04","version":"0.81"},{"version":"0.82","date":"2004-03-25T23:52:49"},{"date":"2004-08-19T15:42:55","version":"0.83"},{"version":"0.84","date":"2004-09-03T19:44:01"},{"date":"2004-09-22T16:08:23","version":"0.85"},{"version":"0.86","date":"2004-09-23T02:04:43"},{"date":"2004-10-31T20:59:42","version":"0.87"},{"version":"0.90","date":"2004-12-16T20:56:33"},{"date":"2005-01-09T21:52:49","version":"0.91"},{"date":"2005-01-13T17:42:18","version":"0.92"},{"date":"2005-03-25T21:22:56","version":"0.93"},{"version":"0.94","date":"2006-10-22T22:57:04"},{"date":"2007-04-30T23:02:05","version":"0.95"},{"version":"0.96","date":"2007-05-01T15:20:02"},{"version":"0.97","date":"2008-04-14T18:49:14"},{"version":"0.98","date":"2008-04-15T21:32:47"}],"advisories":[{"affected_versions":["<0.97"],"description":"User-submitted data cab be executed if it is displayed on a page, if the data contains a string that can be interpreted as a Wyrd.\n","fixed_versions":[">=0.97"],"id":"CPANSA-Apache-Wyrd-2008-01","cves":[],"severity":null,"distribution":"Apache-Wyrd","reported":"2008-04-14","references":["https://metacpan.org/dist/Apache-Wyrd/changes"]}],"main_module":"Apache::Wyrd"},"IO-Compress":{"main_module":"IO::Compress","advisories":[{"id":"CPANSA-IO-Compress-2016-1238","reported":"2016-08-02","references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"distribution":"IO-Compress","severity":"high","cves":["CVE-2016-1238"],"affected_versions":["<2.070"],"fixed_versions":[">=2.070"],"description":"(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.\n"}],"versions":[{"version":"2.017","date":"2009-04-04T09:49:11"},{"date":"2009-05-03T16:27:20","version":"2.018"},{"date":"2009-05-04T09:43:44","version":"2.019"},{"date":"2009-06-03T17:48:41","version":"2.020"},{"version":"2.021","date":"2009-08-30T20:27:02"},{"date":"2009-10-09T21:56:08","version":"2.022"},{"date":"2009-11-09T23:43:07","version":"2.023"},{"date":"2010-01-09T17:56:46","version":"2.024"},{"date":"2010-03-28T12:57:23","version":"2.025"},{"date":"2010-04-07T19:51:37","version":"2.026"},{"date":"2010-04-24T19:16:06","version":"2.027"},{"version":"2.030","date":"2010-07-24T14:46:19"},{"version":"2.032","date":"2011-01-06T11:24:01"},{"version":"2.033","date":"2011-01-11T14:03:58"},{"version":"2.034","date":"2011-05-02T21:50:29"},{"version":"2.035","date":"2011-05-07T08:32:12"},{"date":"2011-06-18T21:45:50","version":"2.036"},{"version":"2.037","date":"2011-06-22T07:19:49"},{"date":"2011-10-28T14:28:46","version":"2.039"},{"date":"2011-10-28T22:20:49","version":"2.040"},{"date":"2011-11-17T23:45:33","version":"2.042"},{"version":"2.043","date":"2011-11-20T21:34:13"},{"version":"2.044","date":"2011-12-03T22:49:21"},{"date":"2011-12-04T19:21:48","version":"2.045"},{"date":"2011-12-18T22:38:32","version":"2.046"},{"version":"2.047","date":"2012-01-28T23:28:39"},{"date":"2012-01-29T17:00:45","version":"2.048"},{"version":"2.049","date":"2012-02-18T15:58:24"},{"version":"2.052","date":"2012-04-29T12:42:10"},{"date":"2012-08-05T20:37:36","version":"2.055"},{"date":"2012-11-10T19:09:13","version":"2.057"},{"date":"2012-11-12T22:15:00","version":"2.058"},{"date":"2012-12-15T13:41:23","version":"2.059"},{"date":"2013-01-07T20:02:34","version":"2.060"},{"date":"2013-05-27T09:55:05","version":"2.061"},{"version":"2.062","date":"2013-08-12T19:08:16"},{"date":"2013-11-02T17:15:29","version":"2.063"},{"version":"2.064","date":"2014-02-01T23:21:32"},{"version":"2.066","date":"2014-09-21T12:42:45"},{"version":"2.067","date":"2014-12-08T15:14:06"},{"date":"2014-12-23T17:46:25","version":"2.068"},{"version":"2.069","date":"2015-09-26T18:42:09"},{"version":"2.070","date":"2016-12-28T23:09:27"},{"date":"2017-02-12T20:41:37","version":"2.072"},{"version":"2.073","date":"2017-02-19T20:37:27"},{"date":"2017-02-19T22:11:53","version":"2.074"},{"date":"2018-04-03T18:22:13","version":"2.080"},{"date":"2018-04-08T15:03:07","version":"2.081"},{"date":"2018-12-30T22:40:20","version":"2.083"},{"date":"2019-01-06T08:57:26","version":"2.084"},{"version":"2.086","date":"2019-03-31T19:16:41"},{"version":"2.087","date":"2019-08-10T18:12:14"},{"version":"2.088","date":"2019-11-03T09:29:00"},{"date":"2019-11-03T19:54:15","version":"2.089"},{"date":"2019-11-09T16:00:26","version":"2.090"},{"date":"2019-11-23T19:44:59","version":"2.091"},{"date":"2019-12-04T22:10:26","version":"2.092"},{"date":"2019-12-07T16:05:46","version":"2.093"},{"date":"2020-07-14T15:32:09","version":"2.094"},{"version":"2.095","date":"2020-07-20T19:25:09"},{"version":"2.096","date":"2020-07-31T20:53:32"},{"version":"2.100","date":"2021-01-07T13:57:52"},{"date":"2021-02-20T14:25:27","version":"2.101"},{"version":"2.102","date":"2021-02-28T08:57:41"},{"version":"2.103","date":"2022-04-03T19:50:28"},{"date":"2022-04-09T15:43:24","version":"2.104"},{"version":"2.105","date":"2022-04-09T21:36:46"},{"version":"2.106","date":"2022-04-12T16:10:04"},{"date":"2022-06-25T09:04:18","version":"2.201"},{"date":"2023-02-08T21:49:30","version":"2.204"},{"date":"2023-07-16T19:41:51","version":"2.205"},{"date":"2023-07-25T15:56:21","version":"2.206"},{"version":"2.207","date":"2024-02-18T22:20:49"},{"date":"2024-03-31T15:17:06","version":"2.208"},{"date":"2024-04-06T13:44:44","version":"2.211"},{"date":"2024-04-27T12:55:39","version":"2.212"},{"version":"2.213","date":"2024-08-28T15:36:27"},{"version":null,"perl_release":"5.009003","date":"2006-01-28T00:00:00","dual_lived":1}]},"CGI":{"advisories":[{"id":"CPANSA-CGI-2012-5526","distribution":"CGI","reported":"2012-11-21","references":["http://www.securityfocus.com/bid/56562","http://www.openwall.com/lists/oss-security/2012/11/15/6","https://github.com/markstos/CGI.pm/pull/23","http://www.securitytracker.com/id?1027780","http://cpansearch.perl.org/src/MARKSTOS/CGI.pm-3.63/Changes","http://secunia.com/advisories/51457","http://www.ubuntu.com/usn/USN-1643-1","http://www.debian.org/security/2012/dsa-2586","http://rhn.redhat.com/errata/RHSA-2013-0685.html","http://secunia.com/advisories/55314","http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","https://exchange.xforce.ibmcloud.com/vulnerabilities/80098"],"cves":["CVE-2012-5526"],"severity":null,"affected_versions":["<3.63"],"description":"CGI.pm module before 3.63 for Perl does not properly escape newlines in (1) Set-Cookie or (2) P3P headers, which might allow remote attackers to inject arbitrary headers into responses from applications that use CGI.pm.\n","fixed_versions":[">=3.63"]},{"distribution":"CGI","reported":"2011-11-08","references":["https://rt.cpan.org/Public/Bug/Display.html?id=68380","http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-2766"],"cves":["CVE-2011-2766"],"id":"CPANSA-CGI-2011-2766","fixed_versions":[">=3.56"],"description":"Usage of deprecated FCGI.pm API.\n","affected_versions":["<3.56"]},{"reported":"2010-11-08","distribution":"CGI","description":"Non-random MIME boundary.\n","fixed_versions":[">=3.50"],"cves":[],"id":"CPANSA-CGI-2010-02","affected_versions":["<3.50"]},{"fixed_versions":[">=3.49"],"description":"Newlines in headers.\n","cves":[],"reported":"2010-02-05","distribution":"CGI","id":"CPANSA-CGI-2010-01","affected_versions":["<3.49"]},{"fixed_versions":[">=3.50"],"description":"Unspecified vulnerability in CGI.pm 3.50 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unknown vectors. NOTE: this issue exists because of an incomplete fix for CVE-2010-2761.\n","affected_versions":["<3.50"],"distribution":"CGI","references":["http://openwall.com/lists/oss-security/2010/12/01/3","http://www.mandriva.com/security/advisories?name=MDVSA-2011:008","http://www.vupen.com/english/advisories/2011/0106","http://www.bugzilla.org/security/3.2.9/","http://secunia.com/advisories/43033","https://bugzilla.mozilla.org/show_bug.cgi?id=591165","http://www.vupen.com/english/advisories/2011/0207","http://www.vupen.com/english/advisories/2011/0271","http://www.vupen.com/english/advisories/2011/0212","http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html","http://secunia.com/advisories/43068","http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html","http://secunia.com/advisories/43165","http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html","http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"],"reported":"2010-12-06","cves":["CVE-2010-4411"],"severity":null,"id":"CPANSA-CGI-2010-4411"},{"severity":null,"cves":["CVE-2010-2761"],"reported":"2010-12-06","references":["https://github.com/AndyA/CGI--Simple/commit/e4942b871a26c1317a175a91ebb7262eea59b380","http://cpansearch.perl.org/src/LDS/CGI.pm-3.50/Changes","http://openwall.com/lists/oss-security/2010/12/01/1","http://www.nntp.perl.org/group/perl.perl5.changes/2010/11/msg28043.html","http://perl5.git.perl.org/perl.git/blobdiff/a0b94c2432b1d8c20653453a0f6970cb10f59aec..84601d63a7e34958da47dad1e61e27cb3bd467d1:/cpan/CGI/lib/CGI.pm","http://perl5.git.perl.org/perl.git/commit/84601d63a7e34958da47dad1e61e27cb3bd467d1","http://openwall.com/lists/oss-security/2010/12/01/2","http://openwall.com/lists/oss-security/2010/12/01/3","https://bugzilla.mozilla.org/show_bug.cgi?id=600464","http://osvdb.org/69588","http://osvdb.org/69589","http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html","http://www.mandriva.com/security/advisories?name=MDVSA-2010:237","http://www.vupen.com/english/advisories/2011/0076","http://www.mandriva.com/security/advisories?name=MDVSA-2010:250","http://secunia.com/advisories/42877","https://bugzilla.mozilla.org/show_bug.cgi?id=591165","http://www.vupen.com/english/advisories/2011/0207","http://www.bugzilla.org/security/3.2.9/","http://secunia.com/advisories/43033","http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053591.html","http://secunia.com/advisories/43147","http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053576.html","http://www.vupen.com/english/advisories/2011/0249","http://www.vupen.com/english/advisories/2011/0271","http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html","http://www.vupen.com/english/advisories/2011/0212","http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html","http://secunia.com/advisories/43165","http://secunia.com/advisories/43068","http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html","http://www.redhat.com/support/errata/RHSA-2011-1797.html","http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"],"distribution":"CGI","id":"CPANSA-CGI-2010-2761","fixed_versions":[">=3.50"],"description":"The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172.\n","affected_versions":["<3.50"]}],"versions":[{"date":"1995-11-25T09:21:00","version":"2.10"},{"version":"2.13","date":"1995-12-28T09:08:00"},{"date":"1996-05-22T22:30:00","version":"2.20"},{"version":"2.21","date":"1996-05-31T05:31:00"},{"date":"1996-08-07T09:24:00","version":"2.22"},{"date":"1996-08-14T08:17:00","version":"2.23"},{"version":"2.24","date":"1996-08-21T09:09:00"},{"date":"1996-09-10T14:23:00","version":"2.25"},{"date":"1996-10-22T11:17:00","version":"2.26"},{"version":"2.27","date":"1996-10-24T18:21:00"},{"version":"2.28","date":"1996-12-02T11:48:00"},{"version":"2.29","date":"1996-12-09T13:39:00"},{"version":"2.30","date":"1997-01-02T16:40:00"},{"date":"1997-02-15T15:36:00","version":"2.31"},{"version":"2.32","date":"1997-03-25T08:58:00"},{"version":"2.33","date":"1997-04-04T20:45:00"},{"date":"1997-04-10T15:41:00","version":"2.34"},{"version":"2.35","date":"1997-04-20T18:29:00"},{"version":"2.36","date":"1997-05-09T09:33:00"},{"date":"1997-08-29T04:42:00","version":"2.37"},{"date":"1997-09-15T17:51:00","version":"2.37"},{"version":"2.37","date":"1997-10-01T04:15:00"},{"date":"1997-10-12T07:10:00","version":"2.37"},{"version":"2.37","date":"1997-11-23T11:37:00"},{"date":"1997-12-20T09:57:00","version":"2.37"},{"version":"2.37","date":"1998-01-16T12:22:00"},{"date":"1998-01-19T11:34:00","version":"2.37"},{"version":"2.37","date":"1998-01-26T11:00:00"},{"date":"1998-01-29T19:48:00","version":"2.37"},{"version":"2.37","date":"1998-02-02T13:37:00"},{"date":"1998-02-05T08:25:00","version":"2.37"},{"date":"1998-02-09T13:58:00","version":"2.37"},{"version":"2.37","date":"1998-02-16T16:21:00"},{"date":"1998-02-23T08:33:00","version":"2.37"},{"date":"1998-02-24T16:52:00","version":"2.37"},{"version":"2.37","date":"1998-03-13T15:33:00"},{"version":"2.38","date":"1998-03-22T21:12:00"},{"version":"2.39","date":"1998-03-24T22:37:08"},{"date":"1998-05-20T09:17:00","version":"2.40"},{"date":"1998-05-28T15:03:00","version":"2.41"},{"version":"2.42","date":"1998-06-09T09:00:00"},{"version":"2.43","date":"1998-10-14T19:06:31"},{"version":"2.44","date":"1998-11-24T19:41:41"},{"date":"1998-11-26T11:07:27","version":"2.45"},{"date":"1998-12-06T10:22:46","version":"2.46"},{"date":"1999-02-18T03:50:16","version":"2.47"},{"date":"1999-02-19T14:10:25","version":"2.48"},{"version":"2.49","date":"1999-02-23T22:00:33"},{"version":"2.52","date":"1999-06-08T15:13:15"},{"version":"2.53","date":"1999-06-09T14:56:06"},{"version":"2.54","date":"1999-08-09T14:18:33"},{"date":"1999-08-31T17:11:00","version":"2.55"},{"date":"1999-09-13T21:11:51","version":"2.56"},{"date":"2000-03-23T23:00:12","version":"2.58"},{"version":"2.59","date":"2000-03-24T12:31:52"},{"date":"2000-03-27T22:11:34","version":"2.60"},{"version":"2.61","date":"2000-03-28T02:50:18"},{"version":"2.62","date":"2000-03-28T21:38:03"},{"version":"2.63","date":"2000-04-10T15:19:54"},{"date":"2000-04-11T15:25:13","version":"2.64"},{"version":"2.65","date":"2000-04-11T15:55:40"},{"version":"2.66","date":"2000-04-12T20:16:46"},{"date":"2000-05-16T01:38:08","version":"2.67"},{"version":"2.68","date":"2000-05-18T17:55:55"},{"version":"2.69","date":"2000-07-28T03:06:11"},{"date":"2000-08-04T19:37:27","version":"2.70"},{"date":"2000-08-13T16:09:25","version":"2.71"},{"date":"2000-08-20T17:35:50","version":"2.72"},{"version":"3.","date":"2000-08-24T13:33:37"},{"date":"2000-09-13T02:55:51","version":"2.73"},{"version":"2.74","date":"2000-09-13T16:35:14"},{"date":"2001-02-02T15:43:07","version":"2.75"},{"version":"2.751","date":"2001-02-02T15:50:53"},{"version":"2.752","date":"2001-02-04T23:49:27"},{"date":"2001-03-12T17:00:13","version":"2.753"},{"date":"2001-06-15T15:33:28","version":"3.02"},{"version":"3.02_","date":"2001-06-29T14:47:39"},{"date":"2001-07-05T16:13:55","version":"3.03_01"},{"version":"2.76","date":"2001-07-26T21:29:22"},{"version":"2.77","date":"2001-08-07T12:33:22"},{"version":"2.78","date":"2001-09-26T02:26:36"},{"date":"2001-12-09T21:39:11","version":"2.79"},{"version":"2.80","date":"2002-01-12T02:47:17"},{"date":"2002-04-10T19:39:49","version":"2.81"},{"version":"2.84","date":"2002-09-11T12:27:48"},{"date":"2002-09-11T14:01:02","version":"2.85"},{"date":"2002-09-12T03:58:40","version":"2.86"},{"version":"2.87","date":"2002-10-07T02:00:58"},{"version":"2.88","date":"2002-10-14T13:58:09"},{"version":"2.89","date":"2002-10-16T17:50:26"},{"version":"0","date":"2002-11-22T23:03:39"},{"date":"2003-02-10T20:11:57","version":"2.90"},{"version":"2.91","date":"2003-02-11T14:15:15"},{"version":"2.92","date":"2003-04-28T00:44:10"},{"version":"2.93","date":"2003-04-28T13:37:43"},{"date":"2003-06-09T12:15:29","version":"2.94"},{"date":"2003-06-13T02:35:42","version":"2.95"},{"version":"2.96","date":"2003-06-16T18:42:38"},{"date":"2003-06-17T23:32:52","version":"2.97"},{"version":"2.98","date":"2003-07-16T17:06:29"},{"date":"2003-08-01T14:43:54","version":"2.99"},{"version":"3.00","date":"2003-08-18T17:51:48"},{"version":"3.01","date":"2003-12-10T17:05:47"},{"date":"2004-01-13T16:34:47","version":"3.03"},{"version":"3.04","date":"2004-01-19T12:44:30"},{"date":"2004-04-12T20:39:57","version":"3.05"},{"version":"3.06","date":"2005-03-09T21:06:46"},{"version":"3.07","date":"2005-03-14T16:34:03"},{"date":"2005-04-20T15:31:11","version":"3.08"},{"date":"2005-05-05T20:16:55","version":"3.09"},{"date":"2005-05-13T21:48:46","version":"3.10"},{"date":"2005-08-03T21:17:14","version":"3.11"},{"version":"3.12","date":"2005-12-04T16:46:53"},{"date":"2005-12-05T13:54:26","version":"3.13"},{"date":"2005-12-06T22:14:19","version":"3.14"},{"date":"2005-12-07T20:16:49","version":"3.15"},{"version":"3.16","date":"2006-02-08T18:50:56"},{"version":"3.17","date":"2006-02-24T19:04:58"},{"date":"2006-04-17T13:56:06","version":"3.19"},{"date":"2006-04-23T14:27:55","version":"3.20"},{"version":"3.21","date":"2006-08-21T19:12:36"},{"version":"3.22","date":"2006-08-23T15:24:41"},{"date":"2006-08-24T11:53:26","version":"3.23"},{"version":"3.25","date":"2006-09-28T17:09:45"},{"date":"2007-02-27T15:42:54","version":"3.27"},{"version":"3.28","date":"2007-03-29T15:38:01"},{"version":"3.29","date":"2007-04-16T17:00:18"},{"version":"3.31","date":"2007-11-30T19:06:19"},{"date":"2007-12-27T18:41:32","version":"3.32"},{"version":"3.33","date":"2008-01-03T15:03:17"},{"version":"3.34","date":"2008-03-18T16:04:41"},{"version":"3.35","date":"2008-03-27T14:26:48"},{"date":"2008-04-23T13:09:44","version":"3.37"},{"version":"3.38","date":"2008-06-25T14:58:32"},{"date":"2008-07-29T15:01:52","version":"3.39"},{"version":"3.40","date":"2008-08-06T18:21:51"},{"version":"3.41","date":"2008-08-26T13:56:27"},{"date":"2008-09-08T14:15:41","version":"3.42"},{"version":"3.43","date":"2009-04-06T18:35:19"},{"version":"3.44","date":"2009-07-30T16:34:17"},{"version":"3.45","date":"2009-08-14T13:37:12"},{"date":"2009-09-09T15:39:42","version":"3.46"},{"version":"3.47","date":"2009-09-09T20:03:01"},{"version":"3.48","date":"2009-09-25T15:07:03"},{"version":"3.49","date":"2010-02-05T16:24:53"},{"version":"3.50","date":"2010-11-08T21:53:26"},{"date":"2011-01-05T18:28:41","version":"3.51"},{"version":"3.52","date":"2011-01-25T04:30:05"},{"date":"2011-04-25T23:01:21","version":"3.53"},{"date":"2011-04-28T14:36:41","version":"3.54"},{"version":"3.55","date":"2011-06-03T15:39:16"},{"version":"3.56","date":"2011-11-09T02:00:20"},{"date":"2011-11-09T15:59:18","version":"3.57"},{"version":"3.58","date":"2011-11-12T03:36:07"},{"version":"3.59","date":"2011-12-30T13:35:35"},{"date":"2012-08-16T03:21:13","version":"3.60"},{"version":"3.61","date":"2012-11-03T02:10:42"},{"date":"2012-11-10T01:40:50","version":"3.62"},{"date":"2012-11-14T23:45:29","version":"3.63"},{"version":"3.64","date":"2013-11-24T01:22:00"},{"version":"3.65","date":"2014-02-12T03:13:58"},{"date":"2014-05-15T12:59:58","version":"3.65_01"},{"date":"2014-05-16T11:43:33","version":"3.65_02"},{"date":"2014-05-20T12:31:46","version":"3.65_03"},{"version":"4.00","date":"2014-05-22T19:58:14"},{"version":"4.01","date":"2014-05-27T13:13:51"},{"version":"4.02","date":"2014-06-09T13:55:49"},{"version":"4.03","date":"2014-07-02T14:53:06"},{"version":"4.03_01","date":"2014-07-28T18:30:34"},{"version":"4.03_02","date":"2014-07-30T14:26:40"},{"date":"2014-08-13T11:40:14","version":"4.03_03"},{"date":"2014-09-04T14:42:14","version":"4.04"},{"date":"2014-09-20T16:08:55","version":"4.04_01"},{"version":"4.04_02","date":"2014-09-28T19:57:05"},{"version":"4.04_03","date":"2014-09-29T09:50:07"},{"date":"2014-10-06T12:01:14","version":"4.04_04"},{"date":"2014-10-06T12:24:10","version":"4.04_05"},{"version":"4.05","date":"2014-10-08T07:42:49"},{"version":"4.06","date":"2014-10-10T11:35:49"},{"version":"4.07","date":"2014-10-12T16:29:35"},{"date":"2014-10-18T11:00:38","version":"4.08"},{"date":"2014-10-21T07:33:36","version":"4.09"},{"date":"2014-11-25T21:06:50","version":"4.09_01"},{"version":"4.10","date":"2014-11-27T12:53:51"},{"date":"2014-11-30T12:12:26","version":"4.10_01"},{"date":"2014-12-03T07:25:15","version":"4.11"},{"version":"4.12","date":"2014-12-18T08:35:52"},{"date":"2014-12-18T09:21:52","version":"4.13"},{"date":"2015-02-12T14:19:13","version":"4.13_01"},{"version":"4.13_02","date":"2015-02-13T08:01:29"},{"date":"2015-03-01T13:28:25","version":"4.13_03"},{"version":"4.13_04","date":"2015-03-08T16:09:21"},{"version":"4.13_05","date":"2015-03-25T17:55:15"},{"date":"2015-04-01T06:51:57","version":"4.14"},{"version":"4.14_01","date":"2015-04-17T14:27:39"},{"version":"4.15","date":"2015-04-20T07:15:45"},{"version":"4.20","date":"2015-05-29T14:48:42"},{"version":"4.21","date":"2015-06-22T07:50:02"},{"version":"4.22","date":"2015-10-16T09:46:31"},{"version":"4.24","date":"2015-12-20T18:33:35"},{"date":"2015-12-21T09:29:19","version":"4.25"},{"date":"2016-02-04T16:37:12","version":"4.26"},{"version":"4.27","date":"2016-03-02T08:03:46"},{"date":"2016-03-14T07:21:48","version":"4.28"},{"date":"2016-05-22T12:23:19","version":"4.28_01"},{"version":"4.28_02","date":"2016-05-22T12:54:23"},{"date":"2016-05-23T08:25:25","version":"4.28_03"},{"date":"2016-06-09T12:01:20","version":"4.29"},{"version":"4.30","date":"2016-06-09T12:11:54"},{"version":"4.31","date":"2016-06-14T07:14:00"},{"version":"4.32","date":"2016-07-19T07:05:46"},{"version":"4.33","date":"2016-09-16T09:47:49"},{"version":"4.34","date":"2016-10-13T11:58:55"},{"date":"2016-10-13T13:56:21","version":"4.35"},{"version":"4.35_01","date":"2017-03-29T08:56:26"},{"date":"2017-04-06T14:42:12","version":"4.36"},{"version":"4.37","date":"2017-11-01T10:17:40"},{"date":"2017-12-01T08:41:02","version":"4.38"},{"date":"2018-08-13T15:57:52","version":"4.39"},{"date":"2018-08-15T08:39:39","version":"4.40"},{"date":"2019-03-26T15:58:49","version":"4.41"},{"date":"2019-03-26T16:33:27","version":"4.42"},{"version":"4.43","date":"2019-05-01T14:28:45"},{"version":"4.44","date":"2019-06-03T09:00:55"},{"date":"2020-01-13T07:03:55","version":"4.45"},{"date":"2020-02-03T14:49:22","version":"4.46"},{"version":"4.47","date":"2020-05-01T13:01:44"},{"date":"2020-06-02T08:22:41","version":"4.48"},{"date":"2020-06-08T09:46:25","version":"4.49"},{"version":"4.50","date":"2020-06-22T07:35:25"},{"date":"2020-10-05T06:14:39","version":"4.51"},{"date":"2021-05-04T08:02:27","version":"4.52"},{"version":"4.53","date":"2021-06-03T06:45:55"},{"date":"2022-02-03T07:52:34","version":"4.54"},{"version":"4.55","date":"2023-01-03T07:45:53"},{"version":"4.56","date":"2023-03-03T08:51:51"},{"date":"2023-05-02T13:16:01","version":"4.57"},{"date":"2023-10-02T07:08:45","version":"4.58"},{"version":"4.59","date":"2023-10-02T07:14:30"},{"version":"4.60","date":"2023-11-01T07:57:12"},{"date":"2024-01-08T15:17:04","version":"4.61"},{"date":"2024-03-01T13:46:49","version":"4.62"},{"date":"2024-03-06T15:20:30","version":"4.63"},{"date":"2024-03-18T12:10:48","version":"4.64"},{"version":"4.65","date":"2024-06-04T15:15:17"},{"date":"2024-06-19T08:59:52","version":"4.66"},{"date":"2025-01-08T15:27:45","version":"4.67"},{"dual_lived":1,"date":"2006-01-28T00:00:00","perl_release":"5.009003","version":"3.15_01"}],"main_module":"CGI"},"Elive":{"main_module":"Elive","versions":[{"version":"0.01","date":"2009-03-17T06:37:43"},{"version":"0.02","date":"2009-04-13T23:51:59"},{"version":"0.03","date":"2009-04-14T20:26:27"},{"date":"2009-04-15T22:30:08","version":"0.04"},{"date":"2009-04-17T07:27:23","version":"0.05"},{"version":"0.06","date":"2009-04-17T22:04:55"},{"version":"0.07","date":"2009-04-22T00:14:13"},{"date":"2009-04-22T03:10:13","version":"0.08"},{"version":"0.09","date":"2009-04-24T22:26:35"},{"date":"2009-04-28T07:30:45","version":"0.10"},{"date":"2009-04-29T21:49:12","version":"0.11"},{"version":"0.12","date":"2009-05-01T23:15:47"},{"version":"0.13","date":"2009-05-04T22:19:09"},{"version":"0.14","date":"2009-05-05T20:09:18"},{"version":"0.15","date":"2009-05-08T22:04:14"},{"version":"0.16","date":"2009-05-11T20:38:56"},{"date":"2009-05-13T21:31:52","version":"0.17"},{"date":"2009-05-15T03:47:36","version":"0.18"},{"date":"2009-05-18T21:43:03","version":"0.19"},{"date":"2009-05-24T00:13:36","version":"0.20"},{"version":"0.21","date":"2009-05-24T20:48:19"},{"date":"2009-05-27T22:05:37","version":"0.22"},{"date":"2009-05-29T05:09:57","version":"0.23"},{"date":"2009-06-03T04:48:43","version":"0.24"},{"date":"2009-06-03T22:18:02","version":"0.25"},{"version":"0.26","date":"2009-06-12T22:36:31"},{"version":"0.27","date":"2009-06-19T21:34:40"},{"version":"0.28","date":"2009-06-22T03:47:43"},{"version":"0.29","date":"2009-06-24T04:14:37"},{"version":"0.30","date":"2009-06-26T23:24:47"},{"date":"2009-07-03T06:18:23","version":"0.31"},{"date":"2009-07-17T22:56:55","version":"0.32"},{"date":"2009-07-22T03:22:18","version":"0.33"},{"version":"0.34","date":"2009-07-28T06:46:45"},{"date":"2009-08-02T22:36:31","version":"0.35"},{"date":"2009-08-03T22:44:25","version":"0.36"},{"date":"2009-08-05T21:02:32","version":"0.37"},{"version":"0.38","date":"2009-08-21T08:29:37"},{"date":"2009-08-31T02:24:45","version":"0.39"},{"version":"0.40","date":"2009-09-10T01:20:54"},{"version":"0.41","date":"2009-09-11T21:34:13"},{"date":"2009-10-08T00:53:22","version":"0.42"},{"version":"0.43","date":"2009-10-20T23:09:46"},{"date":"2009-10-22T00:05:22","version":"0.44"},{"date":"2009-10-26T04:15:36","version":"0.45"},{"date":"2009-10-28T08:27:27","version":"0.46"},{"date":"2009-10-28T21:26:06","version":"0.47"},{"date":"2009-10-29T00:00:43","version":"0.48"},{"version":"0.48_01","date":"2009-11-02T21:37:24"},{"date":"2009-11-06T20:36:30","version":"0.49"},{"version":"0.50","date":"2009-11-09T21:34:02"},{"date":"2009-11-16T00:26:26","version":"0.51"},{"version":"0.52","date":"2009-11-30T20:38:39"},{"date":"2009-12-14T23:14:43","version":"0.53"},{"version":"0.53_1","date":"2009-12-18T00:24:06"},{"version":"0.54","date":"2009-12-18T22:36:34"},{"version":"0.55","date":"2009-12-20T20:02:22"},{"date":"2010-01-04T06:35:00","version":"0.56"},{"version":"0.57","date":"2010-01-04T21:18:52"},{"date":"2010-01-14T00:08:40","version":"0.58"},{"version":"0.59","date":"2010-01-21T22:46:27"},{"version":"0.60","date":"2010-01-24T21:24:09"},{"date":"2010-01-26T22:38:54","version":"0.61"},{"date":"2010-02-15T23:06:41","version":"0.62"},{"date":"2010-03-06T22:34:53","version":"0.63"},{"date":"2010-03-11T22:45:28","version":"0.64"},{"version":"0.65","date":"2010-05-17T00:40:50"},{"date":"2010-05-21T23:54:39","version":"0.66"},{"date":"2010-05-27T22:12:29","version":"0.67"},{"version":"0.68","date":"2010-06-02T07:33:50"},{"version":"0.69","date":"2010-06-11T00:12:21"},{"version":"0.70","date":"2010-06-22T05:13:22"},{"date":"2010-06-22T22:20:27","version":"0.71"},{"date":"2010-08-13T01:10:30","version":"0.72"},{"version":"0.73","date":"2010-09-03T03:48:51"},{"version":"0.74_2","date":"2010-10-14T20:54:08"},{"date":"2010-10-18T01:49:41","version":"0.74"},{"date":"2010-10-27T23:52:59","version":"0.75"},{"version":"0.76","date":"2010-11-09T23:46:08"},{"version":"0.77","date":"2010-12-08T21:27:13"},{"date":"2010-12-08T23:17:00","version":"0.78"},{"version":"0.79","date":"2011-01-20T02:01:43"},{"version":"0.80","date":"2011-01-27T19:56:34"},{"date":"2011-02-03T03:17:09","version":"0.81"},{"date":"2011-02-10T00:02:08","version":"0.82"},{"date":"2011-03-10T05:19:08","version":"0.83"},{"date":"2011-03-11T01:11:39","version":"0.84"},{"date":"2011-03-14T00:55:18","version":"0.85"},{"version":"0.86","date":"2011-03-14T21:15:08"},{"version":"0.87","date":"2011-04-11T00:59:22"},{"date":"2011-04-11T19:19:42","version":"0.87.1"},{"date":"2011-04-15T02:12:50","version":"0.87.2"},{"version":"0.88","date":"2011-04-27T02:43:51"},{"date":"2011-05-20T00:15:55","version":"0.89"},{"version":"0.90","date":"2011-06-08T23:34:06"},{"version":"0.91","date":"2011-06-14T23:35:27"},{"version":"0.95","date":"2011-06-28T07:09:46"},{"date":"2011-06-29T21:42:38","version":"0.96"},{"version":"0.97","date":"2011-07-05T06:35:18"},{"version":"0.98","date":"2011-07-08T00:35:18"},{"date":"2011-07-14T03:25:12","version":"0.99"},{"version":"1.00","date":"2011-07-19T00:14:00"},{"version":"1.01","date":"2011-07-20T01:14:39"},{"date":"2011-07-21T05:49:47","version":"1.02"},{"version":"1.03","date":"2011-07-23T23:23:35"},{"date":"2011-07-29T00:14:06","version":"1.04"},{"date":"2011-08-01T02:20:53","version":"1.05"},{"date":"2011-08-05T21:36:24","version":"1.06"},{"date":"2011-08-07T01:43:31","version":"1.07"},{"date":"2011-08-09T00:51:44","version":"1.08"},{"date":"2011-08-10T05:13:13","version":"1.09"},{"date":"2011-08-10T21:06:42","version":"1.10"},{"date":"2011-08-11T22:27:24","version":"1.11"},{"date":"2011-08-15T00:58:40","version":"1.12"},{"date":"2011-08-19T00:21:11","version":"1.13"},{"version":"1.14","date":"2011-08-20T22:44:01"},{"version":"1.15","date":"2011-08-23T21:43:48"},{"date":"2011-08-26T22:25:28","version":"1.16"},{"date":"2011-09-08T22:32:49","version":"1.17"},{"version":"1.18","date":"2011-09-16T00:00:34"},{"version":"1.19","date":"2011-09-28T07:09:24"},{"date":"2011-11-15T01:28:33","version":"1.20"},{"version":"1.21","date":"2011-12-03T01:49:03"},{"version":"1.22","date":"2012-01-05T04:04:10"},{"version":"1.23","date":"2012-01-25T20:01:01"},{"version":"1.24","date":"2012-02-28T01:03:16"},{"version":"1.25","date":"2012-04-18T04:53:06"},{"date":"2012-05-04T04:11:34","version":"1.26"},{"date":"2012-07-13T21:59:27","version":"1.27"},{"version":"1.28","date":"2012-10-12T02:45:37"},{"version":"1.29","date":"2012-10-26T21:16:49"},{"version":"1.30","date":"2013-01-04T01:33:50"},{"date":"2013-03-28T02:39:54","version":"1.31"},{"date":"2014-02-28T16:40:50","version":"1.32"},{"date":"2015-01-21T21:14:50","version":"1.33"},{"version":"1.34","date":"2015-04-03T22:38:32"},{"date":"2015-06-29T02:59:33","version":"1.35"},{"version":"1.36","date":"2015-12-03T20:48:05"},{"date":"2015-12-04T02:58:35","version":"1.37"}],"advisories":[{"cves":[],"severity":null,"distribution":"Elive","references":["https://metacpan.org/dist/Elive/changes"],"reported":"2011-10-15","id":"CPANSA-Elive-2011-01","fixed_versions":[">=1.20"],"description":"Elive::DAO->set() did not die on tainted data.\n","affected_versions":["<1.20"]}]},"Net-IPAddress-Util":{"main_module":"Net::IPAddress::Util","advisories":[{"id":"CPANSA-Net-IPAddress-Util-2021-47156","severity":null,"cves":["CVE-2021-47156"],"references":["https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/","https://metacpan.org/release/Net-IPAddress-Util","https://metacpan.org/release/PWBENNETT/Net-IPAddress-Util-5.000/changes"],"reported":"2024-03-18","distribution":"Net-IPAddress-Util","affected_versions":["<5.000"],"description":"The Net::IPAddress::Util module before 5.000 for Perl does not properly consider extraneous zero characters in an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.\n","fixed_versions":[">=5.000"]}],"versions":[{"date":"2010-03-21T17:13:19","version":"0.01"},{"version":"0.02","date":"2010-03-21T21:58:11"},{"version":"0.03","date":"2010-03-21T23:54:15"},{"date":"2010-03-22T00:50:40","version":"0.04"},{"date":"2010-03-23T11:38:32","version":"0.05"},{"version":"0.06","date":"2010-03-24T10:42:02"},{"date":"2010-03-25T10:58:12","version":"0.07"},{"version":"0.08","date":"2010-03-26T11:06:58"},{"date":"2010-03-27T15:38:27","version":"0.09"},{"version":"0.10","date":"2010-04-29T01:26:36"},{"version":"0.11","date":"2011-03-26T22:10:10"},{"date":"2011-03-27T00:22:54","version":"0.12"},{"date":"2012-05-30T10:03:21","version":"1.000"},{"date":"2012-05-31T10:48:35","version":"1.001"},{"version":"1.002","date":"2012-06-09T08:44:51"},{"date":"2013-10-29T14:27:36","version":"2.000"},{"version":"2.000_TRIAL","date":"2013-10-29T14:31:44"},{"version":"2.001_TRIAL","date":"2013-10-30T03:01:39"},{"version":"2.002_TRIAL","date":"2013-10-30T03:32:06"},{"date":"2013-10-30T11:47:01","version":"2.003_TRIAL"},{"version":"2.004_TRIAL","date":"2013-10-30T15:53:55"},{"version":"1.500","date":"2013-11-01T02:53:47"},{"date":"2013-11-02T02:04:49","version":"3.000"},{"version":"3.001","date":"2014-04-29T10:09:11"},{"date":"2014-06-10T06:38:16","version":"3.002"},{"version":"3.003","date":"2014-06-14T21:40:33"},{"date":"2014-09-24T11:29:12","version":"3.010"},{"version":"3.011","date":"2014-09-24T13:12:04"},{"date":"2014-09-26T05:01:04","version":"3.012"},{"version":"3.013","date":"2014-09-27T15:52:03"},{"date":"2014-09-27T15:59:49","version":"3.014"},{"date":"2014-09-30T03:35:57","version":"3.015"},{"date":"2014-09-30T03:47:35","version":"3.016"},{"date":"2014-09-30T05:30:38","version":"3.017"},{"date":"2014-09-30T06:56:39","version":"3.018"},{"version":"3.019","date":"2015-01-11T03:59:42"},{"version":"3.020","date":"2015-01-11T23:29:32"},{"version":"3.021","date":"2015-02-18T06:04:51"},{"version":"3.022","date":"2015-03-21T16:22:56"},{"version":"3.024","date":"2016-03-30T16:54:57"},{"version":"3.025","date":"2016-03-30T23:56:29"},{"version":"3.026","date":"2016-04-07T19:36:23"},{"version":"3.027","date":"2016-04-13T13:40:55"},{"version":"3.028","date":"2017-08-17T16:40:13"},{"date":"2017-08-17T21:11:21","version":"3.029"},{"version":"3.030","date":"2017-08-18T18:07:20"},{"version":"3.031","date":"2017-08-18T19:01:22"},{"version":"3.032","date":"2017-08-31T16:41:45"},{"date":"2017-08-31T19:39:56","version":"3.033"},{"date":"2017-09-20T19:26:27","version":"3.034"},{"date":"2017-09-21T10:14:03","version":"4.000"},{"date":"2017-09-22T13:04:11","version":"4.001"},{"version":"4.002","date":"2017-10-04T18:28:54"},{"version":"4.003","date":"2017-10-05T18:08:46"},{"date":"2017-10-05T18:44:53","version":"4.004"},{"date":"2021-04-05T18:40:34","version":"5.000"},{"date":"2021-04-11T04:34:22","version":"5.001"}]},"Net-DNS":{"main_module":"Net::DNS","advisories":[{"affected_versions":["<0.63"],"fixed_versions":[">=0.63"],"description":"Allows remote attackers to cause a denial of service (program \"croak\") via a crafted DNS response.\n","id":"CPANSA-Net-DNS-2008-01","cves":["CVE-2007-6341"],"reported":"2008-02-08","references":["https://metacpan.org/changes/distribution/Net-DNS"],"distribution":"Net-DNS"},{"id":"CPANSA-Net-DNS-2007-3409","references":["http://rt.cpan.org/Public/Bug/Display.html?id=27285","http://www.net-dns.org/docs/Changes.html","http://www.gentoo.org/security/en/glsa/glsa-200708-06.xml","http://www.mandriva.com/security/advisories?name=MDKSA-2007:146","http://www.redhat.com/support/errata/RHSA-2007-0674.html","ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc","http://www.novell.com/linux/security/advisories/2007_17_sr.html","http://www.trustix.org/errata/2007/0023/","http://www.ubuntu.com/usn/usn-483-1","http://www.securityfocus.com/bid/24669","http://www.securitytracker.com/id?1018376","http://secunia.com/advisories/25829","http://secunia.com/advisories/26014","http://secunia.com/advisories/26055","http://secunia.com/advisories/26012","http://secunia.com/advisories/26075","http://secunia.com/advisories/26211","http://secunia.com/advisories/26231","http://secunia.com/advisories/26417","http://secunia.com/advisories/26543","http://www.debian.org/security/2008/dsa-1515","http://secunia.com/advisories/29354","http://osvdb.org/37054","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10595","http://www.securityfocus.com/archive/1/473871/100/0/threaded"],"reported":"2007-06-26","distribution":"Net-DNS","severity":null,"cves":["CVE-2007-3409"],"affected_versions":["<0.60"],"description":"Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop.\n","fixed_versions":[">=0.60"]},{"id":"CPANSA-Net-DNS-2007-3377","distribution":"Net-DNS","reported":"2007-06-25","references":["http://www.nntp.perl.org/group/perl.qpsmtpd/2006/03/msg4810.html","http://rt.cpan.org/Public/Bug/Display.html?id=23961","https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245458","http://www.net-dns.org/docs/Changes.html","http://support.avaya.com/elmodocs2/security/ASA-2007-351.htm","http://www.gentoo.org/security/en/glsa/glsa-200708-06.xml","http://www.mandriva.com/security/advisories?name=MDKSA-2007:146","http://www.redhat.com/support/errata/RHSA-2007-0674.html","http://www.redhat.com/support/errata/RHSA-2007-0675.html","ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc","http://www.novell.com/linux/security/advisories/2007_17_sr.html","http://www.trustix.org/errata/2007/0023/","http://www.ubuntu.com/usn/usn-483-1","http://www.securityfocus.com/bid/24669","http://www.securitytracker.com/id?1018377","http://secunia.com/advisories/25829","http://secunia.com/advisories/26014","http://secunia.com/advisories/26055","http://secunia.com/advisories/26012","http://secunia.com/advisories/26075","http://secunia.com/advisories/26211","http://secunia.com/advisories/26231","http://secunia.com/advisories/26417","http://secunia.com/advisories/26508","http://secunia.com/advisories/26543","http://www.debian.org/security/2008/dsa-1515","http://secunia.com/advisories/29354","http://osvdb.org/37053","https://exchange.xforce.ibmcloud.com/vulnerabilities/35112","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9904","http://www.securityfocus.com/archive/1/473871/100/0/threaded"],"cves":["CVE-2007-3377"],"severity":null,"affected_versions":["<0.60"],"description":"Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin.\n","fixed_versions":[">=0.60"]}],"versions":[{"version":"0.02","date":"1997-02-04T10:03:21"},{"date":"1997-02-05T05:54:07","version":"0.02"},{"version":"0.03","date":"1997-02-10T16:24:12"},{"version":"0.04","date":"1997-02-13T23:50:40"},{"version":"0.05","date":"1997-03-28T06:22:18"},{"version":"0.06","date":"1997-04-03T06:54:12"},{"version":"0.07","date":"1997-04-19T18:07:46"},{"date":"1997-05-13T15:27:34","version":"0.08"},{"version":"0.09","date":"1997-05-29T22:16:14"},{"version":"0.10","date":"1997-06-13T04:35:29"},{"date":"1997-07-06T18:10:05","version":"0.11"},{"version":"0.12","date":"1997-10-02T05:53:19"},{"date":"2002-02-01T21:32:42","version":"0.14"},{"date":"2002-04-11T23:04:19","version":"0.19"},{"date":"2002-05-15T00:39:48","version":"0.20"},{"date":"2002-06-03T21:44:48","version":"0.21"},{"version":"0.22","date":"2002-06-06T21:48:08"},{"version":"0.23","date":"2002-06-11T22:49:07"},{"version":"0.24","date":"2002-07-06T20:17:50"},{"date":"2002-08-01T10:37:46","version":"0.25"},{"version":"0.26","date":"2002-08-05T20:11:20"},{"date":"2002-08-15T15:55:56","version":"0.27"},{"date":"2002-08-21T00:18:55","version":"0.28"},{"version":"0.29","date":"2002-10-02T06:09:09"},{"version":"0.30","date":"2002-11-07T13:19:03"},{"version":"0.31","date":"2002-11-18T04:32:09"},{"version":"0.32","date":"2003-01-05T21:37:55"},{"version":"0.33","date":"2003-01-08T18:31:53"},{"version":"0.34","date":"2003-03-06T19:19:53"},{"date":"2003-05-22T02:33:15","version":"0.34_02"},{"version":"0.34_03","date":"2003-05-23T01:24:00"},{"date":"2003-05-26T07:13:38","version":"0.35"},{"version":"0.36","date":"2003-05-28T22:24:43"},{"date":"2003-05-28T22:41:56","version":"0.37"},{"version":"0.38","date":"2003-06-05T23:55:14"},{"version":"0.38_01","date":"2003-06-23T00:19:28"},{"date":"2003-07-29T09:34:12","version":"0.38_02"},{"date":"2003-08-07T22:35:45","version":"0.39"},{"date":"2003-08-12T04:10:01","version":"0.39_01"},{"date":"2003-08-28T15:17:51","version":"0.39_02"},{"date":"2003-09-01T22:18:39","version":"0.40"},{"version":"0.40_01","date":"2003-09-26T22:54:49"},{"date":"2003-10-03T15:57:27","version":"0.41"},{"date":"2003-10-26T05:42:29","version":"0.42"},{"date":"2003-12-01T04:39:24","version":"0.42_01"},{"date":"2003-12-11T08:53:09","version":"0.42_02"},{"version":"0.43","date":"2003-12-12T00:28:17"},{"date":"2003-12-13T01:55:07","version":"0.44"},{"version":"0.44_01","date":"2004-01-03T06:49:06"},{"date":"2004-01-04T04:51:25","version":"0.44_02"},{"date":"2004-01-08T05:56:11","version":"0.45"},{"date":"2004-02-10T00:53:47","version":"0.45_01"},{"version":"0.46","date":"2004-02-21T12:53:34"},{"date":"2004-04-01T07:39:00","version":"0.47"},{"date":"2004-05-06T19:18:31","version":"0.47_01"},{"date":"2004-08-13T01:11:57","version":"0.48"},{"date":"2005-03-07T14:31:55","version":"0.48_01"},{"date":"2005-03-14T20:47:20","version":"0.48_02"},{"date":"2005-03-22T15:54:51","version":"0.48_03"},{"version":"0.49","date":"2005-03-29T13:12:16"},{"version":"0.49_01","date":"2005-05-24T08:07:55"},{"date":"2005-05-28T07:07:52","version":"0.49_02"},{"date":"2005-06-01T20:51:43","version":"0.49_03"},{"date":"2005-06-08T14:15:32","version":"0.50"},{"date":"2005-06-10T11:00:29","version":"0.51"},{"version":"0.49_01","date":"2005-06-14T11:42:54"},{"date":"2005-06-22T14:32:45","version":"0.49_01"},{"version":"0.52","date":"2005-07-01T21:50:47"},{"version":"0.53","date":"2005-07-22T12:23:21"},{"date":"2005-07-31T14:40:15","version":"0.53_01"},{"date":"2005-10-18T14:39:03","version":"0.53_02"},{"version":"0.54","date":"2005-12-07T13:15:30"},{"version":"0.55","date":"2005-12-14T10:29:42"},{"date":"2006-02-20T15:34:25","version":"0.56"},{"version":"0.57","date":"2006-02-24T16:21:14"},{"version":"0.58","date":"2006-07-04T11:42:41"},{"version":"0.59","date":"2006-09-18T19:31:10"},{"date":"2007-06-22T07:31:18","version":"0.60"},{"version":"0.61","date":"2007-08-01T12:26:55"},{"date":"2007-12-28T19:32:25","version":"0.62"},{"version":"0.63","date":"2008-02-08T15:49:50"},{"version":"0.64","date":"2008-12-30T18:11:35"},{"date":"2009-01-26T18:19:23","version":"0.65"},{"version":"0.66","date":"2009-12-30T13:58:25"},{"date":"2011-10-25T12:14:24","version":"0.66_01"},{"date":"2011-10-27T14:23:38","version":"0.66_02"},{"date":"2011-10-28T14:31:06","version":"0.66_03"},{"version":"0.66_04","date":"2011-10-28T15:00:15"},{"date":"2011-10-31T14:36:02","version":"0.66_06"},{"date":"2011-10-31T19:34:01","version":"0.66_07"},{"date":"2011-11-02T21:52:59","version":"0.66_08"},{"version":"0.67","date":"2011-11-07T09:07:56"},{"version":"0.67_01","date":"2012-01-23T13:41:03"},{"date":"2012-01-26T10:44:13","version":"0.67_03"},{"version":"0.67_04","date":"2012-01-27T08:47:28"},{"date":"2012-01-31T21:54:27","version":"0.68"},{"version":"0.68","date":"2012-01-31T22:11:31"},{"version":"0.68_01","date":"2012-10-29T15:35:55"},{"date":"2012-10-31T10:25:57","version":"0.68_02"},{"date":"2012-10-31T20:33:53","version":"0.68_03"},{"version":"0.68_04","date":"2012-11-12T07:15:13"},{"date":"2012-11-12T10:22:31","version":"0.68_05"},{"date":"2012-11-19T12:57:25","version":"0.68_06"},{"version":"0.68_07","date":"2012-11-21T23:12:34"},{"version":"0.68_08","date":"2012-11-23T22:12:01"},{"date":"2012-12-04T07:18:08","version":"0.68_09"},{"date":"2012-12-05T12:07:43","version":"0.69"},{"version":"0.69_1","date":"2012-12-05T14:05:12"},{"date":"2012-12-06T11:10:17","version":"0.70"},{"date":"2012-12-12T16:04:03","version":"0.70_1"},{"date":"2012-12-15T11:18:56","version":"0.71"},{"date":"2012-12-24T21:14:23","version":"0.71_01"},{"date":"2012-12-28T15:03:57","version":"0.72"},{"date":"2013-11-13T15:18:55","version":"0.72_01"},{"version":"0.72_02","date":"2013-11-14T16:13:33"},{"date":"2013-11-18T10:49:23","version":"0.72_03"},{"date":"2013-11-19T21:52:50","version":"0.72_04"},{"date":"2013-11-29T13:35:08","version":"0.73"},{"version":"0.73_1","date":"2013-12-24T15:21:50"},{"date":"2014-01-02T20:32:27","version":"0.73_2"},{"version":"0.73_3","date":"2014-01-05T20:31:16"},{"date":"2014-01-12T10:25:24","version":"0.73_4"},{"version":"0.73_5","date":"2014-01-13T15:59:49"},{"version":"0.74","date":"2014-01-16T10:23:47"},{"date":"2014-03-03T21:33:39","version":"0.74_1"},{"version":"0.74_2","date":"2014-03-10T08:36:19"},{"date":"2014-04-03T21:00:45","version":"0.74_3"},{"version":"0.74_4","date":"2014-04-30T14:05:59"},{"date":"2014-05-05T06:05:46","version":"0.74_5"},{"date":"2014-05-06T09:22:01","version":"0.74_6"},{"date":"2014-05-08T09:54:21","version":"0.75"},{"version":"0.75_1","date":"2014-05-22T20:56:00"},{"date":"2014-05-23T22:26:56","version":"0.76"},{"version":"0.76_1","date":"2014-05-29T11:26:07"},{"version":"0.76_2","date":"2014-06-05T16:04:39"},{"date":"2014-06-13T08:31:32","version":"0.76_3"},{"date":"2014-06-13T21:57:13","version":"0.77"},{"date":"2014-07-02T09:53:03","version":"0.77_1"},{"version":"0.77_2","date":"2014-07-09T07:09:44"},{"version":"0.78","date":"2014-07-10T14:13:33"},{"date":"2014-07-30T21:41:25","version":"0.78_1"},{"date":"2014-08-12T22:13:54","version":"0.78_2"},{"version":"0.78_3","date":"2014-08-15T14:40:22"},{"date":"2014-08-19T13:24:46","version":"0.78_5"},{"date":"2014-08-22T22:29:13","version":"0.79"},{"date":"2014-09-11T11:42:35","version":"0.79_1"},{"date":"2014-09-15T14:51:32","version":"0.79_2"},{"date":"2014-09-22T11:51:22","version":"0.80"},{"version":"0.80_1","date":"2014-10-20T08:19:15"},{"version":"0.80_2","date":"2014-10-24T08:21:15"},{"date":"2014-10-29T13:44:16","version":"0.81"},{"date":"2015-01-05T10:22:06","version":"0.81_01"},{"version":"0.82","date":"2015-01-20T14:12:38"},{"version":"0.82_01","date":"2015-02-11T14:26:36"},{"date":"2015-02-18T11:05:47","version":"0.82_02"},{"date":"2015-02-26T15:48:06","version":"0.83"},{"version":"1.00_01","date":"2015-05-27T10:04:50"},{"date":"2015-06-11T17:23:10","version":"1.00_02"},{"date":"2015-06-15T10:02:08","version":"1.00_03"},{"version":"1.00_04","date":"2015-06-23T13:57:29"},{"version":"1.00_05","date":"2015-06-26T09:37:11"},{"date":"2015-06-29T17:15:06","version":"1.00_06"},{"version":"1.00_07","date":"2015-07-01T13:51:22"},{"date":"2015-07-02T08:17:44","version":"1.00_08"},{"version":"1.01","date":"2015-07-06T17:28:32"},{"date":"2015-08-26T20:44:25","version":"1.01_01"},{"version":"1.01_02","date":"2015-09-03T06:21:58"},{"date":"2015-09-04T20:39:37","version":"1.01_03"},{"version":"1.01_04","date":"2015-09-08T08:26:06"},{"date":"2015-09-11T11:49:24","version":"1.01_05"},{"version":"1.01_06","date":"2015-09-15T18:51:53"},{"date":"2015-09-16T10:25:09","version":"1.02"},{"version":"1.02_01","date":"2015-09-22T13:39:43"},{"date":"2015-10-05T08:30:03","version":"1.02_02"},{"date":"2015-10-06T20:39:36","version":"1.02_03"},{"date":"2015-10-08T21:24:29","version":"1.02_04"},{"date":"2015-10-13T07:30:39","version":"1.02_05"},{"date":"2015-10-14T12:44:57","version":"1.02_06"},{"version":"1.02_07","date":"2015-10-20T09:59:26"},{"date":"2015-10-23T08:32:04","version":"1.02_08"},{"date":"2015-10-27T16:07:21","version":"1.02_09"},{"version":"1.02_10","date":"2015-11-02T06:00:09"},{"version":"1.03","date":"2015-11-08T13:49:33"},{"version":"1.03_01","date":"2015-12-01T21:21:55"},{"version":"1.03_02","date":"2015-12-02T14:27:42"},{"version":"1.03_03","date":"2015-12-02T20:49:07"},{"date":"2015-12-08T20:41:10","version":"1.04"},{"date":"2016-02-01T16:26:27","version":"1.04_01"},{"version":"1.04_02","date":"2016-02-02T08:03:42"},{"version":"1.04_03","date":"2016-02-05T12:19:57"},{"date":"2016-02-29T12:32:53","version":"1.04_04"},{"date":"2016-03-07T21:11:01","version":"1.05"},{"date":"2016-03-21T13:15:38","version":"1.05_01"},{"version":"1.05_02","date":"2016-03-24T18:45:15"},{"date":"2016-04-04T21:53:54","version":"1.05_03"},{"version":"1.05_04","date":"2016-04-15T10:11:03"},{"version":"1.05_05","date":"2016-04-17T12:05:46"},{"date":"2016-05-11T08:58:51","version":"1.05_06"},{"version":"1.05_07","date":"2016-05-22T07:54:41"},{"version":"1.06","date":"2016-05-27T19:12:44"},{"date":"2016-06-22T08:54:06","version":"1.06_01"},{"date":"2016-08-24T11:36:13","version":"1.06_02"},{"version":"1.06_03","date":"2016-08-25T15:01:31"},{"version":"1.06_04","date":"2016-09-17T08:19:30"},{"date":"2016-11-12T03:24:33","version":"1.06_05"},{"version":"1.06_06","date":"2016-12-23T14:48:42"},{"date":"2016-12-29T17:16:20","version":"1.07"},{"version":"1.07_01","date":"2017-01-18T21:51:05"},{"date":"2017-01-27T10:44:03","version":"1.07_02"},{"version":"1.07_03","date":"2017-02-09T10:28:55"},{"version":"1.07_04","date":"2017-02-13T10:08:41"},{"date":"2017-02-20T11:12:45","version":"1.08"},{"date":"2017-03-06T09:33:06","version":"1.08_02"},{"date":"2017-03-13T10:02:22","version":"1.08_03"},{"date":"2017-03-22T09:48:52","version":"1.08_04"},{"date":"2017-03-24T07:00:36","version":"1.09"},{"date":"2017-04-19T13:10:57","version":"1.09_01"},{"date":"2017-05-05T22:21:10","version":"1.10"},{"version":"1.10_01","date":"2017-05-31T09:07:40"},{"version":"1.10_02","date":"2017-06-03T20:26:47"},{"date":"2017-06-12T12:03:07","version":"1.10_03"},{"version":"1.11","date":"2017-06-26T12:52:57"},{"version":"1.11_01","date":"2017-07-07T21:50:10"},{"version":"1.11_02","date":"2017-07-28T16:17:01"},{"version":"1.11_03","date":"2017-08-15T10:33:15"},{"date":"2017-08-17T12:48:08","version":"1.11_04"},{"version":"1.12","date":"2017-08-18T13:15:31"},{"version":"1.12_01","date":"2017-09-12T09:28:26"},{"date":"2017-10-06T09:07:45","version":"1.12_02"},{"date":"2017-10-10T14:42:38","version":"1.12_03"},{"date":"2017-10-18T09:49:20","version":"1.13"},{"date":"2017-11-30T11:11:55","version":"1.13_01"},{"version":"1.13_02","date":"2017-12-07T10:17:12"},{"date":"2017-12-15T12:34:59","version":"1.14"},{"date":"2018-01-31T10:11:39","version":"1.14_01"},{"date":"2018-02-01T14:14:07","version":"1.14_02"},{"date":"2018-02-09T11:42:14","version":"1.15"},{"version":"1.15_01","date":"2018-06-11T09:20:56"},{"date":"2018-06-14T10:46:39","version":"1.15_02"},{"date":"2018-07-03T09:05:15","version":"1.15_03"},{"version":"1.15_04","date":"2018-07-06T10:03:02"},{"date":"2018-07-16T04:56:07","version":"1.16"},{"date":"2018-07-20T16:22:38","version":"1.16_01"},{"date":"2018-07-24T15:35:14","version":"1.16_02"},{"version":"1.17","date":"2018-07-25T07:10:24"},{"version":"1.17_01","date":"2018-09-11T10:24:34"},{"date":"2018-09-11T15:32:52","version":"1.17_02"},{"version":"1.17_03","date":"2018-09-12T06:15:44"},{"version":"1.18","date":"2018-09-21T14:49:48"},{"version":"1.18_01","date":"2018-11-08T06:39:55"},{"date":"2018-11-15T06:02:14","version":"1.19"},{"date":"2018-12-31T12:23:28","version":"1.19_01"},{"version":"1.19_02","date":"2019-01-28T09:48:25"},{"version":"1.19_03","date":"2019-03-22T08:40:39"},{"date":"2019-03-22T14:13:56","version":"1.20"},{"version":"1.20_01","date":"2019-07-21T09:20:43"},{"date":"2019-07-23T14:51:08","version":"1.20_02"},{"date":"2019-08-21T13:49:42","version":"1.20_03"},{"date":"2019-08-30T08:37:40","version":"1.21"},{"date":"2020-02-02T21:54:31","version":"1.21_01"},{"version":"1.22","date":"2020-02-13T13:56:48"},{"version":"1.22_01","date":"2020-03-17T09:09:32"},{"version":"1.23","date":"2020-03-18T14:55:27"},{"version":"1.23_01","date":"2020-05-13T09:04:51"},{"date":"2020-05-27T12:47:25","version":"1.24"},{"date":"2020-06-19T10:52:05","version":"1.24_01"},{"date":"2020-06-23T13:07:04","version":"1.24_02"},{"version":"1.25","date":"2020-06-26T15:40:24"},{"version":"1.25_01","date":"2020-07-28T12:55:42"},{"version":"1.25_02","date":"2020-07-31T08:43:21"},{"date":"2020-08-06T15:55:03","version":"1.26"},{"date":"2020-08-31T13:51:53","version":"1.26_01"},{"version":"1.26_02","date":"2020-09-07T08:02:00"},{"date":"2020-09-11T18:53:08","version":"1.27"},{"date":"2020-10-08T22:00:15","version":"1.27_01"},{"version":"1.27_02","date":"2020-10-16T10:20:24"},{"date":"2020-10-19T08:09:59","version":"1.27_03"},{"date":"2020-10-23T16:53:49","version":"1.28"},{"version":"1.28_01","date":"2020-11-16T16:33:26"},{"version":"1.29","date":"2020-11-18T13:40:46"},{"date":"2020-12-24T15:37:27","version":"1.29_01"},{"version":"1.29_02","date":"2021-03-22T08:38:47"},{"date":"2021-03-28T09:38:33","version":"1.29_03"},{"date":"2021-03-30T10:06:50","version":"1.30"},{"version":"1.31","date":"2021-05-02T12:43:26"},{"version":"1.31_01","date":"2021-07-09T09:57:13"},{"version":"1.32","date":"2021-07-16T14:24:25"},{"date":"2021-08-11T10:07:26","version":"1.32_01"},{"date":"2021-12-08T10:42:13","version":"1.32_02"},{"date":"2021-12-16T12:22:39","version":"1.33"},{"date":"2022-05-21T10:05:03","version":"1.33_01"},{"version":"1.34","date":"2022-05-30T13:39:34"},{"version":"1.34_01","date":"2022-09-23T13:43:05"},{"date":"2022-10-04T13:44:45","version":"1.34_02"},{"version":"1.35","date":"2022-10-04T20:02:07"},{"version":"1.35_01","date":"2022-12-20T14:45:20"},{"version":"1.35_02","date":"2022-12-21T11:28:18"},{"version":"1.35_03","date":"2022-12-28T13:12:39"},{"date":"2022-12-30T15:53:37","version":"1.36"},{"version":"1.36_01","date":"2023-01-30T14:07:07"},{"version":"1.36_02","date":"2023-02-20T15:36:17"},{"date":"2023-03-06T12:19:36","version":"1.36_03"},{"date":"2023-03-13T18:06:16","version":"1.37"},{"date":"2023-03-30T19:26:05","version":"1.37_01"},{"date":"2023-04-17T12:34:49","version":"1.37_02"},{"version":"1.37_03","date":"2023-04-20T12:38:12"},{"version":"1.37_04","date":"2023-04-25T20:37:19"},{"date":"2023-05-09T10:50:45","version":"1.38"},{"version":"1.38_01","date":"2023-05-31T14:12:28"},{"version":"1.39","date":"2023-06-01T11:46:37"},{"version":"1.39_01","date":"2023-08-23T14:53:17"},{"date":"2023-08-25T12:50:35","version":"1.39_02"},{"date":"2023-08-30T18:16:07","version":"1.40"},{"date":"2023-11-22T08:42:22","version":"1.40_01"},{"version":"1.41","date":"2023-11-27T13:28:04"},{"date":"2023-12-24T15:48:59","version":"1.42"},{"version":"1.42_01","date":"2024-01-04T11:21:08"},{"version":"1.42_02","date":"2024-01-08T09:38:46"},{"version":"1.42_03","date":"2024-01-10T15:04:01"},{"date":"2024-01-17T09:07:40","version":"1.42_04"},{"version":"1.42_05","date":"2024-01-25T11:08:34"},{"version":"1.43","date":"2024-01-26T14:54:33"},{"date":"2024-02-14T09:22:32","version":"1.43_01"},{"date":"2024-02-15T13:03:57","version":"1.44"},{"date":"2024-04-21T08:24:10","version":"1.44_01"},{"version":"1.45","date":"2024-05-02T11:03:24"},{"date":"2024-07-26T03:56:44","version":"1.45_01"},{"version":"1.45_02","date":"2024-08-12T09:53:41"},{"version":"1.46","date":"2024-08-19T15:12:15"},{"date":"2024-09-18T20:46:06","version":"1.47"},{"date":"2024-11-07T14:13:26","version":"1.47_01"},{"date":"2024-11-08T13:27:46","version":"1.48"},{"date":"2024-12-16T13:43:49","version":"1.48_01"},{"version":"1.48_02","date":"2024-12-18T14:24:48"},{"date":"2024-12-27T13:12:51","version":"1.49"},{"version":"1.49_01","date":"2025-01-02T16:36:47"},{"date":"2025-01-29T09:05:23","version":"1.49_02"},{"version":"1.49_03","date":"2025-02-08T16:50:50"},{"version":"1.49_04","date":"2025-02-10T13:49:02"},{"version":"1.49_05","date":"2025-02-11T15:56:15"},{"date":"2025-02-21T08:48:19","version":"1.50"}]},"XML-DT":{"main_module":"XML::DT","advisories":[{"affected_versions":["<0.64"],"fixed_versions":[],"description":"The (1) mkxmltype and (2) mkdtskel scripts in XML-DT before 0.64 allow local users to overwrite arbitrary files via a symlink attack on a /tmp/_xml_##### temporary file.\n","id":"CPANSA-XML-DT-2014-5260","reported":"2014-08-16","references":["http://openwall.com/lists/oss-security/2014/08/15/8","https://metacpan.org/diff/file?target=AMBS/XML-DT-0.64/&source=AMBS/XML-DT-0.63/","https://metacpan.org/source/AMBS/XML-DT-0.66/Changes","https://bugs.debian.org/756566"],"distribution":"XML-DT","severity":null,"cves":["CVE-2014-5260"]}],"versions":[{"version":"0.11","date":"1999-07-30T13:04:11"},{"date":"2000-04-07T09:24:55","version":"0.14"},{"version":"0.15","date":"2000-09-19T17:03:40"},{"version":"0.16","date":"2000-10-16T16:21:54"},{"version":"0.19","date":"2000-11-30T12:37:27"},{"date":"2002-03-07T17:54:06","version":"0.20"},{"date":"2002-05-28T12:35:07","version":"0.21"},{"version":"0.22","date":"2002-12-20T17:31:58"},{"version":"0.23","date":"2002-12-27T09:10:47"},{"version":"0.24","date":"2003-02-20T16:16:43"},{"version":"v0.24.1","date":"2003-06-17T10:15:16"},{"version":"0.25","date":"2003-10-09T08:12:32"},{"date":"2003-10-13T07:47:22","version":"0.25"},{"date":"2003-11-14T10:55:50","version":"0.27"},{"version":"0.28","date":"2003-12-16T14:25:13"},{"version":"0.29","date":"2004-01-07T11:38:24"},{"version":"0.30","date":"2004-01-22T11:25:21"},{"date":"2004-08-09T17:43:41","version":"0.31"},{"version":"0.32","date":"2004-09-20T19:15:56"},{"date":"2004-10-03T19:21:18","version":"0.33"},{"version":"0.34","date":"2004-10-30T14:43:29"},{"version":"0.35","date":"2004-11-15T16:39:19"},{"date":"2004-11-19T17:29:05","version":"0.36"},{"date":"2004-11-21T16:27:45","version":"0.37"},{"version":"0.38","date":"2004-12-24T16:34:24"},{"version":"0.39","date":"2005-03-22T12:05:18"},{"date":"2005-04-06T08:14:46","version":"0.40"},{"version":"0.41","date":"2005-07-20T20:28:06"},{"version":"0.42","date":"2005-09-18T16:06:11"},{"version":"0.43","date":"2006-05-15T09:08:21"},{"version":"0.44","date":"2006-05-15T09:33:07"},{"date":"2006-05-16T14:14:36","version":"0.45"},{"version":"0.46","date":"2006-11-03T09:39:12"},{"version":"0.47","date":"2006-11-23T18:14:09"},{"date":"2008-02-20T22:00:02","version":"0.48"},{"version":"0.49","date":"2008-02-20T22:16:45"},{"date":"2008-02-21T22:02:53","version":"0.50"},{"date":"2008-02-22T17:19:12","version":"0.51"},{"version":"0.52","date":"2008-10-22T09:12:08"},{"version":"0.53","date":"2009-01-18T20:10:36"},{"version":"0.54","date":"2010-11-19T16:27:23"},{"date":"2011-02-12T22:08:27","version":"0.55"},{"date":"2011-02-12T22:09:55","version":"0.56"},{"date":"2012-04-07T20:30:58","version":"0.57"},{"version":"0.58","date":"2012-04-09T10:19:15"},{"date":"2012-06-05T13:37:08","version":"0.59"},{"version":"0.60","date":"2012-06-25T16:57:54"},{"date":"2012-06-25T17:04:58","version":"0.61"},{"date":"2012-06-25T19:02:40","version":"0.62"},{"version":"0.63","date":"2013-03-25T22:27:48"},{"version":"0.64","date":"2014-07-31T19:46:44"},{"date":"2014-08-01T13:00:43","version":"0.65"},{"date":"2014-08-15T20:17:39","version":"0.66"},{"date":"2015-03-15T18:28:49","version":"0.67"},{"date":"2015-09-29T08:06:14","version":"0.68"},{"date":"2019-04-22T17:01:30","version":"0.69"}]},"Crypt-DSA":{"versions":[{"version":"0.02","date":"2001-03-24T01:21:08"},{"version":"0.03","date":"2001-04-07T07:44:41"},{"version":"0.10","date":"2001-04-23T00:09:38"},{"date":"2001-05-02T23:26:09","version":"0.11"},{"version":"0.12","date":"2001-05-04T06:12:08"},{"date":"2005-05-26T16:19:59","version":"0.13"},{"version":"0.14","date":"2006-05-08T18:43:01"},{"version":"0.15_01","date":"2009-08-19T11:11:31"},{"date":"2009-09-11T12:47:36","version":"1.16"},{"version":"1.17","date":"2011-06-17T01:49:57"},{"date":"2024-12-04T04:25:53","version":"1.18"},{"version":"1.18","date":"2024-12-04T13:54:34"},{"date":"2024-12-04T14:50:02","version":"1.19"}],"advisories":[{"affected_versions":["<1.18"],"description":"The Crypt::DSA (aka Crypt-DSA) module 1.17 and earlier for Perl, when /dev/random is absent, uses the Data::Random module, which makes it easier for remote attackers to spoof a signature, or determine the signing key of a signed message, via a brute-force attack.\n","fixed_versions":[],"id":"CPANSA-Crypt-DSA-2011-3599","reported":"2011-10-10","references":["https://rt.cpan.org/Public/Bug/Display.html?id=71421","https://bugzilla.redhat.com/show_bug.cgi?id=743567","http://www.openwall.com/lists/oss-security/2011/10/05/9","http://www.openwall.com/lists/oss-security/2011/10/05/5","http://secunia.com/advisories/46275","http://www.securityfocus.com/bid/49928","http://osvdb.org/76025"],"distribution":"Crypt-DSA","severity":null,"cves":["CVE-2011-3599"]}],"main_module":"Crypt::DSA"},"PathTools":{"main_module":"Cwd","advisories":[{"affected_versions":["<3.65"],"fixed_versions":[">=3.65"],"description":"Does not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.\n","id":"CPANSA-PathTools-2016-02","cves":["CVE-2016-1238"],"references":["https://metacpan.org/changes/distribution/PathTools"],"reported":"2016-02-08","distribution":"PathTools"},{"fixed_versions":[">=3.62"],"description":"Does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.\n","affected_versions":["<3.62"],"reported":"2016-01-11","references":["https://metacpan.org/changes/distribution/PathTools"],"distribution":"PathTools","cves":["CVE-2015-8607"],"id":"CPANSA-PathTools-2016-01"}],"versions":[{"version":"3.00","date":"2004-09-03T03:40:00"},{"date":"2004-09-07T03:39:26","version":"3.01"},{"date":"2004-11-19T04:26:35","version":"3.01_01"},{"version":"3.01_02","date":"2004-11-29T04:20:10"},{"version":"3.01_03","date":"2004-11-30T02:34:46"},{"date":"2005-01-10T01:33:05","version":"3.02"},{"version":"3.03","date":"2005-01-22T03:59:59"},{"version":"3.04","date":"2005-02-07T00:28:43"},{"version":"3.05","date":"2005-02-28T13:27:37"},{"version":"3.06","date":"2005-04-14T02:06:10"},{"version":"3.07","date":"2005-05-06T12:50:38"},{"version":"3.08","date":"2005-05-28T15:13:27"},{"date":"2005-06-15T23:45:19","version":"3.09"},{"version":"3.10","date":"2005-08-26T03:29:11"},{"version":"3.11","date":"2005-08-28T01:16:38"},{"date":"2005-10-04T03:14:00","version":"3.12"},{"date":"2005-11-16T05:58:53","version":"3.13"},{"version":"3.14","date":"2005-11-18T00:15:37"},{"date":"2005-12-10T04:51:57","version":"3.14_01"},{"version":"3.14_02","date":"2005-12-14T05:11:27"},{"date":"2005-12-27T20:32:26","version":"3.15"},{"version":"3.16","date":"2006-01-31T02:52:07"},{"version":"3.17","date":"2006-03-03T22:55:18"},{"version":"3.18","date":"2006-04-28T03:04:00"},{"date":"2006-07-12T03:43:15","version":"3.19"},{"date":"2006-10-05T02:18:51","version":"3.21"},{"version":"3.22","date":"2006-10-10T02:53:23"},{"date":"2006-10-11T17:13:59","version":"3.23"},{"version":"3.24","date":"2006-11-20T04:53:56"},{"date":"2007-05-22T02:08:53","version":"3.25"},{"version":"3.25_01","date":"2007-10-14T02:15:40"},{"date":"2007-12-25T02:34:28","version":"3.2501"},{"date":"2008-01-14T12:02:28","version":"3.26"},{"date":"2008-01-15T23:27:33","version":"3.26_01"},{"version":"3.27","date":"2008-01-17T02:21:47"},{"date":"2008-02-12T03:46:01","version":"3.2701"},{"version":"3.28_01","date":"2008-07-26T02:19:45"},{"date":"2008-10-27T19:27:37","version":"3.28_02"},{"date":"2008-10-27T21:16:35","version":"3.28_03"},{"version":"3.29","date":"2008-10-29T20:11:52"},{"version":"3.29_01","date":"2009-05-07T18:27:46"},{"version":"3.30","date":"2009-05-10T08:59:46"},{"date":"2009-09-21T12:46:15","version":"3.30_01"},{"date":"2009-09-29T06:22:30","version":"3.30_02"},{"date":"2009-11-01T14:22:36","version":"3.31"},{"version":"3.31_02","date":"2010-07-23T08:10:31"},{"version":"3.31_03","date":"2010-09-17T13:24:05"},{"version":"3.32","date":"2010-09-19T15:53:14"},{"date":"2010-09-20T07:54:00","version":"3.33"},{"date":"2011-12-20T07:42:29","version":"3.39_01"},{"date":"2013-01-16T06:35:08","version":"3.40"},{"version":"3.46_01","date":"2014-05-01T18:34:31"},{"version":"3.47","date":"2014-05-23T17:00:38"},{"date":"2015-07-11T22:18:08","version":"3.56_01"},{"version":"3.56_02","date":"2015-07-16T15:33:27"},{"date":"2015-11-09T22:09:25","version":"3.58_01"},{"version":"3.59","date":"2015-11-13T23:46:00"},{"version":"3.60","date":"2015-11-19T02:32:50"},{"version":"3.62","date":"2016-01-11T13:49:31"},{"version":"3.73","date":"2018-02-18T20:27:27"},{"date":"2018-02-19T08:41:14","version":"3.74"},{"version":"3.75","date":"2018-08-29T19:53:19"},{"version":null,"perl_release":"5","date":"1994-10-17T00:00:00","dual_lived":1},{"dual_lived":1,"date":"1997-05-15T00:00:00","perl_release":"5.004","version":"2.00"},{"dual_lived":1,"date":"1999-04-29T00:00:00","version":"2.01","perl_release":"5.00405"},{"date":"2000-03-22T00:00:00","dual_lived":1,"version":"2.02","perl_release":"5.006"},{"dual_lived":1,"date":"2001-04-08T00:00:00","version":"2.04","perl_release":"5.006001"},{"version":"2.06","perl_release":"5.007003","dual_lived":1,"date":"2002-03-05T00:00:00"},{"perl_release":"5.008001","version":"2.08","dual_lived":1,"date":"2003-09-25T00:00:00"},{"version":"2.12","perl_release":"5.008003","dual_lived":1,"date":"2004-01-14T00:00:00"},{"perl_release":"5.008004","version":"2.17","dual_lived":1,"date":"2004-04-21T00:00:00"},{"perl_release":"5.008005","version":"2.19","date":"2004-07-19T00:00:00","dual_lived":1},{"version":"3.3002","perl_release":"5.011000","date":"2009-10-02T00:00:00","dual_lived":1},{"perl_release":"5.013006","version":"3.34","date":"2010-10-20T00:00:00","dual_lived":1},{"version":"3.35","perl_release":"5.013008","dual_lived":1,"date":"2010-12-20T00:00:00"},{"perl_release":"5.013009","version":"3.36","dual_lived":1,"date":"2011-01-20T00:00:00"},{"version":"3.37","perl_release":"5.013010","date":"2011-02-20T00:00:00","dual_lived":1},{"version":"3.38","perl_release":"5.015006","date":"2011-12-20T00:00:00","dual_lived":1},{"version":"3.39_02","perl_release":"5.015008","dual_lived":1,"date":"2012-02-20T00:00:00"},{"perl_release":"5.017007","version":"3.39_03","dual_lived":1,"date":"2012-12-18T00:00:00"},{"version":"3.41","perl_release":"5.019001","date":"2013-06-21T00:00:00","dual_lived":1},{"version":"3.44","perl_release":"5.019003","dual_lived":1,"date":"2013-08-20T00:00:00"},{"date":"2013-10-20T00:00:00","dual_lived":1,"version":"3.45","perl_release":"5.019005"},{"date":"2014-09-14T00:00:00","dual_lived":1,"perl_release":"5.020001","version":"3.48"},{"dual_lived":1,"date":"2015-02-14T00:00:00","version":"3.48_01","perl_release":"5.020002"},{"version":"3.49","perl_release":"5.021002","date":"2014-07-20T00:00:00","dual_lived":1},{"perl_release":"5.021004","version":"3.50","dual_lived":1,"date":"2014-09-20T00:00:00"},{"dual_lived":1,"date":"2014-10-20T00:00:00","perl_release":"5.021005","version":"3.51"},{"date":"2014-12-20T00:00:00","dual_lived":1,"perl_release":"5.021007","version":"3.54"},{"perl_release":"5.02101","version":"3.55","dual_lived":1,"date":"2015-03-20T00:00:00"},{"date":"2015-04-20T00:00:00","dual_lived":1,"version":"3.56","perl_release":"5.021011"},{"dual_lived":1,"date":"2015-08-20T00:00:00","version":"3.57","perl_release":"5.023002"},{"version":"3.58","perl_release":"5.023003","date":"2015-09-20T00:00:00","dual_lived":1},{"date":"2016-02-20T00:00:00","dual_lived":1,"perl_release":"5.023008","version":"3.63"},{"dual_lived":1,"date":"2017-01-14T00:00:00","version":"3.63_01","perl_release":"5.024001"},{"date":"2016-06-20T00:00:00","dual_lived":1,"perl_release":"5.025002","version":"3.64"},{"version":"3.65","perl_release":"5.025004","dual_lived":1,"date":"2016-08-20T00:00:00"},{"dual_lived":1,"date":"2016-11-20T00:00:00","version":"3.66","perl_release":"5.025007"},{"version":"3.67","perl_release":"5.025011","dual_lived":1,"date":"2017-03-20T00:00:00"},{"version":"3.68","perl_release":"5.027002","date":"2017-07-20T00:00:00","dual_lived":1},{"dual_lived":1,"date":"2017-11-20T00:00:00","version":"3.70","perl_release":"5.027006"},{"dual_lived":1,"date":"2017-12-20T00:00:00","perl_release":"5.027007","version":"3.71"},{"version":"3.72","perl_release":"5.027008","dual_lived":1,"date":"2018-01-20T00:00:00"},{"perl_release":"5.029005","version":"3.76","date":"2018-11-20T00:00:00","dual_lived":1},{"version":"3.77","perl_release":"5.029007","dual_lived":1,"date":"2019-01-20T00:00:00"},{"dual_lived":1,"date":"2019-04-20T00:00:00","perl_release":"5.02901","version":"3.78"},{"version":"3.79","perl_release":"5.033004","dual_lived":1,"date":"2020-11-20T00:00:00"},{"perl_release":"5.033005","version":"3.80","date":"2020-12-20T00:00:00","dual_lived":1},{"date":"2021-06-20T00:00:00","dual_lived":1,"version":"3.81","perl_release":"5.035001"},{"dual_lived":1,"date":"2021-07-23T00:00:00","perl_release":"5.035002","version":"3.82"},{"version":"3.83","perl_release":"5.035007","date":"2021-12-20T00:00:00","dual_lived":1},{"perl_release":"5.03501","version":"3.84","date":"2022-03-20T00:00:00","dual_lived":1},{"version":"3.85","perl_release":"5.037001","dual_lived":1,"date":"2022-06-20T00:00:00"},{"version":"3.86","perl_release":"5.037002","date":"2022-07-20T00:00:00","dual_lived":1},{"perl_release":"5.037007","version":"3.88","date":"2022-12-20T00:00:00","dual_lived":1},{"date":"2023-03-20T00:00:00","dual_lived":1,"perl_release":"5.037010","version":"3.89"},{"version":"3.90","perl_release":"5.039002","dual_lived":1,"date":"2023-08-20T00:00:00"}]},"DBD-MariaDB":{"main_module":"DBD::MariaDB","versions":[{"date":"2018-06-26T14:23:29","version":"0.90_01"},{"version":"1.00","date":"2018-07-12T13:36:05"},{"version":"1.10","date":"2018-12-05T12:21:26"},{"date":"2019-01-02T15:38:57","version":"1.11"},{"version":"1.20","date":"2019-02-22T16:31:33"},{"version":"1.21","date":"2019-02-27T11:08:40"},{"version":"1.22","date":"2022-04-21T23:16:33"},{"version":"1.23","date":"2023-09-10T14:27:09"}],"advisories":[{"id":"CPANSA-DBD-MariaDB-2018-01","reported":"2017-07-01","references":["https://metacpan.org/changes/distribution/DBD-MariaDB"],"distribution":"DBD-MariaDB","cves":["CVE-2018-2767"],"affected_versions":["<1.00"],"description":"SSL problems of MySQL and MariaDB clients.\n","fixed_versions":[">=1.00"]},{"reported":"2017-07-01","references":["https://metacpan.org/changes/distribution/DBD-MariaDB"],"distribution":"DBD-MariaDB","cves":["CVE-2017-10788"],"id":"CPANSA-DBD-MariaDB-2017-02","description":"Use-after-free after calling mysql_stmt_close().\n","fixed_versions":[">=1.00"],"affected_versions":["<1.00"]},{"cves":["CVE-2017-3302"],"reported":"2017-07-01","references":["https://metacpan.org/changes/distribution/DBD-MariaDB"],"distribution":"DBD-MariaDB","id":"CPANSA-DBD-MariaDB-2017-01","description":"Leaking dangling pointers.\n","fixed_versions":[">=1.00"],"affected_versions":["<1.00"]}]},"Devel-PPPort":{"main_module":"Devel::PPPort","advisories":[{"affected_versions":["<3.41"],"description":"Function croak() takes first parameter printf-like format. Arbitrary string from the variable $@ can cause perl crash when contains one or more '%'.\n","fixed_versions":[">=3.41"],"id":"CPANSA-Devel-PPPort-2017-01","distribution":"Devel-PPPort","reported":"2017-02-14","references":["https://metacpan.org/dist/Devel-PPPort/changes","https://github.com/Dual-Life/Devel-PPPort/pull/47"],"cves":[],"severity":null}],"versions":[{"date":"1999-03-01T05:05:50","version":"1.0004"},{"date":"1999-03-08T02:57:01","version":"1.0005"},{"version":"1.0006","date":"1999-03-24T16:17:40"},{"version":"1.0007","date":"1999-03-29T16:29:09"},{"version":"2.99_01","date":"2004-08-07T14:09:53"},{"date":"2004-08-08T17:24:46","version":"2.99_02"},{"date":"2004-08-09T20:40:45","version":"2.99_03"},{"date":"2004-08-10T21:37:23","version":"2.99_04"},{"version":"2.99_05","date":"2004-08-10T21:52:34"},{"date":"2004-08-11T21:14:33","version":"2.99_06"},{"version":"2.99_07","date":"2004-08-13T11:05:16"},{"version":"3.00","date":"2004-08-16T09:37:21"},{"date":"2004-08-17T21:45:21","version":"3.00_01"},{"date":"2004-08-19T11:23:25","version":"3.00_02"},{"version":"3.00_03","date":"2004-08-20T13:31:59"},{"version":"3.01","date":"2004-08-23T05:52:31"},{"version":"3.02","date":"2004-09-08T19:25:27"},{"date":"2004-09-08T20:39:17","version":"3.03"},{"date":"2004-12-29T14:03:53","version":"3.04"},{"date":"2005-01-31T18:29:11","version":"3.05"},{"date":"2005-02-02T21:53:39","version":"3.06"},{"version":"3.06_01","date":"2005-06-25T16:59:34"},{"date":"2005-10-18T19:59:34","version":"3.06_02"},{"date":"2005-10-18T21:43:58","version":"3.06_03"},{"version":"3.06_04","date":"2005-10-30T11:10:01"},{"date":"2006-01-16T18:10:31","version":"3.07"},{"version":"3.08","date":"2006-01-19T18:40:04"},{"version":"3.08_01","date":"2006-05-20T11:11:00"},{"date":"2006-05-22T11:17:01","version":"3.08_02"},{"version":"3.08_03","date":"2006-05-25T15:33:51"},{"date":"2006-05-29T17:44:18","version":"3.08_04"},{"version":"3.08_05","date":"2006-06-23T19:00:30"},{"version":"3.08_06","date":"2006-06-25T08:09:51"},{"version":"3.08_07","date":"2006-07-03T21:36:39"},{"version":"3.09","date":"2006-07-08T16:22:49"},{"date":"2006-07-21T17:25:17","version":"3.09_01"},{"version":"3.09_02","date":"2006-07-25T18:45:27"},{"version":"3.10","date":"2006-08-14T19:31:33"},{"date":"2006-12-02T16:26:47","version":"3.10_01"},{"version":"3.10_02","date":"2006-12-02T17:23:57"},{"version":"3.11","date":"2007-02-14T13:10:03"},{"date":"2007-03-23T17:09:16","version":"3.11_01"},{"date":"2007-08-12T23:08:25","version":"3.11_02"},{"version":"3.11_03","date":"2007-08-14T19:14:20"},{"date":"2007-08-20T16:31:23","version":"3.11_04"},{"version":"3.11_05","date":"2007-08-20T17:29:16"},{"date":"2007-09-11T21:41:31","version":"3.11_06"},{"version":"3.12","date":"2007-09-22T08:00:55"},{"version":"3.13","date":"2007-10-04T10:33:11"},{"date":"2008-01-04T14:09:17","version":"3.13_01"},{"date":"2008-04-13T13:11:47","version":"3.13_02"},{"date":"2008-05-13T19:07:49","version":"3.13_03"},{"date":"2008-06-01T12:08:17","version":"3.14"},{"date":"2008-07-11T20:42:44","version":"3.14_01"},{"version":"3.14_02","date":"2008-10-12T19:49:45"},{"version":"3.14_03","date":"2008-10-21T21:20:59"},{"version":"3.14_04","date":"2008-10-30T18:55:01"},{"version":"3.14_05","date":"2008-10-31T07:20:25"},{"version":"3.15","date":"2009-01-18T13:49:22"},{"version":"3.16","date":"2009-01-23T17:33:31"},{"version":"3.17","date":"2009-03-15T15:45:38"},{"version":"3.18","date":"2009-06-12T11:05:52"},{"date":"2009-06-12T11:25:31","version":"3.18_01"},{"date":"2009-06-14T09:59:59","version":"3.19"},{"version":"3.19_01","date":"2010-02-20T18:48:07"},{"version":"3.19_02","date":"2010-03-07T12:51:00"},{"date":"2011-04-13T07:49:49","version":"3.19_03"},{"date":"2011-09-10T19:32:27","version":"3.20"},{"date":"2013-08-17T13:27:59","version":"3.21"},{"version":"3.22","date":"2014-03-20T02:17:15"},{"version":"3.23","date":"2014-04-13T00:04:17"},{"date":"2014-05-09T00:15:50","version":"3.24"},{"date":"2014-12-02T13:08:04","version":"3.25"},{"date":"2015-01-08T02:42:03","version":"3.26"},{"date":"2015-01-13T15:02:40","version":"3.27"},{"date":"2015-01-16T12:33:46","version":"3.28"},{"version":"3.29","date":"2015-03-05T13:22:18"},{"version":"3.30","date":"2015-03-05T20:29:10"},{"date":"2015-03-12T14:27:15","version":"3.31"},{"date":"2015-09-30T16:31:45","version":"3.32"},{"date":"2016-05-06T11:01:12","version":"3.32_01"},{"version":"3.32_02","date":"2016-05-24T13:59:25"},{"version":"3.33","date":"2016-06-03T13:47:32"},{"date":"2016-06-12T23:09:20","version":"3.34"},{"version":"3.35","date":"2016-06-17T18:22:04"},{"date":"2017-05-14T08:53:44","version":"3.36"},{"date":"2018-04-21T12:18:05","version":"3.41"},{"date":"2018-04-21T14:45:37","version":"3.42"},{"version":"3.43","date":"2018-09-19T14:47:44"},{"date":"2018-10-12T17:16:24","version":"3.43_04"},{"date":"2019-02-20T23:05:14","version":"3.44"},{"date":"2019-03-19T20:55:38","version":"3.45"},{"version":"3.46","date":"2019-04-26T19:50:59"},{"version":"3.47","date":"2019-04-28T05:30:49"},{"version":"3.48","date":"2019-04-28T21:43:34"},{"version":"3.48","date":"2019-04-28T21:57:51"},{"date":"2019-04-29T17:48:49","version":"3.49"},{"date":"2019-04-30T19:05:34","version":"3.50"},{"date":"2019-04-30T23:09:43","version":"3.51"},{"version":"3.52","date":"2019-05-14T17:18:17"},{"date":"2019-06-09T16:13:03","version":"3.52_04"},{"date":"2019-06-11T07:57:30","version":"3.53_04"},{"version":"3.53","date":"2019-09-28T00:25:55"},{"version":"3.54","date":"2019-09-28T00:35:17"},{"version":"3.55","date":"2019-11-07T21:15:22"},{"version":"3.56","date":"2019-11-25T17:04:32"},{"date":"2020-01-31T20:46:51","version":"3.57"},{"date":"2020-02-10T22:15:17","version":"3.57_01"},{"date":"2020-03-04T21:32:50","version":"3.57_02"},{"date":"2020-03-09T20:42:29","version":"3.58"},{"date":"2020-08-06T22:31:34","version":"3.58_01"},{"date":"2020-08-10T16:51:52","version":"3.59"},{"date":"2020-08-11T19:44:32","version":"3.60"},{"version":"3.60_01","date":"2020-09-30T23:22:16"},{"date":"2020-10-07T14:59:47","version":"3.60_02"},{"date":"2020-10-12T23:25:45","version":"3.61"},{"version":"3.62","date":"2020-10-16T20:01:45"},{"version":"3.63","date":"2021-07-07T00:08:28"},{"version":"3.64","date":"2022-02-01T18:16:40"},{"date":"2022-03-02T22:12:02","version":"3.65"},{"date":"2022-03-02T22:41:01","version":"3.66"},{"version":"3.67","date":"2022-03-08T19:25:43"},{"date":"2022-03-18T22:08:30","version":"3.68"},{"version":"2.0002","perl_release":"5.007003","dual_lived":1,"date":"2002-03-05T00:00:00"},{"version":"2.007","perl_release":"5.008001","dual_lived":1,"date":"2003-09-25T00:00:00"},{"dual_lived":1,"date":"2003-11-05T00:00:00","version":"2.009","perl_release":"5.008002"},{"date":"2004-01-14T00:00:00","dual_lived":1,"version":"2.011","perl_release":"5.008003"},{"dual_lived":1,"date":"2003-10-27T00:00:00","perl_release":"5.009","version":"2.008"},{"date":"2004-03-16T00:00:00","dual_lived":1,"version":"2.011_01","perl_release":"5.009001"},{"dual_lived":1,"date":"2017-12-20T00:00:00","version":"3.37","perl_release":"5.027007"},{"version":"3.38","perl_release":"5.027008","dual_lived":1,"date":"2018-01-20T00:00:00"},{"dual_lived":1,"date":"2018-02-20T00:00:00","version":"3.39","perl_release":"5.027009"},{"dual_lived":1,"date":"2018-04-20T00:00:00","perl_release":"5.027011","version":"3.40"},{"date":"2022-11-20T00:00:00","dual_lived":1,"version":"3.69","perl_release":"5.037006"},{"date":"2023-02-20T00:00:00","dual_lived":1,"version":"3.70","perl_release":"5.037009"},{"version":"3.71","perl_release":"5.037011","dual_lived":1,"date":"2023-04-20T00:00:00"},{"perl_release":"5.039003","version":"3.72","dual_lived":1,"date":"2023-09-20T00:00:00"}]},"HTTP-Daemon":{"advisories":[{"id":"CPANSA-HTTP-Daemon-2022-31081","severity":"medium","cves":["CVE-2022-31081"],"reported":"2022-06-27","references":["https://github.com/libwww-perl/HTTP-Daemon/commit/e84475de51d6fd7b29354a997413472a99db70b2","https://github.com/libwww-perl/HTTP-Daemon/commit/8dc5269d59e2d5d9eb1647d82c449ccd880f7fd0","https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn","https://datatracker.ietf.org/doc/html/rfc7230#section-9.5","https://github.com/libwww-perl/HTTP-Daemon/security/advisories/GHSA-cg8c-pxmv-w7cf","http://metacpan.org/release/HTTP-Daemon/","https://cwe.mitre.org/data/definitions/444.html","https://github.com/libwww-perl/HTTP-Daemon/issues/56","https://github.com/NixOS/nixpkgs/pull/181632"],"distribution":"HTTP-Daemon","affected_versions":["<6.15"],"fixed_versions":[">=6.15"],"description":"HTTP::Daemon is a simple http server class written in perl. Versions prior to 6.15 are subject to a vulnerability which could potentially be exploited to gain privileged access to APIs or poison intermediate caches. It is uncertain how large the risks are, most Perl based applications are served on top of Nginx or Apache, not on the `HTTP::Daemon`. This library is commonly used for local development and tests. Users are advised to update to resolve this issue. Users unable to upgrade may add additional request handling logic as a mitigation. After calling `my $rqst = $conn->get_request()` one could inspect the returned `HTTP::Request` object. Querying the 'Content-Length' (`my $cl = $rqst->header('Content-Length')`) will show any abnormalities that should be dealt with by a `400` response. Expected strings of 'Content-Length' SHOULD consist of either a single non-negative integer, or, a comma separated repetition of that number. (that is `42` or `42, 42, 42`). Anything else MUST be rejected.\n"}],"versions":[{"version":"6.00","date":"2011-02-27T22:49:28"},{"date":"2012-02-18T12:26:43","version":"6.01"},{"date":"2019-04-01T16:05:05","version":"6.02"},{"date":"2019-04-01T20:58:35","version":"6.03"},{"version":"6.04","date":"2019-04-02T13:12:12"},{"version":"6.05","date":"2019-07-26T20:42:43"},{"date":"2019-08-29T14:24:33","version":"6.06"},{"version":"6.07","date":"2020-05-19T19:20:38"},{"version":"6.08","date":"2020-05-22T15:27:22"},{"version":"6.09","date":"2020-05-25T16:53:41"},{"version":"6.10","date":"2020-05-26T16:22:18"},{"version":"6.11","date":"2020-06-03T14:48:37"},{"version":"6.12","date":"2020-06-04T16:03:28"},{"version":"6.13","date":"2022-02-09T20:41:36"},{"date":"2022-03-03T20:49:07","version":"6.14"},{"version":"6.15","date":"2023-02-22T22:03:32"},{"version":"6.16","date":"2023-02-24T03:09:01"}],"main_module":"HTTP::Daemon"},"Apache-SessionX":{"main_module":"Apache::SessionX","advisories":[{"id":"CPANSA-Apache-SessionX-2005-01","cves":[],"reported":"2005-11-15","references":["https://metacpan.org/changes/distribution/Apache-SessionX"],"distribution":"Apache-SessionX","affected_versions":["<2.01"],"fixed_versions":[">=2.01"],"description":"Problem in session_id validation, which allows creation of session with invalid ids.\n"}],"versions":[{"date":"2001-11-20T15:36:53","version":"2.00"},{"version":"2.00","date":"2003-03-02T14:18:57"},{"date":"2005-11-15T05:21:49","version":"2.01"}]},"CGI-Simple":{"versions":[{"version":"0.078","date":"2007-01-09T22:31:27"},{"date":"2007-02-23T16:22:19","version":"0.079"},{"date":"2007-03-30T20:15:35","version":"0.080"},{"date":"2007-05-20T19:19:40","version":"0.081"},{"date":"2007-05-22T18:43:01","version":"0.082"},{"version":"0.83","date":"2007-05-22T18:54:06"},{"version":"1.0","date":"2007-05-24T03:15:01"},{"date":"2007-07-13T18:58:16","version":"1.1"},{"date":"2007-07-31T01:57:01","version":"1.1.1"},{"version":"1.1.2","date":"2007-07-31T02:04:25"},{"date":"2007-07-31T02:10:47","version":"1.103"},{"version":"1.104","date":"2008-05-13T15:46:18"},{"version":"1.105","date":"2008-05-16T14:37:31"},{"date":"2008-09-14T13:29:51","version":"1.106"},{"version":"1.107","date":"2009-03-07T21:24:59"},{"date":"2009-03-13T14:06:24","version":"1.108"},{"date":"2009-04-16T17:54:13","version":"1.109"},{"version":"1.110","date":"2009-05-24T21:25:22"},{"date":"2009-05-28T18:02:08","version":"1.111"},{"version":"1.112","date":"2009-05-31T10:43:56"},{"date":"2010-12-27T13:11:56","version":"1.113"},{"date":"2014-10-19T12:53:24","version":"1.115"},{"version":"1.13","date":"2018-03-01T15:09:42"},{"version":"1.14","date":"2018-03-03T10:42:06"},{"date":"2018-03-04T03:42:20","version":"1.15"},{"date":"2018-07-25T15:17:39","version":"1.16"},{"date":"2018-10-02T09:48:08","version":"1.17"},{"date":"2018-10-03T14:21:12","version":"1.18"},{"version":"1.19","date":"2018-10-04T12:05:58"},{"date":"2018-10-05T11:30:05","version":"1.20"},{"date":"2018-10-06T07:21:31","version":"1.21"},{"version":"1.22","date":"2019-09-07T04:28:17"},{"version":"1.23","date":"2020-02-06T06:12:09"},{"version":"1.24","date":"2020-02-07T11:11:56"},{"date":"2020-02-10T13:00:54","version":"1.25"},{"version":"1.26","date":"2022-01-02T18:00:56"},{"version":"1.27","date":"2022-01-06T16:00:18"},{"version":"1.280","date":"2022-01-11T15:16:20"},{"version":"1.281","date":"2024-01-31T14:19:02"}],"advisories":[{"id":"CPANSA-CGI-Simple-2010-02","cves":["CVE-2010-4410"],"distribution":"CGI-Simple","reported":"2010-12-27","references":["https://metacpan.org/changes/distribution/CGI-Simple"],"affected_versions":["<1.113"],"fixed_versions":[">=1.113"],"description":"Newlines in headers, which could lead to header injection attacks.\n"},{"id":"CPANSA-CGI-Simple-2010-01","cves":[],"reported":"2010-12-27","references":["https://metacpan.org/changes/distribution/CGI-Simple"],"distribution":"CGI-Simple","affected_versions":["<1.113"],"description":"Non-random multipart boundary.\n","fixed_versions":[">=1.113"]},{"description":"The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172.\n","fixed_versions":[],"affected_versions":["<=1.112"],"distribution":"CGI-Simple","reported":"2010-12-06","references":["https://github.com/AndyA/CGI--Simple/commit/e4942b871a26c1317a175a91ebb7262eea59b380","http://cpansearch.perl.org/src/LDS/CGI.pm-3.50/Changes","http://openwall.com/lists/oss-security/2010/12/01/1","http://www.nntp.perl.org/group/perl.perl5.changes/2010/11/msg28043.html","http://perl5.git.perl.org/perl.git/blobdiff/a0b94c2432b1d8c20653453a0f6970cb10f59aec..84601d63a7e34958da47dad1e61e27cb3bd467d1:/cpan/CGI/lib/CGI.pm","http://perl5.git.perl.org/perl.git/commit/84601d63a7e34958da47dad1e61e27cb3bd467d1","http://openwall.com/lists/oss-security/2010/12/01/2","http://openwall.com/lists/oss-security/2010/12/01/3","https://bugzilla.mozilla.org/show_bug.cgi?id=600464","http://osvdb.org/69588","http://osvdb.org/69589","http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html","http://www.mandriva.com/security/advisories?name=MDVSA-2010:237","http://www.vupen.com/english/advisories/2011/0076","http://www.mandriva.com/security/advisories?name=MDVSA-2010:250","http://secunia.com/advisories/42877","https://bugzilla.mozilla.org/show_bug.cgi?id=591165","http://www.vupen.com/english/advisories/2011/0207","http://www.bugzilla.org/security/3.2.9/","http://secunia.com/advisories/43033","http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053591.html","http://secunia.com/advisories/43147","http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053576.html","http://www.vupen.com/english/advisories/2011/0249","http://www.vupen.com/english/advisories/2011/0271","http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053678.html","http://www.vupen.com/english/advisories/2011/0212","http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html","http://secunia.com/advisories/43165","http://secunia.com/advisories/43068","http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053665.html","http://www.redhat.com/support/errata/RHSA-2011-1797.html","http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"],"cves":["CVE-2010-2761"],"severity":null,"id":"CPANSA-CGI-Simple-2010-2761"}],"main_module":"CGI::Simple"},"LWP-Protocol-Net-Curl":{"main_module":"LWP::Protocol::Net::Curl","versions":[{"date":"2012-10-24T18:49:20","version":"0.001"},{"date":"2012-10-26T20:05:13","version":"0.002"},{"version":"0.003","date":"2012-10-29T18:55:46"},{"version":"0.004","date":"2012-10-31T13:01:46"},{"date":"2012-11-01T15:17:14","version":"0.005"},{"version":"0.006","date":"2012-11-12T12:23:09"},{"version":"0.007","date":"2012-11-13T14:33:10"},{"version":"0.008","date":"2012-11-25T22:38:58"},{"date":"2012-11-28T19:03:10","version":"0.009"},{"version":"0.010","date":"2012-12-07T00:13:55"},{"date":"2012-12-18T12:05:00","version":"0.011"},{"version":"0.012","date":"2013-02-08T11:00:04"},{"version":"0.013","date":"2013-02-11T01:56:30"},{"version":"0.014","date":"2013-02-16T12:51:03"},{"date":"2013-05-13T21:41:47","version":"0.015"},{"date":"2013-05-18T22:12:03","version":"0.016"},{"version":"0.017","date":"2013-07-13T12:22:34"},{"date":"2013-08-17T11:34:49","version":"0.018"},{"date":"2013-10-11T12:33:53","version":"0.019"},{"date":"2013-10-13T09:02:17","version":"0.020"},{"date":"2014-01-21T17:46:37","version":"0.021"},{"version":"0.022","date":"2014-07-09T15:04:06"},{"date":"2014-12-23T17:06:56","version":"0.023"},{"version":"0.024","date":"2019-07-12T12:27:08"},{"date":"2019-07-15T11:29:17","version":"0.025"},{"date":"2019-10-08T12:01:54","version":"0.026"},{"version":"0.027","date":"2025-01-21T10:57:04"}],"advisories":[{"references":["https://metacpan.org/changes/distribution/LWP-Protocol-Net-Curl","https://github.com/creaktive/LWP-Protocol-Net-Curl/commit/dc8b183c6520a2b6bcde685de635675ee4a7e019"],"reported":"2012-11-28","distribution":"LWP-Protocol-Net-Curl","cves":[],"id":"CPANSA-LWP-Protocol-Net-Curl-2012-01","description":"Misconfiguration with libcurl v7.28.1 causes a HTTPS validation issues.\n","fixed_versions":[">=0.009"],"affected_versions":["<0.009"]}]},"Crypt-Random-Source":{"main_module":"Crypt::Random::Source","versions":[{"date":"2008-06-17T00:15:09","version":"0.01_01"},{"version":"0.01","date":"2008-06-17T01:51:37"},{"version":"0.02","date":"2008-06-17T01:53:15"},{"version":"0.03","date":"2008-06-17T06:01:16"},{"version":"0.04","date":"2009-11-25T17:09:48"},{"date":"2009-11-25T17:11:14","version":"0.05"},{"version":"0.06","date":"2010-12-23T03:04:46"},{"version":"0.07","date":"2011-01-05T08:42:20"},{"date":"2014-08-05T00:05:07","version":"0.08"},{"date":"2014-08-30T17:12:48","version":"0.09"},{"date":"2014-08-31T18:06:40","version":"0.10"},{"date":"2015-10-24T04:00:11","version":"0.11"},{"date":"2016-03-11T03:43:41","version":"0.12"},{"version":"0.13","date":"2018-04-08T01:09:20"},{"version":"0.14","date":"2018-04-10T02:58:59"}],"advisories":[{"distribution":"Crypt-Random-Source","reported":null,"references":["https://metacpan.org/dist/Crypt-Random-Source/changes","https://nvd.nist.gov/vuln/detail/CVE-2018-25107","https://github.com/karenetheridge/Crypt-Random-Source/pull/3","https://metacpan.org/release/ETHER/Crypt-Random-Source-0.13/changes"],"cves":["CVE-2018-25107"],"severity":null,"id":"CPANSA-Crypt-Random-Source-2024-001","description":"In versions prior to 0.13, rand could be used as a result of calling get_weak, or get, if no random device was available. This implies that not explicitly asking for get_strong on a non POSIX operating system (e.g. Win32 without the Win32 backend) could have resulted in non cryptographically random data.\n","fixed_versions":[">=0.13"],"affected_versions":["<=0.12"]}]},"HTTP-Session2":{"advisories":[{"severity":"critical","cves":[],"reported":"2018-01-26","references":["https://metacpan.org/changes/distribution/HTTP-Session2","https://github.com/tokuhirom/HTTP-Session2/commit/813838f6d08034b6a265a70e53b59b941b5d3e6d"],"distribution":"HTTP-Session2","id":"CPANSA-HTTP-Session2-2018-01","description":"HTTP::Session2 1.10 does not validate session id, this causes RCE depending on the session store you use.\n","fixed_versions":[">=1.10"],"affected_versions":["<1.10"]}],"versions":[{"version":"0.01","date":"2013-10-28T03:20:09"},{"date":"2013-10-30T00:17:21","version":"0.02"},{"version":"0.03","date":"2013-10-31T01:21:27"},{"version":"0.04","date":"2013-11-01T01:10:52"},{"version":"0.05","date":"2014-03-18T18:53:09"},{"version":"1.00","date":"2014-07-28T04:10:11"},{"version":"1.01","date":"2014-07-28T11:44:05"},{"version":"1.02","date":"2014-07-31T21:17:23"},{"date":"2014-08-01T11:04:00","version":"1.03"},{"date":"2014-08-01T11:10:56","version":"1.04"},{"date":"2014-08-01T11:20:46","version":"1.05"},{"date":"2014-08-01T14:04:04","version":"1.06"},{"date":"2014-08-01T14:08:11","version":"1.07"},{"version":"1.08","date":"2014-08-03T07:23:00"},{"date":"2014-09-01T02:26:38","version":"1.09"},{"date":"2018-01-26T05:02:08","version":"1.10"}],"main_module":"HTTP::Session2"},"Crypt-CBC":{"advisories":[{"severity":null,"cves":[],"reported":"2021-05-17","references":["https://metacpan.org/changes/distribution/Crypt-CBC","https://github.com/briandfoy/cpan-security-advisory/issues/165"],"distribution":"Crypt-CBC","id":"CPANSA-Crypt-CBC-2021-0001","fixed_versions":[">=3.04"],"description":"Fixed bug involving manually-specified IV not being used in some circumstances.\n","affected_versions":["<3.04"]},{"fixed_versions":[">=2.17"],"description":"Crypt::CBC Perl module 2.16 and earlier, when running in RandomIV mode, uses an initialization vector (IV) of 8 bytes, which results in weaker encryption when used with a cipher that requires a larger block size than 8 bytes, such as Rijndael.\n","affected_versions":["<2.17"],"severity":null,"cves":["CVE-2006-0898"],"reported":"2006-02-25","references":["https://metacpan.org/changes/distribution/Crypt-CBC","http://www.securityfocus.com/bid/16802","http://secunia.com/advisories/18755","http://www.debian.org/security/2006/dsa-996","http://secunia.com/advisories/19187","http://www.gentoo.org/security/en/glsa/glsa-200603-15.xml","http://secunia.com/advisories/19303","http://www.novell.com/linux/security/advisories/2006_38_security.html","http://secunia.com/advisories/20899","http://securityreason.com/securityalert/488","http://www.redhat.com/support/errata/RHSA-2008-0261.html","http://secunia.com/advisories/31493","http://rhn.redhat.com/errata/RHSA-2008-0630.html","https://exchange.xforce.ibmcloud.com/vulnerabilities/24954","http://www.securityfocus.com/archive/1/425966/100/0/threaded"],"distribution":"Crypt-CBC","id":"CPANSA-Crypt-CBC-2006-0898"}],"versions":[{"date":"1998-06-19T19:48:52","version":"1.00"},{"date":"1998-09-22T18:30:35","version":"1.10"},{"version":"1.20","date":"1998-12-20T23:36:49"},{"date":"2000-01-27T00:27:56","version":"1.22"},{"date":"2000-02-22T15:20:56","version":"1.23"},{"date":"2000-06-07T18:55:59","version":"1.24"},{"date":"2000-06-08T15:59:07","version":"1.25"},{"version":"2.01","date":"2001-12-10T17:16:25"},{"date":"2002-01-24T05:30:16","version":"2.02"},{"version":"2.03","date":"2002-06-02T18:40:15"},{"date":"2002-06-12T02:20:51","version":"2.04"},{"version":"2.05","date":"2002-06-22T13:02:09"},{"date":"2002-08-08T18:47:49","version":"2.07"},{"date":"2002-09-11T12:17:23","version":"2.08"},{"date":"2004-05-27T15:20:52","version":"2.09"},{"date":"2004-05-29T17:29:19","version":"2.10"},{"version":"2.11","date":"2004-06-03T16:22:32"},{"date":"2004-06-17T15:55:19","version":"2.11"},{"version":"2.14","date":"2005-05-05T20:11:50"},{"version":"2.15","date":"2005-08-01T14:02:45"},{"date":"2006-02-16T14:08:57","version":"2.17"},{"date":"2006-06-06T23:22:02","version":"2.18"},{"version":"2.19","date":"2006-08-12T19:52:11"},{"version":"2.21","date":"2006-10-16T23:40:13"},{"date":"2006-10-29T21:55:34","version":"2.22"},{"date":"2007-09-28T15:25:53","version":"2.24"},{"date":"2008-03-28T14:17:29","version":"2.27"},{"date":"2008-03-31T14:56:52","version":"2.28"},{"date":"2008-04-22T14:27:07","version":"2.29"},{"version":"2.30","date":"2008-09-30T15:17:58"},{"version":"2.31","date":"2012-10-30T11:08:06"},{"version":"2.32","date":"2012-12-14T19:30:14"},{"version":"2.33","date":"2013-07-30T20:03:53"},{"version":"3.00","date":"2021-02-07T15:30:51"},{"date":"2021-02-08T21:38:16","version":"3.01"},{"version":"3.02","date":"2021-04-11T22:16:48"},{"version":"3.03","date":"2021-04-19T02:59:12"},{"version":"3.04","date":"2021-05-17T15:03:53"}],"main_module":"Crypt::CBC"},"Moxy":{"main_module":"Moxy","advisories":[{"affected_versions":["<0.25"],"fixed_versions":[">=0.25"],"description":"Allowed file schema\n","id":"CPANSA-Moxy-2008-01","distribution":"Moxy","references":["https://metacpan.org/dist/Moxy/changes"],"reported":"2008-04-09","cves":[],"severity":null}],"versions":[{"version":"0.04","date":"2008-01-01T18:30:22"},{"date":"2008-01-02T13:16:19","version":"0.05"},{"date":"2008-01-19T02:45:48","version":"0.06"},{"date":"2008-01-19T04:46:15","version":"0.07"},{"date":"2008-01-19T13:40:32","version":"0.08"},{"version":"0.20","date":"2008-01-20T07:59:32"},{"version":"0.22","date":"2008-01-25T07:34:00"},{"version":"0.23","date":"2008-01-26T10:16:38"},{"date":"2008-01-27T06:18:24","version":"0.24"},{"version":"0.25","date":"2008-04-09T15:15:08"},{"version":"0.30","date":"2008-04-20T05:07:40"},{"date":"2008-04-20T11:43:55","version":"0.31"},{"date":"2008-04-21T02:33:59","version":"0.32"},{"date":"2008-05-13T04:32:15","version":"0.32"},{"version":"0.32","date":"2008-05-14T04:12:27"},{"version":"0.32","date":"2008-06-14T07:29:30"},{"version":"0.32","date":"2008-08-14T16:20:15"},{"date":"2008-08-22T09:54:45","version":"0.32"},{"date":"2008-10-02T10:14:27","version":"0.32"},{"version":"0.32","date":"2008-11-07T01:24:33"},{"version":"0.32","date":"2008-11-07T01:43:45"},{"date":"2008-11-08T01:14:56","version":"0.32"},{"version":"0.32","date":"2008-11-19T02:50:08"},{"date":"2009-02-10T11:05:56","version":"0.32"},{"version":"0.51","date":"2009-02-20T09:48:43"},{"version":"0.52","date":"2009-03-24T11:22:16"},{"date":"2009-03-31T06:33:35","version":"0.53"},{"version":"0.54","date":"2009-04-07T10:51:35"},{"date":"2009-04-08T06:23:07","version":"0.55"},{"version":"0.56","date":"2009-04-08T08:36:37"},{"date":"2011-01-26T08:17:33","version":"0.60"},{"date":"2011-05-18T04:36:44","version":"0.57"},{"version":"0.60","date":"2011-05-18T04:46:01"},{"version":"0.60","date":"2011-05-24T01:35:05"},{"version":"0.63","date":"2011-05-27T01:48:35"},{"date":"2012-11-06T05:23:15","version":"0.70"}]},"Apache-AuthCAS":{"advisories":[{"id":"CPANSA-Apache-AuthCAS-2007-01","distribution":"Apache-AuthCAS","references":["https://metacpan.org/changes/distribution/Apache-AuthCAS","https://cxsecurity.com/issue/WLB-2007120031"],"reported":"2007-12-13","cves":["CVE-2007-6342"],"severity":"high","affected_versions":["<0.5"],"description":"A tainted cookie could be sent by a malicious user and it would be used in an SQL query without protection against SQL injection.\n","fixed_versions":[">=0.5"]}],"versions":[{"date":"2004-09-15T19:17:43","version":"0.1"},{"version":"0.2","date":"2004-09-15T20:11:40"},{"version":"0.3","date":"2004-10-05T22:51:50"},{"date":"2004-10-13T00:45:52","version":"0.4"},{"version":"0.5","date":"2008-03-23T23:03:16"}],"main_module":"Apache::AuthCAS"},"EasyTCP":{"advisories":[{"description":"The Net::EasyTCP package before 0.15 for Perl always uses Perl's builtin rand(), which is not a strong random number generator, for cryptographic keys.\n","fixed_versions":[">=0.,15"],"affected_versions":["<0.15"],"distribution":"EasyTCP","references":["https://github.com/briandfoy/cpan-security-advisory/issues/184","https://metacpan.org/release/MNAGUIB/EasyTCP-0.15/view/EasyTCP.pm","https://metacpan.org/release/MNAGUIB/EasyTCP-0.26/changes"],"reported":"2025-01-02","cves":["CVE-2002-20002"],"severity":"moderate","id":"CPANSA-EasyTCP-2002-20002"},{"affected_versions":[">=0.15"],"description":"The Net::EasyTCP package 0.15 through 0.26 for Perl uses Perl's builtin rand() if no strong randomization module is present.\n","fixed_versions":[],"id":"CPANSA-EasyTCP-2024-56830","distribution":"EasyTCP","reported":"2025-01-02","references":["https://github.com/briandfoy/cpan-security-advisory/issues/184","https://metacpan.org/release/MNAGUIB/EasyTCP-0.26/changes"],"cves":["CVE-2024-56830"],"severity":"moderate"}],"versions":[{"version":"0.01","date":"2002-01-03T20:21:16"},{"version":"0.02","date":"2002-01-10T23:58:29"},{"date":"2002-01-12T22:23:25","version":"0.03"},{"date":"2002-01-14T20:13:58","version":"0.04"},{"version":"0.05","date":"2002-01-16T16:30:59"},{"date":"2002-01-18T04:48:03","version":"0.06"},{"version":"0.07","date":"2002-01-21T20:26:09"},{"version":"0.08","date":"2002-01-22T21:08:52"},{"date":"2002-01-31T16:33:35","version":"0.09"},{"version":"0.10","date":"2002-02-01T02:09:00"},{"version":"0.11","date":"2002-02-05T20:35:47"},{"date":"2002-02-22T19:51:44","version":"0.12"},{"date":"2002-03-22T20:47:32","version":"0.13"},{"date":"2002-09-07T05:21:49","version":"0.14"},{"date":"2002-09-25T03:02:37","version":"0.15"},{"version":"0.16","date":"2002-09-30T20:20:38"},{"date":"2002-11-11T19:38:16","version":"0.17"},{"version":"0.18","date":"2003-02-26T22:15:03"},{"date":"2003-03-02T05:47:04","version":"0.19"},{"date":"2003-05-14T19:40:01","version":"0.20"},{"date":"2003-05-14T20:22:30","version":"0.21"},{"date":"2003-05-15T13:10:31","version":"0.22"},{"date":"2003-05-24T13:19:56","version":"0.23"},{"date":"2003-07-15T01:11:20","version":"0.24"},{"date":"2003-08-07T12:19:25","version":"0.25"},{"date":"2004-04-06T02:50:22","version":"0.26"}],"main_module":"Net::EasyTCP"},"File-KeePass":{"main_module":"File::KeePass","advisories":[{"id":"CPANSA-File-KeePass-2016-01","distribution":"File-KeePass","references":["https://rt.cpan.org/Ticket/Display.html?id=117836"],"reported":"2016-09-14","cves":[],"severity":null,"affected_versions":[">0"],"description":"The module is making use of the perl rand function for key and iv generation (for Crypt::Rijndael).\n","fixed_versions":[]}],"versions":[{"version":"0.01","date":"2010-06-29T14:52:50"},{"version":"0.02","date":"2010-12-04T04:33:41"},{"version":"0.03","date":"2010-12-07T06:06:57"},{"version":"2.00","date":"2012-09-13T04:48:56"},{"version":"2.01","date":"2012-09-13T14:17:11"},{"version":"2.02","date":"2012-09-13T15:22:40"},{"version":"2.03","date":"2012-09-15T22:25:43"}]},"MHonArc":{"main_module":"MHonArc::UTF8","versions":[{"date":"1997-12-11T20:44:41","version":"2.1"},{"version":"v2.2.0","date":"1998-03-04T01:06:00"},{"date":"1998-10-11T02:56:10","version":"v2.3.0"},{"date":"1998-10-25T19:27:37","version":"v2.3.1"},{"version":"v2.3.2","date":"1998-11-01T20:02:48"},{"date":"1998-11-08T21:59:21","version":"v2.3.3"},{"date":"1999-06-26T07:57:53","version":"v2.4.0"},{"version":"v2.4.1","date":"1999-07-26T19:30:51"},{"version":"v2.4.2","date":"1999-08-12T07:16:14"},{"version":"v2.4.3","date":"1999-08-16T06:25:39"},{"date":"1999-10-01T19:43:07","version":"v2.4.4"},{"date":"2000-02-15T03:44:03","version":"v2.4.5"},{"date":"2000-04-24T08:35:56","version":"v2.4.6"},{"version":"v2.4.7","date":"2000-10-29T04:18:32"},{"version":"v2.4.7","date":"2000-10-30T06:29:47"},{"version":"v2.4.8","date":"2001-04-14T21:48:01"},{"date":"2001-06-11T03:09:13","version":"v2.4.9"},{"version":"v2.5.0","date":"2001-08-26T19:46:53"},{"date":"2001-09-07T15:24:19","version":"v2.5.0"},{"version":"v2.5.0","date":"2001-10-17T16:03:13"},{"date":"2001-11-14T05:09:59","version":"v2.5.1"},{"date":"2001-11-25T06:46:19","version":"v2.5.2"},{"date":"2002-04-18T07:23:29","version":"v2.5.3"},{"date":"2002-05-03T05:06:16","version":"v2.5.4"},{"date":"2002-05-28T05:43:00","version":"v2.5.5"},{"date":"2002-06-18T18:07:38","version":"v2.5.6"},{"version":"v2.5.7","date":"2002-06-21T22:59:36"},{"version":"v2.5.8","date":"2002-06-29T03:22:26"},{"date":"2002-07-20T02:39:53","version":"v2.5.9"},{"date":"2002-07-29T00:10:32","version":"v2.5.10"},{"date":"2002-08-04T04:25:22","version":"v2.5.11"},{"version":"v2.5.12","date":"2002-09-04T04:32:14"},{"version":"v2.5.13","date":"2002-10-21T17:13:35"},{"version":"v2.5.14","date":"2002-12-22T01:07:40"},{"version":"v2.6.0","date":"2003-02-10T05:23:02"},{"date":"2003-02-23T00:39:05","version":"v2.6.1"},{"date":"2003-03-12T01:55:48","version":"v2.6.2"},{"version":"v2.6.3","date":"2003-04-06T02:11:59"},{"date":"2003-06-22T21:54:52","version":"v2.6.4"},{"version":"v2.6.5","date":"2003-07-20T04:51:56"},{"date":"2003-07-21T17:20:07","version":"v2.6.6"},{"version":"v2.6.7","date":"2003-08-07T23:49:43"},{"version":"v2.6.8","date":"2003-08-13T04:47:02"},{"date":"2004-05-17T06:24:46","version":"v2.6.9"},{"version":"v2.6.10","date":"2004-05-17T06:25:16"},{"date":"2005-05-20T17:15:40","version":"v2.6.11"},{"version":"v2.6.12","date":"2005-06-09T02:30:11"},{"version":"v2.6.13","date":"2005-07-06T05:15:55"},{"version":"2.6.14","date":"2005-07-23T07:15:49"},{"version":"2.6.15","date":"2005-07-27T03:46:13"},{"date":"2006-06-10T03:21:01","version":"2.6.16"},{"date":"2011-01-09T10:04:06","version":"2.6.17"},{"date":"2011-01-09T16:35:39","version":"2.6.18"},{"date":"2014-04-22T03:33:53","version":"2.6.19"},{"date":"2020-09-14T09:22:58","version":"v2.6.20"},{"date":"2020-09-14T11:54:14","version":"v2.6.21"},{"version":"v2.6.22","date":"2020-09-21T07:06:18"},{"date":"2020-11-12T12:54:55","version":"v2.6.23"},{"version":"v2.6.24","date":"2020-11-16T14:24:54"}],"advisories":[{"cves":["CVE-2010-4524"],"references":["https://metacpan.org/changes/distribution/MHonArc"],"reported":"2011-01-09","distribution":"MHonArc","id":"CPANSA-MHonArc-2011-01","fixed_versions":[">=2.6.17"],"description":"Improper escaping of certain HTML sequences (XSS).\n","affected_versions":["<2.6.17"]},{"description":"DoS when processing html messages with deep tag nesting.\n","fixed_versions":[">=2.6.17"],"affected_versions":["<2.6.17"],"distribution":"MHonArc","references":["https://metacpan.org/changes/distribution/MHonArc"],"reported":"2011-01-09","cves":["CVE-2010-1677"],"id":"CPANSA-MHonArc-2011-02"}]},"File-Slurp":{"advisories":[{"cves":[],"references":["https://rt.cpan.org/Public/Bug/Display.html?id=83126","https://rt.perl.org/Ticket/Display.html?id=121870"],"reported":"2013-02-04","distribution":"File-Slurp","id":"CPANSA-File-Slurp-2013-01","description":"Use of sysread treats any :encoding(...) as effectively :utf8.\n","fixed_versions":[">=9999.26"],"affected_versions":["<9999.26"]}],"versions":[{"date":"1996-04-22T21:18:00","version":"96.042202"},{"version":"98.071901","date":"1998-07-19T16:25:00"},{"version":"2001.1103","date":"2001-11-04T03:17:00"},{"version":"2002.0305","date":"2002-03-08T05:22:00"},{"date":"2002-11-01T03:14:00","version":"2002.1031"},{"date":"2003-09-04T16:28:00","version":"2004.0904"},{"date":"2003-11-24T07:45:57","version":"0.01"},{"version":"9999.01","date":"2003-11-24T08:02:47"},{"date":"2003-12-17T09:20:57","version":"9999.02"},{"version":"9999.03","date":"2003-12-22T06:54:57"},{"date":"2004-02-23T19:27:53","version":"9999.04"},{"version":"9999.06","date":"2004-09-21T05:23:58"},{"date":"2005-01-30T10:01:07","version":"9999.07"},{"version":"9999.08","date":"2005-04-16T05:06:09"},{"date":"2005-04-29T06:09:11","version":"9999.09"},{"version":"9999.10","date":"2006-01-19T18:29:42"},{"version":"9999.11","date":"2006-01-20T06:45:13"},{"version":"9999.12","date":"2006-03-07T07:13:42"},{"date":"2008-01-24T04:57:12","version":"9999.13"},{"version":"9999.14","date":"2011-03-22T22:41:08"},{"version":"9999.15","date":"2011-03-24T22:52:42"},{"date":"2011-04-24T04:26:18","version":"9999.16"},{"date":"2011-05-13T06:23:08","version":"9999.17"},{"date":"2011-05-13T07:03:44","version":"9999.18"},{"date":"2011-06-07T08:08:06","version":"9999.19"},{"version":"9999.20_01","date":"2018-09-28T01:57:50"},{"version":"9999.20_02","date":"2018-10-05T01:23:09"},{"version":"9999.21","date":"2018-10-08T21:16:27"},{"date":"2018-10-16T03:15:39","version":"9999.22"},{"date":"2018-10-20T20:06:53","version":"9999.23"},{"date":"2018-10-30T02:45:09","version":"9999.24"},{"date":"2018-11-16T16:11:34","version":"9999.25"},{"version":"9999.26","date":"2019-02-13T16:35:40"},{"version":"9999.27","date":"2019-04-05T13:28:05"},{"version":"9999.28","date":"2019-09-13T00:36:22"},{"version":"9999.29","date":"2019-11-27T20:40:47"},{"version":"9999.30","date":"2020-03-09T14:31:40"},{"date":"2020-06-28T22:33:21","version":"9999.31"},{"version":"9999.32","date":"2020-07-01T00:34:08"}],"main_module":"File::Slurp"},"Crypt-Passwd-XS":{"advisories":[{"id":"CPANSA-Crypt-Passwd-XS-2012-01","distribution":"Crypt-Passwd-XS","reported":"2012-05-07","references":["https://metacpan.org/changes/distribution/Crypt-Passwd-XS"],"cves":["CVE-2012-2143"],"affected_versions":["<0.601"],"fixed_versions":[">=0.601"],"description":"The crypt_des (aka DES-based crypt) function does not process the complete cleartext password if this password contains a 0x80 character, which makes it easier for context-dependent attackers to obtain access via an authentication attempt with an initial substring of the intended password, as demonstrated by a Unicode password.\n"}],"versions":[{"date":"2010-11-14T21:18:18","version":"0.4"},{"version":"0.501","date":"2010-11-17T02:03:54"},{"version":"0.503","date":"2010-11-17T23:25:17"},{"date":"2010-11-20T00:37:33","version":"0.504"},{"date":"2010-11-24T00:59:34","version":"0.505"},{"version":"0.506","date":"2011-03-09T16:18:01"},{"date":"2011-03-09T21:40:38","version":"0.507"},{"date":"2011-07-26T16:37:20","version":"0.600"},{"version":"0.601","date":"2012-12-06T19:57:57"}],"main_module":"Crypt::Passwd::XS"},"Spreadsheet-ParseExcel":{"advisories":[{"id":"CPANSA-Spreadsheet-ParseExcel-2023-7101","distribution":"Spreadsheet-ParseExcel","reported":"2023-12-24","references":["http://www.openwall.com/lists/oss-security/2023/12/29/4","https://github.com/jmcnamara/spreadsheet-parseexcel/blob/c7298592e102a375d43150cd002feed806557c15/lib/Spreadsheet/ParseExcel/Utility.pm#L171","https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md","https://https://github.com/haile01/perl_spreadsheet_excel_rce_poc","https://https://metacpan.org/dist/Spreadsheet-ParseExcel","https://https://www.cve.org/CVERecord?id=CVE-2023-7101","https://lists.debian.org/debian-lts-announce/2023/12/msg00025.html"],"cves":["CVE-2023-7101"],"severity":null,"affected_versions":["<0.66"],"description":"Spreadsheet::ParseExcel version 0.65 is a Perl module used for parsing Excel files. Spreadsheet::ParseExcel is vulnerable to an arbitrary code execution (ACE) vulnerability due to passing unvalidated input from a file into a string-type “eval”. Specifically, the issue stems from the evaluation of Number format strings (not to be confused with printf-style format strings) within the Excel parsing logic.\n","fixed_versions":[">=0.66"]}],"versions":[{"date":"2000-10-06T00:33:12","version":"0.06"},{"version":"0.07","date":"2000-11-18T03:01:33"},{"version":"0.08","date":"2000-11-24T23:59:57"},{"date":"2000-12-15T02:58:39","version":"0.09"},{"version":"0.10","date":"2001-01-16T00:27:35"},{"version":"0.11","date":"2001-01-31T15:09:13"},{"version":"0.12","date":"2001-02-05T11:37:49"},{"date":"2001-02-22T22:35:17","version":"0.13"},{"date":"2001-03-06T02:14:24","version":"0.15"},{"date":"2001-03-07T21:50:33","version":"0.16"},{"date":"2001-03-12T23:08:09","version":"0.17"},{"version":"0.18","date":"2001-03-17T07:39:42"},{"date":"2001-03-26T11:41:43","version":"0.19"},{"date":"2001-03-30T11:22:58","version":"0.20"},{"version":"0.201","date":"2001-04-11T00:12:29"},{"date":"2001-04-11T00:17:15","version":"v0.20.1"},{"version":"0.21","date":"2001-04-28T02:18:17"},{"version":"v0.21.1","date":"2001-04-29T05:37:04"},{"date":"2001-05-01T07:23:55","version":"v0.21.2"},{"date":"2001-05-05T09:46:39","version":"0.22"},{"version":"v0.22.1","date":"2001-05-15T22:20:34"},{"date":"2001-05-24T22:12:58","version":"v0.22.2"},{"version":"v0.22.3","date":"2001-06-05T22:21:24"},{"date":"2001-06-21T21:38:06","version":"0.23"},{"version":"0.2301","date":"2001-06-26T03:05:48"},{"version":"0.24","date":"2001-07-05T10:44:34"},{"date":"2001-07-13T10:51:35","version":"0.2402"},{"version":"0.2403","date":"2001-07-24T21:45:07"},{"version":"0.2404","date":"2001-12-06T22:01:45"},{"version":"0.2405","date":"2002-01-28T22:38:34"},{"version":"0.2406","date":"2002-04-07T22:20:17"},{"date":"2002-04-24T13:05:42","version":"0.2407"},{"date":"2002-05-09T15:05:41","version":"0.25"},{"date":"2002-06-05T20:57:29","version":"0.26"},{"date":"2002-07-13T22:41:34","version":"0.2601"},{"version":"0.2602","date":"2002-07-16T02:07:27"},{"version":"0.2603","date":"2004-05-30T01:51:09"},{"version":"0.27_01","date":"2006-09-11T09:15:23"},{"date":"2006-09-12T20:55:36","version":"0.27_02"},{"version":"0.27_03","date":"2006-11-02T16:44:10"},{"version":"0.27","date":"2007-01-03T15:48:01"},{"date":"2007-01-07T17:20:30","version":"0.28"},{"version":"0.29","date":"2007-03-29T23:21:14"},{"date":"2007-03-31T15:33:28","version":"0.30"},{"version":"0.31","date":"2007-05-03T02:21:13"},{"date":"2007-05-05T03:56:46","version":"0.32"},{"version":"0.33","date":"2008-09-07T07:47:07"},{"version":"0.40","date":"2008-10-24T00:05:35"},{"date":"2008-10-24T00:18:27","version":"0.33"},{"version":"0.42","date":"2009-01-01T20:42:10"},{"date":"2009-01-08T02:06:27","version":"0.43"},{"version":"0.44","date":"2009-01-09T03:37:10"},{"version":"0.45","date":"2009-01-14T02:19:46"},{"date":"2009-01-20T00:34:23","version":"0.46"},{"version":"0.47","date":"2009-01-22T00:39:18"},{"version":"0.48","date":"2009-01-23T07:07:04"},{"version":"0.49","date":"2009-01-24T01:19:12"},{"version":"0.50","date":"2009-08-18T23:30:07"},{"date":"2009-08-19T22:08:26","version":"0.51"},{"version":"0.52","date":"2009-08-21T18:09:01"},{"version":"0.53","date":"2009-08-24T23:06:49"},{"version":"0.54","date":"2009-08-25T20:24:31"},{"date":"2009-09-30T06:26:08","version":"0.55"},{"version":"0.56","date":"2009-12-10T00:23:50"},{"version":"0.57","date":"2010-01-24T19:18:56"},{"version":"0.58","date":"2010-09-17T18:09:07"},{"date":"2011-04-06T19:13:26","version":"0.59"},{"date":"2014-02-26T19:58:52","version":"0.60"},{"date":"2014-03-04T18:56:46","version":"0.61"},{"version":"0.62","date":"2014-03-05T17:16:00"},{"date":"2014-03-07T20:47:21","version":"0.63"},{"version":"0.64","date":"2014-03-11T17:22:13"},{"version":"0.65","date":"2014-03-18T20:47:23"},{"version":"0.66","date":"2023-12-29T01:14:58"}],"main_module":"Spreadsheet::ParseExcel"},"Kelp":{"advisories":[{"affected_versions":["<0.9001"],"fixed_versions":[">=0.9001"],"description":"X-Real-IP, X-Forwarded-Host and X-Remote-User headers were trusted and used in Kelp::Request\n","reviewed_by":[{"email":"rrwo@cpan.org","name":"Robert Rothenberg","date":"2022-06-28"}],"id":"CPANSA-Kelp-2014-01","cves":[],"references":["https://metacpan.org/dist/Kelp/changes","https://github.com/sgnix/kelp/commit/9f8f5a5215bdc1685a671c1157132a65727aadff"],"reported":"2014-05-30","distribution":"Kelp"}],"versions":[{"version":"0.1","date":"2013-04-12T17:16:52"},{"version":"0.11","date":"2013-04-12T17:39:48"},{"version":"0.2","date":"2013-04-14T01:05:22"},{"date":"2013-04-16T21:52:38","version":"0.21"},{"version":"0.215","date":"2013-04-17T04:59:31"},{"version":"0.216","date":"2013-04-17T13:16:42"},{"version":"0.217","date":"2013-04-17T19:13:12"},{"version":"0.218","date":"2013-04-20T01:47:43"},{"date":"2013-04-20T20:27:42","version":"0.2181"},{"date":"2013-05-02T16:45:58","version":"0.2182"},{"date":"2013-05-06T03:44:19","version":"0.219"},{"version":"0.2191","date":"2013-05-14T20:01:26"},{"date":"2013-05-25T21:37:51","version":"0.3001"},{"version":"0.3101","date":"2013-06-14T05:59:18"},{"date":"2013-06-16T15:38:29","version":"0.3102"},{"date":"2013-07-03T02:34:18","version":"0.4001"},{"date":"2013-07-05T17:36:59","version":"0.4011"},{"version":"0.4012","date":"2013-07-05T22:46:46"},{"version":"0.4501","date":"2013-08-15T03:19:01"},{"version":"0.455","date":"2013-11-11T18:10:07"},{"date":"2013-11-20T05:15:34","version":"0.456"},{"version":"0.457","date":"2014-03-02T17:34:04"},{"version":"0.4601","date":"2014-03-27T16:29:16"},{"version":"0.4602","date":"2014-03-31T22:46:22"},{"version":"0.9001","date":"2014-05-31T00:52:57"},{"date":"2014-07-13T00:41:29","version":"0.9012"},{"date":"2014-08-08T17:57:48","version":"0.9015"},{"date":"2014-12-15T07:02:58","version":"0.9021"},{"version":"0.9051","date":"2015-04-03T00:32:47"},{"date":"2015-08-11T06:50:14","version":"0.9071"},{"date":"2016-11-09T00:00:02","version":"0.9081"},{"version":"1.01","date":"2017-12-28T21:08:47"},{"date":"2018-01-08T16:43:42","version":"1.02"},{"version":"1.03","date":"2021-01-12T14:26:40"},{"date":"2021-01-14T15:00:50","version":"1.03_1"},{"version":"1.03_2","date":"2021-01-16T16:53:41"},{"version":"1.04","date":"2021-01-18T21:15:56"},{"version":"1.04_01","date":"2021-01-21T12:12:36"},{"date":"2021-01-21T17:15:38","version":"1.05"},{"date":"2022-05-09T21:07:41","version":"1.06"},{"version":"1.07","date":"2024-06-02T18:49:17"},{"version":"1.10_01","date":"2024-06-05T19:57:13"},{"version":"2.00_01","date":"2024-06-08T19:49:17"},{"date":"2024-06-09T13:06:47","version":"2.00_02"},{"version":"2.00_03","date":"2024-06-09T15:41:33"},{"date":"2024-06-09T20:00:29","version":"2.00_04"},{"version":"2.00_05","date":"2024-06-10T07:25:19"},{"date":"2024-06-10T15:39:47","version":"2.00"},{"version":"2.01_01","date":"2024-06-15T11:55:22"},{"date":"2024-06-18T16:33:19","version":"2.01_02"},{"version":"2.01_03","date":"2024-06-19T19:26:30"},{"date":"2024-06-20T06:26:12","version":"2.01_04"},{"date":"2024-06-20T20:43:31","version":"2.01_05"},{"version":"2.10_01","date":"2024-06-23T19:25:33"},{"date":"2024-06-24T05:14:31","version":"2.10"},{"version":"2.11","date":"2024-06-25T04:15:52"},{"date":"2024-06-26T06:15:21","version":"2.12"},{"date":"2024-07-01T06:06:23","version":"2.13"},{"version":"2.14","date":"2024-07-02T05:28:06"},{"date":"2024-07-03T19:52:27","version":"2.15"},{"date":"2024-07-05T19:03:36","version":"2.16"},{"date":"2024-07-06T04:18:40","version":"2.17"},{"version":"2.18","date":"2024-10-08T04:22:01"},{"date":"2024-10-10T20:15:05","version":"2.19"}],"main_module":"Kelp"},"FCGI":{"versions":[{"version":"0.25","date":"1996-09-25T17:48:57"},{"version":"0.26","date":"1996-10-15T21:51:06"},{"version":"0.27","date":"1997-02-20T08:55:44"},{"version":"0.28","date":"1997-02-25T07:14:13"},{"date":"1997-06-10T18:16:17","version":"0.29"},{"version":"0.30","date":"1997-06-24T17:17:05"},{"date":"1997-07-24T11:05:43","version":"0.31"},{"date":"1998-06-17T10:24:17","version":"0.34"},{"version":"0.35","date":"1998-06-22T15:38:51"},{"version":"0.36","date":"1998-06-24T19:42:57"},{"version":"0.37","date":"1998-06-27T16:08:39"},{"version":"0.40","date":"1998-07-15T15:24:00"},{"version":"0.41","date":"1998-07-29T16:05:51"},{"version":"0.42","date":"1998-08-28T15:30:49"},{"date":"1998-12-22T22:34:14","version":"0.43"},{"version":"0.44","date":"1998-12-23T11:28:39"},{"version":"0.45","date":"1999-03-08T17:04:02"},{"version":"0.46","date":"1999-07-30T08:26:31"},{"date":"1999-07-31T21:58:01","version":"0.47"},{"date":"1999-08-27T13:41:54","version":"0.48"},{"version":"0.49","date":"2000-04-09T18:58:32"},{"date":"2000-04-10T07:04:43","version":"0.50"},{"version":"0.51","date":"2000-04-12T12:27:09"},{"version":"0.52","date":"2000-04-12T14:10:02"},{"version":"0.53","date":"2000-07-10T10:01:51"},{"date":"2000-10-08T19:52:29","version":"0.54"},{"date":"2000-10-18T21:22:46","version":"0.55"},{"date":"2000-11-03T15:44:28","version":"0.56"},{"version":"0.57","date":"2000-11-12T15:15:01"},{"date":"2000-11-14T23:20:24","version":"0.58"},{"date":"2000-12-31T22:05:44","version":"0.59"},{"version":"0.60","date":"2001-06-08T15:19:08"},{"version":"0.61","date":"2001-09-20T12:34:13"},{"date":"2001-09-21T16:19:42","version":"0.62"},{"version":"0.63","date":"2001-09-24T20:43:48"},{"date":"2001-09-25T08:26:24","version":"0.64"},{"version":"0.65","date":"2002-02-19T14:16:27"},{"date":"2002-09-05T16:23:07","version":"0.66"},{"date":"2002-12-23T10:21:36","version":"0.67"},{"version":"0.67_01","date":"2009-12-20T21:05:48"},{"version":"0.68","date":"2010-01-06T10:07:05"},{"version":"0.68_01","date":"2010-01-10T01:35:11"},{"version":"0.68_02","date":"2010-01-13T19:25:40"},{"version":"0.69","date":"2010-02-15T23:08:12"},{"version":"0.70","date":"2010-03-22T14:35:03"},{"date":"2010-04-01T00:55:33","version":"0.71"},{"version":"0.71_01","date":"2010-08-24T21:32:56"},{"date":"2011-04-28T08:50:09","version":"0.71_02"},{"date":"2011-04-28T09:05:42","version":"0.71_03"},{"version":"0.72","date":"2011-05-19T09:06:02"},{"version":"0.73","date":"2011-05-28T01:35:17"},{"date":"2011-09-24T08:31:47","version":"0.74"},{"version":"0.75","date":"2014-07-17T00:19:02"},{"date":"2014-08-05T01:29:06","version":"0.76"},{"date":"2014-08-05T15:53:28","version":"0.77"},{"date":"2016-03-07T00:08:23","version":"0.78"},{"date":"2019-12-14T18:29:19","version":"0.79"},{"date":"2021-07-25T04:54:49","version":"0.80"},{"version":"0.81","date":"2021-07-30T23:19:01"},{"date":"2021-07-31T03:26:34","version":"0.82"}],"advisories":[{"description":"Leaking information across requests when using the deprecated and undocumented old FCGI interface.\n","fixed_versions":[">=0.74"],"affected_versions":["<0.74"],"distribution":"FCGI","references":["https://metacpan.org/changes/distribution/FCGI","https://github.com/perl-catalyst/FCGI/commit/297693dc8362d25bb25e473899c72508a0f71d2e"],"reported":"2011-09-24","cves":["CVE-2011-2766"],"id":"CPANSA-FCGI-2011-01"}],"main_module":"FCGI"},"HTML-Perlinfo":{"advisories":[{"affected_versions":["<1.52"],"fixed_versions":[">=1.52"],"description":"Possibility of denial-of-service attack.\n","id":"CPANSA-HTML-Perlinfo-2008-01","references":["https://metacpan.org/changes/release/ACCARDO/HTML-Perlinfo-1.52"],"reported":"2008-07-04","distribution":"HTML-Perlinfo","cves":[]}],"versions":[{"date":"2005-08-18T21:39:08","version":"1.00"},{"date":"2005-09-19T20:41:07","version":"1.05"},{"date":"2006-01-14T05:25:20","version":"1.25"},{"date":"2006-08-13T03:42:36","version":"1.40"},{"date":"2006-08-13T09:29:45","version":"1.41"},{"version":"1.42","date":"2006-08-15T01:04:34"},{"date":"2006-08-25T07:51:28","version":"1.43"},{"version":"1.44","date":"2006-09-10T23:20:13"},{"date":"2006-09-24T02:22:48","version":"1.45"},{"version":"1.46","date":"2006-09-27T20:08:12"},{"date":"2006-10-02T19:30:30","version":"1.47"},{"date":"2008-03-16T03:15:04","version":"1.48"},{"version":"1.49","date":"2008-04-26T04:17:07"},{"version":"1.50","date":"2008-04-30T20:44:40"},{"date":"2008-06-08T21:07:29","version":"1.51"},{"date":"2008-07-03T23:57:26","version":"1.52"},{"date":"2008-07-21T22:24:22","version":"1.53"},{"date":"2008-07-27T23:52:36","version":"1.54"},{"version":"1.55","date":"2009-04-08T01:09:54"},{"date":"2009-04-08T19:06:59","version":"1.56"},{"version":"1.57","date":"2009-04-16T15:57:34"},{"date":"2009-04-17T02:41:48","version":"1.58"},{"date":"2009-04-22T03:29:45","version":"1.59"},{"date":"2009-05-02T20:48:38","version":"1.60"},{"date":"2009-05-02T22:21:42","version":"1.60"},{"date":"2009-05-03T23:02:35","version":"1.61"},{"version":"1.62","date":"2011-06-13T19:28:39"},{"date":"2014-08-19T21:37:30","version":"1.63"},{"version":"1.64","date":"2014-08-19T22:29:15"},{"date":"2015-06-06T23:25:41","version":"1.65"},{"version":"1.66","date":"2015-06-08T18:20:03"},{"version":"1.67","date":"2015-06-08T20:22:33"},{"date":"2015-06-12T02:03:18","version":"1.68"},{"date":"2016-11-29T19:21:00","version":"1.69"},{"version":"1.70","date":"2019-06-24T15:33:44"},{"date":"2019-06-25T02:15:30","version":"1.71"},{"version":"1.72","date":"2019-07-02T19:22:14"},{"date":"2019-07-02T20:41:23","version":"1.73"}],"main_module":"HTML::Perlinfo"},"Perl-Version":{"advisories":[{"description":"Insecure dependency File::Slurp is used.\n","fixed_versions":[">=1.013"],"affected_versions":["<1.013"],"cves":[],"references":["https://metacpan.org/changes/distribution/Perl-Version","https://rt.cpan.org/Public/Bug/Display.html?id=92974"],"reported":"2014-02-12","distribution":"Perl-Version","id":"CPANSA-Perl-Version-2014-01"}],"versions":[{"version":"v0.0.1","date":"2007-02-07T19:41:42"},{"date":"2007-02-23T18:03:11","version":"v0.0.3"},{"date":"2007-02-24T18:03:42","version":"v0.0.4"},{"version":"v0.0.5","date":"2007-02-25T12:41:13"},{"date":"2007-02-27T12:46:07","version":"v0.0.6"},{"date":"2007-02-28T01:27:59","version":"v0.0.7"},{"version":"0.0.8","date":"2007-06-20T16:09:31"},{"date":"2007-09-03T14:28:35","version":"v1.000"},{"version":"v1.001","date":"2007-09-07T15:42:58"},{"date":"2007-09-07T15:58:18","version":"v1.002"},{"version":"1.003","date":"2007-11-08T12:14:27"},{"date":"2007-11-08T12:24:59","version":"1.004"},{"date":"2008-04-03T14:56:16","version":"1.005"},{"date":"2008-04-07T19:14:56","version":"1.006"},{"version":"1.007","date":"2008-04-07T19:27:24"},{"version":"1.008","date":"2009-03-07T16:40:03"},{"version":"1.009","date":"2009-03-09T16:22:08"},{"date":"2010-09-19T15:37:48","version":"1.010"},{"date":"2011-02-21T21:32:17","version":"1.011"},{"date":"2014-02-12T20:58:43","version":"1.013"},{"version":"1.013_01","date":"2014-02-14T16:08:42"},{"date":"2014-02-18T16:42:57","version":"1.013_02"},{"date":"2015-11-21T06:05:48","version":"1.013_03"},{"date":"2024-01-04T15:11:21","version":"1.015"},{"version":"1.016","date":"2024-01-05T13:57:01"},{"date":"2024-03-09T01:38:25","version":"1.017"},{"version":"1.018","date":"2025-01-27T13:08:16"}],"main_module":"Perl::Version"},"Sys-Syslog":{"main_module":"Sys::Syslog","advisories":[{"description":"Optional modules loaded from loading optional modules from \".\"\n","fixed_versions":[">=0.35"],"affected_versions":["<0.35"],"severity":"high","cves":["CVE-2016-1238"],"reported":"2016-07-27","references":["https://metacpan.org/dist/Sys-Syslog/changes","https://rt.cpan.org/Public/Bug/Display.html?id=116543"],"distribution":"Sys-Syslog","id":"CPANSA-Sys-Syslog-2016-1238"}],"versions":[{"date":"2005-12-06T22:19:29","version":"0.09"},{"date":"2005-12-08T01:10:57","version":"0.10"},{"date":"2005-12-27T23:49:31","version":"0.11"},{"date":"2006-01-07T04:07:20","version":"0.12"},{"date":"2006-01-11T01:03:02","version":"0.13"},{"version":"0.14","date":"2006-05-25T22:42:27"},{"date":"2006-06-10T23:57:12","version":"0.15"},{"date":"2006-06-20T21:26:29","version":"0.16"},{"date":"2006-07-23T01:51:16","version":"0.17"},{"date":"2006-08-28T22:18:29","version":"0.18"},{"date":"2007-09-05T09:39:56","version":"0.19"},{"date":"2007-09-05T10:23:25","version":"0.20"},{"version":"0.21","date":"2007-09-13T23:01:59"},{"version":"0.22","date":"2007-11-08T00:58:57"},{"version":"0.23","date":"2007-11-12T22:42:29"},{"version":"0.24","date":"2007-12-31T17:18:56"},{"version":"0.25","date":"2008-06-05T23:16:19"},{"version":"0.25","date":"2008-06-15T23:49:12"},{"version":"0.27","date":"2008-09-21T17:05:08"},{"date":"2009-03-14T03:24:36","version":"1.00"},{"version":"0.28","date":"2011-04-16T17:01:20"},{"date":"2011-04-18T14:10:00","version":"0.29"},{"version":"0.30","date":"2012-08-15T01:27:23"},{"version":"0.31","date":"2012-08-18T18:07:17"},{"version":"0.32","date":"2012-09-14T12:36:22"},{"version":"0.33","date":"2013-05-24T00:13:07"},{"version":"0.34","date":"2016-05-05T23:20:00"},{"date":"2016-09-01T16:56:39","version":"0.35"},{"version":"0.36","date":"2019-10-21T22:41:02"},{"perl_release":"5","version":null,"dual_lived":1,"date":"1994-10-17T00:00:00"},{"dual_lived":1,"date":"2000-03-22T00:00:00","perl_release":"5.006","version":"0.01"},{"date":"2002-03-05T00:00:00","dual_lived":1,"perl_release":"5.007003","version":"0.02"},{"version":"0.03","perl_release":"5.008","dual_lived":1,"date":"2002-07-19T00:00:00"},{"dual_lived":1,"date":"2003-09-25T00:00:00","version":"0.04","perl_release":"5.008001"},{"dual_lived":1,"date":"2004-04-21T00:00:00","version":"0.05","perl_release":"5.008004"},{"date":"2005-05-30T00:00:00","dual_lived":1,"perl_release":"5.008007","version":"0.06"},{"dual_lived":1,"date":"2007-07-07T00:00:00","version":"0.18_01","perl_release":"5.009005"},{"dual_lived":1,"date":"2017-01-14T00:00:00","perl_release":"5.022003","version":"0.33_01"},{"version":"0.34_01","perl_release":"5.025004","date":"2016-08-20T00:00:00","dual_lived":1}]},"Image-ExifTool":{"main_module":"Image::ExifTool","versions":[{"version":"3.60","date":"2004-10-04T15:37:06"},{"version":"3.72","date":"2004-11-02T12:46:54"},{"date":"2004-11-05T12:41:52","version":"3.74"},{"version":"3.82","date":"2004-11-11T18:24:18"},{"version":"3.93","date":"2004-11-24T18:42:42"},{"version":"3.94","date":"2004-11-25T16:34:47"},{"version":"4.36","date":"2005-01-24T13:15:55"},{"version":"4.53","date":"2005-02-07T15:56:43"},{"date":"2005-02-18T00:42:59","version":"4.64"},{"version":"4.73","date":"2005-03-01T19:23:29"},{"date":"2005-03-15T12:09:56","version":"4.87"},{"date":"2005-04-02T19:46:41","version":"4.93"},{"version":"5.05","date":"2005-04-20T12:41:30"},{"date":"2005-05-16T15:54:07","version":"5.18"},{"version":"5.25","date":"2005-06-03T19:21:17"},{"version":"5.32","date":"2005-06-15T17:21:33"},{"date":"2005-07-19T18:16:02","version":"5.46"},{"date":"2005-08-24T14:58:18","version":"5.55"},{"version":"5.67","date":"2005-10-13T13:15:01"},{"version":"5.77","date":"2005-11-18T13:04:29"},{"date":"2005-12-22T16:42:56","version":"5.87"},{"version":"6.00","date":"2006-02-19T20:26:14"},{"version":"6.17","date":"2006-05-12T12:10:32"},{"date":"2006-07-24T13:18:05","version":"6.29"},{"date":"2006-09-06T20:26:16","version":"6.36"},{"date":"2006-09-21T15:39:52","version":"6.42"},{"version":"6.57","date":"2006-11-20T13:52:55"},{"date":"2006-12-20T13:07:23","version":"6.66"},{"date":"2007-02-14T13:28:50","version":"6.75"},{"date":"2007-02-16T13:21:27","version":"6.76"},{"date":"2007-05-10T18:53:15","version":"6.90"},{"date":"2007-10-24T11:39:52","version":"7.00"},{"date":"2008-02-05T17:21:39","version":"7.15"},{"version":"7.21","date":"2008-03-12T12:24:57"},{"version":"7.25","date":"2008-04-18T13:09:00"},{"version":"7.30","date":"2008-05-31T11:39:35"},{"version":"7.50","date":"2008-10-26T19:00:34"},{"date":"2008-10-27T13:48:39","version":"7.51"},{"version":"7.60","date":"2009-01-06T13:48:18"},{"date":"2009-02-09T14:25:12","version":"7.67"},{"date":"2009-07-02T15:42:38","version":"7.82"},{"version":"7.88","date":"2009-08-18T01:30:53"},{"version":"7.89","date":"2009-08-18T12:03:19"},{"date":"2009-11-20T19:06:24","version":"8.00"},{"version":"8.10","date":"2010-02-08T20:49:00"},{"version":"8.15","date":"2010-03-18T14:09:58"},{"date":"2010-07-13T12:35:33","version":"8.25"},{"version":"8.40","date":"2010-11-21T21:29:00"},{"version":"8.50","date":"2011-03-01T12:43:02"},{"version":"8.60","date":"2011-06-27T11:52:50"},{"version":"8.65","date":"2011-09-24T10:53:29"},{"version":"8.75","date":"2012-01-08T13:48:19"},{"version":"8.77","date":"2012-01-27T14:19:10"},{"date":"2012-03-25T12:07:06","version":"8.85"},{"date":"2012-04-28T12:06:48","version":"8.90"},{"date":"2012-08-25T12:28:04","version":"9.01"},{"version":"9.04","date":"2012-11-03T16:37:48"},{"date":"2013-01-02T21:07:34","version":"9.11"},{"version":"9.12","date":"2013-01-03T01:49:33"},{"version":"9.13","date":"2013-01-10T15:05:11"},{"date":"2013-04-06T11:38:39","version":"9.25"},{"version":"9.27","date":"2013-04-15T11:20:13"},{"date":"2014-01-11T22:58:56","version":"9.46"},{"date":"2014-02-22T14:40:30","version":"9.53"},{"version":"9.60","date":"2014-05-11T13:34:36"},{"version":"9.70","date":"2014-09-03T12:19:55"},{"date":"2014-11-15T15:14:24","version":"9.76"},{"version":"9.90","date":"2015-03-14T11:33:58"},{"date":"2015-08-18T13:30:08","version":"10.00"},{"version":"10.10","date":"2016-01-22T15:51:06"},{"date":"2016-04-20T13:25:01","version":"10.15"},{"version":"10.20","date":"2016-06-13T14:05:58"},{"version":"10.36","date":"2016-11-24T16:55:55"},{"date":"2017-01-13T16:02:53","version":"10.39"},{"version":"10.40","date":"2017-01-14T17:30:45"},{"date":"2017-04-20T12:54:29","version":"10.50"},{"date":"2017-06-05T14:41:23","version":"10.55"},{"date":"2018-02-22T13:27:40","version":"10.80"},{"version":"11.00","date":"2018-06-07T11:44:16"},{"date":"2018-06-11T12:18:41","version":"11.01"},{"date":"2018-09-28T01:34:43","version":"11.11"},{"version":"11.30","date":"2019-03-06T15:14:28"},{"date":"2019-06-11T15:29:41","version":"11.50"},{"date":"2019-10-10T13:04:36","version":"11.70"},{"version":"11.85","date":"2020-01-28T15:40:58"},{"date":"2020-06-11T20:36:48","version":"12.00"},{"version":"12.15","date":"2021-01-18T14:03:50"},{"date":"2021-01-21T17:51:28","version":"12.16"},{"date":"2021-05-21T00:37:46","version":"12.26"},{"date":"2021-08-12T13:13:43","version":"12.30"},{"date":"2022-06-07T11:39:06","version":"12.42"},{"version":"12.42","date":"2022-06-07T20:05:13"},{"version":"12.50","date":"2022-11-09T11:41:50"},{"version":"12.60","date":"2023-04-05T15:01:59"},{"date":"2023-11-19T16:15:22","version":"12.70"},{"date":"2024-01-31T01:08:08","version":"12.75"},{"version":"12.76","date":"2024-01-31T15:31:14"},{"date":"2024-10-29T17:10:24","version":"13.00"},{"date":"2024-12-20T16:49:20","version":"13.10"}],"advisories":[{"id":"CPANSA-Image-ExifTool-2022-23935","distribution":"Image-ExifTool","references":["https://github.com/exiftool/exiftool/commit/74dbab1d2766d6422bb05b033ac6634bf8d1f582","https://gist.github.com/ert-plus/1414276e4cb5d56dd431c2f0429e4429"],"reported":"2022-01-25","cves":["CVE-2022-23935"],"severity":"critical","affected_versions":["<=12.37"],"fixed_versions":[">12.38"],"description":"lib/Image/ExifTool.pm in ExifTool before 12.38 mishandles a $file =~ /\\|$/ check, leading to command injection.\n"},{"affected_versions":[">=7.44,<=12.23"],"description":"Improper neutralization of user data in the DjVu file format in ExifTool versions 7.44 and up allows arbitrary code execution when parsing the malicious image\n","fixed_versions":[">12.23"],"id":"CPANSA-Image-ExifTool-2021-22204","cves":["CVE-2021-22204"],"severity":null,"distribution":"Image-ExifTool","reported":"2021-04-23","references":["http://packetstormsecurity.com/files/162558/ExifTool-DjVu-ANT-Perl-Injection.html","http://packetstormsecurity.com/files/164768/GitLab-Unauthenticated-Remote-ExifTool-Command-Injection.html","http://packetstormsecurity.com/files/164994/GitLab-13.10.2-Remote-Code-Execution.html","http://packetstormsecurity.com/files/167038/ExifTool-12.23-Arbitrary-Code-Execution.html","http://www.openwall.com/lists/oss-security/2021/05/09/1","http://www.openwall.com/lists/oss-security/2021/05/10/5","https://github.com/exiftool/exiftool/commit/cf0f4e7dcd024ca99615bfd1102a841a25dde031#diff-fa0d652d10dbcd246e6b1df16c1e992931d3bb717a7e36157596b76bdadb3800","https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22204.json","https://hackerone.com/reports/1154542","https://lists.debian.org/debian-lts-announce/2021/05/msg00018.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DDKDLJLBTBBR66OOPXSXCG2PQRM5KCZL/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F6UOBPU3LSHAPRRJNISNVXZ5DSUIALLV/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U4RF6PJCJ6NQOVJJJF6HN6BORUQVIXY6/","https://www.debian.org/security/2021/dsa-4910"]},{"affected_versions":["=8.32"],"description":"ExifTool 8.32 allows local users to gain privileges by creating a %TEMP%\\\\par-%username%\\\\cache-exiftool-8.32 folder with a victim's username, and then copying a Trojan horse ws32_32.dll file into this new folder, aka DLL Hijacking. NOTE: 8.32 is an obsolete version from 2010 (9.x was released starting in 2012, and 10.x was released starting in 2015).\n","fixed_versions":[">8"],"id":"CPANSA-Image-ExifTool-2018-20211","references":["http://packetstormsecurity.com/files/150892/Exiftool-8.3.2.0-DLL-Hijacking.html","http://seclists.org/fulldisclosure/2018/Dec/44"],"reported":"2019-01-02","distribution":"Image-ExifTool","severity":null,"cves":["CVE-2018-20211"]}]},"libwww-perl":{"main_module":"LWP","advisories":[{"cves":[],"references":["https://github.com/libwww-perl/libwww-perl/pull/270"],"reported":"2017-11-06","distribution":"libwww-perl","reviewed_by":[{"email":"rrwo@cpan.org","name":"Robert Rothenberg","date":"2022-06-23"}],"id":"CPANSA-libwww-perl-2017-01","fixed_versions":[">=6.27"],"description":"LWP::Protocol::file can open existent file from file:// scheme. However, current version of LWP uses open FILEHANDLE,EXPR and it has ability to execute arbitrary command\n","affected_versions":["<6.28"]},{"description":"The Net::HTTPS module in libwww-perl (LWP) before 6.00, as used in WWW::Mechanize, LWP::UserAgent, and other products, when running in environments that do not set the If-SSL-Cert-Subject header, does not enable full validation of SSL certificates by default, which allows remote attackers to spoof servers via man-in-the-middle (MITM) attacks involving hostnames that are not properly validated.\n","fixed_versions":[">=6.00"],"affected_versions":["<6.00"],"cves":["CVE-2011-0633"],"distribution":"libwww-perl","reported":"2011-01-20","references":["http://vttynotes.blogspot.com/2010/12/man-in-middle-fun-with-perl-lwp.html","http://vttynotes.blogspot.com/2011/03/quick-note-on-lwp-and-perl-security-cve.html"],"id":"CPANSA-libwww-perl-2011-01"},{"affected_versions":["<5.835"],"fixed_versions":[">=5.835"],"description":"lwp-download in libwww-perl before 5.835 does not reject downloads to filenames that begin with a . (dot) character, which allows remote servers to create or overwrite files via (1) a 3xx redirect to a URL with a crafted filename or (2) a Content-Disposition header that suggests a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory.\n","id":"CPANSA-libwww-perl-2010-01","distribution":"libwww-perl","references":["http://vttynotes.blogspot.com/2010/12/man-in-middle-fun-with-perl-lwp.html","http://vttynotes.blogspot.com/2011/03/quick-note-on-lwp-and-perl-security-cve.html"],"reported":"2010-07-06","cves":["CVE-2010-2253"]},{"affected_versions":["<5.51"],"id":"CPANSA-libwww-perl-2001-01","description":"If LWP::UserAgent::env_proxy is called in a CGI environment, the case-insensitivity when looking for \"http_proxy\" permits \"HTTP_PROXY\" to be found, but this can be trivially set by the web client using the \"Proxy:\" header.\n","fixed_versions":[">=5.51"],"cves":[],"distribution":"libwww-perl","reported":"2001-03-14"},{"affected_versions":["<0.04"],"fixed_versions":[">=0.04"],"description":"There is a security hole with the implementation of getBasicCredentials().\n","id":"CPANSA-libwww-perl-1995-01","cves":[],"distribution":"libwww-perl","reported":"1995-09-06","references":["https://metacpan.org/dist/libwww-perl/changes"]}],"versions":[{"version":"5","date":"1995-09-16T13:51:35"},{"date":"1995-11-06T14:29:13","version":"5"},{"date":"1996-05-09T22:43:16","version":"5"},{"version":"5.00","date":"1996-05-26T14:01:51"},{"date":"1996-08-02T16:38:58","version":"5.01"},{"date":"1996-09-11T16:19:57","version":"5.02"},{"date":"1996-09-30T22:58:37","version":"5.03"},{"date":"1996-10-22T10:39:33","version":"5.04"},{"date":"1996-12-04T23:36:17","version":"5.05"},{"date":"1997-01-27T23:53:38","version":"5.06"},{"version":"5.07","date":"1997-02-11T14:20:18"},{"version":"5.08","date":"1997-04-05T13:10:16"},{"version":"5.09","date":"1997-06-10T11:07:01"},{"date":"1997-06-20T10:51:10","version":"5.10"},{"date":"1997-08-06T08:41:11","version":"5.11"},{"date":"1997-09-05T09:38:58","version":"5.12"},{"date":"1997-09-20T12:50:59","version":"5.13"},{"date":"1997-10-12T20:55:32","version":"5.14"},{"version":"5.15","date":"1997-11-06T20:23:06"},{"date":"1997-12-12T17:44:29","version":"5.18"},{"version":"5.18_03","date":"1997-12-16T22:25:00"},{"date":"1997-12-17T10:08:54","version":"5.18_04"},{"date":"1998-01-20T18:16:51","version":"5.18_05"},{"version":"5.19","date":"1998-01-26T23:55:39"},{"date":"1998-02-12T23:43:23","version":"5.20"},{"version":"5.21","date":"1998-03-12T18:39:08"},{"version":"5.22","date":"1998-03-24T19:42:54"},{"date":"1998-03-31T22:25:14","version":"5.30"},{"date":"1998-04-10T15:07:10","version":"5.31"},{"version":"5.32","date":"1998-04-17T05:23:45"},{"date":"1998-05-07T15:10:00","version":"5.33"},{"version":"5.34","date":"1998-07-07T16:06:51"},{"date":"1998-07-09T23:05:12","version":"5.35"},{"date":"1998-08-04T15:15:44","version":"5.36"},{"version":"5.40_01","date":"1998-10-12T17:42:28"},{"date":"1998-11-19T22:17:29","version":"5.41"},{"date":"1999-03-20T07:52:48","version":"5.42"},{"date":"1999-05-09T19:26:17","version":"5.43"},{"date":"1999-06-25T20:34:40","version":"5.44"},{"date":"1999-09-20T13:36:22","version":"5.45"},{"date":"1999-10-28T12:30:45","version":"5.46"},{"version":"5.47","date":"1999-11-16T14:59:58"},{"version":"5.48","date":"2000-04-09T19:45:32"},{"version":"5.49","date":"2001-01-01T06:35:20"},{"date":"2001-01-12T20:58:43","version":"5.50"},{"date":"2001-03-14T21:33:03","version":"5.51"},{"date":"2001-03-29T21:39:12","version":"5.52"},{"version":"5.53","date":"2001-04-10T23:15:00"},{"date":"2001-04-19T06:13:35","version":"5.53_90"},{"version":"5.53_91","date":"2001-04-21T05:02:13"},{"date":"2001-04-25T17:37:11","version":"5.53_92"},{"date":"2001-04-29T06:28:31","version":"5.53_93"},{"version":"5.53_94","date":"2001-05-05T13:57:20"},{"version":"5.53_95","date":"2001-08-07T00:46:18"},{"date":"2001-08-28T05:59:46","version":"5.53_96"},{"version":"5.53_97","date":"2001-09-20T00:33:20"},{"date":"2001-10-26T23:30:57","version":"5.60"},{"date":"2001-11-17T02:56:46","version":"5.61"},{"version":"5.62","date":"2001-11-21T19:00:47"},{"version":"5.63","date":"2001-12-14T21:01:09"},{"version":"5.64","date":"2002-02-09T18:54:35"},{"date":"2002-05-31T20:59:15","version":"5.65"},{"date":"2002-12-20T19:28:34","version":"5.66"},{"version":"5.67","date":"2003-01-01T16:53:11"},{"date":"2003-01-03T05:04:44","version":"5.68"},{"date":"2003-01-24T16:55:35","version":"5.69"},{"date":"2003-10-13T20:56:35","version":"5.70"},{"version":"5.71","date":"2003-10-14T19:12:56"},{"version":"5.72","date":"2003-10-15T19:53:47"},{"date":"2003-10-19T20:04:40","version":"5.73"},{"date":"2003-10-23T19:26:57","version":"5.74"},{"version":"5.75","date":"2003-10-26T22:10:48"},{"version":"5.76","date":"2003-11-21T19:33:09"},{"date":"2004-04-06T13:41:45","version":"5.77"},{"date":"2004-04-07T11:13:36","version":"5.78"},{"version":"5.79","date":"2004-04-13T08:09:08"},{"version":"5.800","date":"2004-06-16T10:43:42"},{"date":"2004-11-12T18:32:17","version":"5.801"},{"version":"5.802","date":"2004-11-30T13:06:01"},{"version":"5.803","date":"2004-12-11T15:48:30"},{"version":"5.804","date":"2005-12-06T09:36:12"},{"version":"5.805","date":"2005-12-08T12:29:02"},{"version":"5.806","date":"2007-07-19T21:31:44"},{"date":"2007-07-31T13:14:54","version":"5.807"},{"date":"2007-08-05T13:29:17","version":"5.808"},{"version":"5.810","date":"2008-04-08T11:47:19"},{"version":"5.811","date":"2008-04-14T08:28:19"},{"version":"5.812","date":"2008-04-16T10:32:51"},{"version":"5.813","date":"2008-06-17T20:37:17"},{"date":"2008-07-25T09:09:53","version":"5.814"},{"date":"2008-09-24T18:10:11","version":"5.815"},{"date":"2008-09-29T09:27:09","version":"5.816"},{"date":"2008-10-10T21:31:27","version":"5.817"},{"date":"2008-10-16T10:32:24","version":"5.818"},{"date":"2008-10-20T11:43:37","version":"5.819"},{"date":"2008-11-05T18:07:29","version":"5.820"},{"version":"5.821","date":"2008-11-25T00:16:49"},{"date":"2008-12-05T19:18:40","version":"5.822"},{"version":"5.823","date":"2009-01-12T16:50:02"},{"date":"2009-02-13T14:12:29","version":"5.824"},{"version":"5.825","date":"2009-02-16T10:00:35"},{"date":"2009-04-24T20:42:45","version":"5.826"},{"version":"5.827","date":"2009-06-15T19:36:37"},{"date":"2009-06-25T19:44:55","version":"5.828"},{"date":"2009-07-08T20:03:11","version":"5.829"},{"date":"2009-07-26T19:39:49","version":"5.830"},{"date":"2009-08-13T20:53:34","version":"5.831"},{"date":"2009-09-21T18:24:41","version":"5.832"},{"version":"5.833","date":"2009-10-06T21:23:39"},{"version":"5.834","date":"2009-11-21T13:09:14"},{"version":"5.835","date":"2010-05-05T21:13:47"},{"version":"5.836","date":"2010-05-13T07:34:58"},{"version":"5.837","date":"2010-09-20T21:24:38"},{"version":"5.837","date":"2010-11-04T15:16:35"},{"date":"2011-03-08T19:25:05","version":"6.00"},{"version":"6.01","date":"2011-03-09T23:30:57"},{"date":"2011-03-27T11:35:01","version":"6.02"},{"date":"2011-10-15T13:38:28","version":"6.03"},{"date":"2012-02-18T22:13:13","version":"6.04"},{"version":"6.05","date":"2013-03-11T21:47:56"},{"date":"2014-04-16T18:38:49","version":"6.06"},{"date":"2014-07-02T05:10:47","version":"6.07"},{"version":"6.08","date":"2014-07-25T03:19:43"},{"date":"2015-02-10T02:58:40","version":"6.09"},{"version":"6.10","date":"2015-02-12T17:40:48"},{"date":"2015-02-13T21:38:49","version":"6.11"},{"date":"2015-02-14T00:16:15","version":"6.12"},{"date":"2015-02-14T18:45:12","version":"6.13"},{"version":"6.14_001","date":"2015-11-25T20:23:47"},{"date":"2015-12-05T06:01:09","version":"6.15"},{"date":"2016-01-05T00:29:20","version":"6.15_001"},{"version":"6.15_002","date":"2016-01-14T01:52:18"},{"version":"6.15_003","date":"2016-01-14T02:01:20"},{"date":"2016-02-13T06:18:45","version":"6.15_004"},{"version":"6.16","date":"2017-01-18T14:22:22"},{"version":"6.17","date":"2017-01-31T19:39:10"},{"date":"2017-02-03T20:31:54","version":"6.18"},{"date":"2017-02-14T19:56:20","version":"6.19"},{"date":"2017-02-21T15:19:06","version":"6.20"},{"date":"2017-02-21T20:38:03","version":"6.21"},{"date":"2017-03-01T15:27:43","version":"6.22"},{"date":"2017-03-07T03:49:52","version":"6.23"},{"version":"6.24","date":"2017-03-14T16:36:38"},{"version":"6.25","date":"2017-04-03T17:20:06"},{"version":"6.26","date":"2017-04-12T15:36:20"},{"version":"6.27","date":"2017-09-21T22:32:37"},{"date":"2017-11-06T15:43:47","version":"6.28"},{"version":"6.29","date":"2017-11-06T20:34:56"},{"version":"6.30","date":"2017-12-08T01:57:23"},{"version":"6.31","date":"2017-12-11T01:57:47"},{"date":"2018-02-20T19:41:40","version":"6.32"},{"date":"2018-02-27T04:04:55","version":"6.33"},{"date":"2018-06-05T18:50:45","version":"6.34"},{"date":"2018-07-16T04:51:16","version":"6.35"},{"version":"6.36","date":"2018-10-10T02:21:49"},{"version":"6.37","date":"2019-03-06T20:51:05"},{"date":"2019-03-25T19:00:53","version":"6.38"},{"version":"6.39","date":"2019-05-06T14:19:25"},{"version":"6.40","date":"2019-10-24T13:08:25"},{"date":"2019-10-28T14:45:05","version":"6.41"},{"date":"2019-11-20T17:41:59","version":"6.42"},{"date":"2019-11-26T13:56:02","version":"6.43"},{"date":"2020-04-14T19:39:37","version":"6.44"},{"version":"6.45","date":"2020-06-08T14:52:52"},{"date":"2020-06-23T21:20:14","version":"6.46"},{"date":"2020-08-18T15:28:34","version":"6.47"},{"version":"6.48","date":"2020-09-20T15:26:52"},{"date":"2020-09-24T00:29:49","version":"6.49"},{"version":"6.50","date":"2020-12-16T18:36:35"},{"version":"6.51","date":"2020-12-29T22:09:46"},{"version":"6.52","date":"2021-01-07T21:58:27"},{"version":"6.53","date":"2021-03-07T16:55:35"},{"date":"2021-05-06T17:55:38","version":"6.54"},{"date":"2021-06-17T13:58:40","version":"6.55"},{"date":"2021-08-17T13:58:19","version":"6.56"},{"version":"6.57","date":"2021-09-20T20:29:02"},{"version":"6.58","date":"2021-10-25T20:44:12"},{"date":"2021-12-02T21:20:00","version":"6.59"},{"date":"2021-12-17T22:33:53","version":"6.60"},{"version":"6.61","date":"2022-01-21T21:44:31"},{"date":"2022-04-05T01:05:20","version":"6.62"},{"version":"6.63","date":"2022-04-25T15:25:43"},{"date":"2022-04-26T13:17:45","version":"6.64"},{"date":"2022-05-09T18:42:27","version":"6.65"},{"version":"6.66","date":"2022-05-18T16:57:21"},{"date":"2022-06-14T20:24:12","version":"6.67"},{"date":"2023-02-27T19:20:03","version":"6.68"},{"version":"6.69","date":"2023-04-29T13:15:34"},{"date":"2023-04-30T13:26:14","version":"6.70"},{"date":"2023-06-20T19:46:00","version":"6.71"},{"date":"2023-07-17T22:02:15","version":"6.72"},{"date":"2024-01-13T20:26:02","version":"6.73"},{"version":"6.74","date":"2024-01-22T17:49:13"},{"version":"6.75","date":"2024-01-24T14:30:24"},{"date":"2024-01-25T18:33:12","version":"6.76"},{"date":"2024-03-11T00:58:25","version":"6.77"},{"version":"6.78","date":"2025-02-20T00:44:17"}]},"Fake-Encode":{"main_module":"Fake::Encode","advisories":[{"affected_versions":["<0.08"],"fixed_versions":[">=0.08"],"description":"Loading modules from . (current directory).\n","id":"CPANSA-Fake-Encode-2017-01","distribution":"Fake-Encode","reported":"2017-01-23","references":["https://metacpan.org/changes/distribution/Fake-Encode"],"cves":["CVE-2016-1238"]}],"versions":[{"version":"0.01","date":"2016-05-31T14:11:49"},{"date":"2017-01-23T12:34:23","version":"0.02"},{"version":"0.03","date":"2017-01-25T15:52:13"},{"date":"2017-01-26T15:17:01","version":"0.04"},{"version":"0.05","date":"2017-03-06T16:01:40"},{"version":"0.06","date":"2017-09-08T17:54:14"},{"date":"2017-09-09T15:27:50","version":"0.07"},{"version":"0.08","date":"2018-02-03T14:50:49"},{"date":"2018-02-19T12:21:04","version":"0.09"},{"version":"0.10","date":"2019-07-11T16:26:06"},{"date":"2023-03-25T02:26:13","version":"0.11"}]},"Filesys-SmbClientParser":{"advisories":[{"fixed_versions":[],"description":"The Filesys::SmbClientParser module 2.7 and earlier for Perl allows remote SMB servers to execute arbitrary code via a folder name containing shell metacharacters.\n","affected_versions":["<=2.7"],"references":["http://www.securityfocus.com/bid/30290","http://secunia.com/advisories/31175","http://securityreason.com/securityalert/4027","https://exchange.xforce.ibmcloud.com/vulnerabilities/43910","http://www.securityfocus.com/archive/1/494536/100/0/threaded"],"reported":"2008-07-24","distribution":"Filesys-SmbClientParser","severity":null,"cves":["CVE-2008-3285"],"id":"CPANSA-Filesys-SmbClientParser-2008-3285"}],"versions":[{"version":"0.01","date":"2000-11-19T21:10:38"},{"date":"2000-11-20T19:41:09","version":"0.2"},{"version":"0.3","date":"2001-01-12T00:31:50"},{"date":"2001-04-15T22:37:14","version":"1.2"},{"date":"2001-04-19T17:38:19","version":"1.3"},{"date":"2001-05-30T08:04:44","version":"1.4"},{"date":"2002-01-25T12:18:47","version":"2.0"},{"date":"2002-04-19T21:56:09","version":"2.1"},{"date":"2002-08-09T11:24:20","version":"2.2"},{"version":"2.3","date":"2002-08-13T14:55:48"},{"date":"2002-11-08T23:57:07","version":"2.4"},{"date":"2002-11-12T18:59:33","version":"2.5"},{"date":"2004-01-28T23:06:58","version":"2.6"},{"version":"2.7","date":"2004-04-14T21:56:02"}],"main_module":"Filesys::SmbClientParser"},"HTML-Parser":{"main_module":"HTML::Parser","versions":[{"version":"2.14","date":"1998-03-31T22:25:05"},{"version":"2.16","date":"1998-04-02T11:40:38"},{"version":"2.17","date":"1998-04-28T08:35:12"},{"version":"2.18","date":"1998-06-22T19:45:24"},{"date":"1998-07-06T23:12:33","version":"2.19"},{"date":"1998-07-08T13:05:04","version":"2.20"},{"date":"1998-11-13T21:48:08","version":"2.21"},{"version":"2.23","date":"1999-06-09T10:34:35"},{"date":"1999-11-03T07:10:32","version":"2.24"},{"version":"2.25","date":"1999-11-05T09:46:11"},{"date":"1999-12-14T23:01:49","version":"3.00"},{"version":"3.01","date":"1999-12-19T07:07:38"},{"date":"1999-12-21T09:55:56","version":"3.02"},{"date":"2000-01-15T16:25:39","version":"3.04"},{"version":"3.05","date":"2000-01-22T16:14:25"},{"version":"3.06","date":"2000-03-06T14:00:15"},{"date":"2000-03-20T12:47:48","version":"3.07"},{"date":"2000-05-23T10:59:19","version":"3.08"},{"version":"3.09","date":"2000-06-28T08:49:09"},{"version":"3.10","date":"2000-06-29T07:52:47"},{"version":"3.11","date":"2000-08-22T10:04:28"},{"version":"3.12","date":"2000-09-14T18:22:47"},{"date":"2000-09-17T01:55:45","version":"3.13"},{"date":"2000-12-04T06:05:39","version":"3.14"},{"version":"3.15","date":"2000-12-26T09:04:53"},{"version":"3.16","date":"2001-02-23T07:21:20"},{"version":"3.17","date":"2001-02-24T06:32:38"},{"version":"3.18","date":"2001-02-25T04:51:50"},{"version":"3.19","date":"2001-03-10T04:32:27"},{"version":"3.19_90","date":"2001-03-13T19:44:52"},{"version":"3.19","date":"2001-03-16T02:29:32"},{"date":"2001-03-19T19:26:50","version":"3.19_91"},{"date":"2001-03-26T15:37:39","version":"3.19_92"},{"date":"2001-03-27T19:44:20","version":"3.19_93"},{"version":"3.19_94","date":"2001-03-30T08:24:11"},{"date":"2001-04-03T00:18:14","version":"3.20"},{"version":"3.21","date":"2001-04-10T22:34:03"},{"version":"3.22","date":"2001-04-18T05:31:23"},{"version":"3.23","date":"2001-05-02T04:18:51"},{"version":"3.23","date":"2001-05-05T06:18:21"},{"version":"3.24","date":"2001-05-09T07:23:34"},{"date":"2001-05-11T17:26:39","version":"3.25"},{"version":"3.25","date":"2001-06-12T08:35:06"},{"date":"2002-03-17T20:11:55","version":"3.26"},{"version":"3.27","date":"2003-01-18T13:08:01"},{"version":"3.28","date":"2003-04-17T03:56:32"},{"date":"2003-08-15T06:11:17","version":"3.29"},{"date":"2003-08-18T05:48:21","version":"3.30"},{"version":"3.31","date":"2003-08-19T14:56:07"},{"date":"2003-10-10T14:31:48","version":"3.32"},{"date":"2003-10-14T10:53:29","version":"3.33"},{"version":"3.34","date":"2003-10-27T21:23:09"},{"date":"2003-12-12T14:27:23","version":"3.35"},{"date":"2004-04-01T12:21:44","version":"3.36"},{"date":"2004-11-10T18:56:54","version":"3.37"},{"version":"3.38","date":"2004-11-11T10:19:56"},{"date":"2004-11-17T14:33:49","version":"3.39_90"},{"date":"2004-11-23T11:46:30","version":"3.39_91"},{"version":"3.39_92","date":"2004-11-23T22:25:21"},{"date":"2004-11-29T11:14:34","version":"3.40"},{"date":"2004-11-30T09:30:56","version":"3.41"},{"version":"3.42","date":"2004-12-04T11:54:54"},{"date":"2004-12-06T09:19:28","version":"3.43"},{"date":"2004-12-28T14:07:28","version":"3.44"},{"version":"3.45","date":"2005-01-06T09:09:45"},{"date":"2005-10-24T12:34:04","version":"3.46"},{"version":"3.47","date":"2005-11-22T21:50:09"},{"version":"3.48","date":"2005-12-02T17:41:00"},{"date":"2006-02-08T10:58:39","version":"3.49"},{"version":"3.50","date":"2006-02-14T18:32:51"},{"version":"3.51","date":"2006-03-22T09:26:15"},{"version":"3.52","date":"2006-04-26T08:43:13"},{"date":"2006-04-27T11:55:34","version":"3.53"},{"version":"3.54","date":"2006-04-28T08:21:04"},{"date":"2006-07-10T09:16:22","version":"3.55"},{"version":"3.56","date":"2007-01-12T11:00:07"},{"version":"3.57","date":"2008-11-16T21:45:07"},{"version":"3.58","date":"2008-11-17T11:35:37"},{"date":"2008-11-24T09:15:09","version":"3.59"},{"date":"2009-02-09T11:26:08","version":"3.60"},{"version":"3.61","date":"2009-06-20T09:34:17"},{"version":"3.62","date":"2009-08-13T21:01:27"},{"date":"2009-10-22T20:11:52","version":"3.63"},{"version":"3.64","date":"2009-10-25T12:24:11"},{"version":"3.65","date":"2010-04-04T20:44:00"},{"version":"3.66","date":"2010-07-09T13:27:13"},{"version":"3.67","date":"2010-08-17T17:15:19"},{"date":"2010-09-01T21:28:52","version":"3.68"},{"date":"2011-10-15T15:35:01","version":"3.69"},{"date":"2013-03-28T22:21:30","version":"3.70"},{"version":"3.71","date":"2013-05-08T22:23:29"},{"version":"3.72","date":"2016-01-19T17:44:02"},{"version":"3.73","date":"2020-08-25T17:40:17"},{"version":"3.74","date":"2020-08-30T18:40:48"},{"date":"2020-08-30T19:58:22","version":"3.75"},{"version":"3.76","date":"2021-03-04T18:06:59"},{"date":"2022-03-14T22:12:49","version":"3.77"},{"version":"3.78","date":"2022-03-28T15:23:23"},{"version":"3.79","date":"2022-10-12T15:41:58"},{"version":"3.80","date":"2022-11-01T14:19:26"},{"version":"3.81","date":"2023-01-31T03:13:18"},{"version":"3.82","date":"2024-03-13T20:11:51"},{"date":"2024-07-30T16:42:50","version":"3.83"}],"advisories":[{"description":"The decode_entities function in util.c in HTML-Parser before 3.63 allows context-dependent attackers to cause a denial of service (infinite loop) via an incomplete SGML numeric character reference, which triggers generation of an invalid UTF-8 character.\n","fixed_versions":[],"affected_versions":["<3.63"],"severity":null,"cves":["CVE-2009-3627"],"reported":"2009-10-29","references":["https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6225","http://www.openwall.com/lists/oss-security/2009/10/23/9","http://secunia.com/advisories/37155","http://www.securityfocus.com/bid/36807","https://bugzilla.redhat.com/show_bug.cgi?id=530604","http://www.vupen.com/english/advisories/2009/3022","http://github.com/gisle/html-parser/commit/b9aae1e43eb2c8e989510187cff0ba3e996f9a4c","https://exchange.xforce.ibmcloud.com/vulnerabilities/53941"],"distribution":"HTML-Parser","id":"CPANSA-HTML-Parser-2009-3627"}]},"Data-Validate-IP":{"main_module":"Data::Validate::IP","versions":[{"date":"2005-03-04T16:46:50","version":"0.02"},{"version":"0.03","date":"2005-03-04T20:06:14"},{"date":"2005-04-28T15:11:20","version":"0.04"},{"date":"2007-03-06T19:45:16","version":"0.05"},{"version":"0.06","date":"2007-05-16T16:08:59"},{"date":"2007-05-18T02:42:07","version":"0.07"},{"date":"2007-12-06T18:48:53","version":"0.08"},{"version":"0.10","date":"2009-06-04T17:52:28"},{"date":"2010-03-01T19:40:48","version":"0.11"},{"date":"2010-12-29T21:23:08","version":"0.12"},{"version":"0.13","date":"2011-01-06T14:25:53"},{"version":"0.14","date":"2011-01-06T14:45:14"},{"date":"2013-02-05T00:19:11","version":"0.15"},{"date":"2013-02-06T15:18:38","version":"0.16"},{"date":"2013-02-19T15:58:21","version":"0.17"},{"date":"2013-02-20T00:31:32","version":"0.18"},{"date":"2013-03-13T15:48:07","version":"0.19"},{"date":"2013-07-13T19:21:15","version":"0.20"},{"date":"2013-12-05T21:16:41","version":"0.21"},{"date":"2013-12-05T22:47:38","version":"0.22"},{"version":"0.23","date":"2014-03-09T16:00:20"},{"date":"2014-08-28T16:00:00","version":"0.24"},{"version":"0.25","date":"2016-02-02T16:17:46"},{"version":"0.26","date":"2016-05-31T17:31:50"},{"version":0.27,"date":"2016-11-17T18:05:57"},{"version":"0.28","date":"2021-03-29T17:01:17"},{"date":"2021-03-29T17:07:58","version":"0.29"},{"version":"0.30","date":"2021-03-29T21:50:39"},{"date":"2022-11-28T18:19:55","version":"0.31"}],"advisories":[{"affected_versions":["<=0.29"],"description":"The Data::Validate::IP module through 0.29 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.\n","fixed_versions":[">0.29"],"id":"CPANSA-Data-Validate-IP-2021-01","reported":"2021-03-31","references":["https://security.netapp.com/advisory/ntap-20210604-0002/","https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/","https://github.com/houseabsolute/Data-Validate-IP","https://github.com/houseabsolute/Data-Validate-IP/commit/3bba13c819d616514a75e089badd75002fd4f14e","https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-018.md","https://sick.codes/sick-2021-018/"],"distribution":"Data-Validate-IP","cves":["CVE-2021-29662"]}]},"HTML-Template-Pro":{"advisories":[{"id":"CPANSA-HTML-Template-Pro-2011-4616","severity":null,"cves":["CVE-2011-4616"],"reported":"2012-01-06","references":["http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652587","http://openwall.com/lists/oss-security/2011/12/19/1","http://metacpan.org/diff/release/VIY/HTML-Template-Pro-0.9505/VIY/HTML-Template-Pro-0.9507","http://secunia.com/advisories/47184","http://cpansearch.perl.org/src/VIY/HTML-Template-Pro-0.9507/Changes","http://www.securityfocus.com/bid/51117","http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089603.html","http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089889.html","http://lists.fedoraproject.org/pipermail/package-announce/2012-October/089888.html"],"distribution":"HTML-Template-Pro","affected_versions":["<0.9507"],"fixed_versions":[">=0.9507"],"description":"Cross-site scripting (XSS) vulnerability in the HTML-Template-Pro module before 0.9507 for Perl allows remote attackers to inject arbitrary web script or HTML via template parameters, related to improper handling of > (greater than) and < (less than) characters.\n"}],"versions":[{"version":"0.38","date":"2005-06-09T11:07:59"},{"date":"2005-06-22T09:55:37","version":"0.39"},{"date":"2005-07-07T09:11:59","version":"0.40"},{"version":"0.41","date":"2005-07-26T16:58:29"},{"version":"0.42","date":"2005-08-04T15:58:27"},{"date":"2005-08-04T17:36:21","version":"0.43"},{"version":"0.44","date":"2005-08-12T16:32:44"},{"date":"2005-08-19T19:10:08","version":"0.45"},{"version":"0.46","date":"2005-08-26T18:24:23"},{"date":"2005-08-31T17:43:09","version":"0.48"},{"date":"2005-09-08T17:43:14","version":"0.50"},{"version":"0.52","date":"2005-09-30T15:59:34"},{"version":"0.53","date":"2005-10-06T17:14:51"},{"version":"0.54","date":"2005-10-17T13:37:05"},{"version":"0.55","date":"2005-10-26T12:18:18"},{"date":"2005-11-03T16:46:06","version":"0.56"},{"version":"0.57","date":"2005-11-13T16:12:39"},{"date":"2005-12-02T08:10:18","version":"0.58"},{"version":"0.59","date":"2006-01-22T20:07:54"},{"date":"2006-02-02T16:32:55","version":"0.60"},{"date":"2006-02-06T20:45:02","version":"0.61"},{"version":"0.62","date":"2006-02-22T20:05:55"},{"date":"2006-04-18T20:24:51","version":"0.64"},{"date":"2007-06-01T14:46:48","version":"0.65"},{"date":"2007-10-04T11:08:55","version":"0.66"},{"date":"2007-12-02T23:20:56","version":"0.67"},{"version":"0.68","date":"2008-01-08T18:01:32"},{"date":"2008-01-08T20:03:26","version":"0.68"},{"date":"2008-03-01T19:46:47","version":"0.69"},{"version":"0.70","date":"2008-06-09T09:06:12"},{"version":"0.71","date":"2008-09-05T19:36:06"},{"version":"0.72","date":"2008-12-19T08:16:12"},{"date":"2009-04-02T20:36:25","version":"0.73"},{"date":"2009-04-10T20:41:07","version":"0.74"},{"version":"0.75","date":"2009-07-05T16:40:09"},{"date":"2009-07-13T08:33:36","version":"0.76"},{"date":"2009-07-23T17:37:10","version":"0.80"},{"version":"0.81","date":"2009-07-28T15:58:37"},{"version":"0.82","date":"2009-08-04T15:46:34"},{"date":"2009-08-05T20:27:52","version":"0.83"},{"version":"0.84","date":"2009-08-08T18:13:20"},{"date":"2009-08-09T16:45:02","version":"0.85"},{"date":"2009-08-24T08:00:34","version":"0.86"},{"date":"2009-08-29T19:22:41","version":"0.87"},{"date":"2009-09-11T16:53:57","version":"0.90"},{"version":"0.91","date":"2009-09-24T15:48:49"},{"version":"0.92","date":"2009-09-29T20:14:35"},{"version":"0.93","date":"2009-11-23T20:25:34"},{"version":"0.94","date":"2010-03-26T19:12:55"},{"date":"2010-05-21T19:34:29","version":"0.95"},{"version":"0.9501","date":"2010-06-16T19:00:45"},{"date":"2010-06-24T18:50:34","version":"0.9502"},{"date":"2010-08-29T12:45:12","version":"0.9503"},{"date":"2010-09-29T07:16:03","version":"0.9504"},{"version":"0.9505","date":"2011-07-01T10:40:21"},{"date":"2011-10-04T20:31:16","version":"0.9506"},{"date":"2011-12-09T07:59:17","version":"0.9507"},{"version":"0.9508","date":"2011-12-26T21:57:41"},{"date":"2012-02-28T19:59:05","version":"0.9509"},{"date":"2013-05-13T08:40:09","version":"0.9510"},{"version":"0.9520","date":"2021-11-30T23:21:23"},{"version":"0.9521","date":"2021-12-02T07:27:12"},{"date":"2021-12-06T17:53:48","version":"0.9522"},{"version":"0.9523","date":"2021-12-15T09:50:03"},{"version":"0.9524","date":"2022-01-16T20:42:34"}],"main_module":"HTML::Template::Pro"},"Pinto":{"main_module":"Pinto","advisories":[{"id":"CPANSA-Pinto-2014-01","reviewed_by":[{"email":"rrwo@cpan.org","name":"Robert Rothenberg","date":"2022-06-28"}],"reported":"2014-08-19","references":["https://metacpan.org/dist/Pinto/changes","https://github.com/thaljef/Pinto/commit/195d46eb4488a7dec6c39d6eb1c48dc872ab2b3b"],"distribution":"Pinto","cves":[],"affected_versions":["<0.09995"],"description":"Pinto server allowed directory traveral.\n","fixed_versions":[">=0.09995"]}],"versions":[{"version":"0.001","date":"2011-07-26T21:17:47"},{"version":"0.002","date":"2011-07-27T00:22:00"},{"version":"0.003","date":"2011-08-04T06:00:27"},{"version":"0.004","date":"2011-08-04T07:24:59"},{"date":"2011-08-04T07:46:03","version":"0.005"},{"version":"0.006","date":"2011-08-04T07:54:24"},{"date":"2011-08-04T15:07:03","version":"0.007"},{"date":"2011-08-09T21:49:02","version":"0.008"},{"version":"0.009","date":"2011-08-13T00:51:56"},{"version":"0.010","date":"2011-08-14T20:32:00"},{"version":"0.011","date":"2011-08-15T04:14:45"},{"date":"2011-08-17T16:12:20","version":"0.012"},{"version":"0.014","date":"2011-08-17T23:14:14"},{"date":"2011-08-18T08:57:36","version":"0.015"},{"date":"2011-08-18T09:03:09","version":"0.016"},{"version":"0.017","date":"2011-08-24T07:53:18"},{"version":"0.018","date":"2011-08-24T08:48:57"},{"version":"0.019","date":"2011-08-24T11:16:38"},{"version":"0.020","date":"2011-08-29T03:46:11"},{"date":"2011-08-30T08:20:49","version":"0.021"},{"version":"0.022","date":"2011-08-31T08:35:52"},{"date":"2011-08-31T21:22:32","version":"0.023"},{"version":"0.024","date":"2011-09-01T22:29:05"},{"version":"0.025_001","date":"2011-12-02T11:21:54"},{"date":"2011-12-02T12:42:45","version":"0.025_002"},{"date":"2011-12-03T12:16:42","version":"0.025_003"},{"date":"2011-12-07T15:26:36","version":"0.025_004"},{"version":"0.026","date":"2011-12-07T20:09:02"},{"version":"0.027","date":"2011-12-08T23:27:07"},{"date":"2011-12-12T09:32:39","version":"0.028"},{"version":"0.029","date":"2011-12-15T08:31:43"},{"date":"2012-01-27T06:05:38","version":"0.030"},{"version":"0.031","date":"2012-02-28T13:23:36"},{"date":"2012-03-01T18:43:41","version":"0.032"},{"version":"0.033","date":"2012-03-15T14:00:07"},{"version":"0.035","date":"2012-04-05T02:08:20"},{"version":"0.036","date":"2012-04-09T07:18:50"},{"version":"0.037","date":"2012-04-11T03:02:41"},{"version":"0.038","date":"2012-04-17T01:21:11"},{"version":"0.040_001","date":"2012-05-01T20:52:05"},{"version":"0.040_002","date":"2012-05-04T23:28:00"},{"date":"2012-05-05T04:42:35","version":"0.040_003"},{"version":"0.041","date":"2012-05-15T18:18:01"},{"date":"2012-05-18T04:59:37","version":"0.042"},{"version":"0.043","date":"2012-06-19T17:58:05"},{"version":"0.044","date":"2012-07-15T08:45:52"},{"date":"2012-07-24T06:18:49","version":"0.045"},{"version":"0.046","date":"2012-08-13T22:50:28"},{"date":"2012-08-14T00:27:03","version":"0.047"},{"version":"0.048","date":"2012-08-15T16:28:03"},{"version":"0.050","date":"2012-08-15T21:30:01"},{"version":"0.051","date":"2012-08-16T01:31:42"},{"date":"2012-09-18T23:20:20","version":"0.052"},{"date":"2012-09-20T04:03:53","version":"0.053"},{"version":"0.054","date":"2012-09-20T05:07:44"},{"version":"0.055","date":"2012-09-20T20:40:05"},{"version":"0.056","date":"2012-09-27T20:45:51"},{"date":"2012-10-07T21:25:33","version":"0.057"},{"version":"0.058","date":"2012-10-12T06:19:44"},{"version":"0.059","date":"2012-10-20T08:01:03"},{"date":"2012-10-23T21:41:47","version":"0.060"},{"version":"0.061","date":"2012-10-31T00:23:58"},{"date":"2012-11-08T18:57:09","version":"0.062"},{"date":"2012-11-12T20:03:29","version":"0.063"},{"date":"2012-11-12T21:58:57","version":"0.064"},{"date":"2012-11-14T18:00:34","version":"0.065"},{"date":"2013-03-15T23:28:13","version":"0.065_01"},{"version":"0.065_02","date":"2013-03-16T06:44:49"},{"date":"2013-03-19T22:58:08","version":"0.065_03"},{"version":"0.065_04","date":"2013-03-20T23:12:44"},{"version":"0.065_05","date":"2013-03-20T23:28:07"},{"date":"2013-03-23T07:33:37","version":"0.065_06"},{"version":"0.066","date":"2013-03-26T23:29:22"},{"version":"0.067","date":"2013-03-30T07:51:45"},{"date":"2013-04-05T05:47:08","version":"0.068"},{"version":"0.079_01","date":"2013-04-21T16:55:30"},{"version":"0.079_04","date":"2013-04-23T07:53:34"},{"version":"0.080","date":"2013-04-26T17:50:55"},{"version":"0.081","date":"2013-04-26T21:00:35"},{"version":"0.082","date":"2013-04-29T17:02:33"},{"date":"2013-05-13T21:45:43","version":"0.083"},{"date":"2013-05-15T00:34:13","version":"0.084"},{"version":"0.084_01","date":"2013-06-16T08:05:08"},{"date":"2013-06-17T04:08:49","version":"0.084_02"},{"date":"2013-06-17T20:09:55","version":"0.085"},{"version":"0.086","date":"2013-06-18T10:08:10"},{"version":"0.087","date":"2013-06-20T01:50:39"},{"version":"0.087_01","date":"2013-07-09T08:19:39"},{"date":"2013-07-21T08:38:23","version":"0.087_03"},{"version":"0.087_04","date":"2013-07-27T03:21:44"},{"date":"2013-07-30T07:00:31","version":"0.087_05"},{"version":"0.088","date":"2013-08-15T18:00:31"},{"date":"2013-08-19T20:34:32","version":"0.089"},{"version":"0.090","date":"2013-08-23T22:02:45"},{"date":"2013-10-25T19:22:19","version":"0.091"},{"date":"2013-11-20T19:18:40","version":"0.092"},{"date":"2013-12-22T00:41:08","version":"0.093"},{"version":"0.094","date":"2013-12-22T09:07:09"},{"date":"2013-12-23T07:49:14","version":"0.095"},{"date":"2014-01-07T18:57:51","version":"0.096"},{"date":"2014-01-08T07:10:26","version":"0.097"},{"date":"2014-01-17T20:57:05","version":"0.097_01"},{"date":"2014-01-23T08:46:47","version":"0.097_02"},{"version":"0.097_03","date":"2014-01-23T22:17:10"},{"date":"2014-01-25T23:24:17","version":"0.097_04"},{"version":"0.098","date":"2014-01-28T01:01:18"},{"date":"2014-01-28T10:07:29","version":"0.098_01"},{"version":"0.099","date":"2014-01-28T20:44:00"},{"date":"2014-02-01T01:30:41","version":"0.0991"},{"version":"0.0992","date":"2014-02-10T10:11:30"},{"version":"0.0993","date":"2014-02-23T22:14:22"},{"version":"0.0994","date":"2014-03-02T00:14:38"},{"version":"0.0994_01","date":"2014-03-05T09:16:04"},{"date":"2014-03-16T06:18:21","version":"0.0994_02"},{"date":"2014-03-16T07:56:27","version":"0.0994_03"},{"date":"2014-03-18T04:44:49","version":"0.0994_04"},{"date":"2014-03-19T04:24:14","version":"0.0995"},{"version":"0.0996","date":"2014-03-23T04:23:21"},{"version":"0.0997","date":"2014-03-24T04:02:32"},{"date":"2014-03-31T22:44:44","version":"0.0998"},{"date":"2014-04-04T06:05:12","version":"0.0999"},{"date":"2014-04-05T12:41:39","version":"0.09991"},{"date":"2014-04-23T22:27:50","version":"0.09992"},{"version":"0.09992_01","date":"2014-04-28T17:43:44"},{"version":"0.09992_02","date":"2014-04-29T21:34:32"},{"date":"2014-05-03T01:04:46","version":"0.09993"},{"date":"2014-08-20T01:44:36","version":"0.09995"},{"version":"0.09996","date":"2014-11-04T19:15:26"},{"date":"2015-03-24T08:26:01","version":"0.09997"},{"version":"0.09998","date":"2015-06-10T15:22:03"},{"version":"0.09999","date":"2015-06-14T05:30:55"},{"date":"2015-08-12T08:48:47","version":"0.11"},{"date":"2016-07-17T05:04:20","version":"0.11_01"},{"version":"0.12","date":"2016-07-26T04:18:25"},{"version":"0.13","date":"2017-08-06T05:59:13"},{"date":"2017-08-06T07:31:17","version":"0.14"}]},"Net-Server-Coro":{"versions":[{"version":"0.2","date":"2008-03-10T20:46:24"},{"date":"2008-10-22T17:26:30","version":"0.3"},{"version":"0.4","date":"2008-10-22T17:41:55"},{"date":"2009-10-16T03:46:28","version":"0.5"},{"version":"0.6","date":"2009-10-16T14:56:53"},{"date":"2009-12-16T03:28:15","version":"0.7"},{"date":"2010-01-30T16:11:57","version":"0.8"},{"version":"0.9","date":"2010-11-15T04:56:09"},{"date":"2011-09-05T05:33:01","version":"1.0"},{"date":"2011-09-05T05:37:09","version":"1.1"},{"date":"2011-10-29T06:29:11","version":"1.2"},{"version":"1.3","date":"2012-11-12T08:14:39"}],"advisories":[{"reported":"2011-03-16","references":["https://www.itsecdb.com/oval/definition/oval/org.opensuse.security/def/20110411/CVE-2011-0411.html","https://metacpan.org/dist/Net-Server-Coro/changes"],"distribution":"Net-Server-Coro","severity":null,"cves":["CVE-2011-0411"],"id":"CPANSA-Net-Server-Coro-2011-0411","description":"Remaining contents of the read buffer could allow plaintext injection attacks wherein attackers could cause nominally SSL-only commands to be executed by appending them to the end of a STARTTLS.\n","fixed_versions":[">=1.0"],"affected_versions":["<1.0"]}],"main_module":"Net::Server::Coro"},"Image-Info":{"main_module":"Image::Info","advisories":[{"affected_versions":[">=2.12"],"fixed_versions":[],"description":"perl-Image-Info: When parsing an SVG file, external entity expansion (XXE) was not disabled. An attacker could craft an SVG file which, when processed by an application using perl-Image-Info, could cause denial of service or, potentially, information disclosure.\n","id":"CPANSA-Image-Info-2016-01","cves":["CVE-2016-9181"],"distribution":"Image-Info","references":["http://www.securityfocus.com/bid/94220","http://www.openwall.com/lists/oss-security/2016/11/04/2"],"reported":"2016-11-04"}],"versions":[{"version":"0.01","date":"1999-12-19T07:09:24"},{"date":"1999-12-22T00:03:22","version":"0.02"},{"date":"1999-12-25T22:43:22","version":"0.03"},{"version":"0.04","date":"2000-01-07T18:20:42"},{"date":"2000-08-24T09:09:25","version":"0.05"},{"date":"2000-10-18T19:55:02","version":"1.00"},{"date":"2000-10-31T17:32:56","version":"1.01"},{"version":"1.02","date":"2000-11-10T18:21:41"},{"version":"1.03","date":"2000-11-13T19:44:44"},{"version":"1.04","date":"2000-11-30T20:25:46"},{"version":"0.06","date":"2001-03-24T20:20:31"},{"version":"1.05","date":"2001-03-24T20:40:20"},{"version":"1.06","date":"2001-03-26T19:28:11"},{"version":"1.07","date":"2001-04-11T00:53:39"},{"date":"2001-08-24T18:29:39","version":"1.08"},{"date":"2001-12-14T23:07:08","version":"1.09"},{"version":"1.10","date":"2002-05-29T00:04:22"},{"version":"1.11","date":"2002-07-04T17:37:20"},{"date":"2002-12-31T00:09:32","version":"1.12"},{"date":"2003-10-06T17:27:43","version":"1.13"},{"version":"1.14","date":"2003-10-06T21:50:56"},{"version":"1.15","date":"2003-10-06T22:10:09"},{"date":"2004-01-07T12:47:37","version":"1.16"},{"version":"1.17","date":"2006-01-28T12:41:59"},{"version":"1.18","date":"2006-03-03T15:31:07"},{"date":"2006-03-05T09:19:05","version":"1.18"},{"version":"1.18","date":"2006-03-13T20:52:28"},{"version":"1.18","date":"2006-05-01T14:33:54"},{"date":"2006-07-16T12:43:58","version":"1.18"},{"version":"1.23","date":"2006-09-30T12:35:03"},{"version":"1.24","date":"2007-02-25T12:39:30"},{"version":"1.25","date":"2007-05-14T19:11:49"},{"date":"2007-09-09T11:23:15","version":"1.26"},{"version":"1.27","date":"2007-12-15T13:50:50"},{"date":"2008-03-30T19:16:37","version":"1.28"},{"date":"2009-07-08T20:39:39","version":"1.28_50"},{"version":"1.28_51","date":"2009-07-09T22:26:22"},{"date":"2009-07-17T18:24:54","version":"1.28_52"},{"date":"2009-07-31T21:09:25","version":"1.29"},{"date":"2009-08-14T20:25:31","version":"1.29_50"},{"version":"1.29_51","date":"2009-09-14T19:04:17"},{"date":"2009-09-16T19:23:40","version":"1.29_51"},{"date":"2009-10-23T20:45:13","version":"1.29_51"},{"date":"2009-10-31T09:21:38","version":"1.29_51"},{"version":"1.30_50","date":"2009-11-14T16:30:54"},{"date":"2009-11-22T22:10:25","version":"1.30_51"},{"date":"2010-02-09T20:08:40","version":"1.30_52"},{"date":"2010-02-09T20:43:56","version":"1.30_53"},{"version":"1.31","date":"2010-09-25T15:42:44"},{"version":"1.31_50","date":"2011-12-28T21:32:21"},{"date":"2011-12-28T21:53:50","version":"1.31_51"},{"version":"1.32","date":"2012-02-21T21:03:11"},{"version":"1.32_50","date":"2012-10-23T19:59:15"},{"date":"2012-10-24T20:24:17","version":"1.32_51"},{"date":"2012-10-25T21:49:45","version":"1.32_52"},{"version":"1.33","date":"2012-11-03T19:12:43"},{"version":"1.33_50","date":"2013-01-27T13:49:04"},{"version":"1.33_51","date":"2013-01-28T11:15:59"},{"version":"1.34","date":"2013-01-29T16:18:27"},{"date":"2013-04-03T20:29:08","version":"1.34_50"},{"version":"1.35","date":"2013-04-10T19:22:43"},{"date":"2013-05-06T10:32:44","version":"1.35_50"},{"version":"1.35_51","date":"2013-06-28T08:29:45"},{"date":"2013-07-05T08:23:26","version":"1.36"},{"date":"2014-12-19T23:10:31","version":"1.36_51"},{"date":"2014-12-29T22:23:42","version":"1.36_52"},{"version":"1.37","date":"2014-12-31T08:44:32"},{"version":"1.38","date":"2015-04-20T05:00:55"},{"version":"1.38_50","date":"2016-10-01T15:35:13"},{"version":"1.38_51","date":"2016-10-01T17:43:27"},{"date":"2016-10-08T09:00:58","version":"1.39"},{"date":"2017-03-19T20:16:19","version":"1.39_50"},{"version":"1.40","date":"2017-03-21T19:05:30"},{"version":"1.40_50","date":"2017-06-30T17:22:28"},{"version":"1.41","date":"2017-07-12T16:34:02"},{"version":"1.41_50","date":"2019-10-16T19:12:33"},{"date":"2019-10-19T06:46:49","version":"1.42"},{"version":"1.42_50","date":"2022-07-17T15:58:54"},{"date":"2022-10-03T17:54:30","version":"1.43"},{"date":"2023-07-25T18:26:43","version":"1.43_50"},{"date":"2023-08-03T17:14:43","version":"1.44"},{"date":"2024-11-20T08:40:18","version":"1.44_50"},{"date":"2024-11-23T10:43:42","version":"1.44_51"},{"version":"1.45","date":"2024-11-24T09:58:13"}]},"PlRPC":{"versions":[{"version":"0.2001","date":"1998-10-28T23:03:06"},{"date":"1999-01-15T09:26:43","version":"0.2003"},{"date":"1999-04-09T21:18:22","version":"0.2010"},{"version":"0.2004","date":"1999-06-21T09:10:10"},{"date":"1999-06-21T09:26:45","version":"0.2011"},{"version":"0.2012","date":"1999-06-26T16:21:38"},{"version":"0.2013","date":"2001-01-23T08:17:41"},{"version":"0.2014","date":"2001-01-23T15:57:05"},{"date":"2001-03-26T13:10:50","version":"0.2015"},{"date":"2001-10-01T02:45:21","version":"0.2016"},{"date":"2003-06-09T08:55:18","version":"0.2017"},{"date":"2004-07-27T07:47:32","version":"0.2018"},{"version":"0.2018","date":"2007-05-22T20:56:36"},{"version":"0.2018","date":"2007-06-17T20:00:21"},{"date":"2012-01-27T16:55:27","version":"0.2021_01"}],"advisories":[{"fixed_versions":[],"description":"The PlRPC module, possibly 0.2020 and earlier, for Perl uses the Storable module, which allows remote attackers to execute arbitrary code via a crafted request, which is not properly handled when it is deserialized.\n","affected_versions":["<=0.2020"],"reported":"2014-04-29","references":["https://bugzilla.redhat.com/show_bug.cgi?id=1051108","http://seclists.org/oss-sec/2014/q1/56","http://seclists.org/oss-sec/2014/q1/62","https://bugzilla.redhat.com/show_bug.cgi?id=1030572","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734789","https://rt.cpan.org/Public/Bug/Display.html?id=90474"],"distribution":"PlRPC","severity":null,"cves":["CVE-2013-7284"],"id":"CPANSA-PlRPC-2013-7284"}],"main_module":"Bundle::PlRPC"},"YAML-LibYAML":{"versions":[{"date":"2007-05-11T21:37:19","version":"0.01"},{"version":"0.02","date":"2007-05-15T06:37:59"},{"version":"0.03","date":"2007-05-19T22:23:53"},{"version":"0.04","date":"2007-05-21T05:19:05"},{"version":"0.05","date":"2007-05-21T07:45:35"},{"version":"0.06","date":"2007-05-23T06:56:11"},{"date":"2007-05-23T07:10:14","version":"0.07"},{"version":"0.08","date":"2007-05-26T04:58:43"},{"date":"2007-05-28T07:47:31","version":"0.09"},{"date":"2007-05-28T10:30:28","version":"0.10"},{"date":"2007-05-30T00:30:09","version":"0.11"},{"version":"0.12","date":"2007-05-30T08:13:24"},{"date":"2007-05-30T09:38:37","version":"0.14"},{"date":"2007-05-31T07:48:16","version":"0.15"},{"date":"2007-05-31T21:05:50","version":"0.16"},{"date":"2007-06-07T02:55:10","version":"0.17"},{"version":"0.18","date":"2007-06-18T01:35:48"},{"version":"0.19","date":"2007-06-18T08:06:43"},{"date":"2007-06-18T23:34:20","version":"0.20"},{"date":"2007-06-21T23:27:47","version":"0.21"},{"date":"2007-06-22T07:42:47","version":"0.22"},{"version":"0.23","date":"2007-06-23T01:17:58"},{"date":"2007-06-24T18:37:51","version":"0.24"},{"date":"2007-06-25T01:40:09","version":"0.25"},{"date":"2007-06-26T21:00:04","version":"0.26"},{"date":"2008-06-07T05:37:26","version":"0.27"},{"date":"2008-11-12T07:09:30","version":"0.29"},{"version":"0.30","date":"2009-01-11T11:00:54"},{"version":"0.31","date":"2009-01-12T09:26:53"},{"version":"0.32","date":"2009-01-12T09:34:50"},{"date":"2010-04-15T01:01:10","version":"0.33"},{"date":"2010-09-23T22:43:36","version":"0.34"},{"version":"0.35","date":"2011-04-03T16:41:03"},{"version":"0.37","date":"2011-09-29T18:10:52"},{"date":"2012-01-04T06:58:09","version":"0.38"},{"version":"0.39","date":"2013-02-12T02:09:38"},{"date":"2013-03-12T18:07:29","version":"0.40"},{"date":"2013-03-13T17:36:09","version":"0.41"},{"version":"0.42","date":"2014-07-11T22:30:03"},{"version":"0.43","date":"2014-07-12T17:05:47"},{"date":"2014-07-13T22:24:47","version":"0.44"},{"date":"2014-08-04T08:23:39","version":"0.45"},{"version":"0.46","date":"2014-08-05T17:33:54"},{"date":"2014-08-09T07:30:51","version":"0.47"},{"date":"2014-08-16T04:07:46","version":"0.48"},{"date":"2014-08-16T14:31:04","version":"0.49"},{"date":"2014-08-16T19:58:18","version":"0.50"},{"version":"0.51","date":"2014-08-16T21:29:48"},{"version":"0.52","date":"2014-08-23T04:04:49"},{"date":"2014-11-28T17:22:06","version":"0.53"},{"date":"2014-11-29T19:48:26","version":"0.54"},{"version":"0.55","date":"2014-12-23T01:27:43"},{"date":"2015-01-16T03:23:05","version":"0.56"},{"date":"2015-01-16T04:06:00","version":"0.57"},{"date":"2015-01-21T05:02:46","version":"0.58"},{"version":"0.59","date":"2015-01-26T23:05:30"},{"version":"0.60","date":"2016-02-09T19:36:50"},{"date":"2016-02-20T18:05:06","version":"0.61"},{"date":"2016-02-22T15:47:18","version":"0.62"},{"date":"2016-07-03T17:33:17","version":"0.62_001"},{"version":"0.62_002","date":"2016-07-03T17:40:25"},{"date":"2016-07-08T14:41:45","version":"0.63"},{"version":"0.71","date":"2016-09-08T09:56:51"},{"version":"0.73","date":"2016-09-13T14:44:45"},{"date":"2017-01-03T04:10:44","version":"0.63_001"},{"date":"2017-04-03T18:56:26","version":"0.63_002"},{"date":"2017-04-07T18:32:36","version":"0.64"},{"date":"2017-05-18T21:10:50","version":"0.65"},{"version":"0.65_001","date":"2017-08-13T11:49:59"},{"date":"2017-08-17T18:07:26","version":"0.66"},{"date":"2017-11-10T21:07:40","version":"0.66_001"},{"version":"0.66_002","date":"2017-11-14T20:03:09"},{"version":"0.67","date":"2017-11-15T18:00:42"},{"date":"2017-12-16T21:50:01","version":"0.67_001"},{"version":"0.68","date":"2017-12-18T19:01:27"},{"version":"0.68_001","date":"2017-12-20T18:38:40"},{"date":"2017-12-22T11:40:39","version":"0.68_002"},{"date":"2017-12-26T17:37:54","version":"0.69"},{"version":"0.69_001","date":"2018-06-07T20:16:52"},{"date":"2018-06-09T19:53:37","version":"0.70"},{"date":"2018-06-27T17:14:44","version":"0.70_001"},{"version":"0.72","date":"2018-07-08T15:04:37"},{"version":"0.72_01","date":"2018-08-31T15:38:28"},{"version":"0.74","date":"2018-09-01T01:07:45"},{"date":"2018-10-14T14:09:48","version":"0.74_001"},{"date":"2018-11-03T13:17:49","version":"0.75"},{"date":"2018-12-16T17:28:49","version":"0.75_001"},{"version":"0.76","date":"2018-12-30T19:11:20"},{"date":"2019-03-13T18:47:41","version":"0.76_001"},{"version":"0.77","date":"2019-04-15T20:56:14"},{"date":"2019-05-15T18:20:47","version":"0.77_001"},{"version":"0.78","date":"2019-05-18T16:36:19"},{"version":"0.78_001","date":"2019-05-30T16:01:02"},{"date":"2019-06-10T11:10:47","version":"0.78_002"},{"version":"0.79","date":"2019-06-11T19:36:40"},{"version":"0.79_001","date":"2019-08-21T16:49:31"},{"date":"2019-08-22T11:18:19","version":"0.80"},{"date":"2020-01-27T22:06:22","version":"0.81"},{"version":"0.82","date":"2020-05-02T18:40:13"},{"version":"0.82_001","date":"2021-05-02T00:16:51"},{"date":"2021-05-08T21:52:55","version":"0.83"},{"date":"2022-09-03T19:20:07","version":"0.84"},{"version":"0.84_001","date":"2022-09-09T15:31:45"},{"date":"2022-09-09T18:12:56","version":"0.84_002"},{"version":"0.84_003","date":"2022-09-09T19:01:06"},{"version":"0.85","date":"2022-09-12T12:21:48"},{"version":"0.86","date":"2023-01-26T02:35:03"},{"date":"2023-05-04T10:47:26","version":"0.86_001"},{"version":"0.87","date":"2023-05-04T19:38:30"},{"date":"2023-05-12T12:28:46","version":"0.88"},{"date":"2024-01-24T21:55:26","version":"0.88_001"},{"version":"0.89","date":"2024-01-27T00:45:43"},{"version":"0.89_001","date":"2024-05-26T13:07:57"},{"version":"0.90","date":"2024-09-06T21:47:43"},{"date":"2024-09-06T22:09:50","version":"v0.901.0"},{"date":"2024-09-09T20:42:09","version":"v0.901.1"},{"date":"2024-09-20T19:48:00","version":"v0.902.0"},{"version":"v0.902.1","date":"2025-01-12T21:19:33"},{"date":"2025-01-26T01:28:39","version":"v0.902.2"},{"version":"v0.902.3","date":"2025-01-26T15:02:24"},{"version":"v0.902.4","date":"2025-02-02T22:21:19"},{"date":"2025-02-02T23:15:49","version":"v0.903.0"}],"advisories":[{"affected_versions":["<0.69"],"fixed_versions":[">=0.69"],"description":"Need SafeLoad and SafeDump analog to python\n","id":"CPANSA-YAML-LibYAML-2016-01","reported":"2016-03-10","references":["https://github.com/ingydotnet/yaml-libyaml-pm/issues/45"],"distribution":"YAML-LibYAML","severity":null,"cves":[]},{"affected_versions":["<0.53"],"description":"scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.\n","fixed_versions":[">=0.54"],"id":"CPANSA-YAML-LibYAML-2014-9130","distribution":"YAML-LibYAML","references":["http://www.openwall.com/lists/oss-security/2014/11/29/3","http://www.openwall.com/lists/oss-security/2014/11/28/8","https://bitbucket.org/xi/libyaml/commits/2b9156756423e967cfd09a61d125d883fca6f4f2","http://www.securityfocus.com/bid/71349","http://secunia.com/advisories/59947","https://bitbucket.org/xi/libyaml/issue/10/wrapped-strings-cause-assert-failure","http://secunia.com/advisories/60944","http://www.openwall.com/lists/oss-security/2014/11/28/1","http://linux.oracle.com/errata/ELSA-2015-0100.html","http://secunia.com/advisories/62723","http://secunia.com/advisories/62705","http://secunia.com/advisories/62774","http://www.ubuntu.com/usn/USN-2461-2","http://www.ubuntu.com/usn/USN-2461-3","http://www.ubuntu.com/usn/USN-2461-1","http://rhn.redhat.com/errata/RHSA-2015-0100.html","http://www.debian.org/security/2014/dsa-3103","http://rhn.redhat.com/errata/RHSA-2015-0112.html","http://www.debian.org/security/2014/dsa-3102","http://www.debian.org/security/2014/dsa-3115","http://rhn.redhat.com/errata/RHSA-2015-0260.html","http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html","http://www.mandriva.com/security/advisories?name=MDVSA-2015:060","http://www.mandriva.com/security/advisories?name=MDVSA-2014:242","http://advisories.mageia.org/MGASA-2014-0508.html","http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html","http://secunia.com/advisories/62176","http://secunia.com/advisories/62174","http://secunia.com/advisories/62164","https://exchange.xforce.ibmcloud.com/vulnerabilities/99047","https://puppet.com/security/cve/cve-2014-9130"],"reported":"2014-12-08","cves":["CVE-2014-9130"],"severity":null},{"references":["https://bugzilla.redhat.com/show_bug.cgi?id=801738","https://rt.cpan.org/Public/Bug/Display.html?id=46507","http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077023.html","http://www.openwall.com/lists/oss-security/2012/03/10/4","http://www.openwall.com/lists/oss-security/2012/03/09/6","http://www.debian.org/security/2012/dsa-2432","http://www.securityfocus.com/bid/52381","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661548","http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077782.html","https://rt.cpan.org/Public/Bug/Display.html?id=75365","http://secunia.com/advisories/48317","http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077004.html","http://lists.opensuse.org/opensuse-updates/2012-08/msg00029.html","http://secunia.com/advisories/50277","http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html","https://exchange.xforce.ibmcloud.com/vulnerabilities/73856"],"reported":"2012-09-09","distribution":"YAML-LibYAML","severity":null,"cves":["CVE-2012-1152"],"id":"CPANSA-YAML-LibYAML-2012-1152","fixed_versions":[">=0.57"],"description":"Multiple format string vulnerabilities in the error reporting functionality in the YAML::LibYAML (aka YAML-LibYAML and perl-YAML-LibYAML) module 0.38 for Perl allow remote attackers to cause a denial of service (process crash) via format string specifiers in a (1) YAML stream to the Load function, (2) YAML node to the load_node function, (3) YAML mapping to the load_mapping function, or (4) YAML sequence to the load_sequence function.\n","affected_versions":[">0.38,<0.57"]}],"main_module":"YAML::LibYAML"},"Mojo-DOM-Role-Analyzer":{"advisories":[{"cves":["CVE-2024-38526"],"severity":null,"distribution":"Mojo-DOM-Role-Analyzer","references":["https://github.com/mitmproxy/pdoc/pull/703","https://github.com/mitmproxy/pdoc/security/advisories/GHSA-5vgj-ggm4-fg62","https://sansec.io/research/polyfill-supply-chain-attack","https://github.com/briandfoy/cpan-security-advisory/issues/155","https://github.com/sdondley/Mojo-DOM-Role-Analyzer/issues/10","https://stackdiary.com/polyfill-compromise-hits-100000-sites-in-a-supply-chain-attack/"],"reported":"2024-06-26","embedded_vulnerability":{"name":"polyfill.io","distributed_version":null},"id":"CPANSA-Mojo-DOM-Role-Analyzer-2024-38526","description":"pdoc provides API Documentation for Python Projects. Documentation generated with `pdoc --math` linked to JavaScript files from polyfill.io. The polyfill.io CDN has been sold and now serves malicious code. This issue has been fixed in pdoc 14.5.1.\n","fixed_versions":[],"affected_versions":["<=0.015"]}],"versions":[{"version":"0.007","date":"2020-08-04T22:48:59"},{"version":"0.008","date":"2020-08-05T13:43:47"},{"version":"0.009","date":"2020-08-06T02:47:29"},{"date":"2020-08-08T13:39:18","version":"0.010"},{"version":"0.011","date":"2020-08-09T13:43:20"},{"date":"2020-08-09T23:37:24","version":"0.012"},{"date":"2020-08-12T03:21:57","version":"0.013"},{"date":"2020-08-13T21:09:19","version":"0.014"},{"date":"2020-08-16T15:39:17","version":"0.015"}],"main_module":"Mojo::DOM::Role::Analyzer"},"Archive-Tar":{"main_module":"Archive::Tar","versions":[{"date":"1998-02-02T06:13:59","version":"0.071"},{"version":"0.072","date":"1998-04-10T17:07:35"},{"version":"0.08","date":"1998-07-30T00:56:03"},{"version":"0.20","date":"1999-01-10T02:22:23"},{"version":"0.21","date":"1999-02-02T19:01:41"},{"date":"2000-04-28T00:37:46","version":"0.22"},{"date":"2003-01-21T23:07:30","version":"0.23"},{"version":"0.99_01","date":"2003-03-18T17:08:50"},{"version":"0.99_02","date":"2003-03-26T14:57:35"},{"version":"0.99_03","date":"2003-04-28T16:01:24"},{"version":"0.99_04","date":"2003-04-28T16:57:58"},{"version":"0.99_05","date":"2003-04-30T12:52:19"},{"date":"2003-05-05T12:06:35","version":"0.99_06"},{"version":"1.00","date":"2003-05-31T09:27:33"},{"date":"2003-06-08T10:46:56","version":"1.01"},{"date":"2003-06-12T09:47:58","version":"1.02"},{"date":"2003-06-26T12:52:19","version":"1.03"},{"version":"1.04","date":"2003-07-27T17:07:50"},{"date":"2003-08-25T13:38:44","version":"1.05"},{"date":"2003-10-15T14:35:12","version":"1.06"},{"version":"1.07","date":"2003-10-17T11:42:14"},{"version":"1.08","date":"2004-01-05T12:59:23"},{"date":"2004-05-22T12:32:02","version":"1.09"},{"date":"2004-06-11T19:24:06","version":"1.10"},{"date":"2004-11-09T16:12:40","version":"1.20"},{"version":"1.21","date":"2004-11-10T16:04:13"},{"version":"1.22","date":"2004-11-21T10:09:52"},{"version":"1.23","date":"2004-12-03T15:53:06"},{"version":"1.24","date":"2005-05-03T13:11:19"},{"date":"2005-08-20T10:14:40","version":"1.25"},{"version":"1.26","date":"2005-08-22T09:29:53"},{"date":"2006-01-19T13:31:53","version":"1.28"},{"version":"1.29","date":"2006-03-03T13:56:20"},{"version":"1.30","date":"2006-08-02T15:00:41"},{"version":"1.31","date":"2007-05-18T12:18:49"},{"date":"2007-05-25T09:32:48","version":"1.32"},{"date":"2007-08-15T14:20:33","version":"1.34"},{"version":"1.36","date":"2007-09-16T09:13:21"},{"version":"1.37_01","date":"2007-11-11T11:59:00"},{"version":"1.38","date":"2007-12-24T11:02:07"},{"date":"2008-08-22T16:33:49","version":"1.39_01"},{"date":"2008-08-25T03:56:58","version":"1.39_02"},{"version":"1.39_03","date":"2008-08-25T22:07:56"},{"date":"2008-09-08T12:14:37","version":"1.39_04"},{"version":"1.40","date":"2008-10-13T13:42:10"},{"version":"1.42","date":"2008-12-13T17:10:15"},{"date":"2009-01-19T17:08:08","version":"1.44"},{"version":"1.46","date":"2009-03-05T16:10:06"},{"version":"1.48","date":"2009-04-20T17:07:30"},{"date":"2009-06-12T12:01:54","version":"1.50"},{"version":"1.52","date":"2009-06-13T11:29:50"},{"date":"2009-09-10T12:13:03","version":"1.54"},{"version":"1.56","date":"2010-02-03T14:40:15"},{"version":"1.58","date":"2010-02-17T21:47:16"},{"date":"2010-04-23T14:12:31","version":"1.60"},{"version":"1.62","date":"2010-06-28T21:02:59"},{"version":"1.64","date":"2010-07-09T11:04:45"},{"version":"1.66","date":"2010-07-26T08:44:00"},{"version":"1.68","date":"2010-08-17T16:06:19"},{"date":"2010-11-15T22:02:53","version":"1.70"},{"version":"1.72","date":"2010-11-18T19:22:01"},{"version":"1.74","date":"2010-12-18T21:19:51"},{"version":"1.76","date":"2011-01-07T22:27:40"},{"version":"1.78","date":"2011-09-08T22:13:33"},{"date":"2011-10-13T10:25:39","version":"1.80"},{"date":"2011-11-21T12:14:43","version":"1.82"},{"date":"2012-03-03T00:00:05","version":"1.84"},{"date":"2012-05-24T11:38:09","version":"1.86"},{"date":"2012-06-01T11:06:25","version":"1.88"},{"version":"1.90","date":"2012-09-05T18:19:00"},{"version":"1.92","date":"2013-06-18T15:13:27"},{"version":"0.93_01","date":"2013-10-22T14:28:22"},{"date":"2013-10-22T14:36:08","version":"1.93_02"},{"date":"2013-10-24T18:02:48","version":"1.94"},{"version":"1.96","date":"2013-10-24T19:10:34"},{"date":"2014-06-14T17:12:02","version":"1.98"},{"date":"2014-06-15T14:59:24","version":"2.00"},{"date":"2014-09-14T18:03:23","version":"2.02"},{"date":"2014-12-14T20:13:33","version":"2.04"},{"date":"2016-04-24T14:05:11","version":"2.06"},{"date":"2016-05-12T08:57:35","version":"2.08"},{"date":"2016-07-27T12:40:29","version":"2.10"},{"version":"2.12","date":"2016-10-16T11:27:58"},{"date":"2016-10-20T12:38:57","version":"2.14"},{"version":"2.16","date":"2016-11-01T19:19:36"},{"date":"2016-11-07T13:36:15","version":"2.18"},{"date":"2016-12-15T10:54:40","version":"2.20"},{"date":"2016-12-16T09:46:28","version":"2.22"},{"version":"2.24","date":"2016-12-16T15:27:38"},{"date":"2017-05-12T12:46:05","version":"2.26"},{"date":"2018-06-08T10:57:04","version":"2.28"},{"date":"2018-06-19T11:55:28","version":"2.30"},{"version":"2.32","date":"2018-09-13T07:17:10"},{"date":"2020-02-01T16:41:47","version":"2.34"},{"version":"2.36","date":"2020-02-02T13:34:34"},{"date":"2020-06-25T07:51:56","version":"2.38"},{"date":"2021-07-27T09:51:54","version":"2.40"},{"version":"3.00","date":"2023-03-25T12:10:20"},{"date":"2023-04-12T23:09:11","version":"3.02"},{"date":"2025-02-25T20:25:09","version":"3.04"},{"dual_lived":1,"date":"2006-01-28T00:00:00","version":"1.26_01","perl_release":"5.009003"},{"date":"2006-08-15T00:00:00","dual_lived":1,"perl_release":"5.009004","version":"1.30_01"},{"date":"2017-01-14T00:00:00","dual_lived":1,"perl_release":"5.022003","version":"2.04_01"},{"perl_release":"5.026003","version":"2.24_01","date":"2018-11-29T00:00:00","dual_lived":1},{"dual_lived":1,"date":"2023-12-30T00:00:00","perl_release":"5.039006","version":"3.02_001"}],"advisories":[{"description":"In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypass a directory-traversal protection mechanism, and overwrite arbitrary files, via an archive file containing a symlink and a regular file with the same name.\n","fixed_versions":[],"affected_versions":["<2.28"],"distribution":"Archive-Tar","reported":"2018-06-12","references":["https://security-tracker.debian.org/tracker/CVE-2018-12015","https://github.com/jib/archive-tar-new/commit/ae65651eab053fc6dc4590dbb863a268215c1fc5"],"cves":["CVE-2018-12015"],"severity":"medium","id":"CPANSA-Archive-Tar-2018-01"},{"fixed_versions":[">1.36"],"description":"Directory traversal vulnerability in the Archive::Tar Perl module 1.36 and earlier allows user-assisted remote attackers to overwrite arbitrary files via a TAR archive that contains a file whose name is an absolute path or has \"..\" sequences.\n","affected_versions":["<=1.36"],"severity":null,"cves":["CVE-2007-4829"],"references":["http://rt.cpan.org/Public/Bug/Display.html?id=29517","https://bugzilla.redhat.com/show_bug.cgi?id=295021","http://rt.cpan.org/Public/Bug/Display.html?id=30380","https://issues.rpath.com/browse/RPL-1716","http://www.securityfocus.com/bid/26355","http://secunia.com/advisories/27539","http://osvdb.org/40410","http://www.ubuntu.com/usn/usn-700-1","http://secunia.com/advisories/33314","http://www.ubuntu.com/usn/usn-700-2","http://www.gentoo.org/security/en/glsa/glsa-200812-10.xml","http://secunia.com/advisories/33116","http://www.vupen.com/english/advisories/2007/3755","https://exchange.xforce.ibmcloud.com/vulnerabilities/38285","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11658"],"reported":"2007-11-02","distribution":"Archive-Tar","id":"CPANSA-Archive-Tar-2007-4829"},{"affected_versions":["<2.10"],"description":"'(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.'\n","fixed_versions":[">=2.10"],"id":"CPANSA-Archive-Tar-2016-1238","references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"reported":"2016-08-02","distribution":"Archive-Tar","severity":"high","cves":["CVE-2016-1238"]}]},"Digest-SHA":{"main_module":"Digest::SHA","versions":[{"date":"2003-10-11T09:45:19","version":"0.9"},{"version":"1.0","date":"2003-10-20T09:50:18"},{"version":"1.01","date":"2003-10-25T11:31:51"},{"version":"2.0","date":"2003-11-01T21:22:08"},{"version":"2.1","date":"2003-11-09T11:06:19"},{"version":"2.2","date":"2003-11-16T11:08:06"},{"date":"2003-11-19T11:54:09","version":"2.3"},{"date":"2003-11-23T00:52:20","version":"2.4"},{"date":"2003-11-26T12:32:09","version":"3.0"},{"version":"v4.0.0","date":"2003-11-30T07:47:28"},{"version":"3.1-alpha1","date":"2003-11-30T16:19:28"},{"date":"2003-12-01T13:27:50","version":"4.0.2"},{"version":"v4.0.3","date":"2003-12-03T11:20:55"},{"date":"2003-12-04T07:54:40","version":"v4.0.4"},{"date":"2003-12-06T09:23:46","version":"v4.0.5"},{"version":"v4.0.6","date":"2003-12-11T11:30:14"},{"date":"2003-12-13T09:30:39","version":"v4.0.7"},{"date":"2003-12-19T07:30:18","version":"v4.0.8"},{"version":"v4.0.9","date":"2003-12-24T10:37:28"},{"date":"2003-12-25T08:13:32","version":"v4.1.0"},{"date":"2003-12-28T00:09:30","version":"v4.2.0"},{"date":"2004-01-24T08:43:05","version":"v4.2.1"},{"version":"v4.2.2","date":"2004-02-01T08:52:29"},{"date":"2004-02-07T10:45:32","version":"v4.3.0"},{"date":"2004-03-04T10:41:51","version":"v4.3.1"},{"version":"4.3.2","date":"2004-04-28T11:30:19"},{"date":"2004-05-05T07:56:21","version":"4.3.3"},{"date":"2004-05-14T12:08:55","version":"5.00"},{"date":"2004-05-21T20:20:18","version":"5.01"},{"date":"2004-07-29T10:13:58","version":"5.02"},{"version":"5.03","date":"2004-07-31T07:34:46"},{"date":"2004-08-06T09:44:08","version":"5.10"},{"date":"2004-08-15T12:25:38","version":"5.20"},{"date":"2004-08-23T12:35:36","version":"5.21"},{"version":"5.22","date":"2004-09-08T08:01:56"},{"date":"2004-09-10T06:51:39","version":"5.23"},{"date":"2004-09-12T11:33:41","version":"5.24"},{"version":"5.25","date":"2004-09-13T02:27:16"},{"version":"5.26","date":"2004-10-10T09:13:00"},{"version":"5.27","date":"2004-10-24T11:25:48"},{"date":"2004-11-17T09:23:50","version":"5.28"},{"version":"5.29","date":"2005-08-15T09:20:59"},{"version":"5.30","date":"2005-08-21T00:35:30"},{"version":"5.31","date":"2005-09-05T08:36:39"},{"version":"5.32","date":"2005-12-02T10:13:07"},{"date":"2006-02-03T02:22:56","version":"5.34"},{"date":"2006-05-08T01:10:50","version":"5.35"},{"version":"5.36","date":"2006-05-08T11:19:00"},{"version":"5.37","date":"2006-05-15T11:31:17"},{"version":"5.38","date":"2006-05-25T10:10:52"},{"version":"5.39","date":"2006-05-28T10:49:11"},{"version":"5.40","date":"2006-06-02T21:45:07"},{"date":"2006-06-03T09:31:44","version":"5.41"},{"version":"5.42","date":"2006-07-24T11:22:26"},{"version":"5.43","date":"2006-08-05T10:13:57"},{"date":"2006-10-14T07:59:30","version":"5.44"},{"version":"5.45","date":"2007-06-26T10:20:05"},{"date":"2008-04-09T12:40:29","version":"5.46"},{"date":"2008-04-30T11:17:26","version":"5.47"},{"date":"2010-01-05T02:07:18","version":"5.48"},{"version":"5.49","date":"2010-12-12T14:44:43"},{"version":"5.50","date":"2010-12-14T13:46:10"},{"date":"2011-03-03T13:19:38","version":"5.60"},{"date":"2011-03-09T12:56:01","version":"5.61"},{"date":"2011-05-14T11:11:34","version":"5.62"},{"version":"5.63","date":"2011-11-08T13:27:54"},{"date":"2011-12-14T10:18:37","version":"5.70"},{"version":"5.71","date":"2012-02-29T11:11:59"},{"date":"2012-09-25T01:14:59","version":"5.72"},{"version":"5.73","date":"2012-10-31T11:42:32"},{"date":"2012-11-24T11:40:47","version":"5.74"},{"version":"5.80","date":"2012-12-10T21:21:06"},{"version":"5.81","date":"2013-01-14T14:32:22"},{"date":"2013-01-24T12:06:14","version":"5.82"},{"version":"5.83","date":"2013-03-04T16:22:03"},{"date":"2013-03-10T00:42:51","version":"5.84"},{"version":"5.85","date":"2013-06-26T11:11:56"},{"date":"2014-01-30T15:40:50","version":"5.86"},{"version":"5.87","date":"2014-02-18T01:26:20"},{"version":"5.88","date":"2014-03-17T16:05:33"},{"version":"5.89","date":"2014-04-19T13:09:10"},{"date":"2014-05-07T15:54:15","version":"5.90"},{"version":"5.91","date":"2014-05-16T17:36:12"},{"version":"5.92","date":"2014-06-01T07:25:04"},{"date":"2014-10-26T13:15:37","version":"5.93"},{"version":"5.94","date":"2015-01-10T09:49:55"},{"date":"2015-01-10T20:24:40","version":"5.95"},{"version":"5.96","date":"2016-07-28T11:11:53"},{"version":"5.97","date":"2017-09-06T09:38:45"},{"date":"2017-10-04T08:38:13","version":"5.98"},{"date":"2017-12-09T06:04:13","version":"6.00"},{"date":"2017-12-25T07:41:55","version":"6.01"},{"date":"2018-04-20T23:47:19","version":"6.02"},{"version":"6.03","date":"2022-08-08T18:56:41"},{"date":"2023-02-25T19:06:34","version":"6.04"},{"date":"2013-08-12T00:00:00","dual_lived":1,"perl_release":"5.018001","version":"5.84_01"},{"date":"2014-10-01T00:00:00","dual_lived":1,"perl_release":"5.018003","version":"5.84_02"},{"perl_release":"5.022003","version":"5.95_01","dual_lived":1,"date":"2017-01-14T00:00:00"}],"advisories":[{"affected_versions":["<5.96"],"fixed_versions":[">=5.96"],"description":"Digest::SHA before 5.96 with perls earlier than v5.26 included the current working directory in the module search path, which could lead to the inadvernant loading of unexpected versions of a module. The current directory was removed from the default module search path in perls from v5.26 and later.\n","id":"CPANSA-Digest-SHA-2016-1238","reported":null,"references":["https://rt.cpan.org/Public/Bug/Display.html?id=116513","https://github.com/advisories/GHSA-hm5v-6984-hfqp","https://metacpan.org/release/MSHELOR/Digest-SHA-5.96/diff/MSHELOR/Digest-SHA-5.95","https://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","https://lists.debian.org/debian-security-announce/2016/msg00206.html","https://security.gentoo.org/glsa/201701-75"],"distribution":"Digest-SHA","severity":"high","cves":["CVE-2016-1238"]}]},"Encode":{"advisories":[{"description":"Loading optional modules from . (current directory).\n","fixed_versions":[">=2.85"],"affected_versions":["<2.85"],"references":["https://metacpan.org/changes/distribution/Encode","https://github.com/dankogai/p5-encode/pull/58/commits/12be15d64ce089154c4367dc1842cd0dc0993ec6"],"reported":"2016-07-27","distribution":"Encode","severity":"high","cves":["CVE-2016-1238"],"id":"CPANSA-Encode-2016-01"},{"id":"CPANSA-Encode-2021-01","cves":["CVE-2021-36770"],"distribution":"Encode","reported":"2021-07-17","references":["https://github.com/Perl/perl5/commit/c1a937fef07c061600a0078f4cb53fe9c2136bb9","https://github.com/dankogai/p5-encode/commit/527e482dc70b035d0df4f8c77a00d81f8d775c74","https://metacpan.org/dist/Encode/changes","https://news.cpanel.com/unscheduled-tsr-10-august-2021/","https://security.netapp.com/advisory/ntap-20210909-0003/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5NDGQSGMEZ75FJGBKNYC75OTO7TF7XHB/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6KOZYD7BH2DNIAEZ2ZL4PJ4QUVQI6Y33/","https://security-tracker.debian.org/tracker/CVE-2021-36770"],"affected_versions":[">=3.05","<=3.11"],"fixed_versions":[">3.11"],"description":"Encode.pm, as distributed in Perl through 5.34.0, allows local users to gain privileges via a Trojan horse Encode::ConfigLocal library (in the current working directory) that preempts dynamic module loading. Exploitation requires an unusual configuration, and certain 2021 versions of Encode.pm (3.05 through 3.11). This issue occurs because the || operator evaluates @INC in a scalar context, and thus @INC has only an integer value.\n"},{"cves":["CVE-2011-2939"],"severity":null,"distribution":"Encode","references":["http://perl5.git.perl.org/perl.git/commitdiff/e46d973584785af1f445c4dedbee4243419cb860#patch5","https://bugzilla.redhat.com/show_bug.cgi?id=731246","http://www.openwall.com/lists/oss-security/2011/08/19/17","http://www.redhat.com/support/errata/RHSA-2011-1424.html","http://www.openwall.com/lists/oss-security/2011/08/18/8","http://secunia.com/advisories/46989","http://www.mandriva.com/security/advisories?name=MDVSA-2012:008","http://secunia.com/advisories/51457","http://www.ubuntu.com/usn/USN-1643-1","http://www.securityfocus.com/bid/49858","http://secunia.com/advisories/46172","http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod","http://secunia.com/advisories/55314","http://search.cpan.org/~flora/perl-5.14.2/pod/perldelta.pod#Encode_decode_xs_n-byte_heap-overflow_(CVE-2011-2939)"],"reported":"2012-01-13","id":"CPANSA-Encode-2011-2939","description":"Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow.\n","fixed_versions":[">=2.44"],"x-commit":"Encode CVE-2011-2939 GitHub #13","affected_versions":["<2.44"]}],"versions":[{"version":"0.93","date":"2002-03-20T08:30:40"},{"date":"2002-03-20T20:15:52","version":"0.94"},{"version":"0.95","date":"2002-03-21T16:07:21"},{"date":"2002-03-22T22:33:15","version":"0.96"},{"version":"0.97","date":"2002-03-23T20:36:05"},{"date":"2002-03-24T16:07:09","version":"0.98"},{"version":"0.99","date":"2002-03-25T19:45:16"},{"version":"1.00","date":"2002-03-28T23:39:49"},{"version":"1.01","date":"2002-03-29T21:43:17"},{"version":"1.10","date":"2002-03-31T21:40:25"},{"version":"1.11","date":"2002-03-31T22:27:07"},{"date":"2002-04-04T20:02:40","version":"1.20"},{"date":"2002-04-07T15:36:48","version":"1.26"},{"version":"1.27","date":"2002-04-07T18:49:41"},{"version":"1.28","date":"2002-04-07T19:05:34"},{"version":"1.30","date":"2002-04-08T02:49:31"},{"version":"1.31","date":"2002-04-08T18:51:14"},{"version":"1.32","date":"2002-04-09T20:26:37"},{"version":"1.33","date":"2002-04-10T22:44:19"},{"date":"2002-04-14T22:49:10","version":"1.40"},{"date":"2002-04-16T23:47:16","version":"1.41"},{"date":"2002-04-19T06:18:26","version":"1.50"},{"version":"1.51","date":"2002-04-20T10:08:39"},{"version":"1.52","date":"2002-04-20T23:55:45"},{"date":"2002-04-22T09:56:04","version":"1.56"},{"date":"2002-04-22T20:37:12","version":"1.57"},{"version":"1.58","date":"2002-04-23T00:22:06"},{"version":"1.60","date":"2002-04-24T20:23:42"},{"version":"1.61","date":"2002-04-26T03:19:40"},{"version":"1.62","date":"2002-04-27T11:43:39"},{"version":"1.63","date":"2002-04-27T19:52:51"},{"date":"2002-04-29T07:20:38","version":"1.64"},{"date":"2002-04-30T16:40:07","version":"1.65"},{"version":"1.66","date":"2002-05-01T05:51:35"},{"date":"2002-05-02T07:43:35","version":"1.67"},{"date":"2002-05-03T12:29:47","version":"1.68"},{"version":"1.69","date":"2002-05-04T16:50:40"},{"date":"2002-05-06T10:36:39","version":"1.70"},{"date":"2002-05-07T16:30:42","version":"1.71"},{"date":"2002-05-20T16:04:48","version":"1.72"},{"version":"1.74","date":"2002-05-28T18:41:36"},{"date":"2002-06-01T18:17:49","version":"1.75"},{"version":"1.76","date":"2002-08-25T15:18:49"},{"date":"2002-10-06T03:59:19","version":"1.77"},{"date":"2002-10-20T15:55:16","version":"1.78"},{"version":"1.79","date":"2002-10-21T06:11:36"},{"date":"2002-10-21T20:42:56","version":"1.80"},{"date":"2002-11-08T18:42:11","version":"1.81"},{"version":"1.82","date":"2002-11-14T23:17:11"},{"date":"2002-11-18T18:06:47","version":"1.83"},{"version":"1.84","date":"2003-01-10T12:09:05"},{"version":"1.85","date":"2003-01-21T22:23:28"},{"date":"2003-01-22T03:36:42","version":"1.86"},{"date":"2003-02-06T02:01:00","version":"1.87"},{"date":"2003-02-20T14:46:12","version":"1.88"},{"version":"1.89","date":"2003-02-28T01:45:53"},{"version":"1.90","date":"2003-03-09T17:54:26"},{"version":"1.91","date":"2003-03-09T20:12:08"},{"version":"1.92","date":"2003-03-31T03:51:31"},{"date":"2003-04-24T17:50:54","version":"1.93"},{"version":"1.94","date":"2003-05-10T18:31:48"},{"version":"1.95","date":"2003-05-21T09:22:43"},{"date":"2003-06-18T09:41:21","version":"1.96"},{"version":"1.97","date":"2003-07-08T22:01:28"},{"date":"2003-08-25T11:47:32","version":"1.98"},{"date":"2003-12-29T02:52:28","version":"1.99"},{"date":"2004-05-16T21:05:06","version":"2.00"},{"version":"2.01","date":"2004-05-25T16:31:35"},{"date":"2004-08-31T11:01:51","version":"2.02"},{"version":"2.03","date":"2004-10-06T06:50:47"},{"date":"2004-10-16T21:26:58","version":"2.04"},{"date":"2004-10-19T05:03:32","version":"2.05"},{"version":"2.06","date":"2004-10-22T06:29:14"},{"version":"2.07","date":"2004-10-22T19:43:19"},{"date":"2004-10-24T13:04:29","version":"2.08"},{"date":"2004-12-03T19:21:42","version":"2.09"},{"version":"2.10","date":"2005-05-16T18:54:53"},{"date":"2005-08-05T11:26:06","version":"2.11"},{"version":"2.12","date":"2005-09-08T14:23:38"},{"date":"2006-01-15T15:12:01","version":"2.13"},{"date":"2006-01-15T15:57:41","version":"2.14"},{"version":"2.15","date":"2006-04-06T16:01:30"},{"date":"2006-05-03T18:38:44","version":"2.16"},{"date":"2006-05-09T17:14:04","version":"2.17"},{"version":"2.18","date":"2006-06-03T20:34:08"},{"version":"2.19","date":"2007-04-06T13:05:52"},{"date":"2007-04-22T15:17:34","version":"2.20"},{"version":"2.21","date":"2007-05-12T06:50:09"},{"date":"2007-05-29T07:43:07","version":"2.22"},{"version":"2.23","date":"2007-05-29T18:21:25"},{"version":"2.24","date":"2008-03-12T10:12:18"},{"date":"2008-05-07T21:06:08","version":"2.25"},{"version":"2.26","date":"2008-07-01T21:03:33"},{"version":"2.27","date":"2009-01-21T23:01:50"},{"version":"2.29","date":"2009-02-01T13:16:44"},{"date":"2009-02-15T17:48:01","version":"2.30"},{"version":"2.31","date":"2009-02-16T06:25:32"},{"version":"2.32","date":"2009-03-07T07:45:00"},{"version":"2.33","date":"2009-03-25T08:01:10"},{"date":"2009-07-08T13:53:25","version":"2.34"},{"date":"2009-07-13T02:32:45","version":"2.35"},{"version":"2.36","date":"2009-09-06T09:20:21"},{"version":"2.37","date":"2009-09-06T14:37:23"},{"date":"2009-11-16T14:34:43","version":"2.38"},{"date":"2009-11-26T09:31:02","version":"2.39"},{"date":"2010-09-18T18:47:17","version":"2.40"},{"version":"2.41","date":"2010-12-23T11:12:33"},{"version":"2.42","date":"2010-12-31T22:52:35"},{"date":"2011-05-21T23:21:24","version":"2.43"},{"version":"2.44","date":"2011-08-09T08:01:30"},{"date":"2012-08-05T23:15:11","version":"2.45"},{"date":"2012-08-12T05:52:45","version":"2.46"},{"version":"2.47","date":"2012-08-15T05:40:21"},{"date":"2013-02-18T02:43:35","version":"2.48"},{"version":"2.49","date":"2013-03-05T03:19:15"},{"date":"2013-04-26T18:36:59","version":"2.50"},{"version":"2.51","date":"2013-04-29T22:21:31"},{"date":"2013-08-14T02:33:46","version":"2.52"},{"date":"2013-08-29T15:27:02","version":"2.53"},{"version":"2.54","date":"2013-08-29T16:50:08"},{"date":"2013-09-14T07:58:54","version":"2.55"},{"version":"2.56","date":"2013-12-22T04:12:07"},{"version":"2.57","date":"2014-01-03T04:55:36"},{"version":"2.58","date":"2014-03-28T02:41:54"},{"version":"2.59","date":"2014-04-06T17:41:19"},{"date":"2014-04-29T16:34:10","version":"2.60"},{"date":"2014-05-31T09:55:56","version":"2.61"},{"version":"2.62","date":"2014-05-31T12:20:28"},{"version":"2.63","date":"2014-10-19T07:13:44"},{"version":"2.64","date":"2014-10-29T15:42:04"},{"version":"2.65","date":"2014-11-27T14:12:57"},{"version":"2.66","date":"2014-12-02T23:37:28"},{"date":"2014-12-04T20:28:33","version":"2.67"},{"version":"2.68","date":"2015-01-22T10:29:46"},{"date":"2015-02-05T10:43:34","version":"2.69"},{"version":"2.70","date":"2015-02-05T10:56:52"},{"date":"2015-03-12T00:14:19","version":"2.71"},{"date":"2015-03-14T02:51:25","version":"2.72"},{"date":"2015-04-15T23:27:13","version":"2.73"},{"date":"2015-06-25T00:59:20","version":"2.74"},{"date":"2015-06-30T10:10:03","version":"2.75"},{"version":"2.76","date":"2015-07-31T02:26:51"},{"version":"2.77","date":"2015-09-15T14:03:35"},{"date":"2015-09-24T02:29:52","version":"2.78"},{"date":"2016-01-22T07:08:25","version":"2.79"},{"version":"2.80","date":"2016-01-25T15:04:42"},{"date":"2016-02-06T19:34:58","version":"2.81"},{"date":"2016-02-06T20:21:37","version":"2.82"},{"date":"2016-03-24T08:00:30","version":"2.83"},{"version":"2.84","date":"2016-04-11T07:24:26"},{"date":"2016-08-04T03:37:23","version":"2.85"},{"date":"2016-08-10T18:25:39","version":"2.86"},{"version":"2.87","date":"2016-10-28T05:15:33"},{"date":"2016-11-29T23:38:19","version":"2.88"},{"version":"2.89","date":"2017-04-21T05:24:59"},{"version":"2.90","date":"2017-06-10T17:46:11"},{"version":"2.91","date":"2017-06-22T08:18:22"},{"date":"2017-07-18T07:23:39","version":"2.92"},{"date":"2017-10-06T22:33:35","version":"2.93"},{"version":"2.94","date":"2018-01-09T06:04:38"},{"date":"2018-02-08T00:41:02","version":"2.95"},{"date":"2018-02-11T05:41:37","version":"2.96"},{"date":"2018-02-21T12:30:05","version":"2.97"},{"version":"2.98","date":"2018-04-22T09:14:59"},{"version":"2.99","date":"2019-01-21T03:28:35"},{"version":"2.100","date":"2019-01-31T04:42:29"},{"date":"2019-01-31T05:05:06","version":"3.00"},{"date":"2019-03-13T00:45:28","version":"3.01"},{"date":"2019-12-25T09:47:36","version":"3.02"},{"version":"3.03","date":"2020-03-02T04:45:26"},{"date":"2020-03-10T22:40:35","version":"3.04"},{"version":"3.05","date":"2020-03-18T05:03:23"},{"date":"2020-05-02T02:40:38","version":"3.06"},{"date":"2020-07-25T13:08:13","version":"3.07"},{"date":"2020-12-02T09:20:23","version":"3.08"},{"version":"3.09","date":"2021-05-14T11:03:11"},{"version":"3.10","date":"2021-05-18T07:51:48"},{"version":"3.11","date":"2021-07-23T02:41:38"},{"date":"2021-08-09T14:30:33","version":"3.12"},{"version":"3.13","date":"2021-10-06T00:57:50"},{"version":"3.14","date":"2021-10-08T00:35:29"},{"date":"2021-10-08T15:45:44","version":"3.15"},{"version":"3.16","date":"2021-10-13T08:39:09"},{"version":"3.17","date":"2022-04-07T03:18:23"},{"version":"3.18","date":"2022-06-25T02:14:35"},{"date":"2022-08-04T04:51:01","version":"3.19"},{"date":"2023-11-10T01:26:15","version":"3.20"},{"version":"3.21","date":"2024-02-25T23:19:43"},{"version":"0.40","perl_release":"5.007003","dual_lived":1,"date":"2002-03-05T00:00:00"},{"date":"2003-09-25T00:00:00","dual_lived":1,"perl_release":"5.008001","version":"1.9801"},{"dual_lived":1,"date":"2004-04-21T00:00:00","version":"1.99_01","perl_release":"5.008004"},{"date":"2006-08-15T00:00:00","dual_lived":1,"perl_release":"5.009004","version":"2.18_01"},{"date":"2012-11-10T00:00:00","dual_lived":1,"version":"2.39_01","perl_release":"5.012005"},{"perl_release":"5.014002","version":"2.42_01","dual_lived":1,"date":"2011-09-26T00:00:00"},{"date":"2013-03-10T00:00:00","dual_lived":1,"version":"2.42_02","perl_release":"5.014004"},{"dual_lived":1,"date":"2013-03-11T00:00:00","perl_release":"5.016003","version":"2.44_01"},{"version":"2.72_01","perl_release":"5.022003","date":"2017-01-14T00:00:00","dual_lived":1},{"perl_release":"5.024001","version":"2.80_01","date":"2017-01-14T00:00:00","dual_lived":1},{"perl_release":"5.034001","version":"3.08_01","dual_lived":1,"date":"2022-03-13T00:00:00"}],"main_module":"Encode"},"Plack":{"versions":[{"version":"0.9000","date":"2009-10-13T07:21:14"},{"version":"0.9001","date":"2009-10-13T07:59:20"},{"version":"0.9002","date":"2009-10-14T18:28:32"},{"version":"0.9003","date":"2009-10-19T02:19:08"},{"version":"0.9004","date":"2009-10-21T05:59:54"},{"version":"0.9005","date":"2009-10-22T03:55:53"},{"date":"2009-10-23T08:22:57","version":"0.9006"},{"version":"0.9007","date":"2009-10-25T00:49:12"},{"version":"0.9008","date":"2009-10-27T21:20:52"},{"version":"0.9009","date":"2009-11-08T04:51:25"},{"date":"2009-11-12T07:23:02","version":"0.9010"},{"date":"2009-11-12T11:57:16","version":"0.9011"},{"date":"2009-11-17T21:48:12","version":"0.9012"},{"version":"0.9013","date":"2009-11-19T02:29:16"},{"date":"2009-11-21T05:54:55","version":"0.9014"},{"date":"2009-11-26T08:39:53","version":"0.9015"},{"date":"2009-11-29T07:41:55","version":"0.9016"},{"version":"0.9017","date":"2009-11-29T08:40:10"},{"version":"0.9018","date":"2009-12-03T08:52:20"},{"date":"2009-12-06T06:01:48","version":"0.9019"},{"version":"0.9020","date":"2009-12-07T10:39:46"},{"date":"2009-12-08T22:32:02","version":"0.9021"},{"version":"0.9022","date":"2009-12-13T19:03:10"},{"date":"2009-12-17T21:22:18","version":"0.9023"},{"version":"0.9024","date":"2009-12-19T20:28:45"},{"date":"2009-12-26T01:16:08","version":"0.9025"},{"version":"0.9026","date":"2010-01-01T01:38:39"},{"version":"0.9027","date":"2010-01-04T00:36:24"},{"version":"0.9028","date":"2010-01-06T02:44:35"},{"version":"0.9029","date":"2010-01-08T03:13:27"},{"date":"2010-01-09T21:17:38","version":"0.9030"},{"version":"0.9031","date":"2010-01-11T19:34:54"},{"version":"0.99_01","date":"2010-01-29T22:44:12"},{"version":"0.99_02","date":"2010-01-31T06:15:25"},{"date":"2010-02-04T00:15:09","version":"0.99_03"},{"date":"2010-02-06T07:17:08","version":"0.99_04"},{"date":"2010-02-10T20:55:18","version":"0.99_05"},{"date":"2010-02-23T03:10:40","version":"0.9910"},{"date":"2010-02-23T09:58:27","version":"0.9911"},{"version":"0.9912","date":"2010-02-25T09:32:19"},{"date":"2010-02-26T03:16:42","version":"0.9913"},{"date":"2010-03-04T00:07:15","version":"0.9914"},{"version":"0.9915","date":"2010-03-08T09:35:55"},{"version":"0.9916","date":"2010-03-12T03:56:59"},{"date":"2010-03-17T22:41:16","version":"0.9917"},{"date":"2010-03-18T05:42:29","version":"0.9918"},{"version":"0.9919","date":"2010-03-18T05:56:03"},{"date":"2010-03-19T07:05:16","version":"0.9920"},{"date":"2010-03-25T22:10:09","version":"0.99_21"},{"date":"2010-03-26T02:51:33","version":"0.99_22"},{"date":"2010-03-27T08:06:00","version":"0.99_23"},{"version":"0.99_24","date":"2010-03-27T20:36:26"},{"version":"0.9925","date":"2010-03-28T02:06:23"},{"version":"0.9926","date":"2010-03-28T21:49:52"},{"date":"2010-03-29T19:51:35","version":"0.9927"},{"version":"0.9928","date":"2010-03-30T00:07:33"},{"version":"0.9929","date":"2010-03-31T07:37:38"},{"date":"2010-04-14T03:22:29","version":"0.9930"},{"date":"2010-04-17T06:54:58","version":"0.9931"},{"version":"0.9932","date":"2010-04-19T06:29:10"},{"version":"0.9933","date":"2010-04-27T21:35:45"},{"version":"0.9934","date":"2010-05-04T22:51:24"},{"date":"2010-05-05T22:21:08","version":"0.9935"},{"date":"2010-05-14T23:01:23","version":"0.9936"},{"date":"2010-05-15T06:14:20","version":"0.9937"},{"version":"0.9938","date":"2010-05-24T00:16:59"},{"date":"2010-07-03T01:04:03","version":"0.9938"},{"version":"0.9940","date":"2010-07-03T06:43:20"},{"date":"2010-07-09T01:22:49","version":"0.9941"},{"date":"2010-07-24T06:46:17","version":"0.9942"},{"date":"2010-07-30T20:26:59","version":"0.9943"},{"date":"2010-08-09T06:40:55","version":"0.9944"},{"version":"0.9945","date":"2010-08-19T23:32:19"},{"version":"0.9946","date":"2010-08-29T05:49:19"},{"date":"2010-09-09T09:27:05","version":"0.9947"},{"version":"0.9948","date":"2010-09-09T23:04:59"},{"version":"0.9949","date":"2010-09-14T19:01:11"},{"version":"0.9950","date":"2010-09-30T21:14:53"},{"date":"2010-10-25T21:19:36","version":"0.9951"},{"version":"0.9952","date":"2010-12-02T22:06:47"},{"version":"0.9953","date":"2010-12-03T22:52:23"},{"version":"0.9954","date":"2010-12-10T01:48:11"},{"version":"0.9955","date":"2010-12-10T02:03:59"},{"version":"0.9956","date":"2010-12-10T03:39:26"},{"date":"2010-12-16T19:33:28","version":"0.9957"},{"version":"0.9958","date":"2010-12-20T23:23:17"},{"version":"0.9959","date":"2010-12-21T19:58:23"},{"version":"0.9960","date":"2010-12-25T19:18:11"},{"date":"2011-01-08T05:54:56","version":"0.9961"},{"version":"0.9962","date":"2011-01-09T05:21:23"},{"date":"2011-01-11T00:51:33","version":"0.9963"},{"version":"0.9964","date":"2011-01-25T00:50:49"},{"version":"0.9965","date":"2011-01-25T07:13:52"},{"version":"0.9966","date":"2011-01-25T20:03:38"},{"date":"2011-01-25T22:27:44","version":"0.9967"},{"date":"2011-02-10T03:09:10","version":"0.9968"},{"version":"0.9969","date":"2011-02-19T05:56:47"},{"version":"0.9970","date":"2011-02-22T16:44:11"},{"version":"0.9971","date":"2011-02-23T22:07:39"},{"version":"0.9972","date":"2011-02-24T19:57:46"},{"date":"2011-02-26T17:48:50","version":"0.9973"},{"date":"2011-03-04T04:56:59","version":"0.9974"},{"date":"2011-03-24T18:38:08","version":"0.99_75"},{"version":"0.9976","date":"2011-04-09T01:29:10"},{"version":"0.9977","date":"2011-05-01T19:24:37"},{"date":"2011-05-04T18:31:01","version":"0.9978"},{"date":"2011-05-17T16:59:59","version":"0.9979"},{"date":"2011-06-07T03:29:28","version":"0.9980"},{"version":"0.9981","date":"2011-07-19T00:35:19"},{"version":"0.9982","date":"2011-07-19T20:14:06"},{"date":"2011-09-27T17:23:29","version":"0.9983"},{"version":"0.9984","date":"2011-10-03T16:57:23"},{"date":"2011-10-31T20:17:46","version":"0.9985"},{"version":"0.9986","date":"2012-03-12T18:29:44"},{"date":"2012-05-10T05:13:38","version":"0.9987"},{"version":"0.9988","date":"2012-05-11T10:27:33"},{"date":"2012-06-21T20:49:15","version":"0.9989"},{"version":"0.9990","date":"2012-07-18T18:17:16"},{"date":"2012-07-20T00:30:44","version":"0.9991"},{"date":"2012-07-20T02:12:14","version":"1.0000"},{"date":"2012-07-26T23:28:35","version":"1.0001"},{"version":"1.0002","date":"2012-08-14T00:09:45"},{"date":"2012-08-29T20:49:18","version":"1.0003"},{"date":"2012-09-20T02:21:25","version":"1.0004"},{"date":"2012-10-09T20:37:58","version":"1.0005"},{"date":"2012-10-18T23:10:01","version":"1.0006"},{"date":"2012-10-21T06:23:22","version":"1.0007"},{"version":"1.0008","date":"2012-10-23T01:54:12"},{"date":"2012-10-23T07:59:59","version":"1.0009"},{"date":"2012-11-02T20:33:36","version":"1.0010"},{"date":"2012-11-11T19:09:23","version":"1.0011"},{"date":"2012-11-14T20:02:29","version":"1.0012"},{"date":"2012-11-15T03:49:43","version":"1.0013"},{"date":"2012-12-03T18:30:20","version":"1.0014"},{"date":"2013-01-10T23:23:32","version":"1.0015"},{"date":"2013-01-31T21:28:36","version":"1.0016"},{"date":"2013-02-08T03:43:51","version":"1.0017"},{"version":"1.0018","date":"2013-03-08T18:47:51"},{"version":"1.0019","date":"2013-04-02T01:39:27"},{"version":"1.0020","date":"2013-04-02T02:39:03"},{"date":"2013-04-02T18:21:32","version":"1.0021"},{"version":"1.0022","date":"2013-04-02T19:38:30"},{"version":"1.0023","date":"2013-04-08T18:14:06"},{"version":"1.0024","date":"2013-05-01T17:07:27"},{"version":"1.0025","date":"2013-06-12T20:10:31"},{"date":"2013-06-13T06:01:17","version":"1.0026"},{"version":"1.0027","date":"2013-06-14T04:31:09"},{"version":"1.0028","date":"2013-06-15T08:44:43"},{"version":"1.0029","date":"2013-08-22T21:06:25"},{"version":"1.0030","date":"2013-11-23T07:55:52"},{"date":"2014-08-01T20:20:15","version":"1.0031"},{"version":"1.0032","date":"2014-10-04T18:14:01"},{"version":"1.0033","date":"2014-10-23T20:32:28"},{"date":"2015-02-02T20:44:19","version":"1.0034"},{"version":"1.0035","date":"2015-04-16T08:09:20"},{"version":"1.0036","date":"2015-06-03T19:03:39"},{"version":"1.0037","date":"2015-06-19T17:02:08"},{"version":"1.0038","date":"2015-11-25T20:37:51"},{"date":"2015-12-06T11:29:40","version":"1.0039"},{"version":"1.0040","date":"2016-04-01T16:58:21"},{"version":"1.0041","date":"2016-09-25T21:25:47"},{"date":"2016-09-29T05:38:42","version":"1.0042"},{"date":"2017-02-22T03:02:05","version":"1.0043"},{"version":"1.0044","date":"2017-04-27T17:48:20"},{"date":"2017-12-31T20:42:50","version":"1.0045"},{"version":"1.0046","date":"2018-02-10T07:52:31"},{"version":"1.0047","date":"2018-02-10T09:25:30"},{"date":"2020-11-30T00:21:36","version":"1.0048"},{"version":"1.0049","date":"2022-09-01T17:44:48"},{"version":"1.0050","date":"2022-09-05T15:48:11"},{"version":"1.0051","date":"2024-01-05T23:11:02"},{"date":"2024-09-30T20:39:33","version":"1.0052"},{"date":"2024-12-12T21:11:55","version":"1.0053"}],"advisories":[{"description":"Fixed a possible directory traversal with Plack::App::File on Win32.\n","fixed_versions":[">=1.0034"],"affected_versions":["<1.0034"],"distribution":"Plack","references":[],"reported":"2015-02-02","cves":[],"id":"CPANSA-Plack-2015-0202"},{"id":"CPANSA-Plack-2014-0801","distribution":"Plack","reported":"2014-08-01","references":["https://github.com/plack/Plack/pull/446"],"cves":[],"affected_versions":["<1.0031"],"description":"Plack::App::File would previously strip trailing slashes off provided paths. This in combination with the common pattern of serving files with Plack::Middleware::Static could allow an attacker to bypass a whitelist of generated files\n","fixed_versions":[">=1.0031"]},{"affected_versions":["<1.0016"],"fixed_versions":[">=1.0016"],"description":"Fixed directory traversal bug in Plack::App::File on win32 environments\n","id":"CPANSA-Plack-2013-0131","distribution":"Plack","references":[],"reported":"2013-01-31","cves":[]}],"main_module":"Plack"},"App-Genpass":{"versions":[{"version":"0.03","date":"2009-12-14T22:15:31"},{"date":"2010-01-01T18:06:50","version":"0.04"},{"version":"0.05","date":"2010-01-02T07:45:49"},{"date":"2010-05-28T21:46:01","version":"0.06"},{"date":"2010-05-29T21:37:11","version":"0.07"},{"version":"0.08","date":"2010-05-30T08:35:54"},{"date":"2010-05-31T18:39:55","version":"0.09"},{"date":"2010-06-07T10:16:54","version":"0.10"},{"date":"2010-07-16T21:15:53","version":"0.11"},{"date":"2010-07-16T22:36:16","version":"1.00"},{"date":"2010-07-18T15:20:18","version":"1.01"},{"date":"2011-02-17T10:52:08","version":"2.00"},{"version":"2.01","date":"2011-03-10T12:26:49"},{"date":"2011-08-03T11:58:46","version":"2.02"},{"version":"2.03","date":"2011-08-03T16:05:37"},{"date":"2011-08-06T07:36:59","version":"2.04"},{"version":"2.10","date":"2011-08-08T12:51:57"},{"version":"2.20","date":"2011-11-27T17:45:15"},{"version":"2.30","date":"2012-03-26T19:55:19"},{"version":"2.31","date":"2012-06-26T08:16:36"},{"version":"2.32","date":"2012-06-30T23:12:23"},{"date":"2012-11-20T08:48:46","version":"2.33"},{"date":"2014-08-04T20:00:26","version":"2.34"},{"version":"2.400","date":"2016-10-12T08:56:56"},{"date":"2016-10-14T21:27:13","version":"2.401"}],"advisories":[{"affected_versions":["<0.2400"],"fixed_versions":[">=0.2400"],"description":"App-genpass before v0.2400 generated passwords using build in rand()\n","id":"CPANSA-App-Genpass-2024-001","references":["https://metacpan.org/dist/App-Genpass/changes","https://github.com/xsawyerx/app-genpass/pull/5","https://github.com/briandfoy/cpan-security-advisory/issues/178"],"reported":null,"distribution":"App-Genpass","severity":null,"cves":[]}],"main_module":"App::Genpass"},"App-perlall":{"main_module":"App::perlall","advisories":[{"affected_versions":["<0.33"],"description":"The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key.\n","fixed_versions":[">=0.33"],"id":"CPANSA-App-perlall-2013-1667","reported":"2013-03-14","references":["http://www.securityfocus.com/bid/58311","http://perl5.git.perl.org/perl.git/commitdiff/d59e31f","http://perl5.git.perl.org/perl.git/commitdiff/9d83adc","http://www.nntp.perl.org/group/perl.perl5.porters/2013/03/msg199755.html","http://www.debian.org/security/2013/dsa-2641","http://secunia.com/advisories/52499","http://secunia.com/advisories/52472","https://bugzilla.redhat.com/show_bug.cgi?id=912276","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702296","http://perl5.git.perl.org/perl.git/commitdiff/6e79fe5","http://osvdb.org/90892","http://www.ubuntu.com/usn/USN-1770-1","http://rhn.redhat.com/errata/RHSA-2013-0685.html","http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html","http://marc.info/?l=bugtraq&m=137891988921058&w=2","http://www.mandriva.com/security/advisories?name=MDVSA-2013:113","https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0094","http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","https://exchange.xforce.ibmcloud.com/vulnerabilities/82598","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18771"],"distribution":"App-perlall","severity":null,"cves":["CVE-2013-1667"]}],"versions":[{"version":"0.01","date":"2011-12-23T21:52:22"},{"version":"0.02","date":"2011-12-24T00:56:03"},{"date":"2012-01-06T17:07:08","version":"0.03"},{"date":"2012-01-09T22:05:35","version":"0.04"},{"date":"2012-01-31T21:18:20","version":"0.05"},{"version":"0.06","date":"2012-02-06T23:12:27"},{"date":"2012-02-07T20:52:55","version":"0.07"},{"version":"0.08","date":"2012-02-23T10:35:50"},{"version":"0.09","date":"2012-03-22T18:24:53"},{"date":"2012-05-03T13:44:26","version":"0.10"},{"date":"2012-05-05T02:22:56","version":"0.11"},{"version":"0.12","date":"2012-05-05T14:18:09"},{"version":"0.13","date":"2012-05-29T15:34:02"},{"version":"0.14","date":"2012-06-07T16:07:09"},{"date":"2012-07-18T17:55:03","version":"0.15"},{"version":"0.15_01","date":"2012-07-18T18:05:33"},{"version":"0.16","date":"2012-07-19T19:07:14"},{"version":"0.17","date":"2012-08-06T15:11:54"},{"date":"2012-11-06T22:12:59","version":"0.18"},{"version":"0.19","date":"2012-11-08T15:37:31"},{"version":"0.20","date":"2012-11-08T15:50:30"},{"date":"2012-11-08T18:53:37","version":"0.21"},{"date":"2012-11-09T22:04:21","version":"0.22"},{"version":"0.23","date":"2012-11-11T19:50:41"},{"date":"2012-11-13T20:46:09","version":"0.25"},{"date":"2012-11-13T22:45:49","version":"0.26"},{"date":"2012-11-15T16:26:40","version":"0.27"},{"date":"2012-12-13T20:09:18","version":"0.28"},{"date":"2012-12-20T22:29:59","version":"0.29"},{"version":"0.30","date":"2013-01-09T20:22:21"},{"version":"0.31","date":"2013-02-04T19:58:18"},{"date":"2013-02-23T21:35:31","version":"0.32"},{"date":"2013-03-05T01:04:28","version":"0.33"},{"date":"2013-03-05T15:34:37","version":"0.34"},{"date":"2013-03-22T22:34:57","version":"0.35"},{"date":"2013-07-11T19:58:07","version":"0.36"},{"date":"2013-07-13T19:53:25","version":"0.37"},{"date":"2013-10-23T15:58:48","version":"0.39"},{"version":"0.40","date":"2013-11-18T16:12:38"},{"date":"2013-12-03T17:08:11","version":"0.41"},{"version":"0.42","date":"2013-12-06T18:40:51"},{"date":"2013-12-09T18:31:19","version":"0.43"},{"version":"0.44","date":"2014-01-11T23:39:19"},{"version":"0.45","date":"2014-07-25T13:36:23"},{"date":"2014-08-10T01:42:03","version":"0.46"},{"version":"0.47","date":"2015-07-08T07:43:56"},{"date":"2015-10-06T09:33:35","version":"0.48"},{"version":"0.49","date":"2015-11-27T15:53:11"},{"date":"2016-06-12T12:48:37","version":"0.50"},{"date":"2019-12-10T20:02:45","version":"0.51"}]},"libapreq2":{"main_module":"Apache2::Cookie","advisories":[{"cves":["CVE-2006-0042"],"distribution":"libapreq2","references":["https://metacpan.org/changes/distribution/libapreq2"],"reported":"2007-04-17","id":"CPANSA-libapreq2-2006-01","fixed_versions":[">=2.07"],"description":"Unspecified vulnerability in apreq_parse_headers and apreq_parse_urlencoded functions in Apache2::Request (Libapreq2) allows remote attackers to cause a denial of service (CPU consumption) via unknown attack vectors that result in quadratic computational complexity.\n","affected_versions":["<2.07"]}],"versions":[{"date":"2003-11-11T01:28:48","version":"2.01_03"},{"version":"2.02_02","date":"2003-11-16T04:16:12"},{"version":"2.03_04","date":"2004-06-12T14:52:49"},{"version":"2.04_03","date":"2004-08-30T16:13:45"},{"version":"2.05","date":"2005-05-04T23:38:05"},{"date":"2005-07-20T17:10:48","version":"2.06"},{"version":"2.07","date":"2006-02-12T18:10:47"},{"version":"2.08","date":"2006-08-09T04:54:07"},{"date":"2009-03-13T22:47:11","version":"2.12"},{"version":"2.13","date":"2010-12-02T18:41:57"},{"version":"2.15","date":"2021-02-23T13:26:47"},{"date":"2021-03-22T17:59:11","version":"2.16"}]},"Lemonldap-NG-Portal":{"versions":[{"date":"2005-06-29T18:44:50","version":"0.01"},{"date":"2005-07-02T08:49:37","version":"0.02"},{"version":"0.1","date":"2006-10-07T13:24:36"},{"date":"2006-10-14T13:26:07","version":"0.11"},{"date":"2006-10-14T14:11:06","version":"0.111"},{"date":"2006-10-17T13:58:53","version":"0.2"},{"date":"2006-11-02T15:23:31","version":"0.4"},{"version":"0.41","date":"2006-11-03T07:25:06"},{"date":"2006-12-07T21:02:36","version":"0.42"},{"date":"2006-12-19T18:26:07","version":"0.5"},{"date":"2006-12-31T13:03:32","version":"0.51"},{"date":"2007-01-13T19:47:36","version":"0.6"},{"version":"0.62","date":"2007-02-28T22:29:18"},{"date":"2007-03-04T18:23:52","version":"0.63"},{"date":"2007-03-09T20:18:23","version":"0.64"},{"version":"0.7","date":"2007-03-29T19:52:31"},{"date":"2007-04-01T20:26:10","version":"0.71"},{"date":"2007-04-14T20:46:13","version":"0.72"},{"date":"2007-04-20T06:51:13","version":"0.73"},{"version":"0.74","date":"2007-06-13T13:54:26"},{"version":"0.76","date":"2007-07-22T20:35:13"},{"version":"0.77","date":"2007-07-31T05:11:34"},{"version":"0.8","date":"2007-10-15T06:03:56"},{"version":"0.81","date":"2008-02-28T07:13:04"},{"date":"2008-04-11T14:53:38","version":"0.82"},{"version":"0.83","date":"2008-06-06T05:50:06"},{"version":"0.84","date":"2008-06-06T12:46:10"},{"version":"0.85","date":"2008-08-25T19:53:48"},{"version":"0.86","date":"2008-12-25T08:26:49"},{"date":"2009-02-08T07:13:05","version":"0.87"},{"date":"2009-06-29T10:14:46","version":"0.88"},{"date":"2009-07-05T11:40:59","version":"0.89"},{"version":"0.90","date":"2009-10-11T08:26:21"},{"version":"0.99","date":"2010-10-13T21:02:21"},{"date":"2010-10-22T05:36:29","version":"0.99.1"},{"version":"0.991","date":"2010-10-22T05:45:04"},{"version":"0.992","date":"2010-10-24T06:33:29"},{"date":"2010-11-26T13:38:59","version":"1.0.0"},{"date":"2011-02-28T13:42:23","version":"1.0.2"},{"version":"v1.0.3","date":"2011-03-07T11:17:03"},{"date":"2011-03-23T14:54:26","version":"1.0.4"},{"date":"2011-04-15T14:51:44","version":"1.0.5"},{"date":"2011-05-30T08:40:46","version":"1.0.6"},{"date":"2011-07-08T09:33:35","version":"1.1.0"},{"date":"2011-07-29T13:43:35","version":"1.1.1"},{"date":"2011-10-07T12:58:06","version":"1.1.2"},{"version":"1.2.0","date":"2012-06-18T10:13:31"},{"version":"1.2.1","date":"2012-07-06T09:18:54"},{"version":"1.2.2","date":"2012-09-17T14:04:26"},{"date":"2013-01-25T21:51:54","version":"1.2.2_01"},{"version":"1.2.3","date":"2013-02-08T17:11:38"},{"date":"2013-04-23T13:19:57","version":"1.2.4"},{"date":"2013-08-26T10:39:11","version":"1.2.5"},{"date":"2013-11-02T16:31:10","version":"v1.3.0"},{"version":"v1.3.0_01","date":"2013-11-10T18:00:31"},{"version":"v1.3.1","date":"2013-11-11T14:01:21"},{"date":"2014-02-05T09:31:50","version":"1.3.2"},{"version":"1.3.3","date":"2014-03-07T13:55:23"},{"version":"v1.4.0","date":"2014-06-30T12:54:16"},{"version":"v1.4.1","date":"2014-07-25T09:55:37"},{"version":"v1.4.2","date":"2014-11-05T15:15:30"},{"date":"2014-12-19T10:31:47","version":"v1.4.3"},{"version":"v1.4.4","date":"2015-04-15T10:05:31"},{"date":"2015-05-22T16:54:10","version":"v1.4.5"},{"version":"v1.4.6","date":"2015-10-09T09:21:04"},{"version":"v1.9.0","date":"2016-03-02T09:50:24"},{"version":"v1.4.7","date":"2016-03-22T14:25:24"},{"version":"v1.9.1","date":"2016-04-05T16:02:49"},{"version":"v1.4.8","date":"2016-04-27T15:23:10"},{"version":"v1.9.2","date":"2016-05-01T19:25:36"},{"date":"2016-06-03T14:14:52","version":"v1.4.9"},{"version":"v1.9.3","date":"2016-06-07T15:48:38"},{"date":"2016-06-14T18:36:34","version":"v1.9.4"},{"date":"2016-07-13T09:08:18","version":"v1.4.10"},{"date":"2016-07-13T12:58:54","version":"v1.9.5"},{"version":"v1.4.11","date":"2016-10-10T13:34:33"},{"date":"2016-10-16T12:23:25","version":"v1.9.6"},{"version":"v1.9.7","date":"2016-12-14T19:57:55"},{"date":"2017-02-28T21:11:18","version":"v1.9.99_2.0alpha1"},{"date":"2017-03-02T14:55:34","version":"v1.9.8"},{"date":"2017-03-07T05:48:09","version":"v1.9.99_02"},{"date":"2017-03-07T06:00:28","version":"v1.9.99_03"},{"date":"2017-03-15T05:34:48","version":"v1.9.991_01"},{"version":"v1.9.9","date":"2017-03-17T07:21:31"},{"date":"2017-05-19T18:48:42","version":"v1.9.10"},{"version":"v1.9.11","date":"2017-09-01T10:32:34"},{"date":"2017-09-12T08:40:27","version":"v1.9.12"},{"date":"2017-09-29T14:00:36","version":"v1.9.13"},{"version":"v1.9.14","date":"2017-11-24T19:59:18"},{"version":"v1.9.15","date":"2018-01-23T12:50:53"},{"version":"v1.9.16","date":"2018-03-16T10:34:13"},{"date":"2018-06-16T09:27:27","version":"v1.9.17"},{"date":"2018-10-05T09:40:26","version":"v1.9.18"},{"version":"v2.0.0","date":"2018-11-30T10:49:52"},{"date":"2019-02-12T17:13:39","version":"v2.0.2"},{"version":"v2.0.3","date":"2019-04-11T12:23:10"},{"date":"2019-05-13T13:07:36","version":"v2.0.4"},{"date":"2019-06-29T21:31:33","version":"v2.0.5"},{"version":"v2.0.6","date":"2019-09-24T13:01:00"},{"version":"v2.0.7","date":"2019-12-21T21:46:38"},{"date":"2020-05-05T16:14:25","version":"v2.0.8"},{"date":"2020-09-07T06:21:08","version":"v2.0.9"},{"date":"2021-01-17T17:24:36","version":"v2.0.10"},{"date":"2021-01-31T14:52:09","version":"v2.0.11"},{"version":"v2.0.12","date":"2021-07-22T17:38:26"},{"date":"2021-08-23T07:09:56","version":"v2.0.13"},{"date":"2022-02-22T18:13:11","version":"v2.0.14"},{"version":"v2.0.15","date":"2022-09-09T17:10:35"},{"date":"2022-09-16T08:36:23","version":"v2.0.15.1"},{"version":"v2.0.16","date":"2023-02-01T15:29:55"},{"date":"2023-05-12T17:38:52","version":"v2.16.2"},{"date":"2023-08-30T16:24:40","version":"v2.17.0"},{"date":"2023-12-20T21:12:20","version":"v2.18.0"},{"date":"2023-12-22T23:41:14","version":"v2.18.1"},{"date":"2024-02-06T17:49:13","version":"v2.18.2"},{"date":"2024-04-30T15:23:21","version":"v2.19.0"},{"version":"v2.19.1","date":"2024-07-15T14:48:13"},{"version":"v2.19.2","date":"2024-09-04T07:30:33"},{"version":"v2.20.0","date":"2024-10-08T15:53:50"},{"date":"2024-11-08T16:34:12","version":"v2.20.1"},{"date":"2025-01-21T17:01:40","version":"v2.20.2"},{"date":"2025-01-22T17:40:34","version":"v2.16.4"}],"advisories":[{"affected_versions":["<0.87"],"fixed_versions":[">=0.87"],"description":"When running on Apache with thread support setMacros and setGroups were not launched with the good datas.\n","id":"CPANSA-Lemonldap-NG-Portal-2009-01","cves":[],"distribution":"Lemonldap-NG-Portal","reported":"2009-02-08","references":["https://metacpan.org/changes/distribution/Lemonldap-NG-Portal"]}],"main_module":"Lemonldap::NG::Portal"},"DBD-SQLite":{"versions":[{"date":"2002-02-19T18:56:55","version":"0.05"},{"date":"2002-02-22T07:29:26","version":"0.06"},{"version":"0.07","date":"2002-02-23T11:19:51"},{"version":"0.08","date":"2002-02-25T12:59:46"},{"version":"0.09","date":"2002-02-27T19:46:01"},{"date":"2002-02-28T11:11:10","version":"0.10"},{"date":"2002-03-13T12:16:23","version":"0.11"},{"version":"0.12","date":"2002-03-21T16:49:25"},{"version":"0.13","date":"2002-03-26T22:39:39"},{"version":"0.14","date":"2002-03-28T15:59:02"},{"version":"0.15","date":"2002-04-02T10:48:10"},{"version":"0.16","date":"2002-06-17T23:50:53"},{"version":"0.17","date":"2002-06-26T13:59:05"},{"date":"2002-07-12T13:46:37","version":"0.18"},{"version":"0.19","date":"2002-08-13T22:19:45"},{"date":"2002-10-17T16:25:57","version":"0.20"},{"version":"0.21","date":"2002-10-18T07:08:42"},{"date":"2002-12-18T18:02:11","version":"0.22"},{"date":"2002-12-29T16:25:29","version":"0.23"},{"version":"0.24","date":"2003-01-29T16:47:23"},{"version":"0.25","date":"2003-03-06T22:24:48"},{"date":"2003-07-31T15:16:06","version":"0.26"},{"version":"0.27","date":"2003-08-18T20:17:31"},{"date":"2003-08-25T13:42:07","version":"0.28"},{"date":"2003-12-05T15:42:05","version":"0.29"},{"date":"2004-02-08T18:45:02","version":"0.30"},{"date":"2004-02-14T19:18:16","version":"0.31"},{"date":"2004-07-21T21:19:33","version":"1.00"},{"date":"2004-08-01T04:49:09","version":"1.01"},{"date":"2004-08-02T18:35:42","version":"1.02"},{"version":"1.03","date":"2004-08-09T15:43:59"},{"version":"1.04","date":"2004-08-23T15:14:21"},{"version":"1.05","date":"2004-09-10T15:46:34"},{"date":"2004-09-21T17:26:28","version":"1.06"},{"version":"1.07","date":"2004-10-12T09:07:33"},{"version":"1.08","date":"2005-02-26T13:47:33"},{"date":"2005-06-20T15:42:32","version":"1.09"},{"version":"1.10","date":"2005-12-01T20:56:30"},{"version":"1.11","date":"2005-12-02T19:13:29"},{"date":"2006-04-10T02:24:08","version":"1.12"},{"version":"1.13","date":"2006-09-08T05:02:06"},{"date":"2007-09-19T19:25:09","version":"1.14"},{"date":"2009-03-27T11:11:41","version":"1.19_01"},{"version":"1.19_02","date":"2009-03-28T16:46:41"},{"version":"1.19_03","date":"2009-03-30T21:58:59"},{"version":"1.19_04","date":"2009-03-31T20:31:37"},{"version":"1.19_05","date":"2009-04-02T04:24:12"},{"date":"2009-04-03T19:21:54","version":"1.19_06"},{"date":"2009-04-04T00:49:42","version":"1.19_07"},{"version":"1.19_08","date":"2009-04-04T04:29:03"},{"date":"2009-04-05T03:16:37","version":"1.19_09"},{"version":"1.19_10","date":"2009-04-05T19:43:04"},{"version":"1.20","date":"2009-04-07T14:00:36"},{"version":"1.21","date":"2009-04-08T01:24:11"},{"date":"2009-04-08T02:05:13","version":"1.22_01"},{"version":"1.22_02","date":"2009-04-08T11:49:36"},{"version":"1.22_03","date":"2009-04-09T09:40:39"},{"version":"1.22_04","date":"2009-04-11T01:58:53"},{"date":"2009-04-14T15:52:05","version":"1.22_05"},{"date":"2009-04-15T14:59:20","version":"1.22_06"},{"version":"1.22_07","date":"2009-04-16T05:40:28"},{"date":"2009-04-17T09:08:15","version":"1.22_08"},{"version":"1.23","date":"2009-04-19T09:53:00"},{"version":"1.24_01","date":"2009-04-22T02:14:33"},{"version":"1.24_02","date":"2009-04-23T00:50:02"},{"date":"2009-04-23T10:20:49","version":"1.25"},{"date":"2009-05-05T06:04:00","version":"1.26_01"},{"version":"1.26_02","date":"2009-06-19T06:56:29"},{"date":"2009-08-12T06:01:13","version":"1.26_03"},{"date":"2009-10-06T06:23:40","version":"1.26_04"},{"date":"2009-10-15T04:05:19","version":"1.26_05"},{"date":"2009-10-28T11:16:12","version":"1.26_06"},{"date":"2009-11-16T01:47:37","version":"1.26_07"},{"date":"2009-11-23T11:15:09","version":"1.27"},{"date":"2009-12-23T11:44:07","version":"1.28_01"},{"version":"1.28_02","date":"2010-01-03T05:56:21"},{"date":"2010-01-08T09:14:18","version":"1.29"},{"date":"2010-03-10T15:55:37","version":"1.30_01"},{"version":"1.30_02","date":"2010-03-30T11:45:57"},{"version":"1.30_03","date":"2010-05-31T03:13:24"},{"version":"1.30_04","date":"2010-08-25T09:25:41"},{"date":"2010-08-27T15:31:59","version":"1.30_05"},{"version":"1.30_06","date":"2010-09-09T01:49:17"},{"date":"2010-09-15T07:30:11","version":"1.31"},{"date":"2010-12-10T05:14:51","version":"1.32_01"},{"version":"1.32_02","date":"2011-03-07T06:57:51"},{"version":"1.32_03","date":"2011-05-12T05:05:38"},{"version":"1.32_04","date":"2011-05-20T02:39:29"},{"date":"2011-05-30T07:39:31","version":"1.33"},{"version":"1.34_01","date":"2011-09-21T16:26:23"},{"version":"1.34_02","date":"2011-10-21T06:13:45"},{"version":"1.34_03","date":"2011-11-01T03:51:19"},{"date":"2011-11-29T00:16:47","version":"1.35"},{"version":"1.36_01","date":"2012-01-19T06:15:08"},{"date":"2012-02-23T04:11:05","version":"1.36_02"},{"date":"2012-05-07T22:56:21","version":"1.36_03"},{"version":"1.36_04","date":"2012-05-19T09:46:14"},{"version":"1.37","date":"2012-06-09T14:43:03"},{"version":"1.38_01","date":"2012-09-24T10:18:25"},{"date":"2013-04-09T05:03:21","version":"1.38_02"},{"version":"1.38_03","date":"2013-05-21T05:14:23"},{"version":"1.38_04","date":"2013-05-29T07:11:57"},{"date":"2013-05-31T04:39:53","version":"1.38_05"},{"version":"1.39","date":"2013-06-09T15:10:40"},{"date":"2013-07-28T05:31:53","version":"1.40"},{"version":"1.41_01","date":"2013-08-27T06:41:37"},{"date":"2013-08-29T18:53:29","version":"1.41_02"},{"version":"1.41_03","date":"2013-09-04T17:57:50"},{"version":"1.41_04","date":"2014-01-12T01:19:09"},{"date":"2014-01-22T03:53:26","version":"1.41_05"},{"version":"1.41_06","date":"2014-02-12T02:53:38"},{"date":"2014-03-13T13:44:52","version":"1.41_07"},{"version":"1.42","date":"2014-03-19T15:29:13"},{"version":"1.43_01","date":"2014-03-25T18:50:08"},{"version":"1.43_02","date":"2014-03-25T19:58:13"},{"date":"2014-06-12T05:01:15","version":"1.43_03"},{"date":"2014-07-21T01:13:47","version":"1.43_04"},{"date":"2014-07-21T05:45:41","version":"1.43_05"},{"date":"2014-07-22T00:31:31","version":"1.43_06"},{"date":"2014-07-29T17:03:09","version":"1.43_07"},{"date":"2014-08-21T09:01:11","version":"1.43_08"},{"date":"2014-10-20T07:50:46","version":"1.43_09"},{"version":"1.44","date":"2014-10-22T14:15:00"},{"version":"1.45_01","date":"2014-10-22T15:33:37"},{"date":"2014-10-23T08:21:27","version":"1.45_02"},{"version":"1.45_03","date":"2014-10-24T17:57:53"},{"date":"2014-10-28T08:28:00","version":"1.45_04"},{"version":"1.45_05","date":"2014-11-25T04:07:43"},{"version":"1.45_06","date":"2014-11-26T08:52:49"},{"date":"2014-12-10T06:23:03","version":"1.46"},{"date":"2015-02-17T07:00:46","version":"1.47_01"},{"date":"2015-04-16T13:30:38","version":"1.47_02"},{"date":"2015-04-16T14:45:00","version":"1.47_03"},{"date":"2015-05-01T17:37:17","version":"1.47_04"},{"version":"1.47_05","date":"2015-05-08T13:49:32"},{"version":"1.48","date":"2015-06-11T16:10:44"},{"date":"2015-08-04T11:18:05","version":"1.49_01"},{"version":"1.49_02","date":"2015-10-10T03:43:45"},{"date":"2015-11-05T05:52:27","version":"1.49_03"},{"version":"1.49_04","date":"2015-11-24T12:59:11"},{"version":"1.49_05","date":"2016-01-11T13:32:43"},{"version":"1.49_06","date":"2016-01-15T03:40:44"},{"version":"1.49_07","date":"2016-01-21T01:11:59"},{"version":"1.49_08","date":"2016-01-30T00:55:58"},{"date":"2016-02-10T15:04:42","version":"1.50"},{"date":"2016-02-20T01:03:50","version":"1.51_01"},{"date":"2016-02-20T01:49:29","version":"1.51_02"},{"date":"2016-02-20T11:06:51","version":"1.51_03"},{"version":"1.51_04","date":"2016-03-07T04:33:35"},{"date":"2016-06-23T01:22:57","version":"1.51_05"},{"version":"1.51_06","date":"2016-10-15T00:21:14"},{"date":"2016-10-16T05:16:29","version":"1.51_07"},{"version":"1.52","date":"2016-11-15T13:02:35"},{"version":"1.53_01","date":"2016-11-26T01:34:30"},{"date":"2016-12-24T02:36:45","version":"1.54"},{"version":"1.55_01","date":"2017-01-03T15:42:47"},{"date":"2017-01-07T16:49:21","version":"1.55_02"},{"version":"1.55_03","date":"2017-02-14T01:31:43"},{"version":"1.55_04","date":"2017-11-21T17:07:32"},{"date":"2017-12-15T18:52:29","version":"1.55_05"},{"version":"1.55_06","date":"2018-01-27T07:33:51"},{"date":"2018-01-27T07:42:58","version":"1.55_07"},{"date":"2018-02-28T09:01:25","version":"1.56"},{"version":"1.57_01","date":"2018-03-21T06:45:29"},{"version":"1.58","date":"2018-03-28T11:56:19"},{"date":"2018-09-16T19:25:50","version":"1.59_01"},{"date":"2018-09-30T06:09:34","version":"1.59_02"},{"date":"2018-11-03T12:14:20","version":"1.59_03"},{"date":"2018-12-01T02:42:29","version":"1.60"},{"date":"2018-12-01T08:01:30","version":"1.61_01"},{"date":"2018-12-01T09:10:18","version":"1.61_02"},{"date":"2018-12-19T13:03:22","version":"1.61_03"},{"version":"1.61_04","date":"2018-12-22T06:37:21"},{"date":"2018-12-28T17:59:27","version":"1.62"},{"date":"2019-01-25T22:31:45","version":"1.63_01"},{"version":"1.63_02","date":"2019-02-13T19:09:44"},{"version":"1.63_03","date":"2019-02-14T16:56:40"},{"date":"2019-05-24T16:39:18","version":"1.63_04"},{"date":"2019-07-11T17:50:51","version":"1.63_05"},{"date":"2019-08-12T09:02:59","version":"1.64"},{"version":"1.65_01","date":"2020-01-18T01:56:18"},{"version":"1.65_02","date":"2020-02-08T13:02:59"},{"date":"2020-07-26T16:42:08","version":"1.65_03"},{"version":"1.66","date":"2020-08-30T02:14:15"},{"version":"1.67_01","date":"2020-11-24T12:57:56"},{"date":"2020-12-05T17:06:24","version":"1.67_02"},{"version":"1.67_03","date":"2021-03-30T21:37:13"},{"date":"2021-05-30T22:56:01","version":"1.67_04"},{"date":"2021-06-12T23:39:11","version":"1.67_05"},{"version":"1.67_06","date":"2021-06-14T03:49:54"},{"date":"2021-06-19T00:57:41","version":"1.67_07"},{"date":"2021-07-22T05:30:17","version":"1.68"},{"date":"2021-07-29T21:09:19","version":"1.69_01"},{"version":"1.69_02","date":"2021-07-30T14:21:39"},{"date":"2021-08-01T10:20:33","version":"1.70"},{"version":"1.71_01","date":"2021-12-01T17:03:29"},{"version":"1.71_02","date":"2022-01-06T20:51:05"},{"version":"1.71_03","date":"2022-02-23T10:49:28"},{"version":"1.71_04","date":"2022-02-26T00:59:40"},{"version":"1.71_05","date":"2022-02-26T02:49:09"},{"version":"1.71_06","date":"2022-03-12T02:54:15"},{"version":"1.71_07","date":"2022-10-25T18:36:30"},{"version":"1.72","date":"2022-11-03T16:28:17"},{"version":"1.73_01","date":"2023-07-09T01:04:52"},{"date":"2023-09-19T17:26:03","version":"1.74"},{"version":"1.75_01","date":"2024-09-17T14:05:40"},{"version":"1.76","date":"2024-10-19T04:47:07"}],"advisories":[{"fixed_versions":[">=1.65_03"],"description":"In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.\n","affected_versions":["<1.65_03"],"reported":"2020-06-27","references":["https://www.sqlite.org/src/info/10fa79d00f8091e5","https://www.sqlite.org/src/timeline?p=version-3.32.3&bt=version-3.32.2","https://www.sqlite.org/src/tktview?name=8f157e8010","https://security.netapp.com/advisory/ntap-20200709-0001/","https://security.gentoo.org/glsa/202007-26","https://usn.ubuntu.com/4438-1/","https://www.oracle.com/security-alerts/cpuoct2020.html","https://support.apple.com/kb/HT211931","https://support.apple.com/kb/HT211844","https://support.apple.com/kb/HT211850","https://support.apple.com/kb/HT211843","https://support.apple.com/kb/HT211847","http://seclists.org/fulldisclosure/2020/Nov/19","http://seclists.org/fulldisclosure/2020/Nov/22","http://seclists.org/fulldisclosure/2020/Nov/20","http://seclists.org/fulldisclosure/2020/Dec/32","https://www.oracle.com/security-alerts/cpujan2021.html","https://support.apple.com/kb/HT212147","http://seclists.org/fulldisclosure/2021/Feb/14","https://www.oracle.com/security-alerts/cpuApr2021.html","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf","https://www.oracle.com/security-alerts/cpuapr2022.html"],"distribution":"DBD-SQLite","severity":"medium","cves":["CVE-2020-15358"],"id":"CPANSA-DBD-SQLite-2020-15358"},{"id":"CPANSA-DBD-SQLite-2020-13632","references":["https://bugs.chromium.org/p/chromium/issues/detail?id=1080459","https://sqlite.org/src/info/a4dd148928ea65bd","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/","https://security.netapp.com/advisory/ntap-20200608-0002/","https://usn.ubuntu.com/4394-1/","https://www.oracle.com/security-alerts/cpujul2020.html","https://security.gentoo.org/glsa/202007-26","https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc","https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"reported":"2020-05-27","distribution":"DBD-SQLite","severity":"medium","cves":["CVE-2020-13632"],"affected_versions":["<1.65_03"],"fixed_versions":[">=1.65_03"],"description":"ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.\n"},{"description":"SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.\n","fixed_versions":[">=1.65_03"],"affected_versions":["<1.65_03"],"references":["https://bugs.chromium.org/p/chromium/issues/detail?id=1080459","https://sqlite.org/src/info/eca0ba2cf4c0fdf7","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/","https://security.netapp.com/advisory/ntap-20200608-0002/","https://usn.ubuntu.com/4394-1/","https://www.oracle.com/security-alerts/cpujul2020.html","https://security.gentoo.org/glsa/202007-26","https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc","https://www.oracle.com/security-alerts/cpuoct2020.html","https://support.apple.com/kb/HT211931","https://support.apple.com/kb/HT211844","https://support.apple.com/kb/HT211850","https://support.apple.com/kb/HT211843","https://support.apple.com/kb/HT211952","http://seclists.org/fulldisclosure/2020/Nov/19","http://seclists.org/fulldisclosure/2020/Nov/22","http://seclists.org/fulldisclosure/2020/Nov/20","https://support.apple.com/kb/HT211935","http://seclists.org/fulldisclosure/2020/Dec/32","https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"reported":"2020-05-27","distribution":"DBD-SQLite","severity":"medium","cves":["CVE-2020-13631"],"id":"CPANSA-DBD-SQLite-2020-13631"},{"id":"CPANSA-DBD-SQLite-2020-13630","reported":"2020-05-27","references":["https://bugs.chromium.org/p/chromium/issues/detail?id=1080459","https://sqlite.org/src/info/0d69f76f0865f962","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/","https://security.netapp.com/advisory/ntap-20200608-0002/","https://usn.ubuntu.com/4394-1/","https://www.oracle.com/security-alerts/cpujul2020.html","https://security.gentoo.org/glsa/202007-26","https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc","https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://support.apple.com/kb/HT211931","https://support.apple.com/kb/HT211844","https://support.apple.com/kb/HT211850","https://support.apple.com/kb/HT211843","https://support.apple.com/kb/HT211952","http://seclists.org/fulldisclosure/2020/Nov/19","http://seclists.org/fulldisclosure/2020/Nov/22","http://seclists.org/fulldisclosure/2020/Nov/20","https://support.apple.com/kb/HT211935","http://seclists.org/fulldisclosure/2020/Dec/32","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"distribution":"DBD-SQLite","severity":"high","cves":["CVE-2020-13630"],"affected_versions":["<1.65_03"],"description":"ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.\n","fixed_versions":[">=1.65_03"]},{"id":"CPANSA-DBD-SQLite-2020-13435","cves":["CVE-2020-13435"],"severity":"medium","distribution":"DBD-SQLite","references":["https://www.sqlite.org/src/info/7a5279a25c57adf1","https://security.netapp.com/advisory/ntap-20200528-0004/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/","https://usn.ubuntu.com/4394-1/","https://www.oracle.com/security-alerts/cpujul2020.html","https://security.gentoo.org/glsa/202007-26","https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc","https://support.apple.com/kb/HT211931","https://support.apple.com/kb/HT211844","https://support.apple.com/kb/HT211850","https://support.apple.com/kb/HT211843","https://support.apple.com/kb/HT211952","http://seclists.org/fulldisclosure/2020/Nov/19","http://seclists.org/fulldisclosure/2020/Nov/22","http://seclists.org/fulldisclosure/2020/Nov/20","https://support.apple.com/kb/HT211935","http://seclists.org/fulldisclosure/2020/Dec/32","https://www.oracle.com/security-alerts/cpuApr2021.html"],"reported":"2020-05-24","affected_versions":["<1.65_03"],"fixed_versions":[">=1.65_03"],"description":"SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.\n"},{"id":"CPANSA-DBD-SQLite-2020-13434","references":["https://www.sqlite.org/src/info/23439ea582241138","https://www.sqlite.org/src/info/d08d3405878d394e","https://lists.debian.org/debian-lts-announce/2020/05/msg00024.html","https://security.netapp.com/advisory/ntap-20200528-0004/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/","https://usn.ubuntu.com/4394-1/","https://www.oracle.com/security-alerts/cpujul2020.html","https://security.gentoo.org/glsa/202007-26","https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc","https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","https://support.apple.com/kb/HT211931","https://support.apple.com/kb/HT211844","https://support.apple.com/kb/HT211850","https://support.apple.com/kb/HT211843","https://support.apple.com/kb/HT211952","http://seclists.org/fulldisclosure/2020/Nov/19","http://seclists.org/fulldisclosure/2020/Nov/22","http://seclists.org/fulldisclosure/2020/Nov/20","https://support.apple.com/kb/HT211935","http://seclists.org/fulldisclosure/2020/Dec/32","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com/security-alerts/cpuapr2022.html"],"reported":"2020-05-24","distribution":"DBD-SQLite","severity":"medium","cves":["CVE-2020-13434"],"affected_versions":["<1.65_03"],"description":"SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.\n","fixed_versions":[">=1.65_03"]},{"id":"CPANSA-DBD-SQLite-2020-11656","severity":"critical","cves":["CVE-2020-11656"],"reported":"2020-04-09","references":["https://www3.sqlite.org/cgi/src/info/b64674919f673602","https://www.sqlite.org/src/info/d09f8c3621d5f7f8","https://security.netapp.com/advisory/ntap-20200416-0001/","https://www.oracle.com/security-alerts/cpujul2020.html","https://security.gentoo.org/glsa/202007-26","https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.tenable.com/security/tns-2021-14","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"distribution":"DBD-SQLite","affected_versions":["<1.65_03"],"fixed_versions":[">=1.65_03"],"description":"In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.\n"},{"fixed_versions":[">=1.65_03"],"description":"SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled.\n","affected_versions":["<1.65_03"],"distribution":"DBD-SQLite","reported":"2020-04-09","references":["https://www3.sqlite.org/cgi/src/info/4a302b42c7bf5e11","https://www3.sqlite.org/cgi/src/tktview?name=af4556bb5c","https://security.netapp.com/advisory/ntap-20200416-0001/","https://lists.debian.org/debian-lts-announce/2020/05/msg00006.html","https://usn.ubuntu.com/4394-1/","https://www.oracle.com/security-alerts/cpujul2020.html","https://security.gentoo.org/glsa/202007-26","https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc","https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.tenable.com/security/tns-2021-14","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"cves":["CVE-2020-11655"],"severity":"high","id":"CPANSA-DBD-SQLite-2020-11655"},{"id":"CPANSA-DBD-SQLite-2020-9327","references":["https://www.sqlite.org/cgi/src/info/4374860b29383380","https://www.sqlite.org/cgi/src/info/abc473fb8fb99900","https://www.sqlite.org/cgi/src/info/9d0d4ab95dc0c56e","https://security.netapp.com/advisory/ntap-20200313-0002/","https://security.gentoo.org/glsa/202003-16","https://usn.ubuntu.com/4298-1/","https://www.oracle.com/security-alerts/cpujul2020.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"reported":"2020-02-21","distribution":"DBD-SQLite","severity":"high","cves":["CVE-2020-9327"],"affected_versions":["<1.65_03"],"description":"In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.\n","fixed_versions":[">=1.65_03"]},{"fixed_versions":[">=1.65_03"],"description":"selectExpander in select.c in SQLite 3.30.1 proceeds with WITH stack unwinding even after a parsing error.\n","affected_versions":["=1.65_02"],"reported":"2020-01-02","references":["https://github.com/sqlite/sqlite/commit/a6c1a71cde082e09750465d5675699062922e387","https://usn.ubuntu.com/4298-1/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://security.gentoo.org/glsa/202007-26","https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","https://lists.debian.org/debian-lts-announce/2020/12/msg00016.html"],"distribution":"DBD-SQLite","severity":"high","cves":["CVE-2019-20218"],"id":"CPANSA-DBD-SQLite-2019-20218"},{"id":"CPANSA-DBD-SQLite-2019-19959","severity":"high","cves":["CVE-2019-19959"],"references":["https://github.com/sqlite/sqlite/commit/1e490c4ca6b43a9cf8637d695907888349f69bec","https://github.com/sqlite/sqlite/commit/d8f2d46cbc9925e034a68aaaf60aad788d9373c1","https://security.netapp.com/advisory/ntap-20200204-0001/","https://usn.ubuntu.com/4298-1/","https://www.oracle.com/security-alerts/cpuapr2020.html"],"reported":"2020-01-03","distribution":"DBD-SQLite","affected_versions":["=1.65_02"],"fixed_versions":[">=1.65_03"],"description":"ext/misc/zipfile.c in SQLite 3.30.1 mishandles certain uses of INSERT INTO in situations involving embedded '\\\\0' characters in filenames, leading to a memory-management error that can be detected by (for example) valgrind.\n"},{"fixed_versions":[">=1.65_03"],"description":"multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.\n","affected_versions":["=1.65_02"],"distribution":"DBD-SQLite","reported":"2019-12-23","references":["https://github.com/sqlite/sqlite/commit/8428b3b437569338a9d1e10c4cd8154acbe33089","https://security.netapp.com/advisory/ntap-20200114-0003/","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html","https://access.redhat.com/errata/RHSA-2020:0514","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html","https://www.debian.org/security/2020/dsa-4638","https://usn.ubuntu.com/4298-1/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://usn.ubuntu.com/4298-2/","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"cves":["CVE-2019-19926","CVE-2019-19880"],"severity":"high","id":"CPANSA-DBD-SQLite-2019-19926"},{"severity":"critical","cves":["CVE-2019-8457"],"reported":"2019-05-30","references":["https://www.sqlite.org/src/info/90acdbfce9c08858","https://www.sqlite.org/releaselog/3_28_0.html","https://usn.ubuntu.com/4004-1/","https://usn.ubuntu.com/4004-2/","https://security.netapp.com/advisory/ntap-20190606-0002/","https://usn.ubuntu.com/4019-1/","https://usn.ubuntu.com/4019-2/","http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/","https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","https://www.oracle.com/security-alerts/cpujan2020.html","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10365"],"distribution":"DBD-SQLite","id":"CPANSA-DBD-SQLite-2019-8457","description":"SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap out-of-bound read in the rtreenode() function when handling invalid rtree tables.\n","fixed_versions":[">=1.63_04"],"affected_versions":[">=1.19_01,<1.63_03"]},{"id":"CPANSA-DBD-SQLite-2019-5018","distribution":"DBD-SQLite","references":["https://talosintelligence.com/vulnerability_reports/TALOS-2019-0777","http://www.securityfocus.com/bid/108294","http://packetstormsecurity.com/files/152809/Sqlite3-Window-Function-Remote-Code-Execution.html","https://security.netapp.com/advisory/ntap-20190521-0001/","https://security.gentoo.org/glsa/201908-09","https://usn.ubuntu.com/4205-1/"],"reported":"2019-05-10","cves":["CVE-2019-5018"],"severity":"high","affected_versions":[">=1.61_03,<1.63_03"],"description":"An exploitable use after free vulnerability exists in the window function functionality of Sqlite3 3.26.0. A specially crafted SQL command can cause a use after free vulnerability, potentially resulting in remote code execution. An attacker can send a malicious SQL command to trigger this vulnerability.\n","fixed_versions":[">=1.63_04"]},{"cves":["CVE-2019-19925"],"severity":"high","distribution":"DBD-SQLite","references":["https://github.com/sqlite/sqlite/commit/54d501092d88c0cf89bec4279951f548fb0b8618","https://security.netapp.com/advisory/ntap-20200114-0003/","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html","https://access.redhat.com/errata/RHSA-2020:0514","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html","https://www.debian.org/security/2020/dsa-4638","https://usn.ubuntu.com/4298-1/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"reported":"2019-12-24","id":"CPANSA-DBD-SQLite-2019-19925","description":"zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.\n","fixed_versions":[">=1.65_03"],"affected_versions":["=1.65_02"]},{"affected_versions":["=1.65_02"],"description":"SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.\n","fixed_versions":[">=1.65_03"],"id":"CPANSA-DBD-SQLite-2019-19924","reported":"2019-12-24","references":["https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3","https://security.netapp.com/advisory/ntap-20200114-0003/","https://usn.ubuntu.com/4298-1/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"distribution":"DBD-SQLite","severity":"medium","cves":["CVE-2019-19924"]},{"id":"CPANSA-DBD-SQLite-2019-19923","reported":"2019-12-24","references":["https://github.com/sqlite/sqlite/commit/396afe6f6aa90a31303c183e11b2b2d4b7956b35","https://security.netapp.com/advisory/ntap-20200114-0003/","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html","https://access.redhat.com/errata/RHSA-2020:0514","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html","https://www.debian.org/security/2020/dsa-4638","https://usn.ubuntu.com/4298-1/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"distribution":"DBD-SQLite","severity":"high","cves":["CVE-2019-19923"],"affected_versions":["=1.65_02"],"fixed_versions":[">=1.65_03"],"description":"flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).\n"},{"description":"exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.\n","fixed_versions":[">=1.65_03"],"affected_versions":["=1.65_02"],"references":["https://github.com/sqlite/sqlite/commit/75e95e1fcd52d3ec8282edb75ac8cd0814095d54","https://security.netapp.com/advisory/ntap-20200114-0001/","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html","https://access.redhat.com/errata/RHSA-2020:0514","http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html","https://www.debian.org/security/2020/dsa-4638","https://usn.ubuntu.com/4298-1/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"reported":"2019-12-18","distribution":"DBD-SQLite","severity":"high","cves":["CVE-2019-19880"],"id":"CPANSA-DBD-SQLite-2019-19880"},{"fixed_versions":[">=1.65_03"],"description":"pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.\n","affected_versions":["<=1.65_02"],"cves":["CVE-2019-19646"],"severity":"critical","distribution":"DBD-SQLite","reported":"2019-12-09","references":["https://github.com/sqlite/sqlite/commit/ebd70eedd5d6e6a890a670b5ee874a5eae86b4dd","https://github.com/sqlite/sqlite/commit/926f796e8feec15f3836aa0a060ed906f8ae04d3","https://www.sqlite.org/","https://security.netapp.com/advisory/ntap-20191223-0001/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.tenable.com/security/tns-2021-14","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"id":"CPANSA-DBD-SQLite-2019-19646"},{"affected_versions":["<=1.65_02"],"fixed_versions":[">=1.65_03"],"description":"alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.\n","id":"CPANSA-DBD-SQLite-2019-19645","distribution":"DBD-SQLite","reported":"2019-12-09","references":["https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06","https://security.netapp.com/advisory/ntap-20191223-0001/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://usn.ubuntu.com/4394-1/","https://www.tenable.com/security/tns-2021-14","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"cves":["CVE-2019-19645"],"severity":"medium"},{"description":"SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.\n","fixed_versions":[">=1.65_03"],"affected_versions":["=1.65_02"],"references":["https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13","https://www.sqlite.org/","https://security.netapp.com/advisory/ntap-20191223-0001/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://usn.ubuntu.com/4394-1/","https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"reported":"2019-12-09","distribution":"DBD-SQLite","severity":"high","cves":["CVE-2019-19603"],"id":"CPANSA-DBD-SQLite-2019-19603"},{"cves":["CVE-2019-19317"],"severity":"critical","distribution":"DBD-SQLite","reported":"2019-12-05","references":["https://github.com/sqlite/sqlite/commit/522ebfa7cee96fb325a22ea3a2464a63485886a8","https://github.com/sqlite/sqlite/commit/73bacb7f93eab9f4bd5a65cbc4ae242acf63c9e3","https://security.netapp.com/advisory/ntap-20191223-0001/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"id":"CPANSA-DBD-SQLite-2019-19317","fixed_versions":[">=1.65_03"],"description":"lookupName in resolve.c in SQLite 3.30.1 omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service or possibly have unspecified other impact.\n","affected_versions":["=1.65_02"]},{"severity":"high","cves":["CVE-2019-19244"],"reported":"2019-11-25","references":["https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348","https://usn.ubuntu.com/4205-1/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"distribution":"DBD-SQLite","id":"CPANSA-DBD-SQLite-2019-19244","description":"sqlite3Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.\n","fixed_versions":[">=1.65_03"],"affected_versions":["=1.65_02"]},{"description":"SQLite 3.30.1 mishandles pExpr->y.pTab, as demonstrated by the TK_COLUMN case in sqlite3ExprCodeTarget in expr.c.\n","fixed_versions":[">=1.65_03"],"affected_versions":["=1.65_02"],"cves":["CVE-2019-19242"],"severity":"medium","distribution":"DBD-SQLite","reported":"2019-11-27","references":["https://github.com/sqlite/sqlite/commit/57f7ece78410a8aae86aa4625fb7556897db384c","https://usn.ubuntu.com/4205-1/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf"],"id":"CPANSA-DBD-SQLite-2019-19242"},{"affected_versions":["<1.61_01"],"fixed_versions":[">=1.61_01"],"description":"SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries in a \"merge\" operation that occurs after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). This is a different vulnerability than CVE-2018-20346.\n","id":"CPANSA-DBD-SQLite-2018-20506","cves":["CVE-2018-20506"],"severity":"high","distribution":"DBD-SQLite","references":["https://support.apple.com/kb/HT209451","https://support.apple.com/kb/HT209450","https://support.apple.com/kb/HT209448","https://support.apple.com/kb/HT209447","https://support.apple.com/kb/HT209446","https://support.apple.com/kb/HT209443","https://sqlite.org/src/info/940f2adc8541a838","https://seclists.org/bugtraq/2019/Jan/39","https://seclists.org/bugtraq/2019/Jan/33","https://seclists.org/bugtraq/2019/Jan/32","https://seclists.org/bugtraq/2019/Jan/31","https://seclists.org/bugtraq/2019/Jan/29","https://seclists.org/bugtraq/2019/Jan/28","http://www.securityfocus.com/bid/106698","http://seclists.org/fulldisclosure/2019/Jan/69","http://seclists.org/fulldisclosure/2019/Jan/68","http://seclists.org/fulldisclosure/2019/Jan/67","http://seclists.org/fulldisclosure/2019/Jan/66","http://seclists.org/fulldisclosure/2019/Jan/64","http://seclists.org/fulldisclosure/2019/Jan/62","http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html","https://security.netapp.com/advisory/ntap-20190502-0004/","https://usn.ubuntu.com/4019-1/","https://usn.ubuntu.com/4019-2/","https://www.oracle.com/security-alerts/cpuapr2020.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10365"],"reported":"2019-04-03"},{"description":"SQLite 3.25.2, when queries are run on a table with a malformed PRIMARY KEY, allows remote attackers to cause a denial of service (application crash) by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases).\n","fixed_versions":[">=1.59_03"],"affected_versions":["=1.59_02"],"distribution":"DBD-SQLite","references":["https://support.apple.com/kb/HT209451","https://support.apple.com/kb/HT209450","https://support.apple.com/kb/HT209448","https://support.apple.com/kb/HT209447","https://support.apple.com/kb/HT209446","https://support.apple.com/kb/HT209443","https://sqlite.org/src/info/1a84668dcfdebaf12415d","https://seclists.org/bugtraq/2019/Jan/39","https://seclists.org/bugtraq/2019/Jan/33","https://seclists.org/bugtraq/2019/Jan/32","https://seclists.org/bugtraq/2019/Jan/31","https://seclists.org/bugtraq/2019/Jan/29","https://seclists.org/bugtraq/2019/Jan/28","http://www.securityfocus.com/bid/106698","http://seclists.org/fulldisclosure/2019/Jan/69","http://seclists.org/fulldisclosure/2019/Jan/68","http://seclists.org/fulldisclosure/2019/Jan/67","http://seclists.org/fulldisclosure/2019/Jan/66","http://seclists.org/fulldisclosure/2019/Jan/64","http://seclists.org/fulldisclosure/2019/Jan/62","https://security.netapp.com/advisory/ntap-20190502-0004/","https://usn.ubuntu.com/4019-1/"],"reported":"2019-04-03","cves":["CVE-2018-20505"],"severity":"high","id":"CPANSA-DBD-SQLite-2018-20505"},{"id":"CPANSA-DBD-SQLite-2018-20346","severity":"high","cves":["CVE-2018-20346"],"reported":"2018-12-21","references":["https://www.sqlite.org/releaselog/3_25_3.html","https://www.mail-archive.com/sqlite-users@mailinglists.sqlite.org/msg113218.html","https://crbug.com/900910","https://chromium.googlesource.com/chromium/src/+/c368e30ae55600a1c3c9cb1710a54f9c55de786e","https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html","https://bugzilla.redhat.com/show_bug.cgi?id=1659677","https://bugzilla.redhat.com/show_bug.cgi?id=1659379","https://blade.tencent.com/magellan/index_en.html","https://access.redhat.com/articles/3758321","https://worthdoingbadly.com/sqlitebug/","https://sqlite.org/src/info/d44318f59044162e","https://sqlite.org/src/info/940f2adc8541a838","https://news.ycombinator.com/item?id=18685296","https://github.com/zhuowei/worthdoingbadly.com/blob/master/_posts/2018-12-14-sqlitebug.html","https://lists.debian.org/debian-lts-announce/2018/12/msg00012.html","https://www.synology.com/security/advisory/Synology_SA_18_61","http://www.securityfocus.com/bid/106323","https://www.freebsd.org/security/advisories/FreeBSD-EN-19:03.sqlite.asc","http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00040.html","http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00070.html","https://security.gentoo.org/glsa/201904-21","https://usn.ubuntu.com/4019-1/","https://usn.ubuntu.com/4019-2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/","https://support.apple.com/HT209448","https://support.apple.com/HT209447","https://support.apple.com/HT209446","https://support.apple.com/HT209451","https://support.apple.com/HT209443","https://support.apple.com/HT209450","https://www.oracle.com/security-alerts/cpuapr2020.html","https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","https://kc.mcafee.com/corporate/index?page=content&id=SB10365"],"distribution":"DBD-SQLite","affected_versions":["<1.61_01"],"fixed_versions":[">=1.61_01"],"description":"SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan.\n"},{"fixed_versions":[">=1.59_01"],"description":"In SQLite through 3.22.0, databases whose schema is corrupted using a CREATE TABLE AS statement could cause a NULL pointer dereference, related to build.c and prepare.c.\n","affected_versions":["<1.59_01"],"references":["https://www.sqlite.org/cgi/src/timeline?r=corrupt-schema","https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1756349","https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6964","https://www.sqlite.org/cgi/src/vdiff?from=1774f1c3baf0bc3d&to=d75e67654aa9620b","http://www.securityfocus.com/bid/103466","https://lists.debian.org/debian-lts-announce/2019/01/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/","https://usn.ubuntu.com/4205-1/","https://usn.ubuntu.com/4394-1/","https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html","https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E","https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E"],"reported":"2018-03-17","distribution":"DBD-SQLite","severity":"high","cves":["CVE-2018-8740"],"id":"CPANSA-DBD-SQLite-2018-8740"},{"id":"CPANSA-DBD-SQLite-2017-10989","severity":"critical","cves":["CVE-2017-10989"],"references":["https://sqlite.org/src/info/66de6f4a","https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1700937","https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2405","https://sqlite.org/src/vpatch?from=0db20efe201736b3&to=66de6f4a9504ec26","http://marc.info/?l=sqlite-users&m=149933696214713&w=2","http://www.securityfocus.com/bid/99502","http://www.securitytracker.com/id/1039427","https://support.apple.com/HT208144","https://support.apple.com/HT208115","https://support.apple.com/HT208113","https://support.apple.com/HT208112","http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html","https://lists.debian.org/debian-lts-announce/2019/01/msg00009.html","http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html","https://usn.ubuntu.com/4019-1/","https://usn.ubuntu.com/4019-2/"],"reported":"2017-07-07","distribution":"DBD-SQLite","affected_versions":["=1.55_06","<=1.55_03"],"fixed_versions":[">=1.55_07"],"description":"The getNodeSize function in ext/rtree/rtree.c in SQLite through 3.19.3, as used in GDAL and other products, mishandles undersized RTree blobs in a crafted database, leading to a heap-based buffer over-read or possibly unspecified other impact.\n"},{"reported":"2016-09-26","references":["http://www.openwall.com/lists/oss-security/2016/07/01/1","http://www.securityfocus.com/bid/91546","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IGQTH7V45QVHFDXJAEECHEO3HHD644WZ/","https://www.korelogic.com/Resources/Advisories/KL-001-2016-003.txt","https://www.sqlite.org/releaselog/3_13_0.html","http://www.sqlite.org/cgi/src/info/67985761aa93fb61","http://www.openwall.com/lists/oss-security/2016/07/01/2","http://lists.opensuse.org/opensuse-updates/2016-08/msg00053.html","https://www.tenable.com/security/tns-2016-20","https://usn.ubuntu.com/4019-1/","https://usn.ubuntu.com/4019-2/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/","https://github.com/briandfoy/cpan-security-advisory/issues/187","https://rt.cpan.org/Public/Bug/Display.html?id=118395"],"distribution":"DBD-SQLite","severity":"medium","cves":["CVE-2016-6153"],"id":"CPANSA-DBD-SQLite-2016-6153","fixed_versions":[">=1.55_01"],"description":"os_unix.c in SQLite before 3.13.0 improperly implements the temporary directory search algorithm, which might allow local users to obtain sensitive information, cause a denial of service (application crash), or have unspecified other impact by leveraging use of the current working directory for temporary files.\n","affected_versions":["<=1.55_01"]},{"affected_versions":["<=1.47_01"],"fixed_versions":[">=1.47_02"],"description":"The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.\n","id":"CPANSA-DBD-SQLite-2015-3416","severity":null,"cves":["CVE-2015-3416"],"references":["http://www.sqlite.org/src/info/c494171f77dc2e5e04cb6d865e688448f04e5920","http://seclists.org/fulldisclosure/2015/Apr/31","http://www.debian.org/security/2015/dsa-3252","http://www.mandriva.com/security/advisories?name=MDVSA-2015:217","http://www.ubuntu.com/usn/USN-2698-1","https://support.apple.com/HT205267","http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html","http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html","https://support.apple.com/HT205213","http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","http://www.securitytracker.com/id/1033703","https://security.gentoo.org/glsa/201507-05","http://rhn.redhat.com/errata/RHSA-2015-1635.html","http://rhn.redhat.com/errata/RHSA-2015-1634.html","http://www.securityfocus.com/bid/74228","http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"],"reported":"2015-04-24","distribution":"DBD-SQLite"},{"description":"The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement.\n","fixed_versions":[">=1.47_02"],"affected_versions":["<=1.47_01"],"severity":null,"cves":["CVE-2015-3415"],"references":["https://www.sqlite.org/src/info/02e3c88fbf6abdcf3975fb0fb71972b0ab30da30","http://seclists.org/fulldisclosure/2015/Apr/31","http://www.debian.org/security/2015/dsa-3252","http://www.mandriva.com/security/advisories?name=MDVSA-2015:217","http://www.ubuntu.com/usn/USN-2698-1","https://support.apple.com/HT205267","http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html","http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html","https://support.apple.com/HT205213","http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","http://www.securitytracker.com/id/1033703","https://security.gentoo.org/glsa/201507-05","http://rhn.redhat.com/errata/RHSA-2015-1635.html","http://www.securityfocus.com/bid/74228","http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"],"reported":"2015-04-24","distribution":"DBD-SQLite","id":"CPANSA-DBD-SQLite-2015-3415"},{"id":"CPANSA-DBD-SQLite-2015-3414","cves":["CVE-2015-3414"],"severity":null,"distribution":"DBD-SQLite","references":["https://www.sqlite.org/src/info/eddc05e7bb31fae74daa86e0504a3478b99fa0f2","http://seclists.org/fulldisclosure/2015/Apr/31","http://www.debian.org/security/2015/dsa-3252","http://www.mandriva.com/security/advisories?name=MDVSA-2015:217","http://www.ubuntu.com/usn/USN-2698-1","https://support.apple.com/HT205267","http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html","http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html","https://support.apple.com/HT205213","http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","http://www.securitytracker.com/id/1033703","https://security.gentoo.org/glsa/201507-05","http://rhn.redhat.com/errata/RHSA-2015-1635.html","http://www.securityfocus.com/bid/74228","http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"],"reported":"2015-04-24","affected_versions":["<=1.47_01"],"fixed_versions":[">=1.47_02"],"description":"SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE\"\"\"\"\"\"\"\" at the end of a SELECT statement.\n"},{"id":"CPANSA-DBD-SQLite-2013-7443","severity":null,"cves":["CVE-2013-7443"],"reported":"2015-08-12","references":["https://www.sqlite.org/src/info/520070ec7fbaac73eda0e0123596b7bb3e9a6897","https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1448758","https://www.sqlite.org/src/info/ac5852d6403c9c9628ca0aa7be135c702f000698","http://ubuntu.com/usn/usn-2698-1","http://www.openwall.com/lists/oss-security/2015/07/14/5","http://www.openwall.com/lists/oss-security/2015/07/15/4","http://www.securityfocus.com/bid/76089"],"distribution":"DBD-SQLite","affected_versions":["=1.47_01"],"description":"Buffer overflow in the skip-scan optimization in SQLite 3.8.2 allows remote attackers to cause a denial of service (crash) via crafted SQL statements.\n","fixed_versions":[">=1.47_02"]}],"main_module":"DBD::SQLite"},"Cmd-Dwarf":{"advisories":[{"distribution":"Cmd-Dwarf","references":["https://github.com/seagirl/dwarf/commit/14cf7a1d55db635a07f4838e16f3d9a28e63f529","https://metacpan.org/changes/distribution/Cmd-Dwarf"],"reported":"2014-12-03","cves":[],"id":"CPANSA-Cmd-Dwarf-2014-01","description":"JSON highjacking possibility.\n","fixed_versions":[">=1.20"],"affected_versions":["<1.20"]}],"versions":[{"date":"2015-07-30T06:48:35","version":"1.27"},{"version":"1.28","date":"2015-08-26T13:27:51"},{"date":"2015-08-28T08:58:33","version":"1.29"},{"version":"1.30","date":"2015-09-17T08:17:32"},{"version":"1.31","date":"2016-01-20T06:39:15"},{"version":"1.41","date":"2016-10-25T05:56:33"},{"version":"1.42","date":"2017-03-29T04:42:05"},{"date":"2017-06-21T07:06:05","version":"1.50"},{"version":"1.60","date":"2017-10-05T08:08:01"},{"version":"1.70","date":"2018-03-17T07:35:19"},{"date":"2018-08-18T11:43:10","version":"1.80"},{"date":"2019-04-05T05:22:33","version":"1.81"},{"date":"2019-04-05T05:36:46","version":"1.82"},{"version":"1.83","date":"2019-04-05T09:06:55"}],"main_module":"Cmd::Dwarf"},"App-cpanminus":{"versions":[{"date":"2010-02-20T02:27:00","version":"0.01"},{"date":"2010-02-20T03:14:10","version":"0.02"},{"date":"2010-02-20T03:39:56","version":"0.03"},{"version":"0.04","date":"2010-02-20T05:04:01"},{"version":"0.05","date":"2010-02-20T05:16:03"},{"date":"2010-02-20T05:48:44","version":"0.06"},{"date":"2010-02-20T20:20:08","version":"0.07"},{"version":"0.08","date":"2010-02-20T23:41:01"},{"date":"2010-02-21T07:48:49","version":"0.09"},{"version":"0.99_01","date":"2010-02-23T20:52:46"},{"version":"0.99_02","date":"2010-02-24T06:20:33"},{"version":"0.99_03","date":"2010-02-24T07:05:47"},{"version":"0.99_04","date":"2010-02-25T17:20:05"},{"version":"0.99_05","date":"2010-02-25T22:42:22"},{"version":"0.99_06","date":"2010-02-25T22:51:43"},{"version":"0.99_07","date":"2010-02-28T05:14:30"},{"version":"0.9910","date":"2010-03-01T05:59:15"},{"version":"0.9911","date":"2010-03-02T00:29:51"},{"version":"0.9912","date":"2010-03-03T02:55:22"},{"version":"0.9913","date":"2010-03-03T03:21:59"},{"date":"2010-03-04T08:42:03","version":"0.9914"},{"date":"2010-03-04T09:58:11","version":"0.9915"},{"date":"2010-03-04T19:35:22","version":"0.9916"},{"version":"0.9917","date":"2010-03-09T13:58:32"},{"date":"2010-03-10T02:26:03","version":"0.9918"},{"version":"0.9919","date":"2010-03-10T02:41:31"},{"date":"2010-03-10T09:49:22","version":"0.99_20"},{"date":"2010-03-10T15:03:38","version":"0.9921"},{"version":"0.9922","date":"2010-03-11T02:01:28"},{"version":"0.9923","date":"2010-03-16T00:07:01"},{"version":"0.99_24","date":"2010-03-22T05:05:33"},{"version":"0.99_25","date":"2010-03-23T02:54:44"},{"version":"0.99_26","date":"2010-03-23T03:24:34"},{"version":"0.9927","date":"2010-03-23T18:24:55"},{"date":"2010-03-26T05:09:12","version":"0.9928"},{"date":"2010-03-27T04:42:41","version":"0.9929"},{"date":"2010-03-30T21:29:41","version":"0.9930"},{"version":"0.9931","date":"2010-04-05T01:18:12"},{"version":"0.9932","date":"2010-04-05T23:28:11"},{"date":"2010-04-11T07:51:27","version":"0.99_33"},{"date":"2010-04-11T11:55:44","version":"0.9934"},{"date":"2010-04-12T11:09:47","version":"0.999_01"},{"date":"2010-04-13T07:11:08","version":"0.999_02"},{"date":"2010-04-14T09:29:25","version":"0.999_03"},{"date":"2010-04-14T09:30:52","version":"0.9935"},{"date":"2010-04-19T06:23:01","version":"0.999_04"},{"version":"0.999_05","date":"2010-04-21T11:40:46"},{"version":"0.9936","date":"2010-04-21T11:53:47"},{"version":"1.0000","date":"2010-04-24T08:23:24"},{"version":"1.0001","date":"2010-04-24T08:26:40"},{"version":"1.0002","date":"2010-05-02T03:51:09"},{"date":"2010-05-04T23:16:18","version":"1.0003"},{"date":"2010-05-14T23:10:54","version":"1.0004"},{"version":"1.0005","date":"2010-07-02T23:39:32"},{"date":"2010-07-02T23:54:14","version":"1.0006"},{"date":"2010-07-30T19:55:47","version":"1.0010"},{"version":"1.0011","date":"2010-08-18T23:42:36"},{"date":"2010-08-20T19:58:19","version":"1.0012"},{"date":"2010-09-12T19:54:17","version":"1.0013"},{"version":"1.0014","date":"2010-09-21T19:43:20"},{"version":"1.0015","date":"2010-09-24T23:52:00"},{"version":"1.1000","date":"2010-11-12T07:57:33"},{"version":"1.1001","date":"2010-11-12T20:37:49"},{"date":"2010-11-17T02:28:44","version":"1.1002"},{"version":"1.1003","date":"2010-11-25T09:18:34"},{"version":"1.1004","date":"2010-11-30T18:07:12"},{"date":"2010-12-14T23:08:40","version":"1.1005"},{"date":"2010-12-16T19:32:01","version":"1.1006"},{"date":"2011-01-18T17:40:16","version":"1.1007"},{"date":"2011-01-18T20:54:34","version":"1.19_01"},{"version":"1.19_02","date":"2011-01-18T22:11:52"},{"version":"1.1008","date":"2011-01-26T22:08:11"},{"date":"2011-02-16T18:11:52","version":"1.2000"},{"date":"2011-02-16T18:55:46","version":"1.2001"},{"date":"2011-03-01T02:59:25","version":"1.29_01"},{"version":"1.29_02","date":"2011-03-02T00:09:00"},{"date":"2011-03-02T22:41:40","version":"1.3000"},{"date":"2011-03-04T02:35:03","version":"1.3001"},{"date":"2011-03-04T03:54:53","version":"1.30_02"},{"date":"2011-03-04T08:32:56","version":"1.30_03"},{"version":"1.30_04","date":"2011-03-04T08:53:22"},{"date":"2011-03-04T09:41:34","version":"1.30_05"},{"version":"1.30_06","date":"2011-03-04T22:57:43"},{"date":"2011-03-04T23:20:45","version":"1.30_07"},{"date":"2011-03-05T00:07:44","version":"1.30_08"},{"version":"1.30_09","date":"2011-03-05T02:16:54"},{"version":"1.30_10","date":"2011-03-05T22:57:38"},{"date":"2011-03-06T09:37:36","version":"1.30_11"},{"date":"2011-03-07T03:00:09","version":"1.30_12"},{"version":"1.30_13","date":"2011-03-07T18:54:03"},{"date":"2011-03-08T09:11:33","version":"1.4000"},{"date":"2011-03-08T18:11:57","version":"1.4001"},{"date":"2011-03-09T01:57:18","version":"1.4002"},{"date":"2011-03-10T02:15:19","version":"1.4003"},{"version":"1.4004","date":"2011-03-10T18:09:34"},{"version":"1.4005","date":"2011-05-11T19:49:38"},{"date":"2011-05-16T17:17:29","version":"1.4006"},{"version":"1.4007","date":"2011-05-17T17:54:45"},{"date":"2011-06-16T01:00:00","version":"1.4008"},{"version":"1.49_01","date":"2011-06-26T17:59:17"},{"version":"1.49_02","date":"2011-10-12T09:57:03"},{"version":"1.5000","date":"2011-10-13T06:40:49"},{"date":"2011-10-13T15:21:16","version":"1.5001"},{"version":"1.5002","date":"2011-10-18T00:13:36"},{"date":"2011-10-19T07:31:10","version":"1.5003"},{"date":"2011-11-08T22:29:31","version":"1.5004"},{"date":"2011-11-22T21:31:21","version":"1.5005"},{"date":"2011-11-29T19:49:42","version":"1.5006"},{"version":"1.5007","date":"2011-12-20T18:18:50"},{"date":"2012-03-18T01:23:40","version":"1.5008"},{"date":"2012-03-30T16:45:43","version":"1.5009"},{"date":"2012-03-31T11:01:47","version":"1.5010"},{"date":"2012-04-12T09:59:39","version":"1.5011"},{"version":"1.5012","date":"2012-05-11T03:50:22"},{"date":"2012-05-12T03:18:19","version":"1.5013"},{"date":"2012-06-13T01:34:12","version":"1.5014"},{"version":"1.5015","date":"2012-06-24T22:37:49"},{"date":"2012-07-17T19:02:48","version":"1.5016"},{"version":"1.5017","date":"2012-07-18T15:41:26"},{"date":"2012-09-19T05:42:19","version":"1.5018"},{"date":"2012-12-22T17:22:02","version":"1.5019"},{"version":"1.5020","date":"2013-01-29T18:32:26"},{"date":"2013-01-31T08:45:31","version":"1.5021"},{"date":"2013-01-31T18:07:46","version":"1.59_01"},{"date":"2013-02-01T03:12:10","version":"1.59_02"},{"version":"1.59_03","date":"2013-02-01T18:54:58"},{"version":"1.59_04","date":"2013-02-03T17:07:16"},{"date":"2013-02-04T19:52:48","version":"1.59_05"},{"date":"2013-02-05T20:40:30","version":"1.59_06"},{"version":"1.59_07","date":"2013-02-06T19:17:51"},{"date":"2013-02-06T19:32:27","version":"1.59_08"},{"date":"2013-02-07T09:59:04","version":"1.59_09"},{"date":"2013-02-08T00:29:16","version":"1.59_10"},{"version":"1.59_11","date":"2013-02-11T22:12:12"},{"version":"1.59_12","date":"2013-02-14T02:15:12"},{"date":"2013-02-25T20:16:34","version":"1.59_13"},{"date":"2013-02-26T17:57:00","version":"1.6000"},{"date":"2013-02-27T01:04:54","version":"1.6001"},{"version":"1.6002","date":"2013-02-27T20:13:45"},{"version":"1.6003","date":"2013-03-08T19:03:47"},{"version":"1.6004","date":"2013-03-08T19:32:25"},{"date":"2013-03-08T19:48:06","version":"1.6005"},{"version":"1.6006","date":"2013-03-14T06:00:27"},{"version":"1.6007","date":"2013-03-17T21:34:17"},{"version":"1.6008","date":"2013-03-19T17:03:36"},{"date":"2013-03-25T04:10:51","version":"1.6100"},{"date":"2013-03-25T20:41:37","version":"1.6101"},{"version":"1.6102","date":"2013-03-28T00:16:09"},{"version":"1.6103","date":"2013-03-30T21:36:49"},{"version":"1.6104","date":"2013-04-03T01:04:42"},{"date":"2013-04-05T05:17:38","version":"1.6105"},{"date":"2013-04-06T21:19:18","version":"1.6106"},{"date":"2013-04-07T04:19:16","version":"1.6107"},{"date":"2013-04-13T06:32:52","version":"1.6108"},{"date":"2013-04-13T11:48:43","version":"1.6190"},{"date":"2013-04-14T03:09:40","version":"1.6191"},{"date":"2013-04-14T08:17:32","version":"1.6192"},{"version":"1.6193","date":"2013-04-15T07:37:08"},{"version":"1.6900","date":"2013-04-15T07:42:51"},{"date":"2013-04-21T00:50:44","version":"1.6901"},{"version":"1.6109","date":"2013-04-21T01:06:02"},{"version":"1.6902","date":"2013-04-21T01:18:10"},{"version":"1.6903","date":"2013-04-22T01:07:09"},{"date":"2013-04-24T02:24:37","version":"1.6904"},{"date":"2013-04-24T03:05:21","version":"1.6905"},{"version":"1.6906","date":"2013-04-25T06:20:23"},{"version":"1.6907","date":"2013-04-26T18:40:08"},{"version":"1.6908","date":"2013-04-27T01:12:17"},{"date":"2013-04-29T08:49:53","version":"1.6909"},{"version":"1.6910","date":"2013-05-03T07:29:32"},{"version":"1.6911","date":"2013-05-04T20:28:02"},{"date":"2013-05-06T20:59:52","version":"1.6912"},{"date":"2013-05-10T00:05:10","version":"1.6913"},{"version":"1.6914","date":"2013-05-12T23:03:52"},{"date":"2013-05-16T02:01:33","version":"1.6915"},{"version":"1.6916","date":"2013-06-04T10:55:37"},{"date":"2013-06-05T01:07:33","version":"1.6917"},{"date":"2013-06-10T20:03:21","version":"1.6918"},{"version":"1.6919","date":"2013-06-12T15:33:22"},{"date":"2013-06-14T21:09:54","version":"1.6920"},{"date":"2013-06-18T10:19:43","version":"1.6921"},{"version":"1.6922","date":"2013-06-19T20:57:09"},{"date":"2013-07-04T05:17:11","version":"1.6923"},{"version":"1.6924","date":"2013-07-16T18:38:21"},{"version":"1.6925","date":"2013-07-20T05:08:06"},{"date":"2013-07-20T16:03:14","version":"1.6926"},{"date":"2013-07-23T07:45:33","version":"1.6927"},{"version":"1.6928","date":"2013-07-23T21:07:02"},{"version":"1.6929","date":"2013-07-24T18:46:29"},{"date":"2013-07-24T20:48:14","version":"1.6930"},{"date":"2013-07-24T21:51:33","version":"1.6931"},{"version":"1.6932","date":"2013-07-24T22:29:04"},{"version":"1.6933","date":"2013-07-25T16:58:24"},{"date":"2013-07-26T23:17:21","version":"1.6934"},{"date":"2013-07-31T18:36:57","version":"1.6935"},{"version":"1.6936","date":"2013-08-05T04:37:54"},{"version":"1.6937","date":"2013-08-06T01:55:29"},{"version":"1.6938","date":"2013-08-06T06:12:45"},{"version":"1.6939","date":"2013-08-06T09:55:55"},{"date":"2013-08-08T19:36:34","version":"1.6940"},{"date":"2013-08-20T18:32:44","version":"1.6941"},{"date":"2013-08-27T18:11:47","version":"1.6942"},{"version":"1.6943","date":"2013-09-03T23:40:37"},{"date":"2013-09-04T22:02:21","version":"1.7000"},{"version":"1.7001","date":"2013-09-08T20:12:16"},{"date":"2013-09-19T05:31:34","version":"1.7100"},{"version":"1.7101","date":"2013-09-19T11:15:59"},{"date":"2013-09-20T04:33:50","version":"1.7102"},{"version":"1.7002","date":"2014-04-27T05:46:31"},{"version":"1.7003","date":"2014-04-27T15:11:46"},{"version":"1.7004","date":"2014-04-27T16:23:35"},{"version":"1.7005","date":"2014-09-02T04:00:49"},{"date":"2014-09-02T06:27:35","version":"1.7006"},{"version":"1.7005","date":"2014-09-05T12:04:41"},{"date":"2014-09-05T22:45:37","version":"1.7006"},{"version":"1.7007","date":"2014-09-09T16:26:54"},{"date":"2014-09-10T08:19:24","version":"1.7008"},{"version":"1.7009","date":"2014-09-10T08:44:00"},{"version":"1.7010","date":"2014-09-17T09:28:23"},{"date":"2014-09-22T06:08:51","version":"1.7011"},{"version":"1.7012","date":"2014-09-27T02:29:33"},{"version":"1.7013","date":"2014-10-07T06:52:45"},{"date":"2014-10-08T03:54:02","version":"1.7014"},{"date":"2014-11-14T21:14:40","version":"1.7015"},{"version":"1.7016","date":"2014-11-16T19:47:26"},{"date":"2014-11-25T22:01:56","version":"1.7017"},{"date":"2014-11-25T22:08:49","version":"1.7018"},{"date":"2014-12-04T20:52:24","version":"1.7019"},{"version":"1.7020","date":"2014-12-09T01:54:37"},{"version":"1.7021","date":"2014-12-12T05:43:01"},{"version":"1.7022","date":"2014-12-13T00:42:15"},{"version":"1.7023","date":"2015-01-04T23:00:30"},{"date":"2015-01-12T21:32:45","version":"1.7024"},{"date":"2015-02-07T06:59:17","version":"1.7025"},{"version":"1.7026","date":"2015-02-14T01:12:18"},{"date":"2015-02-14T20:15:20","version":"1.7027"},{"version":"1.7028","date":"2015-04-17T17:24:16"},{"version":"1.7029","date":"2015-04-18T22:16:17"},{"version":"1.7030","date":"2015-04-19T12:15:59"},{"date":"2015-04-22T21:14:17","version":"1.7031"},{"version":"1.7032","date":"2015-04-30T01:52:49"},{"date":"2015-05-02T00:18:54","version":"1.7033"},{"date":"2015-05-07T21:21:07","version":"1.7034"},{"date":"2015-06-05T17:51:53","version":"1.7035"},{"date":"2015-06-06T05:08:20","version":"1.7036"},{"date":"2015-06-18T21:38:47","version":"1.7037"},{"version":"1.7038","date":"2015-06-23T01:05:25"},{"date":"2015-06-29T01:06:18","version":"1.7039"},{"date":"2016-01-07T19:29:19","version":"1.7040"},{"version":"1.7041","date":"2016-05-08T18:29:30"},{"date":"2016-05-24T07:49:34","version":"1.7042"},{"date":"2017-04-03T03:57:15","version":"1.7043"},{"version":"1.7044","date":"2018-04-19T11:54:56"},{"date":"2018-04-20T12:17:48","version":"1.7900"},{"version":"1.7901","date":"2018-04-20T12:20:35"},{"date":"2018-04-20T12:43:24","version":"1.7902"},{"date":"2018-04-20T14:54:30","version":"1.7903"},{"date":"2018-04-20T21:22:56","version":"1.7904"},{"date":"2018-04-21T09:40:47","version":"1.7905"},{"date":"2018-04-21T10:57:20","version":"1.9015"},{"date":"2018-04-21T11:17:58","version":"1.9016"},{"date":"2018-04-21T17:31:13","version":"1.9017"},{"version":"1.9018","date":"2018-04-22T13:54:32"},{"date":"2018-04-25T09:27:31","version":"1.7906"},{"version":"1.7907","date":"2018-04-26T11:36:59"},{"version":"1.7045","date":"2022-01-27T03:05:02"},{"version":"1.7046","date":"2022-04-27T06:01:26"},{"date":"2023-07-30T06:01:02","version":"1.7047"},{"version":"1.7048","date":"2024-10-29T18:49:03"}],"advisories":[{"id":"CPANSA-App-cpanminus-2020-01","reported":"2020-07-30","references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DENFY4CRTIZL5WYYUYUM4VKCJNXO4QIW/","https://metacpan.org/pod/App::cpanminus","https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/","https://access.redhat.com/security/cve/cve-2020-16154","https://security-tracker.debian.org/tracker/CVE-2020-16154","https://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html","https://github.com/miyagawa/cpanminus/pull/638"],"distribution":"App-cpanminus","cves":["CVE-2020-16154"],"affected_versions":["<=1.7044"],"description":"The App::cpanminus package 1.7044 for Perl allows Signature Verification Bypass.\n","fixed_versions":[">=1.7045"]},{"fixed_versions":[],"description":"The App::cpanminus package through 1.7047 for Perl downloads code via insecure HTTP, enabling code execution for network attackers.\n","affected_versions":["<=1.7047"],"reported":"2024-08-27","references":["https://github.com/miyagawa/cpanminus/issues/611","https://github.com/miyagawa/cpanminus/pull/674","https://security.metacpan.org/2024/08/26/cpanminus-downloads-code-using-insecure-http.html"],"distribution":"App-cpanminus","cves":["CVE-2024-45321"],"id":"CPANSA-App-cpanminus-2024-45321"}],"main_module":"App::cpanminus"},"Catalyst-Authentication-Store-LDAP":{"versions":[{"version":"0.1000","date":"2008-02-05T18:18:24"},{"version":"0.1001","date":"2008-04-10T02:06:58"},{"version":"0.1002","date":"2008-07-09T20:45:43"},{"date":"2008-09-10T13:21:33","version":"0.1003"},{"date":"2008-10-22T01:57:27","version":"0.1003"},{"version":"0.1005","date":"2009-05-01T02:34:18"},{"date":"2009-12-11T18:54:26","version":"1.006"},{"date":"2010-03-19T10:07:13","version":"1.007"},{"date":"2010-04-03T03:04:13","version":"1.008"},{"version":"1.009","date":"2010-05-15T07:14:41"},{"version":"1.010","date":"2010-07-06T21:39:55"},{"version":"1.011","date":"2010-07-07T20:41:22"},{"version":"1.012","date":"2010-10-05T08:11:56"},{"version":"1.013","date":"2013-01-09T14:58:46"},{"date":"2013-04-26T19:51:28","version":"1.014"},{"version":"1.015","date":"2015-02-20T18:07:31"},{"version":"1.016","date":"2016-02-11T17:50:52"},{"date":"2021-05-26T09:59:28","version":"1.017"}],"advisories":[{"fixed_versions":[">=1.013"],"description":"Incorrect password check binds to the unauthenticated user.\n","affected_versions":["<1.013"],"distribution":"Catalyst-Authentication-Store-LDAP","reported":"2012-12-11","references":["https://rt.cpan.org/Public/Bug/Display.html?id=81908"],"cves":[],"severity":"high","id":"CPANSA-Catalyst-Authentication-Store-LDAP-2012-01"}],"main_module":"Catalyst::Authentication::Store::LDAP"},"Catalyst-Plugin-Static-Simple":{"advisories":[{"id":"CPANSA-Catalyst-Plugin-Static-Simple-2017-01","distribution":"Catalyst-Plugin-Static-Simple","reported":"2017-10-31","references":["https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/","https://metacpan.org/pod/CPAN::Checksums"],"cves":["CVE-2017-16248"],"affected_versions":["<0.34"],"fixed_versions":[">=0.34"],"description":"The Catalyst-Plugin-Static-Simple module before 0.34 for Perl allows remote attackers to read arbitrary files if there is a '.' character anywhere in the pathname, which differs from the intended policy of allowing access only when the filename itself has a '.' character.\n"}],"versions":[{"date":"2005-08-12T01:37:04","version":"0.01"},{"date":"2005-08-16T22:09:54","version":"0.02"},{"date":"2005-08-22T03:44:24","version":"0.03"},{"version":"0.04","date":"2005-08-22T15:59:08"},{"version":"0.05","date":"2005-08-26T15:58:06"},{"version":"0.06","date":"2005-09-05T19:36:58"},{"version":"0.07","date":"2005-09-06T01:07:28"},{"version":"0.08","date":"2005-09-07T22:52:21"},{"version":"0.09","date":"2005-10-07T17:40:16"},{"date":"2005-10-19T21:19:04","version":"0.10"},{"version":"0.11","date":"2005-11-14T00:28:01"},{"version":"0.13","date":"2005-12-15T14:56:40"},{"date":"2006-03-24T16:18:59","version":"0.14"},{"date":"2006-07-05T16:35:54","version":"0.14"},{"date":"2006-12-09T03:25:57","version":"0.15"},{"version":"0.16","date":"2007-04-30T18:48:25"},{"version":"0.17","date":"2007-05-11T14:52:16"},{"version":"0.18","date":"2007-07-01T04:12:31"},{"date":"2007-07-02T20:54:05","version":"0.19"},{"version":"0.20","date":"2007-09-24T13:50:15"},{"version":"0.21","date":"2009-03-29T18:47:56"},{"version":"0.22","date":"2009-08-21T16:21:17"},{"version":"0.23","date":"2009-10-06T16:51:19"},{"date":"2009-10-18T18:12:48","version":"0.24"},{"date":"2009-10-22T20:49:26","version":"0.25"},{"date":"2009-12-06T12:32:46","version":"0.26"},{"version":"0.27","date":"2010-01-03T14:56:26"},{"version":"0.28","date":"2010-01-04T13:18:25"},{"version":"0.29","date":"2010-02-01T18:48:45"},{"date":"2012-05-04T17:17:29","version":"0.30"},{"version":"0.31","date":"2013-09-09T14:32:43"},{"version":"0.32","date":"2014-06-05T12:44:48"},{"date":"2014-10-29T16:02:17","version":"0.33"},{"version":"0.34","date":"2017-08-02T17:00:14"},{"version":"0.35","date":"2018-03-14T12:13:30"},{"date":"2018-03-15T11:41:17","version":"0.36"},{"date":"2021-05-05T14:30:07","version":"0.37"}],"main_module":"Catalyst::Plugin::Static::Simple"},"Net-CIDR-Lite":{"advisories":[{"id":"CPANSA-Net-CIDR-Lite-2021-47154","distribution":"Net-CIDR-Lite","reported":"2024-03-18","references":["https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/","https://github.com/stigtsp/Net-CIDR-Lite/commit/23b6ff0590dc279521863a502e890ef19a5a76fc","https://metacpan.org/dist/Net-CIDR-Lite/changes","https://metacpan.org/pod/Net::CIDR::Lite"],"cves":["CVE-2021-47154"],"severity":null,"affected_versions":["<0.22"],"description":"The Net::CIDR::Lite module before 0.22 for Perl does not properly consider extraneous zero characters at the beginning of an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.\n","fixed_versions":[">=0.22"]}],"versions":[{"date":"2001-10-23T22:54:21","version":"0.02"},{"date":"2001-10-24T00:14:02","version":"0.03"},{"version":"0.04","date":"2001-10-24T00:55:11"},{"date":"2001-10-25T17:20:05","version":"0.05"},{"version":"0.06","date":"2001-10-31T01:40:19"},{"date":"2001-10-31T23:51:49","version":"0.07"},{"version":"0.08","date":"2001-11-26T23:12:47"},{"version":"0.09","date":"2001-11-27T05:47:30"},{"version":"0.10","date":"2001-11-27T18:25:47"},{"date":"2002-04-16T05:44:00","version":"0.11"},{"version":"0.12","date":"2002-07-15T07:07:02"},{"version":"0.13","date":"2002-07-15T09:46:34"},{"date":"2002-07-15T16:31:01","version":"0.14"},{"version":"0.15","date":"2003-04-16T20:20:04"},{"version":"0.16","date":"2005-05-18T19:01:44"},{"version":"0.17","date":"2005-05-18T19:43:12"},{"version":"0.18","date":"2005-05-21T08:14:32"},{"date":"2006-01-30T19:34:31","version":"0.19"},{"date":"2006-02-14T00:58:01","version":"0.20"},{"date":"2010-03-26T00:38:30","version":"0.21"},{"date":"2021-04-04T21:03:12","version":"0.22"}],"main_module":"Net::CIDR::Lite"},"Module-Provision":{"versions":[{"date":"2013-04-14T19:20:34","version":"v0.3.43"},{"version":"v0.3.44","date":"2013-04-15T12:46:30"},{"version":"v0.3.45","date":"2013-04-15T17:33:39"},{"version":"v0.4.47","date":"2013-04-21T16:14:43"},{"date":"2013-04-22T15:09:36","version":"v0.4.51"},{"date":"2013-04-24T04:13:42","version":"v0.6.59"},{"date":"2013-04-24T23:34:41","version":"v0.7.4"},{"version":"v0.7.6","date":"2013-04-27T01:18:07"},{"version":"v0.7.7","date":"2013-04-27T11:36:59"},{"version":"v0.8.3","date":"2013-04-30T22:32:47"},{"version":"v0.9.5","date":"2013-05-02T18:45:43"},{"version":"v0.10.1","date":"2013-05-04T00:14:46"},{"date":"2013-05-04T20:22:41","version":"v0.11.1"},{"version":"v0.12.1","date":"2013-05-06T15:08:18"},{"date":"2013-05-08T15:51:41","version":"v0.12.3"},{"date":"2013-05-09T23:42:20","version":"v0.12.5"},{"date":"2013-05-10T19:29:24","version":"v0.12.6"},{"version":"v0.13.1","date":"2013-05-11T02:15:00"},{"date":"2013-05-11T13:59:50","version":"v0.14.2"},{"date":"2013-05-12T18:03:55","version":"v0.15.3"},{"date":"2013-05-14T12:49:37","version":"v0.15.5"},{"version":"v0.15.6","date":"2013-05-15T17:55:40"},{"date":"2013-05-15T20:59:19","version":"v0.15.7"},{"version":"v0.15.8","date":"2013-05-16T23:02:48"},{"version":"v0.15.9","date":"2013-05-19T12:59:15"},{"version":"v0.16.1","date":"2013-06-08T17:12:50"},{"date":"2013-07-28T18:42:27","version":"v0.17.16"},{"date":"2013-07-29T16:10:28","version":"v0.17.17"},{"version":"v0.17.18","date":"2013-07-29T23:51:34"},{"version":"v0.17.19","date":"2013-07-30T13:06:37"},{"version":"v0.18.0","date":"2013-08-07T17:56:55"},{"version":"v0.18.1","date":"2013-08-07T17:58:22"},{"date":"2013-08-08T13:39:44","version":"v0.18.2"},{"date":"2013-08-10T08:51:08","version":"v0.18.3"},{"date":"2013-08-10T21:18:54","version":"v0.18.4"},{"version":"0.20.1","date":"2013-08-17T15:47:30"},{"version":"0.21.1","date":"2013-08-21T12:36:06"},{"date":"2013-08-21T12:56:35","version":"0.22.1"},{"version":"0.23.1","date":"2013-09-14T09:38:12"},{"version":"0.24.1","date":"2013-09-16T20:23:50"},{"version":"0.25.1","date":"2013-11-23T13:38:55"},{"date":"2013-11-25T21:30:21","version":"0.26.1"},{"version":"0.27.1","date":"2013-12-11T17:25:32"},{"date":"2013-12-12T14:23:50","version":"0.28.1"},{"date":"2013-12-12T21:54:50","version":"0.29.1"},{"version":"0.31.2","date":"2014-01-24T21:05:50"},{"version":"0.32.1","date":"2014-05-01T14:42:10"},{"version":"0.33.1","date":"2014-05-15T20:55:59"},{"version":"0.34.1","date":"2014-05-19T11:47:05"},{"date":"2014-10-28T13:51:21","version":"0.36.1"},{"date":"2015-02-11T17:52:30","version":"0.38.1"},{"version":"0.39.1","date":"2015-02-11T19:03:04"},{"date":"2015-06-08T21:47:29","version":"0.40.1"},{"version":"0.41.1","date":"2016-04-04T12:15:12"},{"version":"0.42.1","date":"2017-05-08T19:30:17"}],"advisories":[{"cves":["CVE-2016-1238"],"severity":"high","distribution":"Module-Provision","reported":"2016-08-02","references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"id":"CPANSA-Module-Provision-2016-1238","fixed_versions":[">=0.42.1"],"description":"(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.\n","affected_versions":["<0.42.1"]}],"main_module":"Module::Provision"},"Apache-Session-Browseable":{"advisories":[{"affected_versions":["<1.3.6"],"description":"In Apache::Session::Browseable before 1.3.6, validity of the X.509 certificate is not checked by default when connecting to remote LDAP backends, because the default configuration of the Net::LDAPS module for Perl is used. NOTE: this can, for example, be fixed in conjunction with the CVE-2020-16093 fix.\n","fixed_versions":[">=1.3.6"],"id":"CPANSA-Apache-Session-Browseable-2020-36659","distribution":"Apache-Session-Browseable","references":["https://github.com/LemonLDAPNG/Apache-Session-Browseable/commit/fdf393235140b293cae5578ef136055a78f3574f","https://lists.debian.org/debian-lts-announce/2023/01/msg00025.html"],"reported":"2023-01-27","cves":["CVE-2020-36659"],"severity":null}],"versions":[{"date":"2009-10-31T08:09:42","version":"0.1"},{"version":"0.2","date":"2009-11-01T09:10:13"},{"date":"2009-11-01T16:21:16","version":"0.3"},{"date":"2010-08-16T15:26:19","version":"0.4"},{"version":"0.5","date":"2010-12-06T21:08:25"},{"version":"0.6","date":"2010-12-08T15:45:21"},{"version":"0.7","date":"2012-06-24T07:14:37"},{"version":"0.8","date":"2012-10-13T16:15:41"},{"version":"0.9","date":"2013-02-28T06:05:09"},{"version":"1.0","date":"2013-08-28T04:42:23"},{"date":"2013-08-30T04:47:02","version":"1.0"},{"version":"v1.0.2","date":"2013-10-20T05:39:14"},{"date":"2015-06-12T15:56:45","version":"1.1"},{"version":"1.2","date":"2016-03-09T05:31:13"},{"date":"2016-03-10T06:30:41","version":"v1.2.1"},{"date":"2016-04-01T11:34:51","version":"v1.2.2"},{"version":"v1.2.3","date":"2016-06-07T13:59:19"},{"date":"2017-02-19T07:34:18","version":"v1.2.4"},{"version":"v1.2.5","date":"2017-04-04T05:18:26"},{"version":"v1.2.5","date":"2017-09-12T09:35:30"},{"version":"v1.2.7","date":"2017-10-03T05:00:07"},{"date":"2017-10-03T10:42:35","version":"v1.2.8"},{"date":"2019-02-08T06:29:20","version":"v1.2.9"},{"date":"2019-02-08T09:31:22","version":"v1.3.0"},{"version":"v1.3.1","date":"2019-05-04T10:55:48"},{"date":"2019-07-04T18:30:30","version":"v1.3.2"},{"version":"v1.3.3","date":"2019-09-19T20:44:43"},{"version":"v1.3.4","date":"2019-11-20T19:43:04"},{"version":"v1.3.5","date":"2020-01-21T10:20:26"},{"version":"v1.3.6","date":"2020-09-04T13:23:31"},{"date":"2020-09-04T13:39:40","version":"v1.3.7"},{"version":"v1.3.8","date":"2020-09-06T21:03:06"},{"date":"2021-08-10T04:44:06","version":"v1.3.9"},{"version":"v1.3.10","date":"2022-03-08T13:51:31"},{"version":"v1.3.11","date":"2022-09-26T16:41:24"},{"date":"2023-07-06T10:43:25","version":"v1.3.12"},{"date":"2023-07-06T11:38:32","version":"v1.3.13"},{"date":"2024-12-19T07:59:19","version":"v1.3.13"}],"main_module":"Apache::Session::Browseable"},"DBD-Pg":{"versions":[{"version":"0.1","date":"1997-03-13T21:11:59"},{"version":"0.3","date":"1997-04-28T20:48:18"},{"date":"1997-08-10T20:45:01","version":"0.5"},{"date":"1997-08-16T06:48:54","version":"0.51"},{"version":"0.52","date":"1997-08-17T09:14:26"},{"version":"0.61","date":"1997-08-23T20:41:48"},{"date":"1997-08-26T21:39:36","version":"0.62"},{"date":"1997-10-05T18:41:32","version":"0.63"},{"version":"0.64","date":"1998-02-02T21:05:57"},{"version":"0.65","date":"1998-02-15T09:59:55"},{"date":"1998-02-19T21:13:44","version":"0.66"},{"version":"0.67","date":"1998-02-21T16:49:34"},{"date":"1998-03-03T21:22:18","version":"0.68"},{"date":"1998-03-06T22:15:44","version":"0.69"},{"date":"1998-04-20T20:14:28","version":"0.72"},{"version":"0.73","date":"1998-06-03T15:15:54"},{"version":"0.89","date":"1998-11-05T21:41:28"},{"version":"0.90","date":"1999-01-16T06:10:32"},{"date":"1999-02-14T20:41:05","version":"0.91"},{"version":"0.92","date":"1999-06-16T19:06:21"},{"version":"0.93","date":"1999-09-29T21:25:02"},{"date":"2000-07-07T10:45:34","version":"0.94"},{"date":"2000-07-10T18:07:30","version":"0.95"},{"date":"2001-04-09T17:58:20","version":"0.96"},{"version":"0.97","date":"2001-04-20T21:11:46"},{"date":"2001-04-25T14:13:22","version":"0.98"},{"date":"2001-05-24T17:36:05","version":"0.99"},{"date":"2001-05-27T14:14:13","version":"1.00"},{"date":"2001-06-27T18:03:08","version":"1.01"},{"date":"2002-03-06T23:05:52","version":"1.10"},{"date":"2002-03-07T01:34:18","version":"1.11"},{"date":"2002-04-10T02:03:57","version":"1.12"},{"date":"2002-04-27T20:50:11","version":"1.13"},{"date":"2002-11-27T17:57:11","version":"1.20"},{"version":"1.21","date":"2003-01-13T06:46:43"},{"date":"2003-03-27T04:46:08","version":"1.22"},{"version":"1.31_5","date":"2003-09-10T02:12:07"},{"date":"2003-10-29T21:33:29","version":"1.31_7"},{"version":"1.31_8","date":"2003-11-10T03:52:37"},{"version":"1.31_9","date":"2003-11-14T22:17:30"},{"version":"1.31","date":"2003-11-18T18:34:28"},{"date":"2004-02-13T18:57:25","version":"1.32_1"},{"version":"1.32_2","date":"2004-02-19T02:40:51"},{"date":"2004-02-25T19:23:08","version":"1.32"},{"date":"2005-02-06T21:18:12","version":"1.39_02"},{"date":"2005-02-22T06:07:17","version":"1.40"},{"date":"2005-03-31T12:35:04","version":"1.40_1"},{"version":"1.40_2","date":"2005-03-31T23:34:15"},{"date":"2005-04-01T23:56:01","version":"1.40_03"},{"date":"2005-04-05T02:47:47","version":"1.40_04"},{"version":"1.41","date":"2005-04-06T22:53:50"},{"date":"2005-05-07T18:48:36","version":"1.41_1"},{"version":"1.41_2","date":"2005-05-19T03:23:24"},{"version":"1.42","date":"2005-05-21T14:56:23"},{"date":"2005-06-22T00:42:23","version":"1.42_1"},{"date":"2005-06-23T12:09:13","version":"1.43"},{"version":"1.43_1","date":"2005-09-13T01:39:06"},{"version":"1.43_2","date":"2006-02-13T03:50:51"},{"date":"2006-02-22T03:00:40","version":"1.44"},{"date":"2006-02-26T19:15:10","version":"1.45"},{"date":"2006-03-17T17:17:03","version":"1.46"},{"version":"1.47","date":"2006-03-19T21:19:12"},{"date":"2006-04-05T15:39:30","version":"1.48"},{"version":"1.49","date":"2006-05-05T16:40:59"},{"date":"2008-01-17T14:34:38","version":"2.0.0"},{"version":"2.0.0_2","date":"2008-01-17T22:47:38"},{"date":"2008-01-18T04:21:25","version":"2.0.0_3"},{"date":"2008-01-18T16:25:19","version":"2.0.0_4"},{"date":"2008-01-19T19:05:27","version":"2.0.0_5"},{"version":"2.0.0_6","date":"2008-01-23T19:19:45"},{"date":"2008-01-26T17:48:03","version":"2.0.0_7"},{"date":"2008-01-28T17:08:31","version":"2.0.0_8"},{"version":"2.0.0_9","date":"2008-01-28T21:21:19"},{"version":"2.0.0","date":"2008-02-10T19:34:31"},{"date":"2008-02-17T04:58:29","version":"2.0.0_1"},{"date":"2008-02-17T13:10:04","version":"2.0.0_2"},{"date":"2008-02-17T18:17:25","version":"2.0.1_1"},{"version":"2.0.1_2","date":"2008-02-18T02:28:30"},{"date":"2008-02-18T23:52:09","version":"2.0.1_3"},{"date":"2008-02-19T02:09:09","version":"2.1.0"},{"date":"2008-02-19T04:45:29","version":"2.1.1"},{"version":"2.1.1_1","date":"2008-02-19T15:36:06"},{"version":"2.1.2","date":"2008-02-20T02:56:37"},{"version":"2.1.3","date":"2008-02-21T00:31:43"},{"date":"2008-02-26T01:59:20","version":"2.1.3_1"},{"date":"2008-02-26T13:50:47","version":"2.1.3_2"},{"version":"2.2.0","date":"2008-02-28T04:08:34"},{"version":"2.2.1","date":"2008-03-02T03:01:12"},{"date":"2008-03-03T17:14:01","version":"2.2.2"},{"version":"2.3.0","date":"2008-03-19T14:50:06"},{"version":"2.4.0","date":"2008-03-21T16:41:42"},{"date":"2008-03-23T16:55:36","version":"2.5.0"},{"version":"2.5.1","date":"2008-04-07T19:16:57"},{"version":"2.5.2_1","date":"2008-04-14T15:57:23"},{"version":"2.6.0","date":"2008-04-16T18:16:11"},{"version":"2.6.1","date":"2008-04-22T18:06:55"},{"date":"2008-04-28T21:15:56","version":"2.6.1_1"},{"version":"2.6.2","date":"2008-04-30T23:18:14"},{"version":"2.6.3","date":"2008-05-01T16:03:12"},{"version":"2.6.4","date":"2008-05-02T17:09:20"},{"date":"2008-05-07T14:10:57","version":"2.6.5"},{"version":"2.6.6","date":"2008-05-07T20:41:03"},{"version":"2.7.0","date":"2008-05-10T22:37:02"},{"version":"2.7.1","date":"2008-05-11T20:58:52"},{"version":"2.7.2","date":"2008-05-14T13:19:24"},{"date":"2008-06-02T01:33:26","version":"2.8.0"},{"date":"2008-06-12T04:06:28","version":"2.8.1"},{"version":"2.8.2","date":"2008-06-30T02:21:03"},{"version":"2.8.3","date":"2008-07-07T02:09:01"},{"date":"2008-07-10T18:18:54","version":"2.8.4"},{"version":"2.8.5","date":"2008-07-13T14:41:49"},{"version":"2.8.6","date":"2008-07-21T15:23:39"},{"version":"2.8.7","date":"2008-07-24T05:27:41"},{"version":"2.9.0","date":"2008-08-03T19:48:22"},{"date":"2008-08-18T03:49:13","version":"2.9.1"},{"date":"2008-08-18T14:00:03","version":"2.9.2"},{"date":"2008-08-27T02:46:34","version":"2.10.0"},{"date":"2008-08-31T16:29:33","version":"2.10.1"},{"version":"2.10.2","date":"2008-09-01T01:40:52"},{"version":"2.10.3","date":"2008-09-01T01:48:43"},{"version":"2.10.4","date":"2008-09-16T15:35:48"},{"version":"2.10.5","date":"2008-09-16T15:43:37"},{"version":"2.10.6","date":"2008-09-19T13:38:32"},{"date":"2008-09-23T03:13:47","version":"2.10.7"},{"date":"2008-10-13T11:50:18","version":"2.11.0"},{"version":"2.11.1","date":"2008-10-14T04:21:14"},{"date":"2008-10-16T00:55:38","version":"2.11.2"},{"version":"2.11.3","date":"2008-11-03T13:51:55"},{"version":"2.11.4","date":"2008-11-12T22:11:37"},{"version":"2.11.5","date":"2008-11-24T23:56:25"},{"date":"2008-11-30T23:05:28","version":"2.11.6"},{"version":"2.11.7","date":"2008-12-13T17:02:24"},{"version":"2.11.8","date":"2008-12-28T19:24:29"},{"version":"2.11.8_1","date":"2009-03-24T02:23:04"},{"date":"2009-03-26T18:53:00","version":"2.11.8_2"},{"version":"2.12.0","date":"2009-03-28T14:56:16"},{"version":"2.13.0","date":"2009-04-14T02:14:44"},{"date":"2009-04-23T16:30:10","version":"2.13.1"},{"date":"2009-07-13T19:43:16","version":"2.13.1_1"},{"date":"2009-07-14T14:34:31","version":"2.13.1_2"},{"version":"2.13.1_3","date":"2009-07-15T21:12:47"},{"date":"2009-07-17T01:15:13","version":"2.13.1_4"},{"date":"2009-07-20T23:54:06","version":"2.13.1_5"},{"date":"2009-07-21T16:03:25","version":"2.13.1_6"},{"version":"2.13.1_7","date":"2009-07-21T21:43:56"},{"date":"2009-07-27T22:45:52","version":"2.14.0"},{"version":"2.14.1","date":"2009-07-28T17:05:35"},{"version":"2.14.1_1","date":"2009-08-04T04:08:56"},{"date":"2009-08-04T18:18:51","version":"2.15.0"},{"date":"2009-08-07T15:05:27","version":"2.15.1"},{"date":"2009-12-17T15:41:55","version":"2.8.8"},{"date":"2009-12-17T17:14:41","version":"2.16.0"},{"version":"2.16.1","date":"2010-01-20T21:13:23"},{"date":"2010-04-06T18:56:34","version":"2.17.0"},{"version":"2.17.1","date":"2010-04-08T15:32:24"},{"date":"2010-11-21T05:14:52","version":"2.17.2"},{"date":"2011-03-27T03:53:00","version":"2.17.2_1"},{"version":"2.18.0","date":"2011-03-29T00:36:37"},{"version":"2.18.1","date":"2011-05-09T16:40:13"},{"date":"2011-06-19T18:46:40","version":"2.99.9_1"},{"version":"2.99.9_2","date":"2011-06-20T20:47:06"},{"date":"2012-03-09T22:51:54","version":"2.19.0"},{"version":"2.19.1","date":"2012-03-11T03:28:47"},{"version":"2.19.2","date":"2012-03-12T20:58:56"},{"version":"2.19.3","date":"2012-08-21T17:18:39"},{"version":"2.20.1_1","date":"2013-11-16T03:47:03"},{"date":"2013-11-21T03:22:26","version":"2.20.1_2"},{"version":"2.20.1_3","date":"2013-11-26T19:03:57"},{"version":"2.20.1_4","date":"2013-11-27T19:35:07"},{"date":"2014-01-11T20:31:09","version":"2.20.1_6"},{"date":"2014-02-04T01:38:37","version":"3.0.0"},{"date":"2014-04-05T11:08:15","version":"3.1.0"},{"date":"2014-04-06T13:17:49","version":"3.1.1"},{"date":"2014-05-15T17:20:49","version":"3.2.0"},{"version":"3.2.1","date":"2014-05-20T16:38:44"},{"version":"3.3.0","date":"2014-05-31T18:50:07"},{"date":"2014-08-16T19:09:15","version":"3.4.0"},{"date":"2014-08-20T20:38:19","version":"3.4.1"},{"date":"2014-09-25T21:16:23","version":"3.4.2"},{"date":"2015-01-06T20:41:04","version":"3.5.0"},{"version":"3.5.0_1","date":"2015-02-07T13:09:54"},{"date":"2015-02-16T19:17:14","version":"3.5.0_2"},{"date":"2015-02-17T21:20:22","version":"3.5.1"},{"version":"3.5.2","date":"2015-09-29T15:46:33"},{"date":"2015-10-01T14:06:04","version":"3.5.3"},{"date":"2017-04-05T10:23:22","version":"3.5.9_1"},{"version":"3.6.0","date":"2017-04-17T13:34:12"},{"version":"3.6.1","date":"2017-05-22T16:49:32"},{"version":"3.6.2","date":"2017-05-23T14:25:49"},{"version":"3.6.9_1","date":"2017-09-22T16:30:49"},{"date":"2017-09-23T02:10:34","version":"3.6.9_2"},{"version":"3.7.0","date":"2017-09-24T19:30:09"},{"version":"3.7.1","date":"2018-02-11T19:23:39"},{"version":"v3.7.3","date":"2018-02-12T13:39:58"},{"date":"2018-02-13T04:10:10","version":"3.7.4"},{"version":"3.8.0","date":"2019-04-26T02:20:41"},{"version":"3.8.1","date":"2019-07-06T19:44:25"},{"version":"3.8.9_1","date":"2019-07-25T15:48:44"},{"version":"3.9.0","date":"2019-08-13T21:10:51"},{"version":"3.9.1","date":"2019-08-15T19:46:43"},{"version":"3.10.0","date":"2019-09-03T15:18:09"},{"version":"3.10.1","date":"2020-01-14T03:27:38"},{"date":"2020-01-17T22:34:46","version":"3.10.2"},{"version":"3.10.3","date":"2020-01-20T21:01:45"},{"version":"3.10.4","date":"2020-02-03T17:19:38"},{"date":"2020-03-23T17:47:23","version":"3.10.5"},{"date":"2020-04-23T16:46:52","version":"3.11.0"},{"version":"3.11.1","date":"2020-04-28T15:12:38"},{"date":"2020-05-07T18:35:28","version":"3.12.0"},{"date":"2020-06-03T13:39:22","version":"3.12.1"},{"version":"3.12.2","date":"2020-06-04T15:30:54"},{"version":"3.12.3","date":"2020-06-05T17:59:13"},{"date":"2020-06-08T20:38:00","version":"3.12.3_1"},{"date":"2020-06-15T21:25:55","version":"3.12.3_2"},{"date":"2020-06-17T15:53:25","version":"3.13.0"},{"version":"3.14.0","date":"2020-07-20T00:24:23"},{"version":"3.14.1","date":"2020-08-12T16:17:33"},{"version":"3.14.2","date":"2020-08-13T13:36:09"},{"version":"3.15.0","date":"2021-05-21T21:20:28"},{"date":"2022-02-14T15:39:15","version":"3.15.1"},{"version":"3.16.0","date":"2022-08-08T18:03:02"},{"date":"2023-03-06T00:06:35","version":"3.16.1"},{"version":"3.16.2","date":"2023-04-04T19:49:11"},{"version":"3.16.3","date":"2023-04-04T20:43:26"},{"version":"3.17.0","date":"2023-08-24T00:42:24"},{"date":"2023-12-06T23:47:13","version":"3.18.0"}],"advisories":[{"fixed_versions":[],"description":"Multiple format string vulnerabilities in dbdimp.c in DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.19.0 for Perl allow remote PostgreSQL database servers to cause a denial of service (process crash) via format string specifiers in (1) a crafted database warning to the pg_warn function or (2) a crafted DBD statement to the dbd_st_prepare function.\n","affected_versions":["<2.19.0"],"cves":["CVE-2012-1151"],"severity":null,"distribution":"DBD-Pg","reported":"2012-09-09","references":["http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661536","https://rt.cpan.org/Public/Bug/Display.html?id=75642","http://secunia.com/advisories/48319","https://bugzilla.redhat.com/show_bug.cgi?id=801733","http://www.openwall.com/lists/oss-security/2012/03/10/4","http://secunia.com/advisories/48307","http://www.debian.org/security/2012/dsa-2431","http://cpansearch.perl.org/src/TURNSTEP/DBD-Pg-2.19.1/Changes","http://www.openwall.com/lists/oss-security/2012/03/09/6","http://rhn.redhat.com/errata/RHSA-2012-1116.html","http://secunia.com/advisories/48824","http://security.gentoo.org/glsa/glsa-201204-08.xml","http://www.mandriva.com/security/advisories?name=MDVSA-2012:112","https://exchange.xforce.ibmcloud.com/vulnerabilities/73855","https://exchange.xforce.ibmcloud.com/vulnerabilities/73854"],"id":"CPANSA-DBD-Pg-2012-1151"},{"severity":null,"cves":["CVE-2009-0663"],"references":["http://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49-2+etch1.diff.gz","https://launchpad.net/bugs/cve/2009-0663","http://www.debian.org/security/2009/dsa-1780","http://secunia.com/advisories/34909","http://www.securityfocus.com/bid/34755","http://www.redhat.com/support/errata/RHSA-2009-0479.html","http://secunia.com/advisories/35058","http://www.redhat.com/support/errata/RHSA-2009-1067.html","http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html","http://secunia.com/advisories/35685","https://exchange.xforce.ibmcloud.com/vulnerabilities/50467","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9499"],"reported":"2009-04-30","distribution":"DBD-Pg","id":"CPANSA-DBD-Pg-2009-0663","fixed_versions":[],"description":"Heap-based buffer overflow in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module 1.49 for Perl might allow context-dependent attackers to execute arbitrary code via unspecified input to an application that uses the getline and pg_getline functions to read database rows.\n","affected_versions":["=1.49"]},{"id":"CPANSA-DBD-Pg-2009-1341","distribution":"DBD-Pg","references":["http://rt.cpan.org/Public/Bug/Display.html?id=21392","https://launchpad.net/bugs/cve/2009-1341","http://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49-2+etch1.diff.gz","http://www.debian.org/security/2009/dsa-1780","http://cpansearch.perl.org/src/TURNSTEP/DBD-Pg-2.13.1/Changes","http://secunia.com/advisories/34909","http://www.securityfocus.com/bid/34757","http://www.redhat.com/support/errata/RHSA-2009-0479.html","http://secunia.com/advisories/35058","http://www.redhat.com/support/errata/RHSA-2009-1067.html","http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html","http://secunia.com/advisories/35685","https://exchange.xforce.ibmcloud.com/vulnerabilities/50387","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9680"],"reported":"2009-04-30","cves":["CVE-2009-1341"],"severity":null,"affected_versions":["<2.0.0"],"fixed_versions":[">=2.0.0"],"description":"Memory leak in the dequote_bytea function in quote.c in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.0.0 for Perl allows context-dependent attackers to cause a denial of service (memory consumption) by fetching data with BYTEA columns.\n"}],"main_module":"DBD::Pg"},"Catalyst-Runtime":{"main_module":"Catalyst::Runtime","versions":[{"version":"5.70_01","date":"2006-06-25T19:20:53"},{"version":"5.70_02","date":"2006-06-27T18:10:20"},{"date":"2006-06-28T21:50:30","version":"5.70_03"},{"version":"5.7000","date":"2006-07-07T22:47:30"},{"version":"5.7001","date":"2006-07-20T06:00:58"},{"version":"5.7002","date":"2006-09-19T07:36:29"},{"date":"2006-09-23T17:43:12","version":"5.7003"},{"date":"2006-11-06T23:28:40","version":"5.7004"},{"version":"5.7005","date":"2006-11-07T19:43:56"},{"version":"5.7006","date":"2006-11-15T08:27:59"},{"version":"5.7007","date":"2007-03-14T11:13:37"},{"version":"5.7008","date":"2007-08-13T06:36:11"},{"date":"2007-08-21T22:23:53","version":"5.7009"},{"date":"2007-08-22T05:51:41","version":"5.7010"},{"date":"2007-10-18T18:11:24","version":"5.7011"},{"version":"5.7012","date":"2007-12-17T08:19:28"},{"date":"2008-05-17T12:41:13","version":"5.7013"},{"date":"2008-05-25T21:16:45","version":"5.7013"},{"date":"2008-06-25T20:43:41","version":"5.7099_01"},{"date":"2008-07-18T11:41:25","version":"5.7099_02"},{"date":"2008-07-20T08:15:02","version":"5.7099_02"},{"date":"2008-10-13T20:55:41","version":"5.7099_02"},{"version":"5.7099_02","date":"2008-10-14T06:06:06"},{"version":"5.7015","date":"2008-10-15T21:44:15"},{"version":"5.8000_03","date":"2008-10-17T12:42:53"},{"version":"5.8000_04","date":"2008-12-05T15:11:14"},{"version":"5.7099_04","date":"2009-01-12T15:46:59"},{"date":"2009-01-19T17:36:04","version":"5.71000"},{"version":"5.8000_05","date":"2009-01-29T08:56:09"},{"date":"2009-02-04T20:08:22","version":"5.8000_06"},{"date":"2009-03-27T09:21:12","version":"5.71001"},{"date":"2009-04-13T19:03:36","version":"5.8000_07"},{"version":"5.80001","date":"2009-04-18T20:26:00"},{"date":"2009-04-21T23:45:45","version":"5.80002"},{"version":"5.80003","date":"2009-04-29T14:39:21"},{"date":"2009-05-18T15:16:38","version":"5.80004"},{"version":"5.80005","date":"2009-06-06T12:49:15"},{"version":"5.80006","date":"2009-06-29T22:11:48"},{"date":"2009-06-30T22:11:36","version":"5.80007"},{"date":"2009-08-21T16:14:33","version":"5.80008"},{"date":"2009-08-21T20:29:33","version":"5.80009"},{"version":"5.80010","date":"2009-08-21T21:42:08"},{"version":"5.80011","date":"2009-08-23T11:57:26"},{"version":"5.80012","date":"2009-09-09T18:01:32"},{"date":"2009-09-17T09:35:20","version":"5.80013"},{"date":"2009-11-21T02:32:20","version":"5.80014"},{"date":"2009-11-22T20:24:47","version":"5.80014_01"},{"date":"2009-12-01T01:14:00","version":"5.80014_02"},{"date":"2009-12-02T15:42:50","version":"5.80015"},{"version":"5.80016","date":"2009-12-11T23:37:44"},{"version":"5.80017","date":"2010-01-10T02:01:50"},{"date":"2010-01-12T21:39:47","version":"5.80018"},{"version":"5.80019","date":"2010-01-29T00:18:07"},{"version":"5.80020","date":"2010-02-04T06:19:31"},{"version":"5.80021","date":"2010-03-03T23:16:29"},{"version":"5.80022","date":"2010-03-28T19:25:48"},{"date":"2010-05-07T22:07:08","version":"5.80023"},{"version":"5.80024","date":"2010-05-15T09:57:52"},{"version":"5.80025","date":"2010-07-29T00:59:16"},{"version":"5.80026","date":"2010-09-01T15:10:42"},{"date":"2010-09-02T11:33:03","version":"5.80027"},{"version":"5.80028","date":"2010-09-28T20:14:11"},{"date":"2010-10-03T16:24:08","version":"5.80029"},{"version":"5.80030","date":"2011-01-04T12:56:30"},{"date":"2011-01-24T10:50:27","version":"5.89000"},{"version":"5.80031","date":"2011-01-31T08:25:21"},{"date":"2011-02-23T08:28:58","version":"5.80032"},{"version":"5.89001","date":"2011-03-01T14:56:37"},{"date":"2011-03-02T10:37:42","version":"5.89002"},{"version":"5.80033","date":"2011-07-24T15:58:37"},{"date":"2011-07-28T20:05:01","version":"5.89003"},{"date":"2011-08-15T21:35:34","version":"5.9000"},{"date":"2011-08-15T21:59:58","version":"5.90001"},{"version":"5.90002","date":"2011-08-22T20:55:10"},{"version":"5.90003","date":"2011-10-05T07:48:57"},{"date":"2011-10-11T15:19:05","version":"5.90004"},{"version":"5.90005","date":"2011-10-22T21:01:24"},{"date":"2011-10-25T17:54:34","version":"5.90006"},{"date":"2011-11-22T20:40:44","version":"5.90007"},{"version":"5.90008","date":"2012-02-06T21:08:28"},{"version":"5.90009","date":"2012-02-16T09:29:44"},{"version":"5.90010","date":"2012-02-18T00:49:30"},{"version":"5.90011","date":"2012-03-08T21:53:00"},{"version":"5.90012","date":"2012-05-19T07:13:21"},{"date":"2012-06-08T00:37:40","version":"5.90013"},{"date":"2012-06-21T20:41:41","version":"5.90013"},{"version":"5.90014","date":"2012-06-26T14:34:56"},{"version":"5.90015","date":"2012-06-30T18:00:53"},{"version":"5.90016","date":"2012-08-17T01:39:42"},{"date":"2012-10-19T21:51:54","version":"5.90017"},{"version":"5.90018","date":"2012-10-24T01:01:44"},{"date":"2012-12-04T22:04:19","version":"5.90019"},{"version":"5.90020","date":"2013-02-22T14:05:39"},{"date":"2013-04-12T17:09:27","version":"5.90030"},{"version":"5.90040","date":"2013-06-12T21:26:14"},{"date":"2013-06-15T02:10:17","version":"5.90041"},{"date":"2013-06-16T01:57:47","version":"5.90042"},{"date":"2013-07-26T19:13:01","version":"5.90049_001"},{"version":"5.90049_002","date":"2013-08-21T02:39:45"},{"date":"2013-09-20T19:03:54","version":"5.90049_003"},{"date":"2013-10-18T22:19:33","version":"5.90049_004"},{"date":"2013-10-31T20:48:42","version":"5.90049_005"},{"version":"5.90049_006","date":"2013-11-05T03:25:31"},{"version":"5.90050","date":"2013-11-05T22:35:22"},{"date":"2013-11-07T17:14:35","version":"5.90051"},{"version":"5.90052","date":"2013-12-18T20:03:22"},{"version":"5.90059_001","date":"2013-12-19T14:33:08"},{"version":"5.90053","date":"2013-12-22T16:18:16"},{"date":"2013-12-22T16:34:11","version":"5.90059_002"},{"version":"5.90059_003","date":"2013-12-27T02:27:08"},{"date":"2014-01-27T17:20:51","version":"5.90059_004"},{"version":"5.90059_005","date":"2014-01-28T19:36:58"},{"version":"5.90059_006","date":"2014-02-06T20:41:25"},{"version":"5.90060","date":"2014-02-08T03:11:11"},{"version":"5.90061","date":"2014-03-10T14:46:10"},{"version":"5.90062","date":"2014-04-14T18:53:26"},{"version":"5.90063","date":"2014-05-02T00:15:16"},{"version":"5.90064","date":"2014-05-05T14:55:25"},{"version":"5.90069_001","date":"2014-05-27T18:08:08"},{"version":"5.90065","date":"2014-06-05T12:44:59"},{"date":"2014-06-10T00:22:42","version":"5.90069_002"},{"date":"2014-08-06T15:09:29","version":"5.90069_003"},{"version":"5.90069_004","date":"2014-08-07T15:59:15"},{"date":"2014-08-07T21:49:59","version":"5.90070"},{"date":"2014-08-10T13:15:52","version":"5.90071"},{"date":"2014-09-15T16:30:58","version":"5.90072"},{"date":"2014-09-23T17:24:54","version":"5.90073"},{"version":"5.90074","date":"2014-10-01T21:45:12"},{"version":"5.90075","date":"2014-10-07T00:07:51"},{"version":"5.90076","date":"2014-11-14T00:20:16"},{"date":"2014-11-19T00:28:27","version":"5.90077"},{"version":"5.90079_001","date":"2014-12-02T21:50:30"},{"version":"5.90079_002","date":"2014-12-02T23:22:07"},{"date":"2014-12-03T19:45:16","version":"5.90079_003"},{"version":"5.90079_004","date":"2014-12-26T23:05:46"},{"version":"5.90078","date":"2014-12-31T16:26:20"},{"date":"2014-12-31T21:04:56","version":"5.90079_005"},{"version":"5.90079_006","date":"2015-01-02T15:11:55"},{"version":"5.90079","date":"2015-01-02T18:11:38"},{"date":"2015-01-07T20:01:40","version":"5.90079_007"},{"date":"2015-01-07T23:26:17","version":"5.90079_008"},{"date":"2015-01-09T17:04:47","version":"5.90080"},{"version":"5.90081","date":"2015-01-10T22:39:56"},{"date":"2015-01-10T23:33:56","version":"5.90082"},{"version":"5.90083","date":"2015-02-17T02:29:50"},{"version":"5.90084","date":"2015-02-23T22:24:50"},{"version":"5.90085","date":"2015-03-25T18:58:11"},{"date":"2015-03-26T21:30:15","version":"5.90089_001"},{"date":"2015-04-17T21:32:30","version":"5.90089_002"},{"version":"5.90089_003","date":"2015-04-27T20:20:40"},{"version":"5.90089_004","date":"2015-04-28T18:24:12"},{"date":"2015-04-29T14:04:24","version":"5.90090"},{"date":"2015-05-08T20:36:59","version":"5.90091"},{"version":"5.90092","date":"2015-05-19T16:48:30"},{"version":"5.90093","date":"2015-05-29T17:06:23"},{"version":"5.90094","date":"2015-07-24T20:17:46"},{"date":"2015-07-27T14:32:30","version":"5.90095"},{"date":"2015-07-27T15:44:59","version":"5.90096"},{"date":"2015-07-28T20:33:41","version":"5.90097"},{"date":"2015-08-24T16:30:12","version":"5.90100"},{"date":"2015-09-04T22:57:40","version":"5.90101"},{"version":"5.90102","date":"2015-10-29T19:39:24"},{"version":"5.90103","date":"2015-11-12T10:19:42"},{"version":"5.90104","date":"2016-04-04T17:18:38"},{"version":"5.90105","date":"2016-06-08T20:06:53"},{"version":"5.90106","date":"2016-07-06T01:21:42"},{"date":"2016-07-20T19:12:32","version":"5.90110"},{"date":"2016-07-20T20:07:16","version":"5.90111"},{"date":"2016-07-25T21:03:05","version":"5.90112"},{"version":"5.90113","date":"2016-12-15T21:35:30"},{"version":"5.90114","date":"2016-12-19T16:54:08"},{"version":"5.90115","date":"2017-05-01T16:42:46"},{"version":"5.90116","date":"2018-01-19T20:55:15"},{"date":"2018-01-21T23:47:21","version":"5.90117"},{"date":"2018-05-01T09:59:20","version":"5.90118"},{"date":"2018-09-24T00:25:48","version":"5.90119"},{"version":"5.90120","date":"2018-10-19T06:13:58"},{"date":"2018-10-22T20:39:48","version":"5.90_121"},{"version":"5.90122","date":"2018-11-03T14:52:06"},{"date":"2018-11-27T15:39:35","version":"5.90123"},{"date":"2019-01-18T22:36:07","version":"5.90124"},{"version":"5.90125","date":"2020-01-19T01:11:05"},{"version":"5.90126","date":"2020-01-20T01:40:16"},{"date":"2020-07-27T01:25:21","version":"5.90_127"},{"date":"2020-09-11T12:38:26","version":"5.90128"},{"version":"5.90129","date":"2022-07-23T13:13:34"},{"date":"2022-11-09T15:37:01","version":"5.90130"},{"date":"2023-07-20T23:09:29","version":"5.90131"},{"version":"5.90132","date":"2024-11-08T19:56:41"}],"advisories":[{"cves":[],"distribution":"Catalyst-Runtime","reported":"2013-01-23","references":["http://git.shadowcat.co.uk/gitweb/gitweb.cgi?p=catagits/Catalyst-Runtime.git;a=commitdiff;h=7af54927870a7c6f89323ac1876d49f92e7841f5"],"id":"CPANSA-Catalyst-Runtime-2013-01","fixed_versions":[">=5.90020"],"description":"Passing a special host to the redirect page link makes it vulnerable to XSS attack.\n","affected_versions":["<5.90020"]},{"distribution":"Catalyst-Runtime","reported":"2005-11-24","fixed_versions":[">=5.58"],"cves":[],"description":"Path traversal in Static::Simple plugin.\n","affected_versions":["<5.58"],"id":"CPANSA-Catalyst-Runtime-2005-01"}]},"RT-Authen-ExternalAuth":{"versions":[{"date":"2008-03-13T16:16:36","version":"0.01"},{"date":"2008-03-17T13:34:40","version":"0.02"},{"date":"2008-03-31T14:55:18","version":"0.03"},{"date":"2008-04-03T14:20:36","version":"0.04"},{"version":"0.05","date":"2008-04-09T08:57:51"},{"date":"2008-10-17T13:22:11","version":"0.06_01"},{"version":"0.06_02","date":"2008-10-17T16:41:34"},{"version":"0.06_02","date":"2008-10-31T12:08:54"},{"version":"0.06_02","date":"2008-11-01T18:23:27"},{"date":"2008-11-06T21:16:42","version":"0.06_02"},{"date":"2008-12-22T22:08:06","version":"0.07_02"},{"version":"0.07_02","date":"2009-01-20T21:09:48"},{"version":"0.07_02","date":"2009-01-24T13:52:42"},{"version":"0.08_01","date":"2011-02-19T00:43:35"},{"version":"0.08_02","date":"2011-04-15T19:46:43"},{"date":"2011-05-06T21:08:52","version":"0.09"},{"date":"2012-01-23T17:51:41","version":"0.09_01"},{"date":"2012-01-26T18:48:51","version":"0.09_02"},{"version":"0.09_03","date":"2012-01-27T23:07:12"},{"version":"0.10","date":"2012-02-17T16:34:10"},{"version":"0.10_01","date":"2012-02-23T16:31:54"},{"date":"2012-07-25T08:57:21","version":"0.11"},{"version":"0.11","date":"2012-07-25T18:36:36"},{"date":"2012-10-26T19:59:54","version":"0.12"},{"date":"2013-01-31T19:22:43","version":"0.13"},{"version":"0.14","date":"2013-05-22T21:28:15"},{"date":"2013-05-23T00:20:43","version":"0.15"},{"date":"2013-06-27T19:24:37","version":"0.16"},{"date":"2013-07-10T19:43:08","version":"0.17"},{"date":"2014-03-07T22:19:49","version":"0.18"},{"version":"0.19","date":"2014-04-04T17:21:04"},{"date":"2014-04-09T19:34:29","version":"0.20"},{"version":"0.21","date":"2014-07-02T02:20:30"},{"date":"2014-08-14T04:04:28","version":"0.22_01"},{"date":"2014-08-14T17:28:53","version":"0.23"},{"version":"0.23_01","date":"2014-09-30T22:04:16"},{"date":"2014-10-09T16:24:49","version":"0.24"},{"version":"0.25","date":"2014-10-16T20:59:29"},{"date":"2016-08-02T16:14:34","version":"0.26"},{"version":"0.27","date":"2017-06-15T18:44:24"}],"advisories":[{"description":"Timing sidechannel vulnerability in password checking.\n","fixed_versions":[">=0.27"],"affected_versions":["<0.27"],"distribution":"RT-Authen-ExternalAuth","references":["https://metacpan.org/changes/distribution/RT-Authen-ExternalAuth"],"reported":"2017-06-15","cves":["CVE-2017-5361"],"id":"CPANSA-RT-Authen-ExternalAuth-2017-01"}],"main_module":"RT::Authen::ExternalAuth"},"Convert-ASN1":{"versions":[{"date":"2000-04-03T21:52:45","version":"0.04"},{"date":"2000-05-12T10:14:51","version":"0.05"},{"date":"2000-05-22T11:08:54","version":"0.06"},{"date":"2000-05-30T14:31:54","version":"0.07"},{"version":"0.08","date":"2001-02-05T22:44:53"},{"date":"2001-04-19T23:07:25","version":"0.09"},{"version":"0.10","date":"2001-04-20T06:40:05"},{"version":"0.11","date":"2001-06-11T13:37:41"},{"version":"0.12","date":"2001-07-31T17:11:59"},{"date":"2001-08-26T07:23:52","version":"0.13"},{"date":"2001-09-10T18:07:31","version":"0.14"},{"date":"2002-01-22T11:33:25","version":"0.15"},{"date":"2002-08-20T00:05:24","version":"0.16"},{"date":"2003-05-12T17:52:00","version":"0.17"},{"version":"0.18","date":"2003-10-08T14:31:56"},{"date":"2005-04-19T00:51:07","version":"0.19"},{"version":"0.20","date":"2006-02-22T01:29:15"},{"version":"0.21","date":"2007-02-03T02:50:32"},{"version":"0.22","date":"2008-09-15T19:39:08"},{"date":"2012-05-03T21:33:29","version":"0.23"},{"version":"0.24","date":"2012-06-04T22:12:03"},{"date":"2012-06-09T00:32:31","version":"0.25"},{"version":"0.26","date":"2012-06-09T18:31:05"},{"version":"0.27","date":"2014-06-25T18:49:11"},{"version":"0.28","date":"2021-05-23T21:05:04"},{"version":"0.29","date":"2021-05-24T21:29:37"},{"date":"2021-05-30T00:58:54","version":"0.30"},{"version":"0.31","date":"2021-06-03T01:30:40"},{"version":"0.32","date":"2021-09-21T21:46:25"},{"date":"2021-09-22T22:51:23","version":"0.33"},{"date":"2023-08-07T22:47:22","version":"0.34"}],"advisories":[{"references":["https://github.com/gbarr/perl-Convert-ASN1/issues/14","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONNQSW4SSKMG5RUEFZJZA5T5R2WXEGQF/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6V3PJEQOT47ZO77263XPGS3Y3AJROI4X/"],"reported":"2020-04-07","distribution":"Convert-ASN1","severity":"high","cves":["CVE-2013-7488"],"id":"CPANSA-Convert-ASN1-2013-7488","description":"perl-Convert-ASN1 (aka the Convert::ASN1 module for Perl) through 0.27 allows remote attackers to cause an infinite loop via unexpected input.\n","fixed_versions":[],"affected_versions":["<0.27"]}],"main_module":"Convert::ASN1"},"Plack-Middleware-StaticShared":{"main_module":"Plack::Middleware::StaticShared","versions":[{"date":"2010-12-03T11:42:11","version":"0.01"},{"date":"2011-08-03T00:32:41","version":"0.02"},{"date":"2011-08-10T14:36:03","version":"0.03"},{"version":"0.04","date":"2012-04-26T03:37:11"},{"date":"2013-01-24T10:40:54","version":"0.05"},{"date":"2016-06-09T03:53:36","version":"0.06"}],"advisories":[{"id":"CPANSA-Plack-Middleware-StaticShared-2012-01","severity":null,"cves":[],"references":["https://metacpan.org/dist/Plack-Middleware-StaticShared/changes"],"reported":"2012-04-26","distribution":"Plack-Middleware-StaticShared","affected_versions":["<0.04"],"fixed_versions":[">=0.04"],"description":"Vulnerability of directory traversal.\n"}]},"XML-Twig":{"main_module":"XML::Twig","versions":[{"date":"1999-10-05T22:25:47","version":"1.6"},{"version":"1.7","date":"1999-12-07T16:53:28"},{"date":"1999-12-17T17:03:18","version":"1.8"},{"version":"1.9","date":"2000-02-18T00:39:24"},{"date":"2000-03-24T23:22:37","version":"1.10"},{"version":"2.00","date":"2000-06-05T19:27:48"},{"date":"2000-08-18T12:10:46","version":"2.01"},{"date":"2001-01-16T09:14:14","version":"2.02"},{"version":"3.00","date":"2002-01-09T16:33:44"},{"date":"2002-01-09T17:01:53","version":"3.01"},{"date":"2002-01-16T14:11:04","version":"3.02"},{"date":"2002-03-26T14:40:14","version":"3.03"},{"date":"2002-04-02T04:57:42","version":"3.04"},{"version":"3.05","date":"2002-07-09T16:02:36"},{"version":"3.06","date":"2002-09-17T17:07:34"},{"date":"2002-09-17T20:03:49","version":"3.07"},{"date":"2002-09-17T21:57:09","version":"3.08"},{"version":"3.09","date":"2002-11-11T07:42:10"},{"date":"2003-06-09T19:35:52","version":"3.10"},{"date":"2003-09-24T13:23:47","version":"3.11"},{"version":"3.12","date":"2004-01-29T15:20:30"},{"date":"2004-02-02T07:13:15","version":"3.13"},{"date":"2004-03-17T15:39:18","version":"3.14"},{"version":"3.15","date":"2004-04-05T08:30:51"},{"date":"2005-02-11T17:51:59","version":"3.16"},{"date":"2005-03-16T14:06:47","version":"3.17"},{"version":"3.18","date":"2005-08-08T12:22:25"},{"date":"2005-08-10T16:22:28","version":"3.19"},{"version":"3.20","date":"2005-08-11T13:51:56"},{"date":"2005-08-12T12:59:54","version":"3.21"},{"date":"2005-10-14T16:27:05","version":"3.22"},{"version":"3.23","date":"2006-01-23T14:26:19"},{"version":"3.24","date":"2006-05-09T08:56:08"},{"date":"2006-05-10T11:07:37","version":"3.25"},{"version":"3.26","date":"2006-07-01T11:18:04"},{"date":"2007-01-05T17:23:58","version":"3.28"},{"version":"3.29","date":"2007-01-22T09:42:28"},{"version":"3.30","date":"2007-11-06T14:49:35"},{"version":"3.31","date":"2007-11-07T19:29:27"},{"date":"2007-11-13T20:40:13","version":"3.32"},{"version":"3.33","date":"2010-01-15T17:14:59"},{"version":"3.34","date":"2010-01-18T19:31:16"},{"version":"3.35","date":"2010-05-16T05:25:45"},{"date":"2010-10-07T09:55:43","version":"3.36"},{"date":"2010-10-10T05:53:41","version":"3.37"},{"date":"2011-02-27T06:57:30","version":"3.38"},{"date":"2011-09-22T01:30:24","version":"3.39"},{"version":"3.40","date":"2012-05-10T10:44:35"},{"date":"2012-08-08T20:31:00","version":"3.41"},{"date":"2012-11-08T12:28:17","version":"3.42"},{"date":"2013-05-13T08:47:04","version":"3.44"},{"version":"3.45","date":"2014-03-01T08:34:52"},{"date":"2014-03-05T11:25:33","version":"3.46"},{"date":"2014-03-29T10:30:09","version":"3.47"},{"date":"2014-03-30T09:01:59","version":"3.48"},{"date":"2015-04-12T09:17:47","version":"3.49"},{"date":"2016-11-22T15:01:43","version":"3.50"},{"date":"2016-11-23T12:34:37","version":"3.51"},{"date":"2016-11-23T17:21:16","version":"3.52"},{"date":"2024-12-13T15:34:19","version":"3.53"}],"advisories":[{"severity":"critical","cves":["CVE-2016-9180"],"reported":"2016-12-22","references":["http://www.securityfocus.com/bid/94219","http://www.openwall.com/lists/oss-security/2016/11/04/2","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00020.html","http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00033.html","https://rt.cpan.org/Public/Bug/Display.html?id=118097"],"distribution":"XML-Twig","id":"CPANSA-XML-Twig-2016-9180","fixed_versions":[">=1.39"],"description":"perl-XML-Twig: The option to `expand_external_ents`, documented as controlling external entity expansion in XML::Twig does not work. External entities are always expanded, regardless of the option's setting.\n","affected_versions":["<1.39"]}]},"Jifty-DBI":{"main_module":"Jifty::DBI","versions":[{"version":"0.02","date":"2005-11-08T21:32:52"},{"version":"0.05_01","date":"2005-11-26T07:21:20"},{"date":"2005-12-23T20:48:59","version":"0.06"},{"date":"2005-12-24T04:29:10","version":"0.06"},{"version":"0.08","date":"2005-12-25T19:37:31"},{"version":"0.09","date":"2005-12-29T13:31:40"},{"version":"0.10","date":"2006-01-08T10:05:05"},{"version":"0.11","date":"2006-01-15T17:22:14"},{"version":"0.15","date":"2006-03-05T01:55:32"},{"date":"2006-03-05T02:07:03","version":"0.15"},{"version":"0.18","date":"2006-03-31T13:22:16"},{"version":"0.19","date":"2006-04-02T10:05:36"},{"version":"0.20","date":"2006-04-21T16:27:47"},{"date":"2006-05-03T18:26:47","version":"0.20"},{"date":"2006-06-15T12:17:00","version":"0.21"},{"date":"2006-09-12T22:56:59","version":"0.25"},{"version":"0.25","date":"2006-11-13T16:15:30"},{"version":"0.25","date":"2006-11-24T03:15:46"},{"version":"0.25","date":"2007-01-17T20:34:50"},{"version":"0.31","date":"2007-01-26T11:55:26"},{"version":"0.39_99","date":"2007-01-26T12:22:07"},{"version":"0.32","date":"2007-01-26T12:56:35"},{"date":"2007-01-26T13:34:03","version":"0.39_999"},{"date":"2007-01-28T13:30:21","version":"0.32"},{"version":"0.39_9999","date":"2007-04-15T15:26:52"},{"version":"0.41","date":"2007-04-16T20:21:33"},{"version":"0.43","date":"2007-08-24T04:20:36"},{"date":"2007-10-26T16:48:22","version":"0.43"},{"date":"2007-11-07T17:27:17","version":"0.46"},{"date":"2007-11-16T21:28:33","version":"0.46"},{"version":"0.46","date":"2007-11-29T21:38:34"},{"version":"0.49","date":"2008-04-08T03:05:48"},{"version":"0.53","date":"2009-03-25T19:32:29"},{"date":"2009-05-19T12:33:45","version":"0.53"},{"version":"0.53","date":"2009-07-14T07:29:33"},{"version":"0.59","date":"2009-11-19T01:16:21"},{"date":"2010-01-04T18:04:58","version":"0.60"},{"version":"0.63","date":"2010-12-08T20:15:10"},{"date":"2010-12-08T20:24:47","version":"0.64"},{"version":"0.66","date":"2011-02-14T21:27:51"},{"version":"0.67","date":"2011-02-28T16:00:37"},{"version":"0.68","date":"2011-04-14T16:20:25"},{"version":"0.69","date":"2011-05-17T19:54:33"},{"version":"0.70","date":"2011-06-15T20:46:39"},{"version":"0.71","date":"2011-06-17T20:39:50"},{"version":"0.72","date":"2011-10-17T16:45:06"},{"version":"0.73","date":"2012-01-25T21:39:16"},{"version":"0.74","date":"2012-01-25T21:45:14"},{"version":"0.75","date":"2013-01-29T20:18:33"},{"date":"2013-06-17T22:14:37","version":"0.76"},{"date":"2013-12-01T18:11:35","version":"0.77"},{"date":"2015-04-30T19:16:36","version":"0.78"}],"advisories":[{"affected_versions":["<0.68"],"fixed_versions":[">=0.68"],"description":"SQL injection in column names, operators, order and group by.\n","id":"CPANSA-Jifty-DBI-2011-01","references":["https://metacpan.org/dist/Jifty-DBI/changes","https://metacpan.org/dist/Jifty/changes"],"reported":"2011-04-04","distribution":"Jifty-DBI","cves":[]}]},"SVN-Look":{"advisories":[{"description":"Two-arg open with a possibility of running arbitrary commands.\n","fixed_versions":[">=0.40"],"affected_versions":["<0.40"],"cves":[],"references":["https://metacpan.org/changes/distribution/SVN-Look","https://github.com/gnustavo/SVN-Look/commit/b413ac1c397dfc6b2d164fede693f7ff9a94c83c","https://bugs.launchpad.net/ubuntu/+source/libsvn-look-perl/+bug/1323300"],"reported":"2014-05-31","distribution":"SVN-Look","id":"CPANSA-SVN-Look-2014-01"}],"versions":[{"version":"0.08.360","date":"2008-09-26T03:22:44"},{"date":"2008-09-27T22:10:54","version":"0.09.366"},{"date":"2008-09-28T03:07:02","version":"0.10.369"},{"version":"0.11.388","date":"2008-10-05T03:16:35"},{"date":"2008-10-10T02:25:16","version":"0.12.409"},{"date":"2008-10-24T00:51:56","version":"0.12.442"},{"version":"0.12.455","date":"2008-11-03T10:43:38"},{"version":"0.13.463","date":"2008-11-06T03:11:52"},{"date":"2009-02-28T02:50:53","version":"0.14.5"},{"date":"2009-03-01T12:17:06","version":"0.14.7"},{"date":"2009-03-06T01:52:43","version":"0.14.9"},{"date":"2009-03-08T02:25:41","version":"0.14.10"},{"version":"0.14.12","date":"2009-03-20T01:24:06"},{"date":"2009-10-25T01:23:51","version":"0.15"},{"version":"0.16","date":"2010-02-16T20:16:51"},{"date":"2010-02-24T23:20:51","version":"0.17"},{"version":"0.18","date":"2010-04-28T11:38:27"},{"version":"0.19","date":"2010-12-12T10:35:04"},{"version":"0.20","date":"2010-12-12T19:59:46"},{"date":"2011-07-20T20:11:31","version":"0.21"},{"version":"0.22","date":"2011-07-22T22:31:55"},{"version":"0.23","date":"2011-07-27T20:22:58"},{"date":"2011-07-30T21:52:08","version":"0.24"},{"version":"0.25","date":"2011-08-21T23:31:44"},{"version":"0.26","date":"2011-08-27T20:12:39"},{"date":"2011-09-18T02:42:31","version":"0.27"},{"date":"2011-10-10T23:18:59","version":"0.28"},{"date":"2011-10-13T01:06:12","version":"0.29"},{"date":"2011-11-02T21:00:23","version":"0.30"},{"version":"0.31","date":"2012-02-26T00:04:15"},{"version":"0.32","date":"2012-02-26T21:55:01"},{"version":"0.33","date":"2012-02-27T23:49:07"},{"date":"2012-03-05T14:37:05","version":"0.34"},{"version":"0.35","date":"2012-04-22T00:14:50"},{"date":"2012-06-18T17:07:07","version":"0.36"},{"version":"0.37","date":"2012-06-18T17:34:58"},{"date":"2012-06-19T17:00:40","version":"0.38"},{"date":"2013-10-20T23:32:26","version":"0.39"},{"date":"2014-06-12T18:05:32","version":"0.40"},{"version":"0.41","date":"2014-06-14T02:51:53"},{"version":"0.42","date":"2020-10-09T01:36:59"},{"version":"0.43","date":"2022-05-21T14:32:05"}],"main_module":"SVN::Look"},"PApp":{"versions":[{"version":"0.02","date":"2000-04-11T19:29:07"},{"version":"0.03","date":"2000-04-14T01:33:03"},{"version":"0.04","date":"2000-05-11T01:27:39"},{"date":"2000-05-27T20:43:50","version":"0.05"},{"version":"0.06","date":"2000-06-07T19:56:36"},{"date":"2000-06-09T20:15:48","version":"0.07"},{"date":"2000-06-18T21:57:46","version":"0.08"},{"version":"0.12","date":"2001-02-25T17:23:00"},{"date":"2001-11-30T10:35:30","version":"0.121"},{"version":"0.122","date":"2001-12-03T18:35:13"},{"date":"2002-04-16T17:20:02","version":"0.142"},{"date":"2002-09-27T09:55:48","version":"0.143"},{"version":"0.2","date":"2002-11-15T19:09:27"},{"date":"2003-11-01T21:22:27","version":"0.22"},{"version":"0.95","date":"2004-04-24T07:18:03"},{"date":"2004-11-23T17:16:58","version":"1"},{"version":"1.1","date":"2005-09-04T14:32:15"},{"date":"2007-01-06T19:32:19","version":"1.2"},{"date":"2008-01-20T12:37:14","version":"1.4"},{"version":"1.41","date":"2008-01-28T20:07:08"},{"date":"2008-11-26T07:18:45","version":"1.42"},{"version":"1.43","date":"2008-12-09T17:23:32"},{"date":"2010-01-30T03:08:38","version":"1.44"},{"version":"1.45","date":"2010-11-21T07:30:21"},{"version":"2.0","date":"2013-03-19T12:24:55"},{"version":2.1,"date":"2016-02-11T07:21:31"},{"version":2.2,"date":"2020-02-17T11:04:59"},{"version":2.3,"date":"2023-08-02T22:30:09"}],"advisories":[{"fixed_versions":[">=0.11"],"description":"Testing for nonexistant access rights always returned true.\n","affected_versions":["<0.11"],"distribution":"PApp","references":["https://metacpan.org/dist/PApp/changes"],"reported":"2001-10-27","cves":[],"severity":null,"id":"CPANSA-PApp-2001-01"}],"main_module":"PApp"},"LWP-Protocol-https":{"main_module":"LWP::Protocol::https","advisories":[{"distribution":"LWP-Protocol-https","reported":"2020-01-28","references":["http://www.openwall.com/lists/oss-security/2014/05/04/1","http://www.openwall.com/lists/oss-security/2014/05/02/8","http://www.openwall.com/lists/oss-security/2014/05/06/8","https://github.com/libwww-perl/lwp-protocol-https/pull/14","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746579"],"cves":["CVE-2014-3230"],"severity":"medium","id":"CPANSA-LWP-Protocol-https-2014-3230","description":"The libwww-perl LWP::Protocol::https module 6.04 through 6.06 for Perl, when using IO::Socket::SSL as the SSL socket class, allows attackers to disable server certificate validation via the (1) HTTPS_CA_DIR or (2) HTTPS_CA_FILE environment variable.\n","fixed_versions":[],"affected_versions":[">=6.04,<=6.06"]}],"versions":[{"version":"6.02","date":"2011-03-27T11:59:53"},{"date":"2012-02-18T23:01:32","version":"6.03"},{"version":"6.04","date":"2013-04-29T21:26:33"},{"version":"6.06","date":"2014-04-18T17:03:15"},{"version":"6.07","date":"2017-02-20T02:46:43"},{"date":"2020-03-23T20:20:33","version":"6.08"},{"version":"6.09","date":"2020-07-16T13:33:20"},{"date":"2020-12-17T15:44:24","version":"6.10"},{"version":"6.11","date":"2023-07-09T15:11:15"},{"version":"6.12","date":"2024-01-22T17:51:48"},{"date":"2024-02-06T01:01:15","version":"6.13"},{"date":"2024-03-11T01:09:49","version":"6.14"}]},"File-Path":{"main_module":"File::Path","advisories":[{"description":"Race condition in the rmtree and remove_tree functions allows attackers to set the mode on arbitrary files via vectors involving directory-permission loosening logic.\n","fixed_versions":[">=2.13"],"affected_versions":["<2.13"],"cves":["CVE-2017-6512"],"distribution":"File-Path","references":["https://metacpan.org/changes/distribution/File-Path","https://github.com/jkeenan/File-Path/commit/e5ef95276ee8ad471c66ee574a5d42552b3a6af2"],"reported":"2017-05-02","id":"CPANSA-File-Path-2017-01"},{"affected_versions":["<=1.08"],"fixed_versions":[],"description":"Race condition in the rmtree function in File::Path 1.08 (lib/File/Path.pm) in Perl 5.8.8 allows local users to to delete arbitrary files via a symlink attack, a different vulnerability than CVE-2005-0448, CVE-2004-0452, and CVE-2008-2827. NOTE: this is a regression error related to CVE-2005-0448. It is different from CVE-2008-5302 due to affected versions.\n","id":"CPANSA-File-Path-2008-5303","distribution":"File-Path","reported":"2008-12-01","references":["http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286905","http://www.openwall.com/lists/oss-security/2008/11/28/2","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286922#36","http://www.gossamer-threads.com/lists/perl/porters/233695#233695","http://www.debian.org/security/2008/dsa-1678","http://www.ubuntu.com/usn/usn-700-1","http://secunia.com/advisories/33314","http://wiki.rpath.com/Advisories:rPSA-2009-0011","http://www.ubuntu.com/usn/usn-700-2","http://secunia.com/advisories/32980","http://support.apple.com/kb/HT4077","http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html","http://www.redhat.com/support/errata/RHSA-2010-0458.html","http://secunia.com/advisories/40052","http://www.mandriva.com/security/advisories?name=MDVSA-2010:116","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","https://exchange.xforce.ibmcloud.com/vulnerabilities/47044","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9699","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6680","http://www.securityfocus.com/archive/1/500210/100/0/threaded"],"cves":["CVE-2008-5303"],"severity":null},{"id":"CPANSA-File-Path-2008-5302","severity":null,"cves":["CVE-2008-5302"],"references":["http://www.gossamer-threads.com/lists/perl/porters/233695#233695","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286922#36","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=286905","http://www.openwall.com/lists/oss-security/2008/11/28/2","http://www.debian.org/security/2008/dsa-1678","http://secunia.com/advisories/33314","http://www.ubuntu.com/usn/usn-700-1","http://wiki.rpath.com/Advisories:rPSA-2009-0011","http://www.ubuntu.com/usn/usn-700-2","http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html","http://secunia.com/advisories/32980","http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html","http://support.apple.com/kb/HT4077","http://secunia.com/advisories/40052","http://www.mandriva.com/security/advisories?name=MDVSA-2010:116","http://www.redhat.com/support/errata/RHSA-2010-0458.html","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","https://exchange.xforce.ibmcloud.com/vulnerabilities/47043","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6890","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11076","http://www.securityfocus.com/archive/1/500210/100/0/threaded"],"reported":"2008-12-01","distribution":"File-Path","affected_versions":["=1.08","=2.07"],"fixed_versions":[],"description":"Race condition in the rmtree function in File::Path 1.08 and 2.07 (lib/File/Path.pm) in Perl 5.8.8 and 5.10.0 allows local users to create arbitrary setuid binaries via a symlink attack, a different vulnerability than CVE-2005-0448, CVE-2004-0452, and CVE-2008-2827. NOTE: this is a regression error related to CVE-2005-0448. It is different from CVE-2008-5303 due to affected versions.\n"},{"id":"CPANSA-File-Path-2008-2827","severity":null,"cves":["CVE-2008-2827"],"reported":"2008-06-23","references":["http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=487319","http://rt.cpan.org/Public/Bug/Display.html?id=36982","http://www.securityfocus.com/bid/29902","http://secunia.com/advisories/30790","http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html","http://www.mandriva.com/security/advisories?name=MDVSA-2008:165","https://www.redhat.com/archives/fedora-package-announce/2008-June/msg01025.html","http://secunia.com/advisories/30837","http://secunia.com/advisories/31687","http://www.securitytracker.com/id?1020373","https://exchange.xforce.ibmcloud.com/vulnerabilities/43308"],"distribution":"File-Path","affected_versions":[">=2.04,<2.07"],"fixed_versions":[">=2.07"],"description":"The rmtree function in lib/File/Path.pm in Perl 5.10 does not properly check permissions before performing a chmod, which allows local users to modify the permissions of arbitrary files via a symlink attack, a different vulnerability than CVE-2005-0448 and CVE-2004-0452.\n"},{"id":"CPANSA-File-Path-2005-0448","cves":["CVE-2005-0448"],"severity":null,"distribution":"File-Path","references":["http://www.debian.org/security/2005/dsa-696","http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml","http://www.redhat.com/support/errata/RHSA-2005-881.html","http://secunia.com/advisories/18075","http://www.securityfocus.com/bid/12767","ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U","http://secunia.com/advisories/14531","http://secunia.com/advisories/18517","http://fedoranews.org/updates/FEDORA--.shtml","http://www.redhat.com/support/errata/RHSA-2005-674.html","http://secunia.com/advisories/17079","http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056","http://www.mandriva.com/security/advisories?name=MDKSA-2005:079","http://www.securityfocus.com/advisories/8704","http://secunia.com/advisories/55314","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A728","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10475","https://usn.ubuntu.com/94-1/"],"reported":"2005-05-02","affected_versions":["<1.07"],"fixed_versions":[],"description":"Race condition in the rmtree function in File::Path.pm in Perl before 5.8.4 allows local users to create arbitrary setuid binaries in the tree being deleted, a different vulnerability than CVE-2004-0452.\n"},{"id":"CPANSA-File-Path-2004-0452","severity":null,"cves":["CVE-2004-0452"],"references":["http://www.debian.org/security/2004/dsa-620","http://www.gentoo.org/security/en/glsa/glsa-200501-38.xml","http://www.redhat.com/support/errata/RHSA-2005-103.html","ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U","http://www.securityfocus.com/bid/12072","http://secunia.com/advisories/12991","http://secunia.com/advisories/18517","http://fedoranews.org/updates/FEDORA--.shtml","http://www.redhat.com/support/errata/RHSA-2005-105.html","http://secunia.com/advisories/55314","http://marc.info/?l=bugtraq&m=110547693019788&w=2","https://www.ubuntu.com/usn/usn-44-1/","https://exchange.xforce.ibmcloud.com/vulnerabilities/18650","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9938"],"reported":"2004-12-21","distribution":"File-Path","affected_versions":[">=1.06,<=1.404"],"description":"Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/write permissions for the world, which allows local users to delete arbitrary files and directories, and possibly read files and directories, via a symlink attack.\n","fixed_versions":[]}],"versions":[{"date":"2007-05-17T13:46:15","version":"1.99_01"},{"date":"2007-05-27T09:29:48","version":"1.99_02"},{"date":"2007-06-27T19:23:09","version":"2.00_05"},{"version":"2.00_06","date":"2007-07-04T21:37:13"},{"date":"2007-07-09T19:37:02","version":"2.00_07"},{"version":"2.00_08","date":"2007-08-01T00:10:43"},{"version":"2.00_09","date":"2007-08-20T18:15:55"},{"version":"2.00_10","date":"2007-09-04T17:20:45"},{"date":"2007-09-08T12:53:07","version":"2.00_11"},{"date":"2007-09-29T10:29:32","version":"2.01"},{"date":"2007-10-24T10:36:09","version":"2.02"},{"date":"2007-11-04T18:36:19","version":"2.03"},{"date":"2007-11-24T09:53:23","version":"2.04"},{"date":"2008-05-07T08:25:05","version":"2.05"},{"date":"2008-05-08T09:36:50","version":"2.06"},{"date":"2008-05-10T21:02:47","version":"2.06_01"},{"date":"2008-05-12T10:07:46","version":"2.06_02"},{"date":"2008-05-12T21:43:43","version":"2.06_03"},{"version":"2.06_04","date":"2008-05-13T14:40:30"},{"date":"2008-10-01T20:41:37","version":"2.06_05"},{"date":"2008-10-05T21:59:58","version":"2.06_06"},{"version":"2.06_07","date":"2008-10-29T17:55:36"},{"version":"2.06_08","date":"2008-11-05T00:12:29"},{"version":"2.07","date":"2008-11-09T13:11:17"},{"date":"2009-06-21T13:23:32","version":"2.07_03"},{"date":"2009-10-04T10:31:05","version":"2.08"},{"date":"2013-01-16T21:36:05","version":"2.09"},{"version":"2.10_001","date":"2015-06-24T17:03:22"},{"date":"2015-06-26T17:28:20","version":"2.10_002"},{"date":"2015-07-08T16:59:11","version":"2.10_003"},{"version":"2.10_004","date":"2015-07-10T11:34:44"},{"date":"2015-07-17T15:03:07","version":"2.10_005"},{"date":"2015-07-18T02:28:14","version":"2.11"},{"date":"2015-07-24T23:01:36","version":"2.11_001"},{"version":"2.11_002","date":"2015-07-25T09:56:18"},{"version":"2.11_003","date":"2015-08-03T18:07:05"},{"date":"2015-10-01T19:34:07","version":"2.11_004"},{"date":"2015-10-09T12:11:52","version":"2.12"},{"date":"2016-09-18T13:35:39","version":"2.12_001"},{"version":"2.12_002","date":"2017-03-12T22:09:35"},{"date":"2017-04-07T13:59:30","version":"2.12_003"},{"version":"2.12_004","date":"2017-04-18T18:37:56"},{"version":"2.12_005","date":"2017-04-21T12:03:20"},{"date":"2017-04-21T21:58:56","version":"2.12_006"},{"date":"2017-04-22T20:09:24","version":"2.12_007"},{"version":"2.12_008","date":"2017-05-07T17:48:35"},{"version":"2.13","date":"2017-05-31T23:44:51"},{"date":"2017-06-07T21:34:52","version":"2.14"},{"date":"2017-07-30T02:40:36","version":"2.15"},{"date":"2018-08-31T13:04:13","version":"2.16"},{"date":"2020-07-18T18:29:28","version":"2.17"},{"date":"2020-11-04T12:38:02","version":"2.18_001"},{"date":"2020-11-05T01:30:15","version":"2.18"},{"date":"1995-03-14T00:00:00","dual_lived":1,"version":null,"perl_release":"5.001"},{"dual_lived":1,"date":"1996-02-29T00:00:00","version":"1.01","perl_release":"5.002"},{"perl_release":"5.004","version":"1.04","date":"1997-05-15T00:00:00","dual_lived":1},{"dual_lived":1,"date":"1999-04-29T00:00:00","version":"1.0402","perl_release":"5.00405"},{"perl_release":"5.005","version":"1.0401","date":"1998-07-22T00:00:00","dual_lived":1},{"dual_lived":1,"date":"2000-03-22T00:00:00","perl_release":"5.006","version":"1.0403"},{"dual_lived":1,"date":"2001-04-08T00:00:00","version":"1.0404","perl_release":"5.006001"},{"dual_lived":1,"date":"2002-03-05T00:00:00","version":"1.05","perl_release":"5.007003"},{"date":"2003-09-25T00:00:00","dual_lived":1,"version":"1.06","perl_release":"5.008001"},{"date":"2005-05-30T00:00:00","dual_lived":1,"version":"1.07","perl_release":"5.008007"},{"version":"1.08","perl_release":"5.008008","date":"2006-01-31T00:00:00","dual_lived":1},{"dual_lived":1,"date":"2008-12-14T00:00:00","version":"2.07_02","perl_release":"5.008009"},{"perl_release":"5.011003","version":"2.08_01","dual_lived":1,"date":"2009-12-20T00:00:00"},{"dual_lived":1,"date":"2016-05-09T00:00:00","perl_release":"5.024000","version":"2.12_01"}]},"POSIX-2008":{"main_module":"POSIX::2008","advisories":[{"reported":null,"references":["https://rt.cpan.org/Public/Bug/Display.html?id=96644"],"distribution":"POSIX-2008","severity":null,"cves":[],"id":"CPANSA-POSIX-2008-001","fixed_versions":[">=0.04"],"description":"POSIX::2008's implementation of readlink() and readlinkat(). The underlying syscalls do not add any null terminator byte at the end of the output buffer, but _readlink50c() in 2008.XS also fails to add a null terminator before returning the result string to perl. This results in arbitrary memory contents being visible in the result returned to perl code by readlink() and readlinkat(). At the very least, this causes failures in any downstream code that attempts to access whatever filename (plus the erroneous garbage) was linked to.\n","affected_versions":["<0.04"]},{"distribution":"POSIX-2008","references":["https://metacpan.org/release/CGPAN/POSIX-2008-0.24/source/Changes"],"reported":null,"cves":["CVE-2024-55564"],"severity":null,"id":"CPANSA-POSIX-2008-002","fixed_versions":[">=0.24"],"description":"Fixed potential env buffer overflow in _execve50c()\n","affected_versions":["<0.24"]}],"versions":[{"date":"2013-09-13T17:14:53","version":"0.01"},{"date":"2013-09-14T16:20:56","version":"0.02"},{"version":"0.03","date":"2013-09-16T09:32:15"},{"date":"2015-05-25T13:51:17","version":"0.04"},{"date":"2017-08-25T20:52:28","version":"0.05"},{"date":"2017-08-26T17:21:09","version":"0.06"},{"version":"0.07","date":"2017-08-27T14:55:54"},{"version":"0.08","date":"2017-08-31T18:14:24"},{"version":"0.09","date":"2017-09-01T10:14:04"},{"date":"2017-09-02T09:15:21","version":"0.10"},{"version":"0.11","date":"2017-09-02T13:11:19"},{"date":"2017-09-03T20:02:26","version":"0.12"},{"date":"2017-09-08T11:50:51","version":"0.13"},{"version":"0.14","date":"2017-09-09T18:04:53"},{"version":"0.15","date":"2017-09-10T12:50:52"},{"date":"2017-09-15T14:59:53","version":"0.16"},{"version":"0.18","date":"2023-06-01T13:51:43"},{"version":"0.19","date":"2023-07-07T13:52:59"},{"version":"0.20_01","date":"2023-07-08T12:09:34"},{"version":"0.20_02","date":"2023-07-09T08:25:58"},{"version":"0.20_03","date":"2023-07-11T15:26:35"},{"version":"0.20_04","date":"2023-07-12T17:47:09"},{"date":"2023-07-13T17:26:29","version":"0.20_05"},{"version":"0.20","date":"2023-07-14T15:57:30"},{"date":"2023-11-16T19:54:40","version":"0.21"},{"date":"2024-01-26T16:30:56","version":"0.22"},{"version":"0.23","date":"2024-01-27T15:34:00"},{"date":"2024-06-14T12:10:38","version":"0.24"}]},"Dpkg":{"main_module":"Dpkg","versions":[{"date":"2018-09-26T18:53:52","version":"v1.19.1"},{"version":"v1.19.2","date":"2018-10-08T10:54:58"},{"version":"v1.19.3","date":"2019-01-22T18:41:25"},{"date":"2019-02-23T17:40:31","version":"v1.19.5"},{"version":"v1.19.6","date":"2019-03-25T14:54:21"},{"date":"2019-06-03T21:51:58","version":"v1.19.7"},{"version":"v1.20.0","date":"2020-03-08T03:05:24"},{"date":"2020-06-27T01:26:33","version":"v1.20.1"},{"version":"v1.20.2","date":"2020-06-27T23:35:03"},{"version":"v1.20.3","date":"2020-06-29T11:02:10"},{"version":"v1.20.4","date":"2020-07-07T06:22:23"},{"date":"2020-07-08T03:55:55","version":"v1.20.5"},{"version":"v1.20.6","date":"2021-01-08T04:23:50"},{"version":"v1.20.7","date":"2021-01-09T00:19:44"},{"version":"v1.20.8","date":"2021-04-13T21:44:34"},{"version":"v1.20.9","date":"2021-04-13T23:33:15"},{"date":"2021-12-05T18:08:48","version":"v1.21.0"},{"version":"v1.21.1","date":"2021-12-06T20:23:10"},{"version":"v1.21.2","date":"2022-03-13T20:07:04"},{"version":"v1.21.3","date":"2022-03-24T20:19:38"},{"date":"2022-03-26T12:56:21","version":"v1.21.4"},{"version":"v1.21.5","date":"2022-03-29T01:07:10"},{"version":"v1.21.8","date":"2022-05-25T15:21:07"},{"version":"v1.21.9","date":"2022-07-01T09:48:45"},{"version":"v1.21.10","date":"2022-12-01T12:08:26"},{"date":"2022-12-02T23:34:17","version":"v1.21.11"},{"date":"2022-12-19T01:27:49","version":"v1.21.13"},{"date":"2023-01-01T23:04:24","version":"v1.21.14"},{"version":"v1.21.19","date":"2023-01-25T22:18:51"},{"date":"2023-05-16T22:34:01","version":"v1.21.22"},{"version":"v1.22.0","date":"2023-08-30T10:44:22"},{"version":"v1.22.1","date":"2023-10-30T03:47:45"},{"version":"v1.22.2","date":"2023-12-18T03:09:08"},{"version":"v1.22.4","date":"2024-01-24T12:39:35"},{"version":"v1.22.5","date":"2024-02-27T03:56:46"},{"version":"v1.22.6","date":"2024-03-10T21:52:57"},{"version":"v1.22.7","date":"2024-07-16T23:58:08"},{"date":"2024-07-21T18:44:31","version":"v1.22.8"},{"version":"v1.22.11","date":"2024-08-01T11:07:53"},{"date":"2025-01-02T03:22:30","version":"v1.22.12"},{"version":"v1.22.13","date":"2025-01-03T11:09:37"}],"advisories":[{"affected_versions":["<1.21.8"],"description":"Dpkg::Source::Archive in dpkg, the Debian package management system, before version 1.21.8, 1.20.10, 1.19.8, 1.18.26 is prone to a directory traversal vulnerability. When extracting untrusted source packages in v2 and v3 source package formats that include a debian.tar, the in-place extraction can lead to directory traversal situations on specially crafted orig.tar and debian.tar tarballs.\n","fixed_versions":[">=1.21.8"],"id":"CPANSA-Dpkg-2022-1664","severity":"critical","cves":["CVE-2022-1664"],"references":["https://lists.debian.org/debian-security-announce/2022/msg00115.html","https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=faa4c92debe45412bfcf8a44f26e827800bb24be","https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=7a6c03cb34d4a09f35df2f10779cbf1b70a5200b","https://lists.debian.org/debian-lts-announce/2022/05/msg00033.html","https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=58814cacee39c4ce9e2cd0e3a3b9b57ad437eff5","https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=1f23dddc17f69c9598477098c7fb9936e15fa495"],"reported":"2022-05-26","distribution":"Dpkg"},{"description":"dpkg-source in dpkg 1.3.0 through 1.18.23 is able to use a non-GNU patch program and does not offer a protection mechanism for blank-indented diff hunks, which allows remote attackers to conduct directory traversal attacks via a crafted Debian source package, as demonstrated by use of dpkg-source on NetBSD.\n","fixed_versions":[">=1.18.24"],"affected_versions":["<1.18.24"],"distribution":"Dpkg","references":["http://www.openwall.com/lists/oss-security/2017/04/20/2","http://www.securityfocus.com/bid/98064"],"reported":"2017-04-26","cves":["CVE-2017-8283"],"severity":"critical","id":"CPANSA-Dpkg-2017-8283"},{"id":"CPANSA-Dpkg-2016-1238","cves":["CVE-2016-1238"],"severity":"high","distribution":"Dpkg","reported":"2016-08-02","references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"affected_versions":["<1.18.11"],"fixed_versions":[">=1.18.11"],"description":"(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.\n"},{"affected_versions":["<1.18.4"],"fixed_versions":[">=1.18.4"],"description":"Off-by-one error in the extracthalf function in dpkg-deb/extract.c in the dpkg-deb component in Debian dpkg 1.16.x before 1.16.17 and 1.17.x before 1.17.26 allows remote attackers to execute arbitrary code via the archive magic version number in an \"old-style\" Debian binary package, which triggers a stack-based buffer overflow.\n","id":"CPANSA-Dpkg-2015-0860","references":["http://www.ubuntu.com/usn/USN-2820-1","http://www.debian.org/security/2015/dsa-3407","https://blog.fuzzing-project.org/30-Stack-overflows-and-out-of-bounds-read-in-dpkg-Debian.html","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798324","https://anonscm.debian.org/cgit/dpkg/dpkg.git/commit/dpkg-deb/extract.c?id=e65aa3db04eb908c9507d5d356a95cedb890814d","https://security.gentoo.org/glsa/201612-07"],"reported":"2015-12-03","distribution":"Dpkg","severity":null,"cves":["CVE-2015-0860"]},{"affected_versions":["<1.18.0"],"fixed_versions":[">=1.18.0"],"description":"The dpkg-source command in Debian dpkg before 1.16.16 and 1.17.x before 1.17.25 allows remote attackers to bypass signature verification via a crafted Debian source control file (.dsc).\n","id":"CPANSA-Dpkg-2015-0840","distribution":"Dpkg","reported":"2015-04-13","references":["http://www.ubuntu.com/usn/USN-2566-1","http://www.debian.org/security/2015/dsa-3217","http://lists.opensuse.org/opensuse-updates/2015-06/msg00029.html","http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157387.html"],"cves":["CVE-2015-0840"],"severity":null},{"description":"Multiple format string vulnerabilities in the parse_error_msg function in parsehelp.c in dpkg before 1.17.22 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers in the (1) package or (2) architecture name.\n","fixed_versions":[">=1.17.22"],"affected_versions":["<1.17.22"],"cves":["CVE-2014-8625"],"severity":null,"distribution":"Dpkg","reported":"2015-01-20","references":["http://seclists.org/oss-sec/2014/q4/539","https://bugs.launchpad.net/ubuntu/+source/dpkg/+bug/1389135","http://seclists.org/oss-sec/2014/q4/622","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768485","http://seclists.org/oss-sec/2014/q4/551","http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157387.html","https://exchange.xforce.ibmcloud.com/vulnerabilities/98551"],"id":"CPANSA-Dpkg-2014-8625"},{"distribution":"Dpkg","reported":"2014-04-30","references":["http://www.debian.org/security/2014/dsa-2915","http://www.ubuntu.com/usn/USN-2183-1","http://www.securityfocus.com/bid/67106"],"cves":["CVE-2014-0471"],"severity":null,"id":"CPANSA-Dpkg-2014-0471","description":"Directory traversal vulnerability in the unpacking functionality in dpkg before 1.15.9, 1.16.x before 1.16.13, and 1.17.x before 1.17.8 allows remote attackers to write arbitrary files via a crafted source package, related to \"C-style filename quoting.\"\n","fixed_versions":[">=1.17.10"],"affected_versions":["<1.17.10"]},{"id":"CPANSA-Dpkg-2014-3127","severity":null,"cves":["CVE-2014-3127"],"reported":"2014-05-14","references":["https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746306","http://www.securityfocus.com/bid/67181","http://seclists.org/oss-sec/2014/q2/227","http://seclists.org/oss-sec/2014/q2/191","http://metadata.ftp-master.debian.org/changelogs//main/d/dpkg/dpkg_1.15.10_changelog"],"distribution":"Dpkg","affected_versions":["<1.17.10"],"description":"dpkg 1.15.9 on Debian squeeze introduces support for the \"C-style encoded filenames\" feature without recognizing that the squeeze patch program lacks this feature, which triggers an interaction error that allows remote attackers to conduct directory traversal attacks and modify files outside of the intended directories via a crafted source package. NOTE: this can be considered a release engineering problem in the effort to fix CVE-2014-0471.\n","fixed_versions":[">=1.17.10"]},{"fixed_versions":[">=1.17.10"],"description":"Directory traversal vulnerability in dpkg-source in dpkg-dev 1.3.0 allows remote attackers to modify files outside of the intended directories via a crafted source package that lacks a --- header line.\n","affected_versions":["<1.17.10"],"distribution":"Dpkg","reported":"2014-05-30","references":["http://openwall.com/lists/oss-security/2014/05/25/2","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746498","http://www.securityfocus.com/bid/67725","http://www.ubuntu.com/usn/USN-2242-1","http://www.debian.org/security/2014/dsa-2953"],"cves":["CVE-2014-3864"],"severity":null,"id":"CPANSA-Dpkg-2014-3864"},{"id":"CPANSA-Dpkg-2014-3865","cves":["CVE-2014-3865"],"severity":null,"distribution":"Dpkg","references":["https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=749183","http://openwall.com/lists/oss-security/2014/05/25/2","http://www.securityfocus.com/bid/67727","http://www.ubuntu.com/usn/USN-2242-1","http://www.debian.org/security/2014/dsa-2953"],"reported":"2014-05-30","affected_versions":["<1.17.10"],"description":"Multiple directory traversal vulnerabilities in dpkg-source in dpkg-dev 1.3.0 allow remote attackers to modify files outside of the intended directories via a source package with a crafted Index: pseudo-header in conjunction with (1) missing --- and +++ header lines or (2) a +++ header line with a blank pathname.\n","fixed_versions":[">=1.17.10"]},{"description":"Directory traversal vulnerability in the unpacking functionality in dpkg before 1.15.9, 1.16.x before 1.16.13, and 1.17.x before 1.17.8 allows remote attackers to write arbitrary files via a crafted source package, related to \"C-style filename quoting.\"\n","fixed_versions":[">=1.17.9"],"affected_versions":["<1.17.9"],"cves":["CVE-2014-0471"],"severity":null,"distribution":"Dpkg","reported":"2014-04-30","references":["http://www.debian.org/security/2014/dsa-2915","http://www.ubuntu.com/usn/USN-2183-1","http://www.securityfocus.com/bid/67106"],"id":"CPANSA-Dpkg-2014-0471"},{"distribution":"Dpkg","reported":"2014-05-14","references":["https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746306","http://www.securityfocus.com/bid/67181","http://seclists.org/oss-sec/2014/q2/227","http://seclists.org/oss-sec/2014/q2/191","http://metadata.ftp-master.debian.org/changelogs//main/d/dpkg/dpkg_1.15.10_changelog"],"cves":["CVE-2014-3127"],"severity":null,"id":"CPANSA-Dpkg-2014-3127","fixed_versions":[">=1.17.9"],"description":"dpkg 1.15.9 on Debian squeeze introduces support for the \"C-style encoded filenames\" feature without recognizing that the squeeze patch program lacks this feature, which triggers an interaction error that allows remote attackers to conduct directory traversal attacks and modify files outside of the intended directories via a crafted source package. NOTE: this can be considered a release engineering problem in the effort to fix CVE-2014-0471.\n","affected_versions":["<1.17.9"]},{"cves":["CVE-2014-0471"],"severity":null,"distribution":"Dpkg","references":["http://www.debian.org/security/2014/dsa-2915","http://www.ubuntu.com/usn/USN-2183-1","http://www.securityfocus.com/bid/67106"],"reported":"2014-04-30","id":"CPANSA-Dpkg-2014-0471","fixed_versions":[">=1.17.8"],"description":"Directory traversal vulnerability in the unpacking functionality in dpkg before 1.15.9, 1.16.x before 1.16.13, and 1.17.x before 1.17.8 allows remote attackers to write arbitrary files via a crafted source package, related to \"C-style filename quoting.\"\n","affected_versions":["<1.17.8"]},{"affected_versions":["<1.15.8.8"],"fixed_versions":[">=1.15.8.8"],"description":"Directory traversal vulnerability in dpkg-source in dpkg before 1.14.31 and 1.15.x allows user-assisted remote attackers to modify arbitrary files via directory traversal sequences in a patch for a source-format 3.0 package.\n","id":"CPANSA-Dpkg-2010-1679","distribution":"Dpkg","reported":"2011-01-11","references":["http://www.vupen.com/english/advisories/2011/0044","http://secunia.com/advisories/42831","http://secunia.com/advisories/42826","http://www.ubuntu.com/usn/USN-1038-1","http://www.debian.org/security/2011/dsa-2142","http://www.vupen.com/english/advisories/2011/0040","http://osvdb.org/70368","http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053311.html","http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053306.html","http://secunia.com/advisories/43054","http://www.securityfocus.com/bid/45703","http://www.vupen.com/english/advisories/2011/0196","https://exchange.xforce.ibmcloud.com/vulnerabilities/64615"],"cves":["CVE-2010-1679"],"severity":null},{"severity":null,"cves":["CVE-2010-0396"],"reported":"2010-03-15","references":["http://www.debian.org/security/2010/dsa-2011","http://www.vupen.com/english/advisories/2010/0582","http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29.tar.gz","https://exchange.xforce.ibmcloud.com/vulnerabilities/56887"],"distribution":"Dpkg","id":"CPANSA-Dpkg-2010-0396","description":"Directory traversal vulnerability in the dpkg-source component in dpkg before 1.14.29 allows remote attackers to modify arbitrary files via a crafted Debian source archive.\n","fixed_versions":[">=1.15.6"],"affected_versions":["<1.15.6"]},{"description":"dpkg 1.9.21 does not properly reset the metadata of a file during replacement of the file in a package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid file, (2) setgid file, or (3) device, a related issue to CVE-2010-2059.\n","fixed_versions":[">=1.9.22"],"affected_versions":["=1.9.21"],"cves":["CVE-2004-2768"],"severity":null,"distribution":"Dpkg","reported":"2010-06-08","references":["http://www.hackinglinuxexposed.com/articles/20031214.html","http://lists.jammed.com/ISN/2003/12/0056.html","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=225692","https://bugzilla.redhat.com/show_bug.cgi?id=598775","https://exchange.xforce.ibmcloud.com/vulnerabilities/59428"],"id":"CPANSA-Dpkg-2004-2768"},{"id":"CPANSA-Dpkg-2011-0402","distribution":"Dpkg","references":["http://www.ubuntu.com/usn/USN-1038-1","http://secunia.com/advisories/42831","http://www.debian.org/security/2011/dsa-2142","http://secunia.com/advisories/42826","http://www.vupen.com/english/advisories/2011/0040","http://www.vupen.com/english/advisories/2011/0044","http://osvdb.org/70367","http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053311.html","http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053306.html","http://www.vupen.com/english/advisories/2011/0196","http://www.securityfocus.com/bid/45703","http://secunia.com/advisories/43054","https://exchange.xforce.ibmcloud.com/vulnerabilities/64614"],"reported":"2011-01-11","cves":["CVE-2011-0402"],"severity":null,"affected_versions":["<1.15.10"],"description":"dpkg-source in dpkg before 1.14.31 and 1.15.x allows user-assisted remote attackers to modify arbitrary files via a symlink attack on unspecified files in the .pc directory.\n","fixed_versions":[">=1.15.10"]}]},"HTTP-Body":{"main_module":"HTTP::Body","advisories":[{"id":"CPANSA-HTTP-Body-2013-4407","severity":"moderate","cves":["CVE-2013-4407"],"reported":"2013-09-02","references":["https://www.openwall.com/lists/oss-security/2024/04/07/1","https://security-tracker.debian.org/tracker/CVE-2013-4407","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=721634"],"distribution":"HTTP-Body","affected_versions":[">=1.08,<1.23"],"fixed_versions":[">=1.23"],"description":"HTTP::Body::Multipart in the HTTP-Body 1.08, 1.22, and earlier module for Perl uses the part of the uploaded file's name after the first \".\" character as the suffix of a temporary file, which makes it easier for remote attackers to conduct attacks by leveraging subsequent behavior that may assume the suffix is well-formed.\n"}],"versions":[{"version":"0.01","date":"2005-10-06T23:31:10"},{"date":"2005-10-07T19:39:00","version":"0.2"},{"version":"0.03","date":"2005-10-28T00:04:21"},{"version":"0.4","date":"2005-11-09T06:02:28"},{"date":"2005-11-17T04:03:44","version":"0.5"},{"version":"0.6","date":"2006-01-06T11:55:08"},{"date":"2007-03-23T17:02:39","version":"0.7"},{"version":"0.8","date":"2007-03-24T01:48:23"},{"date":"2007-03-27T17:55:21","version":"0.9"},{"version":"1.00","date":"2008-02-23T16:03:17"},{"version":"1.01","date":"2008-02-23T16:16:09"},{"version":"1.02","date":"2008-02-27T22:08:06"},{"version":"1.03","date":"2008-04-07T14:20:46"},{"version":"1.04","date":"2008-06-23T19:41:56"},{"version":"1.05","date":"2008-12-01T22:14:51"},{"date":"2010-01-09T18:23:07","version":"1.06"},{"date":"2010-01-24T19:42:49","version":"1.07"},{"date":"2010-08-19T19:02:08","version":"1.08"},{"date":"2010-08-19T23:11:46","version":"1.09"},{"version":"1.10","date":"2010-10-08T14:52:40"},{"version":"1.11","date":"2010-10-26T14:38:59"},{"version":"1.12","date":"2011-03-20T00:58:03"},{"version":"1.14","date":"2011-11-04T18:44:06"},{"date":"2011-12-05T03:02:21","version":"1.15"},{"version":"1.16","date":"2012-10-03T15:19:24"},{"version":"1.17","date":"2012-10-03T22:04:49"},{"date":"2013-12-06T15:06:26","version":"1.18"},{"date":"2013-12-06T15:07:56","version":"1.19"},{"version":"1.20","date":"2015-01-28T15:21:00"},{"date":"2015-01-29T03:50:10","version":"1.21"},{"version":"1.22","date":"2015-01-29T03:53:01"},{"date":"2024-03-30T03:28:24","version":"1.23"}]},"GBrowse":{"advisories":[{"cves":[],"distribution":"GBrowse","reported":"2017-01-15","references":["https://metacpan.org/changes/distribution/GBrowse"],"id":"CPANSA-GBrowse-2017-01","fixed_versions":[">=2.56"],"description":"An attacker is able to delete other users' accounts. No httponly cookie flag. Cross-site scripting vulnerability in generation of citation text.\n","affected_versions":["<2.56"]},{"affected_versions":["<1.62"],"fixed_versions":[">=1.62"],"description":"Cross-site scripting.\n","id":"CPANSA-GBrowse-2004-01","distribution":"GBrowse","reported":"2004-04-05","references":["https://metacpan.org/changes/distribution/GBrowse"],"cves":[]},{"fixed_versions":[">=1.54"],"description":"Path traversal.\n","affected_versions":["<1.54"],"references":["https://metacpan.org/changes/distribution/GBrowse"],"reported":"2003-08-23","distribution":"GBrowse","cves":[],"id":"CPANSA-GBrowse-2003-01"}],"versions":[{"version":"1.981","date":"2008-12-29T15:38:27"},{"version":"1.982","date":"2008-12-29T17:21:12"},{"version":"1.983","date":"2009-01-06T07:42:56"},{"version":"1.984","date":"2009-01-06T09:17:54"},{"version":"1.985","date":"2009-01-10T12:37:42"},{"date":"2009-01-12T16:58:20","version":"1.986"},{"version":"1.987","date":"2009-01-22T19:49:50"},{"version":"1.988","date":"2009-01-30T00:12:57"},{"version":"1.989","date":"2009-03-10T19:24:17"},{"version":"1.99","date":"2009-04-03T19:29:22"},{"date":"2009-05-04T05:30:31","version":"1.991"},{"date":"2009-05-05T23:40:00","version":"1.992"},{"version":"1.993","date":"2009-05-07T14:11:11"},{"version":"1.994","date":"2009-05-30T22:07:17"},{"version":"1.995","date":"2009-06-08T21:27:08"},{"version":"1.996","date":"2009-07-06T14:12:57"},{"version":"1.997","date":"2009-07-30T16:40:54"},{"date":"2009-08-19T19:19:44","version":"1.9971"},{"version":"1.998","date":"2009-12-09T21:39:37"},{"date":"2009-12-15T15:59:37","version":"1.9982"},{"version":"1.9983","date":"2009-12-18T19:25:25"},{"version":"1.9984","date":"2009-12-22T21:20:40"},{"version":"1.999","date":"2009-12-23T21:56:31"},{"date":"2010-01-28T02:58:41","version":"2.00"},{"version":"2.01","date":"2010-02-09T18:13:33"},{"date":"2010-03-10T05:56:50","version":"2.02"},{"version":"2.03","date":"2010-03-25T16:06:21"},{"version":"2.04","date":"2010-04-18T21:44:27"},{"date":"2010-05-13T03:30:32","version":"2.05"},{"date":"2010-05-13T21:17:05","version":"2.06"},{"version":"2.07","date":"2010-05-17T14:49:41"},{"version":"2.08","date":"2010-05-21T02:52:47"},{"date":"2010-06-10T20:17:32","version":"2.09"},{"date":"2010-06-15T14:20:30","version":"2.10"},{"version":"2.11","date":"2010-06-30T19:15:37"},{"date":"2010-06-30T19:30:03","version":"2.12"},{"version":"2.13","date":"2010-07-05T20:17:39"},{"date":"2010-08-27T15:06:04","version":"2.14"},{"version":"2.15","date":"2010-09-13T22:17:44"},{"version":"2.16","date":"2010-11-01T16:24:01"},{"date":"2010-11-18T17:08:57","version":"2.17"},{"date":"2011-01-18T22:35:59","version":"2.20"},{"version":"2.21","date":"2011-01-22T17:17:34"},{"version":"2.22","date":"2011-01-26T14:31:35"},{"date":"2011-01-30T20:03:25","version":"2.23"},{"date":"2011-01-31T17:19:08","version":"2.24"},{"date":"2011-02-02T18:53:40","version":"2.25"},{"version":"2.26","date":"2011-02-04T18:51:54"},{"date":"2011-04-10T21:07:42","version":"2.27"},{"date":"2011-04-10T21:32:05","version":"2.28"},{"version":"2.29","date":"2011-05-02T16:12:11"},{"date":"2011-05-03T12:17:18","version":"2.30"},{"version":"2.31","date":"2011-05-03T15:50:21"},{"date":"2011-05-04T18:47:51","version":"2.32"},{"version":"2.33","date":"2011-05-07T03:27:32"},{"date":"2011-06-01T15:19:47","version":"2.34"},{"date":"2011-06-03T13:41:28","version":"2.35"},{"date":"2011-06-04T14:58:14","version":"2.36"},{"date":"2011-06-06T21:24:59","version":"2.37"},{"date":"2011-06-09T16:00:48","version":"2.38"},{"date":"2011-06-29T17:45:00","version":"2.39"},{"version":"2.40","date":"2011-09-30T16:56:29"},{"version":"2.41","date":"2011-10-07T13:31:48"},{"version":"2.42","date":"2011-10-12T19:33:22"},{"version":"2.43","date":"2011-10-24T16:43:23"},{"date":"2011-12-08T23:09:26","version":"2.44"},{"date":"2012-01-03T21:35:41","version":"2.45"},{"version":"2.46","date":"2012-02-10T17:28:20"},{"date":"2012-02-16T12:40:04","version":"2.47"},{"version":"2.48","date":"2012-02-24T21:06:10"},{"date":"2012-04-17T23:48:26","version":"2.49"},{"version":"2.50","date":"2012-09-04T16:22:21"},{"date":"2012-09-18T03:01:31","version":"2.51"},{"date":"2012-09-26T02:54:36","version":"2.52"},{"version":"2.53","date":"2012-12-10T11:23:34"},{"date":"2012-12-11T15:49:03","version":"2.54"},{"version":"2.55","date":"2013-07-10T14:51:25"},{"version":"2.56","date":"2017-01-15T21:29:11"}],"main_module":"CGI::Toggle"},"XAO-Web":{"versions":[{"date":"2002-01-03T03:05:25","version":"1.0"},{"date":"2002-01-04T02:47:11","version":"1.01"},{"date":"2002-01-04T03:44:00","version":"1.02"},{"date":"2002-03-19T04:56:54","version":"1.03"},{"date":"2002-11-09T02:33:07","version":"1.04"},{"version":"1.05","date":"2003-11-13T02:15:48"},{"version":"1.05","date":"2003-11-13T07:09:31"},{"version":"1.06","date":"2005-01-14T01:48:49"},{"date":"2005-02-01T03:24:39","version":"1.07"},{"version":"1.45","date":"2017-04-19T20:26:55"},{"version":"1.46","date":"2017-04-20T00:32:26"},{"date":"2017-05-01T19:57:48","version":"1.47"},{"date":"2018-07-07T00:42:57","version":"1.68"},{"date":"2018-07-07T03:29:38","version":"1.69"},{"date":"2018-07-07T16:38:26","version":"1.70"},{"version":"1.71","date":"2018-07-30T13:35:32"},{"version":"1.72","date":"2018-10-20T00:50:11"},{"version":"1.73","date":"2018-10-25T19:16:09"},{"version":"1.74","date":"2018-10-30T01:27:58"},{"version":"1.75","date":"2019-01-10T02:17:29"},{"date":"2019-03-02T17:38:20","version":"1.76"},{"date":"2019-04-26T23:13:56","version":"1.77"},{"version":"1.78","date":"2019-11-20T20:52:59"},{"date":"2019-12-24T02:26:57","version":"1.79"},{"date":"2020-01-10T01:19:32","version":"1.80"},{"version":"1.81","date":"2020-07-21T02:08:41"},{"version":"1.82","date":"2020-08-26T22:28:48"},{"date":"2020-08-26T23:19:26","version":"1.83"},{"date":"2020-09-18T03:22:46","version":"1.84"},{"date":"2020-09-22T23:47:44","version":"1.85"},{"version":"1.86","date":"2020-09-23T00:51:16"},{"date":"2021-06-08T22:38:04","version":"1.87"},{"version":"1.88","date":"2022-04-09T02:06:50"},{"date":"2022-07-02T00:05:43","version":"1.89"},{"date":"2022-12-08T04:50:55","version":"1.90"},{"version":"1.91","date":"2023-05-22T21:52:57"}],"advisories":[{"id":"CPANSA-XAO-Web-2020-01","severity":null,"cves":["CVE-2020-36827"],"reported":"2020-09-18","references":["https://github.com/amaltsev/XAO-Web/commit/20dd1d3bc5b811503f5722a16037b60197fe7ef4","https://metacpan.org/release/AMALTSEV/XAO-Web-1.84/changes"],"distribution":"XAO-Web","affected_versions":["<1.84"],"fixed_versions":[">=1.84"],"description":"Embedded HTML in JSON data was not escaped.\n"}],"main_module":"XAO::Web"},"Net-Dropbear":{"versions":[{"version":"0.01","date":"2015-11-03T18:31:23"},{"date":"2015-11-04T04:17:39","version":"0.02"},{"version":"0.03","date":"2015-11-05T06:49:56"},{"date":"2015-11-07T03:40:31","version":"0.04"},{"date":"2015-11-29T00:37:40","version":"0.06"},{"date":"2016-01-02T05:57:50","version":"0.07"},{"version":"0.08","date":"2016-08-04T05:36:45"},{"version":"0.09","date":"2016-08-08T05:56:46"},{"date":"2016-08-10T05:05:32","version":"0.10"},{"date":"2020-03-17T04:05:13","version":"0.11"},{"date":"2020-03-20T02:33:34","version":"0.12"},{"version":"0.13","date":"2020-03-21T14:51:53"},{"version":"0.14","date":"2021-05-28T04:07:12"},{"version":"0.15","date":"2022-07-01T04:48:35"},{"version":"0.16","date":"2022-07-08T03:18:20"}],"advisories":[{"description":"In LibTomCrypt through 1.18.2, the der_decode_utf8_string function (in der_decode_utf8_string.c) does not properly detect certain invalid UTF-8 sequences. This allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) or read information from other memory locations via carefully crafted DER-encoded data.\n","cves":["CVE-2019-17362"],"affected_versions":["<0"],"fixed_versions":[">0"],"id":"CPANSA-Net-Dropbear-2019-17362","embedded_vulnerability":{"affected_versions":"<0","distributed_version":"1.8.2","name":"libtomcrypt"},"reported":"2019-10-09","references":["https://github.com/atrodo/Net-Dropbear/issues/6","https://github.com/libtom/libtomcrypt/pull/508","https://github.com/libtom/libtomcrypt/issues/507","https://vuldb.com/?id.142995","https://lists.debian.org/debian-lts-announce/2019/10/msg00010.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00020.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00041.html"],"distribution":"Net-Dropbear","severity":"critical","comment":"From the author: \"I have reviewed Dropbear's usage of libtomcrypt, and the function in question for CVE-2019-17362, der_decode_utf8_string, is not used in Dropbear. None of the DER parsing from libtomcrypt is used in Dropbear at all, I have confirmed that the flag to include it is not set, and confirmed that the resultant Dropbear.so that is built by Net::Dropbear does not include any of the der_* symbols.\"\n"}],"main_module":"Net::Dropbear"},"Proc-ProcessTable":{"advisories":[{"description":"ProcessTable.pm in the Proc::ProcessTable module 0.45 for Perl, when TTY information caching is enabled, allows local users to overwrite arbitrary files via a symlink attack on /tmp/TTYDEVS.\n","fixed_versions":[">=0.47"],"affected_versions":[">=0.45,<0.47"],"references":["http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650500","http://www.osvdb.org/77428","http://www.openwall.com/lists/oss-security/2011/11/30/2","http://www.securityfocus.com/bid/50868","https://rt.cpan.org/Public/Bug/Display.html?id=72862","http://www.openwall.com/lists/oss-security/2011/11/30/3","http://secunia.com/advisories/47015","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4363"],"reported":"2012-10-07","distribution":"Proc-ProcessTable","severity":null,"cves":["CVE-2011-4363"],"id":"CPANSA-Proc-ProcessTable-2011-4363"}],"versions":[{"version":"0.01","date":"1998-07-23T12:59:39"},{"version":"0.02","date":"1998-07-24T12:50:40"},{"version":"0.03","date":"1998-07-26T13:18:26"},{"version":"0.04","date":"1998-08-15T21:22:20"},{"version":"0.05","date":"1998-12-09T23:53:30"},{"date":"1998-12-10T04:51:19","version":"0.06"},{"date":"1999-02-05T03:21:51","version":"0.08"},{"date":"1999-02-20T04:27:53","version":"0.09"},{"version":"0.10","date":"1999-02-20T16:36:14"},{"version":"0.11","date":"1999-03-07T00:16:52"},{"date":"1999-03-21T16:07:46","version":"0.12"},{"version":"0.13","date":"1999-05-14T02:10:41"},{"version":"0.14","date":"1999-05-16T01:22:45"},{"version":"0.15","date":"1999-06-02T02:39:22"},{"version":"0.16","date":"1999-08-10T03:45:58"},{"date":"1999-08-19T15:45:19","version":"0.17"},{"version":"0.18","date":"1999-08-19T17:44:22"},{"version":"0.20","date":"1999-09-09T02:45:48"},{"version":"0.21","date":"1999-09-10T16:51:02"},{"version":"0.22","date":"1999-10-05T12:34:33"},{"date":"1999-11-01T13:55:15","version":"0.23"},{"version":"0.24","date":"2000-01-20T20:57:35"},{"date":"2000-02-03T16:28:46","version":"0.25"},{"date":"2000-02-11T21:56:23","version":"0.26"},{"date":"2000-06-29T12:38:46","version":"0.27"},{"date":"2000-08-14T09:25:19","version":"0.28"},{"date":"2001-01-09T12:47:49","version":"0.29"},{"version":"0.30","date":"2001-03-08T02:57:16"},{"version":"0.31","date":"2001-06-01T12:39:15"},{"date":"2001-08-20T02:41:52","version":"0.32"},{"version":"0.33","date":"2001-10-16T13:32:04"},{"date":"2002-02-25T03:17:15","version":"0.34"},{"date":"2002-07-03T04:31:57","version":"0.35"},{"version":"0.36","date":"2002-11-08T02:31:59"},{"date":"2002-11-08T14:59:11","version":"0.37"},{"date":"2002-12-07T03:33:51","version":"0.38"},{"date":"2003-10-03T17:45:51","version":"0.39"},{"date":"2005-07-11T01:33:32","version":"0.40"},{"version":"0.41","date":"2006-07-01T04:27:59"},{"version":"0.42","date":"2008-01-26T05:34:53"},{"version":"0.43","date":"2008-07-18T04:05:51"},{"date":"2008-07-25T14:29:08","version":"0.44"},{"version":"0.45","date":"2008-09-08T15:39:40"},{"version":"0.46","date":"2012-10-19T13:58:48"},{"version":"0.47","date":"2013-02-16T16:06:35"},{"version":"0.48","date":"2013-05-26T22:20:21"},{"date":"2013-12-05T23:31:39","version":"0.49"},{"version":"0.50","date":"2013-12-15T15:47:54"},{"version":"0.50_01","date":"2014-05-17T21:03:43"},{"date":"2014-10-17T22:56:58","version":"0.51"},{"date":"2015-08-23T10:12:37","version":"0.52"},{"date":"2015-08-24T19:36:41","version":"0.53"},{"date":"2018-02-01T21:02:36","version":"0.54"},{"version":"0.55","date":"2018-02-01T21:57:51"},{"date":"2019-02-07T22:38:02","version":"0.56"},{"date":"2019-06-14T21:16:11","version":"0.56_01"},{"version":"0.56_02","date":"2019-06-15T11:28:52"},{"version":"0.57","date":"2019-06-15T18:56:51"},{"version":"0.58","date":"2019-06-15T19:20:02"},{"date":"2019-06-20T19:35:05","version":"0.59"},{"version":"0.60","date":"2021-08-14T16:19:38"},{"date":"2021-08-17T22:50:12","version":"0.61"},{"version":"0.611","date":"2021-08-18T06:57:20"},{"version":"0.612","date":"2021-09-08T10:39:21"},{"version":"0.62","date":"2021-09-13T14:03:14"},{"version":"0.631","date":"2021-09-26T21:58:24"},{"version":"0.632","date":"2021-09-26T22:35:32"},{"version":"0.633","date":"2021-09-26T23:01:20"},{"date":"2021-09-26T23:04:23","version":"0.634"},{"version":"0.635","date":"2023-05-08T06:51:59"},{"date":"2023-06-21T06:25:43","version":"0.636"}],"main_module":"Proc::ProcessTable"},"XML-Atom":{"main_module":"XML::Atom","advisories":[{"fixed_versions":[],"description":"It was discovered that the XML::Atom Perl module before version 0.39 did not disable external entities when parsing XML from potentially untrusted sources. This may allow attackers to gain read access to otherwise protected resources, depending on how the library is used.\n","affected_versions":["<0.39"],"distribution":"XML-Atom","references":["https://seclists.org/oss-sec/2012/q1/549","https://metacpan.org/release/MIYAGAWA/XML-Atom-0.39/source/Changes"],"reported":"2021-07-09","cves":["CVE-2012-1102"],"severity":"high","id":"CPANSA-XML-Atom-2012-1102"}],"versions":[{"date":"2003-09-08T04:47:09","version":"0.01"},{"version":"0.02","date":"2003-09-28T23:11:32"},{"date":"2003-12-05T09:20:27","version":"0.03"},{"version":"0.04","date":"2003-12-15T08:03:04"},{"version":"0.041","date":"2003-12-15T17:10:29"},{"version":"0.05","date":"2004-01-06T05:04:22"},{"version":"0.06","date":"2004-04-24T23:47:03"},{"version":"0.07","date":"2004-05-16T01:13:46"},{"version":"0.08","date":"2004-06-02T06:05:57"},{"version":"0.09","date":"2004-07-30T05:49:54"},{"version":"0.10","date":"2005-01-01T00:20:55"},{"date":"2005-02-24T03:19:08","version":"0.11"},{"version":"0.12","date":"2005-06-07T05:13:21"},{"date":"2005-07-19T21:00:39","version":"0.12_01"},{"version":"0.12_02","date":"2005-08-16T21:46:06"},{"version":"0.13","date":"2005-08-18T07:18:26"},{"date":"2005-09-14T05:38:53","version":"0.13_01"},{"version":"0.14","date":"2005-10-21T04:55:40"},{"date":"2005-11-01T05:55:40","version":"0.15"},{"date":"2005-11-22T21:17:26","version":"0.16"},{"version":"0.17","date":"2006-02-22T23:24:00"},{"date":"2006-03-16T06:14:49","version":"0.18"},{"version":"0.19","date":"2006-03-19T05:03:12"},{"date":"2006-04-30T16:49:38","version":"0.19_01"},{"date":"2006-07-07T06:39:52","version":"0.19_03"},{"date":"2006-07-12T03:44:58","version":"0.20"},{"date":"2006-07-12T17:44:49","version":"0.21"},{"version":"0.21_01","date":"2006-07-19T10:42:43"},{"version":"0.21_02","date":"2006-07-20T08:07:49"},{"date":"2006-07-21T10:15:06","version":"0.21_03"},{"version":"0.22","date":"2006-07-24T20:00:37"},{"date":"2006-08-27T05:53:47","version":"0.22_01"},{"date":"2006-08-27T06:42:17","version":"0.23"},{"date":"2006-11-25T23:03:57","version":"0.24"},{"date":"2006-11-30T23:14:23","version":"0.25"},{"version":"0.25_01","date":"2007-04-27T20:57:39"},{"version":"0.25_02","date":"2007-06-20T19:23:36"},{"date":"2007-09-16T04:24:44","version":"0.26"},{"version":"0.27","date":"2007-09-16T04:41:58"},{"date":"2007-10-04T20:30:48","version":"0.27_01"},{"date":"2007-11-06T21:08:06","version":"0.28"},{"version":"0.29","date":"2008-10-26T00:27:44"},{"version":"0.30","date":"2008-11-12T22:45:37"},{"date":"2008-11-13T21:19:34","version":"0.31"},{"date":"2008-11-23T22:07:41","version":"0.32"},{"date":"2009-01-07T02:00:59","version":"0.33"},{"date":"2009-04-29T17:46:03","version":"0.34"},{"date":"2009-05-01T23:42:30","version":"0.35"},{"date":"2009-12-21T22:02:23","version":"0.36"},{"version":"0.37","date":"2009-12-29T02:32:53"},{"version":"0.38","date":"2011-05-23T02:57:51"},{"version":"0.39","date":"2011-06-21T04:07:51"},{"version":"0.40","date":"2011-09-18T19:43:27"},{"date":"2011-09-27T01:44:56","version":"0.41"},{"version":"0.42","date":"2017-05-12T05:34:02"},{"date":"2021-04-28T20:40:29","version":"0.43"}]},"CGI-Application-Plugin-AutoRunmode":{"main_module":"CGI::Application::Plugin::AutoRunmode","versions":[{"date":"2005-03-04T06:59:51","version":"0.04"},{"date":"2005-03-10T07:22:55","version":"0.05"},{"version":"0.06","date":"2005-06-15T10:20:17"},{"version":"0.07","date":"2005-06-18T02:09:08"},{"version":"0.08","date":"2005-07-17T00:49:10"},{"version":"0.09","date":"2005-09-22T12:31:22"},{"date":"2005-10-16T00:17:47","version":"0.10"},{"version":"0.11","date":"2005-10-18T13:23:50"},{"date":"2005-11-03T01:10:37","version":"0.12"},{"date":"2006-04-08T07:18:44","version":"0.13"},{"version":"0.14","date":"2006-05-21T05:04:48"},{"version":"0.15","date":"2006-12-17T07:46:24"},{"version":"0.16","date":"2009-02-14T09:16:39"},{"version":"0.17","date":"2010-05-21T04:24:45"},{"version":"0.18","date":"2011-02-18T09:23:15"}],"advisories":[{"cves":[],"references":["https://metacpan.org/changes/distribution/CGI-Application-Plugin-AutoRunmode"],"reported":"2005-03-04","distribution":"CGI-Application-Plugin-AutoRunmode","id":"CPANSA-CGI-Application-Plugin-AutoRunmode-2005-01","fixed_versions":[">=0.04"],"description":"Non-word characters are allowed in runmode name.\n","affected_versions":["<0.04"]}]},"Spreadsheet-ParseXLSX":{"versions":[{"date":"2013-07-17T02:45:07","version":"0.01"},{"date":"2013-07-17T15:14:43","version":"0.02"},{"date":"2013-07-26T07:34:38","version":"0.03"},{"date":"2013-07-31T18:28:38","version":"0.04"},{"date":"2013-07-31T22:15:56","version":"0.05"},{"date":"2013-08-29T20:02:30","version":"0.06"},{"date":"2013-09-05T18:34:35","version":"0.07"},{"date":"2013-09-10T18:21:15","version":"0.08"},{"version":"0.09","date":"2013-10-09T14:52:49"},{"version":"0.10","date":"2013-11-06T18:36:10"},{"date":"2013-11-14T00:30:46","version":"0.11"},{"version":"0.12","date":"2013-12-09T20:27:26"},{"date":"2014-01-29T21:32:54","version":"0.13"},{"date":"2014-04-03T16:56:25","version":"0.14"},{"date":"2014-07-05T01:39:06","version":"0.15"},{"date":"2014-07-05T18:55:08","version":"0.16"},{"version":"0.17","date":"2015-03-26T03:38:16"},{"version":"0.18","date":"2015-09-19T06:08:07"},{"date":"2015-12-04T07:38:39","version":"0.19"},{"date":"2015-12-05T18:45:32","version":"0.20"},{"date":"2016-05-23T07:09:47","version":"0.21"},{"version":"0.22","date":"2016-05-25T05:39:15"},{"date":"2016-05-29T03:01:59","version":"0.23"},{"date":"2016-06-25T18:03:32","version":"0.24"},{"version":"0.25","date":"2016-07-15T02:36:28"},{"version":"0.26","date":"2016-08-16T06:35:10"},{"date":"2016-08-16T07:12:41","version":"0.27"},{"version":"0.28","date":"2024-01-02T13:45:35"},{"date":"2024-01-02T17:49:11","version":"0.29"},{"version":"0.30","date":"2024-01-17T11:34:43"},{"date":"2024-01-18T11:30:17","version":"0.31"},{"date":"2024-03-08T11:04:50","version":"0.32"},{"date":"2024-03-08T12:50:37","version":"0.33"},{"date":"2024-03-13T10:28:28","version":"0.34"},{"date":"2024-03-19T16:22:17","version":"0.35"},{"date":"2025-01-24T09:33:40","version":"0.36"}],"advisories":[{"cves":["CVE-2024-22368"],"distribution":"Spreadsheet-ParseXLSX","reported":"2024-01-03","references":["https://github.com/haile01/perl_spreadsheet_excel_rce_poc/blob/main/parse_xlsx_bomb.md","https://github.com/briandfoy/cpan-security-advisory/issues/131","https://nvd.nist.gov/vuln/detail/CVE-2024-22368","https://github.com/haile01/perl_spreadsheet_excel_rce_poc/blob/main/parse_xlsx_bomb.md","https://metacpan.org/dist/Spreadsheet-ParseXLSX/changes","https://github.com/advisories/GHSA-x2hg-844v-frvh"],"id":"CPANSA-Spreadsheet-ParseXLSX-2024-22368","fixed_versions":[">=0.28"],"description":"The Spreadsheet::ParseXLSX package before 0.28 for Perl can encounter an out-of-memory condition during parsing of a crafted XLSX document. This occurs because the memoize implementation does not have appropriate constraints on merged cells.\n","affected_versions":["<0.28"]},{"reported":"2024-01-17","references":["https://metacpan.org/release/NUDDLEGG/Spreadsheet-ParseXLSX-0.30/changes","https://gist.github.com/phvietan/d1c95a88ab6e17047b0248d6bf9eac4a","https://github.com/briandfoy/cpan-security-advisory/issues/134","https://github.com/MichaelDaum/spreadsheet-parsexlsx/issues/10","https://github.com/advisories/GHSA-cxjh-j6f8-vrmf","https://nvd.nist.gov/vuln/detail/CVE-2024-23525"],"distribution":"Spreadsheet-ParseXLSX","cves":["CVE-2024-23525"],"id":"CPANSA-Spreadsheet-ParseXLSX-2024-23525","description":"In default configuration of Spreadsheet::ParseXLSX, whenever we call Spreadsheet::ParseXLSX->new()->parse('user_input_file.xlsx'), we'd be vulnerable for XXE vulnerability if the XLSX file that we are parsing is from user input.\n","fixed_versions":[">=0.30"],"affected_versions":["<0.30"]}],"main_module":"Spreadsheet::ParseXLSX"},"SVG-Sparkline":{"advisories":[{"description":"Invalid data input validation makes it possible to pass arbitrary strings to module loading eval.\n","fixed_versions":[">=1.12"],"affected_versions":["<1.12"],"reported":"2017-05-15","references":["https://metacpan.org/changes/distribution/SVG-Sparkline","https://github.com/gwadej/svg-sparkline/commit/ca83d6eb56aa86f3ca735866ffa9aa97acc2e708"],"distribution":"SVG-Sparkline","cves":[],"id":"CPANSA-SVG-Sparkline-2017-01"}],"versions":[{"date":"2009-04-02T02:42:59","version":"0.1.0"},{"version":"0.1.1","date":"2009-04-03T01:30:19"},{"date":"2009-04-05T21:43:08","version":"0.2.0"},{"version":"0.2.5","date":"2009-04-18T04:46:33"},{"version":"0.2.6","date":"2009-04-21T00:31:44"},{"version":"0.2.7","date":"2009-04-27T03:42:24"},{"date":"2009-05-06T23:20:05","version":"0.3"},{"version":"0.31","date":"2009-05-07T22:11:10"},{"date":"2009-10-19T04:12:52","version":"0.32"},{"version":"0.33","date":"2009-10-21T00:27:30"},{"version":"0.34","date":"2010-05-01T04:50:06"},{"date":"2010-10-30T22:01:18","version":"0.35"},{"version":"0.36","date":"2012-09-04T00:09:32"},{"version":"1","date":"2013-10-24T14:01:00"},{"date":"2014-09-04T02:01:54","version":"1.1"},{"date":"2015-03-03T19:38:44","version":"1.11"},{"version":"1.12","date":"2017-05-15T01:32:51"}],"main_module":"SVG::Sparkline"},"Dancer2":{"main_module":"Dancer2","versions":[{"version":"0.01","date":"2013-02-22T15:39:46"},{"version":"0.02","date":"2013-02-24T11:04:25"},{"date":"2013-03-07T17:30:37","version":"0.03"},{"date":"2013-04-22T19:58:02","version":"0.04"},{"version":"0.05","date":"2013-07-20T16:53:37"},{"date":"2013-07-30T14:29:42","version":"0.06"},{"version":"0.07","date":"2013-08-03T22:17:54"},{"date":"2013-08-18T12:24:31","version":"0.08"},{"version":"0.09","date":"2013-09-01T21:19:26"},{"version":"0.10","date":"2013-09-28T13:29:35"},{"version":"0.11","date":"2013-12-15T13:21:28"},{"date":"2014-04-07T21:05:16","version":"0.12"},{"date":"2014-04-13T17:20:22","version":"0.13"},{"version":"0.140000","date":"2014-04-28T21:16:57"},{"version":"0.140001","date":"2014-05-01T08:50:43"},{"version":"0.140900_01","date":"2014-06-07T20:35:57"},{"version":"0.141000","date":"2014-06-08T20:29:28"},{"date":"2014-06-24T19:18:07","version":"0.142000"},{"date":"2014-07-05T19:43:17","version":"0.143000"},{"version":"0.149000_01","date":"2014-07-23T19:34:51"},{"version":"0.149000_02","date":"2014-08-10T11:53:37"},{"date":"2014-08-16T23:38:39","version":"0.150000"},{"version":"0.151000","date":"2014-10-08T19:51:49"},{"date":"2014-10-14T02:33:06","version":"0.152000"},{"version":"0.153000","date":"2014-10-23T21:48:36"},{"date":"2014-10-29T21:41:13","version":"0.153001"},{"date":"2014-10-30T08:29:15","version":"0.153002"},{"date":"2014-11-17T14:41:14","version":"0.154000"},{"version":"0.155000","date":"2014-11-28T00:21:55"},{"version":"0.155001","date":"2014-11-28T16:44:27"},{"version":"0.155002","date":"2014-12-02T22:02:03"},{"date":"2014-12-03T21:35:35","version":"0.155003"},{"date":"2014-12-04T10:57:08","version":"0.155004"},{"date":"2014-12-07T17:07:21","version":"0.156000"},{"date":"2014-12-08T22:08:30","version":"0.156001"},{"date":"2014-12-14T17:25:53","version":"0.157000"},{"version":"0.157001","date":"2014-12-21T19:42:24"},{"date":"2015-01-01T17:11:48","version":"0.158000"},{"version":"0.159000","date":"2015-02-24T03:54:24"},{"version":"0.159001","date":"2015-02-25T14:33:59"},{"version":"0.159002","date":"2015-03-03T18:25:28"},{"date":"2015-03-23T14:00:19","version":"0.159003"},{"version":"0.160000","date":"2015-04-26T22:15:22"},{"date":"2015-05-14T18:46:02","version":"0.160001"},{"version":"0.160002","date":"2015-06-04T11:07:02"},{"date":"2015-06-06T09:11:43","version":"0.160003"},{"date":"2015-07-08T13:04:02","version":"0.161000"},{"date":"2015-08-28T13:32:02","version":"0.161000_01"},{"date":"2015-09-06T11:13:10","version":"0.162000"},{"version":"0.162000_01","date":"2015-10-13T15:08:16"},{"version":"0.163000","date":"2015-10-15T11:00:10"},{"date":"2015-12-16T22:44:32","version":"0.164000"},{"version":"0.165000","date":"2015-12-17T08:23:24"},{"date":"2016-01-12T18:04:57","version":"0.166000"},{"version":"0.166001","date":"2016-01-22T06:57:11"},{"date":"2016-04-19T19:52:27","version":"0.166001_01"},{"date":"2016-04-29T14:45:41","version":"0.166001_02"},{"version":"0.166001_03","date":"2016-05-27T11:25:55"},{"date":"2016-05-27T12:57:04","version":"0.166001_04"},{"date":"2016-05-31T13:29:37","version":"0.200000"},{"version":"0.200001","date":"2016-06-16T14:00:23"},{"version":"0.200002","date":"2016-06-22T14:41:29"},{"date":"2016-07-05T19:36:46","version":"0.200003"},{"version":"0.200003","date":"2016-07-11T15:21:33"},{"date":"2016-07-22T04:41:26","version":"0.200004"},{"version":"0.201000","date":"2016-07-22T13:28:45"},{"date":"2016-08-13T18:53:07","version":"0.202000"},{"date":"2016-08-25T03:12:19","version":"0.203000"},{"version":"0.203001","date":"2016-09-04T02:01:29"},{"date":"2016-10-11T01:59:49","version":"0.204000"},{"date":"2016-10-17T13:32:25","version":"0.204001"},{"version":"0.204002","date":"2016-12-21T21:47:24"},{"date":"2017-01-25T21:23:22","version":"0.204003"},{"version":"0.204004","date":"2017-01-26T17:31:30"},{"date":"2017-03-10T21:40:43","version":"0.205000"},{"date":"2017-07-11T13:04:56","version":"0.205001"},{"date":"2017-10-17T21:10:03","version":"0.205002"},{"version":"0.206000_01","date":"2018-04-09T00:54:25"},{"version":"0.206000_02","date":"2018-04-10T01:50:18"},{"date":"2018-04-20T02:12:22","version":"0.206000"},{"version":"0.207000","date":"2018-11-14T22:26:15"},{"version":"0.208000","date":"2019-06-19T14:23:06"},{"version":"0.208001","date":"2019-08-05T01:12:14"},{"date":"2019-12-14T21:13:32","version":"0.208002"},{"date":"2019-12-24T05:57:09","version":"0.300000"},{"date":"2020-04-06T16:18:33","version":"0.300001"},{"version":"0.300002","date":"2020-04-07T15:49:22"},{"version":"0.300003","date":"2020-04-09T14:42:55"},{"date":"2020-05-27T00:54:55","version":"0.300004"},{"date":"2021-01-26T20:59:33","version":"0.300005"},{"version":"0.301000","date":"2021-03-15T23:12:49"},{"date":"2021-03-17T12:56:09","version":"0.301001"},{"version":"0.301002","date":"2021-04-18T19:33:05"},{"date":"2021-06-03T13:29:26","version":"0.301003"},{"date":"2021-06-06T17:32:08","version":"0.301004"},{"date":"2022-03-14T02:18:12","version":"0.400000"},{"version":"0.400001","date":"2023-02-05T23:42:54"},{"version":"1.0.0","date":"2023-10-09T14:11:25"},{"version":"1.1.0","date":"2023-12-12T01:29:05"},{"date":"2024-07-18T23:49:14","version":"1.1.1"},{"date":"2024-11-25T13:36:09","version":"1.1.2"}],"advisories":[{"affected_versions":["<0.206000"],"fixed_versions":[">=0.206000"],"description":"There is a potential RCE with regards to Storable. We have added session ID validation to the session engine so that session backends based on Storable can reject malformed session IDs that may lead to exploitation of the RCE.\n","id":"CPANSA-Dancer2-2018-01","cves":[],"severity":"critical","distribution":"Dancer2","reported":"2018-01-30","references":["https://metacpan.org/changes/distribution/Dancer2","http://lists.preshweb.co.uk/pipermail/dancer-users/2018-April/005952.html","https://github.com/PerlDancer/Dancer2/commit/3580f5d0874a9abf5483528f73bda9a7fd9ec7f1"]}]},"ExtUtils-ParseXS":{"advisories":[{"fixed_versions":[">=3.35"],"description":"(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.","affected_versions":["<3.35"],"references":["http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","http://www.debian.org/security/2016/dsa-3628","http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securityfocus.com/bid/92136","http://www.securitytracker.com/id/1036440","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c%40%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://rt.perl.org/Public/Bug/Display.html?id=127834","https://security.gentoo.org/glsa/201701-75","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","http://www.debian.org/security/2016/dsa-3628","http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securityfocus.com/bid/92136","http://www.securitytracker.com/id/1036440","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c%40%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://rt.perl.org/Public/Bug/Display.html?id=127834","https://security.gentoo.org/glsa/201701-75","https://security.gentoo.org/glsa/201812-07"],"reported":"2016-08-02","distribution":"ExtUtils-ParseXS","severity":"high","cves":["CVE-2016-1238"],"id":"CPANSA-ExtUtils-ParseXS-2016-1238"}],"versions":[{"date":"2002-12-09T00:53:36","version":"1.98_01"},{"date":"2003-02-05T18:22:19","version":"1.99"},{"version":"2.00","date":"2003-02-23T22:45:04"},{"date":"2003-03-20T15:25:07","version":"2.01"},{"date":"2003-03-31T00:25:32","version":"2.02"},{"version":"2.03","date":"2003-08-16T22:57:00"},{"version":"2.04","date":"2003-09-04T18:14:59"},{"date":"2003-09-29T15:35:39","version":"2.05"},{"version":"2.06","date":"2003-12-26T15:05:42"},{"date":"2004-01-25T23:04:13","version":"2.07"},{"date":"2004-02-21T03:46:57","version":"2.08"},{"date":"2005-03-27T17:18:20","version":"2.09"},{"version":"2.10","date":"2005-05-31T02:37:25"},{"version":"2.11","date":"2005-06-14T04:04:10"},{"version":"2.12","date":"2005-08-25T01:07:16"},{"version":"2.13","date":"2005-10-04T03:02:19"},{"version":"2.14","date":"2005-10-09T01:52:46"},{"date":"2005-10-10T15:09:54","version":"2.15"},{"date":"2006-09-16T03:35:22","version":"2.16"},{"version":"2.17","date":"2006-11-20T23:08:18"},{"version":"2.18","date":"2007-01-30T02:58:43"},{"date":"2008-02-17T20:29:31","version":"2.19"},{"date":"2008-08-07T03:20:09","version":"2.19_02"},{"date":"2009-06-28T03:01:41","version":"2.19_03"},{"date":"2009-06-29T15:51:33","version":"2.19_04"},{"version":"2.20","date":"2009-07-01T17:49:20"},{"version":"2.20_01","date":"2009-07-08T16:47:56"},{"version":"2.2002","date":"2009-07-18T21:23:28"},{"version":"2.20_03","date":"2009-07-24T03:16:46"},{"date":"2009-08-10T15:44:42","version":"2.20_04"},{"version":"2.20_05","date":"2009-08-23T01:50:17"},{"version":"2.200401","date":"2009-09-15T02:36:48"},{"date":"2009-10-02T05:28:52","version":"2.200402"},{"version":"2.200403","date":"2009-10-02T06:06:00"},{"version":"2.20_06","date":"2009-10-03T03:49:34"},{"version":"2.20_07","date":"2009-10-03T15:28:29"},{"version":"2.21","date":"2009-10-05T15:25:07"},{"date":"2009-12-19T12:43:55","version":"2.21_01"},{"date":"2009-12-19T15:58:28","version":"2.21_02"},{"date":"2010-01-11T20:03:31","version":"2.22"},{"version":"2.2201","date":"2010-01-25T21:14:41"},{"version":"2.2202","date":"2010-01-27T20:07:51"},{"date":"2010-02-11T19:04:49","version":"2.2203"},{"date":"2010-03-10T19:27:43","version":"2.2204"},{"date":"2010-03-10T23:17:47","version":"2.2205"},{"date":"2010-07-04T19:53:47","version":"2.2206"},{"version":"3.00_01","date":"2011-07-12T20:42:45"},{"version":"3.00_02","date":"2011-07-14T13:21:26"},{"date":"2011-07-23T15:09:23","version":"3.00_03"},{"date":"2011-07-27T20:24:26","version":"3.00_04"},{"date":"2011-07-27T20:57:56","version":"3.00_05"},{"date":"2011-08-04T16:06:39","version":"3.01"},{"date":"2011-08-04T18:09:18","version":"3.02"},{"version":"3.03","date":"2011-08-11T06:25:52"},{"date":"2011-08-21T11:40:28","version":"3.03_02"},{"version":"3.03_03","date":"2011-08-24T17:51:31"},{"date":"2011-08-25T06:33:30","version":"3.04"},{"date":"2011-08-28T15:57:42","version":"3.04_01"},{"version":"3.04_02","date":"2011-09-03T13:31:37"},{"date":"2011-09-04T16:55:05","version":"3.04_03"},{"version":"3.04_04","date":"2011-09-12T06:28:10"},{"date":"2011-10-05T06:18:44","version":"3.05"},{"version":"3.06","date":"2011-12-07T07:35:08"},{"date":"2011-12-07T13:15:12","version":"3.07"},{"date":"2011-12-19T17:10:40","version":"3.08"},{"date":"2011-12-28T18:05:57","version":"3.09"},{"version":"3.11","date":"2011-12-29T17:00:16"},{"date":"2012-01-28T12:07:45","version":"3.13_01"},{"date":"2012-02-01T17:51:52","version":"3.14"},{"version":"3.15","date":"2012-02-02T07:15:27"},{"version":"3.18","date":"2012-11-19T06:42:48"},{"date":"2013-04-11T18:19:45","version":"3.18_01"},{"date":"2013-04-15T05:41:18","version":"3.18_02"},{"date":"2013-04-19T16:47:41","version":"3.18_03"},{"date":"2013-06-20T15:51:15","version":"3.18_04"},{"date":"2013-08-09T17:14:04","version":"3.21"},{"version":"3.22","date":"2013-08-29T17:31:29"},{"version":"3.24","date":"2014-03-07T09:35:16"},{"version":"3.29_01","date":"2015-08-10T08:49:21"},{"date":"2015-08-31T08:44:00","version":"3.30"},{"version":"3.35","date":"2017-07-31T15:52:17"},{"date":"2017-12-18T12:31:00","version":"3.36_03"},{"date":"2021-04-17T17:48:59","version":"3.43_02"},{"version":"3.44","date":"2022-01-06T23:02:34"},{"date":"2023-09-02T13:28:52","version":"3.51"},{"dual_lived":1,"date":"2006-01-28T00:00:00","version":"2.15_02","perl_release":"5.009003"},{"version":"2.18_02","perl_release":"5.010000","dual_lived":1,"date":"2007-12-18T00:00:00"},{"date":"2010-08-20T00:00:00","dual_lived":1,"version":"2.2207","perl_release":"5.013004"},{"version":"2.2208","perl_release":"5.013008","dual_lived":1,"date":"2010-12-20T00:00:00"},{"version":"2.2209","perl_release":"5.013009","date":"2011-01-20T00:00:00","dual_lived":1},{"version":"2.2210","perl_release":"5.014000","dual_lived":1,"date":"2011-05-14T00:00:00"},{"version":"3.03_01","perl_release":"5.015002","dual_lived":1,"date":"2011-08-20T00:00:00"},{"version":"3.12","perl_release":"5.015007","dual_lived":1,"date":"2012-01-20T00:00:00"},{"date":"2012-02-20T00:00:00","dual_lived":1,"perl_release":"5.015008","version":"3.16"},{"perl_release":"5.017","version":"3.17","dual_lived":1,"date":"2012-05-26T00:00:00"},{"perl_release":"5.019001","version":"3.19","dual_lived":1,"date":"2013-06-21T00:00:00"},{"perl_release":"5.019004","version":"3.23","date":"2013-09-20T00:00:00","dual_lived":1},{"date":"2014-06-20T00:00:00","dual_lived":1,"perl_release":"5.021001","version":"3.25"},{"dual_lived":1,"date":"2014-11-20T00:00:00","perl_release":"5.021006","version":"3.26"},{"dual_lived":1,"date":"2014-12-20T00:00:00","perl_release":"5.021007","version":"3.27"},{"date":"2015-04-20T00:00:00","dual_lived":1,"version":"3.28","perl_release":"5.021011"},{"date":"2015-08-20T00:00:00","dual_lived":1,"version":"3.29","perl_release":"5.023002"},{"perl_release":"5.023007","version":"3.31","dual_lived":1,"date":"2016-01-20T00:00:00"},{"version":"3.32","perl_release":"5.025002","dual_lived":1,"date":"2016-06-20T00:00:00"},{"version":"3.33","perl_release":"5.025003","date":"2016-07-20T00:00:00","dual_lived":1},{"dual_lived":1,"date":"2017-03-20T00:00:00","version":"3.34","perl_release":"5.025011"},{"dual_lived":1,"date":"2017-11-20T00:00:00","perl_release":"5.027006","version":"3.36"},{"dual_lived":1,"date":"2018-02-20T00:00:00","version":"3.38","perl_release":"5.027009"},{"dual_lived":1,"date":"2018-03-20T00:00:00","perl_release":"5.02701","version":"3.39"},{"version":"3.40","perl_release":"5.029006","dual_lived":1,"date":"2018-12-18T00:00:00"},{"dual_lived":1,"date":"2020-08-20T00:00:00","version":"3.41","perl_release":"5.033001"},{"perl_release":"5.033005","version":"3.42","dual_lived":1,"date":"2020-12-20T00:00:00"},{"date":"2021-04-20T00:00:00","dual_lived":1,"version":"3.43","perl_release":"5.033009"},{"perl_release":"5.03501","version":"3.45","dual_lived":1,"date":"2022-03-20T00:00:00"},{"perl_release":"5.037004","version":"3.46","dual_lived":1,"date":"2022-09-20T00:00:00"},{"version":"3.48","perl_release":"5.037006","dual_lived":1,"date":"2022-11-20T00:00:00"},{"perl_release":"5.037007","version":"3.49","dual_lived":1,"date":"2022-12-20T00:00:00"},{"version":"3.50","perl_release":"5.037011","dual_lived":1,"date":"2023-04-20T00:00:00"}],"main_module":"ExtUtils::ParseXS"},"Term-ReadLine-Gnu":{"versions":[{"version":"0.06","date":"1997-02-07T02:03:51"},{"version":"0.07","date":"1997-03-26T07:17:23"},{"date":"1997-08-25T15:02:01","version":"0.09"},{"date":"1998-03-31T15:49:08","version":"0.10"},{"version":"1.00","date":"1998-04-17T05:23:29"},{"version":"1.01","date":"1998-05-13T15:45:47"},{"date":"1998-09-30T16:10:02","version":"1.03"},{"version":"1.04","date":"1999-02-22T17:28:32"},{"version":"1.05","date":"1999-04-10T16:08:54"},{"date":"1999-05-05T14:55:21","version":"1.06"},{"version":"1.07","date":"1999-07-19T15:13:19"},{"date":"1999-12-30T13:37:18","version":"1.08"},{"version":"1.09","date":"2000-04-03T18:05:33"},{"version":"1.10","date":"2001-04-22T14:23:37"},{"version":"1.11","date":"2001-10-28T04:38:19"},{"version":"1.12","date":"2002-03-31T05:54:31"},{"date":"2002-07-28T05:07:18","version":"1.13"},{"version":"1.14","date":"2003-03-17T03:59:29"},{"date":"2004-10-17T20:00:06","version":"1.15"},{"date":"2006-04-02T01:36:28","version":"1.16"},{"version":"1.17","date":"2008-02-07T15:00:09"},{"version":"1.17","date":"2008-02-07T15:52:11"},{"date":"2009-02-27T14:14:29","version":"1.18"},{"date":"2009-03-20T17:00:37","version":"1.19"},{"version":"1.20","date":"2010-05-02T14:26:20"},{"date":"2014-03-01T17:19:57","version":"1.21"},{"version":"1.22","date":"2014-03-05T14:48:24"},{"date":"2014-03-19T15:53:44","version":"1.23"},{"version":"1.24","date":"2014-03-23T11:58:51"},{"version":"1.25","date":"2014-12-20T13:25:24"},{"version":"1.26","date":"2015-01-31T12:30:45"},{"version":"1.27","date":"2015-09-06T06:03:05"},{"date":"2015-09-21T13:14:52","version":"1.28"},{"date":"2016-02-29T14:06:51","version":"1.29"},{"version":"1.30","date":"2016-03-01T15:55:22"},{"date":"2016-03-06T00:45:52","version":"1.31"},{"date":"2016-06-07T15:25:50","version":"1.32"},{"date":"2016-06-09T17:11:29","version":"1.33"},{"date":"2016-06-12T14:53:40","version":"1.34"},{"date":"2016-11-03T14:36:40","version":"1.35"},{"version":"1.36","date":"2019-01-14T05:39:06"},{"date":"2020-12-27T03:26:23","version":"1.37"},{"date":"2021-02-22T09:48:52","version":"1.38"},{"version":"1.39","date":"2021-02-22T14:36:24"},{"version":"1.40","date":"2021-02-23T07:24:27"},{"version":"1.41","date":"2021-05-01T14:45:09"},{"version":"1.42","date":"2021-05-07T03:30:02"},{"version":"1.43","date":"2022-10-01T08:45:18"},{"date":"2022-11-06T14:03:08","version":"1.44"},{"version":"1.45","date":"2022-11-27T13:23:27"},{"date":"2023-07-01T09:18:33","version":"1.46"}],"advisories":[{"external_vulnerability":{"distributed_version":"<=6.3","name":"readline"},"description":"The _rl_tropen function in util.c in GNU readline before 6.3 patch 3 allows local users to create or overwrite arbitrary files via a symlink attack on a /var/tmp/rltrace.[PID] file.\n","cves":["CVE-2014-2524"],"affected_versions":["<1.27"],"fixed_versions":[">=1.27"],"id":"CPANSA-Term-ReadLine-Gnu-2014-2524","severity":null,"comment":"The presense of affected versions of Term-ReadLine-Gnu suggests that a vulnerable version of the readline linrary is installed on the host system.\n","distribution":"Term-ReadLine-Gnu","references":["https://bugzilla.redhat.com/show_bug.cgi?id=1077023","http://lists.gnu.org/archive/html/bug-readline/2014-03/msg00057.html","http://seclists.org/oss-sec/2014/q1/579","http://seclists.org/oss-sec/2014/q1/587","https://lists.fedoraproject.org/pipermail/package-announce/2014-July/135686.html","http://www.mandriva.com/security/advisories?name=MDVSA-2014:154","http://advisories.mageia.org/MGASA-2014-0319.html","http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html","http://www.mandriva.com/security/advisories?name=MDVSA-2015:132"],"reported":"2014-08-20"}],"main_module":"Term::ReadLine::Gnu"},"Search-OpenSearch-Server":{"main_module":"Search::OpenSearch::Server","versions":[{"date":"2010-05-28T03:07:46","version":"0.01"},{"date":"2010-05-29T01:11:09","version":"0.02"},{"version":"0.03","date":"2010-06-23T01:22:53"},{"date":"2010-06-26T21:08:31","version":"0.04"},{"version":"0.05","date":"2011-01-08T04:05:22"},{"date":"2011-09-26T18:12:08","version":"0.06"},{"version":"0.07","date":"2011-09-26T18:16:12"},{"version":"0.08","date":"2011-09-30T03:15:51"},{"version":"0.09","date":"2011-10-23T01:42:30"},{"version":"0.10","date":"2012-05-01T02:22:52"},{"version":"0.11","date":"2012-07-15T03:32:57"},{"date":"2012-07-27T02:42:45","version":"0.12"},{"version":"0.13","date":"2012-08-07T01:48:25"},{"date":"2012-08-10T03:10:13","version":"0.14"},{"version":"0.15","date":"2012-08-21T02:34:37"},{"version":"0.16","date":"2012-08-21T17:47:00"},{"version":"0.17","date":"2012-09-04T01:54:00"},{"date":"2012-09-12T03:42:03","version":"0.18"},{"version":"0.19","date":"2012-09-13T14:06:58"},{"version":"0.20","date":"2012-09-20T02:21:37"},{"version":"0.21","date":"2012-10-15T04:32:38"},{"date":"2012-11-08T03:20:16","version":"0.22"},{"date":"2012-11-21T19:01:22","version":"0.23"},{"date":"2012-11-26T19:37:12","version":"0.24"},{"version":"0.25","date":"2012-12-18T19:11:36"},{"version":"0.26","date":"2013-01-04T19:08:19"},{"date":"2013-06-14T02:28:09","version":"0.27"},{"date":"2014-03-02T22:22:17","version":"0.28"},{"version":"0.299_01","date":"2014-04-23T18:20:52"},{"date":"2014-04-24T02:56:24","version":"0.299_02"},{"date":"2014-06-05T07:29:19","version":"0.299_03"},{"date":"2014-06-08T04:57:40","version":"0.300"},{"version":"0.301","date":"2015-08-14T20:04:12"}],"advisories":[{"id":"CPANSA-Search-OpenSearch-Server-2012-01","distribution":"Search-OpenSearch-Server","references":["https://metacpan.org/changes/distribution/Search-OpenSearch-Server","https://github.com/karpet/search-opensearch-server/commit/69d53fde9d70fe12e1f592de482601c43c45a278"],"reported":"2012-08-31","cves":[],"affected_versions":["<0.17"],"description":"Arbitrary Perl methods could be called via HTTP like RPC.\n","fixed_versions":[">=0.17"]}]},"CGI-apacheSSI":{"versions":[{"date":"2014-08-20T22:55:20","version":"0.93"},{"date":"2016-01-30T12:57:47","version":"0.94"},{"version":"0.95","date":"2016-01-31T22:48:55"},{"version":"0.96","date":"2016-02-01T00:36:49"}],"advisories":[{"id":"CPANSA-CGI-apacheSSI-2016-01","cves":[],"reported":"2016-01-31","references":["https://metacpan.org/changes/distribution/CGI-apacheSSI"],"distribution":"CGI-apacheSSI","affected_versions":["<0.95"],"description":"Security and parsing problems with \"include\" calls.\n","fixed_versions":[">=0.95"]}],"main_module":"CGI::apacheSSI"},"Module-Signature":{"main_module":"Module::Signature","advisories":[{"id":"CPANSA-Module-Signature-2013-01","cves":["CVE-2013-2145"],"distribution":"Module-Signature","references":["https://metacpan.org/changes/distribution/Module-Signature"],"reported":"2013-08-19","affected_versions":["<0.72"],"description":"The cpansign verify functionality in the Module::Signature module before 0.72 for Perl allows attackers to bypass the signature check and execute arbitrary code via a SIGNATURE file with a \"special unknown cipher\" that references an untrusted module in Digest/.\n","fixed_versions":[">=0.72"]}],"versions":[{"version":"0.02","date":"2002-08-13T14:04:00"},{"version":"0.03","date":"2002-08-13T15:48:18"},{"version":"0.04","date":"2002-08-14T08:03:45"},{"version":"0.05","date":"2002-08-14T09:28:41"},{"date":"2002-10-10T15:22:33","version":"0.06"},{"version":"0.07","date":"2002-10-11T04:16:01"},{"date":"2002-10-11T19:32:19","version":"0.08"},{"version":"0.09","date":"2002-10-12T10:33:29"},{"date":"2002-10-12T11:10:21","version":"0.10"},{"version":"0.11","date":"2002-10-12T19:23:48"},{"version":"0.12","date":"2002-10-12T22:55:54"},{"date":"2002-10-13T05:22:45","version":"0.13"},{"date":"2002-10-17T06:14:07","version":"0.14"},{"version":"0.15","date":"2002-10-17T22:01:57"},{"version":"0.16","date":"2002-10-28T23:37:00"},{"version":"0.17","date":"2002-10-30T07:05:06"},{"version":"0.18","date":"2002-11-04T15:08:41"},{"date":"2002-11-04T15:13:45","version":"0.19"},{"version":"0.20","date":"2002-11-04T15:24:41"},{"date":"2002-11-22T10:28:48","version":"0.21"},{"version":"0.23","date":"2003-05-15T18:44:28"},{"date":"2003-07-08T02:49:57","version":"0.24"},{"date":"2003-07-16T06:31:58","version":"0.25"},{"date":"2003-07-17T14:03:19","version":"0.26"},{"version":"0.27","date":"2003-07-28T14:31:54"},{"date":"2003-07-29T15:30:55","version":"0.28"},{"version":"0.29","date":"2003-08-08T02:54:01"},{"version":"0.30","date":"2003-08-10T13:35:38"},{"version":"0.31","date":"2003-08-10T17:17:19"},{"version":"0.32","date":"2003-08-11T09:15:13"},{"date":"2003-08-12T04:11:59","version":"0.33"},{"version":"0.34","date":"2003-08-18T15:32:45"},{"version":"0.35","date":"2003-08-27T07:08:31"},{"version":"0.36","date":"2003-10-28T04:22:56"},{"date":"2003-11-06T10:55:07","version":"0.37"},{"version":"0.38","date":"2004-01-01T10:14:15"},{"version":"0.39","date":"2004-06-17T15:17:14"},{"version":"0.40","date":"2004-07-01T12:18:17"},{"version":"0.41","date":"2004-07-04T08:19:11"},{"date":"2004-11-20T06:19:22","version":"0.42"},{"date":"2004-12-16T06:45:55","version":"0.43"},{"version":"0.44","date":"2004-12-16T07:17:30"},{"date":"2005-08-09T04:23:46","version":"0.45"},{"date":"2005-08-21T08:16:22","version":"0.50"},{"version":"0.51","date":"2006-01-01T18:41:57"},{"version":"0.52","date":"2006-01-18T16:32:37"},{"version":"0.53","date":"2006-01-31T05:02:24"},{"version":"0.54","date":"2006-05-11T17:12:46"},{"version":"0.55","date":"2006-07-30T01:15:07"},{"date":"2009-11-16T14:59:35","version":"0.60"},{"date":"2009-11-18T16:58:07","version":"0.61"},{"version":"0.62","date":"2010-03-23T21:21:37"},{"version":"0.62","date":"2010-03-28T02:49:21"},{"version":"0.62","date":"2010-05-08T22:55:43"},{"date":"2010-09-03T19:55:36","version":"0.65"},{"date":"2010-09-06T20:58:24","version":"0.66"},{"version":"0.67","date":"2011-04-17T15:09:22"},{"date":"2011-05-13T09:55:20","version":"0.68"},{"date":"2012-11-02T15:20:28","version":"0.69"},{"date":"2012-11-28T17:49:21","version":"0.70"},{"date":"2013-06-04T10:29:18","version":"0.71"},{"date":"2013-06-05T15:21:34","version":"0.72"},{"date":"2013-06-05T20:57:10","version":"0.73"},{"date":"2015-04-06T18:39:32","version":"0.74"},{"version":"0.75","date":"2015-04-06T20:58:34"},{"date":"2015-04-08T10:13:11","version":"0.76"},{"date":"2015-04-08T11:47:26","version":"0.77"},{"date":"2015-04-09T09:00:30","version":"0.78"},{"version":"0.79","date":"2015-05-18T15:18:02"},{"version":"0.80","date":"2016-06-07T06:36:30"},{"version":"0.81","date":"2016-09-05T06:41:06"},{"version":"0.81","date":"2018-08-26T15:19:13"},{"date":"2018-08-29T08:35:25","version":"0.83"},{"date":"2020-06-25T13:01:10","version":"0.84"},{"date":"2020-06-25T13:10:23","version":"0.86"},{"date":"2020-07-04T07:16:32","version":"0.87"},{"date":"2021-12-18T03:39:32","version":"0.87"},{"date":"2024-09-14T13:57:16","version":"0.89"},{"date":"2024-09-15T22:11:10","version":"0.89"}]},"ActivePerl":{"advisories":[{"id":"CPANSA-ActivePerl-2012-5377","references":["https://www.htbridge.com/advisory/HTB23108","http://osvdb.org/86177"],"reported":"2012-10-11","distribution":"ActivePerl","severity":null,"cves":["CVE-2012-5377"],"affected_versions":["=5.16.1.1601"],"darkpan":"true","description":"Untrusted search path vulnerability in the installation functionality in ActivePerl 5.16.1.1601, when installed in the top-level C:\\ directory, allows local users to gain privileges via a Trojan horse DLL in the C:\\Perl\\Site\\bin directory, which is added to the PATH system environment variable, as demonstrated by a Trojan horse wlbsctrl.dll file used by the \"IKE and AuthIP IPsec Keying Modules\" system service in Windows Vista SP1, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8 Release Preview.\n","fixed_versions":[]},{"id":"CPANSA-ActivePerl-2006-2856","severity":null,"cves":["CVE-2006-2856"],"reported":"2006-06-06","references":["http://secunia.com/advisories/20328","http://www.securityfocus.com/bid/18269","http://www.osvdb.org/25974","http://www.vupen.com/english/advisories/2006/2140","https://exchange.xforce.ibmcloud.com/vulnerabilities/26915"],"distribution":"ActivePerl","darkpan":"true","affected_versions":["=5.8.8.817"],"description":"ActiveState ActivePerl 5.8.8.817 for Windows configures the site/lib directory with \"Users\" group permissions for changing files, which allows local users to gain privileges by creating a malicious sitecustomize.pl file in that directory. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.\n","fixed_versions":[]},{"affected_versions":["<=5.8.1"],"darkpan":"true","fixed_versions":[],"description":"Integer overflow in the duplication operator in ActivePerl allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large multiplier, which may trigger a buffer overflow.\n","id":"CPANSA-ActivePerl-2004-2286","distribution":"ActivePerl","references":["http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0878.html","http://www.securityfocus.com/bid/10380","https://exchange.xforce.ibmcloud.com/vulnerabilities/16224"],"reported":"2004-12-31","cves":["CVE-2004-2286"],"severity":null},{"description":"ActivePerl 5.8.x and others, and Larry Wall's Perl 5.6.1 and others, when running on Windows systems, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long argument to the system command, which leads to a stack-based buffer overflow. NOTE: it is unclear whether this bug is in Perl or the OS API that is used by Perl.\n","fixed_versions":[],"darkpan":"true","affected_versions":["<5.10"],"severity":null,"cves":["CVE-2004-2022"],"reported":"2004-12-31","references":["http://www.oliverkarow.de/research/ActivePerlSystemBOF.txt","http://www.perlmonks.org/index.pl?node_id=354145","http://www.securityfocus.com/bid/10375","http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0905.html","http://marc.info/?l=full-disclosure&m=108489112131099&w=2","http://marc.info/?l=full-disclosure&m=108482796105922&w=2","http://marc.info/?l=full-disclosure&m=108483058514596&w=2","http://marc.info/?l=bugtraq&m=108489894009025&w=2","https://exchange.xforce.ibmcloud.com/vulnerabilities/16169"],"distribution":"ActivePerl","id":"CPANSA-ActivePerl-2004-2022"},{"description":"Buffer overflow in the win32_stat function for (1) ActiveState's ActivePerl and (2) Larry Wall's Perl before 5.8.3 allows local or remote attackers to execute arbitrary commands via filenames that end in a backslash character.\n","fixed_versions":[],"affected_versions":[],"darkpan":"true","reported":"2004-05-04","references":["http://www.kb.cert.org/vuls/id/722414","http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/019794.html","http://public.activestate.com/cgi-bin/perlbrowse?patch=22552","http://www.idefense.com/application/poi/display?id=93&type=vulnerabilities","http://marc.info/?l=bugtraq&m=108118694327979&w=2","https://exchange.xforce.ibmcloud.com/vulnerabilities/15732"],"distribution":"ActivePerl","severity":null,"cves":["CVE-2004-0377"],"id":"CPANSA-ActivePerl-2004-0377"},{"cves":["CVE-2001-0815"],"severity":null,"distribution":"ActivePerl","reported":"2001-12-06","references":["http://bugs.activestate.com/show_bug.cgi?id=18062","http://www.securityfocus.com/bid/3526","http://www.osvdb.org/678","http://marc.info/?l=bugtraq&m=100583978302585&w=2","https://exchange.xforce.ibmcloud.com/vulnerabilities/7539"],"id":"CPANSA-ActivePerl-2001-0815","description":"Buffer overflow in PerlIS.dll in Activestate ActivePerl 5.6.1.629 and earlier allows remote attackers to execute arbitrary code via an HTTP request for a long filename that ends in a .pl extension.\n","fixed_versions":[],"darkpan":"true","affected_versions":["<=5.6.1.629"]}],"versions":[],"main_module":""},"MySQL-Admin":{"main_module":"MySQL::Admin","versions":[{"date":"2009-04-05T07:27:17","version":"0.41"},{"version":"0.42","date":"2009-04-25T12:13:07"},{"date":"2009-05-02T16:39:11","version":"0.43"},{"version":"0.44","date":"2009-05-06T16:32:16"},{"date":"2009-09-20T10:34:08","version":"0.47"},{"date":"2009-09-20T17:52:11","version":"0.48"},{"version":"0.5","date":"2009-09-20T19:27:03"},{"date":"2009-09-23T13:03:36","version":"0.51"},{"version":"0.52","date":"2009-09-26T10:35:54"},{"version":"0.54","date":"2009-09-28T06:12:57"},{"version":"0.55","date":"2009-09-29T10:34:19"},{"version":"0.56","date":"2009-09-30T16:13:36"},{"version":"0.57","date":"2009-10-03T07:37:25"},{"version":"0.58","date":"2009-10-04T06:02:37"},{"date":"2009-10-04T09:07:10","version":"0.59"},{"date":"2009-10-05T15:31:56","version":"0.6"},{"date":"2009-10-13T13:03:13","version":"0.61"},{"version":"0.62","date":"2009-10-13T13:28:16"},{"version":"0.65","date":"2015-03-22T15:18:03"},{"date":"2015-03-24T07:27:33","version":"0.66"},{"version":"0.67","date":"2015-03-26T19:31:05"},{"version":"0.68","date":"2015-03-30T18:13:38"},{"version":"0.69","date":"2015-04-01T20:54:59"},{"version":"0.7","date":"2015-04-02T18:13:25"},{"version":"0.71","date":"2015-04-02T20:01:04"},{"date":"2015-04-06T19:38:13","version":"0.72"},{"date":"2015-04-07T17:24:44","version":"0.73"},{"date":"2015-04-09T20:30:39","version":"0.74"},{"version":"0.75","date":"2015-04-12T19:12:02"},{"version":"0.76","date":"2015-04-18T10:10:22"},{"date":"2015-04-23T19:09:21","version":"0.77"},{"date":"2015-06-19T21:18:27","version":"0.79"},{"date":"2015-06-20T15:56:45","version":"0.8"},{"version":"0.81","date":"2015-06-21T11:51:26"},{"date":"2015-07-09T20:24:39","version":"0.84"},{"date":"2015-07-10T12:25:42","version":"0.85"},{"version":"0.86","date":"2015-07-11T17:51:30"},{"date":"2015-07-26T19:47:51","version":"0.87"},{"version":"0.89","date":"2015-10-10T14:46:47"},{"date":"2015-10-31T17:56:24","version":"0.9"},{"date":"2015-11-01T11:42:27","version":"0.91"},{"date":"2015-11-01T13:05:50","version":"0.92"},{"date":"2015-12-27T20:50:17","version":"0.93"},{"date":"2016-01-25T20:30:24","version":"0.94"},{"date":"2016-01-26T09:59:39","version":"0.95"},{"date":"2016-01-26T13:59:30","version":"0.96"},{"date":"2016-01-28T09:10:44","version":"0.97"},{"version":"0.98","date":"2016-02-03T21:51:55"},{"version":"0.99","date":"2016-02-06T07:24:22"},{"version":"1","date":"2016-02-06T10:01:55"},{"date":"2016-02-06T17:43:58","version":"1.01"},{"version":"1.02","date":"2016-02-14T18:20:01"},{"version":"1.03","date":"2016-02-23T12:55:34"},{"date":"2016-02-24T14:56:54","version":"1.04"},{"version":"1.05","date":"2016-05-15T18:28:42"},{"date":"2016-06-25T20:34:51","version":"1.06"},{"version":"1.07","date":"2016-06-26T11:54:44"},{"date":"2016-10-26T20:01:37","version":"1.08"},{"version":"1.09","date":"2016-10-26T20:17:36"},{"version":"1.1","date":"2017-01-25T20:32:12"},{"version":"1.11","date":"2017-01-26T20:40:27"},{"version":"1.12","date":"2017-01-29T19:25:00"},{"version":"1.13","date":"2018-06-03T15:06:18"},{"date":"2018-06-10T16:38:09","version":"1.14"},{"date":"2018-07-01T19:20:11","version":"1.15"},{"version":"1.16","date":"2018-07-24T05:59:11"},{"version":"1.17","date":"2019-04-22T13:37:27"},{"date":"2019-05-26T14:49:11","version":"1.18"}],"advisories":[{"distribution":"MySQL-Admin","reported":null,"references":["https://metacpan.org/dist/MySQL-Admin/changes"],"cves":[],"severity":null,"id":"CPANSA-MySQL-Admin-1-1","fixed_versions":[">=0.34"],"description":"Unspecified security issues.\n","affected_versions":["<0.34"]}]},"Kossy":{"main_module":"Kossy","advisories":[{"affected_versions":["<0.60"],"description":"Flaw in defense from JSON hijacking.\n","fixed_versions":[">=0.60"],"id":"CPANSA-Kossy-2021-01","distribution":"Kossy","reported":"2021-08-29","references":["https://github.com/kazeburo/Kossy/pull/16","https://metacpan.org/dist/Kossy/changes"],"cves":["CVE-2021-47157"],"severity":null}],"versions":[{"date":"2011-11-29T08:45:37","version":"0.05"},{"date":"2012-01-05T01:58:20","version":"0.06"},{"version":"0.07","date":"2012-02-17T03:11:05"},{"version":"0.08","date":"2012-04-24T10:06:21"},{"version":"0.09","date":"2012-05-17T08:52:24"},{"date":"2012-06-19T02:16:23","version":"0.10"},{"version":"0.11","date":"2012-07-24T12:51:12"},{"date":"2012-08-24T09:24:50","version":"0.12"},{"version":"0.13","date":"2012-12-05T02:26:49"},{"date":"2013-03-14T13:28:06","version":"0.14"},{"date":"2013-04-04T15:38:05","version":"0.14"},{"date":"2013-07-16T04:32:43","version":"0.16"},{"version":"0.17","date":"2013-07-16T04:40:39"},{"date":"2013-08-08T07:08:09","version":"0.18"},{"date":"2013-08-30T07:04:23","version":"0.19"},{"date":"2013-10-09T06:49:21","version":"0.20"},{"version":"0.21","date":"2013-10-10T06:42:16"},{"date":"2013-10-15T02:46:09","version":"0.22"},{"date":"2013-10-21T05:21:48","version":"0.23"},{"version":"0.24","date":"2013-10-31T04:44:36"},{"version":"0.25","date":"2013-11-06T02:29:36"},{"date":"2013-11-12T02:17:30","version":"0.26"},{"date":"2013-11-12T05:48:05","version":"0.27"},{"date":"2013-11-28T01:33:03","version":"0.28"},{"date":"2014-02-12T04:48:29","version":"0.30"},{"version":"0.31","date":"2014-02-12T04:56:17"},{"date":"2014-02-19T06:55:53","version":"0.32"},{"date":"2014-02-19T16:20:13","version":"0.33"},{"version":"0.34","date":"2014-02-19T17:19:43"},{"date":"2014-05-28T15:13:06","version":"0.34"},{"date":"2014-05-28T15:51:34","version":"0.34"},{"version":"0.37","date":"2014-05-28T16:50:27"},{"date":"2014-05-29T06:37:53","version":"0.38"},{"version":"0.39","date":"2014-10-20T05:47:47"},{"version":"0.40","date":"2016-07-19T15:04:31"},{"version":"0.50","date":"2021-08-26T13:50:58"},{"version":"0.60","date":"2021-09-16T12:04:39"},{"version":"0.61","date":"2023-11-06T14:27:18"},{"date":"2023-11-09T08:57:59","version":"0.62"},{"version":"0.63","date":"2023-11-13T02:24:42"}]},"Safe":{"advisories":[{"id":"CPANSA-Safe-2010-1447","reported":"2010-05-19","references":["https://bugs.launchpad.net/bugs/cve/2010-1447","http://www.vupen.com/english/advisories/2010/1167","http://secunia.com/advisories/39845","http://www.postgresql.org/about/news.1203","http://security-tracker.debian.org/tracker/CVE-2010-1447","https://bugzilla.redhat.com/show_bug.cgi?id=588269","http://www.securitytracker.com/id?1023988","http://osvdb.org/64756","http://www.securityfocus.com/bid/40305","http://secunia.com/advisories/40052","http://www.redhat.com/support/errata/RHSA-2010-0458.html","http://www.openwall.com/lists/oss-security/2010/05/20/5","http://www.mandriva.com/security/advisories?name=MDVSA-2010:116","http://www.redhat.com/support/errata/RHSA-2010-0457.html","http://www.mandriva.com/security/advisories?name=MDVSA-2010:115","http://secunia.com/advisories/40049","http://www.debian.org/security/2011/dsa-2267","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7320","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11530"],"distribution":"Safe","severity":null,"cves":["CVE-2010-1447"],"affected_versions":["<=2.26"],"description":"The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution.\n","fixed_versions":[">=2.27"]},{"cves":["CVE-2010-1168"],"severity":null,"distribution":"Safe","references":["http://www.openwall.com/lists/oss-security/2010/05/20/5","http://www.redhat.com/support/errata/RHSA-2010-0457.html","http://www.redhat.com/support/errata/RHSA-2010-0458.html","http://secunia.com/advisories/40049","http://cpansearch.perl.org/src/RGARCIA/Safe-2.27/Changes","http://www.mandriva.com/security/advisories?name=MDVSA-2010:115","http://blogs.perl.org/users/rafael_garcia-suarez/2010/03/new-safepm-fixes-security-hole.html","http://www.mandriva.com/security/advisories?name=MDVSA-2010:116","https://bugzilla.redhat.com/show_bug.cgi?id=576508","http://secunia.com/advisories/40052","http://securitytracker.com/id?1024062","http://secunia.com/advisories/42402","http://blogs.sun.com/security/entry/cve_2010_1168_vulnerability_in","http://www.vupen.com/english/advisories/2010/3075","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9807","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7424"],"reported":"2010-06-21","id":"CPANSA-Safe-2010-1168","fixed_versions":[],"description":"The Safe (aka Safe.pm) module before 2.25 for Perl allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving implicitly called methods and implicitly blessed objects, as demonstrated by the (a) DESTROY and (b) AUTOLOAD methods, related to \"automagic methods.\"\n","affected_versions":["<2.25"]},{"description":"Safe.pm 2.0.7 and earlier, when used in Perl 5.8.0 and earlier, may allow attackers to break out of safe compartments in (1) Safe::reval or (2) Safe::rdo using a redefined @_ variable, which is not reset between successive calls.\n","fixed_versions":[">=2.08"],"affected_versions":["<=2.07"],"cves":["CVE-2002-1323"],"severity":null,"distribution":"Safe","references":["http://use.perl.org/articles/02/10/06/1118222.shtml?tid=5","http://www.securityfocus.com/bid/6111","http://www.debian.org/security/2002/dsa-208","http://www.iss.net/security_center/static/10574.php","http://bugs6.perl.org/rt2/Ticket/Display.html?id=17744","http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0061.html","http://www.redhat.com/support/errata/RHSA-2003-256.html","http://www.redhat.com/support/errata/RHSA-2003-257.html","ftp://patches.sgi.com/support/free/security/advisories/20030606-01-A","ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2004-007.0.txt","ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2004.1/SCOSA-2004.1.txt","http://www.osvdb.org/2183","http://www.osvdb.org/3814","http://marc.info/?l=bugtraq&m=104040175522502&w=2","http://marc.info/?l=bugtraq&m=104033126305252&w=2","http://marc.info/?l=bugtraq&m=104005919814869&w=2","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1160"],"reported":"2002-12-11","id":"CPANSA-Safe-2002-1323"}],"versions":[{"date":"1995-08-24T12:36:38","version":"0"},{"version":"0","date":"1995-09-01T21:17:14"},{"version":"2.01","date":"1996-02-10T20:04:44"},{"version":"2.08","date":"2002-10-05T18:38:39"},{"date":"2002-10-06T12:17:23","version":"2.09"},{"date":"2004-07-02T13:08:36","version":"2.11"},{"version":"2.13","date":"2008-01-28T17:33:00"},{"date":"2008-01-30T16:30:34","version":"2.14"},{"date":"2008-02-06T12:34:21","version":"2.15"},{"version":"2.16","date":"2008-03-13T10:54:21"},{"version":"2.17","date":"2009-06-28T14:20:14"},{"version":"2.19","date":"2009-08-25T07:44:28"},{"date":"2009-11-30T23:33:41","version":"2.20"},{"date":"2010-01-14T21:51:28","version":"2.21"},{"version":"2.22","date":"2010-02-11T21:59:56"},{"version":"2.23","date":"2010-02-22T22:45:10"},{"version":"2.24","date":"2010-03-06T21:42:25"},{"date":"2010-03-07T21:51:36","version":"2.25"},{"version":"2.26","date":"2010-03-09T10:56:56"},{"date":"2010-04-29T20:37:15","version":"2.27"},{"date":"2010-09-13T13:50:58","version":"2.28"},{"version":"2.29","date":"2010-10-31T13:20:32"},{"date":"2011-12-07T08:22:34","version":"2.30"},{"version":"2.32","date":"2012-03-31T15:27:57"},{"version":"2.33","date":"2012-04-03T10:12:30"},{"version":"2.35","date":"2013-02-21T07:31:30"},{"date":"1996-02-29T00:00:00","dual_lived":1,"perl_release":"5.002","version":"1.00"},{"perl_release":"5.00307","version":"2.06","dual_lived":1,"date":"1996-10-10T00:00:00"},{"dual_lived":1,"date":"2003-11-15T00:00:00","version":"2.10","perl_release":"5.006002"},{"version":"2.07","perl_release":"5.007003","date":"2002-03-05T00:00:00","dual_lived":1},{"version":"2.12","perl_release":"5.008008","date":"2006-01-31T00:00:00","dual_lived":1},{"date":"2009-08-22T00:00:00","dual_lived":1,"perl_release":"5.010001","version":"2.18"},{"date":"2012-02-20T00:00:00","dual_lived":1,"version":"2.31","perl_release":"5.015008"},{"dual_lived":1,"date":"2012-05-20T00:00:00","version":"2.31_01","perl_release":"5.016"},{"dual_lived":1,"date":"2012-06-20T00:00:00","version":"2.33_01","perl_release":"5.017001"},{"version":"2.34","perl_release":"5.017008","date":"2013-01-20T00:00:00","dual_lived":1},{"version":"2.36","perl_release":"5.019001","date":"2013-06-21T00:00:00","dual_lived":1},{"version":"2.37","perl_release":"5.019002","date":"2013-07-22T00:00:00","dual_lived":1},{"dual_lived":1,"date":"2014-08-20T00:00:00","version":"2.38","perl_release":"5.021003"},{"date":"2015-01-20T00:00:00","dual_lived":1,"version":"2.39","perl_release":"5.021008"},{"dual_lived":1,"date":"2017-04-20T00:00:00","version":"2.40","perl_release":"5.025012"},{"dual_lived":1,"date":"2019-10-20T00:00:00","perl_release":"5.031005","version":"2.41"},{"perl_release":"5.032001","version":"2.41_01","date":"2021-01-23T00:00:00","dual_lived":1},{"perl_release":"5.033001","version":"2.42","dual_lived":1,"date":"2020-08-20T00:00:00"},{"dual_lived":1,"date":"2020-09-20T00:00:00","version":"2.43","perl_release":"5.033002"},{"perl_release":"5.037004","version":"2.44","dual_lived":1,"date":"2022-09-20T00:00:00"},{"date":"2023-08-20T00:00:00","dual_lived":1,"version":"2.45","perl_release":"5.039002"},{"dual_lived":1,"date":"2024-02-23T00:00:00","perl_release":"5.039008","version":"2.46"}],"main_module":"Safe"},"Otogiri":{"advisories":[{"cves":[],"references":["https://github.com/ytnobody/Otogiri/commit/fac1592b3d153a6871ff1aed8016a6888cff9095","https://metacpan.org/changes/distribution/Otogiri"],"reported":"2014-07-03","distribution":"Otogiri","id":"CPANSA-Otogiri-2014-01","description":"A dependant module SQL::Maker without strict mode is vulnerable to SQL injection.\n","fixed_versions":[">=0.13"],"affected_versions":["<0.13"]}],"versions":[{"version":"0.01","date":"2013-10-30T06:45:51"},{"version":"0.02","date":"2013-11-08T08:36:50"},{"version":"0.03","date":"2013-11-09T05:00:47"},{"version":"0.04","date":"2013-12-27T00:15:23"},{"date":"2013-12-28T15:54:15","version":"0.05"},{"date":"2014-01-14T09:13:18","version":"0.06"},{"version":"0.07","date":"2014-02-25T06:25:50"},{"version":"0.08","date":"2014-03-18T04:14:12"},{"version":"0.09","date":"2014-03-18T05:07:37"},{"date":"2014-05-13T12:58:21","version":"0.10"},{"date":"2014-05-30T10:11:18","version":"0.11"},{"version":"0.12","date":"2014-06-05T08:30:13"},{"version":"0.13","date":"2014-07-03T12:40:28"},{"date":"2014-12-18T08:37:33","version":"0.14"},{"date":"2015-01-11T04:56:15","version":"0.15"},{"date":"2015-11-13T07:18:18","version":"0.16"},{"version":"0.17","date":"2016-02-02T05:58:26"},{"version":"0.18","date":"2017-05-19T01:37:05"},{"date":"2020-01-17T11:12:52","version":"0.19"},{"date":"2023-10-15T02:01:31","version":"0.20"},{"version":"0.21","date":"2023-10-15T02:02:58"},{"date":"2023-12-10T00:23:20","version":"0.22"},{"version":"0.23","date":"2024-06-08T13:42:18"}],"main_module":"Otogiri"},"Spoon":{"advisories":[{"distribution":"Spoon","reported":"2014-06-04","references":["https://rt.cpan.org/Public/Bug/Display.html?id=85217","http://www.securityfocus.com/bid/59834","http://seclists.org/oss-sec/2013/q2/318","https://exchange.xforce.ibmcloud.com/vulnerabilities/84197"],"cves":["CVE-2012-6143"],"severity":null,"id":"CPANSA-Spoon-Cookie-2012-6143","fixed_versions":[],"description":"Spoon::Cookie in the Spoon module 0.24 for Perl does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via a crafted request, which is not properly handled when it is deserialized.\n","affected_versions":[">0.24"]}],"versions":[{"date":"2004-03-21T10:04:10","version":"0.10"},{"version":"0.11","date":"2004-03-23T07:50:48"},{"date":"2004-03-30T16:23:32","version":"0.12"},{"date":"2004-05-07T16:21:27","version":"0.13"},{"version":"0.14","date":"2004-06-02T10:15:14"},{"version":"0.15","date":"2004-06-21T17:39:05"},{"version":"0.16","date":"2004-06-22T17:43:16"},{"date":"2004-07-20T20:01:22","version":"0.17"},{"date":"2004-08-12T05:59:51","version":"0.18"},{"date":"2004-12-16T00:12:10","version":"0.19"},{"version":"0.20","date":"2004-12-18T09:04:38"},{"version":"0.21","date":"2005-01-11T16:27:02"},{"date":"2005-04-04T14:49:45","version":"0.22"},{"version":"0.23","date":"2005-04-07T03:44:14"},{"date":"2006-12-09T23:29:37","version":"0.24"}],"main_module":"Spoon"},"ExtUtils-MakeMaker":{"main_module":"ExtUtils::MakeMaker","advisories":[{"description":"Loading modules from . (current directory).\n","fixed_versions":[">=7.22"],"affected_versions":["<7.22"],"severity":"high","cves":["CVE-2016-1238"],"references":["https://metacpan.org/changes/distribution/ExtUtils-MakeMaker","https://github.com/Perl-Toolchain-Gang/ExtUtils-MakeMaker/commit/3e9df17d11c40f2561c23ec79693c8c390e0ae88"],"reported":"2016-08-07","distribution":"ExtUtils-MakeMaker","id":"CPANSA-ExtUtils-MakeMaker-2016-01"}],"versions":[{"date":"2001-07-06T08:23:56","version":"5.47_01"},{"version":"5.48_01","date":"2002-01-16T20:19:18"},{"date":"2002-01-18T04:56:33","version":"5.48_03"},{"date":"2002-01-22T00:33:31","version":"5.48_04"},{"version":"5.49_01","date":"2002-02-04T08:46:04"},{"date":"2002-03-05T04:53:40","version":"5.50_01"},{"version":"5.51_01","date":"2002-03-25T07:53:14"},{"date":"2002-03-26T05:56:07","version":"5.52_01"},{"date":"2002-03-31T03:55:52","version":"5.54_01"},{"version":"5.55_01","date":"2002-04-05T05:01:52"},{"version":"5.55_02","date":"2002-04-06T08:29:20"},{"date":"2002-04-07T03:04:18","version":"5.55_03"},{"version":"5.90_01","date":"2002-04-11T05:32:04"},{"date":"2002-04-24T04:21:44","version":"5.91_01"},{"version":"5.92_01","date":"2002-04-30T03:43:53"},{"version":"5.93_01","date":"2002-05-06T06:02:08"},{"date":"2002-05-17T19:04:41","version":"5.94_01"},{"date":"2002-05-17T21:24:13","version":"5.94_02"},{"version":"5.95_01","date":"2002-05-18T18:43:02"},{"date":"2002-05-23T21:01:02","version":"5.96_01"},{"version":"6.00","date":"2002-05-26T01:25:25"},{"date":"2002-05-30T19:02:20","version":"6.01"},{"version":"6.02","date":"2002-06-16T05:41:28"},{"version":"6.03","date":"2002-06-19T21:24:32"},{"version":"6.04","date":"2002-08-27T01:42:36"},{"version":"6.05","date":"2002-08-27T23:24:30"},{"version":"6.06_01","date":"2002-12-19T08:42:01"},{"date":"2002-12-24T04:54:53","version":"6.06_02"},{"date":"2003-03-30T03:49:59","version":"6.06_03"},{"date":"2003-03-31T04:37:55","version":"6.06_04"},{"date":"2003-03-31T10:50:00","version":"6.06_05"},{"date":"2003-04-07T02:46:10","version":"6.10_01"},{"date":"2003-04-07T08:33:23","version":"6.10_02"},{"date":"2003-04-11T07:27:36","version":"6.10_03"},{"version":"6.10_04","date":"2003-05-23T09:05:27"},{"version":"6.10_05","date":"2003-06-07T01:32:29"},{"version":"6.10_06","date":"2003-06-07T08:00:14"},{"date":"2003-07-05T23:40:34","version":"6.10_07"},{"version":"6.10_08","date":"2003-07-22T01:23:46"},{"version":"6.11","date":"2003-07-28T04:00:19"},{"date":"2003-07-30T05:28:47","version":"6.12"},{"date":"2003-07-31T23:51:40","version":"6.13"},{"date":"2003-08-03T23:27:51","version":"6.14"},{"version":"6.15","date":"2003-08-03T23:46:11"},{"date":"2003-08-18T08:43:08","version":"6.16"},{"version":"6.17","date":"2003-09-15T22:23:01"},{"version":"6.18","date":"2003-11-04T04:12:53"},{"date":"2003-11-04T07:03:30","version":"6.19"},{"version":"6.20","date":"2003-11-06T10:37:47"},{"version":"6.21","date":"2003-11-11T08:26:17"},{"version":"6.21_03","date":"2004-04-03T21:33:45"},{"date":"2004-11-24T04:06:20","version":"6.22"},{"version":"6.23","date":"2004-11-26T21:15:45"},{"version":"6.24","date":"2004-11-30T20:42:14"},{"version":"6.24_01","date":"2004-12-09T06:00:53"},{"date":"2004-12-15T12:05:50","version":"6.25"},{"date":"2004-12-18T02:34:56","version":"6.25_01"},{"date":"2004-12-20T08:36:56","version":"6.25_02"},{"date":"2004-12-21T04:17:27","version":"6.25_03"},{"version":"6.25_04","date":"2004-12-21T05:58:10"},{"version":"6.25_05","date":"2004-12-22T13:05:53"},{"date":"2004-12-26T22:26:26","version":"6.25_06"},{"date":"2004-12-31T08:53:31","version":"6.25_07"},{"date":"2005-02-08T14:21:17","version":"6.25_08"},{"version":"6.25_09","date":"2005-03-12T18:29:26"},{"version":"6.25_10","date":"2005-03-14T00:17:26"},{"date":"2005-03-15T10:05:07","version":"6.25_11"},{"date":"2005-03-19T00:19:47","version":"6.25_12"},{"version":"6.26","date":"2005-03-22T22:50:34"},{"version":"6.26_01","date":"2005-03-29T05:48:40"},{"version":"6.27","date":"2005-04-04T23:55:46"},{"date":"2005-04-12T23:23:53","version":"6.28"},{"version":"6.29","date":"2005-05-19T21:22:00"},{"version":"6.30","date":"2005-05-20T23:14:45"},{"version":"6.30_01","date":"2005-08-17T06:59:11"},{"date":"2006-09-01T19:07:28","version":"6.30_02"},{"version":"6.30_03","date":"2006-09-01T21:06:57"},{"date":"2006-09-11T20:20:27","version":"6.30_04"},{"date":"2006-10-10T01:04:44","version":"6.31"},{"date":"2007-02-21T16:02:09","version":"6.32"},{"date":"2007-06-29T22:18:15","version":"6.33"},{"version":"6.34","date":"2007-06-30T16:10:15"},{"version":"6.35","date":"2007-07-02T03:56:25"},{"date":"2007-07-03T08:10:57","version":"6.36"},{"date":"2007-11-26T01:10:14","version":"6.37_01"},{"date":"2007-11-26T07:35:50","version":"6.37_02"},{"version":"6.37_03","date":"2007-11-26T22:18:55"},{"version":"6.38","date":"2007-11-29T00:04:35"},{"date":"2007-12-06T11:08:15","version":"6.40"},{"version":"6.42","date":"2007-12-08T01:02:26"},{"date":"2008-01-02T00:09:23","version":"6.43_01"},{"version":"6.44","date":"2008-02-29T00:08:42"},{"version":"6.45_01","date":"2008-09-06T10:22:44"},{"version":"6.45_02","date":"2008-09-07T21:18:05"},{"version":"6.46","date":"2008-09-27T21:37:54"},{"date":"2008-10-14T16:41:49","version":"6.47_01"},{"date":"2008-10-16T23:18:52","version":"6.47_02"},{"version":"6.48","date":"2008-10-20T18:20:40"},{"version":"6.49_01","date":"2009-02-20T01:11:08"},{"version":"6.50","date":"2009-03-22T19:30:00"},{"date":"2009-04-10T21:33:29","version":"6.51_01"},{"date":"2009-04-14T04:22:58","version":"6.51_02"},{"date":"2009-05-24T05:41:35","version":"6.51_03"},{"date":"2009-05-24T21:07:28","version":"6.51_04"},{"version":"6.52","date":"2009-05-30T18:41:35"},{"date":"2009-06-08T02:05:24","version":"6.53_01"},{"date":"2009-06-08T02:28:24","version":"6.53_02"},{"date":"2009-07-02T21:55:25","version":"6.53_03"},{"version":"6.54","date":"2009-07-07T23:53:09"},{"date":"2009-07-14T23:02:39","version":"6.55_01"},{"date":"2009-08-05T07:40:59","version":"6.55_02"},{"date":"2009-12-05T07:09:23","version":"6.55_03"},{"version":"6.56","date":"2009-12-17T22:06:47"},{"date":"2010-08-24T08:38:36","version":"6.57_01"},{"date":"2010-09-07T23:43:49","version":"6.57_02"},{"date":"2010-09-08T22:33:36","version":"6.57_03"},{"date":"2010-09-09T23:52:37","version":"6.57_04"},{"date":"2010-09-11T20:25:23","version":"6.57_05"},{"date":"2010-10-06T10:53:43","version":"6.57_06"},{"version":"6.57_07","date":"2011-03-25T03:41:39"},{"version":"6.57_08","date":"2011-03-27T11:00:41"},{"version":"6.57_09","date":"2011-03-28T00:15:59"},{"version":"6.57_10","date":"2011-04-04T05:33:46"},{"date":"2011-05-20T00:34:23","version":"6.57_11"},{"version":"6.58","date":"2011-07-06T21:22:27"},{"version":"6.58_01","date":"2011-08-03T20:25:34"},{"date":"2011-08-05T13:07:58","version":"6.59"},{"date":"2011-09-25T05:23:43","version":"6.61_01"},{"version":"6.62","date":"2011-10-23T23:48:06"},{"date":"2011-10-24T00:40:49","version":"6.63_01"},{"date":"2011-11-02T00:07:43","version":"6.63_02"},{"version":"6.63_03","date":"2012-11-02T03:58:40"},{"version":"6.63_04","date":"2012-11-22T21:25:35"},{"version":"6.64","date":"2012-12-17T02:35:20"},{"version":"6.65_01","date":"2013-03-18T23:21:28"},{"date":"2013-04-14T09:59:15","version":"6.65_02"},{"date":"2013-04-15T12:50:31","version":"6.65_03"},{"version":"6.66","date":"2013-04-19T17:52:08"},{"version":"6.67_01","date":"2013-04-25T20:08:31"},{"version":"6.67_02","date":"2013-06-02T17:31:16"},{"date":"2013-06-05T21:09:00","version":"6.67_03"},{"date":"2013-06-10T19:25:22","version":"6.67_04"},{"version":"6.67_05","date":"2013-06-13T20:55:25"},{"version":"6.68","date":"2013-06-14T22:35:24"},{"version":"6.69_01","date":"2013-06-20T12:00:00"},{"date":"2013-07-02T12:16:23","version":"6.69_02"},{"version":"6.69_03","date":"2013-07-09T21:47:07"},{"version":"6.69_04","date":"2013-07-10T10:50:08"},{"date":"2013-07-11T21:20:53","version":"6.69_05"},{"date":"2013-07-12T13:51:50","version":"6.69_06"},{"date":"2013-07-16T14:34:32","version":"6.69_07"},{"version":"6.69_08","date":"2013-07-16T23:40:44"},{"date":"2013-07-21T08:26:44","version":"6.69_09"},{"version":"6.70","date":"2013-07-23T21:42:47"},{"date":"2013-07-24T08:33:58","version":"6.71_01"},{"version":"6.72","date":"2013-07-24T17:42:20"},{"version":"6.73_01","date":"2013-07-24T22:53:41"},{"version":"6.73_02","date":"2013-07-26T12:34:19"},{"version":"6.73_03","date":"2013-07-30T21:12:02"},{"version":"6.73_04","date":"2013-08-01T21:41:12"},{"version":"6.73_05","date":"2013-08-05T16:45:38"},{"date":"2013-08-05T23:52:18","version":"6.73_06"},{"version":"6.73_07","date":"2013-08-07T15:09:12"},{"version":"6.73_08","date":"2013-08-09T18:52:24"},{"date":"2013-08-09T19:00:18","version":"6.73_09"},{"date":"2013-08-16T15:43:35","version":"6.73_10"},{"version":"6.73_11","date":"2013-08-17T21:57:55"},{"date":"2013-08-23T09:52:43","version":"6.73_12"},{"version":"6.74","date":"2013-08-27T11:45:55"},{"version":"6.75_01","date":"2013-08-29T14:09:22"},{"date":"2013-09-01T20:52:29","version":"6.75_02"},{"date":"2013-09-02T23:26:56","version":"6.75_03"},{"version":"6.75_04","date":"2013-09-05T11:10:20"},{"date":"2013-09-06T12:40:59","version":"6.76"},{"version":"6.77_01","date":"2013-09-10T14:22:45"},{"version":"6.77_02","date":"2013-09-12T20:23:49"},{"date":"2013-09-16T11:23:59","version":"6.77_03"},{"date":"2013-09-18T18:25:33","version":"6.77_04"},{"version":"6.77_05","date":"2013-09-19T13:12:32"},{"version":"6.77_06","date":"2013-09-19T14:43:24"},{"date":"2013-09-21T08:48:44","version":"6.77_07"},{"date":"2013-09-22T17:46:50","version":"6.77_08"},{"date":"2013-09-23T12:47:39","version":"6.78"},{"date":"2013-10-01T14:01:33","version":"6.79_01"},{"version":"6.79_02","date":"2013-10-11T12:01:23"},{"date":"2013-10-11T13:00:29","version":"6.79_03"},{"date":"2013-10-11T17:59:30","version":"6.79_04"},{"version":"6.80","date":"2013-10-15T15:08:06"},{"date":"2013-10-16T08:04:29","version":"6.81_01"},{"date":"2013-10-17T11:24:19","version":"6.81_02"},{"version":"6.81_03","date":"2013-10-24T19:54:34"},{"date":"2013-11-01T19:56:13","version":"6.81_04"},{"version":"6.81_05","date":"2013-11-02T21:44:06"},{"date":"2013-11-04T19:24:38","version":"6.82"},{"date":"2013-11-05T11:45:54","version":"6.83_01"},{"date":"2013-11-12T11:15:21","version":"6.83_02"},{"date":"2013-11-15T09:49:39","version":"6.83_03"},{"version":"6.83_04","date":"2013-11-17T11:44:01"},{"version":"6.83_05","date":"2013-11-25T22:52:46"},{"date":"2013-11-29T21:55:40","version":"6.83_06"},{"date":"2013-11-30T15:27:01","version":"6.84"},{"version":"6.85_01","date":"2013-12-16T13:18:35"},{"version":"6.85_02","date":"2013-12-17T10:17:50"},{"version":"6.85_03","date":"2013-12-23T14:59:36"},{"date":"2013-12-23T15:02:38","version":"6.85_04"},{"version":"6.85_05","date":"2013-12-29T11:28:14"},{"date":"2013-12-30T23:18:09","version":"6.85_06"},{"version":"6.85_07","date":"2014-01-01T19:00:36"},{"version":"6.86","date":"2014-01-04T12:21:05"},{"date":"2014-01-12T10:34:38","version":"6.87_01"},{"version":"6.87_02","date":"2014-01-18T13:30:15"},{"date":"2014-01-19T17:53:19","version":"6.87_03"},{"date":"2014-01-26T19:33:34","version":"6.87_04"},{"version":"6.87_05","date":"2014-01-28T14:00:44"},{"version":"6.88","date":"2014-01-31T20:59:13"},{"version":"6.89_01","date":"2014-02-17T16:23:55"},{"date":"2014-02-20T20:49:24","version":"6.90"},{"date":"2014-03-06T13:52:24","version":"6.91_01"},{"version":"6.92","date":"2014-03-13T16:34:37"},{"version":"6.93_01","date":"2014-03-24T16:57:01"},{"date":"2014-03-25T20:38:21","version":"6.94"},{"date":"2014-04-02T20:52:53","version":"6.95_01"},{"version":"6.95_02","date":"2014-04-07T14:29:26"},{"date":"2014-04-11T21:09:21","version":"6.96"},{"version":"6.97_01","date":"2014-04-24T13:29:12"},{"version":"6.97_02","date":"2014-04-28T10:55:44"},{"version":"6.98","date":"2014-04-29T20:41:00"},{"version":"6.99_01","date":"2014-06-03T21:19:42"},{"date":"2014-06-05T11:18:25","version":"6.99_02"},{"version":"6.99_03","date":"2014-07-04T10:15:23"},{"version":"6.99_04","date":"2014-07-12T11:54:35"},{"version":"6.99_05","date":"2014-07-22T11:42:12"},{"version":"6.99_06","date":"2014-07-28T14:07:14"},{"date":"2014-07-30T16:44:02","version":"6.99_07"},{"version":"6.99_08","date":"2014-08-18T13:19:18"},{"date":"2014-08-28T10:13:30","version":"6.99_09"},{"date":"2014-09-04T14:04:55","version":"6.99_10"},{"date":"2014-09-08T13:39:46","version":"6.99_11"},{"version":"6.99_12","date":"2014-09-11T14:32:19"},{"version":"6.99_13","date":"2014-09-15T19:11:34"},{"version":"6.99_14","date":"2014-09-19T14:06:14"},{"version":"6.99_15","date":"2014-09-21T12:23:58"},{"date":"2014-10-02T18:50:08","version":"6.99_16"},{"date":"2014-10-12T18:41:24","version":"6.99_17"},{"date":"2014-10-20T09:14:39","version":"6.99_18"},{"date":"2014-10-22T19:48:56","version":"7.00"},{"version":"7.01_01","date":"2014-10-25T12:49:55"},{"date":"2014-10-25T16:49:40","version":"7.01_02"},{"version":"7.01_03","date":"2014-10-30T19:48:04"},{"version":"7.01_04","date":"2014-10-31T10:13:56"},{"version":"7.01_05","date":"2014-11-03T12:53:43"},{"date":"2014-11-03T20:55:23","version":"7.01_06"},{"date":"2014-11-04T19:40:07","version":"7.01_07"},{"date":"2014-11-04T20:29:00","version":"7.01_08"},{"date":"2014-11-06T21:59:55","version":"7.01_09"},{"version":"7.02","date":"2014-11-08T10:39:16"},{"version":"7.03_01","date":"2014-11-18T21:47:11"},{"date":"2014-11-24T13:26:46","version":"7.03_02"},{"version":"7.03_03","date":"2014-11-25T16:43:06"},{"date":"2014-11-27T14:42:51","version":"7.03_04"},{"version":"7.03_05","date":"2014-11-28T18:32:48"},{"date":"2014-12-01T15:37:46","version":"7.03_06"},{"version":"7.04","date":"2014-12-02T12:56:02"},{"version":"7.05_01","date":"2014-12-06T16:58:07"},{"version":"7.05_02","date":"2014-12-15T20:13:08"},{"version":"7.05_03","date":"2014-12-24T12:12:00"},{"date":"2014-12-24T14:49:46","version":"7.05_04"},{"version":"7.05_05","date":"2014-12-31T23:21:05"},{"date":"2015-01-08T19:09:29","version":"7.05_06"},{"date":"2015-01-09T16:23:43","version":"7.05_07"},{"version":"7.05_08","date":"2015-01-20T10:13:21"},{"version":"7.05_09","date":"2015-01-23T10:51:30"},{"date":"2015-01-26T15:19:01","version":"7.05_10"},{"date":"2015-01-31T16:40:19","version":"7.05_11"},{"version":"7.05_12","date":"2015-02-07T15:19:11"},{"version":"7.05_13","date":"2015-02-18T22:49:29"},{"date":"2015-02-20T17:32:55","version":"7.05_14"},{"date":"2015-03-05T19:44:02","version":"7.05_15"},{"version":"7.05_16","date":"2015-03-09T11:35:12"},{"version":"7.05_17","date":"2015-03-24T12:27:52"},{"date":"2015-03-27T12:20:03","version":"7.05_18"},{"date":"2015-03-27T16:59:34","version":"7.05_19"},{"date":"2015-04-04T15:53:36","version":"7.05_20"},{"version":"7.05_21","date":"2015-06-13T14:19:26"},{"version":"7.05_22","date":"2015-06-14T13:44:56"},{"date":"2015-06-24T19:51:24","version":"7.05_23"},{"date":"2015-07-01T18:30:38","version":"7.05_24"},{"date":"2015-07-07T17:18:36","version":"7.05_25"},{"version":"7.05_26","date":"2015-08-04T19:41:25"},{"date":"2015-08-05T09:35:40","version":"7.05_27"},{"date":"2015-08-19T18:10:20","version":"7.05_28"},{"version":"7.05_29","date":"2015-08-24T15:26:22"},{"date":"2015-08-31T18:06:48","version":"7.06"},{"version":"7.07_01","date":"2015-09-02T11:55:33"},{"version":"7.08","date":"2015-09-08T19:59:05"},{"version":"7.10","date":"2015-09-10T18:55:41"},{"date":"2015-11-12T12:35:03","version":"7.11_01"},{"version":"7.11_02","date":"2015-11-21T20:23:22"},{"date":"2015-11-25T15:40:06","version":"7.11_03"},{"version":"7.11_04","date":"2016-02-15T11:40:55"},{"date":"2016-03-19T10:07:11","version":"7.11_05"},{"version":"7.11_06","date":"2016-03-29T18:44:47"},{"version":"7.12","date":"2016-04-19T11:41:10"},{"version":"7.13_01","date":"2016-04-23T16:35:56"},{"date":"2016-04-24T13:20:40","version":"7.14"},{"version":"7.15_01","date":"2016-04-27T18:27:25"},{"version":"7.15_02","date":"2016-04-28T12:15:28"},{"date":"2016-05-01T13:29:10","version":"7.15_03"},{"version":"7.16","date":"2016-05-07T10:28:49"},{"version":"7.17_01","date":"2016-05-09T19:14:54"},{"date":"2016-05-09T23:07:33","version":"7.17_02"},{"date":"2016-05-11T18:22:21","version":"7.17_03"},{"date":"2016-05-23T15:39:08","version":"7.18"},{"date":"2016-06-02T14:01:28","version":"7.19_01"},{"version":"7.19_02","date":"2016-06-13T09:11:52"},{"date":"2016-06-13T13:44:33","version":"7.19_03"},{"version":"7.19_04","date":"2016-06-14T11:35:43"},{"version":"7.19_05","date":"2016-06-20T14:40:57"},{"version":"7.19_06","date":"2016-06-27T12:04:29"},{"date":"2016-07-03T14:30:23","version":"7.19_07"},{"version":"7.19_08","date":"2016-07-28T12:26:56"},{"version":"7.20","date":"2016-08-05T08:57:09"},{"date":"2016-08-07T09:54:04","version":"7.21_01"},{"date":"2016-08-08T08:42:10","version":"7.22"},{"version":"7.23_01","date":"2016-08-19T09:24:06"},{"version":"7.24","date":"2016-08-20T12:35:27"},{"version":"7.25_01","date":"2017-02-03T15:21:22"},{"date":"2017-05-11T11:19:49","version":"7.25_02"},{"version":"7.25_03","date":"2017-05-11T17:09:16"},{"date":"2017-05-12T12:25:54","version":"7.25_04"},{"date":"2017-05-15T09:41:49","version":"7.25_05"},{"date":"2017-05-23T19:31:28","version":"7.25_06"},{"date":"2017-05-27T20:21:06","version":"7.26"},{"version":"7.27_01","date":"2017-05-28T10:50:55"},{"date":"2017-05-30T08:56:32","version":"7.27_02"},{"version":"7.28","date":"2017-05-30T21:26:23"},{"date":"2017-05-31T08:32:44","version":"7.29_01"},{"version":"7.29_02","date":"2017-06-11T11:17:55"},{"date":"2017-06-12T12:31:08","version":"7.30"},{"version":"7.31_01","date":"2017-06-14T15:10:23"},{"date":"2017-06-26T13:14:10","version":"7.31_02"},{"date":"2017-07-10T09:02:35","version":"7.31_03"},{"date":"2017-10-05T12:19:00","version":"7.31_04"},{"version":"7.31_05","date":"2017-11-25T09:37:04"},{"version":"7.31_06","date":"2018-01-16T13:28:46"},{"date":"2018-01-16T16:24:23","version":"7.31_07"},{"version":"7.31_08","date":"2018-02-12T12:32:45"},{"version":"7.32","date":"2018-02-16T20:25:44"},{"date":"2018-02-20T10:44:19","version":"7.33_01"},{"version":"7.33_02","date":"2018-02-24T14:05:00"},{"version":"7.33_03","date":"2018-02-24T20:21:42"},{"version":"7.34","date":"2018-03-19T10:51:54"},{"date":"2018-04-19T12:46:01","version":"7.35_01"},{"date":"2018-04-24T11:01:35","version":"7.35_02"},{"version":"7.35_03","date":"2018-04-27T13:59:23"},{"version":"7.35_04","date":"2018-07-09T09:50:43"},{"version":"7.35_05","date":"2018-07-10T09:18:31"},{"date":"2018-07-19T19:49:08","version":"7.35_06"},{"version":"7.35_07","date":"2018-11-23T11:59:44"},{"date":"2018-12-06T10:56:33","version":"7.35_08"},{"date":"2019-02-18T10:27:00","version":"7.35_09"},{"version":"7.35_10","date":"2019-02-20T10:06:48"},{"date":"2019-04-25T11:10:29","version":"7.35_11"},{"version":"7.35_12","date":"2019-04-27T22:17:58"},{"version":"7.35_13","date":"2019-04-28T11:23:25"},{"date":"2019-04-28T13:15:57","version":"7.35_14"},{"version":"7.36","date":"2019-04-28T15:48:41"},{"date":"2019-06-07T10:55:49","version":"7.37_01"},{"date":"2019-06-27T10:35:57","version":"7.37_02"},{"version":"7.37_03","date":"2019-08-03T12:27:47"},{"version":"7.37_04","date":"2019-08-22T14:34:47"},{"version":"7.38","date":"2019-09-11T09:16:48"},{"date":"2019-09-16T06:54:51","version":"7.39_01"},{"date":"2019-11-07T10:03:13","version":"7.39_02"},{"version":"7.39_03","date":"2019-11-17T20:12:14"},{"date":"2019-11-18T15:20:20","version":"7.39_04"},{"date":"2019-11-21T12:10:17","version":"7.39_05"},{"date":"2019-12-16T20:02:27","version":"7.40"},{"date":"2019-12-16T21:53:56","version":"7.41_01"},{"version":"7.42","date":"2019-12-17T22:30:33"},{"version":"7.43_01","date":"2020-01-05T13:00:40"},{"version":"7.44","date":"2020-01-14T16:54:08"},{"version":"7.45_01","date":"2020-05-28T16:58:08"},{"date":"2020-06-23T10:14:10","version":"7.46"},{"date":"2020-06-26T10:13:17","version":"7.47_01"},{"date":"2020-07-07T07:38:50","version":"7.47_02"},{"version":"7.47_03","date":"2020-07-08T21:54:35"},{"version":"7.47_04","date":"2020-07-28T19:00:26"},{"version":"7.47_05","date":"2020-07-31T09:57:33"},{"date":"2020-08-01T13:53:05","version":"7.47_06"},{"version":"7.47_07","date":"2020-08-03T21:39:02"},{"date":"2020-08-31T09:02:22","version":"7.47_08"},{"date":"2020-09-14T13:50:45","version":"7.47_09"},{"date":"2020-09-15T18:45:02","version":"7.47_10"},{"version":"7.47_11","date":"2020-09-20T09:20:24"},{"date":"2020-09-30T15:40:12","version":"7.47_12"},{"version":"7.48","date":"2020-10-04T10:56:39"},{"date":"2020-10-06T17:29:16","version":"7.49_01"},{"date":"2020-10-08T12:03:50","version":"7.49_02"},{"date":"2020-10-09T20:46:22","version":"7.49_03"},{"version":"7.49_04","date":"2020-10-13T18:34:34"},{"version":"7.50","date":"2020-10-21T18:14:52"},{"date":"2020-11-04T00:05:13","version":"7.51_01"},{"version":"7.52","date":"2020-11-04T19:51:52"},{"date":"2020-11-10T03:50:49","version":"7.53_01"},{"version":"7.54","date":"2020-11-12T19:50:41"},{"date":"2020-11-18T18:25:16","version":"7.55_01"},{"version":"7.56","date":"2020-11-19T20:00:09"},{"date":"2020-12-18T13:45:54","version":"7.57_01"},{"date":"2020-12-18T23:07:45","version":"7.57_02"},{"date":"2020-12-21T18:31:44","version":"7.58"},{"date":"2021-02-02T10:13:35","version":"7.59_01"},{"version":"7.60","date":"2021-02-17T11:05:23"},{"version":"7.61_01","date":"2021-03-21T15:00:35"},{"date":"2021-04-13T18:13:28","version":"7.62"},{"version":"7.63_01","date":"2021-05-25T18:00:03"},{"version":"7.63_02","date":"2021-06-03T19:05:10"},{"date":"2021-06-22T13:53:51","version":"7.63_03"},{"version":"7.63_04","date":"2021-06-30T14:30:46"},{"version":"7.63_05","date":"2021-08-14T08:19:32"},{"version":"7.63_06","date":"2021-11-03T01:44:47"},{"version":"7.63_07","date":"2021-11-27T11:51:29"},{"date":"2021-11-27T17:31:21","version":"7.63_08"},{"version":"7.63_09","date":"2021-12-08T22:35:25"},{"version":"7.63_10","date":"2021-12-13T16:54:00"},{"version":"7.63_11","date":"2021-12-14T17:00:18"},{"version":"7.64","date":"2021-12-17T19:24:34"},{"date":"2022-05-30T10:07:14","version":"7.65_01"},{"version":"7.65_02","date":"2022-07-22T13:01:08"},{"version":"7.65_03","date":"2022-12-24T00:32:29"},{"version":"7.66","date":"2022-12-25T09:06:33"},{"date":"2023-03-01T13:47:08","version":"7.67_01"},{"version":"7.67_02","date":"2023-03-06T11:17:11"},{"version":"7.68","date":"2023-03-14T21:41:23"},{"version":"7.69_01","date":"2023-03-25T11:45:00"},{"date":"2023-03-26T13:29:08","version":"7.70"},{"date":"2024-06-24T19:34:30","version":"7.71_01"},{"version":"7.71_02","date":"2024-11-22T19:08:50"},{"date":"2025-02-19T01:40:18","version":"7.71_03"},{"date":"2025-02-24T15:29:06","version":"7.71_04"},{"version":"7.71_05","date":"2025-02-28T18:43:37"},{"date":"2025-03-03T16:59:13","version":"7.71_06"},{"perl_release":"5","version":null,"date":"1994-10-17T00:00:00","dual_lived":1},{"dual_lived":1,"date":"1996-02-29T00:00:00","version":"5.21","perl_release":"5.002"},{"date":"1996-10-10T00:00:00","dual_lived":1,"version":"5.38","perl_release":"5.00307"},{"dual_lived":1,"date":"1997-05-15T00:00:00","version":"5.4002","perl_release":"5.004"},{"version":"5.42","perl_release":"5.00405","dual_lived":1,"date":"1999-04-29T00:00:00"},{"dual_lived":1,"date":"1998-07-22T00:00:00","perl_release":"5.005","version":"5.4301"},{"version":"5.4302","perl_release":"5.00503","dual_lived":1,"date":"1999-03-28T00:00:00"},{"perl_release":"5.006","version":"5.45","dual_lived":1,"date":"2000-03-22T00:00:00"},{"date":"2004-03-16T00:00:00","dual_lived":1,"version":"6.21_02","perl_release":"5.009001"},{"perl_release":"5.013000","version":"6.5601","dual_lived":1,"date":"2010-04-20T00:00:00"},{"perl_release":"5.022","version":"7.04_01","date":"2015-06-01T00:00:00","dual_lived":1},{"date":"2017-01-14T00:00:00","dual_lived":1,"version":"7.04_02","perl_release":"5.022003"},{"date":"2016-02-20T00:00:00","dual_lived":1,"version":"7.10_01","perl_release":"5.023008"},{"version":"7.10_02","perl_release":"5.024001","date":"2017-01-14T00:00:00","dual_lived":1}]},"Catalyst-Action-REST":{"versions":[{"version":"0.1","date":"2006-11-20T03:15:08"},{"version":"0.2","date":"2006-12-01T01:42:22"},{"version":"0.30","date":"2006-12-04T00:22:45"},{"version":"0.31","date":"2006-12-06T08:48:49"},{"date":"2007-03-10T00:44:35","version":"0.40"},{"version":"0.41","date":"2007-05-24T21:09:40"},{"date":"2007-07-07T19:33:22","version":"0.50"},{"version":"0.60","date":"2008-01-04T01:33:04"},{"version":"0.61","date":"2008-06-30T19:30:56"},{"date":"2008-07-02T15:25:10","version":"0.62"},{"version":"0.63","date":"2008-08-07T17:14:34"},{"date":"2008-08-14T16:09:53","version":"0.64"},{"version":"0.65","date":"2008-08-20T17:45:46"},{"version":"0.66","date":"2008-08-22T18:24:57"},{"version":"0.67_01","date":"2009-03-25T16:38:07"},{"version":"0.67","date":"2009-03-26T05:04:33"},{"version":"0.68","date":"2009-03-26T05:37:53"},{"date":"2009-03-26T21:19:43","version":"0.69"},{"date":"2009-03-28T06:23:19","version":"0.70"},{"date":"2009-03-28T16:19:10","version":"0.71"},{"date":"2009-06-25T18:56:47","version":"0.72"},{"version":"0.73","date":"2009-06-28T00:22:51"},{"version":"0.74","date":"2009-07-22T23:12:44"},{"date":"2009-08-17T13:11:15","version":"0.75"},{"version":"0.76","date":"2009-08-21T20:42:44"},{"date":"2009-08-27T01:26:49","version":"0.77"},{"version":"0.78","date":"2009-09-28T14:05:11"},{"version":"0.79","date":"2009-12-11T01:11:49"},{"date":"2009-12-19T14:59:13","version":"0.80"},{"version":"0.81","date":"2010-01-14T20:56:56"},{"version":"0.82","date":"2010-02-04T22:35:05"},{"date":"2010-02-08T22:24:29","version":"0.83"},{"date":"2010-05-06T08:34:09","version":"0.84"},{"version":"0.85","date":"2010-05-13T08:15:30"},{"version":"0.86","date":"2010-09-01T22:17:14"},{"version":"0.87","date":"2010-11-03T19:48:23"},{"date":"2011-01-11T23:12:42","version":"0.88"},{"date":"2011-01-24T21:59:02","version":"0.89"},{"date":"2011-02-25T13:58:06","version":"0.90"},{"date":"2011-08-04T12:46:05","version":"0.91"},{"version":"0.91","date":"2011-10-01T10:11:59"},{"version":"0.93","date":"2011-10-12T18:35:31"},{"date":"2011-12-09T08:51:25","version":"0.94"},{"date":"2012-01-04T19:54:14","version":"0.95"},{"date":"2012-01-30T11:32:44","version":"0.96"},{"date":"2012-02-21T10:06:13","version":"0.97"},{"version":"0.98","date":"2012-02-21T11:44:32"},{"date":"2012-02-28T09:14:17","version":"0.99"},{"version":"1.00","date":"2012-04-13T08:37:31"},{"date":"2012-05-29T20:02:44","version":"1.01"},{"date":"2012-06-05T21:45:05","version":"1.02"},{"version":"1.03","date":"2012-06-27T23:52:31"},{"version":"1.04","date":"2012-06-30T09:32:24"},{"version":"1.05","date":"2012-07-02T19:16:30"},{"version":"1.06","date":"2012-12-11T22:13:48"},{"date":"2013-04-11T19:25:51","version":"1.07"},{"version":"1.08","date":"2013-04-16T07:36:02"},{"date":"2013-04-19T12:43:57","version":"1.09"},{"date":"2013-04-22T13:43:09","version":"1.10"},{"date":"2013-06-16T14:28:48","version":"1.11"},{"date":"2013-09-11T17:50:54","version":"1.12"},{"date":"2013-11-08T15:49:54","version":"1.13"},{"date":"2013-12-27T21:33:09","version":"1.14"},{"date":"2014-05-07T14:04:03","version":"1.15"},{"version":"1.16","date":"2014-09-12T18:22:35"},{"version":"1.17","date":"2014-10-24T00:59:39"},{"version":"1.18","date":"2015-01-20T18:22:02"},{"date":"2015-02-06T15:40:56","version":"1.19"},{"date":"2015-10-29T20:34:02","version":"1.20"},{"date":"2017-12-05T15:16:47","version":"1.21"}],"advisories":[{"cves":[],"severity":null,"distribution":"Catalyst-Action-REST","reported":"2013-09-03","references":["https://metacpan.org/dist/Catalyst-Action-REST/changes"],"id":"CPANSA-Catalyst-Action-REST-2013-01","description":"YAML and YAML::HTML parsers are a potential security hole, as they may allow arbitrary Perl objects to be instantiated.\n","fixed_versions":[">=1.12"],"affected_versions":["<1.12"]}],"main_module":"Catalyst::Action::REST"},"Compress-LZ4":{"main_module":"Compress::LZ4","versions":[{"version":"0.01","date":"2012-02-11T16:33:26"},{"version":"0.02","date":"2012-02-20T21:26:48"},{"version":"0.03","date":"2012-03-02T04:47:50"},{"version":"0.04","date":"2012-03-18T07:09:30"},{"version":"0.05","date":"2012-03-18T19:45:25"},{"date":"2012-03-22T09:23:45","version":"0.06"},{"date":"2012-03-22T16:12:43","version":"0.07"},{"date":"2012-03-23T16:29:14","version":"0.08"},{"date":"2012-03-23T17:27:12","version":"0.09"},{"date":"2012-03-26T11:28:24","version":"0.10"},{"version":"0.11","date":"2012-04-03T21:36:24"},{"version":"0.12","date":"2012-04-04T12:55:22"},{"date":"2012-06-01T18:55:41","version":"0.13"},{"date":"2012-08-10T00:21:56","version":"0.14"},{"version":"0.15","date":"2012-08-11T16:37:53"},{"date":"2012-09-08T18:18:41","version":"0.16"},{"date":"2013-03-19T00:39:07","version":"0.17"},{"version":"0.18","date":"2013-11-19T00:56:57"},{"version":"0.19","date":"2014-02-08T00:35:09"},{"version":"0.20","date":"2014-07-07T21:08:49"},{"version":"0.21","date":"2015-05-12T19:01:36"},{"version":"0.22","date":"2015-05-20T06:16:53"},{"date":"2016-07-25T20:45:05","version":"0.23"},{"version":"0.24","date":"2017-03-23T04:34:45"},{"date":"2017-04-06T16:38:31","version":"0.25"}],"advisories":[{"description":"Outdated LZ4 source code with security issue on 32bit systems.\n","fixed_versions":[">=0.20"],"affected_versions":["<0.20"],"references":["https://metacpan.org/changes/distribution/Compress-LZ4","https://github.com/gray/compress-lz4/commit/fc503812b4cbba16429658e1dfe20ad8bbfd77a0"],"reported":"2014-07-07","distribution":"Compress-LZ4","cves":[],"id":"CPANSA-Compress-LZ4-2014-01"}]},"Net-IPv4Addr":{"main_module":"Net::IPv4Addr","advisories":[{"id":"CPANSA-Net-IPV4Addr-2021-47155","distribution":"Net-IPv4Addr","references":["https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/","https://metacpan.org/release/Net-IPAddress-Util","https://metacpan.org/release/PWBENNETT/Net-IPAddress-Util-5.000/changes"],"reported":"2024-03-18","cves":["CVE-2021-47155"],"severity":null,"affected_versions":[">=0.10"],"description":"The Net::IPAddress::Util module before 5.000 for Perl does not properly consider extraneous zero characters in an IP address string, which (in some situations) allows attackers to bypass access control that is based on IP addresses.\n","fixed_versions":[]}],"versions":[{"date":"1999-10-20T01:18:13","version":"0.07"},{"date":"1999-12-17T23:08:34","version":"0.08"},{"version":"0.8","date":"1999-12-17T23:10:21"},{"date":"2000-05-03T20:24:59","version":"0.09"},{"date":"2000-08-07T19:39:33","version":"0.10"}]},"Dancer":{"main_module":"Dancer","advisories":[{"affected_versions":["<1.3114"],"fixed_versions":[">=1.3114"],"description":"CRLF injection vulnerability in the cookie method allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a cookie name.\n","id":"CPANSA-Dancer-2014-01","cves":["CVE-2012-5572"],"distribution":"Dancer","references":["https://metacpan.org/changes/distribution/Dancer","https://github.com/PerlDancer/Dancer/commit/46ef9124f3149f697455061499ac7cee40930349"],"reported":"2014-05-30"},{"cves":["CVE-2011-1589"],"distribution":"Dancer","references":["https://metacpan.org/changes/distribution/Dancer","https://github.com/PerlDancer/Dancer/commit/91d0bf6a36705b0971b18f7d38fa2f3df8c7b994"],"reported":"2011-04-05","id":"CPANSA-Dancer-2011-01","description":"Directory traversal vulnerability (Mojolicious report, but Dancer was vulnerable as well).\n","fixed_versions":[">=1.3051"],"affected_versions":["<1.3051"]}],"versions":[{"date":"2009-07-27T13:18:07","version":"20090727.1315"},{"version":"0_0.99","date":"2009-07-27T14:14:13"},{"date":"2009-08-01T13:48:20","version":"0.9901"},{"date":"2009-08-04T10:01:54","version":"0.9902"},{"date":"2009-08-07T12:29:03","version":"0.9003"},{"date":"2009-09-19T15:30:19","version":"0.9904"},{"date":"2009-09-23T21:33:51","version":"0.9905"},{"date":"2009-11-20T11:14:20","version":"1.000"},{"date":"2010-01-06T13:53:28","version":"1.100"},{"version":"1.110","date":"2010-01-11T09:46:45"},{"version":"1.120","date":"2010-01-15T16:03:35"},{"version":"1.121","date":"2010-01-15T17:53:08"},{"version":"1.122","date":"2010-01-20T07:48:38"},{"date":"2010-01-29T17:29:24","version":"1.130"},{"date":"2010-02-09T07:55:18","version":"1.140"},{"date":"2010-02-17T15:09:48","version":"1.150"},{"date":"2010-03-07T17:50:01","version":"1.160"},{"version":"1.170","date":"2010-03-24T11:19:00"},{"date":"2010-03-24T13:44:04","version":"1.171"},{"version":"1.172","date":"2010-03-28T15:09:59"},{"date":"2010-04-01T14:13:30","version":"1.173"},{"version":"1.173_01","date":"2010-04-04T11:03:53"},{"date":"2010-04-08T13:49:39","version":"1.174"},{"version":"1.175","date":"2010-04-11T10:49:39"},{"version":"1.175_01","date":"2010-04-19T08:43:22"},{"version":"1.176","date":"2010-04-22T20:29:56"},{"date":"2010-05-05T12:21:26","version":"1.178_01"},{"date":"2010-05-16T10:28:47","version":"1.1800"},{"date":"2010-05-19T14:17:57","version":"1.1801"},{"date":"2010-05-19T17:32:52","version":"1.1802"},{"version":"1.1803","date":"2010-05-23T20:45:17"},{"date":"2010-06-18T11:59:20","version":"1.1804"},{"version":"1.1805","date":"2010-06-22T06:41:58"},{"version":"1.1806_01","date":"2010-07-07T06:15:55"},{"version":"1.1806_02","date":"2010-08-14T16:37:45"},{"date":"2010-08-23T17:47:12","version":"1.1807"},{"date":"2010-08-24T06:23:38","version":"1.1808"},{"version":"1.1809","date":"2010-08-25T05:41:15"},{"date":"2010-09-01T06:19:20","version":"1.1810"},{"date":"2010-09-03T09:23:14","version":"1.1811"},{"version":"1.1812","date":"2010-09-21T12:19:35"},{"date":"2010-09-24T14:25:44","version":"1.1901"},{"version":"1.1999_01","date":"2010-10-14T09:25:03"},{"version":"1.1999_02","date":"2010-10-28T15:41:17"},{"date":"2010-11-02T14:14:32","version":"1.1902"},{"version":"1.1902","date":"2010-11-02T14:25:04"},{"version":"1.1903","date":"2010-11-03T17:07:29"},{"version":"1.1904","date":"2010-11-04T11:16:17"},{"date":"2010-11-11T07:43:21","version":"1.1999_03"},{"date":"2010-11-14T08:08:56","version":"1.1999_04"},{"date":"2010-11-18T15:54:33","version":"1.200"},{"version":"1.2000","date":"2010-11-18T16:52:47"},{"version":"1.2000_01","date":"2010-11-29T22:05:38"},{"date":"2010-11-30T10:00:23","version":"1.2000_02"},{"date":"2010-11-30T19:59:09","version":"1.2001"},{"date":"2010-12-02T12:18:12","version":"1.2001_01"},{"version":"1.2002","date":"2010-12-03T20:28:56"},{"date":"2010-12-07T18:05:50","version":"1.2002_01"},{"date":"2010-12-08T21:38:17","version":"1.2002_02"},{"date":"2010-12-10T18:28:16","version":"1.2003"},{"date":"2010-12-22T17:57:55","version":"1.3000_01"},{"date":"2011-01-03T15:17:14","version":"1.3000_02"},{"date":"2011-01-27T10:00:22","version":"1.2004"},{"date":"2011-01-27T10:09:31","version":"1.3001"},{"version":"1.3002","date":"2011-02-02T15:42:28"},{"version":"1.2005","date":"2011-02-05T17:07:15"},{"version":"1.3003","date":"2011-02-06T13:12:28"},{"date":"2011-02-10T20:48:48","version":"1.3010"},{"date":"2011-02-12T12:50:18","version":"1.3010_01"},{"date":"2011-02-14T15:58:10","version":"1.3011"},{"version":"1.3012","date":"2011-03-01T19:00:52"},{"date":"2011-03-03T08:41:00","version":"1.3013"},{"date":"2011-03-04T12:56:36","version":"1.3014"},{"date":"2011-03-10T14:16:24","version":"1.3014_01"},{"date":"2011-03-13T13:17:43","version":"1.3019_01"},{"date":"2011-03-14T07:44:57","version":"1.3019_02"},{"version":"1.3020","date":"2011-03-21T13:44:17"},{"date":"2011-04-01T15:22:58","version":"1.3029_01"},{"date":"2011-04-08T20:07:26","version":"1.3029_02"},{"version":"1.3029_03","date":"2011-04-10T08:18:44"},{"date":"2011-04-13T08:26:50","version":"1.3030"},{"version":"1.3039_01","date":"2011-04-27T14:58:57"},{"date":"2011-05-01T14:55:49","version":"1.3040"},{"version":"1.3049_01","date":"2011-05-14T15:03:00"},{"version":"1.3050","date":"2011-05-20T10:57:10"},{"date":"2011-05-27T12:57:27","version":"1.3051"},{"version":"1.3059_01","date":"2011-05-27T13:07:51"},{"date":"2011-05-29T14:06:24","version":"1.3059_02"},{"version":"1.3059_03","date":"2011-06-11T14:02:50"},{"date":"2011-06-12T17:31:55","version":"1.3059_04"},{"date":"2011-06-15T10:35:07","version":"1.3060"},{"version":"1.3069_01","date":"2011-07-07T13:19:45"},{"version":"1.3069_02","date":"2011-07-10T16:14:53"},{"date":"2011-07-14T13:47:19","version":"1.3070"},{"date":"2011-07-26T16:21:51","version":"1.3071"},{"version":"1.3079_01","date":"2011-08-17T15:27:53"},{"date":"2011-08-23T09:55:46","version":"1.3072"},{"version":"1.3079_02","date":"2011-08-28T14:13:40"},{"date":"2011-09-10T15:10:29","version":"1.3079_03"},{"date":"2011-10-02T16:07:02","version":"1.3079_04"},{"version":"1.3079_05","date":"2011-10-18T14:43:22"},{"version":"1.3080","date":"2011-10-25T21:16:42"},{"date":"2011-11-27T06:51:43","version":"1.3089_01"},{"version":"1.3090","date":"2011-12-13T14:41:24"},{"version":"1.3091","date":"2011-12-17T11:09:48"},{"date":"2012-01-27T14:38:05","version":"1.3092"},{"date":"2012-02-29T14:34:55","version":"1.3093"},{"date":"2012-03-31T09:57:40","version":"1.3094"},{"date":"2012-04-01T19:22:56","version":"1.3095"},{"date":"2012-06-22T20:18:54","version":"1.3095_01"},{"date":"2012-07-03T07:27:28","version":"1.3095_02"},{"version":"1.3096","date":"2012-07-05T23:09:20"},{"version":"1.3097","date":"2012-07-08T18:36:14"},{"version":"1.3098","date":"2012-07-28T14:40:15"},{"date":"2012-08-11T13:54:49","version":"1.3099"},{"date":"2012-08-25T19:42:47","version":"1.3100"},{"date":"2012-10-06T13:24:53","version":"1.3110"},{"version":"1.9999_01","date":"2012-12-24T13:17:58"},{"date":"2012-12-24T13:48:35","version":"1.9999_02"},{"version":"2.0000_01","date":"2013-01-22T21:38:11"},{"version":"2.000001","date":"2013-02-22T15:33:14"},{"version":"1.3111","date":"2013-02-24T22:51:59"},{"version":"1.3111_01","date":"2013-03-30T16:33:05"},{"date":"2013-04-01T22:31:08","version":"1.3111_02"},{"version":"1.3112","date":"2013-04-11T01:04:37"},{"version":"1.3113","date":"2013-05-09T00:36:16"},{"version":"1.3114","date":"2013-06-02T16:49:58"},{"date":"2013-06-09T23:54:16","version":"1.3115"},{"version":"1.3116","date":"2013-07-04T01:35:27"},{"date":"2013-07-31T22:40:52","version":"1.3117"},{"version":"1.3118","date":"2013-09-01T16:45:13"},{"version":"1.3119","date":"2013-10-26T19:42:59"},{"version":"1.3120","date":"2013-12-24T16:23:20"},{"version":"1.3121","date":"2014-02-02T22:26:53"},{"version":"1.3122","date":"2014-04-10T23:16:40"},{"version":"1.3123","date":"2014-04-12T15:47:53"},{"version":"1.3124","date":"2014-05-10T16:15:17"},{"version":"1.3125","date":"2014-07-12T17:19:08"},{"date":"2014-07-15T02:01:21","version":"1.3126"},{"date":"2014-09-09T00:49:19","version":"1.3127"},{"version":"1.3128","date":"2014-09-09T11:47:21"},{"version":"1.3129","date":"2014-09-10T00:50:37"},{"date":"2014-09-16T01:21:25","version":"1.3130"},{"version":"1.3131_0","date":"2014-10-11T18:59:22"},{"date":"2014-10-13T23:25:36","version":"1.3131_1"},{"date":"2014-10-20T23:14:23","version":"1.3132"},{"version":"1.3133","date":"2014-11-26T22:20:35"},{"date":"2015-02-23T01:33:08","version":"1.3134"},{"date":"2015-04-23T01:54:25","version":"1.3135"},{"date":"2015-05-24T15:48:19","version":"1.3136"},{"version":"1.3137","date":"2015-06-05T20:05:21"},{"version":"1.3138","date":"2015-06-12T20:55:50"},{"date":"2015-06-25T20:13:45","version":"1.3139"},{"version":"1.3140","date":"2015-07-03T13:56:32"},{"date":"2015-09-07T15:15:26","version":"1.3141"},{"version":"1.3142","date":"2015-09-15T00:52:23"},{"date":"2015-10-26T21:15:31","version":"1.3143"},{"date":"2015-11-04T12:36:07","version":"1.3144"},{"date":"2015-11-06T22:12:42","version":"1.3200"},{"version":"1.3201","date":"2015-11-07T19:27:25"},{"version":"1.3202","date":"2015-11-07T21:52:17"},{"version":"1.3300","date":"2016-02-15T21:33:45"},{"version":"1.3301","date":"2016-02-16T22:42:44"},{"date":"2018-05-20T19:52:07","version":"1.3203"},{"version":"1.3204","date":"2018-05-23T13:43:34"},{"version":"1.3205","date":"2018-06-13T22:02:36"},{"version":"1.3400","date":"2018-06-15T22:11:45"},{"date":"2018-10-01T11:53:31","version":"1.3401"},{"date":"2018-10-10T10:44:29","version":"1.3402"},{"date":"2018-10-11T22:45:37","version":"1.3403"},{"date":"2018-10-12T20:33:54","version":"1.3500"},{"date":"2019-03-14T19:27:25","version":"1.3501"},{"date":"2019-03-19T14:49:14","version":"1.3510"},{"version":"1.3511","date":"2019-03-29T11:18:31"},{"date":"2019-03-31T19:16:29","version":"1.3512"},{"version":"1.3513","date":"2020-01-29T21:03:12"},{"version":"1.3514","date":"2020-06-29T16:44:22"},{"version":"1.3514_02","date":"2020-10-02T20:51:17"},{"date":"2020-10-06T21:24:49","version":"1.3514_03"},{"version":"1.3514_04","date":"2022-06-29T22:00:04"},{"version":"1.3520","date":"2023-01-02T10:57:26"},{"version":"1.3521","date":"2023-02-05T23:40:49"},{"date":"2023-02-08T20:58:09","version":"1.3521"}]},"CGI-Session":{"main_module":"CGI::Session","versions":[{"version":"0.01","date":"2001-10-30T08:59:10"},{"date":"2002-05-10T12:04:15","version":"2.0"},{"version":"2.1","date":"2002-05-10T17:38:46"},{"version":"2.2","date":"2002-05-14T18:21:39"},{"date":"2002-05-17T18:02:23","version":"2.4"},{"version":"2.7","date":"2002-05-27T09:52:46"},{"date":"2002-06-06T08:08:21","version":"2.9"},{"version":"2.91","date":"2002-06-06T08:36:26"},{"version":"2.92","date":"2002-06-18T18:15:57"},{"date":"2002-08-26T08:23:54","version":"2.94"},{"date":"2002-11-27T07:20:47","version":"3.1"},{"date":"2002-11-27T12:27:59","version":"3.2"},{"version":"v3.2.2.1","date":"2002-11-28T03:19:31"},{"version":"3.3","date":"2002-11-28T03:26:41"},{"date":"2002-11-28T03:44:39","version":"3.4"},{"version":"3.5","date":"2002-11-28T06:55:29"},{"date":"2002-11-28T17:12:32","version":"3.6"},{"date":"2002-11-29T21:29:53","version":"3.7"},{"date":"2002-12-03T16:26:55","version":"3.8"},{"date":"2002-12-04T07:37:02","version":"3.9"},{"date":"2002-12-09T09:02:18","version":"3.10"},{"version":"3.11","date":"2002-12-09T20:09:24"},{"version":"3.91","date":"2003-03-09T11:26:21"},{"date":"2003-03-10T02:42:16","version":"3.92"},{"date":"2003-03-14T13:21:20","version":"3.93"},{"version":"3.94","date":"2003-05-02T20:12:40"},{"date":"2003-07-26T13:51:31","version":"3.95"},{"date":"2005-02-09T08:35:23","version":"4.00_01"},{"version":"4.00_02","date":"2005-02-09T09:54:17"},{"version":"4.00_03","date":"2005-02-11T08:23:00"},{"version":"4.00_04","date":"2005-02-17T03:24:21"},{"date":"2005-02-22T17:56:43","version":"4.00_05"},{"version":"4.00_06","date":"2005-02-24T18:46:45"},{"version":"4.00_07","date":"2005-03-13T19:18:37"},{"date":"2005-03-15T16:48:17","version":"4.00_08"},{"version":"4.00_09","date":"2005-07-22T02:00:21"},{"date":"2005-09-01T05:57:49","version":"4.00"},{"date":"2005-09-01T16:25:46","version":"4.01"},{"version":"4.02","date":"2005-09-02T15:51:20"},{"date":"2005-09-24T02:12:22","version":"4.02_01"},{"date":"2005-10-05T23:22:54","version":"4.03"},{"date":"2006-03-02T03:00:28","version":"4.04"},{"version":"4.05","date":"2006-03-04T00:08:26"},{"date":"2006-03-09T03:13:06","version":"4.06"},{"version":"4.07","date":"2006-03-09T12:09:28"},{"version":"4.08","date":"2006-03-16T02:38:25"},{"version":"4.09","date":"2006-03-17T04:08:57"},{"date":"2006-03-28T07:00:52","version":"4.10"},{"version":"4.11","date":"2006-04-03T19:33:30"},{"version":"4.12","date":"2006-04-07T14:34:06"},{"version":"4.13","date":"2006-04-12T17:05:18"},{"date":"2006-06-11T11:36:57","version":"4.14"},{"version":"4.20_1","date":"2006-11-24T14:10:38"},{"date":"2006-12-05T02:08:37","version":"4.20"},{"date":"2008-03-22T02:42:57","version":"4.29_1"},{"version":"4.29_2","date":"2008-03-28T01:45:56"},{"date":"2008-04-26T01:31:34","version":"4.30"},{"date":"2008-06-16T14:44:06","version":"4.31"},{"date":"2008-06-17T21:35:03","version":"4.32"},{"version":"4.33","date":"2008-07-08T01:27:59"},{"date":"2008-07-13T02:39:59","version":"4.34"},{"date":"2008-07-16T00:36:46","version":"4.35"},{"date":"2008-09-13T15:45:06","version":"4.36"},{"date":"2008-10-23T02:57:30","version":"4.37"},{"date":"2008-11-01T03:47:46","version":"4.38"},{"date":"2008-12-16T01:22:42","version":"4.39"},{"version":"4.40","date":"2009-01-03T01:18:15"},{"version":"4.41","date":"2009-03-21T02:01:09"},{"version":"4.42","date":"2009-08-26T13:38:39"},{"version":"4.43","date":"2010-12-12T00:32:27"},{"date":"2011-06-06T20:48:07","version":"4.44"},{"date":"2011-07-02T01:33:33","version":"4.45"},{"date":"2011-07-08T14:34:42","version":"4.46"},{"version":"4.47","date":"2011-07-08T19:31:44"},{"date":"2011-07-11T13:02:37","version":"4.48"},{"version":"4.49","date":"2021-02-08T07:00:20"}],"advisories":[{"fixed_versions":[],"description":"CGI::Session 4.03-1 allows local users to overwrite arbitrary files via a symlink attack on temporary files used by (1) Driver::File, (2) Driver::db_file, and possibly (3) Driver::sqlite.\n","affected_versions":["<4.10"],"severity":null,"cves":["CVE-2006-1279"],"reported":"2006-03-19","references":["http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=356555","http://secunia.com/advisories/19211","http://www.securityfocus.com/bid/17177","http://www.osvdb.org/23865","http://www.vupen.com/english/advisories/2006/0946","https://exchange.xforce.ibmcloud.com/vulnerabilities/25285"],"distribution":"CGI-Session","id":"CPANSA-CGI-Session-2006-1279"},{"affected_versions":["<4.12"],"fixed_versions":[">=4.12"],"description":"possible SQL injection attack\n","id":"CPANSA-CGI-Session-2006-01","reported":"2006-04-06","references":["https://rt.cpan.org/Public/Bug/Display.html?id=18578"],"distribution":"CGI-Session","severity":null,"cves":[]}]},"CGI-Application-Dispatch":{"versions":[{"version":"0.01","date":"2004-09-13T01:35:58"},{"date":"2004-10-19T18:26:01","version":"0.02"},{"date":"2004-10-29T16:53:40","version":"0.03"},{"version":"1.00","date":"2005-01-06T15:34:49"},{"date":"2005-01-08T12:42:00","version":"1.01"},{"date":"2005-01-20T14:43:28","version":"1.02"},{"date":"2005-03-04T16:28:16","version":"1.03"},{"version":"1.04","date":"2005-07-12T21:44:54"},{"date":"2006-01-12T15:56:53","version":"2.00_02"},{"version":"2.00_03","date":"2006-02-06T15:50:52"},{"version":"2.00_04","date":"2006-02-14T15:41:25"},{"version":"2.00_05","date":"2006-04-12T14:18:22"},{"date":"2006-06-27T04:29:04","version":"2.00_06"},{"date":"2006-07-03T15:52:12","version":"2.00"},{"date":"2006-08-14T14:14:10","version":"2.01"},{"date":"2006-08-17T14:57:55","version":"2.02"},{"version":"2.03","date":"2006-09-30T02:13:40"},{"version":"2.10_01","date":"2007-01-03T18:12:57"},{"date":"2007-01-11T18:55:41","version":"2.10_02"},{"date":"2007-01-15T14:08:30","version":"2.10"},{"date":"2007-12-28T20:23:49","version":"2.11"},{"date":"2007-12-31T20:43:51","version":"2.12_01"},{"date":"2008-01-03T14:39:57","version":"2.12"},{"version":"2.13_01","date":"2008-03-08T18:33:34"},{"version":"2.13_02","date":"2008-03-11T16:41:27"},{"date":"2008-09-17T00:44:02","version":"2.13"},{"version":"2.14","date":"2008-11-03T01:33:21"},{"date":"2008-12-04T16:00:05","version":"2.15"},{"version":"2.16","date":"2009-03-24T02:03:51"},{"date":"2009-12-30T19:06:27","version":"2.17"},{"date":"2011-01-05T03:42:59","version":"2.18"},{"date":"2011-06-16T17:42:14","version":"3.00"},{"date":"2011-06-24T02:53:20","version":"3.01"},{"date":"2011-06-24T22:33:01","version":"3.02"},{"date":"2011-06-26T03:52:14","version":"3.03"},{"date":"2011-06-29T13:45:53","version":"3.04"},{"version":"3.05","date":"2011-09-07T22:21:15"},{"version":"3.06","date":"2011-09-09T15:29:58"},{"date":"2011-09-09T17:32:11","version":"3.07"},{"version":"3.10","date":"2012-09-03T04:04:19"},{"date":"2012-09-14T01:02:58","version":"3.11"},{"version":"3.12","date":"2012-09-14T01:19:52"}],"advisories":[{"fixed_versions":[">=1.02"],"description":"Untainted module names.\n","affected_versions":["<1.02"],"references":["https://metacpan.org/changes/distribution/CGI-Application-Dispatch"],"reported":"2005-01-20","distribution":"CGI-Application-Dispatch","cves":[],"id":"CPANSA-CGI-Application-Dispatch-2005-001"}],"main_module":"CGI::Application::Dispatch"},"DBD-mysqlPP":{"advisories":[{"cves":[],"severity":"high","distribution":"DBD-mysqlPP","reported":"2011-10-14","references":["https://metacpan.org/changes/distribution/DBD-mysqlPP","https://jvn.jp/en/jp/JVN51216285/index.html"],"id":"CPANSA-DBD-mysqlPP-2011-01","fixed_versions":[">=0.03"],"description":"SQL injection.\n","affected_versions":["<0.93"]}],"versions":[{"version":"0.02","date":"2002-04-04T07:20:36"},{"version":"0.03","date":"2002-04-15T10:26:39"},{"version":"0.04","date":"2003-01-24T11:14:14"},{"version":"0.05","date":"2011-10-21T23:07:07"},{"date":"2011-10-26T22:17:22","version":"0.06"},{"date":"2011-11-17T22:24:50","version":"0.07"}],"main_module":"DBD::mysqlPP"},"Crypt-Random":{"main_module":"Crypt::Random","versions":[{"version":"0.17","date":"1999-04-09T19:08:40"},{"date":"1999-10-13T23:27:57","version":"0.18"},{"date":"2000-09-18T22:56:56","version":"0.23"},{"date":"2001-02-14T08:55:34","version":"0.32"},{"version":"0.33","date":"2001-03-05T09:27:27"},{"date":"2001-04-17T22:01:25","version":"0.34"},{"version":"1.07","date":"2001-06-22T22:11:42"},{"date":"2001-06-23T02:22:55","version":"1.08"},{"version":"1.10","date":"2001-07-09T19:07:34"},{"date":"2001-07-12T16:02:21","version":"1.11"},{"version":"1.12","date":"2003-01-08T13:41:34"},{"date":"2003-03-11T18:44:11","version":"1.13"},{"date":"2004-05-21T21:18:13","version":"1.20"},{"date":"2004-05-24T23:04:52","version":"1.21"},{"version":"1.22","date":"2004-06-01T22:58:47"},{"version":"1.23","date":"2004-06-02T18:52:24"},{"date":"2005-03-07T23:05:09","version":"1.24"},{"date":"2005-03-07T23:18:08","version":"1.25"},{"date":"2018-12-22T16:21:07","version":1.51},{"date":"2018-12-22T19:30:28","version":1.52},{"version":1.53,"date":"2021-06-03T18:19:46"},{"version":1.54,"date":"2021-06-03T18:31:44"},{"version":"1.55","date":"2025-01-30T05:20:08"},{"date":"2025-02-05T01:49:00","version":"1.56"},{"date":"2025-02-10T23:28:24","version":"1.57"}],"advisories":[{"id":"CPANSA-Crypt-Random-2024-001","references":["https://metacpan.org/dist/Crypt-Random/changes","https://rt.cpan.org/Ticket/Display.html?id=128062","https://github.com/atoomic/Crypt-Random/pull/1"],"reported":null,"distribution":"Crypt-Random","severity":null,"cves":[],"affected_versions":[">0"],"fixed_versions":[],"description":"The makerandom program that comes with Crypt::Random adds module search paths in its shebang line, potentially leading to issues with unexpected modules being loaded\n"}]},"Devel-StackTrace":{"versions":[{"version":"0.7","date":"2000-06-27T19:21:12"},{"date":"2000-07-04T16:34:23","version":"0.75"},{"version":"0.8","date":"2000-09-03T02:55:27"},{"date":"2000-09-03T04:10:13","version":"0.85"},{"date":"2001-11-24T06:37:34","version":"0.9"},{"version":"1.00","date":"2002-08-23T09:12:26"},{"version":"1.01","date":"2002-09-18T16:19:28"},{"version":"1.02","date":"2002-09-19T22:12:09"},{"date":"2003-01-22T20:33:08","version":"1.03"},{"version":"1.04","date":"2003-09-25T19:15:23"},{"version":"1.05","date":"2004-02-17T20:35:35"},{"date":"2004-02-22T00:14:28","version":"1.06"},{"date":"2004-02-22T00:30:48","version":"1.07"},{"date":"2004-02-23T15:25:26","version":"1.08"},{"date":"2004-02-26T22:30:00","version":"1.09"},{"version":"1.10","date":"2004-03-10T21:25:04"},{"date":"2004-04-12T05:11:33","version":"1.11"},{"date":"2005-09-30T05:47:47","version":"1.12"},{"version":"1.13","date":"2006-04-01T04:51:47"},{"date":"2007-03-16T15:29:38","version":"1.14"},{"date":"2007-04-28T20:07:57","version":"1.15"},{"date":"2008-02-02T06:09:06","version":"1.16"},{"date":"2008-03-30T17:20:19","version":"1.17"},{"version":"1.18","date":"2008-03-31T14:16:23"},{"date":"2008-06-13T18:07:37","version":"1.19"},{"version":"1.1901","date":"2008-06-13T23:46:42"},{"date":"2008-07-16T13:20:57","version":"1.1902"},{"version":"1.20","date":"2008-10-26T01:44:25"},{"version":"1.21","date":"2009-07-02T04:50:03"},{"version":"1.22","date":"2009-07-15T19:51:37"},{"version":"1.23","date":"2010-08-28T01:47:36"},{"version":"1.24","date":"2010-09-03T14:18:22"},{"date":"2010-09-06T14:54:15","version":"1.25"},{"date":"2010-10-15T15:25:58","version":"1.26"},{"date":"2011-01-16T18:57:01","version":"1.27"},{"date":"2012-11-16T16:59:05","version":"1.28"},{"version":"1.29","date":"2012-11-16T17:47:00"},{"date":"2012-11-20T05:07:49","version":"1.30"},{"date":"2014-01-16T22:37:16","version":"1.31"},{"version":"1.32","date":"2014-05-05T08:01:10"},{"date":"2014-06-26T20:43:33","version":"1.33"},{"date":"2014-06-26T21:50:12","version":"1.34"},{"date":"2014-11-01T18:06:29","version":"2.00"},{"version":"2.01","date":"2016-03-02T17:23:15"},{"date":"2016-12-07T19:51:47","version":2.02},{"date":"2017-11-18T17:10:57","version":"2.03"},{"date":"2019-05-24T18:54:07","version":"2.04"},{"date":"2024-01-08T04:48:56","version":"2.05"}],"advisories":[{"severity":null,"cves":["CVE-2008-3502"],"reported":"2008-08-06","references":["http://lists.bestpractical.com/pipermail/rt-announce/2008-June/000158.html","http://www.securityfocus.com/bid/29925","http://secunia.com/advisories/30830","https://exchange.xforce.ibmcloud.com/vulnerabilities/43337"],"distribution":"Devel-StackTrace","id":"CPANSA-Devel-StackTrace-2008-3502","description":"Unspecified vulnerability in Best Practical Solutions RT 3.0.0 through 3.6.6 allows remote authenticated users to cause a denial of service (CPU or memory consumption) via unspecified vectors related to the Devel::StackTrace module for Perl.\n","fixed_versions":[">=1.19"],"affected_versions":["<1.19"]}],"main_module":"Devel::StackTrace"},"mod_perl":{"main_module":"mod_perl2","versions":[{"version":"0.60","date":"1996-05-21T02:07:05"},{"version":"0.60","date":"1996-05-21T20:51:37"},{"version":"0.60","date":"1996-06-18T19:41:55"},{"version":"0.60","date":"1996-06-25T15:49:56"},{"date":"1996-07-14T23:39:07","version":"0.70"},{"version":"0.76","date":"1996-07-26T20:39:23"},{"date":"1996-09-08T22:13:32","version":"0.81"},{"date":"1996-10-04T15:50:31","version":"0.83_02"},{"date":"1996-10-09T07:10:24","version":"0.83_03"},{"date":"1996-10-14T03:46:54","version":"0.83_04"},{"version":"0.83_05","date":"1996-10-15T13:34:22"},{"version":"0.83_06","date":"1996-10-17T03:48:27"},{"version":"0.83_07","date":"1996-10-18T22:18:01"},{"version":"0.83_09","date":"1996-10-21T01:37:29"},{"date":"1996-10-25T14:09:06","version":"0.83_10"},{"version":"0.84","date":"1996-10-28T00:01:00"},{"date":"1996-11-13T05:39:14","version":"0.85"},{"version":"0.85_01","date":"1996-11-14T07:21:01"},{"version":"0.85_02","date":"1996-11-27T17:19:02"},{"version":"0.85_03","date":"1996-12-05T03:37:12"},{"date":"1996-12-10T23:17:33","version":"0.85_04"},{"version":"0.85_06","date":"1996-12-17T13:31:40"},{"date":"1996-12-19T14:32:44","version":"0.86"},{"date":"1996-12-24T04:19:35","version":"0.87"},{"date":"1996-12-24T20:41:28","version":"0.88"},{"version":"0.89","date":"1996-12-31T04:43:25"},{"version":"0.90","date":"1996-12-31T07:52:56"},{"date":"1997-01-20T10:04:20","version":"0.90_01"},{"version":"0.91","date":"1997-01-23T00:58:22"},{"version":"0.92","date":"1997-01-23T15:56:19"},{"date":"1997-01-28T02:37:30","version":"0.93"},{"date":"1997-03-05T03:19:32","version":"0.93_01"},{"version":"0.94","date":"1997-03-10T12:07:39"},{"version":"0.95","date":"1997-03-23T18:53:46"},{"date":"1997-03-23T18:54:02","version":"0.95_02"},{"version":"0.95_03","date":"1997-04-01T04:44:44"},{"version":"0.95_04","date":"1997-04-02T01:35:22"},{"date":"1997-04-02T03:20:37","version":"0.95_05"},{"version":"0.95_06","date":"1997-04-02T04:42:28"},{"version":"0.96","date":"1997-04-04T05:33:39"},{"date":"1997-04-16T03:54:02","version":"0.97"},{"version":"0.97_01","date":"1997-04-23T03:29:01"},{"date":"1997-04-30T03:56:50","version":"0.97_02"},{"date":"1997-05-02T19:58:12","version":"0.98"},{"version":"0.98_03","date":"1997-05-19T22:59:20"},{"version":"0.98_05","date":"1997-05-23T00:24:28"},{"date":"1997-05-30T02:07:03","version":"0.98_08"},{"version":"0.98_09","date":"1997-06-02T00:05:45"},{"date":"1997-06-03T03:15:48","version":"0.98_10"},{"version":"0.98_11","date":"1997-06-04T01:54:46"},{"version":"0.98_12","date":"1997-06-06T01:14:09"},{"date":"1997-06-12T00:36:43","version":"0.99"},{"version":"1.00","date":"1997-06-30T03:04:22"},{"date":"1997-07-08T06:20:15","version":"1.00"},{"date":"1997-07-30T20:57:59","version":"1.00"},{"version":"0.85_05","date":"1997-08-25T22:00:29"},{"version":"1.00_02","date":"1997-09-16T01:09:06"},{"date":"1997-09-21T21:40:32","version":"1.00_03"},{"version":"1.01","date":"1997-10-17T00:04:35"},{"version":"1.02","date":"1997-10-17T15:40:45"},{"date":"1997-10-24T04:02:30","version":"1.03"},{"version":"1.04","date":"1997-10-31T03:59:22"},{"date":"1997-11-07T04:32:07","version":"1.05"},{"version":"1.07","date":"1997-11-26T02:09:01"},{"date":"1997-12-02T21:34:03","version":"1.07_01"},{"date":"1997-12-22T09:29:56","version":"1.07_02"},{"version":"1.07_03","date":"1998-01-08T10:21:31"},{"date":"1998-01-28T02:10:28","version":"1.07_03"},{"date":"1998-01-29T00:47:52","version":"1.07_03"},{"date":"1998-02-10T11:04:03","version":"1.07_04"},{"date":"1998-02-12T15:08:20","version":"1.07_04"},{"date":"1998-02-20T03:43:49","version":"1.08"},{"version":"1.08","date":"1998-03-07T01:06:09"},{"version":"1.09","date":"1998-03-19T07:39:18"},{"date":"1998-03-21T04:14:02","version":"1.10"},{"date":"1998-03-27T16:52:20","version":"1.10"},{"date":"1998-04-21T14:43:05","version":"1.11"},{"date":"1998-04-24T18:58:30","version":"1.11"},{"date":"1998-06-09T16:51:19","version":"1.11"},{"date":"1998-06-14T19:21:25","version":"1.12"},{"date":"1998-07-14T01:13:07","version":"1.13"},{"version":"1.14","date":"1998-07-19T00:19:20"},{"version":"1.15","date":"1998-07-24T13:52:53"},{"version":"1.15","date":"1998-07-24T15:59:13"},{"date":"1998-09-20T00:02:57","version":"1.15_01"},{"version":"1.16","date":"1998-10-02T23:10:02"},{"date":"1998-10-28T18:16:45","version":"1.16"},{"date":"1998-11-24T23:54:59","version":"1.16_01"},{"version":"1.16_02","date":"1998-12-01T00:01:25"},{"date":"1999-01-28T06:27:45","version":"1.18"},{"date":"1999-06-11T17:22:35","version":"1.20"},{"version":"1.21","date":"1999-07-02T23:43:56"},{"date":"2000-03-06T01:32:31","version":"1.21_01"},{"date":"2000-03-07T07:56:53","version":"1.21_02"},{"date":"2000-03-15T10:25:52","version":"1.21_03"},{"version":"1.22","date":"2000-03-23T06:51:53"},{"date":"2000-04-21T06:51:47","version":"1.23"},{"date":"2000-05-17T05:44:34","version":"1.24"},{"date":"2000-10-10T16:44:39","version":"1.24_01"},{"version":"1.25","date":"2001-01-30T04:33:45"},{"date":"2001-07-06T21:27:16","version":"1.25_01"},{"version":"1.26","date":"2001-07-12T02:23:32"},{"version":"1.99_01","date":"2002-04-07T04:58:26"},{"date":"2002-06-02T03:05:50","version":"1.27"},{"version":"1.99_02","date":"2002-06-02T03:27:13"},{"date":"2002-06-15T23:59:37","version":"1.99_03"},{"version":"1.99_04","date":"2002-06-21T22:45:41"},{"date":"2002-08-20T16:54:13","version":"1.99_05"},{"date":"2002-09-27T15:19:03","version":"1.99_06"},{"version":"1.99_07","date":"2002-09-27T19:41:50"},{"date":"2003-01-11T04:22:19","version":"1.99_08"},{"version":"1.99_09","date":"2003-04-28T02:36:59"},{"date":"2003-07-03T03:32:20","version":"1.28"},{"version":"1.99_10","date":"2003-09-29T17:11:24"},{"date":"2003-10-08T04:54:22","version":"1.29"},{"version":"1.99_11","date":"2003-11-10T21:04:15"},{"version":"1.99_12","date":"2003-12-22T19:56:22"},{"date":"2004-03-09T00:29:43","version":"1.99_13"},{"date":"2004-05-21T18:02:49","version":"1.99_14"},{"version":"1.99_15","date":"2004-08-20T18:35:12"},{"version":"1.99_16","date":"2004-08-23T05:59:47"},{"version":"1.99_17","date":"2004-10-22T21:38:19"},{"date":"2004-12-12T23:22:37","version":"v2.0.0"},{"version":"v2.0.0","date":"2004-12-23T23:38:49"},{"version":"v2.0.0","date":"2005-01-06T01:27:43"},{"version":"v2.0.0","date":"2005-01-22T08:55:19"},{"date":"2005-04-14T13:19:23","version":"v2.0.0"},{"version":"v2.0.0","date":"2005-05-04T02:48:58"},{"version":"v2.0.0","date":"2005-05-20T05:12:45"},{"version":"v2.0.1","date":"2005-06-17T21:05:23"},{"version":"v2.0.2","date":"2005-10-21T01:27:23"},{"date":"2006-11-29T08:29:30","version":"v2.0.3"},{"version":"1.30","date":"2007-03-30T06:19:02"},{"version":"v2.0.4","date":"2008-04-17T06:32:36"},{"date":"2009-05-13T02:29:50","version":"1.31"},{"date":"2011-02-07T23:31:36","version":"v2.0.5"},{"version":"v2.0.6","date":"2012-04-25T15:31:27"},{"date":"2012-06-06T02:40:24","version":"v2.0.7"},{"date":"2013-04-18T02:15:56","version":"2.0.8"},{"date":"2015-06-18T21:16:34","version":"2.0.9"},{"date":"2016-10-27T21:16:36","version":"2.0.10"},{"version":"2.0.11","date":"2019-10-05T11:36:44"},{"version":"2.0.12","date":"2022-01-30T13:36:21"},{"date":"2023-10-21T10:32:29","version":"2.0.13"}],"advisories":[{"distribution":"mod_perl","reported":"2009-05-11","references":["https://metacpan.org/changes/distribution/mod_perl"],"cves":["CVE-2009-0796"],"id":"CPANSA-mod_perl-2009-01","description":"XSS in Apache::Status.\n","fixed_versions":[">=1.31"],"affected_versions":["<1.31"]},{"id":"CPANSA-mod_perl-2007-01","reported":"2007-03-29","references":["https://metacpan.org/changes/distribution/mod_perl"],"distribution":"mod_perl","cves":["CVE-2007-1349"],"affected_versions":["<1.30"],"description":"Unescaped variable interpolation in Apache::PerlRun regular expression could cause regex engine tampering.\n","fixed_versions":[">=1.30"]},{"id":"CPANSA-mod_perl-2011-2767","distribution":"mod_perl","reported":"2018-08-26","references":["https://mail-archives.apache.org/mod_mbox/perl-modperl/201110.mbox/raw/%3C20111004084343.GA21290%40ktnx.net%3E","https://bugs.debian.org/644169","https://lists.debian.org/debian-lts-announce/2018/09/msg00018.html","https://access.redhat.com/errata/RHSA-2018:2737","https://access.redhat.com/errata/RHSA-2018:2826","https://access.redhat.com/errata/RHSA-2018:2825","http://www.securityfocus.com/bid/105195","https://usn.ubuntu.com/3825-1/","https://usn.ubuntu.com/3825-2/","https://lists.apache.org/thread.html/c8ebe8aad147a3ad2e7b0e8b2da45263171ab5d0fc7f8c100feaa94d@%3Cmodperl-cvs.perl.apache.org%3E","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00063.html","http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00065.html"],"cves":["CVE-2011-2767"],"severity":"critical","affected_versions":[">=2.0,<=2.0.10"],"description":"mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary Perl code by placing it in a user-owned .htaccess file, because (contrary to the documentation) there is no configuration option that permits Perl code for the administrator's control of HTTP request processing without also permitting unprivileged users to run Perl code in the context of the user account that runs Apache HTTP Server processes.\n","fixed_versions":[]}]},"Compress-Raw-Bzip2":{"main_module":"Compress::Raw::Bzip2","advisories":[{"id":"CPANSA-Compress-Raw-Bzip2-2010-0405","distribution":"Compress-Raw-Bzip2","reported":"2010-01-27","references":["https://metacpan.org/changes/distribution/Compress-Raw-Bzip2"],"cves":["CVE-2010-0405"],"affected_versions":["<2.031"],"description":"Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file.\n","fixed_versions":[">=2.031"]},{"description":"Off-by-one error in the bzinflate function in Bzip2.xs in the Compress-Raw-Bzip2 module before 2.018 for Perl allows context-dependent attackers to cause a denial of service (application hang or crash) via a crafted bzip2 compressed stream that triggers a buffer overflow, a related issue to CVE-2009-1391.\n","fixed_versions":[">=2.018"],"affected_versions":["<2.018"],"severity":null,"cves":["CVE-2009-1884"],"references":["http://security.gentoo.org/glsa/glsa-200908-07.xml","https://bugs.gentoo.org/show_bug.cgi?id=281955","https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00999.html","https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00982.html","http://www.securityfocus.com/bid/36082","http://secunia.com/advisories/36386","https://bugzilla.redhat.com/show_bug.cgi?id=518278","http://secunia.com/advisories/36415","https://exchange.xforce.ibmcloud.com/vulnerabilities/52628"],"reported":"2009-08-19","distribution":"Compress-Raw-Bzip2","id":"CPANSA-Compress-Raw-Bzip2-2009-1884"}],"versions":[{"version":"2.000_10","date":"2006-03-13T16:14:00"},{"date":"2006-04-15T21:23:09","version":"2.000_11"},{"version":"2.000_12","date":"2006-05-17T12:43:30"},{"version":"2.000_13","date":"2006-06-20T12:43:47"},{"date":"2006-10-26T14:15:45","version":"2.000_14"},{"version":"2.001","date":"2006-11-01T10:35:27"},{"date":"2006-12-29T20:40:23","version":"2.002"},{"version":"2.003","date":"2007-01-02T13:03:45"},{"date":"2007-03-03T15:50:04","version":"2.004"},{"version":"2.005","date":"2007-07-01T00:06:51"},{"version":"2.006","date":"2007-09-01T19:44:48"},{"date":"2007-11-10T11:59:25","version":"2.008"},{"date":"2008-04-20T14:41:25","version":"2.009"},{"date":"2008-05-05T17:18:15","version":"2.010"},{"version":"2.011","date":"2008-05-17T11:16:17"},{"date":"2008-07-15T22:23:56","version":"2.012"},{"date":"2008-09-02T20:20:05","version":"2.014"},{"date":"2008-09-03T20:47:15","version":"2.015"},{"version":"2.017","date":"2009-04-04T09:47:36"},{"version":"2.018","date":"2009-05-03T16:26:57"},{"version":"2.019","date":"2009-05-04T09:42:06"},{"date":"2009-06-03T17:48:18","version":"2.020"},{"date":"2009-08-30T20:25:24","version":"2.021"},{"date":"2009-11-09T23:25:19","version":"2.023"},{"date":"2010-01-09T17:56:12","version":"2.024"},{"version":"2.025","date":"2010-03-28T12:56:33"},{"version":"2.026","date":"2010-04-07T19:49:29"},{"version":"2.027","date":"2010-04-24T19:15:32"},{"version":"2.030","date":"2010-07-24T14:29:17"},{"date":"2010-09-21T19:44:52","version":"2.031"},{"date":"2011-01-06T11:26:00","version":"2.032"},{"date":"2011-01-11T14:02:05","version":"2.033"},{"date":"2011-05-02T21:50:15","version":"2.034"},{"version":"2.035","date":"2011-05-07T08:30:09"},{"version":"2.036","date":"2011-06-18T21:45:13"},{"version":"2.037","date":"2011-06-22T07:17:56"},{"version":"2.039","date":"2011-10-28T14:27:59"},{"version":"2.040","date":"2011-10-28T22:18:59"},{"date":"2011-11-17T23:44:58","version":"2.042"},{"date":"2011-11-20T21:31:34","version":"2.043"},{"version":"2.044","date":"2011-12-03T22:48:47"},{"version":"2.045","date":"2011-12-04T19:19:58"},{"version":"2.047","date":"2012-01-28T23:26:44"},{"date":"2012-01-29T16:58:55","version":"2.048"},{"version":"2.049","date":"2012-02-18T15:56:34"},{"version":"2.052","date":"2012-04-29T12:40:06"},{"date":"2012-08-05T20:35:37","version":"2.055"},{"date":"2012-11-10T19:08:29","version":"2.057"},{"version":"2.058","date":"2012-11-12T22:14:16"},{"date":"2012-11-25T13:38:19","version":"2.059"},{"date":"2013-01-07T20:02:08","version":"2.060"},{"date":"2013-05-27T09:54:30","version":"2.061"},{"version":"2.062","date":"2013-08-12T19:06:20"},{"version":"2.063","date":"2013-11-02T17:14:54"},{"version":"2.064","date":"2014-02-01T23:19:50"},{"version":"2.066","date":"2014-09-21T12:40:58"},{"version":"2.067","date":"2014-12-08T15:12:21"},{"date":"2014-12-23T17:44:34","version":"2.068"},{"date":"2015-09-27T14:33:57","version":"2.069"},{"date":"2016-12-28T23:07:42","version":"2.070"},{"version":"2.072","date":"2017-02-12T20:39:20"},{"date":"2017-02-19T20:35:17","version":"2.073"},{"date":"2017-02-19T22:11:17","version":"2.074"},{"version":"2.080","date":"2018-04-03T18:20:04"},{"date":"2018-04-08T15:01:21","version":"2.081"},{"date":"2018-12-30T22:38:05","version":"2.083"},{"version":"2.084","date":"2019-01-06T08:56:52"},{"version":"2.086","date":"2019-03-31T19:13:22"},{"version":"2.087","date":"2019-08-10T18:11:44"},{"version":"2.088","date":"2019-11-03T08:56:50"},{"date":"2019-11-03T19:53:42","version":"2.089"},{"version":"2.090","date":"2019-11-09T18:35:48"},{"version":"2.091","date":"2019-11-23T19:34:12"},{"date":"2019-12-04T22:08:25","version":"2.092"},{"date":"2019-12-07T16:05:12","version":"2.093"},{"version":"2.094","date":"2020-07-13T10:53:44"},{"version":"2.095","date":"2020-07-20T19:13:40"},{"date":"2020-07-31T20:50:12","version":"2.096"},{"version":"2.100","date":"2021-01-07T13:00:00"},{"version":"2.101","date":"2021-02-20T14:08:53"},{"date":"2022-04-03T19:48:28","version":"2.103"},{"date":"2022-06-25T09:02:32","version":"2.201"},{"version":"2.204","date":"2023-02-08T19:23:39"},{"version":"2.205","date":"2023-07-16T15:36:44"},{"version":"2.206","date":"2023-07-25T15:36:59"},{"date":"2024-02-18T22:19:11","version":"2.207"},{"version":"2.208","date":"2024-02-19T09:28:45"},{"version":"2.209","date":"2024-02-20T13:23:07"},{"date":"2024-02-26T09:33:37","version":"2.210"},{"version":"2.211","date":"2024-04-06T13:40:27"},{"date":"2024-04-27T12:52:31","version":"2.212"},{"date":"2024-08-28T15:29:28","version":"2.213"},{"version":"2.05201","perl_release":"5.017002","dual_lived":1,"date":"2012-07-20T00:00:00"},{"dual_lived":1,"date":"2023-07-02T00:00:00","perl_release":"5.038","version":"2.204_001"}]},"Config-Model":{"main_module":"Config::Model","advisories":[{"distribution":"Config-Model","reported":"2017-05-10","references":["https://metacpan.org/changes/distribution/Config-Model","https://github.com/dod38fr/config-model/commit/9bd64d9ec6c0939166a2216a37d58dd19a725951"],"cves":["CVE-2017-0373"],"id":"CPANSA-Config-Model-2017-03","fixed_versions":[">=2.102"],"description":"The gen_class_pod implementation in lib/Config/Model/Utils/GenClassPod.pm in Config-Model (aka libconfig-model-perl) before 2.102 has a dangerous \"use lib\" line, which allows remote attackers to have an unspecified impact via a crafted Debian package file.\n","affected_versions":["<2.102"]},{"distribution":"Config-Model","reported":"2017-05-10","references":["https://metacpan.org/changes/distribution/Config-Model","https://github.com/dod38fr/config-model/commit/4d37c75b0c4f9633b67999f8260b08027a6bc524"],"cves":["CVE-2017-0374"],"id":"CPANSA-Config-Model-2017-02","description":"Loads models from a local directory, making it possible to substitute the model.\n","fixed_versions":[">=2.102"],"affected_versions":["<2.102"]},{"cves":[],"reported":"2017-05-10","references":["https://metacpan.org/changes/distribution/Config-Model","https://github.com/dod38fr/config-model/commit/01d212348bfbadf31bd74aadd26b1e391ff2fd92"],"distribution":"Config-Model","id":"CPANSA-Config-Model-2017-01","description":"YAML or YAML::XS can be loaded automatically making it possible to run arbitrary code loading a specially crafted YAML file.\n","fixed_versions":[">=2.102"],"affected_versions":["<2.102"]}],"versions":[{"date":"2006-04-21T12:27:44","version":"0.505"},{"version":"0.506","date":"2006-05-19T13:32:14"},{"date":"2006-06-15T12:10:38","version":"0.507"},{"version":"0.601","date":"2006-07-20T12:28:36"},{"version":"0.602","date":"2006-09-07T12:06:17"},{"version":"0.603","date":"2006-10-19T11:24:40"},{"version":"0.604","date":"2006-12-06T12:58:35"},{"date":"2007-01-08T13:16:42","version":"0.605"},{"version":"0.606","date":"2007-01-11T12:42:09"},{"date":"2007-01-12T13:06:38","version":"0.607"},{"date":"2007-02-23T13:00:34","version":"0.608"},{"version":"0.609","date":"2007-05-14T11:41:18"},{"date":"2007-06-06T12:28:06","version":"0.610"},{"date":"2007-07-03T15:35:21","version":"0.611"},{"version":"0.612","date":"2007-07-27T11:38:57"},{"version":"0.613","date":"2007-10-01T15:52:56"},{"version":"0.614","date":"2007-10-23T16:10:29"},{"version":"0.615","date":"2007-11-15T12:36:18"},{"date":"2007-12-04T12:41:22","version":"0.616"},{"date":"2008-01-28T11:55:50","version":"0.617"},{"date":"2008-02-14T12:56:25","version":"0.618"},{"date":"2008-02-29T12:08:41","version":"0.619"},{"date":"2008-03-18T17:40:57","version":"0.620"},{"date":"2008-03-20T07:49:00","version":"0.6201"},{"date":"2008-04-04T11:38:49","version":"0.621"},{"version":"0.622","date":"2008-04-25T16:23:31"},{"version":"0.623","date":"2008-05-19T11:47:46"},{"date":"2008-07-25T11:35:07","version":"0.624"},{"version":"0.625","date":"2008-07-30T12:02:43"},{"date":"2008-09-22T12:20:00","version":"0.626"},{"date":"2008-09-23T11:05:58","version":"0.627"},{"date":"2008-09-29T12:35:05","version":"0.628"},{"version":"0.629","date":"2008-10-13T15:09:27"},{"date":"2008-10-21T11:59:27","version":"0.630"},{"version":"0.631","date":"2008-11-10T14:37:44"},{"date":"2008-12-16T13:32:26","version":"0.632"},{"version":"0.633","date":"2008-12-23T15:36:48"},{"date":"2009-03-05T13:06:32","version":"0.634"},{"date":"2009-04-20T12:21:46","version":"0.635"},{"version":"0.636","date":"2009-05-30T16:19:54"},{"date":"2009-06-23T12:07:41","version":"0.637"},{"version":"0.638","date":"2009-06-30T11:31:35"},{"version":"0.639","date":"2009-09-08T11:35:25"},{"version":"0.640","date":"2009-09-09T16:10:41"},{"date":"2010-01-20T17:30:14","version":"0.641"},{"date":"2010-01-21T17:17:34","version":"0.642"},{"version":"0.643","date":"2010-02-25T13:04:52"},{"date":"2010-03-12T15:24:45","version":"0.644"},{"version":"1.001","date":"2010-03-28T14:53:46"},{"version":"1.202","date":"2010-04-22T12:22:00"},{"version":"1.203","date":"2010-06-03T11:09:45"},{"version":"1.204","date":"2010-06-03T11:20:09"},{"date":"2010-06-07T16:04:03","version":"1.205"},{"date":"2010-08-13T10:53:09","version":"1.206"},{"date":"2010-09-14T16:14:40","version":"1.207"},{"date":"2010-09-16T11:46:11","version":"1.208"},{"date":"2010-09-20T12:29:12","version":"1.209"},{"version":"1.210","date":"2010-09-30T16:34:27"},{"version":"1.211","date":"2010-10-08T10:46:45"},{"date":"2010-10-15T11:08:52","version":"1.212"},{"date":"2010-10-19T12:29:03","version":"1.213"},{"version":"1.214","date":"2010-10-19T15:17:01"},{"version":"1.215","date":"2010-10-19T15:28:56"},{"version":"1.216","date":"2010-10-26T12:16:51"},{"date":"2010-10-30T12:44:11","version":"1.217"},{"version":"1.218","date":"2010-11-05T11:53:14"},{"date":"2010-11-09T13:20:51","version":"1.219"},{"date":"2010-11-10T08:41:22","version":"1.220"},{"version":"1.221","date":"2010-11-21T17:40:10"},{"version":"1.222","date":"2010-11-22T14:01:55"},{"date":"2010-11-28T17:34:03","version":"1.223"},{"version":"1.224","date":"2010-12-06T13:18:53"},{"date":"2010-12-07T08:01:43","version":"1.225"},{"version":"1.226","date":"2010-12-08T18:48:08"},{"version":"1.227","date":"2011-01-07T18:12:45"},{"version":"1.228","date":"2011-01-09T12:27:15"},{"date":"2011-01-10T19:57:53","version":"1.229"},{"version":"1.230","date":"2011-01-20T16:47:27"},{"version":"1.231","date":"2011-01-30T11:30:23"},{"date":"2011-01-30T13:51:34","version":"1.232"},{"date":"2011-02-11T12:25:32","version":"1.233"},{"date":"2011-02-21T17:11:22","version":"1.234"},{"date":"2011-03-01T13:06:28","version":"1.235"},{"version":"1.236","date":"2011-04-01T14:09:03"},{"version":"1.237","date":"2011-04-04T12:57:04"},{"date":"2011-04-05T14:45:45","version":"1.238"},{"version":"1.240","date":"2011-04-05T17:40:17"},{"date":"2011-04-07T18:09:49","version":"1.241"},{"version":"1.242","date":"2011-04-25T15:28:14"},{"date":"2011-05-02T12:33:33","version":"1.243"},{"version":"1.244","date":"2011-05-16T15:52:46"},{"version":"1.245","date":"2011-06-17T12:10:22"},{"date":"2011-06-20T12:32:24","version":"1.246"},{"date":"2011-06-27T14:14:52","version":"1.247"},{"date":"2011-07-05T15:48:52","version":"1.248"},{"version":"1.249","date":"2011-07-12T09:54:39"},{"version":"1.250","date":"2011-07-22T12:40:47"},{"version":"1.251","date":"2011-08-30T12:16:32"},{"date":"2011-09-01T16:06:19","version":"1.252"},{"date":"2011-09-02T16:03:35","version":"1.253"},{"version":"1.254","date":"2011-09-04T15:21:52"},{"version":"1.255","date":"2011-09-15T15:23:39"},{"version":"1.256","date":"2011-09-16T12:28:51"},{"version":"1.257","date":"2011-09-23T10:52:00"},{"date":"2011-10-14T14:45:06","version":"1.258"},{"version":"1.259","date":"2011-10-16T10:17:53"},{"version":"1.260","date":"2011-10-28T13:28:02"},{"version":"1.261","date":"2011-11-18T17:02:26"},{"version":"1.262","date":"2011-11-19T11:55:30"},{"date":"2011-11-29T15:43:38","version":"1.263"},{"date":"2011-11-30T07:50:25","version":"1.264"},{"date":"2011-12-06T18:26:54","version":"1.265"},{"version":"2.001","date":"2012-02-06T11:55:29"},{"date":"2012-02-08T09:49:49","version":"2.002"},{"date":"2012-02-08T13:14:22","version":"2.003"},{"version":"2.004","date":"2012-02-09T11:28:18"},{"date":"2012-02-23T18:25:32","version":"2.005"},{"version":"2.006","date":"2012-02-25T11:30:41"},{"version":"2.007","date":"2012-02-26T16:34:50"},{"date":"2012-03-01T12:40:23","version":"2.008"},{"date":"2012-03-13T13:11:49","version":"2.009"},{"date":"2012-03-13T13:15:03","version":"2.010"},{"version":"2.011","date":"2012-03-19T21:41:44"},{"date":"2012-04-05T11:41:54","version":"2.012"},{"version":"2.013","date":"2012-04-06T12:10:46"},{"version":"2.014","date":"2012-05-04T13:57:13"},{"version":"2.015","date":"2012-05-14T10:06:13"},{"version":"2.016","date":"2012-05-20T08:38:36"},{"date":"2012-05-21T10:56:35","version":"2.017"},{"version":"2.018","date":"2012-05-29T13:53:06"},{"date":"2012-06-05T12:34:15","version":"2.019"},{"date":"2012-06-18T08:34:26","version":"2.020"},{"version":"2.021_01","date":"2012-06-27T14:44:55"},{"date":"2012-06-28T15:30:52","version":"2.021"},{"version":"2.022","date":"2012-07-03T14:47:31"},{"version":"2.023","date":"2012-07-04T13:50:37"},{"date":"2012-09-04T11:30:02","version":"2.024"},{"date":"2012-09-10T10:52:02","version":"2.025"},{"date":"2012-09-20T17:12:09","version":"2.026_1"},{"date":"2012-09-21T10:38:47","version":"2.026_2"},{"date":"2012-09-27T11:53:42","version":"2.026"},{"date":"2012-10-30T12:48:16","version":"2.027"},{"version":"2.028","date":"2012-11-27T12:44:55"},{"version":"2.029","date":"2012-11-28T13:31:04"},{"date":"2013-02-27T18:37:05","version":"2.030_01"},{"date":"2013-03-23T09:47:53","version":"2.030"},{"date":"2013-04-03T17:22:28","version":"2.031"},{"date":"2013-04-15T11:28:33","version":"2.032"},{"date":"2013-04-15T19:27:14","version":"2.033"},{"date":"2013-04-17T19:29:52","version":"2.034"},{"version":"2.035","date":"2013-04-27T15:05:09"},{"date":"2013-05-25T17:53:04","version":"2.036"},{"version":"2.037","date":"2013-06-15T17:46:45"},{"date":"2013-07-03T19:30:32","version":"2.038"},{"version":"2.039","date":"2013-07-18T18:12:07"},{"date":"2013-07-20T09:46:11","version":"2.040"},{"version":"2.041","date":"2013-08-14T17:58:40"},{"version":"2.042","date":"2013-09-15T17:41:45"},{"date":"2013-09-20T17:35:06","version":"2.043"},{"version":"2.044","date":"2013-10-13T16:02:40"},{"version":"2.045","date":"2013-10-18T17:48:15"},{"date":"2013-12-15T13:07:37","version":"2.046"},{"date":"2014-01-25T15:54:37","version":"2.047"},{"version":"2.048","date":"2014-02-23T18:02:19"},{"version":"2.049","date":"2014-02-26T19:45:44"},{"version":"2.050","date":"2014-02-27T18:12:32"},{"version":"2.051","date":"2014-03-06T18:23:11"},{"date":"2014-03-23T16:20:43","version":"2.052"},{"date":"2014-03-25T19:11:57","version":"2.053"},{"version":"2.054","date":"2014-04-01T17:51:50"},{"date":"2014-05-02T11:33:28","version":"2.055"},{"date":"2014-05-18T19:34:53","version":"2.056"},{"version":"2.057","date":"2014-06-12T19:32:47"},{"version":"2.058","date":"2014-06-19T19:43:18"},{"date":"2014-06-29T15:08:02","version":"2.059"},{"version":"2.060","date":"2014-08-19T12:43:59"},{"version":"2.061","date":"2014-09-23T19:21:04"},{"version":"2.062","date":"2014-11-23T19:45:05"},{"date":"2014-11-28T17:55:21","version":"2.063"},{"version":"2.064","date":"2014-12-04T18:47:05"},{"version":"2.065","date":"2015-01-06T20:16:15"},{"date":"2015-02-15T16:13:00","version":"2.066"},{"version":"2.067","date":"2015-03-01T18:38:28"},{"version":"2.068","date":"2015-03-29T13:39:56"},{"date":"2015-04-25T19:29:15","version":"2.069"},{"date":"2015-05-03T14:00:52","version":"2.070"},{"version":"2.071","date":"2015-05-23T11:15:16"},{"version":"2.072","date":"2015-07-18T19:31:43"},{"date":"2015-07-19T07:35:51","version":"2.073"},{"date":"2015-09-30T18:56:39","version":"2.074"},{"version":"2.075","date":"2015-11-22T20:11:19"},{"date":"2016-01-14T18:13:20","version":"2.076"},{"version":"2.077","date":"2016-01-20T19:55:36"},{"date":"2016-01-24T18:48:46","version":"2.078"},{"date":"2016-02-12T20:44:28","version":"2.079"},{"version":"2.080","date":"2016-02-27T17:59:55"},{"version":"2.081","date":"2016-02-29T19:01:45"},{"date":"2016-03-29T18:22:30","version":"2.082"},{"date":"2016-04-20T18:32:29","version":"2.083"},{"date":"2016-05-26T17:35:53","version":"2.084"},{"date":"2016-05-29T17:13:14","version":"2.085"},{"date":"2016-06-04T19:28:08","version":"2.086"},{"version":"2.087","date":"2016-06-29T17:35:35"},{"version":"2.088","date":"2016-07-09T18:06:03"},{"date":"2016-09-04T13:17:52","version":"2.089"},{"date":"2016-09-10T16:07:07","version":"2.090"},{"version":"2.091","date":"2016-09-13T17:05:56"},{"version":"2.092","date":"2016-09-23T17:46:04"},{"version":"2.093","date":"2016-11-08T18:33:39"},{"version":"2.094","date":"2016-11-09T18:23:05"},{"version":"2.095","date":"2016-12-06T18:01:00"},{"date":"2016-12-11T20:28:14","version":"2.096"},{"date":"2016-12-22T17:35:34","version":"2.097"},{"date":"2017-02-26T18:58:23","version":"2.098"},{"version":"2.099","date":"2017-03-05T17:09:37"},{"version":"2.100","date":"2017-03-18T12:06:34"},{"date":"2017-04-28T17:40:56","version":"2.101"},{"version":"2.102","date":"2017-05-14T19:10:40"},{"version":"2.103","date":"2017-05-25T08:15:17"},{"version":"2.104","date":"2017-06-03T13:23:33"},{"version":"2.105","date":"2017-06-09T17:26:55"},{"date":"2017-07-16T14:07:23","version":"2.106"},{"date":"2017-08-30T19:12:10","version":"2.107"},{"date":"2017-08-31T17:23:43","version":"2.108"},{"version":"2.109","date":"2017-09-18T17:52:57"},{"date":"2017-09-21T19:12:32","version":"2.110"},{"date":"2017-09-22T18:41:04","version":"2.111"},{"date":"2017-10-01T09:12:45","version":"2.112"},{"version":"2.113","date":"2017-10-12T19:07:46"},{"version":"2.114","date":"2017-11-11T16:35:03"},{"version":"2.115","date":"2017-12-14T18:03:18"},{"version":"2.116","date":"2017-12-16T09:52:09"},{"version":"2.117","date":"2018-02-03T18:09:35"},{"date":"2018-03-26T18:33:19","version":"2.118"},{"date":"2018-04-02T16:55:50","version":"2.119"},{"version":"2.120","date":"2018-04-08T07:56:03"},{"version":"2.121","date":"2018-04-15T17:08:18"},{"date":"2018-04-17T17:20:14","version":"2.122"},{"version":"2.123","date":"2018-05-01T17:18:09"},{"version":"2.124","date":"2018-06-09T17:16:59"},{"version":"2.125","date":"2018-06-24T12:47:24"},{"date":"2018-08-20T13:10:09","version":"2.126"},{"date":"2018-09-30T16:44:13","version":"2.127"},{"version":"2.128","date":"2018-11-21T19:33:41"},{"date":"2018-12-05T18:44:58","version":"2.129"},{"date":"2018-12-07T19:02:10","version":"2.130"},{"date":"2018-12-16T18:32:58","version":"2.131"},{"date":"2018-12-22T17:50:27","version":"2.132"},{"date":"2019-01-13T20:17:07","version":"2.133"},{"version":"2.134","date":"2019-05-05T10:51:38"},{"version":"2.135","date":"2019-06-05T17:21:24"},{"date":"2019-07-29T15:44:09","version":"2.136"},{"version":"2.137","date":"2019-12-01T17:32:00"},{"version":"2.138","date":"2019-12-27T14:43:21"},{"date":"2020-07-18T14:38:14","version":"2.139"},{"date":"2020-07-31T08:24:37","version":"2.140"},{"version":"2.141","date":"2021-01-17T18:04:01"},{"date":"2021-04-07T17:08:47","version":"2.142"},{"date":"2021-10-31T17:28:44","version":"2.143"},{"date":"2021-11-04T17:26:40","version":"2.144"},{"version":"2.145","date":"2021-11-06T18:23:25"},{"date":"2021-11-28T18:13:47","version":"2.146"},{"date":"2021-11-29T18:42:25","version":"2.147"},{"date":"2022-01-09T15:02:17","version":"2.148"},{"date":"2022-01-13T16:42:50","version":"2.149"},{"date":"2022-05-08T15:10:12","version":"2.150"},{"version":"2.151","date":"2022-07-26T14:32:41"},{"version":"2.152","date":"2022-07-28T08:07:07"},{"date":"2023-07-14T14:05:14","version":"2.153"},{"date":"2023-07-14T17:35:53","version":"2.153"},{"version":"2.154","date":"2024-06-15T14:47:56"},{"date":"2024-11-24T15:11:43","version":"2.155"}]},"SOAP-Lite":{"versions":[{"version":"0.36","date":"2000-09-25T01:49:14"},{"date":"2000-10-06T01:58:32","version":"0.38"},{"date":"2000-10-09T04:27:51","version":"0.39"},{"version":"0.40","date":"2000-10-16T05:12:09"},{"version":"0.41","date":"2000-10-31T15:10:52"},{"version":"0.42","date":"2000-11-15T15:00:57"},{"version":"0.43","date":"2000-11-28T20:43:40"},{"date":"2000-12-13T07:37:47","version":"0.44"},{"date":"2001-01-17T17:28:31","version":"0.45"},{"version":"0.46","date":"2001-02-01T02:23:51"},{"version":"0.47","date":"2001-02-22T07:28:20"},{"version":"0.50","date":"2001-04-18T19:09:15"},{"version":"0.51","date":"2001-07-18T22:39:30"},{"version":"0.52","date":"2001-11-21T19:35:24"},{"date":"2002-04-16T05:20:54","version":"0.55"},{"date":"2003-10-28T19:27:00","version":"0.60"},{"date":"2004-02-26T16:36:26","version":"0.60"},{"date":"2005-02-22T01:57:43","version":"0.65_3"},{"date":"2005-04-03T09:20:17","version":"0.65_4"},{"date":"2005-05-06T17:24:23","version":"0.65_5"},{"version":"0.65_6","date":"2005-06-03T19:23:20"},{"version":"0.66","date":"2005-12-25T08:42:50"},{"version":"0.66.1","date":"2006-01-04T23:14:27"},{"date":"2006-01-27T21:43:49","version":"0.67"},{"date":"2006-07-06T18:18:56","version":"0.68"},{"version":"0.69","date":"2006-08-16T14:53:50"},{"date":"2007-10-18T20:54:02","version":"0.70_01"},{"version":"0.70_02","date":"2007-11-08T21:30:41"},{"version":"0.70_03","date":"2007-11-18T19:00:11"},{"version":"0.70_04","date":"2008-01-02T17:06:17"},{"version":"0.70_05","date":"2008-02-13T12:28:07"},{"date":"2008-02-16T10:37:04","version":"0.70_06"},{"date":"2008-02-25T21:44:41","version":"0.70_07"},{"date":"2008-02-25T21:50:22","version":"0.70_08"},{"version":"0.71","date":"2008-02-28T21:58:13"},{"version":"0.71.01","date":"2008-03-29T14:13:41"},{"version":"0.71.02","date":"2008-04-14T17:25:25"},{"date":"2008-04-17T20:40:23","version":"v0.71.03"},{"date":"2008-04-22T06:03:55","version":"0.71.04"},{"version":"0.710.05","date":"2008-05-05T21:50:36"},{"version":"0.710.06","date":"2008-06-05T18:47:08"},{"version":"0.710.07","date":"2008-06-13T20:27:05"},{"date":"2008-07-13T20:41:11","version":"0.710.08"},{"version":"0.710.09","date":"2009-09-29T21:20:02"},{"date":"2009-09-30T18:40:30","version":"0.710.10"},{"version":"0.711","date":"2010-03-18T20:24:42"},{"date":"2010-06-03T15:41:39","version":"0.712"},{"date":"2011-08-16T17:53:28","version":"0.713"},{"version":"0.714","date":"2011-08-18T19:51:02"},{"date":"2012-07-15T09:37:20","version":"0.715"},{"date":"2013-05-11T06:44:04","version":"0.716"},{"date":"2013-07-17T06:17:00","version":"1.0"},{"date":"2013-07-29T08:26:07","version":"1.01"},{"date":"2013-07-30T02:20:34","version":"1.02"},{"version":"1.03","date":"2013-08-04T17:49:18"},{"date":"2013-08-10T03:46:49","version":"1.04"},{"date":"2013-08-19T05:31:17","version":"1.05"},{"version":"1.06","date":"2013-08-22T04:20:29"},{"date":"2013-11-08T03:09:10","version":"1.07"},{"version":"1.08","date":"2013-11-08T17:41:10"},{"version":"1.09","date":"2014-01-14T21:41:07"},{"date":"2014-01-23T18:53:42","version":"1.10"},{"version":"1.11","date":"2014-02-22T05:18:14"},{"version":"1.12","date":"2014-11-27T07:08:11"},{"version":"1.13","date":"2014-12-30T15:58:06"},{"version":"1.14","date":"2015-03-25T05:04:34"},{"version":"1.15","date":"2015-07-21T18:12:21"},{"version":"1.16","date":"2015-07-23T07:34:59"},{"date":"2015-07-31T05:59:50","version":"1.17"},{"date":"2015-08-26T04:31:24","version":"1.18"},{"version":"1.19","date":"2015-08-26T15:38:01"},{"date":"2016-06-09T21:34:36","version":"1.20"},{"version":"1.22","date":"2017-08-16T05:18:24"},{"date":"2017-12-19T02:30:48","version":"1.23"},{"date":"2017-12-19T18:36:52","version":"1.24"},{"version":"1.25","date":"2017-12-29T18:39:43"},{"date":"2017-12-30T22:19:12","version":"1.26"},{"date":"2018-05-14T20:36:08","version":"1.27"}],"advisories":[{"cves":["CVE-2015-8978"],"distribution":"SOAP-Lite","references":["https://metacpan.org/changes/distribution/SOAP-Lite","https://www.securityfocus.com/bid/94487","https://github.com/redhotpenguin/perl-soaplite/commit/6942fe0d281be1c32c5117605f9c4e8d44f51124"],"reported":"2015-07-21","id":"CPANSA-SOAP-Lite-2015-01","fixed_versions":[">=1.15"],"description":"An example attack consists of defining 10 or more XML entities, each defined as consisting of 10 of the previous entity, with the document consisting of a single instance of the largest entity, which expands to one billion copies of the first entity. The amount of computer memory used for handling an external SOAP call would likely exceed that available to the process parsing the XML.\n","affected_versions":["<1.15"]},{"id":"CPANSA-SOAP-Lite-2002-01","severity":"high","cves":["CVE-2002-1742"],"reported":"2002-04-08","references":["https://metacpan.org/changes/distribution/SOAP-Lite"],"distribution":"SOAP-Lite","affected_versions":["<0.55"],"description":"Allows remote attackers to load arbitrary Perl functions by suppling a non-existent function in a script using a SOAP::Lite module, which causes the AUTOLOAD subroutine to trigger.\n","fixed_versions":[">=0.55"]},{"cves":[],"references":["https://metacpan.org/changes/distribution/SOAP-Lite"],"reported":"2000-10-05","distribution":"SOAP-Lite","id":"CPANSA-SOAP-Lite-2000-01","description":"Security problem on server side (no more details).\n","fixed_versions":[">=0.38"],"affected_versions":["<0.38"]}],"main_module":"SOAP::Lite"},"Plack-Middleware-Session":{"main_module":"Plack::Middleware::Session","advisories":[{"id":"CPANSA-Plack-Middleware-Session-2014-01","severity":"critical","cves":[],"reported":"2014-08-11","references":["https://gist.github.com/miyagawa/2b8764af908a0dacd43d","https://metacpan.org/changes/distribution/Plack-Middleware-Session"],"distribution":"Plack-Middleware-Session","affected_versions":["<=0.21"],"fixed_versions":[">0.21"],"description":"Plack::Middleware::Session::Cookie 0.21 has a security vulnerability where it allows an attacker to execute arbitrary code on the server, when the middleware is enabled without a secret.\n"}],"versions":[{"version":"0.01","date":"2009-12-15T18:59:13"},{"version":"0.02","date":"2009-12-19T19:27:38"},{"date":"2010-01-07T22:12:43","version":"0.03"},{"version":"0.09_01","date":"2010-01-30T21:46:53"},{"date":"2010-01-31T07:17:07","version":"0.09_02"},{"version":"0.09_03","date":"2010-02-03T04:46:20"},{"date":"2010-02-23T03:16:31","version":"0.10"},{"version":"0.11","date":"2010-02-27T10:47:17"},{"date":"2010-07-07T22:55:18","version":"0.12"},{"version":"0.13","date":"2010-12-22T17:00:14"},{"date":"2011-03-29T20:50:06","version":"0.14"},{"version":"0.15","date":"2012-09-04T21:16:35"},{"date":"2013-02-10T19:43:11","version":"0.16"},{"version":"0.17","date":"2013-02-11T23:45:49"},{"version":"0.17","date":"2013-02-12T10:57:14"},{"version":"0.20","date":"2013-06-24T23:09:39"},{"date":"2013-10-12T18:42:26","version":"0.21"},{"date":"2014-08-11T17:18:03","version":"0.22"},{"version":"0.23","date":"2014-08-11T17:23:40"},{"version":"0.24","date":"2014-09-05T11:48:57"},{"version":"0.25","date":"2014-09-29T03:07:54"},{"date":"2015-02-03T08:17:55","version":"0.26"},{"version":"0.27","date":"2015-02-14T00:52:35"},{"date":"2015-02-16T16:30:31","version":"0.28"},{"version":"0.29","date":"2015-02-17T23:57:32"},{"version":"0.30","date":"2015-03-02T18:25:56"},{"date":"2019-02-26T19:01:59","version":"0.31"},{"version":"0.32","date":"2019-02-26T21:36:43"},{"version":"0.33","date":"2019-03-09T23:19:27"},{"version":"0.34","date":"2024-09-23T16:54:44"}]},"PGObject-Util-DBAdmin":{"main_module":"PGObject::Util::DBAdmin","versions":[{"version":"0.01","date":"2014-09-11T11:20:13"},{"version":"0.02","date":"2014-09-12T02:45:35"},{"version":"0.03","date":"2014-09-13T02:03:16"},{"version":"0.04","date":"2014-09-13T14:37:42"},{"date":"2014-09-14T07:48:28","version":"0.05"},{"version":"0.06","date":"2014-09-17T08:27:06"},{"date":"2015-07-16T14:55:28","version":"0.07"},{"date":"2016-02-11T18:01:16","version":"0.08"},{"date":"2016-07-18T11:03:07","version":"0.09"},{"version":"v0.09.0","date":"2016-12-16T21:20:09"},{"version":"v0.10.0","date":"2016-12-16T21:36:46"},{"version":"v0.100.0","date":"2016-12-16T21:43:21"},{"date":"2018-03-31T14:06:25","version":"v0.120.0"},{"date":"2018-05-06T09:28:39","version":"v0.130.0"},{"date":"2018-06-05T19:29:29","version":"v0.130.1"},{"date":"2019-07-07T08:06:48","version":"v0.131.0"},{"version":"v1.0.0","date":"2019-07-08T20:46:34"},{"date":"2019-07-09T18:04:14","version":"v1.0.1"},{"version":"v1.0.2","date":"2019-09-20T06:49:02"},{"version":"v1.0.3","date":"2019-09-29T18:24:55"},{"version":"v1.1.0","date":"2020-09-21T21:20:33"},{"date":"2020-10-21T20:17:28","version":"v1.2.0"},{"version":"v1.2.1","date":"2020-10-21T22:24:41"},{"version":"v1.2.2","date":"2020-10-23T18:46:24"},{"version":"v1.2.3","date":"2020-10-24T07:08:10"},{"version":"v1.3.0","date":"2020-10-24T19:58:09"},{"date":"2020-10-25T12:15:26","version":"v1.4.0"},{"version":"v1.5.0","date":"2021-09-24T12:47:40"},{"version":"v1.6.0","date":"2021-11-07T12:22:17"},{"date":"2021-11-07T14:17:22","version":"v1.6.1"},{"date":"2024-09-13T19:24:01","version":"v1.6.2"}],"advisories":[{"affected_versions":["<1.6.0"],"fixed_versions":[">=1.6.0"],"description":"The PGObject::Util::DBAdmin module before 0.120.0 for Perl, as used in LedgerSMB through 1.5.x, insufficiently sanitizes or escapes variable values used as part of shell command execution, resulting in shell code injection via the create(), run_file(), backup(), or restore() function. The vulnerability allows unauthorized users to execute code with the same privileges as the running application.\n","id":"CPANSA-PGObject-Util-DBAdmin-2018-01","references":["https://archive.ledgersmb.org/ledger-smb-announce/msg00280.html"],"reported":"2018-06-18","distribution":"PGObject-Util-DBAdmin","cves":["CVE-2018-9246"]}]},"DBIx-Custom":{"versions":[{"version":"0.0101","date":"2009-11-08T04:18:19"},{"version":"0.0201","date":"2009-11-09T10:46:44"},{"date":"2009-11-12T14:12:47","version":"0.0301"},{"date":"2009-11-15T11:43:40","version":"0.0401"},{"date":"2009-11-16T11:10:52","version":"0.0501"},{"version":"0.0502","date":"2009-11-17T12:37:33"},{"version":"0.0601","date":"2009-11-19T12:05:50"},{"version":"0.0602","date":"2009-11-19T13:37:39"},{"version":"0.0603","date":"2009-11-20T12:08:31"},{"version":"0.0604","date":"2009-11-23T13:39:53"},{"version":"0.0605","date":"2009-11-23T14:45:46"},{"date":"2009-11-25T13:57:52","version":"0.0701"},{"version":"0.0702","date":"2009-12-01T07:30:25"},{"date":"2009-12-02T13:59:36","version":"0.0801"},{"version":"0.0901","date":"2009-12-09T14:27:53"},{"version":"0.0902","date":"2009-12-22T13:40:07"},{"date":"2010-01-18T12:42:57","version":"0.0903"},{"version":"0.0904","date":"2010-01-21T14:29:12"},{"date":"2010-01-22T12:51:23","version":"0.0905"},{"date":"2010-01-24T09:49:30","version":"0.0906"},{"date":"2010-01-30T00:15:17","version":"0.1001"},{"date":"2010-01-30T03:51:04","version":"0.1101"},{"version":"0.1301","date":"2010-05-01T13:02:19"},{"date":"2010-05-01T23:29:22","version":"0.1401"},{"version":"0.1402","date":"2010-05-02T06:04:57"},{"version":"0.1501","date":"2010-05-26T15:13:04"},{"date":"2010-05-27T14:00:04","version":"0.1502"},{"date":"2010-05-28T13:28:16","version":"0.1503"},{"date":"2010-06-25T12:11:33","version":"0.1602"},{"version":"0.1603","date":"2010-07-14T13:55:33"},{"version":"0.1604","date":"2010-08-03T14:43:14"},{"version":"0.1605","date":"2010-08-05T15:17:49"},{"date":"2010-08-05T15:24:36","version":"0.1606"},{"version":"0.1607","date":"2010-08-06T14:57:35"},{"date":"2010-08-07T05:49:19","version":"0.1608"},{"version":"0.1609","date":"2010-08-08T04:45:12"},{"version":"0.1610","date":"2010-08-08T12:44:43"},{"date":"2010-08-09T12:08:31","version":"0.1611"},{"date":"2010-08-10T11:19:41","version":"0.1612"},{"date":"2010-08-10T12:35:17","version":"0.1613"},{"date":"2010-08-12T15:01:01","version":"0.1614"},{"version":"0.1615","date":"2010-08-15T04:00:44"},{"version":"0.1616","date":"2010-08-24T10:18:06"},{"date":"2010-09-07T12:12:04","version":"0.1617"},{"version":"0.1618","date":"2010-10-17T05:44:56"},{"version":"0.1619","date":"2010-10-20T15:01:35"},{"date":"2010-10-21T14:38:05","version":"0.1620"},{"version":"0.1621","date":"2010-11-10T06:54:46"},{"date":"2010-12-20T14:58:38","version":"0.1622"},{"date":"2010-12-21T16:10:25","version":"0.1623"},{"version":"0.1624","date":"2010-12-22T08:41:09"},{"date":"2011-01-01T16:08:48","version":"0.1625"},{"version":"0.1626","date":"2011-01-02T04:21:11"},{"version":"0.1627","date":"2011-01-04T15:18:21"},{"date":"2011-01-12T07:29:29","version":"0.1628"},{"version":"0.1629","date":"2011-01-12T15:35:11"},{"version":"0.1630","date":"2011-01-13T15:41:25"},{"version":"0.1631","date":"2011-01-17T15:53:44"},{"date":"2011-01-18T14:43:16","version":"0.1632"},{"version":"0.1633","date":"2011-01-18T15:22:37"},{"version":"0.1634","date":"2011-01-19T14:52:48"},{"date":"2011-01-21T14:04:02","version":"0.1635"},{"version":"0.1636","date":"2011-01-22T13:02:55"},{"date":"2011-01-24T12:58:40","version":"0.1637"},{"version":"0.1638","date":"2011-01-25T12:32:26"},{"version":"0.1639","date":"2011-01-26T09:23:22"},{"date":"2011-01-26T13:59:10","version":"0.1640"},{"date":"2011-01-27T05:19:14","version":"0.1641"},{"version":"0.1642","date":"2011-01-28T12:18:42"},{"version":"0.1643","date":"2011-02-09T08:54:11"},{"version":"0.1644","date":"2011-02-11T14:07:25"},{"version":"0.1645","date":"2011-02-14T15:24:30"},{"date":"2011-02-18T17:48:52","version":"0.1646"},{"version":"0.1647","date":"2011-02-19T00:30:41"},{"date":"2011-02-21T16:13:29","version":"0.1648"},{"date":"2011-02-22T14:53:08","version":"0.1649"},{"date":"2011-02-24T05:45:44","version":"0.1650"},{"version":"0.1651","date":"2011-02-24T14:35:20"},{"version":"0.1652","date":"2011-02-25T14:39:56"},{"version":"0.1653","date":"2011-02-28T13:18:03"},{"version":"0.1654","date":"2011-03-06T14:32:11"},{"version":"0.1655","date":"2011-03-08T14:59:08"},{"date":"2011-03-09T13:44:35","version":"0.1656"},{"version":"0.1657","date":"2011-03-10T15:44:50"},{"date":"2011-03-11T16:23:11","version":"0.1658"},{"date":"2011-03-12T08:20:07","version":"0.1659"},{"version":"0.1660","date":"2011-03-14T11:16:27"},{"date":"2011-03-15T16:32:52","version":"0.1661"},{"date":"2011-03-19T14:40:50","version":"0.1662"},{"date":"2011-03-21T03:53:25","version":"0.1663"},{"version":"0.1664","date":"2011-03-24T14:45:52"},{"version":"0.1665","date":"2011-03-25T14:25:43"},{"version":"0.1666","date":"2011-03-29T17:26:27"},{"version":"0.1667","date":"2011-03-30T08:03:39"},{"version":"0.1668","date":"2011-03-30T15:04:03"},{"version":"0.1669","date":"2011-03-30T15:25:45"},{"date":"2011-04-01T15:29:33","version":"0.1670"},{"date":"2011-04-02T16:31:44","version":"0.1671"},{"version":"0.1672","date":"2011-04-04T13:37:34"},{"version":"0.1673","date":"2011-04-05T11:45:54"},{"version":"0.1674","date":"2011-04-05T11:59:11"},{"version":"0.1675","date":"2011-04-11T13:47:34"},{"version":"0.1676","date":"2011-04-11T14:55:38"},{"version":"0.1677","date":"2011-04-12T15:17:24"},{"version":"0.1678","date":"2011-04-18T13:36:31"},{"date":"2011-04-19T11:07:27","version":"0.1679"},{"version":"0.1680","date":"2011-04-25T14:05:23"},{"version":"0.1681","date":"2011-04-26T14:07:02"},{"date":"2011-05-23T14:40:41","version":"0.1682"},{"version":"0.1683","date":"2011-06-06T11:52:44"},{"version":"0.1684","date":"2011-06-07T13:07:20"},{"version":"0.1685","date":"2011-06-08T10:32:35"},{"version":"0.1686","date":"2011-06-08T12:24:07"},{"version":"0.1687","date":"2011-06-09T13:59:44"},{"version":"0.1688","date":"2011-06-10T13:26:20"},{"version":"0.1689","date":"2011-06-12T03:22:26"},{"version":"0.1690","date":"2011-06-12T12:01:43"},{"date":"2011-06-13T13:31:21","version":"0.1691"},{"version":"0.1692","date":"2011-06-14T13:27:31"},{"version":"0.1693","date":"2011-06-15T08:51:43"},{"version":"0.1694","date":"2011-06-17T14:38:23"},{"date":"2011-06-20T13:08:47","version":"0.1695"},{"date":"2011-06-21T13:12:38","version":"0.1696"},{"version":"0.1697","date":"2011-06-24T13:42:00"},{"version":"0.1698","date":"2011-06-27T13:23:13"},{"version":"0.1699","date":"2011-06-28T14:39:21"},{"version":"0.1700","date":"2011-07-01T11:04:37"},{"version":"0.1701","date":"2011-07-11T13:19:20"},{"date":"2011-07-26T14:09:43","version":"0.1702"},{"date":"2011-07-28T04:59:20","version":"0.1703"},{"version":"0.1704","date":"2011-07-29T13:45:24"},{"version":"0.1705","date":"2011-07-29T14:35:38"},{"version":"0.1706","date":"2011-07-30T04:25:21"},{"version":"0.1707","date":"2011-07-30T05:16:05"},{"version":"0.1708","date":"2011-07-30T14:32:34"},{"date":"2011-08-01T12:48:52","version":"0.1709"},{"version":"0.1710","date":"2011-08-02T13:30:15"},{"version":"0.1711","date":"2011-08-09T14:11:24"},{"version":"0.1712","date":"2011-08-10T16:16:52"},{"version":"0.1713","date":"2011-08-12T13:45:58"},{"version":"0.1714","date":"2011-08-13T13:38:02"},{"version":"0.1715","date":"2011-08-14T03:47:28"},{"version":"0.1716","date":"2011-08-15T14:00:28"},{"version":"0.1717","date":"2011-08-16T04:03:16"},{"date":"2011-08-20T09:40:46","version":"0.1718"},{"version":"0.1720","date":"2011-08-22T13:43:21"},{"version":"0.1721","date":"2011-08-26T14:11:53"},{"version":"0.1722","date":"2011-09-02T15:12:10"},{"version":"0.1723","date":"2011-09-12T12:24:14"},{"version":"0.1724","date":"2011-09-16T15:15:54"},{"version":"0.1725","date":"2011-09-27T11:48:33"},{"date":"2011-09-30T11:21:45","version":"0.1726"},{"version":"0.1727","date":"2011-10-03T10:43:32"},{"date":"2011-10-05T04:10:35","version":"0.1728"},{"date":"2011-10-05T08:12:55","version":"0.1729"},{"version":"0.1730","date":"2011-10-10T11:35:23"},{"date":"2011-10-11T14:30:46","version":"0.1731"},{"version":"0.1732","date":"2011-10-20T11:56:08"},{"date":"2011-10-21T22:47:50","version":"0.1733"},{"date":"2011-10-22T22:02:37","version":"0.1734"},{"date":"2011-10-23T00:11:48","version":"0.1735"},{"version":"0.1736","date":"2011-10-23T13:08:15"},{"version":"0.1737","date":"2011-10-24T14:07:44"},{"date":"2011-10-25T14:31:15","version":"0.1738"},{"version":"0.1739","date":"2011-10-26T01:14:58"},{"version":"0.1740","date":"2011-10-27T12:59:00"},{"version":"0.1741","date":"2011-10-28T11:49:57"},{"version":"0.1742","date":"2011-10-31T15:37:07"},{"version":"0.1743","date":"2011-11-01T12:02:38"},{"date":"2011-11-03T13:38:04","version":"0.1744"},{"date":"2011-11-04T14:16:11","version":"0.1745"},{"date":"2011-11-07T12:19:53","version":"0.1746"},{"version":"0.1747","date":"2011-11-11T11:59:27"},{"version":"0.20_01","date":"2011-11-16T00:36:45"},{"date":"2011-11-16T08:50:11","version":"0.2100"},{"date":"2011-11-21T11:05:36","version":"0.2101"},{"version":"0.2102","date":"2011-11-25T14:34:26"},{"version":"0.2103","date":"2011-11-28T10:38:56"},{"version":"0.2104","date":"2011-11-29T13:48:49"},{"date":"2012-01-14T13:39:10","version":"0.2105"},{"date":"2012-01-20T15:16:34","version":"0.2106"},{"version":"0.2107","date":"2012-01-25T08:56:44"},{"date":"2012-01-29T14:30:53","version":"0.2108"},{"date":"2012-02-07T13:31:49","version":"0.2109"},{"date":"2012-02-10T14:51:17","version":"0.2110"},{"version":"0.2111","date":"2012-02-11T14:45:41"},{"date":"2012-02-28T14:33:03","version":"0.22"},{"version":"0.23","date":"2012-03-01T00:07:11"},{"version":"0.24","date":"2012-03-02T14:57:03"},{"version":"0.25","date":"2012-03-19T11:58:43"},{"date":"2012-07-11T08:20:53","version":"0.26"},{"date":"2012-09-17T13:15:26","version":"0.27"},{"date":"2013-03-04T11:25:17","version":"0.28"},{"version":"0.29","date":"2014-02-03T09:21:29"},{"version":"0.30","date":"2014-02-04T00:17:32"},{"version":"0.31","date":"2015-01-13T01:36:24"},{"date":"2015-01-13T05:24:10","version":"0.32"},{"date":"2015-01-13T07:52:20","version":"0.33"},{"version":"0.34","date":"2015-01-15T02:04:26"},{"version":"0.35","date":"2015-05-23T05:44:25"},{"date":"2015-05-25T02:52:16","version":"0.36"},{"date":"2016-05-21T07:00:46","version":"0.37"},{"version":"0.38","date":"2017-03-16T07:48:58"},{"date":"2017-03-29T02:29:03","version":"0.39"},{"date":"2017-03-30T01:41:11","version":"0.40"},{"date":"2017-11-06T15:17:26","version":"0.41"},{"date":"2019-10-15T04:14:26","version":"0.41_99"},{"date":"2019-10-19T08:52:17","version":"0.42"},{"date":"2020-04-01T05:39:43","version":"0.43"},{"version":"0.44","date":"2020-08-03T00:46:29"},{"version":"0.45","date":"2021-12-16T00:31:02"}],"advisories":[{"reported":"2011-01-27","references":["https://metacpan.org/changes/distribution/DBIx-Custom","https://github.com/yuki-kimoto/DBIx-Custom/commit/5b00b9f9a966e7abecabd91710c8fa893784d919"],"distribution":"DBIx-Custom","severity":"high","cves":[],"id":"CPANSA-DBIx-Custom-2011-01","fixed_versions":[">=0.1641"],"description":"SQL injection when passing special column names.\n","affected_versions":["<0.1641"]}],"main_module":"DBIx::Custom"},"File-Temp":{"main_module":"File::Temp","versions":[{"version":"0.05","date":"2000-03-14T20:15:55"},{"date":"2000-04-28T04:48:55","version":"0.07"},{"version":"0.08","date":"2000-05-16T01:10:28"},{"version":"0.09","date":"2000-07-26T20:30:30"},{"version":"0.11","date":"2000-12-12T21:04:53"},{"version":"0.12","date":"2001-02-23T00:37:44"},{"version":"0.13","date":"2003-08-16T04:06:11"},{"date":"2003-08-17T04:42:50","version":"0.14"},{"date":"2005-02-22T05:40:33","version":"0.15"},{"version":"0.16","date":"2005-02-22T21:42:47"},{"version":"0.17","date":"2006-08-18T22:40:10"},{"date":"2007-01-22T00:18:40","version":"0.18"},{"version":"0.19","date":"2007-11-20T08:28:08"},{"date":"2007-12-21T00:46:29","version":"0.20"},{"version":"0.21","date":"2008-11-14T01:30:09"},{"version":"0.22","date":"2009-06-29T07:41:24"},{"date":"2013-02-07T17:03:45","version":"0.22_90"},{"version":"0.23","date":"2013-03-14T21:57:42"},{"version":"0.2301","date":"2013-04-11T15:31:13"},{"date":"2013-09-26T13:48:13","version":"0.2302"},{"version":"0.2303","date":"2013-10-09T13:59:01"},{"version":"0.2304","date":"2013-10-10T13:17:32"},{"version":"0.2305","date":"2018-04-19T12:01:34"},{"date":"2018-06-24T19:34:31","version":"0.2306"},{"date":"2018-06-24T19:41:28","version":"0.2307"},{"version":"0.2308","date":"2018-07-11T21:07:49"},{"date":"2019-01-06T20:32:53","version":"0.2309"},{"date":"2020-09-26T17:39:38","version":"0.2310"},{"version":"0.2311","date":"2020-10-03T04:04:55"},{"perl_release":"5.009003","version":"0.16_01","dual_lived":1,"date":"2006-01-28T00:00:00"}],"advisories":[{"cves":["CVE-2011-4116"],"severity":"high","distribution":"File-Temp","references":["http://www.openwall.com/lists/oss-security/2011/11/04/2","https://rt.cpan.org/Public/Bug/Display.html?id=69106","https://github.com/Perl-Toolchain-Gang/File-Temp/issues/14","http://www.openwall.com/lists/oss-security/2011/11/04/4","https://seclists.org/oss-sec/2011/q4/238"],"reported":"2020-01-31","id":"CPANSA-File-Temp-2011-4116","fixed_versions":[],"description":"_is_safe in the File::Temp module for Perl does not properly handle symlinks.\n","affected_versions":[">0"]}]},"Data-FormValidator":{"main_module":"Data::FormValidator","advisories":[{"fixed_versions":[">4.66"],"description":"The Data::FormValidator module 4.66 and earlier for Perl, when untaint_all_constraints is enabled, does not properly preserve the taint attribute of data, which might allow remote attackers to bypass the taint protection mechanism via form input.\n","affected_versions":["<=4.66"],"severity":null,"cves":["CVE-2011-2201"],"reported":"2011-09-14","references":["http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629511","http://www.openwall.com/lists/oss-security/2011/06/13/13","https://bugzilla.redhat.com/show_bug.cgi?id=712694","http://www.openwall.com/lists/oss-security/2011/06/12/3","http://www.securityfocus.com/bid/48167","https://rt.cpan.org/Public/Bug/Display.html?id=61792","http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065416.html","http://www.openwall.com/lists/oss-security/2011/06/13/5"],"distribution":"Data-FormValidator","id":"CPANSA-Data-FormValidator-2011-2201"}],"versions":[{"date":"2001-06-19T21:43:01","version":"1.3"},{"date":"2001-06-22T16:36:08","version":"1.4"},{"date":"2001-06-25T17:02:43","version":"1.4"},{"date":"2001-06-28T15:13:01","version":"1.5"},{"version":"v1.5.1","date":"2001-07-18T14:23:17"},{"version":"1.6","date":"2001-09-23T22:42:22"},{"version":"1.7","date":"2001-11-03T18:16:00"},{"date":"2002-02-14T22:45:46","version":"1.8"},{"date":"2002-02-18T02:20:12","version":"1.9"},{"version":"1.10","date":"2002-04-21T13:42:36"},{"date":"2002-06-29T21:04:14","version":"1.11"},{"date":"2002-10-07T02:06:39","version":"1.91"},{"version":"1.92","date":"2002-12-23T23:36:37"},{"date":"2003-03-08T13:10:33","version":"1.93"},{"version":"2.00","date":"2003-03-23T03:01:57"},{"version":"2.01","date":"2003-04-02T15:18:15"},{"date":"2003-04-09T15:54:50","version":"2.02"},{"version":"2.03","date":"2003-04-10T16:12:40"},{"date":"2003-04-12T02:58:35","version":"2.04"},{"version":"2.10","date":"2003-04-20T22:23:44"},{"date":"2003-04-24T02:51:03","version":"2.10"},{"version":"3.00","date":"2003-05-11T21:29:55"},{"date":"2003-05-16T04:06:05","version":"3.01"},{"version":"3.1","date":"2003-05-26T23:18:18"},{"date":"2003-05-27T19:41:01","version":"3.11"},{"date":"2003-06-23T01:27:03","version":"3.12"},{"date":"2003-11-02T21:19:10","version":"3.13"},{"version":"3.14","date":"2003-11-03T17:59:41"},{"version":"3.15","date":"2003-11-30T20:36:41"},{"date":"2004-01-04T01:37:01","version":"3.49_1"},{"date":"2004-01-12T22:04:27","version":"3.50"},{"date":"2004-02-27T04:19:47","version":"3.51"},{"version":"3.52","date":"2004-03-21T17:42:11"},{"version":"3.53","date":"2004-03-23T02:33:53"},{"date":"2004-03-24T14:55:49","version":"3.54"},{"date":"2004-04-17T02:30:02","version":"3.56"},{"version":"3.57","date":"2004-04-22T02:26:41"},{"date":"2004-05-05T21:55:00","version":"3.58"},{"date":"2004-07-02T17:48:51","version":"3.59"},{"version":"3.61","date":"2004-09-28T02:25:35"},{"version":"3.62","date":"2004-10-09T04:00:51"},{"date":"2004-11-17T22:27:13","version":"3.63"},{"version":"4.00_01","date":"2005-05-20T01:25:45"},{"date":"2005-07-03T19:37:11","version":"4.00_02"},{"date":"2005-07-20T02:07:36","version":"3.70"},{"version":"3.71","date":"2005-07-31T17:36:02"},{"date":"2005-08-14T16:09:26","version":"4.00"},{"date":"2005-08-20T18:20:14","version":"4.01"},{"version":"4.02","date":"2005-09-01T02:31:29"},{"date":"2005-12-23T01:00:49","version":"4.10"},{"version":"4.11","date":"2006-01-03T23:49:53"},{"date":"2006-01-06T02:14:25","version":"4.12"},{"version":"4.13","date":"2006-02-10T02:48:33"},{"date":"2006-02-17T18:48:14","version":"4.14"},{"date":"2006-06-13T01:12:23","version":"4.20"},{"version":"4.21_01","date":"2006-07-01T15:42:37"},{"date":"2006-07-11T01:45:51","version":"4.30"},{"version":"4.40","date":"2006-08-21T23:43:58"},{"date":"2006-10-03T18:16:57","version":"4.49_1"},{"version":"4.50","date":"2006-12-05T02:41:19"},{"version":"4.51","date":"2007-07-14T03:36:00"},{"version":"4.52","date":"2007-10-19T19:41:46"},{"date":"2007-10-20T20:02:19","version":"4.50"},{"date":"2007-10-21T13:30:20","version":"4.54"},{"date":"2007-10-21T15:50:42","version":"4.55"},{"version":"4.56","date":"2007-10-31T16:49:55"},{"date":"2007-11-02T02:55:19","version":"4.57"},{"date":"2008-06-16T18:28:54","version":"4.60"},{"date":"2008-06-16T18:46:47","version":"4.61"},{"version":"4.62","date":"2009-01-03T17:14:18"},{"date":"2009-01-03T17:49:48","version":"4.63"},{"date":"2009-12-31T03:22:00","version":"4.65"},{"date":"2010-02-24T14:33:48","version":"4.66"},{"date":"2011-11-12T02:18:45","version":"4.67"},{"date":"2011-11-12T03:11:55","version":"4.70"},{"version":"4.71","date":"2012-10-02T20:40:09"},{"version":"4.80","date":"2012-11-01T15:14:05"},{"version":"4.81","date":"2013-07-19T12:31:06"},{"date":"2017-02-23T15:15:37","version":"4.82"},{"date":"2017-02-23T16:39:53","version":"4.83"},{"date":"2017-02-25T15:12:25","version":"4.84"},{"date":"2017-02-25T20:34:08","version":4.85},{"version":4.86,"date":"2017-03-26T19:39:49"},{"date":"2017-08-28T12:41:42","version":4.88}]},"Pod-Perldoc":{"versions":[{"date":"2002-11-11T10:33:54","version":"3.04"},{"version":"3.05","date":"2002-11-12T05:04:50"},{"version":"3.06","date":"2002-11-22T10:04:59"},{"date":"2002-12-02T05:24:12","version":"3.07"},{"date":"2003-01-19T03:50:24","version":"3.08"},{"version":"3.09","date":"2003-07-24T14:38:18"},{"date":"2003-09-11T07:02:58","version":"3.10"},{"version":"3.11","date":"2003-10-12T23:01:05"},{"date":"2003-10-22T01:02:23","version":"3.12"},{"date":"2004-04-10T02:26:31","version":"3.13"},{"date":"2004-11-30T22:34:04","version":"3.14"},{"version":"3.14_01","date":"2007-08-23T12:55:53"},{"version":"3.14_02","date":"2007-08-23T18:18:55"},{"version":"3.14_03","date":"2007-09-04T13:39:37"},{"version":"3.14_04","date":"2008-04-16T14:37:04"},{"date":"2008-04-22T18:26:25","version":"3.14_05"},{"date":"2008-05-03T00:43:47","version":"3.14_06"},{"date":"2008-05-08T14:33:08","version":"3.14_07"},{"date":"2008-11-01T15:01:44","version":"3.15"},{"date":"2009-09-30T17:29:52","version":"3.15_01"},{"version":"3.15_08","date":"2011-11-13T23:32:29"},{"version":"3.15_09","date":"2011-11-14T19:38:57"},{"date":"2011-11-20T01:58:40","version":"3.15_10"},{"date":"2011-11-29T19:10:49","version":"3.15_11"},{"date":"2011-12-09T13:03:26","version":"3.15_12"},{"version":"3.15_13","date":"2011-12-14T10:17:10"},{"date":"2011-12-18T16:08:00","version":"3.15_14"},{"version":"3.15_15","date":"2012-01-06T16:47:58"},{"date":"2012-03-17T05:02:18","version":"3.16"},{"version":"3.17","date":"2012-03-18T03:01:03"},{"version":"3.18","date":"2013-01-28T04:11:09"},{"version":"3.19","date":"2013-01-28T04:33:05"},{"date":"2013-01-29T02:56:49","version":"3.19_01"},{"date":"2013-04-27T05:51:04","version":"3.20"},{"version":"3.21_01","date":"2013-11-19T17:18:23"},{"date":"2014-01-06T02:28:01","version":"3.21"},{"version":"3.22_01","date":"2014-01-31T05:43:36"},{"date":"2014-02-05T05:17:44","version":"3.22_02"},{"date":"2014-02-23T19:09:39","version":"3.23"},{"version":"3.23_01","date":"2014-08-16T16:52:05"},{"version":"3.24","date":"2014-08-19T03:49:18"},{"version":"3.24_01","date":"2014-09-10T03:32:34"},{"version":"3.24_02","date":"2015-01-21T03:18:32"},{"version":"3.25","date":"2015-02-12T03:13:45"},{"date":"2016-01-12T14:43:09","version":"3.25_02"},{"version":"3.26","date":"2016-07-28T04:44:07"},{"version":"3.26_01","date":"2016-07-30T16:09:06"},{"version":"3.26_02","date":"2016-08-02T16:35:03"},{"version":"3.27","date":"2016-08-03T20:48:54"},{"date":"2016-10-16T02:46:57","version":"3.27_01"},{"date":"2017-03-01T22:00:04","version":"3.27_02"},{"version":"3.28","date":"2017-03-16T01:14:07"},{"date":"2023-12-06T07:21:16","version":"3.28_01"},{"date":"2025-02-16T02:15:19","version":"3.29"},{"version":"3.15_02","perl_release":"5.011005","date":"2010-02-20T00:00:00","dual_lived":1},{"perl_release":"5.013009","version":"3.15_03","dual_lived":1,"date":"2011-01-20T00:00:00"},{"version":"3.15_04","perl_release":"5.014001","date":"2011-06-16T00:00:00","dual_lived":1},{"version":"3.15_05","perl_release":"5.015000","date":"2011-06-20T00:00:00","dual_lived":1},{"perl_release":"5.015001","version":"3.15_06","dual_lived":1,"date":"2011-07-20T00:00:00"},{"dual_lived":1,"date":"2011-09-20T00:00:00","perl_release":"5.015003","version":"3.15_07"},{"date":"2017-01-14T00:00:00","dual_lived":1,"perl_release":"5.022003","version":"3.25_01"},{"date":"2017-01-14T00:00:00","dual_lived":1,"version":"3.25_03","perl_release":"5.024001"},{"perl_release":"5.027005","version":"3.2801","date":"2017-10-20T00:00:00","dual_lived":1}],"advisories":[{"severity":"high","cves":["CVE-2016-1238"],"reported":"2016-08-02","references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"distribution":"Pod-Perldoc","id":"CPANSA-Pod-Perldoc-2016-1238","description":"(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.\n","fixed_versions":[">=3.26"],"affected_versions":["<3.26"]}],"main_module":"Pod::Perldoc"},"Perlbal":{"main_module":"Perlbal","versions":[{"version":"1.3","date":"2005-07-26T20:21:09"},{"version":"1.35","date":"2005-08-17T06:04:13"},{"date":"2005-08-19T17:27:29","version":"1.36"},{"version":"1.38","date":"2005-10-19T16:57:48"},{"version":"1.41","date":"2006-02-06T19:25:44"},{"date":"2006-08-04T04:56:17","version":"1.42"},{"date":"2006-08-09T18:09:23","version":"1.43"},{"date":"2006-08-10T21:49:57","version":"1.44"},{"version":"1.45","date":"2006-08-10T23:04:14"},{"date":"2006-08-10T23:55:32","version":"1.46"},{"date":"2006-08-15T23:17:40","version":"1.47"},{"version":"1.50","date":"2006-09-08T20:42:55"},{"version":"1.51","date":"2006-10-04T18:55:28"},{"version":"1.52","date":"2006-11-13T18:01:56"},{"date":"2006-12-05T09:32:56","version":"1.53"},{"version":"1.54","date":"2007-02-05T20:00:01"},{"version":"1.55","date":"2007-03-21T07:32:33"},{"date":"2007-04-16T21:02:13","version":"1.56"},{"date":"2007-04-26T20:37:24","version":"1.57"},{"date":"2007-05-11T18:20:57","version":"1.58"},{"version":"1.59","date":"2007-05-22T17:31:31"},{"date":"2007-10-24T04:09:35","version":"1.60"},{"version":"1.70","date":"2008-03-09T04:28:27"},{"date":"2008-09-14T00:41:35","version":"1.71"},{"version":"1.72","date":"2008-09-22T01:40:20"},{"date":"2009-10-05T20:51:59","version":"1.73"},{"date":"2010-03-20T07:59:03","version":"1.74"},{"version":"1.75","date":"2010-04-02T22:32:03"},{"version":"1.76","date":"2010-06-18T01:52:54"},{"date":"2011-01-16T05:20:16","version":"1.77"},{"date":"2011-01-23T05:33:07","version":"1.78"},{"version":"1.79","date":"2011-06-15T23:59:19"},{"date":"2012-02-27T07:02:28","version":"1.80"}],"advisories":[{"affected_versions":["<1.70"],"description":"Directory traversal vulnerability in the _serve_request_multiple function in lib/Perlbal/ClientHTTPBase.pm in Perlbal before 1.70, when concat get is enabled, allows remote attackers to read arbitrary files in a parent directory via a directory traversal sequence in an unspecified parameter. NOTE: some of these details are obtained from third party information.\n","fixed_versions":[],"id":"CPANSA-Perlbal-2008-1652","distribution":"Perlbal","references":["http://search.cpan.org/src/BRADFITZ/Perlbal-1.70/CHANGES","http://secunia.com/advisories/29565","http://www.vupen.com/english/advisories/2008/1045/references","https://exchange.xforce.ibmcloud.com/vulnerabilities/41540"],"reported":"2008-04-02","cves":["CVE-2008-1652"],"severity":null}]},"GitLab-API-v4":{"versions":[{"version":"0.01","date":"2017-12-11T18:40:52"},{"date":"2017-12-16T00:11:18","version":"0.02"},{"version":"0.03","date":"2018-01-12T21:26:23"},{"date":"2018-02-03T23:15:40","version":"0.04"},{"date":"2018-03-06T18:26:52","version":"0.05"},{"date":"2018-04-09T20:06:01","version":"0.06"},{"version":"0.07","date":"2018-05-10T21:33:05"},{"version":"0.08","date":"2018-05-14T17:33:39"},{"date":"2018-05-29T04:48:13","version":"0.09"},{"version":"0.10","date":"2018-06-06T06:47:41"},{"version":"0.11","date":"2018-09-02T05:24:51"},{"version":"0.12","date":"2018-09-12T01:04:05"},{"date":"2018-11-08T13:44:56","version":"0.13"},{"version":"0.14","date":"2018-12-04T20:39:42"},{"version":"0.15","date":"2019-01-09T18:13:46"},{"version":"0.16","date":"2019-02-18T06:21:38"},{"version":"0.17","date":"2019-02-20T22:49:13"},{"version":"0.18","date":"2019-04-01T04:36:27"},{"version":"0.19","date":"2019-05-17T20:41:31"},{"version":"0.20","date":"2019-07-23T21:42:57"},{"version":"0.21","date":"2019-08-24T18:56:25"},{"date":"2019-09-13T15:03:00","version":"0.22"},{"date":"2019-10-18T19:55:54","version":"0.23"},{"version":"0.24","date":"2020-02-12T22:10:58"},{"date":"2020-02-12T22:21:40","version":"0.25"},{"date":"2021-01-30T07:11:26","version":"0.26"},{"version":"0.27","date":"2023-06-07T20:51:14"}],"advisories":[{"id":"CPANSA-GitLab-API-v4-2023-31485","distribution":"GitLab-API-v4","reported":"2023-02-28","references":["https://github.com/bluefeet/GitLab-API-v4/pull/57","https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/","https://www.openwall.com/lists/oss-security/2023/04/18/14","https://github.com/chansen/p5-http-tiny/pull/151"],"cves":["CVE-2023-31485"],"affected_versions":[">=0.26"],"fixed_versions":[],"description":"GitLab::API::v4 is missing the verify_SSL=>1 flag in HTTP::Tiny, allowing a network attacker to MITM connections to the GitLab server.\n"}],"main_module":"GitLab::API::v4"},"Mozilla-CA":{"main_module":"Mozilla::CA","versions":[{"date":"2011-01-22T12:13:20","version":"20110122"},{"date":"2011-01-26T19:10:48","version":"20110126"},{"version":"20110209","date":"2011-02-11T22:42:06"},{"date":"2011-03-01T23:13:54","version":"20110301"},{"version":"20110409","date":"2011-04-09T21:15:42"},{"version":"20110904","date":"2011-09-04T03:48:06"},{"version":"20110914","date":"2011-09-15T08:01:35"},{"date":"2011-10-25T06:46:10","version":"20111025"},{"date":"2012-01-18T06:52:33","version":"20120118"},{"date":"2012-03-09T01:57:07","version":"20120309"},{"date":"2012-08-22T00:27:51","version":"20120822"},{"version":"20120823","date":"2012-08-22T06:39:33"},{"version":"20130114","date":"2013-01-14T18:34:17"},{"date":"2014-12-22T00:25:09","version":"20141217"},{"date":"2015-08-26T05:56:57","version":"20150826"},{"version":"20160104","date":"2016-01-04T01:19:28"},{"version":"20180117","date":"2018-03-01T11:34:46"},{"date":"2020-05-20T04:53:47","version":"20200520"},{"version":"20211001","date":"2021-10-01T21:38:43"},{"date":"2022-11-14T10:45:12","version":"20221114"},{"date":"2023-08-01T15:43:22","version":"20230801"},{"date":"2023-08-07T12:10:03","version":"20230807"},{"date":"2023-08-21T18:15:27","version":"20230821"},{"version":"20231213","date":"2023-12-13T20:18:41"},{"date":"2024-03-13T15:19:08","version":"20240313"},{"version":"20240730","date":"2024-07-30T16:10:02"},{"date":"2024-09-24T02:19:55","version":"20240924"},{"version":"20250202","date":"2025-02-02T15:34:15"}],"advisories":[{"id":"CPANSA-Mozilla-CA-2011-34","cves":[],"severity":null,"distribution":"Mozilla-CA","references":["https://rt.cpan.org/Public/Bug/Display.html?id=70967","https://www.mozilla.org/en-US/security/advisories/mfsa2011-35/","https://www.mozilla.org/en-US/security/advisories/mfsa2011-34/"],"reported":null,"affected_versions":["<20110914"],"description":"Google Chrome user alibo encountered an active \"man in the middle\" (MITM) attack on secure SSL connections to Google servers. The fraudulent certificate was mis-issued by DigiNotar, a Dutch Certificate Authority. DigiNotar has reported evidence that other fraudulent certificates were issued and in active use but the full extent of the compromise is not known.\n","fixed_versions":[">=20110914"]},{"affected_versions":["<20240730"],"fixed_versions":[">=20240730"],"description":"ECM GlobalTrust 2000 root certificates have been distrusted\n","id":"CPANSA-Mozilla-CA-2024-39689","severity":"low","cves":["CVE-2024-39689"],"references":["https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/XpknYMPO8dI","https://groups.google.com/a/ccadb.org/g/public/c/wRs-zec8w7k/m/G_9QprJ2AQAJ","https://github.com/certifi/python-certifi/security/advisories/GHSA-248v-346w-9cwc","https://github.com/certifi/python-certifi/commit/bd8153872e9c6fc98f4023df9c2deaffea2fa463"],"reported":"2024-06-11","distribution":"Mozilla-CA"}]},"Net-Server":{"versions":[{"date":"2001-03-05T14:48:26","version":"0.46"},{"version":"0.47","date":"2001-03-08T14:37:30"},{"version":"0.52","date":"2001-03-13T16:35:32"},{"date":"2001-03-20T06:55:22","version":"0.55"},{"version":"0.58","date":"2001-04-09T16:54:28"},{"date":"2001-05-10T15:05:54","version":"0.63"},{"version":"0.65","date":"2001-07-05T15:19:21"},{"version":"0.75","date":"2001-08-23T17:45:28"},{"version":"0.77","date":"2001-08-27T16:15:20"},{"date":"2001-10-24T16:30:10","version":"0.79"},{"version":"0.80","date":"2001-11-14T17:30:01"},{"version":"0.81","date":"2001-11-19T20:57:43"},{"version":"0.82","date":"2002-02-05T21:55:06"},{"version":"0.84","date":"2002-06-20T20:21:27"},{"version":"0.85","date":"2003-03-07T15:29:18"},{"date":"2003-11-06T20:11:03","version":"0.86"},{"version":"0.87","date":"2004-02-15T06:20:34"},{"date":"2005-05-05T01:51:14","version":"0.88"},{"version":"0.88","date":"2005-06-21T21:24:27"},{"date":"2005-11-23T08:40:11","version":"0.89"},{"version":"0.90","date":"2005-12-05T21:19:07"},{"version":"0.91","date":"2006-03-08T22:27:33"},{"date":"2006-03-22T17:26:29","version":"0.92"},{"date":"2006-03-24T20:03:25","version":"0.93"},{"version":"0.94","date":"2006-07-12T02:54:02"},{"version":"0.95","date":"2007-02-03T08:23:04"},{"date":"2007-03-26T15:01:13","version":"0.96"},{"date":"2007-07-25T16:29:47","version":"0.97"},{"version":"0.99","date":"2010-07-13T19:27:21"},{"date":"2011-07-22T12:36:35","version":"0.99.6.1"},{"date":"2012-05-30T15:41:07","version":"2.000"},{"date":"2012-05-30T21:48:13","version":"2.001"},{"version":"2.002","date":"2012-05-31T21:43:35"},{"date":"2012-06-06T19:31:21","version":"2.003"},{"version":"2.004","date":"2012-06-08T17:22:50"},{"version":"2.005","date":"2012-06-12T19:40:55"},{"version":"2.006","date":"2012-06-20T22:51:22"},{"version":"2.007","date":"2013-01-10T07:47:04"},{"date":"2014-05-12T18:22:26","version":"2.008"},{"date":"2017-08-10T21:13:01","version":"2.009"},{"version":"2.010","date":"2021-03-22T15:23:31"},{"date":"2022-12-02T00:35:10","version":"2.011"},{"date":"2022-12-02T04:19:54","version":"2.012"},{"version":"2.013","date":"2022-12-03T01:57:05"},{"date":"2023-03-14T17:16:00","version":"2.014"}],"advisories":[{"description":"Format string vulnerability in the log function in Net::Server 0.87 and earlier, as used in Postfix Greylisting Policy Server (Postgrey) 1.18 and earlier, and possibly other products, allows remote attackers to cause a denial of service (crash) via format string specifiers that are not properly handled before being sent to syslog, as demonstrated using sender addresses to Postgrey.\n","fixed_versions":[">0.87"],"affected_versions":["<=0.87"],"severity":null,"cves":["CVE-2005-1127"],"reported":"2005-05-02","references":["http://lists.ee.ethz.ch/postgrey/msg00627.html","http://lists.ee.ethz.ch/postgrey/msg00630.html","http://lists.ee.ethz.ch/postgrey/msg00647.html","http://www.osvdb.org/15517","http://secunia.com/advisories/14958","http://www.debian.org/security/2006/dsa-1121","http://www.debian.org/security/2006/dsa-1122","http://secunia.com/advisories/21164","http://secunia.com/advisories/21152","http://secunia.com/advisories/21149","http://www.gentoo.org/security/en/glsa/glsa-200608-18.xml","http://www.securityfocus.com/bid/13193","http://secunia.com/advisories/21452","http://www.mandriva.com/security/advisories?name=MDKSA-2006:131","http://marc.info/?l=full-disclosure&m=111354538331167&w=2","https://exchange.xforce.ibmcloud.com/vulnerabilities/20108"],"distribution":"Net-Server","id":"CPANSA-Net-Server-2005-1127"}],"main_module":"Net::Server"},"CPAN-Checksums":{"main_module":"CPAN::Checksums","advisories":[{"severity":"medium","cves":["CVE-2020-16155"],"references":["https://metacpan.org/pod/CPAN::Checksums","https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/"],"reported":"2021-12-13","distribution":"CPAN-Checksums","id":"CPANSA-CPAN-Checksums-2020-16155","description":"The CPAN::Checksums package 2.12 for Perl does not uniquely define signed data.\n","fixed_versions":[],"affected_versions":[">=2.12"]}],"versions":[{"version":"1.003","date":"2000-12-10T09:31:19"},{"version":"1.004","date":"2000-12-11T08:49:05"},{"date":"2000-12-11T10:20:16","version":"1.006"},{"version":"1.007","date":"2000-12-11T13:38:18"},{"version":"1.008","date":"2000-12-13T11:24:09"},{"version":"1.009","date":"2002-03-31T20:27:49"},{"date":"2002-10-06T17:22:35","version":"1.0"},{"version":"1.011","date":"2002-10-07T08:56:12"},{"date":"2003-02-02T10:26:00","version":"1.014"},{"date":"2003-02-03T15:44:57","version":"1.015"},{"version":"1.016","date":"2003-02-03T19:21:46"},{"version":"1.018","date":"2005-01-24T07:59:41"},{"date":"2005-10-31T07:27:02","version":"1.032"},{"version":"1.039","date":"2005-11-11T07:16:04"},{"version":"1.048","date":"2006-05-01T13:34:41"},{"version":"1.050","date":"2006-05-09T03:30:39"},{"date":"2007-08-05T12:10:58","version":"1.061"},{"date":"2007-10-09T03:09:45","version":"1.064"},{"date":"2008-05-17T05:26:24","version":"2.00"},{"version":"2.01","date":"2008-09-03T19:33:28"},{"date":"2008-10-31T06:54:59","version":"2.02"},{"date":"2009-09-20T01:50:36","version":"2.03"},{"date":"2009-09-28T04:10:09","version":"2.04"},{"date":"2010-01-23T05:39:17","version":"2.05"},{"date":"2010-10-24T12:13:44","version":"2.06"},{"date":"2010-11-20T22:18:39","version":"2.07"},{"date":"2011-08-30T06:32:02","version":"2.08"},{"date":"2014-04-04T04:06:11","version":"2.09"},{"date":"2015-04-11T05:48:38","version":"2.10"},{"version":"2.11","date":"2016-04-09T05:42:27"},{"date":"2016-06-14T02:42:03","version":"2.12"},{"date":"2021-11-23T16:57:18","version":"2.13"},{"version":"2.14","date":"2021-12-04T10:00:42"}]},"Dezi":{"versions":[{"date":"2011-06-22T04:53:57","version":"0.001000"},{"version":"0.001001","date":"2011-08-03T02:42:22"},{"date":"2011-09-30T03:35:08","version":"0.001002"},{"version":"0.001003","date":"2011-10-23T02:12:02"},{"version":"0.001004","date":"2012-03-17T02:40:15"},{"version":"0.001005","date":"2012-07-11T03:20:40"},{"version":"0.001006","date":"2012-08-18T02:43:23"},{"date":"2012-08-22T03:58:33","version":"0.001007"},{"version":"0.001008","date":"2012-09-04T02:05:34"},{"version":"0.002000","date":"2012-09-12T03:51:13"},{"date":"2012-09-13T01:50:59","version":"0.002001"},{"date":"2012-09-13T14:10:02","version":"0.002002"},{"date":"2012-10-16T00:57:46","version":"0.002003"},{"date":"2012-10-18T03:15:21","version":"0.002004"},{"version":"0.002005","date":"2012-12-19T05:25:13"},{"version":"0.002006","date":"2013-02-03T02:49:07"},{"date":"2013-02-05T15:02:54","version":"0.002007"},{"version":"0.002008","date":"2013-02-09T05:37:41"},{"version":"0.002009","date":"2013-02-13T02:30:33"},{"date":"2013-02-13T04:31:49","version":"0.002010"},{"date":"2013-11-13T17:08:03","version":"0.002011"},{"date":"2014-02-27T18:08:30","version":"0.002012"},{"version":"0.002998_01","date":"2014-06-05T06:59:12"},{"date":"2014-06-08T04:59:17","version":"0.003000"},{"date":"2014-07-30T20:40:24","version":"0.004000"},{"date":"2014-09-02T02:45:00","version":"0.004001"},{"date":"2015-04-30T22:01:11","version":"0.004002"},{"version":"0.004003","date":"2018-05-16T02:24:24"}],"advisories":[{"affected_versions":["<0.002002"],"description":"Bypassing authentication on the /index URL app with non-idempotent requests to /search URL.\n","fixed_versions":[">=0.002002"],"id":"CPANSA-Dezi-2012-01","cves":[],"distribution":"Dezi","references":["https://metacpan.org/changes/distribution/Dezi","https://github.com/karpet/Dezi/commit/f1ad292b4dd988d1a38202c804bb7a2a3bcca3c8"],"reported":"2012-09-13"}],"main_module":"Dezi"},"CGI-Application":{"main_module":"CGI::Application","versions":[{"date":"2000-07-11T04:23:51","version":"1.0"},{"date":"2000-07-12T15:21:41","version":"1.1"},{"date":"2000-07-18T21:11:44","version":"1.2"},{"version":"1.3","date":"2001-05-21T12:03:59"},{"version":"1.31","date":"2001-05-28T18:29:06"},{"version":"2.0","date":"2001-06-25T03:17:50"},{"version":"2.1","date":"2001-08-11T22:18:28"},{"date":"2002-05-06T03:21:57","version":"2.2"},{"version":"2.3","date":"2002-05-06T11:57:30"},{"version":"2.4","date":"2002-05-27T01:01:18"},{"version":"2.5","date":"2002-07-18T11:59:16"},{"version":"2.6","date":"2002-10-07T13:03:27"},{"date":"2003-02-01T13:52:45","version":"3.0"},{"version":"3.1","date":"2003-06-02T13:01:50"},{"version":"3.2","date":"2004-02-04T03:23:56"},{"version":"3.2","date":"2004-02-04T15:53:56"},{"version":"3.22","date":"2004-02-14T01:47:53"},{"version":"3.30","date":"2004-09-26T19:22:20"},{"version":"3.31","date":"2004-09-26T19:35:26"},{"version":"4.0_2","date":"2005-03-19T14:42:14"},{"date":"2005-06-07T03:25:55","version":"4.0_4"},{"version":"4.0","date":"2005-06-11T04:00:57"},{"date":"2005-06-13T19:15:12","version":"4.01_01"},{"date":"2005-06-14T14:37:30","version":"4.01"},{"date":"2005-07-24T19:08:18","version":"4.02_1"},{"date":"2005-07-31T03:11:25","version":"4.02"},{"date":"2005-08-04T23:45:52","version":"4.03"},{"version":"4.04_01","date":"2005-09-01T02:54:00"},{"date":"2005-09-09T01:12:21","version":"4.04_02"},{"date":"2005-10-12T02:12:18","version":"4.04"},{"date":"2006-03-02T01:58:41","version":"4.05"},{"date":"2006-04-13T02:34:40","version":"4.06"},{"version":"4.07_01","date":"2006-07-02T05:05:34"},{"date":"2007-10-31T23:34:31","version":"4.07_02"},{"date":"2008-06-16T20:09:18","version":"4.07_03"},{"version":"4.10","date":"2008-06-18T03:30:33"},{"version":"4.11","date":"2008-08-10T15:36:00"},{"date":"2008-09-27T04:18:05","version":"4.11"},{"version":"4.11","date":"2008-11-02T00:43:18"},{"version":"4.21","date":"2009-01-03T16:13:59"},{"version":"4.30","date":"2009-07-30T01:35:48"},{"version":"4.31","date":"2009-07-30T01:42:34"},{"version":"4.32_1","date":"2010-02-14T00:33:00"},{"date":"2011-06-16T17:07:16","version":"4.50"},{"date":"2015-01-23T12:19:21","version":"4.50_50"},{"version":"4.50_51","date":"2015-07-18T12:57:01"},{"date":"2018-02-28T13:57:05","version":"4.60"},{"date":"2018-03-01T13:29:17","version":"4.60_1"},{"date":"2018-03-02T09:20:24","version":"4.61"}],"advisories":[{"affected_versions":["<4.50_51"],"fixed_versions":[],"description":"The CGI::Application module before 4.50_50 and 4.50_51 for Perl, when run modes are not specified, allows remote attackers to obtain sensitive information (web queries and environment details) via vectors related to the dump_html function.\n","id":"CPANSA-CGI-Application-2013-7329","severity":null,"cves":["CVE-2013-7329"],"references":["https://github.com/markstos/CGI--Application/pull/15","http://openwall.com/lists/oss-security/2014/02/19/11","http://lists.fedoraproject.org/pipermail/package-announce/2014-March/129436.html","http://lists.fedoraproject.org/pipermail/package-announce/2014-March/129444.html","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=739505","http://www.securityfocus.com/bid/65687","https://rt.cpan.org/Public/Bug/Display.html?id=84403","https://bugzilla.redhat.com/show_bug.cgi?id=1067180","https://exchange.xforce.ibmcloud.com/vulnerabilities/91735"],"reported":"2014-10-06","distribution":"CGI-Application"}]},"Graphics-ColorNames":{"versions":[{"version":"0.10","date":"2001-02-20T03:47:48"},{"date":"2001-04-12T02:32:22","version":"0.20"},{"version":"0.21","date":"2001-04-13T04:37:27"},{"version":"0.22","date":"2001-04-15T14:26:41"},{"date":"2001-04-18T03:13:51","version":"0.23"},{"version":"0.24","date":"2001-04-28T16:09:48"},{"version":"0.30","date":"2001-10-05T02:42:20"},{"version":"0.31","date":"2002-10-24T01:17:51"},{"date":"2002-12-05T03:07:24","version":"0.32"},{"version":"0.3901","date":"2004-07-22T00:41:35"},{"version":"0.39_02","date":"2004-07-22T20:01:47"},{"date":"2004-07-23T01:52:58","version":"0.39_03"},{"version":"0.39_04","date":"2004-07-26T06:36:47"},{"version":"1.00","date":"2004-08-01T01:21:33"},{"version":"1.01","date":"2004-08-18T20:32:07"},{"date":"2004-08-24T15:53:20","version":"1.02"},{"version":"1.03","date":"2004-08-26T21:51:46"},{"version":"1.04","date":"2004-09-03T06:56:23"},{"date":"2004-09-03T07:00:16","version":"1.05"},{"version":"1.06","date":"2005-03-29T23:06:41"},{"date":"2005-04-04T15:17:24","version":"2.0_01"},{"date":"2005-04-07T16:08:52","version":"2.0_02"},{"date":"2005-04-08T16:48:24","version":"2.0_03"},{"version":"2.0_04","date":"2006-10-24T13:58:29"},{"version":"2.01","date":"2007-12-16T15:33:27"},{"version":"2.02","date":"2007-12-16T16:04:00"},{"version":"2.03","date":"2007-12-17T12:49:37"},{"date":"2007-12-17T20:01:53","version":"2.04"},{"version":"2.10_01","date":"2007-12-20T16:01:35"},{"date":"2008-01-04T15:55:53","version":"2.10_02"},{"version":"2.10_03","date":"2008-01-05T13:14:32"},{"date":"2008-01-06T21:52:18","version":"2.10_04"},{"date":"2008-01-08T16:20:38","version":"2.10_05"},{"date":"2008-01-10T21:43:53","version":"2.11"},{"version":"v3.0.0","date":"2018-09-27T23:02:17"},{"version":"v3.0.1","date":"2018-09-28T12:40:06"},{"version":"v3.0.2","date":"2018-09-28T16:56:39"},{"version":"v3.1.0","date":"2018-09-30T12:37:45"},{"version":"v3.1.1","date":"2018-10-01T16:51:16"},{"date":"2018-10-01T22:15:39","version":"v3.1.2"},{"date":"2018-10-03T23:36:26","version":"v3.2.0"},{"date":"2018-10-06T10:00:38","version":"v3.2.1"},{"date":"2018-10-23T20:30:22","version":"v3.3.0"},{"date":"2018-10-24T15:03:58","version":"v3.3.1"},{"version":"v3.3.2","date":"2018-10-27T16:33:30"},{"date":"2018-10-27T18:31:44","version":"v3.3.3"},{"version":"v3.3.4","date":"2018-11-11T15:13:51"},{"date":"2018-11-18T19:13:42","version":"v3.4.0"},{"version":"v3.5.0","date":"2019-06-06T20:30:43"}],"advisories":[{"affected_versions":[">=2.0_01,<=3.1.2"],"fixed_versions":[">3.1.2"],"description":"A specially-named file may lead to HTML injection attacks.\n","id":"CPANSA-Graphics-ColorNames-2010-02","references":["https://metacpan.org/changes/distribution/Graphics-ColorNames","https://rt.cpan.org/Public/Bug/Display.html?id=54500"],"reported":"2010-02-11","distribution":"Graphics-ColorNames","cves":["CVE-2024-55918"]}],"main_module":"Graphics::ColorNames"},"WWW-Mechanize":{"main_module":"WWW::Mechanize","versions":[{"date":"2002-09-10T21:50:10","version":"0.30"},{"version":"0.31","date":"2002-09-13T20:19:21"},{"version":"0.32","date":"2002-10-24T04:25:30"},{"version":"0.33","date":"2003-01-16T16:05:31"},{"date":"2003-01-22T23:57:57","version":"0.35"},{"date":"2003-02-04T17:40:03","version":"0.36"},{"date":"2003-03-04T21:13:29","version":"0.37"},{"date":"2003-03-25T05:52:17","version":"0.38"},{"date":"2003-04-02T05:31:16","version":"0.39"},{"date":"2003-04-20T02:56:53","version":"0.40"},{"date":"2003-05-23T04:29:22","version":"0.41"},{"date":"2003-05-27T03:44:25","version":"0.42"},{"version":"0.43","date":"2003-05-29T14:30:01"},{"version":"0.44","date":"2003-06-05T17:16:31"},{"version":"0.45","date":"2003-06-17T04:25:04"},{"date":"2003-06-20T16:17:58","version":"0.46"},{"date":"2003-06-22T03:54:22","version":"0.47"},{"date":"2003-06-22T18:56:42","version":"0.48"},{"version":"0.49","date":"2003-06-23T19:49:13"},{"date":"2003-06-24T14:54:50","version":"0.50"},{"version":"0.51","date":"2003-06-30T02:43:06"},{"date":"2003-07-08T23:52:55","version":"0.52"},{"version":"0.53","date":"2003-07-17T17:26:47"},{"version":"0.54","date":"2003-07-20T05:50:27"},{"version":"0.55","date":"2003-07-22T17:15:43"},{"version":"0.56","date":"2003-07-24T17:25:57"},{"date":"2003-08-01T04:36:32","version":"0.57"},{"version":"0.58","date":"2003-08-15T04:41:26"},{"version":"0.59","date":"2003-09-04T05:33:00"},{"date":"2003-09-23T04:32:57","version":"0.60"},{"version":"0.61","date":"2003-10-06T23:41:02"},{"version":"0.62","date":"2003-10-08T01:55:58"},{"version":"0.63","date":"2003-10-13T20:24:52"},{"date":"2003-10-24T04:57:15","version":"0.64"},{"date":"2003-11-10T06:19:18","version":"0.65"},{"version":"0.66","date":"2003-11-13T21:09:41"},{"date":"2003-11-26T05:21:34","version":"0.69_01"},{"date":"2003-12-01T05:52:38","version":"0.70"},{"version":"0.71_01","date":"2003-12-22T05:53:11"},{"version":"0.71_02","date":"2003-12-22T21:01:12"},{"version":"0.72","date":"2004-01-13T04:45:37"},{"version":"0.73_01","date":"2004-02-29T05:58:51"},{"date":"2004-03-03T05:57:51","version":"0.73_02"},{"date":"2004-03-21T06:08:45","version":"0.73_03"},{"date":"2004-03-23T05:41:11","version":"0.74"},{"version":"0.75_01","date":"2004-03-28T04:54:18"},{"version":"0.75_02","date":"2004-04-05T05:01:50"},{"version":"0.76","date":"2004-04-08T03:05:29"},{"date":"2004-04-10T05:55:21","version":"1.00"},{"date":"2004-04-14T04:14:17","version":"1.02"},{"version":"1.03_01","date":"2004-05-27T20:23:15"},{"version":"1.03_02","date":"2004-08-17T04:10:41"},{"version":"1.04","date":"2004-09-16T04:32:03"},{"date":"2004-10-01T02:18:55","version":"1.05_01"},{"date":"2004-10-02T22:08:55","version":"1.05_02"},{"version":"1.05_03","date":"2004-11-01T03:25:19"},{"version":"1.05_04","date":"2004-11-06T05:39:06"},{"date":"2004-12-08T21:25:06","version":"1.06"},{"date":"2004-12-24T07:08:27","version":"1.08"},{"date":"2005-02-02T05:58:14","version":"1.10"},{"version":"1.11_01","date":"2005-02-14T06:21:29"},{"version":"1.11_02","date":"2005-02-22T04:05:23"},{"version":"1.12","date":"2005-02-25T05:50:52"},{"date":"2005-04-12T19:32:06","version":"1.13_01"},{"date":"2005-08-30T22:32:23","version":"1.14"},{"date":"2005-10-28T22:38:43","version":"1.16"},{"date":"2006-01-12T22:26:07","version":"1.17_01"},{"date":"2006-02-02T06:32:25","version":"1.18"},{"version":"1.19_02","date":"2006-08-08T05:13:01"},{"version":"1.20","date":"2006-08-19T06:44:58"},{"version":"1.21_01","date":"2006-09-18T22:22:26"},{"version":"1.21_02","date":"2006-10-04T18:17:54"},{"date":"2006-10-07T06:26:26","version":"1.21_03"},{"version":"1.21_04","date":"2006-10-08T02:39:57"},{"date":"2007-03-02T06:09:51","version":"1.22"},{"date":"2007-05-11T21:01:11","version":"1.24"},{"date":"2007-05-16T05:27:55","version":"1.26"},{"version":"1.29_01","date":"2007-05-22T19:16:39"},{"date":"2007-05-25T02:37:45","version":"1.30"},{"date":"2007-09-18T04:39:11","version":"1.31_01"},{"version":"1.31_02","date":"2007-10-25T16:59:57"},{"date":"2007-10-30T17:09:44","version":"1.32"},{"date":"2007-12-10T06:39:14","version":"1.34"},{"date":"2008-09-28T04:52:28","version":"1.49_01"},{"version":"1.50","date":"2008-10-27T04:12:02"},{"version":"1.51_01","date":"2008-11-06T21:12:28"},{"version":"1.51_02","date":"2008-11-18T07:34:58"},{"version":"1.51_03","date":"2008-11-20T17:07:18"},{"version":"1.52","date":"2008-11-25T15:56:37"},{"version":"1.54","date":"2009-01-12T06:51:13"},{"date":"2009-07-06T17:20:24","version":"1.55_01"},{"date":"2009-07-10T22:13:25","version":"1.56"},{"version":"1.58","date":"2009-07-14T03:40:28"},{"date":"2009-08-17T06:04:34","version":"1.60"},{"version":"1.62","date":"2010-04-11T04:14:18"},{"date":"2010-07-01T15:49:38","version":"1.64"},{"date":"2010-09-10T22:10:32","version":"1.66"},{"date":"2011-04-07T05:12:31","version":"1.67_01"},{"date":"2011-04-21T15:11:30","version":"1.68"},{"date":"2011-08-01T21:49:08","version":"1.69_01"},{"version":"1.70","date":"2011-08-26T17:52:15"},{"date":"2011-11-25T18:39:23","version":"1.71"},{"version":"1.72","date":"2012-02-02T23:40:39"},{"version":"1.72_01","date":"2012-03-24T16:20:29"},{"date":"2012-04-27T00:35:00","version":"1.72_02"},{"version":"1.73","date":"2013-08-24T04:33:44"},{"version":"1.74","date":"2015-01-24T05:52:57"},{"date":"2015-06-03T03:27:34","version":"1.75"},{"date":"2016-07-29T16:21:58","version":"1.76"},{"date":"2016-08-05T16:58:03","version":"1.77"},{"version":"1.78","date":"2016-08-08T13:30:07"},{"date":"2016-09-17T04:05:20","version":"1.79"},{"version":"1.80","date":"2016-09-25T02:46:39"},{"date":"2016-10-06T12:55:47","version":"1.81"},{"version":"1.82","date":"2016-10-07T13:50:48"},{"version":"1.83","date":"2016-10-14T20:59:34"},{"date":"2017-03-07T18:46:19","version":"1.84"},{"version":"1.85","date":"2017-06-28T22:11:34"},{"version":"1.86","date":"2017-07-04T15:51:05"},{"date":"2018-02-07T22:07:28","version":"1.87"},{"date":"2018-03-23T15:41:01","version":"1.88"},{"date":"2018-10-18T19:56:43","version":"1.89"},{"version":"1.90","date":"2018-11-12T18:53:49"},{"date":"2019-01-10T19:04:12","version":"1.91"},{"date":"2019-08-24T01:02:55","version":"1.92"},{"date":"2019-10-04T21:10:14","version":"1.93"},{"date":"2019-10-10T13:15:13","version":"1.94"},{"date":"2019-10-28T13:17:10","version":"1.95"},{"version":"1.96","date":"2020-02-21T02:27:01"},{"version":"1.97","date":"2020-05-14T00:48:07"},{"version":"1.98","date":"2020-05-25T17:08:10"},{"version":"1.99","date":"2020-06-08T15:44:13"},{"date":"2020-06-09T19:17:21","version":"2.00"},{"date":"2020-09-18T17:52:29","version":"2.01"},{"date":"2020-10-13T13:53:04","version":"2.02"},{"version":"2.03","date":"2020-11-10T14:49:20"},{"version":"2.04","date":"2021-08-06T12:35:04"},{"version":"2.05","date":"2021-09-21T14:23:14"},{"version":"2.06","date":"2021-10-25T21:00:18"},{"date":"2022-04-29T15:40:57","version":"2.07"},{"date":"2022-05-30T17:33:59","version":"2.08"},{"date":"2022-06-14T14:22:59","version":"2.09"},{"date":"2022-07-04T21:09:58","version":"2.10"},{"version":"2.11","date":"2022-07-17T17:27:26"},{"date":"2022-07-20T06:47:33","version":"2.12"},{"date":"2022-07-29T09:50:42","version":"2.13"},{"date":"2022-08-15T19:26:39","version":"2.14"},{"version":"2.15","date":"2022-08-21T08:24:07"},{"date":"2023-02-11T12:11:44","version":"2.16"},{"version":"2.17","date":"2023-04-27T15:49:35"},{"version":"2.18","date":"2024-01-30T14:34:27"},{"date":"2024-09-16T15:28:35","version":"2.19"}],"advisories":[{"affected_versions":["<1.05_03"],"fixed_versions":[">=1.05_03"],"description":"find_link() uses eval().\n","id":"CPANSA-WWW-Mechanize-2004-01","distribution":"WWW-Mechanize","reported":"2004-10-31","references":["https://metacpan.org/dist/WWW-Mechanize/changes"],"cves":[],"severity":null}]},"PAR-Packer":{"main_module":"PAR::Packer","versions":[{"date":"2006-12-01T14:20:06","version":"0.969_01"},{"version":"0.970","date":"2006-12-03T17:36:32"},{"date":"2007-02-03T12:27:07","version":"0.973"},{"version":"0.975","date":"2007-05-07T18:21:52"},{"version":"0.976","date":"2007-07-29T11:50:15"},{"version":"0.977","date":"2007-12-20T21:39:30"},{"date":"2008-02-29T18:37:56","version":"0.978"},{"version":"0.979","date":"2008-05-13T15:45:56"},{"version":"0.980","date":"2008-05-14T10:27:09"},{"version":"0.982","date":"2008-07-29T15:44:11"},{"date":"2009-03-10T15:55:06","version":"0.980"},{"date":"2009-03-21T11:20:02","version":"0.991"},{"version":"0.992_01","date":"2009-07-19T16:47:51"},{"date":"2009-07-23T13:18:32","version":"0.992_02"},{"version":"0.992_03","date":"2009-07-24T18:30:24"},{"version":"0.992_04","date":"2009-09-11T07:38:47"},{"date":"2009-11-13T09:01:15","version":"0.992_05"},{"version":"0.992_06","date":"2009-11-20T13:59:38"},{"date":"2009-11-22T13:08:12","version":"1.000"},{"version":"1.001","date":"2009-11-24T11:16:58"},{"version":"1.002","date":"2009-12-17T20:55:25"},{"date":"2010-04-10T17:57:57","version":"1.003"},{"date":"2010-04-20T12:10:24","version":"1.004"},{"version":"1.005","date":"2010-06-05T15:54:54"},{"date":"2010-06-26T11:23:34","version":"1.006"},{"version":"1.007","date":"2010-09-09T16:42:00"},{"date":"2010-11-21T17:11:43","version":"1.008"},{"date":"2011-03-26T13:36:55","version":"1.009"},{"date":"2011-07-13T14:10:05","version":"1.010"},{"date":"2011-12-01T21:08:37","version":"1.011"},{"version":"1.012","date":"2011-12-02T17:53:42"},{"date":"2012-02-22T09:58:04","version":"1.013"},{"version":"1.014","date":"2012-12-21T15:55:13"},{"version":"1.015","date":"2013-10-09T12:06:04"},{"version":"1.016","date":"2013-11-30T19:03:48"},{"date":"2013-12-03T23:53:51","version":"1.017"},{"date":"2014-05-18T16:52:34","version":"1.018"},{"date":"2014-07-07T14:25:15","version":"1.019"},{"date":"2014-08-24T13:27:57","version":"1.020"},{"date":"2014-09-14T13:49:37","version":"1.021"},{"version":"1.022","date":"2014-09-19T10:07:30"},{"version":"1.023","date":"2014-11-02T14:32:42"},{"date":"2014-11-07T09:04:07","version":"1.024"},{"date":"2015-01-24T16:52:17","version":"1.025"},{"version":"1.026","date":"2015-07-19T13:14:40"},{"date":"2015-11-18T16:58:33","version":"1.027"},{"date":"2015-11-19T09:05:09","version":"1.027"},{"date":"2016-01-12T16:24:46","version":"1.029"},{"version":"1.029_01","date":"2016-02-02T14:54:21"},{"version":"1.029_02","date":"2016-02-11T14:08:57"},{"version":"1.029_03","date":"2016-02-25T08:41:55"},{"version":"1.029_04","date":"2016-02-29T08:36:46"},{"version":"1.030","date":"2016-03-29T08:29:59"},{"version":"1.031","date":"2016-04-10T17:15:52"},{"version":"1.031_01","date":"2016-04-29T17:01:57"},{"date":"2016-05-07T09:59:28","version":"1.032"},{"version":"1.033","date":"2016-05-19T09:50:49"},{"date":"2016-07-17T12:38:31","version":"1.034"},{"date":"2016-07-23T12:04:14","version":"1.035"},{"date":"2016-12-04T17:13:20","version":"1.035_001"},{"version":"1.035_002","date":"2016-12-19T19:35:16"},{"date":"2016-12-30T11:06:25","version":"1.036"},{"version":"1.036_001","date":"2017-03-22T19:29:19"},{"version":"1.036_002","date":"2017-05-14T11:54:43"},{"version":"1.037","date":"2017-05-28T11:33:53"},{"version":"1.038","date":"2017-09-27T19:40:44"},{"version":"1.039","date":"2017-09-28T05:13:05"},{"date":"2017-10-10T17:00:14","version":"1.039_001"},{"date":"2017-10-13T12:05:52","version":"1.039_002"},{"version":"1.039_003","date":"2017-10-16T20:46:49"},{"version":"1.039_004","date":"2017-10-17T17:07:49"},{"version":"1.040","date":"2017-10-21T16:09:18"},{"version":"1.041","date":"2017-11-08T17:07:11"},{"version":"1.042","date":"2018-04-02T21:46:01"},{"date":"2018-04-03T11:26:08","version":"1.043"},{"date":"2018-06-06T22:03:32","version":"1.044"},{"version":"1.045","date":"2018-06-12T19:04:22"},{"date":"2018-08-17T22:20:28","version":"1.046"},{"date":"2018-08-19T09:17:57","version":"1.047"},{"date":"2019-03-04T09:42:35","version":"1.047_001"},{"date":"2019-03-04T15:33:14","version":"1.047_002"},{"version":"1.047_003","date":"2019-03-06T17:39:18"},{"version":"1.048","date":"2019-04-29T11:53:04"},{"version":"1.049","date":"2019-05-31T11:58:05"},{"version":"1.049_001","date":"2020-03-08T15:56:09"},{"date":"2020-03-08T22:53:16","version":"1.049_002"},{"date":"2020-03-08T22:58:32","version":"1.049_003"},{"date":"2020-03-10T13:51:31","version":"1.049_004"},{"version":"1.050","date":"2020-03-18T08:14:29"},{"date":"2020-11-29T22:25:00","version":"1.051"},{"version":"1.052","date":"2021-01-13T15:44:24"},{"version":"1.053","date":"2022-01-25T15:25:10"},{"date":"2022-01-27T11:05:32","version":"1.054"},{"version":"1.055","date":"2022-07-03T16:27:19"},{"version":"1.055_01","date":"2022-08-31T07:56:09"},{"version":"1.056","date":"2022-09-05T10:12:07"},{"version":"1.056_01","date":"2022-11-25T09:12:00"},{"date":"2022-11-27T15:25:29","version":"1.056_02"},{"date":"2022-11-29T11:33:29","version":"1.057"},{"version":"1.057_001","date":"2023-05-24T11:53:27"},{"version":"1.057_002","date":"2023-06-07T14:56:47"},{"date":"2023-06-12T09:14:24","version":"1.058"},{"version":"1.059","date":"2023-07-20T14:13:30"},{"date":"2023-12-15T14:05:16","version":"1.061"},{"version":"1.062","date":"2024-03-05T14:01:26"},{"date":"2024-03-10T13:46:23","version":"1.062_001"},{"version":"1.062_002","date":"2024-03-11T13:08:45"},{"version":"1.063","date":"2024-03-15T12:57:23"},{"date":"2024-06-24T09:05:18","version":"1.063_001"}],"advisories":[{"cves":["CVE-2011-4114"],"reported":"2011-07-18","references":["https://metacpan.org/changes/distribution/PAR-Packer","https://rt.cpan.org/Public/Bug/Display.html?id=69560"],"distribution":"PAR-Packer","id":"CPANSA-PAR-Packer-2011-01","fixed_versions":[">=1.011"],"description":"PAR packed files are extracted to unsafe and predictable temporary directories.\n","affected_versions":["<1.011"]}]},"POE-Component-IRC":{"main_module":"POE::Component::IRC","advisories":[{"affected_versions":["<6.32"],"fixed_versions":[],"description":"libpoe-component-irc-perl before v6.32 does not remove carriage returns and line feeds. This can be used to execute arbitrary IRC commands by passing an argument such as \\\"some text\\\\rQUIT\\\" to the 'privmsg' handler, which would cause the client to disconnect from the server.\n","id":"CPANSA-Poe-Component-IRC-2010-3438","severity":"critical","cves":["CVE-2010-3438"],"reported":"2019-11-12","references":["https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=581194","https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-3438","https://security-tracker.debian.org/tracker/CVE-2010-3438"],"distribution":"POE-Component-IRC"}],"versions":[{"date":"2001-01-14T01:08:55","version":"1.0"},{"version":"1.0","date":"2001-02-21T23:20:30"},{"date":"2001-03-02T11:10:34","version":"1.1"},{"version":"1.2","date":"2001-05-24T09:39:58"},{"version":"1.3","date":"2001-07-01T00:29:06"},{"version":"1.4","date":"2001-07-03T00:23:58"},{"version":"1.5","date":"2001-07-05T22:29:01"},{"date":"2001-07-07T02:07:09","version":"1.6"},{"version":"1.7","date":"2001-07-21T08:09:18"},{"date":"2001-12-11T00:06:53","version":"1.8"},{"date":"2001-12-13T07:07:40","version":"1.9"},{"date":"2002-02-22T23:26:52","version":"2.0"},{"date":"2002-03-05T01:19:43","version":"2.1"},{"version":"2.2","date":"2002-05-24T20:54:40"},{"version":"2.3","date":"2002-09-06T15:29:09"},{"version":"2.4","date":"2002-10-10T21:24:56"},{"version":"2.5","date":"2002-10-27T19:02:42"},{"version":"2.6","date":"2002-12-12T04:30:15"},{"version":"2.7","date":"2003-02-02T23:23:52"},{"version":"2.8","date":"2003-06-07T23:25:07"},{"version":"2.9","date":"2003-07-19T20:38:58"},{"date":"2004-12-31T13:57:37","version":"3.0"},{"version":"3.1","date":"2005-01-21T12:36:21"},{"date":"2005-02-02T11:58:41","version":"3.2"},{"date":"2005-02-02T14:17:25","version":"3.3"},{"date":"2005-02-18T15:40:19","version":"3.4"},{"version":"3.4","date":"2005-02-23T13:35:13"},{"date":"2005-03-01T18:10:05","version":"3.4"},{"version":"3.4","date":"2005-03-04T17:53:49"},{"version":"3.4","date":"2005-03-14T10:31:33"},{"version":"3.4","date":"2005-03-21T09:24:00"},{"date":"2005-04-05T09:50:19","version":"4.0"},{"version":"4.1","date":"2005-04-11T10:31:43"},{"date":"2005-04-14T19:46:49","version":"4.2"},{"date":"2005-04-20T08:35:06","version":"4.3"},{"date":"2005-04-28T14:23:29","version":"4.4"},{"version":"4.5","date":"2005-05-22T15:26:46"},{"date":"2005-06-01T14:33:57","version":"4.6"},{"version":"4.61","date":"2005-06-02T09:53:57"},{"date":"2005-06-02T15:47:47","version":"4.62"},{"version":"4.63","date":"2005-06-16T21:03:43"},{"date":"2005-07-05T15:28:06","version":"4.64"},{"date":"2005-07-13T16:52:52","version":"4.65"},{"version":"4.66","date":"2005-07-28T17:16:01"},{"date":"2005-08-25T13:31:53","version":"4.67"},{"version":"4.68","date":"2005-09-02T12:35:28"},{"version":"4.69","date":"2005-09-05T11:27:29"},{"date":"2005-09-16T15:59:06","version":"4.70"},{"version":"4.71","date":"2005-10-13T18:10:10"},{"version":"4.72","date":"2005-10-25T18:07:42"},{"version":"4.73","date":"2005-10-26T06:43:59"},{"date":"2005-10-26T08:21:25","version":"4.74"},{"version":"4.75","date":"2005-12-04T17:50:30"},{"version":"4.76","date":"2005-12-23T15:22:40"},{"version":"4.77","date":"2005-12-26T17:08:35"},{"version":"4.78","date":"2006-01-10T22:07:46"},{"date":"2006-01-15T17:09:57","version":"4.79"},{"date":"2006-03-16T16:53:54","version":"4.80"},{"date":"2006-03-31T16:02:38","version":"4.81"},{"version":"4.82","date":"2006-04-11T18:38:36"},{"date":"2006-04-11T19:50:58","version":"4.83"},{"date":"2006-04-12T13:40:40","version":"4.84"},{"date":"2006-04-13T11:43:55","version":"4.85"},{"version":"4.86","date":"2006-04-27T20:45:17"},{"date":"2006-05-06T16:13:30","version":"4.87"},{"version":"4.88","date":"2006-05-21T17:09:49"},{"date":"2006-05-22T08:21:25","version":"4.89"},{"version":"4.90","date":"2006-05-22T12:56:03"},{"version":"4.91","date":"2006-06-01T20:15:32"},{"date":"2006-06-11T17:15:17","version":"4.92"},{"version":"4.93","date":"2006-06-13T18:29:21"},{"date":"2006-07-02T09:10:52","version":"4.94"},{"date":"2006-07-05T10:47:35","version":"4.95"},{"version":"4.96","date":"2006-07-16T13:37:50"},{"date":"2006-07-24T11:55:01","version":"4.97"},{"version":"4.98","date":"2006-08-18T11:39:13"},{"version":"4.99","date":"2006-08-29T16:57:17"},{"date":"2006-09-01T01:32:30","version":"5.00"},{"version":"5.01","date":"2006-09-07T17:03:08"},{"version":"5.02","date":"2006-09-08T15:45:55"},{"date":"2006-09-16T13:33:43","version":"5.03"},{"version":"5.04","date":"2006-09-25T12:40:35"},{"date":"2006-10-06T14:02:37","version":"5.05"},{"version":"5.06","date":"2006-10-12T12:29:17"},{"version":"5.07","date":"2006-10-17T10:57:25"},{"version":"5.08","date":"2006-10-23T12:43:37"},{"version":"5.09","date":"2006-10-24T14:15:06"},{"version":"5.10","date":"2006-10-24T17:18:06"},{"date":"2006-10-25T15:51:16","version":"5.11"},{"version":"5.12","date":"2006-11-16T14:01:15"},{"date":"2006-11-19T14:34:09","version":"5.13"},{"version":"5.14","date":"2006-11-29T11:10:54"},{"version":"5.15","date":"2006-12-05T19:42:12"},{"version":"5.16","date":"2006-12-06T12:27:38"},{"version":"5.17","date":"2006-12-12T23:09:26"},{"date":"2006-12-29T11:08:52","version":"5.18"},{"date":"2007-01-31T12:06:39","version":"5.19"},{"version":"5.20","date":"2007-01-31T17:37:46"},{"date":"2007-02-01T12:39:18","version":"5.21"},{"date":"2007-02-02T12:55:07","version":"5.22"},{"date":"2007-04-12T15:28:46","version":"5.23"},{"version":"5.24","date":"2007-04-16T12:51:48"},{"date":"2007-04-29T12:19:32","version":"5.25"},{"date":"2007-04-29T14:33:13","version":"5.26"},{"version":"5.27","date":"2007-05-01T13:21:57"},{"date":"2007-05-01T14:14:27","version":"5.28"},{"version":"5.29","date":"2007-05-03T12:51:34"},{"version":"5.30","date":"2007-05-08T18:38:59"},{"date":"2007-05-18T09:26:43","version":"5.31_01"},{"date":"2007-05-31T15:25:34","version":"5.31_02"},{"date":"2007-06-01T10:02:23","version":"5.31_03"},{"version":"5.31_04","date":"2007-06-05T08:46:20"},{"version":"5.31_05","date":"2007-06-11T09:30:57"},{"date":"2007-06-12T11:28:18","version":"5.32"},{"date":"2007-07-10T17:11:05","version":"5.33_01"},{"date":"2007-07-25T10:01:32","version":"5.34"},{"date":"2007-11-01T14:32:47","version":"5.36"},{"version":"5.37_01","date":"2007-12-05T21:26:00"},{"version":"5.37_02","date":"2007-12-06T08:53:09"},{"version":"5.38","date":"2007-12-06T17:35:01"},{"version":"5.40","date":"2007-12-26T11:03:08"},{"date":"2007-12-31T12:44:42","version":"5.42"},{"version":"5.44","date":"2008-01-01T14:10:56"},{"version":"5.46","date":"2008-01-03T15:21:36"},{"version":"5.48","date":"2008-01-10T20:32:12"},{"date":"2008-01-13T10:30:41","version":"5.50"},{"date":"2008-01-14T08:06:32","version":"5.52"},{"version":"5.54","date":"2008-01-27T09:43:44"},{"date":"2008-01-31T13:13:54","version":"5.56"},{"date":"2008-02-04T08:13:31","version":"5.58"},{"date":"2008-02-06T13:54:09","version":"5.60"},{"version":"5.62","date":"2008-02-07T16:42:54"},{"date":"2008-02-16T08:35:10","version":"5.64"},{"date":"2008-02-18T22:11:13","version":"5.66"},{"version":"5.68","date":"2008-02-20T20:00:00"},{"date":"2008-03-03T10:51:33","version":"5.70"},{"date":"2008-03-21T10:56:45","version":"5.72"},{"date":"2008-04-02T15:23:28","version":"5.74"},{"date":"2008-04-24T15:13:29","version":"5.76"},{"date":"2008-05-30T07:16:00","version":"5.78"},{"version":"5.80","date":"2008-06-12T15:42:21"},{"version":"5.82","date":"2008-06-14T08:49:07"},{"date":"2008-06-26T19:16:22","version":"5.84"},{"date":"2008-07-22T09:11:40","version":"5.86"},{"date":"2008-08-28T15:06:57","version":"5.88"},{"date":"2009-01-22T11:04:20","version":"5.90"},{"version":"5.92","date":"2009-01-27T13:08:53"},{"version":"5.94","date":"2009-01-27T21:56:50"},{"version":"5.96","date":"2009-01-28T12:02:40"},{"version":"5.98","date":"2009-03-02T23:16:08"},{"date":"2009-03-04T23:31:34","version":"6.00"},{"date":"2009-03-06T11:07:07","version":"6.02"},{"date":"2009-03-07T23:41:08","version":"6.04"},{"version":"6.05_01","date":"2009-04-11T09:24:16"},{"version":"6.06","date":"2009-04-30T12:12:52"},{"date":"2009-05-29T11:58:02","version":"6.08"},{"date":"2009-07-09T20:20:10","version":"6.09_01"},{"date":"2009-07-10T09:17:48","version":"6.09_02"},{"version":"6.09_03","date":"2009-07-10T14:24:17"},{"version":"6.09_04","date":"2009-07-12T20:52:44"},{"date":"2009-07-16T14:20:12","version":"6.09_05"},{"version":"6.09_06","date":"2009-07-17T10:23:41"},{"version":"6.09_07","date":"2009-07-21T06:26:37"},{"date":"2009-07-27T12:19:55","version":"6.09_08"},{"date":"2009-07-29T11:16:27","version":"6.09_09"},{"version":"6.09_10","date":"2009-07-30T13:40:56"},{"date":"2009-08-07T12:59:58","version":"6.09_11"},{"version":"6.10","date":"2009-08-14T20:49:04"},{"version":"6.11_01","date":"2009-08-19T09:21:27"},{"date":"2009-09-10T09:00:17","version":"6.12"},{"date":"2009-09-24T15:13:45","version":"6.14"},{"version":"6.16","date":"2009-10-11T09:02:32"},{"version":"6.18","date":"2009-12-11T19:28:22"},{"date":"2010-01-15T18:42:20","version":"6.20"},{"version":"6.22","date":"2010-01-20T01:54:34"},{"version":"6.24","date":"2010-02-12T02:47:46"},{"version":"6.26","date":"2010-03-14T07:34:45"},{"date":"2010-03-14T10:57:17","version":"6.28"},{"version":"6.30","date":"2010-05-10T14:40:23"},{"date":"2010-05-11T13:45:23","version":"6.32"},{"date":"2010-06-21T20:28:42","version":"6.33"},{"date":"2010-06-25T18:17:14","version":"6.34"},{"version":"6.35","date":"2010-06-27T09:33:18"},{"date":"2010-07-26T03:54:08","version":"6.36"},{"version":"6.37","date":"2010-08-17T23:08:39"},{"date":"2010-09-03T18:33:58","version":"6.38"},{"date":"2010-09-04T02:16:21","version":"6.39"},{"version":"6.40","date":"2010-09-09T06:56:17"},{"date":"2010-09-23T21:34:09","version":"6.41"},{"date":"2010-09-25T09:40:47","version":"6.42"},{"version":"6.43","date":"2010-09-25T21:30:54"},{"date":"2010-09-25T23:35:19","version":"6.44"},{"version":"6.45","date":"2010-09-26T03:42:36"},{"version":"6.46","date":"2010-09-29T04:59:09"},{"version":"6.47","date":"2010-10-03T15:29:13"},{"version":"6.48","date":"2010-10-03T19:50:31"},{"version":"6.49","date":"2010-10-16T19:05:02"},{"date":"2010-11-03T02:06:04","version":"6.50"},{"date":"2010-11-05T11:29:30","version":"6.51"},{"date":"2010-11-05T17:26:55","version":"6.52"},{"date":"2011-03-10T15:39:11","version":"6.53"},{"date":"2011-03-10T18:21:18","version":"6.54"},{"version":"6.55","date":"2011-04-01T18:38:19"},{"date":"2011-04-01T20:05:44","version":"6.56"},{"date":"2011-04-02T03:41:42","version":"6.57"},{"date":"2011-04-04T17:52:07","version":"6.58"},{"version":"6.59","date":"2011-04-04T20:23:21"},{"version":"6.60","date":"2011-04-15T06:13:37"},{"version":"6.61","date":"2011-04-19T17:04:11"},{"date":"2011-05-03T11:00:14","version":"6.62"},{"version":"6.63","date":"2011-05-15T05:08:04"},{"version":"6.64","date":"2011-05-15T10:00:34"},{"date":"2011-05-19T01:55:49","version":"6.65"},{"version":"6.66","date":"2011-05-19T22:33:07"},{"date":"2011-05-22T16:45:17","version":"6.67"},{"version":"6.68","date":"2011-05-22T17:02:27"},{"version":"6.69","date":"2011-07-29T01:54:20"},{"date":"2011-08-02T03:40:17","version":"6.70"},{"date":"2011-09-18T16:08:38","version":"6.71"},{"date":"2011-10-07T15:42:11","version":"6.72"},{"date":"2011-10-08T04:41:24","version":"6.73"},{"date":"2011-10-09T20:16:25","version":"6.74"},{"date":"2011-11-13T14:26:23","version":"6.75"},{"date":"2011-11-29T03:25:52","version":"6.76"},{"date":"2011-12-02T03:56:47","version":"6.77"},{"date":"2011-12-07T20:30:42","version":"6.78"},{"version":"6.79","date":"2012-09-19T13:26:08"},{"date":"2012-09-20T08:55:35","version":"6.80"},{"date":"2012-11-23T15:56:03","version":"6.81"},{"date":"2013-03-09T22:17:24","version":"6.82"},{"date":"2013-05-27T09:43:25","version":"6.83"},{"version":"6.84","date":"2014-06-17T09:47:20"},{"version":"6.85","date":"2014-06-19T09:22:12"},{"date":"2014-06-20T10:14:59","version":"6.86"},{"date":"2014-06-21T14:09:46","version":"6.87"},{"date":"2014-06-28T12:16:18","version":"6.88"},{"date":"2017-09-05T18:14:17","version":"6.89"},{"date":"2017-09-05T18:19:13","version":"6.90"},{"version":"6.91","date":"2021-06-05T12:55:31"},{"date":"2021-06-08T13:32:11","version":"6.92"},{"date":"2021-06-15T18:29:10","version":"6.93"}]},"Log-Any":{"main_module":"Log::Any","advisories":[{"fixed_versions":["1.716"],"description":"The WithStackTrace proxy may expose sensitive information\n","affected_versions":[">=1.712,<=1.715"],"cves":[],"severity":null,"distribution":"Log-Any","reported":null,"references":["https://metacpan.org/dist/Log-Any/changes","https://github.com/preaction/Log-Any/pull/97"],"id":"CPANSA-Log-Any-2023-001"}],"versions":[{"date":"2009-07-11T14:11:33","version":"0.01"},{"version":"0.02","date":"2009-07-14T23:34:51"},{"version":"0.03","date":"2009-07-18T03:41:02"},{"date":"2009-09-04T00:32:59","version":"0.03"},{"date":"2009-10-27T22:26:20","version":"0.05"},{"date":"2009-10-31T23:24:23","version":"0.06"},{"version":"0.07","date":"2009-12-07T17:57:19"},{"date":"2009-12-16T01:31:06","version":"0.08"},{"date":"2010-01-05T21:20:31","version":"0.09"},{"date":"2010-01-05T21:27:46","version":"0.10"},{"version":"0.11","date":"2010-02-12T13:08:17"},{"version":"0.12","date":"2011-03-23T21:55:43"},{"version":"0.13","date":"2011-08-02T13:27:07"},{"date":"2011-08-31T22:51:22","version":"0.14"},{"date":"2013-04-10T17:16:43","version":"0.15"},{"date":"2014-12-12T22:09:51","version":"0.90"},{"date":"2014-12-15T03:15:09","version":"0.91"},{"version":"0.92","date":"2014-12-15T12:13:47"},{"version":"1.00","date":"2014-12-26T03:04:57"},{"version":"1.01","date":"2014-12-27T03:26:31"},{"date":"2014-12-28T12:07:41","version":"1.02"},{"version":"1.03","date":"2015-01-02T03:43:07"},{"version":"1.031","date":"2015-03-26T10:09:30"},{"version":"1.032","date":"2015-03-26T21:24:48"},{"date":"2016-02-03T15:34:02","version":"1.033"},{"date":"2016-02-04T19:48:49","version":"1.035"},{"date":"2016-02-06T01:27:07","version":"1.037"},{"version":"1.038","date":"2016-02-10T21:18:02"},{"version":"1.040","date":"2016-02-24T22:48:34"},{"version":"1.041","date":"2016-08-18T05:02:37"},{"version":"1.042","date":"2016-08-27T04:38:20"},{"version":"1.043","date":"2016-11-04T02:48:06"},{"version":"1.044","date":"2016-11-06T21:53:19"},{"version":"1.045","date":"2016-11-12T03:54:03"},{"date":"2017-01-12T03:44:21","version":"1.046"},{"date":"2017-03-23T01:25:09","version":"1.047"},{"date":"2017-03-27T20:17:22","version":"1.048"},{"date":"2017-03-28T21:03:30","version":"1.049"},{"version":"1.050","date":"2017-08-04T03:30:12"},{"date":"2017-08-07T01:43:24","version":"1.051"},{"version":"1.700","date":"2017-09-28T22:00:06"},{"version":"1.701","date":"2017-10-02T19:38:09"},{"version":"1.702","date":"2017-11-28T21:20:01"},{"version":"1.703","date":"2017-11-29T16:57:31"},{"version":"1.704","date":"2017-12-18T00:14:35"},{"version":"1.705","date":"2018-01-17T19:50:35"},{"version":"1.706","date":"2018-07-07T01:21:05"},{"date":"2018-08-02T03:56:11","version":"1.707"},{"date":"2020-01-13T03:58:06","version":"1.708"},{"version":"1.709","date":"2021-02-17T21:17:28"},{"version":"1.710","date":"2021-08-02T15:11:51"},{"date":"2022-11-22T17:29:07","version":"1.711"},{"version":"1.712","date":"2022-12-09T17:06:31"},{"date":"2022-12-12T18:45:32","version":"1.713"},{"version":"1.714","date":"2023-03-20T16:49:03"},{"version":"1.715","date":"2023-05-04T18:09:55"},{"version":"1.716","date":"2023-06-26T19:15:29"},{"version":"1.717","date":"2023-08-17T15:53:05"}]},"Net-SNMP":{"advisories":[{"affected_versions":[">=5.1.4,<6.0.0"],"fixed_versions":[">=6.0.0"],"description":"Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large OCTETSTRING in an attribute value pair (AVP).\n","id":"CPANSA-Net-SNMP-2008-2292","severity":null,"cves":["CVE-2008-2292"],"references":["http://sourceforge.net/tracker/index.php?func=detail&aid=1826174&group_id=12694&atid=112694","http://www.securityfocus.com/bid/29212","http://secunia.com/advisories/30187","https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html","http://www.vmware.com/security/advisories/VMSA-2008-0013.html","http://secunia.com/advisories/31334","http://secunia.com/advisories/30647","http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html","https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html","http://secunia.com/advisories/31155","http://secunia.com/advisories/31351","http://security.gentoo.org/glsa/glsa-200808-02.xml","http://sunsolve.sun.com/search/document.do?assetkey=1-26-239785-1","http://www.mandriva.com/security/advisories?name=MDVSA-2008:118","http://secunia.com/advisories/31467","https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html","http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm","http://secunia.com/advisories/31568","http://www.debian.org/security/2008/dsa-1663","http://secunia.com/advisories/30615","http://www.redhat.com/support/errata/RHSA-2008-0529.html","http://secunia.com/advisories/32664","http://www.ubuntu.com/usn/usn-685-1","http://secunia.com/advisories/33003","http://www.vupen.com/english/advisories/2008/2361","http://www.vupen.com/english/advisories/2008/2141/references","http://www.vupen.com/english/advisories/2008/1528/references","http://www.securitytracker.com/id?1020527","https://exchange.xforce.ibmcloud.com/vulnerabilities/42430","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11261"],"reported":"2008-05-18","distribution":"Net-SNMP"},{"affected_versions":["<=5.2.1.2"],"fixed_versions":[],"description":"Untrusted search path vulnerability in Net-SNMP 5.2.1.2 and earlier, on Gentoo Linux, installs certain Perl modules with an insecure DT_RPATH, which could allow local users to gain privileges.\n","id":"CPANSA-Net-SNMP-2005-2811","cves":["CVE-2005-2811"],"severity":null,"distribution":"Net-SNMP","references":["http://www.gentoo.org/security/en/glsa/glsa-200509-05.xml"],"reported":"2005-09-07"},{"references":["http://lists.opensuse.org/opensuse-updates/2014-03/msg00060.html","http://comments.gmane.org/gmane.comp.security.oss.general/12284","https://bugzilla.redhat.com/show_bug.cgi?id=1072778","http://sourceforge.net/p/net-snmp/patches/1275/","http://www.nntp.perl.org/group/perl.perl5.porters/2006/09/msg116250.html","https://bugzilla.redhat.com/show_bug.cgi?id=1072044","http://lists.opensuse.org/opensuse-updates/2014-03/msg00061.html","http://secunia.com/advisories/59974","http://www.gentoo.org/security/en/glsa/glsa-201409-02.xml","https://rhn.redhat.com/errata/RHSA-2014-0322.html","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"],"reported":"2014-04-27","distribution":"Net-SNMP","severity":null,"cves":["CVE-2014-2285"],"id":"CPANSA-Net-SNMP-2014-2285","fixed_versions":[],"description":"The perl_trapd_handler function in perl/TrapReceiver/TrapReceiver.xs in Net-SNMP 5.7.3.pre3 and earlier, when using certain Perl versions, allows remote attackers to cause a denial of service (snmptrapd crash) via an empty community string in an SNMP trap, which triggers a NULL pointer dereference within the newSVpv function in Perl.\n","affected_versions":["<=5.7.3"]}],"versions":[{"version":"1.10","date":"1998-10-14T13:13:11"},{"version":"1.20","date":"1998-11-06T14:25:38"},{"date":"1999-03-17T13:51:17","version":"1.30"},{"date":"1999-04-26T13:39:02","version":"1.40"},{"date":"1999-05-06T16:25:03","version":"2.00"},{"version":"2.99","date":"1999-08-12T15:23:21"},{"date":"1999-09-09T13:30:41","version":"3.00"},{"date":"2000-01-01T18:12:05","version":"3.01"},{"version":"3.50","date":"2000-05-06T04:35:25"},{"version":"3.60","date":"2000-09-09T15:00:00"},{"date":"2001-09-09T13:33:46","version":"3.65"},{"date":"2001-11-09T14:14:48","version":"v4.0.0"},{"date":"2002-01-01T14:16:29","version":"v4.0.1"},{"date":"2002-05-06T12:51:31","version":"v4.0.2"},{"version":"v4.0.3","date":"2002-09-09T12:55:22"},{"version":"v4.1.0","date":"2003-05-06T11:06:55"},{"date":"2003-09-09T12:50:16","version":"v4.1.1"},{"version":"v4.1.2","date":"2003-09-11T19:19:45"},{"date":"2004-07-20T13:49:08","version":"v5.0.0"},{"date":"2004-09-09T17:06:35","version":"v5.0.1"},{"version":"v5.1.0","date":"2005-07-20T13:58:05"},{"version":"v5.2.0","date":"2005-10-20T14:25:07"},{"date":"2009-09-09T15:17:46","version":"v6.0.0"},{"version":"v6.0.1","date":"2010-09-10T00:15:52"}],"main_module":"Net::SNMP"},"XML-LibXML":{"advisories":[{"description":"The _clone function does not properly set the expand_entities option, which allows remote attackers to conduct XML external entity (XXE) attacks via crafted XML data to the (1) new or (2) load_xml function.\n","fixed_versions":[">=2.0120"],"affected_versions":["<2.0120"],"cves":["CVE-2015-3451"],"reported":"2015-04-23","references":["https://metacpan.org/changes/distribution/XML-LibXML"],"distribution":"XML-LibXML","id":"CPANSA-XML-LibXML-2015-01"},{"id":"CPANSA-XML-LibXML-2017-01","cves":["CVE-2017-10672"],"reported":"2015-04-23","references":["https://www.debian.org/security/2017/dsa-4042","https://rt.cpan.org/Public/Bug/Display.html?id=122246","https://lists.debian.org/debian-lts-announce/2017/11/msg00017.html"],"distribution":"XML-LibXML","affected_versions":["<2.0129"],"fixed_versions":[">=2.0129"],"description":"Use-after-free in the XML-LibXML module through 2.0129 for Perl allows remote attackers to execute arbitrary code by controlling the arguments to a replaceChild call.\n"}],"versions":[{"date":"2001-05-18T11:31:21","version":"0.91"},{"version":"0.92","date":"2001-06-03T07:47:14"},{"date":"2001-06-09T16:52:26","version":"0.93"},{"version":"0.94","date":"2001-06-10T08:54:23"},{"version":"0.96","date":"2001-06-21T10:07:56"},{"date":"2001-06-29T20:39:47","version":"0.97"},{"version":"0.99","date":"2001-07-20T16:08:25"},{"version":"1.00","date":"2001-08-07T10:13:29"},{"date":"2001-11-14T11:39:59","version":"1.30"},{"version":"1.31","date":"2001-11-25T17:25:52"},{"version":"1.40","date":"2002-03-13T14:24:12"},{"date":"2002-05-11T21:07:22","version":"1.49"},{"date":"2002-05-20T11:33:20","version":"1.50"},{"date":"2002-05-31T16:53:50","version":"1.51"},{"date":"2002-06-12T10:16:35","version":"1.52"},{"date":"2002-09-14T21:02:38","version":"1.53"},{"version":"1.54_0","date":"2002-10-26T15:21:51"},{"date":"2002-11-08T10:03:05","version":"1.54_1"},{"date":"2002-11-08T18:15:20","version":"1.54_2"},{"version":"1.54_3","date":"2002-11-15T20:14:58"},{"date":"2003-05-22T23:44:39","version":"1.54_4"},{"date":"2003-05-30T18:46:39","version":"1.54"},{"date":"2003-08-19T21:15:43","version":"1.55"},{"version":"1.56","date":"2003-08-25T13:39:01"},{"date":"2004-02-29T16:56:42","version":"1.57"},{"version":"1.58","date":"2004-03-31T19:49:55"},{"date":"2004-04-04T11:42:03","version":"1.58_1"},{"version":"1.59","date":"2006-08-02T10:59:49"},{"date":"2006-08-26T18:11:05","version":"1.60"},{"date":"2006-09-24T15:43:20","version":"1.61"},{"date":"2006-09-25T07:21:39","version":"1.61"},{"version":"1.61","date":"2006-09-25T07:42:26"},{"version":"1.61","date":"2006-09-25T11:38:04"},{"version":"1.62","date":"2006-11-18T09:57:51"},{"date":"2006-11-25T09:10:37","version":"1.62"},{"version":"1.63","date":"2007-04-16T11:46:21"},{"date":"2007-09-09T21:51:03","version":"1.64"},{"date":"2007-09-25T16:37:46","version":"1.65"},{"date":"2008-01-29T21:10:45","version":"1.66"},{"date":"2008-11-04T14:26:16","version":"1.67"},{"version":"1.68","date":"2008-11-05T13:32:59"},{"version":"1.69","date":"2008-11-11T21:00:56"},{"version":"1.69_1","date":"2009-01-23T22:30:52"},{"version":"1.69_2","date":"2009-02-06T19:12:24"},{"version":"1.70","date":"2009-10-07T12:31:25"},{"version":"1.71","date":"2011-06-14T17:01:30"},{"date":"2011-06-16T16:40:11","version":"1.72"},{"version":"1.73","date":"2011-06-18T08:35:40"},{"version":"1.74","date":"2011-06-23T12:27:53"},{"version":"1.75","date":"2011-06-24T16:02:54"},{"version":"1.76","date":"2011-06-30T18:20:41"},{"date":"2011-07-01T19:31:51","version":"1.77"},{"date":"2011-07-06T17:27:49","version":"1.78"},{"version":"1.79","date":"2011-07-08T17:06:33"},{"version":"1.80","date":"2011-07-12T20:39:51"},{"version":"1.81","date":"2011-07-16T15:36:21"},{"version":"1.82","date":"2011-07-20T20:49:05"},{"version":"1.83","date":"2011-07-23T11:34:22"},{"version":"1.84","date":"2011-07-23T20:17:26"},{"version":"1.85","date":"2011-08-24T14:08:28"},{"date":"2011-08-25T08:46:56","version":"1.86"},{"date":"2011-08-27T11:07:44","version":"1.87"},{"date":"2011-09-21T10:01:23","version":"1.88"},{"version":"1.89","date":"2011-12-24T07:47:30"},{"version":"1.90","date":"2012-01-08T19:01:33"},{"version":"1.91","date":"2012-02-21T12:02:10"},{"date":"2012-02-21T17:03:56","version":"1.92"},{"version":"1.93","date":"2012-02-27T09:18:12"},{"date":"2012-03-03T20:10:26","version":"1.94"},{"date":"2012-03-06T08:42:27","version":"1.95"},{"date":"2012-03-16T19:05:40","version":"1.96"},{"date":"2012-04-30T17:35:11","version":"1.97"},{"date":"2012-05-13T18:06:03","version":"1.98"},{"date":"2012-05-31T07:25:35","version":"1.99"},{"date":"2012-06-19T20:07:27","version":"2.0000"},{"date":"2012-06-20T16:53:03","version":"2.0001"},{"version":"2.0002","date":"2012-07-08T15:12:36"},{"version":"2.0003","date":"2012-07-27T15:22:53"},{"version":"2.0004","date":"2012-08-07T20:06:48"},{"version":"2.0005","date":"2012-10-13T11:23:03"},{"date":"2012-10-13T20:34:57","version":"2.0006"},{"version":"2.0007","date":"2012-10-17T17:05:13"},{"version":"2.0008","date":"2012-10-22T10:13:20"},{"version":"2.0009","date":"2012-11-01T14:29:13"},{"version":"2.0010","date":"2012-11-01T18:16:34"},{"date":"2012-11-07T22:29:47","version":"2.0011"},{"date":"2012-11-09T04:42:04","version":"2.0012"},{"date":"2012-12-04T15:46:46","version":"2.0013"},{"version":"2.0014","date":"2012-12-05T09:13:26"},{"date":"2013-04-12T23:35:55","version":"2.0015"},{"version":"2.0016","date":"2013-04-13T19:39:51"},{"date":"2013-05-09T08:07:47","version":"2.0017"},{"date":"2013-05-13T10:44:19","version":"2.0018"},{"date":"2013-07-01T08:08:50","version":"2.0019"},{"version":"2.0100","date":"2013-08-14T05:27:26"},{"version":"2.0101","date":"2013-08-15T05:34:30"},{"version":"2.0102","date":"2013-08-19T12:18:31"},{"date":"2013-08-22T05:35:19","version":"2.0103"},{"date":"2013-08-30T09:38:04","version":"2.0104"},{"version":"2.0105","date":"2013-09-07T17:24:00"},{"date":"2013-09-17T16:14:51","version":"2.0106"},{"date":"2013-10-31T07:16:02","version":"2.0107"},{"date":"2013-12-17T09:10:53","version":"2.0108"},{"version":"2.0109","date":"2014-01-31T08:01:23"},{"date":"2014-02-01T14:14:02","version":"2.0110"},{"version":"2.0111","date":"2014-03-05T15:31:25"},{"date":"2014-03-13T18:19:10","version":"2.0112"},{"date":"2014-03-14T12:15:54","version":"2.0113"},{"version":"2.0114","date":"2014-04-03T13:01:06"},{"date":"2014-04-03T13:15:41","version":"2.0115"},{"date":"2014-04-12T08:10:37","version":"2.0116"},{"version":"2.0117","date":"2014-10-26T16:31:29"},{"date":"2015-02-05T10:57:03","version":"2.0118"},{"date":"2015-04-23T07:14:45","version":"2.0119"},{"version":"2.0120","date":"2015-05-01T09:50:18"},{"version":"2.0121","date":"2015-05-03T12:08:06"},{"date":"2015-09-01T09:02:29","version":"2.0122"},{"date":"2015-12-06T13:19:22","version":"2.0123"},{"version":"2.0124","date":"2016-02-27T11:21:08"},{"date":"2016-05-30T09:24:51","version":"2.0125"},{"version":"2.0126","date":"2016-06-24T16:21:00"},{"version":"2.0127","date":"2016-07-22T17:40:51"},{"date":"2016-07-24T09:15:48","version":"2.0128"},{"date":"2017-03-14T13:37:23","version":"2.0129"},{"version":"2.0130","date":"2017-10-18T08:45:49"},{"date":"2017-10-24T08:57:20","version":"2.0131"},{"date":"2017-10-28T17:58:34","version":"2.0132"},{"version":"2.0133","date":"2019-02-02T11:11:30"},{"version":"2.0134","date":"2019-02-10T15:02:55"},{"date":"2019-03-23T08:54:34","version":"2.0200"},{"date":"2019-05-25T17:46:46","version":"2.0201"},{"date":"2020-01-13T09:16:50","version":"2.0202"},{"version":"2.0203","date":"2020-03-11T06:48:19"},{"date":"2020-03-17T16:33:17","version":"2.0204"},{"version":"2.0205","date":"2020-05-08T11:36:06"},{"version":"2.0206","date":"2020-09-15T08:06:58"},{"version":"2.0207","date":"2021-04-17T08:16:22"},{"date":"2022-09-30T03:29:15","version":"2.0208"},{"version":"2.0209","date":"2023-07-15T06:04:39"},{"version":"2.0210","date":"2024-01-24T15:19:39"}],"main_module":"XML::LibXML"},"MIME-tools":{"versions":[{"date":"1996-10-18T13:57:11","version":"2.01"},{"date":"1996-10-23T19:20:59","version":"2.02"},{"version":"2.03","date":"1996-10-28T18:27:36"},{"date":"1996-11-03T00:35:36","version":"2.04"},{"version":"2.13","date":"1997-01-13T10:17:14"},{"date":"1997-01-14T07:05:37","version":"2.14"},{"date":"1997-01-21T03:40:48","version":"3.203"},{"date":"1997-01-22T11:24:13","version":"3.204"},{"version":"4.111","date":"1998-01-14T15:44:55"},{"version":"4.112","date":"1998-01-18T04:23:37"},{"version":"4.113","date":"1998-01-20T08:21:18"},{"version":"4.116","date":"1998-02-14T21:45:26"},{"version":"4.119","date":"1998-05-05T14:32:36"},{"version":"4.121","date":"1998-06-04T13:30:01"},{"date":"1999-02-10T05:39:03","version":"4.122"},{"version":"4.124","date":"1999-05-14T13:29:15"},{"date":"2000-05-24T14:44:21","version":"5.115"},{"date":"2000-05-26T04:46:25","version":"5.116"},{"date":"2000-06-06T16:14:02","version":"5.205"},{"version":"5.206","date":"2000-06-08T07:36:13"},{"version":"5.207","date":"2000-06-09T03:44:00"},{"version":"5.209","date":"2000-06-10T08:12:36"},{"date":"2000-06-20T13:24:34","version":"5.210"},{"date":"2000-06-24T06:57:34","version":"5.211"},{"version":"5.304","date":"2000-07-07T14:46:11"},{"date":"2000-07-20T06:47:41","version":"5.306"},{"date":"2000-08-15T14:22:44","version":"5.310"},{"date":"2000-08-16T05:28:11","version":"5.311"},{"version":"5.313","date":"2000-09-05T04:17:48"},{"version":"5.314","date":"2000-09-06T04:59:03"},{"version":"5.316","date":"2000-09-21T06:14:25"},{"version":"5.404","date":"2000-11-05T15:24:04"},{"version":"5.405","date":"2000-11-06T00:34:39"},{"version":"5.408","date":"2000-11-10T05:27:35"},{"version":"5.409","date":"2000-11-20T18:04:43"},{"date":"2000-11-23T05:31:08","version":"5.410"},{"date":"2001-06-05T15:21:25","version":"5.411"},{"date":"2001-11-16T17:32:32","version":"5.411"},{"version":"6.200_01","date":"2003-06-09T16:42:00"},{"date":"2003-07-22T20:49:42","version":"6.200_02"},{"version":"5.412","date":"2004-09-14T14:20:07"},{"date":"2004-09-15T14:11:08","version":"5.413"},{"version":"5.414","date":"2004-10-06T19:46:54"},{"version":"5.415","date":"2004-10-27T12:51:54"},{"date":"2005-01-03T15:45:29","version":"5.416"},{"version":"5.417","date":"2005-01-20T21:24:25"},{"date":"2005-09-29T19:40:53","version":"5.418"},{"version":"5.419","date":"2005-12-22T21:52:16"},{"version":"5.420","date":"2006-03-17T21:20:12"},{"date":"2007-06-18T20:04:22","version":"5.420_01"},{"date":"2007-08-31T18:03:20","version":"5.420_02"},{"version":"5.421","date":"2007-09-20T21:33:01"},{"version":"5.422","date":"2007-09-25T22:31:20"},{"version":"5.423","date":"2007-09-27T15:50:17"},{"version":"5.424","date":"2007-11-07T15:36:31"},{"version":"5.425","date":"2007-11-17T16:20:42"},{"version":"5.426","date":"2008-03-18T13:45:38"},{"version":"5.426","date":"2008-06-30T18:41:00"},{"version":"5.428","date":"2010-04-22T15:31:33"},{"date":"2010-04-30T13:47:59","version":"5.500"},{"date":"2011-01-07T15:59:19","version":"5.500"},{"date":"2011-02-17T18:37:12","version":"5.501"},{"version":"5.502","date":"2011-03-08T14:03:11"},{"date":"2012-06-08T13:44:12","version":"5.503"},{"date":"2013-01-30T21:01:40","version":"5.504"},{"version":"5.505","date":"2013-11-14T15:27:15"},{"version":"5.506","date":"2015-04-22T17:32:26"},{"version":"5.507","date":"2015-09-30T13:21:56"},{"date":"2016-08-29T14:52:28","version":"5.508"},{"date":"2017-04-05T18:13:30","version":"5.508"},{"date":"2022-07-06T14:20:39","version":"5.503"},{"version":"5.503","date":"2024-01-02T15:38:07"},{"date":"2024-01-08T18:22:18","version":"5.503"},{"date":"2024-01-25T16:28:54","version":"5.503"},{"version":"5.503","date":"2024-02-06T20:49:02"},{"date":"2024-04-24T15:36:43","version":"5.515"}],"advisories":[{"reported":"1998-01-10","references":["https://metacpan.org/dist/MIME-tools/changes"],"distribution":"MIME-tools","severity":null,"cves":[],"id":"CPANSA-MIME-tools-1998-01","fixed_versions":[">=4.109"],"description":"There was a potential security hole when outputting entities with recommended filenames.\n","affected_versions":["<4.109"]}],"main_module":"MIME::Body"},"Compress-Raw-Zlib":{"main_module":"Compress::Raw::Zlib","versions":[{"version":"2.000_09","date":"2006-03-03T23:06:38"},{"date":"2006-03-13T16:14:20","version":"2.000_10"},{"version":"2.000_11","date":"2006-04-15T21:23:24"},{"version":"2.000_12","date":"2006-05-17T12:43:41"},{"date":"2006-06-20T12:45:30","version":"2.000_13"},{"date":"2006-10-26T14:15:34","version":"2.000_09"},{"version":"2.001","date":"2006-11-01T10:35:38"},{"version":"2.002","date":"2006-12-29T20:40:35"},{"version":"2.003","date":"2007-01-02T13:03:57"},{"version":"2.004","date":"2007-03-03T15:50:15"},{"version":"2.005","date":"2007-07-01T00:07:02"},{"date":"2007-09-01T19:44:59","version":"2.006"},{"version":"2.008","date":"2007-11-10T11:59:36"},{"version":"2.009","date":"2008-04-20T14:42:52"},{"version":"2.010","date":"2008-05-05T17:18:27"},{"date":"2008-05-17T11:16:28","version":"2.011"},{"date":"2008-07-15T22:24:07","version":"2.012"},{"date":"2008-09-02T20:20:16","version":"2.014"},{"version":"2.015","date":"2008-09-03T20:47:27"},{"date":"2009-04-04T09:49:03","version":"2.017"},{"version":"2.018","date":"2009-05-03T16:27:08"},{"date":"2009-05-04T09:42:17","version":"2.019"},{"date":"2009-06-03T17:48:30","version":"2.020"},{"version":"2.021","date":"2009-08-30T20:25:35"},{"date":"2009-11-09T23:26:59","version":"2.023"},{"date":"2010-01-09T17:56:35","version":"2.024"},{"date":"2010-03-28T12:57:08","version":"2.025"},{"version":"2.026","date":"2010-04-07T19:51:09"},{"date":"2010-04-24T19:15:54","version":"2.027"},{"date":"2010-07-24T14:31:01","version":"2.030"},{"version":"2.032","date":"2011-01-06T11:23:45"},{"version":"2.033","date":"2011-01-11T14:03:45"},{"version":"2.034","date":"2011-05-02T22:05:37"},{"version":"2.035","date":"2011-05-07T08:31:57"},{"version":"2.036","date":"2011-06-18T21:45:36"},{"date":"2011-06-22T07:18:22","version":"2.037"},{"version":"2.039","date":"2011-10-28T14:28:35"},{"version":"2.040","date":"2011-10-28T22:20:38"},{"date":"2011-11-17T23:45:21","version":"2.042"},{"date":"2011-11-20T21:33:33","version":"2.043"},{"version":"2.044","date":"2011-12-03T22:49:10"},{"date":"2011-12-04T19:21:36","version":"2.045"},{"date":"2012-01-28T23:28:28","version":"2.047"},{"version":"2.048","date":"2012-01-29T17:00:33"},{"date":"2012-02-18T15:58:12","version":"2.049"},{"date":"2012-02-21T19:35:18","version":"2.050"},{"version":"2.051","date":"2012-02-22T20:43:23"},{"version":"2.052","date":"2012-04-29T12:41:57"},{"version":"2.053","date":"2012-05-06T08:40:06"},{"version":"2.054","date":"2012-05-08T19:22:47"},{"version":"2.055","date":"2012-08-05T20:36:06"},{"date":"2012-08-10T22:20:09","version":"2.056"},{"version":"2.057","date":"2012-11-10T19:08:56"},{"version":"2.058","date":"2012-11-12T22:14:42"},{"date":"2012-11-25T13:38:42","version":"2.059"},{"version":"2.060","date":"2013-01-07T20:02:22"},{"version":"2.061","date":"2013-05-27T09:54:54"},{"date":"2013-08-12T19:08:05","version":"2.062"},{"date":"2013-11-02T17:15:17","version":"2.063"},{"date":"2014-02-01T23:21:28","version":"2.064"},{"date":"2014-02-03T20:23:00","version":"2.065"},{"date":"2014-09-21T12:42:35","version":"2.066"},{"version":"2.067","date":"2014-12-08T15:14:00"},{"version":"2.068","date":"2014-12-23T17:44:57"},{"date":"2015-09-26T18:41:58","version":"2.069"},{"date":"2016-12-28T23:09:21","version":"2.070"},{"date":"2016-12-30T22:58:08","version":"2.071"},{"date":"2017-02-12T20:41:25","version":"2.072"},{"version":"2.073","date":"2017-02-19T20:37:20"},{"date":"2017-02-19T22:11:41","version":"2.074"},{"date":"2017-11-14T15:43:26","version":"2.075"},{"version":"2.076","date":"2017-11-21T22:29:23"},{"version":"2.080","date":"2018-04-03T18:22:06"},{"version":"2.081","date":"2018-04-08T15:02:55"},{"date":"2018-12-30T22:40:08","version":"2.083"},{"date":"2019-01-06T08:57:15","version":"2.084"},{"version":"2.086","date":"2019-03-31T19:11:54"},{"version":"2.087","date":"2019-08-10T18:12:03"},{"date":"2019-11-03T08:55:23","version":"2.088"},{"date":"2019-11-03T19:54:04","version":"2.089"},{"date":"2019-11-09T15:58:48","version":"2.090"},{"date":"2019-11-23T19:34:34","version":"2.091"},{"version":"2.092","date":"2019-12-04T22:08:37"},{"version":"2.093","date":"2019-12-07T16:05:34"},{"version":"2.094","date":"2020-07-13T10:54:06"},{"version":"2.095","date":"2020-07-21T06:57:01"},{"version":"2.096","date":"2020-07-31T20:48:45"},{"version":"2.100","date":"2021-01-07T13:00:23"},{"version":"2.101","date":"2021-02-20T14:10:43"},{"date":"2022-04-03T19:48:50","version":"2.103"},{"version":"2.104","date":"2022-05-13T06:30:30"},{"version":"2.105","date":"2022-05-14T14:24:32"},{"date":"2022-06-21T21:19:21","version":"2.200"},{"version":"2.201","date":"2022-06-25T09:04:10"},{"version":"2.202","date":"2022-06-27T08:18:10"},{"date":"2023-02-08T19:26:25","version":"2.204"},{"version":"2.205","date":"2023-07-16T15:32:41"},{"version":"2.206","date":"2023-07-25T15:35:40"},{"date":"2024-02-18T22:16:24","version":"2.207"},{"version":"2.208","date":"2024-02-19T09:27:19"},{"version":"2.209","date":"2024-02-26T16:11:33"},{"version":"2.211","date":"2024-04-06T13:41:58"},{"version":"2.212","date":"2024-04-27T12:55:28"},{"date":"2024-08-28T15:27:59","version":"2.213"},{"version":"2.027_01","perl_release":"5.013003","date":"2010-07-20T00:00:00","dual_lived":1},{"dual_lived":1,"date":"2012-07-20T00:00:00","perl_release":"5.017002","version":"2.05401"},{"dual_lived":1,"date":"2015-09-20T00:00:00","version":"2.068_01","perl_release":"5.023003"},{"dual_lived":1,"date":"2023-07-02T00:00:00","perl_release":"5.038","version":"2.204_001"}],"advisories":[{"description":"Off-by-one error in the inflate function in Zlib.xs in Compress::Raw::Zlib Perl module before 2.017, as used in AMaViS, SpamAssassin, and possibly other products, allows context-dependent attackers to cause a denial of service (hang or crash) via a crafted zlib compressed stream that triggers a heap-based buffer overflow, as exploited in the wild by Trojan.Downloader-71014 in June 2009.\n","fixed_versions":[],"affected_versions":["<2.017"],"reported":"2009-06-16","references":["http://article.gmane.org/gmane.mail.virus.amavis.user/33635","http://article.gmane.org/gmane.mail.virus.amavis.user/33638","http://www.securityfocus.com/bid/35307","http://secunia.com/advisories/35422","https://bugzilla.redhat.com/show_bug.cgi?id=504386","http://www.vupen.com/english/advisories/2009/1571","http://thread.gmane.org/gmane.mail.virus.amavis.user/33635","http://osvdb.org/55041","http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html","http://secunia.com/advisories/35876","http://secunia.com/advisories/35685","https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00607.html","http://secunia.com/advisories/35689","http://www.mandriva.com/security/advisories?name=MDVSA-2009:157","http://security.gentoo.org/glsa/glsa-200908-07.xml","https://bugs.gentoo.org/show_bug.cgi?id=273141","https://exchange.xforce.ibmcloud.com/vulnerabilities/51062","https://usn.ubuntu.com/794-1/"],"distribution":"Compress-Raw-Zlib","severity":null,"cves":["CVE-2009-1391"],"id":"CPANSA-Compress-Raw-Zlib-2009-1391"}]},"Convert-UUlib":{"versions":[{"version":"0.03","date":"1999-05-08T20:44:28"},{"date":"1999-05-25T19:26:16","version":"0.05"},{"date":"1999-07-29T21:35:05","version":"0.06"},{"version":"0.11","date":"2000-07-16T20:52:56"},{"date":"2001-05-04T21:14:40","version":"0.111"},{"date":"2001-06-14T16:49:29","version":"0.2"},{"version":"0.201","date":"2001-09-16T01:45:11"},{"version":"0.21","date":"2002-03-31T22:10:15"},{"version":"0.21","date":"2002-03-31T22:52:00"},{"date":"2002-04-05T22:18:55","version":"0.211"},{"version":"0.212","date":"2002-04-06T02:39:32"},{"version":"0.213","date":"2002-07-27T19:20:26"},{"version":"0.3","date":"2002-10-13T18:14:28"},{"version":"0.31","date":"2002-10-15T23:26:09"},{"date":"2003-11-24T16:10:49","version":"1.0"},{"date":"2004-03-16T20:05:14","version":"1.01"},{"date":"2004-04-18T14:51:27","version":"1.02"},{"date":"2004-04-18T20:16:15","version":"1.03"},{"version":"1.04","date":"2004-12-28T14:12:40"},{"date":"2005-03-03T17:52:16","version":"1.051"},{"version":"1.06","date":"2005-12-05T23:58:50"},{"date":"2006-12-10T16:45:11","version":"1.07"},{"date":"2006-12-16T22:31:30","version":"1.08"},{"version":"1.09","date":"2007-05-25T17:40:35"},{"date":"2008-06-13T13:27:38","version":"1.10"},{"version":"1.11","date":"2008-06-13T13:34:18"},{"date":"2008-10-13T12:13:26","version":"1.12"},{"version":"1.3","date":"2009-08-28T23:26:34"},{"version":"1.31","date":"2009-09-16T07:05:05"},{"version":"1.32","date":"2009-09-16T18:10:46"},{"date":"2009-10-28T08:05:40","version":"1.33"},{"date":"2010-12-14T21:21:33","version":"1.34"},{"date":"2011-05-29T15:23:57","version":"1.4"},{"date":"2015-07-11T01:57:19","version":1.5},{"version":1.6,"date":"2019-10-24T15:19:15"},{"version":1.62,"date":"2020-02-17T22:21:21"},{"version":1.7,"date":"2020-02-29T21:09:26"},{"version":1.71,"date":"2020-03-16T23:54:43"},{"date":"2020-12-17T01:25:02","version":1.8}],"advisories":[{"affected_versions":["<1.051"],"fixed_versions":[],"description":"Buffer overflow in Convert-UUlib (Convert::UUlib) before 1.051 allows remote attackers to execute arbitrary code via a malformed parameter to a read operation.\n","id":"CPANSA-Convert-UUlib-2005-1349","severity":null,"cves":["CVE-2005-1349"],"references":["http://www.gentoo.org/security/en/glsa/glsa-200504-26.xml","http://secunia.com/advisories/15130","http://www.securityfocus.com/bid/13401","http://www.mandriva.com/security/advisories?name=MDKSA-2006:022","https://exchange.xforce.ibmcloud.com/vulnerabilities/20275"],"reported":"2005-05-02","distribution":"Convert-UUlib"}],"main_module":"Convert::UUlib"},"UI-Dialog":{"versions":[{"version":"1.00","date":"2004-01-04T10:51:34"},{"date":"2004-01-13T00:08:39","version":"1.01"},{"date":"2004-02-15T11:03:37","version":"1.02"},{"date":"2004-02-18T16:52:59","version":"1.03"},{"date":"2004-02-22T18:34:25","version":"1.04"},{"date":"2004-03-18T02:12:03","version":"1.05"},{"date":"2004-03-18T16:01:50","version":"1.06"},{"date":"2004-07-21T19:59:51","version":"1.07"},{"date":"2004-10-05T00:46:22","version":"1.08"},{"date":"2013-08-10T09:39:07","version":"1.09"},{"date":"2013-08-10T17:09:57","version":"1.09"},{"date":"2013-08-19T17:22:00","version":"1.09"},{"version":"1.11","date":"2016-01-19T19:05:07"},{"version":"1.12","date":"2016-01-22T06:42:45"},{"version":"1.13","date":"2016-01-30T21:24:56"},{"version":"1.14","date":"2016-02-03T02:10:12"},{"date":"2016-02-09T00:11:17","version":"1.15"},{"date":"2016-02-10T02:57:43","version":"1.16"},{"date":"2016-02-12T05:25:14","version":"1.17"},{"version":"1.18","date":"2016-02-13T02:56:26"},{"date":"2016-02-21T23:33:48","version":"1.19"},{"date":"2016-03-07T02:15:26","version":"1.20"},{"date":"2016-04-02T22:17:32","version":"1.21"}],"advisories":[{"affected_versions":["<1.11"],"description":"Allows remote attackers to execute arbitrary commands.\n","fixed_versions":[">=1.11"],"id":"CPANSA-UI-Dialog-2015-01","distribution":"UI-Dialog","reported":"2015-10-10","references":["https://metacpan.org/changes/distribution/UI-Dialog"],"cves":[]},{"id":"CPANSA-UI-Dialog-2004-01","references":["https://metacpan.org/changes/distribution/UI-Dialog"],"reported":"2004-02-18","distribution":"UI-Dialog","cves":[],"affected_versions":["<1.03"],"description":"CDialog and Whiptail backends usage of the temp files.\n","fixed_versions":[">=1.03"]},{"references":["https://security-tracker.debian.org/tracker/CVE-2008-7315/","https://rt.cpan.org/Public/Bug/Display.html?id=107364","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496448","http://www.securityfocus.com/bid/77031/info","http://www.openwall.com/lists/oss-security/2015/10/08/6"],"reported":"2017-10-10","distribution":"UI-Dialog","severity":"critical","cves":["CVE-2008-7315"],"id":"CPANSA-UI-Dialog-2008-7315","fixed_versions":[">1.09"],"description":"UI-Dialog 1.09 and earlier allows remote attackers to execute arbitrary commands.\n","affected_versions":["<=1.09"]}],"main_module":"UI::Dialog"},"Module-Metadata":{"versions":[{"date":"2010-07-06T21:16:54","version":"1.000000"},{"version":"1.000001","date":"2010-07-08T23:56:47"},{"version":"1.000002","date":"2010-12-10T17:07:09"},{"version":"1.000003","date":"2011-01-07T02:35:06"},{"version":"1.000004","date":"2011-02-03T07:55:40"},{"date":"2011-08-03T01:41:05","version":"1.000005"},{"date":"2011-08-29T19:48:33","version":"1.000006"},{"version":"1.000007","date":"2011-09-07T16:01:55"},{"version":"1.000008","date":"2012-02-08T03:31:54"},{"date":"2012-02-08T17:34:49","version":"1.000009"},{"date":"2012-07-29T19:21:55","version":"1.000010"},{"date":"2012-08-16T00:07:05","version":"1.000010_001"},{"date":"2012-08-16T00:15:02","version":"1.000010_002"},{"date":"2012-08-16T04:54:55","version":"1.000010_003"},{"version":"1.000011","date":"2012-08-16T19:57:31"},{"version":"1.000012","date":"2013-05-05T04:59:03"},{"date":"2013-05-08T23:00:33","version":"1.000013"},{"version":"1.000014","date":"2013-05-09T09:02:22"},{"date":"2013-08-21T15:46:56","version":"1.000015"},{"date":"2013-08-22T05:59:11","version":"1.000016"},{"version":"1.000017","date":"2013-09-11T01:06:02"},{"date":"2013-09-11T16:28:24","version":"1.000018"},{"date":"2013-10-06T16:50:13","version":"1.000019"},{"version":"1.000020","date":"2014-04-27T20:57:08"},{"version":"1.000021","date":"2014-04-29T18:29:51"},{"version":"1.000022","date":"2014-04-29T22:06:21"},{"version":"1.000023","date":"2014-06-02T02:39:20"},{"date":"2014-06-03T01:54:30","version":"1.000024"},{"version":"1.000025","date":"2015-01-04T18:57:40"},{"date":"2015-01-17T19:23:52","version":"1.000026"},{"date":"2015-04-11T00:23:53","version":"1.000027"},{"version":"1.000028","date":"2015-09-11T04:25:25"},{"date":"2015-09-11T16:26:57","version":"1.000029"},{"version":"1.000030","date":"2015-11-20T03:05:34"},{"date":"2015-11-24T03:59:40","version":"1.000031"},{"date":"2016-04-23T22:38:13","version":"1.000032"},{"date":"2016-07-24T23:34:48","version":"1.000033"},{"date":"2018-07-19T20:31:14","version":"1.000034"},{"date":"2019-04-18T02:44:48","version":"1.000035"},{"date":"2019-04-18T18:27:14","version":"1.000036"},{"date":"2019-09-07T18:34:09","version":"1.000037"},{"version":"1.000038","date":"2023-04-28T11:27:07"},{"version":"1.000005_01","perl_release":"5.015002","date":"2011-08-20T00:00:00","dual_lived":1}],"advisories":[{"fixed_versions":[">=1.000015"],"description":"Eval injection vulnerability in the Module-Metadata module before 1.000015 for Perl allows remote attackers to execute arbitrary Perl code via the $Version value.\n","affected_versions":["<1.000015"],"cves":["CVE-2013-1437"],"severity":"critical","distribution":"Module-Metadata","reported":"2020-01-28","references":["http://lists.fedoraproject.org/pipermail/package-announce/2013-August/114912.html","https://metacpan.org/changes/distribution/Module-Metadata","http://lists.fedoraproject.org/pipermail/package-announce/2013-August/114904.html"],"reviewed_by":[{"date":"2022-07-11","name":"Robert Rothenberg","email":"rrwo@cpan.org"}],"id":"CPANSA-Module-Metadata-2013-1437"}],"main_module":"Module::Metadata"},"Config-IniFiles":{"advisories":[{"affected_versions":["<2.71"],"description":"The Config::IniFiles module before 2.71 for Perl creates temporary files with predictable names, which allows local users to overwrite arbitrary files via a symlink attack. NOTE: some of these details are obtained from third party information. NOTE: it has been reported that this might only be exploitable by writing in the same directory as the .ini file. If this is the case, then this issue might not cross privilege boundaries.\n","fixed_versions":[],"id":"CPANSA-Config-IniFiles-2012-2451","cves":["CVE-2012-2451"],"severity":null,"distribution":"Config-IniFiles","reported":"2012-06-27","references":["http://www.openwall.com/lists/oss-security/2012/05/02/6","http://www.osvdb.org/81671","http://secunia.com/advisories/48990","https://bitbucket.org/shlomif/perl-config-inifiles/changeset/a08fa26f4f59","https://bugzilla.redhat.com/show_bug.cgi?id=818386","http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080713.html","http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080716.html","http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081207.html","http://www.securityfocus.com/bid/53361","http://www.ubuntu.com/usn/USN-1543-1","https://exchange.xforce.ibmcloud.com/vulnerabilities/75328"]}],"versions":[{"date":"2000-06-20T02:07:11","version":"0.05"},{"version":"0.06","date":"2000-06-26T02:38:13"},{"date":"2000-07-31T01:32:53","version":"0.08"},{"version":"0.09","date":"2000-07-31T01:51:15"},{"version":"0.11","date":"2000-09-17T03:29:50"},{"date":"2000-09-20T01:06:10","version":"1.6"},{"date":"2000-10-17T02:01:37","version":"1.8"},{"version":"1.11","date":"2000-11-25T03:36:14"},{"date":"2000-11-28T14:09:00","version":"1.12"},{"date":"2000-11-28T14:09:15","version":"1.13"},{"date":"2000-12-13T17:45:25","version":"2.10"},{"date":"2000-12-18T17:56:28","version":"2.13"},{"version":"2.14","date":"2001-01-08T18:27:24"},{"version":"2.17","date":"2001-03-24T21:54:18"},{"version":"2.18","date":"2001-03-30T04:48:27"},{"date":"2001-04-05T01:06:51","version":"2.19"},{"version":"2.21","date":"2001-08-28T11:05:35"},{"date":"2001-12-06T17:15:03","version":"2.22"},{"version":"2.23","date":"2001-12-07T16:24:14"},{"date":"2001-12-07T17:27:08","version":"2.24"},{"date":"2001-12-12T20:50:06","version":"2.25"},{"date":"2001-12-19T22:26:32","version":"2.26"},{"date":"2001-12-20T16:11:24","version":"2.27"},{"date":"2002-08-15T21:41:35","version":"2.29"},{"version":"2.30","date":"2002-10-15T18:59:21"},{"date":"2002-12-18T01:58:55","version":"2.36"},{"date":"2003-01-31T23:06:08","version":"2.37"},{"date":"2003-05-14T01:38:13","version":"2.38"},{"date":"2005-04-29T20:33:23","version":"2.39"},{"version":"2.43","date":"2008-12-04T17:02:19"},{"version":"2.44","date":"2008-12-25T09:47:08"},{"date":"2008-12-27T15:25:59","version":"2.45"},{"version":"2.46","date":"2009-01-17T14:40:26"},{"version":"2.47","date":"2009-01-21T09:41:11"},{"version":"2.48","date":"2009-04-07T12:26:44"},{"date":"2009-05-02T14:27:53","version":"2.49"},{"version":"2.50","date":"2009-05-31T11:58:04"},{"date":"2009-06-08T09:41:11","version":"2.51"},{"version":"2.52","date":"2009-06-28T13:21:57"},{"date":"2009-11-13T09:58:28","version":"2.53"},{"version":"2.54","date":"2009-11-18T11:15:13"},{"version":"2.55","date":"2009-12-22T15:48:07"},{"date":"2009-12-31T04:57:40","version":"2.56"},{"date":"2010-03-01T13:51:57","version":"2.57"},{"date":"2010-05-17T07:45:33","version":"2.58"},{"date":"2010-11-12T11:33:52","version":"2.59"},{"version":"2.60","date":"2010-11-13T07:22:50"},{"version":"2.61","date":"2010-11-14T08:57:26"},{"version":"2.62","date":"2010-11-19T13:37:37"},{"version":"2.63","date":"2010-11-19T14:54:12"},{"date":"2010-11-20T09:55:05","version":"2.64"},{"version":"2.65","date":"2010-11-25T18:48:52"},{"date":"2011-01-29T16:40:18","version":"2.66"},{"version":"2.67","date":"2011-06-21T11:59:37"},{"date":"2011-06-21T19:18:33","version":"2.68"},{"version":"2.69","date":"2012-04-05T09:10:11"},{"date":"2012-04-06T09:52:14","version":"2.70"},{"version":"2.71","date":"2012-05-02T08:05:15"},{"version":"2.72","date":"2012-05-05T16:56:55"},{"date":"2012-05-14T07:49:33","version":"2.73"},{"version":"2.74","date":"2012-05-23T21:47:46"},{"date":"2012-05-25T12:29:48","version":"2.75"},{"date":"2012-06-15T14:47:10","version":"2.76"},{"date":"2012-06-21T16:39:23","version":"2.77"},{"version":"2.78","date":"2012-10-21T11:18:39"},{"version":"2.79","date":"2013-05-06T07:10:33"},{"date":"2013-05-14T19:25:07","version":"2.80"},{"version":"2.81","date":"2013-05-16T10:36:17"},{"version":"2.82","date":"2013-05-21T15:35:10"},{"version":"2.83","date":"2014-01-27T09:01:28"},{"date":"2015-04-13T18:40:30","version":"2.84"},{"version":"2.85","date":"2015-04-13T19:08:57"},{"version":"2.86","date":"2015-04-14T07:55:59"},{"date":"2015-06-16T09:06:37","version":"2.87"},{"version":"2.88","date":"2015-07-10T08:38:11"},{"version":"2.89","date":"2016-05-03T09:14:13"},{"version":"2.90","date":"2016-06-02T13:09:19"},{"date":"2016-06-03T03:11:38","version":"2.91"},{"version":"2.92","date":"2016-06-17T09:34:08"},{"date":"2016-07-24T08:34:00","version":"2.93"},{"version":"2.94","date":"2016-11-29T17:31:38"},{"version":"2.95","date":"2018-03-16T11:14:39"},{"version":"2.96","date":"2018-04-07T08:45:56"},{"version":"2.97","date":"2018-04-21T09:13:56"},{"date":"2018-04-21T11:50:34","version":"2.98"},{"date":"2018-09-13T07:11:41","version":"3.000000"},{"date":"2019-01-16T09:54:40","version":"3.000001"},{"version":"3.000002","date":"2019-03-14T13:34:40"},{"date":"2020-03-24T15:45:08","version":"3.000003"}],"main_module":"Config::IniFiles"},"File-DataClass":{"advisories":[{"affected_versions":["<0.72.1"],"description":"Loading modules from . (current directory).\n","fixed_versions":[">=0.72.1"],"id":"CPANSA-File-DataClass-2017-01","references":["https://metacpan.org/changes/distribution/File-DataClass"],"reported":"2017-04-01","distribution":"File-DataClass","cves":["CVE-2016-1238"]}],"versions":[{"version":"0.1.228","date":"2010-09-29T16:37:04"},{"date":"2010-10-06T14:20:31","version":"0.2.234"},{"version":"0.3.238","date":"2011-01-26T18:14:50"},{"version":"0.3.239","date":"2011-02-27T23:09:38"},{"version":"0.3.259","date":"2011-04-12T19:44:59"},{"version":"0.4.268","date":"2011-05-15T17:45:09"},{"date":"2011-05-30T01:47:40","version":"0.5.271"},{"date":"2011-07-11T13:39:10","version":"0.6.286"},{"date":"2011-11-30T00:05:18","version":"0.7.321"},{"date":"2011-12-02T04:40:20","version":"0.7.325"},{"version":"0.7.326","date":"2011-12-02T22:39:25"},{"date":"2011-12-03T18:43:58","version":"0.7.328"},{"version":"0.7.330","date":"2012-02-22T18:28:29"},{"date":"2012-02-23T11:00:24","version":"0.7.331"},{"version":"0.7.332","date":"2012-02-24T10:52:18"},{"version":"0.7.335","date":"2012-03-12T17:34:58"},{"date":"2012-03-20T18:24:26","version":"0.7.336"},{"date":"2012-03-21T22:43:50","version":"0.7.338"},{"date":"2012-03-22T13:48:59","version":"0.7.339"},{"date":"2012-03-24T00:37:31","version":"0.7.343"},{"version":"0.8.351","date":"2012-03-28T23:58:41"},{"date":"2012-03-29T22:05:21","version":"0.8.355"},{"date":"2012-04-03T00:26:12","version":"0.8.357"},{"version":"0.8.360","date":"2012-04-04T15:19:03"},{"date":"2012-04-17T18:57:01","version":"0.9.368"},{"version":"0.10.380","date":"2012-05-19T21:05:56"},{"version":"0.11.401","date":"2012-07-10T00:34:23"},{"date":"2012-09-02T13:43:37","version":"0.12.406"},{"version":"0.12.409","date":"2012-09-06T14:02:06"},{"version":"0.13.416","date":"2012-11-07T07:49:39"},{"date":"2012-11-13T20:16:27","version":"0.13.418"},{"date":"2012-12-12T23:25:16","version":"0.13.420"},{"date":"2012-12-14T17:58:08","version":"0.13.421"},{"version":"0.13.422","date":"2012-12-19T22:23:08"},{"date":"2012-12-21T20:48:41","version":"0.13.424"},{"version":"0.13.427","date":"2012-12-30T03:05:28"},{"date":"2013-01-07T00:52:48","version":"0.14.429"},{"version":"0.15.431","date":"2013-04-01T01:14:44"},{"date":"2013-04-02T14:21:13","version":"0.15.434"},{"date":"2013-04-14T16:15:55","version":"v0.16.438"},{"date":"2013-04-15T20:42:56","version":"v0.16.442"},{"date":"2013-04-24T03:47:54","version":"v0.16.445"},{"version":"v0.17.450","date":"2013-04-29T17:12:37"},{"date":"2013-04-30T22:15:36","version":"v0.18.6"},{"version":"v0.19.1","date":"2013-05-02T14:14:57"},{"date":"2013-05-07T23:33:06","version":"v0.20.6"},{"date":"2013-05-10T14:58:03","version":"v0.20.7"},{"date":"2013-05-14T13:32:28","version":"v0.20.8"},{"version":"v0.20.9","date":"2013-05-15T20:03:34"},{"version":"v0.20.10","date":"2013-05-16T00:11:50"},{"version":"v0.20.12","date":"2013-05-17T16:07:41"},{"date":"2013-06-08T13:26:40","version":"v0.20.13"},{"version":"v0.22.1","date":"2013-07-28T17:41:14"},{"date":"2013-07-29T11:39:49","version":"v0.22.2"},{"date":"2013-07-29T11:46:28","version":"v0.22.3"},{"version":"v0.22.4","date":"2013-07-29T18:37:14"},{"date":"2013-07-30T10:19:23","version":"v0.22.5"},{"version":"v0.22.7","date":"2013-07-30T16:25:59"},{"version":"v0.22.8","date":"2013-07-31T09:54:30"},{"version":"v0.22.9","date":"2013-08-02T19:06:49"},{"date":"2013-08-06T17:19:31","version":"v0.23.1"},{"date":"2013-08-07T13:14:13","version":"v0.23.2"},{"version":"0.24.1","date":"2013-08-13T18:01:24"},{"date":"2013-08-16T22:49:23","version":"0.24.3"},{"version":"0.25.1","date":"2013-09-03T13:11:17"},{"version":"0.26.1","date":"2013-09-26T16:04:18"},{"date":"2013-11-22T09:42:00","version":"0.27.1"},{"date":"2014-01-01T15:02:23","version":"0.28.1"},{"version":"0.29.1","date":"2014-01-01T17:03:18"},{"version":"0.30.1","date":"2014-01-02T02:33:28"},{"date":"2014-01-13T18:41:29","version":"0.31.1"},{"date":"2014-01-24T20:56:21","version":"0.33.1"},{"date":"2014-04-04T10:52:59","version":"0.34.1"},{"date":"2014-05-01T14:40:32","version":"0.35.1"},{"date":"2014-05-13T10:03:54","version":"0.36.1"},{"date":"2014-05-13T21:08:07","version":"0.37.1"},{"date":"2014-05-15T00:11:43","version":"0.38.1"},{"version":"0.39.1","date":"2014-05-16T08:19:01"},{"version":"0.40.1","date":"2014-05-22T09:37:34"},{"version":"0.40.2","date":"2014-05-22T14:10:49"},{"version":"0.41.1","date":"2014-05-28T10:28:42"},{"version":"0.42.1","date":"2014-07-03T23:27:53"},{"date":"2014-07-04T09:25:10","version":"0.42.2"},{"version":"0.43.1","date":"2014-07-04T12:19:02"},{"version":"0.44.1","date":"2014-07-16T12:39:03"},{"version":"0.45.1","date":"2014-08-18T23:00:05"},{"date":"2014-08-26T12:43:14","version":"0.45.5"},{"date":"2014-08-26T16:41:35","version":"0.46.1"},{"version":"0.47.1","date":"2014-08-27T16:17:50"},{"version":"0.48.1","date":"2014-09-03T22:25:51"},{"version":"0.48.3","date":"2014-10-02T17:39:13"},{"version":"0.49.1","date":"2014-10-02T19:59:28"},{"date":"2014-11-07T18:51:52","version":"0.50.1"},{"version":"0.50.2","date":"2014-11-08T21:45:45"},{"date":"2014-11-09T13:19:50","version":"0.50.3"},{"version":"0.51.1","date":"2014-11-09T15:52:41"},{"version":"0.52.1","date":"2014-11-10T12:44:49"},{"date":"2014-12-19T11:49:49","version":"0.53.1"},{"date":"2014-12-19T22:54:41","version":"0.54.1"},{"date":"2015-02-05T00:04:33","version":"0.55.1"},{"version":"0.56.1","date":"2015-03-19T14:59:03"},{"version":"0.57.1","date":"2015-04-04T20:00:58"},{"version":"0.58.1","date":"2015-04-04T20:16:31"},{"version":"0.59.1","date":"2015-04-05T17:58:31"},{"date":"2015-04-08T23:10:28","version":"0.60.1"},{"version":"0.61.1","date":"2015-05-11T12:15:05"},{"date":"2015-05-24T11:52:28","version":"0.62.1"},{"date":"2015-06-21T21:42:17","version":"0.63.1"},{"version":"0.66.1","date":"2015-08-29T08:58:54"},{"version":"0.67.1","date":"2016-02-01T00:18:43"},{"date":"2016-02-01T14:33:11","version":"0.68.1"},{"date":"2016-07-05T00:36:52","version":"0.69.1"},{"date":"2016-07-29T15:24:24","version":"0.70.1"},{"date":"2016-07-29T18:59:13","version":"0.71.1"},{"date":"2017-04-02T08:23:47","version":"0.72.1"},{"date":"2017-06-02T00:03:17","version":"0.73.1"}],"main_module":"File::DataClass"},"IPTables-Parse":{"advisories":[{"references":["https://metacpan.org/source/MRASH/IPTables-Parse-1.6/Changes","https://github.com/mtrmac/IPTables-Parse/commit/b400b976d81140f6971132e94eb7657b5b0a2b87","https://bugzilla.redhat.com/show_bug.cgi?id=1267962","http://www.openwall.com/lists/oss-security/2015/11/24/10"],"reported":"2017-06-07","distribution":"IPTables-Parse","severity":"medium","cves":["CVE-2015-8326"],"id":"CPANSA-IPTables-Parse-2015-8326","fixed_versions":[],"description":"The IPTables-Parse module before 1.6 for Perl allows local users to write to arbitrary files owned by the current user.\n","affected_versions":["<1.6"]}],"versions":[{"date":"2008-10-26T23:15:50","version":"0.7"},{"version":"0.8","date":"2012-02-27T02:20:58"},{"date":"2012-02-27T02:22:29","version":"0.9"},{"date":"2012-02-29T02:51:44","version":"1.0"},{"date":"2012-03-03T03:56:08","version":"1.1"},{"version":"1.1","date":"2015-02-25T02:08:58"},{"date":"2015-03-01T20:15:52","version":"1.3.1"},{"date":"2015-03-01T20:50:07","version":"1.4"},{"version":"1.5","date":"2015-09-09T13:53:26"},{"version":"1.6","date":"2015-11-07T21:08:49"},{"date":"2015-11-30T01:16:22","version":"1.6.1"}],"main_module":"IPTables::Parse"},"MARC-File-XML":{"main_module":"MARC::File::XML","versions":[{"date":"2017-05-24T01:18:18","version":"v1.0.5"}],"advisories":[{"references":["http://www.securityfocus.com/bid/65057","http://www.nntp.perl.org/group/perl.perl4lib/2014/01/msg3073.html","http://secunia.com/advisories/55404","http://libmail.georgialibraries.org/pipermail/open-ils-general/2014-January/009442.html","https://metacpan.org/source/GMCHARLT/MARC-XML-1.0.2/Changes","http://lists.katipo.co.nz/pipermail/koha/2014-January/038430.html","http://osvdb.org/102367","https://exchange.xforce.ibmcloud.com/vulnerabilities/90620"],"reported":"2014-01-26","distribution":"MARC-File-XML","severity":null,"cves":["CVE-2014-1626"],"id":"CPANSA-MARC-File-XML-2014-1626","fixed_versions":[],"description":"XML External Entity (XXE) vulnerability in MARC::File::XML module before 1.0.2 for Perl, as used in Evergreen, Koha, perl4lib, and possibly other products, allows context-dependent attackers to read arbitrary files via a crafted XML file.\n","affected_versions":["<1.0.2"]}]},"RT-Extension-MobileUI":{"versions":[{"date":"2010-08-05T20:58:09","version":"0.9"},{"version":"0.91","date":"2010-08-06T15:38:53"},{"date":"2010-08-06T15:58:11","version":"0.92"},{"version":"0.93","date":"2010-08-06T17:55:08"},{"date":"2010-08-09T13:36:43","version":"0.94"},{"date":"2010-08-09T13:44:33","version":"0.95"},{"version":"0.96","date":"2010-08-26T21:28:07"},{"version":"0.96","date":"2010-09-06T18:11:56"},{"date":"2010-10-28T15:50:29","version":"0.98"},{"date":"2010-10-29T14:08:08","version":"0.99"},{"version":"1.00","date":"2010-11-19T18:11:43"},{"date":"2010-12-08T16:36:01","version":"1.01"},{"version":"1.02","date":"2012-07-25T08:57:33"},{"version":"1.02","date":"2012-07-25T18:36:52"},{"version":"1.03","date":"2012-08-27T16:42:55"},{"date":"2013-06-12T19:09:14","version":"1.04"},{"version":"1.05","date":"2013-08-13T18:06:54"},{"date":"2014-04-23T20:25:25","version":"1.06"},{"date":"2014-04-23T20:26:56","version":"1.07"}],"advisories":[{"distribution":"RT-Extension-MobileUI","references":["https://metacpan.org/changes/distribution/RT-Extension-MobileUI"],"reported":"2012-05-18","cves":["CVE-2012-2769"],"id":"CPANSA-RT-Extension-MobileUI-2012-01","description":"Multiple cross-site scripting (XSS) vulnerabilities in the topic administration page.\n","fixed_versions":[">=1.02"],"affected_versions":["<1.02"]}],"main_module":"RT::Extension::MobileUI"},"Parallel-ForkManager":{"advisories":[{"description":"Parallel::ForkManager module before 1.0.0 for Perl does not properly handle temporary files.\n","fixed_versions":[],"affected_versions":["<1.0.0"],"distribution":"Parallel-ForkManager","reported":"2020-01-31","references":["http://www.openwall.com/lists/oss-security/2011/11/04/2","http://www.openwall.com/lists/oss-security/2011/11/04/4","https://rt.cpan.org/Public/Bug/Display.html?id=68298"],"cves":["CVE-2011-4115"],"severity":"high","id":"CPANSA-Parallel-ForkManager-2011-4115"}],"versions":[{"version":"0.5","date":"2000-10-19T21:52:22"},{"date":"2000-11-30T11:03:55","version":"0.6"},{"date":"2001-04-04T11:28:22","version":"0.7"},{"version":"v0.7.2","date":"2001-05-14T14:34:23"},{"version":"v0.7.3","date":"2001-10-24T00:32:21"},{"version":"v0.7.4","date":"2002-07-04T21:16:46"},{"date":"2002-12-25T23:14:12","version":"v0.7.5"},{"version":"0.7.6","date":"2010-08-15T10:53:20"},{"version":"0.7.7","date":"2010-09-27T22:27:36"},{"date":"2010-10-25T16:44:43","version":"0.7.8"},{"date":"2010-11-01T18:06:12","version":"0.7.9"},{"date":"2012-12-23T10:29:10","version":"v1.0.0"},{"date":"2012-12-23T19:35:57","version":"1.01"},{"version":"1.02","date":"2012-12-24T11:30:23"},{"version":"1.03","date":"2013-03-06T09:31:14"},{"version":"1.04","date":"2013-09-03T06:57:39"},{"version":"1.05","date":"2013-09-18T08:58:10"},{"date":"2013-12-24T20:42:36","version":"1.06"},{"version":"1.07","date":"2014-11-10T07:11:25"},{"version":"1.08","date":"2015-01-07T15:27:26"},{"date":"2015-01-08T14:47:12","version":"1.09"},{"date":"2015-01-15T15:22:56","version":"1.10"},{"version":"1.10_1","date":"2015-01-22T19:09:25"},{"version":"1.10_2","date":"2015-01-26T19:32:34"},{"date":"2015-01-30T16:16:43","version":"1.11"},{"version":"1.12","date":"2015-02-23T23:22:38"},{"date":"2015-05-11T22:32:07","version":"1.13"},{"date":"2015-05-17T21:19:58","version":"1.14"},{"version":"1.15","date":"2015-07-08T21:41:39"},{"version":"1.16","date":"2015-10-08T22:51:51"},{"date":"2015-11-28T14:50:06","version":"1.17"},{"version":"1.18","date":"2016-03-29T23:27:09"},{"version":"1.19","date":"2016-06-28T23:04:26"},{"date":"2018-07-19T00:48:24","version":"1.20"},{"version":"2.00","date":"2018-08-23T01:28:34"},{"date":"2018-08-23T23:59:37","version":"2.01"},{"date":"2018-10-08T23:21:03","version":"2.02"},{"date":"2024-08-24T18:13:26","version":"2.03"}],"main_module":"Parallel::ForkManager"},"HTML-StripScripts":{"main_module":"HTML::StripScripts","advisories":[{"id":"CPANSA-HTML-StripScripts-2023-24038","cves":["CVE-2023-24038"],"severity":"high","distribution":"HTML-StripScripts","reported":"2023-01-21","references":["https://github.com/clintongormley/perl-html-stripscripts/issues/3","https://lists.debian.org/debian-lts-announce/2023/01/msg00036.html","https://www.debian.org/security/2023/dsa-5339"],"affected_versions":["<=1.06"],"fixed_versions":[],"description":"The HTML-StripScripts module through 1.06 for Perl allows _hss_attval_style ReDoS because of catastrophic backtracking for HTML content with certain style attributes.\n"}],"versions":[{"date":"2003-03-30T10:08:51","version":"0.01"},{"version":"0.02","date":"2003-07-25T18:13:42"},{"version":"0.03","date":"2004-04-27T16:45:34"},{"date":"2007-05-28T11:57:07","version":"0.90"},{"version":"0.99","date":"2007-05-28T12:31:03"},{"version":"0.991","date":"2007-05-29T13:15:46"},{"version":"1.00","date":"2007-06-05T12:44:56"},{"version":"1.01","date":"2007-10-22T14:30:52"},{"version":"1.02","date":"2007-10-22T15:47:44"},{"version":"1.03","date":"2007-10-22T17:21:36"},{"date":"2007-11-16T17:53:46","version":"1.04"},{"version":"1.05","date":"2009-11-05T10:25:59"},{"date":"2016-05-12T09:44:35","version":"1.06"}]},"Mojolicious-Plugin-LazyImage":{"versions":[{"version":"0.01","date":"2017-12-28T10:40:31"}],"advisories":[{"description":"pdoc provides API Documentation for Python Projects. Documentation generated with `pdoc --math` linked to JavaScript files from polyfill.io. The polyfill.io CDN has been sold and now serves malicious code. This issue has been fixed in pdoc 14.5.1.\n","fixed_versions":[],"affected_versions":["<=0.01"],"reported":"2024-06-26","references":["https://github.com/mitmproxy/pdoc/pull/703","https://github.com/mitmproxy/pdoc/security/advisories/GHSA-5vgj-ggm4-fg62","https://sansec.io/research/polyfill-supply-chain-attack","https://github.com/briandfoy/cpan-security-advisory/issues/155","https://stackdiary.com/polyfill-compromise-hits-100000-sites-in-a-supply-chain-attack/"],"distribution":"Mojolicious-Plugin-LazyImage","severity":null,"cves":["CVE-2024-38526"],"id":"CPANSA-Mojolicious-Plugin-LazyImage-2024-38526","embedded_vulnerability":{"distributed_version":null,"name":"polyfill.io"}}],"main_module":"Mojolicious::Plugin::LazyImage"},"CGI-Auth-Basic":{"versions":[{"version":"1.0","date":"2004-02-21T14:58:09"},{"date":"2004-08-31T13:29:28","version":"1.01"},{"version":"1.02","date":"2004-11-07T03:34:32"},{"version":"1.10","date":"2006-06-18T01:12:15"},{"date":"2007-12-30T20:53:33","version":"1.11"},{"version":"1.20","date":"2009-04-18T04:22:51"},{"date":"2009-04-23T17:00:50","version":"1.21"},{"version":"1.21","date":"2009-04-24T15:07:48"},{"date":"2012-08-27T01:50:53","version":"1.22"},{"date":"2015-01-21T00:26:01","version":"1.23"},{"date":"2018-12-23T21:03:03","version":"1.24"}],"advisories":[{"affected_versions":["<1.11"],"description":"TBD\n","fixed_versions":[">=1.11"],"id":"CPANSA-CGI-Auth-Basic-2007-01","distribution":"CGI-Auth-Basic","references":["https://metacpan.org/changes/distribution/CGI-Auth-Basic"],"reported":"2007-12-30","cves":[]}],"main_module":"CGI::Auth::Basic"},"HTML-EP":{"main_module":"HTML::EP","advisories":[{"description":"HTML::EP::Session::Cookie in the HTML::EP module 0.2011 for Perl does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via a crafted request, which is not properly handled when it is deserialized.\n","fixed_versions":[],"affected_versions":[">=0.2011"],"reported":"2014-06-04","references":["http://www.securityfocus.com/bid/59833","http://seclists.org/oss-sec/2013/q2/318","https://exchange.xforce.ibmcloud.com/vulnerabilities/84199"],"distribution":"HTML-EP","severity":null,"cves":["CVE-2012-6142"],"id":"CPANSA-HTML-EP-2012-6142"}],"versions":[{"date":"1998-06-24T20:39:44","version":"0.1000"},{"version":"0.1002","date":"1998-06-26T12:21:47"},{"date":"1998-07-17T21:28:11","version":"0.1005"},{"date":"1998-07-18T16:05:32","version":"0.1006"},{"version":"0.1100","date":"1998-07-24T20:40:11"},{"version":"0.1106","date":"1998-09-12T20:26:57"},{"date":"1998-09-14T00:09:23","version":"0.1107"},{"version":"0.1108","date":"1998-09-18T01:41:54"},{"version":"0.1109","date":"1998-10-06T09:42:57"},{"date":"1998-10-13T16:57:33","version":"0.1111"},{"date":"1998-10-15T19:02:15","version":"0.1112"},{"date":"1998-10-21T21:58:15","version":"0.1113"},{"date":"1998-11-06T20:01:59","version":"0.1116"},{"date":"1998-11-29T18:25:07","version":"0.1117"},{"version":"0.1118","date":"1998-12-03T17:11:04"},{"date":"1999-01-26T02:07:08","version":"0.1123"},{"version":"0.1124","date":"1999-02-01T00:08:19"},{"version":"0.1125","date":"1999-02-07T20:07:50"},{"date":"1999-02-13T12:36:36","version":"0.1126"},{"date":"1999-02-23T18:47:31","version":"0.1127"},{"date":"1999-02-26T18:27:47","version":"0.1128"},{"version":"0.1130","date":"1999-05-04T22:59:11"},{"date":"1999-08-26T15:05:04","version":"0.11321"},{"date":"1999-08-27T11:29:51","version":"0.1133"},{"date":"1999-08-31T11:04:44","version":"0.1134"},{"date":"1999-09-21T10:22:21","version":"0.1135"},{"date":"1999-09-26T13:27:28","version":"0.20_00"},{"date":"1999-09-27T10:28:51","version":"0.20_01"},{"date":"1999-11-05T11:38:40","version":"0.2003"},{"version":"0.2004","date":"1999-11-08T15:38:12"},{"date":"1999-11-08T18:18:11","version":"0.2005"},{"date":"1999-11-17T12:28:55","version":"0.2006"},{"version":"0.2007","date":"1999-11-17T17:23:52"},{"version":"0.2008","date":"1999-11-25T10:15:38"},{"date":"1999-12-07T20:43:46","version":"0.2009"},{"date":"1999-12-15T22:41:39","version":"0.2010"},{"version":"0.2011","date":"2001-01-05T13:26:37"},{"version":0,"date":"2001-01-05T13:27:07"}]},"CPAN":{"main_module":"CPAN","advisories":[{"id":"CPANSA-CPAN-2023-31484","cves":["CVE-2023-31484"],"reported":"2023-02-28","references":["https://github.com/andk/cpanpm/commit/9c98370287f4e709924aee7c58ef21c85289a7f0","https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/","https://github.com/andk/cpanpm/pull/175","https://www.openwall.com/lists/oss-security/2023/04/18/14"],"distribution":"CPAN","affected_versions":["<2.35"],"previous_id":["CPANSA-CPAN-2023-01"],"description":"The verify_SSL flag is missing from HTTP::Tiny, and allows a network attacker to MITM the connection if it is used by the CPAN client\n","fixed_versions":[">=2.35"]},{"cves":[],"distribution":"CPAN","reported":"2009-09-23","references":["https://github.com/andk/cpanpm/commit/079fa2e7ee77d626eab8bb06d0465c6a05f6c8b6","https://rt.cpan.org/Ticket/Display.html?id=46384"],"id":"CPANSA-CPAN-2009-01","description":"Archive::Tar preserves permissions in the tarball; extracted file permissions will be set from users umask instead.\n","fixed_versions":[">=1.93"],"affected_versions":["<1.93"]},{"description":"CPAN 2.28 allows Signature Verification Bypass.","fixed_versions":[">=2.29"],"affected_versions":["<2.28"],"cves":["CVE-2020-16156"],"severity":"high","distribution":"CPAN","reported":"2021-12-13","references":["https://metacpan.org/pod/distribution/CPAN/scripts/cpan","https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/","http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/"],"id":"CPANSA-CPAN-2020-16156"}],"versions":[{"version":"0.17","date":"1996-09-10T17:13:59"},{"date":"1996-09-10T20:51:00","version":"0.20"},{"date":"1996-09-12T05:53:35","version":"0.26"},{"date":"1996-09-12T14:01:39","version":"0.27"},{"version":"0.28","date":"1996-09-16T20:18:59"},{"version":"0.29","date":"1996-09-17T17:14:51"},{"version":"0.30","date":"1996-09-19T05:24:17"},{"date":"1996-09-20T10:40:01","version":"0.31"},{"version":"0.35","date":"1996-09-22T19:30:33"},{"date":"1996-09-23T12:55:23","version":"0.36"},{"date":"1996-09-23T14:05:44","version":"0.37"},{"version":"0.39","date":"1996-09-27T12:52:07"},{"version":"0.40","date":"1996-09-28T20:51:31"},{"date":"1996-10-01T21:14:27","version":"0.41"},{"version":"0.42","date":"1996-11-17T07:56:02"},{"date":"1996-11-17T14:51:59","version":"0.43"},{"date":"1996-11-30T17:04:28","version":"0.44"},{"date":"1996-12-01T12:19:19","version":"0.45"},{"date":"1996-12-01T18:24:17","version":"0.46"},{"version":"1.00","date":"1996-12-10T00:58:25"},{"version":"1.01","date":"1996-12-10T10:17:15"},{"date":"1996-12-11T01:31:55","version":"1.02"},{"date":"1996-12-21T03:10:23","version":"1.03"},{"version":"1.04","date":"1996-12-21T20:08:49"},{"date":"1996-12-22T13:04:58","version":"1.05"},{"version":"1.06","date":"1996-12-22T14:16:08"},{"version":"1.07","date":"1996-12-23T04:05:01"},{"version":"1.08","date":"1996-12-23T13:18:01"},{"version":"1.09","date":"1996-12-24T00:46:19"},{"date":"1997-01-17T02:29:49","version":"1.09_01"},{"date":"1997-01-21T01:06:40","version":"1.10"},{"version":"1.11","date":"1997-01-22T18:50:00"},{"version":"1.12","date":"1997-01-23T00:07:58"},{"version":"1.14","date":"1997-01-24T01:07:44"},{"version":"1.15","date":"1997-01-24T12:32:12"},{"date":"1997-02-02T13:51:48","version":"1.16_01"},{"date":"1997-02-02T21:05:12","version":"1.17"},{"version":"1.18","date":"1997-02-03T00:38:36"},{"version":"1.19","date":"1997-02-03T09:13:48"},{"version":"1.20","date":"1997-02-05T09:38:00"},{"version":"1.21","date":"1997-02-11T06:32:42"},{"version":"1.22_01","date":"1997-03-13T23:14:59"},{"date":"1997-03-31T12:03:55","version":"1.23"},{"version":"1.24","date":"1997-03-31T22:47:11"},{"version":"1.25","date":"1997-06-30T18:13:23"},{"date":"1997-07-28T13:58:09","version":"1.27"},{"date":"1997-08-04T06:09:33","version":"1.28"},{"date":"1997-08-11T23:33:58","version":"1.29"},{"date":"1997-08-29T14:34:37","version":"1.30"},{"date":"1997-09-21T08:53:03","version":"1.31"},{"date":"1997-09-23T18:45:50","version":"1.3101"},{"version":"1.32","date":"1998-01-02T18:22:35"},{"date":"1998-01-10T18:24:23","version":"1.33"},{"version":"1.35","date":"1998-02-03T18:06:41"},{"date":"1998-02-08T08:55:55","version":"1.36"},{"date":"1998-06-12T06:51:25","version":"1.37"},{"date":"1998-06-14T20:18:08","version":"1.38"},{"version":"1.40","date":"1998-07-24T20:13:41"},{"version":"1.41","date":"1998-12-01T02:20:32"},{"version":"1.42","date":"1998-12-01T07:58:35"},{"version":"1.43","date":"1998-12-01T22:16:27"},{"date":"1998-12-03T17:07:54","version":"1.43"},{"version":"1.44","date":"1999-01-09T18:38:33"},{"version":"1.44_51","date":"1999-01-10T19:38:27"},{"date":"1999-01-13T12:15:42","version":"1.44_52"},{"date":"1999-01-15T09:26:40","version":"1.44_53"},{"date":"1999-01-15T09:27:45","version":"1.44_54"},{"version":"1.45","date":"1999-01-23T14:56:16"},{"date":"1999-01-25T01:43:42","version":"1.46"},{"date":"1999-01-25T13:11:23","version":"1.47"},{"date":"1999-03-06T19:34:54","version":"1.48"},{"date":"1999-05-22T16:45:00","version":"1.49"},{"date":"1999-05-23T14:32:20","version":"1.50"},{"date":"1999-10-23T03:06:39","version":"1.50_01"},{"version":"1.51","date":"1999-12-29T22:30:22"},{"version":"1.52","date":"2000-01-08T15:32:55"},{"version":"1.53","date":"2000-03-23T23:39:41"},{"date":"2000-03-25T22:51:15","version":"1.54"},{"date":"2000-07-30T11:15:04","version":"1.55"},{"version":"1.56","date":"2000-08-01T20:47:09"},{"date":"2000-08-16T12:54:07","version":"1.57"},{"date":"2000-08-21T19:44:18","version":"1.57_51"},{"version":"1.57_53","date":"2000-08-27T22:09:36"},{"date":"2000-08-30T16:54:50","version":"1.57_54"},{"version":"1.57_55","date":"2000-08-31T08:11:01"},{"version":"1.57_56","date":"2000-08-31T22:16:21"},{"version":"1.57_57","date":"2000-09-01T12:18:43"},{"version":"1.57_58","date":"2000-09-03T22:19:20"},{"date":"2000-09-05T09:44:05","version":"1.57_59"},{"date":"2000-09-05T19:55:34","version":"1.57_60"},{"version":"1.57_61","date":"2000-09-06T10:54:07"},{"version":"1.57_62","date":"2000-09-08T02:19:06"},{"date":"2000-09-10T08:54:37","version":"1.57_65"},{"date":"2000-09-12T08:46:40","version":"1.57_66"},{"date":"2000-09-17T10:24:31","version":"1.57_67"},{"date":"2000-10-08T14:25:04","version":"1.57_68"},{"date":"2000-10-18T14:53:45","version":"1.58"},{"date":"2000-10-21T14:21:06","version":"1.58_51"},{"date":"2000-10-25T07:05:38","version":"1.58_52"},{"date":"2000-10-26T11:03:29","version":"1.58_53"},{"date":"2000-10-26T15:34:21","version":"1.58_54"},{"version":"1.58_55","date":"2000-10-27T07:59:03"},{"date":"2000-11-04T09:36:53","version":"1.58_56"},{"version":"1.58_57","date":"2000-11-06T19:30:27"},{"version":"1.58_90","date":"2000-11-08T08:10:51"},{"version":"1.58_91","date":"2000-11-13T10:26:38"},{"date":"2000-11-14T18:24:18","version":"1.58_92"},{"version":"1.58_93","date":"2000-11-15T07:19:56"},{"version":"1.59","date":"2000-12-01T06:05:58"},{"version":"1.59_51","date":"2000-12-01T08:19:58"},{"date":"2000-12-26T13:54:06","version":"1.59_52"},{"version":"1.59_53","date":"2001-01-02T16:37:24"},{"date":"2001-02-09T21:44:55","version":"1.59_54"},{"date":"2002-04-19T13:29:54","version":"1.60"},{"date":"2002-04-20T02:18:41","version":"1.60"},{"version":"1.60","date":"2002-04-21T11:31:25"},{"version":"1.61","date":"2002-05-07T10:38:54"},{"version":"1.62","date":"2002-07-28T10:51:47"},{"date":"2002-08-30T08:58:10","version":"1.63"},{"date":"2003-02-06T10:04:06","version":"1.64"},{"date":"2003-02-08T17:10:13","version":"1.65"},{"date":"2003-03-04T19:38:21","version":"1.70"},{"date":"2003-04-11T04:33:18","version":"1.70_52"},{"version":"1.70_53","date":"2003-04-13T12:43:40"},{"date":"2003-05-15T21:04:52","version":"1.70_54"},{"date":"2003-07-04T09:48:08","version":"1.71"},{"version":"1.72","date":"2003-07-27T20:35:05"},{"date":"2003-07-28T08:21:47","version":"1.73"},{"version":"1.74","date":"2003-07-28T22:58:08"},{"version":"1.75","date":"2003-07-29T15:14:13"},{"version":"1.76","date":"2003-07-31T15:14:02"},{"date":"2003-09-21T21:25:41","version":"1.76_01"},{"version":"1.76_51","date":"2005-09-19T06:37:38"},{"date":"2005-09-22T07:02:02","version":"1.76_52"},{"version":"1.76_53","date":"2005-09-22T07:09:48"},{"date":"2005-10-01T08:23:38","version":"1.76_54"},{"version":"1.76_55","date":"2005-10-19T06:10:58"},{"version":"1.76_56","date":"2005-10-21T04:59:36"},{"version":"1.76_57","date":"2005-10-27T07:08:29"},{"date":"2005-11-02T04:03:28","version":"1.76_58"},{"date":"2005-11-03T06:37:52","version":"1.76_59"},{"date":"2005-11-03T07:38:40","version":"1.76_60"},{"version":"1.76_61","date":"2005-11-06T10:36:53"},{"date":"2005-11-07T04:22:19","version":"1.76_62"},{"date":"2005-11-07T04:47:05","version":"1.76_63"},{"version":"1.76_64","date":"2005-11-07T21:58:06"},{"date":"2005-11-07T22:18:44","version":"1.76_65"},{"date":"2005-12-03T10:12:08","version":"1.80"},{"date":"2005-12-18T11:29:26","version":"1.80_51"},{"date":"2005-12-21T12:13:15","version":"1.80_53"},{"date":"2005-12-22T08:42:59","version":"1.80_54"},{"version":"1.80_55","date":"2005-12-24T07:25:34"},{"version":"1.80_56","date":"2005-12-24T09:59:47"},{"date":"2005-12-31T11:58:10","version":"1.80_57"},{"date":"2006-01-01T09:01:43","version":"1.80_58"},{"date":"2006-01-02T23:15:15","version":"1.81"},{"date":"2006-01-04T07:47:25","version":"1.82"},{"date":"2006-01-05T08:03:36","version":"1.83"},{"version":"1.83_51","date":"2006-01-08T13:35:16"},{"date":"2006-01-10T05:00:26","version":"1.83_52"},{"version":"1.83_53","date":"2006-01-12T07:54:36"},{"date":"2006-01-13T08:20:42","version":"1.83_54"},{"version":"1.83_55","date":"2006-01-14T11:34:47"},{"version":"1.83_56","date":"2006-01-18T06:03:44"},{"version":"1.83_57","date":"2006-01-19T08:00:02"},{"date":"2006-01-22T12:05:01","version":"1.83_58"},{"date":"2006-01-25T13:10:20","version":"1.83_59"},{"date":"2006-01-30T10:35:47","version":"1.83_60"},{"date":"2006-01-30T23:18:09","version":"1.83_61"},{"date":"2006-01-31T10:28:57","version":"1.83_62"},{"version":"1.83_63","date":"2006-02-01T07:49:36"},{"date":"2006-02-02T09:17:39","version":"1.83_64"},{"date":"2006-02-04T11:20:05","version":"1.83_65"},{"date":"2006-02-04T17:05:00","version":"1.83_66"},{"date":"2006-02-06T00:46:27","version":"1.83_67"},{"version":"1.83_68","date":"2006-02-08T07:43:36"},{"date":"2006-02-14T08:17:55","version":"1.83_69"},{"date":"2006-02-15T07:01:02","version":"1.84"},{"version":"1.85","date":"2006-02-19T17:05:36"},{"version":"1.86","date":"2006-02-20T08:36:51"},{"date":"2006-02-21T06:05:05","version":"1.86_51"},{"date":"2006-02-22T22:29:54","version":"1.86_52"},{"date":"2006-02-24T08:24:09","version":"1.86_53"},{"version":"1.87","date":"2006-02-27T07:01:10"},{"date":"2006-03-06T08:02:28","version":"1.87_51"},{"version":"1.87_52","date":"2006-07-21T22:33:11"},{"version":"1.87_53","date":"2006-07-22T18:55:13"},{"version":"1.87_54","date":"2006-07-23T21:37:11"},{"date":"2006-07-29T19:36:50","version":"1.87_55"},{"version":"1.87_56","date":"2006-08-24T05:57:41"},{"version":"1.87_57","date":"2006-08-26T17:05:56"},{"date":"2006-08-31T06:50:49","version":"1.87_58"},{"version":"1.87_59","date":"2006-09-03T21:05:29"},{"version":"1.87_61","date":"2006-09-10T11:57:33"},{"version":"1.87_62","date":"2006-09-11T21:24:18"},{"date":"2006-09-13T05:44:15","version":"1.87_63"},{"version":"1.87_64","date":"2006-09-16T11:02:25"},{"date":"2006-09-19T03:44:51","version":"1.87_65"},{"version":"1.88","date":"2006-09-21T20:30:41"},{"version":"1.8801","date":"2006-09-22T20:40:40"},{"version":"1.88_51","date":"2006-09-30T10:41:20"},{"date":"2006-10-03T09:51:49","version":"1.88_52"},{"version":"1.88_53","date":"2006-10-09T19:31:56"},{"version":"1.88_54","date":"2006-10-14T09:37:15"},{"date":"2006-10-16T06:59:27","version":"1.88_55"},{"version":"1.88_56","date":"2006-10-22T10:34:16"},{"date":"2006-10-23T07:17:30","version":"1.8802"},{"version":"1.88_57","date":"2006-10-24T07:18:16"},{"version":"1.88_58","date":"2006-10-28T15:00:07"},{"version":"1.88_59","date":"2006-11-05T21:24:52"},{"date":"2006-11-10T08:39:55","version":"1.88_61"},{"version":"1.88_62","date":"2006-11-13T07:44:27"},{"version":"1.88_63","date":"2006-11-29T08:11:50"},{"date":"2006-12-04T07:53:37","version":"1.88_64"},{"date":"2006-12-11T21:36:04","version":"1.88_65"},{"version":"1.88_66","date":"2006-12-19T08:21:17"},{"date":"2006-12-31T17:18:53","version":"1.88_67"},{"date":"2007-01-07T21:22:12","version":"1.88_68"},{"version":"1.88_69","date":"2007-01-08T03:42:56"},{"date":"2007-01-27T16:57:49","version":"1.88_71"},{"version":"1.88_72","date":"2007-01-31T07:11:33"},{"version":"1.88_73","date":"2007-02-13T05:24:13"},{"version":"1.88_74","date":"2007-02-15T07:12:17"},{"date":"2007-02-18T16:52:49","version":"1.88_75"},{"date":"2007-02-19T06:20:20","version":"1.88_76"},{"version":"1.88_77","date":"2007-02-19T21:26:47"},{"date":"2007-03-05T23:26:57","version":"1.88_78"},{"date":"2007-03-16T01:54:55","version":"1.88_79"},{"date":"2007-04-07T07:41:18","version":"1.90"},{"date":"2007-04-19T07:03:03","version":"1.91"},{"version":"1.9101","date":"2007-04-23T00:09:11"},{"version":"1.9102","date":"2007-05-08T20:35:04"},{"date":"2007-07-07T16:15:40","version":"1.91_51"},{"version":"1.91_52","date":"2007-07-14T18:45:58"},{"version":"1.91_53","date":"2007-08-09T06:49:38"},{"version":"1.91_54","date":"2007-09-14T21:18:33"},{"version":"1.91_55","date":"2007-09-15T07:14:26"},{"version":"1.92","date":"2007-09-23T11:15:08"},{"version":"1.9201","date":"2007-09-27T07:11:10"},{"version":"1.9202","date":"2007-09-28T06:58:04"},{"version":"1.9203","date":"2007-09-28T07:13:26"},{"version":"1.92_51","date":"2007-11-04T23:04:18"},{"version":"1.9204","date":"2007-11-05T23:30:06"},{"version":"1.92_52","date":"2007-11-11T11:27:20"},{"version":"1.9205","date":"2007-11-11T18:49:37"},{"date":"2007-12-09T23:27:18","version":"1.92_53"},{"date":"2007-12-27T04:57:34","version":"1.92_54"},{"date":"2007-12-30T15:24:13","version":"1.92_55"},{"version":"1.92_56","date":"2008-02-04T21:56:28"},{"version":"1.92_57","date":"2008-02-27T05:13:49"},{"version":"1.92_58","date":"2008-03-12T07:56:18"},{"version":"1.92_59","date":"2008-03-16T18:57:04"},{"date":"2008-03-26T07:53:08","version":"1.92_60"},{"date":"2008-04-25T04:47:52","version":"1.92_61"},{"date":"2008-05-23T04:07:04","version":"1.92_62"},{"date":"2008-06-19T06:42:18","version":"1.92_63"},{"version":"1.92_64","date":"2008-09-03T05:27:35"},{"version":"1.92_65","date":"2008-09-14T09:54:03"},{"date":"2008-09-29T23:15:10","version":"1.92_66"},{"date":"2008-10-12T16:07:51","version":"1.93"},{"date":"2008-10-13T19:37:43","version":"1.9301"},{"date":"2009-01-11T22:07:01","version":"1.93_02"},{"version":"1.93_03","date":"2009-02-01T12:38:23"},{"date":"2009-02-01T21:06:21","version":"1.93_51"},{"version":"1.9304","date":"2009-02-28T15:58:39"},{"date":"2009-04-13T19:24:43","version":"1.93_52"},{"version":"1.93_53","date":"2009-05-04T06:11:28"},{"version":"1.93_54","date":"2009-05-07T20:13:16"},{"date":"2009-05-24T05:37:28","version":"1.94"},{"version":"1.94_01","date":"2009-06-14T19:53:52"},{"date":"2009-06-27T02:55:22","version":"1.9402"},{"date":"2009-09-14T02:47:24","version":"1.94_51"},{"date":"2009-10-15T19:33:19","version":"1.94_52"},{"version":"1.94_53","date":"2009-12-18T07:00:09"},{"date":"2010-01-14T08:01:42","version":"1.94_54"},{"date":"2010-02-03T03:43:49","version":"1.94_55"},{"version":"1.94_56","date":"2010-02-17T13:39:33"},{"version":"1.94_57","date":"2010-05-24T19:33:41"},{"version":"1.94_58","date":"2010-06-24T06:34:13"},{"date":"2010-09-26T20:23:30","version":"1.94_59"},{"date":"2010-09-28T20:44:58","version":"1.94_60"},{"version":"1.94_61","date":"2010-10-03T17:29:37"},{"version":"1.94_62","date":"2010-10-26T06:43:51"},{"version":"1.94_63","date":"2011-01-16T17:58:10"},{"date":"2011-01-21T04:58:35","version":"1.94_64"},{"date":"2011-02-14T12:10:12","version":"1.94_65"},{"date":"2011-03-12T11:30:03","version":"1.9600"},{"date":"2011-06-27T06:56:01","version":"1.97_51"},{"version":"1.9800","date":"2011-08-07T09:40:33"},{"date":"2012-10-16T21:42:49","version":"1.99_51"},{"version":"2.00-TRIAL","date":"2013-02-06T07:41:54"},{"version":"2.00","date":"2013-04-12T16:57:44"},{"version":"2.01-TRIAL","date":"2013-06-22T20:27:32"},{"date":"2013-06-23T07:33:40","version":"2.02-TRIAL"},{"date":"2013-09-15T09:42:33","version":"2.03-TRIAL"},{"date":"2014-03-18T22:33:22","version":"2.04-TRIAL"},{"version":"2.05-TRIAL","date":"2014-03-31T20:55:24"},{"date":"2014-04-04T02:07:20","version":"2.05-TRIAL2"},{"version":"2.05","date":"2014-04-18T13:35:51"},{"version":"2.06-TRIAL","date":"2014-08-06T19:32:53"},{"date":"2015-01-04T18:54:54","version":"2.06-TRIAL"},{"date":"2015-01-05T06:31:55","version":"2.08-TRIAL"},{"date":"2015-02-02T04:41:02","version":"2.09-TRIAL"},{"date":"2015-02-22T15:57:42","version":"2.10-TRIAL"},{"version":"2.10","date":"2015-03-13T07:45:04"},{"date":"2015-12-31T11:00:08","version":"2.12-TRIAL"},{"date":"2016-05-16T09:56:01","version":"2.13-TRIAL"},{"version":"2.14-TRIAL","date":"2016-06-04T14:41:28"},{"date":"2016-06-25T04:32:45","version":"2.14"},{"version":"2.15-TRIAL","date":"2016-07-17T12:10:30"},{"version":"2.16-TRIAL","date":"2017-01-16T16:20:27"},{"version":"2.16-TRIAL2","date":"2017-01-16T21:27:06"},{"date":"2017-02-14T16:22:20","version":"2.16"},{"date":"2017-02-15T09:37:10","version":"2.17-TRIAL"},{"version":"2.17-TRIAL2","date":"2017-02-16T09:48:46"},{"version":"2.18-TRIAL","date":"2017-03-30T21:38:23"},{"date":"2017-11-04T23:27:47","version":"2.19-TRIAL"},{"date":"2017-11-26T22:10:39","version":"2.20-TRIAL"},{"date":"2018-09-22T20:46:35","version":"2.21-TRIAL"},{"date":"2018-12-16T10:35:04","version":"2.22-TRIAL"},{"date":"2018-12-23T09:11:29","version":"2.22"},{"version":"2.23-TRIAL","date":"2019-02-10T20:28:53"},{"version":"2.24-TRIAL","date":"2019-02-14T21:21:03"},{"date":"2019-02-16T05:56:23","version":"2.25-TRIAL"},{"date":"2019-03-03T06:27:10","version":"2.25"},{"date":"2019-03-19T00:04:34","version":"2.26"},{"version":"2.27-TRIAL","date":"2019-05-31T21:11:50"},{"version":"2.27-TRIAL2","date":"2019-06-09T05:48:20"},{"version":"2.27","date":"2019-07-03T20:15:40"},{"date":"2020-04-03T02:52:43","version":"2.28-TRIAL"},{"date":"2020-06-13T04:57:39","version":"2.28"},{"version":"2.29","date":"2021-11-23T16:58:45"},{"date":"2021-12-12T09:16:03","version":"2.30-TRIAL"},{"date":"2021-12-14T20:52:30","version":"2.31-TRIAL"},{"version":"2.32-TRIAL","date":"2021-12-26T21:35:55"},{"version":"2.33-TRIAL","date":"2022-01-21T04:09:07"},{"date":"2022-03-27T17:53:47","version":"2.33"},{"date":"2022-04-03T19:19:13","version":"2.34-TRIAL"},{"date":"2022-04-17T17:40:25","version":"2.34"},{"date":"2023-04-15T14:44:27","version":"2.35-TRIAL"},{"version":"2.35","date":"2023-04-27T13:05:07"},{"date":"2023-05-10T07:08:30","version":"2.36-TRIAL"},{"date":"2023-05-14T19:36:11","version":"2.36"},{"date":"2024-08-18T17:03:50","version":"2.37-TRIAL"},{"version":"2.37","date":"2024-08-30T17:18:31"},{"date":"2024-10-03T10:21:39","version":"2.38-TRIAL"},{"version":"2.38-TRIAL2","date":"2024-10-13T11:32:53"},{"version":"2.38","date":"2024-11-17T19:52:34"},{"perl_release":"5.004","version":"1.2401","date":"1997-05-15T00:00:00","dual_lived":1},{"perl_release":"5.005","version":"1.3901","dual_lived":1,"date":"1998-07-22T00:00:00"},{"date":"2002-03-05T00:00:00","dual_lived":1,"perl_release":"5.007003","version":"1.59_56"},{"version":"1.76_02","perl_release":"5.008008","dual_lived":1,"date":"2006-01-31T00:00:00"},{"perl_release":"5.011003","version":"1.94_5301","dual_lived":1,"date":"2009-12-20T00:00:00"},{"version":"1.9600_01","perl_release":"5.014002","dual_lived":1,"date":"2011-09-26T00:00:00"},{"date":"2013-09-20T00:00:00","dual_lived":1,"perl_release":"5.019004","version":"2.03"},{"version":"2.04","perl_release":"5.01901","dual_lived":1,"date":"2014-03-20T00:00:00"},{"version":"2.11","perl_release":"5.021011","dual_lived":1,"date":"2015-04-20T00:00:00"},{"version":"2.11_01","perl_release":"5.022003","date":"2017-01-14T00:00:00","dual_lived":1},{"version":"2.14_01","perl_release":"5.025004","dual_lived":1,"date":"2016-08-20T00:00:00"},{"perl_release":"5.025010","version":"2.17","date":"2017-02-20T00:00:00","dual_lived":1},{"dual_lived":1,"date":"2017-04-20T00:00:00","perl_release":"5.025012","version":"2.18"},{"date":"2017-12-20T00:00:00","dual_lived":1,"perl_release":"5.027007","version":"2.20"},{"date":"2018-10-20T00:00:00","dual_lived":1,"perl_release":"5.029004","version":"2.21"}]},"IO-Socket-SSL":{"advisories":[{"affected_versions":["<=1.35"],"fixed_versions":[">1.35"],"description":"The IO::Socket::SSL module 1.35 for Perl, when verify_mode is not VERIFY_NONE, fails open to VERIFY_NONE instead of throwing an error when a ca_file/ca_path cannot be verified, which allows remote attackers to bypass intended certificate restrictions.\n","id":"CPANSA-IO-Socket-SSL-2010-4334","reported":"2011-01-14","references":["http://osvdb.org/69626","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606058","http://www.securityfocus.com/bid/45189","http://cpansearch.perl.org/src/SULLR/IO-Socket-SSL-1.35/Changes","http://secunia.com/advisories/42508","http://secunia.com/advisories/42757","http://www.openwall.com/lists/oss-security/2010/12/09/8","http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052594.html","http://www.openwall.com/lists/oss-security/2010/12/24/1","http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052601.html","http://www.mandriva.com/security/advisories?name=MDVSA-2011:092"],"distribution":"IO-Socket-SSL","severity":null,"cves":["CVE-2010-4334"]},{"distribution":"IO-Socket-SSL","reported":"2009-08-31","references":["http://www.openwall.com/lists/oss-security/2009/08/31/4","http://www.openwall.com/lists/oss-security/2009/08/28/1","http://cpansearch.perl.org/src/SULLR/IO-Socket-SSL-1.30/Changes","http://www.openwall.com/lists/oss-security/2009/08/29/1","http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html","http://www.vupen.com/english/advisories/2011/0118","http://www.gentoo.org/security/en/glsa/glsa-201101-06.xml","http://secunia.com/advisories/42893"],"cves":["CVE-2009-3024"],"severity":null,"id":"CPANSA-IO-Socket-SSL-2009-3024","description":"The verify_hostname_of_cert function in the certificate checking feature in IO-Socket-SSL (IO::Socket::SSL) 1.14 through 1.25 only matches the prefix of a hostname when no wildcard is used, which allows remote attackers to bypass the hostname check for a certificate.\n","fixed_versions":[">=1.26"],"affected_versions":[">=1.14","<=1.25"]}],"versions":[{"version":"0.70","date":"1999-06-18T14:54:49"},{"version":"0.72","date":"1999-07-21T19:45:05"},{"date":"1999-07-29T17:28:04","version":"0.73"},{"version":"0.74","date":"2000-07-04T11:46:51"},{"version":"0.75","date":"2000-08-08T06:59:10"},{"date":"2000-11-17T14:26:45","version":"0.76"},{"version":"0.77","date":"2001-01-15T13:57:06"},{"version":"0.78","date":"2001-04-24T07:00:38"},{"version":"0.79","date":"2001-06-04T08:01:01"},{"version":"0.80","date":"2001-08-19T08:28:53"},{"version":"0.81","date":"2002-04-10T12:43:43"},{"version":"0.90","date":"2002-08-13T21:42:55"},{"date":"2002-08-19T15:28:09","version":"0.901"},{"date":"2002-09-01T01:13:14","version":"0.91"},{"date":"2002-10-22T06:15:30","version":"0.92"},{"date":"2003-06-24T19:24:37","version":"0.93"},{"version":"0.94","date":"2003-06-26T19:41:04"},{"date":"2003-08-25T22:47:30","version":"0.95"},{"date":"2004-04-30T17:43:07","version":"0.96"},{"version":"0.97","date":"2005-07-17T09:20:02"},{"date":"2006-06-12T14:37:33","version":"0.98"},{"date":"2006-06-12T14:48:30","version":"0.98"},{"date":"2006-07-17T15:05:06","version":"0.99"},{"date":"2006-07-18T13:33:27","version":"0.99"},{"date":"2006-07-20T05:59:15","version":"0.99"},{"date":"2006-07-20T08:35:45","version":"0.99"},{"date":"2006-07-24T14:27:43","version":"0.99"},{"version":"0.99","date":"2006-08-02T07:30:04"},{"version":"0.99","date":"2006-08-02T07:37:59"},{"version":"0.99","date":"2006-08-02T20:43:25"},{"version":"0.99","date":"2006-08-11T10:01:10"},{"date":"2006-08-15T20:22:28","version":"0.99"},{"date":"2006-09-12T14:16:38","version":"0.99"},{"version":"0.99","date":"2006-09-13T11:10:06"},{"version":"0.99","date":"2006-12-01T09:57:52"},{"date":"2007-03-06T18:12:09","version":"0.99"},{"version":"0.99","date":"2007-03-28T19:06:21"},{"date":"2007-04-16T19:35:58","version":"0.99"},{"version":"0.99","date":"2007-04-30T07:45:00"},{"version":"0.99","date":"2007-06-03T19:46:51"},{"date":"2007-06-06T13:59:06","version":"0.99"},{"date":"2007-08-10T09:07:39","version":"0.99"},{"date":"2007-09-13T19:40:43","version":"0.99"},{"date":"2007-10-09T21:18:11","version":"0.99"},{"version":"0.99","date":"2007-10-10T18:49:29"},{"date":"2007-10-26T06:29:26","version":"0.99"},{"date":"2008-01-11T17:59:06","version":"0.99"},{"version":"0.99","date":"2008-01-28T06:44:08"},{"version":"0.99","date":"2008-02-22T09:07:12"},{"date":"2008-02-24T09:42:37","version":"0.99"},{"date":"2008-02-25T21:18:02","version":"0.99"},{"date":"2008-03-10T08:46:06","version":"0.99"},{"date":"2008-07-16T09:27:07","version":"0.99"},{"version":"0.99","date":"2008-08-28T20:03:28"},{"version":"0.99","date":"2008-09-19T06:34:13"},{"version":"0.99","date":"2008-09-19T16:54:30"},{"date":"2008-09-24T07:52:48","version":"0.99"},{"date":"2008-09-25T09:24:39","version":"0.99"},{"date":"2008-10-13T09:06:13","version":"0.99"},{"date":"2008-11-17T17:21:39","version":"0.99"},{"date":"2008-12-31T14:47:59","version":"0.99"},{"date":"2009-01-15T20:52:54","version":"0.99"},{"version":"0.99","date":"2009-01-22T20:59:47"},{"date":"2009-01-24T06:34:00","version":"0.99"},{"version":"1.23","date":"2009-02-23T09:59:39"},{"version":"1.24","date":"2009-04-01T08:02:14"},{"version":"1.25","date":"2009-07-02T18:15:35"},{"version":"1.26","date":"2009-07-03T07:36:23"},{"date":"2009-07-24T06:37:32","version":"1.27"},{"date":"2009-08-19T10:46:35","version":"1.28"},{"date":"2009-08-19T10:54:30","version":"1.29"},{"version":"1.30","date":"2009-08-19T14:41:37"},{"version":"1.30_2","date":"2009-09-01T07:44:10"},{"version":"1.30_3","date":"2009-09-02T05:57:30"},{"version":"1.31","date":"2009-09-25T19:10:53"},{"date":"2010-02-22T09:39:43","version":"1.32"},{"date":"2010-03-17T12:53:27","version":"1.33"},{"version":"1.34","date":"2010-11-01T08:55:36"},{"date":"2010-12-06T08:16:23","version":"1.35"},{"version":"1.36","date":"2010-12-08T19:28:31"},{"date":"2010-12-09T08:38:47","version":"1.37"},{"version":"1.38","date":"2011-01-18T08:45:03"},{"version":"1.39","date":"2011-03-03T11:39:29"},{"version":"1.40","date":"2011-05-02T10:32:52"},{"version":"1.41","date":"2011-05-10T05:14:22"},{"version":"1.42","date":"2011-05-10T14:15:57"},{"version":"1.43","date":"2011-05-11T08:23:15"},{"date":"2011-05-12T19:35:25","version":"1.43_1"},{"date":"2011-05-27T11:46:14","version":"1.44"},{"date":"2011-10-13T08:42:32","version":"1.45"},{"version":"1.46","date":"2011-10-18T06:30:07"},{"version":"1.47","date":"2011-10-21T07:09:03"},{"version":"1.48","date":"2011-10-26T16:35:42"},{"version":"1.49","date":"2011-10-28T08:26:49"},{"version":"1.50","date":"2011-12-06T21:14:17"},{"version":"1.51","date":"2011-12-06T21:25:05"},{"version":"1.52","date":"2011-12-07T08:12:01"},{"version":"1.53","date":"2011-12-11T21:45:13"},{"version":"1.54","date":"2012-01-11T08:15:23"},{"date":"2012-02-20T06:49:04","version":"1.55"},{"version":"1.56","date":"2012-02-22T15:49:39"},{"date":"2012-02-26T21:57:54","version":"1.57"},{"version":"1.58","date":"2012-02-26T22:09:30"},{"date":"2012-03-08T10:44:05","version":"1.59"},{"date":"2012-03-20T18:59:41","version":"1.60"},{"version":"1.61","date":"2012-03-27T14:34:36"},{"date":"2012-03-28T05:53:19","version":"1.62"},{"version":"1.63","date":"2012-04-06T20:33:58"},{"version":"1.64","date":"2012-04-06T21:04:54"},{"version":"1.65","date":"2012-04-16T16:51:54"},{"date":"2012-04-16T18:52:52","version":"1.66"},{"version":"1.67","date":"2012-05-07T09:39:11"},{"date":"2012-05-07T13:01:38","version":"1.68"},{"version":"1.69","date":"2012-05-08T08:24:35"},{"version":"1.70","date":"2012-05-08T09:18:24"},{"date":"2012-05-09T08:41:48","version":"1.71"},{"version":"1.72","date":"2012-05-10T11:10:15"},{"version":"1.73","date":"2012-05-11T19:29:42"},{"date":"2012-05-13T15:19:26","version":"1.74"},{"date":"2012-06-07T17:42:47","version":"1.74_1"},{"date":"2012-06-07T21:59:28","version":"1.74_2"},{"version":"1.75","date":"2012-06-15T12:42:21"},{"date":"2012-06-18T06:20:09","version":"1.76"},{"date":"2012-10-05T05:36:56","version":"1.77"},{"date":"2012-11-25T14:08:27","version":"1.78"},{"date":"2012-11-25T15:50:09","version":"1.79"},{"version":"1.80","date":"2012-11-30T07:47:23"},{"date":"2012-12-06T09:14:04","version":"1.81"},{"version":"1.82","date":"2013-01-28T07:41:50"},{"date":"2013-02-03T19:04:27","version":"1.83"},{"date":"2013-02-14T08:05:20","version":"1.831"},{"version":"1.84","date":"2013-02-15T20:48:12"},{"date":"2013-04-14T08:59:30","version":"1.85"},{"date":"2013-04-17T11:31:18","version":"1.86"},{"version":"1.87","date":"2013-04-24T18:16:01"},{"version":"1.88","date":"2013-05-02T05:59:47"},{"version":"1.89","date":"2013-05-14T13:36:49"},{"date":"2013-05-29T18:58:35","version":"1.90"},{"date":"2013-05-30T09:36:07","version":"1.91"},{"date":"2013-05-30T19:20:11","version":"1.92"},{"version":"1.93","date":"2013-05-31T06:14:58"},{"date":"2013-06-01T12:46:14","version":"1.94"},{"date":"2013-07-03T08:44:53","version":"1.950"},{"version":"1.951","date":"2013-07-03T10:02:42"},{"date":"2013-07-11T20:14:18","version":"1.952"},{"date":"2013-07-22T06:34:31","version":"1.953"},{"date":"2013-09-15T13:05:33","version":"1.954"},{"date":"2013-10-11T16:54:45","version":"1.955"},{"date":"2013-11-10T18:00:08","version":"1.956"},{"date":"2013-11-11T08:42:30","version":"1.957"},{"date":"2013-11-11T18:28:16","version":"1.958"},{"version":"1.959","date":"2013-11-12T15:39:42"},{"version":"1.960","date":"2013-11-13T00:10:43"},{"version":"1.961","date":"2013-11-26T14:47:11"},{"date":"2013-11-27T21:19:25","version":"1.962"},{"date":"2014-01-13T13:05:48","version":"1.963"},{"version":"1.964","date":"2014-01-15T11:36:49"},{"version":"1.965","date":"2014-01-16T19:11:32"},{"version":"1.966","date":"2014-01-21T16:53:39"},{"version":"1.967","date":"2014-02-06T22:06:14"},{"date":"2014-03-13T06:38:27","version":"1.968"},{"date":"2014-03-16T16:41:39","version":"1.969"},{"date":"2014-03-19T05:04:51","version":"1.970"},{"version":"1.971","date":"2014-03-22T19:54:06"},{"date":"2014-03-23T06:48:23","version":"1.972"},{"version":"1.973","date":"2014-03-26T07:10:22"},{"version":"1.974","date":"2014-04-02T06:53:53"},{"date":"2014-04-02T10:14:38","version":"1.975"},{"version":"1.976","date":"2014-04-04T04:36:04"},{"date":"2014-04-04T13:25:28","version":"1.977"},{"date":"2014-04-04T14:21:32","version":"1.978"},{"version":"1.979","date":"2014-04-06T06:24:29"},{"date":"2014-04-08T01:25:10","version":"1.980"},{"date":"2014-04-08T11:09:59","version":"1.981"},{"version":"1.982","date":"2014-04-24T20:14:47"},{"date":"2014-04-27T12:02:16","version":"1.982_1"},{"date":"2014-05-04T08:03:37","version":"1.983"},{"version":"1.984","date":"2014-05-10T13:11:17"},{"version":"1.985","date":"2014-05-15T06:30:28"},{"version":"1.986","date":"2014-05-16T17:41:46"},{"date":"2014-05-17T15:03:37","version":"1.987"},{"version":"1.988","date":"2014-05-17T22:15:10"},{"date":"2014-05-24T08:16:00","version":"1.989"},{"date":"2014-05-26T05:46:04","version":"1.989_1"},{"version":"1.990","date":"2014-05-27T11:00:11"},{"version":"1.991","date":"2014-05-27T19:43:31"},{"version":"1.992","date":"2014-06-01T21:47:49"},{"date":"2014-06-13T20:45:52","version":"1.993"},{"date":"2014-06-22T09:53:11","version":"1.994"},{"date":"2014-07-11T21:50:48","version":"1.995"},{"version":"1.996","date":"2014-07-12T11:49:12"},{"version":"1.997","date":"2014-07-12T17:24:04"},{"version":"1.998","date":"2014-09-07T14:59:47"},{"date":"2014-10-09T19:56:19","version":"1.999"},{"version":"2.000","date":"2014-10-16T05:05:11"},{"version":"2.001","date":"2014-10-21T09:46:39"},{"version":"2.002","date":"2014-10-21T21:00:54"},{"date":"2014-11-14T20:12:08","version":"2.003"},{"date":"2014-11-15T10:05:06","version":"2.004"},{"date":"2014-11-15T10:14:17","version":"2.004_1"},{"date":"2014-11-15T16:29:13","version":"2.005"},{"date":"2014-11-15T16:34:37","version":"2.005_1"},{"date":"2014-11-22T20:51:08","version":"2.006"},{"date":"2014-11-26T22:00:05","version":"2.007"},{"date":"2014-12-16T06:36:16","version":"2.008"},{"version":"2.009","date":"2015-01-12T10:48:21"},{"version":"2.010","date":"2015-01-14T20:13:41"},{"date":"2015-02-01T16:00:22","version":"2.011"},{"version":"2.012","date":"2015-02-02T07:46:57"},{"date":"2015-05-01T15:39:14","version":"2.013"},{"date":"2015-05-05T06:31:37","version":"2.014"},{"date":"2015-05-13T20:43:55","version":"2.015"},{"version":"2.015_001","date":"2015-05-26T21:15:38"},{"date":"2015-05-27T05:39:14","version":"2.015_002"},{"version":"2.015_003","date":"2015-05-27T17:24:09"},{"version":"2.015_004","date":"2015-05-28T07:07:25"},{"date":"2015-05-29T06:01:37","version":"2.015_005"},{"date":"2015-06-02T19:35:20","version":"2.015_006"},{"version":"2.016","date":"2015-06-02T20:41:45"},{"version":"2.016_001","date":"2015-06-04T14:38:29"},{"version":"2.016_002","date":"2015-06-14T17:05:06"},{"date":"2015-08-24T15:45:30","version":"2.017"},{"version":"2.018","date":"2015-08-27T11:31:55"},{"version":"2.019","date":"2015-09-01T05:32:47"},{"version":"2.020","date":"2015-09-20T10:33:59"},{"version":"2.021","date":"2015-12-02T19:55:29"},{"version":"2.022","date":"2015-12-10T07:12:46"},{"date":"2016-01-30T11:12:14","version":"2.023"},{"date":"2016-02-06T19:38:18","version":"2.024"},{"date":"2016-04-04T07:23:02","version":"2.025"},{"date":"2016-04-20T06:11:37","version":"2.026"},{"date":"2016-04-20T14:22:50","version":"2.027"},{"version":"2.028","date":"2016-06-27T14:22:02"},{"date":"2016-06-27T15:53:16","version":"2.029"},{"version":"2.030","date":"2016-07-08T08:53:04"},{"date":"2016-07-08T11:40:31","version":"2.031"},{"date":"2016-07-12T13:12:57","version":"2.032"},{"date":"2016-07-15T09:00:38","version":"2.033"},{"version":"2.034","date":"2016-08-08T08:19:05"},{"date":"2016-08-11T14:25:18","version":"2.035"},{"date":"2016-08-11T19:03:38","version":"2.036"},{"version":"2.037","date":"2016-08-22T17:39:32"},{"version":"2.038","date":"2016-09-17T09:36:29"},{"date":"2016-11-20T21:01:59","version":"2.039"},{"date":"2016-12-17T15:18:35","version":"2.040"},{"version":"2.041","date":"2017-01-04T05:17:55"},{"date":"2017-01-05T18:32:13","version":"2.042"},{"date":"2017-01-06T13:27:56","version":"2.043"},{"date":"2017-01-26T10:46:57","version":"2.044"},{"version":"2.045","date":"2017-02-13T15:26:59"},{"date":"2017-02-15T18:41:05","version":"2.046"},{"version":"2.047","date":"2017-02-16T19:01:01"},{"date":"2017-04-16T18:33:09","version":"2.048"},{"version":"2.049","date":"2017-06-12T05:15:34"},{"version":"2.050","date":"2017-08-18T06:07:18"},{"version":"2.051","date":"2017-09-05T09:28:25"},{"date":"2017-10-22T08:48:29","version":"2.052"},{"version":"2.053","date":"2018-01-21T19:41:38"},{"date":"2018-01-22T05:11:45","version":"2.054"},{"date":"2018-02-15T13:45:54","version":"2.055"},{"version":"2.056","date":"2018-02-19T06:35:28"},{"date":"2018-07-18T19:16:28","version":"2.057"},{"date":"2018-07-19T07:54:24","version":"2.058"},{"version":"2.059","date":"2018-08-15T16:13:05"},{"date":"2018-09-16T19:15:07","version":"2.060"},{"version":"2.061","date":"2019-02-23T02:08:16"},{"version":"2.062","date":"2019-02-24T00:14:55"},{"date":"2019-03-01T14:48:40","version":"2.063"},{"version":"2.064","date":"2019-03-04T12:28:12"},{"date":"2019-03-05T18:50:40","version":"2.065"},{"version":"2.066","date":"2019-03-06T06:55:56"},{"date":"2020-02-14T17:49:51","version":"2.067"},{"version":"2.068","date":"2020-03-31T06:15:39"},{"date":"2021-01-22T16:55:49","version":"2.069"},{"date":"2021-02-26T08:03:24","version":"2.070"},{"date":"2021-05-23T08:12:02","version":"2.071"},{"version":"2.072","date":"2021-08-16T13:06:40"},{"version":"2.073","date":"2021-12-22T19:30:42"},{"date":"2022-01-07T15:09:53","version":"2.074"},{"version":"2.075","date":"2022-09-02T18:18:33"},{"version":"2.076","date":"2022-11-14T13:41:15"},{"version":"2.077","date":"2022-11-21T11:44:16"},{"version":"2.078","date":"2022-12-11T20:10:13"},{"date":"2023-01-16T06:28:01","version":"2.079"},{"date":"2023-01-18T16:28:53","version":"2.080"},{"date":"2023-01-25T10:49:10","version":"2.081"},{"version":"2.082","date":"2023-05-17T20:41:22"},{"version":"2.083","date":"2023-05-18T09:15:20"},{"version":"2.084","date":"2023-11-06T21:02:36"},{"version":"2.085","date":"2024-01-22T19:07:08"},{"version":"2.086","date":"2024-07-03T12:14:36"},{"version":"2.087","date":"2024-07-08T05:33:53"},{"date":"2024-07-14T05:05:54","version":"2.088"},{"version":"2.089","date":"2024-08-29T14:46:00"}],"main_module":"IO::Socket::SSL"},"Email-MIME":{"main_module":"Email::MIME","advisories":[{"id":"CPANSA-Email-MIME-2024-4140","distribution":"Email-MIME","reported":"2024-05-02","references":["https://bugs.debian.org/960062","https://github.com/rjbs/Email-MIME/commit/02bf3e26812c8f38a86a33c168571f9783365df2","https://github.com/rjbs/Email-MIME/commit/3a12edd119e493156a5a05e45dd50f4e36b702e8","https://github.com/rjbs/Email-MIME/commit/3dcf096eeccb8e4dd42738de676c8f4a5aa7a531","https://github.com/rjbs/Email-MIME/commit/7e96ecfa1da44914a407f82ae98ba817bba08f2d","https://github.com/rjbs/Email-MIME/commit/b2cb62f19e12580dd235f79e2546d44a6bec54d1","https://github.com/rjbs/Email-MIME/commit/fc0fededd24a71ccc51bcd8b1e486385d09aae63","https://github.com/rjbs/Email-MIME/issues/66","https://github.com/rjbs/Email-MIME/pull/80","https://www.cve.org/CVERecord?id=CVE-2024-4140"],"cves":["CVE-2024-4140"],"severity":null,"affected_versions":["<1.954"],"fixed_versions":[">=1.954"],"description":"An excessive memory use issue (CWE-770) exists in Email-MIME, before version 1.954, which can cause denial of service when parsing multipart MIME messages. The patch set (from 2020 and 2024) limits excessive depth and the total number of parts.\n"}],"versions":[{"date":"2004-01-23T12:04:54","version":"1.0_01"},{"date":"2004-03-24T16:01:33","version":"1.1"},{"date":"2004-04-02T08:52:35","version":"1.2"},{"version":"1.3","date":"2004-04-05T16:27:42"},{"date":"2004-07-01T17:38:00","version":"1.4"},{"date":"2004-07-01T17:40:06","version":"1.5"},{"date":"2004-07-04T20:17:06","version":"1.6"},{"date":"2004-07-05T21:56:19","version":"1.7"},{"version":"1.8","date":"2004-08-25T09:58:28"},{"date":"2004-10-30T00:19:03","version":"1.81"},{"date":"2004-11-18T01:02:46","version":"1.82"},{"date":"2006-07-13T12:09:00","version":"1.85"},{"date":"2006-08-22T12:15:01","version":"1.851"},{"date":"2006-09-06T03:22:24","version":"1.852"},{"date":"2006-10-12T19:23:59","version":"1.853"},{"version":"1.854","date":"2006-10-15T12:57:06"},{"date":"2006-10-19T19:26:56","version":"1.855"},{"date":"2006-11-28T01:54:55","version":"1.856"},{"version":"1.857","date":"2006-11-28T02:45:42"},{"date":"2007-02-10T03:53:13","version":"1.858"},{"version":"1.859","date":"2007-03-21T02:13:51"},{"date":"2007-07-14T02:17:11","version":"1.860"},{"date":"2007-11-06T02:03:23","version":"1.861"},{"date":"2008-09-08T22:24:06","version":"1.861_01"},{"date":"2009-01-24T03:09:24","version":"1.862"},{"date":"2009-01-30T13:35:20","version":"1.863"},{"date":"2009-11-03T20:49:02","version":"1.900"},{"version":"1.901","date":"2009-11-05T19:29:16"},{"date":"2009-11-11T20:53:15","version":"1.902"},{"version":"1.903","date":"2009-12-23T14:14:45"},{"date":"2010-09-04T22:05:49","version":"1.904"},{"version":"1.905","date":"2010-09-06T13:25:51"},{"date":"2010-10-08T01:06:33","version":"1.906"},{"date":"2011-02-02T22:52:42","version":"1.907"},{"date":"2011-06-02T03:16:50","version":"1.908"},{"date":"2011-09-08T19:27:38","version":"1.909"},{"date":"2011-09-12T16:45:52","version":"1.910"},{"version":"1.911","date":"2012-07-22T23:12:42"},{"date":"2013-04-08T19:42:09","version":"1.912_01"},{"version":"1.920","date":"2013-06-17T15:24:37"},{"version":"1.921","date":"2013-07-02T02:51:36"},{"version":"1.922","date":"2013-07-10T12:45:29"},{"version":"1.923","date":"2013-08-09T02:00:30"},{"date":"2013-08-11T03:25:40","version":"1.924"},{"version":"1.925","date":"2013-11-08T12:02:21"},{"date":"2014-01-29T04:29:29","version":"1.926"},{"date":"2014-12-04T15:22:49","version":"1.927"},{"date":"2014-12-16T02:49:06","version":"1.928"},{"date":"2015-02-17T14:32:33","version":"1.929"},{"date":"2015-03-26T03:00:09","version":"1.930"},{"version":"1.931","date":"2015-07-12T21:32:56"},{"version":"1.932","date":"2015-07-25T02:25:32"},{"date":"2015-07-25T13:33:07","version":"1.933"},{"date":"2015-08-02T00:35:40","version":"1.934"},{"date":"2015-08-31T20:49:57","version":"1.935"},{"date":"2015-09-11T02:48:33","version":"1.936"},{"version":"1.937","date":"2016-01-28T18:33:58"},{"version":"1.938","date":"2017-01-02T01:04:29"},{"version":"1.939","date":"2017-01-14T19:59:46"},{"version":"1.940","date":"2017-01-29T15:34:49"},{"version":"1.941","date":"2017-03-05T00:18:30"},{"date":"2017-03-05T13:16:39","version":"1.942"},{"date":"2017-06-09T23:01:41","version":"1.943"},{"date":"2017-07-25T16:40:42","version":"1.944"},{"date":"2017-07-25T18:18:48","version":"1.945"},{"date":"2017-08-31T13:31:14","version":"1.946"},{"date":"2020-05-09T18:30:39","version":"1.947"},{"date":"2020-05-09T19:06:22","version":"1.948"},{"version":"1.949","date":"2020-05-24T14:27:02"},{"date":"2020-11-03T00:22:52","version":"1.950"},{"version":"1.951","date":"2021-12-14T14:43:29"},{"date":"2021-12-14T14:58:13","version":"1.952"},{"date":"2023-01-09T00:03:49","version":"1.953"},{"version":"1.954","date":"2024-05-02T21:13:55"}]},"App-Context":{"advisories":[{"id":"CPANSA-App-Context-2012-6141","distribution":"App-Context","references":["http://seclists.org/oss-sec/2013/q2/318","https://exchange.xforce.ibmcloud.com/vulnerabilities/84198"],"reported":"2014-06-04","cves":["CVE-2012-6141"],"severity":null,"affected_versions":[">=0.01,<=0.968"],"description":"The App::Context module 0.01 through 0.968 for Perl does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via a crafted request to (1) App::Session::Cookie or (2) App::Session::HTMLHidden, which is not properly handled when it is deserialized.\n","fixed_versions":[">0.968"]}],"versions":[{"version":"0.01","date":"2002-10-10T21:31:39"},{"version":"0.90","date":"2004-09-02T21:17:44"},{"date":"2005-01-07T14:02:06","version":"0.93"},{"date":"2005-08-09T20:05:02","version":"0.95"},{"date":"2006-03-10T04:24:13","version":"0.96"},{"date":"2006-03-12T01:30:11","version":"0.962"},{"version":"0.963","date":"2006-07-25T02:30:21"},{"version":"0.964","date":"2006-09-04T19:41:12"},{"version":"0.965","date":"2007-04-17T13:33:24"},{"date":"2008-02-27T03:13:41","version":"0.966"},{"date":"2008-02-27T14:19:23","version":"0.9661"},{"date":"2009-09-11T14:31:52","version":"0.967"},{"version":"0.968","date":"2010-06-09T21:33:19"}],"main_module":"App::Context"},"Digest":{"main_module":"Digest","versions":[{"version":"1.00","date":"2001-03-14T06:33:08"},{"version":"1.01","date":"2003-01-05T01:23:53"},{"date":"2003-01-19T04:35:36","version":"1.02"},{"date":"2003-11-28T12:29:42","version":"1.03"},{"version":"1.04","date":"2003-11-29T12:08:20"},{"date":"2003-12-01T07:58:06","version":"1.05"},{"date":"2004-04-01T10:55:24","version":"1.06"},{"date":"2004-04-25T14:39:53","version":"1.07"},{"date":"2004-04-29T07:56:42","version":"1.08"},{"date":"2004-11-05T12:20:28","version":"1.09"},{"version":"1.10","date":"2004-11-08T09:41:14"},{"version":"1.11","date":"2005-09-11T11:14:33"},{"version":"1.12","date":"2005-09-29T10:20:20"},{"date":"2005-10-18T11:59:24","version":"1.13"},{"version":"1.14","date":"2005-11-26T10:10:21"},{"version":"1.15","date":"2006-03-20T15:18:01"},{"version":"1.16","date":"2009-06-09T18:58:26"},{"date":"2011-10-02T10:14:32","version":"1.17"},{"date":"2020-10-13T19:16:47","version":"1.18"},{"version":"1.19","date":"2020-10-13T20:02:35"},{"version":"1.20","date":"2021-08-24T13:51:51"},{"dual_lived":1,"date":"2012-10-12T00:00:00","perl_release":"5.014003","version":"1.16_01"},{"version":"1.17_01","perl_release":"5.022003","date":"2017-01-14T00:00:00","dual_lived":1}],"advisories":[{"affected_versions":["<1.17"],"description":"Eval injection vulnerability in the Digest module before 1.17 for Perl allows context-dependent attackers to execute arbitrary commands via the new constructor.\n","fixed_versions":[">=0.17"],"id":"CPANSA-Digest-2011-3597","reviewed_by":[{"name":"Robert Rothenberg","email":"rrwo@cpan.org","date":"2022-07-05"}],"distribution":"Digest","reported":"2012-01-13","references":["http://aix.software.ibm.com/aix/efixes/security/perl_advisory2.asc","http://www.redhat.com/support/errata/RHSA-2011-1797.html","http://www.redhat.com/support/errata/RHSA-2011-1424.html","https://bugzilla.redhat.com/show_bug.cgi?id=743010","http://www.securityfocus.com/bid/49911","http://secunia.com/advisories/46279","http://cpansearch.perl.org/src/GAAS/Digest-1.17/Changes","http://www.mandriva.com/security/advisories?name=MDVSA-2012:009","http://www.mandriva.com/security/advisories?name=MDVSA-2012:008","http://secunia.com/advisories/51457","http://www.ubuntu.com/usn/USN-1643-1","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19446"],"cves":["CVE-2011-3597"],"severity":null},{"id":"CPANSA-Digest-2016-1238","references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"reported":"2016-08-02","distribution":"Digest","severity":"high","cves":["CVE-2016-1238"],"affected_versions":["<1.19"],"fixed_versions":[">=1.19"],"description":"Includes . in @INC which might allow local users to gain privileges via a Trojan horse module under the current working directory.\n"}]},"Apache-AuthenHook":{"advisories":[{"affected_versions":[">=2.00_04"],"fixed_versions":[],"description":"libapache-authenhook-perl 2.00-04 stores usernames and passwords in plaintext in the vhost error log.\n","id":"CPANSA-Apache-AuthenHook-2010-3845","distribution":"Apache-AuthenHook","references":["https://rt.cpan.org/Public/Bug/Display.html?id=62040","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599712","http://seclists.org/oss-sec/2010/q4/63"],"reported":"2017-08-08","cves":["CVE-2010-3845"],"severity":"critical"}],"versions":[{"version":"2.00_01","date":"2003-06-20T19:05:21"},{"version":"2.00_03","date":"2004-04-06T01:20:10"},{"date":"2005-04-14T12:57:55","version":"2.00_04"}],"main_module":"Apache::AuthenHook"},"App-japerl":{"advisories":[{"id":"CPANSA-App-japerl-2016-1238","cves":["CVE-2016-1238"],"severity":"high","distribution":"App-japerl","references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"reported":"2016-08-02","affected_versions":["<0.09"],"description":"(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.\n","fixed_versions":[">=0.09"]}],"versions":[{"version":"0.10","date":"2018-09-07T15:19:24"},{"version":"0.11","date":"2018-09-08T15:07:20"},{"date":"2019-07-14T03:35:18","version":"0.12"},{"version":"0.13","date":"2021-02-18T14:03:58"},{"version":"0.14","date":"2021-09-18T18:20:37"},{"date":"2023-03-25T01:04:11","version":"0.15"}],"main_module":"App::japerl"},"Valiant":{"main_module":"Valiant","versions":[{"date":"2021-02-25T17:30:04","version":"0.001001"},{"date":"2021-02-25T17:57:04","version":"0.001002"},{"date":"2021-03-04T15:56:07","version":"0.001003"},{"version":"0.001004","date":"2021-04-07T14:42:08"},{"date":"2021-04-18T12:44:18","version":"0.001005"},{"version":"0.001006","date":"2021-04-20T01:13:20"},{"version":"0.001007","date":"2021-09-07T01:06:25"},{"version":"0.001008","date":"2021-09-14T14:58:28"},{"version":"0.001009","date":"2021-10-01T17:54:48"},{"version":"0.001010","date":"2021-10-26T17:09:00"},{"version":"0.001011","date":"2021-11-03T21:55:14"},{"version":"0.001012","date":"2022-02-27T23:39:59"},{"version":"0.001013","date":"2022-03-03T14:37:57"},{"date":"2022-03-04T15:43:13","version":"0.001014"},{"version":"0.001015","date":"2022-08-03T23:46:42"},{"version":"0.001016","date":"2022-09-11T19:09:30"},{"version":"0.001017","date":"2022-12-06T23:57:19"},{"date":"2023-04-06T18:14:16","version":"0.001018"},{"version":"0.001019","date":"2023-04-08T22:55:02"},{"date":"2023-04-09T19:34:57","version":"0.001020"},{"version":"0.001021","date":"2023-04-10T21:53:58"},{"version":"0.001022","date":"2023-04-18T13:17:26"},{"date":"2023-07-13T01:06:07","version":"0.001023"},{"date":"2023-07-14T12:59:23","version":"0.001024"},{"date":"2023-08-02T23:49:48","version":"0.001025"},{"version":"0.001026","date":"2023-08-03T22:50:38"},{"date":"2023-08-11T22:44:06","version":"0.002001"},{"version":"0.002002","date":"2023-08-27T14:18:29"},{"version":"0.002003","date":"2023-10-04T17:28:16"},{"version":"0.002004","date":"2024-07-29T19:33:48"},{"version":"0.002005","date":"2024-10-02T00:46:07"},{"version":"0.002006","date":"2024-11-11T21:41:15"},{"version":"0.002007","date":"2024-11-26T18:52:22"},{"version":"0.002008","date":"2024-11-29T16:12:40"},{"version":"0.002009","date":"2024-12-05T17:37:52"},{"version":"0.002010","date":"2024-12-07T15:43:12"},{"version":"0.002011","date":"2024-12-07T19:59:50"},{"version":"0.002012","date":"2024-12-12T22:53:06"},{"date":"2025-01-02T02:25:00","version":"0.002013"},{"version":"0.002014","date":"2025-01-02T15:12:36"},{"date":"2025-01-02T16:14:29","version":"0.002015"},{"date":"2025-03-02T16:09:42","version":"0.002016"}],"advisories":[{"cves":[],"severity":null,"distribution":"Valiant","reported":null,"references":["https://github.com/briandfoy/cpan-security-advisory/issues/175","https://github.com/jjn1056/Valiant/commit/242348776cc01e736397767f11f86cc4055817c4"],"id":"CPANSA-Valiant-2024-001","fixed_versions":[">=0.002011"],"description":"closed potential security issue with deeply nested paramters in the DBIC glue code. This was a hack that could let someone create a child record if you were allowing find_by_unique rather than find by primary key.\n","affected_versions":["<0.002011"]}]},"Digest-MD5":{"versions":[{"version":"1.99_53","date":"1998-10-23T12:30:56"},{"date":"1998-10-24T13:58:24","version":"1.99_54"},{"date":"1998-10-24T22:44:03","version":"1.99_55"},{"date":"1998-10-24T23:07:15","version":"1.99_56"},{"date":"1998-10-27T21:09:37","version":"1.99_57"},{"version":"1.99_58","date":"1998-10-28T14:11:30"},{"date":"1998-10-28T20:57:10","version":"1.99_59"},{"version":"1.99_60","date":"1998-10-30T17:23:27"},{"version":"2.00","date":"1998-11-04T22:27:42"},{"version":"2.01","date":"1998-12-30T04:01:06"},{"version":"2.02","date":"1999-01-31T16:44:38"},{"version":"2.02","date":"1999-02-01T20:25:06"},{"date":"1999-02-27T21:39:24","version":"2.03"},{"version":"2.04","date":"1999-03-05T21:17:35"},{"date":"1999-03-15T10:58:32","version":"2.05"},{"version":"2.05","date":"1999-03-19T05:05:36"},{"version":"2.06","date":"1999-03-26T13:51:38"},{"version":"2.07","date":"1999-04-26T09:45:43"},{"date":"1999-06-02T13:44:41","version":"2.07"},{"version":"2.08","date":"1999-07-28T10:55:54"},{"version":"2.09","date":"1999-08-05T23:29:15"},{"date":"1999-09-02T12:45:17","version":"2.09"},{"date":"2000-08-18T08:49:59","version":"2.10"},{"version":"2.11","date":"2000-08-19T17:39:04"},{"date":"2000-09-18T15:10:45","version":"2.12"},{"version":"2.12","date":"2001-01-19T06:08:47"},{"version":"2.13","date":"2001-03-14T05:56:41"},{"version":"2.13","date":"2001-03-17T04:35:32"},{"date":"2001-06-24T07:37:20","version":"2.13"},{"version":"2.14","date":"2001-07-18T13:40:13"},{"version":"2.15","date":"2001-08-27T17:53:29"},{"version":"2.15","date":"2001-08-29T06:32:30"},{"version":"2.16","date":"2001-09-07T05:52:46"},{"date":"2002-04-25T17:24:14","version":"2.17"},{"date":"2002-05-01T23:34:50","version":"2.18"},{"date":"2002-05-02T03:21:40","version":"2.19"},{"version":"2.20","date":"2002-05-06T05:20:38"},{"date":"2002-12-28T05:33:19","version":"2.21"},{"date":"2003-01-05T01:04:07","version":"2.22"},{"date":"2003-01-19T04:55:24","version":"2.23"},{"version":"2.24","date":"2003-03-09T15:26:49"},{"date":"2003-07-05T05:33:54","version":"2.25"},{"version":"2.26","date":"2003-07-22T06:15:03"},{"date":"2003-08-05T06:12:31","version":"2.27"},{"version":"2.28","date":"2003-10-06T13:16:20"},{"version":"2.29","date":"2003-10-06T17:37:30"},{"version":"2.30","date":"2003-10-09T09:40:47"},{"date":"2003-11-28T13:10:59","version":"2.31"},{"date":"2003-12-05T10:15:43","version":"2.32"},{"date":"2003-12-07T10:31:15","version":"2.33"},{"date":"2005-11-26T10:05:19","version":"2.34"},{"date":"2005-11-26T11:15:35","version":"2.35"},{"date":"2005-11-30T13:55:38","version":"2.36"},{"version":"2.37","date":"2008-11-12T09:36:42"},{"date":"2008-11-14T13:50:45","version":"2.38"},{"date":"2009-06-09T20:21:55","version":"2.39"},{"date":"2010-07-03T14:01:25","version":"2.40"},{"date":"2010-09-25T22:12:42","version":"2.50"},{"date":"2010-09-30T19:46:29","version":"2.51"},{"date":"2012-06-07T22:37:00","version":"2.52"},{"date":"2013-07-02T17:56:06","version":"2.53"},{"date":"2015-01-12T21:19:42","version":"2.54"},{"version":"2.55","date":"2016-03-09T21:17:10"},{"version":"2.56","date":"2020-10-05T17:19:37"},{"date":"2020-10-05T17:42:48","version":"2.57"},{"date":"2020-10-05T21:53:32","version":"2.58"},{"version":"2.59","date":"2023-12-30T21:01:56"},{"perl_release":"5.009005","version":"2.36_01","date":"2007-07-07T00:00:00","dual_lived":1},{"date":"2019-10-20T00:00:00","dual_lived":1,"perl_release":"5.031005","version":"2.55_01"},{"version":"2.58_01","perl_release":"5.038","date":"2023-07-02T00:00:00","dual_lived":1}],"advisories":[{"severity":null,"cves":["CVE-2002-0703"],"references":["http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-035.php","http://www.iss.net/security_center/static/9051.php","http://www.securityfocus.com/bid/4716","http://rhn.redhat.com/errata/RHSA-2002-081.html"],"reported":"2002-07-26","distribution":"Digest-MD5","id":"CPANSA-Digest-MD5-2002-0703","description":"An interaction between the Perl MD5 module (perl-Digest-MD5) and Perl could produce incorrect MD5 checksums for UTF-8 data, which could prevent a system from properly verifying the integrity of the data.\n","fixed_versions":[],"affected_versions":["<2.25"]}],"main_module":"Digest::MD5"},"Catalyst-Controller-Combine":{"main_module":"Catalyst::Controller::Combine","versions":[{"date":"2009-07-11T17:58:25","version":"0.06"},{"date":"2009-07-13T06:49:00","version":"0.07"},{"version":"0.08","date":"2009-10-24T12:48:21"},{"version":"0.09","date":"2010-03-13T19:31:13"},{"version":"0.10","date":"2010-03-27T18:44:05"},{"version":"0.12","date":"2010-06-21T20:47:02"},{"date":"2011-07-28T19:53:12","version":"0.13"},{"version":"0.14","date":"2012-02-20T20:59:00"},{"date":"2012-05-04T10:43:12","version":"0.15"}],"advisories":[{"cves":[],"references":["https://metacpan.org/changes/distribution/Catalyst-Controller-Combine"],"reported":"2010-05-21","distribution":"Catalyst-Controller-Combine","id":"CPANSA-Catalyst-Controller-Combine-2010-01","fixed_versions":[">=0.12"],"description":"Allows to use url-encoded path-parts to crawl along the file system and read files outside the intended directory.\n","affected_versions":["<0.12"]}]},"XML-Simple":{"main_module":"XML::Simple","advisories":[{"id":"CPANSA-XML-Simple-2018-01","distribution":"XML-Simple","references":["https://metacpan.org/dist/XML-Simple/changes","https://github.com/grantm/xml-simple/pull/8"],"reported":"2018-02-18","cves":[],"severity":null,"affected_versions":["<2.25"],"description":"The No. 4 item on the OWASP top 10 is external XML entities. When using XML::Parser, XML::Simple is currently vulnerable by default.\n","fixed_versions":[">=2.25"]}],"versions":[{"date":"1999-11-29T02:30:19","version":"1.00"},{"date":"1999-12-01T11:02:42","version":"1.01"},{"date":"2000-03-05T20:58:37","version":"1.03"},{"version":"1.04","date":"2000-04-03T04:12:07"},{"version":"1.05","date":"2000-08-30T23:40:57"},{"date":"2001-11-19T22:04:26","version":"1.06"},{"date":"2002-02-05T22:46:39","version":"1.07"},{"version":"1.08","date":"2002-02-09T22:43:03"},{"date":"2002-02-14T22:13:24","version":"1.08_01"},{"date":"2002-12-08T08:23:26","version":"2.00"},{"version":"2.01","date":"2002-12-11T09:56:59"},{"date":"2002-12-15T08:21:09","version":"2.02"},{"version":"2.03","date":"2003-01-20T07:54:05"},{"date":"2003-04-10T10:25:56","version":"2.04"},{"version":"2.05","date":"2003-04-16T10:22:00"},{"version":"2.06","date":"2003-05-18T08:50:04"},{"version":"2.07","date":"2003-05-20T08:53:19"},{"date":"2003-06-13T10:31:53","version":"2.08"},{"date":"2003-09-09T09:43:24","version":"2.09"},{"version":"2.10","date":"2004-02-29T10:18:06"},{"version":"2.11","date":"2004-03-02T08:29:33"},{"version":"2.12","date":"2004-04-05T09:29:23"},{"version":"2.13","date":"2004-11-17T09:06:18"},{"version":"2.14","date":"2005-01-29T05:16:40"},{"date":"2006-10-03T01:33:47","version":"2.15"},{"version":"2.16","date":"2006-10-30T08:33:07"},{"version":"2.17","date":"2007-08-02T10:47:38"},{"date":"2007-08-15T10:39:25","version":"2.18"},{"date":"2012-06-17T11:28:59","version":"2.19_01"},{"date":"2012-06-19T08:34:33","version":"2.19_02"},{"date":"2012-06-20T10:01:37","version":"2.20"},{"version":"2.21","date":"2015-12-04T03:35:12"},{"date":"2015-12-04T22:08:47","version":"2.22"},{"version":"2.23","date":"2017-04-17T03:49:52"},{"date":"2017-04-17T04:12:48","version":"2.24"},{"version":"2.25","date":"2018-03-18T03:19:24"}]},"perl":{"advisories":[{"distribution":"perl","reported":"2012-12-21","references":["http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069752.html","http://www.securityfocus.com/bid/49858","http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod","http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77","http://secunia.com/advisories/46172","https://blogs.oracle.com/sunsecurity/entry/cve_2011_2728_denial_of1","https://bugzilla.redhat.com/show_bug.cgi?id=742987"],"cves":["CVE-2011-2728"],"severity":null,"id":"CPANSA-File-Glob-2011-2728","fixed_versions":[],"description":"The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference.\n","affected_versions":["<1.13"]},{"affected_versions":["<5.24.1"],"description":"(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.\n","fixed_versions":[">=5.24.1"],"id":"CPANSA-ExtUtils-ParseXS-2016-1238","reported":"2016-08-02","references":["https://perldoc.perl.org/5.24.1/perldelta","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","http://www.debian.org/security/2016/dsa-3628","http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securityfocus.com/bid/92136","http://www.securitytracker.com/id/1036440","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c%40%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://rt.perl.org/Public/Bug/Display.html?id=127834","https://security.gentoo.org/glsa/201701-75","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","http://www.debian.org/security/2016/dsa-3628","http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securityfocus.com/bid/92136","http://www.securitytracker.com/id/1036440","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c%40%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://rt.perl.org/Public/Bug/Display.html?id=127834","https://security.gentoo.org/glsa/201701-75","https://security.gentoo.org/glsa/201812-07"],"distribution":"perl","severity":"high","cves":["CVE-2016-1238"]},{"distribution":"perl","reported":"2016-08-02","references":["https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/","https://github.com/Perl/perl5/commit/08e3451d7b3b714ad63a27f1b9c2a23ee75d15ee","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/","http://www.openwall.com/lists/oss-security/2016/07/07/1","http://www.openwall.com/lists/oss-security/2016/07/08/5","https://rt.cpan.org/Public/Bug/Display.html?id=115808","http://www.debian.org/security/2016/dsa-3628","http://www.securitytracker.com/id/1036260","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/","http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html","http://www.securityfocus.com/bid/91685","https://security.gentoo.org/glsa/201701-75","https://usn.ubuntu.com/3625-2/","https://usn.ubuntu.com/3625-1/","https://github.com/Perl/perl5/blob/blead/pod/perl5260delta.pod"],"cves":["CVE-2016-6185"],"severity":"high","id":"CPANSA-perl-2016-6185","fixed_versions":[">=5.24.0"],"description":"The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.\n","affected_versions":[">=5.22.0,<5.24.0"]},{"affected_versions":[">=5.005,<5.24.0"],"description":"The VDir::MapPathA and VDir::MapPathW functions in Perl 5.22 allow remote attackers to cause a denial of service (out-of-bounds read) and possibly execute arbitrary code via a crafted (1) drive letter or (2) pInName argument.\n","fixed_versions":[">=5.24.0"],"id":"CPANSA-perl-2015-8608","distribution":"perl","reported":"2017-02-07","references":["https://rt.perl.org/Public/Bug/Display.html?id=126755","https://github.com/Perl/perl5/issues/15067","https://packetstormsecurity.com/files/136649/Perl-5.22-VDir-MapPathA-W-Out-Of-Bounds-Reads-Buffer-Over-Reads.html","http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","https://www.oracle.com/security-alerts/cpujul2020.html"],"cves":["CVE-2015-8608"],"severity":"critical"},{"affected_versions":["<5.14.2"],"description":"The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference.\n","fixed_versions":[],"id":"CPANSA-perl-2011-2728","cves":["CVE-2011-2728"],"severity":null,"distribution":"perl","reported":"2012-12-21","references":["http://lists.fedoraproject.org/pipermail/package-announce/2011-November/069752.html","http://www.securityfocus.com/bid/49858","http://cpansearch.perl.org/src/FLORA/perl-5.14.2/pod/perldelta.pod","http://perl5.git.perl.org/perl.git/commit/1af4051e077438976a4c12a0622feaf6715bec77","http://secunia.com/advisories/46172","https://blogs.oracle.com/sunsecurity/entry/cve_2011_2728_denial_of1","https://bugzilla.redhat.com/show_bug.cgi?id=742987"]},{"id":"CPANSA-perl-2020-12723","severity":"high","cves":["CVE-2020-12723"],"references":["https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3","https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod","https://github.com/Perl/perl5/issues/16947","https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a","https://github.com/Perl/perl5/issues/17743","https://security.netapp.com/advisory/ntap-20200611-0001/","https://security.gentoo.org/glsa/202006-03","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuoct2021.html","https://www.oracle.com/security-alerts/cpujan2022.html","https://www.oracle.com/security-alerts/cpuapr2022.html","https://perldoc.perl.org/perl5283delta","https://perldoc.perl.org/perl5303delta","https://perldoc.perl.org/perl5320delta"],"reported":"2020-06-05","distribution":"perl","affected_versions":["<5.28.3",">=5.30.0,<5.30.3"],"description":"regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.\n","fixed_versions":[">=5.30.3"]},{"affected_versions":["<5.28.3",">=5.30.0,<5.30.3"],"description":"Perl before 5.30.3 has an integer overflow related to mishandling of a \"PL_regkind[OP(n)] == NOTHING\" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.\n","fixed_versions":[">=5.30.3"],"id":"CPANSA-perl-2020-10878","reported":"2020-06-05","references":["https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3","https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c","https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8","https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod","https://security.netapp.com/advisory/ntap-20200611-0001/","https://security.gentoo.org/glsa/202006-03","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuoct2021.html","https://www.oracle.com/security-alerts/cpujan2022.html","https://www.oracle.com/security-alerts/cpuapr2022.html","https://perldoc.perl.org/perl5283delta","https://perldoc.perl.org/perl5303delta","https://perldoc.perl.org/perl5320delta"],"distribution":"perl","severity":"high","cves":["CVE-2020-10878"]},{"fixed_versions":[">=5.30.3"],"description":"Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.\n","affected_versions":["<5.28.3",">=5.30.0,<5.30.3"],"distribution":"perl","reported":"2020-06-05","references":["https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3","https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed","https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod","https://security.netapp.com/advisory/ntap-20200611-0001/","https://security.gentoo.org/glsa/202006-03","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/","http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html","https://www.oracle.com/security-alerts/cpuoct2020.html","https://www.oracle.com/security-alerts/cpujan2021.html","https://www.oracle.com/security-alerts/cpuApr2021.html","https://www.oracle.com//security-alerts/cpujul2021.html","https://www.oracle.com/security-alerts/cpuoct2021.html","https://www.oracle.com/security-alerts/cpujan2022.html","https://www.oracle.com/security-alerts/cpuapr2022.html","https://perldoc.perl.org/perl5283delta","https://perldoc.perl.org/perl5303delta","https://perldoc.perl.org/perl5320delta"],"cves":["CVE-2020-10543"],"severity":"high","id":"CPANSA-perl-2020-10543"},{"description":"An issue was discovered in Perl 5.22 through 5.26. Matching a crafted locale dependent regular expression can cause a heap-based buffer over-read and potentially information disclosure.\n","fixed_versions":[">=5.28.0"],"affected_versions":[">=5.22.0,<5.24.4",">=5.26.0,<5.28.2"],"reported":"2018-04-17","references":["https://www.debian.org/security/2018/dsa-4172","https://rt.perl.org/Public/Bug/Display.html?id=132063","http://www.securitytracker.com/id/1040681","https://access.redhat.com/errata/RHSA-2018:1192","https://usn.ubuntu.com/3625-1/","https://security.gentoo.org/glsa/201909-01","https://www.oracle.com/security-alerts/cpujul2020.html","https://perldoc.perl.org/perl5244delta","https://perldoc.perl.org/perl5262delta","https://github.com/Perl/perl5/issues/16143"],"distribution":"perl","severity":"high","cves":["CVE-2018-6798"],"id":"CPANSA-perl-2018-6798"},{"id":"CPANSA-perl-2018-6797","severity":"critical","cves":["CVE-2018-6797"],"references":["https://www.debian.org/security/2018/dsa-4172","https://rt.perl.org/Public/Bug/Display.html?id=132227","http://www.securitytracker.com/id/1040681","https://access.redhat.com/errata/RHSA-2018:1192","https://usn.ubuntu.com/3625-1/","http://www.securitytracker.com/id/1042004","https://security.gentoo.org/glsa/201909-01","https://www.oracle.com/security-alerts/cpujul2020.html","https://perldoc.perl.org/perl5244delta","https://perldoc.perl.org/perl5262delta"],"reported":"2018-04-17","distribution":"perl","affected_versions":[">=5.18.0,<5.24.4",">=5.26.0,<5.26.2"],"fixed_versions":[">=5.28.0"],"description":"An issue was discovered in Perl 5.18 through 5.26. A crafted regular expression can cause a heap-based buffer overflow, with control over the bytes written.\n"},{"affected_versions":["<5.24.4",">=5.26.0,<5.26.2"],"fixed_versions":[">=5.26.2"],"description":"Heap-based buffer overflow in the pack function in Perl before 5.26.2 allows context-dependent attackers to execute arbitrary code via a large item count.\n","id":"CPANSA-perl-2018-6913","reported":"2018-04-17","references":["https://www.debian.org/security/2018/dsa-4172","https://rt.perl.org/Public/Bug/Display.html?id=131844","https://lists.debian.org/debian-lts-announce/2018/04/msg00009.html","http://www.securitytracker.com/id/1040681","https://usn.ubuntu.com/3625-2/","https://usn.ubuntu.com/3625-1/","http://www.securityfocus.com/bid/103953","https://security.gentoo.org/glsa/201909-01","https://www.oracle.com/security-alerts/cpujul2020.html","https://perldoc.perl.org/perl5244delta","https://perldoc.perl.org/perl5262delta","https://github.com/Perl/perl5/issues/16098"],"distribution":"perl","severity":"critical","cves":["CVE-2018-6913"]},{"description":"Perl before 5.26.3 has a buffer overflow via a crafted regular expression that triggers invalid write operations.\n","fixed_versions":[">=5.26.3"],"affected_versions":["<5.26.3"],"cves":["CVE-2018-18314"],"severity":"critical","distribution":"perl","references":["https://www.debian.org/security/2018/dsa-4347","https://rt.perl.org/Ticket/Display.html?id=131649","https://metacpan.org/changes/release/SHAY/perl-5.26.3","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/","https://github.com/Perl/perl5/commit/19a498a461d7c81ae3507c450953d1148efecf4f","https://bugzilla.redhat.com/show_bug.cgi?id=1646751","http://www.securitytracker.com/id/1042181","https://usn.ubuntu.com/3834-1/","http://www.securityfocus.com/bid/106145","https://access.redhat.com/errata/RHSA-2019:0010","https://access.redhat.com/errata/RHSA-2019:0001","https://security.netapp.com/advisory/ntap-20190221-0003/","https://security.gentoo.org/glsa/201909-01","https://www.oracle.com/security-alerts/cpujul2020.html"],"reported":"2018-12-07","id":"CPANSA-perl-2018-18314"},{"references":["https://www.debian.org/security/2018/dsa-4347","https://usn.ubuntu.com/3834-2/","https://rt.perl.org/Ticket/Display.html?id=133192","https://metacpan.org/changes/release/SHAY/perl-5.26.3","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/","https://github.com/Perl/perl5/commit/43b2f4ef399e2fd7240b4eeb0658686ad95f8e62","https://bugzilla.redhat.com/show_bug.cgi?id=1646738","http://www.securitytracker.com/id/1042181","https://usn.ubuntu.com/3834-1/","https://access.redhat.com/errata/RHSA-2019:0010","https://access.redhat.com/errata/RHSA-2019:0001","https://security.netapp.com/advisory/ntap-20190221-0003/","https://support.apple.com/kb/HT209600","https://seclists.org/bugtraq/2019/Mar/42","http://seclists.org/fulldisclosure/2019/Mar/49","https://security.gentoo.org/glsa/201909-01","https://www.oracle.com/security-alerts/cpujul2020.html"],"reported":"2018-12-07","distribution":"perl","severity":"critical","cves":["CVE-2018-18313"],"id":"CPANSA-perl-2018-18313","description":"Perl before 5.26.3 has a buffer over-read via a crafted regular expression that triggers disclosure of sensitive information from process memory.\n","fixed_versions":[">=5.26.3"],"affected_versions":["<5.26.3"]},{"id":"CPANSA-perl-2018-18312","cves":["CVE-2018-18312"],"severity":"critical","distribution":"perl","references":["https://www.debian.org/security/2018/dsa-4347","https://rt.perl.org/Public/Bug/Display.html?id=133423","https://metacpan.org/changes/release/SHAY/perl-5.28.1","https://metacpan.org/changes/release/SHAY/perl-5.26.3","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/","https://bugzilla.redhat.com/show_bug.cgi?id=1646734","http://www.securitytracker.com/id/1042181","https://usn.ubuntu.com/3834-1/","http://www.securityfocus.com/bid/106179","https://access.redhat.com/errata/RHSA-2019:0010","https://access.redhat.com/errata/RHSA-2019:0001","https://security.netapp.com/advisory/ntap-20190221-0003/","https://security.gentoo.org/glsa/201909-01","https://www.oracle.com/security-alerts/cpujul2020.html","https://perldoc.perl.org/perl5281delta","https://perldoc.perl.org/perl5263delta"],"reported":"2018-12-05","affected_versions":["==5.28.0","<5.26.3"],"description":"Perl before 5.26.3 and 5.28.0 before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.\n","fixed_versions":[">=5.28.1"]},{"fixed_versions":[">=5.28.1"],"description":"Perl before 5.26.3 and 5.28.x before 5.28.1 has a buffer overflow via a crafted regular expression that triggers invalid write operations.\n","affected_versions":["<5.26.3","==5.28.0"],"reported":"2018-12-07","references":["https://www.debian.org/security/2018/dsa-4347","https://usn.ubuntu.com/3834-2/","https://rt.perl.org/Ticket/Display.html?id=133204","https://metacpan.org/changes/release/SHAY/perl-5.28.1","https://metacpan.org/changes/release/SHAY/perl-5.26.3","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWQGEB543QN7SSBRKYJM6PSOC3RLYGSM/","https://lists.debian.org/debian-lts-announce/2018/11/msg00039.html","https://github.com/Perl/perl5/commit/34716e2a6ee2af96078d62b065b7785c001194be","https://bugzilla.redhat.com/show_bug.cgi?id=1646730","http://www.securitytracker.com/id/1042181","https://usn.ubuntu.com/3834-1/","http://www.securityfocus.com/bid/106145","https://access.redhat.com/errata/RHSA-2019:0010","https://access.redhat.com/errata/RHSA-2019:0001","https://access.redhat.com/errata/RHSA-2019:0109","https://security.netapp.com/advisory/ntap-20190221-0003/","https://support.apple.com/kb/HT209600","https://seclists.org/bugtraq/2019/Mar/42","http://seclists.org/fulldisclosure/2019/Mar/49","https://kc.mcafee.com/corporate/index?page=content&id=SB10278","https://access.redhat.com/errata/RHBA-2019:0327","https://access.redhat.com/errata/RHSA-2019:1790","https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html","https://access.redhat.com/errata/RHSA-2019:1942","https://access.redhat.com/errata/RHSA-2019:2400","https://security.gentoo.org/glsa/201909-01","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.oracle.com/security-alerts/cpujul2020.html","https://perldoc.perl.org/perl5281delta","https://perldoc.perl.org/perl5263delta"],"distribution":"perl","severity":"critical","cves":["CVE-2018-18311"],"id":"CPANSA-perl-2018-18311"},{"fixed_versions":[">=5.26.1"],"description":"Buffer overflow in the S_grok_bslash_N function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to disclose sensitive information or cause a denial of service (application crash) via a crafted regular expression with an invalid '\\\\N{U+...}' escape.\n","affected_versions":["==5.26.0",">=5.20.0,<5.24.3"],"distribution":"perl","reported":"2017-09-19","references":["https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1","https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1","https://perl5.git.perl.org/perl.git/commitdiff/2be4edede4ae226e2eebd4eff28cedd2041f300f#patch1","https://bugzilla.redhat.com/show_bug.cgi?id=1492093","http://www.securityfocus.com/bid/100852","http://mirror.cucumberlinux.com/cucumber/cucumber-1.0/source/lang-base/perl/patches/CVE-2017-12883.patch","https://rt.perl.org/Public/Bug/Display.html?id=131598","http://www.debian.org/security/2017/dsa-3982","https://security.netapp.com/advisory/ntap-20180426-0001/","https://www.oracle.com/security-alerts/cpujul2020.html","https://github.com/Perl/perl5/issues/16025","https://perldoc.perl.org/perl5243delta","https://perldoc.perl.org/perl5280delta","https://perldoc.perl.org/perl5261delta"],"cves":["CVE-2017-12883"],"severity":"critical","id":"CPANSA-perl-2017-12883"},{"fixed_versions":[">=5.26.1"],"description":"Heap-based buffer overflow in the S_regatom function in regcomp.c in Perl 5 before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 allows remote attackers to cause a denial of service (out-of-bounds write) via a regular expression with a '\\\\N{}' escape and the case-insensitive modifier.\n","affected_versions":[">=5.18.0,<5.24.3","==5.26.0"],"cves":["CVE-2017-12837"],"severity":"high","distribution":"perl","reported":"2017-09-19","references":["https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1","https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1","https://perl5.git.perl.org/perl.git/commitdiff/96c83ed78aeea1a0496dd2b2d935869a822dc8a5","https://bugzilla.redhat.com/show_bug.cgi?id=1492091","http://www.securityfocus.com/bid/100860","https://rt.perl.org/Public/Bug/Display.html?id=131582","http://www.debian.org/security/2017/dsa-3982","https://security.netapp.com/advisory/ntap-20180426-0001/","https://www.oracle.com/security-alerts/cpujul2020.html","https://github.com/Perl/perl5/issues/16021","https://perldoc.perl.org/perl5243delta","https://perldoc.perl.org/perl5261delta","https://perldoc.perl.org/perl5280delta"],"id":"CPANSA-perl-2017-12837"},{"affected_versions":["<5.24.0"],"fixed_versions":[">=5.24.0"],"description":"The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause a denial of service (infinite loop) via crafted utf-8 data, as demonstrated by \"a\\x80.\"\n","id":"CPANSA-perl-2015-8853","references":["http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html","http://www.openwall.com/lists/oss-security/2016/04/20/7","https://bugzilla.redhat.com/show_bug.cgi?id=1329106","https://rt.perl.org/Public/Bug/Display.html?id=123562","http://www.openwall.com/lists/oss-security/2016/04/20/5","http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html","http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","http://www.securityfocus.com/bid/86707","https://security.gentoo.org/glsa/201701-75","https://usn.ubuntu.com/3625-2/","https://usn.ubuntu.com/3625-1/"],"reported":"2016-05-25","distribution":"perl","severity":"high","cves":["CVE-2015-8853"]},{"id":"CPANSA-perl-2013-1667","distribution":"perl","references":["http://www.securityfocus.com/bid/58311","http://perl5.git.perl.org/perl.git/commitdiff/d59e31f","http://perl5.git.perl.org/perl.git/commitdiff/9d83adc","http://www.nntp.perl.org/group/perl.perl5.porters/2013/03/msg199755.html","http://www.debian.org/security/2013/dsa-2641","http://secunia.com/advisories/52499","http://secunia.com/advisories/52472","https://bugzilla.redhat.com/show_bug.cgi?id=912276","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702296","http://perl5.git.perl.org/perl.git/commitdiff/6e79fe5","http://osvdb.org/90892","http://www.ubuntu.com/usn/USN-1770-1","http://rhn.redhat.com/errata/RHSA-2013-0685.html","http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html","http://marc.info/?l=bugtraq&m=137891988921058&w=2","http://www.mandriva.com/security/advisories?name=MDVSA-2013:113","https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0094","http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","https://exchange.xforce.ibmcloud.com/vulnerabilities/82598","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18771"],"reported":"2013-03-14","cves":["CVE-2013-1667"],"severity":null,"affected_versions":["<5.18.0"],"description":"The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key.\n","fixed_versions":[">=5.26.1"]},{"affected_versions":[">=5.10.0,<5.12.0"],"fixed_versions":[">=5.12.0"],"description":"Perl 5.10.x allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an ability to inject arguments into a (1) getpeername, (2) readdir, (3) closedir, (4) getsockname, (5) rewinddir, (6) tell, or (7) telldir function call.\n","id":"CPANSA-perl-2011-0761","reported":"2011-05-13","references":["http://www.securityfocus.com/bid/47766","http://securitytracker.com/id?1025507","http://www.toucan-system.com/advisories/tssa-2011-03.txt","http://securityreason.com/securityalert/8248","https://exchange.xforce.ibmcloud.com/vulnerabilities/67355","http://www.securityfocus.com/archive/1/517916/100/0/threaded"],"distribution":"perl","severity":null,"cves":["CVE-2011-0761"]},{"references":["http://lists.opensuse.org/opensuse-updates/2011-05/msg00025.html","https://bugzilla.redhat.com/show_bug.cgi?id=694166","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=628836","https://rt.perl.org/Public/Bug/Display.html?id=76538","https://listi.jpberlin.de/pipermail/postfixbuch-users/2011-February/055885.html","http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html","http://forums.ocsinventory-ng.org/viewtopic.php?id=7215"],"reported":"2014-02-10","distribution":"perl","severity":null,"cves":["CVE-2010-4777"],"id":"CPANSA-perl-2010-4777","description":"The Perl_reg_numbered_buff_fetch function in Perl 5.10.0, 5.12.0, 5.14.0, and other versions, when running with debugging enabled, allows context-dependent attackers to cause a denial of service (assertion failure and application exit) via crafted input that is not properly handled when using certain regular expressions, as demonstrated by causing SpamAssassin and OCSInventory to crash.\n","fixed_versions":[">5.14.0"],"affected_versions":["<=5.14.0"]},{"id":"CPANSA-perl-2010-1158","distribution":"perl","references":["http://bugs.gentoo.org/show_bug.cgi?id=313565","http://www.openwall.com/lists/oss-security/2010/04/14/3","http://perldoc.perl.org/perl5100delta.html","http://www.openwall.com/lists/oss-security/2010/04/08/9","https://bugzilla.redhat.com/show_bug.cgi?id=580605","http://secunia.com/advisories/55314"],"reported":"2010-04-20","cves":["CVE-2010-1158"],"severity":null,"affected_versions":["<5.10.0"],"fixed_versions":[">=5.10.0"],"description":"Integer overflow in the regular expression engine in Perl 5.8.x allows context-dependent attackers to cause a denial of service (stack consumption and application crash) by matching a crafted regular expression against a long string.\n"},{"id":"CPANSA-perl-2009-3626","distribution":"perl","reported":"2009-10-29","references":["http://securitytracker.com/id?1023077","http://www.vupen.com/english/advisories/2009/3023","http://perl5.git.perl.org/perl.git/commit/0abd0d78a73da1c4d13b1c700526b7e5d03b32d4","http://www.securityfocus.com/bid/36812","https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6225","http://rt.perl.org/rt3/Ticket/Attachment/617489/295383/","http://www.osvdb.org/59283","http://www.openwall.com/lists/oss-security/2009/10/23/8","http://secunia.com/advisories/37144","http://rt.perl.org/rt3/Public/Bug/Display.html?id=69973","https://exchange.xforce.ibmcloud.com/vulnerabilities/53939"],"cves":["CVE-2009-3626"],"severity":null,"affected_versions":["<=5.10.1"],"fixed_versions":[],"description":"Perl 5.10.1 allows context-dependent attackers to cause a denial of service (application crash) via a UTF-8 character with a large, invalid codepoint, which is not properly handled during a regular-expression match.\n"},{"description":"Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters. NOTE: this issue might only be present on certain operating systems.\n","fixed_versions":[],"affected_versions":["<=5.8.8"],"reported":"2008-04-24","references":["http://rt.perl.org/rt3/Public/Bug/Display.html?id=48156","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=454792","http://www.debian.org/security/2008/dsa-1556","https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00601.html","https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00607.html","http://www.gentoo.org/security/en/glsa/glsa-200805-17.xml","http://www.securityfocus.com/bid/28928","http://secunia.com/advisories/29948","http://secunia.com/advisories/30025","http://secunia.com/advisories/30326","http://www.securitytracker.com/id?1020253","http://www.redhat.com/support/errata/RHSA-2008-0522.html","http://secunia.com/advisories/30624","http://support.avaya.com/elmodocs2/security/ASA-2008-317.htm","http://support.avaya.com/elmodocs2/security/ASA-2008-361.htm","http://www.ipcop.org/index.php?name=News&file=article&sid=41","http://secunia.com/advisories/31467","http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html","http://secunia.com/advisories/31604","http://secunia.com/advisories/31208","http://secunia.com/advisories/31328","http://www.vmware.com/security/advisories/VMSA-2008-0013.html","http://www.redhat.com/support/errata/RHSA-2008-0532.html","http://secunia.com/advisories/31687","http://osvdb.org/44588","http://www.mandriva.com/security/advisories?name=MDVSA-2008:100","http://www.ubuntu.com/usn/usn-700-1","http://secunia.com/advisories/33314","http://wiki.rpath.com/Advisories:rPSA-2009-0011","http://www.ubuntu.com/usn/usn-700-2","http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html","http://secunia.com/advisories/33937","http://support.apple.com/kb/HT3438","http://www.vupen.com/english/advisories/2009/0422","http://www.vupen.com/english/advisories/2008/2361","http://www.vupen.com/english/advisories/2008/2424","http://www.vupen.com/english/advisories/2008/2265/references","https://exchange.xforce.ibmcloud.com/vulnerabilities/41996","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10579","http://www.securityfocus.com/archive/1/500210/100/0/threaded"],"distribution":"perl","severity":null,"cves":["CVE-2008-1927"],"id":"CPANSA-perl-2008-1927"},{"distribution":"perl","reported":"2005-12-01","references":["http://www.dyadsecurity.com/perl-0002.html","http://www.kb.cert.org/vuls/id/948385","http://www.securityfocus.com/bid/15629","http://secunia.com/advisories/17802","http://secunia.com/advisories/17844","http://secunia.com/advisories/17762","http://www.openpkg.org/security/OpenPKG-SA-2005.025-perl.html","http://www.gentoo.org/security/en/glsa/glsa-200512-01.xml","http://www.trustix.org/errata/2005/0070","http://secunia.com/advisories/17941","http://secunia.com/advisories/17952","http://www.redhat.com/support/errata/RHSA-2005-880.html","http://www.novell.com/linux/security/advisories/2005_71_perl.html","http://secunia.com/advisories/18183","http://secunia.com/advisories/18187","http://www.redhat.com/support/errata/RHSA-2005-881.html","http://secunia.com/advisories/18075","http://www.openbsd.org/errata37.html#perl","http://secunia.com/advisories/18295","ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/001_perl.patch","http://www.osvdb.org/21345","http://www.osvdb.org/22255","ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U","http://secunia.com/advisories/18517","http://secunia.com/advisories/17993","https://www.redhat.com/archives/fedora-legacy-announce/2006-February/msg00008.html","http://sunsolve.sun.com/search/document.do?assetkey=1-26-102192-1","http://secunia.com/advisories/19041","http://www.debian.org/security/2006/dsa-943","http://secunia.com/advisories/18413","http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056","http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm","http://www.novell.com/linux/security/advisories/2005_29_sr.html","http://secunia.com/advisories/20894","http://docs.info.apple.com/article.html?artnum=304829","http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html","http://www.us-cert.gov/cas/techalerts/TA06-333A.html","http://secunia.com/advisories/23155","http://www.mandriva.com/security/advisories?name=MDKSA-2005:225","http://www.ipcop.org/index.php?name=News&file=article&sid=41","http://secunia.com/advisories/31208","http://www.vupen.com/english/advisories/2006/2613","http://www.vupen.com/english/advisories/2006/0771","http://www.vupen.com/english/advisories/2006/4750","ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.7/common/007_perl.patch","http://www.vupen.com/english/advisories/2005/2688","http://marc.info/?l=full-disclosure&m=113342788118630&w=2","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1074","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10598","https://usn.ubuntu.com/222-1/","http://www.securityfocus.com/archive/1/438726/100/0/threaded","http://www.securityfocus.com/archive/1/418333/100/0/threaded"],"cves":["CVE-2005-3962"],"severity":null,"id":"CPANSA-perl-2005-3962","fixed_versions":[],"description":"Integer overflow in the format string functionality (Perl_sv_vcatpvfn) in Perl 5.9.2 and 5.8.6 Perl allows attackers to overwrite arbitrary memory and possibly execute arbitrary code via format string specifiers with large values, which causes an integer wrap and leads to a buffer overflow, as demonstrated using format string vulnerabilities in Perl applications.\n","affected_versions":["<5.10.0"]},{"id":"CPANSA-perl-2005-0156","cves":["CVE-2005-0156"],"severity":null,"distribution":"perl","reported":"2005-02-07","references":["http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml","http://www.redhat.com/support/errata/RHSA-2005-103.html","http://www.redhat.com/support/errata/RHSA-2005-105.html","http://www.trustix.org/errata/2005/0003/","http://www.securityfocus.com/bid/12426","http://secunia.com/advisories/14120","http://fedoranews.org/updates/FEDORA--.shtml","http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056","http://www.mandriva.com/security/advisories?name=MDKSA-2005:031","http://secunia.com/advisories/55314","http://marc.info/?l=bugtraq&m=110737149402683&w=2","http://marc.info/?l=full-disclosure&m=110779721503111&w=2","https://exchange.xforce.ibmcloud.com/vulnerabilities/19208","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10803","http://www.digitalmunition.com/DMA[2005-0131b].txt"],"affected_versions":["=5.8.0"],"fixed_versions":[],"description":"Buffer overflow in the PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to execute arbitrary code by setting the PERLIO_DEBUG variable and executing a Perl script whose full pathname contains a long directory tree.\n"},{"reported":"2005-05-02","references":["http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml","http://www.redhat.com/support/errata/RHSA-2005-103.html","http://www.redhat.com/support/errata/RHSA-2005-105.html","http://www.trustix.org/errata/2005/0003/","http://www.securityfocus.com/bid/12426","http://secunia.com/advisories/14120","http://fedoranews.org/updates/FEDORA--.shtml","http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056","http://support.avaya.com/elmodocs2/security/ASA-2006-163.htm","http://secunia.com/advisories/21646","http://www.mandriva.com/security/advisories?name=MDKSA-2005:031","http://marc.info/?l=bugtraq&m=110737149402683&w=2","http://marc.info/?l=full-disclosure&m=110779723332339&w=2","https://exchange.xforce.ibmcloud.com/vulnerabilities/19207","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10404","http://www.digitalmunition.com/DMA[2005-0131a].txt"],"distribution":"perl","severity":null,"cves":["CVE-2005-0155"],"id":"CPANSA-perl-2005-0155","description":"The PerlIO implementation in Perl 5.8.0, when installed with setuid support (sperl), allows local users to create arbitrary files via the PERLIO_DEBUG variable.\n","fixed_versions":[],"affected_versions":["=5.8.0"]},{"fixed_versions":[],"description":"Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.\n","affected_versions":["<=5.8.8"],"cves":["CVE-2007-5116"],"severity":null,"distribution":"perl","references":["https://bugzilla.redhat.com/show_bug.cgi?id=323571","http://www.mandriva.com/security/advisories?name=MDKSA-2007:207","http://www.redhat.com/support/errata/RHSA-2007-0966.html","http://www.redhat.com/support/errata/RHSA-2007-1011.html","http://www.securityfocus.com/bid/26350","http://secunia.com/advisories/27531","http://secunia.com/advisories/27546","https://bugzilla.redhat.com/show_bug.cgi?id=378131","https://issues.rpath.com/browse/RPL-1813","http://www.debian.org/security/2007/dsa-1400","http://www.gentoo.org/security/en/glsa/glsa-200711-28.xml","http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.023.html","http://www.novell.com/linux/security/advisories/2007_24_sr.html","http://www.ubuntu.com/usn/usn-552-1","http://securitytracker.com/id?1018899","http://secunia.com/advisories/27479","http://secunia.com/advisories/27515","http://secunia.com/advisories/27548","http://secunia.com/advisories/27613","http://secunia.com/advisories/27570","http://secunia.com/advisories/27936","http://docs.info.apple.com/article.html?artnum=307179","ftp://aix.software.ibm.com/aix/efixes/security/README","http://www-1.ibm.com/support/docview.wss?uid=isg1IZ10220","http://www-1.ibm.com/support/docview.wss?uid=isg1IZ10244","http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html","http://www.us-cert.gov/cas/techalerts/TA07-352A.html","http://secunia.com/advisories/28167","http://lists.vmware.com/pipermail/security-announce/2008/000002.html","http://support.avaya.com/elmodocs2/security/ASA-2008-014.htm","http://secunia.com/advisories/28368","http://secunia.com/advisories/28387","http://secunia.com/advisories/27756","http://www.vmware.com/security/advisories/VMSA-2008-0001.html","http://sunsolve.sun.com/search/document.do?assetkey=1-26-31524-1","http://secunia.com/advisories/28993","http://secunia.com/advisories/29074","http://sunsolve.sun.com/search/document.do?assetkey=1-66-231524-1","http://secunia.com/advisories/31208","http://www.ipcop.org/index.php?name=News&file=article&sid=41","http://sunsolve.sun.com/search/document.do?assetkey=1-77-1018985.1-1","http://www.vupen.com/english/advisories/2007/4238","http://www.vupen.com/english/advisories/2008/0064","http://www.vupen.com/english/advisories/2008/0641","http://www.vupen.com/english/advisories/2007/3724","http://www.vupen.com/english/advisories/2007/4255","http://marc.info/?l=bugtraq&m=120352263023774&w=2","https://exchange.xforce.ibmcloud.com/vulnerabilities/38270","https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10669","http://www.securityfocus.com/archive/1/486859/100/0/threaded","http://www.securityfocus.com/archive/1/485936/100/0/threaded","http://www.securityfocus.com/archive/1/483584/100/0/threaded","http://www.securityfocus.com/archive/1/483563/100/0/threaded"],"reported":"2007-11-07","id":"CPANSA-perl-2007-5116"},{"severity":null,"cves":["CVE-2012-5195"],"references":["http://perl5.git.perl.org/perl.git/commit/2709980d5a193ce6f3a16f0d19879a6560dcde44","http://www.nntp.perl.org/group/perl.perl5.porters/2012/10/msg193886.html","http://www.securityfocus.com/bid/56287","http://www.openwall.com/lists/oss-security/2012/10/27/1","http://secunia.com/advisories/51457","http://www.openwall.com/lists/oss-security/2012/10/26/2","http://www.ubuntu.com/usn/USN-1643-1","http://www.debian.org/security/2012/dsa-2586","http://rhn.redhat.com/errata/RHSA-2013-0685.html","http://secunia.com/advisories/55314","http://www.mandriva.com/security/advisories?name=MDVSA-2013:113","https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0352","http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673"],"reported":"2012-12-18","distribution":"perl","id":"CPANSA-perl-2012-5195","description":"Heap-based buffer overflow in the Perl_repeatcpy function in util.c in Perl 5.12.x before 5.12.5, 5.14.x before 5.14.3, and 5.15.x before 15.15.5 allows context-dependent attackers to cause a denial of service (memory consumption and crash) or possibly execute arbitrary code via the 'x' string repeat operator.\n","fixed_versions":[">=5.16.0"],"affected_versions":["<5.16.0"]},{"affected_versions":["<5.22.1"],"fixed_versions":[">=5.22.1"],"description":"Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.\n","id":"CPANSA-perl-2016-2381","severity":"high","cves":["CVE-2016-2381"],"reported":"2016-04-08","references":["http://www.gossamer-threads.com/lists/perl/porters/326387","http://www.debian.org/security/2016/dsa-3501","http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html","http://www.securityfocus.com/bid/83802","http://www.ubuntu.com/usn/USN-2916-1","http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html","https://security.gentoo.org/glsa/201701-75","http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","https://www.oracle.com/security-alerts/cpuapr2020.html","https://www.oracle.com/security-alerts/cpujul2020.html"],"distribution":"perl"},{"affected_versions":["=5.8.1"],"fixed_versions":[],"description":"Perl 5.8.1 on Fedora Core does not properly initialize the random number generator when forking, which makes it easier for attackers to predict random numbers.\n","id":"CPANSA-perl-2003-0900","reported":"2003-12-31","references":["https://bugzilla.redhat.com/bugzilla/long_list.cgi?buglist=108711"],"distribution":"perl","severity":null,"cves":["CVE-2003-0900"]},{"id":"CPANSA-perl-2013-7422","distribution":"perl","reported":"2015-08-16","references":["http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html","https://support.apple.com/kb/HT205031","http://perl5.git.perl.org/perl.git/commit/0c2990d652e985784f095bba4bc356481a66aa06","http://www.securityfocus.com/bid/75704","http://www.ubuntu.com/usn/USN-2916-1","https://security.gentoo.org/glsa/201507-11"],"cves":["CVE-2013-7422"],"severity":null,"affected_versions":["<5.20.0"],"description":"Integer underflow in regcomp.c in Perl before 5.20, as used in Apple OS X before 10.10.5 and other products, allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a long digit string associated with an invalid backreference within a regular expression.\n","fixed_versions":[]},{"fixed_versions":[">=5.22.2"],"description":"The VDir::MapPathA and VDir::MapPathW functions in Perl 5.22 allow remote attackers to cause a denial of service (out-of-bounds read) and possibly execute arbitrary code via a crafted (1) drive letter or (2) pInName argument.\n","affected_versions":["<5.22.2"],"reported":"2017-02-07","references":["https://rt.perl.org/Public/Bug/Display.html?id=126755","https://packetstormsecurity.com/files/136649/Perl-5.22-VDir-MapPathA-W-Out-Of-Bounds-Reads-Buffer-Over-Reads.html","http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","https://www.oracle.com/security-alerts/cpujul2020.html"],"distribution":"perl","severity":"critical","cves":["CVE-2015-8608"],"id":"CPANSA-perl-2015-8608"},{"affected_versions":["<5.14.0"],"description":"The (1) lc, (2) lcfirst, (3) uc, and (4) ucfirst functions in Perl 5.10.x, 5.11.x, and 5.12.x through 5.12.3, and 5.13.x through 5.13.11, do not apply the taint attribute to the return value upon processing tainted input, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.\n","fixed_versions":[">=5.14.0"],"id":"CPANSA-perl-2011-1487","reported":"2011-04-11","references":["https://bugzilla.redhat.com/show_bug.cgi?id=692844","http://openwall.com/lists/oss-security/2011/04/01/3","http://openwall.com/lists/oss-security/2011/04/04/35","https://bugzilla.redhat.com/show_bug.cgi?id=692898","http://rt.perl.org/rt3/Public/Bug/Display.html?id=87336","http://secunia.com/advisories/43921","http://www.securityfocus.com/bid/47124","http://perl5.git.perl.org/perl.git/commit/539689e74a3bcb04d29e4cd9396de91a81045b99","http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057971.html","http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057891.html","http://secunia.com/advisories/44168","http://www.debian.org/security/2011/dsa-2265","http://www.mandriva.com/security/advisories?name=MDVSA-2011:091","http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html","https://exchange.xforce.ibmcloud.com/vulnerabilities/66528"],"distribution":"perl","severity":null,"cves":["CVE-2011-1487"]},{"fixed_versions":[],"description":"Perl 5.004_04 and earlier follows symbolic links when running with the -e option, which allows local users to overwrite arbitrary files via a symlink attack on the /tmp/perl-eaXXXXX file.\n","affected_versions":["<5.4.4"],"references":["http://www.redhat.com/support/errata/rh50-errata-general.html#perl","http://www.iss.net/security_center/static/7243.php","http://marc.info/?l=bugtraq&m=88932165406213&w=2"],"reported":"1999-12-31","distribution":"perl","severity":null,"cves":["CVE-1999-1386"],"id":"CPANSA-perl-1999-1386"},{"id":"CPANSA-perl-2017-12814","reported":"2017-09-28","references":["https://rt.perl.org/Public/Bug/Display.html?id=131665","https://perl5.git.perl.org/perl.git/log/refs/tags/v5.26.1-RC1","https://perl5.git.perl.org/perl.git/log/refs/tags/v5.24.3-RC1","http://www.securityfocus.com/bid/101051","https://security.netapp.com/advisory/ntap-20180426-0001/","https://www.oracle.com/security-alerts/cpujul2020.html","https://perldoc.perl.org/perl5243delta","https://github.com/Perl/perl5/issues/16051","https://perldoc.perl.org/perl5261delta","https://perldoc.perl.org/perl5280delta"],"distribution":"perl","severity":"critical","cves":["CVE-2017-12814"],"affected_versions":[">=5.24.0,<5.24.3","==5.26.0"],"description":"Stack-based buffer overflow in the CPerlHost::Add method in win32/perlhost.h in Perl before 5.24.3-RC1 and 5.26.x before 5.26.1-RC1 on Windows allows attackers to execute arbitrary code via a long environment variable.\n","fixed_versions":[]},{"id":"CPANSA-perl-2022-48522","severity":null,"cves":["CVE-2022-48522"],"references":["https://github.com/Perl/perl5/blob/79a7b254d85a10b65126ad99bf10e70480569d68/sv.c#L16336-L16345","https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48522","https://security.netapp.com/advisory/ntap-20230915-0008/","https://ubuntu.com/security/CVE-2022-48522"],"reported":"2023-08-22","distribution":"perl","affected_versions":["=5.34.0"],"fixed_versions":[">=5.34.1"],"description":"In Perl 5.34.0, function S_find_uninit_var in sv.c has a stack-based crash that can lead to remote code execution or local privilege escalation.\n"},{"fixed_versions":["5.34.3","5.36.3","5.38.1"],"description":"A crafted regular expression when compiled by perl 5.30.0 through 5.38.0 can cause a one attacker controlled byte buffer overflow in a heap allocated buffer\n","affected_versions":[">=5.30.0,<5.34.3",">=5.36.0,<5.36.3","==5.38.0"],"severity":null,"cves":["CVE-2023-47038"],"reported":"2023-10-30","references":["https://perldoc.perl.org/perl5342delta","https://perldoc.perl.org/perl5363delta","https://perldoc.perl.org/perl5381delta","https://perldoc.perl.org/perl5382delta","https://perldoc.perl.org/perl5400delta"],"distribution":"perl","id":"CPANSA-perl-2023-47038"},{"id":"CPANSA-perl-2023-47039","references":["https://github.com/ycdxsb/WindowsPrivilegeEscalation","https://perldoc.perl.org/perl5342delta","https://perldoc.perl.org/perl5363delta","https://perldoc.perl.org/perl5381delta","https://perldoc.perl.org/perl5382delta","https://perldoc.perl.org/perl5400delta"],"reported":"2023-10-30","distribution":"perl","severity":null,"cves":["CVE-2023-47039"],"affected_versions":["<5.34.2",">=5.36.0,<5.36.3","==5.38.0"],"description":"Perl for Windows relies on the system path environment variable to find the shell (cmd.exe). When running an executable which uses Windows Perl interpreter, Perl attempts to find and execute cmd.exe within the operating system. However, due to path search order issues, Perl initially looks for cmd.exe in the current working directory.\nAn attacker with limited privileges can exploit this behavior by placing cmd.exe in locations with weak permissions, such as C:\\ProgramData. By doing so, when an administrator attempts to use this executable from these compromised locations, arbitrary code can be executed.\n","fixed_versions":[]},{"cves":["CVE-2023-47100"],"severity":null,"distribution":"perl","references":["https://github.com/Perl/perl5/commit/ff1f9f59360afeebd6f75ca1502f5c3ebf077da3","https://github.com/Perl/perl5/commit/12c313ce49b36160a7ca2e9b07ad5bd92ee4a010","https://github.com/Perl/perl5/commit/7047915eef37fccd93e7cd985c29fe6be54650b6"],"reported":null,"id":"CPANSA-perl-2023-47100","fixed_versions":[">=5.38.2"],"description":"In Perl before 5.38.2, S_parse_uniprop_string in regcomp.c can write to unallocated space because a property name associated with a \\p{...} regular expression construct is mishandled. The earliest affected version is 5.30.0.\n","affected_versions":["<5.34.3",">=5.36.0,<5.36.3",">=5.38.0,<5.38.2"]},{"description":"Buffer overflow in suidperl (sperl), Perl 4.x and 5.x.\n","fixed_versions":[],"affected_versions":[">=4.0,<5.4.0"],"distribution":"perl","references":["https://exchange.xforce.ibmcloud.com/vulnerabilities/448","https://www.cpan.org/src/5.0/CA-97.17.sperl"],"reported":"1997-05-29","cves":["CVE-1999-0034"],"severity":null,"id":"CPANSA-sperl-1999-0034"},{"id":"CPANSA-sperl-1999-0462","references":["http://www.securityfocus.com/bid/339"],"reported":"1999-03-17","distribution":"perl","severity":null,"cves":["CVE-1999-0462"],"affected_versions":[">=4.0,<5.6.0"],"fixed_versions":[],"description":"suidperl in Linux Perl does not check the nosuid mount option on file systems, allowing local users to gain root access by placing a setuid script in a mountable file system, e.g. a CD-ROM or floppy disk.\n"},{"affected_versions":["<5.6.1"],"description":"suidperl (aka sperl) does not properly cleanse the escape sequence \"~!\" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the \"interactive\" environmental variable and calling suidperl with a filename that contains the escape sequence.\n","fixed_versions":[],"id":"CPANSA-sperl-2000-0703","cves":["CVE-2000-0703"],"severity":null,"distribution":"perl","references":["http://archives.neohapsis.com/archives/bugtraq/2000-08/0022.html","http://www.calderasystems.com/support/security/advisories/CSSA-2000-026.0.txt","http://www.securityfocus.com/bid/1547","http://www.novell.com/linux/security/advisories/suse_security_announce_59.html","http://www.redhat.com/support/errata/RHSA-2000-048.html","http://www.turbolinux.com/pipermail/tl-security-announce/2000-August/000017.html","http://archives.neohapsis.com/archives/bugtraq/2000-08/0153.html","http://archives.neohapsis.com/archives/bugtraq/2000-08/0086.html","http://archives.neohapsis.com/archives/bugtraq/2000-08/0113.html","https://www.cpan.org/src/5.0/sperl-2000-08-05/sperl-2000-08-05.txt"],"reported":"2000-10-20"}],"versions":[{"version":"5.002","date":"1996-02-03T07:48:14"},{"version":"5.003_02","date":"1996-08-08T23:13:50"},{"date":"1996-08-10T19:07:27","version":"5.003_02"},{"version":"5.003_03","date":"1996-08-28T16:43:47"},{"date":"1996-09-02T23:25:30","version":"5.003_04"},{"version":"5.003_05","date":"1996-09-12T20:10:42"},{"date":"1996-10-08T21:59:27","version":"5.003_06"},{"version":"5.003_07","date":"1996-10-11T03:39:44"},{"version":"5.003_08","date":"1996-11-19T07:27:23"},{"version":"5.003_09","date":"1996-11-26T09:46:17"},{"date":"1996-11-30T01:22:23","version":"5.003_10"},{"version":"5.003_11","date":"1996-12-06T09:08:18"},{"date":"1996-12-19T04:59:47","version":"5.003_12"},{"date":"1996-12-20T02:59:16","version":"5.003_13"},{"date":"1996-12-23T22:09:26","version":"5.003_15"},{"date":"1996-12-24T23:22:02","version":"5.003_16"},{"version":"5.003_17","date":"1996-12-27T20:20:05"},{"version":"5.003_18","date":"1996-12-31T21:35:40"},{"date":"1997-01-04T06:02:28","version":"5.003_19"},{"version":"5.003_20","date":"1997-01-08T02:15:49"},{"date":"1997-01-15T23:12:15","version":"5.003_21"},{"version":"5.003_22","date":"1997-01-16T20:04:16"},{"version":"5.003_23","date":"1997-01-25T10:04:29"},{"date":"1997-01-29T06:05:11","version":"5.003_24"},{"date":"1997-02-04T05:41:02","version":"5.003_25"},{"version":"5.003_26","date":"1997-02-10T19:37:44"},{"date":"1997-02-18T01:13:23","version":"5.003_27"},{"date":"1997-02-21T17:17:57","version":"5.003_28"},{"date":"1997-02-25T03:29:59","version":"5.003_90"},{"version":"5.003_91","date":"1997-03-01T08:08:54"},{"version":"5.003_92","date":"1997-03-06T18:24:17"},{"version":"5.003_93","date":"1997-03-10T12:06:55"},{"version":"5.003_94","date":"1997-03-22T05:43:00"},{"version":"5.003_95","date":"1997-03-25T19:52:24"},{"version":"5.003_96","date":"1997-04-01T00:50:13"},{"date":"1997-04-03T00:50:37","version":"5.003_97"},{"date":"1997-04-24T00:56:53","version":"5.003_97"},{"version":"5.003_97","date":"1997-04-25T03:44:34"},{"version":"5.003_97","date":"1997-04-28T20:33:01"},{"date":"1997-04-30T15:40:09","version":"5.003_98"},{"date":"1997-05-01T18:40:08","version":"5.003_99"},{"version":"5.003_99","date":"1997-05-09T05:37:58"},{"date":"1997-05-15T22:54:01","version":"5.004"},{"version":"5.004_01","date":"1997-06-13T15:08:00"},{"date":"1997-08-07T20:07:25","version":"5.004_02"},{"version":"5.004_03","date":"1997-09-05T17:46:00"},{"version":"5.004","date":"1997-09-05T18:13:00"},{"version":"5.004","date":"1997-09-19T18:22:20"},{"date":"1997-09-23T06:21:18","version":"5.004"},{"version":"5.004_51","date":"1997-10-02T16:49:00"},{"version":"5.004","date":"1997-10-09T23:16:38"},{"date":"1997-10-14T19:19:40","version":"5.004"},{"version":"5.004_52","date":"1997-10-15T16:17:00"},{"date":"1997-10-15T16:28:24","version":"5.004_04"},{"date":"1997-10-16T16:24:00","version":"5.004_53"},{"date":"1997-11-14T17:04:00","version":"5.004_54"},{"version":"5.004_55","date":"1997-11-25T17:17:00"},{"version":"5.004_56","date":"1997-12-18T16:20:00"},{"version":"5.004_57","date":"1998-02-03T15:06:00"},{"date":"1998-02-06T17:25:00","version":"5.004_58"},{"version":"5.004_59","date":"1998-02-13T16:42:00"},{"version":"5.004_60","date":"1998-02-20T17:42:00"},{"date":"1998-02-27T17:55:00","version":"5.004_61"},{"version":"5.004","date":"1998-03-04T19:46:42"},{"version":"5.004_62","date":"1998-03-06T15:27:00"},{"date":"1998-03-17T15:29:00","version":"5.004_63"},{"date":"1998-04-03T15:44:00","version":"5.004_64"},{"version":"5.004_04","date":"1998-05-01T23:37:24"},{"date":"1998-05-15T15:57:00","version":"5.004_65"},{"version":"5.004_04","date":"1998-05-15T23:46:53"},{"version":"5.004_04","date":"1998-05-19T23:51:10"},{"version":"5.004_66","date":"1998-05-29T15:23:00"},{"version":"5.004_67","date":"1998-06-15T11:47:27"},{"date":"1998-06-23T11:50:59","version":"5.004_68"},{"date":"1998-06-29T09:42:04","version":"5.004_69"},{"date":"1998-07-06T08:22:24","version":"5.004_70"},{"date":"1998-07-09T13:47:36","version":"5.004_71"},{"date":"1998-07-12T13:32:41","version":"5.004_72"},{"date":"1998-07-13T09:17:14","version":"5.004_73"},{"date":"1998-07-14T10:31:15","version":"5.004_74"},{"date":"1998-07-15T11:29:51","version":"5.005"},{"version":"5.004_05","date":"1998-07-21T05:16:24"},{"version":"5.005","date":"1998-07-21T11:36:27"},{"version":"5.005","date":"1998-07-23T00:55:19"},{"version":"5.005_50","date":"1998-07-26T06:20:30"},{"version":"5.005_01","date":"1998-07-27T00:16:22"},{"date":"1998-08-02T10:32:29","version":"5.005_02"},{"date":"1998-08-05T10:49:59","version":"5.005_02"},{"date":"1998-08-08T05:46:05","version":"5.005_02"},{"date":"1998-08-10T08:33:23","version":"5.005_51"},{"version":"5.005_52","date":"1998-09-25T11:59:38"},{"date":"1998-10-09T17:05:49","version":"5.004_05"},{"date":"1998-10-31T12:32:20","version":"5.005_53"},{"version":"5.004_05","date":"1998-11-22T23:06:16"},{"date":"1998-11-30T03:26:39","version":"5.005_03"},{"version":"5.005_54","date":"1998-11-30T04:29:11"},{"date":"1998-12-03T17:22:19","version":"5.004_05"},{"version":"5.005_03","date":"1999-01-03T20:44:49"},{"version":"5.005_03","date":"1999-01-17T18:28:14"},{"version":"5.005_03","date":"1999-01-26T04:39:36"},{"version":"5.005_03","date":"1999-01-29T05:03:44"},{"version":"5.005_55","date":"1999-02-16T07:11:42"},{"version":"5.005_56","date":"1999-03-01T05:38:00"},{"date":"1999-03-05T02:22:53","version":"5.005_03"},{"version":"5.005_03","date":"1999-03-29T00:50:43"},{"date":"1999-04-27T00:23:40","version":"5.004_05"},{"date":"1999-04-29T20:04:24","version":"5.004_05"},{"date":"1999-05-25T10:36:40","version":"5.005_57"},{"version":"5.005_58","date":"1999-07-27T11:00:38"},{"date":"1999-08-02T08:52:25","version":"5.005_59"},{"date":"1999-08-02T21:13:44","version":"5.005_60"},{"version":"5.005_61","date":"1999-08-22T20:40:16"},{"version":"5.005_62","date":"1999-10-15T10:36:17"},{"version":"5.005_63","date":"1999-12-09T11:38:49"},{"version":"v5.5.640","date":"2000-02-02T13:06:00"},{"version":"v5.5.650","date":"2000-02-08T08:37:47"},{"version":"v5.5.660","date":"2000-02-22T11:41:34"},{"date":"2000-03-01T07:34:59","version":"v5.5.670"},{"version":"v5.6.0","date":"2000-03-23T06:06:13"},{"date":"2000-09-02T18:07:32","version":"v5.7.0"},{"version":"v5.6.1","date":"2000-12-18T10:12:29"},{"date":"2001-01-31T16:18:51","version":"v5.6.1"},{"date":"2001-03-19T09:36:57","version":"v5.6.1"},{"date":"2001-04-09T04:47:17","version":"v5.6.1"},{"version":"v5.7.1","date":"2001-04-10T02:54:00"},{"date":"2001-07-13T14:50:55","version":"v5.7.2"},{"date":"2002-03-05T05:00:31","version":"v5.7.3"},{"date":"2002-06-01T19:09:00","version":"v5.8.0"},{"version":"v5.8.0","date":"2002-06-21T14:56:35"},{"version":"v5.8.0","date":"2002-07-14T00:26:18"},{"date":"2002-07-18T23:32:56","version":"v5.8.0"},{"version":"v5.8.1","date":"2003-07-10T06:52:39"},{"date":"2003-07-11T12:23:20","version":"v5.8.1"},{"date":"2003-07-30T20:28:59","version":"v5.8.1"},{"version":"v5.8.1","date":"2003-08-01T15:49:36"},{"version":"v5.8.1","date":"2003-09-22T09:14:19"},{"date":"2003-09-25T11:49:06","version":"v5.8.1"},{"date":"2003-10-27T02:59:51","version":"5.009"},{"date":"2003-10-27T23:40:16","version":"5.008001"},{"version":"5.008001","date":"2003-11-03T09:03:41"},{"date":"2003-11-05T23:34:05","version":"5.008001"},{"date":"2003-11-08T15:53:25","version":"v5.6.2"},{"version":"v5.6.2","date":"2003-11-15T12:53:43"},{"date":"2003-12-05T16:42:45","version":"5.005_03"},{"version":"5.008001","date":"2004-01-07T14:40:01"},{"date":"2004-01-14T19:03:21","version":"5.008003"},{"version":"5.005_03","date":"2004-01-20T21:48:04"},{"date":"2004-01-27T21:18:43","version":"5.005_03"},{"version":"5.005_04","date":"2004-02-04T22:55:06"},{"version":"5.005","date":"2004-02-18T14:20:15"},{"date":"2004-02-23T14:02:10","version":"5.005"},{"date":"2004-03-16T19:35:25","version":"5.009001"},{"date":"2004-04-05T21:27:48","version":"5.008003"},{"version":"5.008003","date":"2004-04-15T22:59:51"},{"date":"2004-04-21T23:03:10","version":"5.008003"},{"date":"2004-07-06T21:41:21","version":"5.008005"},{"date":"2004-07-08T21:55:05","version":"5.008005"},{"date":"2004-07-19T21:56:20","version":"5.008005"},{"date":"2004-11-11T19:56:33","version":"5.008006"},{"date":"2004-11-27T23:56:17","version":"5.008006"},{"version":"5.009002","date":"2005-04-01T09:53:24"},{"date":"2005-05-18T16:35:37","version":"5.008007"},{"date":"2005-05-30T22:19:23","version":"5.008007"},{"date":"2006-01-20T10:09:18","version":"5.008008"},{"date":"2006-01-28T11:11:38","version":"5.009003"},{"date":"2006-02-01T00:00:59","version":"5.008008"},{"version":"5.009004","date":"2006-08-15T13:48:30"},{"version":"5.009005","date":"2007-07-07T16:13:57"},{"date":"2007-11-17T15:31:20","version":"5.009005"},{"version":"5.010000","date":"2007-11-25T18:22:18"},{"date":"2007-12-18T17:41:41","version":"5.010000"},{"date":"2008-11-10T23:14:59","version":"5.008009"},{"date":"2008-12-06T22:50:35","version":"5.008009"},{"date":"2008-12-14T23:08:28","version":"5.008009"},{"version":"5.010001","date":"2009-08-06T16:11:03"},{"date":"2009-08-18T23:45:03","version":"5.010001"},{"date":"2009-08-23T14:21:38","version":"5.010001"},{"version":"5.011000","date":"2009-10-02T20:51:46"},{"date":"2009-10-20T17:51:38","version":"5.011001"},{"version":"5.011002","date":"2009-11-20T07:20:52"},{"version":"5.011003","date":"2009-12-21T04:49:14"},{"date":"2010-01-20T16:48:28","version":"5.011004"},{"date":"2010-02-21T00:45:26","version":"5.011005"},{"date":"2010-03-21T20:41:11","version":"5.012000"},{"date":"2010-03-29T18:29:49","version":"5.012000"},{"version":"5.012000","date":"2010-04-01T02:38:12"},{"date":"2010-04-03T02:40:48","version":"5.012000"},{"version":"5.012000","date":"2010-04-07T05:39:46"},{"date":"2010-04-10T03:46:04","version":"5.012000"},{"date":"2010-04-12T22:38:37","version":"5.012000"},{"date":"2010-04-20T20:06:02","version":"5.013000"},{"version":"5.012001","date":"2010-05-10T02:43:48"},{"date":"2010-05-13T22:31:41","version":"5.012001"},{"version":"5.012001","date":"2010-05-16T22:40:16"},{"date":"2010-05-20T14:03:45","version":"5.013001"},{"version":"5.013002","date":"2010-06-22T21:39:26"},{"version":"5.013003","date":"2010-07-20T10:23:23"},{"version":"5.013004","date":"2010-08-20T15:39:07"},{"version":"5.012002","date":"2010-08-31T16:48:01"},{"version":"5.012002","date":"2010-09-07T01:41:31"},{"date":"2010-09-19T21:22:47","version":"5.013005"},{"version":"5.013006","date":"2010-10-21T01:41:01"},{"version":"5.013007","date":"2010-11-21T01:14:06"},{"date":"2010-12-19T23:06:25","version":"5.013008"},{"date":"2011-01-10T02:12:53","version":"5.012003"},{"version":"5.012003","date":"2011-01-15T04:05:30"},{"version":"5.012003","date":"2011-01-18T02:13:17"},{"version":"5.013009","date":"2011-01-21T01:42:07"},{"version":"5.012003","date":"2011-01-22T03:35:35"},{"version":"5.013010","date":"2011-02-20T19:18:02"},{"date":"2011-03-20T19:49:16","version":"5.013011"},{"date":"2011-04-20T11:53:32","version":"5.014000"},{"version":"5.014000","date":"2011-05-04T16:42:27"},{"date":"2011-05-11T15:49:42","version":"5.014000"},{"date":"2011-05-14T20:34:05","version":"5.014000"},{"version":"5.012004","date":"2011-06-08T13:19:36"},{"date":"2011-06-09T23:48:04","version":"5.014001"},{"version":"5.012004","date":"2011-06-15T17:00:36"},{"date":"2011-06-17T02:42:01","version":"5.014001"},{"date":"2011-06-20T10:41:26","version":"5.012004"},{"date":"2011-06-20T23:19:05","version":"5.015000"},{"version":"5.015001","date":"2011-07-20T21:15:08"},{"version":"5.015002","date":"2011-08-21T00:05:23"},{"date":"2011-09-19T11:25:31","version":"5.014002"},{"date":"2011-09-21T03:05:05","version":"5.015003"},{"version":"5.014002","date":"2011-09-26T14:56:49"},{"date":"2011-10-20T21:17:45","version":"5.015004"},{"date":"2011-11-20T20:40:34","version":"5.015005"},{"version":"5.015006","date":"2011-12-20T17:55:58"},{"version":"5.015007","date":"2012-01-20T20:08:28"},{"date":"2012-02-20T22:38:13","version":"5.015008"},{"version":"5.015009","date":"2012-03-20T19:01:29"},{"version":"5.016000","date":"2012-05-11T03:41:02"},{"date":"2012-05-15T02:51:48","version":"5.016000"},{"date":"2012-05-16T03:22:59","version":"5.016000"},{"version":"5.016000","date":"2012-05-20T22:51:12"},{"version":"5.017000","date":"2012-05-26T16:24:02"},{"date":"2012-06-20T17:38:46","version":"5.017001"},{"version":"5.017002","date":"2012-07-20T14:27:59"},{"date":"2012-08-03T18:59:23","version":"5.016001"},{"version":"5.016001","date":"2012-08-08T22:30:11"},{"version":"5.017003","date":"2012-08-20T14:12:28"},{"date":"2012-09-20T00:40:48","version":"5.017004"},{"version":"5.014003","date":"2012-09-26T22:15:57"},{"date":"2012-10-10T19:46:29","version":"5.014003"},{"version":"5.014003","date":"2012-10-12T20:24:43"},{"date":"2012-10-20T16:31:11","version":"5.017005"},{"version":"5.016002","date":"2012-10-27T01:23:09"},{"version":"5.016002","date":"2012-11-01T13:44:07"},{"date":"2012-11-03T17:27:59","version":"5.012005"},{"version":"5.012005","date":"2012-11-08T21:12:17"},{"date":"2012-11-10T14:02:17","version":"5.012005"},{"version":"5.017006","date":"2012-11-21T00:08:12"},{"version":"5.017007","date":"2012-12-18T21:50:28"},{"date":"2013-01-20T18:48:45","version":"5.017008"},{"version":"5.017009","date":"2013-02-20T22:21:02"},{"date":"2013-03-05T17:03:49","version":"5.014004"},{"version":"5.016003","date":"2013-03-07T16:03:14"},{"date":"2013-03-07T19:52:52","version":"5.014004"},{"version":"5.014004","date":"2013-03-10T23:47:40"},{"version":"5.016003","date":"2013-03-11T21:08:33"},{"date":"2013-03-21T23:11:03","version":"5.017010"},{"version":"5.017011","date":"2013-04-21T00:52:16"},{"version":"5.018000","date":"2013-05-11T12:29:53"},{"version":"5.018000","date":"2013-05-12T23:14:51"},{"version":"5.018000","date":"2013-05-14T01:32:05"},{"date":"2013-05-16T02:53:44","version":"5.018000"},{"date":"2013-05-18T13:33:49","version":"5.018000"},{"date":"2013-05-20T13:12:38","version":"5.019000"},{"version":"5.019001","date":"2013-06-21T01:24:18"},{"version":"5.019002","date":"2013-07-22T05:59:35"},{"version":"5.018001","date":"2013-08-02T03:09:02"},{"version":"5.018001","date":"2013-08-04T12:34:33"},{"version":"5.018001","date":"2013-08-09T02:28:00"},{"version":"5.018001","date":"2013-08-12T14:31:08"},{"version":"5.019003","date":"2013-08-20T16:09:42"},{"date":"2013-09-20T15:58:20","version":"5.019004"},{"version":"5.019005","date":"2013-10-20T13:25:55"},{"date":"2013-11-20T20:37:20","version":"5.019006"},{"version":"5.018002","date":"2013-12-02T22:36:49"},{"date":"2013-12-07T13:55:43","version":"5.018002"},{"date":"2013-12-19T21:27:42","version":"5.018002"},{"version":"5.019007","date":"2013-12-20T20:55:37"},{"version":"5.018002","date":"2013-12-22T03:30:43"},{"date":"2014-01-07T01:52:57","version":"5.018002"},{"version":"5.019008","date":"2014-01-20T21:59:04"},{"version":"5.019009","date":"2014-02-20T04:24:45"},{"version":"5.019010","date":"2014-03-20T20:40:26"},{"date":"2014-04-20T15:47:12","version":"5.019011"},{"date":"2014-05-17T00:16:49","version":"5.020000"},{"version":"5.020000","date":"2014-05-27T01:35:13"},{"date":"2014-05-27T14:32:18","version":"5.021000"},{"version":"5.021001","date":"2014-06-20T15:31:10"},{"version":"5.021002","date":"2014-07-20T13:48:02"},{"date":"2014-08-21T02:26:13","version":"5.021003"},{"version":"5.020001","date":"2014-08-25T18:10:32"},{"version":"5.020001","date":"2014-09-07T17:01:11"},{"date":"2014-09-14T13:11:14","version":"5.020001"},{"date":"2014-09-17T20:29:53","version":"5.018003"},{"version":"5.021004","date":"2014-09-20T13:33:14"},{"version":"5.018003","date":"2014-09-27T12:54:08"},{"date":"2014-10-01T13:22:50","version":"5.018003"},{"version":"5.018004","date":"2014-10-02T00:48:31"},{"version":"5.021005","date":"2014-10-20T16:54:20"},{"version":"5.021006","date":"2014-11-20T23:39:06"},{"version":"5.021007","date":"2014-12-20T17:34:57"},{"version":"5.021008","date":"2015-01-20T20:20:05"},{"date":"2015-02-01T03:07:56","version":"5.020002"},{"date":"2015-02-14T18:26:43","version":"5.020002"},{"date":"2015-02-21T05:27:09","version":"5.021009"},{"date":"2015-03-20T18:30:20","version":"5.021010"},{"version":"5.021011","date":"2015-04-20T21:28:37"},{"date":"2015-05-19T14:12:19","version":"5.022000"},{"version":"5.022000","date":"2015-05-21T23:03:22"},{"date":"2015-06-01T17:51:59","version":"5.022000"},{"date":"2015-06-20T20:22:32","version":"5.023000"},{"version":"5.023001","date":"2015-07-20T19:26:31"},{"version":"5.023002","date":"2015-08-20T15:36:45"},{"date":"2015-08-22T22:12:34","version":"5.020003"},{"version":"5.020003","date":"2015-08-29T22:02:43"},{"date":"2015-09-12T19:09:14","version":"5.020003"},{"version":"5.023003","date":"2015-09-21T02:47:16"},{"date":"2015-10-20T22:17:48","version":"5.023004"},{"version":"5.022001","date":"2015-10-31T18:42:58"},{"date":"2015-11-15T15:15:03","version":"5.022001"},{"version":"5.023005","date":"2015-11-20T17:09:38"},{"version":"5.022001","date":"2015-12-02T22:07:35"},{"version":"5.022001","date":"2015-12-08T21:34:05"},{"version":"5.022001","date":"2015-12-13T19:48:31"},{"date":"2015-12-21T22:40:27","version":"5.023006"},{"version":"5.023007","date":"2016-01-20T21:52:22"},{"version":"5.023008","date":"2016-02-20T21:56:31"},{"date":"2016-03-20T16:45:40","version":"5.023009"},{"date":"2016-04-10T17:29:04","version":"5.022002"},{"date":"2016-04-14T03:27:48","version":"5.024000"},{"version":"5.024000","date":"2016-04-23T20:56:14"},{"date":"2016-04-27T01:02:55","version":"5.024000"},{"version":"5.022002","date":"2016-04-29T21:39:25"},{"version":"5.024000","date":"2016-05-02T14:41:03"},{"date":"2016-05-04T22:27:57","version":"5.024000"},{"version":"5.024000","date":"2016-05-09T11:35:29"},{"date":"2016-05-09T12:02:53","version":"5.025000"},{"version":"5.025001","date":"2016-05-20T21:33:43"},{"date":"2016-06-20T21:02:44","version":"5.025002"},{"version":"5.022003","date":"2016-07-17T22:27:32"},{"date":"2016-07-17T22:29:08","version":"5.024001"},{"date":"2016-07-20T16:22:41","version":"5.025003"},{"date":"2016-07-25T12:58:33","version":"5.022003"},{"date":"2016-07-25T13:01:21","version":"5.024001"},{"date":"2016-08-11T23:47:40","version":"5.022003"},{"date":"2016-08-11T23:50:29","version":"5.024001"},{"date":"2016-08-20T20:25:19","version":"5.025004"},{"date":"2016-09-20T17:45:06","version":"5.025005"},{"date":"2016-10-12T21:39:57","version":"5.022003"},{"date":"2016-10-12T21:40:57","version":"5.024001"},{"version":"5.025006","date":"2016-10-20T15:44:55"},{"version":"5.025007","date":"2016-11-20T21:20:07"},{"date":"2016-12-20T19:14:33","version":"5.025008"},{"version":"5.022003","date":"2017-01-02T18:54:51"},{"date":"2017-01-02T18:57:38","version":"5.024001"},{"date":"2017-01-14T20:04:05","version":"5.022003"},{"version":"5.024001","date":"2017-01-14T20:04:30"},{"version":"5.025009","date":"2017-01-20T15:25:43"},{"version":"5.025010","date":"2017-02-20T21:21:01"},{"date":"2017-03-20T20:56:49","version":"5.025011"},{"version":"5.025012","date":"2017-04-20T19:32:05"},{"date":"2017-05-11T17:07:17","version":"5.026000"},{"date":"2017-05-23T23:19:34","version":"5.026000"},{"date":"2017-05-30T19:42:51","version":"5.026000"},{"version":"5.027000","date":"2017-05-31T21:11:57"},{"version":"5.027001","date":"2017-06-20T06:39:54"},{"date":"2017-07-01T21:50:24","version":"5.022004"},{"date":"2017-07-01T21:50:55","version":"5.024002"},{"date":"2017-07-15T17:26:52","version":"5.022004"},{"date":"2017-07-15T17:29:00","version":"5.024002"},{"date":"2017-07-20T19:28:36","version":"5.027002"},{"version":"5.027003","date":"2017-08-21T20:43:51"},{"date":"2017-09-10T15:37:08","version":"5.024003"},{"version":"5.026001","date":"2017-09-10T15:38:22"},{"version":"5.027004","date":"2017-09-20T21:44:22"},{"version":"5.024003","date":"2017-09-22T21:29:50"},{"version":"5.026001","date":"2017-09-22T21:30:56"},{"version":"5.027005","date":"2017-10-20T22:08:15"},{"date":"2017-11-20T22:39:31","version":"5.027006"},{"version":"5.027007","date":"2017-12-20T22:58:25"},{"date":"2018-01-20T03:17:50","version":"5.027008"},{"version":"5.027009","date":"2018-02-20T20:46:45"},{"version":"5.027010","date":"2018-03-20T21:08:53"},{"version":"5.024004","date":"2018-03-24T19:33:50"},{"version":"5.026002","date":"2018-03-24T19:37:40"},{"date":"2018-04-14T11:25:22","version":"5.024004"},{"version":"5.026002","date":"2018-04-14T11:27:18"},{"version":"5.027011","date":"2018-04-20T15:10:52"},{"date":"2018-05-21T13:12:00","version":"5.028000"},{"version":"5.028000","date":"2018-06-06T12:34:00"},{"version":"5.028000","date":"2018-06-18T22:47:34"},{"version":"5.028000","date":"2018-06-19T20:45:05"},{"version":"5.028000","date":"2018-06-23T02:05:28"},{"version":"5.029000","date":"2018-06-26T21:25:53"},{"date":"2018-07-20T15:13:07","version":"5.029001"},{"version":"5.029002","date":"2018-08-20T21:04:27"},{"version":"5.029003","date":"2018-09-21T02:58:51"},{"date":"2018-10-20T14:20:56","version":"5.029004"},{"date":"2018-11-20T22:03:07","version":"5.029005"},{"date":"2018-11-29T19:03:17","version":"5.026003"},{"version":"5.028001","date":"2018-11-29T19:03:28"},{"version":"5.026003","date":"2018-11-30T22:02:29"},{"version":"5.028001","date":"2018-11-30T22:03:06"},{"version":"5.029006","date":"2018-12-18T12:26:18"},{"version":"5.029007","date":"2019-01-20T02:16:52"},{"date":"2019-02-21T05:30:00","version":"5.029008"},{"date":"2019-03-21T11:49:45","version":"5.029009"},{"date":"2019-04-05T19:46:23","version":"5.028002"},{"date":"2019-04-19T15:07:44","version":"5.028002"},{"date":"2019-04-20T18:11:45","version":"5.029010"},{"date":"2019-05-11T22:58:31","version":"5.030000"},{"date":"2019-05-17T20:44:42","version":"5.030000"},{"version":"5.030000","date":"2019-05-22T09:35:50"},{"date":"2019-05-24T19:28:47","version":"5.031000"},{"version":"5.031001","date":"2019-06-20T20:19:01"},{"version":"5.031002","date":"2019-07-20T17:01:20"},{"date":"2019-08-20T14:02:01","version":"5.031003"},{"version":"5.031004","date":"2019-09-20T21:27:31"},{"version":"5.031005","date":"2019-10-20T14:29:11"},{"date":"2019-10-27T16:29:27","version":"5.030001"},{"version":"5.030001","date":"2019-11-10T14:14:00"},{"version":"5.031006","date":"2019-11-20T22:14:49"},{"version":"5.031007","date":"2019-12-21T03:38:57"},{"date":"2020-01-20T17:17:53","version":"5.031008"},{"version":"5.031009","date":"2020-02-20T23:03:22"},{"date":"2020-02-29T19:25:07","version":"5.030002"},{"date":"2020-03-14T17:04:56","version":"5.030002"},{"version":"5.031010","date":"2020-03-20T20:08:58"},{"version":"5.031011","date":"2020-04-28T19:49:59"},{"version":"5.032000","date":"2020-05-30T18:47:47"},{"date":"2020-06-01T19:17:48","version":"5.028003"},{"version":"5.028003","date":"2020-06-01T19:19:30"},{"date":"2020-06-01T19:19:54","version":"5.030003"},{"version":"5.030003","date":"2020-06-01T19:21:31"},{"date":"2020-06-07T21:13:05","version":"5.032000"},{"version":"5.032000","date":"2020-06-20T20:38:54"},{"version":"5.033000","date":"2020-07-17T19:38:54"},{"version":"5.033001","date":"2020-08-20T20:36:01"},{"date":"2020-09-20T16:29:59","version":"5.033002"},{"version":"5.033003","date":"2020-10-20T21:30:28"},{"version":"5.033004","date":"2020-11-20T13:32:10"},{"version":"5.033005","date":"2020-12-20T14:00:43"},{"version":"5.032001","date":"2021-01-09T16:48:26"},{"version":"5.033006","date":"2021-01-21T01:34:41"},{"date":"2021-01-23T14:56:24","version":"5.032001"},{"date":"2021-02-20T09:58:24","version":"5.033007"},{"version":"5.033008","date":"2021-03-21T00:55:24"},{"date":"2021-04-20T23:37:29","version":"5.033009"},{"version":"5.034000","date":"2021-05-04T23:24:07"},{"version":"5.034000","date":"2021-05-15T14:56:00"},{"date":"2021-05-20T20:07:59","version":"5.034000"},{"version":"5.035000","date":"2021-05-21T02:06:41"},{"date":"2021-06-20T12:39:44","version":"5.035001"},{"date":"2021-07-23T12:53:17","version":"5.035002"},{"date":"2021-08-21T03:17:40","version":"5.035003"},{"version":"5.035004","date":"2021-09-20T19:46:41"},{"version":"5.035005","date":"2021-10-21T19:32:21"},{"version":"5.035006","date":"2021-11-21T00:22:09"},{"version":"5.035007","date":"2021-12-20T23:35:42"},{"version":"5.035008","date":"2022-01-20T22:39:08"},{"version":"5.035009","date":"2022-02-20T12:32:59"},{"date":"2022-02-27T14:18:13","version":"5.034001"},{"version":"5.034001","date":"2022-03-06T17:23:15"},{"version":"5.034001","date":"2022-03-13T08:40:18"},{"date":"2022-03-20T18:33:42","version":"5.035010"},{"date":"2022-04-20T20:33:20","version":"5.035011"},{"date":"2022-05-21T00:12:21","version":"5.036000"},{"date":"2022-05-22T19:36:07","version":"5.036000"},{"version":"5.036000","date":"2022-05-28T00:26:10"},{"date":"2022-05-28T02:33:40","version":"5.037000"},{"date":"2022-06-20T18:57:04","version":"5.037001"},{"version":"5.037002","date":"2022-07-21T01:37:24"},{"date":"2022-08-20T18:57:47","version":"5.037003"},{"version":"5.037004","date":"2022-09-21T00:25:19"},{"version":"5.037005","date":"2022-10-20T17:33:58"},{"version":"5.037006","date":"2022-11-20T11:56:16"},{"date":"2022-12-20T17:14:30","version":"5.037007"},{"version":"5.037008","date":"2023-01-20T15:20:59"},{"date":"2023-02-20T20:45:20","version":"5.037009"},{"version":"5.037010","date":"2023-03-21T08:16:37"},{"date":"2023-04-10T20:07:53","version":"5.036001"},{"date":"2023-04-11T19:50:09","version":"5.036001"},{"version":"5.036001","date":"2023-04-16T15:35:15"},{"version":"5.037011","date":"2023-04-20T19:05:36"},{"date":"2023-04-23T15:22:26","version":"5.036001"},{"version":"5.038000","date":"2023-06-16T02:09:05"},{"version":"5.038000","date":"2023-06-23T21:17:27"},{"version":"5.038000","date":"2023-07-02T23:00:28"},{"version":"5.039001","date":"2023-07-20T19:09:13"},{"date":"2023-08-20T22:46:17","version":"5.039002"},{"date":"2023-09-20T16:12:58","version":"5.039003"},{"version":"5.039004","date":"2023-10-25T19:15:57"},{"date":"2023-11-20T02:49:43","version":"5.039005"},{"version":"5.034002","date":"2023-11-25T15:19:49"},{"version":"5.036002","date":"2023-11-25T15:20:11"},{"date":"2023-11-25T15:21:49","version":"5.038001"},{"date":"2023-11-25T15:58:49","version":"5.034002"},{"version":"5.036002","date":"2023-11-25T15:59:01"},{"date":"2023-11-25T15:59:13","version":"5.038001"},{"date":"2023-11-29T13:10:30","version":"5.034003"},{"date":"2023-11-29T16:08:59","version":"5.036003"},{"version":"5.038002","date":"2023-11-29T16:10:36"},{"date":"2023-12-30T21:59:20","version":"5.039006"},{"version":"5.039007","date":"2024-01-20T12:44:12"},{"date":"2024-02-23T14:25:56","version":"5.039008"},{"version":"5.039009","date":"2024-03-20T16:26:28"},{"date":"2024-04-27T19:22:49","version":"5.039010"},{"date":"2024-05-24T20:45:21","version":"5.040000"},{"version":"5.040000","date":"2024-06-04T21:47:57"},{"date":"2024-06-09T20:45:37","version":"5.040000"},{"version":"5.041001","date":"2024-07-02T14:28:09"},{"date":"2024-07-20T20:54:48","version":"5.041002"},{"date":"2024-08-29T13:23:40","version":"5.041003"},{"date":"2024-09-20T11:18:14","version":"5.041004"},{"date":"2024-10-20T20:49:26","version":"5.041005"},{"date":"2024-11-20T08:29:25","version":"5.041006"},{"version":"5.041007","date":"2024-12-20T14:31:24"},{"version":"5.038003","date":"2025-01-05T20:28:54"},{"date":"2025-01-05T20:32:07","version":"5.040001"},{"version":"5.038003","date":"2025-01-18T19:43:21"},{"date":"2025-01-18T19:48:20","version":"5.040001"},{"date":"2025-01-20T21:30:07","version":"5.041008"},{"date":"2025-02-24T08:19:26","version":"5.041009"}],"main_module":"perl"},"GPIB":{"advisories":[{"id":"CPANSA-GPIB-2006-1565","references":["http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=359239","http://www.securityfocus.com/bid/17288","https://exchange.xforce.ibmcloud.com/vulnerabilities/25681"],"reported":"2006-03-31","distribution":"GPIB","severity":null,"cves":["CVE-2006-1565"],"affected_versions":[">0"],"description":"Untrusted search path vulnerability in libgpib-perl 3.2.06-2 in Debian GNU/Linux includes an RPATH value under the /tmp/buildd directory for the LinuxGpib.so module, which might allow local users to gain privileges by installing malicious libraries in that directory.\n","fixed_versions":[]}],"versions":[{"date":"2002-01-02T03:13:38","version":"0_30"}],"main_module":"GPIB"},"Clipboard":{"main_module":"Clipboard","advisories":[{"affected_versions":["<0.16"],"description":"clipedit in the Clipboard module for Perl allows local users to delete arbitrary files via a symlink attack on /tmp/clipedit$$.\n","fixed_versions":[],"id":"CPANSA-Clipboard-2014-5509","distribution":"Clipboard","references":["https://rt.cpan.org/Public/Bug/Display.html?id=98435","https://bugzilla.redhat.com/show_bug.cgi?id=1135624","http://www.securityfocus.com/bid/69473","http://www.openwall.com/lists/oss-security/2014/08/30/2"],"reported":"2018-01-08","cves":["CVE-2014-5509"],"severity":"medium"}],"versions":[{"version":"0.01","date":"2005-05-01T17:19:57"},{"version":"0.02","date":"2005-05-02T06:17:33"},{"version":"0.03","date":"2005-05-04T06:17:44"},{"version":"0.04","date":"2005-05-08T05:54:44"},{"version":"0.06","date":"2005-06-01T17:00:34"},{"version":"0.07","date":"2005-06-02T05:06:37"},{"version":"0.08","date":"2005-06-22T17:05:15"},{"version":"0.09","date":"2005-11-19T06:12:48"},{"version":"0.10","date":"2010-10-07T01:39:10"},{"version":"0.11","date":"2010-10-07T04:49:39"},{"date":"2010-10-11T06:13:22","version":"0.12"},{"date":"2010-10-13T04:46:50","version":"0.13"},{"date":"2019-01-30T10:47:45","version":"0.14"},{"date":"2019-01-30T11:00:22","version":"0.15"},{"date":"2019-01-30T11:22:23","version":"0.16"},{"version":"0.17","date":"2019-01-30T14:00:52"},{"date":"2019-01-30T20:12:11","version":"0.18"},{"version":"0.19","date":"2019-01-31T11:00:20"},{"date":"2019-04-17T20:55:35","version":"0.20"},{"date":"2019-12-02T06:04:27","version":"0.21"},{"date":"2020-01-28T18:10:34","version":"0.22"},{"date":"2020-03-06T15:43:11","version":"0.23"},{"version":"0.24","date":"2020-03-07T08:25:07"},{"version":"0.25","date":"2020-05-14T06:33:28"},{"version":"0.26","date":"2020-05-16T07:56:58"},{"date":"2021-02-13T18:13:34","version":"0.27"},{"date":"2021-02-23T07:47:20","version":"0.28"},{"date":"2024-04-07T03:11:57","version":"0.29"},{"date":"2024-06-16T12:03:21","version":"0.30"},{"date":"2025-01-21T17:04:47","version":"0.31"},{"version":"0.32","date":"2025-02-10T08:24:16"}]},"DBD-mysql":{"versions":[{"date":"2000-04-15T20:17:36","version":"v1.2212."},{"date":"2001-05-06T21:47:46","version":"2.0900"},{"date":"2001-05-25T21:24:45","version":"2.0901"},{"date":"2001-07-09T21:10:17","version":"2.0902"},{"date":"2001-10-28T22:53:19","version":"2.0903"},{"version":"2.1000","date":"2001-10-31T04:01:07"},{"version":"2.1001","date":"2001-11-04T17:55:04"},{"version":"2.1002","date":"2001-11-04T18:22:30"},{"date":"2001-11-05T20:14:34","version":"2.1003"},{"date":"2001-11-13T01:24:26","version":"2.1004"},{"date":"2001-12-13T09:07:53","version":"2.1005"},{"date":"2001-12-27T18:10:04","version":"2.1007"},{"date":"2001-12-27T18:10:21","version":"2.1006"},{"version":"2.1008","date":"2001-12-28T17:06:05"},{"date":"2002-01-01T20:02:26","version":"2.1009"},{"date":"2002-01-07T21:33:21","version":"2.1010"},{"date":"2002-02-12T11:09:53","version":"2.1011"},{"date":"2002-04-12T07:21:06","version":"2.1012"},{"version":"2.1013","date":"2002-04-15T07:49:36"},{"version":"2.1014","date":"2002-04-17T21:24:26"},{"date":"2002-04-29T20:53:41","version":"2.1015"},{"version":"2.1016","date":"2002-05-01T20:07:05"},{"date":"2002-05-02T20:59:04","version":"2.1017"},{"version":"2.1018","date":"2002-08-13T17:52:25"},{"version":"2.1019","date":"2002-09-16T18:42:20"},{"version":"2.1020","date":"2002-09-23T20:42:50"},{"date":"2002-12-17T20:46:14","version":"2.1021"},{"date":"2003-01-03T02:46:24","version":"2.1022"},{"date":"2003-01-19T21:19:03","version":"2.1023"},{"version":"2.1024","date":"2003-01-20T12:08:27"},{"date":"2003-02-07T21:09:44","version":"2.1025"},{"version":"2.1026","date":"2003-03-03T20:46:27"},{"version":"2.1027","date":"2003-05-31T18:08:15"},{"date":"2003-06-25T16:12:36","version":"2.1028"},{"date":"2003-06-27T04:32:05","version":"2.9002"},{"version":"2.9003_1","date":"2003-09-12T17:04:42"},{"version":"2.9003","date":"2003-10-27T03:39:04"},{"date":"2004-07-01T03:24:14","version":"2.9004_2"},{"version":"2.9004","date":"2004-07-14T03:07:34"},{"date":"2004-10-20T17:27:25","version":"2.9005_1"},{"date":"2004-10-28T00:39:25","version":"2.9005_3"},{"date":"2005-03-29T02:43:14","version":"2.9005"},{"version":"2.9006","date":"2005-04-04T04:27:00"},{"date":"2005-04-27T00:13:49","version":"2.9015_3"},{"version":"2.9007","date":"2005-04-27T00:14:06"},{"version":"2.9008","date":"2005-06-06T01:39:20"},{"version":"3.0000","date":"2005-07-01T01:48:20"},{"date":"2005-07-03T21:56:11","version":"3.0000_0"},{"version":"3.0001_0","date":"2005-07-04T15:53:40"},{"version":"3.0001_1","date":"2005-07-04T16:16:00"},{"version":"3.0001","date":"2005-07-07T01:14:17"},{"date":"2005-07-07T01:22:39","version":"3.0001_2"},{"version":"3.0001_3","date":"2005-07-08T05:37:13"},{"date":"2005-07-11T16:49:47","version":"3.0002"},{"version":"3.0002_1","date":"2005-08-04T02:50:35"},{"date":"2005-09-26T23:22:57","version":"3.0002_2"},{"version":"3.0002_3","date":"2005-09-28T18:58:55"},{"version":"3.0002_4","date":"2005-11-06T21:47:29"},{"version":"3.0002_5","date":"2006-02-01T23:20:01"},{"version":"3.0003","date":"2006-05-04T17:49:06"},{"version":"3.0003_1","date":"2006-05-04T17:49:23"},{"date":"2006-05-21T17:28:22","version":"3.0004"},{"version":"3.0004_1","date":"2006-05-21T17:28:33"},{"version":"3.0005_1","date":"2006-06-10T01:21:49"},{"date":"2006-06-10T01:22:01","version":"3.0005"},{"date":"2006-06-11T17:05:25","version":"3.0006"},{"date":"2006-06-11T17:05:36","version":"3.0006_1"},{"date":"2006-09-08T23:12:02","version":"3.0007"},{"date":"2006-09-08T23:13:45","version":"3.0007_1"},{"version":"3.0007_2","date":"2006-10-07T12:59:23"},{"version":"3.0008","date":"2006-10-16T13:42:13"},{"date":"2006-10-16T13:42:24","version":"3.0008_1"},{"date":"2006-12-24T14:11:04","version":"4.00"},{"version":"4.001","date":"2007-01-08T01:11:12"},{"version":"4.002","date":"2007-03-02T03:32:59"},{"date":"2007-03-02T14:13:37","version":"4.003"},{"date":"2007-03-22T22:31:22","version":"4.004"},{"version":"4.005","date":"2007-06-08T15:33:34"},{"version":"4.006","date":"2007-12-26T22:50:48"},{"version":"4.007","date":"2008-05-11T15:56:07"},{"version":"4.008","date":"2008-08-15T14:06:50"},{"version":"4.009","date":"2008-10-22T01:05:54"},{"date":"2008-10-24T14:00:41","version":"4.010"},{"version":"4.011","date":"2009-04-14T02:40:31"},{"date":"2009-06-19T02:08:06","version":"4.012"},{"date":"2009-09-16T18:37:29","version":"4.013"},{"version":"4.014","date":"2010-04-15T03:17:58"},{"date":"2010-07-09T19:48:58","version":"4.015"},{"version":"4.016","date":"2010-07-10T16:50:49"},{"version":"4.017","date":"2010-08-12T05:50:17"},{"date":"2010-10-26T16:59:27","version":"4.018"},{"date":"2011-05-09T01:28:25","version":"4.019"},{"version":"4.020","date":"2011-08-20T18:45:49"},{"version":"4.021","date":"2012-04-28T14:18:16"},{"date":"2012-08-30T02:00:19","version":"4.022"},{"version":"4.023","date":"2013-04-12T21:48:10"},{"version":"4.024","date":"2013-09-17T16:04:11"},{"version":"4.025","date":"2013-11-04T18:29:18"},{"date":"2014-01-16T01:33:03","version":"4.026"},{"date":"2014-03-19T14:25:36","version":"4.027"},{"date":"2014-08-01T19:59:28","version":"4.028"},{"version":"4.029","date":"2014-12-09T02:39:44"},{"version":"4.030_01","date":"2015-01-28T03:53:42"},{"date":"2015-03-02T20:44:31","version":"4.030_02"},{"version":"4.031","date":"2015-03-06T20:12:05"},{"date":"2015-04-16T22:28:43","version":"4.032_01"},{"version":"4.032","date":"2015-07-21T12:15:24"},{"date":"2015-10-25T19:59:17","version":"4.032_03"},{"date":"2015-10-27T03:37:29","version":"4.033"},{"date":"2015-12-15T07:16:36","version":"4.033_01"},{"version":"4.033_02","date":"2015-12-18T07:00:41"},{"date":"2016-07-04T19:32:50","version":"4.033_03"},{"date":"2016-07-06T06:32:05","version":"4.034"},{"version":"4.035","date":"2016-07-09T05:50:13"},{"version":"4.035_01","date":"2016-08-01T06:29:25"},{"date":"2016-08-11T08:11:18","version":"4.035_02"},{"date":"2016-08-19T15:52:10","version":"4.035_03"},{"date":"2016-08-23T05:59:26","version":"4.036"},{"date":"2016-10-03T07:00:29","version":"4.037"},{"date":"2016-10-14T20:56:49","version":"4.037_01"},{"version":"4.037_02","date":"2016-10-19T19:37:55"},{"date":"2016-10-20T02:33:04","version":"4.038"},{"date":"2016-10-30T08:45:31","version":"4.038_01"},{"version":"4.039","date":"2016-11-16T03:57:57"},{"version":"4.040","date":"2016-11-19T19:56:51"},{"version":"4.041","date":"2016-11-28T20:40:41"},{"version":"4.041_01","date":"2016-12-13T06:59:09"},{"date":"2017-02-28T20:57:20","version":"4.041_02"},{"version":"4.042","date":"2017-03-08T20:32:52"},{"version":"4.043","date":"2017-06-29T21:12:09"},{"version":"4.044","date":"2018-01-23T01:53:30"},{"version":"4.044","date":"2018-02-07T21:43:00"},{"version":"4.045","date":"2018-02-08T20:30:55"},{"date":"2018-02-08T20:48:11","version":"4.046"},{"date":"2018-03-09T20:27:44","version":"4.046_01"},{"date":"2018-09-09T03:02:20","version":"4.047"},{"date":"2018-09-15T12:46:51","version":"4.048"},{"date":"2018-11-17T18:58:09","version":"4.049"},{"version":"4.050","date":"2019-01-09T09:07:15"},{"date":"2019-10-07T10:06:13","version":"4.018_01"},{"version":"4.051","date":"2023-10-04T07:10:45"},{"version":"5.001","date":"2023-10-04T07:20:03"},{"version":"5.002","date":"2023-10-24T09:02:42"},{"date":"2023-12-01T07:13:15","version":"4.052"},{"version":"5.003","date":"2023-12-01T07:14:42"},{"date":"2024-03-19T08:16:14","version":"5.004"},{"version":"5.005","date":"2024-05-01T09:04:33"},{"version":"5.006","date":"2024-06-04T19:59:44"},{"version":"5.007","date":"2024-07-01T06:02:18"},{"date":"2024-07-30T07:47:38","version":"5.008"},{"version":"5.009","date":"2024-09-19T08:35:24"},{"date":"2024-11-11T06:43:01","version":"5.010"},{"version":"4.053","date":"2025-01-06T06:52:30"},{"version":"5.011","date":"2025-01-06T06:55:27"}],"advisories":[{"description":"The DBD::mysql module through 4.043 for Perl allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact by triggering (1) certain error responses from a MySQL server or (2) a loss of a network connection to a MySQL server. The use-after-free defect was introduced by relying on incorrect Oracle mysql_stmt_close documentation and code examples.\n","fixed_versions":[">=4.044"],"affected_versions":["<4.044"],"distribution":"DBD-mysql","references":["https://github.com/perl5-dbi/DBD-mysql/issues/120","http://www.securityfocus.com/bid/99374","http://seclists.org/oss-sec/2017/q2/443"],"reported":"2017-04-13","cves":["CVE-2017-10788"],"id":"CPANSA-DBD-mysql-2017-02"},{"affected_versions":["<4.044"],"fixed_versions":[">=4.044"],"description":"The DBD::mysql module through 4.043 for Perl uses the mysql_ssl=1 setting to mean that SSL is optional (even though this setting's documentation has a \"your communication with the server will be encrypted\" statement), which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152.\n","id":"CPANSA-DBD-mysql-2017-01","cves":["CVE-2017-10789"],"distribution":"DBD-mysql","references":["https://github.com/perl5-dbi/DBD-mysql/pull/114"],"reported":"2017-03-23"},{"fixed_versions":["<2.9003,>=4.039"],"description":"Out-of-bounds read.\n","affected_versions":[">=2.9003,<4.039"],"cves":["CVE-2016-1249"],"references":["https://github.com/perl5-dbi/DBD-mysql/commit/793b72b1a0baa5070adacaac0e12fd995a6fbabe"],"reported":"2016-11-16","distribution":"DBD-mysql","id":"CPANSA-DBD-mysql-2016-03"},{"cves":["CVE-2016-1246"],"reported":"2016-10-02","references":["https://github.com/perl5-dbi/DBD-mysql/commit/7c164a0c86cec6ee95df1d141e67b0e85dfdefd2","http://blogs.perl.org/users/mike_b/2016/10/security-release---buffer-overflow-in-dbdmysql-perl-library.html"],"distribution":"DBD-mysql","id":"CPANSA-DBD-mysql-2016-02","description":"Buffer overflow in the DBD::mysql module before 4.037 for Perl allows context-dependent attackers to cause a denial of service (crash) via vectors related to an error message.\n","fixed_versions":[">=4.037"],"affected_versions":["<4.037"]},{"fixed_versions":[">=4.034"],"description":"Use-after-free vulnerability in the my_login function in DBD::mysql before 4.033_01 allows attackers to have unspecified impact by leveraging a call to mysql_errno after a failure of my_login.\n","affected_versions":["<4.034"],"reported":"2016-08-19","references":["https://github.com/perl5-dbi/DBD-mysql/commit/cf0aa7751f6ef8445e9310a64b14dc81460ca156"],"distribution":"DBD-mysql","cves":["CVE-2015-8949"],"id":"CPANSA-DBD-mysql-2016-01"},{"cves":["CVE-2016-1251"],"reported":"2015-12-27","references":["https://github.com/perl5-dbi/DBD-mysql/commit/3619c170461a3107a258d1fd2d00ed4832adb1b1"],"distribution":"DBD-mysql","id":"CPANSA-DBD-mysql-2015-01","fixed_versions":[">=4.041"],"description":"There is a vulnerability of type use-after-free affecting DBD::mysql (aka DBD-mysql or the Database Interface (DBI) MySQL driver for Perl) 3.x and 4.x before 4.041 when used with mysql_server_prepare=1.\n","affected_versions":["<4.041"]},{"cves":["CVE-2014-9906"],"distribution":"DBD-mysql","references":["https://github.com/perl5-dbi/DBD-mysql/commit/a56ae87a4c1c1fead7d09c3653905841ccccf1cc","https://rt.cpan.org/Public/Bug/Display.html?id=97625"],"reported":"2014-07-30","id":"CPANSA-DBD-mysql-2014-01","description":"Use-after-free vulnerability in DBD::mysql before 4.029 allows attackers to cause a denial of service (program crash) or possibly execute arbitrary code via vectors related to a lost server connection.\n","fixed_versions":[">=4.028"],"affected_versions":["<4.028"]}],"main_module":"DBD::mysql"},"IPC-Cmd":{"versions":[{"version":"0.02","date":"2003-05-10T16:57:39"},{"version":"0.03","date":"2003-05-11T08:50:33"},{"version":"0.04","date":"2003-09-25T10:34:58"},{"version":"0.20","date":"2004-06-18T11:43:01"},{"date":"2004-08-16T10:26:03","version":"0.22"},{"date":"2004-12-03T15:53:45","version":"0.23"},{"version":"0.24","date":"2004-12-09T09:56:18"},{"date":"2006-09-06T15:57:50","version":"0.25"},{"date":"2006-10-05T14:42:36","version":"0.29_01"},{"version":"0.30","date":"2006-10-11T11:11:24"},{"date":"2006-10-13T11:18:04","version":"0.32"},{"version":"0.34","date":"2006-10-20T13:16:49"},{"date":"2006-11-24T14:01:10","version":"0.36"},{"date":"2007-10-11T15:17:44","version":"0.38"},{"date":"2007-10-17T09:29:57","version":"0.40"},{"date":"2008-05-18T15:50:12","version":"0.41_01"},{"version":"0.41_02","date":"2008-06-29T15:41:17"},{"version":"0.41_03","date":"2008-07-13T13:08:43"},{"version":"0.41_04","date":"2008-07-14T13:57:54"},{"date":"2008-09-22T13:12:26","version":"0.41_05"},{"date":"2008-09-24T15:46:32","version":"0.41_06"},{"version":"0.41_07","date":"2008-10-05T16:24:49"},{"version":"0.42","date":"2008-10-10T09:47:07"},{"date":"2009-05-04T08:15:08","version":"0.44"},{"date":"2009-06-12T11:38:40","version":"0.46"},{"date":"2009-09-07T14:15:59","version":"0.48"},{"date":"2009-09-07T15:21:24","version":"0.50"},{"version":"0.51_01","date":"2009-11-08T23:24:39"},{"date":"2009-11-13T16:17:59","version":"0.52"},{"date":"2009-11-15T22:04:56","version":"0.54"},{"date":"2010-02-03T14:21:25","version":"0.56"},{"version":"0.58","date":"2010-04-29T20:06:40"},{"date":"2010-07-05T08:10:45","version":"0.60"},{"date":"2010-10-19T14:53:57","version":"0.62"},{"date":"2010-10-19T18:09:00","version":"0.64"},{"date":"2010-11-23T12:11:55","version":"0.66"},{"version":"0.68","date":"2011-01-07T22:28:30"},{"date":"2011-01-31T20:40:13","version":"0.70"},{"date":"2011-05-10T13:07:15","version":"0.71_01"},{"date":"2011-05-26T12:01:30","version":"0.71_02"},{"date":"2011-05-26T12:46:44","version":"0.71_03"},{"version":"0.72","date":"2011-06-22T11:34:08"},{"version":"0.74","date":"2012-01-30T10:35:24"},{"version":"0.76","date":"2012-01-30T11:34:12"},{"date":"2012-04-30T18:52:04","version":"0.78"},{"version":"0.80","date":"2013-03-02T22:15:43"},{"version":"0.82","date":"2013-06-29T21:17:06"},{"date":"2013-08-06T09:28:59","version":"0.84"},{"version":"0.85_01","date":"2013-09-05T19:34:47"},{"date":"2013-10-10T13:09:11","version":"0.85_02"},{"date":"2013-11-04T14:18:01","version":"0.86"},{"version":"0.88","date":"2013-11-15T14:47:57"},{"version":"0.90","date":"2013-11-18T15:12:15"},{"date":"2014-01-22T20:01:22","version":"0.92"},{"date":"2016-02-12T19:01:25","version":"0.94"},{"version":"0.96","date":"2016-07-28T10:19:44"},{"version":"0.98","date":"2017-05-12T16:05:02"},{"date":"2018-02-14T16:21:01","version":"1.00"},{"date":"2018-05-03T08:53:01","version":"1.02"},{"date":"2019-07-13T09:17:39","version":"1.04"},{"date":"2007-07-07T00:00:00","dual_lived":1,"perl_release":"5.009005","version":"0.36_01"},{"version":"0.40_1","perl_release":"5.010000","dual_lived":1,"date":"2007-12-18T00:00:00"},{"date":"2013-10-20T00:00:00","dual_lived":1,"perl_release":"5.019005","version":"0.84_01"},{"dual_lived":1,"date":"2017-01-14T00:00:00","version":"0.92_01","perl_release":"5.022003"}],"advisories":[{"affected_versions":["<0.96"],"fixed_versions":[">=0.96"],"description":"(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.\n","id":"CPANSA-IPC-Cmd-2016-1238","cves":["CVE-2016-1238"],"severity":"high","distribution":"IPC-Cmd","references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"reported":"2016-08-02"}],"main_module":"IPC::Cmd"},"Email-Address":{"versions":[{"date":"2004-05-27T03:19:56","version":"1.1"},{"version":"1.2","date":"2004-06-02T16:35:30"},{"version":"1.3","date":"2004-08-16T21:39:58"},{"version":"1.5","date":"2004-10-05T18:10:42"},{"date":"2004-10-05T18:20:42","version":"1.6"},{"date":"2004-10-13T10:21:17","version":"1.7"},{"version":"1.80","date":"2004-10-22T16:37:27"},{"date":"2006-07-11T15:04:28","version":"1.85"},{"version":"1.86","date":"2006-07-22T00:42:17"},{"date":"2006-08-10T16:48:44","version":"1.870"},{"version":"1.861","date":"2006-10-12T19:35:04"},{"date":"2006-10-12T22:16:28","version":"1.871"},{"date":"2006-11-11T16:01:38","version":"1.880"},{"version":"1.881","date":"2006-11-19T21:19:02"},{"date":"2006-11-22T01:26:44","version":"1.882"},{"date":"2006-11-25T13:53:46","version":"1.883"},{"date":"2006-12-05T03:41:39","version":"1.884"},{"date":"2007-03-01T01:08:16","version":"1.885"},{"version":"1.886","date":"2007-03-01T20:18:53"},{"date":"2007-04-01T19:15:49","version":"1.887"},{"date":"2007-06-23T01:27:24","version":"1.888"},{"date":"2007-12-19T22:14:37","version":"1.889"},{"version":"1.890","date":"2010-08-22T19:03:33"},{"version":"1.891","date":"2010-08-31T00:56:53"},{"version":"1.892","date":"2010-09-03T23:45:13"},{"version":"1.893","date":"2012-01-03T03:55:12"},{"date":"2012-01-14T16:17:56","version":"1.894"},{"version":"1.895","date":"2012-01-15T18:41:33"},{"version":"1.896","date":"2012-08-01T03:07:33"},{"date":"2012-12-17T15:16:33","version":"1.897"},{"version":"1.898","date":"2013-02-07T21:41:48"},{"date":"2013-08-02T14:54:13","version":"1.899"},{"version":"1.900","date":"2013-08-08T18:46:07"},{"date":"2014-01-29T03:43:28","version":"1.901"},{"date":"2014-04-17T15:19:31","version":"1.902"},{"version":"1.903","date":"2014-04-18T01:07:10"},{"date":"2014-06-14T04:22:22","version":"1.904"},{"version":"1.905","date":"2014-06-18T02:55:59"},{"date":"2015-02-03T21:49:39","version":"1.906"},{"version":"1.907","date":"2015-02-03T22:48:46"},{"date":"2015-09-20T02:55:12","version":"1.908"},{"date":"2018-03-05T03:26:56","version":"1.909"},{"version":"1.910","date":"2018-12-18T02:29:23"},{"version":"1.911","date":"2018-12-22T16:31:37"},{"date":"2018-12-31T19:51:36","version":"1.912"},{"date":"2023-01-10T00:42:33","version":"1.913"}],"advisories":[{"distribution":"Email-Address","reported":"2014-07-03","references":["https://metacpan.org/changes/distribution/Email-Address"],"cves":["CVE-2014-0477"],"id":"CPANSA-Email-Address-2014-01","fixed_versions":[">=1.905"],"description":"Inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via an empty quoted string in an RFC 2822 address.\n","affected_versions":["<1.905"]},{"distribution":"Email-Address","reported":"2018-06-19","references":["https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901873","http://www.openwall.com/lists/oss-security/2018/06/19/3","http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00012.html"],"cves":["CVE-2018-12558"],"id":"CPANSA-Email-Address-2014-01","description":"The parse() method in the Email::Address module through 1.909 for Perl is vulnerable to Algorithmic complexity on specially prepared input, leading to Denial of Service. Prepared special input that caused this problem contained 30 form-field characters (\"\\f\").\n","fixed_versions":[">=1.909"],"affected_versions":["<1.909"]},{"id":"CPANSA-Email-Address-2014-4720","references":["https://github.com/rjbs/Email-Address/blob/master/Changes","http://seclists.org/oss-sec/2014/q2/563"],"reported":"2014-07-06","distribution":"Email-Address","severity":null,"cves":["CVE-2014-4720"],"affected_versions":["<1.904"],"description":"Email::Address module before 1.904 for Perl uses an inefficient regular expression, which allows remote attackers to cause a denial of service (CPU consumption) via vectors related to \"backtracking into the phrase,\" a different vulnerability than CVE-2014-0477.\n","fixed_versions":[">=1.904"]}],"main_module":"Email::Address"},"MojoMojo":{"main_module":"MojoMojo","advisories":[{"fixed_versions":[">=0.999033"],"description":"Anonymous users can delete attachments.\n","affected_versions":["<0.999033"],"distribution":"MojoMojo","reported":"2009-08-14","references":["https://metacpan.org/changes/distribution/MojoMojo","https://github.com/mojomojo/mojomojo/commit/a9b9fd4f4f037627d30f3cbaa10abe42a3439637"],"cves":[],"id":"CPANSA-MojoMojo-2009-01"}],"versions":[{"version":"0.05","date":"2007-08-29T14:32:52"},{"date":"2007-09-12T21:46:24","version":"0.05"},{"date":"2007-09-13T11:28:37","version":"0.05"},{"version":"0.999004","date":"2007-09-18T07:33:43"},{"version":"0.999005","date":"2007-09-18T08:02:02"},{"date":"2007-09-19T20:59:39","version":"0.999006"},{"date":"2007-09-23T23:30:59","version":"0.999007"},{"version":"0.999008","date":"2007-11-12T22:25:35"},{"version":"0.999010","date":"2008-01-20T23:15:07"},{"date":"2008-01-23T23:00:05","version":"0.999011"},{"date":"2008-02-05T23:20:47","version":"0.999012"},{"date":"2008-03-05T00:34:49","version":"0.999013"},{"version":"0.999014","date":"2008-05-02T18:11:49"},{"date":"2008-05-03T16:10:08","version":"0.999015"},{"date":"2008-06-29T13:03:39","version":"0.999016"},{"date":"2008-07-09T14:26:56","version":"0.999017"},{"date":"2008-07-16T19:26:46","version":"0.999018"},{"date":"2008-07-19T21:33:36","version":"0.999018"},{"version":"0.999018","date":"2008-07-29T16:25:08"},{"version":"0.999021","date":"2008-11-01T01:04:37"},{"date":"2008-11-15T09:09:37","version":"0.999022"},{"date":"2008-11-23T16:45:05","version":"0.999023"},{"date":"2008-12-31T17:53:50","version":"0.999024"},{"date":"2009-01-04T22:51:40","version":"0.999025"},{"date":"2009-01-07T23:28:15","version":"0.999026"},{"date":"2009-01-30T23:29:25","version":"0.999027"},{"version":"0.999028","date":"2009-04-23T10:06:20"},{"version":"0.999029","date":"2009-05-09T23:21:10"},{"version":"0.999030","date":"2009-07-18T19:39:14"},{"version":"0.999031","date":"2009-07-26T19:39:37"},{"date":"2009-08-02T21:28:51","version":"0.999032"},{"date":"2009-08-14T12:50:18","version":"0.999033"},{"date":"2009-09-04T18:27:34","version":"0.999040"},{"date":"2009-10-26T16:07:25","version":"0.999041"},{"version":"0.999042","date":"2009-12-02T08:22:24"},{"version":"1.00","date":"2010-05-11T22:58:19"},{"version":"1.01","date":"2010-05-27T07:44:39"},{"date":"2010-08-30T21:24:41","version":"1.02"},{"date":"2011-01-13T12:48:10","version":"1.03"},{"version":"1.04","date":"2011-03-12T23:37:45"},{"date":"2011-09-14T10:09:05","version":"1.05"},{"version":"1.06","date":"2012-08-07T10:39:42"},{"date":"2012-11-12T23:30:00","version":"1.07"},{"date":"2013-01-06T07:46:41","version":"1.08"},{"date":"2013-01-25T16:06:42","version":"1.09"},{"version":"1.10","date":"2013-05-12T22:59:03"},{"version":"1.11","date":"2014-12-25T17:13:24"},{"date":"2017-05-13T13:47:52","version":"1.12"}]},"CBOR-XS":{"main_module":"CBOR::XS","versions":[{"version":"0.01","date":"2013-10-25T23:10:42"},{"date":"2013-10-26T11:09:56","version":"0.02"},{"version":"0.03","date":"2013-10-26T23:04:01"},{"version":"0.04","date":"2013-10-27T22:48:22"},{"version":"0.05","date":"2013-10-28T21:28:30"},{"date":"2013-10-29T15:57:13","version":"0.06"},{"version":"0.07","date":"2013-10-29T22:05:30"},{"version":"0.08","date":"2013-10-30T10:11:46"},{"version":"0.09","date":"2013-11-22T16:19:26"},{"version":"1.0","date":"2013-11-28T16:09:19"},{"version":"1.1","date":"2013-11-30T18:42:59"},{"date":"2013-12-01T17:11:47","version":"1.11"},{"version":"1.12","date":"2013-12-03T10:25:03"},{"date":"2013-12-10T21:07:58","version":"1.2"},{"date":"2014-01-05T14:25:36","version":"1.25"},{"version":1.26,"date":"2014-10-25T06:37:38"},{"version":1.3,"date":"2015-04-27T20:22:15"},{"date":"2016-02-08T04:38:25","version":1.4},{"version":1.41,"date":"2016-02-25T14:23:47"},{"date":"2016-04-27T09:40:38","version":1.5},{"version":1.6,"date":"2016-12-07T14:14:49"},{"version":1.7,"date":"2017-06-27T02:03:48"},{"date":"2018-11-15T19:53:50","version":1.71},{"version":1.8,"date":"2020-11-29T21:36:13"},{"date":"2020-11-30T18:31:32","version":1.81},{"date":"2020-12-01T01:50:49","version":1.82},{"date":"2020-12-08T08:30:59","version":1.83},{"version":1.84,"date":"2021-10-21T01:16:11"},{"version":1.85,"date":"2021-10-23T03:00:48"},{"version":1.86,"date":"2021-11-04T16:50:24"},{"version":1.87,"date":"2023-09-10T20:45:43"}],"advisories":[{"references":["https://metacpan.org/dist/CBOR-XS/changes"],"reported":"2017-07-27","distribution":"CBOR-XS","severity":null,"cves":[],"id":"CPANSA-CBOR-XS-2017-01","fixed_versions":[">=1.7"],"description":"An out-of bound sharedref or stringref index could cause an out of bounds access - might be exploitable. A decoding error during indefinite array or hash decoding could cause an endless loop.\n","affected_versions":["<1.7"]}]},"Crypt-OpenSSL-RSA":{"main_module":"Crypt::OpenSSL::RSA","versions":[{"version":"0.08","date":"2001-04-02T04:24:26"},{"version":"0.09","date":"2001-04-02T16:43:12"},{"date":"2001-04-10T20:56:43","version":"0.10"},{"date":"2001-04-11T02:58:01","version":"0.11"},{"date":"2001-09-07T03:14:26","version":"0.12"},{"version":"0.13","date":"2002-03-22T04:46:17"},{"date":"2002-05-19T16:54:53","version":"0.14"},{"date":"2002-06-07T13:25:40","version":"0.15"},{"version":"0.16","date":"2002-06-12T02:15:47"},{"date":"2003-01-07T04:08:58","version":"0.17"},{"date":"2003-02-24T02:27:12","version":"0.18"},{"date":"2003-04-27T22:48:40","version":"0.19"},{"date":"2004-02-15T20:43:41","version":"0.20"},{"date":"2004-02-16T02:19:45","version":"0.21"},{"date":"2005-06-06T10:51:24","version":"0.22"},{"date":"2005-11-15T04:34:15","version":"0.22"},{"date":"2006-04-13T04:38:04","version":"0.23"},{"date":"2006-11-13T15:34:59","version":"0.24"},{"version":"0.25","date":"2007-05-20T19:06:56"},{"date":"2009-11-22T20:40:31","version":"0.26"},{"date":"2011-06-29T18:49:35","version":"0.26_01"},{"version":"0.27","date":"2011-07-03T20:14:52"},{"version":"0.28","date":"2011-08-24T23:04:56"},{"date":"2017-11-27T03:36:04","version":"0.28"},{"version":"0.29_01","date":"2018-04-14T05:01:11"},{"date":"2018-04-15T18:55:41","version":"0.29_02"},{"version":"0.29_03","date":"2018-04-16T20:47:56"},{"date":"2018-05-01T16:37:12","version":"0.30"},{"version":"0.31","date":"2018-09-24T17:36:24"},{"date":"2021-09-08T15:50:47","version":"0.32"},{"date":"2022-07-08T11:25:11","version":"0.33"}],"advisories":[{"affected_versions":[">0"],"fixed_versions":[],"description":"A timing-based side-channel flaw exists in the perl-Crypt-OpenSSL-RSA package, which could be sufficient to recover plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode.\n","id":"CPANSA-Crypt-OpenSSL-RSA-2024-2467","distribution":"Crypt-OpenSSL-RSA","references":["https://access.redhat.com/security/cve/CVE-2024-2467","https://bugzilla.redhat.com/show_bug.cgi?id=2269567","https://github.com/toddr/Crypt-OpenSSL-RSA/issues/42","https://people.redhat.com/~hkario/marvin/"],"reported":"2024-04-25","cves":["CVE-2024-2467"],"severity":null}]},"HTTP-Tiny":{"main_module":"HTTP::Tiny","versions":[{"version":"0.001","date":"2010-12-11T12:59:31"},{"date":"2010-12-14T02:59:37","version":"0.002"},{"date":"2010-12-15T17:30:49","version":"0.003"},{"date":"2010-12-16T03:53:33","version":"0.004"},{"version":"0.005","date":"2011-01-08T11:32:21"},{"date":"2011-01-10T12:27:39","version":"0.006"},{"version":"0.007","date":"2011-01-12T09:56:28"},{"version":"0.008","date":"2011-01-14T11:34:51"},{"date":"2011-01-17T21:29:27","version":"0.009"},{"version":"0.010","date":"2011-02-04T07:45:53"},{"date":"2011-03-20T00:49:53","version":"0.011"},{"date":"2011-03-31T19:49:33","version":"0.012"},{"date":"2011-07-18T03:15:12","version":"0.013"},{"version":"0.014","date":"2011-10-20T17:55:01"},{"version":"0.015","date":"2011-10-26T20:42:15"},{"version":"0.016","date":"2011-10-27T03:06:06"},{"date":"2012-02-23T02:58:42","version":"0.017"},{"version":"0.018","date":"2012-04-18T13:41:15"},{"date":"2012-05-14T11:15:52","version":"0.019"},{"date":"2012-05-14T19:25:57","version":"0.020"},{"date":"2012-05-16T02:39:55","version":"0.021"},{"date":"2012-06-02T03:32:21","version":"0.022"},{"version":"0.023","date":"2012-09-19T16:06:37"},{"date":"2012-10-10T00:45:59","version":"0.024"},{"date":"2012-12-26T17:11:23","version":"0.025"},{"date":"2013-03-05T03:54:12","version":"0.026"},{"version":"0.027","date":"2013-03-05T17:04:07"},{"date":"2013-03-05T19:13:42","version":"0.028"},{"version":"0.029","date":"2013-04-17T17:51:23"},{"date":"2013-06-13T15:47:33","version":"0.030"},{"version":"0.031","date":"2013-06-17T03:18:45"},{"date":"2013-06-20T15:42:26","version":"0.032"},{"version":"0.033","date":"2013-06-21T10:27:45"},{"date":"2013-06-26T23:03:50","version":"0.034"},{"date":"2013-09-10T16:30:04","version":"0.035"},{"version":"0.036","date":"2013-09-25T16:11:04"},{"date":"2013-10-28T17:50:02","version":"0.037"},{"version":"0.038","date":"2013-11-18T17:57:17"},{"date":"2013-11-28T00:49:36","version":"0.039"},{"date":"2014-02-17T18:05:10","version":"0.040"},{"date":"2014-02-17T18:09:12","version":"0.041"},{"date":"2014-02-18T16:24:50","version":"0.042"},{"date":"2014-02-21T01:42:05","version":"0.043"},{"version":"0.044","date":"2014-07-17T03:47:41"},{"version":"0.045","date":"2014-07-20T23:24:33"},{"date":"2014-07-21T14:33:53","version":"0.046"},{"date":"2014-07-29T18:13:01","version":"0.047"},{"date":"2014-08-21T17:20:45","version":"0.048"},{"version":"0.049","date":"2014-09-02T15:21:17"},{"date":"2014-09-23T19:32:00","version":"0.050"},{"version":"0.051","date":"2014-11-18T03:59:56"},{"date":"2014-12-11T20:25:19","version":"0.052"},{"version":"0.053","date":"2014-12-12T04:43:37"},{"version":"0.054","date":"2015-01-27T12:18:58"},{"date":"2015-05-07T22:15:24","version":"0.055"},{"date":"2015-05-19T10:01:27","version":"0.056"},{"version":"0.057","date":"2016-04-18T14:19:09"},{"date":"2016-05-03T17:49:33","version":"0.058"},{"version":"0.059","date":"2016-07-29T20:12:12"},{"version":"0.061","date":"2016-08-05T16:12:02"},{"version":"0.063","date":"2016-08-08T16:20:33"},{"version":"0.064","date":"2016-08-17T01:43:01"},{"version":"0.065","date":"2016-09-10T02:43:48"},{"date":"2016-09-14T15:45:04","version":"0.067"},{"date":"2016-09-23T20:15:05","version":"0.068"},{"version":"0.069","date":"2016-10-05T15:37:11"},{"version":"0.070","date":"2016-10-10T03:25:33"},{"date":"2018-07-24T15:35:02","version":"0.073"},{"version":"0.074","date":"2018-07-30T19:37:29"},{"date":"2018-08-01T11:10:11","version":"0.075"},{"version":"0.076","date":"2018-08-06T01:09:54"},{"date":"2021-07-22T17:08:36","version":"0.077"},{"version":"0.078","date":"2021-08-02T13:26:31"},{"date":"2021-11-04T16:34:59","version":"0.079"},{"date":"2021-11-05T12:17:42","version":"0.080"},{"version":"0.081","date":"2022-07-17T13:02:38"},{"version":"0.082","date":"2022-07-25T13:47:22"},{"date":"2023-06-11T11:06:38","version":"0.083"},{"version":"0.084","date":"2023-06-14T10:35:44"},{"date":"2023-06-22T14:07:29","version":"0.086"},{"version":"0.088","date":"2023-07-11T12:54:02"},{"version":"0.089","date":"2024-10-21T07:38:21"},{"date":"2024-11-12T10:52:55","version":"0.090"},{"dual_lived":1,"date":"2017-01-14T00:00:00","perl_release":"5.022003","version":"0.054_01"},{"date":"2017-01-14T00:00:00","dual_lived":1,"version":"0.056_001","perl_release":"5.024001"}],"advisories":[{"id":"CPANSA-HTTP-Tiny-2023-31486","cves":["CVE-2023-31486"],"reported":"2023-02-14","references":["https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/","https://github.com/chansen/p5-http-tiny/issues/152","https://github.com/chansen/p5-http-tiny/pull/151","https://hackeriet.github.io/cpan-http-tiny-overview/","https://www.reddit.com/r/perl/comments/111tadi/psa_httptiny_disabled_ssl_verification_by_default/","https://github.com/NixOS/nixpkgs/pull/187480","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962407","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=954089","https://salsa.debian.org/perl-team/interpreter/perl/-/commit/1490431e40e22052f75a0b3449f1f53cbd27ba92.patch","https://github.com/chansen/p5-http-tiny/issues/134","https://github.com/chansen/p5-http-tiny/issues/68"],"distribution":"HTTP-Tiny","affected_versions":["<0.083"],"description":"HTTP::Tiny v0.082, a Perl core module since v5.13.9 and available standalone on CPAN, does not verify TLS certs by default. Users must opt-in with the verify_SSL=>1 flag to verify certs when using HTTPS.\nResulting in a CWE-1188: Insecure Default Initialization of Resource weakness.\n","fixed_versions":[">=0.083"]},{"cves":["CVE-2016-1238"],"distribution":"HTTP-Tiny","references":["https://metacpan.org/changes/distribution/HTTP-Tiny","https://github.com/chansen/p5-http-tiny/commit/b239c95ea7a256cfee9b8848f1bd4d1df6e66444"],"reported":"2016-07-29","id":"CPANSA-HTTP-Tiny-2016-1238","description":"Loading modules from . (current directory).\n","fixed_versions":[">=0.059"],"affected_versions":["<0.059"]},{"id":"CPANSA-HTTP-Tiny-2013-01","distribution":"HTTP-Tiny","references":["https://metacpan.org/dist/HTTP-Tiny/changes"],"reported":"2013-11-27","cves":[],"affected_versions":["<0.039"],"fixed_versions":[">=0.039"],"description":"Temporary file creating during mirror() not opened exclusively.\n"}]},"Zonemaster-Backend":{"main_module":"Zonemaster::Backend","advisories":[{"severity":null,"cves":[],"references":["https://github.com/zonemaster/zonemaster-backend/issues/838","https://metacpan.org/dist/Zonemaster-Backend/changes"],"reported":"2021-08-05","distribution":"Zonemaster-Backend","id":"CPANSA-Zonemaster-Backend-2021-001","description":"When running the API behind a reverse proxy on the same machine (like it is using the configuration example provided by the GUI) the remote ip might always be localhost even if the query was done from elsewher\n","fixed_versions":[">=7.0.0"],"affected_versions":["<7.0.0"]},{"id":"CPANSA-Zonemaster-Backend-2015-001","distribution":"Zonemaster-Backend","references":["https://github.com/zonemaster/zonemaster-backend/issues/25","https://metacpan.org/dist/Zonemaster-Backend/changes"],"reported":"2015-01-28","cves":[],"severity":null,"affected_versions":["<1.0.1"],"description":"Potential SQL injection.\n","fixed_versions":[">=1.0.1"]}],"versions":[{"version":"2.0.0","date":"2017-11-02T13:57:24"},{"date":"2018-01-12T17:25:15","version":"2.0.1"},{"version":"2.0.2","date":"2018-02-23T13:09:41"},{"version":"2.1.0","date":"2018-06-25T08:43:15"},{"date":"2019-05-24T07:07:47","version":"4.0.0"},{"date":"2019-05-31T16:42:26","version":"4.0.1"},{"version":"5.0.0","date":"2020-05-01T14:49:55"},{"version":"5.0.1","date":"2020-05-15T12:59:00"},{"version":"5.0.2","date":"2020-05-22T07:31:56"},{"version":"6.0.0","date":"2020-11-09T09:49:51"},{"version":"6.0.1","date":"2020-11-10T10:02:13"},{"date":"2020-11-18T09:08:50","version":"6.0.2"},{"version":"6.1.0","date":"2021-02-09T11:02:57"},{"version":"6.2.0","date":"2021-05-31T20:39:03"},{"date":"2021-09-18T14:05:03","version":"7.0.0"},{"date":"2021-12-06T00:20:51","version":"8.0.0"},{"version":"8.1.0","date":"2021-12-20T10:08:13"},{"date":"2022-06-10T11:39:25","version":"9.0.0"},{"version":"9.0.1","date":"2022-07-08T08:40:31"},{"version":"10.0.0","date":"2022-12-19T09:29:40"},{"version":"10.0.1","date":"2023-01-31T16:06:19"},{"date":"2023-03-01T17:37:05","version":"10.0.2"},{"version":"11.0.0","date":"2023-06-21T16:14:40"},{"date":"2023-08-08T02:40:32","version":"11.0.1"},{"version":"11.0.2","date":"2023-09-08T09:18:30"},{"version":"11.1.0","date":"2024-03-18T15:59:50"},{"version":"11.1.1","date":"2024-03-28T10:49:24"},{"date":"2024-07-01T15:45:21","version":"11.2.0"},{"version":"11.3.0","date":"2024-12-09T13:52:41"}]},"Mojolicious-Plugin-OAuth2":{"main_module":"Mojolicious::Plugin::OAuth2","advisories":[{"id":"CPANSA-Mojolicious-Plugin-OAuth2-2014-01","cves":[],"distribution":"Mojolicious-Plugin-OAuth2","reported":"2014-10-07","references":["https://metacpan.org/changes/distribution/Mojolicious-Plugin-OAuth2","https://github.com/marcusramberg/Mojolicious-Plugin-OAuth2/commit/68315d329059b427e13d486c0e10733f728709aa"],"affected_versions":["<1.3"],"description":"Param injection in case of several parameters of the same name are present.\n","fixed_versions":[">=1.3"]}],"versions":[{"date":"2011-01-08T11:03:42","version":"0.01"},{"version":"0.02","date":"2011-01-09T18:00:14"},{"version":"0.1","date":"2011-04-03T16:00:38"},{"version":"0.2","date":"2011-08-01T16:56:18"},{"date":"2011-09-04T19:42:29","version":"0.3"},{"date":"2011-09-07T16:59:50","version":"0.4"},{"version":"0.5","date":"2011-10-19T11:55:32"},{"version":"0.6","date":"2012-03-09T21:15:39"},{"version":"0.7","date":"2012-05-30T11:49:29"},{"version":"0.8","date":"2012-08-23T20:18:41"},{"version":"0.9","date":"2013-05-20T05:55:18"},{"version":"1.0","date":"2013-11-06T13:24:52"},{"date":"2014-03-13T08:18:10","version":"1.1"},{"date":"2014-09-06T13:49:59","version":"1.2"},{"version":"1.3","date":"2014-10-07T05:49:16"},{"version":"1.4","date":"2015-03-01T20:09:19"},{"date":"2015-03-02T07:32:59","version":"1.5"},{"version":"1.51","date":"2015-03-18T16:40:18"},{"version":"1.52","date":"2015-04-06T20:46:39"},{"date":"2015-09-08T07:27:41","version":"1.53"},{"version":"1.54","date":"2018-08-30T10:48:55"},{"version":"1.55","date":"2018-09-08T18:30:54"},{"version":"1.56","date":"2018-09-23T22:04:16"},{"version":"1.57","date":"2018-09-24T08:55:14"},{"date":"2019-07-03T12:24:11","version":"1.58"},{"date":"2021-02-16T23:34:41","version":"1.59"},{"version":"2.00","date":"2021-10-27T10:37:42"},{"version":"2.01","date":"2021-10-28T09:30:06"},{"date":"2022-02-08T09:50:33","version":"2.02"}]},"Imager":{"main_module":"Imager","versions":[{"date":"1999-07-19T14:26:37","version":"0.21"},{"date":"2000-01-03T20:14:03","version":"0.27"},{"version":"0.28","date":"2000-01-04T11:16:56"},{"date":"2000-01-05T10:48:05","version":"0.29"},{"version":"0.31","date":"2000-01-16T12:52:22"},{"version":"0.32","date":"2000-03-04T13:28:32"},{"version":"0.35","date":"2001-01-29T00:50:14"},{"date":"2001-01-29T15:06:27","version":"0.36"},{"version":"0.37","date":"2001-01-31T05:02:15"},{"date":"2001-05-21T16:21:08","version":"0.38"},{"version":"0.39","date":"2001-11-02T21:39:20"},{"date":"2002-04-11T15:09:57","version":"0.40"},{"version":"0.41","date":"2002-04-12T12:07:29"},{"date":"2004-01-04T12:47:37","version":"0.42"},{"date":"2004-02-17T07:53:52","version":"0.43"},{"version":"0.43_03","date":"2004-12-07T23:58:16"},{"version":"0.44","date":"2004-12-15T13:02:40"},{"version":"0.44_01","date":"2005-05-24T07:08:15"},{"date":"2005-05-30T04:41:43","version":"0.45"},{"version":"0.45_02","date":"2005-12-12T04:07:30"},{"date":"2005-12-20T00:13:31","version":"0.46"},{"date":"2005-12-30T06:05:50","version":"0.47"},{"date":"2006-02-21T06:09:30","version":"0.47_01"},{"date":"2006-03-03T05:06:46","version":"0.48"},{"version":"0.49","date":"2006-03-07T01:04:03"},{"version":"0.49_01","date":"2006-03-28T04:31:56"},{"date":"2006-03-29T00:31:03","version":"0.50"},{"version":"0.51","date":"2006-04-23T14:29:42"},{"version":"0.51_01","date":"2006-06-28T13:38:48"},{"date":"2006-07-04T14:03:23","version":"0.51_02"},{"version":"0.51_03","date":"2006-07-19T00:58:22"},{"version":"0.52","date":"2006-07-25T05:09:08"},{"date":"2006-07-27T01:01:57","version":"0.53"},{"date":"2006-09-14T07:58:27","version":"0.54"},{"version":"0.55","date":"2006-12-16T22:31:19"},{"date":"2007-04-01T12:30:34","version":"0.56"},{"version":"0.57","date":"2007-04-30T08:49:39"},{"date":"2007-05-11T11:00:18","version":"0.57_01"},{"version":"0.58","date":"2007-05-16T12:49:23"},{"date":"2007-06-14T07:33:05","version":"0.59"},{"date":"2007-08-30T07:51:36","version":"0.60"},{"date":"2007-11-05T07:53:45","version":"0.61"},{"version":"0.61_02","date":"2007-11-28T10:06:27"},{"version":"0.62","date":"2007-12-10T08:31:12"},{"date":"2008-04-07T08:49:14","version":"0.63"},{"version":"0.64","date":"2008-04-23T04:10:18"},{"version":"0.65","date":"2008-05-20T06:34:48"},{"version":"0.67","date":"2008-12-12T11:57:40"},{"version":"0.67_01","date":"2009-09-02T07:05:11"},{"date":"2009-09-07T05:14:24","version":"0.68"},{"date":"2009-09-08T09:23:38","version":"0.69"},{"date":"2009-09-21T03:36:15","version":"0.70"},{"version":"0.71","date":"2009-11-16T04:15:54"},{"version":"0.71_01","date":"2009-11-30T07:17:33"},{"version":"0.71_02","date":"2009-12-01T09:06:53"},{"date":"2009-12-04T14:21:49","version":"0.71_03"},{"date":"2009-12-10T00:44:51","version":"0.72"},{"date":"2010-03-15T07:24:59","version":"0.73"},{"date":"2010-05-06T14:29:21","version":"0.74"},{"date":"2010-06-20T10:47:23","version":"0.75"},{"version":"0.75_01","date":"2010-08-06T10:49:44"},{"version":"0.75_02","date":"2010-08-07T01:48:37"},{"version":"0.75_03","date":"2010-08-09T12:49:36"},{"date":"2010-08-11T09:33:24","version":"0.77"},{"version":"0.77_01","date":"2010-09-13T10:48:57"},{"date":"2010-09-27T04:59:03","version":"0.77_02"},{"version":"0.78","date":"2010-10-04T09:00:26"},{"version":"0.79","date":"2010-12-11T01:09:12"},{"date":"2011-01-17T07:43:35","version":"0.80"},{"date":"2011-02-14T08:22:57","version":"0.81"},{"version":"0.82","date":"2011-03-14T12:18:07"},{"version":"0.82_01","date":"2011-05-17T11:15:02"},{"version":"0.83","date":"2011-05-20T14:07:44"},{"date":"2011-06-20T12:54:05","version":"0.84"},{"date":"2011-08-08T12:39:58","version":"0.84_01"},{"version":"0.84_02","date":"2011-08-22T09:28:25"},{"date":"2011-08-29T09:19:04","version":"0.85"},{"date":"2011-10-10T07:22:51","version":"0.85_01"},{"date":"2011-10-24T10:14:57","version":"0.85_02"},{"version":"0.86","date":"2011-10-31T10:37:15"},{"date":"2012-01-03T05:27:14","version":"0.87"},{"date":"2012-02-22T05:13:09","version":"0.88"},{"version":"0.89","date":"2012-03-18T01:45:35"},{"version":"0.90","date":"2012-04-30T09:09:02"},{"version":"0.91","date":"2012-06-04T12:27:17"},{"date":"2012-08-14T09:53:38","version":"0.92"},{"version":"0.92_01","date":"2012-08-18T01:41:22"},{"date":"2012-10-15T10:15:07","version":"0.93"},{"date":"2012-11-12T10:44:54","version":"0.93_01"},{"date":"2012-11-25T00:13:16","version":"0.93_02"},{"date":"2012-12-14T22:59:55","version":"0.94"},{"date":"2013-03-02T08:34:07","version":"0.94_01"},{"date":"2013-04-05T06:19:32","version":"0.94_02"},{"date":"2013-04-19T12:13:27","version":"0.95"},{"date":"2013-05-19T04:27:19","version":"0.96"},{"version":"0.96_01","date":"2013-07-01T13:21:32"},{"date":"2013-07-09T13:46:48","version":"0.96_02"},{"version":"0.97","date":"2013-07-15T09:52:06"},{"date":"2014-01-02T22:22:03","version":"0.98"},{"version":"0.99","date":"2014-06-25T11:36:29"},{"version":"0.99_01","date":"2014-06-29T05:06:45"},{"version":"0.99_02","date":"2014-07-21T09:16:17"},{"version":"1.000","date":"2014-07-29T09:13:55"},{"version":"1.001","date":"2015-01-02T03:34:59"},{"version":"1.002","date":"2015-04-03T01:31:26"},{"date":"2015-05-12T08:11:18","version":"1.003"},{"version":"1.004","date":"2015-11-08T09:45:59"},{"version":"1.004_001","date":"2016-03-16T08:35:26"},{"version":"1.004_002","date":"2016-03-20T01:27:53"},{"version":"1.004_003","date":"2016-03-23T09:34:13"},{"version":"1.004_004","date":"2016-04-15T05:58:07"},{"version":"1.005","date":"2016-04-16T00:01:33"},{"version":"1.006","date":"2017-08-26T04:27:06"},{"version":"1.007","date":"2018-11-24T01:47:34"},{"version":"1.008","date":"2018-12-31T10:04:02"},{"version":"1.009","date":"2019-01-11T09:10:13"},{"version":"1.010","date":"2019-02-13T08:14:07"},{"date":"2019-03-07T03:20:03","version":"1.011"},{"date":"2020-06-14T03:26:02","version":"1.012"},{"version":"1.013","date":"2022-04-27T05:18:23"},{"version":"1.014","date":"2022-04-28T07:22:51"},{"date":"2022-05-07T04:35:16","version":"1.015"},{"version":"1.016","date":"2022-06-12T05:27:23"},{"version":"1.017","date":"2022-06-14T09:55:03"},{"version":"1.018","date":"2022-06-19T12:04:12"},{"version":"1.019","date":"2022-07-09T03:41:29"},{"date":"2023-11-12T06:55:05","version":"1.020"},{"date":"2023-12-01T06:53:47","version":"1.021"},{"version":"1.022","date":"2023-12-02T23:32:54"},{"date":"2024-01-19T03:18:43","version":"1.023"},{"version":"1.024","date":"2024-04-06T02:24:09"},{"date":"2024-04-14T12:28:26","version":"1.024_001"},{"date":"2024-04-20T07:15:38","version":"1.024_002"},{"version":"1.024_003","date":"2024-04-22T12:51:23"},{"version":"1.024_004","date":"2024-04-24T08:35:58"},{"date":"2024-04-27T01:24:42","version":"1.024_005"},{"version":"1.024_006","date":"2024-06-11T11:35:22"},{"version":"1.024_007","date":"2024-06-12T09:58:08"},{"date":"2024-06-13T10:45:14","version":"1.024_008"},{"date":"2024-11-16T05:30:21","version":"1.025"},{"date":"2025-02-08T05:03:18","version":"1.026"},{"date":"2025-03-02T10:22:16","version":"1.027"}],"advisories":[{"cves":["CVE-2016-1238"],"severity":"high","distribution":"Imager","reported":"2016-08-02","references":["https://metacpan.org/dist/Imager/changes","http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"reviewed_by":[{"email":"rrwo@cpan.org","name":"Robert Rothenberg","date":"2022-06-23"}],"id":"CPANSA-Imager-2016-1238","fixed_versions":[">=1.006"],"description":"Imager would search the default current directory entry in @INC when searching for file format support modules.\n","affected_versions":["<1.006"]},{"references":["https://metacpan.org/dist/Imager/changes","http://rt.cpan.org/Public/Bug/Display.html?id=35324","http://imager.perl.org/i/release064/Imager_0_64","https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00569.html","http://www.securityfocus.com/bid/28980","http://secunia.com/advisories/30030","http://secunia.com/advisories/30011","http://www.vupen.com/english/advisories/2008/1387/references","https://exchange.xforce.ibmcloud.com/vulnerabilities/41986"],"reported":"2008-04-24","distribution":"Imager","severity":null,"cves":["CVE-2008-1928"],"id":"CPANSA-Imager-2008-1928","reviewed_by":[{"email":"rrwo@cpan.org","name":"Robert Rothenberg","date":"2022-06-23"}],"fixed_versions":[">=0.64"],"description":"Buffer overflow in Imager 0.42 through 0.63 allows attackers to cause a denial of service (crash) via an image based fill in which the number of input channels is different from the number of output channels.\n","affected_versions":[">=0.42,<=0.63"]},{"references":["http://imager.perl.org/a/65.html","http://rt.cpan.org/Public/Bug/Display.html?id=26811","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=421582","http://www.debian.org/security/2008/dsa-1498","http://www.securityfocus.com/bid/23711","http://secunia.com/advisories/25038","http://secunia.com/advisories/28868","http://osvdb.org/39846","http://www.vupen.com/english/advisories/2007/1587","http://osvdb.org/35470","https://exchange.xforce.ibmcloud.com/vulnerabilities/34010"],"reported":"2007-05-02","distribution":"Imager","severity":null,"cves":["CVE-2007-2459"],"id":"CPANSA-Imager-2007-2459","reviewed_by":[{"email":"rrwo@cpan.org","name":"Robert Rothenberg","date":"2022-06-23"}],"description":"Heap-based buffer overflow in the BMP reader (bmp.c) in Imager perl module (libimager-perl) 0.45 through 0.56 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted 8-bit/pixel compressed BMP files.\n","fixed_versions":[">=0.57"],"affected_versions":[">=0.21,<=0.56"]},{"affected_versions":["<0.98"],"description":"When drawing on an image with an alpha channel where the source minimum is greater than zero, Imager would read from beyond the end of a malloc() allocated buffer. In rare circumstances this could lead to some of the source image not being written to the target image, or possibly to a segmentation fault.\n","fixed_versions":[">=0.98"],"id":"CPANSA-Imager-2014-01","reported":"2014-01-03","references":["https://metacpan.org/dist/Imager/changes"],"distribution":"Imager","severity":null,"cves":[]},{"id":"CPANSA-Imager-2024-001","severity":"moderate","cves":["CVE-2024-53901"],"references":["https://metacpan.org/dist/Imager/changes","https://github.com/tonycoz/imager/issues/534"],"reported":"2024-11-17","distribution":"Imager","affected_versions":["<=1.024"],"fixed_versions":[">1.024"],"description":"\"invalid next size\" backtrace on use of trim on certain images\n"},{"affected_versions":["<0.50"],"fixed_versions":[">=0.50"],"description":"Imager (libimager-perl) before 0.50 allows user-assisted attackers to cause a denial of service (segmentation fault) by writing a 2- or 4-channel JPEG image (or a 2-channel TGA image) to a scalar, which triggers a NULL pointer dereference.\n","id":"CPANSA-Imager-2006-0053","reported":"2006-04-10","references":["http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=359661","http://rt.cpan.org/Public/Bug/Display.html?id=18397","http://secunia.com/advisories/19575","http://secunia.com/advisories/19577","http://www.debian.org/security/2006/dsa-1028","http://www.securityfocus.com/bid/17415","http://www.vupen.com/english/advisories/2006/1294","https://exchange.xforce.ibmcloud.com/vulnerabilities/25717","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=359661","http://rt.cpan.org/Public/Bug/Display.html?id=18397","http://secunia.com/advisories/19575","http://secunia.com/advisories/19577","http://www.debian.org/security/2006/dsa-1028","http://www.securityfocus.com/bid/17415","http://www.vupen.com/english/advisories/2006/1294","https://exchange.xforce.ibmcloud.com/vulnerabilities/25717"],"distribution":"Imager","severity":null,"cves":["CVE-2006-0053"]}]},"Crypt-Primes":{"main_module":"Crypt::Primes","versions":[{"date":"2000-11-09T23:33:04","version":"0.38"},{"date":"2001-03-05T09:29:12","version":"0.46"},{"date":"2001-06-11T09:15:28","version":"0.49"},{"version":"0.50","date":"2003-01-16T20:11:04"},{"version":"0.51","date":"2025-01-25T02:41:34"},{"date":"2025-01-25T13:14:32","version":"0.52"}],"advisories":[{"id":"CPANSA-Crypt-Primes-2024-001","distribution":"Crypt-Primes","reported":null,"references":["https://rt.cpan.org/Public/Bug/Display.html?id=128058","https://github.com/atoomic/Crypt-Primes/pull/2","https://github.com/perl-Crypt-OpenPGP/Crypt-Primes/blob/main/Changes"],"cves":[],"severity":null,"affected_versions":["<0.52"],"description":"bin/largeprimes uses a custom shebang, which allows it to load modules from several locations: '..', '../lib', 'lib'. This could lead to load modules from an unpredictable location depending from where the script is run and what user is running it.\n","fixed_versions":[">=0.52"]}]},"MT":{"advisories":[{"affected_versions":[">=4.20,<=4.38"],"darkpan":"true","description":"lib/MT/Upgrade.pm in mt-upgrade.cgi in Movable Type 4.2x and 4.3x through 4.38 does not require authentication for requests to database-migration functions, which allows remote attackers to conduct eval injection and SQL injection attacks via crafted parameters, as demonstrated by an eval injection attack against the core_drop_meta_for_table function, leading to execution of arbitrary Perl code.\n","fixed_versions":[],"id":"CPANSA-MT-2013-0209","references":["http://www.sec-1.com/blog/wp-content/uploads/2013/01/movabletype_upgrade_exec.rb_.txt","http://www.movabletype.org/2013/01/movable_type_438_patch.html","http://openwall.com/lists/oss-security/2013/01/22/3","http://www.sec-1.com/blog/?p=402"],"reported":"2013-01-23","distribution":"MT","severity":null,"cves":["CVE-2013-0209"]},{"reported":"2022-08-24","references":["https://movabletype.org/news/2022/08/mt-795-687-released.html","https://jvn.jp/en/jp/JVN57728859/index.html"],"distribution":"MT","severity":"critical","cves":["CVE-2022-38078"],"id":"CPANSA-MT-2022-38078","description":"Movable Type XMLRPC API provided by Six Apart Ltd. contains a command injection vulnerability. Sending a specially crafted message by POST method to Movable Type XMLRPC API may allow arbitrary Perl script execution, and an arbitrary OS command may be executed through it. Affected products and versions are as follows: Movable Type 7 r.5202 and earlier, Movable Type Advanced 7 r.5202 and earlier, Movable Type 6.8.6 and earlier, Movable Type Advanced 6.8.6 and earlier, Movable Type Premium 1.52 and earlier, and Movable Type Premium Advanced 1.52 and earlier. Note that all versions of Movable Type 4.0 or later including unsupported (End-of-Life, EOL) versions are also affected by this vulnerability.\n","fixed_versions":[">=7.9.5",">=6.8.7,<7"],"affected_versions":[">=7,<=7.9.4",">=6,<=6.8.6",">=4,<=5"],"darkpan":"true"},{"cves":["CVE-2021-20837"],"severity":"critical","distribution":"MT","references":["https://jvn.jp/en/jp/JVN41119755/index.html","https://movabletype.org/news/2021/10/mt-782-683-released.html","http://packetstormsecurity.com/files/164818/Movable-Type-7-r.5002-XMLRPC-API-Remote-Command-Injection.html","http://packetstormsecurity.com/files/164705/Movable-Type-7-r.5002-XMLRPC-API-Remote-Command-Injection.html"],"reported":"2021-10-26","id":"CPANSA-MT-2021-20837","fixed_versions":[],"description":"Movable Type 7 r.5002 and earlier (Movable Type 7 Series), Movable Type 6.8.2 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.5002 and earlier (Movable Type Advanced 7 Series), Movable Type Advanced 6.8.2 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.46 and earlier, and Movable Type Premium Advanced 1.46 and earlier allow remote attackers to execute arbitrary OS commands via unspecified vectors. Note that all versions of Movable Type 4.0 or later including unsupported (End-of-Life, EOL) versions are also affected by this vulnerability.\n","darkpan":"true","affected_versions":[">=7,<=7.8.1",">=6,<=6.8.2","<6"]},{"affected_versions":[">=7,<7.8.0"],"darkpan":"true","description":"Cross-site scripting vulnerability in Setting screen of ContentType Information Widget Plugin of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), and Movable Type Premium 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.\n","fixed_versions":[],"id":"CPANSA-MT-2021-20814","references":["https://movabletype.org/news/2021/08/mt-780-681-released.html","https://jvn.jp/en/jp/JVN97545738/index.html"],"reported":"2021-08-26","distribution":"MT","severity":"medium","cves":["CVE-2021-20814"]},{"fixed_versions":[],"description":"Cross-site scripting vulnerability in Edit screen of Content Data of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series) and Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series)) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.\n","darkpan":"true","affected_versions":[">=7,<7.8.0"],"cves":["CVE-2021-20813"],"severity":"medium","distribution":"MT","references":["https://movabletype.org/news/2021/08/mt-780-681-released.html","https://jvn.jp/en/jp/JVN97545738/index.html"],"reported":"2021-08-26","id":"CPANSA-MT-2021-20813"},{"cves":["CVE-2021-20815"],"severity":"medium","distribution":"MT","references":["https://movabletype.org/news/2021/08/mt-780-681-released.html","https://jvn.jp/en/jp/JVN97545738/index.html"],"reported":"2021-08-26","id":"CPANSA-MT-2021-20815","fixed_versions":[],"description":"Cross-site scripting vulnerability in Edit Boilerplate screen of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type 6.8.0 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.44 and earlier, and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.\n","darkpan":"true","affected_versions":[">=7,<7.8.0",">=6,<=6.8.0"]},{"id":"CPANSA-MT-2021-20811","cves":["CVE-2021-20811"],"severity":"medium","distribution":"MT","reported":"2021-08-26","references":["https://movabletype.org/news/2021/08/mt-780-681-released.html","https://jvn.jp/en/jp/JVN97545738/index.html"],"darkpan":"true","affected_versions":[">=7,<7.8.0",">=6,<=6.8.0"],"fixed_versions":[],"description":"Cross-site scripting vulnerability in List of Assets screen of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type 6.8.0 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.44 and earlier, and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.\n"},{"affected_versions":[">=7,<7.8.0",">=6,<=6.8.0"],"darkpan":"true","fixed_versions":[],"description":"Cross-site scripting vulnerability in Website Management screen of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type 6.8.0 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.44 and earlier, and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.\n","id":"CPANSA-MT-2021-20810","references":["https://movabletype.org/news/2021/08/mt-780-681-released.html","https://jvn.jp/en/jp/JVN97545738/index.html"],"reported":"2021-08-26","distribution":"MT","severity":"medium","cves":["CVE-2021-20810"]},{"affected_versions":[">=7,<7.8.0",">=6,<=6.8.0"],"darkpan":"true","description":"Cross-site scripting vulnerability in Create screens of Entry, Page, and Content Type of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type 6.8.0 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.44 and earlier, and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.\n","fixed_versions":[],"id":"CPANSA-MT-2021-20809","distribution":"MT","references":["https://movabletype.org/news/2021/08/mt-780-681-released.html","https://jvn.jp/en/jp/JVN97545738/index.html"],"reported":"2021-08-26","cves":["CVE-2021-20809"],"severity":"medium"},{"id":"CPANSA-MT-2021-20808","reported":"2021-08-26","references":["https://movabletype.org/news/2021/08/mt-780-681-released.html","https://jvn.jp/en/jp/JVN97545738/index.html"],"distribution":"MT","severity":"medium","cves":["CVE-2021-20808"],"affected_versions":[">=7,<7.8.0",">=6,<=6.8.0"],"darkpan":"true","fixed_versions":[],"description":"Cross-site scripting vulnerability in Search screen of Movable Type (Movable Type 7 r.4903 and earlier (Movable Type 7 Series), Movable Type 6.8.0 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.44 and earlier, and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.\n"},{"id":"CPANSA-MT-2020-5669","cves":["CVE-2020-5669"],"severity":"medium","distribution":"MT","references":["https://www.sixapart.jp/movabletype/news/2020/11/18-1101.html","https://jvn.jp/en/jp/JVN94245475/index.html"],"reported":"2021-10-26","darkpan":"true","affected_versions":["<=1.37"],"description":"Cross-site scripting vulnerability in Movable Type Movable Type Premium 1.37 and earlier and Movable Type Premium Advanced 1.37 and earlier allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors.\n","fixed_versions":[]},{"affected_versions":[">=7,<7.2.1",">=6,<=6.5.3"],"darkpan":"true","description":"Movable Type series (Movable Type 7 r.4606 (7.2.1) and earlier (Movable Type 7), Movable Type Advanced 7 r.4606 (7.2.1) and earlier (Movable Type Advanced 7), Movable Type for AWS 7 r.4606 (7.2.1) and earlier (Movable Type for AWS 7), Movable Type 6.5.3 and earlier (Movable Type 6.5), Movable Type Advanced 6.5.3 and earlier (Movable Type Advanced 6.5), Movable Type 6.3.11 and earlier (Movable Type 6.3), Movable Type Advanced 6.3.11 and earlier (Movable Type 6.3), Movable Type Premium 1.29 and earlier, and Movable Type Premium Advanced 1.29 and earlier) allow remote authenticated attackers to upload arbitrary files and execute a php script via unspecified vectors.\n","fixed_versions":[],"id":"CPANSA-MT-2020-5577","references":["https://jvn.jp/en/jp/JVN28806943/index.html","https://movabletype.org/news/2020/05/mt-730-660-6312-released.html"],"reported":"2020-05-14","distribution":"MT","severity":"high","cves":["CVE-2020-5577"]},{"severity":"high","cves":["CVE-2020-5576"],"reported":"2020-05-14","references":["https://jvn.jp/en/jp/JVN28806943/index.html","https://movabletype.org/news/2020/05/mt-730-660-6312-released.html"],"distribution":"MT","id":"CPANSA-MT-2020-5576","fixed_versions":[],"description":"Cross-site request forgery (CSRF) vulnerability in Movable Type series (Movable Type 7 r.4606 (7.2.1) and earlier (Movable Type 7), Movable Type Advanced 7 r.4606 (7.2.1) and earlier (Movable Type Advanced 7), Movable Type for AWS 7 r.4606 (7.2.1) and earlier (Movable Type for AWS 7), Movable Type 6.5.3 and earlier (Movable Type 6.5), Movable Type Advanced 6.5.3 and earlier (Movable Type Advanced 6.5), Movable Type 6.3.11 and earlier (Movable Type 6.3), Movable Type Advanced 6.3.11 and earlier (Movable Type 6.3), Movable Type Premium 1.29 and earlier, and Movable Type Premium Advanced 1.29 and earlier) allows remote attackers to hijack the authentication of administrators via unspecified vectors.\n","darkpan":"true","affected_versions":[">=7,<7.2.1",">=6,<=6.5.3"]},{"cves":["CVE-2020-5575"],"severity":"medium","distribution":"MT","reported":"2020-05-14","references":["https://jvn.jp/en/jp/JVN28806943/index.html","https://movabletype.org/news/2020/05/mt-730-660-6312-released.html"],"id":"CPANSA-MT-2020-5575","description":"Cross-site scripting vulnerability in Movable Type series (Movable Type 7 r.4606 (7.2.1) and earlier (Movable Type 7), Movable Type Advanced 7 r.4606 (7.2.1) and earlier (Movable Type Advanced 7), Movable Type for AWS 7 r.4606 (7.2.1) and earlier (Movable Type for AWS 7), Movable Type 6.5.3 and earlier (Movable Type 6.5), Movable Type Advanced 6.5.3 and earlier (Movable Type Advanced 6.5), Movable Type 6.3.11 and earlier (Movable Type 6.3), Movable Type Advanced 6.3.11 and earlier (Movable Type 6.3), Movable Type Premium 1.29 and earlier, and Movable Type Premium Advanced 1.29 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.\n","fixed_versions":[],"darkpan":"true","affected_versions":[">=7,<7.2.1",">=6,<=6.5.3"]},{"darkpan":"true","affected_versions":[">=7,<7.2.1",">=6,<=6.5.3"],"description":"HTML attribute value injection vulnerability in Movable Type series (Movable Type 7 r.4606 (7.2.1) and earlier (Movable Type 7), Movable Type Advanced 7 r.4606 (7.2.1) and earlier (Movable Type Advanced 7), Movable Type for AWS 7 r.4606 (7.2.1) and earlier (Movable Type for AWS 7), Movable Type 6.5.3 and earlier (Movable Type 6.5), Movable Type Advanced 6.5.3 and earlier (Movable Type Advanced 6.5), Movable Type 6.3.11 and earlier (Movable Type 6.3), Movable Type Advanced 6.3.11 and earlier (Movable Type 6.3), Movable Type Premium 1.29 and earlier, and Movable Type Premium Advanced 1.29 and earlier) allows remote attackers to inject arbitrary HTML attribute value via unspecified vectors.\n","fixed_versions":[],"id":"CPANSA-MT-2020-5574","severity":"medium","cves":["CVE-2020-5574"],"references":["https://jvn.jp/en/jp/JVN28806943/index.html","https://movabletype.org/news/2020/05/mt-730-660-6312-released.html"],"reported":"2020-05-14","distribution":"MT"},{"darkpan":"true","affected_versions":[">=7,<7.1.4",">=6,<=6.5.2"],"description":"Cross-site scripting vulnerability in Movable Type series (Movable Type 7 r.4603 and earlier (Movable Type 7), Movable Type 6.5.2 and earlier (Movable Type 6.5), Movable Type Advanced 7 r.4603 and earlier (Movable Type Advanced 7), Movable Type Advanced 6.5.2 and earlier (Movable Type Advanced 6.5), Movable Type Premium 1.26 and earlier (Movable Type Premium), and Movable Type Premium Advanced 1.26 and earlier (Movable Type Premium Advanced)) allows remote attackers to inject arbitrary web script or HTML in the block editor and the rich text editor via a specially crafted URL.\n","fixed_versions":[],"id":"CPANSA-MT-2020-5528","cves":["CVE-2020-5528"],"severity":"medium","distribution":"MT","references":["https://movabletype.org/news/2020/02/movable_type_r4605_v720_v653_and_v6311_released.html","http://jvn.jp/en/jp/JVN94435544/index.html"],"reported":"2020-02-06"},{"description":"Open redirect vulnerability in Movable Type series Movable Type 7 r.4602 (7.1.3) and earlier (Movable Type 7), Movable Type 6.5.0 and 6.5.1 (Movable Type 6.5), Movable Type 6.3.9 and earlier (Movable Type 6.3.x, 6.2.x, 6.1.x, 6.0.x), Movable Type Advanced 7 r.4602 (7.1.3) and earlier (Movable Type 7), Movable Type Advanced 6.5.0 and 6.5.1 (Movable Type 6.5), Movable Type Advanced 6.3.9 and earlier (Movable Type 6.3.x, 6.2.x, 6.1.x, 6.0.x), Movable Type Premium 1.24 and earlier (Movable Type Premium), and Movable Type Premium (Advanced Edition) 1.24 and earlier (Movable Type Premium) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a specially crafted URL.\n","fixed_versions":[],"affected_versions":[">=7,<7.1.3",">=6.5.0,<=6.5.1",">=6,<=6.3.9"],"darkpan":"true","distribution":"MT","reported":"2019-12-26","references":["https://movabletype.org/news/2019/11/movable_type_r4603_v714_v652_and_v6310_released.html","http://jvn.jp/en/jp/JVN65280626/index.html"],"cves":["CVE-2019-6025"],"severity":"medium","id":"CPANSA-MT-2019-6025"},{"fixed_versions":[],"description":"Cross-site scripting vulnerability in Movable Type versions prior to Ver. 6.3.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.\n","affected_versions":["=6.3.1"],"darkpan":"true","reported":"2018-09-04","references":["http://jvn.jp/en/jp/JVN89550319/index.html"],"distribution":"MT","severity":"medium","cves":["CVE-2018-0672"],"id":"CPANSA-MT-2018-0672"},{"cves":["CVE-2016-5742"],"severity":"critical","distribution":"MT","references":["https://movabletype.org/news/2016/06/movable_type_626_and_613_released.html","http://www.openwall.com/lists/oss-security/2016/06/22/6","http://www.openwall.com/lists/oss-security/2016/06/22/5","http://www.openwall.com/lists/oss-security/2016/06/22/3","http://www.securitytracker.com/id/1036160"],"reported":"2017-01-23","id":"CPANSA-MT-2016-5742","fixed_versions":[],"description":"SQL injection vulnerability in the XML-RPC interface in Movable Type Pro and Advanced 6.x before 6.1.3 and 6.2.x before 6.2.6 and Movable Type Open Source 5.2.13 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.\n","darkpan":"true","affected_versions":[">=6.0.0,<6.1.3",">=6.2.0,<6.2.6","<5.2.13"]},{"fixed_versions":[],"description":"Movable Type Pro, Open Source, and Advanced before 5.2.12 and Pro and Advanced 6.0.x before 6.0.7 does not properly use the Perl Storable::thaw function, which allows remote attackers to include and execute arbitrary local Perl files and possibly execute arbitrary code via unspecified vectors.\n","affected_versions":["<5.2.12",">=6.0.0,<=6.0.7"],"darkpan":"true","distribution":"MT","reported":"2015-02-19","references":["https://movabletype.org/news/2015/02/movable_type_607_and_5212_released_to_close_security_vulnera.html","http://www.securityfocus.com/bid/72606","http://www.openwall.com/lists/oss-security/2015/02/12/17","http://www.openwall.com/lists/oss-security/2015/02/12/2","https://www.debian.org/security/2015/dsa-3183","http://www.securitytracker.com/id/1031777","https://exchange.xforce.ibmcloud.com/vulnerabilities/100912"],"cves":["CVE-2015-1592"],"severity":null,"id":"CPANSA-MT-2015-1592"},{"cves":["CVE-2014-9057"],"severity":null,"distribution":"MT","reported":"2014-12-16","references":["https://movabletype.org/news/2014/12/6.0.6.html","https://movabletype.org/documentation/appendices/release-notes/6.0.6.html","http://secunia.com/advisories/61227","https://www.debian.org/security/2015/dsa-3183"],"id":"CPANSA-MT-2014-9057","description":"SQL injection vulnerability in the XML-RPC interface in Movable Type before 5.18, 5.2.x before 5.2.11, and 6.x before 6.0.6 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.\n","fixed_versions":[],"darkpan":"true","affected_versions":["<5.18",">=5.2.0,<5.2.11",">=6,<6.0.6"]},{"description":"Movable Type before 5.2.6 does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via the comment_state parameter.\n","fixed_versions":[],"darkpan":"true","affected_versions":["<5.2.6"],"cves":["CVE-2013-2184"],"severity":null,"distribution":"MT","reported":"2015-03-27","references":["https://movabletype.org/documentation/appendices/release-notes/movable-type-526-release-notes.html","http://www.debian.org/security/2015/dsa-3183","http://seclists.org/oss-sec/2013/q2/568","http://seclists.org/oss-sec/2013/q2/560"],"id":"CPANSA-MT-2013-2184"},{"id":"CPANSA-MT-2012-1503","reported":"2014-08-29","references":["http://www.cloudscan.me/2012/10/cve-2012-1503-movable-type-pro-513en.html","http://packetstormsecurity.org/files/117564/Movable-Type-Pro-5.13en-Cross-Site-Scripting.html","http://www.exploit-db.com/exploits/22151","http://osvdb.org/show/osvdb/86729","http://www.securityfocus.com/bid/56160","https://exchange.xforce.ibmcloud.com/vulnerabilities/79521"],"distribution":"MT","severity":null,"cves":["CVE-2012-1503"],"affected_versions":["=5.13"],"darkpan":"true","fixed_versions":[],"description":"Cross-site scripting (XSS) vulnerability in Six Apart (formerly Six Apart KK) Movable Type (MT) Pro 5.13 allows remote attackers to inject arbitrary web script or HTML via the comment section.\n"},{"id":"CPANSA-MT-2012-0320","distribution":"MT","reported":"2012-03-03","references":["http://www.movabletype.org/2012/02/movable_type_513_507_and_438_security_updates.html","http://www.movabletype.org/documentation/appendices/release-notes/513.html","http://jvndb.jvn.jp/jvndb/JVNDB-2012-000018","http://jvn.jp/en/jp/JVN20083397/index.html","http://www.securitytracker.com/id?1026738","http://www.securityfocus.com/bid/52138","http://www.debian.org/security/2012/dsa-2423"],"cves":["CVE-2012-0320"],"severity":null,"affected_versions":["<4.38",">=5,<5.07",">=5.10,<5.13"],"darkpan":"true","fixed_versions":[],"description":"Movable Type before 4.38, 5.0x before 5.07, and 5.1x before 5.13 allows remote attackers to take control of sessions via unspecified vectors related to the (1) commenting feature and (2) community script.\n"},{"id":"CPANSA-MT-2012-0317","cves":["CVE-2012-0317"],"severity":null,"distribution":"MT","references":["http://jvn.jp/en/jp/JVN70683217/index.html","http://www.movabletype.org/documentation/appendices/release-notes/513.html","http://www.movabletype.org/2012/02/movable_type_513_507_and_438_security_updates.html","http://jvndb.jvn.jp/jvndb/JVNDB-2012-000015","http://www.securitytracker.com/id?1026738","http://www.securityfocus.com/bid/52138","http://www.debian.org/security/2012/dsa-2423"],"reported":"2012-03-03","darkpan":"true","affected_versions":["<4.38",">=5,<5.07",">=5.10,<5.13"],"description":"Multiple cross-site request forgery (CSRF) vulnerabilities in Movable Type before 4.38, 5.0x before 5.07, and 5.1x before 5.13 allow remote attackers to hijack the authentication of arbitrary users for requests that modify data via the (1) commenting feature or (2) community script.\n","fixed_versions":[]},{"cves":["CVE-2011-5085"],"severity":null,"distribution":"MT","reported":"2012-04-02","references":["http://www.movabletype.org/2011/05/movable_type_51_and_505_436_security_update.html","http://www.debian.org/security/2012/dsa-2423"],"id":"CPANSA-MT-2011-5085","description":"Unspecified vulnerability in Movable Type 4.x before 4.36 and 5.x before 5.05 allows remote attackers to read or modify data via unknown vectors.\n","fixed_versions":[],"darkpan":"true","affected_versions":[">=4,<4.36",">=5,<5.05"]},{"description":"Cross-site scripting (XSS) vulnerability in Movable Type 4.x before 4.36 and 5.x before 5.05 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.\n","fixed_versions":[],"darkpan":"true","affected_versions":[">=4,<4.36",">=5,<5.05"],"cves":["CVE-2011-5084"],"severity":null,"distribution":"MT","references":["http://www.movabletype.org/2011/05/movable_type_51_and_505_436_security_update.html","http://www.debian.org/security/2012/dsa-2423"],"reported":"2012-04-02","id":"CPANSA-MT-2011-5084"},{"darkpan":"true","affected_versions":[">=5.0,<=5.01"],"fixed_versions":[],"description":"Multiple cross-site scripting (XSS) vulnerabilities in the administrative user interface in Six Apart Movable Type 5.0 and 5.01 allow remote attackers to inject arbitrary web script or HTML via unknown vectors.\n","id":"CPANSA-MT-2010-1985","severity":null,"cves":["CVE-2010-1985"],"references":["http://jvndb.jvn.jp/ja/contents/2010/JVNDB-2010-000017.html","http://www.movabletype.com/blog/2010/05/movable-type-502.html","http://www.vupen.com/english/advisories/2010/1136","http://secunia.com/advisories/39741","http://www.movabletype.org/documentation/appendices/release-notes/movable-type-502.html","http://jvn.jp/en/jp/JVN92854093/index.html"],"reported":"2010-05-19","distribution":"MT"},{"affected_versions":["<4.261"],"darkpan":"true","description":"Cross-site scripting (XSS) vulnerability in mt-wizard.cgi in Six Apart Movable Type before 4.261 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2009-2480.\n","fixed_versions":[],"id":"CPANSA-MT-2009-2492","distribution":"MT","references":["http://jvn.jp/en/jp/JVN86472161/index.html","http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000042.html","http://www.vupen.com/english/advisories/2009/1668","http://secunia.com/advisories/35534","http://www.securityfocus.com/bid/35885"],"reported":"2009-07-17","cves":["CVE-2009-2492"],"severity":null},{"id":"CPANSA-MT-2009-2481","references":["http://jvn.jp/en/jp/JVN08369659/index.html","http://www.vupen.com/english/advisories/2009/1668","http://www.securityfocus.com/bid/35471","http://secunia.com/advisories/35534","http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000043.html","https://exchange.xforce.ibmcloud.com/vulnerabilities/51330"],"reported":"2009-07-16","distribution":"MT","severity":null,"cves":["CVE-2009-2481"],"affected_versions":["<4.261"],"darkpan":"true","description":"mt-wizard.cgi in Six Apart Movable Type before 4.261, when global templates are not initialized, allows remote attackers to bypass access restrictions and (1) send e-mail to arbitrary addresses or (2) obtain sensitive information via unspecified vectors.\n","fixed_versions":[]},{"cves":["CVE-2009-0752"],"severity":null,"distribution":"MT","references":["http://www.movabletype.com/blog/2009/02/movable-type-424-get-updated-with-better-password-recovery.html"],"reported":"2009-03-03","id":"CPANSA-MT-2009-0752","description":"Unspecified vulnerability in Movable Type Pro and Community Solution 4.x before 4.24 has unknown impact and attack vectors, possibly related to the password recovery mechanism.\n","fixed_versions":[],"darkpan":"true","affected_versions":["<4.24"]},{"id":"CPANSA-MT-2008-5846","distribution":"MT","reported":"2009-01-05","references":["http://www.movabletype.org/mt_423_change_log.html","http://www.securityfocus.com/bid/33133","https://exchange.xforce.ibmcloud.com/vulnerabilities/47759"],"cves":["CVE-2008-5846"],"severity":null,"affected_versions":["<4.23"],"darkpan":"true","fixed_versions":[],"description":"Six Apart Movable Type (MT) before 4.23 allows remote authenticated users with create permission for posts to bypass intended access restrictions and publish posts via a \"system-wide entry listing screen.\"\n"},{"fixed_versions":[],"description":"Multiple cross-site scripting (XSS) vulnerabilities in Six Apart Movable Type (MT) before 4.23 allow remote attackers to inject arbitrary web script or HTML via a (1) MTEntryAuthorUsername, (2) MTAuthorDisplayName, (3) MTEntryAuthorDisplayName, or (4) MTCommenterName field in a Profile View template; a (5) listing screen or (6) edit screen in the CMS app; (7) a TrackBack title, related to the HTML sanitization library; or (8) a user archive name (aka archive title) on a published Community Blog template.\n","darkpan":"true","affected_versions":["<4.23"],"severity":null,"cves":["CVE-2008-5845"],"references":["http://www.movabletype.org/mt_423_change_log.html","http://jvndb.jvn.jp/ja/contents/2011/JVNDB-2011-000031.html","http://jvn.jp/en/jp/JVN45658190/index.html"],"reported":"2009-01-05","distribution":"MT","id":"CPANSA-MT-2008-5845"},{"id":"CPANSA-MT-2008-5808","cves":["CVE-2008-5808"],"severity":null,"distribution":"MT","references":["http://secunia.com/advisories/32935","http://www.securityfocus.com/bid/32604","http://jvn.jp/en/jp/JVN02216739/index.html","http://www.movabletype.jp/blog/_movable_type_423.html","http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000067.html","https://exchange.xforce.ibmcloud.com/vulnerabilities/47019"],"reported":"2009-01-02","darkpan":"true","affected_versions":[">=3,<=3.38",">=4,<4.23"],"description":"Cross-site scripting (XSS) vulnerability in Six Apart Movable Type Enterprise (MTE) 1.x before 1.56; Movable Type (MT) 3.x before 3.38; and Movable Type, Movable Type Open Source (MTOS), and Movable Type Enterprise 4.x before 4.23 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, possibly related to \"application management.\"\n","fixed_versions":[]},{"description":"Cross-site scripting vulnerability in Setting screen of Server Sync of Movable Type (Movable Type Advanced 7 r.4903 and earlier (Movable Type Advanced 7 Series) and Movable Type Premium Advanced 1.44 and earlier) allows remote attackers to inject arbitrary script or HTML via unspecified vectors.\n","fixed_versions":[],"affected_versions":[">=7,<=7.7.1"],"darkpan":"true","distribution":"MT","references":["https://movabletype.org/news/2021/08/mt-780-681-released.html","https://jvn.jp/en/jp/JVN97545738/index.html"],"reported":"2021-08-26","cves":["CVE-2021-20812"],"severity":"medium","id":"CPANSA-MT-2021-20812"},{"description":"Improper neutralization of Server-Side Includes (SSW) within a web page in Movable Type series allows a remote authenticated attacker with Privilege of 'Manage of Content Types' may execute an arbitrary Perl script and/or an arbitrary OS command. Affected products/versions are as follows: Movable Type 7 r.5301 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.5301 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.53 and earlier, and Movable Type Premium Advanced 1.53 and earlier.\n","fixed_versions":[],"affected_versions":["<=7"],"darkpan":"true","reported":"2022-12-07","references":["https://movabletype.org/news/2022/11/mt-796-688-released.html","https://jvn.jp/en/jp/JVN37014768/index.html"],"distribution":"MT","severity":null,"cves":["CVE-2022-43660"],"id":"CPANSA-MT-2022-43660"}],"versions":[],"main_module":""},"Catalyst-Plugin-Static":{"versions":[{"date":"2005-01-29T00:00:20","version":"0.01"},{"date":"2005-02-19T20:28:50","version":"0.02"},{"date":"2005-03-17T01:01:03","version":"0.03"},{"version":"0.04","date":"2005-03-17T19:10:36"},{"version":"0.05","date":"2005-03-21T13:34:27"},{"version":"0.05","date":"2005-03-23T06:48:05"},{"version":"0.06","date":"2005-04-15T16:58:18"},{"date":"2005-04-17T14:50:45","version":"0.07"},{"version":"0.08","date":"2005-09-06T13:42:42"},{"version":"0.09","date":"2005-11-14T08:38:35"},{"date":"2005-11-14T10:26:31","version":"0.10"},{"date":"2009-10-18T18:13:00","version":"0.11"}],"advisories":[{"id":"CPANSA-Catalyst-Plugin-Static-2005-01","affected_versions":["<0.10"],"description":"Serving files outside of $config->{root} directory.\n","fixed_versions":[">=0.10"],"cves":[],"reported":"2005-11-14","distribution":"Catalyst-Plugin-Static"}],"main_module":"Catalyst::Plugin::Static"},"Module-ScanDeps":{"main_module":"Module::ScanDeps","versions":[{"version":"0.01","date":"2002-11-02T02:07:07"},{"version":"0.02","date":"2002-11-02T15:56:27"},{"date":"2002-11-03T19:51:24","version":"0.03"},{"date":"2002-11-04T12:01:46","version":"0.10"},{"date":"2003-01-18T19:35:58","version":"0.12"},{"version":"0.13","date":"2003-01-18T21:08:58"},{"version":"0.14","date":"2003-01-19T15:48:47"},{"date":"2003-02-25T03:23:37","version":"0.17"},{"date":"2003-03-20T11:59:13","version":"0.18"},{"version":"0.19","date":"2003-03-22T13:20:27"},{"date":"2003-07-30T14:59:45","version":"0.20"},{"version":"0.21","date":"2003-07-30T15:18:11"},{"date":"2003-08-07T18:41:51","version":"0.22"},{"version":"0.23","date":"2003-08-08T10:19:27"},{"version":"0.24","date":"2003-08-10T05:43:06"},{"version":"0.25","date":"2003-08-10T15:46:55"},{"version":"0.27","date":"2003-08-16T04:48:20"},{"version":"0.28","date":"2003-08-17T19:03:59"},{"version":"0.29","date":"2003-09-17T09:18:20"},{"date":"2003-09-20T20:36:32","version":"0.30"},{"version":"0.31","date":"2003-10-17T22:37:35"},{"date":"2003-10-26T10:53:58","version":"0.32"},{"date":"2003-12-21T01:21:51","version":"0.33"},{"version":"0.34","date":"2003-12-30T02:36:30"},{"date":"2003-12-31T12:02:59","version":"0.35"},{"version":"0.37","date":"2003-12-31T15:33:07"},{"date":"2004-01-08T11:38:10","version":"0.38"},{"version":"0.39","date":"2004-01-25T16:28:12"},{"date":"2004-02-23T21:14:41","version":"0.40"},{"version":"0.41","date":"2004-04-18T16:05:29"},{"version":"0.42","date":"2004-04-30T20:02:44"},{"version":"0.43","date":"2004-06-02T18:05:32"},{"date":"2004-06-08T19:06:29","version":"0.44"},{"date":"2004-06-30T08:03:18","version":"0.45"},{"version":"0.46","date":"2004-07-02T10:35:16"},{"version":"0.47","date":"2004-08-30T22:13:57"},{"date":"2004-09-06T20:56:31","version":"0.48"},{"date":"2004-09-26T17:45:11","version":"0.49"},{"date":"2004-10-03T17:31:23","version":"0.50"},{"date":"2005-01-07T20:57:46","version":"0.51"},{"date":"2005-12-12T12:05:41","version":"0.52"},{"version":"0.53","date":"2006-01-09T18:07:40"},{"version":"0.54","date":"2006-01-11T03:19:40"},{"version":"0.55","date":"2006-02-17T16:39:23"},{"date":"2006-02-20T15:38:03","version":"0.56"},{"date":"2006-03-03T19:30:56","version":"0.57"},{"version":"0.58","date":"2006-04-16T14:54:53"},{"date":"2006-05-03T09:13:49","version":"0.59"},{"version":"0.60","date":"2006-05-23T15:29:09"},{"version":"0.61","date":"2006-06-30T19:12:26"},{"version":"0.62","date":"2006-07-16T09:25:37"},{"date":"2006-08-27T17:26:32","version":"0.63"},{"version":"0.64","date":"2006-09-23T07:46:41"},{"date":"2006-09-24T07:59:07","version":"0.64"},{"date":"2006-09-24T09:03:21","version":"0.66"},{"version":"0.67","date":"2006-10-24T16:12:59"},{"date":"2006-10-25T19:08:27","version":"0.68"},{"version":"0.69","date":"2006-11-07T18:16:07"},{"version":"0.70","date":"2006-11-21T11:00:52"},{"version":"0.71","date":"2007-01-04T19:28:34"},{"version":"0.72","date":"2007-02-03T10:40:10"},{"date":"2007-03-25T18:35:04","version":"0.73"},{"date":"2007-04-14T09:17:51","version":"0.73_01"},{"date":"2007-04-30T18:45:05","version":"0.74"},{"version":"0.75","date":"2007-06-24T17:25:22"},{"version":"0.76","date":"2007-07-21T15:40:54"},{"date":"2007-09-20T17:42:07","version":"0.77"},{"date":"2007-11-17T04:18:23","version":"0.78"},{"version":"0.80","date":"2007-11-30T21:08:01"},{"date":"2007-12-07T13:24:35","version":"0.81"},{"version":"0.82","date":"2008-01-28T16:33:27"},{"date":"2008-03-22T23:35:16","version":"0.83"},{"version":"0.84","date":"2008-05-13T14:39:03"},{"version":"0.86","date":"2008-10-23T13:17:33"},{"date":"2008-10-28T13:10:35","version":"0.87"},{"version":"0.83","date":"2008-11-02T16:06:00"},{"date":"2008-11-03T21:38:03","version":"0.83"},{"version":"0.90","date":"2009-05-09T09:09:37"},{"version":"0.91","date":"2009-06-22T20:07:07"},{"version":"0.92","date":"2009-07-19T08:55:54"},{"date":"2009-07-19T09:51:33","version":"0.93"},{"version":"0.94","date":"2009-08-10T18:32:02"},{"date":"2009-09-16T09:14:53","version":"0.95"},{"date":"2009-11-13T10:36:02","version":"0.96"},{"date":"2010-04-10T15:20:47","version":"0.97"},{"date":"2010-07-26T19:24:02","version":"0.98"},{"date":"2011-02-19T16:00:01","version":"1.00"},{"date":"2011-03-26T12:51:17","version":"1.01"},{"date":"2011-04-03T19:59:22","version":"1.02"},{"version":"1.03","date":"2011-07-18T21:29:19"},{"date":"2011-07-21T09:09:46","version":"1.04"},{"version":"1.05","date":"2011-11-02T18:31:39"},{"date":"2011-11-28T15:50:49","version":"1.06"},{"version":"1.07","date":"2011-11-29T18:02:00"},{"version":"1.08","date":"2012-02-21T16:07:41"},{"date":"2012-09-09T11:14:11","version":"1.09"},{"date":"2012-10-20T14:15:34","version":"1.10"},{"version":"1.11","date":"2013-09-28T10:27:58"},{"version":"1.12","date":"2013-12-01T14:49:13"},{"date":"2013-12-21T12:07:54","version":"1.13"},{"date":"2014-08-03T11:34:45","version":"1.14"},{"version":"1.15","date":"2014-08-23T15:39:26"},{"version":"1.16","date":"2014-09-28T16:17:32"},{"date":"2014-10-31T11:13:34","version":"1.17"},{"version":"1.18","date":"2015-01-19T21:56:34"},{"version":"1.19","date":"2015-05-27T08:53:42"},{"version":"1.20","date":"2015-10-04T13:18:36"},{"date":"2016-04-05T10:11:15","version":"1.21"},{"version":"1.22","date":"2016-09-17T20:57:48"},{"date":"2016-11-16T19:46:41","version":"1.23"},{"date":"2017-06-28T17:13:27","version":"1.24"},{"date":"2018-08-17T22:21:56","version":"1.25"},{"date":"2018-12-12T17:38:39","version":"1.26"},{"date":"2018-12-13T17:16:52","version":"1.26_001"},{"date":"2019-01-15T20:08:40","version":"1.27"},{"version":"1.28","date":"2020-08-06T08:02:24"},{"version":"1.29","date":"2020-08-16T12:35:20"},{"version":"1.30","date":"2021-01-13T15:02:27"},{"date":"2021-04-21T14:17:01","version":"1.31"},{"date":"2023-06-14T09:30:00","version":"1.31_001"},{"date":"2023-06-15T11:55:12","version":"1.31_002"},{"date":"2023-06-16T09:04:27","version":"1.31_003"},{"date":"2023-06-18T10:34:43","version":"1.31_004"},{"date":"2023-07-05T15:58:09","version":"1.32"},{"date":"2023-08-04T15:50:23","version":"1.33"},{"date":"2023-09-24T15:21:05","version":"1.34"},{"date":"2023-11-05T12:46:38","version":"1.35"},{"version":"1.37","date":"2024-11-19T16:12:58"}],"advisories":[{"fixed_versions":[">=1.36"],"description":"Qualys discovered that if unsanitized input was used with the library Modules::ScanDeps, before version 1.36 a local attacker could possibly execute arbitrary shell commands by open()ing a \"pesky pipe\" (such as passing \"commands|\" as a filename) or by passing arbitrary strings to eval().\n","affected_versions":["<1.36"],"reported":"2024-11-19","references":["https://github.com/rschupp/Module-ScanDeps/security/advisories/GHSA-g597-359q-v529","https://www.cve.org/CVERecord?id=CVE-2024-10224","https://www.qualys.com/2024/11/19/needrestart/needrestart.txt","https://lists.debian.org/debian-lts-announce/2024/11/msg00015.html","https://ubuntu.com/security/CVE-2024-10224"],"distribution":"Module-ScanDeps","severity":null,"cves":["CVE-2024-10224"],"id":"CPANSA-Module-ScanDeps-2024-10224"}]},"Data-UUID":{"main_module":"Data::UUID","advisories":[{"affected_versions":[">1.219,<1.227"],"description":"Perl module Data::UUID from CPAN version 1.219 vulnerable to symlink attacks\n","fixed_versions":[">=1.227"],"id":"CPANSA-Data-UUID-2013-4184","reported":"2019-12-10","references":["https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-4184","http://www.openwall.com/lists/oss-security/2013/07/31/4","http://www.securityfocus.com/bid/61534","https://exchange.xforce.ibmcloud.com/vulnerabilities/86103","https://security-tracker.debian.org/tracker/CVE-2013-4184","https://access.redhat.com/security/cve/cve-2013-4184","https://bugs.gentoo.org/show_bug.cgi?id=CVE-2013-4184"],"distribution":"Data-UUID","severity":"medium","cves":["CVE-2013-4184"]}],"versions":[{"version":"0.01","date":"2001-10-30T17:35:43"},{"date":"2001-10-31T17:16:07","version":"0.02"},{"date":"2001-11-05T17:56:17","version":"0.03"},{"version":"0.04","date":"2001-12-12T21:23:28"},{"version":"0.05","date":"2002-02-13T19:57:54"},{"date":"2002-03-11T15:42:56","version":"0.06"},{"version":"0.07","date":"2002-06-12T21:38:06"},{"date":"2002-11-29T17:19:21","version":"0.08"},{"date":"2003-02-26T21:56:46","version":"0.09"},{"date":"2003-07-17T21:55:38","version":"0.10"},{"version":"0.11","date":"2003-08-27T20:17:10"},{"version":"0.12_01","date":"2006-02-24T00:44:57"},{"date":"2006-02-25T20:45:33","version":"0.13"},{"version":"0.14","date":"2006-03-18T13:42:09"},{"date":"2006-09-06T02:19:07","version":"0.141"},{"date":"2006-09-06T02:46:59","version":"0.142"},{"date":"2006-09-18T02:16:47","version":"0.143"},{"version":"0.145","date":"2006-09-19T22:29:33"},{"date":"2006-11-15T01:22:33","version":"0.146"},{"version":"0.147_01","date":"2006-11-16T14:16:50"},{"date":"2006-11-16T15:25:08","version":"0.148"},{"version":"1.148","date":"2007-03-08T16:05:15"},{"version":"1.149","date":"2008-11-01T16:36:57"},{"version":"1.200_01","date":"2008-11-02T03:21:27"},{"version":"1.200_02","date":"2008-11-11T21:40:52"},{"date":"2009-04-18T18:12:28","version":"1.201"},{"version":"1.202","date":"2009-06-15T22:47:18"},{"date":"2009-11-03T21:49:20","version":"1.203"},{"version":"1.210","date":"2010-05-07T01:57:28"},{"version":"1.211","date":"2010-05-07T12:00:52"},{"date":"2010-05-07T22:59:24","version":"1.212"},{"version":"1.213","date":"2010-05-09T19:29:59"},{"date":"2010-05-15T01:06:55","version":"1.214"},{"date":"2010-05-25T02:47:15","version":"1.215"},{"version":"1.216","date":"2010-09-04T18:14:56"},{"date":"2010-09-14T01:48:04","version":"1.217"},{"date":"2012-08-01T03:25:46","version":"1.218"},{"version":"1.219","date":"2013-07-07T03:00:13"},{"date":"2014-12-16T00:07:05","version":"1.220"},{"date":"2015-08-10T12:37:32","version":"1.221"},{"date":"2018-04-29T22:11:17","version":"1.222"},{"date":"2019-02-25T22:28:34","version":"1.223"},{"version":"1.224","date":"2019-03-02T14:20:33"},{"version":"1.225","date":"2020-04-12T18:42:29"},{"version":"1.226","date":"2020-04-12T18:43:57"},{"date":"2024-03-18T19:39:28","version":"1.227"}]},"Mail-Audit":{"main_module":"Mail::Audit","versions":[{"date":"2000-03-25T11:22:17","version":"1.0"},{"version":"1.1","date":"2000-06-17T08:03:59"},{"date":"2000-06-17T10:56:28","version":"1.2"},{"date":"2000-06-17T11:13:20","version":"1.3"},{"date":"2001-01-04T20:17:04","version":"1.4"},{"date":"2001-01-07T14:23:39","version":"1.5"},{"version":"1.6","date":"2001-01-13T22:45:20"},{"version":"1.7","date":"2001-01-27T11:31:56"},{"date":"2001-02-12T16:34:27","version":"1.8"},{"date":"2001-03-21T21:35:00","version":"1.9"},{"version":"1.10","date":"2001-04-23T15:45:51"},{"version":"1.11","date":"2001-05-16T23:20:35"},{"date":"2001-12-10T21:02:24","version":"2.0"},{"version":"2.1","date":"2002-03-04T19:59:38"},{"date":"2006-05-27T01:36:59","version":"2.200_01"},{"date":"2006-05-31T01:58:52","version":"2.200_02"},{"version":"2.200_03","date":"2006-06-02T02:17:31"},{"version":"2.200_04","date":"2006-06-04T20:18:18"},{"date":"2006-06-05T03:39:12","version":"2.200_05"},{"date":"2006-07-16T21:50:04","version":"2.201"},{"version":"2.202","date":"2006-07-21T12:18:37"},{"version":"2.203","date":"2006-07-22T00:53:55"},{"version":"2.210","date":"2006-09-19T11:26:30"},{"version":"2.211","date":"2006-09-19T11:38:19"},{"date":"2006-10-31T15:24:49","version":"2.212"},{"date":"2007-02-15T17:05:02","version":"2.213"},{"date":"2007-02-15T19:32:24","version":"2.214"},{"version":"2.215","date":"2007-02-19T21:14:15"},{"date":"2007-02-27T01:52:17","version":"2.216"},{"version":"2.217","date":"2007-03-05T17:16:08"},{"date":"2007-03-06T16:24:21","version":"2.218"},{"date":"2007-06-14T22:28:51","version":"2.219"},{"version":"2.220","date":"2007-07-14T19:04:32"},{"version":"2.221","date":"2007-09-17T13:26:24"},{"date":"2007-11-02T03:23:46","version":"2.222"},{"date":"2008-04-17T20:32:32","version":"2.223"},{"version":"2.224","date":"2009-09-18T17:22:37"},{"version":"2.225","date":"2009-11-23T19:27:24"},{"date":"2011-11-11T16:37:46","version":"2.226"},{"version":"2.227","date":"2011-11-14T19:21:44"},{"date":"2013-09-29T01:21:47","version":"2.228"}],"advisories":[{"references":["http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=344029","http://www.debian.org/security/2006/dsa-960","http://secunia.com/advisories/18652","http://secunia.com/advisories/18656","http://www.securityfocus.com/bid/16434","http://www.vupen.com/english/advisories/2006/0378","https://exchange.xforce.ibmcloud.com/vulnerabilities/24380"],"reported":"2005-12-31","distribution":"Mail-Audit","severity":null,"cves":["CVE-2005-4536"],"id":"CPANSA-Mail-Audit-2005-4536","description":"Mail::Audit module in libmail-audit-perl 2.1-5, when logging is enabled without a default log file specified, uses predictable log filenames, which allows local users to overwrite arbitrary files via a symlink attack on the [PID]-audit.log temporary file.\n","fixed_versions":[],"affected_versions":[">0"]}]},"PAR":{"main_module":"PAR","advisories":[{"references":["https://metacpan.org/changes/distribution/PAR","https://rt.cpan.org/Public/Bug/Display.html?id=69560"],"reported":"2011-07-18","distribution":"PAR","cves":["CVE-2011-4114"],"id":"CPANSA-PAR-2011-01","description":"PAR packed files are extracted to unsafe and predictable temporary directories (this bug was originally reported against PAR::Packer, but it applies to PAR as well).\n","fixed_versions":[">=1.003"],"affected_versions":["<1.003"]},{"affected_versions":["<1.003"],"description":"The par_mktmpdir function in the PAR module before 1.003 for Perl creates temporary files in a directory with a predictable name without verifying ownership and permissions of this directory, which allows local users to overwrite files when another user extracts a PAR packed program, a different vulnerability in a different package than CVE-2011-4114.\n","fixed_versions":[">=1.003"],"id":"CPANSA-PAR-2011-5060","reported":"2012-01-13","references":["http://cpansearch.perl.org/src/RSCHUPP/PAR-1.003/ChangeLog","https://bugzilla.redhat.com/show_bug.cgi?id=753955","https://rt.cpan.org/Public/Bug/Display.html?id=69560","https://exchange.xforce.ibmcloud.com/vulnerabilities/72435"],"distribution":"PAR","severity":null,"cves":["CVE-2011-5060"]}],"versions":[{"date":"2002-10-18T20:38:24","version":"0.01"},{"date":"2002-10-18T21:07:35","version":"0.02"},{"date":"2002-10-18T22:18:06","version":"0.03"},{"version":"0.04","date":"2002-10-19T02:46:52"},{"version":"0.05","date":"2002-10-19T14:33:26"},{"version":"0.06","date":"2002-10-19T15:31:54"},{"version":"0.10","date":"2002-10-19T17:38:40"},{"version":"0.11","date":"2002-10-19T22:30:34"},{"version":"0.12","date":"2002-10-20T13:00:43"},{"date":"2002-10-21T17:29:03","version":"0.13"},{"version":"0.14","date":"2002-10-27T10:38:32"},{"version":"0.15","date":"2002-10-27T17:52:07"},{"version":"0.20","date":"2002-11-02T02:20:38"},{"date":"2002-11-02T21:26:48","version":"0.21"},{"date":"2002-11-03T13:05:06","version":"0.22"},{"version":"0.30","date":"2002-11-05T14:36:58"},{"date":"2002-11-05T22:23:36","version":"0.40"},{"date":"2002-11-06T12:25:00","version":"0.41"},{"date":"2002-11-07T00:48:34","version":"0.42"},{"date":"2002-11-07T14:41:31","version":"0.43"},{"date":"2002-11-08T15:01:18","version":"0.44"},{"version":"0.45","date":"2002-11-08T21:01:12"},{"date":"2002-11-09T23:02:45","version":"0.46"},{"date":"2002-11-10T06:56:37","version":"0.47"},{"date":"2002-11-13T11:32:10","version":"0.48"},{"date":"2002-11-23T14:45:40","version":"0.49"},{"version":"0.50","date":"2002-12-03T01:00:23"},{"date":"2002-12-11T14:30:53","version":"0.51"},{"version":"0.60","date":"2002-12-17T04:06:52"},{"date":"2002-12-17T11:49:44","version":"0.61"},{"date":"2003-01-09T11:16:42","version":"0.62"},{"version":"0.63","date":"2003-02-06T00:38:33"},{"version":"0.64","date":"2003-03-01T15:54:25"},{"date":"2003-03-09T14:31:52","version":"0.65"},{"version":"0.66","date":"2003-03-19T15:54:32"},{"date":"2003-03-31T19:58:56","version":"0.66"},{"date":"2003-05-16T17:35:22","version":"0.67_89"},{"date":"2003-05-25T19:09:58","version":"0.68"},{"version":"0.69","date":"2003-05-31T13:12:53"},{"version":"0.69","date":"2003-07-08T15:39:11"},{"date":"2003-07-16T08:20:09","version":"0.69_91"},{"date":"2003-07-27T14:13:18","version":"0.69_93"},{"version":"0.70","date":"2003-07-29T08:21:31"},{"version":"0.71","date":"2003-07-30T13:57:01"},{"date":"2003-08-02T13:11:15","version":"0.72"},{"date":"2003-08-06T09:16:17","version":"0.73"},{"version":"0.74","date":"2003-08-25T13:39:35"},{"date":"2003-09-21T10:58:00","version":"0.75"},{"date":"2003-10-23T04:45:55","version":"0.75_99"},{"version":"0.76","date":"2003-10-28T12:21:23"},{"version":"0.76_98","date":"2003-12-11T23:00:26"},{"version":"0.76_99","date":"2003-12-28T02:31:29"},{"date":"2003-12-31T15:33:24","version":"0.77"},{"version":"0.77_98","date":"2004-01-03T17:36:11"},{"version":"0.77_99","date":"2004-01-04T20:30:15"},{"version":"0.78","date":"2004-01-06T21:26:43"},{"version":"0.79","date":"2004-01-08T11:35:51"},{"version":"0.79_97","date":"2004-02-15T23:25:34"},{"version":"0.79_98","date":"2004-02-27T15:58:33"},{"version":"0.79_98","date":"2004-02-27T23:54:39"},{"version":"0.79_99","date":"2004-03-03T14:49:47"},{"version":"0.80","date":"2004-03-16T17:04:25"},{"version":"0.80_99","date":"2004-03-28T14:43:14"},{"version":"0.81","date":"2004-05-22T19:13:38"},{"date":"2004-05-24T14:59:45","version":"0.82"},{"version":"0.83","date":"2004-05-29T16:02:03"},{"date":"2004-07-02T10:59:55","version":"0.85"},{"date":"2004-08-30T22:49:15","version":"0.85_01"},{"version":"0.86","date":"2004-12-11T03:49:09"},{"version":"0.87","date":"2005-01-30T19:04:55"},{"date":"2005-06-07T09:13:43","version":"0.88"},{"date":"2005-06-10T15:49:20","version":"0.89"},{"date":"2005-11-25T23:01:00","version":"0.90"},{"date":"2006-02-15T09:33:05","version":"0.91"},{"date":"2006-03-04T20:16:36","version":"0.91"},{"date":"2006-05-19T13:37:12","version":"0.93"},{"version":"0.93","date":"2006-06-02T10:25:51"},{"version":"0.93","date":"2006-06-20T20:44:56"},{"version":"0.942","date":"2006-07-22T19:59:13"},{"version":"0.950","date":"2006-08-05T11:28:06"},{"version":"0.950","date":"2006-08-11T15:51:56"},{"date":"2006-08-12T12:35:34","version":"0.950"},{"date":"2006-08-22T14:14:35","version":"0.952"},{"date":"2006-09-26T20:18:06","version":"0.954"},{"date":"2006-10-03T12:35:05","version":"0.955"},{"date":"2006-10-03T12:58:55","version":"0.956"},{"version":"0.957","date":"2006-10-24T16:42:26"},{"date":"2006-11-11T14:33:23","version":"0.958"},{"date":"2006-11-12T11:48:37","version":"0.959"},{"date":"2006-11-21T12:02:35","version":"0.960"},{"version":"0.969_01","date":"2006-12-01T14:19:55"},{"date":"2006-12-03T17:25:33","version":"0.970"},{"date":"2007-01-10T17:58:01","version":"0.970_01"},{"date":"2007-01-12T11:02:02","version":"0.971"},{"version":"0.972","date":"2007-01-16T15:23:38"},{"version":"0.973","date":"2007-02-03T11:40:25"},{"version":"0.976","date":"2007-07-29T11:17:27"},{"date":"2007-12-20T21:17:26","version":"0.977"},{"date":"2008-05-13T12:44:22","version":"0.979"},{"version":"0.980","date":"2008-05-22T11:41:38"},{"date":"2008-08-09T22:17:14","version":"0.980"},{"version":"0.980","date":"2008-08-10T21:39:41"},{"version":"0.983","date":"2008-09-12T15:02:23"},{"date":"2009-01-25T22:31:20","version":"0.984"},{"date":"2009-02-02T01:40:36","version":"0.985_01"},{"date":"2009-02-19T16:04:27","version":"0.986"},{"version":"0.987_01","date":"2009-02-20T14:30:08"},{"date":"2009-03-02T14:47:14","version":"0.988"},{"date":"2009-03-02T14:56:44","version":"0.989_01"},{"version":"0.991","date":"2009-03-10T15:11:05"},{"version":"0.992","date":"2009-04-05T11:32:48"},{"version":"0.993","date":"2009-07-19T16:37:30"},{"version":"0.994","date":"2009-07-23T13:08:07"},{"date":"2010-04-10T14:05:52","version":"1.000"},{"version":"1.001","date":"2010-07-25T09:32:33"},{"version":"1.002","date":"2010-07-25T10:07:06"},{"version":"1.003","date":"2011-11-28T16:53:29"},{"version":"1.004","date":"2011-11-30T22:31:25"},{"date":"2011-12-02T13:53:02","version":"1.005"},{"version":"1.006","date":"2012-10-14T22:45:17"},{"date":"2012-10-22T21:50:20","version":"1.007"},{"version":"1.008","date":"2015-01-24T14:11:44"},{"date":"2015-04-22T15:26:50","version":"1.009"},{"version":"1.010","date":"2015-07-13T10:56:21"},{"date":"2016-09-18T11:33:22","version":"1.011"},{"date":"2016-11-25T16:06:43","version":"1.012"},{"version":"1.013","date":"2016-11-27T16:51:00"},{"date":"2016-12-18T16:36:08","version":"1.014"},{"version":"1.015","date":"2017-04-13T15:29:12"},{"date":"2019-05-20T18:13:46","version":"1.016"},{"date":"2021-01-13T14:51:49","version":"1.017"},{"date":"2022-09-28T20:53:07","version":"1.018"},{"version":"1.019","date":"2023-11-01T13:25:01"},{"version":"1.020","date":"2024-03-04T10:49:29"}]},"Crypt-OpenSSL-DSA":{"advisories":[{"cves":["CVE-2009-0129"],"distribution":"Crypt-OpenSSL-DSA","reported":"2009-01-15","references":["https://metacpan.org/changes/distribution/Crypt-OpenSSL-DSA","https://www.openwall.com/lists/oss-security/2009/01/12/4","https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511519"],"id":"CPANSA-Crypt-OpenSSL-DSA-2009-01","fixed_versions":[">=0.14"],"description":"Missing error check in do_verify, which might allow remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature.\n","affected_versions":["<0.14"]}],"versions":[{"date":"2001-09-19T04:45:14","version":"0.01"},{"date":"2001-09-24T17:32:49","version":"0.02"},{"version":"0.03","date":"2002-02-07T05:57:36"},{"version":"0.04","date":"2002-09-24T04:52:06"},{"version":"0.10","date":"2002-09-26T00:21:17"},{"date":"2003-01-06T19:08:08","version":"0.11"},{"date":"2005-05-23T01:44:36","version":"0.12"},{"date":"2005-10-15T21:37:10","version":"0.13"},{"date":"2012-10-16T22:55:16","version":"0.14"},{"date":"2015-02-03T21:57:37","version":"0.15"},{"version":"0.16","date":"2016-10-27T11:25:18"},{"date":"2016-10-27T18:54:42","version":"0.17"},{"date":"2016-11-17T10:33:35","version":"0.18"},{"version":"0.19","date":"2017-01-13T08:24:56"},{"date":"2021-03-20T12:31:50","version":"0.20"}],"main_module":"Crypt::OpenSSL::DSA"},"RPC-XML":{"main_module":"RPC::XML","advisories":[{"description":"A a potential security hole in the parsing of external entities.\n","fixed_versions":[">=0.45"],"affected_versions":["<0.45"],"cves":[],"distribution":"RPC-XML","reported":"2002-10-29","references":["https://metacpan.org/dist/RPC-XML/changes"],"id":"CPANSA-RPC-XML-2002-01"}],"versions":[{"date":"2001-06-13T06:30:46","version":"0.25"},{"version":"0.26","date":"2001-06-27T06:18:37"},{"version":"0.27","date":"2001-07-08T23:38:52"},{"version":"0.28","date":"2001-10-08T05:10:22"},{"date":"2001-12-03T07:08:58","version":"0.29"},{"version":"0.30","date":"2002-01-03T09:49:30"},{"date":"2002-01-28T00:48:45","version":"0.35"},{"date":"2002-01-29T20:03:48","version":"0.36"},{"date":"2002-03-23T06:39:00","version":"0.37"},{"date":"2002-05-04T07:56:19","version":"0.40"},{"version":"0.41","date":"2002-05-22T10:04:14"},{"date":"2002-08-01T08:41:21","version":"0.42"},{"date":"2002-08-19T05:56:10","version":"0.43"},{"version":"0.44","date":"2002-08-31T06:58:58"},{"version":"0.45","date":"2002-10-30T05:15:04"},{"version":"0.46","date":"2002-12-30T07:51:25"},{"version":"0.50","date":"2003-01-27T11:37:20"},{"date":"2003-01-30T09:36:24","version":"0.51"},{"version":"0.52","date":"2003-02-10T09:48:58"},{"date":"2003-02-25T09:25:51","version":"0.53"},{"version":"0.54","date":"2004-04-14T12:55:46"},{"date":"2004-11-30T09:27:12","version":"0.55"},{"date":"2004-12-09T09:29:34","version":"0.56"},{"version":"0.57","date":"2004-12-24T11:07:31"},{"version":"0.58","date":"2005-05-12T10:47:19"},{"version":"0.59","date":"2006-06-30T07:56:12"},{"date":"2008-04-09T17:59:42","version":"0.60"},{"date":"2008-09-15T10:19:12","version":"0.61"},{"date":"2008-09-19T09:16:21","version":"0.62"},{"date":"2008-09-19T09:28:08","version":"0.63"},{"date":"2008-09-29T11:24:26","version":"0.64"},{"version":"0.65","date":"2009-06-17T13:19:54"},{"version":"0.66","date":"2009-07-09T14:42:56"},{"version":"0.67","date":"2009-07-10T08:34:44"},{"date":"2009-09-03T17:37:20","version":"0.69"},{"date":"2009-12-07T06:33:13","version":"0.70"},{"date":"2009-12-08T04:11:10","version":"0.71"},{"date":"2009-12-14T05:48:11","version":"0.72"},{"version":"0.73","date":"2010-03-17T05:55:29"},{"version":"0.74","date":"2011-01-23T21:08:04"},{"date":"2011-08-14T00:40:40","version":"0.75"},{"version":"0.76","date":"2011-08-21T19:48:16"},{"version":"0.77","date":"2012-09-03T18:58:22"},{"date":"2014-02-07T04:15:00","version":"0.78"},{"date":"2015-05-01T16:02:19","version":"0.79"},{"version":"0.80","date":"2016-05-08T20:17:31"},{"version":"0.81","date":"2021-01-06T02:49:51"},{"version":"0.82","date":"2021-01-06T18:05:35"}]},"Galileo":{"main_module":"Galileo","advisories":[{"id":"CPANSA-Galileo-2019-7410","severity":"medium","cves":["CVE-2019-7410"],"references":["https://metamorfosec.com/Files/Commits/METC-2020-002-Escape_banner_in_Galileo_CMS_v0.042.txt","https://metacpan.org/changes/distribution/Galileo","https://github.com/jberger/Galileo/pull/55/files","https://metamorfosec.com/Files/Advisories/METS-2020-002-A_Stored_XSS_Vulnerability_in_Galileo_CMS_v0.042.txt"],"reported":"2020-08-14","distribution":"Galileo","affected_versions":["<0.043"],"fixed_versions":[">=0.043"],"description":"There is stored cross site scripting (XSS) in Galileo CMS v0.042. Remote authenticated users could inject arbitrary web script or HTML via $page_title in /lib/Galileo/files/templates/page/show.html.ep (aka the PAGE TITLE Field).\n"}],"versions":[{"version":"0.001","date":"2012-07-30T17:03:42"},{"version":"0.002","date":"2012-07-30T17:38:19"},{"version":"0.003","date":"2012-07-30T20:36:06"},{"date":"2012-07-31T15:41:59","version":"0.004"},{"date":"2012-08-06T21:26:17","version":"0.005"},{"date":"2012-08-09T20:39:14","version":"0.006"},{"date":"2012-09-10T17:57:20","version":"0.007"},{"date":"2012-10-27T17:40:15","version":"0.008"},{"version":"0.009","date":"2012-10-28T18:03:00"},{"date":"2012-10-28T18:10:15","version":"0.01"},{"version":"0.011","date":"2012-10-31T22:10:19"},{"version":"0.012","date":"2013-01-15T15:10:42"},{"date":"2013-01-15T21:07:00","version":"0.013"},{"version":"0.014","date":"2013-01-16T21:37:32"},{"date":"2013-01-19T03:59:45","version":"0.015"},{"version":"0.016","date":"2013-01-26T21:28:59"},{"date":"2013-02-05T03:32:32","version":"0.017"},{"date":"2013-02-06T02:47:47","version":"0.018"},{"version":"0.019","date":"2013-02-06T03:09:27"},{"date":"2013-02-11T23:33:00","version":"0.020"},{"version":"0.021","date":"2013-02-17T01:24:51"},{"version":"0.022","date":"2013-02-17T02:44:14"},{"version":"0.023","date":"2013-03-04T18:25:01"},{"date":"2013-03-12T15:24:22","version":"0.024"},{"date":"2013-03-12T18:48:22","version":"0.025"},{"date":"2013-03-15T15:18:18","version":"0.026"},{"version":"0.027","date":"2013-04-03T20:04:15"},{"date":"2013-05-14T15:59:46","version":"0.028"},{"version":"0.029","date":"2013-06-29T03:30:18"},{"version":"0.030","date":"2013-08-27T03:43:39"},{"version":"0.031","date":"2013-11-28T18:36:10"},{"version":"0.032","date":"2014-04-06T16:17:22"},{"date":"2014-05-10T19:38:50","version":"0.033"},{"date":"2014-05-31T13:06:42","version":"0.034"},{"version":"0.035","date":"2014-08-16T22:10:46"},{"date":"2014-08-31T15:31:15","version":"0.036"},{"version":"0.037","date":"2014-10-14T04:03:53"},{"version":"0.038","date":"2015-01-25T18:08:54"},{"date":"2015-09-28T18:25:31","version":"0.039"},{"date":"2016-01-07T16:33:46","version":"0.040"},{"version":"0.041","date":"2016-08-13T18:15:17"},{"version":"0.042","date":"2017-03-16T03:14:04"},{"date":"2020-08-06T16:26:58","version":"0.043"}]},"Apache-ASP":{"main_module":"Apache::ASP","advisories":[{"fixed_versions":[">=1.95"],"description":"A bug would allow a malicious user possible writing of files in the same directory as the source.asp script.\n","affected_versions":["<1.95"],"severity":null,"cves":[],"reported":"2000-07-10","references":["https://metacpan.org/release/CHAMAS/Apache-ASP-2.63/source/README"],"distribution":"Apache-ASP","id":"CPANSA-Apache-ASP-2000-01"}],"versions":[{"version":"0.01","date":"1998-06-24T02:10:51"},{"version":"0.02","date":"1998-07-11T01:48:14"},{"date":"1998-09-14T11:13:32","version":"0.03"},{"date":"1998-10-12T07:50:56","version":"0.04"},{"version":"0.05","date":"1998-10-18T21:29:19"},{"date":"1999-02-06T06:04:50","version":"0.08"},{"date":"1999-04-22T08:30:57","version":"0.09"},{"version":"0.11","date":"1999-06-24T20:04:52"},{"version":"0.12","date":"1999-07-02T07:05:05"},{"version":"0.14","date":"1999-07-29T10:58:20"},{"version":"0.15","date":"1999-08-25T02:02:31"},{"version":"0.16","date":"1999-09-22T20:54:01"},{"date":"1999-11-16T04:44:48","version":"0.17"},{"date":"2000-02-04T02:14:14","version":"0.18"},{"version":"1.91","date":"2000-07-03T13:08:54"},{"version":"1.93","date":"2000-07-03T22:43:45"},{"version":"1.95","date":"2000-07-11T01:44:02"},{"version":"2.00","date":"2000-07-16T07:17:39"},{"date":"2000-07-22T23:31:36","version":"2.01"},{"version":"2.03","date":"2000-08-02T00:11:15"},{"date":"2000-11-26T19:15:48","version":"2.07"},{"version":"2.09","date":"2001-01-31T04:03:17"},{"date":"2001-05-30T01:37:39","version":"2.11"},{"version":"2.15","date":"2001-06-12T00:41:33"},{"version":"2.17","date":"2001-06-18T02:35:48"},{"version":"2.19","date":"2001-07-11T05:27:22"},{"date":"2001-08-05T23:01:50","version":"2.21"},{"date":"2001-10-11T07:54:39","version":"2.23"},{"date":"2001-10-11T23:34:01","version":"2.25"},{"version":"2.27","date":"2001-11-01T01:11:12"},{"version":"2.29","date":"2001-11-19T21:41:12"},{"date":"2002-01-22T09:52:49","version":"2.31"},{"version":"2.33","date":"2002-04-30T09:12:20"},{"version":"2.35","date":"2002-05-30T19:47:22"},{"version":"2.37","date":"2002-07-03T21:11:15"},{"date":"2002-09-12T08:16:20","version":"2.39"},{"date":"2002-09-30T06:35:47","version":"2.41"},{"date":"2002-10-14T04:01:36","version":"2.45"},{"version":"2.47","date":"2002-11-07T02:03:41"},{"date":"2002-11-11T07:15:21","version":"2.49"},{"date":"2003-02-10T21:11:34","version":"2.51"},{"version":"2.53","date":"2003-04-10T16:27:14"},{"date":"2003-08-10T07:39:57","version":"2.55"},{"date":"2004-01-29T08:30:48","version":"2.57"},{"date":"2005-05-24T05:52:39","version":"2.59"},{"date":"2008-05-25T23:07:57","version":"2.61"},{"date":"2011-10-02T19:18:10","version":"2.62"},{"version":"2.62","date":"2012-02-13T23:15:04"},{"date":"2018-03-15T05:28:37","version":2.63}]},"Net-Ping-External":{"versions":[{"version":"0.01","date":"2001-03-15T21:53:04"},{"date":"2001-03-22T00:15:08","version":"0.02"},{"date":"2001-03-23T08:35:49","version":"0.03"},{"date":"2001-04-20T17:33:31","version":"0.04"},{"version":"0.05","date":"2001-04-20T18:43:34"},{"date":"2001-04-26T02:59:41","version":"0.06"},{"date":"2001-09-28T02:20:34","version":"0.07"},{"version":"0.08","date":"2001-09-30T21:39:47"},{"date":"2001-11-10T06:10:33","version":"0.09"},{"version":"0.10","date":"2001-11-10T16:19:21"},{"date":"2003-02-11T22:41:33","version":"0.11"},{"date":"2006-09-07T10:52:21","version":"0.12_01"},{"version":"0.12_02","date":"2007-01-31T22:09:41"},{"version":"0.12","date":"2007-02-08T16:06:46"},{"date":"2008-12-18T20:27:07","version":"0.13"},{"version":"0.14","date":"2013-10-29T17:05:01"},{"version":"0.15","date":"2014-04-12T21:37:12"}],"advisories":[{"affected_versions":["<=0.15"],"description":"The Net::Ping::External extension through 0.15 for Perl does not properly sanitize arguments (e.g., invalid hostnames) containing shell metacharacters before use of backticks in External.pm, allowing for shell command injection and arbitrary command execution if untrusted input is used.\n","fixed_versions":[],"id":"CPANSA-Net-Ping-External-2008-7319","distribution":"Net-Ping-External","reported":"2017-11-07","references":["https://rt.cpan.org/Public/Bug/Display.html?id=33230","https://bugs.debian.org/881097","http://www.openwall.com/lists/oss-security/2017/11/07/4","http://matthias.sdfeu.org/devel/net-ping-external-cmd-injection.patch"],"cves":["CVE-2008-7319"],"severity":"critical"}],"main_module":"Net::Ping::External"},"Plack-Middleware-XSRFBlock":{"versions":[{"date":"2013-06-20T11:01:27","version":"0.0.0_01"},{"date":"2013-06-21T14:07:31","version":"0.0.0_02"},{"date":"2013-06-21T14:48:20","version":"0.0.0_03"},{"version":"0.0.0_04","date":"2013-06-21T15:04:00"},{"version":"0.0.0_05","date":"2013-06-23T23:30:14"},{"version":"0.0.1","date":"2013-10-21T15:36:45"},{"version":"0.0.2","date":"2014-03-28T11:34:07"},{"version":"0.0.3","date":"2014-06-24T15:02:09"},{"version":"0.0.4","date":"2014-07-09T12:44:23"},{"version":"0.0.5","date":"2014-07-22T15:29:19"},{"date":"2014-08-05T20:48:41","version":"0.0.6"},{"version":"0.0.7","date":"2014-08-28T16:51:49"},{"date":"2014-09-18T08:03:26","version":"0.0.8"},{"version":"0.0.9","date":"2014-10-13T10:16:45"},{"version":"0.0.10","date":"2015-07-18T22:04:22"},{"date":"2015-09-07T16:45:50","version":"0.0.11"},{"date":"2017-07-13T10:36:46","version":"0.0.12"},{"date":"2018-07-23T11:02:29","version":"0.0.13"},{"date":"2018-07-23T16:19:18","version":"0.0.14"},{"version":"0.0.15","date":"2018-07-24T12:45:15"},{"date":"2018-07-25T13:24:47","version":"0.0.16"},{"version":"0.0.17","date":"2022-10-17T09:58:14"},{"date":"2023-07-13T09:16:48","version":"0.0.18"},{"version":"0.0.19","date":"2023-07-14T09:17:25"}],"advisories":[{"cves":["CVE-2023-52431"],"severity":null,"distribution":"Plack-Middleware-XSRFBlock","reported":"2023-07-14","references":["https://metacpan.org/dist/Plack-Middleware-XSRFBlock/changes","https://metacpan.org/release/DAKKAR/Plack-Middleware-XSRFBlock-0.0.19/source/Changes","https://nvd.nist.gov/vuln/detail/CVE-2023-52431"],"id":"CPANSA-Plack-Middleware-XSRFBlock-20230714-01","fixed_versions":[">=0.0.19"],"description":"When not using signed cookies, it was possible to bypass XSRFBlock by POSTing an empty form value and an empty cookie\n","affected_versions":["<0.0.19"]}],"main_module":"Plack::Middleware::XSRFBlock"},"Crypt-JWT":{"main_module":"Crypt::JWT","versions":[{"date":"2015-07-02T22:24:01","version":"0.004"},{"date":"2015-07-02T22:54:29","version":"0.005"},{"date":"2015-07-07T19:43:45","version":"0.010"},{"date":"2015-10-22T07:08:48","version":"0.011"},{"date":"2016-05-02T17:33:01","version":"0.012"},{"version":"0.013","date":"2016-05-03T07:10:15"},{"version":"0.014","date":"2016-05-04T05:48:13"},{"date":"2016-05-12T05:38:49","version":"0.015"},{"version":"0.016","date":"2016-05-12T08:03:49"},{"date":"2016-06-03T10:17:48","version":"0.017"},{"version":"0.018","date":"2016-08-31T19:49:41"},{"version":"0.019","date":"2018-01-26T16:07:54"},{"version":"0.020","date":"2018-02-02T15:02:28"},{"version":"0.021","date":"2018-03-15T11:59:25"},{"date":"2018-06-24T20:29:50","version":"0.022"},{"version":"0.023","date":"2018-09-01T16:09:10"},{"version":"0.024","date":"2019-03-26T11:11:25"},{"date":"2019-09-29T15:23:58","version":"0.025"},{"date":"2020-02-02T08:44:56","version":"0.026"},{"version":"0.027","date":"2020-06-04T22:35:39"},{"date":"2020-06-14T18:17:45","version":"0.028"},{"version":"0.029","date":"2020-06-22T13:13:53"},{"date":"2021-01-08T14:22:56","version":"0.030"},{"date":"2021-01-10T14:18:25","version":"0.031"},{"date":"2021-03-18T21:02:33","version":"0.032"},{"version":"0.033","date":"2021-05-01T17:18:31"},{"date":"2021-11-28T22:08:38","version":"0.034"},{"version":"0.035","date":"2023-10-03T10:20:23"},{"date":"2025-01-26T10:17:48","version":"0.036"}],"advisories":[{"distribution":"Crypt-JWT","references":["https://github.com/DCIT/perl-Crypt-JWT/commit/b98a59b42ded9f9e51b2560410106207c2152d6c","https://www.openwall.com/lists/oss-security/2018/09/07/1"],"reported":"2019-03-20","cves":["CVE-2019-1010263"],"severity":"high","id":"CPANSA-Crypt-JWT-2019-01","description":"Perl Crypt::JWT prior to 0.023 is affected by: Incorrect Access Control. The impact is: allow attackers to bypass authentication by providing a token by crafting with hmac(). The component is: JWT.pm, line 614. The attack vector is: network connectivity. The fixed version is: after commit b98a59b42ded9f9e51b2560410106207c2152d6c.\n","fixed_versions":[">=0.023"],"affected_versions":["<0.023"]},{"id":"CPANSA-Crypt-JWT-2019-01","cves":["CVE-2019-1010161"],"severity":"high","distribution":"Crypt-JWT","references":["https://github.com/DCIT/perl-Crypt-JWT/issues/3#issuecomment-417947483"],"reported":"2019-03-20","affected_versions":["<0.022"],"description":"perl-CRYPT-JWT 0.022 and earlier is affected by: Incorrect Access Control. The impact is: bypass authentication. The component is: JWT.pm for JWT security token, line 614 in _decode_jws(). The attack vector is: network connectivity(crafting user-controlled input to bypass authentication). The fixed version is: 0.023.\n","fixed_versions":[">=0.022"]}]},"CryptX":{"main_module":"CryptX","advisories":[{"affected_versions":["<0.062"],"description":"A user can pass anything as the tag into gcm_decrypt_verify() and it will return decrypted plaintext.\n","fixed_versions":[],"id":"CPANSA-CryptX-2018-01","distribution":"CryptX","reported":"2018-10-26","references":["https://github.com/DCIT/perl-CryptX/issues/47","https://github.com/libtom/libtomcrypt/pull/451"],"cves":["CVE-2018-25099"],"severity":null}],"versions":[{"version":"0.002","date":"2013-04-11T15:10:25"},{"version":"0.003","date":"2013-04-16T07:29:07"},{"version":"0.004","date":"2013-04-16T07:37:29"},{"version":"0.005","date":"2013-04-18T12:09:09"},{"date":"2013-04-19T09:05:57","version":"0.006"},{"date":"2013-04-23T10:03:54","version":"0.007"},{"date":"2013-05-02T08:52:42","version":"0.008"},{"date":"2013-05-19T20:25:17","version":"0.009"},{"date":"2013-06-14T22:37:18","version":"0.011"},{"version":"0.012","date":"2013-06-17T20:00:17"},{"version":"0.013","date":"2013-08-28T07:12:15"},{"version":"0.013_1","date":"2013-09-11T14:31:01"},{"version":"0.014","date":"2013-09-11T21:11:18"},{"version":"0.014_1","date":"2013-09-12T08:21:21"},{"version":"0.014_2","date":"2013-09-12T09:12:21"},{"date":"2013-09-12T09:32:06","version":"0.015"},{"version":"0.016","date":"2013-09-15T19:36:52"},{"date":"2013-09-22T19:20:20","version":"0.016_1"},{"date":"2013-09-23T14:24:27","version":"0.016_2"},{"version":"0.016_3","date":"2013-09-24T05:00:07"},{"version":"0.017","date":"2013-09-24T08:54:42"},{"version":"0.018","date":"2013-10-18T13:21:35"},{"date":"2013-10-20T21:13:35","version":"0.019"},{"version":"0.019_1","date":"2014-01-14T21:30:37"},{"date":"2014-01-15T21:59:30","version":"0.019_2"},{"date":"2014-01-16T21:26:19","version":"0.019_3"},{"date":"2014-01-17T09:42:29","version":"0.019_4"},{"date":"2014-01-18T08:29:06","version":"0.020"},{"date":"2014-01-23T15:47:50","version":"0.021"},{"date":"2015-04-17T01:18:47","version":"0.021_1"},{"version":"0.021_3","date":"2015-04-17T10:12:01"},{"version":"0.021_4","date":"2015-05-06T07:55:21"},{"date":"2015-05-11T21:56:39","version":"0.021_5"},{"version":"0.021_6","date":"2015-05-12T05:52:15"},{"version":"0.021_7","date":"2015-05-12T07:10:42"},{"date":"2015-05-14T09:27:41","version":"0.021_8"},{"version":"0.021_9","date":"2015-05-15T11:08:26"},{"date":"2015-05-22T16:57:26","version":"0.022"},{"version":"0.023","date":"2015-06-10T20:37:54"},{"date":"2015-06-26T06:13:25","version":"0.023_1"},{"date":"2015-06-26T09:18:06","version":"0.023_2"},{"date":"2015-06-29T20:09:16","version":"0.024"},{"date":"2015-07-08T07:56:50","version":"0.025"},{"version":"0.025_01","date":"2015-10-22T15:14:53"},{"version":"0.026","date":"2015-11-28T18:58:17"},{"version":"0.026_01","date":"2015-12-29T21:20:15"},{"date":"2015-12-29T21:20:27","version":"0.026_02"},{"date":"2016-01-02T14:38:13","version":"0.026_05"},{"date":"2016-01-02T15:57:58","version":"0.026_06"},{"date":"2016-01-03T14:36:53","version":"0.026_08"},{"version":"0.026_15","date":"2016-01-10T09:47:31"},{"date":"2016-01-10T09:47:43","version":"0.026_16"},{"date":"2016-01-10T11:52:21","version":"0.026_18"},{"version":"0.026_19","date":"2016-01-10T11:53:48"},{"date":"2016-01-10T17:03:45","version":"0.026_23"},{"date":"2016-01-10T17:03:56","version":"0.026_24"},{"version":"0.026_28","date":"2016-01-10T19:02:14"},{"version":"0.026_29","date":"2016-01-10T20:49:06"},{"date":"2016-01-12T22:25:58","version":"0.026_30"},{"version":"0.026_31","date":"2016-01-12T22:37:33"},{"version":"0.026_32","date":"2016-01-13T23:53:06"},{"version":"0.026_33","date":"2016-01-14T19:29:18"},{"date":"2016-01-14T19:30:45","version":"0.026_34"},{"date":"2016-01-14T21:16:15","version":"0.026_35"},{"date":"2016-01-14T21:19:01","version":"0.026_36"},{"date":"2016-01-22T23:01:16","version":"0.026_39"},{"version":"0.026_40","date":"2016-01-24T22:12:32"},{"version":"0.026_41","date":"2016-01-24T22:36:42"},{"version":"0.027","date":"2016-01-25T20:44:46"},{"version":"0.027_01","date":"2016-01-25T21:42:58"},{"version":"0.027_05","date":"2016-01-26T10:06:26"},{"version":"0.027_06","date":"2016-03-15T09:51:01"},{"version":"0.028","date":"2016-03-23T19:44:54"},{"version":"0.028_01","date":"2016-03-28T14:31:13"},{"version":"0.028_02","date":"2016-03-28T19:32:58"},{"date":"2016-03-31T12:07:46","version":"0.028_03"},{"date":"2016-04-13T09:30:27","version":"0.029"},{"version":"0.030","date":"2016-04-13T09:46:59"},{"date":"2016-05-01T16:53:05","version":"0.031"},{"version":"0.032","date":"2016-05-04T17:45:30"},{"version":"0.033","date":"2016-05-09T20:20:49"},{"date":"2016-05-10T22:31:32","version":"0.034"},{"date":"2016-06-03T10:17:59","version":"0.035"},{"version":"0.036","date":"2016-06-07T19:22:05"},{"version":"0.037","date":"2016-06-16T17:04:27"},{"date":"2016-07-06T18:27:46","version":"0.038"},{"date":"2016-08-03T05:53:42","version":"0.039"},{"version":"0.040","date":"2016-09-12T08:42:39"},{"date":"2016-10-12T09:32:48","version":"0.041"},{"version":"0.041_001","date":"2016-10-19T10:25:05"},{"version":"0.041_002","date":"2016-11-02T09:00:59"},{"date":"2016-11-02T09:19:09","version":"0.041_003"},{"date":"2016-11-12T15:21:01","version":"0.042"},{"version":"0.043","date":"2016-11-27T21:19:27"},{"date":"2016-11-28T07:45:32","version":"0.044"},{"date":"2017-02-21T21:54:33","version":"0.044_001"},{"date":"2017-02-23T15:58:42","version":"0.044_003"},{"version":"0.044_004","date":"2017-02-23T20:35:46"},{"version":"0.044_005","date":"2017-02-23T20:44:50"},{"date":"2017-02-28T12:22:27","version":"0.044_006"},{"version":"0.044_007","date":"2017-02-28T13:58:51"},{"date":"2017-03-01T09:26:34","version":"0.044_008"},{"date":"2017-03-01T09:49:29","version":"0.044_009"},{"date":"2017-03-01T10:02:35","version":"0.044_010"},{"version":"0.045","date":"2017-03-31T09:28:10"},{"version":"0.046","date":"2017-04-04T09:08:33"},{"version":"0.047","date":"2017-04-05T20:09:35"},{"date":"2017-04-07T18:22:15","version":"0.047_001"},{"version":"0.047_002","date":"2017-04-07T21:40:24"},{"date":"2017-04-10T08:16:03","version":"0.047_003"},{"date":"2017-04-24T15:23:29","version":"0.047_004"},{"version":"0.047_005","date":"2017-04-26T15:36:02"},{"version":"0.047_006","date":"2017-05-01T19:11:50"},{"date":"2017-05-31T20:22:56","version":"0.048"},{"date":"2017-07-09T19:38:38","version":"0.048_001"},{"version":"0.048_002","date":"2017-07-14T17:43:25"},{"date":"2017-07-18T05:56:42","version":"0.049"},{"version":"0.050","date":"2017-07-18T20:37:45"},{"version":"0.051","date":"2017-08-08T08:14:05"},{"date":"2017-09-15T12:32:56","version":"0.053"},{"version":"0.053_001","date":"2017-09-19T07:51:19"},{"date":"2017-09-19T18:46:56","version":"0.053_002"},{"date":"2017-09-20T09:56:04","version":"0.053_003"},{"version":"0.053_004","date":"2017-10-10T21:04:53"},{"date":"2017-10-12T07:27:42","version":"0.054"},{"version":"0.054_001","date":"2017-10-23T13:18:12"},{"date":"2017-10-23T17:44:49","version":"0.054_002"},{"date":"2017-10-25T07:43:53","version":"0.054_003"},{"version":"0.054_004","date":"2017-10-30T17:53:14"},{"date":"2017-10-31T18:27:22","version":"0.054_005"},{"version":"0.054_006","date":"2017-11-20T18:51:03"},{"version":"0.054_007","date":"2017-11-24T08:15:31"},{"version":"0.054_008","date":"2017-11-24T14:21:46"},{"date":"2017-11-24T16:33:40","version":"0.054_009"},{"version":"0.055","date":"2017-11-28T10:19:52"},{"date":"2017-12-18T19:05:35","version":"0.055_001"},{"version":"0.056","date":"2017-12-22T13:22:16"},{"version":"0.056_001","date":"2018-01-26T16:05:07"},{"date":"2018-01-29T06:18:08","version":"0.056_002"},{"date":"2018-01-29T10:02:58","version":"0.056_003"},{"date":"2018-01-29T23:05:27","version":"0.056_004"},{"version":"0.056_005","date":"2018-01-30T10:23:40"},{"version":"0.056_006","date":"2018-01-30T14:11:33"},{"date":"2018-01-30T16:08:38","version":"0.056_007"},{"version":"0.056_008","date":"2018-01-30T16:29:41"},{"date":"2018-01-30T16:43:48","version":"0.056_009"},{"version":"0.057","date":"2018-01-31T08:56:12"},{"date":"2018-02-27T17:13:52","version":"0.058"},{"date":"2018-03-08T09:30:22","version":"0.058_001"},{"date":"2018-03-18T16:27:43","version":"0.058_002"},{"version":"0.059","date":"2018-03-25T15:45:36"},{"version":"0.059_001","date":"2018-04-27T17:14:03"},{"version":"0.059_002","date":"2018-04-28T20:59:58"},{"date":"2018-04-29T18:12:50","version":"0.059_003"},{"version":"0.060","date":"2018-05-01T09:32:27"},{"version":"0.060_001","date":"2018-05-27T19:05:34"},{"version":"0.060_002","date":"2018-05-28T07:18:37"},{"version":"0.060_003","date":"2018-06-06T15:49:28"},{"version":"0.061","date":"2018-06-07T05:25:50"},{"version":"0.061_001","date":"2018-10-24T20:35:24"},{"version":"0.061_002","date":"2018-10-26T17:10:16"},{"version":"0.061_003","date":"2018-10-29T10:46:25"},{"version":"0.062","date":"2018-10-30T06:27:48"},{"date":"2018-11-22T10:43:01","version":"0.062_001"},{"version":"0.063","date":"2018-11-28T10:48:28"},{"date":"2019-06-06T09:36:14","version":"0.063_001"},{"version":"0.063_002","date":"2019-06-06T17:35:59"},{"date":"2019-06-10T17:24:53","version":"0.063_003"},{"version":"0.063_004","date":"2019-06-12T13:33:28"},{"date":"2019-06-12T23:12:09","version":"0.063_005"},{"version":"0.064","date":"2019-06-14T07:01:03"},{"version":"0.065","date":"2019-10-19T18:49:19"},{"version":"0.066","date":"2019-10-20T16:30:22"},{"date":"2020-01-26T20:23:46","version":"0.066_001"},{"date":"2020-01-30T10:21:29","version":"0.066_002"},{"date":"2020-02-01T13:24:27","version":"0.067"},{"version":"0.067_001","date":"2020-03-08T19:21:55"},{"date":"2020-03-10T13:04:08","version":"0.068"},{"version":"0.068_001","date":"2020-08-02T08:51:06"},{"date":"2020-08-25T07:12:43","version":"0.069"},{"date":"2021-02-12T14:44:41","version":"0.070"},{"date":"2021-03-30T09:39:33","version":"0.071"},{"date":"2021-04-29T08:23:01","version":"0.072"},{"version":"0.072_001","date":"2021-07-12T16:40:01"},{"date":"2021-07-13T07:03:12","version":"0.072_002"},{"version":"0.072_003","date":"2021-07-13T20:54:22"},{"date":"2021-07-18T12:16:09","version":"0.073"},{"date":"2021-10-04T18:34:39","version":"0.073_001"},{"date":"2021-10-10T18:41:04","version":"0.073_002"},{"version":"0.073_003","date":"2021-10-13T18:32:43"},{"version":"0.074","date":"2021-11-06T09:26:22"},{"version":"0.075","date":"2021-12-25T09:39:17"},{"date":"2022-01-01T00:36:25","version":"0.075_001"},{"version":"0.075_002","date":"2022-01-01T13:19:24"},{"version":"0.075_003","date":"2022-01-01T19:48:49"},{"date":"2022-01-07T20:55:06","version":"0.076"},{"date":"2022-06-09T18:18:34","version":"0.076_001"},{"version":"0.076_002","date":"2022-08-20T15:42:12"},{"date":"2022-08-20T18:14:10","version":"0.076_003"},{"date":"2022-08-21T07:46:06","version":"0.077"},{"version":"0.078","date":"2023-04-28T12:31:25"},{"version":"0.078_001","date":"2023-07-25T18:36:58"},{"version":"0.079","date":"2023-10-01T12:20:32"},{"version":"0.079_002","date":"2023-10-01T17:35:55"},{"version":"0.079_003","date":"2023-10-01T17:36:06"},{"version":"0.079_004","date":"2023-10-02T07:47:50"},{"version":"0.079_005","date":"2023-10-02T11:22:48"},{"date":"2023-10-02T15:06:17","version":"0.079_006"},{"date":"2023-10-03T10:16:25","version":"0.079_007"},{"version":"0.080","date":"2023-10-04T11:07:16"},{"version":"0.080_001","date":"2023-10-07T11:45:30"},{"date":"2024-08-17T10:06:21","version":"0.080_003"},{"version":"0.080_004","date":"2024-08-17T17:16:06"},{"version":"0.080_005","date":"2024-08-17T20:28:14"},{"date":"2024-08-30T18:43:56","version":"0.080_006"},{"version":"0.080_007","date":"2024-09-01T08:32:21"},{"version":"0.080_008","date":"2024-09-01T09:26:40"},{"version":"0.080_009","date":"2024-09-01T11:23:19"},{"date":"2024-09-02T14:51:29","version":"0.080_010"},{"date":"2024-09-03T11:32:03","version":"0.080_011"},{"version":"0.080_012","date":"2024-09-03T18:01:58"},{"version":"0.081","date":"2024-09-08T16:12:50"},{"date":"2024-10-03T11:12:24","version":"0.081_001"},{"date":"2024-10-07T13:31:29","version":"0.082"},{"version":"0.082_001","date":"2024-10-14T11:36:41"},{"date":"2024-10-15T09:31:49","version":"0.083"},{"version":"0.083_001","date":"2024-10-15T15:09:00"},{"version":"0.084","date":"2024-10-16T11:23:26"},{"date":"2025-01-25T22:45:03","version":"0.084_001"},{"date":"2025-02-08T10:02:22","version":"0.085"},{"date":"2025-02-20T21:06:09","version":"0.085_001"}]},"Locale-Maketext":{"main_module":"Locale::Maketext","advisories":[{"fixed_versions":[],"description":"The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application before 5.1.3, and the Foswiki application 1.0.x through 1.0.10 and 1.1.x through 1.1.6.\n","affected_versions":["<1.25"],"references":["http://perl5.git.perl.org/perl.git/commit/1735f6f53ca19f99c6e9e39496c486af323ba6a8","http://sourceforge.net/mailarchive/message.php?msg_id=30219695","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=695224","http://twiki.org/cgi-bin/view/Codev/SecurityAlert-CVE-2012-6329","http://perl5.git.perl.org/perl.git/blob/HEAD:/pod/perl5177delta.pod","http://openwall.com/lists/oss-security/2012/12/11/4","http://code.activestate.com/lists/perl5-porters/187763/","http://code.activestate.com/lists/perl5-porters/187746/","https://bugzilla.redhat.com/show_bug.cgi?id=884354","http://rhn.redhat.com/errata/RHSA-2013-0685.html","http://www.mandriva.com/security/advisories?name=MDVSA-2013:113","https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0032","http://www.ubuntu.com/usn/USN-2099-1","http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","http://www.securityfocus.com/bid/56950","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735","http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705"],"reported":"2013-01-04","distribution":"Locale-Maketext","severity":null,"cves":["CVE-2012-6329"],"id":"CPANSA-Locale-Maketext-2012-6329"},{"id":"CPANSA-Locale-Maketext-2016-1238","distribution":"Locale-Maketext","reported":"2016-08-02","references":["http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html","http://www.securitytracker.com/id/1036440","http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab","https://rt.perl.org/Public/Bug/Display.html?id=127834","http://www.securityfocus.com/bid/92136","http://www.debian.org/security/2016/dsa-3628","https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/","https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/","https://security.gentoo.org/glsa/201701-75","https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E","https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html","https://security.gentoo.org/glsa/201812-07","http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html"],"cves":["CVE-2016-1238"],"severity":"high","affected_versions":["<1.28"],"fixed_versions":[">=1.28"],"description":"Does not remove . from @INC, which might allow local users to gain privileges via a Trojan horse module under the current working directory.\n"}],"versions":[{"date":"1999-03-16T05:22:44","version":"0.17"},{"date":"2000-05-14T08:26:33","version":"0.18"},{"version":"1.01","date":"2001-05-25T14:21:01"},{"date":"2001-06-20T08:28:48","version":"1.02"},{"version":"1.03","date":"2001-06-22T05:27:18"},{"version":"1.04","date":"2003-04-02T20:20:43"},{"date":"2003-04-19T06:11:36","version":"1.05"},{"date":"2003-06-22T07:51:14","version":"1.06"},{"date":"2004-01-12T04:18:16","version":"1.07"},{"date":"2004-01-20T00:14:54","version":"1.08"},{"version":"1.09","date":"2004-03-31T06:47:07"},{"version":"1.10","date":"2005-11-11T03:42:57"},{"version":"1.11_01","date":"2007-05-08T05:03:08"},{"date":"2007-11-18T05:22:03","version":"1.12"},{"version":"1.13","date":"2008-05-28T15:01:40"},{"version":"1.13_80","date":"2009-06-23T18:13:14"},{"version":"1.13_81","date":"2009-06-24T00:22:21"},{"date":"2009-06-24T02:33:08","version":"1.13_82"},{"date":"2010-09-28T22:59:25","version":"1.15_01"},{"version":"1.15_02","date":"2010-10-07T14:12:19"},{"version":"1.16","date":"2010-10-11T18:07:07"},{"version":"1.16_01","date":"2010-10-20T15:54:47"},{"version":"1.17","date":"2010-10-20T18:42:13"},{"version":"1.18_01","date":"2011-05-25T15:44:55"},{"date":"2011-05-31T19:29:50","version":"1.19"},{"version":"1.19_01","date":"2011-12-15T04:02:22"},{"version":"1.21","date":"2011-12-23T15:18:14"},{"date":"2012-01-15T05:02:24","version":"1.22"},{"date":"2012-12-04T21:29:08","version":"1.23"},{"date":"2014-04-14T03:15:07","version":"1.25_01"},{"version":"1.25","date":"2014-04-15T20:10:23"},{"date":"2014-12-04T20:57:02","version":"1.26"},{"date":"2016-06-22T23:30:00","version":"1.27"},{"version":"1.28","date":"2016-07-25T17:57:25"},{"date":"2020-01-20T05:04:23","version":"1.29"},{"date":"2022-04-01T19:18:30","version":"1.30"},{"version":"1.31","date":"2022-04-14T21:18:43"},{"version":"1.32","date":"2022-08-22T19:20:51"},{"version":"1.33","date":"2023-12-30T21:23:51"},{"date":"2006-01-28T00:00:00","dual_lived":1,"perl_release":"5.009003","version":"1.10_01"},{"dual_lived":1,"date":"2009-11-20T00:00:00","perl_release":"5.011002","version":"1.14"},{"version":"1.15","perl_release":"5.013003","date":"2010-07-20T00:00:00","dual_lived":1},{"version":"1.18","perl_release":"5.013009","date":"2011-01-20T00:00:00","dual_lived":1},{"version":"1.20","perl_release":"5.015005","date":"2011-11-20T00:00:00","dual_lived":1},{"perl_release":"5.019001","version":"1.24","dual_lived":1,"date":"2013-06-21T00:00:00"},{"perl_release":"5.022003","version":"1.26_01","date":"2017-01-14T00:00:00","dual_lived":1}]},"YAML":{"main_module":"YAML","versions":[{"version":"0.25","date":"2001-12-19T10:33:57"},{"version":"0.26","date":"2002-01-10T06:33:41"},{"date":"2002-01-15T22:34:34","version":"0.30"},{"version":"0.35","date":"2002-06-25T06:25:48"},{"version":"0.49_01","date":"2004-01-20T09:22:57"},{"date":"2005-01-31T06:49:59","version":"0.36"},{"version":"0.37","date":"2005-03-31T02:57:10"},{"date":"2005-03-31T10:16:09","version":"0.38"},{"version":"0.39","date":"2005-04-12T22:41:53"},{"version":"0.39","date":"2005-04-25T19:42:26"},{"version":"0.49_70","date":"2005-12-25T19:27:42"},{"version":"0.50","date":"2006-01-10T05:55:16"},{"version":"0.50","date":"2006-01-14T19:47:39"},{"date":"2006-01-18T23:03:28","version":"0.52"},{"date":"2006-01-19T19:13:35","version":"0.53"},{"date":"2006-01-30T02:22:33","version":"0.54"},{"date":"2006-01-30T03:11:55","version":"0.55"},{"date":"2006-01-30T18:41:21","version":"0.56"},{"date":"2006-02-02T07:36:12","version":"0.56"},{"date":"2006-02-14T21:21:22","version":"0.58"},{"date":"2006-07-01T05:16:14","version":"0.60"},{"date":"2006-07-02T20:36:06","version":"0.61"},{"date":"2006-07-03T22:52:48","version":"0.62"},{"date":"2007-06-20T23:18:21","version":"0.63"},{"version":"0.64","date":"2007-06-21T23:29:30"},{"version":"0.65","date":"2007-06-22T00:58:23"},{"version":"0.66","date":"2007-09-27T09:16:07"},{"version":"0.67","date":"2008-12-01T10:57:39"},{"version":"0.68","date":"2008-12-04T09:07:34"},{"version":"0.69_01","date":"2009-08-10T05:19:57"},{"date":"2009-08-10T12:44:33","version":"0.69_02"},{"date":"2009-08-10T17:23:08","version":"0.70"},{"date":"2010-01-03T01:52:05","version":"0.71"},{"version":"0.72","date":"2010-09-01T02:04:50"},{"date":"2011-04-19T10:57:00","version":"0.73"},{"date":"2011-09-25T20:06:34","version":"0.74"},{"version":"0.75","date":"2011-09-26T22:47:06"},{"version":"0.76","date":"2011-09-28T10:06:35"},{"version":"0.77","date":"2011-09-29T16:29:20"},{"version":"0.78","date":"2012-01-02T07:55:05"},{"version":"0.79","date":"2012-02-09T01:26:43"},{"date":"2012-02-10T20:57:18","version":"0.80"},{"date":"2012-04-19T18:04:48","version":"0.81"},{"version":"0.82","date":"2012-07-12T18:51:27"},{"date":"2012-07-13T15:45:29","version":"0.83"},{"version":"0.84","date":"2012-07-13T18:19:24"},{"date":"2013-11-24T15:44:47","version":"0.85"},{"version":"0.86","date":"2013-11-26T16:43:45"},{"version":"0.87","date":"2013-12-01T05:53:16"},{"date":"2013-12-03T05:30:33","version":"0.88"},{"version":"0.89","date":"2014-02-08T22:12:24"},{"date":"2014-02-10T16:45:22","version":"0.90"},{"date":"2014-05-27T21:16:01","version":"0.91"},{"date":"2014-05-29T03:07:13","version":"0.92"},{"date":"2014-06-14T05:33:25","version":"0.93"},{"version":"0.94","date":"2014-06-14T17:34:58"},{"version":"0.95","date":"2014-06-20T19:10:04"},{"date":"2014-07-14T05:59:12","version":"0.96"},{"date":"2014-07-17T06:38:34","version":"0.97"},{"date":"2014-07-30T19:33:24","version":"0.98"},{"date":"2014-08-07T00:57:08","version":"0.99"},{"version":"1.00","date":"2014-08-07T07:36:47"},{"date":"2014-08-07T21:49:48","version":"1.01"},{"version":"1.02","date":"2014-08-16T04:11:27"},{"version":"1.03","date":"2014-08-16T10:33:26"},{"date":"2014-08-16T15:30:43","version":"1.04"},{"date":"2014-08-16T20:04:31","version":"1.05"},{"date":"2014-08-16T23:51:52","version":"1.06"},{"date":"2014-08-18T15:40:59","version":"1.07"},{"date":"2014-08-18T17:23:04","version":"1.08"},{"version":"1.09","date":"2014-08-19T23:42:23"},{"version":"1.10","date":"2014-08-29T05:54:45"},{"date":"2014-08-30T03:10:03","version":"1.11"},{"version":"1.12","date":"2014-09-22T15:25:30"},{"date":"2014-10-11T16:07:22","version":"1.13"},{"date":"2015-01-17T23:33:39","version":"1.14"},{"version":"1.15","date":"2015-04-18T15:04:42"},{"version":"1.16","date":"2016-07-03T17:53:34"},{"version":"1.16_001","date":"2016-07-05T20:04:45"},{"version":"1.16_002","date":"2016-07-05T20:10:01"},{"version":"1.17","date":"2016-07-05T20:21:25"},{"date":"2016-07-08T14:53:24","version":"1.18"},{"date":"2016-11-11T22:44:07","version":"1.18_001"},{"date":"2016-11-18T18:46:59","version":"1.19"},{"version":"1.19_001","date":"2016-11-27T20:27:37"},{"version":"1.20","date":"2016-12-02T21:21:40"},{"version":"1.20_001","date":"2016-12-02T22:00:08"},{"date":"2016-12-07T21:17:58","version":"1.20_002"},{"date":"2016-12-23T20:20:06","version":"1.21"},{"date":"2017-02-14T22:24:38","version":"1.22"},{"version":"1.23","date":"2017-02-19T21:08:48"},{"version":"1.23_001","date":"2017-05-12T15:06:03"},{"date":"2017-05-14T13:15:34","version":"1.23_002"},{"date":"2017-10-29T22:09:18","version":"1.23_003"},{"version":"1.24","date":"2017-10-30T19:33:07"},{"date":"2018-05-06T19:10:48","version":"1.24_001"},{"version":"1.24_002","date":"2018-05-10T16:22:16"},{"date":"2018-05-11T17:59:33","version":"1.25"},{"version":"1.25_001","date":"2018-05-12T11:43:38"},{"version":"1.25_002","date":"2018-05-17T13:00:07"},{"version":"1.26","date":"2018-05-18T19:58:16"},{"version":"1.26_001","date":"2018-10-18T19:46:23"},{"version":"1.27","date":"2018-11-03T13:02:53"},{"version":"1.27_001","date":"2019-04-27T13:41:56"},{"version":"1.28","date":"2019-04-28T09:46:43"},{"version":"1.28_001","date":"2019-05-05T11:31:39"},{"version":"1.29","date":"2019-05-11T08:28:01"},{"version":"1.30","date":"2020-01-27T22:10:33"},{"date":"2023-12-27T15:11:23","version":"1.31"}],"advisories":[{"affected_versions":["<1.28"],"description":"Loading globs is easily exploitable.\n","fixed_versions":[">=1.28"],"id":"CPANSA-YAML-2019-01","reported":"2019-04-27","references":["https://github.com/ingydotnet/yaml-pm/issues/212"],"distribution":"YAML","severity":null,"cves":[]},{"fixed_versions":[">=1.25"],"description":"YAML loader can run DESTROY method of object created with perl/* tag.\n","affected_versions":["<1.25"],"severity":null,"cves":[],"references":["https://github.com/ingydotnet/yaml-pm/issues/176"],"reported":"2017-05-10","distribution":"YAML","id":"CPANSA-YAML-2017-01"}]},"Data-Dumper":{"main_module":"Data::Dumper","advisories":[{"cves":["CVE-2014-4330"],"distribution":"Data-Dumper","reported":"2014-09-30","references":["https://metacpan.org/changes/distribution/Data-Dumper"],"id":"CPANSA-Data-Dumper-2014-01","description":"Infinite recursion.\n","fixed_versions":[">=2.154"],"affected_versions":["<2.154"]}],"versions":[{"version":"1.21","date":"1995-11-19T22:29:08"},{"date":"1995-11-23T05:45:27","version":"1.22"},{"version":"1.23","date":"1995-12-04T03:12:16"},{"date":"1996-04-09T15:54:26","version":"2.00"},{"date":"1996-04-10T04:25:17","version":"2.01"},{"date":"1996-04-13T07:14:35","version":"2.02"},{"version":"2.03","date":"1996-08-26T14:36:59"},{"version":"2.04","date":"1996-08-28T20:11:49"},{"date":"1996-12-02T13:42:49","version":"2.05"},{"date":"1996-12-02T23:07:56","version":"2.06"},{"date":"1996-12-07T17:28:27","version":"2.07"},{"date":"1997-12-07T21:27:09","version":"2.08"},{"date":"1998-01-15T20:36:46","version":"2.081"},{"date":"1998-03-06T21:08:49","version":"2.081"},{"version":"2.09","date":"1998-07-17T05:23:08"},{"date":"1998-07-21T12:08:19","version":"2.09"},{"version":"2.10","date":"1998-10-31T12:10:30"},{"version":"2.101","date":"1999-05-01T02:01:03"},{"date":"1999-06-02T01:30:55","version":"2.101"},{"date":"2003-07-20T16:59:48","version":"2.12_01"},{"version":"2.12_02","date":"2003-07-31T19:12:44"},{"version":"2.121","date":"2003-08-25T11:49:41"},{"date":"2009-06-06T14:45:36","version":"2.121_20"},{"date":"2009-06-09T15:49:12","version":"2.122"},{"date":"2009-06-11T08:07:01","version":"2.123"},{"version":"2.124","date":"2009-06-13T15:22:32"},{"date":"2009-08-08T10:33:01","version":"2.125"},{"date":"2010-04-15T19:55:01","version":"2.126"},{"date":"2010-09-06T14:28:10","version":"2.126_01"},{"version":"2.127","date":"2010-09-10T07:08:41"},{"date":"2010-09-10T07:11:52","version":"2.128"},{"date":"2011-05-20T15:53:12","version":"2.130_03"},{"version":"2.131","date":"2011-05-27T14:19:03"},{"version":"2.135_01","date":"2011-12-19T08:23:05"},{"date":"2011-12-29T17:09:49","version":"2.135_02"},{"version":"2.135_07","date":"2012-08-07T06:59:51"},{"date":"2012-10-04T07:35:07","version":"2.136"},{"version":"2.139","date":"2012-12-12T06:30:48"},{"version":"2.143","date":"2013-02-26T06:57:29"},{"date":"2013-03-15T09:46:49","version":"2.145"},{"date":"2014-03-07T09:28:44","version":"2.151"},{"version":"2.154","date":"2014-09-18T15:47:37"},{"version":"2.160","date":"2016-07-03T19:17:57"},{"date":"2016-07-11T20:13:06","version":"2.161"},{"version":"2.167_01","date":"2017-07-31T15:31:28"},{"date":"2017-08-04T08:05:22","version":"2.167_02"},{"date":"2018-09-19T14:41:58","version":"2.172"},{"date":"2018-11-10T10:10:30","version":"2.173"},{"version":"2.179_50","date":"2021-05-14T12:47:34"},{"version":"2.180","date":"2021-05-17T05:53:02"},{"version":"2.180_50","date":"2021-05-22T09:51:29"},{"version":"2.180_51","date":"2021-05-23T14:14:12"},{"version":"2.180_52","date":"2021-05-24T08:03:55"},{"date":"2021-05-25T05:20:34","version":"2.180_53"},{"date":"2021-05-26T06:46:41","version":"2.181"},{"date":"2021-06-29T10:42:11","version":"2.181_50"},{"version":"2.182","date":"2021-06-30T09:36:34"},{"version":"2.182_50","date":"2021-07-01T07:05:45"},{"version":"2.182_51","date":"2021-07-03T13:07:49"},{"date":"2021-07-05T07:07:44","version":"2.183"},{"perl_release":"5.006001","version":"2.102","dual_lived":1,"date":"2001-04-08T00:00:00"},{"dual_lived":1,"date":"2002-03-05T00:00:00","version":"2.12","perl_release":"5.007003"},{"version":"2.121_02","perl_release":"5.008006","date":"2004-11-27T00:00:00","dual_lived":1},{"perl_release":"5.008007","version":"2.121_04","date":"2005-05-30T00:00:00","dual_lived":1},{"dual_lived":1,"date":"2006-01-31T00:00:00","perl_release":"5.008008","version":"2.121_08"},{"dual_lived":1,"date":"2008-12-14T00:00:00","perl_release":"5.008009","version":"2.121_17"},{"version":"2.121_13","perl_release":"5.009005","date":"2007-07-07T00:00:00","dual_lived":1},{"version":"2.121_14","perl_release":"5.010000","dual_lived":1,"date":"2007-12-18T00:00:00"},{"version":"2.129","perl_release":"5.013006","date":"2010-10-20T00:00:00","dual_lived":1},{"version":"2.130_01","perl_release":"5.013007","dual_lived":1,"date":"2010-11-20T00:00:00"},{"version":"2.130_02","perl_release":"5.013008","date":"2010-12-20T00:00:00","dual_lived":1},{"date":"2011-08-20T00:00:00","dual_lived":1,"perl_release":"5.015002","version":"2.132"},{"version":"2.134","perl_release":"5.015003","date":"2011-09-20T00:00:00","dual_lived":1},{"perl_release":"5.015007","version":"2.135_03","date":"2012-01-20T00:00:00","dual_lived":1},{"perl_release":"5.015008","version":"2.135_05","dual_lived":1,"date":"2012-02-20T00:00:00"},{"date":"2012-03-20T00:00:00","dual_lived":1,"perl_release":"5.015009","version":"2.135_06"},{"version":"2.137","perl_release":"5.017006","dual_lived":1,"date":"2012-11-20T00:00:00"},{"perl_release":"5.017008","version":"2.141","date":"2013-01-20T00:00:00","dual_lived":1},{"perl_release":"5.017009","version":"2.142","date":"2013-02-20T00:00:00","dual_lived":1},{"date":"2013-06-21T00:00:00","dual_lived":1,"perl_release":"5.019001","version":"2.146"},{"date":"2013-07-22T00:00:00","dual_lived":1,"version":"2.147","perl_release":"5.019002"},{"version":"2.148","perl_release":"5.019003","dual_lived":1,"date":"2013-08-20T00:00:00"},{"date":"2013-09-20T00:00:00","dual_lived":1,"perl_release":"5.019004","version":"2.149"},{"date":"2013-12-20T00:00:00","dual_lived":1,"version":"2.150","perl_release":"5.019007"},{"perl_release":"5.020002","version":"2.151_01","dual_lived":1,"date":"2015-02-14T00:00:00"},{"version":"2.152","perl_release":"5.021001","date":"2014-06-20T00:00:00","dual_lived":1},{"version":"2.155","perl_release":"5.021007","dual_lived":1,"date":"2014-12-20T00:00:00"},{"version":"2.156","perl_release":"5.021008","date":"2015-01-20T00:00:00","dual_lived":1},{"version":"2.157","perl_release":"5.021009","dual_lived":1,"date":"2015-02-21T00:00:00"},{"dual_lived":1,"date":"2015-03-20T00:00:00","perl_release":"5.02101","version":"2.158"},{"date":"2015-12-21T00:00:00","dual_lived":1,"perl_release":"5.023006","version":"2.159"},{"version":"2.162","perl_release":"5.025006","date":"2016-10-20T00:00:00","dual_lived":1},{"perl_release":"5.025007","version":"2.165","date":"2016-11-20T00:00:00","dual_lived":1},{"perl_release":"5.025008","version":"2.166","date":"2016-12-20T00:00:00","dual_lived":1},{"version":"2.167","perl_release":"5.025009","dual_lived":1,"date":"2017-01-20T00:00:00"},{"date":"2017-12-20T00:00:00","dual_lived":1,"version":"2.169","perl_release":"5.027007"},{"version":"2.170","perl_release":"5.027008","dual_lived":1,"date":"2018-01-20T00:00:00"},{"dual_lived":1,"date":"2018-08-20T00:00:00","version":"2.171","perl_release":"5.029002"},{"perl_release":"5.02901","version":"2.174","dual_lived":1,"date":"2019-04-20T00:00:00"},{"dual_lived":1,"date":"2021-01-23T00:00:00","version":"2.174_01","perl_release":"5.032001"},{"dual_lived":1,"date":"2020-08-20T00:00:00","version":"2.175","perl_release":"5.033001"},{"date":"2020-10-20T00:00:00","dual_lived":1,"version":"2.176","perl_release":"5.033003"},{"perl_release":"5.033008","version":"2.177","date":"2021-03-20T00:00:00","dual_lived":1},{"date":"2021-04-20T00:00:00","dual_lived":1,"version":"2.178","perl_release":"5.033009"},{"dual_lived":1,"date":"2021-05-20T00:00:00","version":"2.179","perl_release":"5.034000"},{"version":"2.184","perl_release":"5.035008","dual_lived":1,"date":"2022-01-20T00:00:00"},{"perl_release":"5.037001","version":"2.185","dual_lived":1,"date":"2022-06-20T00:00:00"},{"dual_lived":1,"date":"2022-07-20T00:00:00","perl_release":"5.037002","version":"2.186"},{"dual_lived":1,"date":"2022-11-20T00:00:00","version":"2.187","perl_release":"5.037006"},{"dual_lived":1,"date":"2023-03-20T00:00:00","perl_release":"5.037010","version":"2.188"},{"version":"2.189","perl_release":"5.039003","date":"2023-09-20T00:00:00","dual_lived":1}]},"CGI-Application-Plugin-CAPTCHA":{"main_module":"CGI::Application::Plugin::CAPTCHA","advisories":[{"severity":null,"cves":[],"reported":null,"references":["https://rt.cpan.org/Public/Bug/Display.html?id=30759","https://metacpan.org/release/CROMEDOME/CGI-Application-Plugin-CAPTCHA-0.02/changes","https://github.com/cromedome/cgi-application-plugin-captcha/commit/9acb5b6561a9983787ad85f55b01c69a895014e6"],"distribution":"CGI-Application-Plugin-CAPTCHA","id":"CPANSA-CGI-Application-Plugin-CAPTCHA-2024-001","fixed_versions":[">=0.02"],"description":"A malicious programmer creating an application to use the service can just have his application send along a cookie that he has created himself, and with that supply an appropriate verification string for his cookie. To avoid that you need to include som kind of hidden server-side password in the string being encrypted, and also include it when you verify.\n","affected_versions":["<0.02"]}],"versions":[{"version":"0.01","date":"2005-08-28T18:31:21"},{"date":"2011-01-05T05:07:55","version":"0.02"},{"version":"0.03","date":"2011-01-05T05:10:54"},{"version":"0.04","date":"2011-01-06T14:08:56"}]},"App-Github-Email":{"advisories":[{"reported":"2018-01-20","references":["https://metacpan.org/changes/distribution/App-Github-Email","https://github.com/faraco/App-Github-Email/commit/b7f052280d1c8ae97bdefc106ca3cbba4aea7213"],"distribution":"App-Github-Email","cves":["CVE-2015-7686"],"id":"CPANSA-App-Github-Email-2018-01","description":"Insecure dependency on Email::Address.\n","fixed_versions":[">=0.3.3"],"affected_versions":["<0.3.3"]}],"versions":[{"version":"0.0.1","date":"2017-01-16T08:03:02"},{"date":"2017-01-16T12:56:51","version":"0.0.2"},{"date":"2017-01-16T17:38:16","version":"0.0.3"},{"date":"2017-03-11T10:45:23","version":"0.0.4"},{"date":"2017-04-05T11:19:02","version":"0.0.5"},{"version":"0.0.6","date":"2017-04-15T17:35:18"},{"version":"0.0.7","date":"2017-05-19T05:05:24"},{"version":"0.1.0","date":"2017-12-18T14:11:19"},{"version":"0.1.1","date":"2017-12-21T08:24:12"},{"version":"0.2.0","date":"2018-01-15T03:18:05"},{"version":"0.2.1","date":"2018-01-20T12:55:34"},{"version":"0.3.1","date":"2018-08-30T16:07:18"},{"date":"2018-08-30T16:13:54","version":"0.3.2"},{"version":"0.3.3","date":"2018-08-31T03:49:31"}],"main_module":"App::Github::Email"},"Apache-MP3":{"advisories":[{"description":"A security bug allowed people to bypass the AllowDownload setting.\n","fixed_versions":[">=2.15"],"affected_versions":["<2.15"],"reported":"2001-01-01","references":["https://metacpan.org/dist/Apache-MP3/changes"],"distribution":"Apache-MP3","severity":null,"cves":[],"id":"CPANSA-Apache-MP3-2001-01"}],"versions":[{"version":"1.00","date":"2000-03-20T13:00:07"},{"date":"2000-05-27T04:19:21","version":"2.00"},{"date":"2000-05-27T04:34:42","version":"2.01"},{"version":"2.02","date":"2000-05-28T16:17:59"},{"date":"2000-08-23T13:46:23","version":"2.04"},{"date":"2000-08-25T14:45:54","version":"2.05"},{"version":"2.06","date":"2000-08-26T03:41:07"},{"version":"2.08","date":"2000-08-31T20:28:28"},{"date":"2000-09-03T18:31:17","version":"2.10"},{"version":"2.11","date":"2000-09-09T22:12:04"},{"date":"2000-11-21T22:15:07","version":"2.12"},{"date":"2000-12-31T04:29:03","version":"2.14"},{"version":"2.15","date":"2001-01-02T03:37:33"},{"version":"2.16","date":"2001-05-01T02:43:47"},{"version":"2.18","date":"2001-06-10T22:02:46"},{"version":"2.19","date":"2001-07-17T01:39:59"},{"version":"2.20","date":"2001-09-26T01:14:42"},{"version":"2.22","date":"2002-01-06T20:38:33"},{"version":"2.26","date":"2002-05-31T01:12:04"},{"date":"2002-08-16T04:18:25","version":"3.00"},{"date":"2002-08-18T17:41:46","version":"3.01"},{"date":"2002-10-14T03:26:03","version":"3.03"},{"version":"3.04","date":"2003-02-15T00:51:19"},{"version":"3.05","date":"2003-10-06T14:12:34"},{"date":"2006-04-15T01:26:38","version":"4.00"}],"main_module":"Apache::MP3"},"Mojolicious":{"main_module":"Mojolicious","versions":[{"date":"2010-02-11T02:04:14","version":"0.999920"},{"date":"2010-02-11T02:55:03","version":"0.999921"},{"date":"2010-02-26T18:50:34","version":"0.999922"},{"version":"0.999923","date":"2010-03-08T20:03:52"},{"version":"0.999924","date":"2010-03-20T22:56:55"},{"date":"2010-06-07T22:33:12","version":"0.999925"},{"date":"2010-06-11T10:33:01","version":"0.999926"},{"version":"0.999927","date":"2010-08-15T13:48:19"},{"version":"0.999928","date":"2010-08-17T17:41:47"},{"date":"2010-08-17T17:54:45","version":"0.999929"},{"version":"0.999930","date":"2010-10-19T13:57:49"},{"date":"2010-10-26T04:44:54","version":"0.999931"},{"version":"0.999932","date":"2010-10-30T00:54:42"},{"date":"2010-10-30T19:46:09","version":"0.999933"},{"version":"0.999934","date":"2010-11-01T00:33:14"},{"date":"2010-11-03T20:34:11","version":"0.999935"},{"date":"2010-11-04T23:48:46","version":"0.999936"},{"date":"2010-11-09T20:13:52","version":"0.999937"},{"version":"0.999938","date":"2010-11-09T21:24:17"},{"version":"0.999939","date":"2010-11-15T17:56:49"},{"date":"2010-11-15T23:18:40","version":"0.999940"},{"date":"2010-11-19T14:22:51","version":"0.999941"},{"date":"2010-12-01T18:57:50","version":"0.999950"},{"version":"1.0","date":"2010-12-26T14:55:33"},{"date":"2011-01-06T12:00:46","version":"1.01"},{"date":"2011-02-14T03:22:27","version":"1.1"},{"version":"1.11","date":"2011-02-18T17:07:03"},{"date":"2011-03-10T10:05:32","version":"1.12"},{"date":"2011-03-14T11:58:23","version":"1.13"},{"version":"1.14","date":"2011-03-17T13:24:28"},{"date":"2011-03-18T18:31:34","version":"1.15"},{"date":"2011-04-15T09:07:17","version":"1.16"},{"version":"1.17","date":"2011-04-18T21:49:07"},{"version":"1.18","date":"2011-04-19T21:03:20"},{"version":"1.19","date":"2011-04-19T22:17:44"},{"date":"2011-04-20T10:39:46","version":"1.20"},{"version":"1.21","date":"2011-04-20T15:29:17"},{"date":"2011-05-02T07:00:00","version":"1.22"},{"date":"2011-05-08T17:00:10","version":"1.31"},{"date":"2011-05-11T13:29:59","version":"1.32"},{"version":"1.33","date":"2011-05-20T12:32:57"},{"version":"1.34","date":"2011-05-22T13:20:40"},{"version":"1.4","date":"2011-06-02T09:03:36"},{"version":"1.41","date":"2011-06-03T10:12:43"},{"version":"1.42","date":"2011-06-09T14:12:56"},{"date":"2011-06-13T14:05:24","version":"1.43"},{"date":"2011-06-18T18:14:22","version":"1.44"},{"version":"1.45","date":"2011-06-20T00:25:16"},{"version":"1.46","date":"2011-06-21T04:56:47"},{"date":"2011-06-22T13:03:42","version":"1.47"},{"version":"1.48","date":"2011-06-24T12:01:47"},{"date":"2011-06-30T15:18:18","version":"1.49"},{"date":"2011-07-01T10:26:00","version":"1.50"},{"date":"2011-07-01T13:59:47","version":"1.51"},{"date":"2011-07-01T17:48:50","version":"1.52"},{"version":"1.53","date":"2011-07-02T11:48:49"},{"version":"1.54","date":"2011-07-03T18:04:37"},{"version":"1.55","date":"2011-07-04T21:23:51"},{"version":"1.56","date":"2011-07-05T20:49:36"},{"version":"1.57","date":"2011-07-07T02:00:07"},{"date":"2011-07-07T19:52:59","version":"1.58"},{"date":"2011-07-08T04:58:56","version":"1.59"},{"date":"2011-07-08T20:44:55","version":"1.60"},{"date":"2011-07-09T19:36:58","version":"1.61"},{"version":"1.62","date":"2011-07-10T00:40:32"},{"date":"2011-07-10T03:19:49","version":"1.63"},{"date":"2011-07-10T05:51:47","version":"1.64"},{"version":"1.65","date":"2011-07-25T18:13:25"},{"date":"2011-07-26T23:14:38","version":"1.66"},{"date":"2011-07-27T13:57:06","version":"1.67"},{"date":"2011-07-29T18:39:20","version":"1.68"},{"version":"1.69","date":"2011-08-03T14:32:24"},{"version":"1.70","date":"2011-08-04T15:34:41"},{"version":"1.71","date":"2011-08-05T04:01:50"},{"version":"1.72","date":"2011-08-05T20:07:50"},{"version":"1.73","date":"2011-08-09T10:07:19"},{"date":"2011-08-09T12:09:49","version":"1.74"},{"date":"2011-08-12T13:14:07","version":"1.75"},{"version":"1.76","date":"2011-08-12T14:54:00"},{"date":"2011-08-14T20:48:58","version":"1.77"},{"date":"2011-08-16T13:22:48","version":"1.78"},{"version":"1.79","date":"2011-08-17T17:43:58"},{"version":"1.80","date":"2011-08-17T19:08:11"},{"date":"2011-08-19T02:48:39","version":"1.81"},{"version":"1.82","date":"2011-08-19T04:55:49"},{"version":"1.83","date":"2011-08-19T05:21:15"},{"version":"1.84","date":"2011-08-19T18:08:30"},{"version":"1.85","date":"2011-08-20T00:19:42"},{"date":"2011-08-21T18:59:13","version":"1.86"},{"version":"1.87","date":"2011-08-23T00:49:19"},{"version":"1.88","date":"2011-08-23T19:20:37"},{"date":"2011-08-23T21:15:42","version":"1.89"},{"date":"2011-08-24T19:01:47","version":"1.90"},{"version":"1.91","date":"2011-08-25T05:54:05"},{"date":"2011-08-26T00:47:54","version":"1.92"},{"version":"1.93","date":"2011-08-27T09:11:59"},{"version":"1.94","date":"2011-08-27T10:52:14"},{"date":"2011-09-01T20:50:35","version":"1.95"},{"date":"2011-09-01T22:42:14","version":"1.96"},{"date":"2011-09-03T10:32:15","version":"1.97"},{"date":"2011-09-14T18:21:20","version":"1.98"},{"date":"2011-09-29T08:27:22","version":"1.99"},{"date":"2011-10-17T16:25:55","version":"2.0"},{"date":"2011-10-19T12:49:44","version":"2.01"},{"date":"2011-10-19T23:41:41","version":"2.02"},{"date":"2011-10-20T12:24:36","version":"2.03"},{"date":"2011-10-21T15:37:59","version":"2.04"},{"version":"2.05","date":"2011-10-22T16:36:22"},{"version":"2.06","date":"2011-10-22T21:44:31"},{"version":"2.07","date":"2011-10-23T00:39:23"},{"version":"2.08","date":"2011-10-23T01:30:44"},{"date":"2011-10-23T02:13:30","version":"2.09"},{"version":"2.10","date":"2011-10-25T02:22:41"},{"date":"2011-10-25T18:47:46","version":"2.11"},{"version":"2.12","date":"2011-10-27T01:54:39"},{"date":"2011-10-27T19:15:21","version":"2.13"},{"version":"2.14","date":"2011-10-28T20:28:23"},{"date":"2011-10-29T04:29:30","version":"2.15"},{"version":"2.16","date":"2011-10-29T20:52:07"},{"version":"2.17","date":"2011-10-30T00:55:35"},{"version":"2.18","date":"2011-10-30T18:03:30"},{"date":"2011-10-31T09:07:02","version":"2.19"},{"version":"2.20","date":"2011-11-01T00:40:20"},{"version":"2.21","date":"2011-11-02T01:29:01"},{"version":"2.22","date":"2011-11-03T15:21:43"},{"version":"2.23","date":"2011-11-04T18:45:33"},{"version":"2.24","date":"2011-11-05T16:16:00"},{"version":"2.25","date":"2011-11-08T21:13:48"},{"date":"2011-11-10T16:53:32","version":"2.26"},{"date":"2011-11-16T20:59:52","version":"2.27"},{"version":"2.28","date":"2011-11-17T23:44:36"},{"date":"2011-11-19T20:10:28","version":"2.29"},{"version":"2.30","date":"2011-11-20T00:19:04"},{"version":"2.31","date":"2011-11-20T22:25:03"},{"version":"2.32","date":"2011-11-24T10:31:31"},{"date":"2011-11-28T12:32:13","version":"2.33"},{"version":"2.34","date":"2011-11-28T14:02:31"},{"date":"2011-12-01T14:19:35","version":"2.35"},{"version":"2.36","date":"2011-12-05T10:52:35"},{"version":"2.37","date":"2011-12-10T18:18:16"},{"date":"2011-12-17T12:03:38","version":"2.38"},{"date":"2011-12-22T12:31:43","version":"2.39"},{"date":"2011-12-24T13:04:21","version":"2.40"},{"version":"2.41","date":"2011-12-28T16:09:18"},{"version":"2.42","date":"2012-01-02T17:15:52"},{"date":"2012-01-08T03:43:27","version":"2.43"},{"version":"2.44","date":"2012-01-17T23:21:12"},{"date":"2012-01-18T15:23:03","version":"2.45"},{"date":"2012-01-25T18:20:48","version":"2.46"},{"version":"2.47","date":"2012-02-06T16:28:27"},{"date":"2012-02-09T07:04:28","version":"2.48"},{"date":"2012-02-13T19:45:00","version":"2.49"},{"date":"2012-02-18T01:18:38","version":"2.50"},{"date":"2012-02-19T12:32:58","version":"2.51"},{"date":"2012-02-24T15:01:33","version":"2.52"},{"version":"2.53","date":"2012-02-25T05:53:29"},{"version":"2.54","date":"2012-02-27T15:31:19"},{"version":"2.55","date":"2012-02-27T19:26:41"},{"version":"2.56","date":"2012-03-01T21:07:06"},{"version":"2.57","date":"2012-03-03T22:01:50"},{"date":"2012-03-09T18:38:46","version":"2.58"},{"version":"2.59","date":"2012-03-09T19:02:23"},{"version":"2.60","date":"2012-03-13T16:50:25"},{"version":"2.61","date":"2012-03-14T00:41:48"},{"date":"2012-03-17T09:05:12","version":"2.62"},{"version":"2.63","date":"2012-03-20T18:39:51"},{"date":"2012-03-21T01:23:59","version":"2.64"},{"date":"2012-03-22T22:06:10","version":"2.65"},{"version":"2.66","date":"2012-03-23T16:16:55"},{"version":"2.67","date":"2012-03-24T14:29:35"},{"date":"2012-03-24T14:59:52","version":"2.68"},{"date":"2012-03-27T12:53:44","version":"2.69"},{"version":"2.70","date":"2012-03-30T21:24:44"},{"date":"2012-04-03T01:46:31","version":"2.71"},{"date":"2012-04-03T13:16:07","version":"2.72"},{"date":"2012-04-03T17:10:05","version":"2.73"},{"date":"2012-04-03T22:33:05","version":"2.74"},{"date":"2012-04-05T01:57:10","version":"2.75"},{"date":"2012-04-05T03:52:05","version":"2.76"},{"version":"2.77","date":"2012-04-09T12:36:15"},{"date":"2012-04-09T18:54:51","version":"2.78"},{"version":"2.79","date":"2012-04-10T10:58:23"},{"version":"2.80","date":"2012-04-10T14:25:57"},{"date":"2012-04-15T18:49:31","version":"2.81"},{"date":"2012-04-16T21:09:32","version":"2.82"},{"date":"2012-04-18T18:51:37","version":"2.83"},{"date":"2012-04-18T21:29:14","version":"2.84"},{"version":"2.85","date":"2012-04-19T15:37:54"},{"version":"2.86","date":"2012-04-23T12:21:14"},{"date":"2012-04-23T14:19:09","version":"2.87"},{"date":"2012-04-24T02:15:58","version":"2.88"},{"version":"2.89","date":"2012-04-24T20:08:49"},{"version":"2.90","date":"2012-04-25T11:35:38"},{"version":"2.91","date":"2012-04-26T19:20:37"},{"version":"2.92","date":"2012-04-30T16:50:01"},{"date":"2012-05-05T22:00:26","version":"2.93"},{"date":"2012-05-10T03:49:57","version":"2.94"},{"date":"2012-05-10T20:08:54","version":"2.95"},{"version":"2.96","date":"2012-05-21T08:26:37"},{"version":"2.97","date":"2012-05-28T12:11:13"},{"date":"2012-05-30T18:21:26","version":"2.98"},{"version":"3.0","date":"2012-06-26T06:45:51"},{"date":"2012-07-01T10:00:07","version":"3.01"},{"version":"3.02","date":"2012-07-03T19:21:54"},{"date":"2012-07-06T21:17:36","version":"3.03"},{"date":"2012-07-07T11:29:24","version":"3.04"},{"date":"2012-07-07T21:49:48","version":"3.05"},{"version":"3.06","date":"2012-07-11T17:27:01"},{"date":"2012-07-13T00:25:44","version":"3.07"},{"date":"2012-07-13T21:53:56","version":"3.08"},{"date":"2012-07-16T19:46:15","version":"3.09"},{"date":"2012-07-16T20:00:50","version":"3.10"},{"date":"2012-07-19T01:44:35","version":"3.11"},{"version":"3.12","date":"2012-07-20T12:30:03"},{"version":"3.13","date":"2012-07-24T17:03:04"},{"version":"3.14","date":"2012-07-27T11:05:47"},{"date":"2012-07-28T11:32:31","version":"3.15"},{"version":"3.16","date":"2012-07-31T18:55:11"},{"date":"2012-08-01T00:38:50","version":"3.17"},{"date":"2012-08-01T19:15:21","version":"3.18"},{"date":"2012-08-02T15:40:34","version":"3.19"},{"version":"3.20","date":"2012-08-03T23:32:38"},{"date":"2012-08-05T22:32:21","version":"3.21"},{"date":"2012-08-06T19:53:03","version":"3.22"},{"version":"3.23","date":"2012-08-07T03:37:26"},{"date":"2012-08-07T20:56:45","version":"3.24"},{"version":"3.25","date":"2012-08-08T00:31:31"},{"date":"2012-08-08T04:04:18","version":"3.26"},{"date":"2012-08-08T21:18:27","version":"3.27"},{"date":"2012-08-10T12:18:38","version":"3.28"},{"version":"3.29","date":"2012-08-13T13:42:56"},{"date":"2012-08-13T16:14:35","version":"3.30"},{"date":"2012-08-15T09:37:25","version":"3.31"},{"date":"2012-08-20T12:37:26","version":"3.32"},{"date":"2012-08-23T18:34:00","version":"3.33"},{"date":"2012-08-24T01:17:41","version":"3.34"},{"version":"3.35","date":"2012-08-27T22:52:31"},{"version":"3.36","date":"2012-08-30T00:59:43"},{"date":"2012-09-04T20:50:40","version":"3.37"},{"version":"3.38","date":"2012-09-07T00:05:53"},{"version":"3.39","date":"2012-09-10T11:58:00"},{"version":"3.40","date":"2012-09-11T18:03:47"},{"version":"3.41","date":"2012-09-13T18:22:49"},{"date":"2012-09-16T17:29:48","version":"3.42"},{"version":"3.43","date":"2012-09-22T19:40:59"},{"version":"3.44","date":"2012-09-29T11:20:17"},{"date":"2012-10-09T20:39:26","version":"3.45"},{"version":"3.46","date":"2012-10-10T20:55:33"},{"version":"3.47","date":"2012-10-12T23:10:49"},{"date":"2012-10-16T22:51:05","version":"3.48"},{"date":"2012-10-19T16:34:25","version":"3.49"},{"version":"3.50","date":"2012-10-20T01:34:34"},{"version":"3.51","date":"2012-10-23T20:23:54"},{"date":"2012-10-26T14:41:25","version":"3.52"},{"version":"3.53","date":"2012-10-31T02:41:01"},{"version":"3.54","date":"2012-11-01T04:36:00"},{"version":"3.55","date":"2012-11-08T11:20:15"},{"date":"2012-11-09T20:09:37","version":"3.56"},{"date":"2012-11-12T19:47:57","version":"3.57"},{"date":"2012-11-19T16:05:13","version":"3.58"},{"version":"3.59","date":"2012-11-20T19:53:03"},{"date":"2012-11-22T05:12:27","version":"3.60"},{"date":"2012-11-25T04:19:47","version":"3.61"},{"date":"2012-11-26T00:57:00","version":"3.62"},{"version":"3.63","date":"2012-11-28T10:17:51"},{"date":"2012-12-01T16:39:26","version":"3.64"},{"version":"3.65","date":"2012-12-08T22:47:54"},{"date":"2012-12-14T01:03:29","version":"3.66"},{"date":"2012-12-14T23:48:00","version":"3.67"},{"version":"3.68","date":"2012-12-16T00:55:55"},{"version":"3.69","date":"2012-12-20T22:47:53"},{"date":"2012-12-23T22:18:59","version":"3.70"},{"version":"3.71","date":"2013-01-02T11:57:12"},{"date":"2013-01-04T22:16:16","version":"3.72"},{"date":"2013-01-06T22:46:48","version":"3.73"},{"version":"3.74","date":"2013-01-07T18:47:06"},{"version":"3.75","date":"2013-01-08T16:15:03"},{"version":"3.76","date":"2013-01-10T00:00:19"},{"date":"2013-01-12T00:36:11","version":"3.77"},{"date":"2013-01-12T23:47:49","version":"3.78"},{"version":"3.79","date":"2013-01-13T00:50:13"},{"date":"2013-01-15T05:02:52","version":"3.80"},{"date":"2013-01-17T21:32:48","version":"3.81"},{"date":"2013-01-18T15:50:23","version":"3.82"},{"version":"3.83","date":"2013-01-27T15:28:40"},{"date":"2013-01-30T00:32:12","version":"3.84"},{"version":"3.85","date":"2013-02-13T00:56:23"},{"date":"2013-02-22T02:01:13","version":"3.86"},{"date":"2013-02-23T19:36:00","version":"3.87"},{"version":"3.88","date":"2013-03-03T21:53:52"},{"version":"3.89","date":"2013-03-04T16:12:24"},{"date":"2013-03-14T20:08:14","version":"3.90"},{"version":"3.91","date":"2013-03-17T22:59:42"},{"date":"2013-04-03T19:48:34","version":"3.92"},{"version":"3.93","date":"2013-04-05T21:46:38"},{"date":"2013-04-08T21:48:55","version":"3.94"},{"version":"3.95","date":"2013-04-12T03:49:59"},{"date":"2013-04-22T21:34:16","version":"3.96"},{"version":"3.97","date":"2013-04-25T21:49:41"},{"version":"4.0","date":"2013-05-15T20:02:05"},{"date":"2013-05-19T17:24:38","version":"4.01"},{"version":"4.02","date":"2013-05-20T16:55:00"},{"version":"4.03","date":"2013-05-21T05:24:56"},{"version":"4.04","date":"2013-05-23T21:25:32"},{"date":"2013-05-24T02:59:59","version":"4.05"},{"date":"2013-05-24T14:23:41","version":"4.06"},{"date":"2013-05-25T18:07:30","version":"4.07"},{"version":"4.08","date":"2013-05-30T21:45:51"},{"version":"4.09","date":"2013-05-31T02:24:29"},{"date":"2013-06-01T02:09:07","version":"4.10"},{"date":"2013-06-03T04:34:37","version":"4.11"},{"date":"2013-06-07T01:51:09","version":"4.12"},{"date":"2013-06-09T00:25:21","version":"4.13"},{"date":"2013-06-10T00:23:12","version":"4.14"},{"date":"2013-06-18T08:02:11","version":"4.15"},{"version":"4.16","date":"2013-06-19T01:27:29"},{"date":"2013-07-04T16:14:27","version":"4.17"},{"date":"2013-07-08T09:17:43","version":"4.18"},{"date":"2013-07-21T21:47:46","version":"4.19"},{"date":"2013-07-28T12:53:38","version":"4.20"},{"date":"2013-07-28T20:17:31","version":"4.21"},{"version":"4.22","date":"2013-07-29T19:13:38"},{"date":"2013-07-31T20:35:17","version":"4.23"},{"date":"2013-08-08T21:10:52","version":"4.24"},{"date":"2013-08-17T20:16:56","version":"4.25"},{"date":"2013-08-18T15:06:51","version":"4.26"},{"version":"4.27","date":"2013-08-26T15:29:36"},{"version":"4.28","date":"2013-08-29T16:11:59"},{"version":"4.29","date":"2013-08-31T02:01:44"},{"date":"2013-09-01T21:48:28","version":"4.30"},{"version":"4.31","date":"2013-09-04T20:09:26"},{"date":"2013-09-06T21:19:59","version":"4.32"},{"version":"4.33","date":"2013-09-07T20:38:03"},{"version":"4.34","date":"2013-09-08T20:58:54"},{"version":"4.35","date":"2013-09-10T21:40:13"},{"date":"2013-09-12T21:31:22","version":"4.36"},{"version":"4.37","date":"2013-09-13T01:32:54"},{"date":"2013-09-16T22:01:40","version":"4.38"},{"version":"4.39","date":"2013-09-17T04:53:49"},{"date":"2013-09-21T01:15:17","version":"4.40"},{"version":"4.41","date":"2013-09-21T17:25:38"},{"version":"4.42","date":"2013-09-30T07:46:05"},{"version":"4.43","date":"2013-10-02T19:16:26"},{"date":"2013-10-04T21:18:14","version":"4.44"},{"version":"4.45","date":"2013-10-06T15:46:08"},{"date":"2013-10-12T17:11:54","version":"4.46"},{"date":"2013-10-14T23:51:30","version":"4.47"},{"date":"2013-10-16T05:28:45","version":"4.48"},{"date":"2013-10-17T16:53:59","version":"4.49"},{"date":"2013-10-23T01:18:55","version":"4.50"},{"date":"2013-10-28T17:20:46","version":"4.51"},{"date":"2013-10-29T06:27:25","version":"4.52"},{"version":"4.53","date":"2013-10-30T00:21:27"},{"version":"4.54","date":"2013-11-07T00:45:35"},{"version":"4.55","date":"2013-11-07T02:38:24"},{"version":"4.56","date":"2013-11-10T02:56:56"},{"date":"2013-11-11T20:30:04","version":"4.57"},{"version":"4.58","date":"2013-11-19T20:46:01"},{"date":"2013-12-04T21:35:49","version":"4.59"},{"version":"4.60","date":"2013-12-11T16:33:35"},{"date":"2013-12-16T16:59:25","version":"4.61"},{"version":"4.62","date":"2013-12-17T20:35:36"},{"version":"4.63","date":"2013-12-19T22:59:01"},{"date":"2014-01-01T16:20:28","version":"4.64"},{"date":"2014-01-02T22:36:45","version":"4.65"},{"version":"4.66","date":"2014-01-04T21:48:06"},{"date":"2014-01-11T17:20:18","version":"4.67"},{"version":"4.68","date":"2014-01-21T22:24:03"},{"version":"4.69","date":"2014-01-24T04:06:26"},{"version":"4.70","date":"2014-01-26T22:08:54"},{"date":"2014-01-28T03:10:15","version":"4.71"},{"date":"2014-01-29T21:29:25","version":"4.72"},{"version":"4.73","date":"2014-02-01T05:20:38"},{"date":"2014-02-02T04:30:05","version":"4.74"},{"version":"4.75","date":"2014-02-02T06:54:56"},{"version":"4.76","date":"2014-02-04T22:41:32"},{"version":"4.77","date":"2014-02-06T23:19:13"},{"date":"2014-02-08T23:02:08","version":"4.78"},{"date":"2014-02-11T02:49:44","version":"4.79"},{"version":"4.80","date":"2014-02-13T04:30:43"},{"date":"2014-02-15T03:27:30","version":"4.81"},{"date":"2014-02-19T04:11:47","version":"4.82"},{"version":"4.83","date":"2014-02-19T06:20:46"},{"version":"4.84","date":"2014-02-22T22:59:02"},{"date":"2014-02-26T22:48:41","version":"4.85"},{"version":"4.86","date":"2014-03-03T05:45:32"},{"version":"4.87","date":"2014-03-04T07:14:15"},{"date":"2014-03-09T22:42:42","version":"4.88"},{"version":"4.89","date":"2014-03-13T21:30:57"},{"version":"4.90","date":"2014-03-16T21:22:35"},{"date":"2014-03-29T00:05:17","version":"4.91"},{"date":"2014-04-08T20:41:54","version":"4.92"},{"date":"2014-04-13T02:17:03","version":"4.93"},{"version":"4.94","date":"2014-04-19T23:39:22"},{"version":"4.95","date":"2014-04-27T03:27:43"},{"date":"2014-04-27T20:04:36","version":"4.96"},{"version":"4.97","date":"2014-04-29T22:12:52"},{"version":"4.98","date":"2014-05-09T01:57:34"},{"version":"4.99","date":"2014-05-12T00:46:43"},{"version":"5.0","date":"2014-05-29T20:15:51"},{"version":"5.01","date":"2014-05-30T14:51:14"},{"date":"2014-05-31T21:51:34","version":"5.02"},{"version":"5.03","date":"2014-06-02T22:07:46"},{"version":"5.04","date":"2014-06-03T21:11:50"},{"date":"2014-06-08T21:50:53","version":"5.05"},{"version":"5.06","date":"2014-06-12T02:08:01"},{"date":"2014-06-13T19:28:04","version":"5.07"},{"version":"5.08","date":"2014-06-16T23:44:48"},{"date":"2014-06-24T15:02:21","version":"5.09"},{"version":"5.10","date":"2014-06-28T23:25:12"},{"version":"5.11","date":"2014-07-03T04:01:24"},{"date":"2014-07-03T23:06:55","version":"5.12"},{"version":"5.13","date":"2014-07-13T00:44:29"},{"version":"5.14","date":"2014-07-14T22:01:49"},{"version":"5.15","date":"2014-07-17T17:58:05"},{"date":"2014-07-21T16:01:56","version":"5.16"},{"date":"2014-07-24T12:40:41","version":"5.17"},{"date":"2014-07-25T20:25:29","version":"5.18"},{"version":"5.19","date":"2014-07-26T21:03:13"},{"date":"2014-07-26T23:36:18","version":"5.20"},{"date":"2014-07-27T18:48:25","version":"5.21"},{"version":"5.22","date":"2014-07-30T16:42:35"},{"date":"2014-07-31T21:32:03","version":"5.23"},{"version":"5.24","date":"2014-08-02T21:56:32"},{"date":"2014-08-07T01:29:20","version":"5.25"},{"version":"5.26","date":"2014-08-09T21:26:37"},{"version":"5.27","date":"2014-08-11T14:26:47"},{"version":"5.28","date":"2014-08-13T00:32:33"},{"date":"2014-08-16T12:40:15","version":"5.29"},{"version":"5.30","date":"2014-08-17T21:49:15"},{"version":"5.31","date":"2014-08-19T17:40:27"},{"version":"5.32","date":"2014-08-21T18:19:53"},{"version":"5.33","date":"2014-08-23T22:25:32"},{"date":"2014-08-29T21:53:02","version":"5.34"},{"version":"5.35","date":"2014-08-30T21:57:50"},{"version":"5.36","date":"2014-09-02T00:20:21"},{"version":"5.37","date":"2014-09-03T20:55:45"},{"date":"2014-09-05T21:57:34","version":"5.38"},{"date":"2014-09-07T03:18:45","version":"5.39"},{"date":"2014-09-12T01:06:33","version":"5.40"},{"date":"2014-09-13T21:24:03","version":"5.41"},{"version":"5.42","date":"2014-09-17T21:54:39"},{"date":"2014-09-22T00:14:24","version":"5.43"},{"date":"2014-09-23T00:49:52","version":"5.44"},{"version":"5.46","date":"2014-09-27T03:21:55"},{"date":"2014-09-27T03:24:38","version":"5.45"},{"date":"2014-09-28T03:31:15","version":"5.47"},{"version":"5.48","date":"2014-10-07T23:08:14"},{"version":"5.49","date":"2014-10-10T21:12:14"},{"date":"2014-10-15T22:00:04","version":"5.50"},{"version":"5.51","date":"2014-10-17T21:48:17"},{"version":"5.52","date":"2014-10-18T20:49:34"},{"date":"2014-10-20T23:34:37","version":"5.53"},{"version":"5.54","date":"2014-10-23T22:51:06"},{"version":"5.55","date":"2014-10-29T00:58:34"},{"date":"2014-10-30T00:23:25","version":"5.56"},{"date":"2014-11-02T22:52:07","version":"5.57"},{"version":"5.58","date":"2014-11-07T00:04:47"},{"date":"2014-11-08T00:26:41","version":"5.59"},{"version":"5.60","date":"2014-11-12T01:31:36"},{"date":"2014-11-15T00:46:43","version":"5.61"},{"date":"2014-11-18T18:24:54","version":"5.62"},{"date":"2014-11-22T03:52:56","version":"5.63"},{"version":"5.64","date":"2014-11-23T02:12:00"},{"date":"2014-11-25T03:23:01","version":"5.65"},{"date":"2014-11-27T03:13:19","version":"5.66"},{"date":"2014-11-27T06:19:49","version":"5.67"},{"date":"2014-12-03T04:36:04","version":"5.68"},{"date":"2014-12-13T02:19:36","version":"5.69"},{"version":"5.70","date":"2014-12-18T00:12:31"},{"date":"2015-01-01T22:44:58","version":"5.71"},{"version":"5.72","date":"2015-01-11T20:02:04"},{"date":"2015-01-23T16:29:22","version":"5.73"},{"version":"5.74","date":"2015-01-24T13:32:51"},{"date":"2015-01-27T04:08:19","version":"5.75"},{"version":"5.76","date":"2015-02-02T19:36:16"},{"version":"5.77","date":"2015-02-03T02:37:04"},{"date":"2015-02-13T00:21:48","version":"5.78"},{"version":"5.79","date":"2015-02-13T05:32:50"},{"version":"5.80","date":"2015-02-18T05:24:00"},{"date":"2015-02-21T03:30:18","version":"5.81"},{"date":"2015-02-23T03:05:04","version":"5.82"},{"date":"2015-02-26T22:17:01","version":"6.0"},{"date":"2015-03-03T16:12:16","version":"6.01"},{"version":"6.02","date":"2015-03-10T02:53:22"},{"version":"6.03","date":"2015-03-16T04:43:10"},{"date":"2015-03-23T04:42:27","version":"6.04"},{"date":"2015-03-25T05:08:15","version":"6.05"},{"version":"6.06","date":"2015-04-07T00:55:21"},{"date":"2015-04-07T17:38:01","version":"6.07"},{"version":"6.08","date":"2015-04-09T22:03:46"},{"date":"2015-04-26T05:10:45","version":"6.09"},{"date":"2015-04-27T02:01:03","version":"6.10"},{"version":"6.11","date":"2015-05-16T22:14:01"},{"version":"6.12","date":"2015-06-18T21:48:20"},{"date":"2015-08-20T06:09:39","version":"6.16"},{"version":"6.17","date":"2015-08-22T19:38:51"},{"version":"6.18","date":"2015-09-02T17:26:36"},{"version":"6.19","date":"2015-09-12T23:37:29"},{"version":"6.20","date":"2015-09-16T22:50:30"},{"date":"2015-09-23T01:05:04","version":"6.21"},{"date":"2015-09-27T01:03:32","version":"6.22"},{"date":"2015-10-07T18:17:26","version":"6.23"},{"date":"2015-10-13T22:54:46","version":"6.24"},{"date":"2015-10-22T02:49:47","version":"6.25"},{"version":"6.26","date":"2015-10-29T00:29:07"},{"version":"6.27","date":"2015-10-30T00:07:08"},{"date":"2015-11-02T15:17:16","version":"6.28"},{"version":"6.30","date":"2015-11-12T02:59:43"},{"date":"2015-11-14T19:38:51","version":"6.31"},{"version":"6.32","date":"2015-11-18T18:16:15"},{"date":"2015-11-22T16:47:00","version":"6.33"},{"date":"2016-01-13T20:08:22","version":"6.40"},{"version":"6.42","date":"2016-01-24T22:01:52"},{"version":"6.43","date":"2016-02-01T16:15:40"},{"version":"6.44","date":"2016-02-05T22:42:51"},{"date":"2016-02-09T23:29:35","version":"6.45"},{"version":"6.46","date":"2016-02-14T00:51:10"},{"date":"2016-02-19T23:09:15","version":"6.47"},{"date":"2016-02-24T17:07:45","version":"6.48"},{"version":"6.49","date":"2016-02-26T22:47:33"},{"version":"6.50","date":"2016-02-27T00:12:03"},{"date":"2016-02-29T23:03:44","version":"6.51"},{"date":"2016-03-02T22:24:28","version":"6.52"},{"version":"6.53","date":"2016-03-04T00:58:55"},{"version":"6.54","date":"2016-03-07T15:09:42"},{"date":"2016-03-08T20:42:43","version":"6.55"},{"date":"2016-03-16T02:42:45","version":"6.56"},{"version":"6.57","date":"2016-03-23T04:23:41"},{"date":"2016-04-10T17:11:22","version":"6.58"},{"date":"2016-04-22T18:45:19","version":"6.59"},{"date":"2016-04-26T13:16:04","version":"6.60"},{"version":"6.61","date":"2016-05-02T17:31:34"},{"date":"2016-05-14T21:05:47","version":"6.62"},{"version":"6.63","date":"2016-06-03T21:10:48"},{"date":"2016-06-09T16:41:51","version":"6.64"},{"date":"2016-06-14T16:15:21","version":"6.65"},{"date":"2016-06-16T22:35:28","version":"6.66"},{"version":"7.0","date":"2016-07-19T06:21:07"},{"date":"2016-08-01T18:46:35","version":"7.01"},{"version":"7.02","date":"2016-08-17T16:34:19"},{"version":"7.03","date":"2016-08-17T16:40:11"},{"date":"2016-08-29T13:59:45","version":"7.04"},{"version":"7.05","date":"2016-08-29T16:44:18"},{"date":"2016-09-17T21:05:37","version":"7.06"},{"version":"7.07","date":"2016-09-20T12:30:54"},{"version":"7.08","date":"2016-09-23T17:19:00"},{"version":"7.09","date":"2016-10-23T09:46:35"},{"date":"2016-11-01T19:02:03","version":"7.10"},{"date":"2016-11-30T09:23:48","version":"7.11"},{"version":"7.12","date":"2016-12-20T08:41:05"},{"date":"2016-12-29T19:40:25","version":"7.13"},{"date":"2017-01-04T22:58:20","version":"7.14"},{"date":"2017-01-10T11:42:59","version":"7.15"},{"date":"2017-01-10T23:52:50","version":"7.16"},{"version":"7.17","date":"2017-01-11T08:35:01"},{"date":"2017-01-11T22:05:10","version":"7.18"},{"date":"2017-01-15T16:05:23","version":"7.19"},{"date":"2017-01-18T09:38:55","version":"7.20"},{"version":"7.21","date":"2017-01-22T14:29:35"},{"version":"7.22","date":"2017-01-25T23:09:32"},{"version":"7.23","date":"2017-01-29T21:43:19"},{"version":"7.24","date":"2017-02-05T21:09:47"},{"date":"2017-02-09T22:51:35","version":"7.25"},{"version":"7.26","date":"2017-02-15T23:08:52"},{"version":"7.27","date":"2017-02-27T17:02:21"},{"version":"7.28","date":"2017-03-07T21:36:36"},{"version":"7.29","date":"2017-03-14T23:27:54"},{"version":"7.30","date":"2017-04-06T12:04:02"},{"date":"2017-04-24T07:50:54","version":"7.31"},{"date":"2017-05-30T17:08:40","version":"7.32"},{"date":"2017-06-05T22:14:35","version":"7.33"},{"version":"7.34","date":"2017-07-02T22:04:01"},{"version":"7.35","date":"2017-07-05T07:50:23"},{"version":"7.36","date":"2017-07-10T07:48:45"},{"version":"7.37","date":"2017-07-24T07:55:46"},{"version":"7.38","date":"2017-08-01T21:56:47"},{"version":"7.39","date":"2017-08-03T08:50:10"},{"date":"2017-08-14T08:32:54","version":"7.40"},{"version":"7.41","date":"2017-08-16T08:19:30"},{"version":"7.42","date":"2017-08-17T11:15:42"},{"date":"2017-08-18T08:26:45","version":"7.43"},{"version":"7.44","date":"2017-09-03T16:04:13"},{"version":"7.45","date":"2017-09-07T08:41:40"},{"version":"7.46","date":"2017-09-12T12:27:00"},{"version":"7.47","date":"2017-10-12T08:26:53"},{"date":"2017-10-21T13:33:01","version":"7.48"},{"version":"7.49","date":"2017-10-30T13:18:49"},{"date":"2017-10-30T18:18:13","version":"7.50"},{"version":"7.51","date":"2017-10-31T19:14:43"},{"version":"7.52","date":"2017-11-02T22:29:23"},{"version":"7.53","date":"2017-11-04T15:24:07"},{"version":"7.54","date":"2017-11-04T22:50:30"},{"version":"7.55","date":"2017-11-07T10:58:56"},{"date":"2017-11-16T13:33:27","version":"7.56"},{"date":"2017-11-18T16:10:38","version":"7.57"},{"date":"2017-12-03T22:14:41","version":"7.58"},{"date":"2017-12-17T17:58:55","version":"7.59"},{"version":"7.60","date":"2018-01-03T14:00:44"},{"version":"7.61","date":"2018-01-15T15:35:28"},{"date":"2018-02-03T19:53:39","version":"7.62"},{"version":"7.63","date":"2018-02-06T20:52:51"},{"date":"2018-02-07T10:17:57","version":"7.64"},{"version":"7.65","date":"2018-02-11T21:55:33"},{"version":"7.66","date":"2018-02-14T08:55:35"},{"date":"2018-02-19T23:11:52","version":"7.67"},{"date":"2018-02-23T18:44:15","version":"7.68"},{"version":"7.69","date":"2018-02-24T21:58:41"},{"date":"2018-02-28T23:47:08","version":"7.70"},{"version":"7.71","date":"2018-03-16T16:41:58"},{"version":"7.72","date":"2018-04-02T21:01:43"},{"date":"2018-04-06T14:10:03","version":"7.73"},{"date":"2018-04-07T22:15:16","version":"7.74"},{"version":"7.75","date":"2018-04-10T16:04:41"},{"version":"7.76","date":"2018-04-24T16:55:32"},{"date":"2018-05-01T17:18:20","version":"7.77"},{"date":"2018-05-11T16:36:16","version":"7.78"},{"date":"2018-05-14T22:13:04","version":"7.79"},{"version":"7.80","date":"2018-05-20T22:46:20"},{"version":"7.81","date":"2018-05-21T22:39:30"},{"version":"7.82","date":"2018-05-27T21:59:59"},{"date":"2018-06-03T21:10:42","version":"7.83"},{"version":"7.84","date":"2018-06-06T14:04:49"},{"version":"7.85","date":"2018-06-19T15:57:43"},{"version":"7.86","date":"2018-07-03T11:30:46"},{"version":"7.87","date":"2018-07-04T10:20:11"},{"version":"7.88","date":"2018-07-13T11:00:52"},{"date":"2018-08-07T09:38:35","version":"7.89"},{"date":"2018-08-08T22:19:36","version":"7.90"},{"date":"2018-08-09T08:39:58","version":"7.91"},{"date":"2018-08-09T16:52:45","version":"7.92"},{"version":"7.93","date":"2018-08-12T14:23:08"},{"date":"2018-08-31T12:53:17","version":"7.94"},{"version":"8.0","date":"2018-09-14T22:17:06"},{"version":"8.01","date":"2018-09-25T16:14:07"},{"date":"2018-10-01T21:34:50","version":"8.02"},{"version":"8.03","date":"2018-10-16T22:41:46"},{"version":"8.04","date":"2018-10-21T20:23:27"},{"date":"2018-11-01T17:15:20","version":"8.05"},{"date":"2018-11-08T23:31:57","version":"8.06"},{"date":"2018-11-18T22:09:07","version":"8.07"},{"date":"2018-12-01T18:26:15","version":"8.08"},{"date":"2018-12-04T20:59:01","version":"8.09"},{"date":"2018-12-20T10:28:28","version":"8.10"},{"date":"2019-01-02T18:04:35","version":"8.11"},{"date":"2019-02-01T16:34:38","version":"8.12"},{"date":"2019-03-21T22:06:21","version":"8.13"},{"date":"2019-04-18T19:11:08","version":"8.14"},{"date":"2019-04-26T17:54:06","version":"8.15"},{"version":"8.16","date":"2019-05-19T19:50:45"},{"version":"8.17","date":"2019-05-23T20:50:59"},{"version":"8.18","date":"2019-06-28T21:29:47"},{"date":"2019-07-08T10:26:46","version":"8.19"},{"date":"2019-07-09T21:02:16","version":"8.20"},{"date":"2019-07-14T17:08:55","version":"8.21"},{"date":"2019-07-17T10:46:26","version":"8.22"},{"version":"8.23","date":"2019-08-12T22:52:14"},{"date":"2019-09-11T22:33:49","version":"8.24"},{"date":"2019-09-29T13:16:15","version":"8.25"},{"date":"2019-11-03T15:48:59","version":"8.26"},{"date":"2019-12-04T19:48:08","version":"8.27"},{"date":"2019-12-26T16:09:10","version":"8.28"},{"version":"8.29","date":"2019-12-28T16:58:30"},{"date":"2020-01-09T20:35:42","version":"8.30"},{"date":"2020-01-14T20:19:13","version":"8.31"},{"version":"8.32","date":"2020-01-19T14:35:03"},{"version":"8.33","date":"2020-02-11T20:25:08"},{"version":"8.34","date":"2020-03-16T17:27:27"},{"date":"2020-03-21T15:12:26","version":"8.35"},{"date":"2020-04-02T09:05:58","version":"8.36"},{"date":"2020-04-19T19:47:37","version":"8.37"},{"date":"2020-04-21T19:54:01","version":"8.38"},{"version":"8.39","date":"2020-04-22T12:49:38"},{"version":"8.40","date":"2020-04-23T09:24:25"},{"version":"8.41","date":"2020-05-01T13:34:44"},{"version":"8.42","date":"2020-05-04T17:15:38"},{"date":"2020-05-21T12:51:12","version":"8.43"},{"version":"8.50","date":"2020-05-25T19:06:44"},{"version":"8.51","date":"2020-05-31T12:29:16"},{"version":"8.52","date":"2020-06-03T20:01:13"},{"date":"2020-06-10T18:02:24","version":"8.53"},{"version":"8.54","date":"2020-06-14T17:42:03"},{"date":"2020-06-18T09:42:34","version":"8.55"},{"version":"8.56","date":"2020-06-26T20:08:07"},{"version":"8.57","date":"2020-07-17T09:08:51"},{"version":"8.58","date":"2020-08-10T18:14:24"},{"version":"8.59","date":"2020-09-13T16:04:24"},{"date":"2020-09-27T15:50:48","version":"8.60"},{"date":"2020-10-02T11:01:53","version":"8.61"},{"version":"8.62","date":"2020-10-12T09:57:55"},{"date":"2020-10-13T08:18:36","version":"8.63"},{"date":"2020-11-06T18:38:59","version":"8.64"},{"date":"2020-11-11T19:55:44","version":"8.65"},{"version":"8.66","date":"2020-11-30T10:42:18"},{"date":"2020-12-05T16:45:53","version":"8.67"},{"version":"8.68","date":"2020-12-27T23:38:05"},{"date":"2020-12-28T14:38:20","version":"8.69"},{"version":"8.70","date":"2020-12-30T14:43:19"},{"version":"8.71","date":"2021-01-17T17:06:28"},{"version":"8.72","date":"2021-01-27T15:33:24"},{"date":"2021-02-06T16:08:52","version":"8.73"},{"date":"2021-02-14T18:44:04","version":"9.0"},{"date":"2021-02-16T21:32:29","version":"9.01"},{"date":"2021-03-01T19:16:02","version":"9.02"},{"version":"9.03","date":"2021-03-07T18:49:12"},{"date":"2021-03-11T21:04:03","version":"9.07"},{"date":"2021-03-12T16:47:37","version":"9.08"},{"date":"2021-03-14T18:32:57","version":"9.09"},{"date":"2021-03-15T13:26:22","version":"9.10"},{"version":"9.11","date":"2021-03-20T16:41:03"},{"version":"9.12","date":"2021-03-20T21:25:26"},{"date":"2021-03-22T11:33:00","version":"9.13"},{"version":"9.14","date":"2021-03-23T22:54:21"},{"date":"2021-04-06T09:10:10","version":"9.15"},{"version":"9.16","date":"2021-04-09T11:31:09"},{"date":"2021-04-13T10:11:02","version":"9.17"},{"version":"9.18","date":"2021-05-23T14:06:27"},{"version":"9.19","date":"2021-06-02T09:14:48"},{"version":"9.20","date":"2021-08-09T17:26:54"},{"version":"9.21","date":"2021-08-13T19:14:43"},{"date":"2021-10-21T11:53:53","version":"9.22"},{"date":"2022-03-25T11:37:40","version":"9.23"},{"version":"9.24","date":"2022-04-18T18:28:00"},{"version":"9.25","date":"2022-04-28T15:21:32"},{"version":"9.26","date":"2022-05-23T15:17:22"},{"date":"2022-09-12T11:10:27","version":"9.27"},{"version":"9.28","date":"2022-10-14T18:55:13"},{"date":"2022-11-11T10:15:54","version":"9.29"},{"date":"2022-11-23T11:52:17","version":"9.30"},{"date":"2022-12-21T00:36:31","version":"9.31"},{"date":"2023-05-08T22:09:51","version":"9.32"},{"date":"2023-06-14T19:25:48","version":"9.33"},{"version":"9.34","date":"2023-09-11T18:34:53"},{"date":"2023-10-27T17:11:42","version":"9.35"},{"date":"2024-03-08T22:16:38","version":"9.36"},{"version":"9.37","date":"2024-05-13T17:48:56"},{"version":"9.38","date":"2024-08-17T14:52:48"},{"date":"2024-11-23T14:16:18","version":"9.39"}],"advisories":[{"affected_versions":["<9.31"],"description":"Mojo::DOM did not correctly parse